International Law Studies
Volume 83
Global Legal Challenges: Command of the Commons,
Strategic Communications and Natural Disasters
Michael D. Carsten
Editor
Naval War College
Newport, Rhode Island
2007
INTERNATIONAL LAW STUDIES SERIES
PRESIDENT, NAVAL WAR COLLEGE
Rear Admiral Jacob L. Shuford, USN
ACTING PROVOST and ASSOCIATE DEAN OF
ACADEMICS, NAVAL WAR COLLEGE
Professor William R. Spain
DEAN, CENTER FOR NAVAL WARFARE
STUDIES
Professor Robert Rubel
CHAIRMAN, INTERNATIONAL LAW
DEPARTMENT
Professor Dennis L. Mandsager
CHARLES H. STOCKTON CHAIR OF
INTERNATIONAL LAW
Professor Michael N. Schmitt
INTERNATIONAL LAW DEPARTMENT
Colonel Leo E. Boucher, JA, USA
Commander James D. McMahon, USCG
Commander Sean P. Henseler, JAGC, USN
Lieutenant Colonel Michael L. Kramer, JA, USA
Major Michael D. Carsten, USMC
EDITORIAL OFFICE
International Law Studies
International Law Department
Naval War College (36)
686 Cushing Road
Newport, RI 02841-1207
Telephone: +1-401-841-4949
Fax:+1-401-841-3989
DSN: 948-4949
E-mail: ILD@nwc.navy.mil
The International Law Studies ("Blue Book") series
was initiated by the Naval War College in 1901 to
publish essays, treatises and articles that contribute
to the broader understanding of international law.
OPNAVINST 5450.207 (series) formally tasks the
Naval War College with publishing the "Blue Book"
series. The thoughts and opinions expressed in this
publication are those of the authors and are not nec-
essarily those of the US government, the US Depart-
ment of the Navy or the Naval War College.
Distribution
This series is not published on a calendar basis but
upon the availability of appropriate topics and au-
thors. Distribution is limited generally to selected US
government officials and agencies and selected US
and international libraries, research centers and edu-
cational institutions. Distribution is also made
through the Federal Depository Library Program by
the US Government Printing Office.
Copies of this volume and other selected editions of
the International Law Studies series may also be ob-
tained commercially from William S. Hein & Co.,
Inc. This does not constitute government endorse-
ment of William S. Hein & Co., Inc. as a commercial
source and no official endorsement is intended or
implied.
Electronic copies of this volume and other selected
volumes may be located at the following website:
http://www.nwc.navy.mil/cnws/ild/ild.aspx.
Permissions
Reproduction and reprinting are subject to the
Copyright Act of 1976 and applicable treaties of the
United States. To obtain permission to reproduce
material bearing a copyright notice, or to reproduce
any material for commercial purposes, contact the
Editorial Office for each use. Material not bearing a
copyright notice may be freely reproduced for aca-
demic or other non-commercial use; however, it is
requested that the author and the International Law
Studies series be credited and that the editor be
informed.
Proper Citation
The International Law Studies series should be cited
according to the following examples:
- For citing a Blue Book: Title (editor, year) (Vol. ,
US Naval War College International Law Studies);
- For citing a chapter: Author, Title of Chapter,
pages, Blue Book Title (editor, year) (Vol. , US Naval
War College International Law Studies).
For sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800; DC area (202) 512-1800
Fax: (202) 512-2104 Mail: Stop IDCC, Washington, DC 20402-0001
ISBN 978-0-16-080068-9
International Law Studies
Volume 83
Library of Congress Cataloging-in-Publication Data
Carsten, Michael D.
Global legal challenges : command of the commons, strategic communications,
and natural disasters / Michael D. Carsten.
p. cm. -- (International law studies ; v. 83)
Includes index.
ISBN 978-1-884733-48-2 (hard cover)
1. National security— Law and legislation. 2. Intelligence service— Law and legisla-
tion. 3. Terrorism. 4. Disaster relief— International cooperation. 5. Globalization.
I. Title.
K3278.C37 2008
343'.01-dc22
2007048127
Table of Contents
Global Legal Challenges: Command of the Commons,
Strategic Communications and Natural Disasters
Foreword ix
Introduction xi
Preface
Jane Gilliland Dalton xiii
Part I: Keynote Address
I Domestic Security and Maintenance of Liberty: Striking the Balance
PaulMcHale 3
Part II: Command of the Commons — The US Perspective
II Command of the Commons Boasts: An Invitation to Lawfare?
Craig H. Allen 21
III Global Commons and the Role for Intelligence
Lowell E. Jacoby 51
IV Maritime Domain Awareness: The Key to Maritime Security
Joseph L. Nimmich and Dana A. Goward 57
Part III: Command of the Commons — The International Perspective
V Threats from the Global Commons: Problems of Jurisdiction and
Enforcement
StuartKaye 69
VI Preemption by Armed Force of Trans-boundary Terrorist Threats:
The Russian Perspective
BakhtiyarR. Tuzmukhamedov 83
VII Security in the Strait of Malacca and the Regional Maritime Security
Initiative: Responses to the US Proposal
Yann-huei Song 97
VIII Actual and Future Threats Emanating from the Commons: A Chilean
Approach
Francisca Moller and Jorge Balaresque 157
Part IV: Public Perception and the Law
IX Piercing the Fog: National Security, Media and the Government
Harvey Rishikof 177
X The Military and the Media in Perspective: Finding the Necessary
Balance
James P. Terry 187
XI National Security, the Law and the Media: Shaping
Public Perceptions
Linda Robinson 197
PartV: Luncheon Address
XII International Legal Public Diplomacy
John B.Bellinger III 205
PART VI: CHALLENGES OF STRATEGIC COMMUNICATIONS
XIII Strategic Communications and the Decline of US Soft Power
GeneE. Bigler 217
XIV Strategic Communications and the Battle of Ideas
MariK.Eder 235
XV Challenges of Strategic Communication
Michael A. Brown 251
VI
Part VII: Global Disasters
XVI Global Disasters: Pakistan's Experience
Ikram ulHaq 257
XVII Australian Defence Force Experience with Non-Government
Organizations in Humanitarian Assistance and Disaster Relief
Operations
Evan Carlin 267
XVIII Disaster Response: Key Legal Issues for US Northern Command
Kurt Johnson 277
XIX The Law of International Disaster Response: Overview and
Ramifications for Military Actors
David Fisher 293
Contributors 321
Index 333
vn
Foreword
The International Law Studies "Blue Book" series was initiated by the Naval
War College in 1901 to publish essays, treatises and articles that contribute
to the broader understanding of international law. This, the eighty- third volume of
the series, contains the proceedings from a scholarly conference entitled Global
Legal Challenges: Command of the Commons, Strategic Communications and Natu-
ral Disasters, hosted here at the Naval War College on June 28-30, 2006.
The conference's mission was to examine legal standards (or lack thereof) applicable
to these challenges and to identify common themes that could guide those responsible for
addressing these challenges in the future. By initiating a dialogue between the responsi-
ble government officials (military and civilian) and the legal personnel who advise
them, the conference developed a number of practical suggestions in the form of les-
sons learned. One striking aspect of these lessons is that, though the panels dealt with
apparently diverse topics, the solutions have many common threads and characteris-
tics. In the truly "global" world in which we live, the challenges must be addressed by
solutions that are equally global, coordinated and consistent across the board.
Renowned international scholars and practitioners, both military and civilian,
representing government, non-government and academic institutions from
throughout the world participated in the event. The conference and this "Blue
Book" were cosponsored by the Lieber Society on the Law of Armed Conflict and
the Roger Williams University School of Law, Bristol, Rhode Island, with generous
support from the Naval War College Foundation and the Israel Yearbook on Human
Rights. The International Law Department of the Center for Naval Warfare
Studies, United States Naval War College, hosted the conference.
On behalf of the Secretary of the Navy, the Chief of Naval Operations, and the
Commandant of the Marine Corps, I extend to all the cosponsors and supporters, the
participants and the contributing authors, our thanks and gratitude for their invalu-
able contributions to this project and to the better understanding of the complex le-
gal issues involved in meeting and responding to future global operational challenges.
JACOB L. SHUFORD
Rear Admiral, US Navy
President, Naval War College
Introduction
The US Naval War College hosted its sixth annual International Law Confer-
ence during June 2006. The purpose of these conferences is to bring together
international scholars and practitioners, military experts and students to examine
legal issues impacting military operations of the day. Commencing with the inau-
gural conference in 2001, the Naval War College's internationally acclaimed Inter-
national Law Studies ("Blue Book") series has been devoted to the conference
subjects. This edition of the "Blue Book" continues that tradition. During 28-30
June, 2006, the Naval War College conducted a conference entitled Global Legal
Challenges: Command of the Commons, Strategic Communications and Natural Di-
sasters. Three main challenges were explored by the conference:
• Threats emanating from the global commons and the need to identify and
counter those threats;
• Combat operations in Afghanistan and Iraq, events that occurred during
those operations and worldwide perceptions of the US role in and responsibility
for those events; and
• Natural disasters of such magnitude international responses were required,
including within the United States of America.
This volume of the International Law Studies series is a compilation of remarks
made during the colloquium and articles which expand upon the thoughts articu-
lated during the colloquium by the authors.
The conference was organized by Professor Jane Dalton, the Naval War Col-
lege's Charles H. Stockton Professor of International Law, and Major Richard
Jaques, US Marine Corps, of the International Law Department. The conference
was cosponsored by the Lieber Society on the Law of Armed Conflict of the Ameri-
can Society of International Law, and was made possible through the support of
the Naval War College Foundation, Roger Williams University School of Law and
the Israel Yearbook on Human Rights. Without the dedicated efforts and support
and assistance of these individuals and organizations the conference would not
have been possible.
I also thank our editorial team, Professor Emeritus Jack Grunawalt and Captain
Ralph Thomas, JAGC, US Navy (Ret.). Their dedication, conscientiousness, and
perseverance were principally responsible for the production of this excellent addi-
tion to the International Law Studies series. Major Mike Carsten, US Marine
Corps, of the International Law Department served as managing editor of this vol-
ume. His dogged perseverance in communicating with contributing authors, mar-
shaling author contributions, packaging the volume, and overseeing the complex
publishing and distribution process also are deserving of special thanks. Without
their efforts, completing this volume would not have been possible.
Often forgotten when it comes time to acknowledge efforts are the personnel re-
sponsible for supervising and executing the expenditure of funds. I thank Colonel
Leo "Chip" Boucher, JA, US Army, of the International Law Department and Bud-
get Analysts Ms. Jamie Price and Ms. Mary Ann Hall for their efforts in managing
and executing the budget for the conference and this volume.
Additionally, special thanks go to Rear Admiral Jacob Shuford, president of
the Naval War College; Dr. James F. Giblin, Jr., the College's provost; and Dr.
Barney Rubel, dean of the Center for Naval Warfare Studies, for their leadership
and support in the planning and conduct of the conference and the publication of
this volume.
The International Law Studies series is published by the Naval War College and
distributed throughout the world to US and international military commands, ac-
ademic institutions and libraries. This publication reflects the Naval War College's
commitment to scholarly discourse and a better understanding of legal issues. The
2006 conference and the publication of this volume of the "Blue Book" continue
that tradition.
DENNIS L. MANDSAGER
Professor of Law & Chairman
International Law Department
xn
Preface
Jane Gilliland Dalton
Though it is early in this twenty-first century, a number of unanticipated,
large-scale events — some man-made, others natural — have brought us
face-to-face with the "global" nature of the world in which we live:
• Threats emanating from the global commons and the need to identify and
counter those threats;
• Combat operations in Afghanistan and Iraq, events that occurred during
those operations and worldwide perceptions of the US role in and responsibility
for those events; and
• Natural disasters of such magnitude that international responses were
required, including within the United States of America.
Though these apparently unconnected events could be viewed in isolation, em-
bedded within each were issues that could not be addressed by a single nation or a
single government agency. The hallmark of these events is the complexity and
global reach of legal, policy and operational issues, and the interrelationships among
them. In developing the theme and identifying the participants for this conference,
Global Legal Challenges: Command of the Commons, Strategic Communications, and
Natural Disasters, hosted at the Naval War College on June 28-30, 2006, the confer-
ence organizers hoped to initiate a dialogue between those who have to meet these
global challenges and the lawyers who advise them. We sought to explore the role
that law plays in shaping policy, how policy influences legal analysis, and how the
interaction of law and policy affect the operational outcomes. The goal was to iden-
tify common themes and lessons for future exploration — to learn from past events
and experiences how better to approach future challenges.
In addition, this conference did not focus primarily on the laws of war, but
rather on legal issues that confront the military commander when engaged in oper-
ations that do not fit the traditional concept of warfighting — protecting the home-
land from threats, whether natural or man-made, in the post-9/11 environment;
ensuring the message one's forces convey through words and deeds is consistent
Preface
with law and policy; and conducting disaster relief operations in a conflicted or in-
secure area, though not necessarily in a war zone.
The recurring theme of the conference, and, thus, this volume of the "Blue
Book" series, is that in an interdependent and complex world of post-9/1 1 global ter-
rorism, neither policymakers nor military commanders can focus only on domestic
or international issues, only on law or policy or operations, only on performing the
mission or communicating the message — rather, they have to accomplish all at
once. They have to interconnect and interact. The challenges are global and com-
plex. The solutions must be sophisticated and nuanced. From the two keynote
speakers and the five panels emerged a number of lessons learned to inform the
debate and to assist in developing solutions for the future.
Competing Interests: Striking the Balance
Assistant Secretary of Defense for Homeland Defense Paul McHale's opening key-
note address captured one of the primary themes that resonated throughout the
three days of the conference — the importance of striking a balance when dealing
with complex issues and competing priorities. In Secretary McHale's case, the bal-
ance is not unlike that America's founding fathers struck between security and lib-
erty. The founding fathers had to guard against creating a system that relied
disproportionately on the military to provide internal security, lest the citizenry's
lack of confidence in civilian law enforcement lead to a voluntary relinquishment
of those capabilities in favor of the military, and to a threat to the civilian character
of the US government. In the wake of Hurricane Katrina, a similar issue arose. The
rapid and effective military deployment to the Gulf Coast — arguably the largest,
fastest deployment of military capabilities in US history, according to Secretary
McHale — led some to argue the military should be in charge of future emergency
responses to domestic natural disasters. Secretary McHale found that identifying
the proper domestic role of the military requires "constant, sobering judgment."
"We ought not blindly commit military forces to missions that should remain in-
herently civilian in character. If we use the military within our own borders for
every mission that the military in theory could achieve, we will, in fact, tip the bal-
ance towards security and pay a price in terms of liberty."1
The luncheon keynote address demonstrated how one executive department
of the US government is seeking to strike the proper balance when addressing
complex issues with partners, allies and others around the world. Department of
State legal adviser John B. Bellinger III, at the request of the secretary of state, has
taken a leading role in the secretary's public diplomacy dialogue. This dialogue is
designed to garner support around the world for US policies and the legal
xiv
]ane Gilliland Dalton
theories underlying those policies related to the global war on terror, the status
and treatment of detainees and other post-9/11 issues. Mr. Bellinger noted that
some of the challenges in this arena involve dispelling myths that are not based
on fact or law and identifying and responding to policy differences that are re-
cast as disputes about the law. Mr. Bellinger's main goals have been to explain
with precision and clarity the legal basis for policy decisions and to place un-
founded and emotionally laden criticisms in perspective. "Unfortunately," com-
mented Mr. Bellinger, "it is easy to capture a criticism about a complex legal
matter in a pithy sound bite . . . but it requires paragraphs of explanation to de-
scribe how the United States is, in fact, complying with its legal obligations."2
Through his dialogues with legal advisers and other representatives from foreign
ministries, the European Union and international organizations, he has encour-
aged responsible officials and commentators in Europe to "promote more bal-
anced discussion within their own nations, among themselves and with the
United States about the issues."3
Secretary McHale recalled that "H.L. Mencken once said that for every complex
problem, there is a solution that is simple, neat and wrong."4 Just as there is no sim-
ple correct solution to the complex issues surrounding the proper role of the mili-
tary in a domestic context, so there is no simple correct solution to the complex
issues Mr. Bellinger addresses when he meets his counterparts overseas. Likewise,
the five panel discussions of this conference identified the complexity of the global
issues each panel was assigned to address and recognized that there are no simple,
clear-cut, easy answers. The solution to these global issues will be found only if
competing interests are balanced in a thoughtful, sober analysis of the law, the pol-
icy and the operational imperatives. The reader of the contributions in this volume
submitted by the panel participants will appreciate the crosscutting themes that
animated the discussions and the practical lessons the panelists offered based on
their experiences. Following is a short summary of the major themes and lessons
learned from the panelists.
See, Understand, Share: Developing Partnerships
"It seems safe to say that global maritime security is now seen by most as a team
sport. . . ."5 Thus the panel moderator, Professor Craig H. Allen, succinctly captured
the primary lesson of the first panel, "Command of the Commons — The United States
Perspective."6 Vice Admiral Lowell E. Jacoby, US Navy (Ret.), explained why that is so
from an intelligence perspective — it is a problem of scale, scope, complexity and the
challenges presented by a highly accomplished foe. "Command of the commons" is
simply not a realistic goal. "I take this position," said Vice Admiral Jacoby, "based
xv
Preface
upon what I believe is a realistic appreciation of what intelligence can achieve. If we
attempt to know everything about everything all the time ... we will fail Rather,
the key is to focus our efforts and dominate those portions of the 'commons' that
are integral to our priority objectives. The key is to be selective and to prioritize our
needs."7
The "see, understand, share" paradigm offered by Rear Admiral Joseph L.
Nimmich, US Coast Guard, provides a means to multiply the effectiveness of the
focused efforts Admiral Jacoby suggests the intelligence community must pursue.
Sharing what is known and understood with all who are stakeholders in ensuring
maritime security (federal, state and local governments; agencies of foreign gov-
ernments; industry partners; etc.) "empowers each player and fosters unity of ef-
fort in dozens of ways. . . . This enables each to bring the full force of its unique au-
thority, experience and expertise to the overall effort."8
This panel recognized that new kinds of partnerships involving new kinds of in-
teractions will best meet the requirements to see, understand and share knowledge
about the maritime domain and other areas of the global commons. Admiral
Jacoby noted with appreciation the close partnership that has to exist between in-
telligence professionals and legal counsel — a partnership that "must be in place
throughout the intelligence process. It must begin with the development of the
plan and continue throughout the operation. That partnership needs to be part of
the overall plan. It can't be attached at the end if it is to be effective."9 Rear Admiral
Nimmich noted that true awareness and understanding of the maritime domain
will only be achieved through a partnership of many government agencies and
through the dissemination of information between agencies and other stake-
holders.10
Professor Allen also recognized the need for new sorts of partnerships that are
multilateral and interagency, combined and joint, and that involve shared efforts
by all those who have a stake in global maritime security. "The advent of regional
maritime security initiatives and risk-specific approaches like the Proliferation
Security Initiative may portend the new modalities that will replace command and
control approaches."11 But Professor Allen also sounds a cautionary note for legal
professionals who advise maritime strategists and policymakers, particularly when
the strategists advocate unique and undefined concepts such as "command of the
commons." "[C]ommand of the commons advocates must be alert to several key
legal limits on their sea command, control and denial strategies,"12 and it is their le-
gal advisers who must not hesitate to engage and alert them to these limits. Vice
Admiral John G. Morgan, Jr., US Navy, during his remarks, likewise encouraged
the legal professionals to engage actively and aggressively in seeking answers to the
many questions that arise in the maritime context — how to respect claimed
xvi
Jane Gilliland Dalton
exclusive economic zones, how to patrol those zones and determine what activities
are authorized within them, and how to maintain "unfettered" access to the
world's oceans.
In advocating creative partnerships to enable policymakers and security strate-
gists to see, understand and share their knowledge about threats emanating from
the global commons, the moderator and panelists for this first panel all returned
repeatedly to the theme of the two keynote speakers — the imperative that these
complex and global issues must be addressed by striking a balance between com-
peting forces and competing interests. The need for security in the maritime do-
main must be balanced with the need for freedom of movement and action there;
the need for information must be balanced with the impossibility of knowing ev-
erything about such vast areas; and the need for command and control must be
balanced with the need to work cooperatively with others who have interests in
those same areas. As Rear Admiral Nimmich noted during his remarks, what is re-
quired is a change from a "need to know" culture to a "need to share" culture, from
operating on a national basis to operating on a global basis. These challenges will
face those operating in the global commons — the oceans, airspace, outer space and
cyberspace — now and into the future.
Threats from the Global Commons: Closing Gaps and Seams
The second panel of the conference, "Command of the Commons — The Interna-
tional Perspective," carried forward the themes of balance and partnership and
provided an international perspective on how best to close the gaps and seams that
exist in our ability to effectively counter threats from and in the global commons.
