Counter Terrorism: The Drone Strike Solution by Rohit Deshpande

By Rohit Deshpande Co-Founder, Rann Neeti , INDIA / Strategic Knowledge Partner - IndraStra Global    In the wake of the 9/11 att...


By Rohit Deshpande

Co-Founder, Rann Neeti, INDIA / Strategic Knowledge Partner - IndraStra Global  

In the wake of the 9/11 attacks, the US administration was under intense pressure to act from both domestic and international quarters. This was important as America’s perception of being invincible had been shattered and the US had to retain its position of pre-eminence in the world. To avenge the deaths of its citizens and punish those presumed to be responsible for the attacks, the US set out on a war path with Afghanistan and Iraq in the years that followed. Since then, America’s battle against global terrorism- as enshrined in the ‘Bush Doctrine’ has taken several twists and turns. A couple of thought worthy trends in America’s global battle against terror are its usage of ‘drones’ and covert JSOC (Joint Special Operations Command) operations. This article will mostly focus on the former and its implications.

The usage of unmanned aerial vehicles to deliver a payload, dates back to the mid-19th century. The Austrians had devised a system which consisted of balloons with bombs and an electromagnetic mechanism to release the same for targeting the city of Venice. Under favorable wind conditions they would launch these towards Venice but it so happened that with change of wind, some of these returned back to Austria. Since then, a lot has changed and drones have become an integral part of modern military strategy. Modern drones were initially built for reconnaissance ops but now they are being armed and are increasingly being used for tactical strikes deep inside enemy territory. Their importance for recon ops can be best summarized by the following excerpt from an article in ‘Wired’ magazine- ‘In 2003, Joint Special Operations Command (JSOC) resorted to spending six months sneaking SEALs into Somalia by submarine to painstakingly plant disguised surveillance cameras — all to capture just a fraction of the images a drone could acquire in a single mission’.[1] Today’s drones can fly virtually undetected at heights exceeding 50,000ft for almost two continuous days, a feat that would be a herculean task for any manned fighter aircraft. High endurance & efficiency, no risk to the pilot’s life, low operational costs are some of the drone’s important selling points. Another distinct feature of drones is that they can persistently hover over potential targets for long periods of time which is instrumental in gathering intelligence. 

The ability to target suspects who are a threat to national security and operate out of foreign soil is vital to any country’s national interest. In earlier times, what would have required months of preparation and a carefully coordinated assassination operation by the country’s intelligence agencies and special-ops team can now be achieved by a simple tactical drone strike. The writer opines that Obama’s drone strike program is perhaps taking the luxury of being able to do so with minimum collateral damage, a little too far. Drones have been the Obama administration’s preferred method of targeting militants in Iraq, Pakistan and Afghanistan as it is believed that they ‘don’t put troops in harm’s way’. 95% of targeted killings since 9/11 have been conducted by drones.[2] With over 380 strikes in Pakistan alone (2006-13), drone strikes have killed over 3200 civilians (many of who are women and children)[3]. In Yemen, the confirmed death toll is close to 500 in addition to the hundreds in Somalia. However, the US administration denies any involvement in the purported JSOC operations in in these two countries.[4]

How Drone targeting works


The CIA and the US military operate drones from a number of bases round the world. Some of these bases are known and some are not so well kept secrets as enunciated by this Washington Post report.[5] Both agencies routinely compile long lists of suspects who they consider to be threats to US national security. The recommendations from the list are sent for review and discussion to the US National Counter Terror Center and finally have to be sanctioned by the president who solicits the expertise of the White House counter terrorism expert. The internal rules that govern the various steps involved in the process of selection of targets to final execution- change constantly based on the domestic and international public mood about the strikes. At times when lack of action may be construed as a sign of weakness the ops are mostly carried out at the President’s discretion. When there is a lot of hue and cry about the loss of innocent lives and a domestic demand for congressional supervision and oversight, the process of sanctioning strikes is multi-layered.  Reportedly, the CIA director exercises authority of targeting sensitive areas in Pakistan without consulting the White House.[6]   It is also believed that the CIA’s drone strike program in Pakistan is exempt from the usual scrutiny that is carried out before strikes. Another aspect of the drone program that is worth re-considering is the ‘personality or signature strikes’ approach. A signature strike is one in which the US conducts targeting without knowing the precise identity of the individuals targeted. Instead, the individuals match a pre-identified ‘behavioral signature’ that the US links to militant activity or association.[7] Signature strikes have probably been responsible for the majority of the reported civilian casualties in Pakistan, Yemen and Somalia. Several high ranking diplomats and state department officials have spoken against ‘signature strikes’ as what constitutes ‘signature terrorist behaviour’ is not certain.[8] In the past gatherings such as meetings of local village bodies, groups of men and women gathered to celebrate an occasion have been misconstrued as militant signatures in the past. The Obama administration is reluctant to open up on this issue and most requests for information regarding the same are denied invoking the ‘national security’ argument. The issue is slowly gaining traction in the public eye thanks to the efforts of several activists, journalists and Hollywood film makers.  Retired military officials in the due course of their careers have often had a change of heart and have spoken critically of these strikes and operations. This is well documented by the renowned investigative journalist Jeremy Scahill’ in his well-researched documentary - ‘Dirty Wars’.

