The Use of Targeted Killing As An Effective Strategy in Counter Terror and Counter Insurgency Warfare

Size: px
Start display at page:

Download "The Use of Targeted Killing As An Effective Strategy in Counter Terror and Counter Insurgency Warfare"

Transcription

1 Ian Henley Professor Dale December 1, 2016 The Use of Targeted Killing As An Effective Strategy in Counter Terror and Counter Insurgency Warfare Ever since the events of September 11, 2001, and even before that, the United States, along with many other nations, have been embroiled in a global conflict against an enemy which has no nation, does not wear uniforms, does not control well-defined areas of territory for long periods, and seeks to mask their communications and the identity of their supporters from outside scrutiny. This newly founded and unstructured warfare against insurgencies and terrorism has force adaptation in the way in which we conduct warfare. Among these changes is the increased and prevalent use of assassination and targeted killing. This method however has been met with a myriad of controversy, ranging from the moral implications to the practicality. This has led to the question, is the use of targeted killing an effective strategy in counter-terror and counterinsurgency warfare? Targeted killing (otherwise known as selective violence) is itself is not a new concept, it has just taken on slightly different meanings throughout history to fit the context of the current conflict. The concept itself can be worked out through common sense, however a singular, definitive definition still has yet to be decided upon by international organizations. The current loosely working definition on targeted killing is, the intentional, premeditated and deliberate use of lethal force, by States or their agents acting under colour of law, or by an organized armed group in armed conflict, against a specific individual who is not in the physical custody of the perpetrator. 1 1 Alston, P. (2010, May 28). Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions. United Nations General Assembly: Human Rights Council, 1-29.!1

2 The distinction must also be made between targeted killing and the opportunistic killing. In a targeted killing, the specific goal of the operation is to use lethal force, and on a specifically desired person or persons. This distinguishes targeted killings from the opportunistic, which is the unintentional, accidental, or reckless killings, or killings made without conscious choice, which is typically the classical case in warfare. 2 The United States reportedly adopted a secret policy of targeted killings soon after the attacks of 11 September It was largely conducted by the Central Intelligence Agency (CIA) using Predator or Reaper drones, although there has been involvement by special operations forces, and of the assistance of civilian contractors with the implementation of these programs. 3 One of the first acknowledged cases of targeted killing programs on a large scale is the Phoenix program. Instituted during the Vietnam war, the CIA headed this counterinsurgency operation with the goal of converting, neutralizing, or killing the political cadres infiltrated into South Vietnam by Northern forces, ultimately resulting in the deaths of thousands of people. Retrospectively, it s been viewed as a failure due to the program not stopping the North from taking over South Vietnam, and leaving many authority figures, along with the public, concerned over the government s willingness to extrajudicially kill at such extreme levels. This particular episode ultimately led to President Ford signing an executive order banning the practice. 4 According to international law, however, in wartime it has been legal to to attack a national leader who is in the military chain of command. But in practice it has been the historical norm to look down upon such methods, so therefore states have largely refrained from such implementation. This is best highlighted through the British government in 1938, who rejected a proposal to assassinate Adolf Hitler on the grounds that it was unsportsmanlike. 5 2 Alston, P. (2010, May 28). Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions. United Nations General Assembly: Human Rights Council, Council of Europe, Secret Detentions and Illegal Transfers of Detainees Involving Council of Europe Member States, report submitted by Mr. Dick Marty, Doc Rev. (7 June 2007), paras Ignatieff, M. (2004). The Lesser Evil: Political Ethics in an Age of Terror (pp ). Princeton, NJ: Princeton University Press. 5 Tannenwald, N. (2008, January). Targeted Killings: Is the Norm Against Assassination in Decline? Brown University.!2

3 Today s contemporary warfare is established around the fact that we now have to fight an enemy who is not fielded against us in any organized military structure, and is dispersed covertly throughout over sixty countries. In consideration of this there has been unprecedented advancements in the level in which targeted killing is utilized. With an overall lessening of the universal stigma once attached to the entirety of the idea, especially among American and Israeli forces. The application is no longer focused solely around high value targets, but recently rank and file members such as militants, couriers, and financiers. Some of the most notable and effective uses of targeted killing in recent years can be seen through the examples of 1) April 2002, where Russian armed forces killed rebel warlord Omar Ibn al Khattab in Chechnya. 2) November 2002, in which Al Qaeda leader Ali Qaed Senyan al-harithi, along with five other men, were killed in Yemen, reportedly by a CIA-operated predator drone. 6 3) January 2010, in an operation allegedly carried out by 18 Israeli Mossad intelligence agents, an assassination of Hamas leader, Mahmoud al-mahbouh, in a Dubai hotel. According to Dubai officials, al- Mahbouh was suffocated with a pillow. 7 However, state actors are not alone is this practice. Insurgencies have also been major practitioners in assassinations and targeted killings as well. For instance, Palestinian guerrillas assassinated Israeli Prime Minister Rehavam Ze evi in The IRA assassinated the British ambassador to the Hague in 1979, Lord Mountbatten in 1980, and attempted to kill Prime Minister Thatcher in And then the Taliban avidly targeted the local police forces for years before they realized that killing national army and police officers is not well received by the locals. 8 When the topic of targeted killing is brought up in discourse, it is often associated with the follow-up topic of drones and drone warfare. It s through this that a common misconception has arisen in which many believe this to be the only way in which this practice is conducted. This 6 It is worthwhile to note that this instance is the first credibly confirmed drone strike by the CIA. The target in question was allegedly directly responsible for the bombing of the USS Cole. 7 Alston, P. (2010, May 28). Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions. United Nations General Assembly: Human Rights Council, Gross, M. (2015). The Ethics of Insurgency: A Critical Guide to Just Guerrilla Warfare (pp ). New York, NY: Cambridge University Press!3

4 mentality couldn t be farther from the truth, with the reality being that drones alone do not have the versatility or utility to cover the appropriate spectrum of situations that are met on the battlefield. While there are several ways in which selective violence may be carried out, the two most commonly used approaches are (expectedly) through drones, as well as through special operations forces (SOF). The widespread use of these two entities have contributed to these programs in unprecedented ways which have never been seen by the world before. Drones, or more formally known as unmanned aerial vehicles (UAVs)/ remotely piloted aircraft (RPAs), are pilotless aircraft controlled by individual operators located at control terminals on the ground, often some distance from the area where the aircraft is operating. Drones are unique in the sense that as opposed to other precision-guided munitions, they place no U.S. military personnel in direct risk of harm, and their ability to serve simultaneously as both intelligence-collection and strike platforms provides multi-faceted suitabilities. They are often brought into discussion today when concerning their newfound usefulness in government work. Reasons being that they are relatively new technology, first being utilized in combat since the Iran-Iraq War in the late 1980 s, and subsequently seeing great success in the first Gulf War as reconnaissance platforms. Since then however there has been a concerning prevalence of not so clearly defined regulations, which is of concern due to the ways in which this technology completely changes the directions in which the world is, and will be operating. On the other end of the spectrum, the use of special operations forces epitomizes the idea of dirty work. Described as snake eaters with masters degrees, 9 SOF are known throughout the world as the most elite forces that any one state can bring to bear. In sum they are responsible for the majority of small scale, clandestine, covert or overt operations of an unorthodox and frequently high-risk nature, undertaken to achieve significant political or military objectives in support of foreign policy. 10 SOF have come to take on such an influential role that they have gradually developed into an indispensable component of modern armed forces outside, and separate of conventional structures and doctrine, rapidly having moved from existing on the 9 A. H. Cordesman, The Iraq War: Strategy, Tactics, and Military Lessons, CSIS Press, Washington, DC, 2003, p Brailey, M. (2005, November). The Transformation of Special Operations Forces in Contemporary Conflict: Strategy, Missions, Organisation and Tactics. Land Warfare Studies Centre, Retrieved from Catalyst.!4