Based on a rich discussion of several specific issues, this panel identified a number
of "gaps and seams" in the current legal regime and developed a mosaic of practical
suggestions for those concerned about security in the maritime domain and in the
global commons as a whole.
Professor Stuart Kaye highlighted the considerable legal authorities that nations
have at their disposal to protect their ports, their shipping and their nationals from
attack. He surveyed several recent international conventions and protocols that
have enhanced the authorities available to port, coastal and flag States. Yet he cau-
tioned that "States have yet to create protection for the totality of activities that take
place beyond the territorial sea. Adequate jurisdictional mechanisms to ensure an
effective response to attacks on submarine cables and undersea pipelines do not ex-
ist, nor does it appear there are international efforts in progress to remedy the situ-
ation."13 Professor Kaye's theme is that international law provides States with the
tools necessary to respond to these threats, but States must move cooperatively to
xvn
Preface
actually put in place legal measures designed to protect submarine cables and pipe-
lines from terrorist threats, and to better cooperate in sharing data and intelligence.
Rear Admiral Jorge Balaresque, Chilean Navy (Ret.), and Professor Francisca
Moller offered the Chilean "Mar Presential" as a precedent for the recent US Mari-
time Domain Awareness strategy. Consistent with the United Nations Convention
on the Law of the Sea and freedom of navigation rights on the high seas, the Mar
Presential represents Chile's efforts to protect national interests and take part in
economic activities that contribute to national development. Quoting the Chilean
Defense White Book, these panelists explained that " [t]his concept expresses the will
to be present in this part of the high seas with the aim of projecting maritime inter-
ests regarding the rest of the international community, watch over the environ-
ment, preserve the natural resources, with exact adherence to International Law."14
But they also stress that mere presence is not enough. Like Professor Kaye, they rec-
ommended more multilateral cooperation to create a legal regime that addresses a
particular problem — in this case, a legal regime that would make proliferation of
weapons of mass destruction a global crime, like slavery or piracy.
Professor Yann-huei Song discussed some very encouraging developments in
maritime cooperation by the littoral States of the Strait of Malacca. Since July 2004,
Indonesia, Malaysia and Singapore have launched the Malsindo Coordinated Pa-
trol (MCP) program (routine sea and air patrols by the maritime security organi-
zations of these three States) and "Eyes in the Sky" (air patrols over the Malacca
Strait) to curb piracy and increase security. These, among several other multilateral
and bilateral initiatives, were undertaken in response to the increasing demand
from Malacca Strait user States and the international community for more effec-
tive law enforcement measures to deal with the problem of piracy and possible
maritime terrorist attacks. The tripartite patrol is "an open arrangement with op-
portunities for the international community to participate" and India has offered
to assist.15
Yet there are numerous gaps and seams that require more effective multilateral
cooperation: cross-border hot pursuit, maritime patrols in each other's territorial
seas, and sharing information and intelligence. When considering why those gaps
and seams still exist, it becomes apparent that sovereignty must become an enabler
of security, not a barrier to it. Professor Song quoted the secretary- general of the
International Maritime Organization, who noted in September 2005: "[w]ith re-
gard to the question of security versus sovereignty . . . , while I can understand and
fully respect the sensitivity of any State over the issue, I also believe that, whilst
States have the right of non-interference in their internal affairs, they also have
concurrent responsibilities towards their own people, the international commu-
nity and their international engagements. Whatever the answer to this, there can be
xvin
Jane Gilliland Dalton
no excuse for inactivity, whether the danger is clear and present or perceived as a
future possibility."16
Sovereignty was also a dominant issue in Professor Bakhtiyar Tuzmukhamedov's
analysis of the 2006 Russian Federation law, "On Counteracting Terrorism." "In a
conspicuous departure from the Soviet-era official and doctrinally strict, i.e., nar-
row, interpretation of the right of self-defense, Russian officials have, since 2002,
increasingly been indicating that it might be permissible to use armed force against
extraterritorial sources of imminent threat to Russian security, even in the absence
of an actual armed attack originating from those sources."17 The law appears to be
aimed, at least in part, at potential threats coming from the Pankissi Gorge in Geor-
gia, an area some Russian officials believe to be "an area where Georgian law and
order was nonexistent."18 Professor Tuzmukhamedov analyzed whether the law,
by its terms, contemplates preemptive actions to deal with threats that are not nec-
essarily imminent. Whatever the letter of the law, however, some, such as Defense
Minister Sergey Ivanov, appear to believe the spirit of the law provides sufficient
grounds for "unilateral and preemptive" use of force against terrorist targets on
foreign soil. If that is so, Professor Tuzmukhamedov poses a provocative question:
"As more nations, some of them bearing enormous might, submit that they would
use armed force in self-defense not only to react to an actual attack, but also to pre-
empt imminent assault, or even prevent it from materializing in the future, would
it not give impetus to claims that a customary rule of international law has already
been conceived?"19
Professor Yoram Dinstein, in his remarks, identified computer network attacks
occurring in that part of the commons known as cyberspace as a relatively new
method of warfare and an area that represents a lacuna in the law. A computer net-
work attack does not appear to fulfill the generally accepted requirement that an
"attack" constitute an act of "violence."20 Thus, with respect to the jus ad helium (or
law governing the resort to force), the crucial question is whether a computer net-
work attack by itself can amount to an "armed attack" as contemplated under Arti-
cle 51 of the United Nations Charter. Of course, the Security Council, acting under
Chapter VII of the Charter, can determine that any act, including a computer net-
work attack, constitutes a threat to the peace. However, absent a Security Council
determination, the question arises whether a computer network attack against a
State can trigger a lawful forcible response in individual or collective self-defense
under Article 5 1 .
Yet, in addition to serving as a method to gather intelligence or to blind the en-
emy and otherwise disrupt its communications, a computer network attack can
also produce devastating and deadly effects if a belligerent party gains actual con-
trol of an opponent's computer network (such as by launching the opponent's
xix
Preface
missiles against its own assets, opening the sluices of dams to cause a flood, or even
causing a meltdown of the adversary's nuclear power reactors). Further, identify-
ing the party actually responsible for a computer network attack can be time con-
suming and fraught with difficulties. Hence, responding promptly to such an
attack from an ostensible source is very dangerous, for a terrorist organization
could use a computer network attack — through a third party's computer net-
work— with a view to inducing State A to respond against State B, which is actually
an innocent party.
On the whole, concluded Professor Dinstein, the computer network attack issue
is complex, the possibilities are enormous and international lawyers are decidedly
behind in their study of the full dimensions of this new phenomenon. In truth, the
same could be said about all the gaps and seams identified by these panelists. There
is much work to be done to close them and the lawyers who advise policymakers
and operational experts can play a major role in shaping appropriate solutions.
The Military and the Media: Shaping the Public Debate
The second day of the conference dealt with communications — how best to com-
municate one's legal theories, policies, strategies and goals in these very complex
situations to a public that is accustomed to instant access and instant analysis: how
best to counter a "pithy sound bite" on an issue that requires pages of analysis to
understand and convey. The first panel of the day, "Public Perceptions and the
Law," concluded that public discourse today is marked by "more heat than light."21
Though the panelists differed concerning who bears the greatest responsibility for
creating that equation, they unanimously agreed that all stakeholders have an im-
portant role to play in shaping improvements.
U.S. News & World Report senior writer Linda Robinson commended the mili-
tary for adopting "effective policies that help provide news media with access to the
battlefield, senior officials and other events and voices that merit coverage."22 Pro-
viding more access and information assists the press in producing "better informed
and more in-depth coverage and analysis."23 It is then incumbent upon the media
to conduct the necessary sustained research to enable only the most accurate and
unbiased reporting. Professor Harvey Rishikof looked to the courts to help pierce
the "fog of confusion" on some of these complex legal issues and to strike the nec-
essary balance among leaks, information flow, national security, the First Amend-
ment and the right to know.24 The resolution of some of these contentious issues
will help shape the debate for the future, hopefully in a more calm and studied
manner, and may inform the public more accurately on these complex legal
matters.
xx
jane Gilliland Dalton
Colonel James P. Terry, US Marine Corps (Ret.), called for the military and the
media to work together to find practical solutions to areas of friction in communica-
tion between the two. " [O] ur ultimate quest must be how can we maintain a vibrant,
robust freedom of expression while protecting the nation's capacity to fight our
wars effectively."25 Colonel Terry challenged the media to make a more concerted
effort to understand and to explain the legal issues involved, such as the difference
between "terrorists" and "insurgents," how women and children who participate
actively and directly in support of combat activities themselves become combatants,
and why a civilian family providing safe haven for a terrorist in its home subjects
the home to a loss of protected status.26 As Ms. Robinson pointed out, " [t] he public
policy debate would greatly benefit from more sustained efforts to understand
what is an extremely complicated conflict that has eluded easy answers."27
Professor Robert F. Turner recalled that the Vietnam conflict demonstrated that
it is possible to win every major battle and nevertheless lose a war if the enemy de-
stroys the national will through propaganda, public diplomacy or what Leninists
called "political struggle." Professor Turner, in his remarks, noted that having the
moral high ground is critically important to Americans and their widespread igno-
rance— including that of members of the legal profession — about applicable laws
of armed conflict is a major impediment. The principle that enemy combatants
maybe lawfully detained without charge for the duration of the hostilities is lost on
many. While public and media education about the law of armed conflict (as well
as relevant constitutional and statutory law) is important to this process, it is
equally important that the government and the armed forces strive to obey their ob-
ligations under international law. Public support is crucially important in every sus-
tained conflict and the media is a primary source of information for the public. To
maintain this support, the country needs to have moral authority on its side and,
when mistakes are made, needs to be honest and open and promptly correct them.
The major theme and lesson learned from this first panel on communications
was that all those involved — the media, the judiciary, the government, the armed
forces, the lawyers who advise these organizations and institutions, and the pub-
lic— must make a concerted effort to fully understand the legal issues involved and
to accurately appreciate and convey the full extent of the legal complexities as they
address the issues. Recalling State Department legal adviser John Bellinger's lun-
cheon remarks, it is imperative that all engage in a "more balanced discussion."
Strategic Communications: Converging on a Message
The second panel on this topic, "Challenges of Strategic Communications," very
quickly identified a primary lesson for policymakers, legal advisers and those who
xxi
Preface
conduct operations — the imperative to have a single national process to move with
singular purpose to promulgate a consistent message.
Rear Admiral Frank Thorp IV, US Navy, likened this process to a symphony: ev-
ery element of national power, everything the government says and does, must be
synchronized. The professional communicators alone cannot successfully direct
this process — the policymakers and those who carry out the policy must be in-
volved. Policy and actions must agree, because inconsistency means failure. The
greatest strategic communication challenge, however, is to create good policy in
the first place. The legal community's role is crucial to the success of this effort to
ensure that the policy is legally sustainable and supportable and to ensure that
those who carry out the policy are trained in their legal obligations. Rear Admiral
Thorp identified three objectives essential to a successful communications process
for the Department of Defense. He suggests that the department must: 1 ) create a
"culture of communication" within the department; 2) develop a strategic com-
munication doctrine that defines roles, responsibilities and relationships; and 3)
provide the military services and the combatant commanders with the necessary
resources to enable them to create the processes to properly conduct strategic
communications. Then, the Department of Defense must work with the other el-
ements of national power to coordinate information, themes, plans, programs
and actions.
Professor Gene Bigler concurred that successful strategic communications re-
quire a unified process. He called this process "convergence," which is more than
simply getting all the messages on the same page, but involves insuring the mes-
sages are in harmony with people's expectations about those delivering the
messages.
Thus it is not just that the messages from the White House and DoS and DoD need to
be consistent with those from the presidency, as that these all need to harmonize with
people's expectations about the actions and values that America represents.
Convergence, then, speaks to the coincidence between message and behavior in order
to enable strategic communications to achieve the persuasive capacity or provide the
desirable model. . . .28
Particularly given the complexity of legal issues and lawyerly discourse, Professor
Bigler suggested that the Departments of State and Defense must present a more
balanced and unified message, one that takes into account the audience's capacity
to understand the issues and its expectations of the values for which the United
States stands.
Brigadier General Mari K. Eder, US Army, echoed this sentiment by expressing
concern that too often "the US Government sends 'mixed messages' or fails to
xxii
Jane Gilliland Dalton
clearly and consistently communicate policy."29 Brigadier General Eder repeatedly
stressed the need to forge a more resilient partnership among public affairs profes-
sionals, warfighters, policymakers, even the private sector, to better enable the
United States to communicate its policies quickly and effectively in a way that reso-
nates with the intended audiences. Likewise, Rear Admiral Michael A. Brown, US
Navy, espoused "an agile and coordinated approach both horizontally and verti-
cally through all levels of government. We can no longer focus on single areas of re-
sponsibility— every action or inaction has the potential to be global in nature."30
Rear Admiral Brown also stressed the importance of developing a rapid response
system: "Slow 'official' response damages credibility and undermines what is even-
tually released. We must plan from the beginning with an effects-based model de-
rived from our strategic goals."31
Professor Craig Allen's article in this volume, concerning the conference's first
panel on "Command of the Commons," envisions a worst-case scenario where the
synchronized strategic communications process falls out of sync. In his example, an
ill-advised communications plan, lacking appropriate legal and policy contexts,
could result in unanticipated negative reactions from the international community.
He suggests that just as the US Navy uses war games to analyze the efficacy and viability
of various political and military strategies, so too could war games be used to analyze
whether a strategic communications plan is, in fact, synchronized with a singular pur-
pose to convey a consistent and appropriate message. Decisionmakers could subject
a catchphrase such as "command of the commons" to red-teaming to assist them in
understanding the possible reactions worldwide to such a statement.32 This practical
suggestion, resulting from the dialogue among the conference participants and pan-
elists, demonstrates how the three major topics of the conference are connected and
how lessons learned in one area of global challenge may have benefit for
policymakers and the operational forces responsible for activities in other areas.
Disaster Response: Harmonizing Legal Structures
The fifth and last panel of the conference, "Global Disasters," tackled an area that
itself could dominate an entire conference. The issues involved are so complex, so
urgent and, unfortunately, so intractable that one wonders whether there will ever
be a coherent legal structure capable of meeting the needs of both the disaster-
stricken country and those seeking to provide relief. Many of the themes discussed
in other panels arose again in this context — that assertions of national sovereignty
often prevent effective and rapid response, that unity of command must inevitably
give precedence to unity of effort. The law as an enabler of operations was a com-
mon theme, though more often than not the various legal structures (local,
xxin
Preface
national and international) are not harmonized to optimize the number of lives
saved or amount of suffering relieved. And within the United States and through-
out the international community there is considerable debate whether the military
is the most appropriate organization to provide disaster assistance, for both legal
and policy reasons. This debate is similar to that concerning the proper role of the
military in strategic communications and in "command" of the commons, where
similar legal and policy considerations arise.
Mr. David Fisher, of the International Federation of Red Cross and Red Crescent
Societies, explained that despite the number of international instruments — at the
global, regional and bilateral levels — and important non-binding guidelines, models
and codes, there still is no coherent international disaster relief system. As a result, le-
gal obstacles to the entry and operation of international relief often exist and moni-
toring, coordination and regulation of international aid is generally inadequate.
These problems bedevil not only those seeking to provide relief to underdeveloped
parts of the world but also prevented the delivery of humanitarian aid to the United
States in the aftermath of Hurricane Katrina.33 The island nation of Fiji, however,
proves that progress can be made. After Fiji established a detailed legal and regula-
tory structure for international relief, subsequent disaster operations experienced
few coordination problems.34 Fortunately, international disaster relief is an area
where lawyers can take and are taking the lead to bring coherence to the process.
The International Conference of the Red Cross and Red Crescent is to take up a se-
ries of recommendations on these issues in November 2007 and the United Na-
tions International Law Commission has placed the "protection of persons in nat-
ural disasters" on its long-term program of work.35
Speaking as one whose nation had recently experienced a disaster of global mag-
nitude, Brigadier General Ikram ul Haq of Pakistan reflected on the institutional
and informational vacuums that resulted immediately after the October 2005
earthquake.36 A lesson learned from that experience is that those vacuums could be
more effectively managed if mechanisms were already in place in the form of
peacetime agreements with friends and allies. Such agreements could address not
only the specific capabilities that a particular nation could bring to the relief effort,
but also could establish procedures and schedules for joint mock disaster relief ex-
ercises. Brigadier General ul Haq also suggested that a "multinational forum to
share disaster relief and recovery experiences" would be helpful in enabling nations
who have suffered such disasters to learn through others' experiences.37
Lieutenant Colonel Evan Carlin, Australian Defence Force, observed firsthand
the difficulties in monitoring, coordinating and regulating international relief ef-
forts after the 2004 Boxing Day tsunami in Indonesia. A primary concern of Aus-
tralian, Singaporean and American military relief forces, a concern unfortunately
xxiv
Jane Gilliland Dalton
not shared by all relief providers, was "to ensure that the relief effort was in accor-
dance with Indonesian priorities. . . ."38 "Indonesians knew best what Indonesians
required " stated Lieutenant Colonel Carlin.39 Like Brigadier General ul Haq, he
emphasized the importance of sharing information. Those involved in the relief ef-
forts needed to know "the progress of the mission, road conditions, security con-
cerns, aid priorities, bottlenecks and expectations."40 But an important, and even
greater, challenge was to inform the rest of the world of Indonesian needs, to pre-
vent well-intended but misguided efforts.
Both Captain Kurt Johnson, JAGC, US Navy, and Mr. Gus Coldebella of the US
Department of Homeland Security reinforced the importance of coordination and
cooperation in arriving at practical solutions to pressing problems in a disaster sit-
uation and addressed some of the challenges involved in monitoring, regulating
and coordinating relief efforts. Mr. Coldebella observed that, while the nature and
speed of communications now gives almost all large natural disasters a "global"
character, all disasters are profoundly and basically local. The US approach is for
disasters to be handled in the first instance at the lowest jurisdictional level possi-
ble. The National Response Plan, adopted only eight short months before Hurri-
cane Katrina struck, provides the structure for federal, state and local governments
to work together. Given the plan's adoption date, however, there was little oppor-
tunity for exercises based on the plan before the plan actually had to be imple-
mented in a disaster. Further, Hurricane Katrina caused a situation in which, at
least for a time, there was no state or local apparatus to request, accept and coordi-
nate federal assistance, which caused initial difficulties. But because the National
Response Plan contemplated such a situation, it allowed federal assets to be moved
where needed without waiting for a state request.
Captain Johnson elaborated on a theme first introduced by Secretary McHale
and discussed by other panelists from an international perspective — the proper
role of the military in providing disaster response. His analysis of the various do-
mestic laws involved clarified the careful legal analysis that will be required, based
on the specific facts of each situation, to determine the Department of Defense role
and authorities in the wake of future major natural disasters. He also acknowledged
that challenges attended the acceptance of international assistance, such as medical
credentials for international medical personnel, Department of Agriculture food
regulations concerning food from foreign nations, gift acceptance authority and
rules for the use of force that foreign troops on the ground were to employ.41
The harmonization of legal structures in the disaster relief area will be compli-
cated and time consuming. It will require efforts at the international, national and
local levels, and must be tailored to accommodate the governmental system, cul-
tural mores and social priorities of each country. Lawyers, policymakers and those
xxv
Preface
who carry out the policies should focus on developing coordination and unity of
effort rather than seeking unity of command. The appropriate role of the military
should be addressed, as well as the most effective way to monitor, coordinate and
regulate the provision of aid from the international community. Sovereignty con-
cerns should be proactively harnessed to facilitate the rapid and comprehensive de-
livery of relief, rather than serving as a barrier thereto. In this area of global
challenge the law truly can serve as an enabler of all that is desirable and beneficial
to mankind. Lawyers can, and should, take the lead in this area to guide national
and local leadership to constructive and creative solutions.
Conclusion
There are many people to thank for their roles in bringing this work to fruition.
Foremost are the cosponsors, the financial contributors and the participants in the
conference from which this book is derived. My thanks to Professor Dennis
Mandsager, chairman of the Naval War College's International Law Department,
for his support, counsel and guidance during the planning and coordination of the
panels, the participants and the presentations. This eighty- third volume of the In-
ternational Law Studies series would not have been possible without the constant
and dedicated assistance of Major Michael D. Carsten, US Marine Corps, of the In-
ternational Law Department; Captain Richard J. Grunawalt, JAGC, US Navy
(Ret.); and Captain Ralph Thomas, JAGC, US Navy (Ret.), who shepherded the
publication from first draft to completion and handled the myriad administrative
details involved in publishing a work of this caliber. Thanks also to the unsung, but
always outstanding, efforts of Ms. Susan Meyer in Desktop Publishing, and the in-
credible proofreading from Susan Farley, Albert F. Fassbender III and Heather M.
Lightner, and publication support from Ms. Valerie Butler. It is only due to these
individuals' efforts that the International Law Department is able to bring you this
volume. However, there are sure to be errors, and these are my responsibility alone.
