Author name: bakcan

Content, Essays

Some Considerations for Conducting Legal Reviews of U.S. Military Cyber Operations

By: The Hon. Paul C. Ney, Jr.*

* General Counsel, U.S. Department of Defense. This Essay is based on remarks given at the U.S. Cyber Command Legal Conference on March 2, 2020. Footnotes have been added and updated as of the date of publication of this Essay. I am grateful to Charles A. Allen, Eliana V. Davidson, Thomas H. Lee, Guillermo R. Carranza, Commander Robin Crabtree, Karl S. Chang, Matthew McCormack, John L. Muelheuser, Gary Corn, and Lieutenant Commander Lynn M. Cherry, for their assistance in preparing this Essay.

[Click here for PDF]

General Nakasone, Colonel Smawley, distinguished panelists, and guests, thank you for the opportunity to speak with you today. Since its inception in 2012, the U.S. Cyber Command legal conference has provided the Department of Defense (DoD), other U.S. Government agencies, our Allies and partners, and interested members of the academy and the general public, with a unique opportunity to explore some of the complex legal issues facing our military and our Nation in cyberspace.

I have two objectives today. First, I’ll offer a snapshot of how we in DoD are integrating cyberspace into our overall national defense strategy. Second, I will summarize the domestic and international law considerations that inform the legal reviews that DoD lawyers conduct as part of the review and approval process for military cyber operations. We at DoD now have considerable practice advising on such operations and are accordingly in a position to begin to speak from experience to some of the challenging legal issues that cyber operations present.

To set the scene, when I talk about “cyberspace,” I am referring to “the interdependent networks of information technology infrastructures and resident data, including the Internet, telecommunications networks, computer systems, and embedded processors and controllers.”[1] Physically, and logically, the domain is in a state of perpetual transformation. It enables the transmission of data across international boundaries in nanoseconds—controlled much more by individuals or even machines than by governments—spreading ideas to disparate audiences and, in some cases, the generating of physical effects in far-flung places.

I. Today’s Cyber Threat Environment and DoD’s Response

As we enter the third decade of the twenty-first century, people are imagining, developing, and creating new technologies and devices at a faster rate than ever before. These new technologies update on a near daily basis—think of the software update that your phone automatically uploaded today.

Sophisticated technologies are now a part of nearly all aspects of military operations, creating opportunities and challenges. A recent Brookings paper makes the point well: “By . . . building Achilles’ heels into everything they operate, modern militaries have created huge opportunities for their potential enemies. The fact that everyone is vulnerable . . . is no guarantee of protection.”[2]

Constantly changing vulnerabilities exist not only within our Armed Forces but also in the private and public sectors, which provide critical support to our operations. This includes contractors that manage networks and other services; the defense industrial base that is the foundation of the United States’ military strength; and critical public infrastructure upon which the entire country, including the Armed Forces, relies for water, electricity, and transportation.

From a strategic competition perspective, too, cyberspace is increasingly dynamic and contested, including as a warfighting domain. In the past few years, other nations, in part to make up for gaps in conventional military power vis-à-vis the United States, have developed cyber strategies and organized military forces to conduct operations in cyberspace. China’s Strategic Support Force, for example, provides its People’s Liberation Army with cyberwarfare capabilities to “establish information dominance in the early stages of a conflict to constrain [U.S.] actions . . . by targeting network-based [command and control,] . . . logistics, and commercial activities.”[3] Russia consistently uses cyber capabilities for what it calls “information confrontation” during peacetime and war.[4] All of this is unsurprising because cyber is a relatively cheap form of gaining real power, especially for impoverished adversaries like North Korea: a cyber operation can require nothing more than a reasonably skilled operator, a computer, a network connection, and persistence.

A key element of the U.S. military’s strategy in the face of these cyber-threats is to “defend forward.”[5] Implementing this element of the strategy begins with “continuously engaging and contesting adversaries and causing them uncertainty wherever they maneuver”—which we refer to as “persistent engagement.”[6] “Persistent engagement recognizes that cyberspace’s structural feature of interconnectedness and its core condition of constant contact creates a strategic necessity to operate continuously in cyberspace.”[7] As General Nakasone has said, “[i]f we find ourselves defending inside our own networks, we have lost the initiative and the advantage.”[8] In short, the strategy envisions that our military cyber forces will be conducting operations in cyberspace to disrupt and defeat malicious cyber activity that is harmful to U.S. national interests.[9]

Cyber operations are also becoming an integral part of other military operations. As the 2018 National Defense Strategy emphasizes, “[s]uccess no longer goes to the country that develops a new technology first, but rather to the one that better integrates it and adapts its way of fighting.”[10] For example, during operations in Iraq in 2017, U.S. forces used cyber and space capabilities to disrupt communications to and from the enemy’s primary command post, forcing the enemy to move to previously unknown backup sites, thereby exposing their entire command-and-control network to U.S. kinetic strikes.[11] Operations like this will become increasingly common.

Because of the complexity and dynamism of the domain and the threat environment, the need for persistent engagement outside U.S. networks, and the critical advantage that cyber operations provide our Armed Forces, DoD must develop, review, and approve military cyber operations at so-called “warp-speed.” To this end, the U.S. Government has made meaningful strides. You heard in 2018 that the President had issued National Security Presidential Memorandum-13, United States Cyber Operations Policy, or “NSPM-13” for short, which allows for the delegation of well-defined authorities to the Secretary of Defense to conduct time-sensitive military operations in cyberspace. Congress also has clarified that the President has authority to direct military operations in cyberspace to counter adversary cyber operations against our national interests and that such operations, whether they amount to the conduct of hostilities or not, and even when conducted in secret, are to be considered traditional military activities and not covert action, for purposes of the covert action statute.[12]

Even as the United States takes action to secure its vital national interests and to support its Allies and partners in this complex environment, it is a Nation dedicated to the rule of law. Consequently, we must ensure that our efforts are not only effective but also consistent with law and wider U.S. Government efforts to promote stability in cyberspace and adherence to the rules-based international order. DoD lawyers have an important role to play as the Department develops and executes cyber operations to meet these mandates.

Let me turn now to providing you a sense of how DoD lawyers analyze proposed military cyber operations for compliance with domestic and international law.

II. Framework for Legal Analysis

To evaluate the legal sufficiency of a proposed military cyber operation, we employ a process similar to the one we use to assess non-cyber operations. We engage our clients to understand the relevant operational details: What is the military objective we seek to achieve? What is the operational scheme of maneuver and how does it contribute to achieving that objective? Where is the target located? Does the operation involve multiple geographic locations? What is the target system used for? How will we access it? What effects—such as loss of access to data—will we generate within that system? How will those effects impact the system’s functioning? Which people or processes will be affected by anticipated changes to the system’s functioning? Are any of those likely to be impacted civilians or public services? Answers to these questions will drive the legal analysis.

A. U.S. Domestic Law

Let’s take up considerations of U.S. domestic law first. We begin with the foundational question of domestic legal authority to conduct a military cyber operation. The domestic legal authority for the DoD to conduct cyber operations is included in the broader authorities of the President and the Secretary of Defense to conduct military operations in defense of the nation. We assess whether a proposed cyber operation has been properly authorized using the analysis we apply to all other operations, including those that constitute use of force. The President has authority under Article II of the U.S. Constitution to direct the use of the Armed Forces to serve important national interests, and it is the longstanding view of the Executive Branch that this authority may include the use of armed force when the anticipated nature, scope, and duration of the operations do not rise to the level of war under the Constitution, triggering Congress’s power to declare war.[13] Furthermore, the Supreme Court has long affirmed the President’s power to use force in defense of the nation and federal persons, property, and instrumentalities.[14] Accordingly, the President has constitutional authority to order military cyber operations even if they amount to use of force in defense of the United States. Of course, the vast majority of military operations in cyberspace do not rise to the level of a use of force; but we begin analysis of U.S. domestic law with the same starting point of identifying the legal authority.

In the context of cyber operations, the President does not need to rely solely on his Article II powers because Congress has provided for ample authorization. As I noted earlier, Congress has specifically affirmed the President’s authority to direct DoD to conduct military operations in cyberspace.[15] Moreover, cyber operations against specific targets are logically encompassed within broad statutory authorizations to the President to use force, like the 2001 Authorization for the Use of Military Force, which authorizes the President to use “all necessary and appropriate force” against those he determines were involved in the 9/11 attacks or that harbored them.[16] Congress has also expressed support for the conduct of military cyber operations to defend the nation against Russian, Chinese, North Korean, and Iranian “active, systematic, and ongoing campaigns of attacks” against U.S. interests, including attempts to influence U.S. elections.[17]

In addition to questions of legal authority, DoD lawyers advise on the Secretary of Defense’s authority to direct the execution of military cyber operations as authorized by the President and statute,[18] “including in response to malicious cyber activity carried out against the United States or a United States person by a foreign power,”[19] and to conduct related intelligence activities.[20] Our lawyers ensure that U.S. military cyber operations adhere to the President’s specific authorizations as well as the generally applicable NSPM-13.

After concluding that the operation has been properly authorized, DoD lawyers assess whether there are any statutes that may restrict DoD’s ability to conduct the proposed cyber operation and whether the operation may be carried out consistent with the protections afforded to the privacy and civil liberties of U.S. persons. To illustrate, I am going to talk about two statutes and the First Amendment as examples of laws that we may consider, depending on the specific cyber operation to be conducted.

First, let’s look at federal criminal provisions in Title 18 of the U.S. Code that prohibit accessing certain computers and computer networks “without authorization,”[21] or transmitting a “program, information, code, or command,”[22] that intentionally causes “any impairment to the integrity or availability” of the computer or data on it [23]—provisions found in the Computer Fraud and Abuse Act or “CFAA,” as amended.[24] These provisions contain exceptions for lawfully authorized activities of law enforcement agencies and U.S. intelligence agencies but do not refer to U.S. military cyber operations.[25] Common sense and long-accepted canons of statutory interpretation suggest, however, that the CFAA will not constrain appropriately authorized DoD cyber operations.[26]

The CFAA was enacted to protect U.S. Government computers and critical banking networks against thieves and hackers,[27] not vice versa; it expresses no clear indication of congressional intent to limit the President from directing military actions;[28] and the more recent statutes I mentioned earlier specifically authorize or reaffirm the President’s authority to direct DoD to conduct operations in cyberspace. In light of these considerations, it would be unreasonable and counterintuitive to interpret the CFAA as restricting properly authorized military cyber operations abroad against foreign actors.[29]

Second, DoD lawyers typically analyze whether the proposed cyber operation may be conducted as a traditional military activity—or “TMA”—such that it would be excluded from the approval and oversight requirements applicable to covert action under the Covert Action Statute.[30] Because the statute does not define TMA, we look to the legislative history and a provision in the National Defense Authorization Act for Fiscal Year 2019 that clarifies that in general clandestine military activities in cyberspace constitute TMA for purposes of the Covert Action Statute, and reaffirms established congressional reporting requirements for military cyber operations.[31]

Third, DoD lawyers must assess whether a proposed operation will impact the privacy and civil liberties of U.S. persons. The practical reality of cyberspace today is that U.S. military cyber operations aimed at disrupting an adversary’s ability to put information online or to distribute it across the worldwide web have the potential to affect U.S. persons’ rights and civil liberties in ways that operations in physical domains do not.

Let me give you a concrete example. A core part of DoD’s mission to defend U.S. elections consists of defending against covert foreign government malign influence operations targeting the U.S. electorate. The bulk of DoD’s efforts in this area involve information-sharing and support to domestic partners, like the Department of Homeland Security and the Federal Bureau of Investigation. But what about a U.S. military cyber operation to disrupt a foreign government’s ability to disseminate covertly information to U.S. audiences via the Internet by pretending that the information has been authored by Americans inside the United States? Can we conduct such an operation in a manner that contributes to the defense of our elections but avoids impermissible interference with the right of free expression under the First Amendment—including the right to receive information?[32] The analysis often turns on the specifics of the proposed operation—but, in short, we believe we can.

Few precedents address this issue directly; but, U.S. case law does provide a framework with at least three key strands. First, there are judicial decisions that stand for the proposition that the U.S. Government, in carrying out certain appropriately authorized activities, may incidentally burden the right to receive information from foreign sources without violating the First Amendment.[33] Second, courts have recognized a compelling government interest in protecting U.S. elections from certain types of foreign influence—especially when that influence is exercised covertly.[34] Third, government action based on the content of the speech will be suspect.[35]

In light of these precedents, DoD lawyers analyzing particular cyber operations for First Amendment compliance will consider a number of factors, including: whether the operation is targeting the foreign actors seeking to influence U.S. elections covertly rather than the information itself; the extent to which the operation may be conducted in a “content neutral” manner; and, the foreign location and foreign government affiliation of the targeted entity.

We at DoD realize that military involvement in protecting U.S. elections is a sensitive mission, even when conducted in compliance with First Amendment protections and consistent with congressional intent. Virtually any military involvement in U.S. elections implicates the bedrock premise of maintaining civilian control of the military and our long tradition of keeping the military out of domestic politics. Accordingly, in assessing proposed operations related to elections, DoD lawyers pay particular attention to whether the proposed operation may be conducted consistent with legal and regulatory limits on the use of official positions to influence or affect the results of U.S. elections or to engage in, or create the appearance of engaging in, partisan politics.[36]

B. International Law

Those are some highlights of U.S. domestic law considerations that may be implicated by proposed military cyber operations; let me turn now to international law.

We recognize that State practice in cyberspace is evolving. As lawyers operating in this area, we pay close attention to States’ explanations of their own practice, how they are applying treaty rules and customary international law to State activities in cyberspace, and how States address matters where the law is unsettled. DoD lawyers, and our clients, engage with our counterparts in other U.S. Government departments and agencies on these issues, and with Allies and partners at every level—from the halls of the United Nations to the floors of combined tactical operations centers—to understand how we each apply international law to operations in cyberspace. Initiatives by non-governmental groups like those that led to the Tallinn Manual can be useful to consider, but they do not create new international law, which only states can make. My intent here is not to lay out a comprehensive set of positions on international law. Rather, as I have done with respect to domestic law, I will tell you how DoD lawyers address some of the international law issues that today’s military cyber operations present.