5 fringes of traditional approaches of strategy towards being a central component of national and international security. A testament to the amount of trust and resources the United States puts into these soldiers is enormous, costing between $800,000 to $1,000,000 to fully train an SOF soldier, depending on what specific unit they re in. 11 The expansion of SOF may be attributed largely to their strategic utility, or their usefulness in providing an economy of force and an expansion of strategic choice. With the largest attributes in this strategic utility being that they are innovative, contribute to morale, showcase a force s competence, provide reassurance, humiliate the enemy, control escalation, and shape the future. 12 All providing for a strong argument in which SOF are objectively good for a military. The practice of targeted killing or selective violence has been a matter of controversy throughout history and throughout it s contemporary applications. The aggravations usually arise through two separate mediums, the morality, and the practicality of assassination based strategy. Along the lines of morality, the divisiveness centers around whether or not we are, in a sense, becoming terrorists ourselves. How do we fight a just war, and keep ourselves from being drawn over the thin line of morality by an enemy whose sole rationale is to cross that same line? Whereas the practicality component asks how we effectively confront an enemy who has redefined the concept of asymmetric warfare and cannot be overcome through conventional military tactics? In this it explores the quandary of whether selective violence is truly an effective strategy, or just complicates the world around it, creating more problems than are ultimately solved. We operate in a highly visible world, where your mistakes are visible and under close public scrutiny. The distance now between the front line where you operate, and the hometown you come from is shrinking to zero in the modern world. What is different about this asymmetric war on terrorism is that it is not about conquering territory, or taking and holding ground, it is about the business of neutralizing specific military objectives. But we are also in 11 Robert Spulak, A Theory of Special Operations: the origin, qualities, and use of SOF (SANDIA NATIONAL LABS ALBUQUERQUE NM, 2007) 12 M. R. D. Foot, Special Operations, I, in E. Elliott-Bateman (ed.), The Fourth Dimension Resistance, Manchester University Press, Manchester, 1970.!5

6 the business of hearts and minds, and convincing the world that it is about holding together the moral identity and legitimacy of the command that is exercised, that we are the good guys. In this new condition we find an ever-present asymmetry of morality. We as a nation are taught to fight combatants who obey the same rules you do (i.e. the rules of the Geneva Convention and the general laws of war). But now we are dealing with people who will systematically leverage your compliance with these rules of war into an advantage for their side. So how can we uphold this image of higher level of morality when fighting against a nihilistic enemy, while simultaneously practicing assassination? The long and short of it is, ethically we cannot. Under the just war theory, what the United States military largely operates on, there are very strict guidelines under which you may selectively target someone for extrajudicial execution. The guidelines follow as such, Targeted killing is only lawful when the target is a combatant or fighter or, in the case of a civilian, only for such time as the person directly participates in hostilities. 13 Killing must be militarily necessary, the use of force must be proportionate so that any anticipated military advantage is considered in light of the expected harm to civilians in the vicinity, and everything feasible must be done to prevent mistakes and minimize harm to civilians. Reprisal or punitive attacks on civilians are prohibited. In addition, These standards apply regardless of whether the armed conflict is between States (an international armed conflict) or between a State and a non-state armed group (non-international armed conflict), including alleged terrorists. 14 The aforementioned summed up, essentially asserts that you must have exhausted all peaceful means of resolving a particular problem before you resort to military violence. These passages are largely influenced by the Just War Theory 13 Geneva Conventions Common Article 3, AP I, art. 52(1) and (2); AP I, art. 50(1); International Humanitarian Law Research Initiative, HPCR Manual and Commentary on International Law Applicable to Air and Missile Warfare, Harvard University Program on Humanitarian Policy and Conflict Research, 15 May 2009, available at (HPCR Commentary), section C.12.(a). 14 Alston, P. (2010, May 28). Report of the Special Rapporteur on extrajudicial, summary or arbitrary executions. United Nations General Assembly: Human Rights Council, 1-29.!6

7 and are found as articles ratified within the Geneva Conventions, thereby giving legitimacy to the Just War Theory and it s criterium. 15 When given this foundation to base their arguments from, moral oppositionists are left with plenty of room to swing. Their main assertion claiming that the application of targeted killing has the effect of causing necessarily indiscriminate killings of civilians, such as those in the vicinity of a targeted person. And especially with the use of drones it is made all the more easy to kill without risk to a State s forces. Thereby, policy makers and commanders will be tempted to interpret the legal limitations on who can be killed, and under what circumstances, too liberally. This leads to the fear that this method of elimination will be seen as the easy way out. But at this point, they have become so addicted to this machine, to this way of doing business, that it seems like it s going to become harder and harder to pull them away from it the longer they re allowed to continue operating in this way. 16 This argument is bolstered by leaked documents showing that the military designated military aged males 17 killed in targeted strikes as enemy killed in action (EKIA) even if they were not the intended targets of the strike. Unless evidence posthumously surfaced, proving the males killed were not terrorists or unlawful enemy combatants, EKIA remained the designation, according to the source. 18 This smudging of records hints at the current trend and future possibility of pushing that ethical line back so far as to threaten the irreparable harm to the international legal structure designed to uphold foundational protections for the right to life and human dignity. 19 This is asymmetric conflict in every sense of the phrase. There is the asymmetry of power, in which it is the weak against the strong. The events of September 11 is probably the 15 ETHICS AND THE NEW WAR Ignatieff, M. (other). (2001). Ethics And The New War. Royal Military College; Young Memorial Lecture Scahill, J. The Assassination Complex. The Intercept, 1. Military aged males is typically in reference to the ages between 18 and 60 years old. Scahill, J. The Assassination Complex. The Intercept, 1. 19Alston, P. (2011). The CIA and Targeted Killings Beyond Borders. Harvard National Security Journal, 2, !7

8 most dramatic example in military history of a small group taking on the might of the greatest military power the world has ever known, and subjecting it to a stunning military defeat. The asymmetry of weaponry, the United States has intelligence satellites orbiting the planet, ten miles of tanks lined up at Fort Hood, five miles of warships lined up at the Navy yards in Norfolk, Virginia. And its enemies achieved the aforementioned stunning blow against the US with box cutters. 20 Finally there is the asymmetry of organization. Western nations as a whole are trained to fight wars against the armed combatants of another state. But suddenly we were engaged in a situation where we faced small, private operations. In many ways similar in organizational structure to criminal organizations. There had to be a lot of adapting to adjust to this new actuality, and targeted killing was in a large sense the answer to this. The effectiveness of selective violence was first argued as a counter to the idea that we could conduct this new type of globalized warfare in the same manner as a law enforcement agency might confront endemic crime. In the case of the World Trade Center bombing of 1993, the 1998 US embassy bombings, and the 1986 bombing of American soldiers at a discotheque in Germany, international police eventually brought those responsible to justice. 21 Yet this had an absolutely zero deterrent effect. The debate then hinges on the idea that those who say that we should not go to war, that we should be handling this through an international police effort, are ignoring the pertinent fact, we tried it; it did not work. The intention behind practicing assassination is that it is all about taking the initiative, taking the fight to the enemy instead of passively waiting for the enemy to act. Without the initiative, they argue, strategists can make no decisions of their own, and instead are forced to fall back into a mode of reactionary and defensive actions, playing to the opposition s agenda. Additionally, according to Michael Gross, targeted killing has emerged as an effective means to disable non-uniformed combatants while sparing civilians many of the horrors of full-scale battle. 22 Going on to say how this policy is an essential tool for combatting non-state actors, that such killings are actually Ignatieff, M. (other). (2001). Ethics And The New War. Royal Military College; Young Memorial Lecture. Ignatieff, M. (other). (2001). Ethics And The New War. Royal Military College; Young Memorial Lecture. 22 Michael Gross, Response to Notes on Asymmetric War, CURRENT INTELLIGENCE (Feb. 2, 2011), available at

