Navigating Conflicts in Cyberspace: Legal Lessons from the History of War at Sea
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Should the United States Develop and Employ Strategic Information Warfare Capabilities?
Should the United States develop and employ strategic information warfare capabilities? Information technologies have transformed U.S. and, indeed, international society. The ways we socialize, educate and inform ourselves, engage in business and practice our religions have been changed, and in many cases now rely, on digital information and communication. Can warfare—the defense and promotion of our national security and interests—be exempt under any circumstances from developing and employing the latest information strategies? Is this even a choice in the 21st century, much less a hard choice? Information warfare has been variously defined by different analysts but a standard general definition, as provided by the U.S. Air Force is “any action to deny, exploit, corrupt, or destroy the enemy’s information and its functions; protecting ourselves against the actions and exploiting our own information operations.” The goal of information war is now frequently described as “information dominance.” (1) Major General Kenneth Minihan, stated, “information dominance is not ‘my pile of information is bigger than yours’…It is a way of increasing our capabilities by using that information to make right decisions, (and) apply them faster than the enemy can. It is a way to alter the enemy’s entire perception of reality. It is a method of using all the information at our disposal to predict (and affect) what happens tomorrow before the enemy even jumps out of bed and thinks about what to do today.” (2) Pro: Information warfare is not a new concept that arose with the Internet. Information has always been a decisive factor in deciding the victory or defeat of one military force over another. -
United States Navy and World War I: 1914–1922
Cover: During World War I, convoys carried almost two million men to Europe. In this 1920 oil painting “A Fast Convoy” by Burnell Poole, the destroyer USS Allen (DD-66) is shown escorting USS Leviathan (SP-1326). Throughout the course of the war, Leviathan transported more than 98,000 troops. Naval History and Heritage Command 1 United States Navy and World War I: 1914–1922 Frank A. Blazich Jr., PhD Naval History and Heritage Command Introduction This document is intended to provide readers with a chronological progression of the activities of the United States Navy and its involvement with World War I as an outside observer, active participant, and victor engaged in the war’s lingering effects in the postwar period. The document is not a comprehensive timeline of every action, policy decision, or ship movement. What is provided is a glimpse into how the 20th century’s first global conflict influenced the Navy and its evolution throughout the conflict and the immediate aftermath. The source base is predominately composed of the published records of the Navy and the primary materials gathered under the supervision of Captain Dudley Knox in the Historical Section in the Office of Naval Records and Library. A thorough chronology remains to be written on the Navy’s actions in regard to World War I. The nationality of all vessels, unless otherwise listed, is the United States. All errors and omissions are solely those of the author. Table of Contents 1914..................................................................................................................................................1 -
Unlocking NATO's Amphibious Potential
November 2020 Perspective EXPERT INSIGHTS ON A TIMELY POLICY ISSUE J.D. WILLIAMS, GENE GERMANOVICH, STEPHEN WEBBER, GABRIELLE TARINI Unlocking NATO’s Amphibious Potential Lessons from the Past, Insights for the Future orth Atlantic Treaty Organization (NATO) members maintain amphibious capabilities that provide versatile and responsive forces for crisis response and national defense. These forces are routinely employed in maritime Nsecurity, noncombatant evacuation operations (NEO), counterterrorism, stability operations, and other missions. In addition to U.S. Marine Corps (USMC) and U.S. Navy forces, the Alliance’s amphibious forces include large ships and associated landing forces from five nations: France, Italy, the Netherlands, Spain, and the United Kingdom (UK). Each of these European allies—soon to be joined by Turkey—can conduct brigade-level operations, and smaller elements typically are held at high readiness for immediate response.1 These forces have been busy. Recent exercises and operations have spanned the littorals of West and North Africa, the Levant, the Gulf of Aden and Arabian Sea, the Caribbean, and the Pacific. Given NATO’s ongoing concerns over Russia’s military posture and malign behavior, allies with amphibious capabilities have also been exploring how these forces could contribute to deterrence or, if needed, be employed as part of a C O R P O R A T I O N combined and joint force in a conflict against a highly some respects, NATO’s ongoing efforts harken back to the capable nation-state. Since 2018, NATO’s headquarters Cold War, when NATO’s amphibious forces routinely exer- and various commands have undertaken initiatives and cised in the Mediterranean and North Atlantic as part of a convened working groups to advance the political intent broader strategy to deter Soviet aggression. -