Conclusion


Though drone strikes have been successful in the elimination of several high ranking leaders of militant organisations, the ratio of innocent lives lost to the number of high value targets killed is very poor. Drone strikes have resulted in the fostering of anti-American sentiment round the world. Several human rights organisations have raised serious concerns about the issue. The graphic below (Research done by Pew Global) reflects the global public opinion about Obama’s drone strike program.[9]

While the writer sincerely sympathizes with the loss of over 3000 American lives on the unfortunate morning of 9/11, usage of controversial methods which result in the loss of equally important lives elsewhere is questionable and must be thoroughly debated and investigated. The kin of the victims of these attacks are often caught between the rhetorical assurances of their governments and the American administration whom they can’t practically question or hold accountable. In these circumstances, overcome with grief and frustration they often find themselves in a ‘nothing to lose’ situation and take up arms. The others who hold themselves back from becoming militants are often just an incident away from walking down the same road. Pakistan is America’s all weather ally-- a recipient of billions of dollars of aid and sophisticated military technology but yet the two friends often don’t see eye to eye and are extremely distrustful of each other as demonstrated by the events surrounding the raid that killed Bin Laden. America continues to support and engage Pakistan despite knowing that several of the world’s most wanted militants have been bred, trained and still are holed up in Pakistan. Most of the drone strikes have been in the ‘Federally Administered Tribal Areas’ of Pakistan a region over which the government has limited control. Outwardly, the government has condemned all American drone strikes but many believe that it did so to save face and has a tacit understanding of looking the other way with the American government. With this arrangement, the US administration virtually has zero accountability which is turning out to be a curse for the tribal and civilian populace of the region. 

In the absence of well-defined, enforceable international laws and conventions on usage of drones in foreign territory, this trend is likely to grow. It is imperative that this issue be tackled in international forums at the earliest or it is likely to do more harm than good to international peace and security. The Obama government’s controversial ‘signature strike’ program probably needs to be revisited. The process of intelligence gathering and analysis predominantly involves connecting several dots and a fair bit of imagination and speculation. Drone strikes should only be used when the gathered intelligence, backed by solid evidence and sound logic. The process of approval of these strikes by the executive should have multiple layers. Though this maybe frowned upon by those on the field, it would be fair to say the current situation warrants it.




