Counterinsurgency a Generic Reference Curriculum
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan. -
International Humanitarian Law and the Challenges of Contemporary Armed
INTERNATIONAL HUMANITARIAN LAW AND THE CHALLENGES OF CONTEMPORARY ARMED CONFLICTS RECOMMITTING TO PROTECTION IN ARMED CONFLICT ON THE 70TH ANNIVERSARY OF THE GENEVA CONVENTIONS REPORT INTERNATIONAL HUMANITARIAN LAW AND THE CHALLENGES OF CONTEMPORARY ARMED CONFLICTS RECOMMITTING TO PROTECTION IN ARMED CONFLICT ON THE 70TH ANNIVERSARY OF THE GENEVA CONVENTIONS TABLE OF CONTENTS EXECUTIVE SUMMARY ..........................................................................................................................5 CHAPTER 1: INTRODUCTION .................................................................................................................9 CHAPTER 2: CONTEMPORARY AND FUTURE CHALLENGES IN THE CONDUCT OF HOSTILITIES ........15 1. Urbanization of armed conflicts ........................................................................................................ 16 A) The protection of civilians against the effects of hostilities during urban warfare ..................................16 B) The use of explosive weapons in populated areas ....................................................................................................19 C) The protection of the civilian population during sieges .......................................................................................22 2. New technologies of warfare .............................................................................................................26 A) Cyber operations, their potential human cost, and the protection afforded by IHL .................................26 -
The Australians in Vietnam 1962-1972
“They Were Hard Nuts”: The Australians in Vietnam, 1962-1972 A focus on the American failure to make maximum use of the Australians’ counterinsurgency tactics in South Vietnam Kate Tietzen Clemson University Abstract: Addressing the need for studies examining the relationship between Commonwealth militaries and the American military, this paper examines the American military’s relationship with the Australian military contingency sent to Vietnam between 1962 and 1972. Analyzing Foreign Relations of the United States (FRUSA) documents, Australian government documents and Australian primary sources including interviews, papers, and autobiographies, this paper argues that the Americans deliberately used the Australian army in South Vietnam for show rather than force. The paper also illustrates American efforts to discredit and ignore Australian counterinsurgency doctrine and tactics; this undertaking only hindered the overall American anti- communist mission in Vietnam. Australia (1) Met all day Sunday (2) They were hard nuts (3) They had a long list of their contributions to Vietnam already (4) Real progress was made with Holt when went upstairs alone and told of the seriousness of the matter (5) Holt told Taylor that he was such a good salesman that he was glad he had not brought his wife to the meeting —Dr. Clark Clifford, meeting with President Lyndon B. Johnson 5 August 19671 While the Viet Minh and the French fought each other during the First Indochina War in Vietnam, Australia was fighting a guerilla-style war in Malaysia in what has been dubbed the “Malayan Emergency” of 1948-1960. In October of 1953, the Australian Defence Committee, the New Zealand Chiefs of Staff and the British Chief of the Imperial General Staff met in Melbourne to air concerns regarding the possibility of Chinese aggression in Southeast Asia.2 The delegation feared Chinese determination for communist control in Southeast Asia, which would threaten the accessibility of strategic raw materials for western powers in the area. -
United Nations Manual for the Generation and Deployment of Military and Formed Police Units to Peace Operations
United Nations Manual for the Generation and Deployment of Military and Formed Police Units to Peace Operations May 2021 DEPARTMENT OF PEACE OPERATIONS DEPARTMENT OF OPERATIONAL SUPPORT 0 Produced by: Office of Military Affairs and Office of the Police Adviser Department of Peace Operations UN Secretariat New York, NY 10017 Tel. 917-367-2487 Approved by: Jean-Pierre Lacroix, Under-Secretary-General for Peace Operations Department of Peace Operations (DPO). Atul Khare Under-Secretary-General for Operational Support Department of Operational Support (DOS) This is the first version of this Manual, May 2021 Contact: DPO/OMA/FGS and DPO/PD/SRS Review date: May 2024 Reference number: 2021.05 Printed at the UN, New York © UN 2021. This publication enjoys copyright under Protocol 2 of the Universal Copyright Convention. Nevertheless, governmental authorities or Member States may freely photocopy any part of this publication for exclusive use within their training institutes. However, no portion of this publication may be reproduced for sale or mass publication without the express consent, in writing, of the Office of Military Affairs and Office of the Police Adviser, UN Department of Peace Operations. 1 Contents Preface ............................................................................................................................................................4 Purpose and Scope .........................................................................................................................................4 Chapter 1. Introduction -
