Lessons from Others for Future U.S. Army Operations in and Through the Information Environment
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Warfare in a Fragile World: Military Impact on the Human Environment
Recent Slprt•• books World Armaments and Disarmament: SIPRI Yearbook 1979 World Armaments and Disarmament: SIPRI Yearbooks 1968-1979, Cumulative Index Nuclear Energy and Nuclear Weapon Proliferation Other related •• 8lprt books Ecological Consequences of the Second Ihdochina War Weapons of Mass Destruction and the Environment Publish~d on behalf of SIPRI by Taylor & Francis Ltd 10-14 Macklin Street London WC2B 5NF Distributed in the USA by Crane, Russak & Company Inc 3 East 44th Street New York NY 10017 USA and in Scandinavia by Almqvist & WikseH International PO Box 62 S-101 20 Stockholm Sweden For a complete list of SIPRI publications write to SIPRI Sveavagen 166 , S-113 46 Stockholm Sweden Stoekholol International Peace Research Institute Warfare in a Fragile World Military Impact onthe Human Environment Stockholm International Peace Research Institute SIPRI is an independent institute for research into problems of peace and conflict, especially those of disarmament and arms regulation. It was established in 1966 to commemorate Sweden's 150 years of unbroken peace. The Institute is financed by the Swedish Parliament. The staff, the Governing Board and the Scientific Council are international. As a consultative body, the Scientific Council is not responsible for the views expressed in the publications of the Institute. Governing Board Dr Rolf Bjornerstedt, Chairman (Sweden) Professor Robert Neild, Vice-Chairman (United Kingdom) Mr Tim Greve (Norway) Academician Ivan M£ilek (Czechoslovakia) Professor Leo Mates (Yugoslavia) Professor -
American War and Military Operations Casualties: Lists and Statistics
American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction .................................................................................................................................... -
Fm 6-27 Mctp 11-10C the Commander's Handbook on the Law of Land Warfare
FM 6-27 MCTP 11-10C THE COMMANDER'S HANDBOOK ON THE LAW OF LAND WARFARE AUGUST 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 27-10/MCTP 11-10C, dated 18 July 1956. HEADQUARTERS, DEPARTMENT OF THE ARMY HEADQUARTERS, UNITED STATES MARINE CORPS Foreword The lessons of protracted conflict confirm that adherence to the law of armed conflict (LOAC) by the land forces, both in intern ational and non-international armed conflict, must serve as the standard that we train to and apply across the entire range of military operations. Adhering to LOAC enhances the legitimacy of our operations and supports the moral framework of our armed forces. We have learned th at we deviate from these norms to our detriment and risk undercutting both domesti c and international support for our operations. LOAC has been and remains a vital guide for all military operations conducted by the U.S. Governm ent. This fi eld manual provides a general description of the law of land warfare for Soldiers and Marines, delineated as statements of doctrine and practice, to gui de the land forces in conducting di sci plined military operations in accordance with the rule of law. The Department of Defense Law of War Manual (June 20 15, updated December 2016) is the authoritative statement on the law of war for the Department of Defense. In the event of a conflict or discrepancy regarding the legal standards addressed in this publication and th e DOD Law of War Manual, the latter takes precedence. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
How State Involvement in Un Peacekeeping Reduces
PACIFYING THE PEACEKEEPERS: HOW STATE INVOLVEMENT IN U.N. PEACEKEEPING REDUCES MILITARY THREATS TO DEMOCRACY by TIMOTHY JAMES ALEXANDER PASSMORE B.A., Lee University, 2006 M.Litt., University of St. Andrews, 2007 M.A., University of Colorado Boulder, 2015 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirement for the degree of Doctor of Philosophy Department of Political Science 2019 This thesis entitled: Pacifying the Peacekeepers: How State Involvement in U.N. Peacekeeping Reduces Military Threats to Democracy written by Timothy James Alexander Passmore has been approved for the Department of Political Science ___________________________________________ Associate Professor Megan Shannon (Chair) ___________________________________________ Professor Jaroslav Tir ___________________________________________ Associate Professor Carew Boulding ___________________________________________ Professor David H. Bearce ___________________________________________ Assistant Professor Benjamin Teitelbaum (Department of Musicology) Date________________ The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. ii ABSTRACT Passmore, Timothy James Alexander (Ph.D., Political Science). Pacifying the Peacekeepers: How State Involvement in U.N. Peacekeeping Reduces Military Threats to Democracy. Dissertation directed by Associate Professor Megan Shannon. What explains why countries undergoing transitions to democracy are major contributors of personnel to United Nations peacekeeping operations? In recent decades, the provision of such personnel has been adopted largely by weak or nascent democracies. In the same period, the world has witnessed a decline in military coup activity. I argue that new democracies use peacekeeping to reduce the threat posed by the military during the years of transition and thereby increase the likelihood of democratic consolidation. -
Cyberspace Operations
Updated December 15, 2020 Defense Primer: Cyberspace Operations Overview force; (2) compete and deter in cyberspace; (3) strengthen The Department of Defense (DOD) defines cyberspace as a alliances and attract new partnerships; (4) reform the global domain within the information environment department; and (5) cultivate talent. consisting of the interdependent network of information technology infrastructures and resident data, including the Three operational concepts identified in the DOD Cyber internet, telecommunications networks, computer systems, Strategy are to conduct cyberspace operations to collect and embedded processors and controllers. The DOD intelligence and prepare military cyber capabilities to be Information Network (DODIN) is a global infrastructure used in the event of crisis or conflict, and to defend forward carrying DOD, national security, and related intelligence to disrupt or halt malicious cyber activity at its source, community information and intelligence. including activity that falls below the level of armed conflict. Defending forward may involve a more aggressive Cyberspace operations are composed of the military, active defense, meaning activities designed to disrupt an intelligence, and ordinary business operations of the DOD adversary’s network when hostile activity is suspected. in and through cyberspace. Military cyberspace operations use cyberspace capabilities to create effects that support Cyber Mission Force operations across the physical domains and cyberspace. DOD began to build a Cyber Mission Force (CMF) in 2012 Cyberspace operations differ from information operations to carry out DOD’s cyber missions. The CMF consists of (IO), which are specifically concerned with the use of 133 teams that are organized to meet DOD’s three cyber information-related capabilities during military operations missions. -
Military Service Veterans Corps
Military Service Veterans Corps. The Military Service Medal, authorized in 2006, may be presented to a Compatriot in recognition of military service which does not otherwise qualify for the War Service Medal. Compatriots of Military Service Veterans Corps are unique. Although they are not eligible for one of the war SAR Veterans Corps, they answered the call – drafted or volunteered, when it was popular and when it was not. Clearly when America needed it's guardians of freedom, members of the SAR Military Service Veterans Corps were there. Since the end of World War II, their members have served around the globe for more than 70 years. They complemented our Armed Forces, ensuring that the Constitution and freedoms established by our founding fathers would not die. They served at home and at times in locations most of us haven’t heard of. They did it in the air, on land and at sea. They served with our active duty forces and our reserve forces. They have served with conviction, honor and pride. Proof of Service: Proof of service, in the form of a copy of the member's discharge, DD-214, or other U.S. or Allied Government proof, especially in the case of a member in active service, must be provided to the NSSAR Veterans Recognition Committee, State Society Secretary or Chapter secretary (depending on presenting authority) before the medal can be purchased and/or worn. Such proof must show that the Compatriot served, or is serving, honorably in: (1) the armed forces of the United States, (2) the military forces of a country allied with the United States, or (3) a United Nations Peace Keeping Force. -
