Targeted Killing and Accountability

Total Page:16

File Type:pdf, Size:1020Kb

Targeted Killing and Accountability Targeted Killing and Accountability GREGORY S. MCNEAL* This Article is a comprehensive examination of the United States’ practice of targeted killings. It is based in part on field research, interviews, and previously unexamined government documents. The Article fills a gap in the literature, which to date lacks sustained scholarly analysis of the accountability mecha- nisms associated with the targeted killing process. The Article (1) provides the first qualitative empirical accounting of the targeted killing process, beginning with the creation of kill lists and extending through the execution of targeted strikes, and (2) provides a robust analytical framework for assessing the accountability mechanisms associated with those processes. The Article begins by reporting the results of a case study that reviewed hundreds of pages of military policy memoranda, disclosures of government policies through Freedom of Information Act (FOIA) requests by NGOs, filings in court documents, public statements by military and intelligence officials, and descriptive accounts reported by the press and depicted in nonfiction books. These findings were supplemented by observing and reviewing aspects of the official training for individuals involved in targeted killings and by conducting confidential interviews with members of the military, special operations, and intelligence community involved in the targeted killing process. These research techniques resulted in a richly detailed depiction of the targeted killing process, the first of its kind to appear in any single publication. After explaining how targeted killings are conducted, the Article shifts from the descriptive to the normative, setting out an analytical framework drawn from the governance literature that assesses accountability along two dimen- sions, creating four accountability mechanisms. After setting forth the analyti- * Associate Professor of Law, Pepperdine University School of Law. © 2014, Gregory S. McNeal. This Article received the Article of the Year Award from the American National Section of L’Association Internationale de Droit Penal/The International Association of Penal Law. Earlier versions of this Article appeared as “The U.S. Practice of Collateral Damage Estimation and Mitigation” and “Kill- Lists and Accountability.” Thanks to Stacy New, Amos Guiora, Jens Ohlin, Claire Finkelstein, Dell Dailey, Ken Anderson, Timothy Matthews, Keith Petty, Mike Schmitt, Rich DiMeglio, Ahilan Ahrulan, Michael Lewis, Robert Chesney, Martin Flaherty, Jean Galbraith, John Yoo, David Kaye, Rick Pildes, and David Glazier for comments on drafts or presentations based on drafts of this Article. Thanks also to participants at University of Pennsylvania’s Targeted Killing conference, commentators from the ACLU’s National Security project, the Bureau of Investigative Journalism, callers who participated in the Federalist Society’s International Law and National Security teleforum, and to those who partici- pated in presentations and workshops at Vanderbilt, Washington & Lee, Colorado, The Army War College, George Mason, Rutgers-Newark, Cardozo, UC Irvine, UC Davis, Tulane, Santa Clara, Pacific McGeorge, Idaho, LSU, Gonzaga, Penn State, and Loyola LA. During the nearly two years of research associated with this project, I received outstanding research assistance from Eric Feil, Ben Hampton, Landon Derentz, Andrew Skinner, Gina McCoy, and Kevin Dulaney. I am especially indebted to the military and intelligence community members and trainers who were willing to speak with me about unclassified, yet opaque, practices. No classified information was revealed in the research or writing of this Article. 681 682THE GEORGETOWN LAW JOURNAL [Vol. 102:681 cal framework, the Article then applies it to the targeted killing program. The Article concludes with accountability reforms that could be implemented based on the specified framework. TABLE OF CONTENTS INTRODUCTION .......................................... 684 I. THE LEGAL BASIS FOR TARGETED KILLINGS .................. 690 A. DOMESTIC LEGAL FOUNDATION ........................ 691 B. INTERNATIONAL LEGAL FOUNDATION .................... 694 1. Jus ad bellum Justification ...................... 695 2. Jus in bello Characterization ..................... 698 C. CATEGORIES OF TARGETS ............................ 700 II. IT TAKES A BUREAUCRACY TO MAKE A KILL LIST .............. 