Targeted Killings by Drones: a Domestic and International Legal Framework
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Train in Spain Fell Mainly Off the Rail (With Apologies to "My Fair Lady")
The Train in Spain Fell Mainly off the Rail (with apologies to "My Fair Lady") March 13, 2004 By Robbie Friedmann The horrendous terror atrocity that murdered about 200 and injured some 1600 on Madrid trains has already become Spain's 9-11, acquiring its own symbol of 3-11, and is seen by some as a "reminder" that the war on terrorism has not ended ("Spain's 3/11: A horrifying reminder that the war on terror is not over," Editorial, Wall Street Journal, 12 March 2004). As if reminders are needed. Initial reports from Spain blamed the multiple blasts on the Basque separatist group ETA and reports suggest that the Spanish foreign minister instructed all Spanish ambassadors to push this notion no matter what other evidence comes up (while keeping all investigation avenues "open"). This is partly because in Spain an act by ETA will be perceived as a unifying factor, while terrorism by Islamist groups may tilt the sentiment against the Spanish involvement in the war on terror. Given the elections slated for next week, the stakes are indeed very high. Even the U.N. Security Council rushed to condemn ETA even as it had no proof ETA was involved (see U.N. Resolution 1530). Nevertheless, initial non-Spanish reports suspected al-Qaeda involvement and shortly thereafter ETA denied any responsibility and al-Qaeda indeed quickly declared it ("Al-Qaeda Took Responsibility for Thursday's Madrid Bombings: 190 people killed, 1,400 injured in Madrid train bombings. Stolen car with detonators and tapes in Arabic found near Madrid," Ma'ariv Online, 11 March 2004), and respected Israeli analysts tended to accept it at face value. -
Swire. “The Declining Half-Life of Secrets”
CYBERSECURITY INITIATIVE New America Cybersecurity Fellows Paper Series - Number 1 THE DECLINING HALF -LIFE OF SECRETS And the Future of Signals Intelligence By Peter Swire July 2015 © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. ABOUT THE AUTHOR Peter Swire, Nancy J. and Lawrence P. Huang Professor of Law and Ethics, Scheller College of Business, Georgia Institute of Technology; Senior Counsel, Alston & Bird LLP; and New America Cybersecurity Fellow ABOUT THE CYBERSECURITY INITIATIVE ACKNOWLEDGEMENTS The Internet has connected us. Yet the policies and debates that sur- Many thanks to Ross Anderson, Ashkan round the security of our networks are too often disconnected, disjoint- Soltani and Lee Tien for assistance with ed, and stuck in an unsuccessful status quo. This is what New Ameri- this draft, and to the fellow members ca’s Cybersecurity Initiative is designed to address. -
N Ieman Reports
NIEMAN REPORTS Nieman Reports One Francis Avenue Cambridge, Massachusetts 02138 Nieman Reports THE NIEMAN FOUNDATION FOR JOURNALISM AT HARVARD UNIVERSITY VOL. 62 NO. 1 SPRING 2008 VOL. 62 NO. 1 SPRING 2008 21 ST CENTURY MUCKRAKERS THE NIEMAN FOUNDATION HARVARDAT UNIVERSITY 21st Century Muckrakers Who Are They? How Do They Do Their Work? Words & Reflections: Secrets, Sources and Silencing Watchdogs Journalism 2.0 End Note went to the Carnegie Endowment in New York but of the Oakland Tribune, and Maynard was throw- found times to return to Cambridge—like many, ing out questions fast and furiously about my civil I had “withdrawal symptoms” after my Harvard rights coverage. I realized my interview was lasting ‘to promote and elevate the year—and would meet with Tenney. She came to longer than most, and I wondered, “Is he trying to my wedding in Toronto in 1984, and we tried to knock me out of competition?” Then I happened to keep in touch regularly. Several of our class, Peggy glance over at Tenney and got the only smile from standards of journalism’ Simpson, Peggy Engel, Kat Harting, and Nancy the group—and a warm, welcoming one it was. I Day visited Tenney in her assisted living facility felt calmer. Finally, when the interview ended, I in Cambridge some years ago, during a Nieman am happy to say, Maynard leaped out of his chair reunion. She cared little about her own problems and hugged me. Agnes Wahl Nieman and was always interested in others. Curator Jim Tenney was a unique woman, and I thoroughly Thomson was the public and intellectual face of enjoyed her friendship. -
EASO Country of Origin Information Report Pakistan Security Situation
