Rethinking the Drone War

Total Page:16

File Type:pdf, Size:1020Kb

Rethinking the Drone War RETHINKING THE DRONE WAR RETHINKING THE DRONE WAR NATIONAL SECURITY, LEGITIMACY, AND CIVILIAN CASUALTIES IN U.S. COUNTERTERRORISM OPERATIONS LARRY LEWIS DIANE M. VAVRICHEK A joint publication of CNA and Marine Corps University Press MCUP MARINE CORPS UNIVERSITY PRESS Quantico, Virginia 2016 This book represents the best opinion of the authors at the time of printing. The views and opinions are the authors’ own, and do not necessarily represent those of CNA, the Department of the Navy, the U.S. Marine Corps, Marine Corps University, or the U.S. government. MCUP MARINE CORPS UNIVERSITY PRESS Marine Corps University Press CNA Corporation 111 South Street 3003 Washington Boulevard Quantico, VA 22134 Arlington, VA 22201 www.usmcu.edu/mcupress www.cna.org 1st printing, 2016 Library of Congress Cataloging-in-Publication Data Names: Lewis, Larry L. (Lawrence L.), author. | Vavrichek, Diane, author. Title: Rethinking the drone war : national security, legitimacy, and civilian casualties in U.S. counterterrorism operations / Larry Lewis, Diane Vavrichek. Other titles: National security, legitimacy, and civilian casualties in U.S. counterterrorism operations Description: Quantico, VA : CNA and Marine Corps University Press, [2016] | Includes index. Identifiers: LCCN 2016034013 Subjects: LCSH: Drone aircraft--United States--History. | Drone aircraft--Government policy--United States. | Drone aircraft--Moral and ethical aspects--United States. | Uninhabited combat aerial vehicles--Government policy--United States. | Terrorism--Prevention--Government policy--United States. | Targeted killing--Government policy--United States. | Civilian war casualties--Prevention. | United States--Military policy--Moral and ethical aspects. | United States--Military policy--Public opinion. | National security--United States. Classification: LCC UG1242.D7 L48 2016 | DDC 363.325/16--dc23 LC record available at https://lccn.loc.gov/2016034013 ISBN 978-0-9973174-3-5 Drone Strikes in Pakistan © 2014 by CNA Corporation The Future of Drone Strikes © 2014 by CNA Corporation Improving Lethal Action © 2014 by CNA Corporation Security and Legitimacy © by CNA Corporation (forthcoming) CONTENTS Illustrations vii Tables ix Preface xi Acknowledgments xiii Abbreviations xv PART I Drone Strikes in Pakistan: Assessing Civilian Casualties Chapter 1: Introduction 1 Chapter 2: Drone Strike Casualty Estimates 6 Chapter 3: Discrepancies in Civilian Casualty Estimates 12 Chapter 4: Platform Precision or Comprehensive Process? 20 Chapter 5: The Drone Campaign and Civilian Harm 24 Chapter 6: Conclusions and Recommendations 30 PART II The Future of Drone Strikes: A Framework for Analyzing Policy Options Chapter 7: Introduction 37 Chapter 8: Framework and Policy Options 44 Chapter 9: Military Effectiveness 57 Chapter 10: Legitimacy 65 v Chapter 11: Anticipating Net Effectiveness 89 Chapter 12: Conclusions and Recommendations 95 PART III Improving Lethal Action: Learning and Adapting in U.S. Counterterrorism Operations Chapter 13: Introduction 105 Chapter 14: An Analytical Approach to Improve Lethal Action Operations 114 Chapter 15: Illustrating the Approach 127 Chapter 16: Implementing the Approach 150 Chapter 17: Benefits of the Process 155 Chapter 18: Conclusions and Recommendations 164 PART IV Security and Legitimacy: Learning from the Past Decade of Operations Chapter 19: Introduction 171 Chapter 20: Lesson One: Promoting Legitimacy 175 Chapter 21: Lesson Two: Practicing Legitimacy 189 Chapter 22: Conclusions and Recommendations 197 Appendix A: Title 10, Title 50, and Oversight 209 Appendix B: Covert Actions 213 Index 223 vi | Contents ILLUSTRATIONS Figure 1. Disparate estimates for civilian deaths from drone strikes in Pakistan, 2004 –13 Figure 2. Comprehensive process for reducing and mitigating civilian harm Figure 3. Number of drone strikes in Pakistan per year Figure 4. Percent of operations resulting in civilian deaths per year Figure 5. Analytical approach to improve lethal force operations Figure 6. Perceived tension between mission success and CIVCAS Figure 7. Common relationship between mission success and CIVCAS in Afghanistan Figure 8. Relationship between mission success and CIVCAS Figure 9. Lethal