Peacetime Espionage, International Law and the Existence of Customary Exceptions I˜Naki Navarrete† & Russell Buchan‡

Total Page:16

File Type:pdf, Size:1020Kb

Peacetime Espionage, International Law and the Existence of Customary Exceptions I˜Naki Navarrete† & Russell Buchan‡ \\jciprod01\productn\C\CIN\51-4\CIN403.txt unknown Seq: 1 8-APR-19 15:07 Out of the Legal Wilderness: Peacetime Espionage, International Law and the Existence of Customary Exceptions I˜naki Navarrete† & Russell Buchan‡ This Article demonstrates that peacetime espionage does not benefit from permissive customary international law exceptions. The mainstream view contends that, though peacetime espionage may contravene interna- tional law, developments in customary international law (CIL) nevertheless undercut State responsibility for such conduct. The gist of this view is that acts of espionage benefit from permissive CIL exceptions because its prac- tice is widespread and accepted within the international society. However, the mainstream literature has rarely— if ever— meaningfully engaged with the practice of espionage in an effort to tease out the objective and subjec- tive elements supportive of customary espionage exceptions. This Article closes this gap and debunks the mainstream view. We show that, although widespread, most acts of espionage are committed in secret and, as such, they cannot qualify as State practice for the purpose of CIL formation. We further demonstrate that States have failed to issue expressions of the sub- jective element in support of customary espionage exceptions. We con- clude by suggesting that, while States are entitled to develop customary espionage exceptions in the future, for now they have yet to come out of the legal wilderness. Introduction ..................................................... 898 R I. International Law and Peacetime Espionage............... 901 R A. Principle of Territorial Sovereignty ..................... 905 R B. Law of the Sea ........................................ 909 R C. Diplomatic and Consular Law ......................... 910 R II. Customary Exceptions and Peacetime Espionage .......... 911 R III. State Practice ............................................. 914 R A. Duration ............................................. 915 R B. Generality and Uniformity ............................ 916 R †I˜naki Navarrete, (B.C.L., LL.B., McGill University, Faculty of Law), [email protected]. ‡ Dr Russell Buchan, University of Sheffield, UK, [email protected]. This Article was written jointly by the authors. The authors are grateful to Guilhem de Roquefeuil, Craig Forcese, Kubo Ma`e´ak, Rachel Mazzarella, Pierrick Rouat, and Nicholas Tsagourias for their invaluable comments on earlier versions of this paper. All errors are our own. 51 CORNELL INT’L L.J. 897 (2019) \\jciprod01\productn\C\CIN\51-4\CIN403.txt unknown Seq: 2 8-APR-19 15:07 898 Cornell International Law Journal Vol. 51 C. Public Character ...................................... 919 R 1. Domestic Law Authorizing Acts of Peacetime Espionage ......................................... 922 R IV. Opinio Juris .............................................. 927 R A. The Policy of Silence .................................. 928 R 1. Air Law ........................................... 929 R 2. Law of the Sea..................................... 930 R 3. Diplomatic and Consular Law ...................... 931 R 4. Space Law ........................................ 932 R B. The Process of Claims and Counterclaims ............. 934 R 1. Denials ........................................... 935 R 2. Neither Confirm Nor Deny ......................... 936 R 3. Mistakes .......................................... 938 R 4. Extra-Legal Justifications ........................... 939 R 5. Legal and Psychological ‘Cannot’ .................... 942 R C. Other Sources of Opinio Juris.......................... 945 R 1. Negative State Practice ............................. 945 R 2. Domestic Law and National Decisions ............... 949 R Conclusion ...................................................... 