International Law on Use of Enemy Uniforms As a Stratagem and the Acquittal in the Skorzeny Case
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Luverne Ostby.Qxd
Luverne Ostby Luverne Ostby was born on 23 July 1922 and was raised in rural Minnesota. He left for military service in September 1941. After being sworn in at Fort Snelling, he was sent to Camp Claibourne Louisiana for his basic training. Early on in his training at Camp Claibourne he was called aside and confronted by an officer that asked him if he spoke Norwegian, upon which his reply was yes. The officer asked “Why don’t you answer in Norwegian?” and pointed to a large tent instructing him to go there. Inside was a tent full of Norwegian speaking soldiers including a neighbor, Bob Stay. The group was sent to Camp Ripley Minnesota to begin training. Ostby was chosen to become a part of the 99th Battalion separate, a unit specifically made up of soldiers able to speak Norwegian. The plan was for the unit to help with the Norwegian Occupation Code Named PLOUGH. Four objectives were expected for be obtained in this mission: first to elimi- nate Norway as an economic asset for Germany, second, force Germany to keep large numbers of troops on occupation duty in Norway and away from other active fronts, third, limit the ability of German troops in Norway to attack allied convoys transporting to the Russian port of Murmansk, and fourth, prepare for the future occupation of Norway, and create a link through Norway to Russia. In December 1942, the battalion including Luverne was transferred to Camp Hale Colorado. They were expected to receive extensive winter training and Ostby was issued skis for training. -
Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
Krinkelt–Rocherath in Belgium on December 17–18, 1944 During the German Ardennes Offensive
CONTENTS Introduction Chronology Design and Development Technical Specifications The Combatants The Strategic Situation Combat Statistics and Analysis Aftermath Further Reading INTRODUCTION The rocket-propelled grenade launcher (RPG) has become a ubiquitous weapon on the modern battlefield; and all of these weapons trace their lineage back to the American 2.36in rocket launcher, better known as the bazooka. The bazooka was the serendipitous conjunction of two new technologies: the shaped-charge antitank warhead and the shoulder-fired rocket launcher. This book looks at the development of this iconic weapon, and traces its combat use on the World War II battlefield. One of the widespread myths to have emerged about German tank design during World War II was the notion that German sideskirt armor was developed in response to the bazooka, and its British equivalent, the PIAT (Projector Infantry Antitank). American and British troops began encountering the new versions of German armored vehicles with extra armor shields in 1944, and so presumed that this new feature was in response to the Allied shaped-charge weapons. The shields received a variety of names including “bazooka shields,” “bazooka pants,” and “PIAT shields.” In reality, their development was not a response to Allied shaped-charge weapons, for most German innovations in tank technology during the war years were prompted by developments on the Eastern Front. This book examines the real story behind the bazooka shields. It also traces the many specialized devices developed by the Wehrmacht in World War II to deal with the threat of infantry close-attack weapons. A remarkable variety of curious devices was developed including a wood paste to defend against antitank charges, and a machine gun with a special curved barrel to allow armored vehicle crews to defend themselves from within the protective armor of their vehicle. -
JP 3-13.4, Military Deception
Joint Publication 3-13.4 Military Deception 26 January 2012 EXECUTIVE SUMMARY COMMANDER’S OVERVIEW • Provides an Overview of Military Deception (MILDEC) and the Goals, Objectives, Functions, and Principles • Describes the Relationship between MILDEC and Information Operations • Explains MILDEC Planning Methodology and Planning Steps • Discusses Execution of MILDEC Operations Military Deception and Its Goals, Objectives, Functions, and Principles Military deception Specific guidance from the joint force commander (JFC) or (MILDEC) is actions higher authority during planning will determine the military executed to deliberately deception (MILDEC) role in a joint operation. MILDEC mislead adversary is intended to deter hostile actions, increase the success military, paramilitary, or of friendly defensive actions, or to improve the success violent extremist of any potential friendly offensive action. Use of organization decision MILDEC during any phase of an operation should help to makers, thereby causing mislead adversaries as to the strength, readiness, locations, the adversary to take and intended missions of friendly forces. In combat specific actions (or situations, the focus is on driving the adversary to inactions) that will culmination and achieving the objectives defined by the contribute to the JFC. In noncombat situations, the JFC seeks to dominate accomplishment of the the situation with decisive operations designed to establish friendly mission. conditions for an early, favorable conclusion. MILDEC and Information Care should be taken to protect the quality of information Quality available for friendly decisions and public dissemination. This will help ensure the JFC has accurate information by not allowing staffs to unknowingly perceive the joint task force’s MILDEC efforts as accurate information. -
Operation Greif and the Trial of the “Most Dangerous Man in Europe.”
