American National Security Strategy As It Pertains to the Afghanistan War Robert Hayworth Walden University

Total Page:16

File Type:pdf, Size:1020Kb

American National Security Strategy As It Pertains to the Afghanistan War Robert Hayworth Walden University Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2018 American National Security Strategy as it Pertains to the Afghanistan War Robert Hayworth Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Robert Hayworth has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. David Kilmnick, Committee Chairperson, Public Policy and Administration Faculty Dr. Tamara Mouras, Committee Member, Public Policy and Administration Faculty Dr. Kathleen Schulin, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer Eric Riedel, Ph.D. Walden University 2018 Abstract American National Security Strategy as it Pertains to the Afghanistan War by Robert Hayworth MPA, Troy University, 1998 BA, Troy University, 1997 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University February 2018 Abstract Following 16 years of war in Afghanistan the number of U.S. military, Coalition forces and Afghan civilian fatalities has exceeded the number of Americans lost on 9/11 and has cost the United States nearly $841 billion dollars. The results are that Afghanistan remains in turmoil and that terrorist attacks, the reason for the invasion, continues. The question is should United States assess a different approach that would result in less blood and treasure being spent to address the need to mitigate terrorist threats. Guided by the analysis of conventional- centric and asymmetric-centric approaches to a counterterrorism strategy, this qualitative study focused on evaluating the effects of U.S. national strategy for the Afghanistan war between 2001 and 2016. A narrative inquiry was employed that used extensive in-depth interviews with five implementers and five recipients of the American strategy based in Afghanistan. The participants were recruited from the U.S. Special Forces community that implemented American strategy in Afghanistan, and from Afghans that experienced the American strategy firsthand. Data were analyzed by employing an inductive coding method. The literature review revealed an intention to use large military forces to conduct a conventional-centric counterterrorism strategy, but the narrative inquiry revealed a negative effect of the conventional-centric counterterrorism strategy. Though more research in this area is needed the implications from the findings for positive social change that an asymmetric- centric strategy could offer as a possible effective solution for countering terrorism. These recommendations may help national strategy developers develop a structure to develop future counterterrorism strategies. American National Security Strategy as it Pertains to the Afghanistan War by Robert Hayworth MPA, Troy University, 1998 BA, Troy University, 1997 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University February 2018 Dedication This work as well as many things in my life is due to my wife, Kim, whose support and continued belief in me is the reason for my success. My motivation to complete this project stems from my fellow brothers, the 241 Marines and sailors that made the ultimate sacrifice on one October day in 1983. I want to give special thanks to the people that teach me every day the meaning of being a Marine and serving my country: Donald Ciefili, Tom Gersbeck, and Larry Lewis. I would also like to mention my deep appreciation to my committee chair, Dr. David Kilmnick, whose patience and guidance allowed me to focus and improve my aspiration to reach this scholarly level, and to my committee members, Dr. Tamara Mouras and Dr. Kathleen Marie Schulin, whose expertise and guidance is the reason I aspire to complete my studies. Acknowledgments As a young man, my first introduction to the new type of war that the nation is to face came to me early on a Sunday morning in October of 1983, when a truck loaded with homemade explosives drove through the south parking area of the Beirut International Airport. It broke through a three-foot block wall to pick up speed and slammed into the lobby of the 24th Marine Amphibious Unit’s Battalion Landing Team’s headquarters building. Seconds later, the driver detonated a bomb that killed 241 of my fellow Marines and sailors, in what was arguably the beginning of the “War on Terror” (Hammes, 2005). Thirty years later, I still work in the counterterrorism profession and recognize the need for a strategic concept, not just in defeating terrorism as a threat, but also in defeating the adversaries that employ asymmetric warfare. In this, I dedicate this work to our professionals, the soldiers, sailors, airmen, and Marines as well as the government and contracted civilians that have taken on the challenge to not only defeat the terrorists, but also bring peace to our world. Table of Contents List of Tables ....................................................................................................................... v List of Figures ..................................................................................................................... vi Chapter 1: Introduction to the Study ................................................................................... 1 Introduction .................................................................................................................... 1 Problem Statement ............................................................................................................... 3 Purpose of the Study ............................................................................................................ 5 Research Question ............................................................................................................... 9 Theoretical Foundation .................................................................................................. 11 Nature of the Study ........................................................................................................ 14 Definitions of Terms ...................................................................................................... 15 Assumptions .................................................................................................................. 