Protecting the Global Information Space in Times of Armed Conflict

Total Page:16

File Type:pdf, Size:1020Kb

Protecting the Global Information Space in Times of Armed Conflict WORKING PAPERS Protecting the global information space in times of armed conflict ROBIN GEISS AND HENNING LAHMANN* FEBRUARY 2021 *The authors wish to thank Dr Kubo Mačák for his helpful comments on an earlier draft of the paper. TABLE OF CONTENTS Introduction ................................................................................................................................................ 1 Mapping the Threat Landscape: Risks to the Information Space in Contemporary Armed Conflict ......................................................................................................................................................... 3 Scenario A – Social Media-Enabled Foreign Electoral Interference ....................................................... 3 Scenario B – Large-scale Distortion of the Media Ecosystem ................................................................... 4 Scenario C – Manipulation of Civilian Behaviour to Gain Military Advantage ................................ 4 Scenario D – Compromising and Extorting of Civilian Individuals Through Information Warfare .....................................................................................................................................................................5 Scenario E – Disinformation as Incitement to Violence ........................................................................... 5 Variants of Distorting the Information Ecosystem in War and Peace............................................ 5 Protecting Information Spaces under Existing Legal Frameworks ................................................. 8 International Humanitarian Law .....................................................................................................................8 International Criminal Law ............................................................................................................................ 16 International Human Rights Law ................................................................................................................. 16 Conclusion: The Limits of Existing Law and Options for Advancing the Debate ...................... 17 working paper aims at filling this gap by INTRODUCTION exposing some of the legal issues arising in relation to mis- and disinformation tactics The growing number of allegations of during armed conflict in order to serve as a adversarial foreign influence operations over starting point for further debate in this respect: the past couple of years, carried out by a variety What, if any, limits exist concerning (digital) of international actors directed against information operations in armed conflict? Does democratic decision-making processes in other the humanitarian legal framework adequately states have put the problem of information capture the humanitarian protection needs that warfare high on the international agenda.1 The arise from these types of (military) conduct? interference in the 2016 U.S. and the 2017 Where and how to draw the line between effects French presidential elections as well as the 2016 and side-effects of digitalised information Brexit referendum in the UK are only the most warfare that should remain either within or prominent examples. The phenomenon is without the protective ambit of international certainly neither abating nor geographically humanitarian law (IHL)? What are, or what limited: In late 2020, for instance, Somalia should be, the limits of disinformation expelled Kenya’s diplomatic staff after campaigns, ‘fake news’, deep fakes and the accusations of electoral meddling.2 Since the systematic manipulation of a given information beginning of 2020, an unprecedented surge of space in times of armed conflict? Does IHL, misinformation and disinformation which is traditionally and primarily focused on surrounding the COVID-19 pandemic has added preventing physical harms, sufficiently account a new sense of urgency while at the same time for and is capable of mitigating potentially far- expanding the scope of the legal questions. reaching consequences that such types of However, so far the ensuing debate among operations can have on societies? If not, should scholars and policy-makers has been focused on it? international human rights law and other While the laws of armed conflict have questions of peacetime international law, such proven to be flexible enough to anticipate as whether and under which circumstances an technological innovation in general and are (online) disinformation campaign targeting applicable also to new means and methods of audiences abroad may amount to a violation of warfare, as thoroughly discussed in relation to the target state’s sovereignty, the principle of the application of IHL to cyber warfare,4 it is less non-intervention, or even – in extreme cases – obvious whether the protection they provide the prohibition of the use of force.3 The legal remains adequate in all instances in which implications of digital information warfare in novel forms of warfare are employed. And while the context of armed conflict, on the other hand, it is certainly true that disinformation have so far received scarce attention. This brief campaigns, ruses and other methods of deception and propaganda have always been 1 This paper focuses on manipulation of the content of part and parcel of warfare, recent technological information. It does not or only peripherally deal with developments, especially in the fields of cyber other issues in relation to the contemporary information and artificial intelligence, are to be seen as a ecosystem, such as hate speech or incitement to violence. veritable gamechanger of (dis-)information 2 See