Operational Law Handbook, 2015
INDEX 632 Agreements, 234 Checks, Accomodation/Convenience, 270 Acquisition and Cross-Servicing Agreements Chemical Biological Incident Response Force, 209 (ACSAs), 126, 131, 240, 272, 456 Chemical Weapons, 30, 161 Acquisition—See Contract(ing), 267 Chemical Weapons Convention, 29 ADA (Antideficiency Act), 225 Chicago Convention, 165, 169 Administrative and Technical (A&T) Status, 126, Chivalry, Principle of, 14 127 Civil Augmentation Program, 262 Advanced Military Training to Civilian Law Civil Disturbances, 195, 201 Enforcement, 200 Civil Support, 194 Affirmative Claims, 300 Civilian Forced Labor, 46 Afghanistan Lift and Sustain, 244 Civilian Internee, 184 After Action Report (AAR), 479, 480 Civilian misconduct, 398 Agency Designee, 343 Civilian Object, 23 Alliance, 453, 462 Civilian Property, 20 American Red Cross (ARC), 351 Civilians, 20 American-British-Canadian-Australian (ABCA) Civil-Military Operations, 145 Program, 461 Claims, 129 Antarctic Treaty, 168 Multinational, 456 Anticipatory Self-Defense By Nations, 6 CLAMO Anti-Deficiency Act, 225 Contact Information, 479 Appropriations and Authorizations, 231 Repositories, 480 AR 15-6 Investigation Guide, 370 Resources, 480 Archipelagic Baselines, 166 Cluster Munitions, 28 Archipelagic Sea Lane Passage, 172 COA Analysis, 467 Arctic Region, 168 COA Comparison, 467 ARNG Title 32 State Status, 215 COA Development, 466 ARNGUS Title 10 Federal Status, 215 Coalition, 453, 462 Article 139 Claims., 300 Coalition Support Fund (CSF), 244 Article 98 Agreements, 129 COCOM, 67 Assassination, 32 -
Fiscal Year 2019 Annual Report on Sexual Assault in the Military
Department of Defense Annual Report on Sexual Assault in the Military Fiscal Year 2019 0 DOD SAPRO Department of Defense Annual Report on Sexual Assault in the Military Fiscal Year 2019 The estimated cost of this report for the Department of Defense is approximately $2,367,000 for the 2019 Fiscal Year. This includes $1,863,000 in expenses and $504,000 in labor. Generated on 2020Apr17 RefID: D-A4BC881 1 DOD SAPRO Table of Contents Executive Summary ................................................................................................................... 3 Introduction ...............................................................................................................................10 Unit Climate ..............................................................................................................................11 Sexual Assault Reporting ..........................................................................................................14 Victim Assistance ......................................................................................................................17 Efforts to Reduce and Stop Sexual Assault ...............................................................................20 Way Forward ............................................................................................................................24 Appendices Appendix A: Additional Accomplishments, Activities, and Outreach Appendix B: Statistical Data on Sexual Assault Appendix C: Metrics and Non-Metrics on Sexual -
Naval Doctrine Publication 1: Naval Warfare
Naval Doctrine Publication 1 Naval Warfare April 2020 It follows then as certain as night succeeds the day, that without a decisive naval force we can do nothing defi nitive, and with it everything honorable and glorious. George Washington Foreword The United States Navy, the United States Marine Corps, and the United States Coast Guard collectively form the nation’s Naval Service. We have worked, fought, and sacrifi ced side by side since the earliest days of our Republic to defend and protect our national interests. Our people, Active and Reserve, and the civilians who support them, are our greatest resource. Together we provide integrated, complementary, and unique capabilities to protect America from attack, promote American prosperity, and preserve America’s strategic infl uence. Naval Doctrine Publication (NDP) 1, Naval Warfare, provides the doctrinal foundation governing our pursuit of