Is There More to the U.S. Mission in Uganda Than Finding Kony?

U.S. Army photo by Sgt. 1st Class Brock Jones

AA Font size + Print

The U.S. sent Special Forces to Uganda to intensify the hunt for the infamous warlord Kony. But is it just part of a larger plan to contain the growing conflict in Africa? By Hilary Matfess

This week, President Obama took military action. But it wasn’t in Ukraine or Syria. Instead, he notified Congress of the deployment of 150 special forces troops and CV-22 Osprey aircraft to Uganda in order to provide support for the African Union task force charged with locating Joseph Kony, the leader of the brutal Lord’s Resistance Army (LRA).

Initial reactions to the news focused on the fraught relationship between the United States and Uganda, especially following Uganda’s recent adoption of legislation targeting homosexuals. But such analysis overestimates the importance of Uganda in this latest U.S. deployment. Obama’s military commitment represents an intervention of sorts in the crisis in the nearby Central African Republic, at a time when the EU is struggling to launch a peacekeeping force in the country and the UN is debating doing the same, amid U.S. reluctance to fund the mission.

Two years ago this month, Joseph Kony gained widespread notoriety in the United States following the release of “Kony 2012,” a video produced by the advocacy group Invisible Children. The International Criminal Court has charged the warlord with 33 counts of war crimes and crimes against humanity, and he has reportedly taken refuge in the jungles between Uganda, South Sudan, and the Central African Republic. His army is thought to have dwindled to fewer than 250 soldiers.

But even in this anemic state, the LRA appears to have shifted its focus away from Uganda and begun conducting raids in the eastern regions of the Central African Republic. One report found that since May 2013, the LRA has abducted more than 200 people in areas controlled by predominantly Muslim Seleka. In addition to the human cost of these raids, which often include mutilation and sexual violence, they have also exacerbated tensions in the Central African Republic, even if LRA activities are only a small part of the cataclysmic violence in the country. The U.S. forces headed to Uganda will help the African Union track Kony and the LRA across Congo, Uganda, South Sudan, and the Central African Republic.

The conflict in the Central African Republic is essentially a power-sharing dispute that has divided the country along religious lines, pitting Christians against Muslims in a cycle of reprisal killings that have turned the capital into a refugee tent-city. In recent meetings on the crisis at the United Nations, American diplomats have expressed concerns about Congress funding a costly peacekeeping mission in the country. Given the American public’s war-weariness following Iraq and Afghanistan, Obama is unlikely to provide robust American support for an intricate peace-building process with a low chance of success.

But however unpalatable intervention is, greater instability in the Central African Republic is also undesirable. A festering conflict could make the region more attractive for criminal and terrorist networks—especially given that both South Sudan and the Democratic Republic of the Congo, which border the Central African Republic, are embroiled in their own domestic conflicts. Keep in mind that instability in Somalia contributed to the tragic terrorist attack at the Westgate shopping mall in neighboring Kenya, in which 67 people were killed and more than 120 injured by members of the militant group al-Shabab.

All of which raises the question: What exactly is the U.S. hoping to achieve by sending Ospreys and special forces to Uganda? Is it simply an effort to intensify the hunt for Kony, or is it an attempt by the Obama administration to contain the conflict in the Central African Republic without committing to the peace-building process the country so desperately needs?

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

    Download
  • Military Readiness: Ensuring Readiness with Analytic Insight

    To determine military readiness, decision makers in defense organizations must develop an understanding of complex inter-relationships among readiness variables. For example, how will an anticipated change in a readiness input really impact readiness at the unit level and, equally important, how will it impact readiness outside of the unit? Learn how to form a more sophisticated and accurate understanding of readiness and make decisions in a timely and cost-effective manner.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.