19 Scope and Delimitations ................................................................................................ 20 Limitations ..................................................................................................................... 21 Significance ................................................................................................................... 23 Summary ........................................................................................................................ 24 Chapter 2: Literature Review ............................................................................................ 27 Introduction ................................................................................................................... 27 Literature Search Strategy ............................................................................................. 27 Theoretical Foundation .................................................................................................. 30 Conceptual Framework ................................................................................................. 35 Previous Approaches to the Challenges of Asymmetric Warfare ................................. 35 i Challenges of Asymmetric Warfare and National Security Strategy ............................ 37 The Gap in the Literature ............................................................................................... 38 Roots of the Afghanistan Strategy ................................................................................. 39 Defining Asymmetric War ............................................................................................ 43 Defining a Strategy for Afghanistan .............................................................................. 44 Understanding Afghanistan and Terrorist Organizations ............................................. 46 Afghanistan Tribal System ........................................................................................... 47 Terrorist Organizations in Afghanistan ........................................................................ 48 The Taliban as a Shadow Government ....................................................................... 50 Adversaries and Populations ......................................................................................... 51 Characteristics of Criminals, Terrorist, and Insurgents ................................................. 53 Characteristics of
Recommended publications
  • Afghanistan: Sikhs and Hindus
    Country Policy and Information Note Afghanistan: Sikhs and Hindus Version 5.0 May 2019 Preface Purpose This note provides country of origin information (COI) and analysis of COI for use by Home Office decision makers handling particular types of protection and human rights claims (as set out in the basis of claim section). It is not intended to be an exhaustive survey of a particular subject or theme. It is split into two main sections: (1) analysis and assessment of COI and other evidence; and (2) COI. These are explained in more detail below. Assessment This section analyses the evidence relevant to this note – i.e. the COI section; refugee/human rights laws and policies; and applicable caselaw – by describing this and its inter-relationships, and provides an assessment on whether, in general: x A person is reasonably likely to face a real risk of persecution or serious harm x A person is able to obtain protection from the state (or quasi state bodies) x A person is reasonably able to relocate within a country or territory x Claims are likely to justify granting asylum, humanitarian protection or other form of leave, and x If a claim is refused, it is likely or unlikely to be certifiable as ‘clearly unfounded’ under section 94 of the Nationality, Immigration and Asylum Act 2002. Decision makers must, however, still consider all claims on an individual basis, taking into account each case’s specific facts. Country of origin information The country information in this note has been carefully selected in accordance with the general principles of COI research as set out in the Common EU [European Union] Guidelines for Processing Country of Origin Information (COI), dated April 2008, and the Austrian Centre for Country of Origin and Asylum Research and Documentation’s (ACCORD), Researching Country Origin Information – Training Manual, 2013.
    [Show full text]
  • Common Afghans‟, a Useful Construct for Achieving Results in Afghanistan
    International Journal of Humanities and Social Science Vol. 1 No. 6; June2011 „Common Afghans‟, A useful construct for achieving results in Afghanistan Fahim Youssofzai Associate Professor (Strategic Management) Department of Business Administration, RMC/CMR P.O. Box: 17000, Stn. Forces Kingston, Ontario, K7K 7B4, Canada E-mail: [email protected], Phone: (613) 541 6000 Abstract Considering the seemingly perpetual problems in Afghanistan, this paper defines a new construct – the Common Afghans – and argues why it should be considered in strategic reflections and actions related to stability of this country. It tries to show that part of ill-performance in comes from the fact that the contributions of an important stakeholder “the Common Afghans” are ignored in the processes undertaken by international stakeholders in this country since 2002. It argues why considering the notion “Common Afghans” is helpful for achieving concrete results related to different initiatives undertaken in Afghanistan, by different stakeholders. Key words: Afghanistan, Common Afghans, Accurate unit of analysis, Policies, Strategies 1. Introduction Afghanistan looks to be in perpetual turmoil. In a recent desperate reflection, Robert Blackwill, a former official in the Bush administration and former US ambassador to India suggests partition of Afghanistan since the US cannot win war in this county (POLITICO, 2010). On same mood, Jack Wheeler defines Afghanistan as “...a problem, not a real country…”. According to Wheeler, “…the solution to the problem is not a futile effort of “nation-building” – that effort is doomed to fail – it is nation-building‟s opposite: get rid of the problem by getting rid of the country…” (Wheeler, 2010).