Finally, a special note of thanks to my husband, Harvey, who enthusiastically en-
couraged me to serve as the Stockton Professor of International Law, though it
meant yet another Navy "geo-bachelor" tour, and to former Stockton Professor
Howard Levie — whose clarity of legal thought and writing continue to inspire all
who work in this area of international law.
Notes
1. McHale, infra, at 7.
2. Bellinger, infra, at 209.
xxvi
Jane Gilliland Dalton
3. Id. at 208.
4. McHale, infra, at 16.
5. Allen, infra, at 32.
6. There is no generally accepted definition of the "global commons." The negotiators of
the United Nations Convention on the Law of the Sea frequently used the phrase to denote those
areas of the oceans and seabed beyond the jurisdiction of any nation. Today, the phrase is often
extended to encompass space, cyberspace, and even "ungoverned spaces" such as Somalia and
the Pankissi Gorge in Georgia. See, e.g., Jacoby, infra, at 52, and Tuzmukhamedov, infra, at 84. In
his prepared remarks, Vice Admiral Morgan suggested that even the global economy could be
considered a part of the global commons in that today's world order is economy based and "one
of the greatest dangers that the world faces right now is the collapse of the global economy." The
concept of "command of the commons" has recently surfaced in some US doctrinal discussions.
See, e.g., Allen, infra, at 30-33. Because at first glance the phrase appears to be inconsistent with
traditional notions of freedom of the seas and sea lanes of communication, the organizers of this
conference chose the topic to prompt debate and facilitate discussion concerning how one goes
about protecting against threats emanating from the global commons.
7. Jacoby, infra, at 53.
8. Nimmich & Goward, infra, at 62.
9. Jacoby, infra, at 55.
10. Nimmich & Goward, infra, at 63.
11. Allen, infra, at 32.
12. Id. at 3 4.
13. Kaye, infra, at 77.
14. Moller & Balaresque, infra, at 164.
15. Song, infra, at 125.
16. Mat 128.
17. Tuzmukhamedov, infra, at 84.
18. Id.
19. See id. at 90.
20. See, e.g., Article 48, 1977 Geneva Protocol I Additional to the Geneva Conventions of 12
August 1949, and Relating to the Protection of Victims of International Armed Conflicts ("At-
tack means acts of violence against the adversary, whether in offence or in defence.")
21. Robinson, infra, at 198.
22. Mat 200.
23. Id.
24. Rishikof, infra, at 185.
25. Terry, infra, at 188.
26. Id. at 194.
27. Robinson, infra, at 200.
28. Bigler, infra, at 225.
29. Eder, infra, at 236.
30. Brown, infra, at 251.
31. Mat 252.
32. Allen, infra, at 37.
33. Fisher, infra, at 302.
34. Mat 306.
35. Id. at 310.
36. ul Haq, infra, at 258.
xxvii
Preface
37. Mat 265.
38. Carlin, infra, at 271.
39. Id.
40. Id.
41. Johnson, infra, at 288.
XXVlll
PARTI
KEYNOTE ADDRESS
I
Domestic Security and Maintenance of Liberty:
Striking the Balance
Paul McHale*
Introduction
We have seen extraordinary changes in the role of the military within do-
mestic American society since September 11, 2001. The National De-
fense Authorization Act of 2003 created the office that I now hold. The statutory
mission assigned to the assistant secretary of defense for homeland defense was —
and is — to supervise all of the homeland defense activities of the Department of
Defense. In short, to supervise the domestic role of the US military, to include both
the warfighting defense of the United States and the consequence management ac-
tivities of the Department of Defense when providing support to civilian authori-
ties. That is a sobering mission. It reflects the intent of Congress to bring a special
geographic focus to the department that reflects the paramount security consider-
ations associated with the immediate defense of the American people. It is a mis-
sion that sobers me every morning.
Constitutional Principles
When I was asked to take this position I thought seriously about the role of the mil-
itary within domestic society, the historic and statutory constraints upon that role
and the appropriate opportunity within the boundaries of those constraints for the
* Assistant Secretary of Defense for Homeland Defense.
Domestic Security and Maintenance of Liberty: Striking the Balance
US armed forces to make a contribution to the physical security of the American
people. It required me to re-examine some first principles of constitutional gov-
ernment and the effective protection of civilian democratic principles so deeply
embedded in our US Constitution.
With that as motivation, I returned to the Federalist papers. I served three terms
in the House of Representatives in the 1990s. When I left the House, I decided to
read the Federalist papers in their entirety. Like many political science majors, I
had read portions — Federalist 10 and Federalist 51 — but I had never read all
eighty-five from beginning to end.
I think most of you participating in this conference are familiar to at least some
degree with the Federalist papers. For those of you in the international community
who may not be familiar with them, just let me briefly set the stage. Over the sum-
mer of 1787 the Constitution of the United States was written in the city of Phila-
delphia. The framers of the Constitution finished their work in September 1787.
Then the question became whether or not the required nine of the original thirteen
states would ratify the framers' work. As in any political context there was serious
debate, on this occasion between the federalists and the anti- federalists. That de-
bate was carried on in the newspapers of the day. Between the time of the comple-
tion of the draft and the ultimate ratification of the Constitution, Alexander
Hamilton, James Madison and John Jay — principally Hamilton and Madison —
wrote eighty-five op-ed pieces. Those commentaries were ultimately bound to-
gether into the published work that we know today as The Federalist}
There are legal scholars who believe that The Federalist may be the finest work
of legal literature ever written in the English language. A few years ago Professor
Bernard Schwartz, Chapman Distinguished Professor of Law at the University of
Tulsa, came up with his list of the top ten legal books ever written in the English
language; at the top of the list was The Federalist.2 I'm not sure that I would go that
far, but I knew when I retired from Congress I wanted to read the Federalist papers.
I knew that the only way in which I would have the discipline to do so would be if I
volunteered to teach a course on the Federalist papers at one of the colleges in my
hometown. So I returned to Pennsylvania and taught a course on the Federalist pa-
pers for a year or so staying about three papers ahead of the students and develop-
ing my expertise in explaining their meaning.
Federalist Paper No. 8 talks with specificity about the role of the military within
the borders of our nation; it is a cautionary message. When I first read Alexander
Hamilton's words I thought they were an anachronism. He was concerned that the
role of the military would become too intrusive within domestic American society.
He feared that if that role were to be too powerful the character of our nation and
Paul McHale
the core principles of the Constitution would be adversely affected. Those fears
were expressed in the following words (to which I have added my own thoughts):
Safety from external danger is the most powerful director of national conduct. Even the
ardent love of liberty will, after a time, give way to its dictates. The violent destruction
of life and property incident to war [think September 11], the continual effort and
alarm attendant on a state of continual danger [think al-Qaeda], will compel nations
the most attached to liberty to resort for repose and security to institutions which have
a tendency to destroy their civil and political rights. To be more safe, they at length
become willing to run the risk of being less free.3
Later in Federalist 8 he talks very specifically about the US military in a manner
that, I think, was prescient. When I studied government in college and first looked
at the Federalist papers and first considered the role of the military, I knew there
was concern among our founders related to a large standing army. The implication
was that a large standing army would by brute force impose military values upon a
civilian government and a republican Constitution. The force of arms would be
seen as the danger.
That is not the rationale of Federalist 8 — it's much more sophisticated, much
more nuanced. It is not about brute force; it is about the choice to sacrifice liberty
in order to achieve security. Hamilton wrote about nations that are internally se-
cure from external attack, as opposed to nations which remain internally subject to
foreign attack; again think al-Qaeda. The twenty-first-century reality, at least from
our perspective within the Department of Defense, is that the United States is now
an inherent, integrated element of a global battlespace from the vantage point of
transnational terrorists.4 Indeed, I think it could be argued successfully that, from
the terrorist standpoint, we are the pre-eminent element of that battlespace. Their
intent is not to achieve victory through a war of attrition but to bring brutality into
the internal confines of the United States. By bringing death and destruction to our
citizens, they believe they can affect our political will. Well short of success in terms
of attrition, they believe they can shape our political conscious by acts of brutality
and if they can succeed in engaging in such acts within the United States they will
have achieved pre-eminent success.
Alexander Hamilton wrote of nations that must fear that kind of internal attack
versus those that are relatively secure within a domestic setting. Let me take those
in reverse order the way Hamilton did. He wrote, a[t]here is a wide difference . . .
between military establishments in a country seldom exposed by its situation to in-
ternal invasions. . . ."5 A recent example of such a country would be the United
States during the Cold War when there was little danger of attack upon our terri-
tory. In this, the first case, the civil state remains in full vigor:
Domestic Security and Maintenance of Liberty: Striking the Balance
The smallness of the army renders the natural strength of the community an
overmatch for it; and the citizens, not habituated to look up to the military power for
protection, or to submit to its oppressions, neither love nor fear the soldiery; they view
them with a spirit of jealous acquiescence in a necessary evil. . . .6
Hamilton then goes on to address, by contrast, the state of a nation that is "often
subject to them [internal invasions], and always apprehensive of them."7 Since
September 11, 2001 we in the United States, on a daily basis, remain uncertain as a
matter of harsh reality as to when and under what circumstances our transnational
terrorist adversaries might again strike us internally. Three thousand people were
killed on our own soil on September 1 1th. Another attack could conceivably occur
tomorrow so we remain subject to that continuing threat. Describing a nation in
that circumstance, Hamilton wrote (again with the insertion of my thoughts):
In a country, in the predicament last described, the contrary of all this happens. The
perpetual menacings of danger [al-Qaeda] oblige the government to be always
prepared to repel it. . . . The continual necessity for their services enhances the
importance of the soldier, and proportionably degrades the condition of the citizen.
The military state becomes elevated above the civil. The inhabitants ... are unavoidably
subjected to frequent infringements on their rights, which serve to weaken their sense
of those rights; and by degrees, the people are brought to consider the soldiery not only
as their protectors, but as their superiors. The transition from this disposition to that of
> considering them as masters, is neither remote, nor difficult. But it is very difficult to
prevail upon a people under such impressions, to make a bold, or effectual resistance,
to usurpations, supported by the military power.8
Hamilton's concern was that if we allowed ourselves to get to the point where we
were disproportionately dependent upon the military for internal security then we
in the military would become the saviors of society and citizens would no longer
trust civilian government to provide for their physical security. The citizenry
would conclude, perhaps correctly, that only the military could provide for its in-
ternal security. Once that recognition occurred, the military would be seen as the
masters and, ultimately, the leaders and superiors of society. In short, not brute
force but rather the voluntary relinquishment of the civilian character of our gov-
ernment would raise the role of the military disproportionately and ultimately
threaten the civilian character of our Constitution. It would not be by force but by
choice that the character of our nation would change because of the core mistake of
allowing a disproportionate dependence upon military power for internal security,
rather than a core dependence upon civilian law enforcement and civilian capabili-
ties to guarantee that same security.
Paul McHale
Striking the Balance
Those were sobering thoughts for me when I was nominated for the position in
which I now serve and those have remained sobering thoughts guiding me and
many others with whom I work. On a daily basis we consider the roles of the mili-
tary and civilian government and civilian capabilities when achieving security
within our own borders. Obviously when we begin to address national security is-
sues in terms of power projection and the ability to take the fight to the enemy
overseas, the role of the military historically has been dominant. In my judgment
that is correct. When we seek out terrorists and their supporters in places like Af-
ghanistan and Iraq, men and women in military uniform are at the vanguard of our
nation's effort to achieve physical security. We send men and women in the armed
forces forward in a lead role to engage the enemy and defeat such enemy attacks.
But within our own country, it remains an issue of constant, sobering judgment to
remain loyal and committed to the preservation of the civilian character of our
government and the democratic nature of our Constitution, and, within that bal-
ance, properly employ the military in a manner that will enhance our security,
while ensuring it remains ultimately subordinate to clear and decisive civilian au-
thority, which in turn will ensure the civilian character of our government. That is
the nature of the challenge. There are many things we can do with military power
within our own borders in order to achieve the security of the American people
while not endangering the civilian character of our Constitution. But that is a
continuing issue of sober assessment. We ought not blindly commit military
forces to missions that should remain inherently civilian in character. If we use
the military within our own borders for every mission that the military in theory
could achieve, we will, in fact, tip the balance towards security and pay a price in
terms of liberty.
Thus, the question becomes how do you strike that balance? The remainder of
my remarks will touch upon certain specific areas of operational activity where
there are significant legal implications. But as I go through these challenges, both
operational and legal, in each and every case I urge you to consider them in the
continuing context of that balance between security and liberty and between the
role of the military and the role of civilian government within the boundaries of
domestic American society. Underlying the determination of that balance is the
overarching requirement that those roles be consistent with the civilian core prin-
ciples of the US Constitution.
Domestic Security and Maintenance of Liberty: Striking the Balance
Homeland Security
It became operationally clear — indeed it was instinctively obvious — that in light of
the attack we had experienced on September 1 1th there was a need for enhanced
physical security within the borders of our nation; the enemy had struck and might
do so again. The Department of Defense, acting with operational prudence, created
rapid reaction forces that could act within our own country. US Army and Marine
Corps forces, in a classified number, were placed on alert for potential domestic de-
ployment of military force in order to defeat a follow-on al-Qaeda attack. It was
clear that having struck us once the enemy might strike us again and that there was
a role for military power in defeating such a foreign attack on our soil.
When I was confirmed as assistant secretary of defense for homeland defense
and began to exercise the responsibilities and authority of supervising the home-
land defense activities of the Department of Defense, I determined that having
rapid reaction Army and Marine Corps ground forces on alert for domestic de-
ployment was a reasonable course of action. But as a lawyer I asked myself, "Is that
constitutional?" Is the ground deployment of US Army forces consistent with the
Posse Comitatus Act of 1878?9 How do we deploy soldiers on our own soil in a
mariner consistent with the Constitution when to do so may potentially conflict
with the posse comitatus statute?10 How do we reconcile the need to defend against
another potential al-Qaeda attack with the Constitution and the law?
I know there are individuals in the audience today from a nation- State that is
today an extremely close friend and ally of the United States. But in 1812 that nation-
State — I am not going to say which one — deployed ground forces to the United
States. Those ground forces left, shall we say, a lasting impact upon the Capitol
of our nation. While those forces were en route to the capital, US Marines were
employed at Bladensburg, Maryland to defend against that attack. We were not
quite as successful as we hoped we would be, but we utilized US military forces to
defend our own soil under the same Constitution with which we live today
against a foreign attack in order to save American lives and defend American
property.
The Constitution has not fundamentally changed in that regard. Article 2 of the
Constitution provides "The President shall be commander in chief of the Army and
Navy of the United States. . . ."u That executive power remains essentially the same
today as it was 1814 when the defense of the capital occurred. As I thought it through,
I turned to the US Army's Domestic Operational Law Handbook where I read about
the Military Purpose Doctrine.12 The Military Purpose Doctrine states that the Posse
Comitatus Act does not apply to those missions which are being executed primar-
ily for a military purpose. The use of force for purposes other than arrest, search
8
Paul McHale
and seizure is not proscribed by posse comitatus. When those Marines were de-
ployed in Bladensburg in 1814 they weren't there to arrest anybody and when we
established quick reaction forces in the wake of September 11th the purpose was
not law enforcement but warfighting on our own soil as it had taken place during
the War of 1 8 1 2 and, some would argue, as Lincoln exercised that power during the
Civil War. It was not that the power was not there; it was that we had not used it on
our own soil for a military purpose in quite a long time. But I personally concluded
that the Military Purpose Doctrine allows us to have Army units on alert — and we
continue to have them on alert — prepared for ground deployment within the
United States to defend, for instance, critical infrastructure, perhaps a nuclear
power plant, against a transnational terrorist threat.
We do not anticipate, however, that the first several layers of our defense against
a foreign attack on our own soil would be military in character. We emphasize that
the primary dependence is upon civilian law enforcement. But if federal, state and
local law enforcement authorities and ultimately the National Guard cannot physi-
cally defend American citizens against a foreign threat on our soil, under the Mili-
tary Purpose Doctrine and consistent with the Posse Comitatus Act, we do have
quick reaction forces ready to be deployed, not for purposes of law enforcement,
but for purposes of warfighting under Article 2 of the Constitution in defense of
the American people.
Responding to Natural Disasters
Having considered and addressed the use of military forces for defensive purposes,
we then encountered the issue of the utilization of US military capabilities within
US borders in the event of a natural disaster. Hurricane Katrina emphasized the
challenges associated not with warfighting but the statutory authority related to in-
cident management. Arguably the worst natural disaster in American history took
place on August 29, 2005 when Hurricane Katrina came ashore along the Gulf
Coast. Nearly two thousand lives were lost; the damage is measured in the billions
of dollars. The performance of the US military in response to what were truly hor-
rific circumstances was by most accounts superbly competent. That is not to say
that the response to catastrophic events cannot be improved upon, but the simple
fact is that the military response to Hurricane Katrina was arguably the largest, fast-
est deployment of military capabilities in US history. Between August 29 and Sep-
tember 10, the United States deployed seventy- two thousand military personnel —
fifty thousand National Guardsmen, twenty-two thousand active duty — to the
Gulf Coast to provide humanitarian relief. Out of that military response came, I
believe, a significant respect for military capabilities, while simultaneously fairly
Domestic Security and Maintenance of Liberty: Striking the Balance
harsh criticism was being directed, often with justification, towards some civilian
response authorities.
The discussion began immediately thereafter as to the appropriate role of the
military in response to a catastrophic natural event. The Stafford Act13 and the
Economy Act,14 as well as other provisions of statutory law, provide the Depart-
ment of Defense authority to assist a lead civilian agency in responding to a natural
disaster or a man-made event. The issue then becomes: if the military does well in
such circumstances, why not put the military in charge? That, again, raises some of
the issues that were first raised in Federalist 8. President Bush sparked serious and
thoughtful discussion on that issue in a way that I think he consciously intended.
We were able to think through both the opportunities and the challenges associ-
ated with the use of military capabilities in providing such a response. There was
discussion in the media and at senior levels of government with regard to the possi-
bility of designating the Department of Defense as the lead federal agency replac-
ing, at least on a temporary basis, the Department of Homeland Security in
providing a federal response to a disaster. Then the lawyers got into the act.
I have learned something from the Department of Justice with regard to the
scope of the executive power under Article 2 of the Constitution and frankly it sur-
prised me; it might not have surprised Hamilton and Madison but it surprised me.
The Department of Justice in a series of opinions, the most fundamental of which
goes back to 2002, concluded that when the Congress of the United States assigns a
certain responsibility by statute to a particular cabinet-level department, the presi-
dent lacks the authority thereafter to re-delegate that responsibility from the desig-
nated agency to another. That theory of law came into play in preliminary analyses
of the issue of whether or not the authorities assigned to the Department of Home-
land Security under the Homeland Security Act of 2002 15 could be re-delegated by
the president to the Department of Defense. Some very thoughtful legal scholars,
including some within the Department of Justice, concluded that the president
could not do that.
The Department of Homeland Security has been uniquely and specifically as-
signed the responsibility as the lead federal agency in responding to catastrophic
events and in consequence management related to disasters. Whether or not it
makes operational sense to reassign that responsibility, because Congress had spo-
ken on the issue, in the absence of follow-on congressional reconsideration of the
Homeland Security Act of 2002, it would appear, at least for the time being, that by
law the lead federal agency in responding to natural disasters must remain the De-
partment of Homeland Security.
As lawyers I ask you to consider what a profound impact the law and your pro-
fession had on a significant public policy debate. The outcome of that debate, at
10
Paul McHale
least in the first phase, was conclusively determined by legal analysis. That doesn't
close the door on a more robust military role, but it means that that military role
will remain, at least under current law, subordinate to a lead federal agency which
is civilian in character. Whether or not one would agree with him, I suspect Alex-
ander Hamilton would feel pretty good about that result.
The position of the Office of General Counsel of the Department of Defense is
that we do not need to amend the Posse Comitatus Act of 1878. The Defense De-
partment has concluded the act does not impede in any significant way the military
missions that the Department of Defense has been assigned to execute nor does the
act present an unreasonable impediment to foreseeable military missions within
the United States. Senator Warner and others have, from time to time, said as a
matter of due diligence and prudence that a statute drafted in the Reconstruction
era perhaps ought to be re-examined for its continued utility in the vastly different
context of transnational terrorism of the twenty-first century.
I believe without question the terminology of the Posse Comitatus Act is out of
date. We found ourselves, for instance, in the aftermath of Katrina dealing with
civil disorder on the streets of New Orleans. If we were to experience a terrorist at-
tack involving a weapon of mass destruction, it is entirely possible that the social
chaos inevitably associated with such a catastrophic event would generate substan-
tial civil disorder. In those circumstances, it might well be that the principles of the
Posse Comitatus Act would come into play in terms of the use of Title 10 active-
duty military personnel in providing immediate protection of constitutional rights
and enforcement of federal statutes in circumstances where, for a limited period of
time, civilian law enforcement authorities found themselves incapable of guaran-
teeing those constitutional rights or enforcing those federal statutes.