Cuban Antifascism and the Spanish Civil War: Transnational Activism, Networks, and Solidarity in the 1930S
Cuban Antifascism and the Spanish Civil War: Transnational Activism, Networks, and Solidarity in the 1930s Ariel Mae Lambe Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2014 © 2014 Ariel Mae Lambe All rights reserved ABSTRACT Cuban Antifascism and the Spanish Civil War: Transnational Activism, Networks, and Solidarity in the 1930s Ariel Mae Lambe This dissertation shows that during the Spanish Civil War (1936–1939) diverse Cubans organized to support the Spanish Second Republic, overcoming differences to coalesce around a movement they defined as antifascism. Hundreds of Cuban volunteers—more than from any other Latin American country—traveled to Spain to fight for the Republic in both the International Brigades and the regular Republican forces, to provide medical care, and to serve in other support roles; children, women, and men back home worked together to raise substantial monetary and material aid for Spanish children during the war; and longstanding groups on the island including black associations, Freemasons, anarchists, and the Communist Party leveraged organizational and publishing resources to raise awareness, garner support, fund, and otherwise assist the cause. The dissertation studies Cuban antifascist individuals, campaigns, organizations, and networks operating transnationally to help the Spanish Republic, contextualizing these efforts in Cuba’s internal struggles of the 1930s. It argues that both transnational solidarity and domestic concerns defined Cuban antifascism. First, Cubans confronting crises of democracy at home and in Spain believed fascism threatened them directly. Citing examples in Ethiopia, China, Europe, and Latin America, Cuban antifascists—like many others—feared a worldwide menace posed by fascism’s spread. -
Meserole Brookings CV 2021
CHRISTOPHER O. MESEROLE 1775 Massachusetts Ave NW, Washington DC 20036 (202) 797-6180 | [email protected] POSITIONS Director of Research and Policy, Brookings AI & Emerging Tech Initiative (2020-) Deputy Director, Brookings AI & Emerging Tech Initiative (2019-2020) Fellow, Foreign Policy, Brookings Institution (2017-) Post-Doctoral Fellow in Foreign Policy, Brookings Institution (2016-2017) Pre-Doctoral Fellow in Foreign Policy, Brookings Institution (2015-2016) AFFILIATIONS Co-Facilitator, GIFCT CAPPI Working Group (2020-) Co-PI, Brookings High-Level Working Group on Disinformation (2019-2020) Member, Christchurch Call Advisory Network (2019-) Adjunct Professor, Georgetown University (2019-) Member, Research Advisory Council, RESOLVE Network (2019-) Member, Digital Freedom Forum, CNAS (2019-) EDUCATION A.B., highest honors in field, Harvard University, Cambridge, MA, 2002 M.Div., S.T.M, Yale University, NeW Haven, CT, 2009, 2010 Ph.D., University of Maryland, College Park, MD, 2017 RESEARCH Artificial intelligence, emerging technology, international security; digital INTERESTS authoritarianism; counterterrorism and countering violent extremism; nonparametric machine learning, interpretable machine learning, differential privacy and homomorphic encryption, decentralized ledger technology WRITING “Exporting Digital Authoritarianism,” Brookings Institution, September 2019. (With Alina Polyakova.) “HoW Big Tech Can Fight White Supremacist Terrorism,” Foreign Affairs, August 2019. (With Daniel Byman.) “Terrorist Definitions and Designation -
Highlights of Recent RAND Research on Counterinsurgency
