Principles and Sources of the Law of Armed Conflict
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
JP 3-13.4, Military Deception
Joint Publication 3-13.4 Military Deception 26 January 2012 EXECUTIVE SUMMARY COMMANDER’S OVERVIEW • Provides an Overview of Military Deception (MILDEC) and the Goals, Objectives, Functions, and Principles • Describes the Relationship between MILDEC and Information Operations • Explains MILDEC Planning Methodology and Planning Steps • Discusses Execution of MILDEC Operations Military Deception and Its Goals, Objectives, Functions, and Principles Military deception Specific guidance from the joint force commander (JFC) or (MILDEC) is actions higher authority during planning will determine the military executed to deliberately deception (MILDEC) role in a joint operation. MILDEC mislead adversary is intended to deter hostile actions, increase the success military, paramilitary, or of friendly defensive actions, or to improve the success violent extremist of any potential friendly offensive action. Use of organization decision MILDEC during any phase of an operation should help to makers, thereby causing mislead adversaries as to the strength, readiness, locations, the adversary to take and intended missions of friendly forces. In combat specific actions (or situations, the focus is on driving the adversary to inactions) that will culmination and achieving the objectives defined by the contribute to the JFC. In noncombat situations, the JFC seeks to dominate accomplishment of the the situation with decisive operations designed to establish friendly mission. conditions for an early, favorable conclusion. MILDEC and Information Care should be taken to protect the quality of information Quality available for friendly decisions and public dissemination. This will help ensure the JFC has accurate information by not allowing staffs to unknowingly perceive the joint task force’s MILDEC efforts as accurate information. -
Nuremberg Icj Timeline 1474-1868
NUREMBERG ICJ TIMELINE 1474-1868 1474 Trial of Peter von Hagenbach In connection with offenses committed while governing ter- ritory in the Upper Alsace region on behalf of the Duke of 1625 Hugo Grotius Publishes On the Law of Burgundy, Peter von Hagenbach is tried and sentenced to death War and Peace by an ad hoc tribunal of twenty-eight judges representing differ- ent local polities. The crimes charged, including murder, mass Dutch jurist and philosopher Hugo Grotius, one of the principal rape and the planned extermination of the citizens of Breisach, founders of international law with such works as Mare Liberum are characterized by the prosecution as “trampling under foot (On the Freedom of the Seas), publishes De Jure Belli ac Pacis the laws of God and man.” Considered history’s first interna- (On the Law of War and Peace). Considered his masterpiece, tional war crimes trial, it is noted for rejecting the defense of the book elucidates and secularizes the topic of just war, includ- superior orders and introducing an embryonic version of crimes ing analysis of belligerent status, adequate grounds for initiating against humanity. war and procedures to be followed in the inception, conduct, and conclusion of war. 1758 Emerich de Vattel Lays Foundation for Formulating Crime of Aggression In his seminal treatise The Law of Nations, Swiss jurist Emerich de Vattel alludes to the great guilt of a sovereign who under- 1815 Declaration Relative to the Universal takes an “unjust war” because he is “chargeable with all the Abolition of the Slave Trade evils, all the horrors of the war: all the effusion of blood, the The first international instrument to condemn slavery, the desolation of families, the rapine, the acts of violence, the rav- Declaration Relative to the Universal Abolition of the Slave ages, the conflagrations, are his works and his crimes . -
International Treaties Signed by the State of Palestine
