Fact-checked by Grok 2 weeks ago

High-value target

A high-value target (HVT) is a that an adversary requires for the successful completion of a , such that its loss would seriously degrade operational effectiveness. This concept, formalized in U.S. , applies to personnel, facilities, or resources essential to enemy command, control, , or combat capabilities, and is distinct from a high-payoff target (HPT), which is an HVT whose neutralization directly advances friendly objectives. In joint targeting processes, HVTs are identified early through to prioritize acquisition, , and , integrating fires across air, ground, sea, , and domains to shape the . Commanders nominate HVTs based on their assessed centrality to adversary functions, often compiling high-value target lists (HVTLs) that guide in , , and operations. Notable applications include targeting senior insurgent or terrorist leaders, where HVT designation facilitates precision strikes to disrupt networks, though empirical assessments reveal mixed outcomes: short-term command disruptions are common, but decentralized organizations often regenerate , limiting decapitation's strategic efficacy against adaptive threats. Controversies arise over collateral risks and legal thresholds under , with emphasizing and to minimize civilian harm, yet real-world executions have prompted debates on long-term blowback versus operational gains.

Definition and Terminology

Core Definition

A high-value target (HVT) is a target that an enemy commander requires for the successful completion of the mission, such that its loss would seriously degrade important enemy functions throughout the friendly course of action. This definition originates from U.S. Department of Defense joint doctrine, particularly in the context of joint targeting processes outlined in Joint Publication 3-60, where HVTs encompass both personnel and resources critical to adversary operations. Target value analysis, a key step in preparation, evaluates potential targets based on their assessed impact on enemy capabilities, prioritizing those whose disruption yields strategic or operational advantages. HVTs are distinguished from high-payoff targets (HPTs), which represent a prioritized subset of HVTs selected for engagement based on specific priorities, feasibility, and expected return on during a given . While HVTs are identified objectively through doctrinal criteria like to courses of (COAs), their designation relies on assessments of dependencies, such as command structures, nodes, or key personnel. In practice, this concept applies across , , and , where HVTs often include high-ranking leaders or assets whose elimination disrupts command-and-control or sustainment functions. The identification of HVTs emphasizes empirical evaluation over subjective judgments, drawing from sources to quantify value through metrics like mission dependency and , ensuring targeting aligns with broader operational objectives rather than isolated tactical gains. Doctrinal sources, such as Joint Publications, provide standardized terminology to minimize in multinational or interagency operations, though real-world application can vary based on evolving threat assessments and technological capabilities for and engagement. A high-value target (HVT) is defined in U.S. as a —whether a , , or resource—that an enemy commander requires for the successful completion of their mission, such that its loss would seriously degrade the enemy's ability to achieve objectives. This enemy-centric valuation contrasts with the high-payoff target (HPT), which is a or related category selected by friendly commanders from HVTs or other nominations based on their potential to significantly contribute to the success of allied operations, often prioritizing immediate tactical or operational effects over inherent enemy dependency. For instance, while an enemy's command node might qualify as an HVT due to its essential role in coordination, it becomes an HPT only if disrupting it aligns with specific friendly courses of during a given phase of operations. HVTs differ from time-sensitive targets (TSTs), which emphasize urgency and fleeting opportunities rather than enduring strategic value; TSTs require rapid response to prevent enemy actions but may include lower-value assets if their immediate justifies attack, whereas HVTs are prioritized for their disproportionate long-term impact regardless of timing. In contexts, HVTs often overlap with high-value individuals (HVIs), a term focused specifically on key personnel like leaders or planners whose elimination disrupts networks, but HVT extends to non-personnel elements such as hubs or weapon caches that an adversary cannot easily replace. This broader scope for HVT avoids conflation with narrower "persons of interest" in , which lack the formalized criterion of mission-criticality to the enemy. Unlike targets of , which arise spontaneously during operations without prior nomination and may yield incidental benefits, HVTs undergo deliberate identification through preparation, templates, and commander input to ensure attacks target elements central to adversary sustainment or command structures. targets, a more general term in targeting cycles, encompass HVTs and HPTs but also include lower-value assets elevated by operational or legal constraints, lacking the specific emphasis on irreplaceable enemy dependencies inherent to HVT designation. These distinctions underpin causal targeting logics, where HVT focus maximizes disruption by severing high-leverage nodes in enemy systems, as evidenced in doctrines prioritizing HVT lists for synchronized strikes.

Historical Origins and Evolution

Early Military Doctrine

In conventional prior to the emphasis on , high-value targets (HVTs) were defined as assets or facilities critical to an adversary's ability to execute operations, whose elimination or disruption would materially degrade their command, control, logistics, or combat effectiveness. U.S. Army Field Manual 6-20-40 (1990) explicitly described HVTs as "targets deemed important to the enemy commander for the successful accomplishment of his mission," noting that their loss could be expected to significantly influence the enemy's decisions or morale. This conceptualization aligned with systemic targeting principles, focusing on interdependent nodes such as command posts, sites, ammunition depots, and bridging equipment rather than individual personnel, reflecting the scale of peer or near-peer conflicts anticipated during the late . The integration of HVT prioritization emerged within frameworks like the doctrine outlined in FM 100-5 (1982 and 1986 editions), which advocated deep strikes into enemy rear areas to preempt follow-on forces by severing key enablers. HVTs were selected through event templates and target-value analysis during intelligence preparation of the battlefield, emphasizing targets whose destruction yielded cascading effects across the enemy's operational tempo, such as disrupting second-echelon reinforcements or command networks. In practice, this was evident in exercises and planning for scenarios against forces, where HVTs like mobile headquarters or fuel storage were modeled for artillery, aviation, or to achieve maneuver dominance. Joint targeting processes, formalized post-Gulf War but rooted in earlier service-specific methods, further refined HVT identification by distinguishing them from high-payoff targets (HPTs), which offered tactical gains but lower strategic value. Pre-2001 , as reflected in emerging joint publications, stressed commander validation of HVT lists to ensure alignment with campaign objectives, often incorporating battle damage assessment to verify impacts on enemy cohesion. This material-focused approach contrasted with later adaptations, prioritizing verifiable degradation over speculative leadership , though operational examples like strikes on Iraqi assets in 1991 demonstrated its application in high-intensity warfare.