952 R Introduction Peacetime espionage represents a serious conundrum for international legal scholars. On the one hand, while States have failed to implement international law that directly and specifically regulates espionage, schol- ars must recognize that States inhabit an international society that com- prises multiple international laws designed to protect States’ sovereign equality.1 Because of its inherently intrusive nature, espionage is likely to run into conflict with a number of these rules. On the other hand, these scholars perceive the world order to be unpredictable and hostile.2 In this environment, they are reluctant to allow international law to curtail States’ ability to undertake espionage, which is regarded “as a vital necessity in the national security process” because it sheds light on the capabilities and intentions of other actors within the international society.3 The conundrum for scholars is therefore clear: disavowing the applica- tion of international law to espionage undermines the authority and integ- rity of the international legal order but at the same time applying international law to espionage deprives States of the national security ben- 1. See, e.g., ANTONIO CASSESE, INTERNATIONAL LAW IN A DIVIDED WORLD 130, 130 (1986) (arguing the principle of the sovereign equality of States— as enshrined in Article 2(1) of the United Nations (UN) Charter 1945— is considered to be “the fundamental premise on which all international law rests.”). 2. Id. at 131. 3. W. Hays Parks, The International Law of Intelligence Collection, in NATIONAL SECURITY LAW 433, 433 (John N. Moore & Robert Turner eds., 1990). \\jciprod01\productn\C\CIN\51-4\CIN403.txt unknown Seq: 3 8-APR-19 15:07 2019 Out of the Legal Wilderness 899 efits afforded by this practice.4 How have international legal scholars resolved this problematique? The short answer is: they haven’t. Rather than tackling head-on the ques- tion of whether espionage is compatible with international law, scholars have instead preferred to sidestep this debate and avoid it entirely. In doing so, they have determined that “international law is silent on the sub- ject”5 of espionage, that is, that this is a practice that is neither “legal nor illegal under international law.”6 In 2007, for example, Radsan— a former assistant general counsel at the Central Intelligence Agency (CIA)— was so exasperated by the predicament that espionage creates for international lawyers that he exhorted: “Accepting that espionage is beyond the law, we should move on to other projects— with grace.”7 International legal scholars have not been able to walk away from espi- onage. New and more effective means and methods of espionage keep emerging and these developments force espionage into the international legal spotlight. Take for instance the dawn of cyberspace and the potential for cyber-enabled espionage. Cyberspace is a domain that is now widely utilized by States to store massive quantities of confidential information. Given the speed and ease at which this information can be accessed, cou- pled with the fact that cyber espionage is a relatively risk-free enterprise insofar as it can be committed remotely, the practice has “metastasize[d]”8 in the last decade and “cyber espionage projects [are] now prevalent.”9 Compelled to grasp the nettle, there has been a flurry of international legal scholarship in recent years examining the applicability of interna- tional law to peacetime espionage.10 Increasingly, scholars have conceded 4. Simon Chesterman, The Spy Who Came in from the Cold War: Intelligence and International Law, 27 MICH. J. INT’L L. 1071, 1072– 73 (2006) (Chesterman refers to this conundrum as the “elephant in the room” for international lawyers). 5. Gary Brown, Spying and Fighting in Cyberspace: What is Which?, 8 J. NAT’L SEC. L. & POL’Y 621, 621 (2016). See also Richard A. Falk, Foreword to ESSAYS ON ESPIONAGE AND INTERNATIONAL LAW V (Roland J. Stranger ed., 1962) (“Traditional international law is remarkably oblivious to the peacetime practice of espionage.”). 6. A. John Radsan, The Unresolved Equation of Espionage and International Law, 28 MICHIGAN J. INT’L L. 595, 596 (2007). A number of authors have proposed their own criteria that can be used to determine the legality of peacetime espionage under interna- tional law. See, e.g., Ashley S. Deeks, Confronting and Adapting: Intelligence Agencies and International Law, 102 VA. L. REV. 599, 605 (2016); Ido Kilovaty, World Wide Web of Exploitations: The Case of Peacetime Cyber Espionage Operations under International Law: Towards a Contextual Approach, 18 COLUM. SCI. & TECH. L. REV. 42, 42 (2016); Darien Pun, Rethinking Espionage in the Modern Era, 18 CHI. J. INT’L L. 353, 353 (2017). 7. Radsan, supra note 6, at 597. 