701 A. HOW KILL LISTS ARE MADE ........................... 702 1. Developing Names for the List ................... 704 2. Who Is Worth Killing? ......................... 712 3. The Accountability Paper Trail ................... 721 4. Vetting and Validating Names for the Kill Lists ....... 723 5. Voting on and Nominating Names to the List ........ 726 B. IMPLICATIONS FOR THE ACCOUNTABILITY DEBATE ........... 729 III. EXECUTING A TARGETED KILLING ......................... 730 A. THE LAW OF ARMED CONFLICT IN THE CONTEXT OF TARGETED KILLING ....................................... 732 1. Distinction and Positive Identification .............. 733 2. Identifying Potential Harm to Civilians ............. 739 a. Pattern of Life Surveillance Redux ............. 739 b. The Collateral Damage Methodology ........... 740 3. Assessing Feasible Precautions ................... 745 a. Mitigating Damage to Collateral Concerns Through Weapon Selection ......................... 746 2014]TARGETED KILLING AND ACCOUNTABILITY 683 b. Mitigating Damage to Collateral Concerns Through Weaponeering ............................ 748 4. Proportionality Analysis and Approval Authority ...... 750 B. ACCOUNTABILITY PROBLEMS AND OPPORTUNITIES ........... 753 1. Military Performance in CENTCOM Theater of Operations .................................. 754 2. CIA Performance in Pakistan .................... 754 3. Explaining the Differences ...................... 755 IV. ACCOUNTABILITY IN THE TARGETED KILLING PROCESS ........... 758 A. MECHANISMS OF ACCOUNTABILITY AND CONTROL IN TARGETED KILLINGS ....................................... 758 B. LEGAL ACCOUNTABILITY AND TARGETED KILLINGS ........... 763 1. Judicial Review of Targeting Decisions: Al Aulaqi and El-Shifa .................................... 764 2. APA Foreign Affairs Exception .................. 768 3. International Legal Investigations ................. 769 4. Criminal Prosecution of Military and CIA Personnel . 770 C. POLITICAL ACCOUNTABILITY AND TARGETED KILLINGS ........ 771 1. Congressional Oversight ....................... 772 2. Presidential Politics ........................... 776 3. International Political Constraints ................. 779 D. BUREAUCRATIC ACCOUNTABILITY AND TARGETED KILLINGS ..... 780 E. PROFESSIONAL ACCOUNTABILITY ....................... 783 F. ACCOUNTABILITY LESSONS ........................... 785 V. ACCOUNTABILITY REFORMS ............................. 785 A. DEFEND THE PROCESS .............................. 785 B. USE PERFORMANCE REPORTING TO ENCOURAGE GOOD BEHAVIOR . 786 C. PUBLISH TARGETING CRITERIA ......................... 787 D. PUBLISH DOLLAR COSTS ............................. 788 E. ESTABLISH INDEPENDENT REVIEW BY A DEFENSE AND INTELLIGENCE REVIEW BOARD FOR TARGETED KILLINGS ....... 789 684THE GEORGETOWN LAW JOURNAL [Vol. 102:681 F. RECOGNIZE THE IMPRACTICAL NATURE OF EX POST JUDICIAL OVERSIGHT ..................................... 791 CONCLUSION ............................................ 793 APPENDIX A: METHODOLOGY ................................ 793 INTRODUCTION When the United States government kills people on traditional and non- traditional battlefields—and it does so on a near daily basis—bureaucrats play a key role in the killings. Bureaucrats help create lists of people to be killed, and sometimes bureaucrats themselves carry out the killings. The process is called targeted killing, and it involves bombs and missiles dropped from Unmanned Aerial Vehicles (UAVs)1 by members of the military or civilians employed by the Central Intelligence Agency (CIA).2 Some of the killings are sanctioned directly by the President of the United States, while others are authorized at a much lower level of government, deep within the military or intelligence bureaucracies of the Executive Branch. No matter which agency pulls the trigger, bureaucrats—far removed from public scrutiny and oftentimes outside the reach of courts—are essential to the success of the program. This Article explores America’s killer bureaucracy, describing America’s targeted killing program in rich detail and analyzing the profound accountability issues raised when bureaucrats kill.3 1. Also referred to as “drones” or “remotely piloted aircrafts.” 