9 necessary in order to restore a certain element of equilibrium in favor of the attacking military forces that are otherwise put at such a disadvantage in an asymmetric conflict in which their opponents are non-uniformed. 23 The reason for this being that selective violence has the goal of undermining insurgent organizations ability to plan and to engage in traditional militancy, in addition to political activities. Effectively forcing militants to change their activities in ways that make it difficult for them to engage in violence. These changes consistently have indirect deterrent effects that do long-term damage to the organization s capacity to support itself. The idea that at any moment, they could be wiped off the face of the earth can deter potential recruits looking to join, and make current members of the insurgency consider more strongly the potential incentives of leaving or even defecting to the government, in order to avoid death. The effects of this will be further reinforced if the campaign of selective violence can be sustained over long periods, as the insurgency s loss of members and recruits will weaken its ability to achieve its aims and thus make it less attractive to current and potential members. 24 In the specific case of UAVs, they have become essential to the concept of selective violence over the last few years. It is important to remember that drones are a tool, not a policy. The policy is assassination. 25 Nonetheless, these tools have proved themselves as an important advance over similar forms of violence because they remove American military personnel from the immediate danger of the battlefield, and allow the collection of real-time intelligence and its integration with decision-making in launching attacks. Consequently, strikes can then be considered with all the coolness possible when one s forces are not at risk and not under pressure to strike at the moment, to take an ill-advised shot because of the human team s inability to linger 23 Michael L. Gross, Moral Dilemmas of Modern War: Torture, Assassination, And Blackmail In An Age of Asymmetric Conflict (2010). 24 Walsh, J. I. (2013, September). THE EFFECTIVENESS OF DRONE STRIKES IN COUNTERINSURGENCY AND COUNTERTERRORISM CAMPAIGNS. Strategic Studies Institute and U.S. Army War College Press, Retrieved from Vol.-2_Alston1.pdf 25 Scahill, J. The Assassination Complex. The Intercept, 1.!9

10 for hours, days, or weeks at a time to find a better moment. 26 In fact, as of the most recent estimate, the CIA s drone-based killing programs have been credited with around 2,400 kills in Pakistan alone since Providing a needed example of the scope to which this program is in use. Beyond the use of UAVs, special operations forces have played pivotal roles in the implementation of targeted killing, becoming an indispensable factor in the overall conflict. The use of SOF, strangely enough, has been absent from almost all of the general analysis of targeted killings, despite the fact that they are governed by the same rules, have led to a significant number of casualties, and were responsible for one of the most infamous examples of extrajudicial assassination, the killing of Osama bin Laden in May 2011, the singular event which truly brought them into the public spotlight. Operations like the Bin Laden mission is not an uncommon occurrence. SOF forces like the Navy SEALs do those mission incredibly frequently, conducting these kinds of operations two and three times a night in Afghanistan. 28 Or, in November 2010, the New York Times cited NATO figures, ending November 11, 2010, in which Special Forces had averaged 17 missions a night, or a little over 520 night raids each month. The results cited being 368 insurgent leaders killed or captured, and 968 lower-level insurgents killed and 2,477 captured. 29 The sheer volume of the body count itself speaks volumes to the frequency in which these units operate, and just how efficient they are at what they do. The antithesis argument goes along the lines that while also having no moral justification, the use of selective violence holds absolutely no validity when it comes to it s effectiveness either. This argument is large and diverse, but one of the leading points given is that we are 26 Durante, Ruben and Zhuravskaya, Ekaterina, Attack When the World Is Not Watching? U.S. News and the Israeli-Palestinian Conflict (September 2016). Available at SSRN: abstract= or 27 Micheal Walzer, Targeted Killing and Drone Warfare (Dissent Magazine: January 11, 2013) 28 Alston, P. (2011). The CIA and Targeted Killings Beyond Borders. Harvard National Security Journal, 2, Alston, P. (2011). The CIA and Targeted Killings Beyond Borders. Harvard National Security Journal, 2, !10

11 fighting such large and decentralized networks that they cannot be neutralized by a lethal strike on one individual, therefore the deaths of their leaders and rank-and-file members are not going to be the downfall of these organizations, due to the hypothetical events of one cell having small effects on other cells by virtue of them being only loosely tied to each other. It has also been economically argued, explaining how the war in Afghanistan has been a sinkhole in which the U.S. has poured vast resources into killing local insurgents,while only exacerbating the very threat the U.S. is seeking to confront. 30 The suggestion that selective violence only has exacerbated the current issue at hand stems from terrorist and insurgent organizations innate ability to exploit the slightest mistakes of state entities in their favor. Propaganda output is a useful tool to them for two reasons. First, the production of effective propaganda is an important objective of most terrorist groups, including al-qaeda. With many of the group s most senior leaders, including Bin Laden, repeatedly emphasizing this point. Bin Laden stating that, the media war of this century is one of the strongest methods 31 of terrorism available. Hence, any degradation of insurgent organizations caused by drone strikes is outweighed by the ability of such organizations to exploit even the smallest numbers of civilian casualties with the goals of persuading people to join or support the insurgency, by manipulating their resentment and frustration of the government. Additionally, strikes and raids, especially drones, have the capability to punish and deter insurgent organizations, but they are not an effective contribution when implemented alone to the overall establishment of effective state authority. This key objective of the whole counterinsurgency doctrine requires large numbers of ground forces and civilians to provide services to and gain intelligence from the local population. This cannot be achieved when civilians are themselves afraid of becoming unwitting victims of these actions. However, there is some concession on the other side of the argument that there may be some merit to the tactical effectiveness of these policies, especially when the combined force of 30 Scahill, J. The Assassination Complex. The Intercept, Walsh, J. I. (2013, September). THE EFFECTIVENESS OF DRONE STRIKES IN COUNTERINSURGENCY AND COUNTERTERRORISM CAMPAIGNS. Strategic Studies Institute and U.S. Army War College Press, Retrieved from /02/Vol.-2_Alston1.pdf!11

