Redefining Information Warfare Boundaries for an Army in a Wireless World

Total Page:16

File Type:pdf, Size:1020Kb

Redefining Information Warfare Boundaries for an Army in a Wireless World CHILDREN AND FAMILIES The RAND Corporation is a nonprofit institution that EDUCATION AND THE ARTS helps improve policy and decisionmaking through ENERGY AND ENVIRONMENT research and analysis. HEALTH AND HEALTH CARE This electronic document was made available from INFRASTRUCTURE AND www.rand.org as a public service of the RAND TRANSPORTATION Corporation. INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY Skip all front matter: Jump to Page 16 POPULATION AND AGING PUBLIC SAFETY SCIENCE AND TECHNOLOGY Support RAND Purchase this document TERRORISM AND HOMELAND SECURITY Browse Reports & Bookstore Make a charitable contribution For More Information Visit RAND at www.rand.org Explore the RAND Arroyo Center View document details Limited Electronic Distribution Rights This document and trademark(s) contained herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is provided for non-commercial use only. Unauthorized posting of RAND electronic documents to a non-RAND website is prohibited. RAND electronic documents are protected under copyright law. Permission is required from RAND to reproduce, or reuse in another form, any of our research documents for commercial use. For information on reprint and linking permissions, please see RAND Permissions. This product is part of the RAND Corporation monograph series. RAND monographs present major research findings that address the challenges facing the public and private sectors. All RAND mono- graphs undergo rigorous peer review to ensure high standards for research quality and objectivity. REDEFINING INFORMATION WARFARE BOUNDARIES FOR AN ARMY IN A WIRELESS WORLD Isaac R. Porche III, Christopher Paul, Michael York, Chad C. Serena, Jerry M. Sollinger, Elliot Axelband, Endy Y. Min, Bruce J. Held Prepared for the United States Army Approved for public release; distribution unlimited ARROYO CENTER The research described in this report was sponsored by the United States Army under Contract No. W74V8H-06-C-0001. The findings and views expressed in this report are those of the authors and do not necessarily reflect the views of the Army or the U.S. Department of Defense. Library of Congress Cataloging-in-Publication Data Porche, Isaac, 1968- Redefining information warfare boundaries for an Army in a wireless world / Isaac R. Porche III, Christopher Paul, Michael York, Chad C. Serena, Jerry M. Sollinger, Elliot Axelband, Endy Y. Min, Bruce J. Held. pages cm Includes bibliographical references. ISBN 978-0-8330-5912-3 (pbk. : alk. paper) 1. Information warfare—United States. 2. Military doctrine—United States. 3. United States. Army—Communication systems. 4. Computer networks—Security measures—United States—Planning. 5. Cyberspace—Security measures—United States. I. Paul, Christopher, 1971- II. Title. UA23.P58 2013 355.3'43—dc23 2013000702 The RAND Corporation is a nonprofit institution that helps improve policy and decisionmaking through research and analysis. RAND’s publications do not necessarily reflect the opinions of its research clients and sponsors. R® is a registered trademark. © Copyright 2013 RAND Corporation Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Copies may not be duplicated for commercial purposes. Unauthorized posting of RAND documents to a non-RAND website is prohibited. RAND documents are protected under copyright law. For information on reprint and linking permissions, please visit the RAND permissions page (http://www.rand.org/publications/ permissions.html). Published 2013 by the RAND Corporation 1776 Main Street, P.O. Box 2138, Santa Monica, CA 90407-2138 1200 South Hayes Street, Arlington, VA 22202-5050 4570 Fifth Avenue, Suite 600, Pittsburgh, PA 15213-2665 RAND URL: http://www.rand.org To order RAND documents or to obtain additional information, contact Distribution Services: Telephone: (310) 451-7002; Fax: (310) 451-6915; Email: order@rand.org Preface As the Army observed in the 2010 cyberspace operations concept capa- bility plan, society’s dependence on the wireless and wired mediums is converging. Computer and telecommunication networks are becom- ing one and the same. And the transmission of digitized packets on Internet-protocol and space-based networks is rapidly supplanting the use of old technology (e.g., dedicated analog channels) when it comes to information sharing and media broadcasting. This monograph identifies the implications of these trends and reconsiders the resulting boundaries of Army cyber operations, at least from a practical standpoint. It focuses on the general and overlapping areas of network operations, information operations, and the more focused areas of electronic warfare, signals intelligence, electromag- netic spectrum operations, public affairs, and military information support operations (formerly psychological operations). Most impor- tantly, it compares the emerging doctrine of cyber operations to all of the aforementioned areas. The intent is to make clear the prevailing boundaries between the areas of interest and the expected progression of these boundaries in the near future. It constructs some new defini- tions that encapsulate these areas, such as information warfare. This is important because the Army is now studying ways to best apply its cyber power and reconsider doctrinally defined areas that are integral to cyberspace. This monograph asserts that the relevant realms that contain the functional areas pertaining to information warfare are just two: the psychological and the technical. The