Post-9/11 Counterterrorism Shift

The September 11, 2001, terrorist attacks, which killed 2,977 people, exposed vulnerabilities in U.S. defenses against non-state actors and catalyzed a doctrinal pivot from state-centric warfare to individualized targeting of terrorist leadership. This shift prioritized high-value targets (HVTs)—defined in U.S. military parlance as enemy personnel or assets whose loss would significantly degrade operational capabilities—over broader area-denial strategies, reflecting the asymmetric nature of al-Qaeda's decentralized network. The Authorization for Use of Military Force (AUMF), enacted by on , 2001, provided legal basis for operations against those responsible for the attacks, explicitly enabling lethal action against HVTs like , designated a priority target by the CIA within days of the strikes. Operation Enduring Freedom, launched October 7, 2001, in , operationalized this approach through (JSOC) raids and early (UAV) strikes aimed at and HVTs, such as the December 2001 where bin Laden evaded capture. By fusing intelligence collection with direct-action missions, U.S. forces disrupted command nodes, capturing figures like intelligence chief Mohammed Fatih (November 2001) and operative (March 2002). The strategy evolved with the 2003 Iraq invasion, where JSOC under General Stanley McChrystal refined HVT operations into a high-tempo model, conducting over 300 raids monthly by 2006 to target leaders, correlating with a 75% drop in attacks in Anbar Province from 2006 to 2007. This "find, fix, finish" cycle integrated real-time , human sources, and precision munitions, marking a departure from Cold War-era . Technological enablers amplified the shift: The Predator drone program, initiated pre-9/11 but expanded post-attacks, enabled remote HVT strikes, with the first lethal use against in on November 3, 2002. By 2008, UAV operations had conducted over 30 strikes in alone, prioritizing "personality strikes" on vetted HVTs based on patterns of life analysis. Joint doctrine formalized HVT prioritization in publications like Joint Publication 3-60 (updated iteratively post-2001), directing commanders to nominate HVTs for attack if their elimination yielded disproportionate effects relative to collateral risks. This globalized application extended to and , with U.S. Africa Command establishing HVT-focused task forces by 2007 to counter al-Shabaab and AQIM networks. Despite successes, such as the May 2, 2011, raid killing bin Laden, the approach revealed limitations in preventing leadership regeneration, prompting doctrinal refinements toward network disruption over sole decapitation.

Identification and Prioritization Criteria

Key Factors for Designation

A high-value target (HVT) is doctrinally defined as a target the enemy commander requires for the successful completion of the mission, where its loss would seriously degrade important enemy functions throughout the friendly course of action. This designation emphasizes targets representing resources or activities the adversary can least afford to lose or that provide the greatest operational advantage, identified through target system analysis (TSA) that evaluates interconnected enemy capabilities. In military doctrine, such as Joint Publication 3-60, HVTs are nominated by joint force components or intelligence staff (J-2) during the targeting cycle, with designation requiring validation against commander guidance, rules of engagement, and law of war compliance. Key factors for HVT designation center on two primary assessments: criticality and vulnerability, derived from systematic intelligence preparation and all-source fusion analysis. Criticality is gauged by the target's intrinsic value to the enemy, including its depth within the adversary's operational architecture, recuperation time if lost, and capacity to sustain mission-essential functions such as or . Vulnerability factors include the enemy's redundancies (e.g., reserves or cushions), dispersion, mobility, and countermeasures, which determine the feasibility of engagement and the target's exposure to friendly forces. For personnel targets, particularly in , these criteria often highlight individuals in senior roles whose elimination disrupts , recruitment, or financing, as their unique knowledge or authority lacks immediate substitutes. Prioritization elevates certain HVTs to high-payoff targets (HPTs) when their neutralization is projected to significantly advance friendly objectives, such as degrading enemy cohesion or enabling follow-on operations. This involves commander-approved weighting based on military advantage, where targets are vetted for accuracy and integrated into prioritized lists like the Joint Integrated Prioritized List (JIPTL). Empirical assessments, including wargaming and historical on enemy regeneration rates, inform these decisions to ensure designations reflect causal impacts rather than speculative threats. Designation processes mandate multidisciplinary input from , operations, and legal advisors to mitigate risks of misidentification, underscoring the reliance on verified, multi-sourced over unconfirmed reports.

Intelligence and Analytical Processes

The identification of high-value targets (HVTs) relies on multi-intelligence fusion, integrating (HUMINT), (SIGINT), (IMINT), and (OSINT) to map adversary networks and leadership structures. Analysts employ and social network modeling to pinpoint individuals whose removal would disrupt command, control, financing, or operational capabilities, prioritizing those with high in organizational hierarchies. This process begins with intelligence preparation of the (IPB), which defines the operational environment, identifies adversary courses of action, and evaluates potential HVT vulnerabilities through pattern-of-life tracking and behavioral profiling. Target value analysis (TVA) serves as a analytical to nominate and rank HVTs, assessing factors such as their in enabling functions, the cascading effects of their neutralization, and recuperability by the adversary. Complementing TVA, the evaluates targets on criticality (impact on mission success), accessibility (feasibility of engagement), recuperability (time to replace), (susceptibility to available weapons), effect (broader consequences), and recognizability ( confidence). In and contexts, these tools are integrated into iterative cycles like F3EAD (find, fix, finish, , analyze, disseminate), where post-operation refines future targeting by disseminating captured materials to validate HVT designations and uncover secondary networks. High-value target teams, often embedded within joint special operations commands, facilitate real-time intelligence-operations fusion, enabling persistent surveillance via unmanned aerial systems and ground sensors to confirm positive identification (PID) before action. Commanders nominate HVTs based on joint targeting directives, balancing strategic disruption against operational risks, with validation through multi-agency review to ensure legal compliance and minimize collateral effects. Empirical studies of counterinsurgency operations highlight that rigorous analytical prioritization, drawing on probabilistic modeling of network resilience, enhances targeting efficacy by focusing resources on nodes with disproportionate influence, though over-reliance on quantitative metrics can overlook adaptive enemy behaviors.

