Just Deserters: Why Indefinite National Service in Eritrea Has Created a Generation of Refugees
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Pulses in Ethiopia, Their Taxonomy and Agricultural Significance E.Westphal
Pulses in Ethiopia, their taxonomy andagricultura l significance E.Westphal JN08201,579 E.Westpha l Pulses in Ethiopia, their taxonomy and agricultural significance Proefschrift terverkrijgin g van degraa dva n doctori nd elandbouwwetenschappen , opgeza gva n derecto r magnificus, prof.dr .ir .H .A . Leniger, hoogleraar ind etechnologie , inne t openbaar teverdedige n opvrijda g 15 maart 1974 desnamiddag st evie ruu r ind eaul ava nd eLandbouwhogeschoo lt eWageninge n Centrefor AgriculturalPublishing and Documentation Wageningen- 8February 1974 46° 48° TOWNS AND VILLAGES DEBRE BIRHAN 56 MAJI DEBRE SINA 57 BUTAJIRA KARA KORE 58 HOSAINA KOMBOLCHA 59 DE8RE ZEIT (BISHUFTU) BATI 60 MOJO TENDAHO 61 MAKI SERDO 62 ADAMI TULU 8 ASSAB 63 SHASHAMANE 9 WOLDYA 64 SODDO 10 KOBO 66 BULKI 11 ALAMATA 66 BAKO 12 LALIBELA 67 GIDOLE 13 SOKOTA 68 GIARSO 14 MAICHEW 69 YABELO 15 ENDA MEDHANE ALEM 70 BURJI 16 ABIYAOI 71 AGERE MARIAM 17 AXUM 72 FISHA GENET 16 ADUA 73 YIRGA CHAFFE 19 ADIGRAT 74 DILA 20 SENAFE 75 WONDO 21 ADI KAYEH 76 YIRGA ALEM 22 ADI UGRI 77 AGERE SELAM 23 DEKEMHARE 78 KEBRE MENGIST (ADOLA) 24 MASSAWA 79 NEGELLI 25 KEREN 80 MEGA 26 AGOROAT 81 MOYALE 27 BARENIU 82 DOLO 28 TESENEY 83 EL KERE 29 OM HAJER 84 GINIR 30 DEBAREK 85 ADABA 31 METEMA 86 DODOLA 32 GORGORA 87 BEKOJI 33 ADDIS ZEMEN 88 TICHO 34 DEBRE TABOR 89 NAZRET (ADAMA 35 BAHAR DAR 90 METAHARA 36 DANGLA 91 AWASH 37 INJIBARA 92 MIESO 38 GUBA 93 ASBE TEFERI 39 BURE 94 BEDESSA 40 DEMBECHA 95 GELEMSO 41 FICHE 96 HIRNA 42 AGERE HIWET (AMB3) 97 KOBBO 43 BAKO (SHOA) 98 DIRE DAWA 44 GIMBI 99 ALEMAYA -
American War and Military Operations Casualties: Lists and Statistics
American War and Military Operations Casualties: Lists and Statistics Updated July 29, 2020 Congressional Research Service https://crsreports.congress.gov RL32492 American War and Military Operations Casualties: Lists and Statistics Summary This report provides U.S. war casualty statistics. It includes data tables containing the number of casualties among American military personnel who served in principal wars and combat operations from 1775 to the present. It also includes data on those wounded in action and information such as race and ethnicity, gender, branch of service, and cause of death. The tables are compiled from various Department of Defense (DOD) sources. Wars covered include the Revolutionary War, the War of 1812, the Mexican War, the Civil War, the Spanish-American War, World War I, World War II, the Korean War, the Vietnam Conflict, and the Persian Gulf War. Military operations covered include the Iranian Hostage Rescue Mission; Lebanon Peacekeeping; Urgent Fury in Grenada; Just Cause in Panama; Desert Shield and Desert Storm; Restore Hope in Somalia; Uphold Democracy in Haiti; Operation Enduring Freedom (OEF); Operation Iraqi Freedom (OIF); Operation New Dawn (OND); Operation Inherent Resolve (OIR); and Operation Freedom’s Sentinel (OFS). Starting with the Korean War and the more recent conflicts, this report includes additional detailed information on types of casualties and, when available, demographics. It also cites a number of resources for further information, including sources of historical statistics on active duty military deaths, published lists of military personnel killed in combat actions, data on demographic indicators among U.S. military personnel, related websites, and relevant CRS reports. Congressional Research Service American War and Military Operations Casualties: Lists and Statistics Contents Introduction .................................................................................................................................... -
Human Trafficking and Trauma in the Digital Era: the Ongoing Tragedy of the Trade in Refugees from Eritrea
Human Trafficking and Trauma in the Digital Era: The Ongoing Tragedy of the Trade in Refugees from Eritrea Edited by Mirjam Van Reisen & Munyaradzi Mawere Langaa Research & Publishing CIG Mankon, Bamenda Publisher: Langaa RPCIG Langaa Research & Publishing Common Initiative Group P.O. Box 902 Mankon Bamenda North West Region Cameroon [email protected] www.langaa-rpcig.net Distributed in and outside N. America by African Books Collective [email protected] www.africanbookscollective.com ISBN-10: ISBN-13: © Mirjam Van Reisen and Munyaradzi Mawere 2017 Contributing Editor Meron Estefanos Editorial Assistant Lena Reim Copyeditors Susan Sellars-Shrestha and Anirudh Krishnan Advisor (report content) Zecarias Gerrima, Reem Abbas and Klara Smits Translators Medhanie Ghebregzabiher Paulos and Bealfan T Haile All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, mechanical or electronic, including photocopying and recording, or be stored in any information storage or retrieval system, without written permission from the publisher This document has been produced with the financial assistance of the European Union. The contents of this document are the sole responsibility of Tilburg University and can under no circumstances be regarded as reflecting the position of the European Union. Table of Contents Acknowledgements…....