European Asylum Support Office EASO Country of Origin Information Report Pakistan Security Situation October 2018 SUPPORT IS OUR MISSION European Asylum Support Office EASO Country of Origin Information Report Pakistan Security Situation October 2018 More information on the European Union is available on the Internet (http://europa.eu). ISBN: 978-92-9476-319-8 doi: 10.2847/639900 © European Asylum Support Office 2018 Reproduction is authorised, provided the source is acknowledged, unless otherwise stated. For third-party materials reproduced in this publication, reference is made to the copyrights statements of the respective third parties. Cover photo: FATA Faces FATA Voices, © FATA Reforms, url, CC BY-NC-SA 2.0 Neither EASO nor any person acting on its behalf may be held responsible for the use which may be made of the information contained herein. EASO COI REPORT PAKISTAN: SECURITY SITUATION — 3 Acknowledgements EASO would like to acknowledge the Belgian Center for Documentation and Research (Cedoca) in the Office of the Commissioner General for Refugees and Stateless Persons, as the drafter of this report. Furthermore, the following national asylum and migration departments have contributed by reviewing the report: The Netherlands, Immigration and Naturalization Service, Office for Country Information and Language Analysis Hungary, Office of Immigration and Nationality, Immigration and Asylum Office Documentation Centre Slovakia, Migration Office, Department of Documentation and Foreign Cooperation Sweden, Migration Agency, Lifos -
Targeted Killings
Published on How does law protect in war? - Online casebook (https://casebook.icrc.org) Home > Targeted killings The intentional and pre-meditated use of lethal force, by a State or organized armed group against a specific individual outside their physical custody. Targeted killings occur both within and outside of armed conflicts [1]. Under IHL, they are problematic as, oftentimes, those targeted are geographically far removed from hostilities, and/or not necessarily directly participating in hostilities [2] at the time they are targeted. In the context of the war on terror [3], targeted killings against suspected terrorists [4], including “unlawful combatants [5]”, have occurred regularly. Drones [6] are frequently relied on to undertake such killings. See Armed conflict [1]; Unlawful combatants [5]; War on terror [3]; Drones [6]; Terrorism and terrorists [4]. CASES Israel, The Targeted Killings Case [7] UN, Statement of a Special Rapporteur on Drone Attacks [8] General Assembly, The use of drones in counter-terrorism operations [9] U.S., Lethal Operations against Al-Qa’ida Leaders [10] United States of America, The Death of Osama bin Laden [11] ICRC, International Humanitarian Law and the challenges of contemporary armed conflicts in 2015 [12] (Paras. 60-64 [13]) Iraq/Syria/UK, Drone Operations against ISIS [14] BIBLIOGRAPHIC RESOURCES JACKSON Jami Melissa, “The Legality of Assassination of Independent Terrorist Leaders: an Examination of National and International Implications”, in North Carolina Journal of International Law and Commercial Regulation, Vol. 24/3, 1999, pp. 669-697. KRETZMER David, “Targeted Killing of Suspected Terrorists: Extra-Judicial Executions or Legitimate Means of Defence?”, in EJIL, Vol. -
Noam Chomsky: Turning the Tide
NOAM CHOMSKY TURNING THE TIDE US Intervention in Central America and the Struggle for Peace ESSENTIAL CLASSICS IN POLITICS: NOAM CHOMSKY EB 0007 ISBN 0 7453 1345 0 London 1999 The Electric Book Company Ltd Pluto Press Ltd 20 Cambridge Drive 345 Archway Rd London SE12 8AJ, UK London N6 5AA, UK www.elecbook.com www.plutobooks.com © Noam Chomsky 1999 Limited printing and text selection allowed for individual use only. All other reproduction, whether by printing or electronically or by any other means, is expressly forbidden without the prior permission of the publishers. This file may only be used as part of the CD on which it was first issued. TURNING THE TIDE US Intervention in Central America and the Struggle for Peace Noam Chomsky 4 Copyright 1985 by Noam Chomsky Manufactured in the USA Production at South End Press, Boston Library of Congress Cataloguing in Publication Data Chomsky, Noam Turning the tide. Bibliography: p. Includes index. 1. Central America—Politics and government—1979- . 2. Violence—Central America—History—20th century. 3. Civil rights—Central America—History—20th century. 4. Central America—Foreign relations—United States. 5. United States— Foreign relations—Central America. I. Title F1 436. 8. U6 1985 327. 728073 ISBN: 0-7453-0184-3 Digital processing by The Electric Book Company 20 Cambridge Drive, London SE12 8AJ, UK www.elecbook.com Classics in Politics: Turning the Tide Noam Chomsky 5 Contents Click on number to go to page Introduction................................................................................. 8 1. Free World Vignettes .............................................................. 11 1. The Miseries of Traditional Life.............................................. 15 2. Challenge and Response: Nicaragua...................................... -
The Evolution of Law and Policy for CIA Targeted Killing