Operational Methods

Capture Operations

Capture operations targeting high-value individuals (HVTs) in and efforts prioritize the apprehension of key leaders alive to facilitate , intelligence exploitation, and disruption of adversary networks, as opposed to lethal strikes which aim for elimination. These operations, often conducted by U.S. (JSOC) units such as or , integrate military precision with interagency collaboration to minimize resistance and while securing the target for detention. Planning for HVT capture relies on the F3EAD targeting cycle—Find, Fix, Finish, Exploit, Analyze, Disseminate—which begins with intelligence fusion from sources including , human informants, and persistent to locate and confirm the target's position. High-value target teams, typically comprising 8-15 members from forces, CIA, FBI, and other agencies, are collocated for rapid decision-making, with rotations of 90-120 days to maintain operational tempo and expertise. This emphasizes to identify HVTs whose removal yields strategic disruption, incorporating elements like evidence collection for potential prosecution by the mid-2000s. Execution involves small-unit raids, frequently at night, employing overwhelming force, non-lethal options where feasible (e.g., flashbangs, tasers), and insertion via helicopters for speed and surprise, followed by ground assault to secure the objective. Sensitive teams accompany operators to immediately collect documents, electronics, and from the site, enabling on-the-spot analysis to generate leads for subsequent operations. In during the 2007 , such teams detained over 7,000 members in between February and August, demonstrating tactical efficacy through adapted swarming tactics and local . Post-capture, HVTs are transferred to facilities managed by entities like the (HIG), which employs collaborative techniques across FBI, CIA, and military interrogators to extract actionable intelligence, feeding back into the F3EAD cycle for network dismantling. These operations have proven tactically disruptive, as evidenced by the capture of thousands of insurgents in by 2008, though sustained success requires embedding within broader strategies to avoid leadership vacuums.

Lethal Targeting Techniques

Lethal targeting techniques against high-value targets (HVTs) encompass kinetic operations designed to neutralize designated individuals through precise application of force, typically executed under frameworks like the U.S. Joint Targeting doctrine outlined in Joint Publication 3-60, which emphasizes matching lethal actions to prioritized targets for mission accomplishment. These methods prioritize time-sensitive targets (TSTs), a subset of HVTs requiring rapid acquisition and attack due to their transient nature and high operational impact. Primary techniques include remotely piloted aircraft strikes and direct-action raids, often integrated within the F3EAD (find, fix, finish, exploit, analyze, disseminate) targeting methodology, which optimizes lethal effects against HVTs in and contexts. Unmanned aerial vehicle (UAV) strikes, utilizing platforms such as the MQ-1 Predator or , deliver precision-guided munitions like missiles to HVT locations identified via intelligence fusion, enabling low-collateral execution from standoff distances and reducing risk to operators. Between 2004 and 2018, the U.S. conducted over 2,243 , , and , with a significant portion targeting HVTs to disrupt terrorist networks, though exact HVT attribution varies by classified assessments. These operations rely on real-time surveillance feeds and to confirm target presence, culminating in a "finish" that exploits kinetic effects for immediate neutralization. Special operations forces (SOF) direct-action raids represent another core technique, involving small-team insertions via or ground infiltration to close with and engage HVTs using suppressed , breaching charges, or tactics. U.S. (JSOC) units, such as or SEAL Team 6, have employed this method extensively in and from 2003 onward, often following multi-intelligence "fixing" to isolate the target in a defensible compound before assault. Raids prioritize speed and surprise, with techniques like dynamic entry and non-lethal incapacitation options escalating to lethal force if resistance occurs, supported by overhead assets for suppression fire. Less common but doctrinally viable techniques include joint fires integration, such as laser-guided bombs from manned aircraft or naval gunfire, applied when HVTs are in open terrain or vehicle convoys verifiable by forward observers. These methods adhere to collateral damage estimation protocols to minimize unintended effects, though empirical data from operations in dynamic environments like Afghanistan indicate challenges in achieving zero civilian impact due to HVT mobility and human shielding. Overall, lethal techniques evolve with technological advancements, such as AI-assisted targeting for faster "finish" phases, but remain constrained by legal authorities like the 2001 Authorization for Use of Military Force.

Notable Examples and Case Studies

Al-Qaeda and Taliban Leadership

The targeting of leadership exemplified high-value target (HVT) prioritization in the era, focusing on figures central to operational command and ideological propagation. , founder and emir of , was designated a paramount HVT due to his orchestration of the , 2001, attacks and subsequent global plots; on , 2011, U.S. Navy executed Operation Neptune Spear, raiding his compound in , , resulting in his death from gunshot wounds during the operation. This action, informed by years of intelligence on a courier network, disrupted 's centralized decision-making, as bin Laden had issued directives on attacks from hiding. His successor, , assumed leadership in 2011 and continued coordinating affiliates; Zawahiri was killed on August 2, 2022, in a U.S. drone strike using two missiles on a residence where he resided under protection, confirmed by DNA evidence and intelligence verifying his presence. These strikes demonstrated the evolution of HVT operations from ground raids to precision over-the-horizon munitions, leveraging and human sources to minimize ground risks while aiming to degrade command structures. Bin Laden's elimination severed a symbolic and strategic , contributing to Al-Qaeda's shift toward decentralized franchises, though capabilities persisted through lieutenants. Zawahiri's , occurring post-U.S. withdrawal from , exposed Taliban-Al-Qaeda ties despite Doha Agreement assurances, prompting temporary Taliban outrage but no retaliation against U.S. interests. Empirical assessments indicate such removals temporarily hampered plotting, as Al-Qaeda documents captured in raids revealed internal disruptions from leadership losses, yet succession by figures like maintained ideological continuity. Taliban leadership targeting paralleled Al-Qaeda efforts but yielded mixed strategic outcomes, often conducted via drone strikes in Pakistan's border regions to interdict cross-border operations. , since 2015, was prioritized as an HVT for rejecting peace talks and directing intensified attacks on Afghan forces; he was killed on May 21, 2016, in a U.S. strike near Ahmad Wal in , while traveling in a vehicle, confirmed by Afghan intelligence and statements. The strike, authorized after tracking his mobile phone, aimed to pressure negotiations but instead unified hardliners under successor , accelerating territorial gains. Unlike cases, HVT removals frequently empowered more intransigent successors, as the group's Pashtun tribal networks facilitated rapid transitions resilient to . Over 200 from 2004-2018 targeted figures, degrading logistics but not collapsing the , which culminated in the 2021 takeover.