12 UAVs and SOF are utilized together to achieve greater strategic objectives. The course of integration of SOF units working in conjunction with unmanned aerial vehicles often takes the place of needing the confirmation of the reconnaissance units in real time before a strike by the UAV is initiated, providing for greater assurances and precision in the intelligence leading up to the trigger pull. The best examples of this has been seen through the many targeted kill missions of the war in Afghanistan, but the origins of these joint capabilities derive from the now-famous Scud Hunting missions conducted by the Australian and UK Special Air Services in Western Iraq. 32 For years, the United States, along with many other nations, have been embroiled in a global conflict against an enemy which has no nation, does not wear uniforms, does not control well-defined areas of territory for long periods, and seeks to mask their communications and the identity of their supporters from outside scrutiny. Targeted killing: the intentional, premeditated and deliberate use of lethal force, has been one of the predominant answers to this asymmetric conflict, and from a purely numerical standpoint, it would appear as though targeted killing is incredibly effective. That between these specific policies and the subsequent opportunistic killings that naturally take place in any conflict, we should ve had it in the bag. However, from a strategic viewpoint, the arguments made do reveal the fallacies in these programs. Highlighting the fact that when your approach revolves around creating lists of people designated to be eliminated, then you are certain to be fighting a losing battle as you slowly but surely turn an entire populace against you. And when a successful counterinsurgency campaign hinges on the cooperation of the local population and the legitimacy of the state, then those actions can only be detrimental. In conclusion, it is safe to say that targeted killing, by itself, is not an effective strategy for counter-terror and counterinsurgency warfare. But may hold some relevance when force is employed selectively in ways that reflect solid intelligence on, and understanding of, the targeted insurgent group, and the population from which a state entity seeks to draw support. Eventually paving way for a better understanding of the limits of selective violence as to allow their use to 32 T. Ripley, Iraq s Western Desert Special Forces Playground, Jane s Defence Weekly, 9 April 2003.!12

13 be more effectively integrated with other types of military force, and tools of foreign and security policy.!13

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

DRONES VERSUS SECURITY OR DRONES FOR SECURITY? DRONES VERSUS SECURITY OR DRONES FOR SECURITY? Anton MANDA, PhD candidate * Abstract: Drones represent the most controversial subject when it comes to the dimension of national security. This technological

More information

THE CONCEPT OF EXTRA-JUDICIAL KILLING: AN ANALYSIS

THE CONCEPT OF EXTRA-JUDICIAL KILLING: AN ANALYSIS THE CONCEPT OF EXTRA-JUDICIAL KILLING: AN ANALYSIS MIRA SAJJAN Lecturer Department of Law & Justice Southeast University, Dhaka, Bangladesh Abstract Every man remains innocent until proven guilty is a

More information

INTERNATIONAL JOURNAL OF RESEARCH AND ANALYSIS VOLUME 4 ISSUE 2 ISSN

INTERNATIONAL JOURNAL OF RESEARCH AND ANALYSIS VOLUME 4 ISSUE 2 ISSN THE LEGALITY OF ASSASSINATION OF OSAMA BIN LADEN UNDER INTERNATIONAL HUMANITARIAN LAW INTRODUCTION On 2 nd * ROMMYEL RAJ May 2011, the U.S Navy Seal Team 6 undertook a covert operation, Operation Geronimo

More information

Chapter 8: The Use of Force

Chapter 8: The Use of Force Chapter 8: The Use of Force MULTIPLE CHOICE 1. According to the author, the phrase, war is the continuation of policy by other means, implies that war a. must have purpose c. is not much different from

More information

Controversy: New Technology For War: The Legality of Drone-Based Targeted Killings Under International Law

Controversy: New Technology For War: The Legality of Drone-Based Targeted Killings Under International Law Chicago-Kent Journal of International and Comparative Law Volume 16 Issue 2 Article 4 5-1-2016 Controversy: New Technology For War: The Legality of Drone-Based Targeted Killings Under International Law

More information

Negotiating with Terrorists an Option Not to Be Forgone

Negotiating with Terrorists an Option Not to Be Forgone KOMMENTARE /COMMENTS Negotiating with Terrorists an Option Not to Be Forgone MICHAEL DAUDERSTÄDT I t is very tempting, in the wake of the many shocking terrorist attacks of recent times such as those in

More information

US DRONE ATTACKS INSIDE PAKISTAN TERRITORY: UN CHARTER

US DRONE ATTACKS INSIDE PAKISTAN TERRITORY: UN CHARTER US DRONE ATTACKS INSIDE PAKISTAN TERRITORY: UN CHARTER Nadia Sarwar * The US President, George W. Bush, in his address to the US. Military Academy at West point on June 1, 2002, declared that America could

More information

The human rights implications of targeted killings. Christof Heyns, UN Special Rapporteur on extrajudicial, summary or arbitrary executions

The human rights implications of targeted killings. Christof Heyns, UN Special Rapporteur on extrajudicial, summary or arbitrary executions The human rights implications of targeted killings Geneva 21 June 2012 Christof Heyns, UN Special Rapporteur on extrajudicial, summary or arbitrary executions I would like to look at the current issue

More information

Background Paper on Geneva Conventions and Persons Held by U.S. Forces

Background Paper on Geneva Conventions and Persons Held by U.S. Forces Background Paper on Geneva Conventions and Persons Held by U.S. Forces January 29, 2002 Introduction 1. International Law and the Treatment of Prisoners in an Armed Conflict 2. Types of Prisoners under

More information

Reaper Madness: Obama s Whack-A-Mole Killing Machine

Reaper Madness: Obama s Whack-A-Mole Killing Machine Reaper Madness: Obama s Whack-A-Mole Killing Machine Guest post by Doug Noble of Rochester Peace Action and Education. Originally published on Counterpunch Blog. Our entire Middle East policy seems to

More information

The Terror OCTOBER 18, 2001

The Terror OCTOBER 18, 2001 The Terror OCTOBER 18, 2001 Philip C. Wilcox Jr. Font Size: A A A The author, a retired US Foreign Service officer, served as US Ambassador at Large for Counterterrorism between 1994 and 1997. The Bush

More information

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION

White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION White Paper of the Interagency Policy Group's Report on U.S. Policy toward Afghanistan and Pakistan INTRODUCTION The United States has a vital national security interest in addressing the current and potential

More information

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/67/L.63 and Add.1)]

Resolution adopted by the General Assembly. [without reference to a Main Committee (A/67/L.63 and Add.1)] United Nations A/RES/67/262 General Assembly Distr.: General 4 June 2013 Sixty-seventh session Agenda item 33 Resolution adopted by the General Assembly [without reference to a Main Committee (A/67/L.63

More information

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism

1/13/ What is Terrorism? The Globalization of Terrorism. What is Terrorism? Geography of Terrorism. Global Patterns of Terrorism What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 1/13/2009 Terrorism 2 Unfortunately, the term terrorism is one that has become a part of our everyday vocabulary

More information

Wanted Dead or Alive: Ethical Concern in UAV Warfare. Abstract. First draft please do not cite without permission of the author

Wanted Dead or Alive: Ethical Concern in UAV Warfare. Abstract. First draft please do not cite without permission of the author Wanted Dead or Alive: Ethical Concern in UAV Warfare ECPR General Conference 2015, Montreal Andree- Anne (Andy) Melancon PhD Candidate The University of Sheffield a.melancon@sheffield.ac.uk First draft

More information

HOSTILITIES UNDER INTERNATIONAL LAW

HOSTILITIES UNDER INTERNATIONAL LAW An Open Access Journal from The Law Brigade (Publishing) Group 447 HOSTILITIES UNDER INTERNATIONAL LAW Written by Dr. Yeshwant Naik Post-Doctoral Research Fellow, Muenster University, Germany The interrelation

More information

DEBATE FORUM. TARGETED KILLING AS A MEANS OF ASYMMETRIC WARFARE: A PROVOCATIVE VIEW AND INVITATION TO DEBATE Sascha Dominik Bachmann Ulf Haeussler