Highlights of Recent RAND Research on Counterinsurgency For more information, contact Shirley Ruhe, Director of Congressional Relations, at 703-413-1100, x5632 or [email protected], or Kurt Card, National Security Legislative Analyst, at 703-413-1100 x5259 or [email protected] As the leading research authority on counterinsurgency, the RAND Corporation has developed a wide selection of materials for policy makers. With multiple insurgencies operating in several theaters this research was developed to provide a historical, geographical, and functional understanding of past and present insurgencies and counterinsurgency operations. Social Science for Counterterrorism Putting the Pieces Together Darcy Noricks et al., 2009 This report from an interdisciplinary project to survey and integrate the scholarly social- science literature relevant to counterterrorism answers questions related to why some individuals become terrorists, how terrorists generate public support, how terrorist organizations make decisions, and why individuals disengage. A Stability Police Force for the United States Justification and Options for Creating U.S. Capabilities Terrence K. Kelly et al., 2009 Establishing security is the sine qua non of stability operations, since it is a prerequisite for reconstruction and development. Security requires a mix of military and police forces to deal with a range of threats from insurgents to criminal organizations. This research examines the creation of a high-end police force, which the authors call a Stability Police Force. 1 Underkill Scalable Capabilities for Military Operations amid Populations David C. Gompert et al., 2009 The battle for Gaza revealed an extremist strategy: hiding in cities and provoking attack to cause civilian deaths that can be blamed on the attacking forces. -
GAO-05-419T Military Personnel: Preliminary Observations On
United States Government Accountability Office Testimony GAO Before the Subcommittee on Military Personnel, Committee on Armed Services, House of Representatives For Release on Delivery Expected at 2:00 p.m. EST MILITARY PERSONNEL Wednesday, March 16, 2005 Preliminary Observations on Recruiting and Retention Issues within the U.S. Armed Forces Statement of Derek B. Stewart, Director, Defense Capabilities and Management a GAO-05-419T March 16, 2005 MILITARY PERSONNEL Accountability Integrity Reliability Highlights Preliminary Observations on Recruiting Highlights of GAO-05-419T, a testimony to and Retention Issues within the U.S. the Chairman, Subcommittee on Military Personnel, Committee on Armed Services, Armed Forces House of Representatives Why GAO Did This Study What GAO Found To meet its human capital needs, DOD’s 10 military components generally met their overall recruitment and the Department of Defense (DOD) retention goals for each of the past 5 fiscal years (FY), but some of the must convince several hundred components experienced difficulties in meeting their overall goals in early thousand people to join the military FY 2005. However, it should be noted that several components introduced a each year while, at the same time, “stop loss” policy shortly after September 11, 2001. The “stop loss” policy retain thousands of personnel to sustain its active duty, reserve, and requires some servicemembers to remain in the military beyond their National Guard forces. Since contract separation date, which may reduce the number of personnel the September 11, 2001, DOD has components must recruit. During FY 2000-2004, each of the active launched three major military components met or exceeded their overall recruiting goals. -
Law of Armed Conflict
Lesson 1 THE LAW OF ARMED CONFLICT Basic knowledge International Committee of the Red Cross Unit for Relations with Armed and Security Forces 19 Avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org Original: English – June 2002 INTRODUCTION TO THE LAW OF ARMED CONFLICT BASIC KNOWLEDGE LESSON 1 [ Slide 2] AIM [ Slide 3] The aim of this lesson is to introduce the topic to the class, covering the following main points: 1. Background: setting the scene. 2. The need for compliance. 3. How the law evolved and its main components. 4. When does the law apply? 5. The basic principles of the law. INTRODUCTION TO THE LAW OF ARMED CONFLICT 1. BACKGROUND: SETTING THE SCENE Today we begin a series of lectures on the law of armed conflict, which is also known as the law of war, international humanitarian law, or simply IHL. To begin, I’d like to take a guess at what you’re thinking right now. Some of you are probably thinking that this is an ideal opportunity to catch up on some well-earned rest. “Thank goodness I’m not on the assault course or on manoeuvres. This is absolutely marvellous. I can switch off and let this instructor ramble on for 45 minutes. I know all about the Geneva Conventions anyway – the law is part of my culture and our military traditions. I really don't need to listen to all this legal ‘mumbo jumbo’.” The more sceptical and cynical among you might well be thinking along the lines of a very famous orator of ancient Rome – Cicero. -
Combatant Status and Computer Network Attack
