Hostname: page-component-7c8c6479df-8mjnm Total loading time: 0 Render date: 2024-03-29T14:55:51.072Z Has data issue: false hasContentIssue false

Drone Attacks under the Jus ad Bellum And Jus in Bello: Clearing the ‘Fog of Law’

Published online by Cambridge University Press:  15 August 2011

Michael N. Schmitt
Affiliation:
United States Naval War College, Newport, USA e-mail: schmitt@aya.yale.edu
Get access

Extract

As the war in Afghanistan and the fight against transnational terrorism wage on with no immediate end in sight, US forces have increasingly turned to drone (technically labeled an unmanned aircraft system or UAS) strikes to target Taliban insurgents and Al Qaeda terrorists, especially in Pakistan's tribal areas of North and South Waziristan. Between 2004 and 2007, a mere nine such attacks were conducted. By contrast, in 2010 there were 118, and by mid-February 2011 US forces had already launched 12. The tactic has proven highly effective in disrupting enemy operations. Since 2004, 32 senior members of al Qaeda and the Taliban have been killed. In 2010, for instance, the US successfully targeted such key figures as Ibne Amin, an al Qaeda linked Swat Taliban commander; Ali Marjan, a local Lashkar-e-Islam commander; Sheikh al-Fateh, the al Qaeda chief in Afghanistan and Pakistan; Hamza al-Jufi, an al Qaeda commander; Sadam Hussein Al Hussami, an al Qaeda planner and explosives expert; Mohammad Qari Zafar, a Taliban commander wanted in connection with the 2006 Karachi consulate bombing; Sheikh Mansoor, an Egyptian-Canadian al Qaeda leader; Abdul Haq al-Turkistani, an al Qaeda linked leader of the Turkistani Islamic Party; Jamal Saeed Abdul Rahim, wanted for his alleged role in the 1986 hijacking of a Pan American World Airways flight; and Mahmud Mahdi Zeidan, a Jordanian Taliban commander. Overall, US air strikes are estimated to have killed between 1,060 and 1,707 members of al Qaeda, the Taliban and associated groups in the past 6 years.

Type
Current Developments
Copyright
Copyright © T.M.C. Asser Instituut and the Authors 2010

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)