action operations per year in Pakistan and Yemen Figure 10. Target type distribution for lethal action operations in Pakistan and Yemen, 2012–14 Figure 11. Percent of lethal action operations that successfully targeted a senior leader, by target type vii Figure 12. Maximum/minimum combatant casualties from lethal action opera- tions with different target types Figure 13. Percent of lethal action operations causing civilian deaths, by year Figure 14. Average civilian deaths per incident, by year Figure 15. Average civilian deaths per operation Figure 16. Relationship between mission success and CIVCAS Figure 17. Initial locations of U.S. forces and civilian convoy Figure 18. Movement of civilian convoy Figure 19. Strike on civilian convoy Appendix figure 1. Relationship between legal and doctrinal definitions of covert viii | Illustrations TABLES Table 1. Overall statistics for drone strikes in Pakistan, 2004 –13 Table 2. Potential advantages of increased TME and perceived legitimacy Table 3. Potential effects of policy options on military effectiveness and identi- fied legitimacy issues Table 4. Short- and long-term effects of mission success and CIVCAS Table 5. Hypothetical report card for meeting PPG goals Table 6. Overall civilian death statistics for Pakistan and Yemen through August 2014 Table 7. Comparing CIVCAS from drone strikes and other operations in Yemen Table 8. Operations in Yemen and Pakistan achieve the aims of the PPG Appendix table 1. Definitions of covert ix PREFACE The years since 9/11 have seen an evolution in U.S. national security practices with respect to counterterrorism operations, particularly when it comes to lethal force via the use of armed drones, also known as un- manned aerial vehicles, or UAVs. Drones constitute a recent addition to the long list of technological advancements in warfighting over time, a list that includes the develop- ment of the crossbow, gunpowder-powered projectile weapons, chemical weapons in World War I, and rockets and jet aircraft in World War II. The most advanced drones—the armed Predator and Reaper models—offer persistent surveillance as well as the ability to engage targets from almost anywhere across the globe, without a requirement for forces on the ground. This extended reach offers a clear example of how advances in technology can provide a new and effective option for using lethal force. Technological advancements and changing security practices affect- ing the use of force raise important ethical and practical questions, such as whether the technologies and practices should be used in warfare and whether self-imposed limits are appropriate for their responsible use, which can be addressed through national policy decisions, as well as such international laws and standards as the principles of humanity enshrined in the Geneva Conventions of 1949. The modern counterterrorism context is no exception. U.S. national security practices, especially those involving armed drones, have raised numerous questions related to ethics and prac- ticality. This volume is a collection of four reports that collectively address these issues by exploring the themes of legitimacy, civilian protection, and xi national security interests. They address, for example, the following ques- tions in the modern counterterrorism context. Legitimacy Do U.S. means and methods of war enhance our perceived legitima- cy and influence? Would we want other nations to model our own behavior? Civilian Protection A fundamental tenet of international law governing armed conflict is to safeguard civilians from the effects of war when possible. How ef- fective are we in protecting civilians while being effective against the threat? National Security Interests A sovereign nation has both the right and obligation to protect its own citizens and look after their welfare. How do our practices and adop- tion of lethal force technologies affect these interests in the short and long term? This volume provides concrete recommendations for policy makers as well as military commanders, a number of which have, since the time of its writing, been incorporated into the recent U.S. policy guidelines related to civilian casualties. Although this volume focuses specifically on current counterterror- ism practices, its analysis, frameworks, and