GSSR-6.1-December-2017.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

GSSR-6.1-December-2017.Pdf Georgetown Security Studies Review 5:1 1 Georgetown Security Studies Review Volume 6, Issue 1 December 2017 A Publication of the Center for Security Studies at Georgetown University’s Edmund A. Walsh School of Foreign Service http://gssr.georgetown.edu Georgetown Security Studies Review 6:1 GEORGETOWN SECURITY STUDIES REVIEW Published by the Center for Security Studies at Georgetown University’s Edmund A. Walsh School of Foreign Service Robert Morgan Byrne-Diakun, Editor-in-Chief Jake Howry, Deputy Editor Shannon Mizzi, Associate Editor for Africa Rebekah Kennel, Associate Editor for Asia Luke Drabyn, Associate Editor for Europe Christen Soden, Associate Editor for the Middle East Emily Kangas, Associate Editor for National Security & the Military Jack Lucas, Associate Editor for Technology & Cyber Security Sarah Gilkes, Associate Editor for Terrorism & Counterterrorism Access the Georgetown Security Studies Review online at http://gssr.georgetown.edu Connect on Facebook at http://www.facebook.com/GeorgetownUniversityGSSR Follow the Georgetown Security Studies Review on Twitter at ‘@gssreview’ Contact the Editor-in-Chief at [email protected] DISCLAIMER The views expressed in Georgetown Security Studies Review do not necessarily represent those of the editors or staff of GSSR, the Edmund A. Walsh School of Foreign Service, or Georgetown University. The editorial board of GSSR and its affiliated peer reviewers strive to verify the accuracy of all factual information contained in GSSR. However, the staffs of GSSR, the Edmund A. Walsh School of Foreign Service, and Georgetown University make no warranties or representations regarding the completeness or accuracy of information contained in GSSR, and they assume no legal liability or responsibility for the content of any work contained therein. Copyright 2012-2017, Georgetown Security Studies Review. All rights reserved. ISSN 2474-8552 (print); ISSN 2474-8560 (online) 1 Georgetown Security Studies Review 6:1 TABLE OF CONTENTS The “Sick Man of Eurasia”: Quarantining the Russian Federation in the 21st Century ............... 8 Douglas A. Livermore The Russian Federation in the early 21st century is only a weak aspirant to the mantle of the former Soviet Union, which itself was never truly a geopolitical equal of the United States. The Russian Federation today is “The Sick Man of Eurasia” and nurses its delusions of bygone imperial grandeur despite its many weaknesses and crumbling prospects. Moscow is now diplomatically isolated from the post-Soviet world order, ideologically bereft of a viable vision with which to compete on the global stage, overwhelmingly reliant on a conventionally weak military, and facing an increasingly grim economic outlook. Demographic shifts are also changing the ethnic composition of Russia, which will have significant influence on the future direction of the Federation. Faced with such a weak global “competitor,” the best path forward for the United States and its allies is to pursue an updated “containment” or “quarantine” strategy, similar to that which succeeded in defeating the Soviet Union’s Cold War ambitions. This quarantine approach would minimize the potential for catastrophic state-on- state war with Russia, leverage Russia’s own internal weaknesses over the long term to mitigate its disruptive global activities, and increase the prospects of an eventual Russian transition to a more peaceful, responsible, and democratic form of representative government prepared to integrate into the existing world order. US Assistance to Syrian Kurdish Forces ..................................................................................... 22 Rebecca Lucas US Special Forces support for Syrian Kurdish forces fighting ISIS, most prominently the People’s Protection Units (YPG), has focused on military support such as train and equip missions. However, the YPG’s increasing territorial control indicates that in order to ensure long-term stability in Syria, the United States needs to assist with building the institutions necessary for good governance. Historical examples indicate that, even with this support, the United States cannot control its partners enough to ensure that they do not act in ways that perpetuate instability and popular dissent. 2 Georgetown Security Studies Review 6:1 Domestic Politics, Military Reforms, and Threat Perceptions: Three Factors Influencing Russian Decision-Making in its Near Abroad ............................................................................ 33 Nicholas Fedyk The troubling escalation in Russian-American tensions today partly stems from Russian meddling in Ukraine. Of all the countries that make up Russia’s near abroad, Ukraine is the most populous and prosperous, and its positioning between Europe and Russia has made it a flashpoint in big power politics in recent years. This paper explores why exactly Russia is destabilizing Ukraine by comparing President Putin’s different responses to two revolutions in post-Soviet Ukraine—the 2004 Orange Revolution and the 2013-2014 Euromaidan. After establishing that the revolutions are sufficiently similar to merit comparison, I will evaluate three potential factors that influenced Putin’s response: 1. The transition of Putin’s inner circle of advisers from liberal, Western-oriented economists to security-community colleagues more skeptical and hostile towards the West. 2. Military reforms that significantly improved the performance of the armed forces. 