DEBATE FORUM. TARGETED KILLING AS A MEANS OF ASYMMETRIC WARFARE: A PROVOCATIVE VIEW AND INVITATION TO DEBATE Sascha Dominik Bachmann Ulf Haeussler DEBATE FORUM TARGETED KILLING AS A MEANS OF ASYMMETRIC WARFARE: A PROVOCATIVE VIEW AND INVITATION TO DEBATE Sascha Dominik Bachmann Ulf Haeussler The killing of Mahmoud al-mabhou reportedly by agents of

More information

The Hague International Model United Nations Qatar nd 25 th of January 2019

The Hague International Model United Nations Qatar nd 25 th of January 2019 Forum: Human Rights Council 2 Issue: Student Officer: Position: Measures to eliminate extrajudicial, summary, or arbitrary executions Labiba Rahman, Adrika Iyer, Bushra Alfakhri President, Deputy President,

More information

All is Fair in War? Just War Theory and American Applications. Chris Sabolcik GSW Area II

All is Fair in War? Just War Theory and American Applications. Chris Sabolcik GSW Area II All is Fair in War? Just War Theory and American Applications Chris Sabolcik GSW Area II Quickchat with Colleagues Brainstorm a military conflict that you consider to be justified, if one exists. Also,

More information

Conflating Terrorism and Insurgency

Conflating Terrorism and Insurgency Page 1 of 6 MENU FOREIGN POLICY ESSAY Conflating Terrorism and Insurgency By John Mueller, Mark Stewart Sunday, February 28, 2016, 10:05 AM Editor's Note: What if most terrorism isn t really terrorism?

More information

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism?

10/15/2013. The Globalization of Terrorism. What is Terrorism? What is Terrorism? The Globalization of Terrorism Global Issues 621 Chapter 23 Page 364 What is Terrorism? 10/15/2013 Terrorism 2 What is Terrorism? Unfortunately, the term terrorism is one that has become a part of our

More information

CONVENTIONAL WARS: EMERGING PERSPECTIVE

CONVENTIONAL WARS: EMERGING PERSPECTIVE CONVENTIONAL WARS: EMERGING PERSPECTIVE A nation has security when it does not have to sacrifice its legitimate interests to avoid war and is able to, if challenged, to maintain them by war Walter Lipman

More information

A. Interim report to the General Assembly on the use of remotely piloted aircraft in counterterrorism

A. Interim report to the General Assembly on the use of remotely piloted aircraft in counterterrorism Published on How does law protect in war? - Online casebook (https://casebook.icrc.org) Home > General Assembly, The use of drones in counter-terrorism operations Drones Case prepared by Ms. Sophie Bobillier,

More information

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010

Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 Cyber War and Competition in the China-U.S. Relationship 1 James A. Lewis May 2010 The U.S. and China are in the process of redefining their bilateral relationship, as China s new strengths means it has

More information

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH

General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH Research Report General Assembly First Committee (International Security and Disarmament) Addressing fourth generation warfare MUNISH Please think about the environment and do not print this research report

More information

MUCH PUBLIC debate has centred on the legality of unmanned aerial

MUCH PUBLIC debate has centred on the legality of unmanned aerial Remotely Piloted Aircraft and International Law Nathalie Weizmann MUCH PUBLIC debate has centred on the legality of unmanned aerial vehicles (UAVs) 1 for the application of armed force. Using UAVs, operators

More information

Exploring Civilian Protection: A Seminar Series

Exploring Civilian Protection: A Seminar Series Exploring Civilian Protection: A Seminar Series (Seminar #1: Understanding Protection: Concepts and Practices) Tuesday, September 14, 2010, 9:00 am 12:00 pm The Brookings Institution, Saul/Zilkha Rooms,

More information

Counterterrorism strategies from an international law. and policy perspective

Counterterrorism strategies from an international law. and policy perspective Royal Netherlands Embassy Washington, DC Counterterrorism strategies from an international law and policy perspective Address by His Excellency Christiaan M.J. Kröner, Ambassador of the Kingdom of the

More information

Overview of the ICRC's Expert Process ( )

Overview of the ICRC's Expert Process ( ) 1 Overview of the ICRC's Expert Process (2003-2008) 1. The Issue of Civilian Direct Participation in Hostilities The primary aim of international humanitarian law (IHL) is to protect the victims of armed

More information

Conventional Deterrence: An Interview with John J. Mearsheimer

Conventional Deterrence: An Interview with John J. Mearsheimer Conventional Deterrence: An Interview with John J. Mearsheimer Conducted 15 July 2018 SSQ: Your book Conventional Deterrence was published in 1984. What is your definition of conventional deterrence? JJM:

More information

Receive ONLINE NEWSLETTER

Receive ONLINE NEWSLETTER Analysis Document 24/2014 09 de abril de 2014 IDEOLOGICAL WARS AND MAGICAL THINKING Visit the WEBSITE Receive ONLINE NEWSLETTER This document has been translated by a Translation and Interpreting Degree

More information

Declassified Minutes of the hearing on Drones and targeted killings: the need to uphold human rights

Declassified Minutes of the hearing on Drones and targeted killings: the need to uphold human rights Declassified AS/Jur (2014) PV 06 (Drones hearing only) 6 November 2014 ajpv06 2014 Committee on Legal Affairs and Human Rights Declassified Minutes of the hearing on Drones and targeted killings: the need

More information

Sixty years of the Geneva Conventions: learning from the past to better face the future

Sixty years of the Geneva Conventions: learning from the past to better face the future Published on How does law protect in war? - Online casebook (https://casebook.icrc.org) Home > Sixtieth Anniversary of the Geneva Conventions [Source: ICRC, Sixty years of the Geneva Conventions: learning

More information

Week # 2 Targeting Principles & Human Shields

Week # 2 Targeting Principles & Human Shields Week # 2 Targeting Principles & Human Shields MILITARY NECESSITY UNNECESSARY SUFFERING PROPORTIONALITY Military Advantage Collateral Damage DISTINCTION Civilian-Combatant Military Objective v. Civilian

More information

Course: Government Course Title: Power and Politics: Power, Tragedy, and H onor Three Faces of W ar Year: Spring 2007

Course: Government Course Title: Power and Politics: Power, Tragedy, and H onor Three Faces of W ar Year: Spring 2007 Document Title: Styles of W riting and the Afghanistan Model A uthor: Andrew Yeo Course: Government 100.03 Course Title: Power and Politics: Power, Tragedy, and H onor Three Faces of W ar Year: Spring

More information

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952)

TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) TERRORISM Fervour is the weapon of choice of the impotent. FRANZ FANON, B l a c k S k i n, White Ma s k s (1952) Until the 1990s, terrorism was widely considered to be a security concern of the second

More information

Chad C. Serena. It Takes More than a Network: The Iraqi Insurgency and Organizational Adaptation. Stanford, CA: Stanford University Press, 2014.