conclusions can be applied in varying degrees to emerging technologies as well. These considerations can help a government ensure that its use of force is not only effective, but also responsible and consonant with its larger interests. xii | Preface ACKNOWLEDGMENTS Portions of this work were funded by CNA. CNA, a nonprofit research and analysis organization with more than 600 analysts and professional staff, is dedicated to developing actionable solutions to complex problems of na- tional importance. In addition to defense-related matters for the U.S. Navy and Marine Corps, CNA’s research portfolio includes policing, home- land security, climate change, water resources, education, and air traffic management. The authors gratefully acknowledge the individuals who aided their re- search by granting interviews; as well as the following colleagues for their feedback and support: William D. Brobst, Richard Brody, Alan C. Brown, Marc Garlasco, Matthew Grund, Lieutenant Commander Matthew Ivey (U.S. Navy, Judge Advocate General’s
Recommended publications
  • The Civilian Impact of Drone Strikes
    THE CIVILIAN IMPACT OF DRONES: UNEXAMINED COSTS, UNANSWERED QUESTIONS Acknowledgements This report is the product of a collaboration between the Human Rights Clinic at Columbia Law School and the Center for Civilians in Conflict. At the Columbia Human Rights Clinic, research and authorship includes: Naureen Shah, Acting Director of the Human Rights Clinic and Associate Director of the Counterterrorism and Human Rights Project, Human Rights Institute at Columbia Law School, Rashmi Chopra, J.D. ‘13, Janine Morna, J.D. ‘12, Chantal Grut, L.L.M. ‘12, Emily Howie, L.L.M. ‘12, Daniel Mule, J.D. ‘13, Zoe Hutchinson, L.L.M. ‘12, Max Abbott, J.D. ‘12. Sarah Holewinski, Executive Director of Center for Civilians in Conflict, led staff from the Center in conceptualization of the report, and additional research and writing, including with Golzar Kheiltash, Erin Osterhaus and Lara Berlin. The report was designed by Marla Keenan of Center for Civilians in Conflict. Liz Lucas of Center for Civilians in Conflict led media outreach with Greta Moseson, pro- gram coordinator at the Human Rights Institute at Columbia Law School. The Columbia Human Rights Clinic and the Columbia Human Rights Institute are grateful to the Open Society Foundations and Bullitt Foundation for their financial support of the Institute’s Counterterrorism and Human Rights Project, and to Columbia Law School for its ongoing support. Copyright © 2012 Center for Civilians in Conflict (formerly CIVIC) and Human Rights Clinic at Columbia Law School All rights reserved Printed in the United States of America. Copies of this report are available for download at: www.civiliansinconflict.org Cover: Shakeel Khan lost his home and members of his family to a drone missile in 2010.
    [Show full text]
  • Cyber-Terrorism
    Cyber-Terrorism: Finding a Common Starting Point By Jeffrey Thomas Biller B.A., March 1998, University of Washington M.H.R., June 2004, University of Oklahoma J.D., May 2007, University of Kansas A Thesis submitted to The Faculty of The George Washington University Law School in partial satisfaction of the requirements for the degree of Master of Laws May 20, 2012 Thesis directed by Gregory E. Maggs Professor of Law, Co-director, National Security and U.S. Foreign Relations Law Program UMI Number: 1515265 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent on the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. UMI 1515265 Copyright 2012 by ProQuest LLC. All rights reserved. This edition of the work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC. 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, MI 48106 - 1346 Acknowledgements The author appreciates the generous support of the United States Air Force Jag Corps, for the opportunity to study; Professor Gregory Maggs, for the excellent feedback and guidance; and the author’s family, for the time and occasional solitude to complete this paper. ii Disclaimer Major Jeffrey T. Biller serves in the U.S. Air Force Judge Advocate General’s Corps. This paper was submitted in partial satisfaction of the requirements for the degree of Master of Laws in National Security and Foreign Relations at The George Washington University Law School.