Name

-51,1,3D Technology,2,5G,6,Abkhazia,2,Academics,9,Accidents,19,Activism,1,ADB,11,ADIZ,1,Adults,1,Advertising,30,Advisory,1,Aerial Reconnaissance,11,Aerial Warfare,34,Aerospace,4,Afghanistan,81,Africa,108,Agile Methodology,2,Agriculture,15,Air Crash,9,Air Defence Identification Zone,1,Air Defense,5,Air Force,26,Air Pollution,1,Airbus,4,Aircraft Carriers,3,Aircraft Systems,1,Al Nusra,1,Al Qaida,3,Al Shabab,1,ALBA,1,Albania,2,Algeria,3,American History,4,AmritaJash,10,Antarctic,1,Anthropology,7,Anti Narcotics,11,Anti Tank,1,Anti-Corruption,3,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,1,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,1,Arctic,6,Argentina,7,Armenia,26,Army,3,Art,1,Artificial Intelligence,62,Arunachal Pradesh,1,ASEAN,10,Asia,63,Asia Pacific,22,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,43,Austria,1,Automation,13,Automotive,123,Autonomous Flight,2,Autonomous Vehicle,2,Aviation,57,AWACS,1,Awards,17,Azerbaijan,14,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,1,Balance of Trade,3,Balkan,10,Baltic,3,Baluchistan,8,Bangladesh,27,Banking,48,Bankruptcy,1,Basel,1,Bashar Al Asad,1,Bay of Bengal,5,BBC,1,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,9,Big Data,29,Big Tech,1,Bilateral Cooperation,13,BIMSTEC,1,Biography,1,Biotechnology,2,BISA,1,Bitcoin,7,Black Lives Matter,1,Black Money,2,Black Sea,1,Blockchain,31,Blood Diamonds,1,Bloomberg,1,Boeing,19,Boko Haram,7,Bolivia,6,Bomb,2,Bond Market,1,Book,10,Book Review,17,Border Conflicts,5,Border Control and Surveillance,5,Bosnia,1,Brand Management,14,Brazil,99,Brexit,22,BRI,5,BRICS,16,British,3,Broadcasting,16,Brunei,2,Brussels,1,Buddhism,1,Budget,3,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,973,C-UAS,1,California,4,Call for Proposals,1,Cambodia,5,Cameroon,1,Canada,46,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,8,CAREC,1,Caribbean,9,CARICOM,1,Caspian Sea,2,Catalan,3,Caucasus,9,CBRN,1,Central African Republic,1,Central Asia,73,Central Asian,3,Central Eastern Europe,45,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,1,Chemicals,7,Child Labor,1,Children,4,Chile,10,China,439,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,1,Civil Liberties,4,Civil Rights,2,Civil Society,4,Civilization,1,Clean Energy,4,Climate,62,Climate Change,13,Clinical Research,3,Clinton,1,Cloud Computing,39,Coal,4,Coast Guard,3,Cognitive Computing,12,Cold War,4,Colombia,15,Commodities,3,Communication,8,Communism,3,Compliance,1,Computers,40,Conferences,1,Conflict,78,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,4,Consumer Behavior,4,Consumer Price Index,1,COP26,3,Coronavirus,106,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,13,Counter Terrorism,79,COVID,5,COVID Vaccine,5,CPEC,7,CPG,3,Credit,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,11,Cryptography,1,CSTO,1,Cuba,6,Culture,4,Currency,6,Customer Relationship Management,1,Cyber Attack,6,Cyber Crime,2,Cyber Security & Warfare,103,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,35,Data Science,2,Database,2,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,10,Decision Support System,5,Defense,9,Defense Deals,5,Deforestation,2,Democracy,20,Democrats,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,38,Digital Economy,7,Digital Marketing,2,Digital Transformation,10,Diplomacy,10,Disaster Management,4,Disinformation,1,Djibouti,2,Documentary,2,Doklam,1,Dokolam,1,Dominica,2,Donald Trump,42,Donetsk,2,Dossier,2,Drones,10,E-Government,2,E-International Relations,1,Earning Reports,1,Earth Science,1,Earthquake,5,East Africa,1,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,1,Economic Justice,1,Economics,38,Economy,69,ECOWAS,2,Ecuador,3,Edge Computing,2,Education,60,Egypt,23,Elections,28,Electric Vehicle,10,Electricity,5,Electronics,7,Emerging Markets,1,Employment,12,Energy,306,Energy Policy,27,Energy Politics,23,Engineering,23,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,45,ePayments,11,Epidemic,5,ESA,1,Ethiopia,3,Eulogy,2,Eurasia,3,Euro,5,Europe,5,European Union,214,EuroZone,5,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,3,F-35,5,Facebook,7,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1103,Fidel Castro,1,Fiji,1,Finance,16,Financial Markets,47,Financial