Full Text, Ebscohost (Accessed September 24, 2016)

Total Page:16

File Type:pdf, Size:1020Kb

Full Text, Ebscohost (Accessed September 24, 2016) Cover Page The following handle holds various files of this Leiden University dissertation: http://hdl.handle.net/1887/69816 Author: Welch, J.P. Title: The Grotius Sanction: Deus Ex Machina. The legal, ethical, and strategic use of drones in transnational armed conflict and counterterrorism Issue Date: 2019-03-21 The Grotius Sanction: Deus Ex Machina. The legal, ethical, and strategic use of drones in transnational armed conflict and counterterrorism James Patrick Welch i ii The Grotius Sanction: Deus Ex Machina. The legal, ethical, and strategic use of drones in transnational armed conflict and counterterrorism. PROEFSCHRIFT ter verkrijging van de graad van Doctor aan de Universiteit Leiden, op gezag van Rector Magnificus prof. mr. C.J.J.M. Stolker, volgens besluit van het College voor Promoties te verdedigen op donderdag 21 maart 2019 klokke 13.45 uur door James Patrick Welch geboren te Dorchester Massachusetts (USA) in 1955 iii Promotor: Prof. dr. P.B. Cliteur Co-promotor: Dr. G. Molier Promotiecommissie: Prof. dr. A. Ellian Prof. dr. A.N. Guiora, (University of Utah, Salt Lake City, USA) Prof. dr. E.R. Muller Prof. dr. L.R. Blank, (Emory University, Atlanta, USA) Dr. B.R. Rijpkema iv Copyright information: The author hereby grants the Leiden Law School the right to display these contents for educational purposes The author assumes total responsibility for meeting the requirements set by United States Copyright Law for inclusion of any materials that are not the author’s creation or in the public domain. §Title 17 USC © Copyright 2018 by James Patrick Welch All rights reserved v Dedication “For he to-day that sheds his blood with me shall be my brother” --Shakespeare, Henry the V, 1598. To Liana, my best friend, my wife, for her infinite patience and support which kept me going through the good times and the bad. vi Table of Contents CHAPTER PAGE TITLE PAGE PROMOTOR AND PROMTION COMMITTEE ........................................................................ iv COPYRIGHT ..................................................................................................................................v DEDICATION .............................................................................................................................. vi TABLE OF CONTENTS .............................................................................................................. vii I. INTRODUCTION Introduction: Research Question and Purpose Statement ................................................................1 II. THEORETICAL FRAMEWORK Theoretical Framework .................................................................................................................40 Methodological Analysis ...............................................................................................................40 Methodology applied in the Grotius Sanction ...............................................................................42 Theoretical Foundations.................................................................................................................50 Four Hypotheses ............................................................................................................................54 Approach to Research ....................................................................................................................58 The Challenges...............................................................................................................................61 Terrorism and The Clash of Consciousness...................................................................................64 Research Significance ....................................................................................................................66 III. FOR WHOM THE BELL TOLLS: COSTS AND CONSEQUENCES vii Targeting Imprecision ....................................................................................................................70 Boots on the Ground ......................................................................................................................78 The State’s Right to Self-defense ..................................................................................................80 Assassination, Treachery, and Perfidy? ........................................................................................82 Striking a Balance ..........................................................................................................................84 IV. LEGAL CONSIDERATIONS Rules, Regulations and Guidelines ..............................................................................................100 The Legal Framework ..................................................................................................................102 International Law .........................................................................................................................105 The Law of War and the Concept of Self-defense .......................................................................113 The UN Charter and the Use of Force .........................................................................................114 The Relationship between Article 51 and Article 2 (4) ...............................................................115 Armed Attack ...............................................................................................................................116 Article 2(4) versus Article 51: Between a Rock and a Hard Place ..............................................124 Self-defence against Non-state Actors.