Hostage-Taking and Kidnapping Terror in the COE

Total Page:16

File Type:pdf, Size:1020Kb

Hostage-Taking and Kidnapping Terror in the COE APPROVED ReVISION w C1 26NOV08…. Front Cover Page Summary of Changes CHANGE 1 dated 5 December to TRADOC G2 Handbook No.1.06 dated 15 September 2008 • The Change 1 supersedes TRADOC G2 handbook No.1.06 dated 15 September 2008 and is published Change 1 as a complete handbook document. • The handbook title is changed to Hostage-Taking and Kidnapping Terror in the COE. • Chapter titles change as listed in the Table of Contents • Hostage-taking receives additional attention throughout the handbook in conjunction with kidnapping. • Definitions used to describe the difference between kidnapping and hostage- taking are from US Code Title 18. • Chapter 1 addresses several conditions that may exist for US soldiers or civilians when detained by a hostile government or in terrorist captivity. • Table 1-2 adds a note to acknowledge that the Democratic Peoples Republic of Korea (DPRK)(North Korea) was removed from the US Department of State’s State Sponsors of Terrorism (SST) list in October 2008 by the US Government. • Chapter 4 provides two major vignettes on hostage-taking that involved US soldiers in the conduct of military missions. • Appendix C adds two references as background Code of Conduct information. ii TRADOC G2 Handbook No.1.06 C1 5Dec08 15 September 2008 TRADOC G2 Handbook TRADOC Intelligence Support Activity No. 1.06 15 September 2008 US Army TRADOC G2 Ft Leavenworth, KS. with Change 1 dated 5 December 2008 Hostage-Taking and Kidnapping Terror in the COE Contents Page Contents ..................................................................................................................i Preface................................................................................................................iii Introduction........................................................................................................... 1 Purpose ............................................................................................................... 2 Terrorism – Scope the Issue................................................................................ 3 Kidnapping and Hostage-Taking – Know the Threat.......................................... 3 Understanding the OE and the COE.................................................................... 4 Summary ............................................................................................................. 7 CHAPTER 1: HOSTAGE-TAKING AND KIDNAPPING.........................................1-1 Hostage-Taking and Kidnapping in Contemporary Times....................................1-1 Section I. Define the Terms ..............................................................................1-1 Section II. Describe the Context......................................................................1-13 Kidnapping Terror Two Decades Ago .............................................................1-17 Kidnapping Terror One Decade Ago...............................................................1-21 Contemporary Kidnapping and Hostage-Taking Terror ..................................1-26 Summary ........................................................................................................1-32 CHAPTER 2: TERRORIST MOTIVATIONS AND BEHAVIORS ............................2-1 Terrorist Motivations and Behaviors.....................................................................2-1 Section I: Goals and intent................................................................................2-1 Section II: Motivation........................................................................................2-6 Section III: Behavior........................................................................................2-13 Summary ........................................................................................................2-19 Distribution Restriction: Approved for Public release; Distribution Unlimited i CHAPTER 3: TERRORIST MODELS AND AFFILIATIONS...................................3-1 Terrorist Models and Affiliations ...........................................................................3-1 Section I: Organizational Commitment ..............................................................3-3 Section II: Organizational Structure...................................................................3-5 Section III: Organizational Categories .............................................................3-10 Summary.........................................................................................................3-14 CHAPTER 4: HOSTAGE-TAKING CASE VIGNETTES .........................................4-1 Hostage Case Vignettes.......................................................................................4-1 Case Study Elements: A Model.........................................................................4-2 Case Methodology ............................................................................................4-4 Case Study: Kumanovo (1999) .........................................................................4-5 Case Study: Karbala (2007) ............................................................................4-29 CHAPTER 5: COMBATING TERRORISM TODAY................................................5-1 Combating Terrorism Today.................................................................................5-1 Rationales for Kidnapping and Hostage-Taking ................................................5-3 Action Modeling for Kidnapping or Hostage-Taking ..........................................5-6 Kidnapping and Hostage-Taking Outcomes....................................................5-14 Summary.........................................................................................................5-19 Appendix A ........................................................................................................... A-1 Geneva Convention – Prisoners of War (Extract)........................................... A-1 Appendix B ........................................................................................................... B-1 UN International Convention Against Taking of Hostages............................ B-1 Appendix C ........................................................................................................... C-1 Code of Conduct ............................................................................................... C-1 Obligations and Responsibilities....................................................................... C-2 The Code of Conduct ....................................................................................... C-4 References.............................................................................................................1 ii TRADOC G2 Handbook No.1.06 C1 5Dec08 15 September 2008 Preface PREFACE Hostage-taking and Kidnapping Terror in the Contemporary Operational Environment is a supplemental handbook to the US Army Training and Doctrine Command capstone handbook guide on terrorism, TRADOC G2 Handbook No. 1, A Military Guide to Terrorism in the Twenty-First Century. Understanding terrorism and actions such as kidnapping or hostage-taking spans foreign and domestic threats in a complex and uncertain array of threats in the contemporary operational environment (COE). Purpose. This unclassified informational handbook supports operational missions, institutional training, and professional military education for US military forces in the War on Terrorism (WOT). This document promotes an improved understanding of terrorism objectives, motivation, and behaviors in the conduct of kidnapping or hostage-taking. Compiled from open source materials, this terrorism handbook promotes a “threat” perspective as well as enemy situational awareness of US actions to combat terrorism. Handbook Use. This handbook exists primarily for US military members in operational units and installation-institutional activities. Other groups of interest include Department of Army Civilians (DAC) and DA contractors. Additional groups of interest include interdepartmental, interagency, intergovernmental, civilian contractor, or nongovernmental, private volunteer and humanitarian relief organizations, and the general citizenry. Study of historical and contemporary terrorist incidents improves training awareness, mission exercise, and operational readiness. Selected references present citations for detailed study of specific terrorism topics. Unless stated otherwise, nouns or pronouns do not refer exclusively to a specific gender. Proponent Statement. Headquarters, US Army Training and Doctrine Command (TRADOC) G2 is the proponent for this publication. Both the capstone guide and supplemental handbook are prepared under the direction of the TRADOC G2, TRADOC Intelligence Support Activity (TRISA). This handbook will be updated to maintain a current and relevant resource based on user requirements. Send comments and recommendations on DA Form 2028 directly to Director, US Army TRADOC Intelligence Support Activity (TRISA), ATTN: ATIN-T, Threats Terrorism Team, 700 Scott Avenue, Bldg 53, Fort Leavenworth, Kansas 66027-1323. This handbook is available at https://dcsint-threats.leavenworth.army.mil and requires an Army Knowledge Online (AKO) login password for website access. 15 September 2008 TRADOC G2 Handbook No.1.06 C1 5Dec08 iii This Page Intentionally Blank iv TRADOC G2 Handbook No.1.06 C1 5Dec08 15 September 2008 Introduction Introduction America is at war and should expect to remain fully engaged for the
Recommended publications
  • Civilian Control Over the Military in East Asia
    Civilian Control over the Military in East Asia Aurel Croissant Ruprecht-Karls-Universität, Heidelberg September 2011 EAI Fellows Program Working Paper Series No. 31 Knowledge-Net for a Better World The East Asia Institute(EAI) is a nonprofit and independent research organization in Korea, founded in May 2002. The EAI strives to transform East Asia into a society of nations based on liberal democracy, market economy, open society, and peace. The EAI takes no institutional position on policy issues and has no affiliation with the Korean government. All statements of fact and expressions of opinion contained in its publications are the sole responsibility of the author or authors. is a registered trademark. © Copyright 2011 EAI This electronic publication of EAI intellectual property is provided for non-commercial use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of EAI documents to a non-EAI website is prohibited. EAI documents are protected under copyright law. The East Asia Institute 909 Sampoong B/D, 310-68 Euljiro 4-ga Jung-gu, Seoul 100-786 Republic of Korea Tel. 82 2 2277 1683 Fax 82 2 2277 1684 EAI Fellows Program Working Paper No. 31 Civilian Control over the Military in East Asia1 Aurel Croissant Ruprecht-Karls-Universität, Heidelberg September 2011 Abstract In recent decades, several nations in East Asia have transitioned from authoritarian rule to democracy. The emerging democracies in the region, however, do not converge on a single pattern of civil-military relations as the analysis of failed institutionalization of civilian control in Thailand, the prolonged crisis of civil– military relations in the Philippines, the conditional subordination of the military under civilian authority in Indonesia and the emergence of civilian supremacy in South Korea in this article demonstrates.
