Constraints on the Waging of War, an Introduction to International

Total Page:16

File Type:pdf, Size:1020Kb

Constraints on the Waging of War, an Introduction to International ISBN 2-88145-115-2 © International Committee of the Red Cross, Frits Kalshoven and Liesbeth Zegveld, Geneva, March 2001 3rd edition Frits Kalshoven and Liesbeth Zegveld CONSTRAINTS ON THE WAGING OF WAR An Introduction to International Humanitarian Law 19, Avenue de la Paix, CH-1202 Geneva T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] Web: www.icrc.org Design: Strategic Communications SA Original: English March 2001 Produced with environment-friendly materials I must retrace my steps, and must deprive those who wage war of nearly all the privileges which I seemed to grant, yet did not grant to them. For when I first set out to explain this part of the law of nations I bore witness that many things are said to be ‘lawful’ or ‘permissible’ for the reason that they are done with impunity, in part also because coactive tribunals lend to them their authority; things which nevertheless, either deviate from the rule of right (whether this has any basis in law strictly so called, or in the admonitions of other virtues), or at any rate may be omitted on higher grounds and with greater praise among good men. Grotius: De jure belli ac pacis Book III, Chapter X, Section I.1. (English translation: Francis G. Kelsey, Oxford, 1925). TABLE OF CONTENTS PREFACE ........................................................... 7 FOREWORD ........................................................... 9 CHAPTER I INTRODUCTION ........................................................ 11 I 1 Object and purpose ............................................... 12 I 2 Custom and treaty ................................................. 15 I 3 Implementation and enforcement ................................. 16 I 4 Structure .......................................................... 17 CHAPTER II THE MAIN CURRENTS: THE HAGUE, GENEVA, NEW YORK ...... 19 II 1 The Hague ........................................................ 19 II 2 Geneva ........................................................... 26 II3 NewYork ......................................................... 29 II 4 Confluence: 1977 and beyond .................................... 32 CHAPTER III THE LAW BEFORE THE PROTOCOLS OF 1977 ...................... 37 III 1 Character of the law ............................................... 37 III 2 Scope of application .............................................. 38 III 3 The Hague ........................................................ 40 3.1 Combatants ............................................... 40 3.2 Means of warfare .......................................... 41 3.3 Methods of warfare ........................................ 44 3.4 Military objectives and protection of the civilian population 44 3.5 Nuclear weapons .......................................... 47 3.6 Cultural property .......................................... 48 III 4 Geneva ........................................................... 51 4.1 Protected persons ......................................... 51 4.2 Principle of protection ..................................... 53 4 CONSTRAINTS ON THE WAGING OF WAR 4.3 First Convention ........................................... 54 4.4 Second Convention ........................................ 56 4.5 Third Convention .......................................... 58 4.6 Fourth Convention ........................................ 61 4.6a General protection of populations against certain consequences of war ............................... 62 4.6b Provisions common to the territory of parties to the conflict and to occupied territory ................................... 63 4.6c Aliens in the territory of a party to the conflict .............. 64 4.6d Occupied territory ......................................... 65 4.6e Internment ................................................. 68 4.6f Information bureaux and Tracing Agency .................. 68 4.7 Common Article 3 ......................................... 69 III 5 Implementation and enforcement ................................. 70 5.1 Instruction and education ................................. 70 5.2 Protecting Powers and other humanitarian agencies ....... 71 5.3 Collective responsibility ................................... 74 5.3a Reciprocity ................................................ 75 5.3b Reprisals .................................................. 76 5.3c Compensation ............................................. 77 5.3d External pressure ........................................... 78 5.3e Collective punishment ..................................... 79 5.4 Individual responsibility ................................... 79 CHAPTER IV THE PROTOCOLS OF 1977 ............................................ 83 IV 1 Protocol I ......................................................... 84 1.1 Character of the law ....................................... 84 1.2 Scope of application ....................................... 85 1.3 Combatant and prisoner-of-war status ..................... 86 1.3a Qualification as ‘armed force’ and ‘combatant’: general rules ............................................... 87 1.3b The individual obligation of the combatant to distinguish himself from civilians ........................ 88 1.3c Exception to the general rule of distinction ................. 88 1.3d Espionage ................................................. 89 1.3e Mercenaries ............................................... 90 1.3f Treatment in case of doubt about status .................... 91 1.4 Methods and means of warfare ............................ 91 1.4a Basic rules ................................................. 91 1.4b Perfidy and ruses of war .................................... 93 1.4c Emblems, flags and uniforms ............................... 