I will start with some basics. It continues to be the view of the United States that existing international law applies to State conduct in cyberspace. Particularly relevant for military operations are the Charter of the United Nations, the law of State responsibility, and the law of war. To determine whether a rule of customary international law has emerged with respect to certain State activities in cyberspace, we look for sufficient State practice over time, coupled with opinio juris—evidence or indications that the practice was undertaken out of a sense that it was legally compelled, not out of a sense of policy prudence or moral obligation.

As I discussed a few minutes ago, our policy leaders assess that the threat environment demands action today—our clients need our advice today on how international legal rules apply when resorting to action to defend our national interests from malicious activity in cyberspace, notwithstanding any lack of agreement among States on how such rules apply. Consequently, in reviewing particular operations, DoD lawyers provide advice guided by how existing rules apply to activities in other domains, while considering the unique, and frequently changing, aspects of cyberspace.

First, let’s discuss the international law applicable to uses of force. Article 2(4) of the Charter of the United Nations provides that “All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.”[37] At the same time, international law recognizes that there are exceptions to this rule. For example, in the exercise of its inherent right of self-defense a State may use force that is necessary and proportionate to respond to an actual or imminent armed attack.[38] This is true in the cyber context just as in any other context.

Depending on the circumstances, a military cyber operation may constitute a use of force within the meaning of Article 2(4) of the U.N. Charter and customary international law. In assessing whether a particular cyber operation—conducted by or against the United States—constitutes a use of force, DoD lawyers consider whether the operation causes physical injury or damage that would be considered a use of force if caused solely by traditional means like a missile or a mine.[39] Even if a particular cyber operation does not constitute a use of force, it is important to keep in mind that the State or States targeted by the operation may disagree, or at least have a different perception of what the operation entailed.

Second, the international law prohibition on coercively intervening in the core functions of another State, such as the choice of political, economic, or cultural system,[40] applies to State conduct in cyberspace.[41] For example, “a cyber operation by a State that interferes with another country’s ability to hold an election” or that tampers with “another country’s election results would be a clear violation of the rule of non-intervention.”[42] Other States have indicated that they would view operations that disrupt the fundamental operation of a legislative body or that would destabilize their financial system as prohibited interventions.[43]

There is no international consensus among States on the precise scope or reach of the non-intervention principle, even outside the context of cyber operations. Because States take different views on this question, DoD lawyers examining any proposed cyber operations must tread carefully, even if only a few States have taken the position publicly that the proposed activities would amount to a prohibited intervention.

Some situations compel us to take into consideration whether the States involved have consented to the proposed operation. Because the principle of non-intervention prohibits “actions designed to coerce a State . . . in contravention of its rights,”[44] it does not prohibit actions to which a State voluntarily consents, provided the conduct remains within the limits of the consent given.[45]

Depending on the circumstances, DoD lawyers may also consider whether an operation that does not constitute a use of force could be conducted as a countermeasure. In general, countermeasures are available in response to an internationally wrongful act attributed to a State. In the traditional view, the use of countermeasures must be preceded by notice to the offending State, though we note that there are varying State views on whether notice would be necessary in all cases in the cyber context because of secrecy or urgency.[46] In a particular case it may be unclear whether a particular malicious cyber activity violates international law. And, in other circumstances, it may not be apparent that the act is internationally wrongful and attributable to a State within the timeframe in which the DoD must respond to mitigate the threat. In these circumstances, which we believe are common, countermeasures would not be available.

For cyber operations that would not constitute a prohibited intervention or use-of-force, the Department believes there is not sufficiently widespread and consistent State practice resulting from a sense of legal obligation to conclude that customary international law generally prohibits such non-consensual cyber operations in another State’s territory. This proposition is recognized in the Department’s adoption of the “defend forward” strategy: “We will defend forward to disrupt or halt malicious cyber activity at its source, including activity that falls below the level of armed conflict.”[47] The Department’s commitment to defend forward including to counter foreign cyber activity targeting the United States—comports with our obligations under international law and our commitment to the rules-based international order.

The DoD OGC view, which we have applied in legal reviews of military cyber operations to date, shares similarities with the view expressed by the U.K. Government in 2018.[48] We recognize that there are differences of opinion among States, which suggests that State practice and opinio juris are presently not settled on this issue. Indeed, many States’ public silence in the face of countless publicly known cyber intrusions into foreign networks precludes a conclusion that States have coalesced around a common view that there is an international prohibition against all such operations (regardless of whatever penalties may be imposed under domestic law).

Traditional espionage may also be a useful analogue to consider. Many of the techniques and even the objectives of intelligence and counterintelligence operations are similar to those used in cyber operations. Of course, most countries, including the United States, have domestic laws against espionage, but international law, in our view, does not prohibit espionage per se even when it involves some degree of physical or virtual intrusion into foreign territory. There is no anti-espionage treaty, and there are many concrete examples of States practicing it, indicating the absence of a customary international law norm against it. In examining a proposed military cyber operation, we may therefore consider the extent to which the operation resembles or amounts to the type of intelligence or counterintelligence activity for which there is no per se international legal prohibition.[49]

Of course, as with domestic law considerations, establishing that a proposed cyber operation does not violate the prohibitions on the use of force and coercive intervention does not end the inquiry. These cyber operations are subject to a number of other legal and normative considerations.

As a threshold matter, in analyzing proposed cyber operations, DoD lawyers take into account the principle of State sovereignty. States have sovereignty over the information and communications technology infrastructure within their territory. The implications of sovereignty for cyberspace are complex, and we continue to study this issue and how State practice evolves in this area, even if it does not appear that there exists a rule that all infringements on sovereignty in cyberspace necessarily involve violations of international law.

It is also longstanding DoD policy that U.S. forces will comply with the law of war during all armed conflicts, however such conflicts are characterized, and in all other military operations.[50] Even if the law of war does not technically apply because the proposed military cyber operation would not take place in the context of armed conflict, DoD nonetheless applies law-of-war principles.[51] This means that the jus in bello principles, such as military necessity, proportionality, and distinction, continue to guide the planning and execution of military cyber operations, even outside the context of armed conflict.

DoD lawyers also advise on how a proposed cyber operation may implicate U.S. efforts to promote certain policy norms for responsible State behavior in cyberspace, such as the norm relating to activities targeting critical infrastructure. These norms are non-binding and identifying the best methods for integrating them into tactical-level operations remains a work in progress. But, they are important political commitments by States that can help to prevent miscalculation and conflict escalation in cyberspace. DoD OGC, along with other DoD leaders, actively supports U.S. State Department-led initiatives to build and promote this framework for responsible State behavior in cyberspace. This includes participation in the UN Group of Governmental Experts and an Open-Ended Working Group on information and communications technologies in the context of international peace and security. These diplomatic engagements are an important part of the United States’ overall effort to protect U.S. national interests by promoting stability in cyberspace.

Of course, the real work of analyzing specific military cyber operations in light of the domestic and international legal considerations I have mentioned falls to judge advocates and civilian attorneys at the tactical and operational levels—which is to say, many of you. As one of my predecessors, Jennifer O’Connor, noted in a speech in 2016, military operations—including cyber operations—are subject to a rigorous targeting process that involves both policy and legal reviews to ensure that specific operations are conducted consistent with the relevant authorization, domestic and international law, and any additional restraints imposed by the applicable orders. Particularly in areas like this one, in which not only the law but the domain itself is constantly evolving, I am extremely proud of the legal work many of you do for the Department of Defense and am humbled every day by your dedication to our Nation’s defense.

Thank you all for what you do and for the opportunity to speak with you today.

[1]  Dep’t of Def., DOD Dictionary of Military and Associated Terms 55 (June 2020), https://www.jcs.mil/Portals/36/Documents/Doctrine/pubs/dictionary.
pdf [https://perma.cc/E428-M2FP].

[2]  Michael O’Hanlon, The Brookings Inst., Forecasting Change in Military Technology, 2020-2040 16 (2018), https://www.brookings.edu/wp-content/uploads/2018/09/FP_20181218_defense_advances_pt2.pdf [https://perma.cc/
YKA6-5FQL].

[3]  Def. Intelligence Agency, China Military Power: Modernizing a Force to Fight and Win 46 (2019), https://www.dia.mil/Portals/27/Documents/News/
Military%20Power%20Publications/China_Military_Power_FINAL_5MB_20190103.pdf [https://perma.cc/R53S-NMFN].

[4]  Def. Intelligence Agency, Russia Military Power: Building a Military to Support Great Power Aspirations 38 (2017), https://www.dia.mil/Portals/27/
Documents/News/Military%20Power%20Publications/Russia%20Military%20Power%20Report%202017.pdf [https://perma.cc/ATQ8-DLEB] (citations omitted).

[5]  Dep’t of Def., Summary: Department of Defense Cyber Strategy 1 (2018), https://media.defense.gov/2018/Sep/18/2002041658/-1/-1/1/CYBER_
STRATEGY_SUMMARY_FINAL.PDF [https://perma.cc/N9F9-GKWZ] [hereinafter DoD Cyber Strategy].

[6]  C. Todd Lopez, Persistent Engagement, Partnerships, Top Cybercom’s Priorities, Defense.gov (May 14, 2019), https://www.defense.gov/Explore/
News/Article/Article/1847823/persistent-engagement-partnerships-top-cybercoms-priorities/ [https://perma.cc/RV8Z-G6GE]. See also id.; Securing the Nation’s Internet Architecture: Hearing Before the H. Armed Services Subcomm. on Intelligence & Emerging Threats & Capabilities & the H. Oversight & Reform Subcomm. on Nat’l Sec. (Statement of Edwin Wilson, Deputy Assistant Secretary of Defense for Cyber Policy at 3) (Sep. 10, 2019), https://docs.house.gov/meetings/AS/AS26/20190910/
109894/HHRG-116-AS26-Bio-WilsonB-20190910.pdf [https://perma.cc/T4S7-5NFG] [hereinafter Hearing]; U.S. Cyber Command, Achieve and Maintain Cyberspace Superiority: Command Vision for US Cyber Command (2018) https://www.
cybercom.mil/Portals/56/Documents/USCYBERCOM%20Vision%20April%202018.pdf?ver=2018-06-14-152556-010 [https://perma.cc/7866-EHZY].

[7]  Michael P. Fischerkeller & Richard J. Harknett, Persistent Engagement and Tacit Bargaining: A Path Toward Constructing Norms in Cyberspace, Lawfare (Nov. 9, 2018), https://www.lawfareblog.com/persistent-engagement-and-tacit-bargaining-path-toward-constructing-norms-cyberspace [https://perma.cc/U4W2-LE4U].

[8]  An Interview with Paul M. Nakasone, Joint Forces Q. (Jan. 2019), at 4, 7, https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-92/jfq-92_4-9_Nakasone-Interview.pdf [https://perma.cc/CCP7-9RBD].

[9]  See Hearing, supra note 6, at 3 (U.S. Armed Forces “defend forward by conducting operations that range from collecting information to gain insight about hostile cyber actors and their intent, to exposing malicious cyber activities and associated infrastructure publicly, to disrupting malicious cyber activities directly.”).

[10]  Dep’t of Defense, Summary of the 2018 National Defense Strategy of the United States of America 10 (2018), https://dod.defense.gov/Portals/1/
Documents/pubs/2018-National-Defense-Strategy-Summary.pdf [https://perma.cc/
R5KF-EXG7].

[11]  See Matthew Cox, US, Coalition Forces Used Cyberattacks to Hunt Down ISIS Command Posts, Military.com (May 25, 2018), https://www.
military.com/dodbuzz/2018/05/25/us-coalition-forces-used-cyberattacks-hunt-down-isis-command-posts.html?utm_source=Mike%27s+Daily+Blast&utm_campaign=
8d4307f510-EMAIL_CAMPAIGN_2018_04_27_COPY_02&utm_medium=email&
utm_term=0_beae3dbeb1-8d4307f510-51475081) [https://perma.cc/7Z8G-J6YU].

[12]  See John S. McCain National Defense Authorization Act for Fiscal Year 2019, Pub. L. No. 115–232 (2018) [hereinafter “NDAA for FY 2019”]. Several provisions in the NDAA for FY 2019 provide authority and express support for the conduct of cyber operations to disrupt, defeat, and deter “active, systematic, and ongoing campaign[s] of attacks against the Government or people of the United States in cyberspace, including [attempts] to influence American elections and democratic political processes” by Russia, China, North Korea, or Iran. Id. § 1642.  The NDAA for FY 2019 also affirms the authority of the President and Secretary of Defense to conduct clandestine military operations in cyberspace, including operation short of hostilities (as such term is used in the War Powers Resolution) or in areas in which hostilities are not occurring. Id. § 1632.

[13]  See, e.g., April 2018 Airstrikes Against Syrian Chemical-Weapons Facilities, 42 Op. O.L.C. slip op. at 9–10 (2018); Authority to Use Military Force in Libya, 35 Op. O.L.C. slip op. at 8 (2011) (quoting Deployment of United States Armed Forces to Haiti, 18 Op. O.L.C. 173, 179 (1994)); see also The President’s Power in the Field of Foreign Relations, 1 Op. O.L.C. Supp. 49, 56 (1937) (describing President Thomas Jefferson’s actions leading to the Barbary War, the invasion of Mexico by Presidents Polk and Wilson, President McKinley’s agreement to suppress the Boxer Revolution, and President Roosevelt’s use of the military to support Colombia to acquire the Panama Canal Zone as examples of the exercise of presidential authority to use the military without Congressional approval.).

[14]  See, e.g., The Prize Cases, 67 U.S. (2 Black) 635, 668–70 (discussing the authority of the President to resist foreign invasion and suppress insurrection); Fleming v. Page, 50 U.S. 603, 615 (1850) (“As commander-in-chief, [the President] is authorized to direct the movements of the naval and military forces placed by law at his command, and to employ them in the manner he may deem most effectual to harass and conquer and subdue the enemy.”).