09__RADSAN__MURPHY_V12_01-09-12.DOCX (DO NOT DELETE) 2/9/2012 3:54 PM The Evolution of Law and Policy for CIA Targeted Killing Afsheen John Radsan* and Richard Murphy** INTRODUCTION Just suppose. The Attorney General, lanky as the President, walks into the Oval Office to join a meeting. The top law enforcement officer is slumped down with apparent bad news. He avoids eye contact with the Commander-in-Chief. “Mr. President,” he says looking down at the coffee table, “the ACLU believes our drone program is illegal.” Silence. (The President and the Attorney General both, of course, maintain links to the human rights community, an important part of their political base.) The President’s other advisers fidget and twitch. The Vice President adjusts the coaster under his drink. Beads of perspiration form on some faces. The Secretary of State and the Secretary of Defense look for the exit; the law is not their thing. The President is cool. “Could you be more specific,” he says, tapping his finger on a black briefing book. The Attorney General looks up from the table. “The drone strikes in Pakistan. Remember, the program Leon was not supposed to talk about with the media.”1 The President smiles. “Yes, I know that. But which laws are they talking about?” After an awkward pause, the President, himself a highly sophisticated lawyer, suggests, “Let’s talk this through some more.” The Attorney General agrees. After the lawyer-to-lawyer exchange, the other advisers relax. Maybe the CIA drone strikes are not illegal after all. Or maybe the apparent illegality does not matter that much. -
Extrajudicial Killing with Near Impunity: Excessive Force by Israeli Law Enforcement Against Palestinians
\\jciprod01\productn\B\BIN\35-1\BIN104.txt unknown Seq: 1 7-FEB-17 13:24 EXTRAJUDICIAL KILLING WITH NEAR IMPUNITY: EXCESSIVE FORCE BY ISRAELI LAW ENFORCEMENT AGAINST PALESTINIANS Emily Schaeffer Omer-Man* I. INTRODUCTION ............................................ 116 R II. RECENT ALLEGED EXTRAJUDICIAL KILLINGS IN ISRAEL- PALESTINE ................................................ 119 R III. A PATTERN OF EXCESSIVE FORCE AGAINST PALESTINIANS ............................................. 135 R A. Arenas of Excessive Violence against Palestinians ...... 136 R B. The Disparity in Law Enforcement Responses to Palestinians versus Jews ............................... 140 R * The author holds a JD from the University of California, Berkeley School of Law (Boalt), and is an American-Israeli human rights attorney at the Michael Sfard Law Office in Tel Aviv, where she currently serves as senior counsel and acting director. She has been a member of the legal team of Israeli human rights NGO, Yesh Din, for over a decade, and for the last eight years has served as Legal Director of the organization’s Accountability of Security Personnel project. In that capacity, she has represented over 500 Palestinian victims of alleged crimes committed against them or their property by Israeli police, soldiers, and other security personnel. The author is also a legal advisor to Israeli NGOs Breaking the Silence and Peace Now, among others, and represents individuals and communities in bringing human rights claims before the Israeli courts, specializing in International Humanitarian Law and International Human Rights Law and their application to the territories occupied by Israel in 1967. The author wishes to express her gratitude to Shelley Cavalieri, Miri Sharon and Michael Schaeffer Omer-Man for their excellent comments and feedback on previous drafts of this Article, as well as to the remarkable editors of the Boston University International Law Journal for their collaboration on this project and their dedication to bringing this important issue to light. -
Download Thepdf
Volume 59, Issue 5 Page 1395 Stanford Law Review KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker © 2007 by the Board of Trustees of the Leland Stanford Junior University, from the Stanford Law Review at 59 STAN. L. REV. 1395 (2007). For information visit http://lawreview.stanford.edu. KEEPING CONTROL OF TERRORISTS WITHOUT LOSING CONTROL OF CONSTITUTIONALISM Clive Walker* INTRODUCTION: THE DYNAMICS OF COUNTER-TERRORISM POLICIES AND LAWS................................................................................................ 1395 I. CONTROL ORDERS ..................................................................................... 1403 A. Background to the Enactment of Control Orders............................... 1403 B. The Replacement System..................................................................... 1408 1. Control orders—outline................................................................ 1408 2. Control orders—contents and issuance........................................ 1411 3. Non-derogating control orders..................................................... 1416 4. Derogating control orders............................................................ 1424 5. Criminal prosecution.................................................................... 1429 6. Ancillary issues............................................................................. 1433 7. Review by Parliament and the Executive...................................... 1443 C. Judicial Review.................................................................................. -