psychological is focused on mes- iii iv Redefining Information Warfare Boundaries for an Army in a Wireless World sage content, and the target is people. The technical realm is focused on the means to deliver (or prevent delivery of) content, and the targets are machines. This monograph considers how the technical realm and the psychological realm can best be organized and perhaps consolidated. This study and monograph were not specifically requested by the Army; rather, this monograph summarizes the results of a short study conducted in response to a question about the future of information operations asked by Army senior leadership. RAND Arroyo Center sought an answer to this question as a “Quick Response” study. Quick Response studies are designed to support near-term decisions to be made by Army officials or to provide analyses to the Army leadership to inform U.S. Department of Defense, administration, or congressio- nal decisions and actions. A brief was provided to Army senior leaders within two months of initiation of this project; this monograph sum- marizes and reports the analytic effort that went into that briefing. The findings and views expressed here are those of the authors and do not necessarily reflect the views of the Army or the U.S. Department of Defense. This research was conducted within the Arroyo Center’s Force Development and Technology Program. RAND Arroyo Center, part of the RAND Corporation, is a federally funded research and devel- opment center sponsored by the U.S. Army. Questions and comments about this research are welcome and should be directed to the program director, Christopher Pernin (Christopher_Pernin@rand.org), the project leader, Isaac Porche (Isaac_Porche@rand.org), or Christopher Paul (cpaul@rand.org). For more information on RAND Arroyo Center, contact the Director of Operations (telephone 310-393-0411, extension 6419; FAX 310-451-6952; email Marcy_Agmon@rand.org), or visit Arroyo’s website at http://www.rand.org/ard. The Project Unique Identifica- tion Code (PUIC) for the project that produced this document is R AND10473. Contents Preface ............................................................................. iii Figures ............................................................................. xi Tables .............................................................................xiii Summary ..........................................................................xv Acknowledgments .............................................................xxix Abbreviations .................................................................. xxxi CHaptER ONE Introduction ....................................................................... 1 Background ......................................................................... 1 The Army’s Role in Cyberspace .................................................. 2 What Is Cyberspace? ............................................................... 3 Environments ..................................................................... 3 Domains .......................................................................... 4 Information Environment ...................................................... 4 Cyberspace Defined ............................................................. 6 Cyber-Electromagnetic/Cyber-Electronic Operations ....................... 9 Purpose .............................................................................. 9 Approach ...........................................................................10 How This Monograph Is Organized ............................................10 CHaptER TWO The Information Environment and Information Warfare ...............11 The Information Environment ..................................................11 The U.S. Department of Defense View of the Information Environment ................................................................11
Recommended publications
  • The Erosion of Strategic Stability and the Future of Arms Control in Europe
    Études de l’Ifri Proliferation Papers 60 THE EROSION OF STRATEGIC STABILITY AND THE FUTURE OF ARMS COntrOL IN EUROPE Corentin BRUSTLEIN November 2018 Security Studies Center The Institut français des relations internationales (Ifri) is a research center and a forum for debate on major international political and economic issues. Headed by Thierry de Montbrial since its founding in 1979, Ifri is a non- governmental, non-profit organization. As an independent think tank, Ifri sets its own research agenda, publishing its findings regularly for a global audience. Taking an interdisciplinary approach, Ifri brings together political and economic decision-makers, researchers and internationally renowned experts to animate its debate and research activities. The opinions expressed in this text are the responsibility of the author alone. ISBN: 978-2-36567-932-9 © All rights reserved, Ifri, 2018 How to quote this document: Corentin Brustlein, “The Erosion of Strategic Stability and the Future of Arms Control in Europe”, Proliferation Papers, No. 60, November 2018. Ifri 27 rue de la Procession 75740 Paris Cedex 15 – FRANCE Tel.: +33 (0)1 40 61 60 00 – Fax: +33 (0)1 40 61 60 60 Email: accueil@ifri.org Website: Ifri.org Author Dr. Corentin Brustlein is the Director of the Security Studies Center at the French Institute of International Relations. His work focuses on nuclear and conventional deterrence, arms control, military balances, and U.S. and French defense policies. Before assuming his current position, he had been a research fellow at Ifri since 2008 and the head of Ifri’s Deterrence and Proliferation Program since 2010.