…… ................................................................................131 Preemption vs. Prevention ...........................................................................................................135 The ethical perspective: Walzer’s moral argument on Anticipatory Self-defense .....................144 V. TARGETED KILLING Targeted Killing ...........................................................................................................................153 The Legal, Moral, and Ethical Aspects of Targeted Killing ........................................................159 Target Discrimination ..................................................................................................................171 Personality and Signature Strikes ................................................................................................181 viii The CIA: Where It All Began: Where It Is Now .........................................................................189 Collateral “Damage” ....................................................................................................................197 VI. MILITARY AND STRATEGIC CONSIDERATIONS Nasty, Brutish and Short: A Return to Hobbes and Asymmetry .................................................216 How does the process behind the kill chain function? (outside the battlespace) .........................222 How does the process behind the kill chain function? (within the battlespace) .........................223 Find, Fix, Finish, Exploit, Analyze, and Disseminate (F3EAD) .................................................227 The Elephant and the Mouse: The advantages and disadvantages of asymmetry .......................230 VII. CONCLUSIONS AND RECOMMENDATIONS Examination of the Four Hypotheses ...........................................................................................244 Specific Recommendations ..........................................................................................................251 Concluding Remarks ....................................................................................................................253 REFERENCES ............................................................................................................................259 APPENDICES Appendix A: Glossary..................................................................................................................315 Appendix B: Theoretical Framework ..........................................................................................328 Appendix C: Legal Documentation ............................................................................................335 Appendix D: Treaties, Acts, and Conventions Against Terrorism ..............................................339 Appendix E: Google Earth Intelligence .......................................................................................342 Appendix F: Compsim Technology Comparison Chart ..............................................................346 Appendix G: Autonomy Matrix and Bandwidth Model ..............................................................347 ix Appendix H: CIA Drone Strikes and Minimum Civilian Casualties ...........................................348 Appendix I: Scale of Intent ..........................................................................................................349 Appendix J: Target Selection Process & The “Kill Chain” (AOR) .............................................350 Appendix K: Target Selection Process & The “Kill Chain” (Outside the AOR) ........................351 Appendix L: Image of Creech AFB Drone OPs ..........................................................................352 Appendix M: Ramstein Satellite Relay Station ...........................................................................353 Appendix N: Chabelly Drone Base Djibouti
Recommended publications
  • The Future of Weapons of Mass Destruction an Update
    A NATIONAL INTELLIGENCE UNIVERSITY PRESIDENTIAL SCHOLAR’S PAPER THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE By John P. Caves, Jr. NIU Presidential Scholar November 2019 – November 2020 and W. Seth Carus THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE John P. Caves, Jr. and W. Seth Carus National Intelligence University National Intelligence Press Washington, DC February 2021 The views expressed in this paper are solely those of the authors and do not necessarily reflect those of the National Intelligence University, National Defense University, or any other part of the U.S. government. ACKNOWLEDGMENTS While the authors are solely responsible for the final content of this paper, they benefited greatly from the time, expertise and support freely availed to them by many knowledgeable individuals and organizations. They include Mr. Caves’ colleagues at National Intelligence University (NIU), where he worked on this paper while on a detail assignment from National Defense University (NDU). Mr. Caves expresses par- ticular gratitude to Dr. Brian Holmes, dean of the Anthony G. Oettinger School of Science and Technol- ogy Intelligence, for his leadership, knowledge, and support. Dr. Sharon Adams, Ms. Beverly Barnhart, Mr. George Clifford, Dr. LaMesha Craft, and Dr. R. Carter Morris offered helpful comments on the paper at various stages. They and Mr. Damarius Alston, LTC Jeffrey Bacon, Lt Col Frances Deutch, Ms. Thelma Flamer, Mr. Julian Meade, and Ms. Christina Sanders were among others at NIU whose assistance and support made Mr. Caves’ assignment at NIU enjoyable as well as productive. Both authors are deeply indebted to their colleagues at NDU’s Center for the Study of Weapons of Mass Destruction (CSWMD), especially Mr.