    [Show full text]
  • Vogue Living Debuts New Furniture Collections ​
    VOGUE LIVING DEBUTS NEW FURNITURE COLLECTIONS ​ Condé Nast and Dorya to debut two new collections at High Point Market NEW YORK – April 10, 2018 – The Vogue Living collection, consisting of 65 pieces divided into two separate collections, Mayfair and Wiltshire, will be shown at High Point Market on April 14-18, 2018. The Wiltshire Collection, through warm tones of cherry and chestnut with pale velvets and florals, evokes a bucolic sensibility with pieces ideally suited for the country home that values comfort as highly as aesthetics. The Mayfair Collection is designed for the modern elegance of a city home, featuring strong statement pieces that draw inspiration from classic designs reinvented for today. ”We are pleased to partner with Dorya on the premier Vogue Living brand. Each piece is handmade and conveys the quality and luxury that Vogue stands for,” said Cathy Glosser, SVP of Licensing, Condé Nast. “The Vogue Living collections tap into a vast array of unique designs, supreme finishes, and stunning details to deliver unmatched craftsmanship,” says F. Doruk Yorgancioglu, president and chief executive officer, Dorya. “We wanted to achieve timelessness while staying relevant for today’s consumer.” The line is currently available through the trade and at vogueliving.dorya.com. Pictures from the ​ ​ line are available here. ​ ​ About Condé Nast: Condé Nast is a premier media company renowned for producing the highest quality content for the world's most influential audiences. Attracting more than 120 million consumers across its industry-leading print, digital and video brands, the company’s portfolio includes some of the most iconic titles in media: Vogue, Vanity Fair, Glamour, Brides, GQ, GQ Style, The New Yorker, Condé Nast Traveler, Allure, Architectural Digest, Bon Appétit, Epicurious, Wired, W, Golf Digest, Golf World, Teen Vogue, Ars Technica, The Scene, them, Pitchfork and Backchannel.
    [Show full text]
  • Volume 2 Presented at the Annual Convention of the Association for Educational Communications and Technology
    thannual Proceedings Selected Papers on the Practice of Educational Communications and Technology - Volume 2 Presented at The Annual Convention of the Association for Educational Communications and Technology Sponsored by the Research and Theory Division And 38 The Division of Instructional Design Indianapolis, IN Editor: Michael Simonson Nova Southeastern University Fischler College of Education North Miami Beach, Florida 2015 Annual Proceedings - Indianapolis: Volumes 1 & 2 Volume 1: Selected Research and Development Papers And Volume 2: Selected Papers On the Practice of Educational Communications and Technology Presented at The Annual Convention of the Association for Educational Communications and Technology Sponsored by the Research and Theory Division And The Division of Instructional Design Indianapolis, IN 2015 Editor Michael Simonson, Ph.D. Instructional Design and Technology Department Fischler College of Education Nova Southeastern University North Miami Beach, FL Preface For the thirty-seventh time, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the annual AECT Convention in Indianapolis, IN. A limited quantity of these Proceedings were printed and sold in both hardcopy and electronic versions. Volumes 1 and 2 are available through the Educational Resources Clearinghouse (ERIC) System. Proceedings volumes are available to members at AECT.ORG. Proceedings copies are also available at: http://www.tresystems.com/proceedings/ The Proceedings of AECT’s Convention are published in two volumes. Volume #1 contains papers dealing primarily with research and development topics. Papers dealing with the practice of instructional technology including instruction and training issues are contained in Volume #2.
    [Show full text]
  • Blazing Through the Darkness
    Blazing through the darkness MICROFIRE PRODUCT CATALOG - 2019 All products can be custom made to your specific needs www.microfire-system.com MICROFIRE CATALOG - 2019 1 MicroFire is a leading technology company with over 10 years of experience in designing and manufacturing top-of-the-line tactical lighting Table of Contents products including flashlights, searchlights, and laser dazzlers. Driven by innovation, we at MicroFire are constantly looking for new ways to 1 Company Profile…….…….….…….1 translate cutting-edge technology into value, 2 Product Information.……….........2 quality, and ultimately superior performance. All of our products are made per U.S. MIL-SPEC 2.1 Hand-held Flashlights.………..2 and we pride ourselves in our mission to provide 2.2 Weapon Lights…………………..15 combat and law enforcement personnel, including some of the most elite troops around 2.3 Searchlights……………………...28 the world, with the best lighting solutions possible. 2019 marks a another beginning for us. With the successful introduction of several ground- breaking products that have surpassed all major competitors last year, MicroFire is now poised to transform the landscape of the entire tactical lighting industry. MICROFIRE CATALOG - 2019 2 Hand-held Tactical Flashlights Our relentless pursuit for excellence and perfection pushes the boundaries of what a flashlight can do. Although no single flashlight is suitable for all circumstances, when you look for a lighting product to fulfill your tactical need, look no further than MicroFire: you are guaranteed a top-quality, ultra-reliable and most durable product that can help you complete the mission successfully and return safely. At MicroFire there is always a lighting product that can meet or even exceed your expectations.