    [Show full text]
  • Information Warfare, International Law, and the Changing Battlefield
    ARTICLE INFORMATION WARFARE, INTERNATIONAL LAW, AND THE CHANGING BATTLEFIELD Dr. Waseem Ahmad Qureshi* ABSTRACT The advancement of technology in the contemporary era has facilitated the emergence of information warfare, which includes the deployment of information as a weapon against an adversary. This is done using a numBer of tactics such as the use of media and social media to spread propaganda and disinformation against an adversary as well as the adoption of software hacking techniques to spread viruses and malware into the strategically important computer systems of an adversary either to steal confidential data or to damage the adversary’s security system. Due to the intangible nature of the damage caused By the information warfare operations, it Becomes challenging for international law to regulate the information warfare operations. The unregulated nature of information operations allows information warfare to Be used effectively By states and nonstate actors to gain advantage over their adversaries. Information warfare also enhances the lethality of hyBrid warfare. Therefore, it is the need of the hour to arrange a new convention or devise a new set of rules to regulate the sphere of information warfare to avert the potential damage that it can cause to international peace and security. ABSTRACT ................................................................................................. 901 I. INTRODUCTION ......................................................................... 903 II. WHAT IS INFORMATION WARFARE? .............................
    [Show full text]
  • Intelligence Services Roles and Responsibilities in Good Security Sector Governance
    SSR BACKGROUNDER Intelligence Services Roles and responsibilities in good security sector governance About this series The SSR Backgrounders provide concise introductions to topics and concepts in good security sector governance (SSG) and security sector reform (SSR). The series summarizes current debates, explains key terms and exposes central tensions based on a broad range of international experiences. The SSR Backgrounders do not promote specific models, policies or proposals for good governance or reform but do provide further resources that will allow readers to extend their knowledge on each topic. The SSR Backgrounders are a resource for security governance and reform stakeholders seeking to understand but also to critically assess current approaches to good SSG and SSR. About this SSR Backgrounder This SSR Backgrounder explains the roles and responsibilities of intelligence services in good security sector governance (SSG). Intelligence services perform an essential security function by providing governments with timely and relevant information necessary to protect the security of states and their societies. Applying the principles of good SSG to intelligence services makes them both effective and accountable within a framework of democratic governance, the rule of law and respect for human rights. This SSR Backgrounder answers the following questions: What are intelligence services? Page 2 What do intelligence services do? Page 2 How is intelligence produced? Page 4 What intrusive legal powers do intelligence services hold?
    [Show full text]
  • Testimony of James C
    September 15, 2005 “Chinese Information Operations Strategies in a Taiwan Contingency” Testimony of James C. Mulvenon, Ph.D. Director, Advanced Studies and Analysis DGI Center for Intelligence Research and Analysis Before the U.S.-China Economic and Security Review Commission Hearing “China’s Military Modernization and the Cross-Strait Balance” INTRODUCTION Thank you, Mr. Chairman and the other members of the U.S.-China Economic and Security Review Commission for the opportunity to take part in the hearings you are holding today on the topic of In the minds of the Chinese leadership, the available evidence suggests that the most important political-military challenge and the most likely flashpoint for Sino-US conflict is Taiwan. In seeking to reunify the island with the mainland, however, it is important to note that the PRC has a political strategy with a military component, not a military strategy with a political component. The PRC would prefer to win without fighting, since Beijing's worst case outcome is a failed operation that would result in de facto independence for Taiwan. Also, the leadership realizes that attacking Taiwan with kinetic weapons will result in significant international opprobrium and make the native population ungovernable. These assumptions explain why China until recently maintained a "wait and see" attitude towards Taiwan, even though the island elected a President from a party committed previously to independence. From 2000 until late 2003, China eschewed saber-rattling in favor of economic enticement and “united front” cooperation with the Pan-Blue opposition, both of which were believed to be working successfully. In November 2003, in response to perceived provocations by Taiwan President Chen Shui-bian, Beijing once again revived the threat of military force to deter what it saw as further slippage towards independence, dramatically increasing tensions in the U.S., China, Taiwan triangle.