3. Escalating threat perceptions associated with Ukraine and its Western allies. I conclude that in 2014 Putin was more willing (due to Russia’s domestic politics), more capable (due to Russia’s military reforms), and more threatened (due to Russia’s geopolitical situation) to utilize military force against Ukraine. At a time when Russia has become a major national security priority, this bears several lessons for countering future Russian adventurism. A Commitment to Peace or Just Good Enough?: Analyzing the Tuareg Uprisings in Niger (1990-2009) ................................................................................................................................. 48 Emily Gilbert Despite their treatment as two distinct rebellions, the Nigerien Tuareg insurgencies were one phenomenon that witnessed multiple swells of violence. The Nigerien government’s initial response was an attempt at an authoritarian counter-insurgency campaign. The government, however, had neither the institutional capacity nor the means to sustain such an operation. Prolonged fighting both weakened the state’s financial resources and undermined the quality of its armed forces. The state failed equally in its initial attempts at a negotiated settlement, allowing conflict to break out once again in 2007. Ultimately, despite the feebleness in the state’s responses, the insurgency ended not due to government efforts, but due to critical weaknesses in the insurgent groups themselves. 3 Georgetown Security Studies Review 6:1 The Role of the Security Services in Russian Foreign Adventurism and Its Consequences for US Policy ........................................................................................................................................... 64 Nicholas McCarty Russian intelligence services have garnered a great deal of press attention in the last year over cyber warfare, hacking, and their influence on Western democracy. Missing from this conversation (in the West at least) is the influence of the security services on Russia itself. As Vladimir Putin and Russia have become increasingly isolated from the international community, Russia’s foreign policy has become dominated by the so-called siloviki, ex-security service members who hope to steer the state toward their interests. Greater awareness of the history and role of the state security services in Russian society is needed if US policymakers are to respond correctly to future crises. An Unorthodox Call to Arms: The Humanitarian Case for Military Intervention in the DPRK ............................................................................................................................... 74 Bryant King In the landmark 2014 Report of the Commission of Inquiry on Human Rights in the Democratic People’s Republic of Korea (DPRK), the United Nations claims that the DPRK is presiding over “systematic, widespread, and gross human rights violations” against its citizenry, whose “gravity, scale, and nature reveal a state that does not have any parallel in the contemporary world.” Consequently, it is appropriate for the United States and its allies to consider whether military intervention might be justified to address this situation, based on the Responsibility to Protect (R2P) framework developed by the International Commission on Intervention and State Sovereignty (ICISS) and the UN’s 2005 World Summit Outcome Document. Because preventive and non-military reactive measures implemented against the DPRK have not ameliorated the state’s human rights situation, the United States and its allies should view military intervention as a viable and legitimate course of action. However, the United States and its allies must recognize the ethical and political challenges they would face in the period leading up to and during the execution of a military intervention, and be willing to support long-running and extensive post-intervention state-building operations lead by the United Nations. While conducting a military intervention might seem a counterintuitive measure to address
Recommended publications
  • Country of Origin Information Report Syria June 2021
    Country of origin information report Syria June 2021 Page 1 of 102 Country of origin information report Syria | June 2021 Publication details City The Hague Assembled by Country of Origin Information Reports Section (DAF/AB) Disclaimer: The Dutch version of this report is leading. The Ministry of Foreign Affairs of the Netherlands cannot be held accountable for misinterpretations based on the English version of the report. Page 2 of 102 Country of origin information report Syria | June 2021 Table of contents Publication details ............................................................................................2 Table of contents ..........................................................................................3 Introduction ....................................................................................................5 1 Political and security situation .................................................................... 6 1.1 Political and administrative developments ...........................................................6 1.1.1 Government-held areas ....................................................................................6 1.1.2 Areas not under government control. ............................................................... 11 1.1.3 COVID-19 ..................................................................................................... 13 1.2 Armed groups ............................................................................................... 13 1.2.1 Government forces .......................................................................................