    [Show full text]
  • Violence, Terrorism, and Identity Politics in Afghanistan: the Securitisation of Higher Education
    social sciences $€ £ ¥ Article Violence, Terrorism, and Identity Politics in Afghanistan: The Securitisation of Higher Education Christian Kaunert 1,* and Arif Sahar 2 1 International Centre for Policing and Security, University of South Wales, Pontypridd CF37 4BD, UK 2 Centre of Excellence in Terrorism, Resilience, Intelligence and Organised Crime Research [CENTRIC], Sheffield Hallam University, Sheffield S1 1WB, UK; [email protected] * Correspondence: [email protected] Abstract: This article investigates the securitisation of the higher education sector in Afghanistan by examining ‘hidden’ non-discursive practices as opposed to overt discursive threat construction. Non-discursive practices are framed by the habitus inherited from different social fields, whereas in Afghanistan, securitising actors converge from different habitus (e.g., institutions, professions, backgrounds) to bar the ‘other’ ethnic or social groups from resources and spaces which could empower these groups to become a pertinent threat, a fear, and a danger to the monopoly of the state elites over the state power and resources. The most prominent securitisation practices emerging from the data include mainly (1) the obstruction of the formation of critical ideas and politics; (2) the obstruction of economic opportunities; and (3) the obstruction of social justice. This article deploys a case study methodology and uses the Kabul University as its subject of investigation. Keywords: Afghanistan; securitisation; violence; higher education; identity politics; statebuilding Citation: Kaunert, Christian, and Arif Sahar. 2021. Violence, Terrorism, 1. Introduction and Identity Politics in Afghanistan: The Afghan state has been juggling an amalgamation of competing forces, including The Securitisation of Higher the power of Islam, tribal politics, ethnic grievances, socioeconomic underdevelopment, Education.
    [Show full text]
  • The Readiness of Canada's Naval Forces Report of the Standing
    The Readiness of Canada's Naval Forces Report of the Standing Committee on National Defence Stephen Fuhr Chair June 2017 42nd PARLIAMENT, 1st SESSION Published under the authority of the Speaker of the House of Commons SPEAKER’S PERMISSION Reproduction of the proceedings of the House of Commons and its Committees, in whole or in part and in any medium, is hereby permitted provided that the reproduction is accurate and is not presented as official. This permission does not extend to reproduction, distribution or use for commercial purpose of financial gain. Reproduction or use outside this permission or without authorization may be treated as copyright infringement in accordance with the Copyright Act. Authorization may be obtained on written application to the Office of the Speaker of the House of Commons. Reproduction in accordance with this permission does not constitute publication under the authority of the House of Commons. The absolute privilege that applies to the proceedings of the House of Commons does not extend to these permitted reproductions. Where a reproduction includes briefs to a Standing Committee of the House of Commons, authorization for reproduction may be required from the authors in accordance with the Copyright Act. Nothing in this permission abrogates or derogates from the privileges, powers, immunities and rights of the House of Commons and its Committees. For greater certainty, this permission does not affect the prohibition against impeaching or questioning the proceedings of the House of Commons in courts or otherwise. The House of Commons retains the right and privilege to find users in contempt of Parliament if a reproduction or use is not in accordance with this permission.
