An Assemblage Approach To Liquid Warfare: AFRICOM and The Hunt' For Joseph Kony
An Assemblage Approach To Liquid Warfare: AFRICOM and The Hunt' For Joseph Kony
research-article2018
SDI0010.1177/0967010618777890Security DialogueDemmers and Gould
Article
Security Dialogue
2018, Vol. 49(5) 364–381
An assemblage approach to liquid © The Author(s) 2018
Jolle Demmers
Utrecht University, the Netherlands
Lauren Gould
Utrecht University, the Netherlands
Abstract
The Western state-led turn to remote forms of military intervention as recently deployed in the Middle East
and across Africa is often explained as resulting from risk aversion (avoidance of ground combat), materiality
(‘the force of matter’) or the adoption of a networked operational logic by major military powers, mimicking
the ‘hit-and-run’ tactics of their enemies. Although recognizing the mobilizing capacities of these phenomena,
we argue that the new military interventionism is prompted by a more fundamental transformation,
grounded in the spatial and temporal reconfiguration of war. We see a resort to ‘liquid warfare’ as a
form of military interventionism that shuns direct control of territory and populations and its cumbersome
order-building and order-maintaining responsibilities, focusing instead on ‘shaping’ the international security
environment through remote technology, flexible operations and military-to-military partnerships. We draw
upon assemblage as a heuristic device and the case of the US Africa Command (AFRICOM) to flesh out the
complex and fluid nature of liquid warfare and the ways by which power operates across space. We outline
how the forging of a transnational military assemblage in the name of ‘hunting Kony’ allowed for the buildup
of an archipelago of military bases and operational capabilities across Africa, which serve as hubs for the
monitoring, disrupting and containment of potential risks and dangers.
Keywords
AFRICOM, assemblage, critical military studies, liquid warfare, militarism, security
Introduction
In the Middle East and across Africa, an expanding conglomerate of armed actors is engaged in
surveillance programmes, training operations, targeted killings and manhunts, often outside
Corresponding author:
Jolle Demmers, Utrecht University, Drift 6, Utrecht, 3512 BS, the Netherlands.
Email: [email protected]
Demmers and Gould 365
conventional war zones. These Western state-led operations mark a shift away from ‘boots on the
ground’ deployments towards light-footprint military interventions, and involve a combination of
drone strikes and airstrikes, special forces, intelligence operatives, private contractors, and mili-
tary-to-military (M2M) training teams on the ground (Watts and Biegon, 2017: 1). Largely, these
military interventions (and their lived realities) remain hidden from Western publics. And if they
incidentally appear on our screens, the shadowy mix of alliances and actors involved makes it hard
to trace lines of responsibility and underlying power constellations. This elusiveness is problematic
for a number of reasons. For one, larger audiences are (effectively) confused into indifference, and,
importantly, those at the receiving end of the violence are unable to hold governments to account.1
War is rendered invisible and normalized. And even in the academic field of critical security stud-
ies, the turn away from state-centrism has produced a blind spot for the interconnectedness between
Western state–led warfare and human insecurity (see Security Dialogue, 2018). Aiming to reinvig-
orate a focus on militarism and its co-constitution with (in)security, and drawing on the case of the
US Africa Command, AFRICOM, we aim to do three things in this article. First, we emphasize the
relevance of the term ‘liquid warfare’ as a way of naming a key feature of extrastate military opera-
tions in late modernity.2 Second, we propose to investigate the fluidity and complexity of these
operations by means of an assemblage approach. Third, we lay out for AFRICOM, and in particu-
lar its Observant Compass operation to counter the Lord’s Resistance Army (LRA), how liquid
warfare plays out in practice.
Liquid warfare
Aiming to define the ‘new newness’ of interventionist warfare, scholars have entered into some-
thing of a coining contest. Drawing on the notions of ‘(counter-)netwars’ (Arquilla and Ronfeldt,
2001), ‘network war’ (Duffield, 2002), and Hardt and Negri’s (2004) ‘global civil war’ (2004), we
see labels such as ‘securocratic war’ (Feldman, 2004), ‘chaoplexic warfare’ (Bousquet, 2008),
‘coalition proxy warfare’ (Mumford, 2013), ‘transnational shadow wars’ (Niva, 2013) or simply
‘remote warfare’ (Watts and Biegon, 2017). In reviewing this debate, we notice how the ‘newness’
of war is attributed to three developments. First, scholars point out how the horrors of intervention-
ist ground wars in Afghanistan and Iraq invoked a sense of risk aversion and war fatigue, ushering
in a ‘post-interventionist’ or ‘pull-back’ era (Duffield, 2016; Kümmel and Giegerich, 2013;
Mumford, 2013). As a reaction, the USA and its coalition partners (but also major powers such as
Russia and Saudi Arabia) have combined a resort to ‘precision’ airstrikes with a shift to smaller,
clandestine, more focused interventions (Mutschler, 2016; Schörnig, 2013). Second, scholars focus
on the turn to military robotics (and drones in particular) as a key feature of interventionist warfare.
We see the emergence of a subfield of ‘drone studies’, with a strong (and often highly abstract)
emphasis on materiality, dingpolitik, the agentic capacity of drones, (in)corporeality and necro-
ethics: the gruelling irony of ‘killing with care’ (see Holmqvits, 2013; Schwarz, 2016; Wall and
Monahan, 2011; Walters, 2014; Wilcox, 2017). What is often implied by these debates is that
somehow new technologies are the drivers behind new forms of warfare. Third, and equally promi-
nent, is the debate on the networked nature of war. Simply put, the argument goes that because the
‘enemies of the state’ are now operating through shadowy networks and cells, the state has to resort
to similar tactics. Elements within the US military and related agencies, legitimated (and ‘legal-
ized’) by the War on Terror, have increasingly adopted more networked forms of organization,
which has made possible the integration of drones and new technologies into so-called counter-
netwars, in which ‘hybrid blends of hierarchies and networks … mount strike operations across
shadowy transnational battle spaces’ (Niva, 2013: 187). What is in fact implied is that ‘shadow
warfare’ results from the state mimicking its enemies.