94 1.4d Quarter .................................................... 95 TABLE OF CONTENTS 5 1.4e Occupants of an aircraft in distress ......................... 96 1.5 Protection of the civilian population ....................... 96 1.5a Basic rule and field of application .......................... 97 1.5b Civilians and combatants .................................. 98 1.5c Civilian objects and military objectives ..................... 100 1.5d Two main lines of protection ............................... 102 1.5e Prohibition of attacks against the civilian population and civilian objects ........................................ 102 1.5f Prohibition to attack specified objects ...................... 104 1.5g Precautionary measures .................................... 107 1.5h Protection of the civilian population and nuclear weapons .. 111 1.5i Localities and zones under special protection .............. 112 1.5j Civil defence .............................................. 114 1.6 Wounded, sick and shipwrecked .......................... 117 1.6a General remarks ........................................... 117 1.6b Medical units, medical personnel, religious personnel ...... 119 1.6c Medical transportation ..................................... 121 1.6d Identification .............................................. 124 1.6e General protection of medical duties ....................... 125 1.6f Role of the civilian population and of aid societies .......... 125 1.6g Other matters .............................................. 126 1.7 Relief in favour of the civilian population .................. 127 1.8 Treatment of persons in the power of a party to the conflict ............................................. 128 IV 2 Protocol II ........................................................ 132 2.1 Scope of application ....................................... 132 2.2 Protected persons ......................................... 134 2.3 Humane treatment ........................................ 134 2.4 Wounded, sick and shipwrecked .......................... 136 2.5 Civilian population ........................................ 137 IV 3 Implementation and enforcement ................................. 139 3.1 Instruction and education ................................. 139 3.2 Protecting Powers and other humanitarian agencies ....... 140 3.3 Collective responsibility ................................... 142 3.3a Reciprocity ................................................ 143 3.3b Reprisals .................................................. 143 3.3c Compensation ............................................. 147 3.4 Individual responsibility ................................... 147 3.5 Other measures of implementation and enforcement ...... 150 3.5a Activities of the Red Cross and Red Crescent and other humanitarian organisations ...................... 151 3.5b International activities for the promotion of international humanitarian law .......................... 152 3.5c International Humanitarian Fact-Finding Commission ...... 153 6 CONSTRAINTS ON THE WAGING OF WAR CHAPTER V POST-1977 DEVELOPMENTS: SUBSTANTIVE LAW ................. 155 V 1 Conventional weapons ............................................ 155 1.1 The Weapons Convention of 1980 and Annexed Protocols . 155 1.1a The Convention ........................................... 156 1.1b Protocol I on non-detectable fragments ..................... 159 1.1c Protocol II on mines, booby-traps and other devices ........ 159 1.1d Protocol III on incendiary weapons ......................... 162 1.1e Protocol IV on blinding laser weapons ..................... 164 1.1f Amended Protocol II on mines, booby traps and similar devices ........................................ 165 1.1g Reciprocity and reprisals ..................................
Recommended publications
  • The Future of Demilitarisation and Civil Military Relations in West Africa: Challenges and Prospects for Democratic Consolidation*
    The African e-Journals Project has digitized full text of articles of eleven social science and humanities journals. This item is from the digital archive maintained by Michigan State University Library. Find more at: http://digital.lib.msu.edu/projects/africanjournals/ Available through a partnership with Scroll down to read the article. Afr.j. polit. sci. (1998), Vol. 3 No. 1, 82-103 The Future of Demilitarisation and Civil Military Relations in West Africa: Challenges and Prospects for Democratic Consolidation* J 'Kayode Fayemi** Abstract This paper examines the state of civil-military relations and the prospects for demilitarisation anddemocratisation in contemporary West Africa. Its underlying thesis is that West Africa poses one of the greatest dilemmas to the prospects for demilitarisation in Africa. At the same time, it offers a potentially useful mecha- nism for regional peace and security with implications for (de)militarisation in Africa. While the paper recognises the historico-structural dimensions of militarisation as well as the behavioural obstacles to demilitarisation, it captures the challenges and prospects in terms of the complexity of state-civil society relations and suggests a holistic understanding of the concept of security. This, it does with a view to de-emphasising force as the key mechanism for conflict resolution, and promoting an inclusive institutionalframework for demilitarisation and development. Introduction Militarisation is a multi-dimensional process containing phenomena such as rearmament, the growth of armed forces, an increasing role for the military in decision making process, an increasing role for force in conflict resolution and the spread of " militaristic" values. In general,... militarisation is a process whereby the "civilian" sphere is increasingly militarised towards a state of excess, usually referred to as "militarism" (Hettne, 1988,18).
