RED DIAMOND “BEST of 2016” ISSUE! INSIDE THIS ISSUE by TRADOC G-2 ACE Threats Integration Pathankot Attack

Total Page:16

File Type:pdf, Size:1020Kb

RED DIAMOND “BEST of 2016” ISSUE! INSIDE THIS ISSUE by TRADOC G-2 ACE Threats Integration Pathankot Attack Fort Leavenworth, KS Volume 7, Issue 12 December 2016 THIS MONTH: RED DIAMOND “BEST OF 2016” ISSUE! INSIDE THIS ISSUE by TRADOC G-2 ACE Threats Integration Pathankot Attack .................. 2 Sustainable Readiness ........ 6 TRADOC G-2 ACE Threats Skylark UAV ........................ 13 Integration (ACE-TI) produces Russian Criminals .............. 17 the Red Diamond monthly Antilanding Operations ...... 21 newsletter as one of several Hizballah .............................. 26 operational environment (OE), Russian EW ......................... 30 threat, and opposing force UK Use of DATE .................. 32 (OPFOR) resources for US Army Al Shabaab Hotel Targets .. 35 training, professional education, and leader development. This Militias in Ukraine, Pt 2 ...... 41 December issue is a selection of Modeling Threats ................ 50 articles published during 2016 Pakistan TTR ....................... 55 that showcase current, real- DJI-Phantom ....................... 60 world threats and how they can JRTC Rotation 16-09 .......... 64 be represented or replicated in Egypt and ISIL ..................... 70 Army learning venues across the range of live, virtual, constructive and gaming Defense of Kunduz ............. 77 (LVCG) simulations. Articles included in this issue range from real-world threats Threat 2025+ ........................ 80 (Egypt and ISIL) to doctrinal OPFOR (Modeling Threats), from tactics (Defense of ACE-TI POCs ....................... 85 Kunduz) to equipment (Skylark UAV), and from concept (Sustainable Readiness) to application (JRTC Rotation 16-09). OEE Red Diamond published by TRADOC G-2 OEE To be added to the Red Diamond e-distribution list, contact: ACE Threats Integration Mrs. Nicole Bier (DAC) Send suggestions to: TRADOC G-2 ACE Threats Integration ATTN: Red Diamond [email protected] Jon H. Moilanen (DAC), Operations, G-2 ACE-TI Red Diamond Disclaimer and Laura Deatrick (CGI CTR), The Red Diamond newsletter presents professional information but the views expressed Editor, G-2 ACE-TI herein are those of the authors, not the Department of Defense or its elements. The content does not necessarily reflect the official US Army position and does not change or supersede any information in other official US Army publications. Authors are responsible for the accuracy and source documentation of material that they reference. The Red Diamond staff reserves the right to edit material. Appearance of external hyperlinks does not constitute endorsement by the US Army for information contained therein. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED by H. David Pendleton, TRADOC G-2 ACE Threats Integration (CGI Ctr) TRADOC G-2 ACE-Threats Integration will soon release its latest Threat Action Report (TAR) on the 2 January 2016 Jaish- e-Mohammed (JeM) attack on the Pathankot Airbase in northwest India. This TAR validates the ability of a small unit to tie up a much larger number of personnel for several days, even after the elimination of all of the militants. The TAR also shows sophisticated threat actor planning, which included two cells initiating their mission despite the lack of direct communication between the groups. Lastly, the TAR demonstrates the likelihood that JeM made a concurrent assault in a different country hundreds of miles away, indicating a high level of coordination between the various action elements within their organization. In the early morning hours of 2 January 2016, four JeM members penetrated the perimeter of the Pathankot Airbase in Punjab state in northwestern India. Their intent was to divert the attention of base security personnel so another team of two militants could approach the runway in an attempt to destroy any fixed- or rotary-wing aircraft located on the tarmac. This pair of militants had been hiding out on the airbase for almost 48 hours, waiting to commence its mission. Due to the four- man team leaving behind its walkie-talkie, which caused a lack of direct communication during the mission that prevented better coordination between the two cells, the two-man team initiated its mission at a pre- planned time. Four-Man Team The loss of the walkie-talkie was not the first snag in the militants’ plans. On Wednesday, 30 December 2015, a JeM handler dropped the four attackers off at the Pakistani border near the Indian village of Bamiyal, Pathankot district, Punjab state. The team infiltrated over the border on the night of 31 December 2015 at almost the exact same location that another militant team had used in order to conduct an attack on a Pathankot police station the previous July. The team had arranged for a taxi to meet it, and used its own GPS device to take the back roads to the intended destination. The cabbie became suspicious, however, of his passengers’ possible nefarious intentions and purposely crashed his taxi into a tree, making the vehicle inoperable for future travel. For his efforts