Latif Dahir, Abdi, “Somalia Severs Diplomatic Ties with Kenya”, New York Times, 15 December 2020, 4 See only Laurent Gisel, Tilman Rodenhäuser and Knut https://www.nytimes.com/2020/12/15/world/africa/somali Dörmann, ‘Twenty Years On: International Humanitarian a-kenya.html. Law and the Protection of Civilians Against the Effects of 3 See only Milanovic, Marko, and Michael N. Schmitt, Cyber Operations During Armed Conflict’, International ‘Cyber Attacks and Cyber (Mis)Information Operations Review of the Red Cross (2020), 11-16; Michael N. Schmitt During a Pandemic’, Journal of National Security Law & (ed.), Tallinn Manual 2.0 on the International Law Policy (2020). Applicable to Cyber Operations (2017), 373 et seq. 2 I Working Papers: Protecting Societies - Anchoring A New Protection Dimension In International Law In Times Of Increased Cyber Threats warfare. Considering the scale, scope, and far- damaging some of these operations have reaching effects of peacetime disinformation become in the wake of global digitalization, is operations, and taking into account the still to be seen as a ‘common feature of war’ with constantly increasing level of military cyber basically only the prohibition of perfidy as a capabilities, the traditional assumption that constraint. generally speaking all types of disinformation After presenting a few brief scenarios of operations short of perfidy are permissible possible (military) information operations in during armed conflict should be revisited. Thus, situations of armed conflict to illustrate what is while the simulation of surrender with the potentially at stake, the subsequent section intent to injure an enemy soldier undoubtedly defines some of the key concepts concerning the amounts to prohibited perfidy, under IHL – issue at hand. The main part examines whether leaving IHRL aside for a moment – it is far less and to what degree existing rules of IHL put clear that the widespread and deep limitations on the conduct of information manipulation of a target country’s entire online warfare. A short look at international criminal information ecosystem – including news and law and international human rights law follows social media, but even scholarship, expert before the paper concludes with an outlook on opinions, or studies by policy analysts and potential paths to advance the debate. pundits – is prohibited or limited by IHL. Propaganda as well as psychological and influence operations, including even operations directed at the civilian population5, have been a MAPPING THE THREAT common and widely accepted feature of warfare throughout the ages. What is more, Article 37(2) LANDSCAPE: RISKS TO THE API entails an explicit – and for an IHL rule unusually – permissive provision confirming INFORMATION SPACE IN the permissibility of ruses of war, whereas only a specific and narrowly defined set of acts of CONTEMPORARY ARMED deception, i.e., those amounting to perfidy, are explicitly prohibited as such. Last but not least, CONFLICT the Tallinn Manual lists ‘psychological warfare 6 activities’ as an example of permissible ruses. Information operations in the context of All of this taken together opens up a wide armed conflicts can occur in vastly different spectrum of permissible disinformation contexts and can have a variety of different campaigns in times of armed conflict, and in effects on the targeted societies and civilian combination with a long-standing practice of populations, depending on the mode of conduct, such operations, from the outset renders any namely the technologies employed, the scope, attempt at discussing legal limits and scale and sophistication of the operation or prohibitive thresholds for such operations campaign, the target audience, and the aims inherently difficult. This said, it is precisely for pursued. In order to illustrate the matter, a set of
Recommended publications
  • Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
    Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • JP 3-13.4, Military Deception
    Joint Publication 3-13.4 Military Deception 26 January 2012 EXECUTIVE SUMMARY COMMANDER’S OVERVIEW • Provides an Overview of Military Deception (MILDEC) and the Goals, Objectives, Functions, and Principles • Describes the Relationship between MILDEC and Information Operations • Explains MILDEC Planning Methodology and Planning Steps • Discusses Execution of MILDEC Operations Military Deception and Its Goals, Objectives, Functions, and Principles Military deception Specific guidance from the joint force commander (JFC) or (MILDEC) is actions higher authority during planning will determine the military executed to deliberately deception (MILDEC) role in a joint operation. MILDEC mislead adversary is intended to deter hostile actions, increase the success military, paramilitary, or of friendly defensive actions, or to improve the success violent extremist of any potential friendly offensive action. Use of organization decision MILDEC during any phase of an operation should help to makers, thereby causing mislead adversaries as to the strength, readiness, locations, the adversary to take and intended missions of friendly forces. In combat specific actions (or situations, the focus is on driving the adversary to inactions) that will culmination and achieving the objectives defined by the contribute to the JFC. In noncombat situations, the JFC seeks to dominate accomplishment of the the situation with decisive operations designed to establish friendly mission. conditions for an early, favorable conclusion. MILDEC and Information Care should be taken to protect the quality of information Quality available for friendly decisions and public dissemination. This will help ensure the JFC has accurate information by not allowing staffs to unknowingly perceive the joint task force’s MILDEC efforts as accurate information.