    [Show full text]
  • Aqueduct Racetrack Is “The Big Race Place”
    Table of Contents Chapter 1: Welcome to The New York Racing Association ......................................................3 Chapter 2: My NYRA by Richard Migliore ................................................................................6 Chapter 3: At Belmont Park, Nothing Matters but the Horse and the Test at Hand .............7 Chapter 4: The Belmont Stakes: Heartbeat of Racing, Heartbeat of New York ......................9 Chapter 5: Against the Odds, Saratoga Gets a Race Course for the Ages ............................11 Chapter 6: Day in the Life of a Jockey: Bill Hartack - 1964 ....................................................13 Chapter 7: Day in the Life of a Jockey: Taylor Rice - Today ...................................................14 Chapter 8: In The Travers Stakes, There is No “Typical” .........................................................15 Chapter 9: Our Culture: What Makes Us Special ....................................................................18 Chapter 10: Aqueduct Racetrack is “The Big Race Place” .........................................................20 Chapter 11: NYRA Goes to the Movies .......................................................................................22 Chapter 12: Building a Bright Future ..........................................................................................24 Contributors ................................................................................................................26 Chapter 1 Welcome to The New York Racing Association On a
    [Show full text]
  • Accepting Entries
    FRIDAY, DECEMBER 11, 2020 ©2020 HORSEMAN PUBLISHING CO., LEXINGTON, KY USA • FOR ADVERTISING INFORMATION CALL (859) 276-4026 Ruthless Hanover Turns Heads With Big 1:48.4 Meadowlands Win ACCEPTING ENTRIES Last Saturday’s card at the Meadowlands was highlighted by two performances that turned heads, especially because for the hottest sale this winter of the strong head wind that horses faced as they reached the homestretch, and a wind chill temperature that felt like it was in the 30s. The conditions were so extreme that the judges gave a one-second time allowance. American History, who won last year’s Breeders Crown Open Pace, won the Meadowlands Preferred in 1:48.4, reeling off his third straight win at the Big M. He is back in to go this Saturday night at the Meadowlands in the $28,000 Preferred. American History’s effort last Saturday made the perform- February 9 & 10, 2021 ance turned in by the winner the race before him all the ENTER ONLINE AT more notable. Ruthless Hanover, a 3-year-old gelded son of Somebeachsomewhere, won a non-winners (of six or www.bloodedhorse.com $75,000, for 5 year olds and under and with other condi- Sale entries will close around mid-January, 2021. tions) event by an astounding 5 ¼ lengths in 1:48.4. It was the sophomore’s sixth career victory, which have all come this year because of an injury he sustained as a 2 year old. Going into the race, Ruthless Hanover had a record of 11- 5-2-2 and had won at the Meadowlands in 1:49.2 on Nov.
    [Show full text]
  • Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
    Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer.
    [Show full text]
  • Applying Traditional Military Principles to Cyber Warfare
    2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1].