to thwart the attack, the militants executed their driver in a field adjacent to the crash site. Without transportation, the four militants flagged down and, using the small-arms weapons they carried, carjacked a vehicle containing three men returning home from a party. The carjackers, after initially blindfolding and securing the vehicle’s occupants, released two of the three men and kept one man as a hostage until he later escaped. The four-man cell then continued on toward its target. Unluckily for the militants, one of the released men, Salwinder Singh, was actually an unarmed Gurdaspur district police superintendent in civilian clothes. When the carjackers realized there was an inoperable blue police beacon mounted on their stolen vehicle, they returned to where they had released the two men but could not find them. The militants, however, decided to proceed with their mission despite the possible compromise. The superintendent and his friend walked over an hour to reach the closest police station, where Singh called his supervisor. Due to his subordinate’s spotty performance record, the supervisor refused to believe that the carjacking was Red Diamond Page 2 December 2016 terrorist-related. This conclusion came in spite of previous Indian security bulletins to the police in the border states warning them to be on the lookout for up to 15 militants that may have crossed into India from Pakistan. Singh’s supervisor just told him to go to work like normal. Even when Singh’s vehicle was found less than one-half mile from the Pathankot Airbase, the Indian security agencies failed to connect the carjacking with a potential terrorist act until just before the attack began. Due to previous intelligence received indicating a possible militant attack along the border, the Indian military directed that all mission-capable aircraft be flown out of Pathankot Airbase by midnight on 1 January 2016. The Indian government also dispatched 50 National Security Guard (NSG) commandos from New Delhi to Pathankot district to look for the suspected militants. Over the next couple of days, the number of “Black Cats”—the nickname for the NSG commandos— increased steadily in the Pathankot area. The exact target of the militants on the first day of the New Year was still unknown, but this would become apparent less than 24 hours later. After midnight on 1 January 2016, one member of the four-man team climbed a eucalyptus tree to reach the top of the Pathankot Airbase perimeter wall and cut the barbed wire on top. The team then used a nylon rope to help the others scale the wall. After crossing the wall, the team made three phone calls—two to its handlers and one personal call to an attacker’s mother—to let her know that he was on a suicide mission. While there was no closed-circuit television on the base, an unmanned aerial vehicle (UAV) with a camera observed the intruders crossing the fence. An Indian Air Force Garud (commando) Quick Reaction Team (QRT) quickly intercepted the militants and a firefight broke out, during which one of the QRT members was wounded. With its mission compromised, the four-man militant cell fled east in the direction of the runway, passing a couple of buildings on the way. Figure 1. Pathankot attack, April 2016 Red Diamond Page 3 December 2016 Figure 2. Action sequence of Pathankot attack, April 2016 The four-man militant team entered one of these buildings, which served as a Defense Security Corps (DSC) dining facility, where the cooks were just beginning to prepare breakfast. One of the DSC jawans (lower-ranking enlisted soldiers) thought something was amiss when a group of men wearing army fatigues suddenly appeared, and the jawan confronted the group. The militants attempted to escape, but the jawan chased down one of the intruders, took the intruder’s weapon away from him, and killed the militant. The three remaining intruders then shot and killed the jawan. The other cooks, however, were able to call security, who arrived quickly. The security personnel cornered the three remaining militants and killed them. Two-Man Team The team of two militants, despite having no communication with the four-man group, set out to destroy any non- operational aircraft still located on the tarmac and attempted to stealthily make its way to the runway. Due to the arrival of a large number of security personnel involved in eliminating the other four-man cell, the militants could never get closer than 700 meters from the runway. Eventually the two remaining attackers took refuge for over 12 hours in an unoccupied barracks, sleeping and eating, while they contemplated their next move. Due to the belief that only four militants had penetrated the airbase perimeter, the Indian security personnel thought all the attackers were dead; government officials even announced publically that the attack on Pathankot Airbase was over. To be on the safe side, security personnel systematically began to clear the other buildings on post, beginning with the most vital facilities. After hiding all day, the two remaining militants decided to ambush some security personnel as they walked by the barracks on Saturday night, 2 January 2016.