    [Show full text]
  • Ground Electronic Warfare: Background and Issues for Congress
    Ground Electronic Warfare: Background and Issues for Congress September 17, 2019 Congressional Research Service https://crsreports.congress.gov R45919 SUMMARY R45919 Ground Electronic Warfare: Background and September 17, 2019 Issues for Congress John R. Hoehn Ground electronic warfare (EW) is a group of programs directed by the Army and Marine Corp Analyst in Military which are designed to effect ground forces use of the electromagnetic spectrum. The U.S. Capabilities and Programs military has several ground EW programs that are used for different missions. These programs can broadly be categorized into counter-improvised explosive device (C-IED) systems, counter- unmanned aerial systems (C-UAS), and communications and radar jammers. Over the past several years, senior leaders in the Army and Marine Corps have testified about the need to improve EW capabilities. Role of EW in Ground Operations EW is a component of modern warfare, particularly in response to threats posed by potential adversaries such as Russia and China. EW refers to operations that use the electromagnetic spectrum (i.e., the “airwaves”) to detect, listen to, jam, and deceive (or “spoof”) enemy radars, radio communication systems, data links, and other electronic systems. EW also refers to operations that defend against enemy attempts to do the same. Ground EW programs have gained importance in an era of “great power competition.” Countries like Russia and China have developed so-called anti-access/area denial (A2/AD) systems, some of which are designed to prevent U.S. military access to radio and satellite communications, and to deny the use of radars for artillery and air defense operations.
    [Show full text]
  • Defense Primer: Electronic Warfare
    Updated October 29, 2020 Defense Primer: Electronic Warfare Electronic warfare (EW), as defined by the Department of Electronic protection involves actions to protect access Defense (DOD), are military activities that use to the spectrum for friendly military assets. electromagnetic energy to control the electromagnetic Electronic attack uses electromagnetic energy to spectrum (“the spectrum”) and attack an enemy. The degrade or deny an enemy’s use of the spectrum. spectrum is a range of frequencies for electromagnetic EW support identifies and catalogues emissions of energy. EW supports command and control (C2) by friendly or enemy forces to either protect U.S. forces or allowing military commanders’ access to the spectrum to develop a plan to deny an enemy’s access to the communicate with forces, while preventing potential spectrum. adversaries from accessing the spectrum to develop an These subsets of EW often mutually support each other in operational picture and communicate with their forces. operations. EW support uses equipment to assess both Some have argued that EW is a component of anti- friendly and adversary electronic emissions. This access/area denial (A2/AD) campaigns. information can then be used to develop a protection plan to maintain access to the spectrum or an attack plan to deny Role of EW in Military Operations adversaries vital access. Radar jamming (electronic attack) Since the introduction of two-way radios, militaries have can serve a protection function for friendly forces to become dependent on the spectrum. This reliance has penetrate defended airspace, and it prevents an adversary expanded over the past century to include nearly every from having a complete operating picture.