    [Show full text]
  • JP 3-13.4, Military Deception
    Joint Publication 3-13.4 Military Deception 26 January 2012 EXECUTIVE SUMMARY COMMANDER’S OVERVIEW • Provides an Overview of Military Deception (MILDEC) and the Goals, Objectives, Functions, and Principles • Describes the Relationship between MILDEC and Information Operations • Explains MILDEC Planning Methodology and Planning Steps • Discusses Execution of MILDEC Operations Military Deception and Its Goals, Objectives, Functions, and Principles Military deception Specific guidance from the joint force commander (JFC) or (MILDEC) is actions higher authority during planning will determine the military executed to deliberately deception (MILDEC) role in a joint operation. MILDEC mislead adversary is intended to deter hostile actions, increase the success military, paramilitary, or of friendly defensive actions, or to improve the success violent extremist of any potential friendly offensive action. Use of organization decision MILDEC during any phase of an operation should help to makers, thereby causing mislead adversaries as to the strength, readiness, locations, the adversary to take and intended missions of friendly forces. In combat specific actions (or situations, the focus is on driving the adversary to inactions) that will culmination and achieving the objectives defined by the contribute to the JFC. In noncombat situations, the JFC seeks to dominate accomplishment of the the situation with decisive operations designed to establish friendly mission. conditions for an early, favorable conclusion. MILDEC and Information Care should be taken to protect the quality of information Quality available for friendly decisions and public dissemination. This will help ensure the JFC has accurate information by not allowing staffs to unknowingly perceive the joint task force’s MILDEC efforts as accurate information.
    [Show full text]
  • 389 Darling Bird
    Barn 6 Hip No. Consigned by Select Sales, Agent XIV 389 Darling Bird Grindstone . Unbridled KBIF Birdstone . {Buzz My Bell {Dear Birdie . Storm Bird Darling Bird . {Hush Dear Chestnut mare; Deputy Minister . Vice Regent foaled 2010 {Darling My Darling . {Mint Copy (1997) {Roamin Rachel . Mining {One Smart Lady By BIRDSTONE (2001), [G1] $1,575,600. Sire of 9 crops, 17 black type wnrs, $19,280,493, including Summer Bird ($2,323,040, champion, Belmont S. [G1], etc.), Mine That Bird ($2,228,637, champion, Ky. Derby [G1], etc.), Noble Bird [G1] (to 4, 2015, $531,278), Birdrun [G2] ($622,816), Thank You Marylou [G3] ($444,292), Florida Won [G3] (to 4, 2015, $365,687). 1st dam DARLING MY DARLING, by Deputy Minister. 5 wins, 2 to 4, $352,359, Dou- bledogdare S. [L] (KEE, $67,270), Raven Run S. [L] (KEE, $51,104), 2nd Frizette S. [G1], Matron S. [G1], 3rd Stonerside Beaumont S. [G2]. Dam of 9 foals of racing age, 4 to race, all winners, including-- FOREVER DARLING (f. by Congrats). Winner in 4 starts at 2 and 3, 2016, $155,400, Santa Ynez S. [G2] (SA, $120,000). Darling Mon (g. by Maria’s Mon). 4 wins at 5 and 7, $70,908. 2nd dam ROAMIN RACHEL, by Mining. 9 wins in 15 starts, 2 to 4, $529,778, Ballerina H. [G1], Beaumont S. [G2], Brown and Williamson H. [G3], Princess Rooney H. [L] (CRC, $60,000), Queen Breeders’ Cup S. [L] (TP, $57,168), Ruthless S. [L] (AQU, $40,500), Bonnie Leaf S. [L] (AQU, $31,860), 2nd Turfway Budweiser Breeders’ Cup S.
    [Show full text]
  • Prohibiting Mines, Booby-Traps and Other Devices (As Amended 1996)
    Protocol on Prohibitions or Restrictions on the Use of Mines, Booby-Traps and Other Devices as amended on 3 May 1996 (Protocol II to the 1980 Convention as amended on 3 May 1996) Article I - Scope of application 1.This Protocol relates to the use on land of the mines, booby-traps and other devices, defined herein, including mines laid to interdict beaches, waterway crossings or river crossings, but does not apply to the use of anti-ship mines at sea or in inland waterways. 2.This Protocol shall apply, in addition to situations referred to in Article I of this Convention, to situations referred to in Article 3 common to the Geneva Conventions of 12 August 1949. This Protocol shall not apply to situations of internal disturbances and tensions, such as riots, isolated and sporadic acts of violence and other acts of a similar nature, as not being armed conflicts. 3.In case of armed conflicts not of an international character occurring in the territory of one of the High Contracting Parties, each party to the conflict shall be bound to apply the prohibitions and restrictions of this Protocol. 4.Nothing in this Protocol shall be invoked for the purpose of affecting the sovereignty of a State or the responsibility of the Government, by all legitimate means, to maintain or re-establish law and order in the State or to defend the national unity and territorial integrity of the State. 5.Nothing in this Protocol shall be invoked as a justification for intervening, directly or indirectly, for any reason whatever, in the armed conflict or in the internal or external affairs of the High Contracting Party in the territory of which that conflict occurs.