8. David P. Fidler, Economic Cyber Espionage and International Law: Controversies Involving Government Acquisition of Trade Secrets through Cyber Technologies, 17 ASIL INSIGHTS 10 (2013). 9. Pete Warren, State-Sponsored Cyber Espionage Projects Now Prevalent, THE GUARD- IAN (Aug. 30, 2012), https://www.theguardian.com/technology/2012/aug/30/state- sponsored-cyber-espionage-prevalent [https://perma.cc/AQ8N-7W9B]. 10. See, e.g., Russell Buchan, The International Legal Regulation of State-Sponsored Cyber Espionage, in INTERNATIONAL CYBER NORMS: LEGAL, POLICY & INDUSTRY PERSPECTIVES (Anna-Maria Osula & Henry R˜oigas eds, 2016); KRIANGSAK KITTICHAISAREE, PUBLIC INTERNTIONAL LAW AND CYBERSPACE (2016); Katharina Ziolkowski, Cyber Espionage— New \\jciprod01\productn\C\CIN\51-4\CIN403.txt unknown Seq: 4 8-APR-19 15:07 900 Cornell International Law Journal Vol. 51 that certain forms of espionage transgress international
Recommended publications
  • Jungle Operations International Course – Guidelines to Candidates
    Jungle Operations International Course – Guidelines to Candidates ANNEX E – STUDENTS’S PREPARATION FOR THE DOCTRINAL INTERACTION GENERAL GUIDELINES FOR THE STUDENTS’S PREPARATION – CIOS 2018 The Doctrinal Interaction will take place on 03 (three) distinct days, and each day a specific block of issues will be dealt with in the jungle environment. During the selection process, still in the country of origin, the future student should receive, through the Military Attaché of his country, the subjects that will be addressed in the Doctrinal Interaction. Each subject contains requests with questions that must be answered and presented by the student in the Doctrinal Interaction. The requests, requisites, maps, letters and information required to resolve the requests are contained in the body of this document. Each student must answer all the questions of the requests in a single document in the ".doc" format and also in a single file in the ".ppt" format. These files must be recorded in a flash drive or CD – Rom and brought to CIGS with the student. A military from the Doctrinal and Research Division will collect the files on the first day of the Mobilization Week at CIGS. During the Doctrinal Interaction each student should present the answers to the questions as follows: - On the 1st day the student will have 30 min to present the requests 1, 2, 3 and 4. - On the 2nd day the student will have 30 min to present 5, 6, 7 and 8. - On the 3rd day the student will have 30 minutes to present the requests 9 and 10.
    [Show full text]
  • Marine Corps Advanced Reconnaissance Vehicle (ARV)
    Updated June 10, 2021 Marine Corps Advanced Reconnaissance Vehicle (ARV) What Is the Advanced Reconnaissance anti-armor capability to defeat close-in heavy armor Vehicle (ARV)? threats; According to the Marine Corps, the Advanced Reconnaissance Vehicle (ARV) aims to be a new armored precision-guided munitions (PGMs) to defeat threats vehicle family to replace the Light Armored Vehicle (LAV) beyond the engagement range of threat systems; (Figure 1): Since the 1980s, the Light Armored Vehicle (LAV) unmanned systems swarm capability to provide persistent, multifunction munitions; has supported Marine Air-Ground Task Force missions on the battlefield. While the LAV remains advanced, networked, multifunctional electronic warfare operationally effective, the life cycle of this system (EW ) capabilities; is set to expire in the mid-2030s…. The Advanced Reconnaissance Vehicle (ARV) [the LAV’s a modern command-and-control suite and a full range of replacement] will be highly mobile, networked, sensors to enhance and extend reconnaissance and transportable, protected, and lethal. The capability surveillance ranges; will provide, sensors, communication systems and lethality options to overmatch threats that have organic unmanned aerial and ground systems historically been addressed with more heavily (UAS/UGS) that can be deployed from the ARV; armored systems. The ARV will be an advanced combat vehicle system, capable of fighting for active and passive vehicle protection capabilities to information that balances competing capability sense, orient, classify, track, and defeat incoming demands to sense, shoot, move, communicate and rocket-propelled grenades (RPGs), anti-tank guided remain transportable as part of the naval missiles (ATGMs), and PGM threats with hard-and soft- expeditionary force.