Counterterrorism
It is those circumstances that authorize the federalization of the National Guard
and the use of the armed forces under the Insurrection Act of 1807. 16 But when we
examine transnational terrorism in the context of the Insurrection Act, we are not
really dealing with an insurrection as that act defines it. At a minimum, we need to
re-examine the archaic terminology of the Insurrection and the Posse Comitatus
acts in order to ensure that their language remains consistent with the character of
the threat that we face in the twenty-first century. The Defense Department's posi-
tion has been that the Posse Comitatus Act does not need to be substantively
amended, but that the terminology of both the Posse Comitatus and the Insurrec-
tion acts should be reconsidered in order to ensure the principles of law reflected in
those statutes remain relevant to the twenty-first-century threat.
11
Domestic Security and Maintenance of Liberty: Striking the Balance
Can we use the National Guard for domestic counterterrorism missions in
support of civilian law enforcement? I am not certain the law is clear on that
point. That too must be examined, probably by legislative authorities. Congress
about a year ago amended the law to provide that a joint task force (JTF) engaged
in counter-narcotic activities, typically along the borders of the United States,
could engage in counterterrorism activities domestically in support of civilian
law enforcement. It was a very brief amendment to the law. With virtually no
legislative history, we are still trying to figure out the legislative intent reflected
in that statutory change, but the law now provides that Title 10 active-duty mil-
itary forces, like JTF North in El Paso, Texas, may engage in counterterrorism
activity in support of civilian law enforcement authorities. There is no analo-
gous provision of law empowering the National Guard to engage in similar mis-
sions. As a result, we now have a disparity in the law in which Title 10 forces may
take on such counterterrorism missions, but National Guard forces may not,
even though they may be colocated.
In the absence of other specific legislation, we find ourselves straining, under
pre-existing authorities not particularly well suited to counterterrorism missions,
to shoehorn what are at least in appearance and perhaps in substance counter-
terrorism activities into other statutory authority. What I suggest needs to be un-
dertaken, in a sober, serious and deliberative manner, is an effort to better define the
counterterrorism mission assigned to Title 10 joint task forces and the parallel au-
thority, if any, granted to the National Guard to also engage in counterterrorism
activities in support of civilian law enforcement.
Intelligence Support
Another issue that I'm going to be unable to resolve in my remarks, but want to
pose for your consideration, is intelligence support for domestic uses of the armed
forces. When military forces are used within our own borders for certain
warfighting, counterterrorism and force protection missions, there is a require-
ment for intelligence, as is the case for all military missions. I suspect when those
Marines defended against those unnamed invading forces at Bladensburg in 1814
they had military intelligence requirements, such as: Where are the enemy forces?
By what means are they moving towards our positions? How many are there and
how are they equipped? In short, the information needed to better anticipate and
respond to the enemy attack.
That requirement is as necessary today as it was then. As we look at the domestic
warfighting responsibilities of both the Title 10 military forces and, under the re-
cent statutory amendment to Title 32, the National Guard, the question arises,
12
Paul McHale
how, consistent with the civilian character of our government and the preservation
of domestic civil liberties, do we acquire the intelligence information necessary to
support our domestic military missions? There is no easy answer to that question
and determining the answer will require sober judgment. We in the military see
ourselves as consumers, not collectors, of domestic intelligence. I believe the law
sees us as consumers as well. There are provisions of the law, very tightly con-
strained, that do allow certain military units, such as counterterrorism units, mili-
tary intelligence units and general utility forces, to collect intelligence domestically.
But, for reasons that are obvious and fundamental to the character of our nation,
the role of the military in collecting domestic intelligence is very tightly and, in my
judgment, appropriately constrained.
The military has statutory authority to collect domestic intelligence that relates
to anti-terrorism force protection. Our terrorist adversaries do see, as indicated
earlier, the United States as a part of the global battlespace. In the context of the
past precedent of the September 1 1 attacks and a continuing threat of domestic at-
tack, anti-terrorism force protection requirements for the military have been
heightened as a military mission as a matter of immediacy.
The question to be considered is, given the force protection mission of conduct-
ing an active defense against the transnational terrorist threat within our borders
and given the parameters of existing statutory authority that allow us to collect in-
telligence domestically for such a purpose, how do we bring to that framework an
appropriate degree of clarity and detail that both enables the successful intelligence
support of those military missions, while avoiding an intrusive and improper en-
gagement in domestic intelligence collection activities by military forces? It is part
of the balance that I addressed earlier. It is a balance that is subject to continuing as-
sessment because of the nature of the threat that we now face domestically and the
role of the military in defending against that threat.
Employment of Non-lethal Weapons
In response to Hurricane Katrina we deployed for either active or contingent
military missions about fifteen thousand security personnel. Most of those military
personnel were deployed to the New Orleans area. You may recall that about four
or five days after Katrina came ashore, the president deployed twenty-two thou-
sand Title 10 military forces on a humanitarian mission. They were there in con-
formity with the Posse Comitatus Act and also available for service in anticipation
of invocation of the Insurrection Act if civil disorder had continued within New
Orleans. The soldiers from the Army's 82nd Airborne and 1st Calvary divisions
and Marines from the 1st and 2nd Marine divisions deployed to New Orleans for a
13
Domestic Security and Maintenance of Liberty: Striking the Balance
humanitarian mission. But they also established a military presence and were avail-
able, subject to presidential authority, for security missions if the president had
chosen to invoke the Insurrection Act. In addition, we used seven thousand Na-
tional Guard forces, which were not subject to the Posse Comitatus Act, in direct
law enforcement roles, including over four thousand National Guard military po-
lice who actively and lawfully engaged in law enforcement-related activities.
Fifteen thousand men and women in uniform were deployed in the aftermath of
Hurricane Katrina into an area of civil disorder, either directly engaged in security
missions or potentially engaged in such missions. They were neither trained in the
use of nor equipped with non-lethal weapons. In my judgment that was a mistake
and we need to learn from that experience. Imagine, if you will, a need to respond
to a larger catastrophic event, perhaps a terrorist attack involving weapons of mass
destruction, where loss of life and physical devastation might be far worse than
what we experienced during the very difficult and tragic days of Hurricane Katrina.
We could and should anticipate that, in the context of related civil disorder, the
military may have a role to play and that role might include the use of lethal force.
But, again in my judgment, we should not limit the range of options available to
our military commanders. Commanders on the ground should have the flexibility
to restore civil order, protect constitutional rights and preserve federal statutory
authority with a proportionate degree of force which, in their determinations,
would be sufficient to fulfill mission requirements. The choice should not be pas-
sivity versus lethality. We have non-lethal weapons in our inventory that would be
sufficient in many circumstances to maintain or restore civil order without neces-
sarily threatening the actual loss of life.
Certainly the legal issues associated with that are profound. If we deploy sol-
diers on our own streets in a catastrophic circumstance reflecting a character of
civil disorder and if we do execute such a deployment for the purpose of preserving
constitutional rights, equal protection of the law for instance, and enforcing other
statutory authorities, what legal authority should be provided? What liability pro-
visions should be enacted in order to ensure the proper employment of such non-
lethal capabilities?
I spoke earlier about critical infrastructure protection. If we use military
forces to protect critical infrastructure such as nuclear power plants against po-
tential al-Qaeda attacks, we have non-lethal capabilities those forces can employ
that are very high tech in character. Some of those capabilities are quite well devel-
oped in terms of technology — microwave beams for instance — and can be used
without risking the loss of life. Defending domestic critical infrastructure under
the same circumstances with rifles and machine guns would pose obvious risks to
the surrounding civilian community. But what are the public policy issues related
14
Paul McHale
to use of non-lethal weapon systems? What are the legal issues? What liability ques-
tions are created? What if we were to use interlocking microwave beams to defend a
nuclear power plant as a humane alternative to the use of deadly force, such as
Ml 6s and .50 caliber machine guns?
Non-lethal weapon systems certainly have the potential to effectively defend
critical infrastructure. Lives, including innocent lives in the surrounding commu-
nities, could be saved through the use of such systems. But it is almost inevitable
that an innocent person would be struck by a microwave beam. It seems preferable
to me to be struck by a beam as opposed to a bullet from an Ml 6, but what are the
liability issues? What are the public policy questions that need to be examined? As
with so many of the questions involving the domestic use of military forces, inte-
gration of non-lethal weapons into use-of- force capabilities must be preceded by
public debate and legislative deliberation. In that way we can develop a legal frame-
work that properly supports the domestic use of non-lethal weapons as a humane
alternative to lethal force.
Who's in Charge?
The Hurricane Katrina experience witnessed multiple layers of local, state and fed-
eral government authorities (civilian and military) involved in the response with-
out clarity of intent and perhaps with some insensitivity to constitutional history. I
therefore ask the rather straightforward question, "Who's in charge?" I know there
are individuals in this audience from Israel. In Israel the answer to "who's in
charge" in responding to a disaster is pretty clear — it's the Israeli Defence Force
(IDF). When disaster occurs, the on-scene IDF commander is in charge.
I spent some time with the Home Front Command in Israel and have some fa-
miliarity with the system of government in Israel. It is a system that is not funda-
mentally federal in character.
Looking back to the historic events of 1 787, it is clear that our founders created a
more complex web of authorities that is consciously embedded and carefully inte-
grated into the US Constitution. Ours is a system of checks and balances, which
sounds pretty good until you have to mount an effective response to a catastrophic
event. The theory of our Constitution — the wonderful theory of our Constitu-
tion— is that we preserve liberty through competition. We decentralize power
throughout the federal government. But by federal I also mean the federal charac-
ter of our government, which includes not just the national government but the
fifty state and thousands and thousands of local governments. We defuse power in
order to have a system of checks and balances. We have a Constitution that created
three equal branches of government so that no one branch of government would
15
Domestic Security and Maintenance of Liberty: Striking the Balance
become too powerful and we gave certain powers to the national government and
reserved the remainder to the states.
We have provisions in the Constitution, including the Tenth Amendment,
guaranteeing certain authorities to the states, and others from the states to local
government. So we recognize — at least I recognize — that if we are to remain con-
sistent with the Constitution, the issue is really not "who's in charge." Under our
Constitution, we will never have absolute unity of command. Our founders in their
wisdom didn't want that. They dispersed power in a decentralized manner
throughout the various levels and branches of government. So our challenge is not
to achieve unity of command; our challenge is to achieve, in military terminology,
unity of effort within that system of decentralized authority, those checks and bal-
ances created by our founders. That requires very close coordination and detailed,
integrated planning among all levels of government and between civilian authori-
ties and military forces.
H.L. Mencken once said that for every complex problem, there is a solution that
is simple, neat and wrong. There is no simple solution consistent with a Constitu-
tion of checks and balances. It requires hard work, integrated planning, a common
understanding of the threat environment and careful consideration of foreseeable
missions in advance of a crisis so that in the context of checks and balances we
nonetheless achieve a unity of effort.
Conclusion
Forgive me for going on at such length, but I wanted to give you some sense of both
the complexity of the issues and the seriousness and purpose that have been
brought to those issues since September 11, 2001. We know that the US military
has a tremendous ability to provide for the physical security of the American peo-
ple, including the contingent missions related to domestic warfighting against for-
eign adversaries on our own soil if civilian law enforcement authorities are not
capable of meeting the perceived or very real threat. And, as was obvious in Hurri-
cane Katrina, we in the Department of Defense have a very important role to play
in providing consequence management capabilities to augment and reinforce ci-
vilian authorities. But in the overall context of enhanced core missions evolving for
the military domestically in the twenty- first century, we have not forgotten the
cautionary words of Federalist 8. The achievement of security while maintaining
our liberty remains our fundamental commitment and our core responsibility.
16
Paul McHale
Notes
1. Alexander Hamilton, James Madison & John Jay, The Federalist (Terence Ball
ed., Cambridge University Press 2003) (1788).
2. BERNARD SCHWARTZ, A BOOK OF LEGAL LISTS: THE BEST AND THE WORST IN AMERI-
CAN LAW (1997).
3. Alexander Hamilton, The Consequences of Hostilities Between the States, Federalist Paper
No. 8, NEW YORK PACKET, Nov. 20, 1787, reprinted in HAMILTON ET AL., supra note 1, at 31,
available at http://www.conservativetruth.org/library/fed08.html [hereinafter Federalist Paper
No. 8].
4. See Department of Defense, Strategy for Homeland Defense and Civil Support 7 (2005),
available at http://www.defenselink.mil/news/Jun2005/d20050630homeland.pdf.
5. Federalist Paper No. 8, supra note 3, at 33.
6. Id.
7. Id.
8. Id. at 33-34.
9. Act of June 18, 1878, ch. 263, 20 Stat. 145.
10. Use of the Army and Air Force as posse comitatus, 18 US Code sec. 1385 (2000), avail-
able at http://www2.law.cornell.edu/uscode/uscodel8/usc_sec_18_00001385 000-.html.
1 1. US Constitution, art. II, sec 2.
12. Now set forth in the Center for Law and Military Operations, Domestic Operational Law
(DOPLAW) Handbook for Judge Advocates 24-25 (2005).
13. Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 US Code sec. 5121—
5206 (2000), available at http://www.disastersrus.org/FEMA/Stafact.htm.
14. Economy Act, 31 US Code sec. 1535 (2006), available at http://frwebgate.access.gpo
.gov/cgi-bin/getdoc.cgi?dbname=browse_usc&docid=Cite:+31 USC 1535.
15. Homeland Security Act of 2002, Pub. L. No. 107-296, 116 Stat. 2135 (codified as
amended in various sections of 5, 6, 18, 44, and 49 US Code), available at http://frwebgate.access
.gpo.gov/cgi-bin/getdoc.cgi?dbname=107_cong_public_laws&docid=f:publ296. 107.pdf.
16. Insurrection Act of 1807, ch. 39, 2 Stat. 443 (current version at 10 US Code sec. 331-335
(2000)), available at http://www4.law.cornell.edu/uscode/html/uscodel0/usc_sup_01_10_10
A 20 I 30 15.html.
17
PART II
COMMAND OF THE COMMONS
THE US PERSPECTIVE
II
Command of the Commons Boasts:
An Invitation to Lawfare?
Craig H. Allen*
Roll on thou deep and dark blue ocean — roll!
Ten thousand fleets sweep over thee in vain
Man marks the earth with ruin — his control
Stops with the shore
Lord Byron, Childe Haroldes Pilgrimage1
Introduction
Lord Byron's humble respect for the sea contrasts sharply with the commonly
held view of the tenth-century Danish King Canute. Canute is often (mistak-
enly) said to have believed that he could hold back the incoming tide by dint of
royal will.2 To silence a group of courtiers prone to excessive flattery, the king is
said to have agreed to place his throne at the low tide line on the shore in Bosham,
to demonstrate the absurdity of their suggestion that he could "command the obe-
dience of the sea." Royal will failed to keep his majesty dry as the tide rose. "Just-
so," as Kipling would say.3 What might we learn from the King Canute fable? We
might start by expressing our envy for the ancient king, who at least had the good
* Judson Falknor Professor of Law, University of Washington, Seattle, Washington. Charles H.
Stockton Professor of International Law, US Naval War College (2006-07). The views expressed
are the author's and are not to be construed as reflecting the official views of the US Navy or any
other branch of the U.S. Government.
Command of the Commons Boasts: An Invitation to Lawfare?
fortune to face a "predictable" threat environment. Even in the tenth century, the
daily tidal cycle was probably well known. The challenge facing the king in his "in-
telligence preparation of the environment" was therefore minor. The same cannot
be said for the threat environment we face in the twenty-first century, which is ev-
erywhere described as one characterized by its uncertainty and accelerating pace of
change. As one astute observer of our current situation might put it: if you do not
expect to be surprised — even shocked — by what happens next, you are not paying
attention.4 Second, one must admire the king's practical modesty. He could have
accepted the flattery, but he knew he could not "command" that great commons
known as the sea.
The first panel in this, the 2006 Naval War College, International Law Depart-
ment conference on "Global Legal Challenges: Command of the Commons, Stra-
tegic Communications, and Natural Disasters," has been asked to offer a US
perspective on current assertions regarding the US command of the commons. It is
my privilege to moderate the discussion by a distinguished panel that includes Vice
Admiral Lowell E. ("Jake") Jacoby, US Navy (retired), the immediate past director
of the Defense Intelligence Agency; Vice Admiral John G. Morgan, Jr., US Navy,
deputy chief of naval operations for plans and strategy (N3/N5); and Rear Admiral
Joseph L. Nimmich, US Coast Guard, assistant commandant of the Coast Guard
for policy and planning.
- It is noteworthy that this conference takes place at a time when the intelligence
community has reliable indications that the Democratic People's Republic of Korea
(DPRK) has fueled one or more Taep'o-dong 2 missiles, in apparent preparation
for a test launch of the DPRK's new intermediate-range weapon. In response, the
US missile defense system has been activated and two Aegis-equipped cruisers are
stationed off the Korean peninsula. How did we obtain our information on missile
preparation going on within one of the world's most closed societies? Why are US
warships deployed to the far western Pacific to erect a missile defense thousands of
miles from the US mainland? What does the story unfolding on the Korean penin-
sula tell us about claims to a "command of the commons"?
As the sole lawyer on the panel, the task fell to me to identify the most salient legal
issues raised by claims to command of the commons. But I was also invited to
weigh in on the involved factual and policy questions. My goals in this short article
are modest. After setting out a lawyer's response to claims of command over the
commons, I turn to a brief legal analysis of the problems raised by this so-called
hegemonic approach. The first and most obvious problem is that any assertion of
command over the commons collides head-on with the relevant international law.
The second problem — and the one strategy drafters would do well to bear in
mind — is that such assertions could invite a response from lawfare practitioners, a
22
Craig H. Allen
move that could jeopardize the freedom of access and maritime mobility on which
our national security depends.5
I. The Panel's Precepts
The organizers of this year's conference might well have been moved to include a
command of the commons topic after seeing a banner to that effect displayed in the
Pentagon.6 The text of that banner is reproduced in the appendix to this article.
Our panel is asked to focus on the perspective of the United States to command of
the commons. We were provided a list of questions in advance. We are first asked,
"How broadly should the global commons be conceived (space, air, surface,
subsurface, seabed, cyber)?" Next, we are asked, "What are the primary threats em-
anating from the global commons?" Our third issue is "What role should elements
of the Intelligence Community play? How should they be integrated into a plan for
'command of the commons'?" Finally, we are told that "The CNO and the National
Plan to Achieve Maritime Domain Awareness call for a 'persistent' Intelligence, Sur-
veillance and Reconnaissance (ISR) capability in the global maritime commons,"
and then asked to consider "What obstacles will we face in achieving that? Are any
of those obstacles legal ones?"
In its reference to "the commons," the Pentagon banner lists the sea (including
undersea), air, space and cyberspace. As our discussion unfolds, the three panelists
appear to adopt a somewhat broader definition of the spatial dimensions of the
commons, which includes the airspace, waters and seabed and its subsoil outside
national jurisdiction, along with outer space and the electromagnetic spectrum.7
(Cyberspace was occasionally listed separately, though without distinguishing the
privately or publicly owned cyberspace components that fall outside the com-
mons.8) It takes but little imagination to appreciate the wide-ranging utility and
pervasive usage of the commons. Some serve as a buffer (particularly for insular
nations, like the United States), a highway of transit and transport, a place to lay ca-
bles and pipelines or to orbit satellites, and — infrequently for the last six decades —
a battlespace.9 Outside of naval planning circles, it is also recognized that the com-
mons are an important source of protein, a recreational arena, a key regulator of
our planetary carbon cycle and climate, and, not nearly often enough, a place of
scientific discovery. The importance of the commons in an era when the globaliza-
tion "mega-trend" penetrates nearly every corner of the planet is undeniable.
In addition to questions about the spatial dimensions of the commons, it is nec-
essary to address the more difficult temporal and conceptual dimensions of "com-
mand." By temporal, I mean whether the command referred to is meant to prevail
in times of peace and war (to the extent that dichotomy any longer has meaning).
23
Command of the Commons Boasts: An Invitation to Lawfare?
By conceptual, I mean the dimensions or degree attached to the claim of control. In
the law of the sea context, the relationship between the State and a body of water is
variously described in terms of "sovereignty," "sovereign rights," and "jurisdic-
tion."10 Assuming that "command" means something less than sovereignty over
the sea (or any other common), what are its conceptual dimensions? The goals of
sea command or control are relatively easy to identify. They typically include the
goal of ensuring freedom of access and movement for warships, auxiliaries and
supporting merchant vessels. Such access is essential to a power projection strat-
egy. The National Defense Strategy appears to stop here; calling only for a capability
to "operate from" the global commons, not to control them.11 At times, however,
claims to access take the form of presence, persistent presence, seabasing and per-
haps even "global fleet stations." And at times sea command or control strategies
include denying use of the sea to one's adversaries, at least during periods of
conflict.