Recommended publications
  • REGLUGERÐ Um Breyting Á Reglugerð Um Þvingunaraðgerðir Varðandi Úkraínu Nr
    Nr. 745 9. júlí 2015 REGLUGERÐ um breyting á reglugerð um þvingunaraðgerðir varðandi Úkraínu nr. 281/2014, ásamt síðari breytingum. 1. gr. Þvingunaraðgerðir. Á eftir 33. tölul. 1. mgr. 2. gr. reglugerðar um þvingunaraðgerðir varðandi Úkraínu nr. 281/2014, ásamt síðari breytingum, komi eftirfarandi töluliðir sem hljóði svo: 34) Ákvörðun ráðsins 2014/933/SSUÖ frá 18. desember 2014 um breytingu á ákvörðun 2014/386/SSUÖ um þvingunaraðgerðir vegna ólöglegrar innlimunar Kríms og Sevastopol. 35) Ákvörðun ráðsins (SSUÖ) 2015/959 frá 19. júní 2015 um breytingu á ákvörðun 2014/386/SSUÖ um þvingunaraðgerðir vegna ólöglegrar innlimunar Kríms og Sevastopol. 36) Reglugerð ráðsins (ESB) nr. 1351/2014 frá 18. desember 2014 um breytingu á reglugerð (ESB) nr. 692/2014 um þvingunaraðgerðir vegna ólöglegrar innlimunar Kríms og Sevastopol. 37) Ákvörðun ráðsins 2014/801/SSUÖ frá 17. nóvember 2014 um breytingu á ákvörðun 2015/145/SSUÖ um þvingunaraðgerðir með tilliti til aðgerða sem grafa undan eða ógna landamærahelgi, fullveldi og sjálfstæði Úkraínu. 38) Ákvörðun ráðsins 2014/855/SSUÖ frá 28. nóvember 2014 um breytingu á ákvörðun 2015/145/SSUÖ um þvingunaraðgerðir með tilliti til aðgerða sem grafa undan eða ógna landamærahelgi, fullveldi og sjálfstæði Úkraínu. 39) Ákvörðun ráðsins (SSUÖ) 2015/241 frá 9. febrúar 2015 um breytingu á ákvörðun 2015/145/SSUÖ um þvingunaraðgerðir með tilliti til aðgerða sem grafa undan eða ógna landamærahelgi, fullveldi og sjálfstæði Úkraínu. 40) Ákvörðun ráðsins (SSUÖ) 2015/432 frá 13. mars 2015 um breytingu á ákvörðun 2015/145/SSUÖ um þvingunaraðgerðir með tilliti til aðgerða sem grafa undan eða ógna landamærahelgi, fullveldi og sjálfstæði Úkraínu. 41) Framkvæmdarreglugerð ráðsins (ESB) nr.
    [Show full text]
  • Could Uavs Improve New Zealand's Maritime Security?
    Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere without the permission of the Author. Could UAVs improve New Zealand’s Maritime Security? 149.800 Master of Philosophy Thesis Massey University Centre for Defence Studies Supervisor: Dr John Moremon By: Brian Oliver Due date: 28 Feb 2009 TABLE OF CONTENTS List of Figures ......................................................................................... iv Glossary .................................................................................................. v Abstract ................................................................................................ viii Introduction ............................................................................................ 1 Chapter 1: New Zealand's Maritime Environment ................................. 6 The Political Backdrop .................................................................... 10 Findings of the Maritime Patrol Review .......................................... 12 Maritime Forces Review ................................................................. 18 The current state of maritime surveillance ..................................... 19 The National Maritime Coordination Centre ................................... 23 Chapter 2: The Value of New Zealand's Maritime Environment ......... 29 Oil and gas production in New Zealand ........................................