    [Show full text]
  • Strategic Studies Quarterly an Air Force–Sponsored Strategic Forum on National and International Security
    WINTER 2019 Vol 13, No. 4 On Great Power Conflict: Entangled or Untangled Alliances? An Interview with Charles A. Kupchan Attrition and the Will to Fight a Great Power War Emma Moore FEATURE ARTICLE Through the Glass—Darker James Wood Forsyth Jr. Ann Mezzell Missile Defense for Great Power Conflict: Outmaneuvering the China Threat Henry Obering III Rebeccah L. Heinrichs Ambiguity, Risk, and Limited Great Power Conflict Thomas G. Mahnken Gillian Evans Techniques for Great Power Space War Paul Szymanski Minding the Gaps: US Military Strategy toward China Derek Grossman John Speed Meyers Decide, Disrupt, Destroy: Information Systems in Great Power Competition with China Ainikki Riikonen Strategic Studies SSQ Quarterly Chief of Staff, US Air Force Gen David L. Goldfein, USAF Commander, Air Education and Training Command Lt Gen Marshall B. Webb, USAF Commander and President, Air University Lt Gen Anthony J. Cotton, USAF Director, Academic Services Dr. Mehmed Ali Director, Air University Press Lt Col Darin Gregg, USAF Editor Col W. Michael Guillot, USAF, Retired Content Editor Illustrator Jeanne K. Shamburger Daniel M. Armstrong Prepress Production Coordinator Webmaster Megan N. Hoehn Kevin V. Frey Advisors Contributing Editors Gen Michael P. C. Carns, USAF, Retired David C. Benson, PhD James W. Forsyth, PhD Mark J. Conversino, PhD Christina Goulter, PhD Kelly A. Grieco, PhD Robert P. Haffa, PhD Michael R. Kraig, PhD Jay P. Kesan, PhD Col Kristi Lowenthal, USAF, PhD Charlotte Ku, PhD Dawn C. Murphy, PhD Benjamin S. Lambeth, PhD David D. Palkki, PhD Martin C. Libicki, PhD Nicholas M. Sambaluk, PhD Allan R. Millett, PhD https://www.af.mil/ https://www.aetc.af.mil/ https://www.airuniversity.af.edu/ Strategic Studies Quarterly An Air Force–Sponsored Strategic Forum on National and International Security WINTER 2019 VOL.
    [Show full text]
  • How Private Military Companies Challenge Global Governance, Erode Accountabilin and Exacerbate Conflict
    MARKETIZED SOLDIERING: HOW PRIVATE MILITARY COMPANIES CHALLENGE GLOBAL GOVERNANCE, ERODE ACCOUNTABILIN AND EXACERBATE CONFLICT by Gregg Blakely Hon. B.A., University of Toronto, 2002 PROJECT SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF ARTS In the Department of Political Science O Gregg Blakely 2006 SIMON FRASER UNIVERSITY All rights reserved. This work may not be reproduced in whole or in part, by photocopy or other means, without permission of the author. APPROVAL Name: Gregg Blakely Degree: Master of Arts, Department of Political Science Title of Project: Marketized Soldiering: How private military companies challenge global governance, erode accountability and exacerbate conflict Examining Committee: Chair: Dr. Laurent Dobuzinskis, Associate Professor Department of Political Science Dr. Douglas A. Ross, Professor Senior Supervisor Department of Political Science Dr. Stuart Farson, Adjunct Professor Supervisor Department of Political Science Dr. Benjamin J. Muller, Limited Term Professor Internal Examiner Department of Political Science Date DefendedIApproved: December 4th. 2006 SIMON FRASER UNIVERSITY~ibra ry DECLARATION OF PARTIAL COPYRIGHT LICENCE The author, whose copyright is declared on the title page of this work, has granted to Simon Fraser University the right to lend this thesis, project or extended essay to users of the Simon Fraser University Library, and to make partial or single copies only for such users or in response to a request from the library of any other university, or other
    [Show full text]