366 Security Dialogue 49(5)
Although offering important insights into the design of warfare, the above perspectives over-
look more fundamental, and classic, questions of war: how war is an alternative system of
profit, power and protection. Wars are produced; they ‘are made to happen by a diverse and
complicated set of actors who may well be achieving their objectives in the midst of what looks
like failure and breakdown’ (Keen, 2008: 15). The changing nature of interventionist warfare
cannot be attributed to reactive impulses or strategies alone. Rather, ‘war fatigue’, ‘remote
technology’ and ‘enemy networks’ provide additional conditions of possibility for the spatial
and temporal reconfiguration of war. As we intend to show for the case of the USA, they offer
new opportunities to further what the US Department of Defense (1997: 6) articulates as ‘shap-
ing the international security environment in ways that promote and protect US interests’.
Paying tribute to Zygmunt Bauman’s (2000, 2001) liquidity vocabulary and Derek Gregory’s
(2011) notion of ‘everywhere war’, we propose to use the term ‘liquid warfare’ to highlight how
conventional ties between war, space and time have become undone. Liquid warfare is about
flexible, open-ended, ‘pop-up’ military interventions, supported by remote technology and reli-
ant on local partnerships and private contractors, through which (coalitions of) parties aim to
promote and protect interests. Liquid warfare is thus temporally open-ended and event-ful, as
well as spatially dispersed and mobile.
Authors debating the temporal reconfiguration of modern war, and particularly US warfare,
trace its origins back to the 1950s. For Boal et al. (2005: 80), the US doctrine of the past 6o years
is that of a ‘long and consistent pattern of military expansionism in the service of empire’. Duffield
(2007) talks of ‘unending war’, Filkins (2008) of ‘forever war’, and Bacevich (2010) of ‘perma-
nent war’. In ‘everywhere war’, Gregory (2011) adds to this by emphasizing how we have to
rethink late modern war not merely in terms of time but also in terms of space and territoriality.
Whereas wars in the past were conducted in ‘resolutely territorial terms’, we now have to ‘supple-
ment cartographic reason by other, more labile spatialities’ (Gregory, 2011: 239). War has become
mobile. The concept of the battlefield in US doctrine is replaced by a multiscalar, multidimensional
battlescape (Graham, 2010: 31). For Chamayou (2015: 57), the geocentric concept of war is now
opposed to a target-centred one, attached to the bodies of the enemy prey.
Although the War on Terror is often seen as the starting point of this ‘mobile turn’, the
above authors merely see the military interventionism that ensued from it as a climactic sum-
mation of a longer history of ‘globalizing wars’ in which the goal is not to take over territory
but to ‘remove the obstacles on the road to a truly global freedom of economic forces’ (Bauman,
2001: 16). The power of the state in late modernity rests upon credit ratings, corporate capac-
ity and global market shares, not on the capture of territory. Control over resources is of key
importance, but access is arranged through free trade regimes, leasing and contracting, large-
scale land purchases, forestry permits, and ‘accumulation by conservation’, rather than territo-
rial conquest (Massé and Lunstrum, 2016). In contrast to the era of imperialist and colonial
rule, ascendancy over a territory has ‘ceased to be the stake of the global power struggle’
(Bauman, 2001: 13). With a wink at Von Clausewitz, Bauman (2000: 12) states that today’s
wars look like ‘the promotion of global free trade by other means’. Boal et al. (2005) labelled
this ‘military neoliberalism’: a useful shorthand for the increasingly military means whereby
the state seeks to make the world ‘safe’ for global capital. What we notice for the case of
AFRICOM is that the major technique of interventionism is the rejection not just of geopoliti-
cal territorial confinement but also of biopolitical notions of controlling the life and death of
populations, along with the related responsibilities and costs of order and nation-building.
Instead, what is at its core is the notion of ‘shaping’ – pursued by ‘forward presence’ and ‘for-
ward posture’ in military terms (McNeill, 2017: 49). As early as 1997, the US Department of
Defense (1997: 6) articulated this idea as follows:
Demmers and Gould 367
The DoD has an essential role to play in shaping the international security environment in ways that
promote and protect US national interests. To do so, the Department employs a wide variety of means
including: forces permanently stationed abroad; forces rotationally deployed overseas; forces deployed
temporarily for exercises, combined training, or military-to-military interactions; and programs such as
defense cooperation, security assistance, International Military Education and Training (IMET) programs
and international arms cooperation.
We here include the above-mentioned temporal and spatial dimensions in the way we define liquid
warfare as a form of military interventionism that shuns direct control of territory and populations
and its cumbersome order-building and order-maintaining responsibilities, focusing instead on
‘shaping’ the international security environment through remote technology, flexible operations
and M2M partnerships. Key to such an understanding of liquid warfare is its inherently indirect
and assembled nature. Because of its reliance on remote management, it works through assem-
blages of heterogeneous and changing ‘partnerships’, which are often full of friction. In aiming to
flesh out the complex and fluid nature of this type of warfare, and as a way of overcoming state-
centrism, we turn to ‘assemblage’ as a heuristic device. In line with McFarlane (2009), we argue
that the concept of assemblage allows for a rich analysis of zones of interconnected but often
conflictual activity and heterogeneous elements. In the next section, we outline our use of the term.
eroding the state, as states have themselves actively participated in their partial ‘disassembly’. The
notion of the dual process of state disassembly and (global) reassembly provides a powerful tool
for analysing today’s military interventions. Elements of what were previously strictly national are
plugged into new transnational arrangements (under rubrics such as ‘security cooperation’ and
‘building partner capacity’) while retaining strong linkages to their previous functions. These
transnational forms have their own specificities, which are neither purely global/local nor purely
public/private.
