You are on page 1of 3

Conclusions

The analysis of five quite different conflicts has centralized and immediate the data fusion of these
demonstrated that UAVs play a key role in each of UAV systems and others in combination with fur-
them, even if these roles differ from one another, ther C4ISR (Command, Control, Communications,
sometimes in a nuanced way, sometimes markedly. Computers, Intelligence, Surveillance, and Recon-
The main findings are that the proliferation of naissance) network elements is, the more decen-
UAVs must be recognized as a fact and that, tralized the response must be.
thanks to them, successive actors are being The use of semi-autonomous systems, as seen
massively upgraded in their operational and, in in the numerous cases of strikes against Saudi oil
some cases, strategic performance and capability infrastructures, can be understood as a foretaste of
spectrum, and thus in their actor quality per se what can be expected with fully autonomous
compared to previous conditions. Ansar Allah in systems and the use of strong AI in the near future.
Yemen, Daesh in Syria and Iraq, or the GNA and A high-intensity military confrontation with more
LNA in Libya are examples of this. technically sophisticated HALE-class combat-fo-
This upgrading can also lead to technological cused UAVs (UCAVs) in an A2/AD environment,
autonomy or even self-sufficiency if a system is and those derivatives that in turn follow them, will
not only provided and integrated, managed and strongly challenge common ways of thinking,
operated by external personnel, but can actually planning and operating.
be produced (e.g. with the help of computer- The use of UAVs shows that there is no vac-
aided design and 3D printing processes) and uum in international politics. The American and
used inde-pendently. In terms of highly portable Israeli highly mature technical solutions are bound
and loca-tion-independent production systems, by restrictions on distribution. This has led to the
this can lead to a fluid threat situation. emergence of a market for Chinese derivatives on
The vulnerability or detection-side impotence the one hand and for regional initiatives on the
of conventional air defence systems in the face other. This circumstance runs counter to the estab-
of these threats from a combination of UAVs, lishment of any universally applicable limitations
cruise missiles, ballistic missiles and loitering and standards. Therefore, an effective ban on or
munitions illustrates that these assets can quickly prohibition of such systems is not to be expected in
become overwhelmed or saturated. the near future. The violations against and erosion
Improving electro-magnetic (especially EW) as of international agreements on limitation, non-pro-
well as direct energy defence system combina- liferation or the banning of individual classes of
tions can be part of the answer. Another part of the warfare agents has proved the ineffectiveness of
answer lies in the yet to be developed resilient these treaties. This is a further reason why one’s
handling of operational procedures, tactics and the own resilience to such systems will have to be
corresponding mindset of the personnel with shaped and one must be able to protect oneself
appropriate education and training concepts. This against them both technically and conceptually.55
means that not only the technical level, but also the It should also be noted that the dependen-cies
human factor must be given greater consideration created by deployment and proliferation will not
in training procedures and established leadership continue ad infinitum. In hybrid conflict con-texts
principles in the future, when dealing with a sen- in particular, this should be understood as an
sor- and effector-infested digital and multispectral inadmissible focus on one aspect of the whole
environment. This may mean that the more much wider spectrum of hybrid vectors. UAVs are

55 Cf. Gady, ‘Krieg um Berg-Karabach 2020: Implikationen für Streitkräftestruktur und Fähigkeiten der Bundeswehr’.

25
becoming the means of choice, as they can per- time before private, commercial organizations offer
form in multiple domains with pinpoint accuracy in their paying clientele comparably complex UAV
a hybrid-led confrontation of varying intensity, and operations, as has been possible in the inter-
can thus support the actions of a hybrid actor in the national framework on the basis of the outlined
best possible way. The price to be paid for the use conflicts. Experiences with companies such as
of UAVs by third parties (those actors who rely on Executive Outcomes, Blackwater/ Academi or oth-
support from UAV providers and operators) is their ers should be cautionary examples of the possible
strategic autonomy. The transfer of UAV sys-tems repeatability of history. The possible use of such
and the commitment through the use of spe-cific mercenary actors in combination with such pow-
personnel to their maintenance and operation will erful UAV capabilities in the context of false flag
only be crowned with success as long as no attacks or proxy attacks can appear attractive to
effective countermeasures against these systems hybrid threat actors, rogue states/organizations/
are brought into the field. Furthermore, these rela- companies and criminal organizations for many
tions and operational capabilities can only be main- reasons.56
tained as long as the other aspects of hybrid war- UAVs are a means of power projection. They
fare and conflict management (e.g. with regard to save blood, sweat and tears on one’s own side in
financial and economic stability) do not hinder such the broadest sense, since as a surrogate they
a UAV solution, causing actors to fall into a situa- seem to reduce the involvement of military person-
tion where they are no longer in a position to pro- nel in combat operations. At the same time, how-
vide or deploy the system for the respective party. ever, they encourage non-state armed groups to
This strategic relationship duly has serious conse- increase violence against civilian targets and
quences and dependencies for both sides even offer them a suitable means to do so.
(provider and user). UAVs are weapons of our time, and humanity
The renaissance of the current mercenary sys- will have to find a way to deal with them in the
tem also suggests that it will only be a matter of struggle against and with hybrid threat actors.

56 Singer, Corporate Warriors: The Rise of the Privatized Military Industry.

26
Author
Frank Christian Sprengel, MA, is a political scientist and sociologist educated at the
Universities of Würzburg and Heidelberg with a focus on security and defence policy. He
works as a manager for REPUCO Unternehmensberatung in Vienna, where he heads the
Strategy and Analysis Division. He is responsible for projects in the field of strategic foresight
as well as strategic management for public and private clients. Mr Sprengel has military and
civilian training, which characterizes his analytical and strategic way of working. In previous
assignments, he worked as a lecturer at the University of Münster (honorary), as a consultant
for international relations, and at the Federal Academy for Security Policy.

27

You might also like