Operations in Iraq and ISIS

U.S. forces conducted on December 13, 2003, resulting in the capture of former Iraqi president near , , after a nine-month involving the 4th Division and special operations units like Task Force 121. was located hiding in an underground "spider hole" on a farm, based on intelligence from local informants and signals intercepts, marking a major disruption to Ba'athist loyalist networks that had fueled post-invasion . Earlier, on July 22, 2003, U.S. troops killed Saddam's sons Uday and in a four-hour firefight in , , after they refused to surrender during a prompted by a tip from an associate; the operation involved the and , confirming the deaths via dental records and DNA. This action eliminated key figures who had orchestrated attacks on coalition forces, though it did not immediately quell the growing insurgency. A pivotal lethal operation occurred on June 7, 2006, when U.S. F-16 aircraft dropped two 500-pound bombs on a near , , killing , leader of (AQI), along with several associates including his spiritual advisor. Intelligence from a Jordanian who infiltrated Zarqawi's network enabled the precise strike, which relied on interagency high-value target teams combining CIA, military , and ; Zarqawi's death temporarily fragmented AQI, his group responsible for thousands of bombings and beheadings that intensified . As AQI evolved into the Islamic State of Iraq and Syria () by 2013-2014, U.S.-led coalition operations under (OIR), launched in 2014, targeted ISIS high-value targets through airstrikes, raids, and support for i and partners, resulting in the capture or killing of hundreds of ISIS leaders and operatives in by 2019. In the 2016-2017 Battle of , coalition airstrikes and ground raids eliminated numerous mid- and senior-level ISIS commanders embedded in urban defenses, contributing to the territorial defeat of ISIS's in by December 2017, though ISIS remnants persisted via sleeper cells. These efforts emphasized precision-guided munitions and real-time intelligence fusion to minimize while disrupting command structures, with U.S. Central Command reporting ongoing partner-enabled operations that killed or detained dozens of ISIS facilitators in through 2024. Despite successes, analysts note that HVT removals alone did not eradicate ISIS's decentralized ideology, as replacements often emerged rapidly in 's unstable environment.

Empirical Effectiveness

Metrics and Studies on Disruption

A quantitative examining 118 decapitation attempts across 90 campaigns from 1975 to 2003 determined that such operations reduced insurgent attack frequency, as measured by negative models (p<0.05), and elevated the likelihood of termination by 27–29% and government victory by 29–32% (p<0.01). These effects were stronger for lethal strikes compared to captures (p<0.01) and in longer campaigns exceeding 10 years, though the analysis underscored decapitation's role as a supportive rather than a standalone . In contrast, an of 298 targeted killings or captures against leaders of terrorist groups from 1945 to revealed that decapitated organizations at a rate of %, lower than the 70% collapse rate for non-targeted groups, indicating that selection for targeting often signals more entities. Resilience correlated with larger group sizes (e.g., 100–500 members showed a 35% lower collapse rate than smaller cohorts), greater age (groups over 25 years exhibited enhanced stability), and ideological traits like religious or separatist orientations, which foster bureaucratic succession and communal resource bases. Application to specific cases highlights short-term disruptions amid adaptive responses; the 2011 elimination of Al-Qaeda founder impaired core command structures, yet the network endured through affiliates such as (AQAP, linked to 143 attacks) and (AQI, 200 attacks), with overall organizational attacks persisting or rising post-strike due to decentralization. Similarly, repeated strikes against leadership from 2014 onward contributed to territorial contraction by 2019 and a decline in high-profile operations, but metrics from indicated sustained low-ebb with episodic violence, as the group fragmented into cells rather than dissolving. Countervailing research posits stronger disruptive potential; one dataset-driven assessment concluded that decapitation triples the annual probability of a terrorist group's demise, accelerating decline through compounded operational setbacks, though this holds more for hierarchical than networked formations. Across studies, metrics consistently show immediate drops in coordinated attacks (e.g., 20–30% in select insurgent contexts) but underscore the need for integrated strategies to counter regeneration, as isolated targeting rarely eradicates ideologically driven networks.

Long-Term Strategic Impacts

Targeted killings of high-value in terrorist organizations have yielded mixed long-term strategic outcomes, with empirical analyses indicating that such operations rarely lead to the complete dismantlement of groups. A comprehensive study of 207 attempts against terrorist organizations from 1945 to 2005 found that groups with charismatic or long-standing leaders were more , surviving leadership loss at rates exceeding 80%, often regenerating through successor promotion or fragmentation into affiliates that perpetuate the and operations. This resilience stems from the decentralized, ideological nature of many terrorist networks, which prioritize redundancy and ideological continuity over hierarchical stability, allowing them to adapt rather than collapse under . In the case of , the 2011 disrupted centralized command but did not precipitate organizational demise; instead, the group fragmented into resilient affiliates like and al-Shabaab, which expanded operations and maintained global attack capabilities into the . Similarly, the 2022 drone strike eliminating yielded symbolic and tactical gains but failed to erode al-Qaeda's core infrastructure, as evidenced by sustained recruitment and plotting in regions like and . These outcomes align with broader data showing that decapitation correlates with short-term attack spikes due to successor or vengeance motives, but long-term violence levels often stabilize or increase if underlying grievances and safe havens persist. Strategically, HVT targeting has incentivized terrorist adaptations, such as enhanced operational security, leader anonymity, and delegation to mid-level cells, complicating future efforts and prolonging threats. While integrated with operations and governance reforms—as in the territorial defeat of cores in and by 2019— contributed to leadership vacuums that facilitated decline; isolated, however, it risks entrenching diffuse networks harder to eradicate than hierarchical ones. Peer-reviewed assessments emphasize that long-term success hinges on complementary measures like disrupting finances and narratives, as alone addresses symptoms rather than causal drivers like ideological appeal or state failure.