    [Show full text]
  • Fm 6-27 Mctp 11-10C the Commander's Handbook on the Law of Land Warfare
    FM 6-27 MCTP 11-10C THE COMMANDER'S HANDBOOK ON THE LAW OF LAND WARFARE AUGUST 2019 DISTRIBUTION RESTRICTION: Approved for public release; distribution is unlimited. This publication supersedes FM 27-10/MCTP 11-10C, dated 18 July 1956. HEADQUARTERS, DEPARTMENT OF THE ARMY HEADQUARTERS, UNITED STATES MARINE CORPS Foreword The lessons of protracted conflict confirm that adherence to the law of armed conflict (LOAC) by the land forces, both in intern ational and non-international armed conflict, must serve as the standard that we train to and apply across the entire range of military operations. Adhering to LOAC enhances the legitimacy of our operations and supports the moral framework of our armed forces. We have learned th at we deviate from these norms to our detriment and risk undercutting both domesti c and international support for our operations. LOAC has been and remains a vital guide for all military operations conducted by the U.S. Governm ent. This fi eld manual provides a general description of the law of land warfare for Soldiers and Marines, delineated as statements of doctrine and practice, to gui de the land forces in conducting di sci plined military operations in accordance with the rule of law. The Department of Defense Law of War Manual (June 20 15, updated December 2016) is the authoritative statement on the law of war for the Department of Defense. In the event of a conflict or discrepancy regarding the legal standards addressed in this publication and th e DOD Law of War Manual, the latter takes precedence.
    [Show full text]
  • FASIG-TIPTON MIDLANTIC Under Tack Show-May 17, 18, 2006 Two-Year-Olds in Training Sale
    FASIG-TIPTON MIDLANTIC Under Tack Show-May 17, 18, 2006 Two-Year-Olds in Training Sale HIP DESCRIPTION TIME HIP DESCRIPTION TIME HIP DESCRIPTION TIME 1 c Graeme Hall OUT 56 f Caller I. D. 10.2 111 c Outofthebox 11.3 2 f Buddha OUT 57 f Darn That Alarm OUT 112 c Johannesburg 22.3 3 c Devil His Due 24.1 58 c Songandaprayer 22.1 113 c Black Minnaloushe OUT 4 c Boundary 11 59 c Acceptable 10.3 114 c Lemon Drop Kid 21.3 5 c Prime Timber 23.2 60 f Two Punch 22.1 115 c Crafty Friend OUT 6 f Gulch 11.1 61 f Forestry 11.3 116 f Yonaguska 22.1 7 f Tale Of The Cat 21.2 62 f Not For Love 10.4 117 c Lemon Drop Kid 10.1 8 c Pulpit 10.2 63 c Gulch 11.1 118 c Texas Glitter 11 9 c Northern Afleet 11.4 64 f Smoke Glacken 23.2 119 c Stormin Fever 11 10 f Yonaguska 22.3 65 c Albert The Great 10.4 120 f Five Star Day 22.1 11 c Unbridled Time 23.2 66 c Honor Glide 35.4 121 f Concerto 10.3 12 c Cee's Tizzy 11.1 67 c Touch Gold 10.4 122 g Golden Missile OUT 13 f Salt Lake 10.4 68 f Red Bullet OUT 123 f Glitterman 10.2 14 f Deputy Minister 11 69 f Distorted Humor 10.3 124 f Devil His Due 10.4 15 c Housebuster 22.2 70 c City Zip 22.3 125 f Snow Ridge 11 16 f Grand Slam OUT 71 c Hennessy OUT 126 f Storm Boot OUT 17 c Gibson County 10.4 72 c Maria's Mon 21.4 127 f Jump Start 23 18 c Indian Charlie 22.2 73 c Behrens OUT 128 c Holy Bull 21.3 19 c Maria's Mon 22.1 74 c Northern Afleet OUT 129 c Commanchero 11 20 f Stormy Atlantic 10.4 75 f Golden Gear 11 130 c Our Emblem 21.4 21 c Deputy Commander 10.4 76 c Street Cry (IRE) 22.2 131 f Lost Soldier 10.3 22 c Lemon Drop
    [Show full text]
  • Viet Cong Improvised Explosive Mines and Boobytraps
