Targeting War Sustaining Activities. International Humanitarian Law Workshop Yale Law School October 1, 2016

Similar documents
Responding to Hamas Attacks from Gaza Issues of Proportionality Background Paper. Israel Ministry of Foreign Affairs December 2008

Cyber Strategy & Policy: International Law Dimensions. Written Testimony Before the Senate Armed Services Committee

Methods in Armed Conflict: The Legal Framework. I H L C O U R S E F A L L U i O

The War in Iraq and International Humanitarian Law Frequently Asked Questions (FAQ) Last Updated April 7, 2003

MOOT COURT COMPETITION VIETNAM INTERNATIONAL COMMITTEE OF THE RED CROSS THE CASE CONCERNING PROSECUTOR MR. TONY GUSMAN

Operation Unified Protector: Targeting Densely Populated Areas in Libya

Bridging the Security Divide

Commentary to the HPCR Manual on International Law Applicable to Air and Missile Warfare

NEW ZEALAND DEFENCE FORCE Te Ope Kaatua o Aotearoa

The Additional Protocols 40 Years Later: New Conflicts, New Actors, New Perspectives

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release December 5, 2016

COMPETING INTERPRETATIONS: THE UNITED STATES DEPARTMENT OF DEFENSE DIRECTLY PARTICIPATES WITH THE ICRC MAJOR MARC R. TILNEY *

SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W.

1 Nuclear Weapons. Chapter 1 Issues in the International Community. Part I Security Environment Surrounding Japan

SHOWDOWN IN THE MIDDLE EAST

AMERICAN BAR ASSOCIATION CENTER FOR HUMAN RIGHTS WASHINGTON, DC. March 18, 2014

Syllabus Law 654 Counterterrorism Law Seminar. George Mason University Antonin Scalia Law School Spring 2018

NATO RULES OF ENGAGEMENT AND USE OF FORCE. Lt Col Brian Bengs, USAF Legal Advisor NATO School

MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

HARVARD INTERNATIONAL LAW JOURNAL

Recent U.S. Foreign Policy. Two takes on Empire

CRS Report for Congress

Foreign Policy and National Defense. Chapter 22

Battlefield Status & Protected Persons Lieutenant Colonel Chris Jenks 4 January 2010

How Everything Became War and the Military Became Everything: Tales from the Pentagon Rosa Brooks New York: Simon & Schuster, 2016, 448 pp.

Foreign Policy and National Defense. Chapter 22

Middle Eastern Conflicts

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

2016 / U.S.-Hired PMSC in Armed Conflict 437 ARTICLE

Previously in This Series

1

Threats to Peace and Prosperity

Activity: Persian Gulf War. Warm Up: What do you already know about the Persian Gulf War? Who was involved? When did it occur?

Draft Rules for the Limitation of the Dangers incurred by the Civilian Population in Time of War. ICRC, 1956 PREAMBLE

Cyber Warfare and International Humanitarian Law : A Study

IDO KILOVATY ABSTRACT

September 30, Honorable Kent Conrad Chairman Committee on the Budget United States Senate Washington, DC 20510

CUSTOMARY INTERNATIONAL HUMANITARIAN LAW

Principle of Distinction in Armed Conflict: An Analysis of the Legitimacy of Combatants and Military Objectives As a Military Target

Precautions against the effects of attacks in urban areas

Totality of the Circumstances: The DoD Law of War Manual and the Evolving Notion of Direct Participation in Hostilities

TOTALITY OF THE CIRCUMSTANCES: THE DOD LAW OF WAR MANUAL AND

THE MILITARY STRATEGY OF THE REPUBLIC OF LITHUANIA

LITHUANIAN DEFENCE SYSTEM: Facts and Trends

Application of the Law of War to the Global War on Terror

Emerging Technology and Perfidy in Armed Conflict

Nuclear dependency. John Ainslie

CONTENTS ANALYSIS. Hackers, Hacktivists, and the Fight for Human Rights in Cybersecurity

San Remo IIHL Round Table 2017

Provisional Reporting Formats for Article 13 para 4 and Article 11 para 2. AUSTRIA. Mr. Wolfgang Banyai

AIR COMMAND AND STAFF COLLEGE AIR UNIVERSITY UNDERSTANDING THE UNIQUE CHALLENGES OF THE CYBER DOMAIN. Kenneth J. Miller, Major, USAF

Effects-based Operations and the Law of Aerial Warfare

U.S. AIR STRIKE MISSIONS IN THE MIDDLE EAST

Intro. To the Gulf War

UNIVERSITY OF MONTERRREY DEPARTMENT OF LAW AND SOCIAL SCIENCES

TIME TO ACT STOPPING VIOLENCE, SAFEGUARDING HEALTH CARE

Does President Trump have the authority to totally destroy North Korea?