2. There are a variety of definitions of targeted killing. See, e.g., Rep. of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions, 14th Sess., ¶ 1, U.N. Doc. A/HRC/14/24/Add.6 (May 28, 2010) (defining a targeted killing as the “intentional, premeditated and deliberate use of lethal force, by States or their agents acting under colour of law, or by an organized armed group in armed conflict, against a specific individual who is not in the physical custody of the perpetrator”); Kenneth Anderson, Targeted Killing in U.S. Counterterrorism Strategy and Law, in LEGISLATING THE WAR ON TERROR:AN AGENDA FOR REFORM 347 (Benjamin Wittes ed., Brookings Institution Press 2009) (defining a targeted killing as a “targeting of a specific individual to be killed, increasingly often by means of high technology, remote-controlled Predator drone aircraft wielding missiles from a stand-off position”); Gabriella Blum & Philip Heymann,
Recommended publications
  • Nysba Spring 2020 | Vol
    NYSBA SPRING 2020 | VOL. 31 | NO. 2 Entertainment, Arts and Sports Law Journal A publication of the Entertainment, Arts and Sports Law Section of the New York State Bar Association In This Issue n A Case of “Creative Destruction”: Takeaways from the 5Pointz Graffiti Dispute n The American Actress, the English Duchess, and the Privacy Litigation n The Battle Against the Bots: The Legislative Fight Against Ticket Bots ....and more www.nysba.org/EASL NEW YORK STATE BAR ASSOCIATION In The Arena: A Sports Law Handbook Co-sponsored by the New York State Bar Association and the Entertainment, Arts and Sports Law Section As the world of professional athletics has become more competitive and the issues more complex, so has the need for more reliable representation in the field of sports law. Written by dozens of sports law attorneys and medical professionals, In the Arena: A Sports Law Handbook is a reflection of the multiple issues that face athletes and the attorneys who represent them. Included in this book are chapters on representing professional athletes, NCAA enforcement, advertising, sponsorship, intellectual property rights, doping, concussion-related issues, Title IX and dozens of useful appendices. Table of Contents Intellectual Property Rights and Endorsement Agreements How Trademark Protection Intersects with the Athlete’s EDITORS Right of Publicity Elissa D. Hecker, Esq. Collective Bargaining in the Big Three David Krell, Esq. Agency Law Sports, Torts and Criminal Law PRODUCT INFO AND PRICES 2013 | 539 pages Role of Advertising and Sponsorship in the Business of Sports PN: 4002 (Print) Doping in Sport: A Historical and Current Perspective PN: 4002E (E-Book) Athlete Concussion-Related Issues Non-Members $80 Concussions—From a Neuropsychological and Medical Perspective NYSBA Members $65 In-Arena Giveaways: Sweepstakes Law Basics and Compliance Issues Order multiple titles to take advantage of our low flat Navigating the NCAA Enforcement Process rate shipping charge of $5.95 per order, regardless of the number of items shipped.
    [Show full text]
  • Resolving Native American Land Claims and the Eleventh Amendment: Changing the Balance of Power
    Volume 39 Issue 3 Article 1 1994 Resolving Native American Land Claims and the Eleventh Amendment: Changing the Balance of Power Katharine F. Nelson Follow this and additional works at: https://digitalcommons.law.villanova.edu/vlr Part of the Constitutional Law Commons Recommended Citation Katharine F. Nelson, Resolving Native American Land Claims and the Eleventh Amendment: Changing the Balance of Power, 39 Vill. L. Rev. 525 (1994). Available at: https://digitalcommons.law.villanova.edu/vlr/vol39/iss3/1 This Article is brought to you for free and open access by Villanova University Charles Widger School of Law Digital Repository. It has been accepted for inclusion in Villanova Law Review by an authorized editor of Villanova University Charles Widger School of Law Digital Repository. Nelson: Resolving Native American Land Claims and the Eleventh Amendment: VILLANOVA LAW REVIEW VOLUME 39 1994 NUMBER 3 RESOLVING NATIVE AMERICAN LAND CLAIMS AND THE ELEVENTH AMENDMENT: CHANGING THE BALANCE OF POWER KATHARINE F. NELSON* TABLE OF CONTENTS I. INTRODUCTION ........................................... 526 II. INDIAN TITLE AND THE NONINTERCOURSE ACT ........... 530 III. THE HISTORY OF TRIBAL ACCESS TO THE FEDERAL COURTS ................................................... 533 A. Before Oneida I and II. ....................... 533 B. O neida I .......................................... 542 C. O neida II ......................................... 543 IV. NEGOTIATED SETTLEMENTS ............................... 546 A. Land Claims ......................................