Controversies and Criticisms

Civilian Casualties and Proportionality

U.S. drone strikes targeting high-value targets (HVTs) in operations, primarily in , , , and from 2004 onward, have resulted in civilian casualties, though estimates vary significantly due to methodological differences in verification. The U.S. government reported between 64 and 116 civilian deaths from 473 strikes in non-battlefield areas (, , ) between 2009 and 2015, emphasizing "personality strikes" against known HVTs with high-confidence intelligence to minimize . Independent trackers like the Bureau of Investigative Journalism estimated 809–1,173 civilians killed in 433 strikes across , , , and from 2010 to 2020, often including "signature strikes" based on behavioral patterns rather than individual identification, which critics argue increases misidentification risks. A study by the Columbia Clinic highlighted challenges in distinguishing militants from civilians post-strike, noting that U.S. classifications frequently label military-age males as combatants by default unless proven otherwise. Proportionality under international humanitarian law (IHL) requires that anticipated civilian harm not be excessive in relation to the concrete and direct military advantage anticipated from an attack, as codified in Additional Protocol I to the Geneva Conventions and customary law. In HVT operations, the military advantage typically involves disrupting command structures, preventing imminent attacks, and degrading terrorist capabilities; for instance, the elimination of Al-Qaeda leaders like Ayman al-Zawahiri in 2022 was assessed as yielding substantial advantage by forestalling plots that could kill hundreds or thousands. Empirical analyses, including views from Pakistani military officials, suggest civilian casualty rates in precise HVT strikes are low (around 2–6% of total deaths), with media reports often inflating figures by assuming non-HVT deaths as civilian without verification, supporting arguments that such operations comply with proportionality when intelligence is robust. Critics, including human rights organizations, contend that even low-probability civilian deaths in remote areas violate strict IHL thresholds, particularly in "signature strikes" where patterns may proxy for HVTs but ensnare innocents, potentially eroding long-term legitimacy despite short-term gains.
Source TypeEstimated Civilian Deaths (2004–2020, select regions)Notes on Methodology
U.S. Government64–116 (2009–2015, non-battlefield)Based on internal reviews; excludes as "area of active hostilities."
Bureau of Investigative Journalism384–807 (, , , , 2010–2020)Aggregates local media, NGO reports; higher due to inclusive counting of unverified deaths.
New America Foundation~300–500 (cumulative across programs)Cross-verified media and official statements; focuses on confirmed HVT impacts.
Post-strike assessments under U.S. policy evolved, with the Obama administration mandating "near certainty" of no civilian casualties for HVT strikes outside active war zones, a standard partially relaxed under in 2019 by revoking annual reporting requirements, though Biden reinstated stricter reviews in 2021. Studies on efficacy indicate that HVT removals correlate with reduced attack frequencies—for example, drone campaigns in diminished Al-Qaeda operations by 50–70% in targeted areas—suggesting that holds when weighing collateral against prevented mass-casualty events orchestrated by HVTs. However, operational errors, such as the 2015 strike in killing two Western hostages, underscore persistent risks, prompting debates on whether technological precision (e.g., improved ) sufficiently mitigates them relative to alternatives like ground raids, which carry higher risks to operators.

Recruitment and Blowback Effects

Critics of high-value target (HVT) operations, including some organizations and academic analysts, posit that such strikes incite blowback by boosting terrorist , as killed leaders are framed as martyrs and operations fuel local grievances against intervening powers. This view draws on anecdotal reports of short-term retaliatory violence, such as increased attacks following certain decapitations between 2001 and 2011. However, these claims often rely on correlational observations rather than causal evidence, overlooking ideological drivers of like jihadist narratives that predate specific strikes. Empirical studies largely refute systematic recruitment surges from HVT targeting. An analysis of 118 attempts in campaigns from 1975 to 2003 found no "martyrdom effect" from failed operations, with successful removals reducing insurgent attacks and intensity by statistically significant margins (p < 0.01–0.05). Similarly, Bryan Price's examination of terrorist groups showed elevates organizational mortality rates, with 59% of targeted groups disbanding versus lower rates for untreated ones, as structures hinder effective . This effect diminishes for older, bureaucratic groups but exploits the dependence of many jihadist networks on singular leaders for operational . In practice, U.S. drone campaigns targeting HVTs in Pakistan's (FATA) from 2004 onward disrupted al-Qaeda's core without documented recruitment blowback. Captured documents from the raid reveal strikes eroded personnel quality, forced relocations, and thinned the talent pool for external plots by 2008–2010, while local Pashtun support waned rather than grew. Post-2011 , al-Qaeda's central command fragmented, with affiliates like AQAP and AQIM facing internal disarray and reduced capabilities, contradicting predictions of motivational surges. and operations yielded comparable results, where HVT losses compounded logistical strains over any propaganda gains. Potential short-term spikes in violence, as seen in retaliatory Hamas bombings after the 1996 killing of , reflect tactical responses rather than sustained growth, often dissipating as successor leadership proves less adept. Civilian casualties in broader drone contexts may erode public support in zones, but precision HVT operations minimize this risk and prioritize disruption of command chains, yielding net reductions in terrorist output. Overall, evidence indicates HVT targeting degrades group resilience more than it catalyzes expansion, with sustained primarily by endogenous factors like religious and vacuums.

International Humanitarian Law Application

(IHL), primarily codified in the of 1949 and their Additional Protocols, governs the conduct of hostilities in armed conflicts, permitting attacks on military objectives while requiring distinction between combatants and civilians. High-value targets (HVTs), such as senior leaders in non-state armed groups like terrorist organizations, qualify as military objectives under IHL if they make an effective contribution to the enemy's military action through their functions and their destruction offers a definite military advantage. In international armed conflicts (IACs), HVTs who are members of enemy armed forces lose protection as combatants and may be lawfully targeted at any time until they surrender or are . This principle extends to non-international armed conflicts (NIACs), prevalent in counter-terrorism operations, where members of organized armed groups continuously performing a continuous combat function—such as planning or directing attacks—are targetable, provided the conflict reaches the requisite intensity threshold under Common Article 3 and Additional Protocol II. The application of IHL to HVT targeting mandates adherence to core principles of distinction, , and precautions. Distinction requires attacks to be directed solely at objectives, excluding unless they directly participate in hostilities, which temporarily forfeits their but does not confer . prohibits attacks where the anticipated exceeds the and advantage, assessed ex ante based on available ; for HVTs, this often involves evaluating collateral risks from precision strikes, such as drones. Precautions demand verifiable on and , feasible warnings where circumstances permit, and of means minimizing incidental , as emphasized in International Committee of the Red Cross (ICRC) interpretive guidance, though states may contest its non-binding expansions on membership criteria. In practice, targeting HVTs in NIACs against groups like or has been defended as IHL-compliant when based on membership in the armed group rather than mere suspicion of terrorism, avoiding conflation with peacetime law enforcement. The U.S. Department of Defense Law of War Manual, for instance, asserts that continuous combatants in NIACs are targetable anywhere, anytime, absent surrender, aligning with state practice in operations yielding measurable disruptions to command structures. However, challenges arise in extraterritorial NIACs, where host state consent or UN Security Council authorization under (Article 51 UN Charter) intersects with IHL, and empirical data from post-strike assessments is required to validate compliance amid claims of excessive casualties. Critics, including some human rights organizations, argue for stricter law overlays, but IHL's status in conflict prioritizes its targeting rules over absolute prohibitions on lethal force.