    [Show full text]
  • Fm 6-27 Mctp 11-10C the Commander's Handbook on the Law of Land Warfare
    FM 6-27 MCTP 11-10C THE COMMANDER'S HANDBOOK ON THE LAW OF LAND WARFARE AUGUST 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 27-10/MCTP 11-10C, dated 18 July 1956. HEADQUARTERS, DEPARTMENT OF THE ARMY HEADQUARTERS, UNITED STATES MARINE CORPS Foreword The lessons of protracted conflict confirm that adherence to the law of armed conflict (LOAC) by the land forces, both in intern ational and non-international armed conflict, must serve as the standard that we train to and apply across the entire range of military operations. Adhering to LOAC enhances the legitimacy of our operations and supports the moral framework of our armed forces. We have learned th at we deviate from these norms to our detriment and risk undercutting both domesti c and international support for our operations. LOAC has been and remains a vital guide for all military operations conducted by the U.S. Governm ent. This fi eld manual provides a general description of the law of land warfare for Soldiers and Marines, delineated as statements of doctrine and practice, to gui de the land forces in conducting di sci plined military operations in accordance with the rule of law. The Department of Defense Law of War Manual (June 20 15, updated December 2016) is the authoritative statement on the law of war for the Department of Defense. In the event of a conflict or discrepancy regarding the legal standards addressed in this publication and th e DOD Law of War Manual, the latter takes precedence.
    [Show full text]
  • Constraints on the Waging of War, an Introduction to International
    ISBN 2-88145-115-2 © International Committee of the Red Cross, Frits Kalshoven and Liesbeth Zegveld, Geneva, March 2001 3rd edition Frits Kalshoven and Liesbeth Zegveld CONSTRAINTS ON THE WAGING OF WAR An Introduction to International Humanitarian Law 19, Avenue de la Paix, CH-1202 Geneva T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] Web: www.icrc.org Design: Strategic Communications SA Original: English March 2001 Produced with environment-friendly materials I must retrace my steps, and must deprive those who wage war of nearly all the privileges which I seemed to grant, yet did not grant to them. For when I first set out to explain this part of the law of nations I bore witness that many things are said to be ‘lawful’ or ‘permissible’ for the reason that they are done with impunity, in part also because coactive tribunals lend to them their authority; things which nevertheless, either deviate from the rule of right (whether this has any basis in law strictly so called, or in the admonitions of other virtues), or at any rate may be omitted on higher grounds and with greater praise among good men. Grotius: De jure belli ac pacis Book III, Chapter X, Section I.1. (English translation: Francis G. Kelsey, Oxford, 1925). TABLE OF CONTENTS PREFACE ........................................................... 7 FOREWORD ........................................................... 9 CHAPTER I INTRODUCTION ........................................................ 11 I 1 Object and purpose ............................................... 12 I 2 Custom and treaty ................................................. 15 I 3 Implementation and enforcement ................................. 16 I 4 Structure .......................................................... 17 CHAPTER II THE MAIN CURRENTS: THE HAGUE, GENEVA, NEW YORK .....
    [Show full text]
  • International Law on Use of Enemy Uniforms As a Stratagem and the Acquittal in the Skorzeny Case
    Missouri Law Review Volume 24 Issue 1 January 1959 Article 7 1959 International Law on Use of Enemy Uniforms As a Stratagem and the Acquittal in the Skorzeny Case Maximilian Koessler Follow this and additional works at: https://scholarship.law.missouri.edu/mlr Part of the Law Commons Recommended Citation Maximilian Koessler, International Law on Use of Enemy Uniforms As a Stratagem and the Acquittal in the Skorzeny Case, 24 MO. L. REV. (1959) Available at: https://scholarship.law.missouri.edu/mlr/vol24/iss1/7 This Article is brought to you for free and open access by the Law Journals at University of Missouri School of Law Scholarship Repository. It has been accepted for inclusion in Missouri Law Review by an authorized editor of University of Missouri School of Law Scholarship Repository. For more information, please contact [email protected]. Koessler: Koessler: International Law on Use of Enemy Uniforms As a Stratagem INTERNATIONAL LAW ON USE OF ENEMY UNIFORMS AS A STRATAGEM AND THE ACQUITTAL IN THE SKORZENY CASE MlAxnaLmiA KoEssLER* I. INTRODUCTION Prior to the trial, by an American military commission entitled "Military Government Court,"' of Otto Skorzeny and his codefendants,2 which trial took place in Dachau between August 18 and September 8, 1947, and ended with an acquittal of all the defendants, the international law on legitimacy or illegitimacy of the use of enemy uniforms as a stratagem was not settled in so far as use outside open combat was con- cerned, as will be later on discussed at some length. One writer has expressed the view that the outcome of that trial supports the view "that such deception is permissible if not done in battle."8 However, this is not necessarily so.