[15]  See National Defense Authorization Act for Fiscal Year 2012, Pub. L. No. 112-81 § 954, 125 Stat. 1298, 1551 (2011) (“Congress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace to defend our Nation, Allies and interests, subject to—(1) the policy principles and legal regimes that the Department follows for kinetic capabilities, including the law of armed conflict; and (2) the War Powers Resolution (50 U.S.C. 1541 et seq.).”).

[16]  Authorization for the Use of Military Force, Pub. L. No. 107–40, 115 Stat. 224 (2001).

[17]  NDAA for FY 2019, supra note 12, § 1642 (2018).

[18]  See 10 U.S.C. § 113(b) (2019) (the Secretary has “authority, direction, and control over the Department of Defense”).

[19]  10 U.S.C. § 394(a) (2018).

[20]  See 50 U.S.C. § 3038 (2016).

[21]  18 U.S.C. § 1030(a)(2) (2018).

[22]  Id. § 1030(a)(5)(A).

[23]  Id. § 1030(e)(8).

[24]  Id. § 1030.

[25]  See 10 U.S.C. § 1030(f) (“This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency of the United States, a State, or a political subdivision of a State, or of an intelligence agency of the United States.”).

[26]  See, e.g., Nardone v. United States, 302 U.S. 379, 383–84 (1937); Hancock v. Train, 426 U.S. 167, 179 (1976) (“Statutes which in general terms divest pre-existing rights or privileges will not be applied to the sovereign without a clear expression or implication to that effect.” (citations omitted)); Dibble v. Fenimore, 545 F.3d 208, 215 (2d Cir. 2008) (describing the “canon of construction that limits the reach of statutes of general applicability to military affairs when Congress has not explicitly provided for application to the military”); United States Assistance to Countries that Shoot Down Civil Aircraft Involved in Drug Trafficking, 18 Op. O.L.C. 148, 164 (1994) (explaining that statutes should not be “be construed to have the surprising and almost certainly unintended effect of criminalizing actions by military personnel that are lawful under international law and the laws of armed conflict”).

[27]  See H.R. Rep. No. 98-894, at 4 (1984).

[28]  See Nardone, 302 U.S. at 383–84.

[29]  Cf. Application of the Neutrality Act to Official Government Activities, 8 Op. O.L.C. 58, 78–80 (1984) (reasoning that subsequent Congressional enactment of provisions regulating the use of the military and covert actions provided further evidence of Congressional intent that the Neutrality Act did not apply to the activities of the Department of Defense or the Central Intelligence Agency).

[30]  See 10 U.S.C. § 3093(e) (2019); H.R. Rep. No. 102-166 at 29–30 (1991) (Conf. Rep.); see also S. Rep. No. 102–85 at 46 (1991).

[31]  NDAA for FY 2019, supra note 12, § 1632.

[32]  The First Amendment protects the rights of U.S. persons “to receive information and ideas, regardless of their social worth.” Stanley v. Georgia, 394 U.S. 557, 564 (1969); see also Martin v. City of Struthers, 319 U.S. 141, 143 (1943); Lamont v. Postmaster General, 381 U.S. 301, 306–07 (1960).

[33]  See, e.g., Kleindienst v. Mandel, 408 U.S. 753 (1972); United States v. Alvarez, 567 U.S. 709 (2012) (plurality opinion).

[34]  See Bluman v. FEC, 800 F. Supp. 2d 281 (D.D.C. 2011), aff’d by Bluman v. FEC, 565 U.S. 1104 (2012).

[35]  See, e.g., R.A.V. v. City of St. Paul, 505 U.S. 377, 384 (1992) (explaining that content-based regulation of speech is permissible only when the content itself is “constitutionally proscribable”).

[36]  See 5 U.S.C. § 7323(a)(1); Dep’t of Def., Directive 1344.10, Political Activities by Members of the Armed Forces, ¶ 4.1.2.2 (Feb. 19, 2008), https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodd/134410p.pdf [https://perma.cc/775C-XAR5].

[37]  U.N. Charter art. 2, ¶ 4.

[38]  See Dep’t of Def., Department of Defense Law of War Manual § 1.11.5 (rev. Dec. 2016) [hereinafter DoD Law of War Manual], https://dod.defense.gov/Portals/1/Documents/pubs/DoD%20Law%20of%20War%20Manual%20-%20June%202015%20Updated%20Dec%202016.pdf?ver=2016-12-13-172036-190 [https://perma.cc/2KW4-MXVY].

[39]  See Harold Koh, International Law in Cyberspace: Remarks as Prepared for Delivery by Harold Hongju Koh to the USCYBERCOM Inter-Agency Legal Conference Ft. Meade, MD, Sept. 18, 2012, 54 Harv. Int’l L.J. Online 1, 3–4, https://journals.law.harvard.edu/ilj/2012/12/online_54_koh/ [https://perma.cc/8GTK-7D8C]; see also DoD Law of War Manual, supra note 38, § 16.3.1.

[40]  See Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), Judgment, 1986 I.C.J. 14, at 108 (June 27, 1986), https://www.icj-cij.org/files/case-related/70/070-19860627-JUD-01-00-EN.pdf [https://perma.cc/
9MPA-QE3F].

[41]  See Brian J. Egan, International Law and Stability in Cyberspace, 35 Berkeley J. Int’l L. 169, 175 (2017). https://www.law.berkeley.edu/wp-content/uploads/2016/12/BJIL-article-International-Law-and-Stability-in-Cyberspace.pdf [https://perma.cc/9945-XV39].

[42]  Id. at 175.

[43]  See, e.g., U.K. Att’y Gen. Jeremy Wright QC, MP, Address on Cyber and International Law in the 21st Century (May 23, 2018) [hereinafter “U.K. Att’y Gen. Speech”], https://www.gov.uk/government/speeches/cyber-and-international-law-in-the-21st-century [https://perma.cc/L5N6-HKX8] (archived Sept. 26, 2019)) (“[T]he practical application of the principle [of non-intervention] in this context would be the use by a hostile state of cyber operations to manipulate the electoral system to alter the results of an election in another state, intervention in the fundamental operation of Parliament, or in the stability of our financial system. Such acts must surely be a breach of the prohibition on intervention in the domestic affairs of states.”).

[44]  Memorandum from George H. Aldrich, Acting Legal Adviser, Dep’t of State, on Intervention in the Internal Affairs of Other States (Oct. 25, 1974).

[45]  See, e.g., Int’l Law Comm’n, Draft Articles on Responsibility of States for Internationally Wrongful Acts, with commentaries, 72–74 (2001).

[46]  See, e.g., U.K. Att’y Gen. Speech, supra note 43.

[47]  DoD Cyber Strategy supra note 5, at 1.

[48]  See, e.g., U.K. Att’y Gen. Speech, supra note 43.

[49]  See, e.g., DoD Law of War Manual, supra note 38, § 16.3.2. That is not to say that a military cyber operation that is not analogous to traditional or counterintelligence activity is necessarily unlawful; such an operation may, however, warrant closer scrutiny and additional analysis.

[50]  See Dep’t of Def., Directive 2311.01, DoD Law of War Program ¶ 1.2 (July 2, 2020), available at:  https://www.esd.whs.mil/Portals/54/Documents/DD/
issuances/dodd/231101p.pdf?ver=2020-07-02-143157-007 [https://perma.cc/9NRH-Q2W6]; see also DoD Law of War Manual, supra note 38, § 18.1.1.

[51]  DoD Law of War Manual, supra note 38, § 3.1.1.2.

Online Scholarship, Perspectives

Designing Frameworks to Counter Foreign Influence: The Impact of the ECJ’s decision in European Commission v. Hungary

By: Tarun Krishnakumar

Background

On June 18, 2020, the European Court of Justice (“Court”) issued its decision in the case of European Commission v. Hungary (Case C-78/18), an action brought by the Commission under Article 258 of the Treaty on the Functioning of the European Union (“TFEU”). By its application to the Court, the Commission sought a declaration that, by enacting Act LXXVI of 2017 on the transparency of organizations receiving support from abroad (“Transparency Act”), Hungary had introduced “discriminatory, unjustified and unnecessary restrictions on foreign donations to civil society organisations, in breach of its obligations under Article 63 TFEU and Articles 7, 8 and 12 of the Charter of Fundamental Rights of the European Union.” In short, the Transparency Act imposed obligations of registration, declaration, and disclosure on certain categories of civil society organizations receiving foreign financial support in excess of a certain monetary threshold. Organizations not in compliance with these obligations could face penalties including fines and dissolution.1A more detailed account of the provisions of the Transparency Act is available at ¶¶ 2–10 of the decision of the Court.

In its ruling, the Court agreed with the assertions of the Commission and found that the adoption of the Transparency Act by Hungary violated its obligations under various EU law provisions—including those which guarantee the free movement of capital (Art. 63, TFEU) as well as individual rights such as the right to freedom of association (Art. 12, Charter), the right to respect for private and family life (Art. 7, Charter), and the right to protection of personal data (Art. 8, Charter). Notably, the Court found that none of the policy objectives offered by Hungary for the Act could justify the breadth of restrictions imposed under it. The stated objectives for the Transparency Act included countering foreign influence and interference in the “social and political life of Hungary,” improving transparency of civil society organizations, and countering money-laundering and terrorist financing.

Even prior to the decision of the Court, the Transparency Act—also referred to unofficially as the NGO law—had attracted widespread condemnation from within Hungary as well as internationally. Within this context, the decision of the Court did not come as a surprise to many, with its findings closely tracking the Opinion of the Advocate General, as well as the Court’s own jurisprudence. Consequently, the decision has attracted limited engagement.

Foreign Influence and the Decision in Hungary

While admittedly breaking limited ground from a jurisprudential perspective, the Court’s decision offers important lessons for another area of increasing relevance—the study of foreign influence campaigns and the designing of frameworks meant to counter them. Ranging from disinformation campaigns and covert lobbying to election interference and surreptitious funding flows, foreign influence activities are seeing a resurgence as states seek to reshape the world order by molding public opinion and decision-making across borders. In response, targeted states are considering a variety of responses to the phenomenon—ranging from stricter foreign funding regimes to foreign agent registration laws aimed at exposing foreign lobbying and political activities.

While jurisdictions like the United States have long had in place laws like the Foreign Agents Registration Act (“FARA”) to counter foreign influence and covert activities, others including Australia have recently joined the bandwagon—with several others, including the United Kingdom, actively pursuing statutory reform in the area. Often oriented to counter similar threats (for e.g. surreptitious foreign lobbying or covert activities), these frameworks vary widely in the scope of entities and activities they aim to cover. While frameworks like the Hungarian Transparency Act may validly be considered to form part of the various state responses to foreign influence, typically frameworks which target only narrow swathes of organizations—such as NGOs or civil society—are more effectively likely to serve other regulatory or political goals. Such frameworks cannot be considered as comprehensive efforts to counter-influence—a phenomenon which can be channeled through a wide variety of stakeholders including individuals and commercial enterprises.

What Hungary Means for Counter-Influence Frameworks Going Forward

In light of the increasing interest in counter-influence frameworks which rely on transparency, the Court’s decision in Hungary provides several interesting indications of future debates including obstacles that are likely to arise. While the decision was issued in the EU, many of the Court’s findings provide indications of issues that lie ahead. After all, foreign influence is a global phenomenon that is unlikely to diminish in the near future.

1. Transparency and Labelling

First and foremost, the decision reveals a divergence in approaches as regards the role of transparency and labelling in countering foreign influence. While frameworks like FARA and the Australian Foreign Influence Transparency Scheme (“FITS”) are premised on the registration of foreign agents and the publication of details about their activities on a public portal, the decision in Hungary suggests that not all jurisdictions would be bound by similar considerations in implementing such an approach.

For instance, jurisdictions in the EU may likely be less tolerant towards blanket labelling of organizations as foreign-funded or foreign agents for fear that it would disincentive donations and stymie the free movement of capital across EU member states. In the words of the Court in Hungary, the provisions of the Transparency Act operated to “create a climate of distrust with regard to [covered civil society organizations], apt to deter natural or legal persons from other Member States or third countries from providing them with financial support.” While the observations are specific to the Hungarian law at issue, the Court acknowledged, at some level, that that any advantages of labelling may be outweighed by its effects on labelled organizations.

In combination with the requirement for public disclosure of donors and “the imposition of additional formalities and administrative burdens” on covered organizations, these requirements operated to deter support to such organizations from foreign sources. While the decision of the Court on the issue centered on proportionality and scoping concerns within the Hungarian framework (discussed below), these observations are notable as non-EU states are unlikely to have similar constraints in discriminating between domestic and foreign capital flows. This may indicate a divergence in how the EU and non-EU states counter foreign influence, particularly funding.

2. Scoping and Targeting

Second, the decision in Hungary also emphasizes the importance of appropriately scoping transparency-based counter-influence legislation—particularly in terms of which entities are covered. At the outset, it is important for such legislation to clearly outline—based on an evidence-based risk-analysis—what triggers application of a registration or disclosure requirement.

In Hungary, the Court faulted the Transparency Act for covering all civil society organizations that accepted a foreign donation regardless of whether they had a “significant influence on public life and public debate” having regard to their “aims and [the] means at their disposal.” In other words, the Court acknowledged that not all organizations can wield the type of influence which may prove harmful to a state and its democratic institutions. The Court also expressed concern that the financial thresholds which triggered registration and reporting requirements under the Transparency Act did not correlate with the nature of the threat presumed. The funding thresholds were too low to suggest that recipient organizations would ipso facto pose a significant threat to Hungary.

While both conclusions of the Court, among others, can be problematic given that covert influence does not necessarily require large organizations—particularly where the targeting of influence is subtler (or not in the public eye)—it does provide markers for the way forward. Rather than an approach based on thresholds, criteria for application of counter-influence frameworks must reflect a more nuanced and risk-centric methodology. One such approach is premising application of the framework on specific activities an organization engages in for, e.g., lobbying, education, or opinion-shaping. Another may only result in registration and other requirements being triggered where an activity of an organization advances the interest of a foreign principal or funder. In other words, mere receipt of foreign funding would not trigger application of a counter-influence framework. Another still may only apply where an organization acts at the direction, control, or request of a foreign principal, i.e. as a foreign agent. The key is manifesting an objective and risk-based approach to application of registration and disclosure requirements—based on activities rather than solely on the fact that funding was received from a foreign source.