    [Show full text]
  • Tactical Employment of Nonlethal Weapons
    NLW MULTI-SERVICE TACTICS, TECHNIQUES, AND PROCEDURES FOR THE TACTICAL EMPLOYMENT OF NONLETHAL WEAPONS FM 3-22.40 MCWP 3-15.8 NTTP 3-07.3.2 AFTTP(I) 3-2.45 October 2007 DISTRIBUTION RESTRICTION: Distribution authorized to US Government agencies and their contractors only to protect technical or operational information from automatic dissemination under the International Exchange Program or by other means. This determination was made on 15 Nov 2006. Other requests will be referred to: HQ TRADOC, ATTN: ATFC-EJ, Ft Monroe, VA 23651-1067; HQ MCCDC, ATTN: C427, Quantico, VA 22134-5021; NWDC, ATTN: N5, Newport, RI 02841-1207; or AFDDEC, ATTN: DD, Maxwell AFB, 36112-6112. DESTRUCTION NOTICE: Destroy by any method that will prevent disclosure of contents or reconstruction of the document. This publication contains copyright material. See figure III-6. FOREWORD This publication has been prepared under our direction for use by our respective commands and other commands as appropriate. BARBARA G. FAST ANDREW W. O’DONNELL, JR. Major General, US Army Brigadier General (Sel), US Marine Corps Deputy Director/Chief of Staff, Director Army Capabilities Integration Center Capabilities Development Directorate CARLTON B. JEWETT ALLEN G. PECK Rear Admiral, US Navy Major General, US Air Force Commander Commander Navy Warfare Development Command Air Force Doctrine Development and Education Center This publication is available through the ALSA Web site (www.alsa.mil); through the Army at Army Knowledge Online (AKO) (www.us.army.mil) and at the General Dennis J. Reimer Training and Doctrine Digital Library (www.train.army.mil) Web sites; and through the Air Force at the Air Force Publishing Web site (www.e-publishing.af.mil).
    [Show full text]
  • Laser Dazzler
    Application Notes Compact Optics Module— For remote laser dazzler Introduction The portable laser dazzlers are tested with a precise Laser dazzler is a new type of non-lethal weapon, to eye safe power density for mere TEMPORARY vision temporarily disable its target with flash blindness. impairment device. They provide the following Targets can include sensors or human vision. In addition advantages: to military use, laser dazzler is now widely employed in • Diversification: Using optical modulation, effective civil applications, such as security. laser beam expansion can be realized to control the power density. An external focusing lens is used to Operation Principle control the beam size. The light intensity and spot The dazzler uses a green laser as the light source set to 8 can be varied to achieve an effective value in the times strobe per second. This value was chosen to range of 1m-1000m. 50m distance expansion beam resonate with the biological frequency in the human diameter is 25m; 100m spot diameter is 40m; body, causing dizziness. Through optical modulation, the 1000m spot diameter can reach 100m. use of such a laser source results in the eyes suddenly • Intelligence: It can also be remotely and flexibly appearing "laser flash blind”, effectively deterring or maneuvered both horizontally and vertically. subduing criminal suspects remotely without damaging • Convenience: By configuring the digital circuit and the attacked subject. power supply, the device is portable. At the same time, it is equipped with a car charger to support full day use. • Robust: The laser can be fired in any direction at any time.