Operation Greif and the Trial of the “Most Dangerous Man in Europe.” A disheveled George S. Patton reported to Dwight Eisenhower with unsettling news from the front. “Ike, I’ve never seen such a goddamn foul-up! The Krauts are infiltrating behind our lines, raising hell, cutting wires and turning around road signs!”1 Such was the characteristic response in the aftermath of Operation Greif, orchestrated by Germany’s top commando, Otto Skorzeny. Through his actions during the Ardennes Offensive of 1944, and his acquittal while on trial, Skorzeny effectively utilized disinformation and covert operations to both earn his credibility and infamous reputation. Born in Vienna in 1908, Skorzeny led a mundane life during the years of the First World War. Despite his inability to concentrate on his studies, he managed to graduate in 1931 from the Technischen Hochschule in Wien with an engineering degree.2 His participation in the Schlagende Verbindungen (dueling societies) during his academic career gave Skorzeny the reputation of being a fierce fighter and resulted in his characteristic scars that covered both sides of his face. With the unification of Austria into Germany in 1938, Skorzeny had his first contact with the Nazi party. While visiting Vienna, he came upon Austrian President Miklas in the midst of an attempt on his life by Nazi roughnecks. Skorzeny, always a man of action, blocked the way of the would-be assassins and ended the confrontation. Word spread across the Germany of the bold Austrian who had saved the President’s life on a whim. 1 Glenn B Infield, Skorzeny (New York: St. -
Fm 6-27 Mctp 11-10C the Commander's Handbook on the Law of Land Warfare
FM 6-27 MCTP 11-10C THE COMMANDER'S HANDBOOK ON THE LAW OF LAND WARFARE AUGUST 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 27-10/MCTP 11-10C, dated 18 July 1956. HEADQUARTERS, DEPARTMENT OF THE ARMY HEADQUARTERS, UNITED STATES MARINE CORPS Foreword The lessons of protracted conflict confirm that adherence to the law of armed conflict (LOAC) by the land forces, both in intern ational and non-international armed conflict, must serve as the standard that we train to and apply across the entire range of military operations. Adhering to LOAC enhances the legitimacy of our operations and supports the moral framework of our armed forces. We have learned th at we deviate from these norms to our detriment and risk undercutting both domesti c and international support for our operations. LOAC has been and remains a vital guide for all military operations conducted by the U.S. Governm ent. This fi eld manual provides a general description of the law of land warfare for Soldiers and Marines, delineated as statements of doctrine and practice, to gui de the land forces in conducting di sci plined military operations in accordance with the rule of law. The Department of Defense Law of War Manual (June 20 15, updated December 2016) is the authoritative statement on the law of war for the Department of Defense. In the event of a conflict or discrepancy regarding the legal standards addressed in this publication and th e DOD Law of War Manual, the latter takes precedence. -
Constraints on the Waging of War, an Introduction to International
ISBN 2-88145-115-2 © International Committee of the Red Cross, Frits Kalshoven and Liesbeth Zegveld, Geneva, March 2001 3rd edition Frits Kalshoven and Liesbeth Zegveld CONSTRAINTS ON THE WAGING OF WAR An Introduction to International Humanitarian Law 19, Avenue de la Paix, CH-1202 Geneva T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] Web: www.icrc.org Design: Strategic Communications SA Original: English March 2001 Produced with environment-friendly materials I must retrace my steps, and must deprive those who wage war of nearly all the privileges which I seemed to grant, yet did not grant to them. For when I first set out to explain this part of the law of nations I bore witness that many things are said to be ‘lawful’ or ‘permissible’ for the reason that they are done with impunity, in part also because coactive tribunals lend to them their authority; things which nevertheless, either deviate from the rule of right (whether this has any basis in law strictly so called, or in the admonitions of other virtues), or at any rate may be omitted on higher grounds and with greater praise among good men. Grotius: De jure belli ac pacis Book III, Chapter X, Section I.1. (English translation: Francis G. Kelsey, Oxford, 1925). TABLE OF CONTENTS PREFACE ........................................................... 