    [Show full text]
  • Officials Say Flynn Discussed Sanctions
    Officials say Flynn discussed sanctions The Washington Post February 10, 2017 Friday, Met 2 Edition Copyright 2017 The Washington Post All Rights Reserved Distribution: Every Zone Section: A-SECTION; Pg. A08 Length: 1971 words Byline: Greg Miller;Adam Entous;Ellen Nakashima Body Talks with Russia envoy said to have occurred before Trump took office National security adviser Michael Flynn privately discussed U.S. sanctions against Russia with that country's ambassador to the United States during the month before President Trump took office, contrary to public assertions by Trump officials, current and former U.S. officials said. Flynn's communications with Russian Ambassador Sergey Kislyak were interpreted by some senior U.S. officials as an inappropriate and potentially illegal signal to the Kremlin that it could expect a reprieve from sanctions that were being imposed by the Obama administration in late December to punish Russia for its alleged interference in the 2016 election. Flynn on Wednesday denied that he had discussed sanctions with Kislyak. Asked in an interview whether he had ever done so, he twice said, "No." On Thursday, Flynn, through his spokesman, backed away from the denial. The spokesman said Flynn "indicated that while he had no recollection of discussing sanctions, he couldn't be certain that the topic never came up." Officials said this week that the FBI is continuing to examine Flynn's communications with Kislyak. Several officials emphasized that while sanctions were discussed, they did not see evidence that Flynn had an intent to convey an explicit promise to take action after the inauguration. Flynn's contacts with the ambassador attracted attention within the Obama administration because of the timing.
    [Show full text]
  • People for Profit: North Korean Forced Labour on a Global Scale Edited by Remco E
    PEOPLE FOR PROFIT People for Profit North Korean Forced Labour on a Global Scale Edited by Remco E. Breuker & Imke B.L.H. van Gardingen Contributors Jan Blinka Britt C.H. Blom Marte C.H. Boonen Klara Boonstra Rosa Brandse Remco E. Breuker Imke B.L.H. van Gardingen Larissa van den Herik Tycho A. van der Hoog Marieke P. Meurs Cedric Ryngaert Shannon R. Stewart Anoma P. van der Veere This is an open source publication by LeidenAsiaCentre. Copyright © 2018 (authors). People for Profit: North Korean Forced Labour on a Global Scale Edited by Remco E. Breuker and Imke B.L.H. van Gardingen ISBN 978-90-826167-1-2 (hardback) ISBN 978-90-826167-3-6 (e-book) LeidenAsiaCentre is an independent research centre affiliated with Leiden University and made possible by a grant from the Vaes Elias Fund. The centre focuses on academic research with direct application to society. All research projects are conducted in close cooperation with a wide variety of partners from Dutch society. More information can be found on our website: www.leidenasiacentre.nl For contact or orders: [email protected] M. de Vrieshof 3, 2311 BZ Leiden, The Netherlands Book design: A.P. van der Veere Contents Contributors IX Acknowledgements XII Introduction Remco E. Breuker and Imke B.L.H. van Gardingen 1 Chapter I Setting the Background: Labour Conditions in the DPRK Remco E. Breuker 6 Chapter II Accountability for DPRK Workers in the Value Chain: The Case of Partner Shipyard, a Polish Shipbuilder and its Dutch Partners Imke B.L.H.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • The Kremlin's Irregular Army: Ukrainian Separatist Order of Battle
    THE KREMLIN’S IRREGULARY ARMY: UKRAINIAN SEPARATIST ORDER OF BATTLE | FRANKLIN HOLCOMB | AUGUST 2017 Franklin Holcomb September 2017 RUSSIA AND UKRAINE SECURITY REPORT 3 THE KREMLIN’S IRREGULAR ARMY: UKRAINIAN SEPARATIST ORDER OF BATTLE WWW.UNDERSTANDINGWAR.ORG 1 Cover: A Pro-Russian separatist sits at his position at Savur-Mohyla, a hill east of the city of Donetsk, August 28, 2014. REUTERS/Maxim Shemetov. Reproduced with permission. All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage or retrieval system, without permission in writing or from the publisher. ©2017 by the Institute for the Study of War. Published in 2017 in the United States of America by the Instittue for the Study of War. 1400 16th Street NW, Suite 515 | Washington, DC 20036 understandingwar.org 2 Franklin Holcomb The Kremlin’s Irregular Army: Ukrainian Separatist Order of Battle ABOUT THE AUTHOR Franklin Holcomb is a Russia and Ukraine Research Analyst at the Institute for the Study of War where he focuses on the war in Ukraine, Ukrainian politics, and Russian foreign policy in Eastern Europe. His current research focuses on studying the development of the Armed Forces of Ukraine and the Russian-backed separatist formations operating in Eastern Ukraine, as well as analyzing Russian political and military activity in Moldova, the Baltic, and the Balkans. Mr. Holcomb is the author of “The Order of Battle of the Ukrainian Armed Forces: A Key Component in European Security,” “Moldova Update: Kremlin Will Likely Seek to Realign Chisinau”, “Ukraine Update: Russia’s Aggressive Subversion of Ukraine,” as well as ISW’s other monthly updates on the political and military situation in Ukraine.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • List of Goods Produced by Child Labor Or Forced Labor a Download Ilab’S Sweat & Toil and Comply Chain Apps Today!