    [Show full text]
  • Security Council Distr.: General 30 May 2018
    United Nations S/2018/466 Security Council Distr.: General 30 May 2018 Original: English Letter dated 16 May 2018 from the Chair of the Security Council Committee established pursuant to resolution 1988 (2011) addressed to the President of the Security Council I have the honour to transmit herewith the ninth report of the Analytical Support and Sanctions Monitoring Team established pursuant to resolution 1526 (2004), which was submitted to the Security Council Committee established pursuant to resolution 1988 (2011), in accordance with paragraph (a) of the annex to resolution 2255 (2015). I should be grateful if the present letter and the report could be brought to the attention of the Security Council members and issued as a document of the Council. (Signed) Kairat Umarov Chair Security Council Committee established pursuant to resolution 1988 (2011) 18-06956 (E) 050618 *1806956* S/2018/466 Letter dated 30 April 2018 from the Analytical Support and Sanctions Monitoring Team addressed to the Chair of the Security Council Committee established pursuant to resolution 1988 (2011) I have the honour to refer to paragraph (a) of the annex to Security Council resolution 2255 (2015), in which the Council requested the Monitoring Team to submit, in writing, two annual comprehensive, independent reports to the Committee, on implementation by Member States of the measures referred to in paragraph 1 of the resolution, including specific recommendations for improved implementation of the measures and possible new measures. I therefore transmit to you the ninth report of the Monitoring Team, pursuant to the above-mentioned request. The Monitoring Team notes that the original language of the report is English.
    [Show full text]
  • Responding to the Next Attack
    Combating Terrorism Center at West Point Objective • Relevant • Rigorous | May 2017 • Volume 10, Issue 5 FEATURE ARTICLE A VIEW FROM THE CT FOXHOLE Responding to the James Next Attack Gagliano Learning from the police response in Orlando and San Bernardino Former FBI Hostage Rescue Team Frank Straub, Jennifer Zeunik, and Ben Gorban Counterterrorist Operator FEATURE ARTICLE Editor in Chief 1 Lessons Learned from the Police Response to the San Bernardino and Orlando Terrorist Attacks Paul Cruickshank Frank Straub, Jennifer Zeunik, and Ben Gorban Managing Editor INTERVIEW Kristina Hummel 8 A View from the CT Foxhole: James A. Gagliano, Former FBI Hostage Rescue EDITORIAL BOARD Team Counterterrorist Operator Paul Cruickshank Colonel Suzanne Nielsen, Ph.D. Department Head ANALYSIS Dept. of Social Sciences (West Point) 13 A New Age of Terror? Older Fighters in the Caliphate Lieutenant Colonel Bryan Price, Ph.D. John Horgan, Mia Bloom, Chelsea Daymon, Wojciech Kaczkowski, Director, CTC and Hicham Tiflati 20 The Terror Threat to Italy: How Italian Exceptionalism is Rapidly Brian Dodwell Diminishing Deputy Director, CTC Michele Groppi 29 Iranian Kurdish Militias: Terrorist-Insurgents, Ethno Freedom Fighters, or CONTACT Knights on the Regional Chessboard? Combating Terrorism Center Franc Milburn U.S. Military Academy 607 Cullum Road, Lincoln Hall In the early hours of June 12, 2016, an Islamic State-inspired gunman car- West Point, NY 10996 ried out the deadliest terrorist attack on U.S. soil since 9/11, shooting dead 49 people in an Orlando nightclub. The attacker was finally killed after a Phone: (845) 938-8495 three-hour hostage standof, leading to questions raised in the media over the police response.
    [Show full text]
  • Rents, Patronage, and Defection: State-Building and Insurgency in Afghanistan
    Rents, Patronage, and Defection: State-building and Insurgency in Afghanistan Anand Gopal Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2017 © 2017 Anand Gopal All rights reserved ABSTRACT Rents, Patronage, and Defection: State-building and Insurgency in Afghanistan Anand Gopal Afghanistan has been one of the most protracted conflicts modern era, but theories of civil war onset fail to explain the war’s causes or its patterns of violence. This thesis examines the origins of the post-2001 period of the conflict through the perspective of state formation; although many civil wars today unfold in newly-forming states, the processes of center-periphery relations and elite incorporation have been little studied in the context of political violence. The thesis first describes how Afghanistan’s embeddedness in the international state system and global markets undermined the nascent state’s efforts to centralize and bureaucratize, leading instead to warlordism and neopatrimonialism. Second, it demonstrates that the development of an insurgency after 2001 was due not to ethnic grievance or rebel opportunities for profit, but rather to the degree to which local elites were excluded from state patronage. Third, it examines the role of ideology and social position in the Afghan Taliban movement. The dissertation seeks to offer a theory of political violence in Afghanistan that can, mutatis mutandis, help explain key features of civil war
    [Show full text]
  • Suicide Attacks in Afghanistan: Why Now?