7 FOREWORD ........................................................... 9 CHAPTER I INTRODUCTION ........................................................ 11 I 1 Object and purpose ............................................... 12 I 2 Custom and treaty ................................................. 15 I 3 Implementation and enforcement ................................. 16 I 4 Structure .......................................................... 17 CHAPTER II THE MAIN CURRENTS: THE HAGUE, GENEVA, NEW YORK ..... -
Background of the Battle of the Bulge 16 Dec 44 – 28 Jan 45
First Division Museum Battle of the Bulge Resource Packet Section # 1, Page 1 Background of the Battle of the Bulge 16 Dec 44 – 28 Jan 45 The Situation After the invasion at Normandy on 6 June 1944, the Allied troops were moving quickly towards Germany to win the war on the Western Front. There was a debate over the best method to attack Germany. British Field Mar- shal Bernard Montgomery advocated a single-thrust strategy. Since the Allies had limited supplies coming in from their available ports, Montgomery wanted to concentrate those supplies with his army to allow him to move quickly into Germany and win the war. The danger of the single-thrust plan was that the German’s could get around Mont- gomery’s army. Supreme Allied Commander General Dwight D. Eisenhower favored a broad-front strategy, which was the strategy chosen for the offensive. The broad front strategy spread the Allied troops thin and moved slower than a single-thrust would have, but the advance kept all of the Allied line moving forward together. Obstacles Natural and man-made obstacles stood in the way of the Allied advance towards Germany. Natural obstacles included the Moselle and Meuse Rivers, the Vosges Mountains in Alsace, the wooded hills of the Ardennes, and the dense Hurtgen Forest near Aachen. Man-made obstacles include French defenses such as the old forts around Metz and the Maginot Line in northeastern France. The German Siegfried Line (the Germans called it the West Wall) and the Rhine River were also difficult obstacles for the Allies to get past. -
Anton Maegerle / Heribert Schiedel Krude Allianz Das Arabisch-Islamistische Bündnis Mit Deutschen Und Österreichischen Rechtsextremisten
www.doew.at Anton Maegerle / Heribert Schiedel Krude Allianz Das arabisch-islamistische Bündnis mit deutschen und österreichischen Rechtsextremisten Neues von ganz rechts, November 2001 „Die Deutschen wissen, wie man es macht, um die Juden loszuwerden.“ (M. A. al-Husseini, Mufti von Jerusalem, 1943 bewundernd in Berlin) Seit den Terrorakten gegen die USA wird über mögliche Vernetzungen zwi- schen deutschsprachigen Rechtsextremisten und islamistischen Fundamentalis- ten spekuliert. Denn die von klerikalfaschistischen Islamisten verursachten Ter- rorszenarien in New York und Washington könnten in ihrer Dramaturgie auch einem braunen Drehbuch entstammen. New York „in Schutt und Asche legen“ wollte kurz vor dem Ende der NS- Herrschaft Reichsführer SS Heinrich Himmler. „Die Amerikaner“, so Himmler, „müssen auch etwas vom Krieg zu spüren bekommen.“ Der „psychologische Effekt wäre enorm. Ich bin überzeugt, dass es die Amerikaner nicht ertragen könnten, in ihrem eigenen Land angegriffen zu werden.