    [Show full text]
  • Télécharger Au Format
    N° 09/2013 recherches & documents Décembre 2013 Les drones armés israéliens : capacités, bilan de leur emploi et perspectives PHILIPPE GROS Avec le soutien de la Direction générale de l’armement WWW . FRSTRATEGIE . ORG Édité et diffusé par la Fondation pour la Recherche Stratégique 4 bis rue des Pâtures – 75016 PARIS ISSN : 1966-5156 ISBN : 978-2-911101-79-3 EAN : 9782911101793 WWW.FRSTRATEGIE.ORG 4 BIS RUE DES PÂTURES 75016 PARIS TÉL.01 43 13 77 77 FAX 01 43 13 77 78 SIRET 394 095 533 00052 TVA FR74 394 095 533 CODE APE 7220Z FONDATION RECONNUE D'UTILITÉ PUBLIQUE – DÉCRET DU 26 FÉVRIER 1993 SOMMAIRE INTRODUCTION .......................................................................................................................... 5 RESUME .................................................................................................................................... 7 ENSEIGNEMENTS POUR NOTRE APPAREIL DE FORCE ................................................................. 11 1 – HISTORIQUE SUCCINCT DE L'EMPLOI DES DRONES ISR ET DRONES ARMES AU SEIN DES IDF ............................................................................................................ 13 2 – ORDRE DE BATAILLE ET PRINCIPAUX EQUIPEMENTS ........................................................ 15 2.1 – L'ordre de bataille actuel des drones de l'IAF .................................................. 15 2.2 – Instruction et entraînement des personnels ..................................................... 18 2.3 – Les principaux systèmes de drone de l'IAF
    [Show full text]
  • List of Persons and Entities Under EU Restrictive Measures Over the Territorial Integrity of Ukraine
    dhdsh PRESS Council of the European Union EN List of persons and entities under EU restrictive measures over the territorial integrity of Ukraine List of Persons Name Identifying Reasons Date of listing information 1. Sergey Valeryevich DOB: 26.11.1972. Aksyonov was elected 'Prime Minister of Crimea' in the Crimean 17.3.2014 AKSYONOV, Verkhovna Rada on 27 February 2014 in the presence of pro-Russian POB: Beltsy (Bălţi), gunmen. His 'election' was decreed unconstitutional by the acting Sergei Valerievich now Republic of Ukrainian President Oleksandr Turchynov on 1 March 2014. He actively AKSENOV (Сергей Moldova lobbied for the 'referendum' of 16 March 2014 and was one of the co- Валерьевич signatories of the ’treaty on Crimea´s accession to the Russian AKCëHOB), Federation’ of 18 March 2014. On 9 April 2014 he was appointed acting Serhiy Valeriyovych ‘Head’ of the so-called ‘Republic of Crimea’ by President Putin. On 9 AKSYONOV (Сергiй October 2014, he was formally ‘elected’ 'Head' of the so-called 'Republic Валерiйович Аксьонов) of Crimea'. Aksyonov subsequently decreed that the offices of ‘Head’ and ‘Prime Minister’ be combined. Member of the Russia State Council. 1/83 dhdsh PRESS Council of the European Union EN Name Identifying Reasons Date of listing information 2. Rustam Ilmirovich DOB: 15.8.1976 As former Deputy Minister of Crimea, Temirgaliev played a relevant role 17.3.2014 TEMIRGALIEV in the decisions taken by the ‘Supreme Council’ concerning the POB: Ulan-Ude, ‘referendum’ of 16 March 2014 against the territorial integrity of Ukraine. (Рустам Ильмирович Buryat ASSR He lobbied actively for the integration of Crimea into the Russian Темиргалиев) (Russian SFSR) Federation.
    [Show full text]
  • Spinning Russia's 21St Century Wars
    Research Article This is an Open Access article distributed under the terms of the Creative The RUSI Journal Commons Attribution-Non-Commercial-NoDerivatives License (https:// creativecommons.org/licenses/by-nc-nd/4.0/). Spinning Russia’s 21st Century Wars Zakhar Prilepin and his ‘Literary Spetsnaz’ Julie Fedor In this article, Julie Fedor examines contemporary Russian militarism through an introduction to one of its most high-profile representatives, the novelist, Chechen war veteran and media personality Zakhar Prilepin. She focuses on Prilepin’s commentary on war and Russian identity, locating his ideas within a broader strand of Russian neo-imperialism. he Russian annexation of Crimea in 2014 brand of militarism that has come to pervade the and the war in the Donbas which began Russian media landscape, Prilepin warrants our T that same year have been accompanied by attention. Studying his career and output can help a remarkable drive to mobilise cultural production to illuminate the context and underpinnings of the in Russia in support of a new brand of state- domestic support for the official military doctrine sponsored militarism. Using a variety of media and policy that is more commonly the subject of platforms and reaching mass popular audiences, scholarship on Russian military and security affairs. a range of cultural celebrities – actors, writers, This article focuses on Prilepin’s commentary rock stars, tabloid war correspondents – have on the nature of war and Russian identity, locating played a key role in framing and shaping domestic his ideas within a broader strand of Russian perceptions of Russia’s 21st Century wars. Despite neo-imperialism in which war is claimed as a vital their prominence in Russian media space, their source of belonging, power and dignity.1 It shows activities have received surprisingly little scholarly how the notion of a special Russian relationship attention to date.