Assemblages, boundaries and power: Aligning political economy and Foucauldian views
We examine extrastate military operations as assemblages, that is, as linked directly to a practice:
to assemble. They hence result from the continuous work of pulling disparate parties (at different
‘levels’ and with different motivations, interests, identities) and elements (discourses, doctrines,
laws, resources) together (Li, 2007). This produces questions on how an operation is drawn
together, how connections are forged and how tensions are managed. It thus invites analysis of how
the parties and elements of an assemblage might – or might not – be made to cohere and act; and,
crucially, how this has consequences for individuals, communities and societies ‘on the ground’. In
studying the act of assemblage, we draw on Li’s (2007) ‘practices of assemblage’. We have adapted
these to guide the analysis of what we will call the ‘Kony military assemblage’, identifying five
practices: (a) forging alignments through a shared threat perception: the work of linking together
the objectives of the parties to an assemblage by means of a joint problem definition; (b) rendering
technical: the production of technical descriptions of the problem/solution to overcome tensions
and make the assemblage appear more coherent than it is; (c) authorizing knowledge: specifying
and limiting the requisite body of ‘expert knowledge’; containing critiques; (d) reassembling:
grafting on new elements and reworking old ones; deploying existing discourses, legal instru-
ments, doctrines, to new ends; transposing the meaning of key terms; (e) managing failures and
contradictions: presenting failure as the outcome of rectifiable deficiencies; smoothing out contra-
dictions; devising compromises (see Li, 2007).
Together, Li’s practices help us to examine ‘what holds the assemblage together’ and how the
parties of an assemblage are made to cohere and to act. These practices define the boundaries of
the assemblage and enable it to govern. It therefore becomes important to study the rules of
membership and practices of in- and exclusion that ‘make’ the assemblage. Evidently, assem-
blages such as the ‘hunt for Kony operation’ include diverse subjects, some very powerful and
capacitated through their access to money, technology or expertise (AFRICOM, the Ugandan
military), others figuring merely as mute legitimating characters (the ‘child soldier’, the ‘raped
woman’). Despite our attentiveness to relationships, we thus acknowledge the difference between
elements in an assemblage and the role of ‘relations of force’ – crucial components of political
economy. By examining boundary rules and practices of particular assemblages, we join others
who aim to align notions of compulsory power based on materialist analysis in political econ-
omy with a Foucauldian notion of productive power (Dittmer, 2014; Roberts, 2014). Compulsory
power is ‘the direct, often coercive, capacity to control the action of others’; productive power
is ‘the constitution of specific types of actors capable of effective action within a given social
domain’ (Barnett and Duvall, 2005: 43). As Abrahamsen and Williams (2011) noticed in the case
of global security assemblages, these two forms of power intersect. ‘Productive power makes
some instances of compulsory power possible and legitimate, and, in turn, compulsory power
shapes the terms of meaning that influence how actors see what is possible and desirable’ (Barnett
and Duvall, 2005: 44).
Demmers and Gould 369
Our choice for an assemblage approach is above all empirically motivated: it allows us to nar-
rate fluidity and complexity in an era of structured inequality. As McKeen-Edwards and Porter
(2013: 17) noted in their study of transnational financial associations, by not seeking to link out-
comes to a single type of social actor or institution, nor to treat all actors and institutions as simple
expressions of another underlying and more fundamental actor, assemblage ‘permits us to acknowl-
edge the autonomous role of different types of actors and institutions, and then to explore how the
interactions among these actors and institutions can explain outcomes’. Such an approach is espe-
cially useful in being able to survey a complex environment such as military interventionism,
which is marked by ongoing asymmetries in North–South relations, and in which historical trajec-
tories of a range of actors and institutions interact to produce effects. Assemblage analytics, in our
view, should not fall into the trap of proving that the social world is ‘dynamic and fluid’ and that,
in our case, institutions of war are ‘assembled and messy’ rather than ‘unified and coherent’. Such
a focus will merely have us mistake our premises for results (see Stephen J. Collier in Acuto and
Curtis, 2014: 36). Instead, we have to specify how particular military operations are assembled,
how and why alliances are forged, who is included and excluded, and how parties to an assemblage
act – and have an effect.
In the third section below, we take the shared problem definition of the need ‘to hunt down
Joseph Kony by military means’ as an empirical point of departure to examine how heterogeneous
units aim to achieve their objectives by rearranging themselves to cohere and act under the rubric
of this ‘mission’.
operation represents a change from large deployments of US troops to more flexible and lighter
operations. It has neither permanent combat troops assigned to it, nor even any permanent offi-
cial bases housing US troops in Africa, with the exception of Camp Lemonier in Djibouti.
Instead, it aims to work through African partners. As Branch (2011: 217) explains, ‘AFRICOM
is being built through informal base sharing agreements with African states and through the
establishment of barebones facilities, so-called “lily-pads” or “cooperative security locations,”
which can be converted into functioning US military bases in 24–48 hours’ – something we refer
to as ‘pop-up warfare’. Moreover, the focus is on security cooperation, including M2M training.4
According to data supplied by US Special Operations Command, there are 1700 people dedi-
cated to assisting the US military’s African partners, spread out across 20 countries, conducting
96 activities at any given time (Turse, 2017).5 AFRICOM claims ‘these activities build strong,
enduring partnerships with African nations, regional and international organizations, and other
states that are committed to improving security in Africa’ (US Africa Command, 2017b). In
practice, this means that African troops are doing the actual fighting and dying on the ground
while AFRICOM, often through private military corporations, performs most of the support
tasks, such as logistics, medical support, surveillance and training (Forest, 2014; Olsen, 2014;
Turse, 2015).