    [Show full text]
  • A/75/337 General Assembly
    United Nations A/75/337 General Assembly Distr.: General 3 September 2020 Original: English Seventy-fifth session Item 72 (b) of the provisional agenda* Promotion and protection of human rights: human rights questions, including alternative approaches for improving the effective enjoyment of human rights and fundamental freedoms Promotion and protection of human rights and fundamental freedoms while countering terrorism Note by the Secretary-General** The Secretary-General has the honour to transmit to the General Assembly the report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Fionnuala Ní Aoláin, submitted in accordance with General Assembly resolution 72/180 and Human Rights Council resolution 40/16. __________________ * A/75/150. ** The present report was submitted after the deadline as a result of consultations with Member States and other relevant stakeholders. 20-11440 (E) 091020 *2011440* A/75/337 Report of the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Fionnuala Ní Aoláin Summary In the present report, the Special Rapporteur on the promotion and protection of human rights and fundamental freedoms while countering terrorism, Fionnuala Ní Aoláin, addresses the interface between international human rights law and international humanitarian law in counter-terrorism contexts. She affirms the interdependent and intersectional nature of the relationship between both legal regimes, which is all the more pronounced in counter-terrorism contexts. She acknowledges the persistent and unequivocal affirmation by the Security Council and other bodies that any counter-terrorism measures must always and fully comply with, inter alia, the overarching norms of international human rights law, international humanitarian law and refugee law.
    [Show full text]
  • Additional Protocol I to the Geneva Conventions
    0031-0330 irl.qxd 2.3.2009 14:21 Page 233 V PROTOCOL ADDITIONAL TO THE GENEVA CONVENTIONS OF 12 AUGUST 1949, AND RELATING TO THE PROTECTION OF VICTIMS OF INTERNATIONAL ARMED CONFLICTS (PROTOCOL I), OF 8 JUNE 1977 Preamble .................................................................................................... 239 PART I General provisions Article 1 General principles and scope of application............................. 240 Article 2 Definitions ................................................................................. 240 Article 3 Beginning and end of application ............................................. 241 Article 4 Legal status of the Parties to the conflict................................... 241 Article 5 Appointment of Protecting Powers and of their substitute ...... 241 Article 6 Qualified persons....................................................................... 242 Article 7 Meetings..................................................................................... 243 PART II Wounded, sick and shipwrecked SECTION I – General protection Article 8 Terminology............................................................................... 243 Article 9 Field of application .................................................................... 245 Article 10 Protection and care.................................................................... 245 Article 11 Protection of persons................................................................. 245 Article 12 Protection of medical units ......................................................
    [Show full text]
  • The American Bombardment of Kampuchea, 1969-1973 Ben Kiernan
    Vietnam Generation Volume 1 Number 1 The Future of the Past: Revisionism and Article 3 Vietnam 1-1989 The American Bombardment of Kampuchea, 1969-1973 Ben Kiernan Follow this and additional works at: http://digitalcommons.lasalle.edu/vietnamgeneration Part of the American Studies Commons Recommended Citation Kiernan, Ben (1989) "The American Bombardment of Kampuchea, 1969-1973," Vietnam Generation: Vol. 1 : No. 1 , Article 3. Available at: http://digitalcommons.lasalle.edu/vietnamgeneration/vol1/iss1/3 This Article is brought to you for free and open access by La Salle University Digital Commons. It has been accepted for inclusion in Vietnam Generation by an authorized editor of La Salle University Digital Commons. For more information, please contact [email protected]. The A m erican BoMbARdMENT of K a m puc Nea, 1969-197? B e n K iE R N A N On March 18,1969, the United States Air Force began its secret B-52 bombardment of rural Cambodia'. Exactly one year later, that country's ruler. Prince Norodom Sihanouk, was overthrown and the Vietnam War, com bined with a new civil war, to tear the nation apart for the next five years. The United States bombing of the countryside continued (now publicly) and increased from 1970 to August 1973. when Congress imposed a halt. Nearly half of the US bom bing tonnage was dropped in the last six months. The total was 540,000 tons. Rural Cambodia was destroyed, and 'Democratic Kampuchea' rose in its ashes. The emergent Communist Party of Kampuchea (CPK) regime, led by Pol Pot, had profited greatly from the U.S.
