Law of Armed Conflict Deskbook, 2015
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto
Human Rights Brief Volume 17 | Issue 1 Article 3 2009 Counter-Insurgency, Human Rights, and the Law of Armed Conflict Federico Sperotto Follow this and additional works at: http://digitalcommons.wcl.american.edu/hrbrief Part of the Human Rights Law Commons, and the International Law Commons Recommended Citation Sperotto, Federico. "Counter-Insurgency, Human Rights, and the Law of Armed Conflict." Human Rights Brief 17, no. 1 (2009): 19-23. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in Human Rights Brief by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. Sperotto: Counter-Insurgency, Human Rights, and the Law of Armed Conflict Counter-Insurgency, Human Rights, and the Law of Armed Conflict by Federico Sperotto* introduCtion ounter-insurgency is the dominant aspect in the United States-led Operation Enduring Freedom (OEF) in CAfghanistan, and, since the NATO-led International Security Assistance Force (ISAF) has assumed growing respon- sibility throughout insurgents’ sanctuaries, also a mission for Europeans. According to the U.S. military, insurgency represents an intermediate step in the spectrum of conflict, which ranges from stable peace to general war.1 The frame in which military opera- tions are conducted is known as irregular warfare, a violent struggle among state and non-state actors for legitimacy and influence over a population.2 This form of conflict is charac- terized by three principle activities: insurgency, counter-insur- gency, and unconventional warfare, referring to the avoidance of Association of the Courtesy of the Revolutionary Afghanistan. -
Luverne Ostby.Qxd
Luverne Ostby Luverne Ostby was born on 23 July 1922 and was raised in rural Minnesota. He left for military service in September 1941. After being sworn in at Fort Snelling, he was sent to Camp Claibourne Louisiana for his basic training. Early on in his training at Camp Claibourne he was called aside and confronted by an officer that asked him if he spoke Norwegian, upon which his reply was yes. The officer asked “Why don’t you answer in Norwegian?” and pointed to a large tent instructing him to go there. Inside was a tent full of Norwegian speaking soldiers including a neighbor, Bob Stay. The group was sent to Camp Ripley Minnesota to begin training. Ostby was chosen to become a part of the 99th Battalion separate, a unit specifically made up of soldiers able to speak Norwegian. The plan was for the unit to help with the Norwegian Occupation Code Named PLOUGH. Four objectives were expected for be obtained in this mission: first to elimi- nate Norway as an economic asset for Germany, second, force Germany to keep large numbers of troops on occupation duty in Norway and away from other active fronts, third, limit the ability of German troops in Norway to attack allied convoys transporting to the Russian port of Murmansk, and fourth, prepare for the future occupation of Norway, and create a link through Norway to Russia. In December 1942, the battalion including Luverne was transferred to Camp Hale Colorado. They were expected to receive extensive winter training and Ostby was issued skis for training. -
The Civilian Impact of Drone Strikes
THE CIVILIAN IMPACT OF DRONES: UNEXAMINED COSTS, UNANSWERED QUESTIONS Acknowledgements This report is the product of a collaboration between the Human Rights Clinic at Columbia Law School and the Center for Civilians in Conflict. At the Columbia Human Rights Clinic, research and authorship includes: Naureen Shah, Acting Director of the Human Rights Clinic and Associate Director of the Counterterrorism and Human Rights Project, Human Rights Institute at Columbia Law School, Rashmi Chopra, J.D. ‘13, Janine Morna, J.D. ‘12, Chantal Grut, L.L.M. ‘12, Emily Howie, L.L.M. ‘12, Daniel Mule, J.D. ‘13, Zoe Hutchinson, L.L.M. ‘12, Max Abbott, J.D. ‘12. Sarah Holewinski, Executive Director of Center for Civilians in Conflict, led staff from the Center in conceptualization of the report, and additional research and writing, including with Golzar Kheiltash, Erin Osterhaus and Lara Berlin. The report was designed by Marla Keenan of Center for Civilians in Conflict. Liz Lucas of Center for Civilians in Conflict led media outreach with Greta Moseson, pro- gram coordinator at the Human Rights Institute at Columbia Law School. The Columbia Human Rights Clinic and the Columbia Human Rights Institute are grateful to the Open Society Foundations and Bullitt Foundation for their financial support of the Institute’s Counterterrorism and Human Rights Project, and to Columbia Law School for its ongoing support. Copyright © 2012 Center for Civilians in Conflict (formerly CIVIC) and Human Rights Clinic at Columbia Law School All rights reserved Printed in the United States of America. Copies of this report are available for download at: www.civiliansinconflict.org Cover: Shakeel Khan lost his home and members of his family to a drone missile in 2010. -
International Criminal Law a Discussion Guide for the Extraordinary Chambers in the Courts of Cambodia