Undeclared War: Unmanned Drones, Human Rights and Collective Security
Undeclared War: unmanned drones, human rights and collective security Susan Carolyn Breau, University of Reading/Mark Olssen, University of Surrey Drones constitute, as Barbara Ehrenreich notes, in her ‘Foreword’ to Medea Benjamin’s Drone Warfare: Killing by remote control, the “ultimate action-at-a-distance weapons, allowing the aggressor to destroy targets in Pakistan or Afghanistan while ‘hiding’ thousands of miles away in Nevada” (Ehrenreich, 2013, p. vii). Yet, as Ehrenreich continues, “it is hard to even claim that their primary use is ‘military’ in any traditional sense. Drones have made possible a programme of targeted assassinations that are justified by the US ‘war on terror’, but otherwise in defiance of both international and US law” (p. viii). She notes how Benjamin in her book documents impressively how “it is the CIA, not the Pentagon, that operates most drone strikes in Western Asia, with no accountability whatsoever. Designed targets…have been condemned without evidence or trial – at the will apparently, of the White House. And those who operate the drones do so with complete impunity for the deaths of any civilians who end up as collateral damage.” (p. viii) Although the technical expertise for producing drones was developed as early as the WWI, and although unmanned aerial vehicles were used for gathering intelligence and for reconnaissance during WWII and during the Vietnam and later Balkan wars, their adaptation to becoming lethal military vehicles for the purposes of attacking and destroying specified targets has taken place more recently. Although Abraham Karem assisted the Israeli’s in developing unmanned robots in the 1970s, and built the first Predator drone in his garage in Southern California in the early 1980s 1, the first official use in military conflict only occurred since 1999 with the NATO Kosovo intervention where unmanned robotic aircraft were adapted to carry missiles “transforming them from spy planes into killer drones” (Benjamin, p. -
Appendix A. Navy Activity Descriptions
Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 APPENDIX A Navy Activity Descriptions Appendix A Navy Activity Descriptions Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 This page intentionally left blank. Appendix A Navy Activity Descriptions Atlantic Fleet Training and Testing Draft EIS/OEIS June 2017 Draft Environmental Impact Statement/Overseas Environmental Impact Statement Atlantic Fleet Training and Testing TABLE OF CONTENTS A. NAVY ACTIVITY DESCRIPTIONS ................................................................................................ A-1 A.1 Description of Sonar, Munitions, Targets, and Other Systems Employed in Atlantic Fleet Training and Testing Events .................................................................. A-1 A.1.1 Sonar Systems and Other Acoustic Sources ......................................................... A-1 A.1.2 Munitions .............................................................................................................. A-7 A.1.3 Targets ................................................................................................................ A-11 A.1.4 Defensive Countermeasures ............................................................................... A-13 A.1.5 Mine Warfare Systems ........................................................................................ A-13 A.1.6 Military Expended Materials ............................................................................... A-16 A.2 Training Activities .................................................................................................. -
The Civil War and Early Submarine Warfare, 1863 Introduction