    [Show full text]
  • The Financial and Economic Crisis of 2008-2009 and Developing Countries
    THE FINANCIAL AND ECONOMIC CRISIS OF 2008-2009 AND DEVELOPING COUNTRIES Edited by Sebastian Dullien Detlef J. Kotte Alejandro Márquez Jan Priewe UNITED NATIONS New York and Geneva, December 2010 ii Note Symbols of United Nations documents are composed of capital letters combined with figures. Mention of such a symbol indicates a reference to a United Nations document. The views expressed in this book are those of the authors and do not necessarily reflect the views of the UNCTAD secretariat. The designations employed and the presentation of the material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Material in this publication may be freely quoted; acknowl edgement, however, is requested (including reference to the document number). It would be appreciated if a copy of the publication containing the quotation were sent to the Publications Assistant, Division on Globalization and Development Strategies, UNCTAD, Palais des Nations, CH-1211 Geneva 10. UNCTAD/GDS/MDP/2010/1 UNITeD NatioNS PUblicatioN Sales No. e.11.II.D.11 ISbN 978-92-1-112818-5 Copyright © United Nations, 2010 All rights reserved THE FINANCIAL AND ECONOMIC CRISIS O F 2008-2009 AND DEVELOPING COUN T RIES iii CONTENTS Abbreviations and acronyms ................................................................................xi About the authors
    [Show full text]
  • U.S. Citizens Kidnapped by the Islamic State John W
    CRS Insights U.S. Citizens Kidnapped by the Islamic State John W. Rollins, Specialist in Terrorism and National Security ([email protected], 7-5529) Liana Rosen, Specialist in International Crime and Narcotics ([email protected], 7-6177) February 13, 2015 (IN10167) Overview On February 10, 2015, President Barack Obama acknowledged that U.S. citizen Kayla Mueller was killed while held in captivity by the terrorist group known as the Islamic State (IS). This was the fourth death of an American taken hostage by the Islamic State: Abdul-Rahman Kassig (previously Peter Kassig), James Foley, and Steven Sotloff were also killed. The death of Mueller and the graphic videos depicting the deaths of the other three Americans have generated debate about the U.S. government's role and capabilities for freeing hostages. In light of these deaths, some policymakers have called for a reevaluation of U.S. policy on international kidnapping responses. Questions include whether it is effective and properly coordinated and implemented, should be abandoned or modified to allow for exceptions and flexibility, or could benefit from enhancements to improve global adherence. Scope The killing of U.S. citizens by the Islamic State may be driven by a variety of underlying motives. Reports describe the group as inclined toward graphic and public forms of violence for purposes of intimidation and recruitment. It is unclear whether the Islamic State would have released its Americans hostages in exchange for ransom payments or other concessions. Foley's family, for example, disclosed that the Islamic State demanded a ransom of 100 million euros ($132 million).
    [Show full text]
  • Download Thesis
    This electronic thesis or dissertation has been downloaded from the King’s Research Portal at https://kclpure.kcl.ac.uk/portal/ Between Universalism and Particularism Government and Civil Society Responses to Contemporary Antisemitism in Britain Cardaun, Sarah Awarding institution: King's College London The copyright of this thesis rests with the author and no quotation from it or information derived from it may be published without proper acknowledgement. END USER LICENCE AGREEMENT Unless another licence is stated on the immediately following page this work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International licence. https://creativecommons.org/licenses/by-nc-nd/4.0/ You are free to copy, distribute and transmit the work Under the following conditions: Attribution: You must attribute the work in the manner specified by the author (but not in any way that suggests that they endorse you or your use of the work). Non Commercial: You may not use this work for commercial purposes. No Derivative Works - You may not alter, transform, or build upon this work. Any of these conditions can be waived if you receive permission from the author. Your fair dealings and other rights are in no way affected by the above. Take down policy If you believe that this document breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 01. Oct. 2021 Between Universalism and Particularism: Government and Civil Society Responses to Contemporary Antisemitism in Britain Thesis submitted for the award of Doctor of Philosophy (PhD) by Sarah K.