Lastly, drawing from the above, there would seem to be little rational basis for a counter-influence framework to only cover certain types of organizations. Channels of influence can range from a well-connected individual acting on their own to a large corporation with close government ties. While there is no doubt that a civil society organization can be a channel of influence, it is likely one of the least efficient, most overt, and easiest to clamp down upon. If a state is serious about countering influence, it must acknowledge that form or advertised purpose of an organization are irrelevant. Within this context, there is even less of a basis to target or exempt certain types of civil society organizations from compliance—as the Transparency Act in Hungary does in relation to religious and minority organizations. A robust counter-influence regime must center not solely on the channel of influence but on its methods. Anything less is not only likely to raise legal questions on equal treatment, but is also likely to be ineffectual in tackling influence in practice.

3. Balancing Privacy and Transparency

Third, the decision also outlines the potential for counter-influence frameworks to clash with privacy and data protection norms. As transparency-based frameworks often rely on public disclosures of information relating to foreign principals and sources of funding, concerns arise in relation to the legal bases for collection, processing, and disclosures of personal information. While approaches to privacy and data protection law will vary in scope, approach, and philosophy (such as between Europe and the United States), states should carefully tailor counter-influence frameworks so as to be consistent with applicable (and rapidly evolving) norms.2At the same time, this is likely to be more of an issue in a harmonized environment like the EU with many rights being conferred on EU residents as a whole rather than citizens of a specific state.

If the objective is disclosure of foreign funding or control, in the absence of special circumstances, it may be sufficient to disclose generalized and non-identifying information relating to the source—particularly where individual sources are concerned. Where funding or control relates to a foreign corporation, government, or public figure, more specific disclosures may be acceptable in light of the reduced privacy concerns. At the end of the day, states must be careful to toe the line between disclosures of foreign sources and requiring disproportionate disclosures which may have the effect of disincentivizing the funding relationship in the first place.

Conclusion

While not intended to be an analysis of the merits of the decision of the Court in Hungary, this comment has sought to signpost certain aspects of the decision which provide indications on future debates about foreign influence and the global frameworks meant to counter it. While foreign influence frameworks will require to be appropriately structured to be effective, the Hungary decision demonstrates that another key issue will be how such frameworks interact with norms in other spaces—including privacy, equal treatment, and proportionality in restricting other rights. To address these concerns, frameworks will be required to adopt a narrowly tailored and evidence-based approach to the risks posed by foreign influence. Anything less may undermine critical societal interests and, more importantly, fail to counter malign influence.

The author is an attorney admitted to the practice of law in the United States and India. He is also a researcher affiliated with the Foreign Influence Transparency Initiative (FITI) at the Center for International Policy (CIP). All views expressed are personal.

Executive Editor: Natasha Nicholson Gaviria
Content, Online Scholarship, Perspectives

Answers to MSF’s Questions in Response to the U.S. Military Investigation into the Kunduz Attack: An Insider’s Perspective

By: Brian Lee Cox

Editorial note: This essay is part of a cross-platform online collaboration with Just Security, Lawfire, and Opinio Juris in recognition of the fifth anniversary of the attack on the MSF trauma center in Kunduz, Afghanistan. For the other articles from the online collaboration, please see the links below.

[hr gap=”30″]

Exactly five years have passed since the horrific attack by the U.S. military on the Médecins Sans Frontières (“MSF”) trauma center in Kunduz, Afghanistan, and the redacted official military investigation was released to the public more than four years ago. On the day the investigation report was released to the public, MSF published a list of ten questions posed to the U.S. military in regards to the official investigation. Now, more than four years later, no official response to these questions has been made publicly available.

The questions appeal to matters with enduring relevance to the study and practice of the law involving armed conflict, such as protections for medical workers and humanitarian activities during war and the pursuit of effective accountability following attacks on civilians in armed conflict. The organization deserves meaningful answers to the unresolved questions, and informed answers can provide a useful contribution to the study and practice of international law and military justice.

While I am no longer a member of the U.S. military and my answers thus do not qualify as an official response, based on my professional endeavors in my capacity as a U.S. Army judge advocate I am deeply familiar with the circumstances of the attack and the official response following the airstrike. I have engaged in extensive conversations regarding the airstrike with many friends and former colleagues who were directly involved with advising various echelons of military command after the tragic attack, and, before I retired from military service in 2018, I was assigned to develop in-depth training for fellow judge advocates involving the Kunduz airstrike and lessons learned following the attack.

My study of the airstrike and the official and public narratives that ensued has continued since my retirement, and I am currently completing a project that engages in a thorough critical assessment of the official investigation and lessons “learned” therefrom. While that project is nearing completion, the fifth anniversary of the attack on the MSF trauma center in Kunduz, Afghanistan presents an opportunity to address, from an informed insider’s perspective, the questions posed by MSF as an organization to the U.S. military.

MSF as an institution deserves answers to these unresolved questions, but official answers are not on offer. The surviving victims of the horrendous attack, the families of those killed, and the organization that continues to provide vital medical services across the globe in the most dangerous circumstances imaginable, deserve better clarity than is currently available from official sources regarding what went wrong with the attack and what was done about it.

This imperative inspired the current cross-platform collaboration on the fifth anniversary of the airstrike. A central aspect of the ongoing discussion of the attack and its broader implications is providing the answers that the victims, families, and MSF association deserve. This essay offers an insider’s perspective regarding the answers to the unresolved questions posed by MSF. The essay is structured around those ten questions by copying them from the applicable MSF webpage and answering each in turn.

  1. What was the physical description of the intended target provided by the Afghan forces and how did it match the description of the MSF hospital?

The official investigation report does not contain direct evidence of the physical description of the intended target that was provided by Afghan forces to the U.S. Special Forces (“USSF”) element. The description was provided over a telephone and through an interpreter in person to the U.S. ground force commander that was co-located at the provincial governor’s compound with some members of the Afghan ground element. However, the available evidence is consistent regarding the nature of the description and how it was communicated.

This is the sequence described by the ground force commander when the aircrew of the supporting AC-130 gunship requested a physical description of the proposed target after the target acquisition and identification system aboard the aircraft pointed to “the center of a field” once the crew entered the grid coordinates provided by the ground element to the aircrew: “I asked the [redacted, likely from the context a reference to a member of the Afghan ground element] and the description I got, and this is before they even SP’d [‘starting point,’ a colloquial method for describing initiation of a movement] from [redacted, likely from the context a reference to Camp Pamir at the airfield to the south of Kunduz City] was a long T-shaped building with a small off shoot. I can’t remember the word I would have used for it. In a walled in compound with multiple out buildings and there was a gate facing to the north with an arch” (pg. 389). Whatever the precise description provided by the joint terminal attack controller (“JTAC”) to the aircrew, the aircrew focused on the “T-shaped building” portion of the description and identified the main building of the trauma center about 400 meters south of the point on the ground initially indicated by the aircraft target acquisition and identification system.

Based on the circumstances at the base of operations at the time, further clarification of the events is unlikely. As the ground force commander recalls during his interview with the investigation team, “If I wanted to get information, Sir, I would have to talk to my interpreter, who would talk to the [redacted, likely a reference to the specific unit of the Afghan Special Security Forces (‘ASSF’) involved in the operation] who would call to somebody” (pg. 387). The ground force commander indicated that he could not recall the name of the member of the ASSF with whom he communicated (pg. 387), and he also does not know with whom this point of contact was communicating over the telephone (pg. 388).

The assertion that Afghan forces may have intentionally provided a physical description that matched the MSF trauma center in hopes that the U.S. military would attack the hospital is addressed briefly elsewhere in discourse involving the attack. This is a topic I address at length in my full study of the official investigation, but a summary is in order here.  While I do not completely rule out the possibility based on my study of the available evidence, my conclusion is that this allegation is incredibly unlikely.

The transcript of the interview with the ground force commander does indicate that the ASSF ground assault force that was planning to move back into the city from Camp Pamir did intend to conduct raids on two different targets—one was described as an “National Directorate of Security (‘NDS’) prison” and the other was not described. This creates the possibility that the second target was the MSF trauma center, but the ground force commander recalls that the ASSF members “just said it was further north, like up around the market somewhere” (pg. 387). The MSF trauma center is located to the south of the NDS facility, not “further north.” Furthermore, if this is a reference to the main market in the center of Kunduz City, this is 600 meters or so north of the compound of the provincial governor where U.S. and Afghan forces had established their base of operations. The spatial orientation of the various points of interest alone makes it factually unlikely, wholly apart from the issue of potential motivation and likely consequences, that Afghan forces intentionally duped the U.S. military into targeting the MSF trauma center by deliberately providing a target description that matches the hospital.

  1. Which forces—either U.S. or Afghan—on the ground had “eyes on the target” [National Directorate of Security compound] before and during the attack? And if the U.S. forces did not, why not?

Neither USSF nor ASSF ground elements had “eyes on” the intended target. The security situation at the base of operations Afghan and U.S. military forces established in Kunduz City would have prevented the group from sending anyone out of the compound to establish eyes on. The ground force commander recalls that on the day of the airstrike, the group experienced “the heaviest contact we had received up to that point” in the mission (pg. 530). The group was rationing battery power to maintain some limited radio contact with higher headquarters and supporting aircraft, and sending a contingent out of the secured base of operations—referred to alternately as the PGOV (“provincial governor”) or PCOP (“provincial chief of police”) compound—in search of the NDS facility would not have been tactically feasible.

Depending on the particular targeting circumstances and the specific aircraft being utilized, a lack of visual contact with the target by ground forces can significantly increase the risk of target misidentification. However, the loitering overhead orbit of the AC-130 and the sensor suite aboard the aircraft actually put the aircrew of this particular aircraft in a much better position to identify the target than the ground element.

The visual field available for crews of most fixed wing aircraft is often described as looking through a “soda straw” when trying to identify targets on the ground. The sensor suite on an AC-130, in contrast, includes a multispectral television sensor and a high definition infrared sensor, both of which were utilized extensively in the target identification process. As examined below, the central factors that led to the tragic outcome of the Kunduz airstrike were inadvertent application of existing ambiguities in doctrinal terminology and a resulting lack of clarity involving the intent of the ground force commander.

The inability of the ground element to put eyes on the target was not a significant contributing factor. The aircrew observed the target area for a total of 68 minutes before initiating the airstrike (pg. 027) and, when they did, they attacked the target they intended to strike.

  1. During the airstrike, how many calls or warnings were record[ed] from Afghan Special Forces to the U.S. Special Forces commander or the Joint Terminal Attack Controller to inform them of the targeting error, i.e. that the intended target (National Directorate of Security compound) was not being hit?

There is no indication from the factual record that members of the ASSF element were aware of the targeting error. At the time that the AC-130 initiated the strike, the so-called “battle damage assessment (‘BDA’) video” (colloquially referred to as the “gun tape”) indicates that the ASSF ground assault force (“GAF”) convoy was five kilometers away from the (mis)identified target (pg. 066, footnote 179).

The multispectral television sensor operator on the AC-130 recalls in a sworn statement provided to the investigation team after the airstrike that the GAF was “stopped around 650m from the Obj” [objective] even after the airstrike and that the convoy “didn’t advanced (sic) to the compound before we had to RTB” (return to base) to refuel (pg. 363).

The ASSF ground element was not physically in a position, then, to determine exactly which target was being attacked. The members of the U.S. ground element at the PCOP compound were not aware that the wrong target had been attacked until after the airstrike concluded, which is further evidence indicating that they did not receive any calls or warnings from the ASSF about the targeting error during the attack.

  1. Why was the attack not called off before the AC-130 completed its mission? Who would have been responsible to call off the attack of an AC-130 deprived of its essential communication capacity operating in a densely populated area? And why didn’t he/she?

The airstrike was not called off before the AC-130 completed its mission because the personnel directly involved in the attack remained under the mistaken belief that the targeted compound was a “Taliban stronghold” for the duration of the attack. Because a “self-defense” rules of engagement (“ROE”) justification was provided by the JTAC to the aircrew, approval from a higher echelon of command was not required.

The inadvertent misapplication of applicable rules of engagement is discussed in more detail below in the response to Question #6. For present purposes, though, this explains why the approval chain for the attack did not extend beyond the ground force commander. The ground force commander (“GFC”) was the “on-scene commander” in doctrinal terminology, and in ROE terms commanders “always retain the inherent right” of self-defense.

Beyond the personnel directly involved in the attack, the chief of operations, or “CHOPS” as the position is colloquially called, at the Special Operations Task Force-Afghanistan (“SOTF-A”) headquarters element was in all likelihood the person at the lowest level of responsibility that could have stopped the attack if the targeting mistake had been realized in time. The CHOPS leads the current operations integration cell (“COIC”), and the COIC, in turn, is “the focal point for controlling the execution of operations.” Because the SOTF-A headquarters was the lowest level of command on the task organization chart (pg. 040) above the ground force commander (as the “commander” of “Area of Operations-North”), the SOTF-A CHOPS likely would have been best situated to intervene and stop the airstrike if the targeting mistake had been recognized in time.

When the initial call was made by the MSF Country Director at 2:19 AM, which was 11 minutes after the airstrike began, the headquarters member on the receiving end of the call went to the Joint Operations Center (“JOC”)—a term more widely used than COIC—to ask about an airstrike. Because of the prevailing operational circumstances, no one in the JOC realized at that time that it was the AC-130 that was in fact targeting the trauma center (pg. 067–068).

The person with whom the MSF Country Director was communicating eventually realized that it must be the AC-130 that was attacking the trauma center. This person then entered the JOC and declared, at 2:33 AM, “You’re hitting the Trauma Center” (pg. 068). Notwithstanding this revelation, the attack continued for another four minutes, until 2:37 AM, according to the investigation report.

The report does include as an exhibit a sworn statement from the person I assess, based on the context of the statement, to be the SOTF-A CHOPS. In this statement, the (presumably) CHOPS recalls, likely referring to the point at which the revelation was made that the trauma center was under attack, “My initial reaction was to do nothing about the strike because I did not know the situation on the ground that warranted the strike to be conducted, and as the [redacted] I will always give the [redacted, presumably a reference to the GFC] the benefit of the doubt when conducting engagements in self-defense” (pg. 435). At 2:38 AM, the (presumably) SOTF-A CHOPS called for a ceasefire, but the last round had already been fired at the trauma center one minute earlier.