In tracing and mapping the materials, practices and bodies that make up the Kony military
assemblage, we use a variety of sources. Building on a small body of academic work
(Bachmann, 2014; Branch, 2011, 2012; Fisher, 2012, 2014; McNeill, 2017; Titeca and Costeur,
2015), we draw on the investigative journalism of key experts such as Nick Turse and Craig
Whitlock, as well as a range of primary sources (US government websites, press releases,
speeches, evaluation reports, NGO briefings, online videos, military magazines, online con-
tractor documents). We gathered and triangulated information on facilities such as military
bases, ‘cooperative security locations’ and ‘forward operation locations’, but also bureaucratic
and military practices, M2M trainings and military assistance programmes, as well as private
military contracting. In addition, information was gathered through interviews held with vari-
ous actors involved in the assemblage during field research between 2007 and 2015 (Gould,
2015, 2016).6
Realizing that militarism and militarization are deeply embedded social phenomena (Jabri,
1996) and ‘potentially everywhere’ (Stavrianakis and Stern, 2018: 9), we rely on the following
set of definitions and indicators to establish whether and when we see the one or the other at
work. Militarism is about the normalization and legitimation of war, as well as the preparations
for war (Woodward, 2005). In our case, militarism is expressed in discursive and institutional
practices that rendered the AFRICOM-led military operation against Kony a necessary, inevita-
ble and/or acceptable form of human conduct. Militarization, we argue, is about the increased
deployment and/or geographical spread of military actors and materials and the extension of
war-like activities to areas of social life that were previously sheltered from such forms of organ-
ized violence. We use three indicators to establish whether or when we speak of militarization:
(1) an increase in military actors and materials in a specific period of time and geographical area;
(2) the taking on of more civilian, developmental and/or policing roles by the military (also at
times called the ‘civilianization’ of the military); (3) an increased mobile employability of mili-
tary personnel across space, and across theatres of war. Finally, we speak of a ‘military assem-
blage’ when the parties taking part in the assemblage deploy a military strategy to counter a
shared threat.
Directing our investigation are questions on how the Kony military assemblage was drawn
together, how it evolved and mutated, who gained from participating in it, and how it had political
consequences.
Demmers and Gould 371
team’ (United Nations, 2012). The AU-led task force would be commanded by Uganda, backed by
the UN, and would receive support from AFRICOM.
Here we see how a diverse set of actors drew together under a threat representation in which the
complex and protracted civil war between the LRA and the government of Uganda was reduced
and sanitized to acts of war crimes by a selection of ‘madmen’, with rebel leader Joseph Kony
featuring as the source of all evil. Through this threat representation, the violent conflict turned
technical. Capturing Kony was now presented as both ‘end state’ and solution. This depoliticiza-
tion move facilitated the embracement of a military solution by all parties involved. As Brian
Losey, commander of Special Operations Command Africa, explained in an interview: ‘So in the
end bringing everybody together, sharing common understanding, coordinating or integrating
operations activities with what our understanding is, is what we seek to do…. Very clearly, the
LRA is embodied by Joseph Kony. It’s the one measureable end state that perhaps has been identi-
fied’ (US Africa Command, 2012). In many ways, the commander summarizes what we argue are
the core practices of the military assemblage.
(Titeca and Costeur, 2015: 105). Ultimately, the DRC banned Ugandan forces from entering the
country. The idea of a regional task force was therefore originally met with fierce opposition by
the DRC.10 Mike Bugason, adviser to the AU’s special envoy on the LRA, explained in an inter-
view that ‘Invisible Children’s campaign, although outdated, brought the international attention,
engagement, and pressure that was needed to launch the task force two months after the cam-
paign’s release’ (Interview 3).11 Since the establishment of the regional task force, the DRC has
been put under renewed pressure by the USA and Uganda to allow Ugandan soldiers back on its
territory in the name of capturing Kony (Fisher, 2014: 693).12
Here we see how the portrayal of the LRA as constantly on the move offered not just a problem
but opportunities too. The move from a geocentric to a target-centric military strategy rendered the
enrolment of the DRC and the CAR into the assemblage as urgent and necessary. In fact, this is
how war is being transformed by the ‘slippery spaces within which and through which it is con-
ducted’ (Gregory, 2011: 239). In our case, the compulsory and productive power to assemble and
reassemble legitimated and allowed for the spatial reconfiguration of war. It translated into an
increased mobile employability of military personnel ‘in the name of’ hunting Kony.
Despite the decline of the LRA, the Kony military assemblage engendered the militarization
of the region. This coincided with the further unravelling of the rebel organization. In 2013,
Invisible Children reported that several LRA camps were destroyed and 16 of its estimated 250
combatants were killed or captured, while another 16 defected (The Resolve and Invisible
Children, 2013). In August 2014, LRA top commander Dominic Ongwen (second on the ICC
list) released 74 women and children abductees, and in January 2015 he surrendered in the CAR
and was handed over to the ICC. In March 2015, it was reported that a corpse exhumed by the
Ugandan authorities was identified, through DNA testing, as being that of Okot Odhiambo (third
on the ICC list) (ICC, 2015).
Militarization, however, also contributed to a worsening in local security dynamics. The very
soldiers who were deployed to fight the LRA and protect civilians were reportedly posing a threat
to the local population. For years, the Ugandan military has been renowned for its human rights
abuses and looting of resources across its borders in the DRC and South Sudan (Schomerus, 2012).
True to its reputation, the Ugandan military has faced allegations that soldiers committed rape and
sexual violence against women and girls in the CAR during their hunt for Kony (Hattam, 2017).