Debates on Due Process and Sovereignty

The targeted killing of high-value targets, particularly through drone strikes, has sparked significant debates regarding adherence to due process under the U.S. Constitution and respect for national sovereignty under international law. Critics argue that such operations often bypass judicial oversight, relying instead on executive determinations of threat, which may contravene the Fifth Amendment's guarantee of due process for U.S. citizens abroad. Proponents, including U.S. government officials, maintain that imminent threats posed by individuals like al-Qaeda operatives justify lethal action without prior trial when capture is infeasible, framing it as a wartime necessity under the 2001 Authorization for Use of Military Force (AUMF). A pivotal case illustrating concerns is the 2011 drone strike in that killed , a U.S. citizen and propagandist, on September 30, 2011. Al-Awlaki's father and the ACLU filed Al-Aulaqi v. Obama in 2010, challenging the authorization as a deprivation of life without , demanding before targeting. The Obama administration defended the strike as lawful against an imminent threat, citing al-Awlaki's operational role in plots like the and the 2010 underwear bomb attempt, but the D.C. District Court dismissed the case on standing grounds without reaching the merits. Subsequent suits, such as Al-Aulaqi v. Panetta over the killings of al-Awlaki and two other U.S. citizens (including his 16-year-old son Abdulrahman in a separate 2011 strike), similarly failed to secure injunctions, highlighting judicial reluctance to intervene in foreign military operations but underscoring ongoing contention over ex ante review requirements. Legal scholars debate whether targeted killings equate to extrajudicial execution outside declared war zones, with some advocating minimal procedural safeguards like internal executive checklists, while others insist on stricter standards akin to criminal process. On , U.S. , , and —totaling over 500 in alone from 2004 to 2018—have been contested as infringements on absent explicit host-nation consent or UN authorization. 's issued formal protests against numerous strikes, such as the 2009 attack in South Waziristan killing 41 civilians per local reports, decrying them as violations of despite occasional tacit against militants. In and , strikes proceeded amid weak central governance, with the U.S. invoking collective or , but UN Special Rapporteur Philip Alston criticized them in 2010 as unlawful outside active hostilities, potentially constituting arbitrary deprivation of life under . Defenders reference Article 51 of the UN Charter for anticipatory against non-state actors, arguing yields to necessity in failed-state contexts, though this interpretation remains disputed in international forums like the UN Human Rights . The Parliamentary of the in 2015 highlighted risks to global norms, urging states to limit targeted killings to verifiable zones to preserve principles.