In assessing the bounds of what might be included in a "command" of the com-
mons, my first recourse was to a common dictionary. Were I to attempt to explain
what I meant by command of the commons to a layperson, I should assume that
person would apply the common definition (a point we lawyers often forget). In
the dictionary I consulted, the most relevant definitions for "command" included
"to have authoritative control over; to rule; to have at one's disposal; to dominate
by position."12 "Authoritative" control implies for me some legitimate basis for ex-
ercising such control. "Rule" carries unfortunate connotations for many. On the
assumption that usage of the term in the actual national strategy documents or lit-
erature was also relevant, particularly in the present audience, I decided to conduct
a cursory literature search. The resulting definitions for command of the sea (and
its sister phrases) were all over the board. After reflecting on the US Navy's "Sea
Power 21" concept papers13 and the Australian Naval Strategy,14 1 came to the con-
clusion that the most useful definition of "command" over a space — physical or
virtual — would have to focus on the putative commander's capability,15 capacity16
and intent. It also became clear to me that one could distinguish the fact of "com-
mand" from the grand strategy that might lead a country to pursue such a com-
mand.17
Although it might have been easy to declare that the command of the commons
concept is too vague to serve as an organizing principle amenable to legal analysis, I
chose instead to craft a working definition that focused mainly on the sea com-
mand and would capture what appeared to be the commonly held attributes of
command constructs. For this article, I ultimately settled on a definition that in-
cludes the requisite capability and intent to ensure freedom of movement for one's
vessels (power projection) during times of peace and war; and, during times of
24
Craig H. Allen
armed conflict, to deny such movement to one's enemies (sea denial); and to exert
that measure of control over neutral or unidentified craft that the law of neutrality
permits (sea control).18
II. Assessing the Claim to US Command of the Commons
The claims espoused in the Pentagon banner find support in the 2003 article
"Command of the Commons: The Military Foundation of U.S. Hegemony," by
MIT professor and Strategic Studies Program Director Barry Posen. Indeed, one
suspects the banner authors had carefully studied Posen's works. Writing in Inter-
national Security, Professor Posen described his concept of command of the com-
mons as the capability to effectively deny use of the commons to any other nation
and to prevail in any military contest for the commons.19 He then went on to argue
that the United States already enjoys de facto command of the commons; by which
he means the sea, deep seabed, space and international airspace, and that com-
mand of the commons has supported the hegemonic grand strategy pursued by the
United States since the late 1990s.20 In explaining his use of the term, Posen
equated "command of the sea" with what the historian Paul Kennedy referred to as
"naval mastery" — more than mere superiority, but certainly less than claims to
"rule" over space.21 Posen admits that "command of the commons" does not mean
that other States cannot use the commons in peacetime, nor does the concept gain-
say that there will be contested areas — the littoral and riverine regions, continental
urban centers and jungles (but none of those areas are within anyone's working
definition of the commons anyway). The true commons, Posen asserts, are com-
manded, under his definition, by the United States. He then concludes with a
warning that "U.S. command of the commons provides an impressive foundation
for selective engagement. It is not adequate for a policy of primacy."22
A. The Claim to De Facto Command of the Commons
Applying the chosen test of capability, capacity and intent to claims of command of
the commons leaves me with considerable doubt regarding the accuracy of those
claims. Vice Admiral Jacoby's warning only increased that doubt.23 On the con-
trary, it seems to me that the claims to a command of the commons reflect a trou-
bling combination of unjustified confidence regarding a very uncertain threat
environment24 and a tin ear regarding the effect such claims are likely to have upon
much of the audience of greatest concern to us. I could add that assertions that the
United States presently enjoys command of the commons failed to impress the
conference attendees I overheard, who, like skeptical Missourians, insisted on
proof. Indeed, the reaction by one attendee to the title of this panel went something
25
Command of the Commons Boasts: An Invitation to Lawfare?
like: "We couldn't 'command' the commons with a 600-ship navy. How could we
be expected to do it with 280 ships, 200,000 fewer sailors, and an ever-shrinking
merchant fleet?"25 Another asked, "If we command the commons, why can't we
stem the flow of illegal migrants and narcotics into our country?"
A quick look at the numbers is not likely to instill confidence in the Missourians.
The seas cover 71% of the planet. The Pacific Ocean alone covers 64 million square
miles (admittedly, some of which falls within the national waters of coastal States).
If all 12 US Navy aircraft carriers were available to patrol the Pacific, each would
still be responsible for an area of more than 5 million square miles (if you assume
six-month deployment rotations, you must double that number). Those who sug-
gest that the focus should be on targets of potential interest, not surface area, would
do well to consider the United Nations Conference on Trade and Development's
recent annual report on shipping, which puts the number of merchant vessels in
the world at more than 600,000. 26 That would cut down the carrier workload to
just 5,000 vessels each. Of course, that does not include the growing fleet of un-
manned vehicles operating on, under and over the seas. As a final feasibility mea-
sure, I thought back to the 2004 Northern Command Homeland Defense
Symposium, where it was emphasized that the United States plainly lacks a mari-
time surveillance system anything like the one the North American Aerospace De-
fense Command (NORAD) provides for the air domain. Although some progress
has been made using Automatic Identification System (AIS) and Long Range Iden-
tification and Tracking (LRIT) systems, maritime domain awareness still has a long
way to go.
The lawyers among us will be quick to point out that any assessment of our "ca-
pability" to command the commons must include an assessment of our legal au-
thority to act. As the 2003 So San incident demonstrated,27 military capability
unaccompanied by an adequate prescriptive and enforcement regime will some-
times utterly fail to produce the desired end state. Spanish Marines proved to be
powerless to achieve a goal where the law fell short. Our legal authorities and capa-
bilities are plainly not adequate to even "secure" the commons, let alone "com-
mand" them sufficiently to protect us against maritime terrorism or weapons of
mass destruction (WMD) transport. The fact that the common four-part "DIME"
inventory of the instruments of national power (diplomatic, information, military
and economic) omits our law enforcement capabilities and capacities may be
partly to blame for this blind spot in most maritime strategy thinking.
Capability is also a function of vulnerability. Ex ante claims to command of
international airspace must be reassessed in an age when even terrorist organiza-
tions have access to unmanned aerial vehicles (UAVs) and missiles — including
missiles capable of taking one of Israel's most modern warships out of action.28
26
Craig H. Allen
Similarly, any claim to a "command" of outer space must be tempered by the
knowledge of the vulnerability of satellites to laser or missile attack, a high-altitude
nuclear explosion, or jamming from the ground,29 and to the growing ease of ac-
cess our adversaries now have to commercial satellites such as Google Earth™ and
Digital Globe®. The vulnerability of vital communication cables strung across the
deep seabed and of critical military and commercial networks to "cyber-attack"30
similarly renders doubtful any claim that the nation has attained "command" of ei-
ther of those domains. On the contrary, we can only hope that a defense establish-
ment that connects and leverages its now lighter and more dispersed forces
through a networked information and communications grid has studied the "un-
restricted warfare" battle plan and has not thrown out its semaphore flags.31 In re-
sponse to those who might argue that such vulnerability represents only the
potential to lose command of the commons, and does not diminish present com-
mand, I would be tempted to respond by asking how they distinguish "command"
from the more temporally limited concept of "superiority."
In short, my initial look at the numbers fails the Missouri "show me" test. In-
deed, one might be moved to remonstrate that the only reason that a claim to
"command" of the commons is plausible at present is because no one is out there
contesting the commons. The interest has moved to the littorals, ports and land
domains. Witness China's so-called "String of Pearls" ambition, to ensure access to
sea lines of communication connecting it to the Persian Gulf oil fields through a
string of bases stretching from Gwandar, Pakistan to Hainan Island.32 In these do-
mains— the favored battlespace of the fourth-generation warfare practitioners —
the fates of the USS Stark, USS Cole, USS Kearsarge and USS Ashland,33 and the INS
Hanit belie any notion of command. Here, there be dragons, and their riders are
reading Mao and Ho Chi Minh, the Small Wars Manual34 and the Sling and the
Stone35
B. Command of the Commons as a Hegemonic Grand Strategy Element
The Pentagon banner includes a citation to Rear Admiral Alfred Thayer Mahan,
suggesting that the banner authors' concept of command of the commons has its
roots in a larger strategy. Why Mahan, and why that particular passage? Is the De-
partment of Defense suggesting that a strategy calling for command of the com-
mons will be found in the old "foundations of strategy" that were "laid upon a
rock"? Did Mahan believe that the United States would "guarantee" other States
"their freedom to navigate the sea, air or space," as the banner claims? With the
trepidation any lawyer should feel before wading into national defense strategy, I
decided to see just what Mahan stood for.
27
Command of the Commons Boasts: An Invitation to Lawfare?
I took as my point of departure the belief that grand strategy, including its for-
eign policy elements, can be a useful window into a nation's intent with regard to
the commons.36 What do the US strategy documents say about the nation's intent
with respect to the commons? My brief study of the literature persuades me that
the evolutionary path of maritime and naval strategy in the United States has not
been linear (Justice Holmes made a similar remark with regard to the evolution of
the common law37). It demonstrates many of the characteristics of the dialectic,
while occasionally producing what economic historians might call a logistic surge,
what Thomas Kuhn described as a revolutionary paradigm shift,38 or what evolu-
tionary biologists refer to as punctuated equilibrium. Essentially all such con-
structs describe a cycle of peaceful interludes punctuated by dramatic revolutions.
Futurist Alvin Toffler warned that the frequency of that cycle is rising sharply.39
Peter Schwartz adds that surprise — by which he means discontinuities — should no
longer be surprising.40 Current indications suggest we might be on the verge of just
such a shift in grand strategy, as the mass of antithetical evidence and sentiment
grows. Justice Holmes, a battle-tested Civil War veteran, would likely agree.
Over the years, naval and maritime strategy documents and treatises have
adopted a variety of terminology to refer to the ends and means that make up the
grand strategy. The choices are informed by history, policy, capability and per-
haps even a little bit of law. Navies (and merchant fleets) figure prominently.
The Greek historian Herodotus makes it clear that the Athenian navy's defeat of
the much larger Persian fleet at the Battle of Salamis (480 BC) was a decisive vic-
tory for the Greeks. Indeed, Athens' naval "superiority," obtained more by strat-
egy and skill than by relative fleet size, was the city-State's signature strength for
nearly eight decades (it was lost when Athens executed most of its naval leaders,
leading to a defeat by Sparta).41 Moving forward from the Greek and Roman expe-
riences to the modern era, we see several shifts in the ends and means elements in
strategy documents. They raise questions regarding distinctions between "superi-
ority" in a given domain and "control" or "command" of that domain, and be-
tween the concept of "naval" superiority (or strategy) and "maritime" superiority
(or strategy), and whether these are ends or means, and whether they are merely
notional or aspirational. And finally, is it only the primacists who seek to "control"
the commons?
Any examination of "sea control" and the correlative opportunity for "power
projection" begins with Captain (later Rear Admiral) Alfred Thayer Mahan and
Rear Admiral Stephen Luce, first president of the US Naval War College. Mahan
was a naval officer and Naval War College professor (and later president) who
characterized the sea as a "wide common."42 The commons included potential
battlespaces, where the naval combatants would mass and meet, and sea lines of
28
Craig H. Allen
communication, through which both warships and merchant vessels traveled. His
magisterial 1894 book, The Influence of Sea Power Upon History, reveals Mahan as a
naval strategist who saw sea control as the paramount goal of naval strategy.43 He
rejected the coastal defense and commerce raiding strategy of the day and offered
in its place a vision of naval warfare as a contest for command of the sea. In
Mahan's view, sea control was essential for a belligerent to be assured of access to
the sea and freedom of mobility, while denying such access or movement to the op-
ponent.44 Later asymmetric strategies did not so much challenge Mahan's assump-
tions; rather, they looked for ways to circumvent the adversary's control of the seas.
In his 1911 treatise Some Principles of Maritime Strategy ', Sir Julian Corbett took
a broader and slightly less aggressive approach, rejecting what he considered to be a
"big-battle fixation" by writers who advocated the principle of concentration.45
Corbett distinguished "naval strategy," which focuses on command of the sea,
from "maritime strategy," which focuses on the interplay between naval and land
forces. To Corbett, naval strategy was but a subset of the maritime strategy, the
purpose of which was to accomplish the sovereign's broader goals. He admonished
that command of the sea was not a proper goal in and of itself but rather a strength
that could be employed to support the nation's overall military objective.46 Corbett
concluded (as does Vice Admiral Jacoby) that it is rarely possible to achieve full
control of the sea. He argued that a belligerent must always attempt to either secure
command of the sea or prevent its opponent from doing so.47 Nevertheless, he con-
cluded that the "most common situation in naval war is that neither side has the
command; that the normal position is not a commanded sea, but an uncommand-
ed sea."48
In 1954, a very young Samuel Huntington penned an unsettling article an-
nouncing that, in his view, the Mahanian strategy based on the clash of great fleets
massing against each other was obsolete.49 Viewing the Soviet Union as a massive
land-force power that posed little or no naval threat, Huntington concluded that
the US Navy force structure should be reshaped to prepare it for littoral warfare
and power projection ashore.50 John Keegan, in his Price of Admiralty, carries the
concept forward; or should I say upward and downward? Looking back to World
War II, and demonstrating how technology can quickly reshape the meaning of
command of the commons, he concludes that the US Navy's aircraft carriers were
the "supreme instrument of command of the sea" in that war.51 But, then, turning
to the present, he falls prey to the sin of presentism, asserting that "command of the
sea in the future unquestionably lies beneath rather than on the surface." Keegan
acknowledged, however — quite prophetically — that future naval battles will likely
be fought close to land, where there is less maneuvering space.52
29
Command of the Commons Boasts: An Invitation to Lawfare?
Command of the sea reached its most recent apogee with the appointment of
John Lehman to serve as President Reagan's secretary of the Navy. Secretary
Lehman is, of course, known as the author of the 600-ship Navy and "the" mari-
time strategy. Writing in his autobiography, Command of the Seas, Lehman reports
considerable pushback in response to his maritime superiority strategy by those
who considered it too ambitious and too provocative.53 Nevertheless, some give
considerable credit to the aggressiveness of Lehman's strategy and force buildup
for the eventual capitulation of the Soviet Union.
As the Reagan era came to a close and with it the Cold War, naval strategy took a
decisive turn inland. Two capstone documents of the 1990s, From the Sea in 199254
and Forward . . . From the Sea in 1995,55 demonstrated that the focus on command
of the sea had given way to a need to establish "forward presence," and that
Mahan's blue-water battles between major combatants would give way to green-
and brown-water activities and "maritime security operations."56 For some, it
looked like coastal defense and blockades were back in style. As one analyst put it
more than a decade ago: aFrom the Sea writes the epitaph to the command of the
sea 'system' that has dominated naval strategic thought since the sixteenth century
when, thanks to the growth of seaborne commerce and the development of war-
ships capable of keeping the sea, 'true naval war' replaced 'cross-ravaging' as the
main purpose of military power at sea."57 The intervening years have mostly borne
.that out, as naval forces have been extensively engaged in maritime security opera-
tions in the littorals of the Greater Mideast and in "projecting" power from the sea
into the former Yugoslavia, Afghanistan and Iraq.
As we reflect back on a history that includes Salamis, Trafalgar, Midway, the
Barbary Pirates and Cole, and briefly consider the various naval and maritime strat-
egies that have competed for adherents, the lesson may be that any notion of com-
mand of the commons is held hostage by the competition for the strategic vision.
Professor Posen makes a strong case for his claim of US hegemony.58 He traces the
path to our current hegemonic posture to the late 1990s, while recognizing that the
hegemonic character of the strategy got an injection of steroids with the 2002
National Security Strategy59 (though only for contested areas or with respect to
specific threats, not for the commons). But, as noted earlier, he concludes that the
hegemonic status, while sufficient for an effective strategy of selective engagement,
is not adequate to support a policy of primacy (elements of which are contained in
the 2002 National Security Strategy).60 In the dialectic of grand strategy, there are
clear signs that US thinking is backing away from its flirtation with primacy.
Whether it lands on Posen's selective engagement or some variant of offshore bal-
ancing or strategic restraint is an open question. Are the differences among the
strategies important for the legal analysis that follows? Perhaps. To the extent that
30
Craig H. Allen
both primacy and selective engagement rely on some level of hegemonic command
of the commons, they both raise legal questions. There is also good reason to be
concerned that a strategy that purports to command what others consider com-
mon is likely to be opposed; and the opposition might well draw on all of the in-
struments of national (and non-State) power, including lawfare to frustrate the
hegemon's design.
1. The National Security Strategy Capstone Documents
Current US high-level strategic plans embrace some elements of primacy, along
with cooperative security and selective engagement. The 2002 National Security
Strategy called on the Department of Defense to ensure its current military domi-
nance was not challenged.61 The 2006 National Security Strategy reiterates that
"[w]e must maintain a military without peer."62 The Clinton-era Department of
Defense Joint Vision 2020 established the goal of "full spectrum dominance," which
was carried into the 2004 National Military Strategy.63 At the same time, however,
both the 2006 National Security Strategy and the National Defense Strategy ac-
knowledge that the United States lacks the capability to address global security
alone.64 Moreover, the National Defense Strategy expressly disclaims any intent to
achieve "dominance" in all areas of military capability.65 And far from a pretension
of presently commanding the commons, it asserts that "[w]e will operate in and
from the commons by overcoming challenges to our global maritime, air, space
and cyberspace operations."66
Other national strategy documents embrace a cooperative, multilateral ap-
proach. The National Strategy to Combat Weapons of Mass Destruction67 and the
National Strategy for Combating Terrorism68 both rely on cooperative, multilateral
and interagency approaches. The National Strategy to Combat Weapons of Mass
Destruction recognizes that "it is vital that we work closely with like-minded coun-
tries on all elements of our comprehensive proliferation strategy."69 Similarly, the
National Strategy for Combating Terrorism calls for strengthened coalitions and
partnerships, including partnerships with international organizations.70 The Pro-
liferation Security Initiative71 and the concept once referred to as the 1,000-ship
navy72 similarly embrace the multilateral approach.
National Security Presidential Directive 41 on maritime security policy clearly
emphasizes the need for cooperation — combined, joint and interagency — in the
pursuit of security in the maritime domain.73 In calling for a new National Strategy
for Maritime Security (NSMS), the president described the "maritime domain" as
"all areas and things of, on, under, relating to, adjacent to, or bordering on a sea,
ocean, other navigable waterway, including all maritime-related activities, infra-
structure, people, cargo, and vessels and other conveyances."74 The NSMS and its
31
Command of the Commons Boasts: An Invitation to Lawfare?
eight supporting plans were promulgated in 2005. 75 Rear Admiral Joseph
Nimmich and Dana Goward, writing in this volume, explain that the hallmarks of
the national strategy for maritime security are its commitment to obtaining mari-
time domain awareness, sharing the intelligence, providing a common operating
picture, and establishing and enabling a layered defense.76 In the words of many,
"information superiority" will give way in the coming months to "information
sharing" (a concept that might not sit well with primacists). The president's direc-
tive also makes it clear that the strategy will be carried out in a way that respects the
rule of law and does not unnecessarily, impede legitimate maritime commerce.
2. The Coming Maritime Strategy: Has Command of the Commons Given Way to
11 Awareness" of the Maritime Domain and the Emerging Global Maritime
Partnership?
At the 2006 Current Strategy Forum held shortly before our conference, the Chief
of Naval Operations, Admiral Mike Mullen, called for the development of a new
maritime strategy to guide the Navy in the coming years.77 The new strategy docu-
ment will join three other capstone planning documents, including Sea Power 21™
the Navy Strategic Plan19 and the CNO-CMC Naval Operations Concept*0 along
with the forthcoming revision to the Naval Doctrine Publication on Naval Warfare
(NDP-1). The strategy is also likely to embrace what was once referred to as the
1,000-ship navy concept81 (now the Global Maritime Partnership) and the Na-
tional Fleet Policy.82 And the strategy will be consistent with higher-level plans, in-
cluding the National Security Strategy and the National Strategy for Maritime
Security. At the time this article was prepared, it was not clear what path the new
maritime strategy would take. Primacy, selective engagement,83 cooperative
security84 and offshore balancing were all being examined in what has been known
as a "competition of ideas" that seeks to cull the best from the "wisdom of groups."