This mosaic assemblage of circumstances accumulated from throughout the full investigation report describes the personnel who would have been responsible for calling off the attack if they had been sufficiently certain that the MSF trauma center was being attacked. Regarding the aspect of the question involving deprivation of essential communication capacity, technological communications challenges existed but did not constitute a significant factor in the targeting error. As unfortunate as it is, military operations in densely populated areas have become the norm rather than the exception in contemporary warfare. This phenomenon has invariably increased the risk to civilians, but has not obviated the necessity to use force in densely populated areas.

  1. How do you reconcile the difference in the duration of the attack between the U.S. version of events and the MSF internal review?

I currently have no adequate explanation for the difference, but I do note that the investigation team had access to detailed transcripts of radio communications, video from the “battle damage assessment recorder” of the AC-130 (pg. 062, among others), and a log of electronic messages sent from the SOTF-A JOC to personnel with the ground element at the PCOP compound (pg. 512). After reviewing information from these and other sources, the investigation report concludes that the attack lasted for “30 minutes, 8 seconds” (pg. 027).

The official account differs significantly from the findings published in the MSF internal review, which estimates that the attack lasted approximately an hour or more and that it ended as late as 3:15 AM. While I do not have access to the underlying data used to develop this estimate, I would welcome the opportunity to review the data in an effort to reconcile the difference between the accounts of the duration of the attack.

  1. Given that U.S. troops were not directly under fire, what are the limits of engagement of U.S forces in combat activities?

The answer to this question gets to the very heart of what truly went wrong with the attack. General Joseph Votel, who was commander of U.S. Central Command when the investigation was released to the public and who briefed MSF representatives before he announced the release, was asked by a reporter at the press conference announcing the release of the investigation if there is “something in particular with the human error . . . that jumps out at you?”

There absolutely is one factor “in particular” that led to the tragic outcome of the airstrike, but the “human error” exists far beyond the personnel involved in the attack. To date, this human error has not been identified by the U.S. military, and it existed long before the Kunduz airstrike and persists now even five years on. General Votel’s answer, that “the communication between the air and the ground” merited “more discussion between what was going on” is well short of the mark, but the same is true for the wider institutional effort to identify what truly went wrong.

The single factor that contributed most to the “human error” involved in the attack on the MSF hospital involves application of ambiguous language present in existing rules of engagement and other use of force policy. In this particular attack, the ambiguity responsible for the human error involved comes down to the use of one word: hostile.

A full assessment of the functional effect of this and other ambiguities in existing practice and doctrine is not feasible in the current format, but for this essay I can summarize the findings of my comprehensive evaluation of the official investigation and lessons “learned” therefrom. The depiction that emerges directly addresses the question of the “limits of engagement” in the Kunduz airstrike “given that U.S. troops were not directly under fire.”

There is no provision of the rules of engagement that categorically prohibits attacking a target even if troops are “not directly under fire,” but the approval process for such an attack is different than for a so-called “self-defense” engagement. The trouble is, the same word is used doctrinally to describe both an “offensive” and a “self-defense” rules of engagement authorization. The rules of engagement permit the use of force in self-defense in response to a “hostile act” or demonstration of “hostile intent,” while describing an “offensive” engagement that is not in response to a perceived hostile act or demonstration of hostile intent as an attack against a “declared hostile force.”

This ambiguity alone is problematic, but a there is a third doctrinal use of the word “hostile” that, in effect, creates a bridge between a “self-defense” and an “offensive” use of force. Both colloquially and doctrinally, the word “hostile” is also used more generally to describe an adversary without regard to the potential ROE characterization of the adversary.

Examples of this imprecise use of the word “hostile” in military doctrine and practice are too abundant to count, but the U.S. Department of Defense Law of War Manual observes, as but one example, that “spying, sabotage, and other hostileactivities behind enemy lines would render a person liable to prosecution for such conduct” (emphasis added).  Another doctrinal example, this from a publication focused on protections for civilians in armed conflict, warns that “in some cases hostile actors may attempt to blend in with” displaced persons and separately suggests to military planners that training exercises should “include civilians who are not hostile” (emphasis added).

While this ambiguity regarding use of the word “hostile” may seem rather innocuous, it manifests in targeting mishaps with devastating consequences. This ambiguity is the single most significant factor that led to the tragic outcome of the Kunduz airstrike.

The “hostile” trail begins with the description of the intent for the close air support that was communicated by the ground force commander to the JTAC. As the ground force commander recalls in the interview with the investigation team after the attack, he remembers “very specifically spelling” out his intent for the requested close air support “to reduce heavy weapons and strong points to allow” the ASSF ground assault force to maneuver to their objective, the Afghan government NDS facility (pg. 391). The ground force commander further clarifies that he wanted to identify the target “prior to the actual contact” in order to “make sure that we were on target and that everyone understood exactly what needed to happen” before the ASSF ground assault force became decisively engaged en route to the objective (pg. 391).

This intent is consistent purely with the “self-defense” usage of the word “hostile,” which permits a use of force in response to a “hostile” act or demonstration of “hostile” intent. The JTAC summarizes this intent in an ambiguous manner that could be consistent with either a “self-defense” or “offensive” engagement. Later, as the aircrew is trying to identify the intended target and describes the activity of the people they are observing at what was in fact the trauma center, the JTAC asserts that the “compound is currently under the control of the TB [Taliban], so those 9 PAX [personnel] are hostile” (pg. 033, emphasis added). This meaning for the word “hostile” is consistent with the doctrinal usage to describe an adversary without regard to ROE classification.

While the ground force commander intended the requested close air support to be purely for the defense of the ASSF and the JTAC instead communicated the non-descript usage of the word “hostile,” the aircrew interpreted the intent in a manner consistent with the “offensive” ROE application. The transcript of a radio conversation between the navigator and fire control officer of the supporting AC-130 reveals that at one point the navigator believes that the JTAC has “already confirmed that this prison complex [factually the MSF trauma center] is hostile” (pg. 060). Although this usage, too, is consistent with the ROE ambivalent meaning of the word “hostile,” the recollections of the members of the aircrew that are reflected in their sworn statements after the attack reveal that they interpreted the observation by the JTAC in a manner consistent with an “offensive” use of force.

The TV sensor operator observes in a sworn statement, for example, that the JTAC “said [before the attack that] the compound was under enemy control and that those [redacted] were declared hostile” (pg. 363, emphasis added). In a sworn statement that appears from the context to be provided by the pilot of the AC-130, the affiant recalls that the JTAC “relayed to us that the complex that we were monitoring [factually the trauma center] was under ‘TB’ (Taliban) control and that all associated personnel were declared hostile” (pg. 492, emphasis added). Similarly, in a sworn statement that from the context appears to be provided by the electronic warfare officer aboard the AC-130, the affiant recalls that the JTAC determined the compound being observed by the aircrew “was under Taliban Control and declared all personnel in that compound to be hostile” (pg. 500, emphasis added).

The practical effect of interpreting “hostile” in this manner is that, in ROE terms, “Once a force is declared hostile by appropriate authority, U.S. forces need not observe a hostile act or demonstrated hostile intent before engaging the declared hostile force” (emphasis added). The JTAC, of course, is not an “appropriate authority” to make such a “hostile” declaration, and the official investigation report makes clear that no one involved in the attack was conferred with such authority.

Due to the widespread ambiguity in doctrine and practice related to the term “hostile,” however, no one involved in the attack knew the difference. The JTAC proffered a ROE justification that was consistent with a self-defense engagement, but also used the term “hostile” in the ROE-neutral meaning without being aware that the aircrew would interpret this to be declaring the people being observed at the MSF trauma center to be a “hostile force.” The aircrew accepted the “self-defense” ROE justification, which permits a use of force in response to a “hostile” act or demonstration of “hostile” intent, but unwittingly interpreted the ROE-neutral “hostile” observation as an assertion that the people being observed were a “declared hostile force.”

If this mistake had been recognized, the airstrike would have never taken place. That is, if the members of the aircrew were aware that the ground force commander’s actual intent was to identify the target before the ASSF ground assault force came under attack and then to “reduce heavy weapons and strongpoints” in defense of the GAF, the aircrew would not have initiated the attack when the JTAC directed them to do so. Due to several factual circumstances, the ground force commander believed the ASSF ground assault force to be under attack when he advised the JTAC to direct the AC-130 to initiate. He also believed the aircrew was operating in accordance with his intent to defend the ASSF GAF and that “there shouldn’t have been any confusion” after he had clarified his intent earlier (pg. 391).

In actuality, the aircrew observed that the ASSF ground assault force was several hundred meters from the perceived objective, the MSF trauma center, when the airstrike was initiated. The aircrew never visually identified any weapons at the compound they were observing, let alone “heavy weapons and strongpoints” as described by the ground force commander. The absence of weapons is to be expected since the members of the aircrew were in fact observing the MSF trauma center and the hospital had a strict “no weapons” policy. At the command to initiate the attack, then, the aircrew would have been fully aware that they were not carrying out the intent of the ground force commander if they would have properly understood the intent. This would have prompted the aircrew not to engage, and they never would have done so since the ASSF ground assault force never came under fire from the MSF trauma center.

It is the existing ambiguity regarding practical and doctrinal application of the term “hostile” that caused the fateful misunderstanding. This is without a doubt “human error” as the investigation and official narratives indicate. However, the error is not attributable to the humans directly involved in the attack.

In attacking without first observing a “hostile act” or demonstration of “hostile intent,” the aircrew unwittingly conducted an attack in a manner consistent with the ROE designation of a “declared hostile force” while still believing they were carrying out the intent of the ground force commander. The bridge from the ROE “self-defense” usage of the term “hostile” (intended by the ground force commander) to the ROE-neutral description of an adversary (communicated by the JTAC) to the ROE “offensive” usage to connote a “declared hostile force” (interpreted and applied by the aircrew) set the conditions for the aircrew to “violate” the ROE by engaging in an “offensive” attack without authorization. The “human error” existed long before the airstrike, and it remains unidentified in existing doctrine and training to this day.

What, then, are the “limits of engagement” when U.S. forces “in combat activities” are not “directly under fire”? The short answer to that question is that the U.S. forces involved unquestionably exceeded the existing limits. The trouble is that the personnel involved in the attack were not aware that they were exceeding the limits of engagement. As General Votel observed during the press conference announcing the release of the investigation to the public, the personnel “were trying to get to the right answer here and do the exact right thing.” Deficiencies in existing doctrine and practice prevented them from doing the “exact right thing,” but this central contributing factor has yet to be identified, let alone rectified, by the U.S. military.

This examination of the application of relevant ROE is not complete and comprehensive. The NATO version of the ROE was also involved in the mistaken attack, though the ambiguity pertaining to the term “hostile” is also present there. A more complete assessment of the role of both the U.S. and NATO sets of ROE is possible by drawing on the classified versions of both. However, most of the provisions that are relevant to the Kunduz airstrike are present in the versions of the ROE that are available to the public.

Finally, sources of use of force policy other than the ROE, such as the “Tactical Guidance,” implementation of the “no-strike list” database, “clearance of fires” procedures, doctrine related to attaining “positive identification,” among others, are addressed in my comprehensive assessment of the official investigation and the lessons “learned” therefrom. However, for present purposes, the abbreviated examination of the ROE that is focused on ambiguous application of the term “hostile” is sufficient to address the “failure” of U.S. forces to comply with the relevant “limits of engagement” when, as in the Kunduz airstrike, the forces are not “directly under fire.”

  1. How do you justify that no court martial is recommended in response to the killing of 42 people and considering the protected status of the hospital?

As tragic and horrific as the outcome of the attack is, decisions regarding potential legal sanctions for the personnel involved in the attack must be made in consideration of the process that led to the airstrike. If the personnel had been aware of the protected status of the hospital and attacked it anyway, the outcome of the decision not to initiate court-martial charges would have been very different.

I have discussed the circumstances of the airstrike and the disposition decisions with many friends and former colleagues who were directly involved in advising the command teams that decided not to initiate charges. Without exception, these judge advocates have communicated to me that they are of the opinion that criminal charges were not appropriate based on the process that led to the strike.

The issue of perspectives regarding accountability for unintended outcomes for attacks in armed conflict is addressed further in the closing reflections of this post. And I consider the issue of accountability in greater detail in the Just Security and Lawfire posts of this collaboration. However, based on my detailed review of the investigation and other official accounts of the circumstances of the attack, I endorse the decision not to initiate court-martial proceedings.

This does not mean that I think accountability for the airstrike is not vitally important. But I worry that focusing on accountability for individual personnel based on the outcome of the airstrike risks diverting attention away from the institution that bears responsibility for the process that led to the tragic outcome.

  1. Who within the chain of command is ultimately responsible for the deaths of 42 people, and how is that person being held accountable?

The matter of accountability is addressed in the answer to the previous question involving the decision not to initiate court-martial proceedings for anyone directly involved in or otherwise responsible for the attack. As I note below in concluding reflections, true “accountability” in the context of the attack on the MSF trauma center needs to be centered on the U.S. military as an institution rather than any individual person directly involved in or otherwise responsible for the attack.

  1. Does the United States consider the actions of U.S. forces to be negligent, and if not, why?

The official report is replete with findings that would indicate that the personnel involved in the attack were negligent, probably even reckless, and potentially even worse. If the outcome of the attack is the focus of the assessment, it is not controversial to conclude that the personnel were at least negligent. However, as I describe in other posts, the official investigation is unfortunately an entirely unreliable source of information. Aside from the findings of the official investigation, if the process of the attack is the focus, a characterization of “negligence” is not as straightforward.

There is no doubt that the personnel involved in the attack got it horribly wrong. I conclude in the full assessment of the official investigation that the navigator and the fire control officer of the AC-130 aircrew did not comply with the requirement to take feasible precautions in the attack, and this can certainly be characterized as negligent.