    vmmiLl MACV IL 53 RELEASEABLETO FWMAFVAND RVNAF _ c.1 NOV23 1966 COUNTERINSURGENCY LESSONS WET CONG IMPRdVlSED EXPLOSIVE MINES AND BOQBY TRAPS (U) MODIFIEDHAND1 I N6 AU1 MODIFIED HANDLING AUTHORIZED HEADQUARTERS UNITED STATESMILITARY ASSISTANCECOMMAND, VIETNAM APO San Francisco 96243 MCJ343 29 September 1966 SUBJECT: Counterinsurgency Lessons Learned No $3 (Revised): Viet Cong Improvised Explosive Mines and Booby Traps (U) SEE DISTRIBUTION 1. Attached as an inclosure is a revised edition of Lessons Learned No 53. This issue of Lessons Learned supersedes Lessons Learned No 53 dated 6 December 1965. 2. This publication is a more complete treatment of Viet Gong mine and booby trap techniques than its predecessor based on recently acquired intelligence on this subject. In this respect it is an expansion of the previous issue rather than a change. FOR THE COHKANDER: 1 Incl 'E. W. CANNON as Major, AGC Asat AC DISTRIBUTION (see pages 9 & 10 of Incl 1) ORIZE D - HEADQUARTERS UNITED STATES MILITARY ASSISTANCE COMXAND, VIETNAM APO San Francisco 96243 mCJ343 29 September 1966 SUBJECT: Counterinsurgency Lessons Learned No 53 (Revised): Viet Cone; Improvised Explosive Mines and Booby Traps (U) TO: SEE DISTRIBUTION 1. (U) BACKGROUND: During the French and Viet Minh conflict the Vi& Minh used improvised explosive mines and booby traps effectively to harass, slow down and demoralize the French forces. The Viet Cong (VC) have improved upon their predecessor*s techniques and are using emplaced munitions as an effective weapon. This effectiveness is attested to by the high percentage of US casualties which are caused by VC mines and booby traps. It is quite evident that we must learn something of the munitions and their use by the VC.
    [Show full text]
  • Grenades and Land Mines, Japanese Robert J
    Claremont Colleges Scholarship @ Claremont CGU Faculty Publications and Research CGU Faculty Scholarship 1-1-2001 Grenades and Land Mines, Japanese Robert J. Bunker Claremont Graduate University Recommended Citation Bunker, Robert J. "Grenades and Land Mines, Japanese." World War II in the Pacific: An Encyclopedia. New York: Garland Publishing, 2001. 210-211. This Article is brought to you for free and open access by the CGU Faculty Scholarship at Scholarship @ Claremont. It has been accepted for inclusion in CGU Faculty Publications and Research by an authorized administrator of Scholarship @ Claremont. For more information, please contact [email protected]. 210 Grenades and Land Mines, Japanese nese factories This conference presented a belated justification for the were idle or only partly productive and that Pacific war. Part of the Joint Declaration of the Greater new military pilots could receive only the most rudimen­ East Asia Conference read: tary tram mg. In the end, the sphere did nor serve the purpose either The United States of America and the British Em­ of uniting East Asia against rhe Allies or of harnessing the pire have in seeking their own prosperity oppressed region's economy to the Japanese war effort. By the end other nations and peoples. Especially in East Asia, of the war, the economy of East Asia was devastated not they indulged in insatiable aggression and exploi­ only from war damage and the dislocation of markets but tation, and so ught to satisfy their inordinate am­ also from the effects of Japanese oversight, which was fo­ bition of enslaving the entire region, and finally cused solely on the war effort.
    [Show full text]