INTERNATIONAL TREATIES SIGNED BY THE STATE OF PALESTINE Area Name of Treaty and Date of its Adoption Entry into force 1. Convention Against Torture and other Cruel, Inhuman or Degrading 2 May 2014 Treatment or Punishment (CAT), 10 December 1984 2. Convention on the Elimination of All Forms of Discrimination Against 2 May 2014 Women (CEDAW), 18 December 1979. 3. Convention on the Political Rights of Women, 31 March 1953 2 April 2015 4. Convention on the Rights of the Child, 20 November 1989. 2 May 2014 Human 5. Convention on the Rights of Persons with Disabilities, 13 December 2 May 2014 Rights 2006. 6. International Covenant on Civil and Political Rights (ICCPR), 16 Decem- 2 July 2014 ber 1966. 7. International Convention on the Elimination of all Forms of Racial Dis- 2 May 2014 crimination, 7 March 1966. 8. International Covenant on Economic, Social and Cultural Rights 2 July 2014 (ICESCR), 16 December 1966. 9. Optional Protocol to the Convention of the Rights of the Child on the 7 May 2014 Involvement of Children in Armed Conflict, 25 May 2000 10. Hague Convention (IV) respecting the Laws and Customs of War on - Land and its annex: Regulations concerning the Laws and Customs of War on Land. The Hague, 18 October 1907 11. Geneva Convention (I) for the Amelioration of the Condition of the 2 April 2014 Wounded and Sick in Armed Forces in the Field, 12 August 1949 12. Geneva Convention (II) for the Amelioration of the Condition of 2 April 2014 Wounded, Sick and Shipwrecked Members of Armed Forces at Sea, 12 August 1949 Interna- 13. -
Fm 6-27 Mctp 11-10C the Commander's Handbook on the Law of Land Warfare
FM 6-27 MCTP 11-10C THE COMMANDER'S HANDBOOK ON THE LAW OF LAND WARFARE AUGUST 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 27-10/MCTP 11-10C, dated 18 July 1956. HEADQUARTERS, DEPARTMENT OF THE ARMY HEADQUARTERS, UNITED STATES MARINE CORPS Foreword The lessons of protracted conflict confirm that adherence to the law of armed conflict (LOAC) by the land forces, both in intern ational and non-international armed conflict, must serve as the standard that we train to and apply across the entire range of military operations. Adhering to LOAC enhances the legitimacy of our operations and supports the moral framework of our armed forces. We have learned th at we deviate from these norms to our detriment and risk undercutting both domesti c and international support for our operations. LOAC has been and remains a vital guide for all military operations conducted by the U.S. Governm ent. This fi eld manual provides a general description of the law of land warfare for Soldiers and Marines, delineated as statements of doctrine and practice, to gui de the land forces in conducting di sci plined military operations in accordance with the rule of law. The Department of Defense Law of War Manual (June 20 15, updated December 2016) is the authoritative statement on the law of war for the Department of Defense. In the event of a conflict or discrepancy regarding the legal standards addressed in this publication and th e DOD Law of War Manual, the latter takes precedence. -
Constraints on the Waging of War, an Introduction to International
ISBN 2-88145-115-2 © International Committee of the Red Cross, Frits Kalshoven and Liesbeth Zegveld, Geneva, March 2001 3rd edition Frits Kalshoven and Liesbeth Zegveld CONSTRAINTS ON THE WAGING OF WAR An Introduction to International Humanitarian Law 19, Avenue de la Paix, CH-1202 Geneva T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] Web: www.icrc.org Design: Strategic Communications SA Original: English March 2001 Produced with environment-friendly materials I must retrace my steps, and must deprive those who wage war of nearly all the privileges which I seemed to grant, yet did not grant to them. For when I first set out to explain this part of the law of nations I bore witness that many things are said to be ‘lawful’ or ‘permissible’ for the reason that they are done with impunity, in part also because coactive tribunals lend to them their authority; things which nevertheless, either deviate from the rule of right (whether this has any basis in law strictly so called, or in the admonitions of other virtues), or at any rate may be omitted on higher grounds and with greater praise among good men. Grotius: De jure belli ac pacis Book III, Chapter X, Section I.1. (English translation: Francis G. Kelsey, Oxford, 1925). TABLE OF CONTENTS PREFACE ........................................................... 7 FOREWORD ........................................................... 9 CHAPTER I INTRODUCTION ........................................................ 11 I 1 Object and purpose ............................................... 12 I 2 Custom and treaty ................................................. 15 I 3 Implementation and enforcement ................................. 16 I 4 Structure .......................................................... 17 CHAPTER II THE MAIN CURRENTS: THE HAGUE, GENEVA, NEW YORK ..... -
