ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Drones - National Security or Domestic Threat?

Updated on May 28, 2013

Meet your new neighbor - the Unmanned Aerial Vehicle.

MQ9 Reaper
MQ9 Reaper | Source
General John Meyer
General John Meyer | Source

“They save lives!” General John Meyer said of drones in 1972.

"The only reason we need (UAVs) is that we don't want to needlessly expend the man in the cockpit", explained General George Brown - also in 1972 - the year before public admission of the existence of a drone program in the U.S. military.

In a practical sense, if an aerial vehicle is to be lost, that loss is very much preferable if not accompanied by the loss of an airman in the process.

Thus, drones save lives.

Click HERE for Obama White Papers

Source
Attorney General Eric Holder
Attorney General Eric Holder | Source
CIA Director-Nominee John Brennan
CIA Director-Nominee John Brennan | Source

Kin-Folk and Calisthenics

Unfortunately though, for a certain 16 year-old born in Denver, Colorado, the inverse turned out to be the case. Abdul-Rahman al-Awlaki - American-born citizen - was specifically targeted and killed via drone attack in Yemen apparently for his crime of having radical kinfolk.

White House Secretary Robert Gibbs explained that he should have had a "far more reasonable father".

“Due process and judicial process are not one and the same,” according to U.S. Attorney General Eric Holder, “Citizenship alone does not make such individuals immune from being targeted.” Apparently not.

We learned recently of a so-called kill-list: photos and stats similar to baseball cards of the top 30 al-Qaeda members, and charts resembling year-book pages of the targets and their likely companions. “How old are these people?” Obama is said to have queried, adding “If they are starting to use children, we are moving into a whole different phase.” Indeed.

The POTUS himself reportedly identifies targets to be pursued, and hopefully eliminates any mistakes involved in delegating such responsibility. Added national security advisor Thomas Donilin, “He’s determined to keep the tether pretty short.”

According to the CIA, since May 2010, there have been exactly ZERO accidental civilian casualties resulting from drone strikes. This thanks, in no small part, to our policy of posthumously declaring all military-aged males as militants. Which of course, makes it very difficult to appeal those charges.Identity strikes, like those on al-Awlaki, target a specific individual. There may be a certain level of collateral damage, but the attack is focused in it’s intent. The signatures strike, however, is a tactic which identifies targets whom display suspicious behavior. Unfortunately though, traveling in a caravan might look a bit suspicious. Outdoor group activities, especially calisthenics and the occasional wedding party (sadly, it’s happened), might look a bit suspicious.

Hopefully unfounded for the repulsiveness of content, there are now reports (by the Bureau of Investigative Journalism) of strategic double-tap tactics being carried out by UAVs. This double-tap is the second attack, which occurs once the responders arrive on the scene of the initial attack. Also, follow-up attacks of mourners and funeral processions. Hopefully these incidences have been coincidental and not strategic.

Source
RQ-1A Predator
RQ-1A Predator | Source
RQ-7 Shadow
RQ-7 Shadow | Source
A160 Hummingbird
A160 Hummingbird | Source
MQ-1C Warrior
MQ-1C Warrior | Source

Collateral Damage & Toxic boots

In 2009, President Obama’s initial UAV endeavor wound up accidentally killing 19 people with all of five missiles, and all of whom turned out to be civilians. By July 2012 - nearly 300 drone strikes later (after 52 under Bush) - upward of 3000 people, including around 800 civilians, had been killed (BIJ).

The USAF 100th Strategic Reconnaissance wing flew nearly 3500 drone missions in Vietnam. Today, at least 50 countries worldwide are advancing drone warfare. We enlist Reapers, Predators, Ravens, Shadows, Hawks, and their brethren; which are deployed in Yemen, Iran, Somalia, Libya, Pakistan & Afghanistan. The Pentagon currently counts some 7000 UAVs among it’s fleet.

The use of combat drones allow opportunistic circumvention of the political toxicity surrounding boots-on-the-ground conflict, while further disconnecting the majority of the populace from the 1% representing us overseas in combat. Rather than dealing with the hassle of being open with the public; rather than dealing with the political calculus of gaining Congressional for approval of war; rather than uprooting troops from their families and shipping them off into harm’s way on foreign lands… Instead we can simply deploy an army of flying robots. And the best part? The drone pilot can carry out ordered assassinations, and then go home and play with the kids in the yard. What’s not to love?

Let’s not forget about the money. We can never forget about the money. An RQ-1 Raven has a unit cost of $35,000, with a program cost of $250,000 (GlobalSecurity.org). The MQ9 Reaper has a $36.8 million unit cost and $11.8 billion program cost (Department of Defense). The MQ1Predator is $4million and S2.38 billion (DofD), and the RQ-7 Shadow is $750,000 and $15.5 billion (Aeroweb).

Drones are relatively inexpensive compared to the B-2 Spirit, with a $1.07 billion unit cost and a whopping $44.75 billion program cost (or $2.1 billion apiece) through 2004 (US General Accounting Office). Or the F-22 Raptor with a $150 million unit cost and $66.7 billion program cost (USAF). In other words, the price tag on a single B-2 bomber equals the cost of 65 of even the most expensive drone unit.

Curtiss N2C-2
Curtiss N2C-2 | Source
OQ-2A
OQ-2A | Source
Two BQM-34 Firebees
Two BQM-34 Firebees | Source

Eastern Gateway Community College?

As the war in Afghanistan inevitably winds to a close, domestic drone use is on the verge of an explosion. The Federal Aviation Administration Modernization and Reform Act (2012) welcomes commercial drones onto the scene, as the FAA projects 30,000 domestic drones and has reportedly approved 82 drone models (including nano/hummingbird drones) and issued 285 licenses while streamlining the process. Mostly utilized as Patriot Act surveillance apparatus, Seattle PD, WSDOT, & Eastern Gateway Community College (?) are all “permitted drone operators.” A Reaper MQ-9 drone recently assisted North Dakota sheriffs in apprehending suspected cattle-rustlers.

Imagine, if you will, a future in which patrolling UAVs are so commonplace as to become unnoticed. Or quiet enough to go largely unheard, and small enough to remain largely unseen. Thirty-thousand approved drones potentially patrolling the country-side. What happens when Wal-Mart’s seemingly inevitable drone fleet (I'm kidding) falls prey to cyber-terrorists? What about a single drone armed with chemical weapons?

An airliner was not generally seen as a potential form of munitions until 9/11.

So yes, it's a nuanced issue - what determines the palatability are not the drones themselves, but the manner in which drones are used. Are drones programmed with Geneva Convention rules acceptable? Would we rather have tens of thousands of boots on the ground in Yemen and Pakistan? I get that. But the drone program further separates the public from sacrifice of battle. And by incessantly reigning down death from the sky upon civilians, we just create more and more backlash in the form of terrorism.

There is a compromise to be made here, by much more intelligent folks than myself, and it lies somewhere between the need of surveillance for public safety, and the privacy concerns of individual citizens.

Can we have this conversation please?

7/11/12

Source
RQ1 Predator sensor operator's chair
RQ1 Predator sensor operator's chair | Source
Source
5 out of 5 stars from 1 rating of Hub
working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)