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Political Science Department -- Theses, Dissertations, and Student Scholarship Political Science, Department of Spring 5-2013 SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW? Ghulam Farooq Mujaddidi University of Nebraska-Lincoln Follow this and additional works at: https://digitalcommons.unl.edu/poliscitheses Part of the Comparative Politics Commons, and the International Relations Commons Mujaddidi, Ghulam Farooq, "SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW?" (2013). Political Science Department -- Theses, Dissertations, and Student Scholarship. 25. https://digitalcommons.unl.edu/poliscitheses/25 This Article is brought to you for free and open access by the Political Science, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Political Science Department -- Theses, Dissertations, and Student Scholarship by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW? by Ghulam Farooq Mujaddidi A THESIS Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Master of Arts Major: Political Science Under the Supervision of Professor Patrice C. McMahon Lincoln, Nebraska May, 2013 SUICIDE ATTACKS IN AFGHANISTAN: WHY NOW? Ghulam Farooq Mujaddidi, M.A. University of Nebraska, 2013 Adviser: Patrice C. McMahon Why, contrary to their predecessors, did the Taliban resort to use of suicide attacks in the 2000s in Afghanistan? By drawing from terrorist innovation literature and Michael Horowitz’s adoption capacity theory—a theory of diffusion of military innovation—the author argues that suicide attacks in Afghanistan is better understood as an innovation or emulation of a new technique to retaliate in asymmetric warfare when insurgents face arms embargo, military pressure, and have direct links to external terrorist groups.
    [Show full text]
  • Fall 2010 Fall
    AIR & SPACE POWER JOURNAL, Fall 2010 AIR & SPACE Fall 2010 Volume XXIV, No. 3 Lorenz on Leadership Part 3 Gen Stephen R. Lorenz, USAF Reenabling Air Force Command and Control for Twenty-first-Century Partnerships Lt Gen Philip Breedlove, USAF Maj Brian Tyler, USAF Seeing the Whole Elephant Envisioning a Successful Light Attack Program for the US Air Force Lt Col Michael W. Pietrucha, USAF Femme Fatale 2010 Lt Col Kristal L. Alfonso, USAF Civilian Language Education in America How the Air Force and Academia Can Thrive Together Col John Conway, USAF, Retired Chief of Staff, US Air Force Gen Norton A. Schwartz Commander, Air Education and Training Command Gen Stephen R. Lorenz http://www.af.mil Commander, Air University Lt Gen Allen G. Peck Director, Air Force Research Institute Gen John A. Shaud, USAF, Retired Chief, Professional Journals Lt Col Paul D. Berg Deputy Chief, Professional Journals Maj Darren K. Stanford http://www.aetc.randolph.af.mil Editor Capt Lori Katowich Professional Staff Marvin W. Bassett, Contributing Editor Tammi K. Long, Editorial Assistant Daniel M. Armstrong, Illustrator L. Susan Fair, Illustrator Ann Bailey, Prepress Production Manager The Air and Space Power Journal (ISSN 1554-2505), Air Force Recurring Publication 10-1, published quarterly, http://www.au.af.mil is the professional journal of the United States Air Force. It is designed to serve as an open forum for the presentation and stimulation of innovative thinking on military doctrine, strategy, force structure, readiness, Air and Space Power Journal and other matters of national defense. The views and 155 N. Twining Street opinions expressed or implied in the Journal are those Maxwell AFB AL 36112-6026 of the authors and should not be construed as carrying the official sanction of the Department of Defense, e-mail: [email protected] Air Force, Air Education and Training Command, Air Visit Air and Space Power Journal online University, or other agencies or departments of the US at http://www.airpower.au.af.mil.