“ Adolf Hitler selbst fällte im März 1941 die Bemerkung, man müsse mit Terrorangriffen auf ameri- kanische Millionenstädte „den Juden“ eine „Lektion“ erteilen. Und gegenüber Albert Speer malte er „wie in einem Delirium sich und uns den Untergang New Yorks in Flammenstürmen“ aus. Antisemitische Vernichtungsphantasien 47 Jahre später lässt der Hitler-Verehrer William L. Pierce (Jg. 1933) in seinem rechtsterroristischen Machwerk „The Turner Diaries“ einen rechtsextremen 2 Anton Maegerle / Heribert Schiedel www.doew.at www.doew.at Krude Allianz 3 Kamikaze mit einem Flugzeug in das Pentagon stürzen. In einer apokalypti- schen Szene wird auch die Zerstörung von New York als dem „jüdisch domi- nierten und verseuchten Zentrum des Weltkapitals“ beschrieben. Lustvoll lässt Pierce unter seinem damaligen Pseudonym Andrew Macdonald die „100 Stock- werke der Wolkenkratzer“ in sich zusammenstürzen. -
Clemency in a Nazi War Crimes Trial By: Allison Ernest
Evading the Hangman’s Noose: Clemency in a Nazi War Crimes Trial By: Allison Ernest Ernest 2 Contents Introduction: The Foundations for a War Crimes Trial Program 3 Background and Historiography 10 Chapter 1: Investigations into Other Trials Erode the United States’ Resolve 17 Chapter 2: The Onset of Trial Fatigue Due to Public Outcry 25 Chapter 3: High Commissioner McCloy Authorizes Sentence Reviews 38 Chapter 4: McCloy and the United States Set the War Criminals Free 45 Conclusion: A Lesson to be Learned 52 Chart: A Complicated Timeline Simplified 57 Bibliography 58 Ernest 3 Introduction: The Foundations for a War Crimes Trial Program “There is a supervening affirmative duty to prosecute the doers of serious offenses that falls on those who are empowered to do so on behalf of a civilized community. This duty corresponds to our fundamental rights as citizens and as persons to receive and give respect to each other in view of our possession of such rights.” Such duty, outlined by contemporary philosopher Alan S. Rosenbaum, was no better exemplified than in the case of Nazi war criminals in the aftermath of World War II. Even before the floundering Axis powers of Germany and Japan declared their respective official surrenders in 1945, the leaders of the Allies prepared possible courses of action for the surviving criminals in the inevitable collapse of the Nazi regime. Since the beginning of the war in 1939, the Nazi regime in Germany implemented a policy of waging a war so barbaric in its execution that the total numbers of casualties rivaled whole populations of countries. -
Protecting the Global Information Space in Times of Armed Conflict
WORKING PAPERS Protecting the global information space in times of armed conflict ROBIN GEISS AND HENNING LAHMANN* FEBRUARY 2021 *The authors wish to thank Dr Kubo Mačák for his helpful comments on an earlier draft of the paper. TABLE OF CONTENTS Introduction ................................................................................................................................................ 1 Mapping the Threat Landscape: Risks to the Information Space in Contemporary Armed Conflict ......................................................................................................................................................... 3 Scenario A – Social Media-Enabled Foreign Electoral Interference ....................................................... 3 Scenario B – Large-scale Distortion of the Media Ecosystem ................................................................... 4 Scenario C – Manipulation of Civilian Behaviour to Gain Military Advantage ................................ 4 Scenario D – Compromising and Extorting of Civilian Individuals Through Information Warfare .....................................................................................................................................................................5 Scenario E – Disinformation as Incitement to Violence ........................................................................... 5 Variants of Distorting the Information Ecosystem in War and Peace............................................ 5 Protecting Information Spaces under Existing