Republic of Kazakhstan
Deposited on 26 November 2020 Republic of Kazakhstan Status of List of Reservations and Notifications This document contains the consolidated list of reservations and notifications made by Republic of Kazakhstan upon deposit of the instrument of ratification pursuant to Articles 28(5) and 29(1) of the Convention, and subsequent to that deposit. 1 Deposited on 26 November 2020 Article 2 – Interpretation of Terms Notification - Agreements Covered by the Convention Pursuant to Article 2(1)(a)(ii) of the Convention, Republic of Kazakhstan wishes the following agreements to be covered by the Convention: Other Original/ Date of Date of Title Contracting Amending Entry into Signature Jurisdiction Instrument Force 1 Конвенция между Правительством Республики Армения и Правительством Республики Казахстан об избежании двойного Armenia Original 06-11-2006 19-01-2011 налогообложения и предотвращении уклонения от налогообложения в отношении налогов на доходы и на имущество 2 Convention between the Republic of Austria and the Republic of Austria Original 10-09-2004 01-03-2006 Kazakhstan with respect to Taxes on Income and on Capital 3 Конвенция между Original 16-09-1996 07-05-1997 Правительством Республики Азербайджан и Правительством Казахстанской Республики об избежании двойного Azerbaijan Amending налогообложения и 03-04-2017 27-04-20181 Instrument (a) предотвращении уклонения от налогообложения в отношении налогов на доходы и на имущество 4 Соглашение между Original 11-04-1997 13-12-1997 Правительством Республики Казахстан и Правительством Республики -
A HRC WG 6 34 KAZ 2 Kazakhstan Annex E
Tables for UN Compilation on Kazakhstan I. Scope of international obligations1 A. International human rights treaties2 Status during previous cycle Action after review Not ratified/not accepted Ratification, accession or ICERD (1998) CRPD (2015) ICCPR -OP 2 succession ICESCR (2006) ICRMW/* ICCPR (2006) CEDAW (1998) CAT (1998) OP-CAT (2008) CRC (1994) OP-CRC-AC (2003) OP-CRC-SC (2001) CRPD (signature, 2008) ICPPED (2009) Complaints procedures, ICERD, art. 14 (2008) OP-ICESCR (signature, inquiries and 2010) OP-ICESCR (signature, urgent action3 2010) ICCPR, art. 41 ICCPR-OP 1 (2009) OP-CRC-IC OP-CEDAW, art. 8 (2001) ICRMW CAT, arts. 20 (1998), 21 OP-CRPD (signature, 2008) and 22 (2008) ICPPED, arts. 31 and 32 OP-CRPD (signature, 2008) Reservations and / or declarations Status during previous cycle Action after review Current Status ICCPR -OP 1 (Declaration, ICCPR -OP 1 (Declaration, art. 1, 2009) art. 1) OP-CAT (Declaration, art. OP-CAT (Declaration, art. 24.1, 2010) 24.1) OP-CRC-AC (Declaration, OP-CRC-AC (Declaration, art.3.2, minimum age of art.3.2, minimum age of recruitment at 19 years recruitment at 19 years) 2003) B. Other main relevant international instruments Status during previous cycle Action after review Not ratified Ratification, accession or Convention on the Convention against Rome Statute of the succession Prevention and Punishment Discrimination in Education International Criminal Court of the Crime of Genocide (2016) Conventions on stateless persons4 ILO Conventions Nos. 169 and 1895 Geneva Conventions of 12 August 1949 and Additional Protocols thereto6 Conventions on refugees7 Palermo Protocol8 ILO fundamental Conventions9 II. -
Protecting the Global Information Space in Times of Armed Conflict
WORKING PAPERS Protecting the global information space in times of armed conflict ROBIN GEISS AND HENNING LAHMANN* FEBRUARY 2021 *The authors wish to thank Dr Kubo Mačák for his helpful comments on an earlier draft of the paper. TABLE OF CONTENTS Introduction ................................................................................................................................................ 1 Mapping the Threat Landscape: Risks to the Information Space in Contemporary Armed Conflict ......................................................................................................................................................... 