……………………………………. xv Justification………………………………….……………… xvii Acronyms…………………………...…….………………… xix Chapter 1: Introduction..………….………………………. 1 The ongoing human trafficking crisis………..……………… 1 Severe trauma…………………………….…………………. 6 A crisis of accountability………………….………………… 7 Main conclusions…………………………...……………….. 11 Part 1: The Ongoing Human Trafficking Crisis….…….. 17 Chapter 2: Human Trafficking in the Sinai: Mapping the Routes and Facilitators……..…………….. 19 Introduction………………………………….……………... 19 Deliberate impoverishment and control: Establishing human trafficking structures……….………….. -
Lessons from Others for Future U.S. Army Operations in and Through the Information Environment
C O R P O R A T I O N Lessons from Others for Future U.S. Army Operations in and Through the Information Environment Christopher Paul, Colin P. Clarke, Michael Schwille, Jakub P. Hlávka, Michael A. Brown, Steven S. Davenport, Isaac R. Porche III, Joel Harding For more information on this publication, visit www.rand.org/t/RR1925z1 Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-9815-3 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2018 RAND Corporation R® is a registered trademark. Cover photos (clockwise from top left): Giorgio Montersino via Flickr (CC BY-SA 2.0); U.S. Air Force photo by Airman 1st Class Adawn Kelsey; U.S. Air Force photo by Tech Sgt John Gordinier; U.S. Air National Guard photo by Master Sgt Andrew J. Moseley; Russian Ministry of Defence (CC BY 4.0); North Korean national media Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous. -
Civilians in Cyberwarfare: Conscripts
Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION ............................................................. -
How State Involvement in Un Peacekeeping Reduces
PACIFYING THE PEACEKEEPERS: HOW STATE INVOLVEMENT IN U.N. PEACEKEEPING REDUCES MILITARY THREATS TO DEMOCRACY by TIMOTHY JAMES ALEXANDER PASSMORE B.A., Lee University, 2006 M.Litt., University of St. Andrews, 2007 M.A., University of Colorado Boulder, 2015 A thesis submitted to the Faculty of the Graduate School of the University of Colorado in partial fulfillment of the requirement for the degree of Doctor of Philosophy Department of Political Science 2019 This thesis entitled: Pacifying the Peacekeepers: How State Involvement in U.N. Peacekeeping Reduces Military Threats to Democracy written by Timothy James Alexander Passmore has been approved for the Department of Political Science ___________________________________________ Associate Professor Megan Shannon (Chair) ___________________________________________ Professor Jaroslav Tir ___________________________________________ Associate Professor Carew Boulding ___________________________________________ Professor David H. Bearce ___________________________________________ Assistant Professor Benjamin Teitelbaum (Department of Musicology) Date________________ The final copy of this thesis has been examined by the signatories, and we find that both the content and the form meet acceptable presentation standards of scholarly work in the above mentioned discipline. ii ABSTRACT Passmore, Timothy James Alexander (Ph.D., Political Science). Pacifying the Peacekeepers: How State Involvement in U.N. Peacekeeping Reduces Military Threats to Democracy. Dissertation directed by Associate Professor Megan Shannon. What explains why countries undergoing transitions to democracy are major contributors of personnel to United Nations peacekeeping operations? In recent decades, the provision of such personnel has been adopted largely by weak or nascent democracies. In the same period, the world has witnessed a decline in military coup activity. I argue that new democracies use peacekeeping to reduce the threat posed by the military during the years of transition and thereby increase the likelihood of democratic consolidation. -
Cyberspace Operations
Updated December 15, 2020 Defense Primer: Cyberspace Operations Overview force; (2) compete and deter in cyberspace; (3) strengthen The Department of Defense (DOD) defines cyberspace as a alliances and attract new partnerships; (4) reform the global domain within the information environment department; and (5) cultivate talent. consisting of the interdependent network of information technology infrastructures and resident data, including the Three operational concepts identified in the DOD Cyber internet, telecommunications networks, computer systems, Strategy are to conduct cyberspace operations to collect and embedded processors and controllers. The DOD intelligence and prepare military cyber capabilities to be Information Network (DODIN) is a global infrastructure used in the event of crisis or conflict, and to defend forward carrying DOD, national security, and related intelligence to disrupt or halt malicious cyber activity at its source, community information and intelligence. including activity that falls below the level of armed conflict. Defending forward may involve a more aggressive Cyberspace operations are composed of the military, active defense, meaning activities designed to disrupt an intelligence, and ordinary business operations of the DOD adversary’s network when hostile activity is suspected. in and through cyberspace. Military cyberspace operations use cyberspace capabilities to create effects that support Cyber Mission Force operations across the physical domains and cyberspace. DOD began to build a Cyber Mission Force (CMF) in 2012 Cyberspace operations differ from information operations to carry out DOD’s cyber missions. The CMF consists of (IO), which are specifically concerned with the use of 133 teams that are organized to meet DOD’s three cyber information-related capabilities during military operations missions. -
Military Service Veterans Corps
Military Service Veterans Corps. The Military Service Medal, authorized in 2006, may be presented to a Compatriot in recognition of military service which does not otherwise qualify for the War Service Medal. Compatriots of Military Service Veterans Corps are unique. Although they are not eligible for one of the war SAR Veterans Corps, they answered the call – drafted or volunteered, when it was popular and when it was not. Clearly when America needed it's guardians of freedom, members of the SAR Military Service Veterans Corps were there. Since the end of World War II, their members have served around the globe for more than 70 years. They complemented our Armed Forces, ensuring that the Constitution and freedoms established by our founding fathers would not die. They served at home and at times in locations most of us haven’t heard of. They did it in the air, on land and at sea. They served with our active duty forces and our reserve forces. They have served with conviction, honor and pride. Proof of Service: Proof of service, in the form of a copy of the member's discharge, DD-214, or other U.S. or Allied Government proof, especially in the case of a member in active service, must be provided to the NSSAR Veterans Recognition Committee, State Society Secretary or Chapter secretary (depending on presenting authority) before the medal can be purchased and/or worn. Such proof must show that the Compatriot served, or is serving, honorably in: (1) the armed forces of the United States, (2) the military forces of a country allied with the United States, or (3) a United Nations Peace Keeping Force. -
Eritrea's Damages Claims
REPORTS OF INTERNATIONAL ARBITRAL AWARDS RECUEIL DES SENTENCES ARBITRALES Eritrea-Ethiopia Claims Commission - Final Award - Eritrea's Damages Claims 17 August 2009 VOLUME XXVI pp. 505-630 NATIONS UNIES - UNITED NATIONS Copyright (c) 2009 PART XVII Final Award Eritrea’s Damages Claims Decision of 17 August 2009 Sentence finale Réclamations de dommages de l’Érythrée Décision du 17 août 2009 part xvii—Final AWARD eritrea’s damages claims 507 Final Award, Eritrea’s Damages Claims Decision of 17 August 2009 Sentence finale, Réclamations de dommages de l’Érythrée, Décision du 17 août 2009 The final awards on claims for damages complete the Commission’s work— except for administratie matters, disposition of its archies and potential post-Award matters . Compensation can only be awarded where there is eidence sufficient in the circumstances to establish the extent of damage caused by conduct the Commission preiously found to hae violated international law . The awards probably do not reflect the totality of damages suffered by either Party but rather the damages that could be established with sufficient certainty through aailable eidence in complex interna- tional legal proceedings between Parties with modest resources and limited time . Eidence of physical damage to buildings and infrastructure is more readily gathered and presented than eidence of the extent of injuries, including physical, economic and moral injuries, to large numbers of indiiduals . There is no sharp dis- tinction between loss of property and death or personal injury in poor countries where security of property is often vital to surial . Awards for loss or destruction of property frequently stem from serious threats to physical integrity . -
ERI 2/2021 19 April 2021