Congolese soldiers stationed in LRA-affected areas also did little to protect the civilian population
and, at times, committed violations (including looting, sexual violence, murder and unlawful
arrest) on a level greater than that of the presumed attacks carried out by the LRA (Titeca and
Costeur, 2015: 111). An array of other actors, including bandits, poachers, armed groups and again
soldiers, allegedly disguised themselves as LRA, mimicking the rebels’ repertoire of violence. This
not only scared the local population into submission and facilitated looting but also misdirected
blame to the LRA (Titeca, 2013). In addition, owing to the overemphasis by the COFCs and
Invisible Children on the security threat posed by the LRA (publicized through radio programmes
and warning posters), local communities in South Sudan and the CAR reported being afraid to
leave their homes and villages (Interview 4).15 Finally, in return for US military support, Ugandan
regional task force troops have been covertly redeployed to fight Al-Shabaab in Somalia (Fisher,
2012; Titeca and Costeur, 2015). An evaluation report by the US Special Operations Command, for
instance, mentions that US special forces provided training on urban counterinsurgency to Ugandan
counterparts deploying to Mogadishu (Forest, 2014: 30). Troops from the Ugandan regional task
force also fought alongside President Salva Kiir Mayardit’s troops in South Sudan.16 Hundreds of
Ugandan soldiers were killed in both struggles. In 2010, Al-Shabaab retaliated directly for Ugandan
involvement in Somalia by detonating two bombs in Kampala, Uganda, killing 74 people and
injuring hundreds. All this makes it safe to conclude that the Kony military assemblage has per-
petuated the same problems it claimed to be fighting: human insecurity and retaliation against
civilians.
intervention’ (Interview 2). AFRICOM, in turn, has repeatedly blamed failures on the lack of dis-
cipline of its local partners (Turse, 2015).
Over the past few years, US military attention and resources have shifted to the Sahel and
Maghreb region, where arrangements similar to those outlined for Central and East Africa are
being rolled out (particularly in Mali, Mauritania, Chad and Niger). Here we see the same
instrumental deployment of flexible military partnerships and operational capabilities through
which potential risks and dangers (however defined) are monitored and, if necessary, disrupted
or contained. Here, too, political and military elites secure their often authoritarian regimes
through plugging into AFRICOM’s military assemblage (Reeve and Pelter, 2014).18 This roll-
back/roll-out movement, we argue, is a key feature of liquid warfare. It shows the shift to
‘mobile and open-ended war’, in which people are harmed and killed, but which remains elu-
sive and unaccounted for.
Conclusion
The current global conjuncture requires us to bring war and militarization ‘back’ into the field of
security studies. Western-led warfare and tactics to counter security threats at a distance inti-
mately intersect with (in)securities across new battlescapes. We have analysed Operation
Observant Compass as part of an assemblage of governing through which heterogeneous ele-
ments and actors became aligned and were able to protect and promote interests in local settings
across East Africa. Our lens of the assemblage helped us to flesh out the labile spatialities and
temporally open-endedness of interventionist warfare, bringing into view a number of things.
Despite the many frictions and tensions, and the important fact that the formation of the ‘Kony
military assemblage’ never corresponded with security realities on the ground, the assemblage
was able to hold together and have a series of effects. Of these, we identify the building of a flex-
ible infrastructure of partnerships and operational capabilities for the protection and promotion of
US interests and the containment of potential threats as of key importance. Although AFRICOM
was a key player, the military assemblage was not an expression of a single type of institution or
logic. Rather, we see how a diverse set of actors – governmental, nongovernmental, intergovern-
mental, corporate and non-profit – rearranged themselves according to the circumstances and
demands of the ‘mission’. We have shown how different actors and elements were included and
excluded and how they played different parts in making the assemblage cohere and work. Human
security discourses (ICC arrest warrants, Recovery Acts, the Kony2012 video and Crisis Tracker)
became crucial in ensuring the diffusion, circulation and reproduction of specific kinds of legiti-
mizing expertise and knowledge. The productive (re)assembling of certain actors and threat per-
ceptions, metaphors (‘Kony as war criminal’), and knowledge practices allowed for the
perpetuation of coercive military strategies of intervention that, as it turned out, served often
unrelated military and economic goals and had substantial security effects. In addition, our analy-
sis directs attention to the mutability of transnational governance arrangements and helps us cap-
ture ‘mission creep’. It illustrates how the Kony assemblage mutated into other military
arrangements and deal-makings, such as the deployment of Ugandan troops to fight Al-Shabaab.
The shadiness of these military arrangements, particularly when legitimized by ‘discourses of
rescue’, enabled permanence and depoliticization and diffused lines of responsibility for the ‘col-
lateral’ damage done.
The mobility and temporal open-endedness of what we here have termed liquid warfare makes
it hard to trace and pin down. This elusiveness both facilitates and is facilitated by dominant narra-
tives of military operations in Africa as necessary interventions to ‘keep us safe’. By addressing the
lack of evidence on the histories, production, dynamics and impacts of liquid warfare, and by map-
ping local repercussions and tracing lines of responsibility, we have here aimed to contribute to
‘making visible’ and ‘making strange’ these contemporary forms of militarism and militarization.
Demmers and Gould 377
Acknowledgements
We are grateful to our colleagues at the Centre for Conflict Studies, Utrecht University, and the three anony-
mous reviewers for their inspiring and constructive comments.
Funding
This research received no specific grant from any funding agency in the public, commercial, or not-for-profit
sectors.
Notes
1. See Airwars and Remote Control (2016).
2. Extrastate military operations involve the fighting by a (coalition of) state(s) outside one’s borders
against the armed forces of another, non-state party. We here alternate between this term and ‘interven-
tionist warfare’.
3. We define ‘governance’ as ‘the attempt to direct conduct and intervene in social processes to produce
desired outcomes and avert undesired ones’ (Li, 2007: 264).
4. Security cooperation encompasses all US Department of Defense interactions, programmes and activi-
ties with foreign security forces to build relationships that promote US interests; to enable partners to
provide the US with access to territory, infrastructure, information and resources; and/or to build and
apply their capacity and capabilities in ways consistent with US defense objectives (Watts and Biegon,
2017: 2).