References

  1. [1]
    [PDF] Department of Defense Dictionary of Military and Associated Terms
    A target the enemy commander requires for the successful ...<|separator|>
  2. [2]
    [PDF] Joint Targeting School Student Guide - National Security Archive
    A High-Value Target (HVT) is a target the enemy commander requires for the successful completion of the mission. A. High-Payoff Target (HPT) is derived from ...
  3. [3]
    [PDF] JP 3-60, Joint Targeting - Just Security
    Jan 31, 2013 · This publication provides doctrine for the planning, coordination, and execution of joint targeting. Page 19. I-1. CHAPTER I. UNDERSTANDING ...
  4. [4]
    [PDF] MCWP 2-3 MAGTF Intelligence Production and Analysis_5
    high-value target-A target the enemy commander requires for the successful comple- tion of the mission. The loss of high-value targets would be expected to ...
  5. [5]
    The successes and problems of high-value targeting strategies ...
    Oct 19, 2022 · ... targeting, so frequently practiced in law enforcement, counterinsurgency, and counterterrorism operations? High-value targeting has been ...
  6. [6]
    [PDF] Civilian Research Project Army War College Fellow
    Targeted Killings: Is Organizational Decapitation an Effective. Counterterrorism Strategy? 5a. CONTRACT NUMBER. 5b. GRANT NUMBER. 5c. PROGRAM ELEMENT NUMBER. 6.
  7. [7]
    [PDF] Secret Weapon: High-value Target Teams as an Organizational ...
    The interagency teams, when working well, took counterterrorism ef- forts (leadership targeting) to an unprecedented level of efficacy, permitting great ...
  8. [8]
    [PDF] ATP 2-01.3 Intelligence Preparation of the Battlefield - Army Garrisons
    Mar 1, 2019 · High-value target list developed during step 3 of IPB (example) ....................... 5-20. Figure 5-8. Threat capability statement example ...
  9. [9]
    [PDF] Air Force Doctrine Publication 3-60, Targeting
    The joint targeting process facilitates tasking orders by providing amplifying information necessary for detailed force-level planning of operations. The ...
  10. [10]
    [PDF] Joint Targeting
    Jan 31, 2013 · An HPT is one whose loss to the enemy will significantly contribute to the success of the friendly course of action (COA). A time- sensitive ...
  11. [11]
    [PDF] AJP-3.9, Allied Joint Doctrine for Joint Targeting - GOV.UK
    Nov 9, 2021 · A legal assessment (military necessity, distinction ... A high-value target, the successful influencing of which will offer disproportionate.
  12. [12]
    FM 6-20-40 Appendix G - GlobalSecurity.org
    During the staff war-gaming process, the targeting officer (in conjunction with the S2, S3, and FSO) develops the high-value target list into a high-payoff ...
  13. [13]
    Timeline: How 9/11 Reshaped Foreign Policy
    The events of September 11, 2001, set in motion sweeping changes to US intelligence and counterterrorism practices, launched two major wars, and altered ...Missing: value | Show results with:value
  14. [14]
    How Have the 9/11 Terror Attacks Shaped U.S. Military Doctrine ...
    Sep 12, 2021 · Different than waging wholesale war on a nation-state, the asymmetrical war lexicon now includes terms like “High Value Target” or “HVT”, “ ...
  15. [15]
    The ABCs of HVT: Key Lessons from High Value Targeting ...
    The use of high value targeting (HVT)—using military and police forces to kill or capture leaders of insurgent and terrorist groups—has increased ...
  16. [16]
    Adapting to Threats: US Counterterrorism Strategy After 9/11 - RSIS
    Sep 10, 2024 · SYNOPSIS The September 11, 2001, attacks highlighted significant US vulnerabilities and led to major counterterrorism reforms. Post-9/11 ...
  17. [17]
    [PDF] ATP 2-33.4 Intelligence Analysis
    Aug 18, 2014 · members and community contacts, for potential targeting to locate the high-value individual (HVI). For example, if the location or phone ...
  18. [18]
    FM 6-20-10: TTPs for The Targeting Process - INTELLIGENCE ...
    TVA is a methodology which concurrently identifies potential HVT sets within a given tactical situation.
  19. [19]
    Optimizing the Alternate Targeting Methodology F3EAD
    With the F3EAD targeting methodology, SOF may recognize, locate, and target enemy units and conduct intelligence exploitation and analysis on captured enemy ...
  20. [20]
    [PDF] Analytic Support to Intelligence in Counterinsurgencies - RAND
    This monograph presents a broad range of analytic techniques that can be used to support the security portion of counterinsurgency oper- ations. Its purpose is ...
  21. [21]
    [PDF] Manhunting: Counter-Network Organization for Irregular Warfare
    The Joint Special Operations University (JSOU) provides its publications to contribute toward expanding the body of knowledge about joint special operations.
  22. [22]
    High-Value Detainee Interrogation Group - FBI
    ... high-value targets. ITs work collaboratively with partners to ensure all HIG ... Journal of Policing, Intelligence, and Counter Terrorism, 11(2), 143- 162.Missing: examples | Show results with:examples
  23. [23]
    [PDF] Joint Publication 3-60 - Executive Services Directorate
    (DOD Dictionary. Source: JP 3-60) high-value target. A target the enemy commander requires for the successful completion of the mission. Also called HVT ...
  24. [24]
    Targeted Killings | Council on Foreign Relations
    Targeted killings, especially those conducted by drone strikes, have become a central component of U.S. counterterrorism operations around the globe.Missing: HVT | Show results with:HVT
  25. [25]
    [PDF] The Degradation Effects of Targeted Drone Killings Against Al ...
    Since the terrorist attacks on. 9/11, this threat has been confronted through various counterterrorism measures accompanying the Global War on Terror (GWOT).
  26. [26]
    [PDF] The ABCs of HVT: Key Lessons from High Value Targeting ...
    Jan 3, 2011 · Too often, HVT campaigns are plagued by poor intelligence, cause unnecessary collateral damage, spur retaliatory attacks, and in many cases, ...Missing: definition | Show results with:definition<|separator|>
  27. [27]
    Osama Bin Laden Dead | whitehouse.gov - Obama White House
    May 2, 2011 · President Obama addresses the Nation to announce that the United States has killed Osama bin Laden, the leader of al Qaeda.
  28. [28]
    Minutes and Years: The Bin Ladin Operation - CIA
    A US military raid on an al-Qa`ida compound killed Usama Bin Ladin, America's most wanted terrorist.
  29. [29]
    Ayman al-Zawahiri: Al-Qaeda leader killed in US drone strike - BBC
    Aug 2, 2022 · Mr Biden said al-Zawahiri had "carved a trail of murder and violence against American citizens". "From hiding, he co-ordinated al-Qaeda's ...
  30. [30]
    Did Killing Mullah Mansour Work? | Council on Foreign Relations
    In May 2016, President Barack Obama authorized a U.S. military drone strike that killed Taliban leader, Mullah Akhtar Mansour. A year later, we can judge ...
  31. [31]
    Experts react: Al-Qaeda chief Ayman al-Zawahiri is dead. What's ...
    Aug 1, 2022 · A sense of vindication for Biden and a moment of truth for the Taliban. The death of Ayman al-Zawahiri is a triumph first and foremost for the ...
  32. [32]
    Were Drone Strikes Effective? Evaluating the Drone Campaign in ...
    Jan 11, 2022 · Sustaining terrorist campaigns requires skilled personnel to forge documents, build bombs, lead operatives in the field, and assist in the “flow ...
  33. [33]
    Taliban leader Mullah Akhtar Mansour killed, Afghans confirm - BBC
    May 22, 2016 · Afghanistan's spy agency has confirmed that Taliban leader Mullah Akhtar Mansour has been killed, after the US targeted him in a drone strike.
  34. [34]
    Obama Says Mullah Mansour, Taliban Leader, Was Killed in U.S. ...
    May 23, 2016 · An American drone strike on Saturday in a restive province of Pakistan killed Mullah Akhtar Muhammad Mansour, the leader of the Afghan Taliban.Missing: details | Show results with:details
  35. [35]
    America's Counterterrorism Wars: The Drone War in Pakistan
    Tracking the United States's drone strikes and other operations in Pakistan, Yemen, Somalia, and Libya.Missing: details | Show results with:details
  36. [36]
    Operation RED DAWN nets Saddam Hussein | Article - Army.mil
    Dec 6, 2013 · Ten years ago this week, the US Army captured Iraqi dictator Saddam Hussein alive. The story of how he was located and captured is an intelligence success ...
  37. [37]
    “We Got Him!” The Anniversary of the Capture of Saddam Hussein
    The chain of events that ended with Saddam's capture outside of Tikrit began March 19, 2003, when the U.S.-led coalition launched its offensive against Saddam's ...
  38. [38]
    Video - U.S. Air Strike on Al-Zarqawi - DVIDS
