Abstract

When most people think of military drones, they usually think of pieces of technology with wingspans greater than the overall length of fighter jets, taking surveillance images from over 40,000 feet and giving the pilot, thousands of miles away, the ability to take out targets with pinpoint accuracy utilizing a wide variety of weapons systems at the pilot’s disposal. While this does describe a large portion of drones used by militaries and fighters all over the world, their development requires billions of dollars of investments, access to cutting-edge technology and scientists, and, most importantly, time. Today, The Islamic State in Iraq and the Levante (ISIL) and other violent non-state actors (VNSA), do not have access to these resources.1 To overcome this asymmetry, they are using the technology available on the consumer market to build or purchase small drones. Although these drones are about the size of a watermelon and may have a range of only a few miles, they still pose a risk. In the hands of a VNSA, these small, inexpensive consumer drones are modified into “killer bees” capable of creating significant damage and terrorizing civilian and military populations. While VNSAs can use drone technology in various ways—such as surveillance, strategic communication, transportation (smuggling), disruption of events, or complementing other activities—the focus of this article is on when and why terrorist groups use drone technology as a weapon.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.