    [Show full text]
  • Coup D'etat Events, 1946-2012
    COUP D’ÉTAT EVENTS, 1946-2015 CODEBOOK Monty G. Marshall and Donna Ramsey Marshall Center for Systemic Peace May 11, 2016 Overview: This data list compiles basic descriptive information on all coups d’état occurring in countries reaching a population greater than 500,000 during the period 1946-2015. For purposes of this compilation, a coup d’état is defined as a forceful seizure of executive authority and office by a dissident/opposition faction within the country’s ruling or political elites that results in a substantial change in the executive leadership and the policies of the prior regime (although not necessarily in the nature of regime authority or mode of governance). Social revolutions, victories by oppositional forces in civil wars, and popular uprisings, while they may lead to substantial changes in central authority, are not considered coups d’état. Voluntary transfers of executive authority or transfers of office due to the death or incapacitance of a ruling executive are, likewise, not considered coups d’état. The forcible ouster of a regime accomplished by, or with the crucial support of, invading foreign forces is not here considered a coup d’état. The dataset includes four types of coup events: successful coups, attempted (failed) coups, coup plots, and alleged coup plots. In order for a coup to be considered “successful” effective authority must be exercised by new executive for at least one month. We are confident that the list of successful coups is comprehensive. Our confidence in the comprehensiveness of the coup lists diminishes across the remaining three categories: good coverage (reporting) of attempted coups and more questionable quality of coverage/reporting of coup plots (“discovered” and alleged).
    [Show full text]
  • Congressional Record United States Th of America PROCEEDINGS and DEBATES of the 104 CONGRESS, FIRST SESSION
    E PL UR UM IB N U U S Congressional Record United States th of America PROCEEDINGS AND DEBATES OF THE 104 CONGRESS, FIRST SESSION Vol. 141 WASHINGTON, FRIDAY, APRIL 7, 1995 No. 65 House of Representatives The House met at 11 a.m. and was PLEDGE OF ALLEGIANCE DESIGNATING THE HONORABLE called to order by the Speaker pro tem- The SPEAKER pro tempore. Will the FRANK WOLF AS SPEAKER PRO pore [Mr. BURTON of Indiana]. TEMPORE TO SIGN ENROLLED gentleman from New York [Mr. SOLO- BILLS AND JOINT RESOLUTIONS f MON] come forward and lead the House in the Pledge of Allegiance. THROUGH MAY 1, 1995 DESIGNATION OF SPEAKER PRO Mr. SOLOMON led the Pledge of Alle- The SPEAKER pro tempore laid be- TEMPORE giance as follows: fore the House the following commu- The SPEAKER pro tempore laid be- I pledge allegiance to the Flag of the nication from the Speaker of the House fore the House the following commu- United States of America, and to the Repub- of Representatives: nication from the Speaker. lic for which it stands, one nation under God, WASHINGTON, DC, indivisible, with liberty and justice for all. April 7, 1995. WASHINGTON, DC, I hereby designate the Honorable FRANK R. April 7, 1995. f WOLF to act as Speaker pro tempore to sign I hereby designate the Honorable DAN BUR- enrolled bills and joint resolutions through TON to act as Speaker pro tempore on this MESSAGE FROM THE SENATE May 1, 1995. day. NEWT GINGRICH, NEWT GINGRICH, A message from the Senate by Mr. Speaker of the House of Representatives.
    [Show full text]
  • Prisons in Yemen
    [PEACEW RKS [ PRISONS IN YEMEN Fiona Mangan with Erica Gaston ABOUT THE REPORT This report examines the prison system in Yemen from a systems perspective. Part of a three-year United States Institute of Peace (USIP) rule of law project on the post-Arab Spring transition period in Yemen, the study was supported by the International Narcotics and Law Enforcement Bureau of the U.S. State Department. With permission from the Yemeni Ministry of Interior and the Yemeni Prison Authority, the research team—authors Fiona Mangan and Erica Gaston for USIP, Aiman al-Eryani and Taha Yaseen of the Yemen Polling Center, and consultant Lamis Alhamedy—visited thirty-seven deten- tion facilities in six governorates to assess organizational function, infrastructure, prisoner well-being, and security. ABOUT THE AUTHORS Fiona Mangan is a senior program officer with the USIP Governance Law and Society Center. Her work focuses on prison reform, organized crime, justice, and security issues. She holds degrees from Columbia University, King’s College London, and University College Dublin. Erica Gaston is a human rights lawyer with seven years of experience in programming and research in Afghanistan on human rights and justice promotion. Her publications include books on the legal, ethical, and practical dilemmas emerging in modern conflict and crisis zones; studies mapping justice systems and outcomes in Afghanistan and Yemen; and thematic research and opinion pieces on rule of law issues in transitioning countries. She holds degrees from Stanford University and Harvard Law School. Cover photo: Covered Yard Area, Hodeida Central. Photo by Fiona Mangan. The views expressed in this report are those of the authors alone.