A MATTER OF POLICY: UNITED STATES APPLICATION OF THE LAW OF ARMED CONFLICT

The Necessity of Human Intelligence in Modern Warfare Bruce Scott Bollinger United States Army Sergeants Major Academy Class # 35 SGM Foreman 31 July

GEORGE A. B. PEIRCE Curriculum Vitae

Proportionality in the Law of Armed Conflict: The Proper Unit of Analysis for Military Operations

Applying Jus Ad Bellum in Cyberspace Barnett 0. Applying Jus Ad Bellum in Cyberspace: The Use of Force, Armed Attacks, and the Right of Self-Defence

Chapter 17: Foreign Policy and National Defense Section 3

the atom against another. To do so now is a political decision of the highest order.

Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003

SS.7.C.4.3 Describe examples of how the United States has dealt with international conflicts.

Foreign Policy and Homeland Security

Disarmament and International Security: Nuclear Non-Proliferation

Student Guide: Introduction to Army Foreign Disclosure and Contact Officers

Welcoming the restoration to Kuwait of its sovereignty, independence and territorial integrity and the return of its legitimate Government.

President Obama and National Security

Senate Armed Services Committee Statement on Counter-ISIL Campaign. delivered 28 October 2015, Washington, D.C.

Evaluate the advantages the North enjoyed in the Civil War.

SECTION 4 IRAQ S WEAPONS OF MASS DESTRUCTION

Combatants in World War I quickly began to use total war tactics

Conflict and Change. Chapter 10

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

SSUSH23 Assess the political, economic, and technological changes during the Reagan, George H.W. Bush, Clinton, George W.

USE OF DRONES AND PRIVATE MILITARY COMPANIES IN MODERN WARFARE: EFFECT ON INTERNATIONAL HUMANITARIAN LAW. Kanij Fatima *

Israel-Hizbullah War, 201?

Staffing Cyber Operations (Presentation)

Russia News. Focus on a more operational partnership. issue 3. NATO-Russia Council (NRC) defence ministers meet informally in Berlin

NOTE BY THE SECRETARY. to the NORTH ATLANTIC DEFENSE COMMITTEE THE STRATEGIC CONCEPT FOR THE DEFENCE OF THE NORTH ATLANTIC AREA

The State Defence Concept Executive Summary

Department of Defense DIRECTIVE

HOMELAND SECURITY PRESIDENTIAL DIRECTIVE-4. Subject: National Strategy to Combat Weapons of Mass Destruction

May 8, 2018 NATIONAL SECURITY PRESIDENTIAL MEMORANDUM/NSPM-11

UNCLASSIFIED. Unclassified

Humanitarian benefits of emerging technologies in the area of lethal autonomous weapon systems

1. Introduction. CHAPTER 3 Cyber Law Development and the United States Law of War Manual. Sean Watts

BACKGROUNDER. The debate over the circumstances in which lethal force may be. Drone Strikes: The Legality of U.S. Targeting Terrorists Abroad

SUMMARY COVER PAGE OF THE ANNUAL REPORT OF CCW PROTOCOL V 1. Canada. REPORTING PERIOD: 01/04/2012 To 31/03/2013 (dd/mm/yyyy) (dd/mm/yyyy)

Effects-Based Operations in the Cyber Domain. Michael J. Weiskopff. A Capstone Project Submitted to the Faculty of. Utica College.

DOD Authorities for Foreign and Security Assistance Programs

Iraqi Insurgent Sniper Training

Private Security Contractors in Iraq and Afghanistan: Legal Issues

SECNAV INSTRUCTION

March 10, Sincerely,

OUTLINE. Published on How does law protect in war? - Online casebook (

I. The Pacific Front Introduction Read the following introductory passage and answer the questions that follow.

Transcription:

Targeting War Sustaining Activities International Humanitarian Law Workshop Yale Law School October 1, 2016

Additional Protocol I, Article 52(2) Attacks shall be limited strictly to military objectives. In so far as objects are concerned, military objectives are limited to those objects which by their nature, location, purpose or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage.

Additional Protocol I, Article 52(2) Attacks shall be limited strictly to military objectives. In so far as objects are concerned, military objectives are limited to those objects which by their nature, location, purpose or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage.

Additional Protocol I, Article 52(2) Attacks shall be limited strictly to military objectives. In so far as objects are concerned, military objectives are limited to those objects which by their nature, location, purpose or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage.

1. CIL Question: Threshold Questions Is the rule in Article 52(2) part of customary international law? 2. NIAC Question: Is the rule in Article 52(2) applicable to noninternational armed conflict under customary international law?

1. CIL Question: Threshold Questions Is the rule in Article 52(2) part of customary international law? 2. NIAC Question: Is the rule in Article 52(2) applicable to noninternational armed conflict under customary international law?

1. CIL Question: Threshold Questions Is the rule in Article 52(2) part of customary international law? 2. NIAC Question: Is the rule in Article 52(2) applicable to noninternational armed conflict under customary international law?