    [Show full text]
  • Protecting US Security by Minimizing the Role of Nuclear Weapons
    Blechman and Rumbaugh Protecting US Security by Minimizing the Role of Nuclear Weapons: A NEW US NUCLEAR POLICY Barry Blechman and Russell Rumbaugh MAY 2015 STIMSON | 1 Protecting US Security by Minimizing the Role of Nuclear Weapons: a New US Nuclear Policy This paper was prepared in September 2014 and commissioned by the Center for Strategic and International Studies (CSIS). It will be published in “Project Atom: A Competitive Strategies Approach to Defining U.S. Nuclear Strategy and Posture for 2025- 2050” (Washington, DC: CSIS, 2015.) 2 | APRIL 2015 CONTENTS Introduction . 5 US Conventional Military Dominance . 5 The Limited Role of Nuclear Weapons . 8 Minimizing the Roles of Nuclear Weapons in US Policies and Those of Other Nations . 12 Contingencies . 19 Conclusion . 23 “After seventy years of indulging fantasies of what nuclear weapons can do, it is high time to acknowledge that they do very little and adapt US nuclear policy, strategy, and forces to those facts.” Blechman and Rumbaugh INTRODUCTION Nuclear weapons remain the most potent destructive force known to humanity . Yet, US nuclear policies and doctrines remain encumbered by Cold War beliefs in the potential utility of nuclear weapons, even though the United States enjoys a dominant geopolitical position in the world, un- derpinned by a conventional military superiority greater than any ever known before . These false hopes that nuclear weapons can play a range of political and military roles in US security policy cause the United States to mistakenly pursue a nuclear strategy that is costly — not only in material terms, but also in geopolitical terms . In the worst case scenarios, this strategy could be catastroph- ic in terms of human lives and the nation’s future .
    [Show full text]
  • WARFARE DEVELOPMENT for Major Joint Operations and Collective Defence
    KNOWLEDGE OF PRINCIPLES OF WAR MUST BE TEMPERED BY A SENSE OF CHANGE, AND APPLIED WITH A FLEXIBILITY OF MIND. Michael Howard The Causes of Wars and Other Essays 10 The Three Swords Magazine 33/2018 ON THE COVER WARFARE DEVELOPMENT FOR MajOR JOINT OpERatIONS AND COllECTIVE DEFENCE by COLONEL NEIL WRIGHT British Army Deputy Chief of Staff (DCOS) Exercises, Training and Innovation Directorate, Joint Warfare Centre The Joint Warfare Centre is far from simply being a training centre and the importance of our role in Warfare Development is, arguably, greater than ever as we refocus NATO's agenda for experimentation, interoperability and doctrine development against Collective Defence and Article 5 scenarios. ►►► The Three Swords Magazine 33/2018 11 JOINT WARFARE DEVELOPMENT ABOVE: A modified screenshot from JAVELIN (JTLS) showing red and blue forces. A Computer-Assisted Exercise (CAX) is a type of synthetic exercise where forces are generated, moved and managed in a simulated joint environment. CAX enables NATO Transformation to challenge and enhance capabilities, increase interoperability, save resources and reduce risk. RIGHT: NATO Space-based early warning capability. The early detection is communicated to Ballistic Missile Defence Command Centres within a minute or two of the missile launch. Integration of Space in exercises started in 2016 with TRIDENT JUNCTURE. Graphics by NATO E LIVE IN in- more public roles, not to mention highligh ting 2017 (hereafter abbreviated to JAVELIN) in the teresting times, contentious normative, ethical and legal con- autumn of last year, a vast Major Joint O pera- perhaps the most siderations. So, these are indeed interesting tion3 Command Post Exercise, involving, for consequential for times calling for broad-minded approaches to the first time in more than two decades, all European security Warfare Deve lopment.
    [Show full text]
  • Ausa Background Brief (
    AUSA BACKGROUND BRIEF ( No. 42 April 1992 SPECIAL OPERATIONS FORCES: A PRIMER Introduction A small but critical portion of the Total Force is made up of the special operations forces (SOF) of the Army, Navy and Air Force, which are comprised of special operations, psychological operations and civil affairs organizations. Special operations forces are task organized to conduct contingency operations. Special operations forces are designed to augment theater-based forces and, in response to a crisis situation, normally operate with an appropriate mix of conventional forces under theater control. ( Almost all SOF missions require joint planning; also, they are used for missions with allied or coalition forces as well as for a number of ongoing ground missions in many countries. U.S. Special Operations Command The joint nature ofSOF operations was recognized in the establishment of a permanent unified command, the U.S. Special Operations Command (USSOCOM). The USSOCOM commander-in­ chief commands all active and reserve Special Operations, Psychological Operations and Civil Affairs forces of the Army, Navy and Air Force (about 47,000 personnel). USSOCOM supports other unified commands responsible for crisis responses in their respective geographic areas of responsibility. The U.S. Special Operations Command is composed of four subordinate commands: U.S. Army Special Operations Command, Naval Special Warfare Command, Air Force Special Opera­ tions Command and Joint Special Operations Command. U.S. Army Special Operations Command (USASOC), headquartered at Fort Bragg, North Carolina, is composed of active component and reserve component Army forces consisting of Special Forces groups, a Ranger regiment, Psychological Operations groups, a Special Operations Aviation regiment, Civil Affairs commands, and special operations signal and support units.