Chad C. Serena. It Takes More than a Network: The Iraqi Insurgency and Organizational Adaptation. Stanford, CA: Stanford University Press, 2014. Journal of Military and Strategic VOLUME 15, ISSUE 4, 2014 Studies Chad C. Serena. It Takes More than a Network: The Iraqi Insurgency and Organizational Adaptation. Stanford, CA: Stanford University Press,

More information

Moral Dilemmas of Modern War

Moral Dilemmas of Modern War Moral Dilemmas of Modern War Torture, Assassination, and Blackmail in an Age of Asymmetric Conflict Asymmetric conflict is changing the way that we practice and think about war. Torture, rendition, assassination,

More information

WikiLeaks Project* The Taliban s Assets in the United Arab Emirates

WikiLeaks Project* The Taliban s Assets in the United Arab Emirates A Counter-Terrorism Analysis of WikiLeaks The Taliban s Assets in the UAE WikiLeaks Project* The Taliban s Assets in the United Arab Emirates By Adam Pankowski, ICT Intern Team As the US s War on Terrorism

More information

Comments on the Draft Additional Protocol to the Council of Europe Convention on the Prevention of Terrorism

Comments on the Draft Additional Protocol to the Council of Europe Convention on the Prevention of Terrorism Comments on the Draft Additional Protocol to the Council of Europe Convention on the Prevention of Terrorism 24 March 2015 Introduction 1. The Justice Initiative welcomes the opportunity to provide comments

More information

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction

Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction Example 8.2 The Economics of Terrorism: Externalities and Strategic Interaction ECONOMIC APPROACHES TO TERRORISM: AN OVERVIEW Terrorism would appear to be a subject for military experts and political scientists,

More information

Leadership in COIN Operations

Leadership in COIN Operations Leadership in COIN Operations An Old Concept in a New Age or Delegating to the Point of Discomfort 1 Purpose To highlight the unique challenges of leadership in a COIN environment. 2 Areas of Discussion

More information

Journal of Military and Strategic. Studies. Bradley Martin

Journal of Military and Strategic. Studies. Bradley Martin Journal of Military and Strategic VOLUME 15, ISSUE 1, 2013 Studies Williamson Murray and Peter Mansoor, eds. Hybrid Warfare: Fighting Complex Opponents from the Ancient World to the Present. New York,

More information

STRUCTURE APPENDIX D APPENDIX D

STRUCTURE APPENDIX D APPENDIX D APPENDIX D This appendix describes the mass-oriented insurgency, the most sophisticated insurgency in terms of organization and methods of operation. It is difficult to organize, but once under way, it

More information

Remarks on the Military Commissions Act

Remarks on the Military Commissions Act HARVARD ILJ ONLINE VOLUME 48 - JANUARY 19, 2007 Remarks on the Military Commissions Act John B. Bellinger * These remarks have been excerpted from an informal presentation Mr. Bellinger gave to Harvard

More information

The first affirmation of the Center s Guideline ( on

The first affirmation of the Center s Guideline (  on October-December, 2007 Vol. 30, No. 4 Security and Defense Guideline #7 for Government and Citizenship by James W. Skillen The first affirmation of the Center s Guideline (www.cpjustice.org/guidelines)

More information

Reflections on U.S. Military Policy

Reflections on U.S. Military Policy Reflections on U.S. Military Policy Douglas Feith Former Under Secretary of Defense for Policy U.S. Department of Defense An Interview with Jonah Shrock and Oliver Hermann Providence, RI, 8 May 2017 Douglas

More information

Drug Lords and Domestic Terrorism in Afghanistan [NAME] [DATE]

Drug Lords and Domestic Terrorism in Afghanistan [NAME] [DATE] 1 Drug Lords and Domestic Terrorism in Afghanistan [NAME] [DATE] 2 Outline Synthesis 1. Drug lords are able to become productive and profitable through successfully recruiting the poor people to work for

More information

P.O. Box 5675, Berkeley, CA USA The Use of Lethal Drones in Counter-Terrorism Operations

P.O. Box 5675, Berkeley, CA USA The Use of Lethal Drones in Counter-Terrorism Operations P.O. Box 5675, Berkeley, CA 94705 USA The Use of Lethal Drones in Counter-Terrorism Operations Contact Information: Paul Grant-Villegas, Frank C. Newman Intern Representing Human Rights Advocates through

More information

TARGETED KILLING: MANAGING AMERICAN PERCEPTIONS ON UNMANNED AERIAL VEHICLE OPERATIONS. by Gregory D. Johnson, Major, USAF

TARGETED KILLING: MANAGING AMERICAN PERCEPTIONS ON UNMANNED AERIAL VEHICLE OPERATIONS. by Gregory D. Johnson, Major, USAF AU/ACSC/2016 AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY TARGETED KILLING: MANAGING AMERICAN PERCEPTIONS ON UNMANNED AERIAL VEHICLE OPERATIONS by Gregory D. Johnson, Major, USAF A Research Report Submitted

More information

Resolved: United Nations peacekeepers should have the power to engage in offensive operations.

Resolved: United Nations peacekeepers should have the power to engage in offensive operations. Resolved: United Nations peacekeepers should have the power to engage in offensive operations. Keith West After the tragedy of World War II and the ineffectiveness of the League of Nations, the world came

More information

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC

WCAML Forum. The Challenges of Terrorist Financing in 2014 and Beyond. May 7, Dennis M. Lormel President & CEO DML Associates, LLC The Challenges of Terrorist Financing in 2014 and Beyond May 7, 2014 Dennis M. Lormel President & CEO DML Associates, LLC Al-Qaeda s Most Dangerous Member: Nasir al-wuhayshi 2 Terrorist Threats 2014 Introduction

More information

THE ICRC'S CLARIFICATION PROCESS ON THE NOTION OF DIRECT PARTICIPATION IN HOSTILITIES UNDER INTERNATIONAL HUMANITARIAN LAW NILS MELZER

THE ICRC'S CLARIFICATION PROCESS ON THE NOTION OF DIRECT PARTICIPATION IN HOSTILITIES UNDER INTERNATIONAL HUMANITARIAN LAW NILS MELZER THE ICRC'S CLARIFICATION PROCESS ON THE NOTION OF DIRECT PARTICIPATION IN HOSTILITIES UNDER INTERNATIONAL HUMANITARIAN LAW NILS MELZER Dr. Nils Melzer is legal adviser for the International Committee of

More information

Terrorism, Counter-terrorism and Human Rights: the experience of emergency powers in Northern Ireland

Terrorism, Counter-terrorism and Human Rights: the experience of emergency powers in Northern Ireland Terrorism, Counter-terrorism and Human Rights: the experience of emergency powers in Northern Ireland Submission by the Northern Ireland Human Rights Commission to the International Commission of Jurists

More information

Albanian National Strategy Countering Violent Extremism

Albanian National Strategy Countering Violent Extremism Unofficial Translation Albanian National Strategy Countering Violent Extremism Fostering a secure environment based on respect for fundamental freedoms and values The Albanian nation is founded on democratic

More information

The Embassy Closings

The Embassy Closings The Embassy Closings August 20, 2013 by Bill O'Grady of Confluence Investment Management In the first week of August, the Obama administration announced the closing of 22 embassies and consulates across

More information

I. Summary Human Rights Watch August 2007

I. Summary Human Rights Watch August 2007 I. Summary The year 2007 brought little respite to hundreds of thousands of Somalis suffering from 16 years of unremitting violence. Instead, successive political and military upheavals generated a human

More information

Toward the Right to Heal: Human Rights at Stake for Injured Soldiers

Toward the Right to Heal: Human Rights at Stake for Injured Soldiers Toward the Right to Heal: Human Rights at Stake for Injured Soldiers All human beings are born free and equal in dignity and rights... Everyone is entitled to all rights and freedoms set forth in this

More information

The Legal Basis for Targeted Airstrikes Against Islamic State s British Citizens

The Legal Basis for Targeted Airstrikes Against Islamic State s British Citizens The Legal Basis for Targeted Airstrikes Against Islamic State s British Citizens Introduction CRT BRIEFING, 8 September 2015 On 7 September, Prime Minister David Cameron informed the House of Commons that