Some have strongly advocated some version of offshore balancing,85 while Posen
and others appear to favor a return to Clinton- style selective engagement. The de-
bate over grand strategy has clearly moved beyond naval planning circles to both
the national and global stages.86
It seems safe to say that global maritime security is now seen by most as a team
sport, but one that involves States of disparate ability and willingness. The advent
of regional maritime security initiatives and risk-specific approaches like the Pro-
liferation Security Initiative may portend the new modalities that will replace com-
mand and control approaches. Whether the threat comes from regional armed
conflicts or Malaccan pirates, this increasingly globalized world plainly benefits
from a maritime security approach that protects the sea lines of communication
for peaceful navigation, commerce and overflight. While those common rights are
32
Craig H. Allen
protected by international law, it is sometimes said that covenants without the
sword are but words.87
Ill, Command of the Commons and the Law
Turning from an amateur's examination of the policy questions presented to our
panel to the legal question, two issues present themselves. The first concerns the le-
gality of any claim to control over the commons, particularly if control takes the
form of sea denial or assertions regarding access or presence exceeding those pro-
tected by the law. The second is one well suited for the Naval War College audience
and concerns the potential lawfare use of a maritime strategy that purports to com-
mand the commons.
A. Command of the Commons and the International Law of the Commons
Lord Bryon was not available to the young Dutch jurist, Hugo Grotius, who wrote
his famous Mare Liberum (the sea is free) in 1608,88 but Grotius would almost cer-
tainly have appreciated Byron's respect for the sea. Grotius' Mare Liberum was the
opening salvo in the "battle of the books" with the Englishman John Selden. Selden
opposed Grotius' freedom of the seas concept with his own Mare Clausum (the sea
is closed) ten years later.89 Grotius eventually won the battle for freedom of the
seas. Even England eventually repudiated Selden's thesis. In one of Lord Stowell's
most often-quoted decisions while on the English High Court of Admiralty, he ex-
plained that two principles of public international law are recognized as
"fundamental":
One is the perfect equality and entire independence of all distinct states. Relative
magnitude creates no distinction of right; relative imbecility, whether permanent or
casual, gives no additional right to the more powerful neighbour; and any advantage
seized upon that ground is mere usurpation. This is the great foundation of public law,
which it mainly concerns the peace of mankind, both in their politic and private
capacities, to preserve inviolate.
The second is, that all nations being equal, all have an equal right to the uninterrupted
use of the unappropriated parts of the ocean for their navigation. In places where no
local authority exists, where the subjects of all states meet upon a footing of entire
equality and independence, no one state, or any of its subjects, has a right to assume or
exercise authority over the subjects of another. I can find no authority that gives the
right of interruption to the navigation of states in amity upon the high seas, excepting
that which the rights of war give to both belligerents against neutrals. . . .90
33
Command of the Commons Boasts: An Invitation to Lawfare?
Modernly, the sovereign equality of States is enshrined in the UN Charter, and the
freedom of the seas — at least of the high seas — is codified in articles 87 and 88 of
the 1982 Convention on the Law of the Sea (1982 LOS Convention).91
Military strategists are regarded by most international lawyers as contemptuous
of the law and legal institutions. Clausewitz's canonical text for strategists refers to
the "certain self-imposed, imperceptible limitations hardly worth mentioning,
known as international law and custom."92 Foreign policy pundit George F.
Kennan is remembered for his attack on what he saw as an excess of "legalism"
(and moralism) in American foreign policy during the Wilson presidency years.93
Although international and constitutional law scholar Philip Bobbitt has come to
Wilson's (and FDR's) defense,94 few from the strategy community have joined
him. Unfortunately, too many international lawyers are unwilling to engage the se-
curity strategists directly. They therefore have the potential to create what
Clausewitz would call "friction."95
Most international lawyers would likely agree that, under the law, the phrase
"command of the commons" is an oxymoron. It is in the very nature of a commons
that no State has sovereignty over it. Indeed, such commons as the seabed beyond
the limits of national jurisdiction are often referred to as the "common heritage of
mankind."96 That said, it must also be admitted that freedom within the commons
in peacetime does not necessarily prevail when the drums beat the call to quarters.
Accordingly, a distinction must be drawn in this analysis between laws applicable
in peacetime and those that control in times of armed conflict. The former is
largely set out in the UN Charter and 1982 LOS Convention. The latter is taken
from a variety of sources including the conventional and customary law of armed
conflict, the law of neutrality, specialized doctrines of blockade,97 and the right of
visit and search.98 No exhaustive treatment of either is attempted here; however,
command of the commons advocates must be alert to several key legal limits on
their sea command, control and denial strategies.
The UN Charter rests on the principle of the sovereign equality of all States
and prohibits the use of force — or the threat to use force — against the territorial
integrity or political independence of another State.99 Under the 1982 LOS Con-
vention, neither the high seas nor the deep seabed beyond national jurisdiction are
subject to any nation's sovereignty.100 The same is true for international airspace.
Over the years, the United States has jealously guarded high seas freedoms against
coastal State encroachments,101 as the recent US reaction to Australian measures
extending pilotage requirements to the Torres Strait demonstrates.102 The high
seas and the deep seabed beyond national jurisdiction are also reserved for "peace-
ful purposes."103 And what of those 600,000 merchant ships plying the oceans?
While on the high seas, merchant vessels (and warships) come under the exclusive
34
Craig H. Allen
jurisdiction and control of their respective flag States, thus limiting the extent to
which a hegemon can exert denial or control strategies against them.104
Under relevant laws applicable during armed conflicts, neutrals generally enjoy
most of the same freedoms that prevail during peacetime, so long as they do not aid
any of the belligerents or carry contraband on their behalf. That general statement
is subject to two important qualifications, including the belligerents' right of visit
and search,105 and the somewhat unsettled regime of maritime "zones."106 If, how-
ever, sea denial is reserved only for times of armed conflict, and is implemented in
accordance with the international law governing the rights and obligations of neu-
trals, the law cannot be said to preclude "command" in the sense of the ability to
deny uses of the sea in ways that conflict with those laws.
Although this brief comment will not focus on the outer space commons, it is
worth mentioning that any claim to command of outer space is difficult to recon-
cile with the legal regime established by the Outer Space Treaty.107 It is also inter-
esting to note the stark contrast between the "command" notion and the
provisions of the Treaty on Open Skies,108 which permit overflight of even the na-
tional territory of each party, to provide potential adversaries a "confidence build-
ing measure." Primacists would do well to consider why a global hegemon with
"command of the commons" would permit Russian military aircraft to overfly and
photograph its naval and air bases. But the logic in such confidence-building mea-
sures as a means of enhancing national security is likely to elude most primacists.109
In closing, it is important to acknowledge that our Janus-faced law both em-
powers and limits the United States. Boasts that the Navy has the capability to in-
timidate a hostile or potentially hostile coastal State or its government by parking a
carrier battle group or expeditionary strike group 12 miles off the State's coastline
carry with them a risk that the law is neither as clear nor as stable as the boaster
might hope.
B. Assertions of Command of the Commons as an Invitation to Lawfare
The foregoing analysis focused on the legal limits on attempts to exploit putative
command of the commons to deny vessels or aircraft of another State access or
transit rights protected by international law. This section is designed to alert the
reader to the danger that an aggressive command of the commons posture may
backfire and motivate other States to undertake measures to reduce the would-be
commander's access or transit rights. It begins with the often heard assumption
that when the stronger naval power controls the sea, the "correct" strategy for the
weaker power is to attempt to deny its opponent use of the sea as much as possible.1 10
The concept of lawfare might provide one means to deny, or at least to limit, a
hegemon's use of the sea.111
35
Command of the Commons Boasts: An Invitation to Lawfare?
The term "lawfare" was apparently coined in the 1970s, but initially lacked a co-
herent definition. Today the concept is most often associated with Air Force Major
General Charles Dunlap, who defines lawfare as the strategy of using or misusing
law as a substitute for traditional military means to achieve an operational objec-
tive.112 It is noteworthy that lawfare tactics are included in the Chinese book on
"Unrestricted Warfare."113 The authors suggest an approach that applies interna-
tional law asymmetrically: binding the more powerful nation, but not its less pow-
erful opponent. The authors also recognize the important role of a sympathetic
media to a lawfare strategy, as did Hezbollah during the 2006 conflict with Israel.
To be sure, the United States has never hesitated to use what has been described
as lawfare to advance its national interests. Witness the new republic's complaints
that British boardings of US merchantmen to impress seamen for duty in the Royal
Navy violated international law.114 Professor Davida Kellogg, among others, advo-
cates a principled, proactive use of lawfare.115 But she warns that we must also be
on guard against false or misleading versions of the law contained in the "pro-
nouncements of nongovernmental organizations (NGOs), terrorist sympathizers
and apologists, and uninformed reporters with political agendas."116
Concern for lawfare tactics found its way into at least one high-level strategy
document. The 2005 National Defense Strategy appears to expect that lawfare tactics
will be used against the United States, warning in its section on "vulnerabilities"
that " [o] ur strength as a nation will continue to be challenged by those who employ
a strategy of the weak using international fora, judicial processes and terrorism."117
"Judicial processes and terrorism"? Putting tactless juxtapositions to one side,118
the secretary is probably right to be concerned. A few suggestions show why.
If I were giving advice to a client seeking to bind a would-be maritime hegemon
through lawfare moves, several come to mind. First, I might advise the client to
identify those States that most resent claims to command of the commons and seek
their support within the United Nations General Assembly (UNGA) for, inter alia,
a request that the International Court of Justice (ICJ) issue an advisory opinion
condemning any attempt to "command of the commons" as a violation of the UN
Charter, the 1982 Law of the Sea Convention and the 1967 Outer Space Conven-
tion, which collectively stand for the proposition of equal access for all States to
those commons. Next I would suggest that the client work through the UN Infor-
mal Consultative Process on Ocean Affairs and the Law of the Sea to propose a
General Assembly resolution defining "due regard for the exercise of the freedom
of the high seas" and "peaceful use" under articles 87 and 88, respectively, of the
Law of the Sea Convention in a way that renders illegal any claim to "command" of
those seas or "sea control" by any nation's warships.119 At the same time, the client
might move for a resolution defining "innocent passage" to exclude any passage by
36
Craig H. Allen
warships (or unmanned vehicles, which are nowhere mentioned in the conven-
tion) the flag State of which purports to command the seas in ways that conflict
with the freedoms of other States, or to vessels en route to a "sea base" assignment
(where the vessel will, in the minds of some, "threaten" the use of force, in violation
of the UN Charter and the Law of the Sea Convention). Another tactic that is sure
to attract the support of a number of coastal States would utilize the ICJ or UNGA
to effectively reduce the commons, by legitimizing "security zones" of up to 200
nautical miles, within which no foreign warship, military aircraft (manned or un-
manned) or intelligence gathering platform could operate without the consent of
the coastal State, and only then when in full compliance with any applicable restric-
tions on vessel numbers, speed, weapons and means of propulsion, along with pos-
itive requirements to carry transponders and disclose to the coastal State any
information gathered during the transit. A final tactic might be to build upon the
suggestion of prominent publicists who argued in an earlier volume of the "Blue
Book" series that naval warfare doctrines like blockade and neutrality are no lon-
ger viable in the post-UN Charter era,120 and would thus provide no authority for
interfering with shipping in a manner inconsistent with the 1982 LOS Convention.
Lest the reader think my goal here is to feed ideas to the nation's enemies, let me
assure you I have no such intent. My goal is to alert public and military officials to
the risk that their assertions, whether in strategy documents or banner displays,
can have serious unintended consequences. A message intended to raise the morale
of service members or garner service support in congress might lead to legal
pushback from opponents within and beyond the nation, in ways that create un-
welcome and avoidable friction over access to the commons. The Navy war games
strategies. Why not war game strategic communications? Why not ask your red
team's legal expert to game a response to any proposal for a "command of the com-
mons" campaign?
Conclusion
De facto command of the commons will be seen by many as an unattainable goal in
an age of asymmetric warfare against amorphous enemies who operate through
dispersed cells. Those who confidently speak of having such command must be
prepared to answer the practical questions regarding how the putative "command"
would fare in response to an adversary's war plan that calls for the targeting of all of
the satellites and submarine cables on which the elaborately networked command
depends in the first 96 hours. The command advocates must also address the eco-
nomics of obtaining and maintaining command. The cost of restoring the Army
and Marine Corps to their pre-Operation Enduring Freedom/Operation Iraqi
37
Command of the Commons Boasts: An Invitation to Lawfare?
Freedom readiness levels will almost certainly make it impossible to build and
maintain the resources effective command would require. It is unlikely that the
world will soon realize the dream that we will beat our collective swords into plow-
shares. But the coming budget showdown in the United States does suggest that
there is a growing risk that in the coming decade four Navy aircraft carriers might,
in effect, be turned into armored Humvees for the Fleet Marine Force.121
Law is a vital enabler for liberal democracies and an important safeguard for our
military forces. That law respects the sovereign equality of States and precludes any
State from asserting dominion over the commons. Strategic statements that sug-
gest a cavalier disregard for legally protected rights will almost certainly generate
resentment and produce undesired effects. Those who might be tempted to post
banners announcing "command of the commons" would also do well to reflect on
what is to be learned from the "strategic communications" panel that follows in
Part III of this volume. To make such a claim in peacetime, while the United States
is simultaneously lobbying other States to join in a 1,000-ship navy to meet the ur-
gent need for maritime security, disserves the national interest. And in an age when
much of the world and virtually all of the media seem bent on discrediting the US
defense establishment, claims to a "command of the commons" seem unnecessar-
ily provocative.122
38
Craig H. Allen
Appendix
Command of the Commons*
Command of the Commons is the key military enabler of the United States.
The United States now enjoys command of the commons — command of the sea
(including undersea), air, space and cyberspace. While other States can use the
commons in peacetime, the United States guarantees their freedom to navigate the
sea, air or space. Command of the commons is the key military enabler of the
United States' global power position. It allows us to utilize other sources of power,
including our own economic and military might, as well as the economic and mili-
tary might of our allies.
How do we maintain command of the commons?
Maintaining command of the sea/undersea. Command of the sea allows us to pro-
ject our national power and influence, and also enhances our country's economic
prosperity. 99% of the volume — and 80% of the value — of the world's interconti-
nental trade moves by sea. The Air Force provides battle space management, preci-
sion navigation, weather services, close air support targeting and air refueling for
both military and commercial users to solidify United States control over the sea.
From time to time the superstructure of tactics has to he altered or wholly torn down; hut
the old foundations of strategy so far remain, as though laid upon a rock.
Alfred Thayer Mahan
Maintaining command of the air. Unsurpassed by any nation, the United States Air
Force maintains joint air and space dominance across the globe. Specialized attack,
jamming and electronic intelligence aircraft combined with well-trained, profes-
sional airmen allows extensive control and exploitation of air, space and near-
space domains. Given the superior capabilities the Air Force possesses, the United
States is able to deter enemy threats and ensure forward operations providing an
essential contribution to global security.
Approximate text of a display in the Pentagon in 2006 (any formatting errors are mine alone).
39
Command of the Commons Boasts: An Invitation to Lawfare?
Freedom from attack; freedom to attack.
Maintaining command of space. Maintaining command of space allows the
United States to see across the entire globe in order to gather vast amounts of useful
information. Over the last 50 years the United States has invested $830 billion in
space assets. Through capabilities developed and executed by the Air Force, the
United States can track and identify military targets with fidelity and communicate
this actionable information in a timely fashion.
See first — understand first — act first.
Maintaining command of cyberspace. The new strategic communication of the
21st century is cyberspace. Like its conceptual predecessor, cyberspace is an interna-
tional domain of trade and intercontinental communication that connotes not only
the Internet but an area of information and cognition that includes the channels of
mass media and finance. Command of cyberspace can increase, sustain or diminish a
nation's position of power in economic, diplomatic or military terms.
A new medium for communications, command and control.
40
Craig H. Allen
Notes
1. George Gordon (Lord Byron), Childe Haroldes Pilgrimage (1812-1818). The term
"childe" was a medieval title for a young man who was a candidate for knighthood.
2. King Canute has been unfairly maligned for centuries. The "authoritative" version of the
king's apocryphal encounter with the sea makes it clear that the king never believed he could
hold back the tides.
3. Rudyard Kipling, The Crab that Played with the Sea, in JUST SO STORIES (1902) (attribut-
ing tidal cycle to Pau Amma, the disaffected crab).
4. Peter Schwartz, Inevitable Surprises: Thinking Ahead in Time of Turbulence
(2003). Schwartz argues that we live in a time of "perpetual discontinuity," a time in which
"bombshells and shockers" are part of everyday life.
5. See generally Department of Defense, National Security and the Convention on the Law
oftheSea(2ded. 1996).
6. My thanks to the 2006 International Law Department Conference Chair, Rear Admiral
and Stockton Professor Jane Dalton, for her notes on the text of the Pentagon banner. They are
reproduced in the appendix. Any errors in recording are mine alone.
7. The National Defense Strategy limits its definition to "space, international waters and
airspace, and cyberspace." Department of Defense, National Defense Strategy of the United
States 13 (Mar. 2005). Vice Admiral Jacoby argues for a broad definition of the global commons
"if it is to be a useful construct in this era of globalization, rapid information age advancements,
and the threats to terrorism and weapons of mass destruction." Interestingly, he would add "un-
governed areas," like parts of Somalia where there is no effective government and may therefore
serve as a haven for terrorists, as part of the global commons. Lowell Jacoby, The Global Com-
mons and the Role for Intelligence, which is Chapter III in this volume, at 51.
8. The Department of Defense Dictionary defines "cyberspace" as "the notional environ-
ment in which digitized information is communicated over computer networks." Chairman of
the Joint Chiefs of Staff, Joint Publication 1-02, DoD Dictionary of Military and Associated
Terms 138 (Apr. 2001, as amended through Aug. 2006) [hereinafter DoD Dictionary].
9. "Battlespace" is defined as "the environmental factors, and conditions which must be
understood to successfully apply combat power, protect the force, or complete the mission. This
includes the air, land, sea, space and the included enemy and friendly forces, facilities, weather,
terrain, the electromagnetic spectrum, and information environment within the operational ar-
eas and areas of interest." DoD Dictionary, id. at 64. The principal battlespace long ago shifted to
the littorals and landward, where asymmetric warfare is the most effective. See the discussion be-
low on naval and maritime strategies of the 1990s.
10. Lawyers fond of the bundle-of- sticks analogy explain that "sovereignty" denotes the full
bundle of sticks, while usufructuary rights of innocent or transit passage represent far fewer
"sticks." A variety of legal labels have been attached to the seas and the interests of the States in
those seas. One debate that concerned the deep seabed divided those who held the res nullius
view from those who espoused the res communis approach. In his dissent in United States v. Cali-
fornia, Justice Frankfurter concluded that the majority was confusing the concepts of imperium
and dominium. He explained that the Roman law concept of dominium was concerned with
property and ownership, while imperium related to political sovereignty. United States v. Cali-
fornia, 332 U.S. 19 (1947) (Frankfurter, J. dissenting).
11. National Defense Strategy, supra note 7, at 13.
12. Webster's II New Riverside University Dictionary (1988).
41
Command of the Commons Boasts: An Invitation to Lawfare?
13. Vern Clark, Sea Power 21: Projecting Decisive Joint Capabilities, U.S. NAVAL INSTITUTE
Proceedings, Oct. 2002, at 32.
14. Royal Australian Navy, Australian Maritime Doctrine - RAN Doctrine l -
2000 (2000), available at http://www.navy.gov.au/spc/amd/amdintro.html [hereinafter AUS-
TRALIAN Maritime Doctrine] .
15. The DoD Dictionary defines "capability" as " [t] he ability to execute a specified course of
action. (A capability may or may not be accompanied by an intention.)" DoD Dictionary, supra
note 8, at 76. The National Defense Strategy adopts a capabilities-based planning approach that
links capabilities to joint operating concepts across a broad range of scenarios. National Defense
Strategy, supra note 7, at 11. One writer defines military capability as "simply the ability to
achieve a desired effect in a specific operating environment." He also defines military capability
as having three pillars: readiness, sustainability and force structure. Alan Hinge, Preparedness,
excerpted at http://www.defence.gov.au/RAAF/organisation/info_on/operations/military
_capability.htm.
16. If "capability" is understood to refer to the nature of the ability, "capacity" refers to the
amount of that ability that can be delivered in a particular period of time.
17. An intent to command the commons does not necessarily imply a primacy strategy.
18. In its section on "command of the sea," the Australian doctrine concludes:
A modern analyst [*] has noted that all these commentators were interested in war and
they were concerned with dominance. They were acutely conscious of the historical
advantages that lay with the utilisation of the sea to further national power. One of the
first products of their thought was the concept of command of the sea, which was
considered to be the principal objective of naval forces operating in a maritime
campaign. This is defined as the possession of such a degree of superiority that one's
own operations are unchallenged by the adversary, while the latter is incapable of
utilising the sea to any degree.
Australian Maritime Doctrine, supra note 14, at 37.
*The "modern analyst" referred to is Rear Admiral J. Richard Hill (Royal Navy, ret.), author of
Maritime Strategy for Medium Powers (1986).