    [Show full text]
  • Surveillance and Counter Surveillance December 1, 2009 STRATFOR Global Information Services
    Surveillance and Counter surveillance December 1, 2009 STRATFOR Global Information Services STRATFOR Global Information Services publishes intelligence, analysis and research for professionals in government, corporations and research institutions. For more than a decade, this information has helped customers monitor, track and manage political risk and instability around the world. STRATFOR Global Information Services delivers information in three ways: via password protected websites, customized information and data feeds and customized briefings and presentations. More than 1 million professionals rely upon this information at organizations that range from The U.S. Air Force to Yale University to The Federal Reserve Bank of Atlanta and others. STRATFOR Global Information Services 700 Lavaca Street, Suite 900 Austin, TX 78701 Tel: 1-512-279-9462 www.stratfor.com Electronic delivery Reports are also available online by subscribing at www.stratfor. com. Copyright © 2009 STRATFOR. All Rights Reserved. Neither this publication nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior permission of STRATFOR. All information in this report is verified to the best of the author’s and the publisher’s ability. However, STRATFOR does not accept responsibility for any loss arising from reliance on it. To learn more please contact Patrick Boykin, Vice President, by calling 1-512-279-9462. Surveillance and Counter Surveillance
    [Show full text]
  • Joint and Combined Warfare in the Twenty-First Century
    Joint and Combined Warfare in the Twenty-first Century Williamson Murray Introduction It is indeed a great honor to present a paper on the future of Joint and Combined operations in the twenty-first century before such a distinguished audience. To do so, this paper will begin with an examination of the historical antecedents of these two forms of warfare up to the present; and end with thoughts about the role of joint and combined operations in the twenty-first century. To do so, we will begin by discussing the fundamental, unchanging nature of war to indicate why a purely technological, mechanistic conception of war would destroy the very joint capabilities on which military forces from the First World must depend in the coming century. Let me begin then with some thoughts on the political nature of war. As the Greek historian Thucydides, the greatest of all strategic and military historians, commented at the end of the fifth century B.C.: “It will be enough for me, however, if these words of mine are judged useful by those who want to understand clearly the events which happened in the past and which (human nature being what it is) will, at some time or other and in much the same ways, be repeated in the future.”1 Men have fought wars for enumerable reasons, but states fight wars for political reaso 276ns.2 Or as Clausewitz put it so simply: “it is clear, consequently, that war is not a mere act of policy, but a true political instrument, a continuation of political activity by other means.”3 “War 1 Thucydides, History of the Peloponnesian War, translated by Rex Warner (New York, reprinted 1986), p.
    [Show full text]
  • Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action
    ARTICLE Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action Andru E. Wall* Abstract Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and 50 create mutually supporting, not mutually exclusive, authorities. Operations conducted under military command and control pursuant to a Secretary of Defense-issued execute order are military operations and not intelligence activities. Attempts by congressional overseers to redefine military preparatory operations as intelligence activities are legally and historically unsupportable. Congress should revise its antiquated oversight structure to reflect our integrated and interconnected world. I. Introduction After being hunted for nearly ten years, Osama Bin Laden was shot and killed by U.S. Navy SEALs in the early hours of May 2, 2011. The identity of the elite special operations unit that conducted the raid on bin Laden's compound in Pakistan was not immediately released, as the * Senior Associate with Alston & Bird LLP; former senior legal advisor for U.S. Special Operations Command Central (2007 to 2009). While this article was cleared for publication as required by my security clearance and nondisclosure agreements, the views expressed herein are my own and do not necessarily reflect the position of the U.S. government or Department of Defense. I thank Harvard Law School for its generous support of this paper andJack Goldsmith, Hagan Scotten., Mark Grdovic, Nick Dotti, Chris Costa, Michael Bahar, and Lenn Ferrer for their invaluable comments and suggestions.
    [Show full text]