    [Show full text]
  • U.S. Command and Control and Intelligence, Surveillance, and Reconnaissance Aircraft
    U.S. Command and Control and Intelligence, Surveillance, and Reconnaissance Aircraft Jeffrey Nelson US Air Force Fellow July 15, 2015 Congressional Research Service 7-5700 www.crs.gov R44108 c11173008 . U.S. Command and Control and Intelligence, Surveillance, and Reconnaissance Aircraft Summary The fleet of manned aircraft accomplishing the Department of Defense’s (DOD’s) Command and Control (C2) and Intelligence, Surveillance, and Reconnaissance (ISR) missions for the joint military community (E-8, E-3, RC-135, WC-135, OC-135, and E-6) is primarily based on Boeing 707 aircraft procured from the 1960s to the early 1990s. As the age of these legacy C2ISR aircraft increases, understanding the Air Force and Navy modernization and recapitalization plans is likely important for Congress. This report examines the Air Force’s and Navy’s current sustainment, modernization, and recapitalization efforts for these Boeing 707-based aircraft, and issues Congress may take into account when considering appropriating funds for continued sustainment and modernization of these aircraft versus funding for recapitalization of these missions to new aircraft. This report addresses potential congressional oversight and appropriations concerns for the sustainment, modernization, and recapitalization of the DOD’s Boeing 707-based legacy C2ISR aircraft fleet. It does not address options for recapitalization currently being offered by industry to other countries. Congress has the authority to approve, reject, or modify Air Force and Navy funding requests for C2ISR aircraft sustainment, modernization, and recapitalization, as well as oversight of the nation’s C2ISR requirements and capabilities. Congress’s decisions on appropriations for the C2ISR force could impact the nation’s C2ISR capabilities and have additional consequences for the U.S.
    [Show full text]
  • Terrorist and Insurgent Teleoperated Sniper Rifles and Machine Guns Robert J
    Claremont Colleges Scholarship @ Claremont CGU Faculty Publications and Research CGU Faculty Scholarship 1-1-2016 Terrorist and Insurgent Teleoperated Sniper Rifles and Machine Guns Robert J. Bunker Claremont Graduate University Alma Keshavarz Claremont Graduate University Recommended Citation Bunker, R. J. (2016). Terrorist and Insurgent Teleoperated Sniper Rifles and Machine Guns. Foreign Military Studies Office (FMSO), 1-40. This Article is brought to you for free and open access by the CGU Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. WL KNO EDGE NCE ISM SA ER IS E A TE N K N O K C E N N T N I S E S J E N A 3 V H A A N H Z И O E P W O I T E D N E Z I A M I C O N O C C I O T N S H O E L C A I N M Z E N O T Terrorist and Insurgent Teleoperated Sniper Rifles and Machine Guns ROBERT J. BUNKER and ALMA KESHAVARZ August 2016 Open Source, Foreign Perspective, Underconsidered/Understudied Topics The Foreign Military Studies Office (FMSO) at Fort Leavenworth, Kansas, is an open source research organization of the U.S. Army. It was founded in 1986 as an innovative program that brought together military specialists and civilian academics to focus on military and security topics derived from unclassified, foreign media. Today FMSO maintains this research tradition of special insight and highly collaborative work by conducting unclassified research on foreign perspectives of defense and security issues that are understudied or unconsidered.