19. Barry R. Posen, Command of the Commons: The Military Foundation of U.S. Hegemony,
28 International Security, Spring 2003, at 5-46. See also Barry R. Posen, Inadvertent Es-
calation: Conventional War and Nuclear Risks (1992).
20. Definitions of "hegemony" vary, and I was not able to find a clear definition of what con-
stitutes a hegemonic grand strategy. One source describes hegemony as the dominance of one
group over other groups, with or without the threat of force, to the extent that, for instance, the
dominant party can dictate the terms of any intercourse to its advantage. It seems clear that the
term has accumulated a distinctly sinister connotation over the past ten years.
2 1 . Paul M. Kennedy, The Rise and Fall of British Naval Mastery (1976). Posen ob-
served that Kennedy distinguished "naval mastery" from a temporary, local naval superiority.
Posen, supra note 19, at 8.
22. Posen, supra note 19, at 44.
23. Vice Admiral Jacoby concluded that command of the commons was not a realistic goal,
particularly given the limits on intelligence. As he put it, "If we attempt to know everything
about everyone all the time, we will fail." Jacoby, supra note 7, at 53.
24. The secretary of defense asserts that uncertainty is "the defining characteristic of today's
strategy threat environment." National Defense Strategy, supra note 7, at 2. In assessing claims to
command of the commons, the entire threat environment, including threats from irregular, cat-
astrophic and disruptive threats, must be considered. Id. at 2-3.
42
Craig H. Allen
25. Navy ranks have dropped below 350,000 (down 220,000 from its 1991 level). Active duty
Marine Corps strength is about half that number. See also Summary of Remarks by Chief of Naval
Operations, Admiral Mike Mullen, at West 2006, January 12, 2006, in Neal Thompson, West
2006 Wrap Up, U.S. NAVAL INSTITUTE PROCEEDINGS, Feb. 2006, at 42 (reporting that the Navy's
current fleet strength of 281 ships is not enough to meet the service's growing responsibilities,
which include maintaining readiness to fight on two fronts, combating terrorist activities, drug
and weapons trafficking, and piracy at sea, along with rescue and recovery efforts in the wake of
Hurricane Katrina and the 2004 Asian tsunami).
26. United Nations Conference on Trade and Development, Review of Marine Transport,
2005, Annex III, at 123, available at http://www.unctad.org/en/docs/rmt2005annexes_en.pdf.
The precise count was 623,626. 1 admit that many of those are small craft, but how large must a
vessel be to serve as a launching platform for a Man-Portable Air Defense System (MANPADS)
missile or, for that matter, a cruise missile?
27. In late 2002, Spanish warships intercepted the freighter So San while on the high seas off
the coast of Yemen. The vessel was suspected of transporting missiles to an unknown destina-
tion. A boarding team of Spanish Marines from the Navarra, later joined by US Navy personnel,
conducted a non-compliant boarding of the So San, and during the subsequent search discov-
ered North Korean-made Scud missiles and components hidden beneath the vessel's cargo of
bagged cement. When it was determined that there was no basis to seize the vessel or her cargo,
the vessel was released. See Nuclear Threat Initiative, North Korea: U.S., Spanish Forces Seize Scud
Shipment, Dec. 11, 2002, available at http://www.nti.Org/d_newswire/issues//2002/12/ll/
7p.html.
28. Norman Polmar, Hezbollah Attack: Lessons for the LCS?, U.S. NAVAL INSTITUTE PRO-
CEEDINGS, Sept. 2006, at 88 (describing the July 21, 2006 attack on the Israel Navy Ship (INS)
Hanit (a corvette) by a C-802 cruise missile).
29. US Claims that China has Used Lasers to Attack Satellites, JANE'S DEFENCE WEEKLY, Oct.
18, 2006, at 7. The article points out that a high-altitude nuclear explosion would wipe out US
low-earth-orbit satellites.
30. See generally COMPUTER NETWORK ATTACK AND INTERNATIONAL LAW (Michael N.
Schmitt & Brian T. O'Donnell eds., 2002) (Vol. 76, US Naval War College International Law
Studies).
31. The US Armed Forces envision a global information grid (GIG) that stretches from the
commander in chief to deployed units. An examination of its "teleport" schematic reveals the
GIG's dependence on satellites. Chairman of the Joint Chiefs of Staff, Joint Publication 6-0, Joint
Communications System, at II- 1-24 (2006).
32. Lawrence Spinetta, Cutting China's String of Pearls, U.S. NAVAL INSTITUTE PROCEED-
INGS, Oct. 2006, at 40-42.
33. The vessels, assigned to an expeditionary strike group carrying the 26th Marine Expedi-
tionary Unit, were fired at with Katyusha rockets and mortars during a port call in the Jordanian
Red Sea port of Aqaba on August 19, 2005. None of the ships were hit.
34. US Marine Corps, Small Wars Manual (1940) (declassified in 1972).
35. Thomas X. Hammes, The Sling and the Stone: On War in the 21st Century
(2004). See also MARTIN VAN CREVELD, THE TRANSFORMATION OF WAR (1991).
36. National security strategy is defined as "[t]he art and science of developing, applying,
and coordinating the instruments of national power (diplomatic, economic, military and infor-
mational) to achieve objectives that contribute to national security. Also called national strat-
egy' or 'grand strategy'." DoD Dictionary, supra note 8, at 362.
43
Command of the Commons Boasts: An Invitation to Lawfare?
37. See Oliver Wendell Holmes, Jr., The Common Law l (1881) ("The life ofthe law has
not been logic, but experience").
38. See, e.g., THOMAS KUHN, THE STRUCTURE OF SCIENTIFIC REVOLUTIONS (1962).
39. See, e.g., ALVIN TOFFLER, FUTURE SHOCK (1970).
40. SCHWARTZ, supra note 4.
41. Following a relatively minor defeat in the battle at Arginusae, in which Athens lost 12
ships, the Athenian civilian leaders executed all of their top naval commanders, destroying the
morale of their navy. Shortly thereafter, the Spartan general-cum-naval commander Lysander
defeated the Athenian navy at the battle of Aegospotami, destroying 168 Athenian ships. See gen-
erally Donald Kagan, The peloponnesian War (2003).
42. Alfred Thayer Mahan, The Influence of Sea Power Upon History 1660-1783, at
25(5thed. 1894).
43. It is true that he also argued that navies exist for the protection of commerce, id. at 26,
but the means of protection come back to sea power. At the same time, for Mahan, "[s]ea power
in the broad sense . . . includes not only the military strength afloat that rules the sea or any part
of it by force of arms, but also the peaceful commerce and shipping from which alone a military
fleet naturally and healthfully springs, and on which it securely rests." Id. at 28.
44. His vision was taken up and acted upon by a former assistant secretary ofthe Navy who
ascended to the presidency in 1901, at the age of 43. Just how much Admiral Mahan's thinking
influenced Theodore Roosevelt's decisions to send Admiral Dewey and his Great White Fleet of
four battleship squadrons around the world (1907-19.09) or to construct a canal across the Pana-
manian isthmus (1904-1914) is a matter of speculation.
45. JULIAN CORBETT, SOME PRINCIPLES OF MARITIME STRATEGY, pt. Ill, ch. I (1911).
46. Corbett explains in his chapter on command ofthe sea: "That this vital feature [com-
mand ofthe sea] of naval warfare should be consecrated as a maxim is well, but when it is carica-
tured into a doctrine, as it sometimes is, that you cannot move a battalion oversea until you have
entirely overthrown your enemy's fleet, it deserves gibbeting." Id. at 101. The "gibbet" was a
form of gallows, where executed criminals were hung for public display.
47. Id., pt. Ill, ch. I.
48. Mat 87.
49. Samuel P. Huntington, National Policy and the Transoceanic Navy, U.S. NAVAL INSTI-
TUTE PROCEEDINGS, May 1954, at 483. Huntington pronounced that:
The fundamental element of a military service is its purpose or role in implementing
national policy. The statement of this role may be called the strategic concept of the
service If a military service does not possess such a concept, it becomes purposeless,
it wallows about amid a variety of conflicting and confusing goals, and ultimately it
suffers both physical and moral degradation.
A military service capable of meeting one threat to the national security loses its reason
for existence when that threat weakens or disappears. If the service is to continue to
exist, it must develop a new strategic concept related to some other security threat.
50. Huntington likely could not have been expected to foresee the Soviet's rapid naval
buildup after the embarrassing October 1962 Cuban missile encounter. See, e.g., Donald
Chipman, Admiral Gorshkov and the Soviet Navy, AIR UNIVERSITY REVIEW (July/ Aug. 1982),
available at http://www.airpower.maxwell.af.mil/airchronicles/aureview/1982/jul-aug/chipman
.html; David Fairhall, Russian Seapower: An account of Its Present Strength and
Strategy 18 (1971).
51. John Keegan, The Price of Admiralty: The Evolution of Naval Warfare 267
( 1988). Apparently, Admiral Raymond Spruance, who commanded Carrier Task Force 16 at the
44
Craig H. Allen
Battle of Midway, disagreed. He is reported to have said that "the submarine beat Japan." See AL-
EXANDER P. deSeversky, Victory Through Air Power 70 (1943).
52. KEEGAN, supra note 51, at 272. Although the book was written in 1988, shortly after the
Falklands-Malvinas conflict, he does not include the naval battles in that conflict within his anal-
ysis.
53. JOHN F. LEHMAN, Jr. COMMAND OF THE SEAS 116-17, 120(1988) (reporting that some
commentators objected that claims to maritime "superiority" might be newly provocative to the
Soviets).
54. US Navy Department, . . . From the Sea: Preparing the Naval Service for the 21st Century
(1992), reprinted, with commentary, in U.S. NAVAL STRATEGY IN THE 1990S: SELECTED DOCU-
MENTS 87-100 (John B. Hattendorf ed., 2006) (Vol. 27, US Naval War College Newport Papers).
Volume 27, Professor Hattendorf s most recent Newport Paper, continues the work he began in
volume 19. JOHN B. HATTENDORF, THE EVOLUTION OF THE U.S. NAVY'S MARITIME STRATEGY,
1977-1986 (2004) (Vol. 19, US Naval War College Newport Papers). Peter M. Swartz of the Cen-
ter for Naval Analyses has compiled a study titled "US Navy Capstone Strategies and Concepts
(1970-2006)." The study is available on The John Hopkins University Applied Physics Labora-
tory website, http://www.jhuapl.edu/maritimestrategy/historic/overview.htm (last visited Feb.
13,2006).
55. US Navy Department, Forward . . . From the Sea (1995), reprinted, with commentary, in
U.S. Naval Strategy in the 1990s, supra note 54, at 149-158.
56. The Royal Australian Navy Doctrine explains:
Command of the sea was theoretically achievable through the complete destruction or
neutralisation of the adversary's forces, but it was a concept that, however historically
valid, became increasingly unrealistic when naval forces were being faced by a range of
asymmetric threats brought about by technological innovations such as the mine, the
torpedo, the submarine and the aircraft. Furthermore, attempting to command the sea
carried the risk of dissipating resources by a failure to recognise that the sea, unlike the
land, was a dynamic medium and that the value of maritime operations was in relation
to the use of the sea for movement and not for possession of the sea itself. Julian
Corbett, in particular, recognised these dilemmas. He pointed out that all naval conflict
was fundamentally about the control of communications. With this in mind, Corbett
qualified the concept of command of the sea, a process which led in the 1970s to the
development of the contemporary term sea control.
Australian Maritime Doctrine, supra note 14, at 38.
57. Jan S. Breemer, The End of Naval Strategy, 22 STRATEGIC REVIEW 40 (1994). Not every-
one agreed. In 1999, noted grand strategist Colin Gray's Modern Strategy argued that Mahan was
(mainly) right. COLIN S. GRAY, MODERN STRATEGY 217-227 (1999) (concluding that Admiral
Mahan was "wiser than his critics"). After criticizing Paul Kennedy's treatment of Mahan, Gray
goes on to opine that Mahan might be the most under-rated theorist of modern strategy. Id. at
217.
58. Posen, supra note 19, distinguishes hegemony from primacy. See also STEPHEN WALT,
Taming American Power: The Global Response to U.S. Primacy (2006); Stephen M. Walt,
American Primacy: Its Prospects and Pitfalls, 55 NAVAL WAR COLLEGE REVIEW 9 (2002); Stephen
G. Brooks & William C. Wohlforth, American Primacy, 81 FOREIGN AFFAIRS 20 (2002).
59. Infra note 61.
60. He explains that "[pjerhaps the first problem that primacy will create for the U.S. com-
mand of the commons is greater difficulty in sustaining, improving, and expanding the global
base structure that the United States presently enjoys." Posen, supra note 19, at 45.
45
Command of the Commons Boasts: An Invitation to Lawfare?
61. The White House, The National Security Strategy of the United States of America 29-30
(2002), available at http://www.whitehouse.gov/nsc/nss.pdf.
62. The White House, The National Security Strategy of the United States of America, Intro-
duction (Mar. 2006), available at http://www.whitehouse.gov/nsc/nss/2006/nss2006.pdf. See
also National Defense Strategy, supra note 7, at 5 ("We will have no global peer competitor and
will remain unmatched in traditional military capability").
63. Chairman of the Joint Chiefs of Staff, JointVision 2020, at 6 (June 2000) (defining full
spectrum dominance as "the ability of US forces, operating unilaterally or in combination with
multinational and interagency partners, to defeat any adversary and control any situation across
the full range of military operations"). See also Chairman of the Joint Chiefs of Staff, National
Military Strategy of the United States 23-26 (2004). Beginning in 2004, the Joint Vision docu-
ment is incorporated into the National Military Strategy.
64. See 2006 National Security Strategy, supra note 62, Introduction (our strength "rests on
strong alliances, friendships, and international institutions"); National Defense Strategy, supra
note 7, at 5 (listing as a vulnerability: "[o]ur capacity to address global security challenges alone
will be insufficient"); id. at 18 ("our security is inextricably linked to that of our partners").
65. National Defense Strategy, supra note 7, at 12.
66. Mat 13.
67. The White House, National Strategy to Combat Weapons of Mass Destruction (Sept.
2006) [hereinafter NS-CWMD], available at http://www.whitehouse.gov/news/releases/2002/
12/ WMDStrategy.pdf.
68. The White House, National Strategy for Combating Terrorism (Dec. 2002; updated and
reissued 2006) [hereinafter NS-CT], available at http://www.whitehouse.gov/nsc/nsct/2006/
nsct2006.pdf.
69. NS-CWMD, supra note 67, at 6.
■> 70. NS-CT, supra note 68, at 19.
7 1 . Text and commentary available at http://www.usinfo.state.gov/products/pubs/proliferation.
72. An overview of the "1000-ship navy" concept is available at http://www.janes.com/
defence/naval_forces/news/jfs060612_l_n.shtml.
73. The White House, National Security Presidential Directive 41 /Homeland Security Presi-
dential Security Directive 13, at 5-6 (Dec. 21, 2004) (NSPD-41/HSPD-13), available at http://
www.fas.org/irp/offdocs/nspd/nspd4 1 .pdf.
74. Id. at 2.
75. The White House, National Strategy for Maritime Security (2005), available at http://
www.whitehouse.gov/homeland/4844-nsms.pdf. The supporting plans include the National
Plan to Achieve Domain Awareness, Global Maritime Intelligence Integration Plan, Maritime
Operational Threat Response Plan, International Outreach and Coordination Strategy, Mari-
time Infrastructure Recovery Plan, Maritime Transportation System Security Plan, Maritime
Commerce Security Plan, and Domestic Outreach Plan.
76. Joseph L. Nimmich & Dana A. Goward, Maritime Awareness: The Key to Maritime Secu-
rity, which is Chapter IV in this volume, at 61-64.
77. Remarks as delivered by Admiral Mike Mullen, Current Strategy Forum, Naval War Col-
lege, Newport, Rhode Island, June 14, 2006, available at http://www.navy.mil/navydata/people/cno/
Mullen/CNO_CSF 140606.pdf. See also Brendan M. Greeley, Jr., The CNO Calls for a New Mari-
time Strategy, U.S. NAVAL INSTITUTE PROCEEDINGS, July 2006, at 6.
78. Clark, supra note 13, at 32.
46
Craig H. Allen
79. Chief of Naval Operations, Navy Strategic Plan in Support of Program Objective Memo-
randum 08 (May 2006), available at http://www.jhuapl.edu/MaritimeRegistry/Documents/
nsp_2006.pdf.
80. Chief of Naval Operations & Commandant of the Marine Corps, Naval Operations Con-
cept 2006, available at http://www.mcwl.quantico.usmc.mil/concepts/ServiceConcepts/
NOC%20FINAL%2014%20Sep.pdf.
81. Supra note 72.
82. The CNO has defined the 1,000-ship navy as a network of international navies, coast
guards, maritime forces, port operators, commercial shippers and local law enforcement, all
working together.
83. See William J. Clinton, A National Security Strategy of Engagement and Enlargement
(Feb. 1995), available at http://www.au.af.mil/au/awc/awcgate/nss-95.pdf ("our engagement
must be selective"). The 1995 National Security Strategy included provisions for forward de-
ployments and power projection. Robert Art characterized the Clinton Strategy as one of selec-
tive engagement, a strategy Art advocates. ROBERT J. ART, A GRAND STRATEGY FOR AMERICA
(2003).
84. There are clearly elements of cooperative security in both the 2006 National Security
Strategy and the National Defense Strategy. See, e.g., National Defense Strategy, supra note 7, at
15.
85. Stephen Walt, In the National Interest, BOSTON REVIEW (Feb./Mar. 2005), available at
http://bostonreview.net/BR30.lZwalt. html.
86. see, e.g., walter russell mead, power, terror, peace, and war: america's
Grand Strategy in a World at Risk (2004); Christopher Layne, The Peace of Illu-
sions: American Grand Strategy From 1940 to the Present (2006); Colin Dueck, Re-
luctant CRUSADERS: POWER, CULTURE, AND CHANGE IN AMERICAN GRAND STRATEGY
(2006); G. John Ikenberry & Anne-Marie Slaughter, Forging a World of Liberty Under Law, U.S.
National Security In The 21st Century (Princeton University, Project on National Security), Sept.
26, 2006, available at http://www.wws.princeton.edu/ppns/report/FinalReport.pdf; Report of
the UN Secretary-General's High Level Panel on Threats, Challenges and Change, A More Secure
World: Our Shared Responsibility, U.N. Doc. A/59/565 (2004), available at http://www.un.org/
secureworld/.
87. THOMAS HOBBES, THE LEVIATHAN, ch. 17 (1651) ("covenants, without the sword, are
but words and of no strength to secure a man at all").
88. Hugo Grotius, The Freedom of the Seas: Or the Right Which Belongs to the
DUTCH TO TAKE PART IN THE EAST INDIAN TRADE (James Brown Scott ed., Ralph van Deman
Magoffin trans., 1916; reprinted 2001) (1608). Cynics might observe that the militarily weak
Dutch had no choice but to argue for such protection under the law against the much more capa-
ble English and Spanish. See ROBERT KAGAN, OF PARADISE AND POWER: AMERICA AND EUROPE
in the New World Order 10 (2003).
89. John Selden, Mare Clausum: Of the Dominion, Or, Ownership of the Sea (2004
reprint of the first edition by Lawbook Exchange Ltd.) (1635). Selden's book was written in 1617
or 1618 but was not published until 1635.
90. Le Louis, 2 Dods. 210, 165 Eng. Rep. 1464 (High Court of Admiralty 1817).
91. United Nations Convention on the Law of the Sea, Dec. 10, 1982, 1833 U.N.T.S. 3, re-
printed in 21 INTERNATIONAL LEGAL MATERIALS 1261 [hereinafter 1982 LOS Convention].
92. CARL VON CLAUSEWITZ, ON WAR 75 (ed. and trans, by Michael Howard & Peter Paret,
1984) (1827). He would not, however, ignore moral values in war. Id. at 137.
47
Command of the Commons Boasts: An Invitation to Lawfare?
93. George F. Kennan, American Diplomacy, 1900-1950 (1951). George Kennan is best
known as "X," the author of The Sources of Soviet Conduct, 25 FOREIGN AFFAIRS 566 (1947).
94. Philip Bobbitt, The Shield of Achilles: War, Peace and the Course of History
(2002). Bobbitt explains "What Wilson — and Roosevelt — understood quite clearly was the do-
mestic wellspring of a sustainable foreign policy. They sought popular endorsement by playing
the U.S. government's strongest card, the American commitment to constitutional ideas as law."
Id. at 362.
95. Clausewitz laments that "[everything in war is simple, but the simplest thing is diffi-
cult." CLAUSEWITZ, supra note 92, at 1 19. And the general's battlefields did not include 24-hour
news services, NGOs or congressional staffers.
96. 1982 LOS Convention, supra note 91, art. 136.