    [Show full text]
  • Restoration Objectives and Strategies for Terrestrial Habitats and Species of the Willamette Sub-Basin
    Protection, Restoration, and Management of Terrestrial Habitats and Species of the Willamette Sub-Basin Technical Appendix 1 Contents 1. Introduction 1 1.1 Purpose and Objectives 1 1.2 Scope and Scale of the Report 2 1.3 Principal Sources of Data 5 1.4 Analytical Approaches 7 1.5 Building Upon Previous Efforts 11 1.6 How to Apply this Report and Databases to Decision-making 14 2. Focal Habitats and Associated Focal Species 31 2.1 Introduction 31 2.2 Focal Habitat: Oak Woodlands 37 2.2.1 Definition 37 2.2.2 Recognition of Importance 37 2.2.3 Status and Distribution 37 2.2.4 Past Impacts, Limiting Factors, and Future Threats 38 2.2.5 Protection, Restoration, and Management 39 2.2.6 Compatibility of Oak Woodland Management and Stream Habitat Management. 40 2.2.7 Contribution of Oak Woodlands to Regional Biodiversity 40 2.2.8 Selected Focal Species 40 2.2.9 Synthesis: Indicators of Oak Woodland Ecological Condition and Sustainability 53 2.3 Focal Habitat: Upland Prairie, Savanna, and Rock Outcrops 55 2.3.1 Description 55 2.3.2 Recognition of Importance 55 2.3.3 Status and Distribution 56 2.3.4 Past Impacts, Limiting Factors, and Future Threats 57 2.3.5 Protection, Restoration, and Management 58 2.3.6 Compatibility of Upland Prairie-Savanna Management and Stream Management 58 2.3.7 Contribution of Upland Prairie-Savanna to Regional Biodiversity 59 2.3.8 Selected Focal Species 59 2.3.9 Synthesis: Indicators of Ecological Condition and Sustainability for Upland Prairie- Savanna 77 2.4 Focal Habitat: Wetland Prairie and Seasonal Marsh 81 2.4.1
    [Show full text]
  • 'Precise' Strikes: Fractured Bodies, Fractured Lives
    Israel’s drone wars: An update ‘Precise’ strikes: Fractured Bodies, Fractured Lives Front Cover image: Israel’s Heron TP drone at Tel Nof Air Force base, February 2010. Credit: UPI/Debbie Hill. Note: The term ‘drone’ is used interchangeably with ‘Unmanned Aerial Vehicle (UAV)’ Drone Wars UK is a small British NGO established in 2010 to undertake research and advocacy around the use of armed drones. We believe that the growing use of remotely-controlled, armed unmanned systems is encouraging and enabling a lowering of the threshold for the use of lethal force as well as eroding well established human rights norms. While some argue that the technology itself is neutral, we believe that drones are a danger to global peace and security. We have seen over the past decade that once these systems are in the armoury, the temptation to use them becomes great, even beyond the constraints of international law. As more countries develop or acquire this technology, the danger to global peace and security grows. Published by Drone Wars UK Drone Wars UK Written by Chloe Skinner Peace House, 19 Paradise Street November 2019 Oxford, OX1 1LD Designed: Chris Woodward www.dronewars.net www.chriswoodwarddesign.co.uk [email protected] ‘Precise Strikes’, Fractured Bodies, Fractured Lives | Israel’s drone wars: An update | 1 Contents 1 INTRODUCTION 3 2 “A RAPIDLY-GROWING DIVISION”: Israel’s drones and their operators 5 3 “ACCESS, PERSISTENCE, ACCURACY.” The humanitarian claims made for drone technology 8 4 “IN A MATTER OF SECONDS, THEY WERE CUT TO PIECES.” Life
    [Show full text]
  • SURVEILLE NSA Paper Based on D2.8 Clean JA V5
    FP7 – SEC- 2011-284725 SURVEILLE Surveillance: Ethical issues, legal limitations, and efficiency Collaborative Project This project has received funding from the European Union’s Seventh Framework Programme for research, technological development and demonstration under grant agreement no. 284725 SURVEILLE Paper on Mass Surveillance by the National Security Agency (NSA) of the United States of America Extract from SURVEILLE Deliverable D2.8: Update of D2.7 on the basis of input of other partners. Assessment of surveillance technologies and techniques applied in a terrorism prevention scenario. Due date of deliverable: 31.07.2014 Actual submission date: 29.05.2014 Start date of project: 1.2.2012 Duration: 39 months SURVEILLE WorK PacKage number and lead: WP02 Prof. Tom Sorell Author: Michelle Cayford (TU Delft) SURVEILLE: Project co-funded by the European Commission within the Seventh Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission Services) RE Restricted to a group specified by the consortium (including the Commission Services) CO Confidential, only for members of the consortium (including the Commission Services) Commission Services) Executive summary • SURVEILLE deliverable D2.8 continues the approach pioneered in SURVEILLE deliverable D2.6 for combining technical, legal and ethical assessments for the use of surveillance technology in realistic serious crime scenarios. The new scenario considered is terrorism prevention by means of Internet monitoring, emulating what is known about signals intelligence agencies’ methods of electronic mass surveillance. The technologies featured and assessed are: the use of a cable splitter off a fiber optic backbone; the use of ‘Phantom Viewer’ software; the use of social networking analysis and the use of ‘Finspy’ equipment installed on targeted computers.