    [Show full text]
  • The Success of the Light Armoured Vehicle
    Canadian Military History Volume 20 Issue 3 Article 9 2011 The Success of the Light Armoured Vehicle Ed Storey Canadian Expeditionary Forces Follow this and additional works at: https://scholars.wlu.ca/cmh Recommended Citation Storey, Ed "The Success of the Light Armoured Vehicle." Canadian Military History 20, 3 (2011) This Feature is brought to you for free and open access by Scholars Commons @ Laurier. It has been accepted for inclusion in Canadian Military History by an authorized editor of Scholars Commons @ Laurier. For more information, please contact [email protected]. Storey: Light Armoured Vehicle The Success of the Light Armoured Vehicle Ed Storey s a military vehicle enthusiast make them cost effective and easier AI was quite excited to see the Abstract: In order to understand the to deploy. article by Frank Maas in Canadian purchase of military vehicles, one must The AVGP series of vehicles Military History dealing with the understand the vehicle and where it falls purchased by Canada in 1976 was in the evolution of vehicle procurement. Canadian Light Armoured Vehicle This article, written in response to an a 10.7 ton, 6 wheeled amphibious (LAV) series of vehicles (vol.20, earlier article in Canadian Military vehicle based on the Swiss Mowag no.2 Spring 2011). I was also keenly History by Frank Maas, examines the Piranha I. Canada bought three interested in the article as my Father chronology and motivations behind versions: the Cougar 76 mm Fire was stationed at CFB Petawawa in the Canadian acquisition of wheeled Support Vehicle, the Grizzly armoured fighting vehicles.
    [Show full text]
  • The Law of Air Warfare
    The Law of Air Warfare by Javier Guisandez Gomez Hostile aerial action Under aerospace doctrine an aerial action is a set of aerial sorties of the same nature which take place simultaneously in pursuit of a common aim. In other words, an action of this type would attain the objective pursued if it involved two or more aircraft engaging in any of a range of operations, namely attacks, reconnaissance, transportation and special aerial missions. The possible situations in which aerial actions may take place range from peacetime to warfare, including all the intermediate stages. It may therefore be said that when aerial action is described as hostile, it is because it is actually carrying out or intended to carry out acts that have a single common characteristic, that is, violence. In this context, violence must be understood as acts which are com- mitted without the consent of the affected group or country and which therefore constitute a violation of the rights or the status of other com- munities or nations. It is important to clarify this point, as otherwise hostile Francisco Javier Guisandez Gomez is a colonel in the Spanish Air Force and heads the Tactics and Doctrine Department at the Air Force Academy in Madrid. Colonel Guisandez Gomez teaches the law of war at the Academy, at the Madrid Centre for the Study of International Humanitarian Law, at the International Institute of Humanitarian Law in San Remo, Italy, and also as an instructor for the ICRC in El Salvador, Guatemala and Nicaragua. Original: Spanish 347 INTERNATIONAL REVIEW OF THE RED CROSS aerial action would cover only aerial attack missions, while those involv- ing transportation or reconnaissance and special missions, and also electronic warfare, in-flight refuelling and so on, would not be classified as hostile action.
    [Show full text]
  • Chinese Intelligence, Surveillance, and Reconnaissance Systems Lt Col Thomas R
    DIGITAL-ONLY COMMENTARY Chinese Intelligence, Surveillance, and Reconnaissance Systems LT COL THOMAS R. MCCABE, USAFR, RETIRED he best weapons in the world are useless unless aimed accurately, which requires a sophisticated intelligence, surveillance, and reconnaissance (ISR) system to detect and track targets, preferably in as close to real time Tas possible. Even more important, at the strategic level, the People’s Republic of China (PRC) views war between modern states as a conflict between systems of systems,1 which means weapons and targeting require an accurate and compre- hensive view of those enemy systems to target them. China has been building a wide variety of ISR systems to provide its forces with such capabilities, including systems that we must expect will be available for military use even if nominally civilian. (China has said its policy of military-civil­­ fusion will include the outer space and maritime domains; so, we must assume that all the surveillance re- sources PRC civilian agencies have will be integrated into crisis/wartime military ISR.2) These systems include the following: Satellites. China has developed and deployed constellations of dual-­­use and military satellite reconnaissance systems, especially the Yaogan (“China remote-­­ sensing satellite”) systems, with both electro-­­optical imagery reconnaissance sat- ellites and synthetic aperture radar satellites.3 Many of the Yaogan satellites are also reported to be electronic intelligence satellites,4 intended to track and locate foreign warships by their
    [Show full text]
  • ATP 3-01.8 Techniques for Combined Arms for Air Defense Headquarters
    ATP 3-01.8 Techniques for Combined Arms for Air Defense DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited Headquarters, Department of the Army This publication is available at the Army Publishing Directorate site (http://), and the Central Army Registry site (https://atiam.train.army.mil/catalog/dashboard) To receive publishing updates, please subscribe at (http://www.apd.army.mil/AdminPubs/new_subscribe.asp) *ATP 3-01.8 Field Manual ATP 3-01.8 Headquarters Department of the Army Washington, DC, Techniques for Combined Arms for Air Defense Contents Page PREFACE.............................................................................................................. iii INTRODUCTION ................................................................................................... iv SUMMARY OF CHANGES .................................................................................... v Chapter 1 AERIAL THREATS AND DEFENSIVE PLANNING .......................................... 1-1 Anticipate Aerial Threats .................................................................................... 1-1 Analyze Air Threat Capabilities .......................................................................... 1-4 Threat Application ............................................................................................... 1-7 Defensive Planning ............................................................................................. 1-9 Chapter 2 TECHNIQUES FOR WARNING AND CONTROL ............................................