Threshold Questions [T]his Administration has carefully reviewed the rules governing targeting operations [against al-qaeda] to ensure that these operations are conducted consistently with law of war principles, including: First, the principle of distinction, which requires that attacks be limited to military objectives and that civilians or civilian objects shall not be the object of the attack. - Harold Hongju Koh, Legal Adviser, Department of State, The Obama Administration and International Law, Annual Meeting of the American Society of International Law, Washington D.C., March 25, 2010

Threshold Questions In particular, I d like to spend a few minutes walking through some of the targeting rules that the United States regards as customary international law applicable to all parties in a NIAC: Insofar as objects are concerned, military objectives are those objects which by their nature, location, purpose or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage. - Brian Egan, International Law, Legal Adviser, Department of State, Legal Diplomacy, and the Counter-ISIL Campaign, Annual Meeting of the American Society of International Law, Washington D.C., April 4, 2016

Threshold Questions In particular, I d like to spend a few minutes walking through some of the targeting rules that the United States regards as customary international law applicable to all parties in a NIAC: Insofar as objects are concerned, military objectives are those objects which by their nature, location, purpose or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage. The United States has interpreted this definition to include objects that make an effective contribution to the enemy s war-fighting or war-sustaining capabilities. - Brian Egan, International Law, Legal Adviser, Department of State, Legal Diplomacy, and the Counter-ISIL Campaign, Annual Meeting of the American Society of International Law, Washington D.C., April 4, 2016

(Indirect) Military Objects War-fighting capabilities e.g., petroleum used to fuel military vehicles War-sustaining capabilities e.g., petroleum used to generate revenue to fund armed forces

Military Objects The crux of the issue is related to revenues from exports of oil which is not put to military use by the enemy. The majority of the Group of Experts took the position that the connection between revenues from such exports and military action is too remote. Consequently, it rejected the war-sustaining argument. - HPCR Manual on International Law Applicable to Air and Missile Warfare, 2002 Advocates of this approach would, as an illustration, argue that it is lawful to launch cyber attacks against the enemy State s oil export industry if the war effort depended on the revenue from oil sales. The majority of the International Group of Experts rejected this position on the ground that the connection between war-sustaining activities and military action was too remote. - Tallinn Manual on the International Law Applicable to Cyber Warfare, 2013

BOTHE, PARTSCH & SOLF With respect to persons, the ICRC attempted to distinguish civilians who (1) participate directly in combat operations, (2) those who are linked to the military effort without being the direct cause of damage inflicted on the adversary on the military level, and (3) those linked to the war effort which States generally demand of all persons under their sovereignty. Only the first class of civilians were to be the object of attack. Presumably, the objects used in the activities mentioned in the second clause are legitimate objects of attack. These are referred to in this Commentary as linked to the military phase of a Party s overall war effort. See ICRC, Conf. Gvt. Experts, 1971, Doc. vol. III, pp. 27-28. See Carnahan, Protecting Civilians under the Draft Geneva Protocol: A Preliminary Inquiry 18 Air Force Law Review 47-48 (1976) for an analysis of this definition. The author points out that the test of effective contribution to military action, would again justify the destruction of raw cotton by the Union during the American Civil War, not because raw cotton had any value as an implement of war, but because in the circumstances ruling at the time it was the Confederacy s chief export and thus the ultimate source of all Confederate weapons and military supplies. Claims for the destruction of British-owned cotton were disallowed by an Anglo-American arbitration tribunal (Report of the US Agent, 6 Papers relating to the Treaty of Washington, pp. 52 57 (1874)).

State Practice & Opinio Juris 1. French, Russian, U.K., U.S. operations against ISIL oil revenues (2015-present) 2. NATO operations against Taliban narcotics revenues (2008-2014) 3. Ethiopian operation against electrical power station in Eritrean-Ethiopian War (1998-2000) 4. NATO operations in Kosovo intervention (1999) 5. Coalition operations in Persian Gulf War (1990-1991) 6. State and U.N. actions during Iran-Iraq War (1980-1988)

Limiting Principles 1. Definite military advantage 2. War-sustaining objects vs. individuals engaged in war-sustaining function 3. The great staple 4. Proportionality analysis

Limiting Principles 1. Definite military advantage Not: indeterminate, speculative, or remote 2. War-sustaining objects vs. individuals engaged in war-sustaining function 3. The great staple 4. Proportionality analysis

Limiting Principles 1. Definite military advantage 2. War-sustaining objects vs. individuals engaged in war-sustaining function 3. The great staple 4. Proportionality analysis

Limiting Principles 1. Definite military advantage 2. War-sustaining objects vs. individuals engaged in war-sustaining function Not: Direct participation in hostilities 3. The great staple 4. Proportionality analysis

Limiting Principles 1. Definite military advantage 2. War-sustaining objects vs. individuals engaged in war-sustaining function 3. The great staple 4. Proportionality analysis

Limiting Principles 1. Definite military advantage 2. War-sustaining objects vs. individuals engaged in war-sustaining function 3. The great staple indispensable and principal source 4. Proportionality analysis

Limiting Principles 1. Definite military advantage 2. War-sustaining objects vs. individuals engaged in war-sustaining function 3. The great staple 4. Proportionality analysis

Limiting Principles 1. Definite military advantage 2. War-sustaining objects vs. individuals engaged in war-sustaining function 3. The great staple 4. Proportionality analysis concrete and direct military advantage anticipated vs. a definite military advantage

POTUS

The end.

https://www.youtube.com/watch?v=qsgvmm9b ah4&feature=youtu.be&t=6m13s https://www.c-span.org/video/?c4623012/isiloil