PALAIS DES NATIONS • 1211 GENEVA 10, SWITZERLAND Mandates of the Working Group on Arbitrary Detention; the Special Rapporteur on the situation of human rights in Eritrea; the Special Rapporteur on extrajudicial, summary or arbitrary executions; the Special Rapporteur on the right to food; the Special Rapporteur on adequate housing as a component of the right to an adequate standard of living, and on the right to non- discrimination in this context; the Special Rapporteur on the human rights of internally displaced persons; the Special Rapporteur on trafficking in persons, especially women and children; and the Special Rapporteur on the human rights to safe drinking water and sanitation REFERENCE: AL ERI 2/2021 19 April 2021 Excellency, We have the honour to address you in our capacity as Working Group on Arbitrary Detention; Special Rapporteur on the situation of human rights in Eritrea; Special Rapporteur on extrajudicial, summary or arbitrary executions; Special Rapporteur on the right to food; Special Rapporteur on adequate housing as a component of the right to an adequate standard of living, and on the right to non- discrimination in this context; Special Rapporteur on the human rights of internally displaced persons; Special Rapporteur on trafficking in persons, especially women and children; and Special Rapporteur on the human rights to safe drinking water and sanitation, pursuant to Human Rights Council resolutions 42/22, 44/1, 44/5, 32/8, 43/14, 41/15, 44/4 and 42/5. In this connection, we would like to bring to the attention of your Excellency’s Government information we have received concerning allegations related to violations of human rights and international humanitarian law committed by the Eritrean Army in the Tigray region of Ethiopia, including deliberate attacks against civilians and summary executions, indiscriminate attacks, sexual and gender-based violence, arbitrary detention, destruction and looting of civilian property and displacement. -
Fiscal Year 2019 Annual Report on Sexual Assault in the Military
Department of Defense Annual Report on Sexual Assault in the Military Fiscal Year 2019 0 DOD SAPRO Department of Defense Annual Report on Sexual Assault in the Military Fiscal Year 2019 The estimated cost of this report for the Department of Defense is approximately $2,367,000 for the 2019 Fiscal Year. This includes $1,863,000 in expenses and $504,000 in labor. Generated on 2020Apr17 RefID: D-A4BC881 1 DOD SAPRO Table of Contents Executive Summary ................................................................................................................... 3 Introduction ...............................................................................................................................10 Unit Climate ..............................................................................................................................11 Sexual Assault Reporting ..........................................................................................................14 Victim Assistance ......................................................................................................................17 Efforts to Reduce and Stop Sexual Assault ...............................................................................20 Way Forward ............................................................................................................................24 Appendices Appendix A: Additional Accomplishments, Activities, and Outreach Appendix B: Statistical Data on Sexual Assault Appendix C: Metrics and Non-Metrics on Sexual -
Eritrea's Local Media Interview with President Isaias Afwerki
Eritrea’s Local Media Interview with President Isaias Afwerki Mr. President, best wishes to you and to our readers on the occasion of the New Year. What are the key GOE development plans for this year? First and foremost I would like to convey my best wishes, even if somewhat belated, for the New Year to the Eritrean people at home and abroad. Energy has for long remained a priority development program for the government. Indeed, electricity supply constituted the biggest challenge facing the nation’s development plans from the outset. The Hirgigo power plant was thus constructed almost immediately after independence early in the 1990s to catalyze sectorial developmental plans. For a variety of reasons, including timely maintenance failures, the status of the energy sector and electricity supply in the past few years have been dismal. The main priority now is to embark on sustainable expansion of energy services. This will require both the development of new supplies and more efficient utilization of current energy resources. Efficiency must be a core objective. The first measure taken to promote efficiency is to charge the real cost of energy. Secondly, major investments are being made to restructure the national electric power supply system. New, higher voltage lines are being installed in the electrical grid in order to increase transmission and distribution efficiency. The challenges of distributing electricity on a nationwide scale through a single interconnected system are massive of course. The notion of expecting the Hirgigo Power plant to provide electricity to far off areas such as Tesseney, Omhajer, Sel’a, Assab, Qarura, cannot be cost-effective and feasible.