3 Scenario A – Social Media-Enabled Foreign Electoral Interference ....................................................... 3 Scenario B – Large-scale Distortion of the Media Ecosystem ................................................................... 4 Scenario C – Manipulation of Civilian Behaviour to Gain Military Advantage ................................ 4 Scenario D – Compromising and Extorting of Civilian Individuals Through Information Warfare .....................................................................................................................................................................5 Scenario E – Disinformation as Incitement to Violence ........................................................................... 5 Variants of Distorting the Information Ecosystem in War and Peace............................................ 5 Protecting Information Spaces under Existing -
Pirates and Impunity: Is the Threat of Asylum Claims a Reason to Allow Pirates to Escape Justice
Pirates and Impunity: Is the Threat of Asylum Claims a Reason to Allow Pirates to Escape Justice Yvonne M. Dutton Abstract Pirates are literally getting away with murder. Modern pirates are attacking vessels, hijacking ships at gunpoint, taking hostages, and injuring and killing crew members.1 They are doing so with increasing frequency. According to the International Maritime Bureau (“IMB”) Piracy Reporting Center’s 2009 Annual Report, there were 406 pirate attacks in 2009—a number that has not been reached since 2003. Yet, in most instances, a culture of impunity reigns whereby nations are not holding pirates accountable for the violent crimes they commit. Only a small portion of those people committing piracy are actually captured and brought to trial, as opposed to captured and released. For example, in September 2008, a Danish warship captured ten Somali pirates, but then later released them on a Somali beach, even though the pirates were found with assault weapons and notes stating how they would split their piracy proceeds with warlords on land. Britain’s Royal Navy has been accused of releasing suspected pirates,7 as have Canadian naval forces. Only very recently, Russia released captured Somali pirates—after a high-seas shootout between Russian marines and pirates that had attacked a tanker carrying twenty-three crew and US$52 million worth of oil.9 In May 2010, the United States released ten captured pirates it had been holding for weeks after concluding that its search for a nation to prosecute them was futile. In fact, between March and April 2010, European Union (“EU”) naval forces captured 275 alleged pirates, but only forty face prosecution. -
ICRC Statement -- Status of the Protocols Additional
United Nations General Assembly 73rd Session Sixth Committee General debate on the Status of the Protocols additional to the Geneva Conventions of 1949 and relating to the protection of victims of armed conflicts [Agenda item 83, to be considered in October 2018] Statement by the International Committee of the Red Cross (ICRC) October 2018 Mr / Madam Chair, On the occasion of the 40th anniversary of the Additional Protocols of 1977, the ICRC took several steps to promote the universalization and implementation of these instruments. Its initiatives included the publication of a policy paper on the impact and practical relevance of the Additional Protocols, raising the question of accession in its dialogue with States, and highlighting the relevance of these instruments through national and regional events. Among other steps taken, the ICRC wrote to States not yet party to the Additional Protocols encouraging them to adhere to these instruments. We reiterate our call to States that have not yet done so, to ratify the Additional Protocols and other key instruments of IHL. At the time of writing, 174 States are party to Additional Protocol I and 168 States are party to Additional Protocol II. Since our last intervention, Burkina Faso and Madagascar became States number 73 and 74 to ratify Additional Protocol III. In April 2018, Palestine made a declaration pursuant to Article 90 of Additional Protocol I making it the 77th State to accept the competence of the International Humanitarian Fact-Finding Commission. We welcome the fact that the number of States party to this and other key instruments of IHL has continued to grow.