My conclusions regarding these violations of the feasible precautions rule, however, are complicated by the fact that these conclusions in essence involve a failure to comply with the doctrinal duty to confirm “validity with respect to” the applicable ROE. These personnel should have clarified the uncertainty they seemed to have regarding application of the ROE, but ultimately all the personnel, including the navigator and the fire control officer, appeared to genuinely believe they were complying with applicable use of force law and policy.

My assessment is that the truly culpable negligence rests with the entire U.S. military as an enterprise. The official investigation report provides abundant evidence that the personnel involved in the attack on the MSF trauma center were thoroughly trained in relevant use of force law and policy. The investigation itself was purportedly conducted “with painstaking attention to detail” and was “followed by an in-depth review process.”

As the response to Question #6 describes, the single most significant factor in the tragic outcome of the attack was utilization of ambiguous terminology that was consistent with existing doctrine and that nonetheless led to a “violation” of the relevant ROE. The official investigation report not only fails to identify the true nature of the factors that contributed to the tragedy, but it systematically mischaracterizes even the most basic aspects of relevant use of force law and policy. That this report is purportedly the product of “painstaking attention to detail” that was “followed by an in-depth review process” further impugns the enterprise that generated such an absolute failure to account for what went wrong.

The discernible negligence here, then, rests with the enterprise that trained the personnel involved in the airstrike and those responsible for evaluating the attack afterward. As I observe below in the concluding reflections, this systemic negligence is correctable. However, it is the enterprise, rather than the products of that enterprise, that is the one truly deserving of the characterization of “negligent.”

  1. How will the disciplinary measures chosen deter U.S. military personnel from violating the laws of war in the future?

In short, the disciplinary measures imposed will have very little effect in preventing the circumstances that caused the catastrophic outcome of the Kunduz airstrike from contributing to a similar tragic outcome again in the future. This is not because the administrative measures imposed are inadequate. Rather, the disciplinary measures that were imposed are misdirected.

Although the outcome of the airstrike is horrendous, the personnel involved, as General Votel asserts, “were trying to get to the right answer here and do the exact right thing.” The aircrew observed the target area for 68 minutes before initiating the airstrike (pg. 027), and when they did, they “knew with 100% certainty” (pg. 058, n.122) that they were attacking the correct objective and thereby that they were carrying out the intent of the ground force commander. The ground force commander, in turn, believed that “there shouldn’t have been any confusion” about his intent for the requested close air support after he clarified his intent to the JTAC. The JTAC unwittingly created a linguistic bridge between the ground force commander’s stated intent to employ close air support in a manner consistent with “self-defense,” and the “offensive” engagement carried out instead by the aircrew. The JTAC did so by stating that the compound being observed by the aircrew was “currently under the control of the TB [Taliban]” and that the people being observed at the compound were thus “hostile.” They were all trying to “do the exact right thing,” but the training and doctrine they were applying in doing so led to a catastrophic outcome.

Even worse than being ineffective, my concern is that the disciplinary measures imposed will ultimately prove to be counterproductive. The narrative reflected in the official investigation upon which accountability measures were based is itself impermissibly focused on the outcome of the airstrike. How is it, to borrow from one such finding of the official investigation, that the personnel “did not attempt to distinguish between combatants and non-combatants” (pg. 095) but a senior commander can nonetheless maintain that the personnel “were trying to get to the right answer here and do the exact right thing”?

It is because the investigation is manifestly erroneous to conclude that the personnel “did not attempt to distinguish between combatants” and civilians. Doing so would violate the law of armed conflict (“LOAC”) distinction rule. This would constitute a serious violation of international law and would qualify as a war crime. So would engaging in a “facially disproportional” attack (pg. 091), though this official finding fails to present a recognizable formulation of the LOAC proportionality rule upon which it is based. These and similar findings of the official investigation constitute a gross misrepresentation of the applicable factual circumstances and the legal and policy standards from which the investigation draws to develop the relevant conclusions.

Even though the personnel involved in the attack were “trying to do the exact right thing,” as General Votel notes when describing the conduct of the personnel involved in the Kunduz airstrike, “unfortunately they came up short.” The fact that they did “come up short” is attributable to inadequate doctrine and training that persists across the U.S. military as an enterprise. The true causal factors have yet to be identified or corrected, though the personnel directly involved in or otherwise responsible for the attack have received, as General Votel observes, “adverse administrative actions [that] can carry severe repercussions on the careers and professional qualification of these individuals.”

The disciplinary measures imposed following the Kunduz airstrike were not effective in the endeavor to prevent similar tragedies from occurring in the future. The reason is that the measures were directed against individual military members who were inadequately trained by the enterprise that called upon them to use force on its behalf, rather than against the enterprise itself. Even worse, the sense that the personnel involved in the attack are punished for the outcome of the attack even though they were “trying to do the exact right thing” contributes to a prevailing sentiment of enmity toward implementation of military justice in armed conflict. This enmity can actually discourage compliance with existing limitations on the use of force by generating a sense of antipathy toward imposition and implementation of legitimate rules.

To this effect, a reflection captured in one of the sworn statements that is included as an exhibit to the Kunduz investigation should be shared and considered. The affiant, whom I assess based on the context of the statement to be the SOTF-A chief of operations, or “CHOPS,” is asked by the interviewer, “What changes should be made to guidance, SOPs [standard operating procedures], unit procedures or training which could have mitigated” the attack on the MSF trauma center (pg. 436). The initial response of the affiant is, “[t]his is not a simple question to answer because the implication is that there was a breakdown or an issue with the guidance, SOPs, unit procedures or training.”

The reflection that follows this initial answer is lengthy, but it is worth including in full here for consideration. The affiant goes on to observe:

“There is a reason that Special Forces elements were asked to conduct this mission. The experience, maturity, professionalism, and ability to operate in the most extreme and austere environments is why they were chosen. There is risk that commanders have to accept when placing American Soldiers in extremis situations, and when [General] Campbell told [redacted, likely from the context a reference to the ground force commander] to take his forces and seize a foothold in a city that had been seized by an estimated [redacted] INS [insurgents], there was risk associated with this extremely dangerous mission asked of these SF [Special Forces] Soldiers. To highlight the risk, from the moment the USSF convoy departed the airfield, they were in a constant firefight for over 2 days. Every time I spoke with [redacted, likely a reference to the ground force commander] (approximately 6 times from 01 OCT – 03 OCT), I heard constant gun fire and explosions in the background” (pg. 436).

The affiant concludes this reflection by observing, “I believe that any changes/restrictions to guidance, SOPs, or unit procedures as a result of the airstrike would hinder the ground forces’ ability to act in their own self-defense.” This sentiment and the rest of the reflection invoke a conceptual challenge involving the endeavor to achieve accountability and implement effective corrective actions following attacks that result in unintended consequences in armed conflict. While the challenge is inherently conceptual, the attack on the MSF trauma center demonstrates the practical implications of the pervasive conceptual challenge. With the question involving the effectiveness of the specific accountability measures that were implemented after the airstrike addressed, the present inquiry turns to consider some concluding reflections involving matters of broader conceptual and practical concern.

Concluding Reflections

The requirement to utilize force, often lethal force, to achieve an identified outcome sets armed conflict apart from a non-conflict setting. For corrective actions and accountability measures following accidents in armed conflict that result in unintended consequences (such as civilian casualties and fratricide) to be meaningful and effective, both the actions and measures must be developed and implemented with a clear understanding of and appreciation for the operational and information environment that existed before and during the accident. The official investigation conducted following the Kunduz airstrike does not present an accurate assessment of either the operational or information environment encountered before and during the airstrike by the personnel involved in the attack.

While the accounting of the factual record appears to be supported by the evidence gathered during the investigation, the findings are not supported by the evidence derived by the investigation team. Similarly, the official findings are based upon articulations of applicable law and policy that do not present a faithful application of the sources from which the formulations are drawn. Both of these factors render the official findings legally deficient. The corrective actions and accountability measures implemented after the airstrike are based on these findings that are legally deficient, and this impugns their reliability as well.

The assessment conducted in the present inquiry of the circumstances that led to the tragic attack on the MSF trauma center and of the corrective actions and accountability measures implemented is not consistent with the prevailing perspectives expressed by senior MSF representatives in the wake of the Kunduz airstrike. I have studied the MSF reaction and narrative extensively during the course of my assessment of both public and official accounts of the attack. While my assessment of the investigation and subsequent corrective actions and accountability measures does not align with prevailing MSF perspectives, I am committed to the pursuit of both meaningful corrective actions and effective accountability measures to ensure that the errors that caused the horrific outcome of this airstrike do not contribute to another in the future.

I conclude in the full assessment of the Kunduz investigation and lessons “learned” therefrom that the attack on the trauma center does not constitute a war crime, and this conclusion is summarized in the Opinio Juris post of this collaboration. While I explain this conclusion in detail in the full assessment of the investigation, I close the present essay with an observation involving the connection between public narratives and the inherently legal characterization of an attack as a war crime.

This closing observation draws on the ongoing work of Professor Shiri Krebs of Deakin Law School. Dr. Krebs has researched and written extensively about the potential unintended consequences of invoking inherently legalistic terminology such as “war crimes” in public narratives involving actions in armed conflict. She concludes her latest article on the topic with the observation that in our current “fake news” era, “where alternative facts are often generated to counter unwelcomed facts and narratives, it is more important than ever to seek new and better ways to produce and introduce information, and prompt reforms based on the lessons learned.”

This and previous similar observations on the topic by Dr. Krebs have been a guiding force for my current project assessing the Kunduz investigation and lessons “learned” therefrom. The idea for the current cross-platform collaboration was inspired in large part by the call to “seek new and better ways to produce and introduce information.” Like Dr. Krebs, I am concerned that the focus on whether the Kunduz airstrike should be characterized as a war crime may be inadvertently diverting attention away from the institutional reforms that must be implemented following the tragic attack.

Although my assessment of whether the Kunduz airstrike constitutes a war crime diverges from the perspectives expressed by MSF as an organization, I am no less committed to achieving the reforms that are necessary to correct the institutional failures that led to the horrific outcome of the attack and that have thus far been an impediment to the effort by the U.S. military to identify and implement the required reforms.

Nothing short of a sweeping change of culture within the U.S. military as an enterprise is needed. Only this can generate the widespread and systemic reforms that must be implemented to first identify, and then correct the pervasive inadequacies of training and knowledge related to use of force law and policy that led to the tragedy in Kunduz and that persist still today. In this endeavor, I hope to be an ally of MSF rather than an adversary—even if our perspectives do not completely align.

Providing an insider’s perspective of the answers to the unresolved questions posed by MSF is an important first step. The surviving victims of the airstrike, the families of those killed, and MSF as an institution deserve informed answers, even if official answers were not offered. Along with the answers provided in this essay, I declare my commitment to advocate for the institutional reforms that must be implemented and, if permitted to do so, to collaborate with the U.S. military to successfully implement the needed reforms. The victims and families of the attack on the MSF trauma center, as well as MSF as an organization, deserve nothing less.

Editors: Maria Trinidad Alonso Quiros; Lukas Roth

[hr gap=”30″]

More articles from the online collaboration:
Opinio Juris: The Attack on the MSF Trauma Center in Kunduz and the Limitations of a Risk-based Approach to War Crimes Characterization (Part I; Part II)

 

Online Scholarship, Perspectives

Forgetting and Remembering: Reflections on Memorializing Counter-Narratives Through Law

Editorial note: This article will be a part of a new ILJ Online series on the international law of protest.

By: Samantha Clare Goh

Britain considers itself to be at the center of a “culture war”. BBC’s move to omit the lyrics of anthems glorifying Britain’s colonial past sought to remember the victims of British colonial atrocity. In turn, Culture Secretary Oliver Dowden’s response has been to accuse the BBC of attempting to “erase” British history. Such talk of remembering, forgetting, and how to deal with historical narratives was also echoed in the furor surrounding the removal of Oxford University’s Rhodes statue, and indeed many other statues around the world that embody colonial history. This war of memory was precipitated by the Black Liver Matter protests, and the original front it was fought on was with regard to police brutality—in remembering African American victims of police brutality, and remembering misconduct of police, both of which had largely been forgotten insofar as the official narrative dictated by the state through legal institutions was concerned.

Yet where the state dictates historical narratives through law, those who stand up to such state oppression through law remain even more deeply engraved in history. To put in Foucauldian terms, this perspectival discourse decentralizes the “truth” of those in power, and is used as a weapon for systemic change. I seek to explore the reciprocal relationship between the state and the individual in using law as a tool for reckoning with the past. Although the state can use law to shape collective memory, this can likewise magnify the significance of moments of resistance to such oppression.

Forgetting to Remember: Collective Memory and Official “Truth”

The relative merits of historicism through law is fiercely debated. It is a common worry amongst academics that legal trials reduce history to specific events committed by particular individuals, as dictated by states. The issues of decontextualization and selectivity solidify the state’s political influence over the creation of official narratives, which become history. We have seen this with colonialism, post-war regimes, and totalitarian countries alike.

Trials decontextualize and are limited by judicial and rational argument. During the Algerian War, in which the former French colony fought for its independence, war crimes committed by French soldiers besmirched the values of universalism, equality, and liberty which the French state often espoused. As such, when French courts later had to rule on Nazi crimes against humanity, its definition was narrowly-construed to exclude French soldiers’ crimes during the Algerian war. This erasure of French colonial atrocity limited the ability of victims of the Algerian war to reckon with this past. Loytomaki recounts how the code of pensions was the only avenue for a young man in France to avenge his mother’s abuse at the hands of French soldiers. In a similar vein, international human rights law has never directly ruled on the injustices of communist regimes. What little engagement there has been with communism is limited to rulings on the fairness of restitution measures—yet to do even this requires the measures to be put in place domestically before it can be judged in the international fora.1Somers v. Hungary, CCPR/C/57/D/566/1993, Views of the Human Rights Committee, ¶ 9.4 (Jul. 29, 1996) (“The only issue is whether the award of less than full compensation for the loss of the author’s property, under Act XXV of 1991, is contrary to article 26.”). Therefore, the issue considered by the Human Rights Committee is whether existing restitution measures were fair and non-discriminatory under art. 26 ICCPR. The prior establishment of restitution measures by the state is therefore a precondition for such an assessment. We therefore see the limits of the trial, which is ultimately situated within a legal system crafted by the state or an international system that defers to state sovereignty, with the state holding unwieldy influence over the scope of legal inquiry.