    2018 LIST OF GOODS PRODUCED BY CHILD LABOR OR FORCED LABOR A DOWNLOAD ILAB’S SWEAT & TOIL AND COMPLY CHAIN APPS TODAY! Browse goods Check produced with countries' child labor or efforts to forced labor eliminate child labor Sweat & Toil See what governments 1,000+ pages can do to end of research in child labor the palm of Review laws and ratifications your hand! Find child labor data Explore the key Discover elements best practice of social guidance compliance systems Comply Chain 8 8 steps to reduce 7 3 4 child labor and 6 forced labor in 5 Learn from Assess risks global supply innovative and impacts company in supply chains chains. examples ¡Ahora disponible en español! Maintenant disponible en français! B BUREAU OF INTERNATIONAL LABOR AFFAIRS How to Access Our Reports We’ve got you covered! Access our reports in the way that works best for you. ON YOUR COMPUTER All three of the USDOL flagship reports on international child labor and forced labor are available on the USDOL website in HTML and PDF formats, at www.dol.gov/endchildlabor. These reports include the Findings on the Worst Forms of Child Labor, as required by the Trade and Development Act of 2000; the List of Products Produced by Forced or Indentured Child Labor, as required by Executive Order 13126; and the List of Goods Produced by Child Labor or Forced Labor, as required by the Trafficking Victims Protection Reauthorization Act of 2005. On our website, you can navigate to individual country pages, where you can find information on the prevalence and sectoral distribution of the worst forms of child labor in the country, specific goods produced by child labor or forced labor in the country, the legal framework on child labor, enforcement of laws related to child labor, coordination of government efforts on child labor, government policies related to child labor, social programs to address child labor, and specific suggestions for government action to address the issue.
    [Show full text]
  • Shifting Patterns in Internet Use Reveal Adaptable and Innovative North Korean Ruling Elite
    CYBER THREAT ANALYSIS Shifting Patterns in Internet Use Reveal Adaptable and Innovative North Korean Ruling Elite By Insikt Group Recorded Future CTA-2018-1025 CYBER THREAT ANALYSIS Scope Note: Insikt Group examined North Korean senior leadership’s internet activity by analyzing third-party data, IP geolocation, Border Gateway Protocol (BGP) routing tables, and open source intelligence (OSINT) using a number of tools. The data analyzed for this report spans from March 16, 2018 through August 30, 2018. This report will be of greatest interest to government departments and organizations within the technology, finance, defense, cryptocurrency, and logistics sectors, as well as those investigating North Korean sanctions circumvention, illicit financing, and state- sponsored cyberespionage. Executive Summary Over the course of the past year and a half, Recorded Future has published a series of research pieces revealing unique insight into the behavior of North Korea’s most senior leadership. We discovered that North Korea’s ruling elite are technologically savvy, use a full range of older and cutting-edge computers, phones, and devices, use the internet as a tool for sanctions circumvention, and recently shifted to embrace Chinese social networking services over Western ones. In this final piece in our series, we explore the persistence of trends in internet security, social media use, and cryptocurrency, and reveal greater insight into the way North Korea uses the internet to generate revenue for the Kim regime. In particular, shifting patterns in the ruling elite’s internet usage reveal just how adaptable and innovative North Korea’s most senior leadership are. The Kim regime has developed a model for using and exploiting the internet that is unique, and leadership are quick to embrace new services or technologies when useful and cast them aside when not.