    [Show full text]
  • Flying the Line Flying the Line the First Half Century of the Air Line Pilots Association
    Flying the Line Flying the Line The First Half Century of the Air Line Pilots Association By George E. Hopkins The Air Line Pilots Association Washington, DC International Standard Book Number: 0-9609708-1-9 Library of Congress Catalog Card Number: 82-073051 © 1982 by The Air Line Pilots Association, Int’l., Washington, DC 20036 All rights reserved Printed in the United States of America First Printing 1982 Second Printing 1986 Third Printing 1991 Fourth Printing 1996 Fifth Printing 2000 Sixth Printing 2007 Seventh Printing 2010 CONTENTS Chapter 1: What’s a Pilot Worth? ............................................................... 1 Chapter 2: Stepping on Toes ...................................................................... 9 Chapter 3: Pilot Pushing .......................................................................... 17 Chapter 4: The Airmail Pilots’ Strike of 1919 ........................................... 23 Chapter 5: The Livermore Affair .............................................................. 30 Chapter 6: The Trouble with E. L. Cord .................................................. 42 Chapter 7: The Perils of Washington ........................................................ 53 Chapter 8: Flying for a Rogue Airline ....................................................... 67 Chapter 9: The Rise and Fall of the TWA Pilots Association .................... 78 Chapter 10: Dave Behncke—An American Success Story ......................... 92 Chapter 11: Wartime.............................................................................
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Idioms-And-Expressions.Pdf
    Idioms and Expressions by David Holmes A method for learning and remembering idioms and expressions I wrote this model as a teaching device during the time I was working in Bangkok, Thai- land, as a legal editor and language consultant, with one of the Big Four Legal and Tax companies, KPMG (during my afternoon job) after teaching at the university. When I had no legal documents to edit and no individual advising to do (which was quite frequently) I would sit at my desk, (like some old character out of a Charles Dickens’ novel) and prepare language materials to be used for helping professionals who had learned English as a second language—for even up to fifteen years in school—but who were still unable to follow a movie in English, understand the World News on TV, or converse in a colloquial style, because they’d never had a chance to hear and learn com- mon, everyday expressions such as, “It’s a done deal!” or “Drop whatever you’re doing.” Because misunderstandings of such idioms and expressions frequently caused miscom- munication between our management teams and foreign clients, I was asked to try to as- sist. I am happy to be able to share the materials that follow, such as they are, in the hope that they may be of some use and benefit to others. The simple teaching device I used was three-fold: 1. Make a note of an idiom/expression 2. Define and explain it in understandable words (including synonyms.) 3. Give at least three sample sentences to illustrate how the expression is used in context.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Clark County Veterinary Clinic
    March 23 - 29, 2012 • The Winchester Sun • 7 Spring is on its way! Dr. Je Castlestle Newly remodeled to better serve your pets. The Dr. Stacey Kimmerermmerreer Clark County most square feet in Central & Eastern Kentucky for Get fl ea and heart worm e family Veterinaryea tCedl liink ic your pet’s care. Doesn’t your pet deserve that? Dr. Daisy Richardsonhardson our pet is tr treatment early. where y Let Your Dog Baths, CLARK COUNTY VETERINARY CLINIC GROOMER WITH Blueberry Come Join the 18 YEARS EXPERIENCE Specialty Cuts, & 2 groomers facials & Fun at Our bubble baths Check out LARGER SURGERY SUITE! to meet your 859-744-5656 for your pet DOGGY these great PET TRAINING needs. businesses 6 x 2” ad offered here. on Hud Rd. www.clarkcounty.myvetonline.com BOARDING DAY CARE 116 Hud Rd. Winchester, KY SPORTS MOVIES KIDS SUNDAY MARCH 25, 2012 T - TIME WARNER S1 - DISH NETWORK S2 - DIRECTV T 8 AM 8:30 9 AM 9:30 10 AM 10:30 11 AM 11:30 12 PM 12:30 1 PM 1:30 2 PM 2:30 3 PM 3:30 4 PM 4:30 S1T S2 13 KET Super Why! Dinosaur Sid the Sci- Martha To the Con- Inside Moyers & Company McLaughlin Comment One to One- Connections American Experience The whaling industry in America Kentucky Kentucky 46 (EI) Train (EI) ence Kid Speaks (EI) trary Washington Group (N) on Kentucky Goodman W/Renee rises as an economic force in the 18th century. (DVS) Life Afield Today (N) Meet the Press (N) Southeast Wave Coun- Walnut Street Live Paid Pro- Paid Pro- Golf Digest Equipment Golf Cen- PGA Tour Golf Arnold Palmer Invitational, Final Round.