5. In 2006, just 1% of all US commandos deployed overseas were in Africa. By 2016, that figure had
jumped to more than 17% (Turse, 2017).
6. Interviews were held with representatives of the African Union, Invisible Children, the International
Criminal Court and the Ugandan military (Gould, 2015, 2016).
7. See the Lord’s Resistance Army Disarmament and Northern Uganda Recovery Act of 2009, Pub. L.
No.111-172(2010).
8. In principle, this is paid to private contractors, but in reality, as regional specialist Kristof Titeca
explained, the Ugandan military makes a list of goods it needs, which is then allocated to military con-
tractors (Interview 1).
9. See also Fisher (2014: 694) and Titeca and Costeur (2015: 110).
10. The CAR initially welcomed the Ugandan military’s engagement in operations against the LRA but
increasingly expressed concern that it was profiting from the CAR’s natural wealth and repeatedly called
for limited Ugandan engagement (see International Crisis Group, 2015).
11. In 2009, an action plan for a regional task force had already been adopted during a special summit in
Tripoli (see International Crisis Group, 2015).
12. This position was reiterated by various representatives from the African Union, Invisible Children, the
United Nations and the European Union during the conference ‘The Lord’s Resistance Army Conflict:
Where State Security and Human Security Meet’, held in Brussels on 2 October 2013.
13. A month later, AFRICOM announced that it was pulling the aircraft out of the mission. For a description
of these events, see Titeca and Atkinson (2014).
14. Available at https://lracrisistracker.com (accessed 25 May 2017).
15. See also Schomerus and de Vries (2014).
16. This was confirmed in an interview with a commander of the Ugandan military (Interview 5).
17. See also International Crisis Group (2015: 12).
18. In 2012, for example, a US-trained military leader overthrew the democratically elected government of
Mali in a coup (Whitlock, 2012).
References
Abrahamsen R and Williams M (2011) Security privatization and global security assemblages. Brown Journal
of World Affairs 18(1): 153–162.
378 Security Dialogue 49(5)
Acuto M and Curtis S (2014) Reassembling International Theory: Assemblage Thinking and International
Relations. Basingstoke & New York: Palgrave Macmillan.
Airwars and Remote Control (2016) Limited Accountability: A Transparency Audit of the Coalition Air War
Against So-Called Islamic State. London: Remote Control Project, Oxford Research Group.
Arquilla J and Ronfeldt D (2001) Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa
Monica, CA: RAND.
Bacevich A (2010) Washington Rules: America’s Path to Permanent War. New York: Metropolitan Books.
Bachmann J (2014) Policing Africa: The US military and visions of crafting ‘good order’. Security Dialogue
45(2): 119–136.
Barnett M and Duvall R (2005) Power in international politics. International Organization 59(Winter): 39–75.
Bauman Z (2000) Liquid Modernity. Cambridge: Polity Press.
Bauman Z (2001) Wars of the globalization era. European Journal for Social Theory 4(1): 11–28.
Boal IA, Clark TJ, Matthews J and Watts M (2005) Afflicted Powers: Capital and Spectacle in a New Age of
War. London: Verso.
Bousquet A (2008) Chaoplexic warfare or the future of military organization. International Affairs 84(5):
915–929.
Branch A (2011) Displacing Human Rights: War and Intervention in Northern Uganda. Oxford: Oxford
University Press.
Branch A (2012) The paradox of protection: Aligning against the Lord’s Resistance Army. African Security
5(3–4): 160–178.
Busch G (2011) The United States and the Lord’s Resistance Army. Small Wars Journal. Available at: http://
smallwarsjournal.com/jrnl/art/the-united-states-and-the-lord’s-resistance-army (accessed 18 May 2017).
Chamayou G (2015) Drone Theory. London: Penguin Books.
Collier SJ and Ong A (eds) (2005) Global Assemblages: Technology, Politics, and Ethics as Anthropological
Problems. London: Blackwell.
De Goede M and Simon S (2013) Governing future radicals in Europe. Antipode 45(2): 315–335.
DeLanda M (2006) A New Philosophy of Society: Assemblage Theory and Social Complexity. London:
Continuum.
Deleuze G and Guattari F (1987) A Thousand Plateaus: Capitalism and Schizophrenia. Minneapolis, MN:
University of Minnesota Press.
Dittmer J (2014) Geopolitical assemblages and complexity. Progress in Human Geography 38(3): 385–401.
Duffield M (2002) Social reconstruction and the radicalization of development: Aid as a relation of global
liberal governance. Development and Change 33(5): 1049–1071.
Duffield M (2007) Development, Security and Unending War: Governing the World of Peoples. Cambridge:
Polity Press.
Duffield M (2016) The resilience of the ruins: Towards a critique of digital humanitarianism. Resilience 4(3):
147–165.
Feldman A (2004) Securocratic wars of public safety. Interventions: International Journal of Postcolonial
Studies 9(3): 330–350.
Filkins D (2008) The Forever War. New York: Alfred A. Knopf.
Fisher J (2012) Managing donor perceptions: Contextualizing Uganda’s 2007 intervention in Somalia. African
Affairs 111(444): 404–423.
Fisher J (2014) Framing Kony: Uganda’s war, Obama’s advisers and the nature of ‘influence’ in Western
foreign policy making. Third World Quarterly 35(4): 686–704.
Forest JF (2014) U.S. Military Deployments to Africa: Lessons from the Hunt for Joseph Kony and the Lord’s
Resistance Army. JSOU Report 14-4. MacDill AFB, FL: Joint Special Operations University.
Freeland V (2015) Rebranding the state: Uganda’s strategic use of the International Criminal Court.
Development and Change 46(2): 293–319.