    [Show full text]
  • The Hostage Through the Ages
    Volume 87 Number 857 March 2005 A haunting figure: The hostage through the ages Irène Herrmann and Daniel Palmieri* Dr Irène Herrmann is Lecturer at the University of Geneva; she is a specialist in Swiss and in Russian history. Daniel Palmieri is Historical Research Officer at the International Committee of the Red Cross; his work deals with ICRC history and history of conflicts. Abstract: Despite the recurrence of hostage-taking through the ages, the subject of hostages themselves has thus far received little analysis. Classically, there are two distinct types of hostages: voluntary hostages, as was common practice during the Ancien Régime of pre-Revolution France, when high-ranking individuals handed themselves over to benevolent jailers as guarantors for the proper execution of treaties; and involuntary hostages, whose seizure is a typical procedure in all-out war where individuals are held indiscriminately and without consideration, like living pawns, to gain a decisive military upper hand. Today the status of “hostage” is a combination of both categories taken to extremes. Though chosen for pecuniary, symbolic or political reasons, hostages are generally mistreated. They are in fact both the reflection and the favoured instrument of a major moral dichotomy: that of the increasing globalization of European and American principles and the resultant opposition to it — an opposition that plays precisely on the western adherence to human and democratic values. In the eyes of his countrymen, the hostage thus becomes the very personification of the innocent victim, a troubling and haunting image. : : : : : : : In the annals of the victims of war, hostages occupy a special place.
    [Show full text]
  • When Are Foreign Volunteers Useful? Israel's Transnational Soldiers in the War of 1948 Re-Examined
    This is a repository copy of When are Foreign Volunteers Useful? Israel's Transnational Soldiers in the War of 1948 Re-examined. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/79021/ Version: WRRO with coversheet Article: Arielli, N (2014) When are Foreign Volunteers Useful? Israel's Transnational Soldiers in the War of 1948 Re-examined. Journal of Military History, 78 (2). pp. 703-724. ISSN 0899- 3718 Reuse Items deposited in White Rose Research Online are protected by copyright, with all rights reserved unless indicated otherwise. They may be downloaded and/or printed for private study, or other acts as permitted by national copyright laws. The publisher or other rights holders may allow further reproduction and re-use of the full text version. This is indicated by the licence information on the White Rose Research Online record for the item. Takedown If you consider content in White Rose Research Online to be in breach of UK law, please notify us by emailing [email protected] including the URL of the record and the reason for the withdrawal request. [email protected] https://eprints.whiterose.ac.uk/ promoting access to White Rose research papers Universities of Leeds, Sheffield and York http://eprints.whiterose.ac.uk/ White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/79021/ Paper: Arielli, N (2014) When are foreign volunteers useful? Israel's transnational soldiers in the war of 1948 re-examined. Journal of Military History, 78 (2). 703 - 724. White Rose Research Online [email protected] When are Foreign Volunteers Useful? Israel’s Transnational Soldiers in the War of 1948 Re-examined Nir Arielli Abstract The literature on foreign, or “transnational,” war volunteering has fo- cused overwhelmingly on the motivations and experiences of the vol- unteers.
    [Show full text]
  • Precipitating the Decline of Terrorist Groups : a Systems Analysis
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1994-03 Precipitating the decline of terrorist groups : a systems analysis DeGhetto, Todd H. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/30893 NAVAL POSTGRADUATE SCHOOL Monterey, California THESIS PRECIPITATING THE DECLINE OF TERRORIST GROUPS: A SYSTEMS ANALYS!S by Todd H. DeGhctto March, 1994 Thesis Advisor JamcsJ. Wirtz Approve<J for public release, distribution IS unlimited The s~s D2111ill DUDLEY KNOX LlBRPRY NAVAL POSTGRADUATE SCHOOl MONTEREY CA 93943-5101 Unclassified SecuntyCl ..l!ifiClllionoflhis~ REPORT DOCUMENTATION PAGE Is Report SecurityCI ..sificBlIon: Unclassified lbReslricli""MBI'klI\g!i 2aScaonlYCJMSlfic:ationAuibority 3 Di5lributioofAvailabilityofRepon lbDecl8SSlfi""lioniDowngraililgScbcdule Approved fur public release~ distribution is l-.llimited. 4 Pemnning Olpnizalioo Report Number(.) SMOIIi1oring0rpnizllionReponNumber(s) 6aN..-acofPerfunningOrilaniution 7a NlIIDe of Moniloriog OrgaDlzation Naval Postgraduate School Naval PostgradUIltl: School 6cAddress(cil)l.&/ak.andZlPcodI) 1bAddress(city._e. tmdZIP cotk) Monterey CA 93943-5000 MontereyCA93943-SOOO Addresslcily.SI<W.Qtt(iZlP~ WSourceofFuDdlngNumbcr.l Program Eli:ment No ProjecL No Task No Work Unit Accession No 11 Tille (incl'" ~ily cltu.ljkmklll) PRECIPITATING mE DECLINE OF TERRORIST GROUPS: A SYSTEMS ANALYSIS 12 PClllOlloi Autboti') Todd H. DeGbetto 16 SupplemCOlory Notation The views expressed in this thesis are those of the author and do not reflect the official policy or position 0 the Depanment of Defense or the U.s. Government. 18Sub;1ea. TQm$ (com", ... "" !f""<UJaryundidcmi/Yl!I'bI<>ct""",btI,) Subgroup Terror ... a System.. Red Bripdos. FLQ. Critical EmIr, DcI"IIilimi.:B1lon. MeI'l:lIIial Success. Burnout. 19Abs1f11C1(contI""""" ",i/""""'_""'whybl<>d""""-J This thesis shows how a government actor can use systems theory to hasten the deeline of a terrorist group.