    [Show full text]
  • Where-The-East-Meets-The-West-1.Pdf
    ICIT Contributor Series Where the East Meets the West: How Western Internet and Modern Communications Technology Helped Soviet-style Propaganda in Donbass October 2018 By: Ms Jamila Mammadova, Research Assistant at the Henry Jackson Society A publication is supported by the Institute’s CCIOS initiative: 1 The ICIT Contributor Series publishes original content from national security and cybersecurity contributors around the world in support of ICIT’s mission. The views and opinions expressed are those of the author(s) and do not necessarily represent that of the Institute or its Fellows, members, donors or other contributors. The author(s) have confirmed to ICIT the originality of this body of work and have provided all citations where appropriate. Copyright © 2018 Institute for Critical Infrastructure Technology 2 Where the East Meets the West: How Western Internet and Modern Communications Technology Helped Soviet-style Propaganda in Donbass “We must spread our priciples, not with words but with deeds, for this is the most popular, the most potent, and the most irresistible form of propaganda”1 - Mikhail Bakunin (1870) Perhaps nowhere has information warfare been as pronounced and aggressive in the last couple of years as in Ukraine. Since 2014, the Ukrainian government in Kyiv has been battling against separatists in Donbass on both the military and informational fronts. There should be no surprise therefore, that the country has turned into a “cyber safe haven”, with the ongoing political, economic and military crises providing little hope that Ukraine will climb down in the world's top cyber crime list in the foreseeable future.2 The separatists have not only managed to disrupt the central government's infrastructure and its presence in the digital space.
    [Show full text]
  • 'Precise' Strikes: Fractured Bodies, Fractured Lives
    Israel’s drone wars: An update ‘Precise’ strikes: Fractured Bodies, Fractured Lives Front Cover image: Israel’s Heron TP drone at Tel Nof Air Force base, February 2010. Credit: UPI/Debbie Hill. Note: The term ‘drone’ is used interchangeably with ‘Unmanned Aerial Vehicle (UAV)’ Drone Wars UK is a small British NGO established in 2010 to undertake research and advocacy around the use of armed drones. We believe that the growing use of remotely-controlled, armed unmanned systems is encouraging and enabling a lowering of the threshold for the use of lethal force as well as eroding well established human rights norms. While some argue that the technology itself is neutral, we believe that drones are a danger to global peace and security. We have seen over the past decade that once these systems are in the armoury, the temptation to use them becomes great, even beyond the constraints of international law. As more countries develop or acquire this technology, the danger to global peace and security grows. Published by Drone Wars UK Drone Wars UK Written by Chloe Skinner Peace House, 19 Paradise Street November 2019 Oxford, OX1 1LD Designed: Chris Woodward www.dronewars.net www.chriswoodwarddesign.co.uk [email protected] ‘Precise Strikes’, Fractured Bodies, Fractured Lives | Israel’s drone wars: An update | 1 Contents 1 INTRODUCTION 3 2 “A RAPIDLY-GROWING DIVISION”: Israel’s drones and their operators 5 3 “ACCESS, PERSISTENCE, ACCURACY.” The humanitarian claims made for drone technology 8 4 “IN A MATTER OF SECONDS, THEY WERE CUT TO PIECES.” Life
    [Show full text]