    [Show full text]
  • Cavalry Reconnaissance Troop Mechanized
    R D EP A RT ME NT F I E LD M A N UA L CAVALRY CAVALRY RECONNAISSANCE TROOP MECHANIZED WAR DEPARTMENT : 24 FEBRUARY 1944 CHANNON, R. r. WJ R D E PA R T M EN T F I E L D M A N U AL FM 2-20 This manual supersedes FM 17-20, 30 May 1942 CAVA L R Y CAVALRY RECONNAISSANCE TROOP, MECHANIZED WAR DEPARTMENT · 24 FEBRUARY 1944 United States Go-ernment Printing Offce IYashington : 1944 For sale by the Superintendent of Documents, U. S. Government Printing Office, Washington, 25 D. C. - Price 25 cents WAR DEPARTMENT, WASHINGTON 25, D. C., 24 February I944. FM 2-20, Cavalry Field Manual, Cavalry Reconnaissance Troops, Mechanized, is published for the information and guid- ance of all concerned. [A. G. 300.7 (11 Jan. 44).] BY ORDER OF THE SECRETARY OF WAR: G. C. MARSHALL, Chief of Staff. OFFICIAL: J. A. ULIO, Major General, The Adjutant General. DISTRIBUTION: B and H I, 2, 7, 17 (5); R I, 2, 7, I7, i8 (2); Bn 2, 7, 17, i8 (5); I C 2 (20). (For explanation of symbols see 2i-6.) Contents CHAPTER 1. GENERAL. Paragraph Page Section 1. Purpose and scope .................... - 2 1 II. Mission ............................. 3 2 111. Organization and equipment ........... 4- 6 2 IV. Training ............................ 7- 9 5 V. Duties of personnel ................... I- 14 I0 VI. Drill, ceremonies, inspections ........... I5 i6 CHAPTER 2. EMPLOYMENT OF CAVALRY RECON- NAISSANCE TROOP, MECHAN- IZED, INFANTRY DIVISION. Section 1. General .... ........................ I6- i8 17 II. Reconnaissance ....................... 19- 38 I8 III. Security ............................
    [Show full text]
  • Open PDF 71KB
    AJA0022 Written evidence submitted by Patrick Benham-Crosswell SUMMARY 1. Ajax is not fit for its primary purpose as an armoured reconnaissance vehicle. Whether it is suitable for the secondary role, providing direct firepower to strike brigades is questionable. 2. If the current problems afford an opportunity to cancel the project and procure an existing vehicle (or vehicles) it should be taken. 3. Suitable alternatives include something based on the Stormer (already in service with the British Army, so logistically compelling) or the new French Jaguar (which is wheeled, and therefore a closer fit into Boxer battlegroups and brigades). 4. This failed procurement is symptomatic of an Army not understanding what it needs, does or wants. The reasons for this are complex and beyond the scope of this document, but it’s premature and (probably) unjustified to lay blame at the door of the PE or GDLS. THE AUTHOR 5. I am an ex-Army officer with extensive experience in armoured reconnaissance. Specifically: a. I was a troop leader and squadron second in command of a reconnaissance regiment in Germany at the end of the Cold War. b. I was the second in command of a squadron in the WHITE ERMINE exercises investigating CVR(T) replacement in 1988. c. I was an expert contributor to subsequent computer simulations of reconnaissance at DERA Fort Halstead. d. I was a subject matter expert for DERA Fort Halstead on a series of simulations on FCLV, FLAV, MRAV and FRES (as well as other programmes). 6. I am in touch with military affairs and write for several publications.