    [Show full text]
  • 2017 SURE Program Abstract Book
    Abstract Book Summer Undergraduate Research in Engineering Program Summer 2017 College of Engineering, University of Michigan Table of Contents Aerospace Engineering……………………………………………………6-15 Climate and Space Sciences and Engineering………………………16-18 Biomedical Engineering………………………………………………….19-23 Civil and Environmental Engineering………………………………….24-31 Chemical Engineering…………………………………………………….32-37 Electrical Engineering and Computer Science………………………38-57 Engineering Education Research………………………….……………….58 Industrial and Operations Engineering……………………….…….…59-65 Macromolecular Science and Engineering……………………….………66 Mechanical Engineering………………………………………………….67-77 Materials Science and Engineering………………………………….…78-80 Nuclear Engineering and Radiological Sciences…………...……….81-85 Robotics…………………………………………………………………………86 Overview The Summer Undergraduate Research in Engineering Program (SURE) offers summer research internships to outstanding undergraduate students who have completed their sophomore or junior year by the start of the summer. Participants conduct 10-12 weeks of full-time summer research with some of the country’s leading faculty in a wide range of engineering disciplines. The program provides opportunities for students to assess their interests and potential in pursuing research at the master's or Ph.D. level in graduate school. SURE students receive guidance by a faculty advisor in a College of Engineering research facility and have produced an abstract booklet which highlights their summer research project and/or experience. Validation
    [Show full text]
  • Warning Civilians Prior to Attack Under International Law: Theory and Practice
    Color profile: Disabled Composite Default screen XIV Warning Civilians Prior to Attack under International Law: Theory and Practice Pnina Sharvit Baruch and Noam Neuman* primary goal of the modern law of armed conflict (also known as interna- Ational humanitarian law) is to protect civiliansasmuchaspossiblefromthe violent consequences of hostilities. Accordingly, the law of armed conflict requires that the parties to a conflict apply certain precautionary measures in order to mini- mize incidental injury to civilians resulting from military attacks. One of these pre- cautionary measures is the provision of warnings to civilians prior to an attack. This article will deal with this measure, and examine both theoretical and practical aspects of providing advance warnings of attacks. During World War II there were instances when civilians were warned prior to an attack. Advance warnings were also provided during other armed conflicts throughout the second half of the twentieth century; however, the amount, scope and specificity of warnings issued to civilians have dramatically increased in the conflicts fought since the beginning of this century. Probably the most elaborate and systematic warnings were issued by Israel in its conflict in Lebanon in 2006 and * Professor (Colonel, Israel Defense Forces (Ret.)) Pnina Sharvit Baruch, Tel Aviv University School of Law, Israel, and Lieutenant Colonel Noam Neuman, Israel Defense Forces. The opin- ions and conclusions expressed in this article are those of the authors and do not necessarily re- flect the views of the Israel Defense Forces or the government of Israel. We would like to thank Galit Rajuan, Nimrod Karin and David Benjamin for their valuable comments and suggestions.
    [Show full text]