    [Show full text]
  • Make Technology Great Again
    Make Technology Great Again Michał „rysiek” Woźniak [email protected] Everything is Broken – Quinn Norton https://medium.com/message/everything-is-broken-81e5f33a24e1 "Malicious Word Doc Uses ActiveX To Infect" https://www.vmray.com/blog/malicious-word-doc-uses-activex-infect/ "Word Malware: OLE Exploited in Zero-Day Attack" https://www.vadesecure.com/en/word-doc-malware/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Dynamic Data Exchange was frst introduced in 1987 with the release of Windows 2.0” https://en.wikipedia.org/wiki/Dynamic_Data_Exchange "As part of the December 2017 Patch Tuesday, Microsoft has shipped an Ofce update that disables the DDE feature in Word applications, after several malware campaigns have abused this feature to install malware.” https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-dde-feature-in-word- to-prevent-further-malware-attacks/ "Microsoft Ofce macro malware targets Macs" https://blog.malwarebytes.com/cybercrime/2017/02/microsoft-ofce-macro- malware-targets-macs/ "Beware PowerSniff Malware uses Word macros and PowerShell scripts" https://www.grahamcluley.com/beware-powersnif-malware/
    [Show full text]
  • Cyber Activities in the Syrian Conflict CSS CY
    CSS CYBER DEFENSE PROJECT Hotspot Analysis The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Zürich, October 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict, October 2017, Center for Security Studies (CSS), ETH Zürich. 2 The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Attribution and actors 9 Pro-government groups 9 Anti-government groups 11 Islamist groups 11 State actors 12 Non-aligned groups 13 3.2 Targets 13 3.3 Tools and techniques 14 Data breaches 14
    [Show full text]
  • Situation in Ukraine
    COMMUNICATION SUBMITTED UNDER ARTICLE 15 OF THE ROME STATUTE OF THE INTERNATIONAL CRIMINAL COURT SITUATION IN UKRAINE: WAR CRIMES AND CRIMES AGAINST HUMANITY COMMITTED IN PRISONS SEIZED AND CONTROLLED BY ANTI-GOVERNMENT FORCES September 2020 TABLE OF ABBREVIATIONS ATO Anti-Terrorist Operation CF Correctional Facility DPR Donetsk Peoples’ Republic ECHR European Convention on Human Rights ECtHR European Court of Human Rights FIDH International Federation for Human Rights IAC International Armed Conflict ICC International Criminal Court ICTY International Criminal Tribunal for the Former Yugoslavia KHPG Kharkiv Human Rights Protection Group LPR Luhansk Peoples’ Republic NIAC Non-International Armed Conflict PTDC Pre Trial Detention Centre SBU Ukrainian State Security UAF Ukrainian Armed Forces The preparation and elaboration of this FIDH-KHPG Communication were made possible thanks to the support of the United Nations Development Programme in Ukraine, International Renaissance Foundation, the European Commission, Open Society Foundations, National Endowment for Democracy (United States), the Democracy Commission of the United States Embassy in Ukraine, and the Ministry of Foreign Affairs of the Netherlands. The contents of this publication are the sole responsibility of FIDH and KHPG and can in no way be taken to reflect the views of the aforementioned supporting institutions. 2 TABLE OF CONTENTS Table of abbreviations 2 I. Introduction 4 II. Executive Summary 6 III. Filing Parties 9 IV. Methodology 12 V. Factual Background 17 A. Outbreak of Armed Conflict in Eastern Ukraine 17 B. Ukrainian Prisons in Donetsk and Luhansk Provinces Prior 24 to the Outbreak of Armed Conflict C. Impact of the Outbreak of Armed Conflict on Prisoners in 24 Eastern Ukraine D.
    [Show full text]
  • Memorial on Admissibility on Behalf of the Government of Ukraine
    Ukraine v. Russia (re Eastern Ukraine) APPLICATION NO. 8019/16 Kyiv, 8 November 2019 MEMORIAL ON ADMISSIBILITY ON BEHALF OF THE GOVERNMENT OF UKRAINE CHAPTER 1: INTRODUCTION 1. The Russian Federation has consistently denied its involvement in the conflict in eastern Ukraine, and has sought to evade international legal responsibility by adopting a series of measures to disguise and “outsource” its military aggression in eastern Ukraine. The Kremlin’s denials of direct involvement were implausible from the outset, and were roundly rejected by the international community. All of the relevant international institutions rightly hold Moscow responsible for a pattern of conduct that has been designed to destabilise Ukraine by sponsoring separatist entities in the use of armed force against the legitimate Government and members of the civilian population. Almost from the outset, the United Nations, the Council of Europe, the European Union, and the G7 all re-affirmed Ukraine’s sovereignty and territorial integrity within its internationally recognised borders, and condemned the Russian Federation’s continuing proxy war in eastern Ukraine. As the conflict has continued, the evidence of Russia’s direct and indirect involvement in the violent rebellion in Donbass has become more and more apparent. Despite Russia’s crude attempts to conceal its involvement, the proof of Russian State responsibility has steadily mounted. In the face of the obvious truth, Russia’s policy of implausible deniability has fallen apart completely. 2. Ukraine submits that the human rights violations committed by Russian forces and their proxies, as particularised in this application, fall directly within Russia’s extra-territorial jurisdiction for the purposes of article 1 of the Convention.
    [Show full text]