    [Show full text]
  • The War in Iraq and International Humanitarian Law Frequently Asked Questions (FAQ) Last Updated April 7, 2003
    The War in Iraq and International Humanitarian Law Frequently Asked Questions (FAQ) Last Updated April 7, 2003 The war in Iraq has raised a number of important issues of international humanitarian law (IHL), also known as the laws of war. IHL consists of the rules during armed conflict that seek to protect civilians and captured or incapacitated combatants, and restrict the methods and means of warfare. The following Frequently Asked Questions (FAQ) address some of the legal issues brought to public attention by official government statements and media reports. The FAQ do not attempt to assess the validity of any factual assertions made; instead they provide a legal analysis on the basis of assumed facts. This set of FAQ is not exhaustive and will be added to as necessary. The responses below are based on IHL as derived from international treaties and customary international law (practices broadly accepted as legally binding). The main sources of treaty law are the four Geneva Conventions of 1949 (to which all warring states are party) and the Hague Convention of 1907 respecting the Laws and Customs of War on Land. Customary IHL is drawn from state practice, decisions of international tribunals, scholarly works, and international treaties to which the United States and Iraq are not party (particularly Protocols I and II of 1977 to the Geneva Conventions), many provisions of which are accepted as reflecting customary international law. At its core, international humanitarian law seeks to limit the harm to people and property during wartime. Human Rights Watch urges all parties to the conflict in Iraq to abide scrupulously by its obligations under IHL.
    [Show full text]
  • The Club-K Anti-Ship Missile System: a Case Study in Perfidy and Its Repression by Robert Clarke*
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Digital Commons @ American University Washington College of Law Human Rights Brief Volume 20 | Issue 1 Article 4 2012 The lubC -K Anti-Ship Missile System: A Case Study in Perfidy and its Repression Robert Clarke Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons Recommended Citation Clarke, Robert. "The lubC -K Anti-Ship Missile System: A Case Study in Perfidy nda its Repression." Human Rights Brief 20, no. 1 (2012): 22-28. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Clarke: The Club-K Anti-Ship Missile System: A Case Study in Perfidy and The Club-K Anti-Ship Missile System: A Case Study in Perfidy and its Repression by Robert Clarke* INTRODUCTION the protection of civilians requires an institutional separation he Club-K anti-ship missile system represents a new and between them and combatants, such a divide may prevent the dangerous means of naval warfare, and one which exist- repression of civilian activity which imperils that same protection. Ting international humanitarian law (IHL) is ill-equipped to confront. Secreted inside the ubiquitous intermodal shipping PERFIDY OR RUSE container and placed on the deck of a cargo carrier, the missile system reveals itself only when the container roof opens, and the QUESTION OF CONFIDENCE missile rises from concealment and launches.1 As footage of test launches and displays at defense exhibitions illustrate, the Club- Although armies have employed deception since time imme- 4 K’s ease of transport and concealment offers obvious advantages morial, long-standing custom prohibits acts of treachery.
    [Show full text]
  • IRRC September 2002 Vol. 84 No 847 547
    mise 84 11.10.2002 12:26 Page 547 RICR Septembre IRRC September 2002 Vol. 84 No 847 547 Acts of terror, “terrorism” and international humanitarian law HANS-PETER GASSER* Since time immemorial civilians have been victims of terrorist acts. Ordinary people going to work by bus or having coffee on the sidewalks are the usual target of indiscriminate violence, not well-known players on the domestic or international scene but bystanders. It may, however, also happen that an act of terrorism strikes persons in the limelight: government officials, opposition leaders, military or police personnel. Such recourse to unchecked and indiscriminate violence has always been deemed contrary to fundamen- tal rules of law, whether enshrined in international treaties protecting the human being or codified by domestic law, in particular criminal law. No civ- ilization, no creed — and no decent human being —condones acts of terror- ism. Moreover, terrorists have always been prosecuted for their crimes. Terrorist attacks on human lives and property have not only brought suffering and distress to the individual victims, but have often had far-reach- ing consequences for the life of a nation or even the course of history. In 1914, for example, the killing in Sarajevo of the Austrian Crown Prince trig- gered the outbreak of the First World War. That event and the revolution which in 1917 disrupted the Russian Empire signalled the end of a long period of stability in nineteenth-century Europe. The twentieth century has seen a spate of terrorist acts all over the world. Few recent conflicts have not been characterized by appalling acts of cruelty against civilians, perpetrated with the sole aim of terrorizing the civilian population of a country at war.
    [Show full text]