  • The Use of English-Language Internet Propaganda by the Taliban Insurgency in Afghanistan, 2007–2010
    University of Denver Digital Commons @ DU Electronic Theses and Dissertations Graduate Studies 6-1-2011 The Use of English-Language Internet Propaganda by the Taliban Insurgency in Afghanistan, 2007–2010 Matthew T. Calvin University of Denver Follow this and additional works at: https://digitalcommons.du.edu/etd Part of the International Relations Commons Recommended Citation Calvin, Matthew T., "The Use of English-Language Internet Propaganda by the Taliban Insurgency in Afghanistan, 2007–2010" (2011). Electronic Theses and Dissertations. 108. https://digitalcommons.du.edu/etd/108 This Thesis is brought to you for free and open access by the Graduate Studies at Digital Commons @ DU. It has been accepted for inclusion in Electronic Theses and Dissertations by an authorized administrator of Digital Commons @ DU. For more information, please contact [email protected],[email protected]. THE USE OF ENGLISH-LANGUAGE INTERNET PROPAGANDA BY THE TALIBAN INSURGENCY IN AFGHANISTAN, 2007 – 2010 __________ A Thesis Presented to the Dean and Faculty of the Josef Korbel School of International Studies University of Denver __________ In Partial Fulfillment of the Requirements for the Degree Master of Arts International Security __________ by Matthew T. Calvin June 2011 Advisor: Dr. Paul R. Viotti © Copyright by Matthew T. Calvin 2011 All Rights Reserved Author: Matthew T. Calvin Title: The Use of English-Language Internet Propaganda by the Taliban Insurgency in Afghanistan, 2007-2010 Advisor: Dr. Paul R. Viotti Degree Date: June 2011 Abstract After nearly a decade of war in Afghanistan, military and government officials have described the propaganda efforts of the Taliban insurgency as increasingly sophisticated and effective.
    [Show full text]
  • Public Choice in the Use of Private Contractors in Iraq
    THE ECONOMICS OF THE WILL TO FIGHT: PUBLIC CHOICE IN THE USE OF PRIVATE CONTRACTORS IN IRAQ * ROBERT BEJESKY INTRODUCTION Private military contractors (PMCs)—“businesses that provide governments with professional services intricately linked to war- fare,”1—have recently caused much consternation due to ineffec- tive state control over and responsibility for PMC activities. In No- vember 2013, the United Nations Working Group on Use of Mer- cenaries affirmed that “‘[p]roviding security is a fundamental hu- man right and a fundamental responsibility of the State’” and indi- cated that governments worldwide must participate in efforts to implement a framework for “robust international regulation of pri- vate military and security companies.”2 This article concurs with the need for global cooperation and regulation of PMCs for an additional reason—it is vital to preserve democratic public choice over foreign policy. Weak public support became an acute issue in the U.S. during the Iraq War as military recruitment and reenlistment rates de- scended. Troops exited the military and accepted less hazardous positions with PMCs for four times more compensation. American public opinion turned firmly against the Iraq War.3 The nine-year U.S. military occupation of Iraq formally ended in December 2011, * M.A. Political Science (Michigan), M.A. Applied Economics (Michigan), LL.M. International Law (Georgetown). The author has taught international law courses for Cooley Law School and the Department of Political Science at the University of Michigan, American Government and Constitutional Law courses for Alma Col- lege, and business law courses at Central Michigan University and the University of Miami.