    [Show full text]
  • Should Lawyers Be Permitted to Violate the Law?
    MILITARY LAWYERING AT THE EDGE OF THE RULE OF LAW AT GUANTANAMO: SHOULD LAWYERS BE PERMITTED TO VIOLATE THE LAW? Ellen Yaroshefsky* I. INTRODUCTION “Where were the lawyers?” is the familiar refrain in the legal profession’s reflection on various corporate scandals.1 What is the legal and moral obligation of lawyers who have knowledge of ongoing illegality and criminal behavior of their clients? What should or must those lawyers do? What about government lawyers who have knowledge of such behavior? This Article considers that question in the context of military lawyers at Guantanamo—those lawyers with direct knowledge of the treatment of prisoners at Guantanamo, treatment criticized throughout the world as violative of fundamental principles of international law. In essence, where were the lawyers for the government and for individual detainees when the government began to violate the most fundamental norms of the rule of law? This Article discusses the proud history of several military lawyers at Guantanamo who consistently demonstrated an unwavering commitment to the Constitution and to the rule of law. They were deeply offended about the actions of the government they served as it undermined the fundamental premises upon which the country was formed. Their jobs placed them at the edge of the rule of law and caused consistent crises of conscience.2 These military lawyers typically are not * Clinical Professor of Law and Director of the Jacob Burns Ethics Center at the Benjamin N. Cardozo School of Law. Sophia Brill, a brilliant future law student, deserves significant credit for her invaluable work on this Article.
    [Show full text]
  • Intelligence and Net Assessment
    GW-5 Intelligence 6/28/2016 Page 1 Chapter Five: Intelligence and Net Assessment Like command and control and battle management, the lessons to be drawn from intelligence during the Gulf War are not only valuable in themselves, they lay the ground work for understanding many of the other aspects and lessons of the war. This is particularly true when intelligence is broadened to cover net assessment, and intelligence- related policy. A narrow definition of the role of intelligence not only gives intelligence responsibility for actions and priorities that were often beyond its control, it ignores critical problems and issues that need to be transformed into lessons for the future. Any such, analysis, however, must be shaped by the fact that the Gulf War was in many ways a war between a Coalition that could "see" and an Iraq that was "blind." The COALITION had a near monopoly of sophisticated intelligence, reconnaissance, near real time analysis capability, and secure communication and dissemination assets. In addition, the Coalition could secure its territory against most Iraqi over flights and incursions, while Iraq effectively had "open skies," with basic intelligence problems greatly reinforced by the rigidities in its strategy and tactics, decision making, and command and control process.1 This war between the "seeing" and the "blind" shaped each side's ability to understand the other's military actions and capabilities throughout Desert Shield. It affected every aspect of battle management during Desert Storm, including such basic military functions as targeting. Superior intelligence played a key role in every aspect of Coalition operations, in giving Coalition forces superior effectiveness, in allowing the Coalition to react to Iraq, in achieving surprise and a superior tempo of operations, and in reducing Coalition casualties.