1 The Civil War and early submarine warfare, 1863 Introduction Civil War combat foreshadowed modern warfare with the introduction of the machine gun, repeater rifles, and trench warfare, and the use of trains to quickly move troops. However, one of the most celebrated tactical innovations of the war was the use of submarines by the Confederate Navy. An early example of this type of naval ingenuity was the CSS Pioneer developed by Horace Lawson Hunley, James McClintock, and Baxter Watson. The Confederates were forced to abandon the Pioneer during testing for fear of capture but she eventually found her way into Union hands, where the submersible was examined and sketched by Ensign David Stauffer of the USS Alexandria. Following the war, the Pioneer was scrapped for metal. Most accounts of actual Civil War submarine combat focus on the sinking of the USS Housatonic by the CSS H. L. Hunley in February 1864, but few mention an earlier but unsuccessful attack by a cigar-shaped vessel, the CSS David, in October 1863. This letter from Union sailor Lewis H. West is a rare eyewitness account of that incident, one of the earliest submarine attacks in naval history. On his first night on board the USS New Ironsides, West experienced the David’s attack. Stealthily cutting through Charleston Bay almost entirely submerged, the David crew attempted to explode a torpedo (what we now refer to as a mine) and in the process nearly destroyed their own vessel. According to West, the “nondescript craft” barely damaged the New Ironsides, and divers found “that not a plate or bolt is started.” The CSS David survived the explosion and the small-arms fire that raked the hull. -
World War I Context Follow up in 1915, Europe Was Embroiled in U.S
1915: World War I Context Follow Up In 1915, Europe was embroiled in U.S. newspapers aroused outrage war, but U.S. public sentiment op- against Germany for ruthlessly kill- posed involvement. President ing defenceless Americans. The U.S. Woodrow Wilson said they would was being drawn into the war. In “remain neutral in fact as well as in June 1916, Congress increased the name.”23 size of the army. In September, Con- gress allocated $7 billion for national Pretext Incident defense, “the largest sum appropri- On May 7, 1915, a German subma- ated to that time.”30 rine (U-boat) sank the Lusitania, a In January 1917, the British British passenger ship killing 1,198, said they had intercepted a German including 128 Americans.24 message to Mexico seeking an alli- The public was not told that ance with Germany and offering to passengers were, in effect, a ‘human help Mexico recover land ceded to shield’ protecting six million rounds the U.S. On April 2, Wilson told of U.S. ammunition bound for Brit- Congress: “The world must be safe ain.25 To Germany, the ship was a for democracy.” Four days later the threat. To Britain, it was bait for lur- U.S. declared war on Germany.31 ing an attack. Why? A week before the attack, Real Reasons British Admiralty leader, Winston The maneuvre which brings Influential British military, political Churchill wrote to the Board of an ally into the field is as and business interests wanted U.S. Trade’s president saying it is “most serviceable as that which help in their war with Germany. -
Writing to Think
U.S. Naval War College U.S. Naval War College Digital Commons Newport Papers Special Collections 2-2014 Writing to Think Robert C. Rubel Follow this and additional works at: https://digital-commons.usnwc.edu/usnwc-newport-papers Recommended Citation Rubel, Robert C., "Writing to Think" (2014). Newport Papers. 41. https://digital-commons.usnwc.edu/usnwc-newport-papers/41 This Book is brought to you for free and open access by the Special Collections at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Newport Papers by an authorized administrator of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. NAVAL WAR COLLEGE NEWPORT PAPERS 41 NAVAL WAR COLLEGE WAR NAVAL Writing to Think The Intellectual Journey of a Naval Career NEWPORT PAPERS NEWPORT 41 Robert C. Rubel Cover This perspective aerial view of Newport, Rhode Island, drawn and published by Galt & Hoy of New York, circa 1878, is found in the American Memory Online Map Collections: 1500–2003, of the Library of Congress Geography and Map Division, Washington, D.C. The map may be viewed at http://hdl.loc.gov/ loc.gmd/g3774n.pm008790. Writing to Think The Intellectual Journey of a Naval Career Robert C. Rubel NAVAL WAR COLLEGE PRESS Newport, Rhode Island meyers$:___WIPfrom C 032812:_Newport Papers:_NP_41 Rubel:_InDesign:000 NP_41 Rubel-FrontMatter.indd January 31, 2014 10:06 AM Naval War College The Newport Papers are extended research projects that Newport, Rhode Island the Director, the Dean of Naval Warfare Studies, and the Center for Naval Warfare Studies President of the Naval War College consider of particular Newport Paper Forty-One interest to policy makers, scholars, and analysts. -
Tactical Employment of Nonlethal Weapons