  • Aviation Week & Space Technology
    Russia’s No Takers for Litmus Test Air Traffi c Games Airbus’s A330 Regional for the F-35B AVIATIONWEEK$14.95 APRIL 27 - MAY 10, 2015 & SPACE TECHNOLOGY ADVANCED MANUFACTURING Automotive to Aerospace TOP-PERFORMING RICH MEDIA COMPANIES EXCLUSIVE Too Focused on the Near Term? STARTS AFTER PAGE 40 International AVIATION$14.95 APRIL 27 - MAY 10, 2015 WEEK & SPACE TECHNOLOGY Litmus Test For the F-35B PAGE 40 Zephyr Rises Again PAGE DTI 11 U.S. Navy’s UAV Swarm PAGE 34 Russia’s Air Traffic Games PAGE 26 AviationWeek.com/awst AviationWeek.com/awst Digital Edition Copyright Notice The content contained in this digital edition (“Digital Material”), as well as its selection and arrangement, is owned by Penton. and its affiliated companies, licensors, and suppliers, and is protected by their respective copyright, trademark and other proprietary rights. Upon payment of the subscription price, if applicable, you are hereby authorized to view, download, copy, and print Digital Material solely for your own personal, non-commercial use, provided that by doing any of the foregoing, you acknowledge that (i) you do not and will not acquire any ownership rights of any kind in the Digital Material or any portion thereof, (ii) you must preserve all copyright and other proprietary notices included in any downloaded Digital Material, and (iii) you must comply in all respects with the use restrictions set forth below and in the Penton Privacy Policy and the Penton Terms of Use (the “Use Restrictions”), each of which is hereby incorporated by reference. Any use not in accordance with, and any failure to comply fully with, the Use Restrictions is expressly prohibited by law, and may result in severe civil and criminal penalties.
    [Show full text]
  • Annex-To-Ukraine-News-Release-26-September-2016.Pdf
    ANNEX TO NOTICE FINANCIAL SANCTIONS: UKRAINE (SOVEREIGNTY AND TERRITORIAL INTEGRITY) COUNCIL IMPLEMENTING REGULATION (EU) No 2016/1661 AMENDING ANNEX I TO COUNCIL REGULATION (EU) No 269/2014 AMENDMENTS Individuals 1. KONSTANTINOV, Vladimir, Andreevich DOB: 19/11/1956. POB: (1) Vladimirovka (a.k.a Vladimirovca), Slobozia Region, Moldavian SSR (now Republic of Moldova/Transnistria region (2) Bogomol, Moldaovian SSR, Republic of Moldova Position: Speaker of the Supreme Council of the Autonomous Republic of Crimea Other Information: Since 17 March 2014, KONSTANTINOV is Chairman of the State Council of the so-called Republic of Crimea. Listed on: 18/03/2014 Last Updated: 23/03/2016 17/09/2016 Group ID: 12923. 2. SIDOROV, Anatoliy, Alekseevich DOB: 02/07/1958. POB: Siva, Perm region, USSR Position: Chief of the Joint Staff of the Collective Security Treaty Organisation (CSTO) (Since November 2015). Commander, Russia’s Western Military District Other Information: Former Commander, Russia's Western Military District. Listed on: 18/03/2014 Last Updated: 21/09/2015 17/09/2016 Group ID: 12931 3. KOVITIDI, KOVATIDI Olga, Fedorovna DOB: 07/05/1962. POB: Simferopol, Ukrainian SSR Position: Member of the Russian Federation Council from the annexed Autonomous Republic of Crimea Listed on: 29/04/2014 Last Updated: 21/09/2015 17/09/2016 Group ID: 12954. 4. PONOMARIOV, Viacheslav DOB: 02/05/1965. POB: Sloviansk, Donetsk Oblast a.k.a: (1) PONOMAREV, Viacheslav, Vladimirovich (2) PONOMARYOV, Vyacheslav, Volodymyrovich Other Information: Former self-declared ‘People’s Mayor’ of Sloviansk (until 10 June 2014). Listed on: 12/05/2014 Last Updated: 23/03/2016 17/09/2016 Group ID: 12970.