INTERNATIONAL CRIMINAL LAW A DISCUSSION GUIDE FOR THE EXTRAORDINARY CHAMBERS IN THE COURTS OF CAMBODIA WAR CRIMES RESEARCH OFFICE 2nd Edition December 2007 Acknowledgments Contributing authors and editors of this Guide include War Crimes Research Office (WCRO) Director Susana SáCouto, WCRO Assistant Director Katherine Cleary, former WCRO Assistant Director Anne Heindel, former WCRO Director John Cerone, Washington College of Law (WCL) Professor Diane Orentlicher and WCL Professor Robert Goldman. The following WCL students and graduates also contributed to its production: Ewen Allison, Katrina Anderson, Katharine Brown, Agustina Del Campo, Tejal Jesrani, Robert Kahn, Chante Lasco, Solomon Shinerock and Claire Trickler- McNulty. Mann Sovanna oversaw translation of the Khmer edition. We are grateful for the generous support of the Open Society Justice Initiative and the Open Society Burma Project/Southeast Asia Initiative, without which this project would not have been possible. About the War Crimes Research Office The core mandate of the War Crimes Research Office is to promote the development and enforcement of international criminal and humanitarian law, primarily through the provision of specialized legal assistance to international criminal courts and tribunals. The Office was established by the Washington College of Law in 1995 in response to a request for assistance from the Prosecutor of the International Criminal Tribunals for the former Yugoslavia (ICTY) and Rwanda (ICTR), established by the United Nations Security Council in 1993 and 1994 respectively. Since then, several new internationalized or “hybrid” war crimes tribunals—comprising both international and national personnel and applying a blend of domestic and international law—have been established under the auspices or with the support of the United Nations, each raising novel legal issues. -
The Relationship Between International Humanitarian Law and the International Criminal Tribunals Hortensia D
Volume 88 Number 861 March 2006 The relationship between international humanitarian law and the international criminal tribunals Hortensia D. T. Gutierrez Posse Hortensia D. T. Gutierrez Posse is Professor of Public International Law, University of Buenos Aires Abstract International humanitarian law is the branch of customary and treaty-based international positive law whose purposes are to limit the methods and means of warfare and to protect the victims of armed conflicts. Grave breaches of its rules constitute war crimes for which individuals may be held directly accountable and which it is up to sovereign states to prosecute. However, should a state not wish to, or not be in a position to, prosecute, the crimes can be tried by international criminal tribunals instituted by treaty or by binding decision of the United Nations Security Council. This brief description of the current legal and political situation reflects the state of the law at the dawn of the twenty-first century. It does not, however, describe the work of a single day or the fruit of a single endeavour. Quite the contrary, it is the outcome of the international community’s growing awareness, in the face of the horrors of war and the indescribable suffering inflicted on humanity throughout the ages, that there must be limits to violence and that those limits must be established by the law and those responsible punished so as to discourage future perpetrators from exceeding them. Short historical overview International humanitarian law has played a decisive role in this development, as both the laws and customs of war and the rules for the protection of victims fall 65 H. -
The Starvation Myth: the U.S. Blockade of Japan in World War Ii Christopher Clary
DOUGlAS L. BENDELL AWARD THE STARVATION MYTH: THE U.S. BLOCKADE OF JAPAN IN WORLD WAR II CHRISTOPHER CLARY At 8:16 a.m., on August 6, 1945, the world changed. Fifty-seconds earlier, the Enola Gay had dropped an atomic bomb, "Little Boy", from 31,600 feet above Hiroshima, Japan. The world was ushered into the nuclear age. After seeing the "initial burst and 'ball of fire,'" co-pilot Robert Lewis questioned aloud, "My God, what have we done?" 1 Lewis, nearly six miles above the devastation, was responding to the pyrotechnic display. He could only imagine the very real damage the bomb had caused. While disagreements exist concerning the exact figures, it is undeniable that the bomb and its radioactive effects killed at least 70,000 people 2 Though he was one of the first to see its effects, Lewis was not the first to question the decision to use the atomic bomb nor would he be the last. The decision still sits at the center of one of the most debated historical (as well as historiographic) questions. The focus on this episode is justified. This singular event divides the Twentieth Century in numerous ways, but perhaps most relevantly it ends a hot and bloody war, and marks the beginning of a colder conflict. And since we examine the event in the year 2000, we must try to avoid the biases of the post-Cold War era. This paper tries to focus on two different realities: the first is what actually, really happened, the true state of affairs, then secondly the perceptions of that actuality. -
Law of Armed Conflict
