Fewer Afghan Civilians Are Being Killed, But Drone Deaths Are On The Rise

A U.S. Air Force MQ-9 Reaper flies near Kandahar in 2009. A U.S. Air Force MQ-9 Reaper flies near Kandahar in 2009. Defense Department

In the early morning of Sept. 16, a group of women and children in Afghanistan’s Laghman Province were walking to a nearby mountain to collect pine nuts and wood when they were hit by a NATO coalition airstrike. No insurgents or militants were harmed in the strike, but four women, three girls, and a boy were killed, according to a new United Nations report. 

The U.N. Assistance Mission in Afghanistan released an annual report on the protection of civilians on Tuesday that shows while the number of civilian deaths in the conflict has decreased in the last year, there has been an increase in the number of deaths from drone strikes — a heated issue that has received greater national attention in recent weeks,  following CIA director nominee John Brennan's confirmation hearing.

Fewer Afghan civilians were killed by insurgents or Afghan and NATO coalition forces last year than the year before. All told, 2,754 civilians were killed in 2012, with only 8 percent dying at the hands of Afghan and NATO forces. 

Source: United Nations Assistance Mission in Afghanistan

But while Afghan and NATO forces were behind fewer deaths in 2012, the share of deaths by drone rose. Aerial strikes killed 126 Afghans last year, accounting for most of the civilian deaths by coalition and Afghan forces. Though this was a 42 percent decrease from 2011, the U.N. report calls for “a thorough review of pre-engagement targeting policies prior to use of aerial weapons,” citing the 52 children killed last year.

The number of drone strikes in Afghanistan increased last year to 506 from 294 the year before. Five of the strikes in 2012 resulted in the deaths of 16 civilians. One of those strikes happened in Nuristan Province, where a drone strike targeting insurgents killed a child and two teachers on Dec. 5, according to the report. In 2011, only one drone strike killed civilians.

Source: United Nations Assistance Mission in Afghanistan

The U.N. report only focuses on the conflict in Afghanistan and does not address drone attacks in other countries. In his confirmation hearing, Brennan was questioned by several lawmakers over the military practice that has quadrupled in his tenure as the White House counterterrorism director.

In his written responses to questions before the hearing, Brennan said the number of civilian deaths from drones strikes should be made public, promising more transparency.

“I believe that, to the extent that U.S. national security interests can be protected, the US government should make public the overall numbers of civilian deaths resulting from U.S. strikes targeting al-Qaida,” Brennan said.

During the hearing, Senate Intelligence Committee Chairwoman Dianne Feinstein, a California Democrat, continued to press Brennan to release that information. He again promised to look into the issue, but said the U.S. strives to keep civilian casualties to a minimum.

Like several lawmakers, the U.N. report calls for a review of the drone strike policy, specifically the criteria that are used to establish the threat of certain targets. It also calls for more transparency in reporting the number of civilians that are killed in operations.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

    Download
  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

    Download
  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

    Download
  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

    Download
  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.

    Download

When you download a report, your information may be shared with the underwriters of that document.