    [Show full text]
  • Security, Protracted Conflicts and the Role of Drones in Eurasia Note: the Term ‘Drone’ Is Used Interchangeably with ‘Unmanned Aerial Vehicle (UAV)’ in This Report
    On the Edge Security, protracted conflicts and the role of drones in Eurasia Note: The term ‘drone’ is used interchangeably with ‘Unmanned Aerial Vehicle (UAV)’ in this report. Supported by a funding from the Foundation Open Society Institute in cooperation with the Human Rights Initiative of the Open Society Foundations. Drone Wars UK is a small British NGO established in 2010 to undertake research and advocacy around the use of armed drones. We believe that the growing use of remotely-controlled, armed unmanned systems is encouraging and enabling a lowering of the threshold for the use of lethal force as well as eroding well established human rights norms. While some argue that the technology itself is neutral, we believe that drones are a danger to global peace and security. We have seen over the past decade that once these systems are in the armoury, the temptation to use them becomes great, even beyond the constraints of international law. As more countries develop or acquire this technology, the danger to global peace and security grows. Published by Drone Wars UK Drone Wars UK Written by Joanna Frew Peace House, 19 Paradise Street January 2021 Oxford, OX1 1LD Design by Chris Woodward www.dronewars.net www.chriswoodwarddesign.co.uk [email protected] On the Edge | 1 Contents 1 Introduction 2 2 Ukraine and conflicts with Russian-backed separatists in Crimea and Donbas 5 Use of Drones in Crimea & the Donbas Armed Drones on the Horizon Russian and Separatist use of Drones Ukrainian Drones Russian and Separatists Drones 3 Georgia, South
    [Show full text]
  • Chapter 15: Africa - World’S First Busiest Drone Operational Proving Ground - Where Counter-Terrorism and Modernization Meet
    Nichols, Ryan, Mumm, Lonstein, & Carter Chapter 15: Africa - World’s First Busiest Drone Operational Proving Ground - Where Counter-Terrorism and Modernization Meet Student Learning Objectives – Africa has become the drone investment -playground of many nations. The student will be introduced to activities of these geopolitical players (US, France, EU, Germany, Egypt and China) and the significance of their intentions. The history of drone investments / operations in Africa is directly a function of the growth of terrorist organizations and African economy. Africa – Overview Africa is a developing continent comprised of unstable states due to undeveloped economy, poor education, and unified government among the states. Africa’s leaders want to see their country develop and become a world leader. They look to their long-term allies to solve their issues. Radical Islam continues to spread and threaten the future of Africa. With the turbulence of state’s government, insurgence groups have joined forces with terrorist organizations affiliated with radical Islam. Radical Islamic extremists are a global security threat. Therefore, several countries fighting terror at home are also assisting Africa in the fight on terror. A priority goal of many African leaders is to defeat terrorism. They feel this can be achieved by stopping terrorist organizations membership growth. Conflict on land is not the only issue facing Africa, maritime security is a huge factor in Africa’s economic growth. Other countries willingly assist Africa in protecting their waterways to reap the benefits of trade and profit. There are high stakes for China, European Union, and United States to ensure Africa’s perimeter allows for safe passage of Commercial and Military vessels.
    [Show full text]
  • Memorial on Admissibility on Behalf of the Government of Ukraine
    Ukraine v. Russia (re Eastern Ukraine) APPLICATION NO. 8019/16 Kyiv, 8 November 2019 MEMORIAL ON ADMISSIBILITY ON BEHALF OF THE GOVERNMENT OF UKRAINE CHAPTER 1: INTRODUCTION 1. The Russian Federation has consistently denied its involvement in the conflict in eastern Ukraine, and has sought to evade international legal responsibility by adopting a series of measures to disguise and “outsource” its military aggression in eastern Ukraine. The Kremlin’s denials of direct involvement were implausible from the outset, and were roundly rejected by the international community. All of the relevant international institutions rightly hold Moscow responsible for a pattern of conduct that has been designed to destabilise Ukraine by sponsoring separatist entities in the use of armed force against the legitimate Government and members of the civilian population. Almost from the outset, the United Nations, the Council of Europe, the European Union, and the G7 all re-affirmed Ukraine’s sovereignty and territorial integrity within its internationally recognised borders, and condemned the Russian Federation’s continuing proxy war in eastern Ukraine. As the conflict has continued, the evidence of Russia’s direct and indirect involvement in the violent rebellion in Donbass has become more and more apparent. Despite Russia’s crude attempts to conceal its involvement, the proof of Russian State responsibility has steadily mounted. In the face of the obvious truth, Russia’s policy of implausible deniability has fallen apart completely. 2. Ukraine submits that the human rights violations committed by Russian forces and their proxies, as particularised in this application, fall directly within Russia’s extra-territorial jurisdiction for the purposes of article 1 of the Convention.
    [Show full text]