    Mar 21, 2022 · B-roll of two US Air Force F-16 Fighting Falcons dropping two 500-lb. bombs on a farmhouse killing Abu Musab al-Zarqawi, the leader of Al Qaeda in Iraq.
  39. [39]
    What Zarqawi's Death Means for the Insurgency - Brookings Institution
    The U.S. military, U.S. intelligence, and the Bush administration deserve a hearty cheer for the airstrike that killed Abu Musab al-Zarqawi. The guerrilla ...
  40. [40]
    Secret Weapon: High-value Target Teams as an Organizational ...
    This study argues that interagency teams were a major catalyst in turning around the Iraq War, and that they will disappear from America's arsenal unless ...Missing: origins concept history
  41. [41]
    [PDF] Fact Sheet on ISIS Financing | Treasury
    Aug 8, 2024 · ... capture of hundreds of ISIS leaders and operatives across Iraq and Syria and further hampered ISIS ability to plan and execute terrorist attacks ...Missing: strikes | Show results with:strikes<|separator|>
  42. [42]
    The Role of U.S. Airpower in Defeating ISIS - RAND
    Feb 12, 2021 · The United States used airpower in Syria and Iraq to halt ISIS's momentum and help defeat the organization, without committing a large ...<|control11|><|separator|>
  43. [43]
    Defeat ISIS Mission in Iraq and Syria for January – June 2024
    TAMPA, Fla. – From January to June 2024, ISIS has claimed 153 attacks in Iraq and Syria. At this rate, ISIS is on pace to more than double the total number ...
  44. [44]
    [PDF] Does Decapitation Work? - Belfer Center
    On organizational forms and leadership decapitation in counterterrorism, see Audrey Kurth Cronin, “How al-Qaida Ends: The. Decline and Demise of Terrorist ...
  45. [45]
    Attacking the Leader, Missing the Mark: Why Terrorist Groups ...
    Apr 1, 2014 · A theory of organizational resilience explains why decapitation results in the decline of some terrorist organizations and the survival of others.
  46. [46]
    The Islamic State at Low Ebb in Iraq: The Insurgent Tide Recedes ...
    Jan 20, 2022 · The Islamic State's insurgency in Iraq is looking increasingly anemic, in contrast to the sustained resurgence it enjoyed over the course of 2019 and early ...
  47. [47]
    Targeting Top Terrorists: How Leadership Decapitation Contributes ...
    bin Laden was dead. Earlier that day, the president had ordered a team of elite military forces deep into Pakistan to kill the mastermind behind the.
  48. [48]
    Five Years After the Death of Osama bin Laden, Is the World Safer?
    May 1, 2016 · Five years ago, US special operations forces killed Osama bin Laden in a raid on his hiding place in Abbottabad, Pakistan.Missing: disruption | Show results with:disruption
  49. [49]
    Al-Qaida after al-Zawahri - Brookings Institution
    Aug 3, 2022 · Terrorist groups often rise and fall depending on the quality of leadership ... Afghanistan What Ayman al-Zawahri's death says about terrorism in ...
  50. [50]
    Can Al-Qa`ida Survive Bin Ladin's Death? Evaluating Leadership ...
    While Bin Ladin's death was a major tactical victory for the United States, decapitation alone rarely results in the demise of terrorist organizations. Killing ...Missing: strikes | Show results with:strikes
  51. [51]
    Do Targeted Killings Weaken Terrorist Groups?
    Aug 2, 2022 · But do not mistake victories over Islamist terrorist organizations with victory over militant Islam. The war on terrorism will not be won with ...
  52. [52]
    Killing Terrorist Leaders Is No Silver Bullet - War on the Rocks
    Oct 13, 2021 · To begin with, decapitation can reshape the composition of a terrorist or insurgent group, and not always to the benefit of counter-terrorism or ...
  53. [53]
    Drone Warfare - TBIJ
    Between 2010 and 2020 the Bureau tracked US drone strikes and other covert actions in Pakistan, Afghanistan, Yemen and Somalia.Somalia · Afghanistan · Yemen<|separator|>
  54. [54]
    "Counting Drone Strike Deaths" by Human Rights Clinic
    Popular debate on US drone strikes often centers on how many individuals are killed, and which of two categories the individuals killed fall into – militant or ...
  55. [55]
    Accuracy of the U.S. Drone Campaign: The Views of a Pakistani ...
    Those against drone strikes in Pakistan argue that the attacks kill a disproportionate number of civilians. Others, however, argue that the number of civilian ...
  56. [56]
    Biden can reduce civilian casualties during US drone strikes. Here's ...
    Jan 19, 2022 · In July 2021, U.S. President Joseph Biden announced the adoption of an “over the horizon” counterterrorism strategy. The new plan would rely ...
  57. [57]
    Trump revokes Obama rule on reporting drone strike deaths - BBC
    Mar 7, 2019 · The US will not have to publish how many civilians are killed in drone strikes outside of war zones.
  58. [58]
    [PDF] The Civilian Impact of Drone Strikes
    Center for Civilians in Conflict supplemented this research with staff expertise on military operations and previous analyses of civilian harm caused by drone ...
  59. [59]
    Legitimate Targets of Attacks Under International Humanitarian Law
    The first rule regarding attacks (by acts of violence2 ) is that the intended target must be a military objective.
  60. [60]
    Sources, Scope, and Application of the Law on Legitimate Targets in ...
    This chapter presents the fragmentation of law applicable to targeting in armed conflict, which spans international humanitarian law, international human ...
  61. [61]
    [PDF] Targeting Individuals Belonging to an Armed Group
    compliant with international humanitarian law (IHL). Targeting based on ... TERROR AND THE LAWS OF WAR: A MILITARY PERSPECTIVE 55 (2d ed. 2015). 7. Id ...
  62. [62]
    Frequently asked questions: Rules of war - ICRC
    IHL is universal: all parties fighting in a conflict are obliged to respect IHL, be they governmental forces or non-State armed groups. The Geneva Conventions, ...
  63. [63]
    [PDF] Targeting and Humanitarian Law: Current Issues
    This article explores several of the more pressing legal issues involving tari geting during 21sticentury armed conflict targeting doctrine, targeting an opi.<|separator|>
  64. [64]
    Targeting Dual-Use Structures: An Alternative Interpretation
    Jun 28, 2021 · As a body of law crafted by States, IHL is intended to allow States effectively to fight while maximizing the protection of civilian, civilian ...
  65. [65]
    [PDF] Targeted Killing of Terrorists | Strategic Forum 286 - NDU Press
    He is also a Senior. Research Scholar at the Yale Law. School. Key Points. ◇◇ The battle against terrorism raises important legal and policy concerns for the ...Missing: methods HVT
  66. [66]
    [PDF] Clarifying the Rules for Targeted Killing - RAND
    What is striking in the debates over questions related to international law and U.S. targeted killing policies is how U.S. government officials have left. (1) ...
  67. [67]
    Q & A: US Targeted Killings and International Law
    Dec 19, 2011 · What is the international human rights law on targeted killings? How many people have US forces killed in targeted killings in recent years?
  68. [68]
    [PDF] Due Process Rights and the Targeted Killing of Suspected Terrorists
    These killings have significantly increased since the Iraq war and are now a central component of U.S. counterterrorism strategy. The targeted killing program.Missing: HVT | Show results with:HVT<|separator|>
  69. [69]
    [PDF] Targeted Killing: The Case of Anwar Al-Aulaqi
    Anwar Al-Aulaqi's potential targeted killing is whether the executive branch may target him for attack without ex ante judicial review. Al-. Aulaqi v. Obama, No ...
  70. [70]
    Al-Aulaqi v. Panetta - Constitutional Challenge to Killing of Three ...
    Jun 4, 2014 · The killings were part of a broader program of “targeted killing” by the United States outside the context of armed conflict. The program is ...
  71. [71]
    [PDF] “will i be next?” - us drone strikes in pakistan - Amnesty International
    Armed groups operating in North Waziristan have been responsible for unlawful killings and other abuses constituting war crimes and other crimes under ...
  72. [72]
    [PDF] an evaluation of the us policy of "targeted killing" under international ...
    Alston, supra note 14, at 17 n.99; see also Arabella Thorpe, Drone Attacks and the Killing of Anwar Al-Aulaqi, House of Commons Standard Note 06165 3. ( ...
  73. [73]
    [PDF] Drones and the International Rule of Law
    This is not because recent U.S. drone strikes “violate” international law; iro-.
  74. [74]
    Drones and targeted killings: the need to uphold human rights and ...
    1. The Parliamentary Assembly considers that the use of armed drones for targeted killings raises serious questions in terms of human rights and other branches ...