If decontextualization limits the trial’s scope, selectivity instrumentalizes the trial and attempts to justify wrongs by producing a subject which constitutes the “bad.” Loytomaki raises another example, of French general Aussaresses whose memoirs described France’s systematic culture of torture during the Algerian war. This conflicted with official accounts and he was prosecuted for “praise of war crimes.” Although this was the first instance war crimes had been acknowledged in French courts, the judgement ultimately reaffirmed the state’s narrative of torture as only committed by rogue actors like Aussaresses. Much like in the famous trial of Adolf Eichmann, the weight of all the historical atrocities of war were placed on one individual, who at the end of the day sat in the court room with the nakedness of a mere human. What has often been mistaken in international criminal tribunals as a metamorphosis from evil war criminal to relatable and pitied man is in fact a mere misrepresentation of the weight of his crimes and individual guilt.

Cohen notes the prevalence of “pleas for historical relativity” in such trials. Such defenses often depict the defendant’s actions as commonplace. “Why me? Everybody killed the Jews,” Eichmann had asked. Meanwhile, Aussaresses claimed that French soldiers “didn’t ask too many questions” when given orders, and were all aware of the systematic torture taking place. Often, these individuals were simply acting under state authority. Attributing guilt to a select individual therefore ignores the larger institutional structure which compelled such acts. As a consequence, the search for the guilty that normally proceeds from devastating historical events is satisfied and reckoning is coerced through the finding of guilt in the individual, conveniently scapegoating the state. Hunt refers to this as the “creation of martyrs”—these “bad” individuals are created to excuse institutionalized wrongdoing.

As such, this limiting (decontextualization) and instrumentalizing (selectivity) of the law by the state to craft an official narrative proves to be dangerous. Said’s creating and blocking of narratives, Orford’s self-justifying narratives, Cohen’s memory eradication, Simpson’s “unprecedenting,” Foucault’s centralized discourse of the powerful—many theorists have warned of the power that is vested in the state that controls historical narrative. At the center of these warnings is the role of law in cementing such narratives, through legal language, trials, and institutionalized relations of power. Such historical narratives follow a familiar template: the limitations of law exclude wrongs committed by “good” state actors, but alongside this, the trial is instrumentalized to selectively punish certain individuals which epitomize the “bad.” In this official narrative, we forget the wrongdoings of “good” actors, and along with it, the rights of the “bad.”

Within the US, this has played out domestically on two fronts: dismissal of police brutality cases, and black incarceration. Justice Sotomayor, in a 2018 dissent, pointed out how the doctrine of qualified immunity amounts to “an absolute shield for law enforcement officers.” Any potential finding of guilt is thus greatly limited by the doctrine, which decontextualizes the outcome of the trial from systemic and institutionalized police misconduct. Meanwhile, the high African American incarceration rates and sentencing disparities between different races for comparable crimes demonstrates a level of selectivity which raises questions surrounding the instrumentalization of law. Much like in international criminal tribunals, the state uses law to limit sentencing in police misconduct cases, whilst instrumentalizingit in sentencing African Americans. The resulting narrative embedded in the collective memory of the state, as produced through the trials, goes as such: force applied by police is justified because they are apprehending criminals, which are mostly African Americans that commit “wrongdoings” warranting tough responses. This is the very attitude underlying U.S. President Donald Trump’s recent defense of the Kenosha gunman, claiming that the gunman “probably would have been killed” by African American protestors and was shooting in self-defense. Therefore, in choosing to forget the wrongdoings of favored parties, at the expense of African Americans’ rights, a version of history which subjugates African Americans is remembered.

Remembering the Forgotten: Individual Memory and Counter-Narratives

Above I critique a top-down perspective to memorializing, where the state employs law to craft an official narrative, and this collective memory of the state in turn becomes that of the individual. However, perhaps this does not accord requisite autonomy to the individual and his ability to use the legal avenues at his disposal to also engage in memorializing through law.

A society’s reckoning with truth is supposed to depoliticize, allowing society to come to terms with and move beyond past atrocities. Yet, Ignatieff has pointed out that nations don’t have a “unitary psyche.” Therefore, where such depoliticization is co-opted by the state without acknowledgement of its own wrongdoings, particularly in the case of widespread knowledge, a dissonance is produced between the narratives of the state and individual.

The result is the opposite of the state’s intention to move forward—individuals are unable to move on, left behind with a historical burden which grows heavier without reckoning. Macklem gives us two examples which help us distinguish between instances of dissonance between the state and its community, and the state and an individual. Both examples take place in a post-war Czechoslovakia that was recently freed from Nazi occupation, and demonstrate where narratives of the community or individual travel bottoms-up to be institutionalized in law. At community level, desire for reckoning led Czech civilians to attack, imprison and kill Germans with such widespread lawlessness that it led to the government’s official institutionalization of this “de-Germanization.” Since such sentiments were ubiquitous across those in the community, and was not incompatible with the official narrative of the ruling regime, its institutionalization was easily realized.

However, for an individual alone in his cause or marginalized by the state, law as a tool for memorializing becomes all the more important. The temporal fragility of individual memory seeks sustained existence through means of law. Brok was a Czech man who developed an unhealthy lifelong obsession with reckoning with the past. Over the course of his life, he continuously sought to reclaim legal ownership of his family’s building which had been confiscated by Nazi authorities and subsequently excluded from post-war restitution initiatives. Brok persevered with his cause until death, despite a lifetime of setbacks which saw him repeatedly bring the case to state court, only to fail—success was found only when his son elevated the case to the international sphere, before the Human Rights Committee. It was perhaps this persistence as a counter-narrative to the state that now gives his narrative the significance it has. If he had won on the first instance, his story would have ended there. Yet it was the resolute insistence to not be forgotten, juxtaposed against the excruciating indifference of the state’s legal institutions to his plight, that made his narrative significant enough for international attention, and also significant enough to memorialize in Macklem’s work. His final memorializing was more powerful only because his narrative had been so forgotten.

Some of those forgotten are being dredged up, once again seeking memorializing through law, such as in the reopening of Elijah McClain’s case. Whilst this probe is an important step forward, one should also be wary of allowing such cases to collapse into merely attributing blame to individual officers. In view of caution against missing wider institutional factors, ongoing awareness of and objections to systemic racism are encouraging. The extent to which marginalized African American communities’ narratives have remained systemically forgotten by the state has also led to the internationalization of the issue. Malcolm X had hoped that such internationalization would help bring governments to account, thereby achieving reckoning for the marginalized. It is to be seen whether international law would succeed in memorializing this counter-narrative, which seeks to remember those whom America had forgotten. One hopes that they find similar successes that Brok did on the international plane.

Yet regardless, in the production of counter-narratives, memorializing is not limited to legal outcomes. There is something martyr-like about the individual whom the state so blatantly targets through law that he becomes the counter-narrative. The adversarial nature of the trial gives a platform to defendants, and some take this up as a final act of memorializing. According to recounts, ex-Argentinian commander Massera denounced the junta court that he stood before, which had been established by the country’s new democratic government seeking to punish previous regimes, stubbornly proclaiming that “[h]istory belongs to me.”  Likewise, when Nazi leader Klaus Barbie was tried for crimes against humanity committed during the World War, his defense lawyer analogized his actions to French crimes in Algeria, judicializing both the atrocities of the Algerian war and the court’s historical selectivity. The scandal and rebelliousness of such acts of memorializing, in the face of the authority of the state apparatus and its narrative, serves to reinforce the place of these counter-narratives in history. There is a dual quality to martyrdom—where Hunt’s martyred individual epitomizes the prevailing of state power, this other aspect of martyrdom turns the oppressed individual into a martyr for his cause, and epitomizes the resilience of the individual against state power.

Ultimately, the martyr can either justify or highlight state wrongdoing, but which direction it goes is dictated by the people. Perhaps this reiterates that reckoning is only achieved when society is genuinely satisfied. This notion of martyrdom is why the unrest within American society over racial injustice could be tipped over the edge by one individual—society deemed that George Floyd was not an African American potential-criminal against whom police force was justified, but another African American victim whose plight highlights systemic and institutionalized police oppression. We are told to “say their names” to remember those forgotten by the narrative the state pushes. The state tries hard to forget the oppression which helps to produce this official narrative, yet the resulting counter-narrative eventually ends up coming back with a vengeance. While they were subjugated by the law, this subjugation was in a way a memorializing of its own.

Conclusion

States limit and instrumentalize the law to craft a certain historical narrative, but the individual’s power to correspondingly use the legal avenues at his disposal as an act of counter-memorializing that rebels against the official narrative is not to be underestimated. This radical form of memorializing inverts the trends, breaking down the official narrative and simultaneously amplifying the counter-memory. Such counter-memorializing through law is important in upholding the narratives of the marginalized. It is perhaps for this reason that Arendt despaired that the rightless man with no legal recourse also has no history, living and dying without trace.

While remembering a certain version of the state’s official narrative inevitably forgets other marginalized narratives, the reclaiming of these counter-narratives is an act of remembering that entails forgetting the state’s narrative. This flux of remembering and forgetting also characterizes modern-day culture wars and debates surrounding colonial-era statues. Dark colonial pasts were forgotten to remember a certain version of imperialist narratives, but these narratives are now in turn being forgotten, to remember the forgotten colonial atrocities and its victims. This is ultimately a picture of one narrative fighting to replace another.

Memorializing through law is not a one-way street. The state and individual take turns using it as a tool for reckoning. When the state excludes the individual through law, the individual in turn fights back with law, alternating between the construction and deconstruction of narratives. States exclude individuals from memory, and individuals forcibly reinsert themselves into the narrative. Oftentimes, it is only through their initial forgetting that their later reinsertion is vested with the memorial significance that it returns with, in the same way the defiance of the act of tearing down a statue behaves as a counter-narrative, forming a powerful statement of memorializing. Through forgetting, later acts of memorializing are therefore reinforced. Thus, this is a reciprocal relationship consisting of centralizing and decentralizing truths, a struggle for power which forms an historical narrative in itself.

Executive Editor: Yixian Sun

[hr gap=”30″]

Online Scholarship, Perspectives

Speech Crimes and Persecution: Undoing the Legacy of Nahimana

Featured image ©OSeveno/WikimediaCommons.

By: Radhika Kapoor and Sharngan Aravindakshan

On the international accountability front, there presently exists an excellent opportunity for clarifying the scope and threshold for speech crimes in international criminal law. In late 2019, the International Criminal Court (“ICC”) authorized the ICC Prosecutor to proceed with investigating atrocities committed against the Rohingya population of Myanmar. In addition, the United Nations International Fact Finding Mission on Myanmar (“FFM”), in its 440-page report on large-scale violations by government forces in Myanmar, stressed the Myanmar government’s strategic and effective use of Facebook to spread hate against the Rohingya among the general populace. Given the emphasis placed on Facebook’s role in fanning the flames of anti-Rohingya hate, it is likely that the prosecution’s charges against the persons responsible will include at least one count of a speech crime, possibly including hate speech amounting to persecution. This article picks up the jurisprudential trail of persecutory speech as a crime against humanity (“CAH”) from the Nahimana Judgment by the Appeals Chamber of the International Criminal Tribunal for Rwanda (“ICTR”) and examines the soundness of its rationale. It then locates the existing standard for persecutory hate speech in the context of the Myanmar-Facebook issue, which instantly makes clear the deficiencies of Nahimana’s muddled legacy.

Nahimana’s Obfuscation

The ICTR Trial Chamber in Prosecutor v. Nahimana was required to determine whether hate speech (both simpliciter as well as speech accompanying calls for violence) might constitute the underlying actus reus for persecution as a CAH. The Trial Chamber held that it could, ruling that hate speech “targeting a population on the basis of ethnicity, or other discriminatory grounds” could constitute persecution (¶1072). Subsequently, the case reached the ICTR Appeals Chamber. In the years since that final ruling on hate speech as persecution, issued in 2007, the Nahimana Appeal has come to be considered a significant metric to assess hate speech as persecution. However, the Nahimana Appeals judgment failed to articulate a clear, replicable benchmark for hate speech as persecution in international criminal law, both by limiting itself to violations of particular fundamental rights and by misguidedly insisting on calls to violence.

Although the ICTR Statute does not define persecution as a CAH, a series of cases at the International Criminal Tribunal for the former Yugoslavia (“ICTY”) laid important foundations for identifying actions amounting to persecution as a crime against humanity.  For instance, the ICTY Trial Chamber in Tadić found that persecution ought to entail an act of discrimination that contravened an individual’s fundamental rights (as enshrined in customary and treaty law). Subsequently, the ICTY Trial Chamber in Kupreskić held that in addition to contravening fundamental rights, the act of persecution should also rise to a level of gravity that was similar to other CAH. This general definition—that persecution required a contravention of fundamental rights, rising to a level of gravity that was similar to other CAH—was accepted by the ICTY Appeals Chamber in Krnojelac, and later by the ICTR Appeals Chamber in Nahimana.

On applying this conception of persecution to the facts at hand, the Nahimana Appeal found that hate speech simpliciterand hate speech that incited violence, targeting a population on the basis of ethnicity or other discriminatory ground, violated the right to respect for dignity and the right to security, respectively (¶ 986). However, the Appeals Chamber also went on to state that “hate speech alone” might not violate a person’s rights to life, freedom, and physical integrity (¶ 986).

To be sure, there can be little dispute with this; not every instance of hate speech necessarily violates these three enumerated rights. But why did the Appeals Chamber class these rights separately from the fundamental rights to security and dignity? Presumably, the Appeals Chamber’s rationale was that violations of rights such as security and dignity would struggle to meet Kupreskić’s gravity threshold before being classified as persecution, while violations of more “serious” rights such as freedom and physical integrity would more easily cross that threshold. This is hinted at in the subsequent paragraph of the judgment, which explicitly questioned whether the violations of the fundamental rights of respect to dignity and security were “as serious” as the other CAH listed in the ICTR Statute (¶ 987). However, in the very same paragraph, the Appeals Chamber also recognized that it was the “cumulative effect” of all the underlying acts of the crime of persecution which must reach a level of gravity equivalent to that for other CAH (¶ 987), thereby doing away with any need to distinguish between the effect of violation of different fundamental rights, despite having so distinguished between them. Nowhere, in fact, did the Appeals Chamber justify its illusory, hierarchical differentiation between various fundamental rights.