Gould LM (2015) The politics of portrayal in violent conflict: The case of the Kony 2012 campaign.
Alternatives: Global, Local, Political 39(4): 207–230.
Gould LM (2016) The Global Justice Assemblage: International Criminal Law Enforcement and the
Governing of the Northern Ugandan Conflict. PhD dissertation, Utrecht University.
Demmers and Gould 379
Graham S (2010) Cities Under Siege: The New Military Urbanism. London & New York: Verso.
Gregory D (2011) The everywhere war. The Geographical Journal 177(3): 238–250.
Hajer M (1993) Discourse coalitions and the institutionalization of practice: The case of acid rain in Britain.
In: Fischer F and Forrester J (eds) The Argumentative Turn in Policy Analysis and Planning. Durham,
NC: Duke University Press, 43–76.
Hardt M and Negri A (2004) Multitude: War and Democracy in the Age of Empire. London: Penguin Books.
Hattam J (2017) Why the US and Uganda were willing to give up the hunt for Joseph Kony. Washington
Post, 22 April.
Holmqvist C (2013) Undoing war: War ontologies and the materiality of drone warfare. Millennium 41(3):
535–552.
Human Rights Watch (2010) Trail of Death: LRA Atrocities in Northeastern Congo. Available at: https://
www.hrw.org/report/2010/03/28/trail-death/lra-atrocities-northeastern-congo (accessed 16 April 2018).
International Criminal Court (ICC) (2015) ICC terminates proceedings against Okot Odhiambo following
forensic confirmation of his passing. Press release, 10 September. Available at: https://www.icc-cpi.int/
pages/item.aspx?name=PR1147 (accessed 25 May 2017).
International Crisis Group (2015) The Lord’s Resistance Army: End game? Africa Report 128. Available at:
https://www.crisisgroup.org/africa/central-africa/lord-s-resistance-army-end-game (accessed 16 April
2018)
Jabri V (1996) Discourses on Violence: Conflict Analysis Reconsidered. Manchester & New York: Manchester
University Press.
Kalyvas SN (2006) The Logic of Violence in Civil War. New York: Cambridge University Press.
Keen D (2008) Complex Emergencies. Cambridge: Polity Press.
Kümmel G and Giegerich B (eds) (2013) The Armed Forces: Towards a Post-Interventionist Era? Wiesbaden:
Springer.
Li TM (2007) Practices of assemblage and community forest management. Economy and Society 36(2):
263–293.
Maasho (2017) US says to continue training regional troops against Lord’s Resistance Army. Reuters, 21
April. Available at: https://af.reuters.com/article/africaTech/idAFKBN17N0P4-OZATP (accessed 2
April 2017).
McFarlane C (2009) Translocal assemblages: Space, power and social movements. Geoforum 40(4): 561–567.
McKeen-Edwards H and Porter T (2013) Transnational Financial Associations and the Governance of Global
Finance: Assembling Wealth and Power. New York & Abingdon: Routledge.
McNeill C (2017) ‘Playing the away game’: AFRICOM in the Sahara-Sahel. Political Geography 58: 46–55.
Massé F and Lunstrum E (2016) Accumulation by securitization: Commercial poaching, neoliberal conserva-
tion, and the creation of new wildlife frontiers. Geoforum 69: 227–237.
Moeller R (2008) United States Africa Command: Partnership, security, and stability. Powerpoint pres-
entation, Office of the Under Secretary of Defense for Forces Transformation and Resources and the
Center for Technology and National Security Policy, National Defense University, Washington, DC, 18
February.
Mullen MG (2011) The National Military Strategy of the United States of America: Redefining America’s
military leadership. Available at: https://www.army.mil/e2/rv5_downloads/info/references/NMS_
Feb2011.pdf (accessed 24 May 2017).
Mumford A (2013) Proxy warfare and the future of conflict. RUSI Journal 158(2): 40–46.
Mutschler MM (2016) On the road to liquid warfare? Revisiting Zygmunt Bauman’s thoughts on liquid
modernity in the context of the ‘new Western way of war’. Working paper. Bonn: BICC.
Niva S (2013) Disappearing violence: JSOC and the Pentagon’s new cartography of networked warfare.
Security Dialogue 44(3): 185–202.
Obama B (2011) Letter from the president to the speaker of the House of Representatives and the president pro
tempore of the Senate regarding the Lord’s Resistance Army. 14 October. Washington, DC: White House.
Obama B (2012) Remarks by the president at the United States Holocaust Memorial Museum. 23 April.
Available at: http://www.whitehouse.gov/the-press-office/2012/04/23/remarks-president-united-states-
holocaust-memorial-museum (accessed 24 May 2017).
380 Security Dialogue 49(5)
Olsen GR (2014) Fighting terrorism in Africa by proxy: The USA and the European Union in Somalia and
Mali. European Security 23(3): 290–306.
Reeve R and Pelter Z (2014) From new frontier to new normal: Counter-terrorism operations in the Sahel-
Sahara. London: Remote Control Project, Oxford Research Group.
Roberts SM (2014) Development capital: USAID and the rise of development contractors. Annals of the
Association of American Geographers 104(5): 1030–1051.
Sassen S (2006) Territory, Authority, Rights: From Medieval to Global Assemblages. Princeton, NJ: Princeton
University Press.
Sassen S (2014) Expulsions: Brutality and Complexity in the Global Economy. Cambridge, MA & London:
The Belknap Press of Harvard University Press.
Schomerus M (2012) They forget what they came for: Uganda’s army in Sudan. Journal of Eastern African
Studies 6(1): 124–153.
Schomerus M and de Vries L (2014) Improvising border security: ‘A situation of security pluralism’ along
South Sudan’s borders with the Democratic Republic of the Congo. Security Dialogue 45(3): 279–294.