More information

European Parliament resolution of 16 February 2012 on the situation in Syria (2012/2543(RSP)) The European Parliament,

European Parliament resolution of 16 February 2012 on the situation in Syria (2012/2543(RSP)) The European Parliament, European Parliament resolution of 16 February 2012 on the situation in Syria (2012/2543(RSP)) The European Parliament, having regard to its previous resolutions on Syria, having regard to the Foreign Affairs

More information

Joint study on global practices in relation to secret detention in the context of countering terrorism. Executive Summary

Joint study on global practices in relation to secret detention in the context of countering terrorism. Executive Summary Joint study on global practices in relation to secret detention in the context of countering terrorism Executive Summary The joint study on global practices in relation to secret detention in the context

More information

Practicing What We Preach: Humane Treatment for Detainees in the War on Terror

Practicing What We Preach: Humane Treatment for Detainees in the War on Terror 1-1-2006 Practicing What We Preach: Humane Treatment for Detainees in the War on Terror Jennifer Moore University of New Mexico - Main Campus Follow this and additional works at: http://digitalrepository.unm.edu/law_facultyscholarship

More information

A Need for Greater Restrictions on the Use of Improvised Explosive Devices? A Food for thought paper

A Need for Greater Restrictions on the Use of Improvised Explosive Devices? A Food for thought paper A Need for Greater Restrictions on the Use of Improvised Explosive Devices? A Food for thought paper Geneva, 24 April 2012 Contents INTRODUCTION 1 WHICH WEAPONS ARE WE TALKING ABOUT? 1 UNLAWFUL WEAPONRY

More information

Obligations of International Humanitarian Law

Obligations of International Humanitarian Law Obligations of International Humanitarian Law Knut Doermann It is an understatement to say that armed conflicts fought in densely populated areas can and do cause tremendous human suffering. Civilians

More information

Remarks by Bishop Richard E Pates to Interfaith Conference on Drone Warfare January 23, 2015 Princeton Theological Seminary

Remarks by Bishop Richard E Pates to Interfaith Conference on Drone Warfare January 23, 2015 Princeton Theological Seminary Remarks by Bishop Richard E Pates to Interfaith Conference on Drone Warfare January 23, 2015 Princeton Theological Seminary Why is drone warfare an urgent moral issue now? Thank you for your kind introduction

More information

Making the Case on National Security as Elections Approach

Making the Case on National Security as Elections Approach Date: September 27, 2010 To: Interested Parties From: Stanley B. Greenberg, James Carville, Jeremy Rosner, Democracy Corps/GQR Jon Cowan, Matt Bennett, Andy Johnson, Third Way Making the Case on National

More information

COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005

COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005 COUNCIL OF AUSTRALIAN GOVERNMENTS COMMUNIQUÉ SPECIAL MEETING ON COUNTER-TERRORISM 27 SEPTEMBER 2005 The Council of Australian Governments (COAG), comprising the Prime Minister, Premiers, the Chief Ministers

More information

Afghanistan. Endemic corruption and violence marred parliamentary elections in September 2010.

Afghanistan. Endemic corruption and violence marred parliamentary elections in September 2010. January 2011 country summary Afghanistan While fighting escalated in 2010, peace talks between the government and the Taliban rose to the top of the political agenda. Civilian casualties reached record

More information

The following text is an edited transcript of Professor. Fisher s remarks at the November 13 meeting. Afghanistan: Negotiation in the Face of Terror

The following text is an edited transcript of Professor. Fisher s remarks at the November 13 meeting. Afghanistan: Negotiation in the Face of Terror 1 The following text is an edited transcript of Professor Fisher s remarks at the November 13 meeting. Afghanistan: Negotiation in the Face of Terror Roger Fisher Whether negotiation will be helpful or

More information

Review. Michael Walzer s Arguing about War New Haven: Yale University Press, 2004

Review. Michael Walzer s Arguing about War New Haven: Yale University Press, 2004 Review Michael Walzer s Arguing about War New Haven: Yale University Press, 2004 reviewed by Ori Lev M ichael Walzer s new book assembles eleven articles published over the last 25 years, the latest in

More information

Briefing on Disarmament and International Security 1 HISTORY OF THE COMMITTEE ON DISARMAMENT AND INTERNATIONAL SECURITY

Briefing on Disarmament and International Security 1 HISTORY OF THE COMMITTEE ON DISARMAMENT AND INTERNATIONAL SECURITY Briefing on Disarmament and International Security 1 HISTORY OF THE COMMITTEE ON DISARMAMENT AND INTERNATIONAL SECURITY In October 1945, after several rounds of negotiation in San Francisco, the United

More information

Foreword to Killing by Remote Control (edited by Bradley Jay Strawser, Oxford University Press, 2012) Jeff McMahan

Foreword to Killing by Remote Control (edited by Bradley Jay Strawser, Oxford University Press, 2012) Jeff McMahan Foreword to Killing by Remote Control (edited by Bradley Jay Strawser, Oxford University Press, 2012) Jeff McMahan There is increasing enthusiasm in government circles for remotely controlled weapons.

More information

Concluding observations of the Committee against Torture

Concluding observations of the Committee against Torture United Nations Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment Distr.: General 29 June 2012 Original: English Committee against Torture Forty-eighth session 7 May

More information

WHAT ARE THE PROS AND CONS OF CULTURAL INTELLIGENCE IN COUNTERINSURGENCY OPERATIONS?

WHAT ARE THE PROS AND CONS OF CULTURAL INTELLIGENCE IN COUNTERINSURGENCY OPERATIONS? WHAT ARE THE PROS AND CONS OF CULTURAL INTELLIGENCE IN COUNTERINSURGENCY OPERATIONS? Alexandros Kassidiaris (Security Analyst, Postgraduate from the Department of War Studies, King's College London, UK)

More information

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management

War Gaming: Part I. January 10, 2017 by Bill O Grady of Confluence Investment Management War Gaming: Part I January 10, 2017 by Bill O Grady of Confluence Investment Management One of the key elements of global hegemony is the ability of a nation to project power. Ideally, this means a potential

More information

Afghan National Defence Security Forces. Issues in the Train, Advise and Assist Efforts

Afghan National Defence Security Forces. Issues in the Train, Advise and Assist Efforts Afghan National Defence Security Forces Issues in the Train, Advise and Assist Efforts Contents ABSTRACT...2 THE AFGHAN SECURITY FORCES REFORMS (2001-2015)...3 THE CURRENT APPROACH...5 CONCLUSION...7 Page1

More information

Weapons of Mass Destruction and their Effect on Interstate Relationships

Weapons of Mass Destruction and their Effect on Interstate Relationships STUDENT 2 PS 235 Weapons of Mass Destruction and their Effect on Interstate Relationships We make war that we may live in Peace. -Aristotle A lot of controversy has been made over the dispersion of weapons

More information

FACT SHEET STOPPING THE USE OF RAPE AS A TACTIC OF

FACT SHEET STOPPING THE USE OF RAPE AS A TACTIC OF June 2014 FACT SHEET STOPPING THE USE OF RAPE AS A TACTIC OF WAR: A NEW APPROACH There is a global consensus that the mass rape of girls and women is routinely used as a tactic or weapon of war in contemporary

More information

Non-state actors and Direct Participation in Hostilities. Giulio Bartolini University of Roma Tre

Non-state actors and Direct Participation in Hostilities. Giulio Bartolini University of Roma Tre Non-state actors and Direct Participation in Hostilities Giulio Bartolini University of Roma Tre The involvement of non-state actors in armed conflicts. Different kinds of non-state actors : A) Organised

More information

Several months before Osama bin Laden was killed on May

Several months before Osama bin Laden was killed on May The Implications of U.S. Drone Strikes Rishaad Ismael Several months before Osama bin Laden was killed on May 2, 2011, his compound in Abbottabad, Pakistan was being secretly monitored by the United States.