    [Show full text]
  • Preparing for Contested War: Improving Command and Control of Dynamic
    PREPARING FOR CONTESTED WAR: IMPROVING COMMAND AND CONTROL OF DYNAMIC TARGETING Biography Name: Nicholas J. Hall Rank: Major Service: USAF Education: BA, International Studies, Baylor University, Waco, TX MA, Global Security Studies, American Military University, Charles Town, WV Current School: Air Command and Staff College Major Nicholas J. Hall is a career intelligence officer in the United Stated Air Force. Maj Hall received his commission in 2005 from ROTC at Baylor University, Waco, Texas. He has served at the unit level within AFSOC, as a targeting officer at the MAJCOM and joint level, as a Mission Intelligence Coordinator in an MQ-1B squadron, and as an analyst within USAFCENT and the PACOM Joint Intelligence Operations Center. Following his current assignment as a student in Air Command and Staff College, Maxwell AFB, Alabama, Maj Hall will move to Langley AFB to become the Director of Operations for the 15th Intelligence Squadron, 365th ISRG, 363rd ISRW, which is responsible for target systems analysis for 25th Air Force. Contact information: Maj Nicholas J. Hall 15 IS/DO DSN: 575-4365 Comm: 757-225-4365 [email protected] Abstract In a contested war, the joint force will need to identify, nominate, and strike a greater number of targets in a shorter amount of time than currently required. These conditions will stress the current command and control of a dynamic targeting process characterized by lengthy target development timelines that allow for high-confidence, centralized decision making. The traditional Air Force solution to this problem is to increase the targeting manpower and scope of responsibility at the AOC.
    [Show full text]
  • Obsolescent and Outgunned: the British Army's Armoured Vehicle
    House of Commons Defence Committee Obsolescent and outgunned: the British Army’s armoured vehicle capability Fifth Report of Session 2019–21 Report, together with formal minutes relating to the report Ordered by the House of Commons to be printed 9 March 2021 HC 659 Published on 14 March 2021 by authority of the House of Commons The Defence Committee The Defence Committee is appointed by the House of Commons to examine the expenditure, administration, and policy of the Ministry of Defence and its associated public bodies. Current membership Rt Hon Tobias Ellwood MP (Conservative, Bournemouth East) (Chair) Stuart Anderson MP (Conservative, Wolverhampton South West) Sarah Atherton MP (Conservative, Wrexham) Martin Docherty-Hughes MP (Scottish National Party, West Dunbartonshire) Richard Drax MP (Conservative, South Dorset) Rt Hon Mr Mark Francois MP (Conservative, Rayleigh and Wickford) Rt Hon Kevan Jones MP (Labour, North Durham) Mrs Emma Lewell-Buck MP (Labour, South Shields) Gavin Robinson MP (Democratic Unionist Party, Belfast East) Rt Hon John Spellar MP (Labour, Warley) Derek Twigg MP (Labour, Halton) Powers The committee is one of the departmental select committees, the powers of which are set out in House of Commons Standing Orders, principally in SO No 152. These are available on the Internet via www.parliament.uk. Publications © Parliamentary Copyright House of Commons 2021. This publication may be reproduced under the terms of the Open Parliament Licence, which is published at www.parliament.uk/site-information/copyright-parliament. Committee reports are published on the Committee’s website at committees.parliament.uk/committee/24/defence-committee/ and in print by Order of the House.
    [Show full text]