USAF Counterproliferation Center CPC Outreach Journal #262
#262 23 May 2003 USAF COUNTERPROLIFERATION CENTER CPC OUTREACH JOURNAL Air University Air War College Maxwell AFB, Alabama Welcome to the CPC Outreach Journal. As part of USAF Counterproliferation Center’s mission to counter weapons of mass destruction through education and research, we’re providing our government and civilian community a source for timely counterproliferation information. This information includes articles, papers and other documents addressing issues pertinent to US military response options for dealing with nuclear, biological and chemical threats and attacks. It’s our hope this information resource will help enhance your counterproliferation issue awareness. Established here at the Air War College in 1998, the USAF/CPC provides education and research to present and future leaders of the Air Force, as well as to members of other branches of the armed services and Department of Defense. Our purpose is to help those agencies better prepare to counter the threat from weapons of mass destruction. Please feel free to visit our web site at www.au.af.mil/au/awc/awcgate/awc-cps.htm for in-depth information and specific points of contact. Please direct any questions or comments on CPC Outreach Journal Jo Ann Eddy, CPC Outreach Editor, at (334) 953-7538 or DSN 493-7538. To subscribe, change e-mail address, or unsubscribe to this journal or to request inclusion on the mailing list for CPC publications, please contact Mrs. Eddy. The following articles, papers or documents do not necessarily reflect official endorsement of the United States Air Force, Department of Defense, or other US government agencies. Reproduction for private use or commercial gain is subject to original copyright restrictions. -
Questioning the National Security Agency's Metadata Program
I/S: A JOURNAL OF LAW AND POLICY FOR THE INFORMATION SOCIETY Secret without Reason and Costly without Accomplishment: Questioning the National Security Agency’s Metadata Program JOHN MUELLER & MARK G. STEWART* I. INTRODUCTION When Edward Snowden’s revelations emerged in June 2013 about the extent to which the National Security Agency was secretly gathering communications data as part of the country’s massive 9/11- induced effort to catch terrorists, the administration of Barack Obama set in motion a program to pursue him to the ends of the earth in order to have him prosecuted to the full extent of the law for illegally exposing state secrets. However, the President also said that the discussions about the programs these revelations triggered have actually been a good thing: “I welcome this debate. And I think it’s healthy for our democracy. I think it’s a sign of maturity because probably five years ago, six years ago, we might not have been having this debate.”1 There may be something a bit patronizing in the implication that the programs have been secret because we were not yet mature enough to debate them when they were put into place. Setting that aside, however, a debate is surely to be welcomed—indeed, much overdue. It should be conducted not only about the National Security Agency’s (NSA) amazingly extensive data-gathering programs to * John Mueller is a professor of political science at Ohio State University and a Senior Fellow at the Cato Insitute. Mark G. Stewart is a professor of engineering at the University of Newcastle, Australia. -
Homeland Security Implications of Radicalization
THE HOMELAND SECURITY IMPLICATIONS OF RADICALIZATION HEARING BEFORE THE SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED NINTH CONGRESS SECOND SESSION SEPTEMBER 20, 2006 Serial No. 109–104 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpoaccess.gov/congress/index.html U.S. GOVERNMENT PRINTING OFFICE 35–626 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY PETER T. KING, New York, Chairman DON YOUNG, Alaska BENNIE G. THOMPSON, Mississippi LAMAR S. SMITH, Texas LORETTA SANCHEZ, California CURT WELDON, Pennsylvania EDWARD J. MARKEY, Massachusetts CHRISTOPHER SHAYS, Connecticut NORMAN D. DICKS, Washington JOHN LINDER, Georgia JANE HARMAN, California MARK E. SOUDER, Indiana PETER A. DEFAZIO, Oregon TOM DAVIS, Virginia NITA M. LOWEY, New York DANIEL E. LUNGREN, California ELEANOR HOLMES NORTON, District of JIM GIBBONS, Nevada Columbia ROB SIMMONS, Connecticut ZOE LOFGREN, California MIKE ROGERS, Alabama SHEILA JACKSON-LEE, Texas STEVAN PEARCE, New Mexico BILL PASCRELL, JR., New Jersey KATHERINE HARRIS, Florida DONNA M. CHRISTENSEN, U.S. Virgin Islands BOBBY JINDAL, Louisiana BOB ETHERIDGE, North Carolina DAVE G. REICHERT, Washington JAMES R. LANGEVIN, Rhode Island MICHAEL MCCAUL, Texas KENDRICK B. MEEK, Florida CHARLIE DENT, Pennsylvania GINNY BROWN-WAITE, Florida SUBCOMMITTEE ON INTELLIGENCE, INFORMATION SHARING, AND TERRORISM RISK ASSESSMENT ROB SIMMONS, Connecticut, Chairman CURT WELDON, Pennsylvania ZOE LOFGREN, California MARK E.