    [Show full text]
  • Still Demanding Respect. Police Abuses Against Lesbian, Gay, Bisexual And
    Stonewalled – still demanding respect Police abuses against lesbian, gay, bisexual and transgender people in the USA Amnesty International Publications - 1 - Amnesty International (AI) is an independent worldwide movement of people who campaign for internationally recognized human rights to be respected and protected. It has more than 1.8 million members and supporters in over 150 countries and territories. Stonewalled – still demanding respect Police abuses against lesbian, gay, bisexual and transgender people in the USA is published by: Amnesty International International Secretariat Peter Benenson House 1 Easton Street London WC1X 0DW United Kingdom www.amnesty.org © Amnesty International Publications, 2006 All rights reserved. This publication is copyright, but may be reproduced by any method without fee for advocacy, campaigning and teaching purposes, but not for resale. The copyright holders request that all such use be registered with them for impact assessment purposes. For copying in any other circumstances, or for re-use in other publications, or for translation or adaptation, prior written permission must be obtained from the publishers, and a fee may be payable. - 2 - Copies of this report are available to download at www.amnesty.org For further information please see www.amnestyusa.org/outfront/ Printed by: The Alden Press Osney Mead, Oxford United Kingdom ISBN 0-86210-393-2 AI Index: AMR 51/001/2006 Original language: English - 3 - Preface 1 Methodology 1 Definitions 2 Chapter 1: Introduction 3 Identity-based discrimination
    [Show full text]
  • The Continuing Pursuit of Unchecked Executive Power 13 May 2005 AI Index: AMR 51/063/2005
    Public amnesty international UNITED STATES OF AMERICA Guantánamo and beyond: The continuing pursuit of unchecked executive power 13 May 2005 AI Index: AMR 51/063/2005 I used to think that America had respect for human rights when it came to prison. Mohammed Nechle, extrajudicially removed from Bosnia and Herzegovina by US agents1 My husband is a tall man with black hair and black eyes…He is now imprisoned in Guantánamo. We don’t know why. Wife of Mohammed Nechle, Algerian national, 20042 Public ........................................................................................................................ - 1 - UNITED STATES OF AMERICA .......................................................................... - 1 - Guantánamo and beyond: The continuing pursuit of unchecked executive power .. - 1 - 1. Summary: The pursuit of unfettered executive power .................................. - 3 - 2. Violating human rights erodes security and trust in government ............... - 10 - 3. Guantánamo detainees – the international legal framework ....................... - 13 - 4. Hypocrisy vs. human rights ........................................................................ - 15 - 5. Human rights law rejected by a war mentality ........................................... - 28 - 6. Seeking to render the Rasul decision meaningless ..................................... - 45 - 7. A judge with security credentials takes a more critical view ..................... - 52 - 8. The Combatant Status Review Tribunal – no laughing matter ..................
    [Show full text]
  • Navy Supplement to the Dod Dictionary of Military and Associated Terms
    NAVY TACTICAL REFERENCE PUBLICATION NAVY SUPPLEMENT TO THE DOD DICTIONARY OF MILITARY AND ASSOCIATED TERMS NTRP 1-02 EDITION APR 2011 UNCLASSIFIED DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS DISTRIBUTION RESTRICTION: APPROVED FOR PUBLIC RELEASE; DISTRIBUTION IS UNLIMITED. PRIMARY REVIEW AUTHORITY: COMMANDER, NAVY WARFARE DEVELOPMENT COMMAND STOCK NUMBER: 0411LP1090273 Form Approved Report Documentation Page OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2. REPORT TYPE APR 2011 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Navy Supplement To The DOD Dictionary Of Military And Associated 5b. GRANT NUMBER Terms 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION Commander, Navy Warfare Development Command,ATTN: N5T,1530 REPORT NUMBER Gilbert Street, Suite 2128,Norfolk,VA,23511 9.
    [Show full text]