More information

Bridging Between Law, Life and Assassinations

Bridging Between Law, Life and Assassinations Bridging Between Law, Life and Assassinations By Marwan Dalal 1 Overtime without Penalty Kicks The Israeli Supreme Court s ruling delivered in December 2006 on Israel s policy of assassinations in the

More information

International Law Journal symposium on State Ethics, 20 February 2012, Harvard Law School

International Law Journal symposium on State Ethics, 20 February 2012, Harvard Law School Extrajudicial executions and targeted killings International Law Journal symposium on State Ethics, 20 February 2012, Harvard Law School Christof Heyns Thank you very much for this opportunity. I am reminded

More information

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS:

CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM. Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS: I. INTRODUCTION CENTRAL TEXAS COLLEGE HMSY 1342 UNDERSTANDING AND COMBATING TERRORISM Semester Hours Credit: 3 INSTRUCTOR: OFFICE HOURS: A. It is important for an individual to understand the history of

More information

Attacks on Medical Units in International Humanitarian and Human Rights Law

Attacks on Medical Units in International Humanitarian and Human Rights Law Attacks on Medical Units in International Humanitarian and Human Rights Law September 2016 MSF-run hospital in Ma arat al-numan, Idleb Governorate, 15 February 2016 (Photo MSF - www.msf.org) The Syrian

More information

CHAPTER 1 BASIC RULES AND PRINCIPLES

CHAPTER 1 BASIC RULES AND PRINCIPLES CHAPTER 1 BASIC RULES AND PRINCIPLES Section I. GENERAL 1. Purpose and Scope The purpose of this Manual is to provide authoritative guidance to military personnel on the customary and treaty law applicable

More information

THE HUMAN RIGHTS DEFENDERS SUMMIT THE INTERNATIONAL ASSEMBLY Paris, December 1998 ADOPTED PLAN OF ACTION

THE HUMAN RIGHTS DEFENDERS SUMMIT THE INTERNATIONAL ASSEMBLY Paris, December 1998 ADOPTED PLAN OF ACTION Public AI Index: ACT 30/05/99 INTRODUCTION THE HUMAN RIGHTS DEFENDERS SUMMIT THE INTERNATIONAL ASSEMBLY Paris, December 1998 ADOPTED PLAN OF ACTION 1. We the participants in the Human Rights Defenders

More information

Question With what crime or crimes should Dan be charged? Discuss. 2. What defense or defenses might Dan assert? Discuss.

Question With what crime or crimes should Dan be charged? Discuss. 2. What defense or defenses might Dan assert? Discuss. Question 2 As Dan walked down a busy city street one afternoon, Vic, a scruffy, long-haired young man, approached him. For some time, Dan had been plagued by a pathological fear that long-haired transients

More information

Afghanistan Nail the myth

Afghanistan Nail the myth Afghanistan Nail the myth Caroline Lucas MP The Green Party MP for Brighton Pavilion intervened in the Parliamentary debate on Afghanistan, which took place on 9 September 2010. These excerpts are taken

More information

Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld

Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld Twenty-Four Theses on Intelligence (Notes for OSS '02, 10 May 2002) by Martin van Creveld The purpose of these notes is to provide a brief, schematic, comparison between the problems facing intelligence

More information

Human Rights: From Practice to Policy

Human Rights: From Practice to Policy Human Rights: From Practice to Policy Proceedings of a Research Workshop Gerald R. Ford School of Public Policy University of Michigan October 2010 Edited by Carrie Booth Walling and Susan Waltz 2011 by

More information

Research Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~

Research Report. Leiden Model United Nations 2015 ~ fresh ideas, new solutions ~ Forum: Issue: Student Officer: Position: General Assembly First Committee: Disarmament and International Security Foreign combatants in internal militarised conflicts Ethan Warren Deputy Chair Introduction

More information

On banning autonomous weapon systems: human rights, automation, and the dehumanization of lethal decision-making

On banning autonomous weapon systems: human rights, automation, and the dehumanization of lethal decision-making On banning autonomous weapon systems: human rights, automation, and the dehumanization of lethal decision-making Peter Asaro Prof. Asaro is a philosopher of technology who has worked in artificial intelligence,

More information

Al Qaeda Now: Understanding Today s Terrorists Karen J. Greenberg (Editor), Cambridge University Press, 2005, 282 pp.

Al Qaeda Now: Understanding Today s Terrorists Karen J. Greenberg (Editor), Cambridge University Press, 2005, 282 pp. Al Qaeda Now: Understanding Today s Terrorists Karen J. Greenberg (Editor), Cambridge University Press, 2005, 282 pp. Bob Glaberson This book is based on a 2004 conference organized jointly by the New

More information

Defence (section 26) Freedom of Information Act. Contents

Defence (section 26) Freedom of Information Act. Contents Defence (section 26) Freedom of Information Act Contents Introduction... 5 Overview... 5 What FOIA says... 6 Definition of terms... 6 Information covered by section 26... 8 The duty to confirm or deny...

More information

1267 and 1988 Committees Monitoring Team. CCW - Geneva, 2 April 2014

1267 and 1988 Committees Monitoring Team. CCW - Geneva, 2 April 2014 1267 and 1988 Committees Monitoring Team CCW - Geneva, 2 April 2014 1 UNDERSTANDING THE UN SANCTIONS REGIMES 2 Current Sanctions Regimes There are currently in place 15 sanctions regimes adopted by the

More information

AMBASSADOR THOMAS R. PICKERING DECEMBER 9, 2010 Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the House Committee on the

AMBASSADOR THOMAS R. PICKERING DECEMBER 9, 2010 Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the House Committee on the AMBASSADOR THOMAS R. PICKERING DECEMBER 9, 2010 Subcommittee on the Constitution, Civil Rights, and Civil Liberties of the House Committee on the Judiciary Hearing on Civil Liberties and National Security

More information

A 3D Approach to Security and Development

A 3D Approach to Security and Development A 3D Approach to Security and Development Robbert Gabriëlse Introduction There is an emerging consensus among policy makers and scholars on the need for a more integrated approach to security and development

More information

Objectives To explore the meanings of conflict and war. To make deductions and practise reasoning skills.

Objectives To explore the meanings of conflict and war. To make deductions and practise reasoning skills. H Oxfam Education www.oxfam.org.uk/education Making Sense of World Conflicts Lesson plan 5: Is it war? Age group: 14 17 Objectives To explore the meanings of conflict and war. To make deductions and practise

More information

Minimizing Civilian Casualties, the Case of ISAF

Minimizing Civilian Casualties, the Case of ISAF Minimizing Civilian Casualties, the Case of ISAF Ladies and Gentlemen, in my introduction I will provide you with some thoughts and experiences on minimizing civilian casualties, based on my recent service

More information

The legality of Targeted Killings in the War on Terror

The legality of Targeted Killings in the War on Terror The legality of Targeted Killings in the War on Terror Candidate number: 513 Submission deadline: 25.04.15 Number of words: 17994 Table of contents 1 INTRODUCTION...1 1.1 The Topic...1 1.2 Defining the

More information