    [Show full text]
  • The Evolution of Terrorism in Greece from 1975 to 2009
    Research Paper No. 158 Georgia Chantzi (Associate in the International Centre for Black Sea Studies, ICBSS) THE EVOLUTION OF TERRORISM IN GREECE FROM 1975 TO 2009 Copyright: University of Coventry, (Dissertation in the Humanities and Social Science), UK. PS. Mrs. Georgia Chantzi permitted RIEAS to publish her Research Thesis (MA). RESEARCH INSTITUTE FOR EUROPEAN AND AMERICAN STUDIES (RIEAS) # 1, Kalavryton Street, Alimos, Athens, 17456, Greece RIEAS URL:http://www.rieas.gr 1 RIEAS MISSION STATEMENT Objective The objective of the Research Institute for European and American Studies (RIEAS) is to promote the understanding of international affairs. Special attention is devoted to transatlantic relations, intelligence studies and terrorism, European integration, international security, Balkan and Mediterranean studies, Russian foreign policy as well as policy making on national and international markets. Activities The Research Institute for European and American Studies seeks to achieve this objective through research, by publishing its research papers on international politics and intelligence studies, organizing seminars, as well as providing analyses via its web site. The Institute maintains a library and documentation center. RIEAS is an institute with an international focus. Young analysts, journalists, military personnel as well as academicians are frequently invited to give lectures and to take part in seminars. RIEAS maintains regular contact with other major research institutes throughout Europe and the United States and, together with similar institutes in Western Europe, Middle East, Russia and Southeast Asia. Status The Research Institute for European and American Studies is a non-profit research institute established under Greek law. RIEAS‟s budget is generated by membership subscriptions, donations from individuals and foundations, as well as from various research projects.
    [Show full text]
  • Treatment of American Prisoners of War in Southeast Asia 1961-1973 by John N. Powers
    Treatment of American Prisoners of War In Southeast Asia 1961-1973 By John N. Powers The years 1961 to 1973 are commonly used when studying American POWs during the Vietnam War, even though history books generally refer to the years 1964 to 1973 in defining that war. Americans were captured as early as 1954 and as late as 1975. In these pages the years 1961 to 1973 will be used. Americans were held prisoner by the North Vietnamese in North Vietnam, the Viet Cong (and their political arm the National Liberation Front) in South Vietnam, and the Pathet Lao in Laos. This article will not discuss those Americans held in Cambodia and China. The Defense Prisoner of War/Missing Personnel Office (DPMO) lists 687 American Prisoners of War who were returned alive by the Vietnamese from 1961 through 1976. Of this number, 72 were returned prior to the release of the bulk of the POWs in Operation Homecoming in 1973. Twelve of these early releases came from North Vietnam. DPMO figures list thirty-six successful escapes, thirty-four of them in South Vietnam and two in Laos. There were more than those thirty-six escapes, including some from prison camps in Hanoi itself. Some escapes ended in recapture within hours, some individuals were not recaptured for days, and some were simply never seen again. There were individuals who escaped multiple times, in both North and South Vietnam. However, only thirty- six American prisoners of war escaped and reached American forces. Of those thirty- six successful attempts, twenty-eight of them escaped within their first month of captivity.
    [Show full text]