    [Show full text]
  • Journal of Indo-Pacific Affairs Volume 4, No. 1 Spring 2021
    Vol. 4, No. 2 Spring 2021 The Journal of JIPA Indo-Pacific Affairs Chief of Staff, US Air Force Gen Charles Q. Brown, Jr., USAF Chief of Space Operations, US Space Force Gen John W. Raymond, USSF Commander, Air Education and Training Command Lt Gen Marshall B. Webb, USAF Commander and President, Air University Lt Gen James B. Hecker, USAF Director, Air University Academic Services Dr. Mehmed Ali Director, Air University Press Maj Richard T. Harrison, USAF Chief of Professional Journals Maj Richard T. Harrison, USAF Editorial Staff Dr. Ernest Gunasekara-Rockwell, Editor Luyang Yuan, Editorial Assistant Daniel M. Armstrong, Illustrator Megan N. Hoehn, Print Specialist Journal of Indo-Pacific Affairs ( JIPA) 600 Chennault Circle Maxwell AFB AL 36112-6010 e-mail: [email protected] Visit Journal of Indo-Pacific Affairs online at https://www.airuniversity.af.edu/JIPA/. ISSN 2576-5361 (Print) ISSN 2576-537X (Online) Published by the Air University Press, The Journal of Indo–Pacific Affairs ( JIPA) is a professional journal of the Department of the Air Force and a forum for worldwide dialogue regarding the Indo–Pacific region, spanning from the west coasts of the Americas to the eastern shores of Africa and covering much of Asia and all of Oceania. The journal fosters intellectual and professional development for members of the Air and Space Forces and the world’s other English-speaking militaries and informs decision makers and academicians around the globe. Articles submitted to the journal must be unclassified, nonsensitive, and releasable to the public. Features represent fully researched, thoroughly documented, and peer-reviewed scholarly articles 5,000 to 6,000 words in length.
    [Show full text]
  • The Future of Weapons of Mass Destruction an Update
    A NATIONAL INTELLIGENCE UNIVERSITY PRESIDENTIAL SCHOLAR’S PAPER THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE By John P. Caves, Jr. NIU Presidential Scholar November 2019 – November 2020 and W. Seth Carus THE FUTURE OF WEAPONS OF MASS DESTRUCTION AN UPDATE John P. Caves, Jr. and W. Seth Carus National Intelligence University National Intelligence Press Washington, DC February 2021 The views expressed in this paper are solely those of the authors and do not necessarily reflect those of the National Intelligence University, National Defense University, or any other part of the U.S. government. ACKNOWLEDGMENTS While the authors are solely responsible for the final content of this paper, they benefited greatly from the time, expertise and support freely availed to them by many knowledgeable individuals and organizations. They include Mr. Caves’ colleagues at National Intelligence University (NIU), where he worked on this paper while on a detail assignment from National Defense University (NDU). Mr. Caves expresses par- ticular gratitude to Dr. Brian Holmes, dean of the Anthony G. Oettinger School of Science and Technol- ogy Intelligence, for his leadership, knowledge, and support. Dr. Sharon Adams, Ms. Beverly Barnhart, Mr. George Clifford, Dr. LaMesha Craft, and Dr. R. Carter Morris offered helpful comments on the paper at various stages. They and Mr. Damarius Alston, LTC Jeffrey Bacon, Lt Col Frances Deutch, Ms. Thelma Flamer, Mr. Julian Meade, and Ms. Christina Sanders were among others at NIU whose assistance and support made Mr. Caves’ assignment at NIU enjoyable as well as productive. Both authors are deeply indebted to their colleagues at NDU’s Center for the Study of Weapons of Mass Destruction (CSWMD), especially Mr.
    [Show full text]
  • Filling the Void: Private Security Providers and Their Implications for United States Military Operations in Iraq and Beyond Howard Prentiss Shores III
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2008 Filling the Void: Private Security Providers and Their Implications for United States Military Operations in Iraq and Beyond Howard Prentiss Shores III Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF SOCIAL SCIENCES FILLING THE VOID: PRIVATE SECURITY PROVIDERS AND THEIR IMPLICATIONS FOR UNITED STATES MILITARY OPERATIONS IN IRAQ AND BEYOND By HOWARD PRENTISS SHORES III A Thesis submitted to the Department of International Affairs in partial fulfillment of the requirements for the degree of Master of Science Degree Awarded: Summer Semester, 2008 Copyright © 2008 Howard P. Shores III All Rights Reserved The members of the Committee approve the thesis of Howard Prentiss Shores III, defended on February 25th, 2008. ________________________ Peter Garretson Professor Directing Thesis ________________________ Mark Souva Committee Member ________________________ Michael Creswell Committee Member The Office of Graduate Studies has verified and approved the above named committee members. ii For my Uncle Charles iii ACKNOWLEDGMENTS Many people have contributed to the realization of this work over the course of the past year; without their vigorous dedication, this work would not have been possible. My most sincere thanks to Dr. Peter Garretson for his tireless direction and advice provided over the course of the creation of this thesis. Thanks to the members of my committee, Dr. Mark Souva and Dr. Michael Creswell for their valuable advice and many contributions to this work. I would like to thank my department chair, Dr.