Lesson 1 THE LAW OF ARMED CONFLICT Basic knowledge International Committee of the Red Cross Unit for Relations with Armed and Security Forces 19 Avenue de la Paix 1202 Geneva, Switzerland T +41 22 734 60 01 F +41 22 733 20 57 E-mail: [email protected] www.icrc.org Original: English – June 2002 INTRODUCTION TO THE LAW OF ARMED CONFLICT BASIC KNOWLEDGE LESSON 1 [ Slide 2] AIM [ Slide 3] The aim of this lesson is to introduce the topic to the class, covering the following main points: 1. Background: setting the scene. 2. The need for compliance. 3. How the law evolved and its main components. 4. When does the law apply? 5. The basic principles of the law. INTRODUCTION TO THE LAW OF ARMED CONFLICT 1. BACKGROUND: SETTING THE SCENE Today we begin a series of lectures on the law of armed conflict, which is also known as the law of war, international humanitarian law, or simply IHL. To begin, I’d like to take a guess at what you’re thinking right now. Some of you are probably thinking that this is an ideal opportunity to catch up on some well-earned rest. “Thank goodness I’m not on the assault course or on manoeuvres. This is absolutely marvellous. I can switch off and let this instructor ramble on for 45 minutes. I know all about the Geneva Conventions anyway – the law is part of my culture and our military traditions. I really don't need to listen to all this legal ‘mumbo jumbo’.” The more sceptical and cynical among you might well be thinking along the lines of a very famous orator of ancient Rome – Cicero. -
Military Strategy: the Blind Spot of International Humanitarian Law
Harvard National Security Journal / Vol. 8 333 ARTICLE Military Strategy: The Blind Spot of International Humanitarian Law Yishai Beer* * Professor of Law, Herzliya Interdisciplinary Center, Herzliya, Israel. The author would like to thank Eyal Benvenisti, Gabriella Blum, Moshe Halbertal, Eliav Lieblich, David Kretzmer, and Kenneth Watkin for their useful comments, and Ohad Abrahami for his research assistance. © 2017 by the President and Fellows of Harvard College and Yishai Beer. 334 2017 / Military Strategy: The Blind Spot of International Humanitarian Law Abstract The stated agenda of international humanitarian law (IHL) is to humanize war’s arena. Since it is the strategic level of war that primarily affects war’s conduct, one might have expected that the law would focus upon it. Paradoxically, the current law generally ignores the strategic discourse and prefers to scrutinize the conduct of war through a tactical lens. This disregard of military strategy has a price that is demonstrated in the prevailing law of targeting. This Article challenges the current blind spot of IHL: its disregard of the direct consequences of war strategy and the war aims deriving from it. It asks those who want to comprehensively reduce war’s hazards to think strategically and to leverage military strategy as a constraining tool. The effect of the suggested approach is demonstrated through an analysis of targeting rules, where the restrictive attributes of military strategy, which could play a significant role in limiting targeting, have been overlooked. Harvard National Security Journal / Vol. 8 335 Table of Contents Introduction ........................................................................................................336 I. Strategy Determines War’s Patterns and Scope .........................................340 II. -
Taming the Trolls: the Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media
Taming the Trolls: The Need for an International Legal Framework to Regulate State Use of Disinformation on Social Media * ASHLEY C. NICOLAS INTRODUCTION Consider a hypothetical scenario in which hundreds of agents of the Russian GRU arrive in the United States months prior to a presidential election.1 The Russian agents spend the weeks leading up to the election going door to door in vulnerable communities, spreading false stories intended to manipulate the population into electing a candidate with policies favorable to Russian positions. The agents set up television stations, use radio broadcasts, and usurp the resources of local newspapers to expand their reach and propagate falsehoods. The presence of GRU agents on U.S. soil is an incursion into territorial integrity⎯a clear invasion of sovereignty.2 At every step, Russia would be required to expend tremendous resources, overcome traditional media barriers, and risk exposure, making this hypothetical grossly unrealistic. Compare the hypothetical with the actual actions of the Russians during the 2016 U.S. presidential election. Sitting behind computers in St. Petersburg, without ever setting foot in the United States, Russian agents were able to manipulate the U.S. population in the most sacred of domestic affairs⎯an election. Russian “trolls” targeted vulnerable populations through social media, reaching millions of users at a minimal cost and without reliance on established media institutions.3 Without using * Georgetown Law, J.D. expected 2019; United States Military Academy, B.S. 2009; Loyola Marymount University M.Ed. 2016. © 2018, Ashley C. Nicolas. The author is a former U.S. Army Intelligence Officer. -
Applying Traditional Military Principles to Cyber Warfare