NLW MULTI-SERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR THE TACTICAL EMPLOYMENT OF NONLETHAL WEAPONS FM 3-22.40 MCWP 3-15.8 NTTP 3-07.3.2 AFTTP(I) 3-2.45 October 2007 DISTRIBUTION RESTRICTION: Distribution authorized to US Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 15 Nov 2006. Other requests will be referred to: HQ TRADOC, ATTN: ATFC-EJ, Ft Monroe, VA 23651-1067; HQ MCCDC, ATTN: C427, Quantico, VA 22134-5021; NWDC, ATTN: N5, Newport, RI 02841-1207; or AFDDEC, ATTN: DD, Maxwell AFB, 36112-6112. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. This publication contains copyright material. See figure III-6. FOREWORD This publication has been prepared under our direction for use by our respective commands and other commands as appropriate. BARBARA G. FAST ANDREW W. O’DONNELL, JR. Major General, US Army Brigadier General (Sel), US Marine Corps Deputy Director/Chief of Staff, Director Army Capabilities Integration Center Capabilities Development Directorate CARLTON B. JEWETT ALLEN G. PECK Rear Admiral, US Navy Major General, US Air Force Commander Commander Navy Warfare Development Command Air Force Doctrine Development and Education Center This publication is available through the ALSA Web site (www.alsa.mil); through the Army at Army Knowledge Online (AKO) (www.us.army.mil) and at the General Dennis J. Reimer Training and Doctrine Digital Library (www.train.army.mil) Web sites; and through the Air Force at the Air Force Publishing Web site (www.e-publishing.af.mil). -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
America's Undeclared Naval War
America's Undeclared Naval War Between September 1939 and December 1941, the United States moved from neutral to active belligerent in an undeclared naval war against Nazi Germany. During those early years the British could well have lost the Battle of the Atlantic. The undeclared war was the difference that kept Britain in the war and gave the United States time to prepare for total war. With America’s isolationism, disillusionment from its World War I experience, pacifism, and tradition of avoiding European problems, President Franklin D. Roosevelt moved cautiously to aid Britain. Historian C.L. Sulzberger wrote that the undeclared war “came about in degrees.” For Roosevelt, it was more than a policy. It was a conviction to halt an evil and a threat to civilization. As commander in chief of the U.S. armed forces, Roosevelt ordered the U.S. Navy from neutrality to undeclared war. It was a slow process as Roosevelt walked a tightrope between public opinion, the Constitution, and a declaration of war. By the fall of 1941, the U.S. Navy and the British Royal Navy were operating together as wartime naval partners. So close were their operations that as early as autumn 1939, the British 1 | P a g e Ambassador to the United States, Lord Lothian, termed it a “present unwritten and unnamed naval alliance.” The United States Navy called it an “informal arrangement.” Regardless of what America’s actions were called, the fact is the power of the United States influenced the course of the Atlantic war in 1941. The undeclared war was most intense between September and December 1941, but its origins reached back more than two years and sprang from the mind of one man and one man only—Franklin Roosevelt. -
Ward Churchill, the Law Stood Squarely on Its Head
81 Or. L. Rev. 663 Copyright (c) 2002 University of Oregon Oregon Law Review Fall, 2002 81 Or. L. Rev. 663 LENGTH: 12803 words SOCIAL JUSTICE MOVEMENTS AND LATCRIT COMMUNITY: The Law Stood Squarely on Its Head: U.S. Legal Doctrine, Indigenous Self-Determination and the Question of World Order WARD CHURCHILL* BIO: * Ward Churchill (Keetoowah Cherokee) is Chair of the Department of Ethnic Studies and Professor of American Indian Studies at the University of Colorado/Boulder. Among his numerous books are: Since Predator Came: Notes from the Struggle for American Indian Liberation (1995), A Little Matter of Genocide: Holocaust and Denial in the Americas, 1492 to the Present (1997) and, most recently, Perversions of Justice: Indigenous Peoples and Angloamerican Law (2002). SUMMARY: ... As anyone who has ever debated or negotiated with U.S. officials on matters concerning American Indian land rights can attest, the federal government's first position is invariably that its title to/authority over its territoriality was acquired incrementally, mostly through provisions of cession contained in some 400 treaties with Indians ratified by the Senate between 1778 and 1871. ... The necessity of getting along with powerful Indian [peoples], who outnumbered the European settlers for several decades, dictated that as a matter of prudence, the settlers buy lands that the Indians were willing to sell, rather than displace them by other methods. ... Under international law, discoverers could acquire land only through a voluntary alienation of title by native owners, with one exception - when they were compelled to wage a "Just War" against native people - by which those holding discovery rights might seize land and other property through military force.