Schörnig N (2013) Unmanned warfare: Towards a neo-interventionist era? In: Kümmel G and Giegerich B
(eds) The Armed Forces: Towards a Post-Interventionist Era? Wiesbaden: Springer, 221–235.
Schwarz E (2016) Prescription drones: On the techno-biopolitical regimes of contemporary ‘ethical killing’.
Security Dialogue 47(1): 59–75.
Security Dialogue (2018) Special issue on militarism and security: Dialogue, possibilities and limits. Security
Dialogue 49(1–2).
Stavrianakis A and Stern M (2018) Militarism and security: Dialogue, possibilities and links. Security
Dialogue 49(1–2): 3–18.
The Resolve and Invisible Children (2013) LRA Crisis Tracker: Annual security brief – January–December
2013. Available at: http://reports.lracrisistracker.com/pdf/2013-A-LRA-Crisis-Tracker-Annual-Brief.
pdf (accessed 25 May 2017).
Titeca (2013) The (LRA) conflict: Beyond the LRA lobby and the hunt for Kony and towards civilian protec-
tion. African Arguments, 17 May. Available at: http://africanarguments.org/2013/05/17/the-lra-conflict-
beyond-the-lra-lobby-the-hunt-for-kony-and-towards-civilian-protection-by-kristof-titeca/ (accessed 25
May 2017).
Titeca K and Atkinson R (2014) Why is the US hunting for Joseph Kony? Al Jazeera, 11 May. Available at: http://
www.aljazeera.com/indepth/opinion/2014/05/why-us-hunting-joseph-kony-20145716731355345.html
(accessed 25 May 2017).
Titeca K and Costeur T (2015) An LRA for everyone: How different actors perceive and construct the LRA
differently, and how this leads to less effective interventions. African Affairs 114(454): 92–114.
Turse N (2015) Tomorrow’s Battlefield: US Proxy Wars and Secret Ops in Africa. Chicago, IL: Haymarket
Books.
Turse N (2017) The war you’ve never heard of. Vice News, 18 May. Available at: https://news.vice.com/
story/the-u-s-is-waging-a-massive-shadow-war-in-africa-exclusive-documents-reveal (accessed 24 May
2017).
United Nations (2012) African countries to launch UN-backed task force against Lord’s Resistance Army.
UN News Centre, 23 March. Available at: http://www.un.org.proxy.library.uu.nl/apps/news/story.
asp?NewsID=41627&Cr=LRA&%20Cr1#.UyxEoTlm_G4 (accessed 24 May 2017).
US Africa Command (2012) Media: Transcripts. Available at: http://www.africom.mil/media-room/
Transcript/8949/transcript-commander-of-special-operations-command (accessed 24 May 2017).
US Africa Command (2017a) About the Command. Available at: http://www.africom.mil/about-the-com-
mand (accessed 24 May 2017).
US Africa Command (2017b) What we do. Available at: http://www.africom.mil/what-we-do (accessed 24
May 2017).
US Africa Command (2017c) U.S. forces transition counter-LRA mission to broader security and stabil-
ity activities. US Africa Command, 29 March. Available at: http://www.africom.mil/media-room/
pressrelease/28776/u-s-forces-transition-counter-lra-mission-to-broader-security-and-stability-activities
(accessed 25 May 2017).
Demmers and Gould 381
US Department of Defense (1997) Quadrennial Defense Review Report. Available at: www.bits.de/NRANEU/
others/strategy/qdr97.pdf. (accessed 26 March 2018).
Van Puijenbroek J and Plooijer N (2009) How enLightning is the Thunder? Study on the Lord’s Resistance
Army in the border region of DR Congo, Sudan and Uganda. Utrecht: IKV Pax Christi. Available at:
http://www.bibalex.org/Search4Dev/files/345191/178593.pdf (accessed 28 April 2018).
Wall T and Monahan T (2011) Surveillance and violence from afar: The politics of drones and liminal secu-
rity-scapes. Theoretical Criminology 15(3): 239–254.
Walters W (2014) Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security.
Security Dialogue 45(2): 101–118.
Watts T and Biegon R (2017) Defining remote warfare: Security cooperation. London: Remote Control
Project, Oxford Research Group.
Whitlock (2012) Contractors run U.S. spying missions in Africa. Washington Post, 14 June.
Wilcox L (2017) Embodying algorithmic war: Gender, race, and the posthuman in drone warfare. Security
Dialogue 48(1): 11–28.
Woodward R (2005) From military geography to militarism’s geographies. Progress in Human Geography
29(6): 718–740.
Interviews cited
1. Interview with Kristof Titeca, regional specialist, Utrecht, the Netherlands, 5 May 2013.
2. Conversation with Lisa Dougan, director of civic engagement, Invisible Children, The Hague, the
Netherlands, 3 October 2013.
3. Interview with Mike Bugason, adviser to the African Union special envoy for the Lord’s Resistance
Army, Brussels, Belgium, 2 October 2013.
4. Conversation with Assistant Professor Lotje de Vries, regional specialist, Utrecht, the Netherlands, 8
September 2016.
5. Interview with a commander of the Ugandan military (confidential source), Gulu, Uganda, 6 January
2015.
Jolle Demmers is Associate Professor of Conflict Studies and co-founder of the Centre for Conflict Studies at
the History of International Relations section of Utrecht University. Her most recent book is Theories of
Violent Conflict (2nd edn, Routledge, 2017), and currently she is writing Boundaries and Violence (Routledge,
2020). Email: [email protected].
Lauren Gould is Assistant Professor of Conflict Studies at the Centre for Conflict Studies at the History of
International Relations section of Utrecht University. She has authored and co-authored articles and book
chapters on issues related to global justice assemblages and military assemblages, drawing on ongoing field-
work in East Africa. Email: [email protected].
Under the heading of The Intimacies of Remote Warfare, Jolle and Lauren are currently engaged in research
projects on remote military interventionism and blowback.