Additionally, while assessing whether the speech in question satisfied Kupreskić’s “gravity” threshold, the Nahimana Appeals Chamber emphasized the physical impossibility of speech “in itself” successfully killing or physically harming persons (¶ 986). It is difficult to dispute this platitude; however, an insight into the Appeals Chamber’s reasoning can be found in the significance it placed upon the “calls for violence” that accompanied the speech in question to assess that it did, indeed, rise to the level required by Kupreskić. At the same time, the Appeals Chamber seemed skittish about the possibility of what it termed as “mere” hate speech rising to Kupreskić’s standard (¶ 987). The Appeals Chamber did not explain the reason for its forced differentiation between these two kinds of speech.

A Complicated Legacy

Contrary to the Nahimana Appeal Chamber’s insistence, persecution as a CAH does not have to “kill” or “injure” a person in order to attract criminal responsibility; its commission is complete if a fundamental right has been breached, on discriminatory grounds, with a level of gravity similar to other CAH. In any case, given the chapeau requirements of Article 3 of the ICTR Statute, any speech capable of amounting to persecution as a CAH must be “part of a widespread or systematic attack” against any civilian population on national, political, ethnic, racial, or religious grounds. This in effect automatically excludes isolated incidents of hate speech or hate speech not linked to mass violence. Creating an additional layer of differentiation between “mere” hate speech and hate speech calling is both incorrect and unnecessary for the purposes of persecutory speech as a CAH. As the Trial Chamber correctly pointed out, denigrating or dehumanising speech can also generate the requisite conditions conducive to large-scale attacks against the targeted population.

Regardless, the spectre of Nahimana continues to haunt international criminal jurisprudence. As recently as 2018, the Appeals Chamber for the International Residual Mechanism for Criminal Tribunals in Šešelj, after relying on the Nahimana Appeal, muddied the waters further by hinging its finding that there was no persecution upon whether the concerned speech had actually “incited violence” against the victims (¶ 163). Given that the crime of persecution does not – either statutorily or customarily – require a “physical element”, this trend is worrying.

The Nahimana Standard in Myanmar: Hate Speech on Facebook

Over the course of the past decade, senior officials and authorities in Myanmar disseminated inflammatory messages targeting Muslims—particularly members of the Rohingya community —through a variety of channels, including pamphlets, songs, print media, and social media.  Significantly, much of this hate speech was disseminated through Facebook. Accordingly, the FFM in its report paid particular attention to the official Facebook accounts of public authorities in Myanmar used to disseminate anti-Rohingya hate speech. These included the official Facebook pages of the Office of the Commander-in-Chief, the State Counsellor’s Information Committee, and the Ministry of Information.

The FFM identified a series of Facebook posts from official accounts implying that murdering non-Buddhists was a “small sin”; repeatedly referring to the Rohingya as “blood-thirsty Bengali terrorists,” illegal immigrants, “aliens,” and “extremists”; and accusing “Bengali terrorists” of “mass murder.” Note that the term “Bengali” is frequently invoked to imply—without basis—that the Rohingya are illegal aliens who do not belong to Myanmar. In its report, the FFM also highlighted various comments under these posts, which used similarly extreme anti-Rohingya language, including references to Islam as the “evil-religion [that would] disappear from our land one day,” and assertions that the Rohingya were “animals” while Rohingya women were dishonest, “unattractive [and] have bad hygiene.”

These posts and communications formed part of the Myanmar authorities’ overarching attempt to paint the Rohingya as a band of terrorists who posed an existential danger to Buddhist lives within Myanmar, paving the way for a military crackdown against the Rohingya in 2017. The FFM acknowledged this as well, finding anti-Rohingya hate speech to be linked to the larger, underlying theme of showing the existence of a “Muslim threat” to the “Buddhist character” of Myanmar.

That a large portion of this campaign of hate was executed on Facebook is not a coincidence. Facebook was already the primary medium for public communication, and Myanmar authorities would frequently rely on it to transmit official information to the public. The official Facebook account of the Office of the Commander-in-Chief had 2.9 million followers, the Ministry of Information had 1.3 million followers and the State Counsellor’s Information Committee had 400,000 followers. Facebook became an easy medium for both anti-Rohingya rhetoric as well as deliberate misinformation from official Myanmar mouthpieces. In a country where Facebook was so ubiquitous that it had come to be considered the Internet, incendiary posts by influential Myanmar authorities spread like wildfire.

It is noteworthy that the Myanmar authorities’ hate speech on Facebook may not have always called for violence or other forms of coercive action—although some certainly did. (Indeed, the authorities’ stratagem appears to have been to paint the Rohingya as violent, instead.) However, despite Nahimana’s indelible—yet unfounded—insistence to the contrary, the crime of hate speech as persecution does not require calls to violence or violations of one’s right to life and physical integrity. As the Appeals Chamber in Nahimana also recognized in principle but failed to incorporate into its findings, hate speech simpliciter—which is devoid of calls to violence—blatantly violated the right of the Rohingya community to dignity, thereby depriving them of a fundamental right enshrined in international law. Today, in the year 2020, it would be difficult for a reasonable trier of fact to deny that the cumulative upshot of the concerned acts, i.e., the various instances of hate speech disseminated by the Myanmar authorities on Facebook in the background of the ongoing and increasing violence against the Rohingya, was a key factor in creating the explosive atmosphere required for the mass, widespread violence against the Rohingya. Hate speech, when resulting in the deprivation of fundamental rights and on meeting the required gravity threshold, constitutes the crime of persecution as CAH. In Myanmar’s case, the government’s consistent anti-Rohingya rhetoric on Facebook to spread instantaneous and widespread racial hatred against the Rohingya should accordingly be tested on the anvil of this threshold. Hopefully, unlike Nahimana, this opportunity to clarify the law will not be missed.

[hr gap=”30″]

Online Scholarship, Perspectives

River Borders, Cartographic Aggression and International Law: An Analysis of the Kalapani Dispute

By: Mary Kavita Dominic

Since May 2020, tensions have been simmering between India and Nepal over the historically disputed territory of Kalapani. These tensions threaten to boil over with the Parliament of Nepal passing a Constitutional Amendment Bill that alters the country’s maps to include this strategically key area within its borders. This has been widely perceived as an act of cartographic aggression by Indian officials. As with any border dispute, it would be useful to unscramble this diplomatic standoff through a legal prism. Of particular import are some of the questions that this issue raises in connection with river boundaries and cartographic assertions.

Legal Staticity versus Geographic Dynamism

The Kalapani dispute is symptomatic of an egregious marriage between natural geographies and modern-day Westphalian states. The status of River Kali as a boundary river between India and Nepal lies at the heart of this dispute. The predisposition of these nation-states towards permanent sovereignty and clearly demarcated borders has been vexed by the indeterminacy and transitory nature of Kali.

In 1816, Kali was designated as the boundary river between India and Nepal in Article V of the Treaty of Sugauli. Concluded between the Kingdom of Gurkha (present-day Nepal) and the British East India Company, the treaty had identified the territory lying to the east of Kali as falling within Nepal’s sovereignty. In return, the King of Nepal had renounced all claims on the region lying to the west of the river.

What appeared to be a straightforward provision in this treaty, however, was rendered incongruous by the topography of Kali. It was asserted by Nepal that the source of Kali was located in the mountains near Limpiyadhura, which is higher in altitude than the rest of the river’s flow. In keeping with this reasoning, it laid claim to the land that stretched downwards from Limpiyadhura and extended to the East. Conversely, India contended that the source of the river was situated further east in Kalapani, a sliver of land wedged between the borders of India, Nepal, and the Tibetan Autonomous Region of China.

Intrinsic to this dispute, therefore, was the problem of identifying the main channel of Kali, which in turn had implications for delimiting the border between India and Nepal. In fact, this dilemma was not unique to the Kalapani dispute. With shifting climate patterns across the world, the dynamism of river boundaries has posed a challenge for international law.

Interpretation of River Border Treaties

International law is no stranger to the ambiguities posed by geographical features in boundary agreements. A case in point is the 2002 border dispute between Nigeria and Cameroon, where the International Court of Justice (“ICJ”) had to identify the mouth of the river Ebeji. Nigeria had claimed that the mouth of Ebeji had changed over time. Acknowledging that the river did not indeed have a single mouth, the court sought to settle this dispute by ascertaining the intention of the parties at the time of the border agreement and making use of maps to identify the location of the mouth of Ebeji (¶¶ 59–60).

Here, in a manner reminiscent of the Kalapani dispute, the parties had to grapple with the indeterminacy of river borders and the resulting ambiguities in a boundary agreement. While resolving this issue, the court found it fit to rely on the original intention of parties as well as cartographic evidence. Such an approach was typical of the “Intent School” of treaty interpretation, whereby emphasis was placed on the intention of the parties to the treaty.

In a similar vein, it might be useful to glean the original intention of the parties to the Treaty of Sugauli, since its terms are unclear as to the delineating river channel. Towards this end, examining the travaux préparatoires of this treatywould be an instructive resource. However, both India and Nepal are yet to furnish any evidence, cartographic or otherwise, that predate the treaty or qualify as its preparatory works. Instead, both states have chosen to rely on surveys and cartographic exercises undertaken after the conclusion of the Treaty.

For instance, Nepal has mostly cited topographic surveys published by the East India Company from 1820 to 1846. Additionally, its former director-general of the Department of Survey has drawn attention to maps prepared by the Survey of India from 1850 to 1856. For their part, Indian officials have also referred to a post-dated map for advancing their claims, namely an 1875 map drawn up by the British colonial government.

The logic behind this approach can be attributed to the teleological school of treaty interpretation. Arguably, under customary international law, subsequent practice of parties is prioritised as a primary source of treaty interpretation, over and above secondary sources such as travaux préparatoires. This position is also reflected in the Vienna Convention on the Law of Treaties (“VCLT”; see articles 31 and 32). Although India and Nepal have not yet ratified the VCLT, it would be in their interest to demonstrate that subsequent surveys and cartographic exercises in the Kalapani-Limpiyadhura region have shown the river boundary to be coextensive with their respective interpretations. Indeed, Nepal, which is a signatory to the VCLT and India, whose Supreme Court has affirmed the customary status of the VCLT, would have much to gain from citing maps as subsequent conduct that affirms their position in relation to the Treaty of Sugauli.

Against this backdrop, it must be pointed out that the 1875 map cited as evidence by the Indian authorities does not carry a Nepali certification. On the other hand, Nepal claims that the maps prepared between 1850 and 1856 were issued by the Survey of India with the participation of Nepali authorities. While this has been consistently denied by India, if it were to be proven otherwise, it might prima facie weaken India’s position. After all, a cooperative cartographic exercise would be better indicative of subsequent practice, as compared to the unilateral drafting of a map. This brings us to the next bone of contention, i.e., the evidentiary value of maps under international law.

Evidentiary Value of Maps

Maps have always figured prominently in territorial disputes. In the past, courts and tribunals were loath to place excessive reliance on them, particularly when they described territory of which the creators had little knowledge or when they were sketched in order to promote a country’s claims. In fact, maps were mostly treated as secondary or hearsay evidence with little or no value.

With the establishment of the ICJ, however, there arose cases where this question had to be settled more conclusively. In a 1953 case between the United Kingdom (“UK”) and France, where both states asserted sovereign claims over a group of islets and rocks, Judge Carneiro observed that the evidence supplied by maps was not always decisive in the settlement of legal questions relating to territorial sovereignty. Although it could constitute proof of the exercise of sovereignty, he opined that a more searching and specialized study would be required in order to decide which of the contending maps prevailed (Individual Opinion, ¶ 20).

This principle, however, appears to have undergone some dilution in two subsequent cases. In the Frontier Land case decided in 1959, the ICJ had to decide between contradictory documents that attributed two plots of land in the Belgo-Dutch Frontier to the states of Belgium and the Netherlands, respectively. The court held that the map of a Delimitation Commission which was incorporated by reference in a treaty, but was inconsistent with the text of the instrument, would prevail over the written provision (pp. 220, 225-226).

This was taken a step further in the Temple of Preah Vihear case, where the ICJ had to decide if the territory surrounding the ruins of the Temple of Preah Vihear fell within the sovereignty of Cambodia or Thailand. In this case, the relationship between the map and the treaty was far less direct than the Frontier Land Case. Nevertheless, the Court treated a map, not formally approved by a Delimitation Commission, as if it were part of the treaty. In the eyes of the majority, Thailand had, by her conduct or lack thereof, acquiesced in the map as representing the outcome of the delimitation (pp. 21-24).

Thus clearly, there has been a shift in the evidentiary value attributed to maps, particularly when delimitation disputes are involved. In the present case, there does not appear to be a map attached to the Treaty of Sugauli. Although there exists a Nepal-India Joint Technical Level Boundary Committee (“JTBC”) that issues boundary base maps, it has declared the Kalapani-Limpiyadhura region as beyond its capacity to resolve. It is in this context, where there is no consensus about the accurate map, that previously mentioned factors of treaty interpretation including intention, subsequent conduct, etc., become relevant in the political dialogue between India and Nepal.

Concluding Remarks

At the end of the day, this cartographic tussle over the source of a river exposes the land bias inherent in international law. As much as interstate disputes appear to concern the position of a river boundary, the true subject of the dispute is often land territory. Staying true to this principle, the differences over the origin of Kali is nothing but a territorial dispute over strategically important land, located at the trijunction of India, Nepal, and China.

In such a high-stakes territorial dispute, it is important that both India and Nepal resolve this amicably without falling foul of international law. With both sides accusing each other of unilateral or exclusionary acts, including the passing of a map in the Parliament of Nepal or India’s construction of a road on disputed territory, this objective stands frustrated. More regrettably, it undermines the spirit of the long-standing Treaty of Peace and Friendship between the two countries.

[hr gap=”30″]

Scroll to Top