    [Show full text]
  • Envisioning a Comprehensive Peace Agreement for Afghanistan for More Information on This Publication, Visit
    C O R P O R A T I O N LAUREL E. MILLER, JONATHAN S. BLAKE Envisioning a Comprehensive Peace Agreement for Afghanistan For more information on this publication, visit www.rand.org/t/RR2937 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-1-9774-0407-7 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2019 RAND Corporation R® is a registered trademark. Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. RAND is nonprofit, nonpartisan, and committed to the public interest. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. Support RAND Make a tax-deductible charitable contribution at www.rand.org/giving/contribute www.rand.org Preface In this report, we paint a detailed picture of a plausible final com- prehensive peace agreement for Afghanistan. The report includes analysis of realistic compromises, presented in the form of a complete peace agreement text.
    [Show full text]
  • US-Russia Relations
    CONGRESSIONAL PROGRAM U.S.-Russia Relations: Policy Challenges in a New Era May 30 – June 4, 2017 Berlin, Germany Copyright @ 2017 by The Aspen Institute The Aspen Institute One Dupont Circle, NW Washington, DC 20036-1133 Published in the United States of America in 2017 by The Aspen Institute All rights reserved Printed in the United States of America Pub #17/015 ISBN: 0-89843-668-0 U.S. Russia Relations: Policy Challenges in a New Era May 30 – June 4, 2017 The Aspen Institute Congressional Program Table of Contents Rapporteur’s Summary Matthew Rojansky ........................................................................................................................................ 3 Demands on Russian Foreign Policy and Its Drivers: Looking Out Five Years (2017-2022) Dmitri Trenin ............................................................................................................................................. 11 Putin’s Image and Russian National Interests Elizabeth Wood .......................................................................................................................................... 19 What would Kennan say about Putin's Russia? Slawomir Debski ........................................................................................................................................ 25 The Big Aim for the Big Deal: Building a Stable Peace and a Conflict Resolution Mechanism in Eastern Europe Mykhail Minakov ......................................................................................................................................
    [Show full text]
  • Afghanistan - Researched and Compiled by the Refugee Documentation Centre of Ireland on Wednesday 7 June 2017
    Afghanistan - Researched and compiled by the Refugee Documentation Centre of Ireland on Wednesday 7 June 2017 Information on indiscriminate violence vis-à-vis internal armed conflict; Information on what provinces including Kabul are safe from indiscriminate violence/internal armed conflict A report issued in February 2017 by the United Nations Assistance Mission in Afghanistan points out that: “…UNAMA continued to document indiscriminate attacks carried out by Taliban in public places that harmed civilians and other attacks directly targeting civilians” (United Nations Assistance Mission in Afghanistan (6 February 2017) Protection of Civilians in Armed Conflict Annual Report 2016, p.83) This report also points out that: “Civilian casualties increased in five of Afghanistan’s eight regions in 2016” (ibid, p.11). In March 2017 the United Nations Security Council points out that: “The overall security situation continued to deteriorate throughout 2016 and into 2017. The United Nations recorded 23,712 security incidents, an almost 5 per cent increase compared with 2015 and the highest number in a single year ever recorded by UNAMA. While the fighting remained particularly prevalent in the five southern and eastern provinces of Helmand, Nangarhar, Kandahar, Kunar and Ghazni, where 50 per cent of all incidents were recorded, the conflict spread in geographical scope, with increasing Taliban activities in northern and north-eastern Afghanistan, as well as in Farah in the west” (United Nations Security Council (3 March 2017) The situation in Afghanistan and its implications for international peace and security, p.3). A report released in April 2017 by the United Nations Assistance Mission in Afghanistan notes that: “Anti-Government Elements continued to target civilians intentionally and deploy indiscriminate tactics in areas with a civilian presence…” (Assistance Mission in Afghanistan (25 April 2017) UNAMA First Quarter 2017 Civilian Casualty Data).
    [Show full text]