Combatant Status and Computer Network Attack * SEAN WATTS Introduction .......................................................................................... 392 I. State Capacity for Computer Network Attacks ......................... 397 A. Anatomy of a Computer Network Attack ....................... 399 1. CNA Intelligence Operations ............................... 399 2. CNA Acquisition and Weapon Design ................. 401 3. CNA Execution .................................................... 403 B. State Computer Network Attack Capabilites and Staffing ............................................................................ 405 C. United States’ Government Organization for Computer Network Attack .............................................. 407 II. The Geneva Tradition and Combatant Immunity ...................... 411 A. The “Current” Legal Framework..................................... 412 1. Civilian Status ...................................................... 414 2. Combatant Status .................................................. 415 3. Legal Implications of Status ................................. 420 B. Existing Legal Assessments and Scholarship.................. 424 C. Implications for Existing Computer Network Attack Organization .................................................................... 427 III. Departing from the Geneva Combatant Status Regime ............ 430 A. Interpretive Considerations ............................................. 431 * Assistant Professor, Creighton University Law School; Professor, -
Noncombatant Immunity and War-Profiteering
In Oxford Handbook of Ethics of War / Published 2017 / doi:10.1093/oxfordhb/9780199943418.001.0001 Noncombatant Immunity and War-Profiteering Saba Bazargan Department of Philosophy UC San Diego Abstract The principle of noncombatant immunity prohibits warring parties from intentionally targeting noncombatants. I explicate the moral version of this view and its criticisms by reductive individualists; they argue that certain civilians on the unjust side are morally liable to be lethally targeted to forestall substantial contributions to that war. I then argue that reductivists are mistaken in thinking that causally contributing to an unjust war is a necessary condition for moral liability. Certain noncontributing civilians—notably, war-profiteers— can be morally liable to be lethally targeted. Thus, the principle of noncombatant immunity is mistaken as a moral (though not necessarily as a legal) doctrine, not just because some civilians contribute substantially, but because some unjustly enriched civilians culpably fail to discharge their restitutionary duties to those whose victimization made the unjust enrichment possible. Consequently, the moral criterion for lethal liability in war is even broader than reductive individualists have argued. 1 In Oxford Handbook of Ethics of War / Published 2017 / doi:10.1093/oxfordhb/9780199943418.001.0001 1. Background 1.1. Noncombatant Immunity and the Combatant’s Privilege in International Law In Article 155 of what came to be known as the ‘Lieber Code’, written in 1866, Francis Lieber wrote ‘[a]ll enemies in regular war are divided into two general classes—that is to say, into combatants and noncombatants’. As a legal matter, this distinction does not map perfectly onto the distinction between members and nonmembers of an armed force. -
Libraries in West Malaysia and Singapore; a Short History
DOCUMENT RESUME ED 059 722 LI 003 461 AUTHOR Tee Edward Lim Huck TITLE Lib aries in West Malaysia and Slngap- e; A Sh History. INSTITUTION Malaya Univ., Kuala Lumpur (Malaysia). PUB DATE 70 NOTE 169p.;(210 References) EDRS PRICE MF-$0.65 HC-$6.58 DESCRIPTORS Foreign Countries; History; *Libraries; Library Planning; *Library Services; Library Surveys IDENTIFIERS *Library Development; Singapore; West Malaysia ABSTRACT An attempt is made to trace the history of every major library in Malay and Singapore. Social and recreational club libraries are not included, and school libraries are not extensively covered. Although it is possible to trace the history of Malaysia's libraries back to the first millenium of the Christian era, there are few written records pre-dating World War II. The lack of documentation on the early periods of library history creates an emphasis on developments in the modern period. This is not out of order since it is only recently that libraries in West Malaysia and Singapore have been recognized as one of the important media of mass education. Lack of funds, failure to recognize the importance of libraries, and problems caused by the federal structure of gc,vernment are blamed for this delay in development. Hinderances to future development are the lack of trained librarians, problems of having to provide material in several different languages, and the lack of national bibliographies, union catalogs and lists of serials. (SJ) (NJ (NJ LIBR ARIES IN WEST MALAYSIA AND SINGAPORE f=t a short history Edward Lirn Huck Tee B.A.HONS (MALAYA), F.L.A.