excellence in the art and science of naval warfare. It provides our philosophy of warfi ghting to guide our activities in the preparation for, and execution of, naval warfare. Based on experience and history, it is designed to be an enduring publication that guides how we organize and employ integrated forces as part of a joint or combined force. The intent of this publication is to provide for mutual understanding and alignment within the Naval Service, institutionally and individually. Institutionally, it forms the doctrinal foundation for subordinate publications, subject to more frequent revision, that provide specifi c details regarding various aspects of naval operations. Individually, it informs all naval personnel about the distinctiveness of operations in the maritime domain and the unique roles they fulfi ll as part of the Naval Service. -
Canadian Refugee Jurisprudence on Military Service Evasion
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by YorkSpace Paper presented at CRS Brown Bag Seminar on 5 January 2005 Dear Friends, Please note that (i) this paper is a work in progress, and (ii) this paper forms a section of a larger work. For both of these reasons, this paper is made available with the stipulation that it will not be cited without the permission of the author. Should you have any questions or comments about this paper do not hesitate to contact me at [email protected]. Regards, Martin Jones CHAPTER TWO: CANADIAN REFUGEE JURISPRUDENCE ON MILITARY SERVICE EVASION Compulsory military service is practiced in about 100 countries; conscription exists as a reality in a majority of the member states of the United Nations and for an overwhelming majority of the population of the world.1 Compulsory military service has been both denounced as nothing less than the surrender of “the most essential rights of personal liberty”2 and praised as the sine qua non of full citizenship.3 Despite a debate that continues to this date concerning its legitimacy, compulsory military service is a continuing phenomenon that affects the lives of many millions of men around the world.4 Many of the countries requiring military service are a significant source of refugees. Of the top ten source countries for refugees in 2002 at least eight require military service.5 It is not surprising, therefore, that the topic of compulsory military service, and in particular the issue of the status of military service evaders, has been raised in refugee determination proceedings.6 It will be the purpose of this paper to asses the treatment of 1 See infra, at Chapter 1, page Error! Bookmark not defined. -
Occupation and Other Forms of Administration of Foreign Territory
EXPERT MEETING OCCUPATION AND OTHER FORMS OF ADMINISTRATION OF FOREIGN TERRITORY International Committee of the Red Cross 19, avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org © ICRC, March 2012 EXPErt MEETING OCCUPATION AND OTHER FORMS OF ADMINISTRATION OF FOREIGN TERRITORY Report prepared and edited by Tristan Ferraro Legal adviser, ICRC CONTENTS FOREWORD 4 ACKNOWLEDGEMENTS 6 INTRODUCTION 7 SUMMARY 10 FIRST MEETING OF EXPERTS: THE BEGINNING AND END OF OCCUPATION 16 PART ONE: THE BEGINNING OF OCCUPATION 17 A. THE PRESENCE OF FOREIGN FORCES: A NECESSITY FOR THE ESTABLISHMENT AND MAINTENANCE OF OCCUPATION? 17 B. THE EXERCISE OF AUTHORITY BY FOREIGN FORCES 19 C. THE NON-CONSENSUAL NATURE OF BELLIGERENT OCCUPATION 20 D. THE CONCEPT OF INDIRECT EFFECTIVE CONTROL 23 E. DURATION AND GEOGRAPHICAL SCOPE OF OCCUPATION 24 F. THE LEGAL FRAMEWORK APPLICABLE TO THE INVASION PHASE 24 PART TWO: THE END OF OCCUPATION 26 A. EVALUATING THE END OF OCCUPATION: A THORNY TASK 27 B. THE CRITERIA FOR DETERMINING THE END OF OCCUPATION 28 C. THE FUNCTIONAL APPLICATION OF OCCUPATION LAW AND THE NOTION OF RESIDUAL RESPONSIBILITIES 31 PART THREE: MULTINATIONAL OCCUPATION 33 A. THE APPLICABILITY OF OCCUPATION LAW TO UN OPERATIONS 33 B. OCCUPATION CONDUCTED BY A COALITION OF STATES 34 APPENDIX 1: BACKGROUND DOCUMENT BY PROF. MICHAEL BOTHE 36 APPENDIX 2: BACKGROUND DOCUMENT BY PROF. ADAM ROBERTS 41 APPENDIX 3: AGENDA AND GUIDING QUESTIONS AIMED AT FRAMING THE DISCUSSIONS 50 APPENDIX 4: LIST OF PARTICIPANTS 53 SECOND MEETING OF EXPERTS: DELIMITING THE RIGHTS AND DUTIES OF AN OCCUPYING POWER AND THE RELEVANCE OF OCCUPATION LAW FOR UN ADMINISTRATION OF TERRITORY 54 PART ONE: DELIMITING THE RIGHTS AND DUTIES OF AN OCCUPYING POWER 56 A.