    [Show full text]
  • Counter Insurgency Operations, and Uses the U.S
    CRANFIELD UNIVERSITY COLONEL ALEXANDER ALDERSON THE VALIDITY OF BRITISH ARMY COUNTERINSURGENCY DOCTRINE AFTER THE WAR IN IRAQ 2003-2009 DEFENCE ACADEMY COLLEGE OF MANAGEMENT AND TECHNOLOGY PhD THESIS CRANFIELD UNIVERSITY DEFENCE ACADEMY COLLEGE OF MANAGEMENT AND TECHNOLOGY DEPARTMENT OF APPLIED SCIENCE, SECURITY AND RESILIENCE PhD THESIS Academic Year 2009-2010 Colonel Alexander Alderson The Validity of British Army Counterinsurgency Doctrine after The War in Iraq 2003-2009 Supervisor: Professor E R Holmes November 2009 © Cranfield University 2009. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright owner Abstract This thesis analyses whether the British Army’s doctrinal approach for countering insurgency is still valid in the light of the war in Iraq. Why is this important? Insurgency remains a prevalent form of instability. In the absence of a major conventional threat to British security, it is one which is likely to confront the Army for the foreseeable future. If British doctrine for counterinsurgency has been invalidated by the campaign in Iraq, this will have profound implications for the way the Army approaches, and is organized, equipped and trained for counterinsurgency in the future. If the doctrine is found to be valid, another explanation has to be found to account for the conduct and outcome of British operations in Southern Iraq between 2003 and 2009. Using historiographical techniques, the thesis examines the principal influences on extant British doctrine, developed in 1995. It analyzes the principal British manuals, the influence on doctrine of the campaigns in Malaya and Northern Ireland and the theories of Sir Robert Thompson and Gen.
    [Show full text]
  • Counterinsurgency As Ideology the Evolution of Expert Knowledge Production in U.S
    Counterinsurgency as Ideology The evolution of expert knowledge production in U.S. asymmetric warfare (1898-2011): The cases of the Philippines, Vietnam and Iraq Submitted by Tobias Ruettershoff, to the University of Exeter as a thesis for the degree of Doctor of Philosophy in Strategy and Security, May 2015 This thesis is available for Library use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certify that all material in this thesis which is not my own work has been identified and that no material has previously been submitted and approved for the award of a degree by this or any other University. Signature: ………………………………………………………… 1 While I am on debunking operations, I would like to come to one particular point; it is our use of terminology: The terms ‘insurgency,’ ‘paramilitary operations,’ ‘guerrilla operations,’ ‘limited warfare,’ ‘sublimited warfare,’ etc. We have gotten to the position of the doctor faced with a strange disease. Whenever doctors are faced with a strange disease they give it a long name. It does not cure you, but at least it makes you feel good because you think they know what they are talking about. And this is what we have done with this particular subject. (Bernard Fall 1963) 2 Abstract This PhD thesis examines the status of ‘expert knowledge’ in the history of U.S. asymmetric, or ‘counterinsurgency’ (COIN), warfare during the last century. The historical rise of expert influence has so far been neglected in the study of wars within the field of International Relations and the thesis will give us an indication of the importance and utility of expert knowledge.
    [Show full text]