Statement,2,Finland,5,Fintech,13,Fiscal Policy,11,Fishery,3,Food Security,22,Forces,1,Forecasting,1,Foreign Policy,12,Forex,1,France,26,Free Market,1,Free Syrian Army,4,Freedom,3,Freedom of Speech,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,6,G24,1,G7,3,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,9,GATT,1,Gaza,2,GCC,11,GDP,7,GDPR,1,Geneal Management,1,General Management,1,Geo Politics,103,Geography,1,Geoint,14,Geopolitics,5,Georgia,11,Georgian,1,geospatial,8,Geothermal,2,Germany,56,Ghana,3,Gibratar,1,Gig economy,1,Global Trade,88,Global Warming,1,Global Water Crisis,10,Globalization,2,Gold,1,Google,13,Gorkhaland,1,Government,125,GPS,1,Greater Asia,124,Greece,12,Green Bonds,1,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gun Control,4,Hacking,4,Haiti,2,Hasan,1,Health,7,Healthcare,71,Heatwave,1,Helicopter,10,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,11,Houthi,11,Howitzer,1,Human Development,28,Human Resource Management,5,Human Rights,4,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,2,IAEA,2,ICBM,1,ICO,1,Identification,2,IDF,1,Imaging,2,IMF,67,Immigration,16,Impeachment,1,Imran Khan,1,Independent Media,72,India,527,India's,1,Indian Air Force,18,Indian Army,5,Indian Nationalism,1,Indian Navy,22,Indian Ocean,16,Indices,1,Indo-Pacific,2,Indonesia,16,IndraStra,1,Industrial Accidents,3,Industrial Automation,2,Industrial Safety,4,Inflation,4,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,7,Internet,52,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,3,Investment,31,Investor Relations,1,IPO,4,Iran,184,Iraq,52,IRGC,1,Iron & Steel,1,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,117,IT ITeS,129,Italy,10,Jabhat al-Nusra,1,Jamaica,3,Japan,56,JASDF,1,Jihad,1,Joe Biden,3,Joint Strike Fighter,4,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kazakhstan,22,Kenya,5,Kiev,1,Kindle,700,Knowledge Management,3,Kosovo,2,Kurdistan,8,Kurds,10,Kuwait,6,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,2,Land Warfare,21,Languages,1,Laos,1,Laser Defense Systems,1,Latin America,79,Law,5,Leadership,3,Lebanon,9,Legal,9,Liberalism,1,Library Science,1,Libya,12,Littoral Warfare,2,Livelihood,3,Loans,8,Lockdown,1,Lone Wolf Attacks,1,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,10,Maldives,7,Mali,5,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,14,Marijuana,1,Marine Engineering,3,Maritime,37,Market Research,2,Marketing,38,Mars,2,Martech,9,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,MDGs,1,Mechatronics,2,Media War,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,15,Meta,1,Metadata,2,Metals,1,Mexico,8,Micro-finance,4,Microsoft,11,Migration,19,Mike Pence,1,Military,99,Military Exercise,8,Military-Industrial Complex,1,Mining,15,Missile Launching Facilities,5,Missile Systems,51,Mobile Apps,3,Mobile Communications,10,Mobility,4,Modi,7,Moldova,1,Monaco,1,Monetary Policy,5,Money Market,2,Mongolia,8,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,1,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Myanmar,24,NAFTA,3,NAM,2,Nanotechnology,4,NASA,12,National Security,5,Nationalism,2,NATO,29,Natural Disasters,10,Natural Gas,28,Naval Base,5,Naval Engineering,17,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,42,Navigation,2,Navy,21,NBC Warfare,2,Negotiations,1,Nepal,12,Neurosciences,6,New Delhi,4,New Normal,1,New York,4,New Zealand,5,News,1007,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,21,North America,37,North Korea,48,Norway,2,NSA,1,NSG,2,Nuclear,37,Nuclear Agreement,29,Nuclear Doctrine,1,Nuclear Security,43,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,4,OFID,5,Oil & Gas,330,Oil Gas,5,Oil Price,50,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,114,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,Operation Unified Protector,1,Operational Research,4,Opinion,609,Pacific,5,Pakistan,156,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,21,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,1,Paracels,1,Partition,1,Partnership,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,5,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,13,Philippines,11,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLAN,3,Plastic Industry,2,Poland,7,Polar,1,Policing,1,Policy,7,Policy