2012 4th International Conference on Cyber Confl ict Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial C. Czosseck, R. Ottis, K. Ziolkowski (Eds.) purposes is granted providing that copies bear this notice and a full citation on the 2012 © NATO CCD COE Publications, Tallinn first page. Any other reproduction or transmission requires prior written permission by NATO CCD COE. Applying Traditional Military Principles to Cyber Warfare Samuel Liles Marcus Rogers Cyber Integration and Information Computer and Information Operations Department Technology Department National Defense University iCollege Purdue University Washington, DC West Lafayette, IN [email protected] [email protected] J. Eric Dietz Dean Larson Purdue Homeland Security Institute Larson Performance Engineering Purdue University Munster, IN West Lafayette, IN [email protected] [email protected] Abstract: Utilizing a variety of resources, the conventions of land warfare will be analyzed for their cyber impact by using the principles designated by the United States Army. The analysis will discuss in detail the factors impacting security of the network enterprise for command and control, the information conduits found in the technological enterprise, and the effects upon the adversary and combatant commander. Keywords: cyber warfare, military principles, combatant controls, mechanisms, strategy 1. INTRODUCTION Adams informs us that rapid changes due to technology have increasingly effected the affairs of the military. This effect whether economic, political, or otherwise has sometimes been extreme. Technology has also made substantial impacts on the prosecution of war. Adams also informs us that information technology is one of the primary change agents in the military of today and likely of the future [1]. -
Krinkelt–Rocherath in Belgium on December 17–18, 1944 During the German Ardennes Offensive
CONTENTS Introduction Chronology Design and Development Technical Specifications The Combatants The Strategic Situation Combat Statistics and Analysis Aftermath Further Reading INTRODUCTION The rocket-propelled grenade launcher (RPG) has become a ubiquitous weapon on the modern battlefield; and all of these weapons trace their lineage back to the American 2.36in rocket launcher, better known as the bazooka. The bazooka was the serendipitous conjunction of two new technologies: the shaped-charge antitank warhead and the shoulder-fired rocket launcher. This book looks at the development of this iconic weapon, and traces its combat use on the World War II battlefield. One of the widespread myths to have emerged about German tank design during World War II was the notion that German sideskirt armor was developed in response to the bazooka, and its British equivalent, the PIAT (Projector Infantry Antitank). American and British troops began encountering the new versions of German armored vehicles with extra armor shields in 1944, and so presumed that this new feature was in response to the Allied shaped-charge weapons. The shields received a variety of names including “bazooka shields,” “bazooka pants,” and “PIAT shields.” In reality, their development was not a response to Allied shaped-charge weapons, for most German innovations in tank technology during the war years were prompted by developments on the Eastern Front. This book examines the real story behind the bazooka shields. It also traces the many specialized devices developed by the Wehrmacht in World War II to deal with the threat of infantry close-attack weapons. A remarkable variety of curious devices was developed including a wood paste to defend against antitank charges, and a machine gun with a special curved barrel to allow armored vehicle crews to defend themselves from within the protective armor of their vehicle. -
Combatant Status and Computer Network Attack
Combatant Status and Computer Network Attack * SEAN WATTS Introduction .......................................................................................... 392 I. State Capacity for Computer Network Attacks ......................... 397 A. Anatomy of a Computer Network Attack ....................... 399 1. CNA Intelligence Operations ............................... 399 2. CNA Acquisition and Weapon Design ................. 401 3. CNA Execution .................................................... 403 B. State Computer Network Attack Capabilites and Staffing ............................................................................ 405 C. United States’ Government Organization for Computer Network Attack .............................................. 407 II. The Geneva Tradition and Combatant Immunity ...................... 411 A. The “Current” Legal Framework..................................... 412 1. Civilian Status ...................................................... 414 2. Combatant Status .................................................. 415 3. Legal Implications of Status ................................. 420 B. Existing Legal Assessments and Scholarship.................. 424 C. Implications for Existing Computer Network Attack Organization .................................................................... 427 III. Departing from the Geneva Combatant Status Regime ............ 430 A. Interpretive Considerations ............................................. 431 * Assistant Professor, Creighton University Law School; Professor,