Brief,6,Political Studies,1,Politics,36,Polynesia,3,Population,3,Portugal,1,Poverty,5,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,17,Private Equity,1,Private Military Contractors,1,Programming,1,Project Management,4,Propaganda,4,Protests,7,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publishing,6,Putin,4,Q&A,1,Qatar,97,QC/QA,1,Qods Force,1,Quantum Computing,2,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,1,Rahul Guhathakurta,4,Railway,7,Raj,1,Ranking,4,Rape,1,RCEP,1,Real Estate,1,Recall,4,Recession,1,Red Sea,2,Referendum,5,Reforms,17,Refugee,23,Regional,4,Regulations,1,Rehabilitation,1,Religion & Spirituality,9,Renewable,13,Reports,35,Repository,1,Republicans,2,Rescue Operation,1,Research,4,Research and Development,19,Retail,36,Revenue Management,1,Risk Management,4,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,258,Russian Navy,4,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,3,SAR,1,SAT,1,Satellite,12,Saudi Arabia,121,Scandinavia,6,Science & Technology,330,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,1,Securities,1,Security,6,Semiconductor,2,Senate,4,Senegal,1,SEO,3,Serbia,4,Seychelles,1,SEZ,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shipping,5,Shutdown,1,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,4,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,11,Situational Awareness,16,Smart Cities,7,Social Media Intelligence,40,Social Policy,39,Social Science,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,11,Somalia,5,South Africa,18,South America,45,South Asia,398,South China Sea,30,South East Asia,59,South Korea,41,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,7,Space,39,Space Station,2,Spain,8,Special Forces,1,Sports,2,Sports Diplomacy,1,Spratlys,1,Sri Lanka,20,Stamps,1,Startups,43,State of the Union,1,STEM,1,Stephen Harper,1,Stock Markets,15,Storm,2,Strategy Games,5,Sub-Sahara,3,Submarine,13,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,37,Surveillance,8,Survey,5,Sustainable Development,14,Swami Vivekananda,1,Sweden,3,Switzerland,3,Syria,111,Taiwan,16,Tajikistan,11,Taliban,15,Tamar Gas Fields,1,Tanzania,4,Tariff,4,Taxation,22,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,21,Telematics,1,Territorial Disputes,1,Terrorism,73,Testing,2,Texas,3,Thailand,7,The Middle East,601,Think Tank,286,Tibet,2,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,2,TPP,2,Trade Agreements,13,Trade War,9,Trademarks,1,Trainging and Development,1,Transcaucasus,16,Transcript,4,Transpacific,2,Transportation,39,Travel and Tourism,4,Tsar,1,Tunisia,7,Turkey,73,Turkmenistan,9,U.S. Air Force,3,U.S. Dollar,1,UAE,130,UAV,21,UCAV,1,Udwains,1,Uganda,1,Ukraine,90,Ukraine War,4,Ummah,1,UNCLOS,6,Unemployment,1,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,67,United Nations,27,United States,629,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,8,US Army Aviation,1,US Congress,1,US Navy,15,US Postal Service,1,US Space Force,2,USA,16,USAF,18,UUV,1,Uyghur,3,Uzbekistan,11,Valuation,1,Vatican,1,Vedant,1,Venezuela,18,Venture Capital,3,Victim,1,Videogames,1,Vietnam,18,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,16,Water Politics,6,Weapons,10,Wearable,2,Weather,2,Webinar,1,WEF,2,Welfare,1,West,2,West Africa,17,West Bengal,2,Western Sahara,2,Whitepaper,2,WHO,3,Wikileaks,1,Wikipedia,1,Wildfire,1,Wildlife,2,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,10,Workshop,1,World Bank,27,World Economy,24,World Peace,10,World War I,1,World War II,3,WTO,6,Xi Jinping,8,Xinjiang,1,Yemen,26,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: Counter Terrorism: The Drone Strike Solution by Rohit Deshpande
Counter Terrorism: The Drone Strike Solution by Rohit Deshpande
http://4.bp.blogspot.com/-UYfFfya2g0k/VVre9OIIjFI/AAAAAAAABII/TVSdeAVPFI0/s640/Article-DBs12-001.jpg
http://4.bp.blogspot.com/-UYfFfya2g0k/VVre9OIIjFI/AAAAAAAABII/TVSdeAVPFI0/s72-c/Article-DBs12-001.jpg
IndraStra Global
https://www.indrastra.com/2015/05/Counter-Terrorism-Drone-Strike-Solution-by-Rohit-Deshpande.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2015/05/Counter-Terrorism-Drone-Strike-Solution-by-Rohit-Deshpande.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content