97. The most recent example was Israel's so-called "blockade" of Lebanon in the 2006 cross-
border conflict with Hezbollah. See Israel Imposes Blockade on Lebanon, REUTERS, July 13, 2006
(citing Israel military source who announced a "full naval closure on Lebanon, because Leba-
non's ports are used to transfer both terrorists and weapons to the terror organizations operating
in Lebanon").
98. The law of neutrality, which addresses the relationship between belligerents and neu-
trals, concerns questions of contraband, blockade and visit and search. The law of neutrality
must be distinguished from the law of armed conflict, which governs actions between and
among belligerents. See generally 10 MARJORIE M. WHITEMAN, DIGEST OF INTERNATIONAL LAW
644 (1968); 1 1 MARJORIE M. WHITEMAN, DIGEST OF INTERNATIONAL LAW ch. XXXIII (1968);
Hague Convention No. XII Concerning the Rights and Duties of Neutral Powers in Naval War,
Oct. 18, 1907, 36 Stat. 2415, reprinted in DOCUMENTS ON THE LAWS OF WAR 127 (Adam Roberts
& Richard Guelff eds., 3d ed. 2000); 4 ENCYCLOPEDIA OF PUBLIC INTERNATIONAL LAW 409
(Rudolph Bernhardt ed., 2000) ("Ships: Visit and Search").
- 99. U.N. Charter art. 2, paras. 1, 4.
100. 1982 LOS Convention, supra note 91, arts. 89 ("No State may validly purport to subject
any part of the high seas to its sovereignty") and 137 ("No state shall claim or exercise sover-
eignty or sovereign rights over any part of the Area"). The "Area" is defined as the seabed and
ocean floor, and subsoil thereof, beyond the limits of national jurisdiction. Id., art. 1.
101. The second of the 1 4 Points President Wilson laid out in his address to Congress in 1 9 1 8
was "[a]bsolute freedom of navigation upon the seas, outside territorial waters, alike in peace
and in war, except as the seas may be closed in whole or part by international action for the en-
forcement of international covenants." Woodrow Wilson, Address to Joint Session of Congress,
Jan. 8, 1918, available at http://www.lib.byu.edu/~rdh/wwi/1918/14points.html.
102. See Report of the International Maritime Organization (IMO) Marine Environment
Protection Committee (MEPC), 53rd Session, July 2005, available at http://www.uscg.mil/hq/
gm/mso/docs/MEPC53_report_cable.doc.
103. 1982 LOS Convention, supra note 91, arts. 88, 141, 301.
104. Id., art. 92.
105. San Remo Manual on International Law Applicable to Armed Conflicts at
SEA 31-32, paras. 118-121 (Louise Doswald-Beck ed., 1995). See also 1 1 WHITEMAN, supra note
98, at §§ 1-6; ANNOTATED SUPPLEMENT TO THE COMMANDER'S HANDBOOK ON THE LAW OF
NAVAL OPERATIONS para. 7.6 (A.R. Thomas & James C. Duncan eds., 1999) (Vol. 73, US Naval
War College International Law Studies); Wolff Heintschel von Heinegg, Visit, Search, Diversion,
and Capture in Naval Warfare, Pts. I & II, 29 CANADIAN YEARBOOK OF INTERNATIONAL LAW 283
(1991) & 30 Canadian Yearbook of International Law 89 (1992).
48
Craig H. Allen
106. See US NAVAL WAR COLLEGE, MARITIME OPERATIONAL ZONES ch. 4 (2006) (law of na-
val warfare and zones).
107. Treaty on Principles Governing the Activities of States in the Exploration and Use of
Outer Space, Including the Moon and Other Celestial Bodies, Jan. 27, 1967, 18 U.S.T. 2410, 610
U.N.T.S. 205. See, e.g., arts. I-IV.
108. Treaty on Open Skies, Mar. 24, 1992, S. Treaty Doc. No. 102-37 (1992), available at
http://www.state.gov/www/global/arms/treaties/openskil.html. Russia flew two open skies
flights over the United States (Alaska and the Southwest) in 2005 and planned four such flights
for 2006.
109. Confidence-building measures are seen by many as the key to providing the transpar-
ency necessary for effective arms control. Such measures may be found in the International
Atomic Energy Agency safeguards and in the Organization for the Prohibition of Chemical
Weapons (OPCW) challenge inspections under Article IX of the Convention on the Prohibition
of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their De-
struction, Jan. 13, 1993, 32 INTERNATIONAL LEGAL MATERIALS 800, reprinted in THE LAWS OF
ARMED CONFLICT 239 (Dietrich Schindler & Jiri Toman eds., 4th ed. 2004).
110. Mine warfare is an often cited example of a sea-denial strategy.
111. Measures to erode political support for basing or support facilities have been identified
as a key vulnerability for the US Navy's forward presence posture. Imagine a lawfare campaign
that successfully pressured the Spanish and Italian governments to terminate agreements for US
bases in Rota and Naples. See Owen R. Cote, Jr., Assuring Access and Projecting Power: The Navy
in the New Security Environment (MIT Security Studies Program paper, April 2002), available at
http://web.mit.edu/ssp/Publications/navy_report/navyreport.html.
112. Charles Dunlap, Legal Issues in Coalition Warfare: A US Perspective, 221, in THE LAW OF
War in the 21st Century: Weaponry and the Use of Force 221 (Anthony M. Helm ed.,
2007) (Vol. 82, US Naval War College International Law Studies). Lawfare was the subject of a
Roundtable on National Security convened by the Council on Foreign Relations on March 18,
2003.
113. The book, written in 1999 by People's Liberation Army (PLA) Colonels Qiao Liang and
Wang Xiangsui, lays out a strategy to defeat a technologically superior opponent, such as the
United States. One translation of the book is available at http://www.terrorism.com/documents/
TRC-Analysis/unrestricted.pdf.
114. See KAGAN, supra note 88, at 10. He explains:
George Washington, Alexander Hamilton, John Adams, and even Thomas Jefferson
were not Utopians. . . . They were realistic enough to know that they were weak, and
both consciously and unconsciously they used the strategies of the weak to get their way
in the world. . . . They appealed to international law as the best means of regulating the
behavior of nations, knowing well they had few other means of constraining Britain and
France. They knew from their reading of Vattel that in international law, 'strength or
weakness . . . counts for nothing. A dwarf is as much a man as a giant is; a small Republic
is no less a sovereign State than the most powerful Kingdom.'
1 1 5. Davida E. Kellogg, International Law and Terrorism, MILITARY REVIEW, Sept./Oct. 2005,
at 50-57.
116. Id. at 50
117. National Defense Strategy, supra note 7, at 5.
118. The phrase and its implications did not escape the media's attention. See Op-Ed, The
Pentagon and "Lawfare," WASHINGTON TIMES, Mar. 24, 2005, at A20.
49
Command of the Commons Boasts: An Invitation to Lawfare?
119. Consider, for example, General Assembly Resolution 3314 (XXIX) (1974), in which the
assembly adopted, without a vote, a definition of "aggression." The assembly's definition was
later picked up by the International Court of Justice in the case brought against the United States
by Nicaragua. Military and Paramilitary Activities in and against Nicaragua (Nicar. v. U.S.),
1986 I.C.J. Rep. 1, para. 195 (June 27) (merits) (holding that the description in paragraph 3(g) of
the annexed definition "may be taken to reflect customary international law"). The tribunal
found it unnecessary to cite evidence of State practice or opinio juris to support its conclusion.
120. A.V. Lowe, The Commander's Handbook on the Law of Naval Operations and the Contem-
porary Law of the Sea, in THE LAW OF NAVAL OPERATIONS 109, 130-38 (Horace B. Robertson, Jr.
ed., 1999) (Vol. 64, US Naval War College International Law Studies); Mark W. Janis, Neutrality,
in supra at 148.
121. Former Naval War College president and Carter-era director of Central Intelligence Ad-
miral Stansfield Turner, is apparently ready to give up the carriers. Stansfield Turner, Do We
Need Carriers? U.S. NAVAL INSTITUTE PROCEEDINGS, July 2006, at 16.
122. See National Defense Strategy, supra note 7, at 5 ("Our leading position in world affairs
will continue to breed unease, a degree of resentment, and resistance").
50
Ill
Global Commons and the Role for
Intelligence
Lowell E. Jacoby*
Introduction
This article attempts to answer four questions concerning the global com-
mons and the role for intelligence in the evolving circumstances in which
transnational terrorism has replaced the military capabilities of a small set of po-
tential adversarial States to become the primary threat to the United States and its
interests. First, how broadly should the global commons be conceived (space, air,
surface, subsurface, seabed, cyberspace)? Second, what are the primary threats em-
anating from the global commons? Third, what role should elements of the intelli-
gence community play? How will they be integrated into a plan for command of
the commons? Finally, the Chief of Naval Operations and the National Strategy to
Achieve Maritime Domain Awareness1 call for a persistent intelligence, surveillance,
and reconnaissance (ISR) capability in the global maritime commons. What ob-
stacles will we face in achieving that? Are any of those obstacles legal ones?
Domains of the Global Commons
In a more rule-driven time, one or more of the space, air, surface, subsurface, seabed
and cyberspace domains might be excluded from the commons. Concepts such as
sovereignly, control of airspace or the seas, nation-State identity and prerogatives,
Vice Admiral, United States Navy (Ret.)
Global Commons and the Role for Intelligence
and territorial waters had great meaning. Much of the meaning of those concepts
and many of the accompanying rules are obsolete.
What forces have changed this situation? Globalization, the information age,
the threats of terrorism and weapons proliferation are some of the factors at work,
along with associated concerns over narcotics trafficking, smuggling and move-
ments of illegal aliens, just to name a few.
The threats have redefined the commons. We speak of "ungoverned spaces"
such as Somalia, or portions of nation-States where the government does not have
effective control, which is a relatively common occurrence in today's world. These
areas are part of the global commons. They become potential havens for terrorists,
or the source of other threatening activities. In the past, when nation-States lost
control of some of their territory it was typically of concern to that State and maybe
to its neighbors. Today, these situations are of far broader concern because of their
association with the global commons.
The information age has had a tremendous effect. Cyberspace is a difficult-to-
define, but an absolutely essential element of the global commons with great
potential for both good and evil. It's a largely ungoverned space apparently devoid
of strong international conventions, an extensive body of legal opinion and pre-
cedence, and effective enforcement mechanisms. The debate within the United
States over domestic surveillance is a manifestation of the issues concerning
cyberspace and its position as the nexus of the commons and threats in the infor-
mation age.
The components of the global commons are interconnected, interdependent
and mutually reinforcing, making the associated issues very complex. Consider the
following illustrative example. The threat is terrorist use of weapons of mass de-
struction (WMD) and the coordination of the planned operations occur over the
Internet using advanced commercial technologies combined with use of multiple
obscure dialects by a security conscious group with haven in ungoverned space.
The movement of associated personnel is through established smuggling routes,
the transportation of components for the weapon is facilitated by a narcotics net-
work and the final movement of WMD to the planned attack location takes advan-
tage of containers embedded in legitimate maritime trade. When viewed in this
context, both the scope of the problem, and the need to master the global com-
mons situation, come into focus. This scenario also captures the difficulties at-
tached to the intelligence problem — a problem of scale, scope, complexity and the
challenges presented by a highly accomplished foe.
52
Lowell £. Jacoby
The Primary Threats
Two conditions must exist for a threat to exist. An entity must have both the capa-
bility and intent to do harm.
The primary concerns are terrorism and proliferation of weapons of mass de-
struction. The worst case situation is the one where the two interconnect and ter-
rorist groups with broad reach possess WMD attack capabilities. In this situation,
capabilities and intent combine to present a threat of major proportions.
The global commons may play a key role in this threat scenario. The challenge
for intelligence is to present the information required by decision makers that will
enable them to defeat this threat. It is an awesome challenge and responsibility.
It is important to realize that a broad range of challenges to stability, economic
well-being, international commerce, health and welfare also originate or can be
abetted by employing the commons. Again, the intelligence challenges are
immense.
Finally, there's an additional capability that deserves great attention, and that is
the capability to disrupt or destroy the ability to communicate and access the data
that's the lifeblood of today's world and modern military capabilities. Major dis-
ruption or destruction of these capabilities could threaten the global economy.
The Role and Integration of the Intelligence Community
Command of the commons is not a realistic goal, if the global commons are
broadly defined. The ability of the adversary to hide and disguise activities, the lim-
ited value of traditional techniques such as deterrence and dissuasion, the pace of
globalization and information technology changes, the interconnected nature of
the problems, combine to make the concept of command of the commons in the
traditional sense of command of the sea unachievable.
I take this position based upon what I believe is a realistic appreciation of what
intelligence can achieve. If we attempt to know everything about everything all the
time, which is what command of the commons would entail, we will fail. The result
will be that we know some things about some things all the time and we will have
spread ourselves too thin to be effective in providing requisite knowledge to deci-
sion makers. Rather, the key is to focus our efforts and dominate those portions of
the commons that are integral to our priority objectives.
The key is to be selective and to prioritize our needs. Rather than control of the
commons, we should focus efforts on achieving domination of those portions of
the commons that are important at a specific time and place. This is akin to what is
typically done in counter-narcotics interdiction operations. Intelligence collection
53
Global Commons and the Role for Intelligence
and analysis, plus the operating forces, are focused on a specified area for a speci-
fied period of time. This focus is overlaid on a fundamental understanding of the
problem and operating patterns which has been achieved over time.
Intelligence must be agile and responsive to changing circumstances and deci-
sion makers priorities in this expansive common space. That requires intelligence
to simultaneously provide breadth and depth. Breadth provides the foundation for
the effort. It allows intelligence professionals to know something about everything
all the time. This breadth then enables the focused efforts needed to employ capa-
bilities and to inform decision makers as priorities are established.
Intelligence needs to be an integral part of the plan. The plan must establish pri-
orities. It is essential that intelligence planners work with operators and decision
makers to ensure that the intelligence capabilities are resourced and that the expec-
tations are realistic. The resultant intelligence plan needs to be an integral part of
the overall plan. And, as unforeseen circumstances are encountered, the agility and
responsiveness based upon intelligence breadth and depth will be tested. A key ele-
ment is that intelligence capabilities need to be in place early. They cannot be cre-
ated after the priorities change. By then it is too late.
Finally, intelligence capabilities must span from unclassified data that is avail-
able in the public domain to highly sensitive data collected by highly classified
means. These capabilities must encompass the data and expertise that friends and
allies can contribute to assist in solving these very difficult problems. The data must
be presented using the most modern information management techniques avail-
able and must reside on protected networks that employ the most advanced tools
and capabilities. And, since the output of the processes is knowledge, the data must
be processed through the minds of highly talented, dedicated and trained men and
women.
A Persistent ISR Capability
Persistent surveillance is the capability to linger on a specified problem for as long
as it takes to fully understand the issue or solve the problem. The problem may be
to track an individual ship. The problem maybe to monitor activities in a specified
port. The problem may be to understand the activities of a particular shipping
company that is potentially involved in illicit activities. The problem may be to un-
derstand the intentions of a specific individual. The problem may come down to
identifying and tracking a single container that is in intermodal international com-
merce. Obviously, these and other problems that are encountered are great in
terms of magnitude and complexity. It really is the issue of finding, and then main-
taining contact on that often-discussed needle in the haystack.
54
Lowell E. Jacoby
The solutions to the problems will come from a variety of sources ranging from
satellites in space, to human intelligence collectors, to examination of legal docu-
ments and financial records, to whatever sources of information may contribute to
solving the problem. Tracking that container, for example, requires a great deal of
international cooperation. The goal is to identify and begin the tracking at the
point of departure so it can be interdicted at the optimal point during its move-
ment. Once the target enters that intermodal transportation system, the surveil-
lance problem becomes very, very difficult.
There will be legal issues threaded throughout. I have great appreciation for the
close partnership that must exist between intelligence professionals and legal
counsel. That partnership must be in place throughout the intelligence process. It
must begin with the development of the plan and continue throughout the opera-
tion. That partnership needs to part of the overall plan. It can't be attached at the
end if it is to be effective.
Conclusion
The concept of global commons must be very broadly defined and encompass the
domains of space, air, surface, subsurface, sea beds and cyberspace if it is to be a
useful construct in this era of globalization, rapid information age advancements,
and the threats of terrorism and proliferation of weapons of mass destruction. The
domains of the global commons are interconnected, interdependent and mutually
reinforcing.
The capabilities of the US intelligence community, and those of friends and
allies, are integral to efforts to dominate the global commons. These intelligence
capabilities must be simultaneously broad and deep. Intelligence required to suc-
cessfully operate in the global commons will be derived through a broad variety of
sources from unclassified data that is publicly available to highly sensitive data col-
lected by highly classified means. The most modern information management
techniques must be applied to the data and the data must reside on secure networks
employing the most modern tools and capabilities.
Key to dominance in the global maritime commons will be an ability to provide
persistent surveillance. Persistent surveillance in the global maritime commons
will be achieved by fully integrating a broad variety of information sources into a
coherent, agile capability that allows analysts to generate the knowledge needed to
make informed decisions with respect to the global maritime commons.
The expanse and complexity of the global commons presents problems of scale,
scope and a convenient operating space for highly accomplished, sophisticated and
dedicated foes. Only by recognizing the broad expanse of the commons and
55
Global Commons and the Role for Intelligence
focusing our intelligence efforts on those portions that can yield the information
necessary to counter the wide array of threats can we address the new and emerging
security challenges of the twenty- first century.
Notes
1. Department of Homeland Security, National Strategy to Achieve Maritime Domain
Awareness (Oct., 2005), available at http://www.dhs.gov/xlibrary/assets/HSPD_MDAPlan.pdf.
56
IV
Maritime Domain Awareness:
The Key to Maritime Security
Joseph L. Nimmich and Dana A. Goward*
Maritime security is burdened by thousands of years of history and tradition.
We in the Coast Guard are reminded of this truism on a daily basis. One
particularly poignant reminder came in October of 2002, a scant thir-
teen months after the 9/11 attacks. In the middle of a weekday afternoon, a fifty-
foot long boat pulled up near the Rickenbacker Causeway in Miami, Florida and
offloaded 220 illegal aliens directly into the heart of downtown. Naturally, a news
helicopter was overhead and the event was almost instantly broadcast nationwide.1
The US Coast Guard is supposed to play a leading role in preventing these kinds of
incidents, and the commandant of the Coast Guard at the time, Admiral Thomas
Collins, ended up briefing the secretary of transportation. After he was told of the
incident, the secretary, in some disbelief, asked Admiral Collins, "How in the
world did they get through?" The Admiral's reply was "Sir, with all due respect,
how did they get through what?"
This is an amusing story for those of us in the maritime community because we
have long known and accepted the openness and vulnerabilities of our many port
and coastal areas. It should be an instructive story for us as well, though, as it makes
two important points. First, it dramatically reminds us of the vulnerability of these
* Rear Admiral Joseph L. Nimmich, US Coast Guard and Captain Dana A. Goward, US Coast
Guard (Ret.). An earlier version of this article was published in the April 2007 issue of the U.S.
Naval Institute Proceedings and is republished with permission.
Maritime Domain Awareness: The Key to Maritime Security
crucial parts of our transportation and economic systems. Our ports are essential
trans-shipment nodes that are responsible for 95 percent of our trade. Many are
highly specialized; all have high concentrations of expensive, difficult to replace in-
frastructure. Most ports are in population centers — and all are economic engines.
Yet security has often been seen as an expensive obstacle, rather than an essential
contributor, to the long-term, uninterrupted free flow of commerce.
Second, the incident in Miami, and the Secretary of Transportation's reaction,
tell us that we maritime professionals fall far short of the expectations of govern-
ment leaders and the populations they represent. The great majority of our leaders
and citizenry are landsmen with no maritime experience at all. They are familiar
with air travel, as a large portion of the population has traveled at least once by air-
plane. They know from movies and television that aircraft, airports, and the skies
are monitored by radar operators, and that aircraft off course or in trouble can be
quickly identified and assisted. Their experience at airports tells them that the flow
of air traffic is orderly, efficient, fairly secure and much the same from one place to
the next. Because few have experience with maritime transportation, they uncon-
sciously assume — and expect — that the kind of orderliness and security they see in
aviation also exists at seaports and on the ocean. When they discover to the con-
trary, they are disappointed, and often wonder why it is that the maritime commu-
nity has not entered the modern age.
A part of the answer is again that maritime security is burdened by thousands of
years of history and tradition. Unlike aviation, which sprang to life as we know it
today in less than a hundred years and which has a coherent, relatively complete ar-
chitecture of policies and supporting systems, maritime practices have evolved
over centuries. Maritime policies and supporting systems have likewise evolved
and have developed ad hoc. Unlike aviation where transparency has been the hall-
mark of safety and has been improved even more for security purposes, the mari-
time domain has long been marked by a culture of secrecy that now works against
both individual community members and society as a whole.
Policy and Systems Architectures
The world's aviation system has a clearly articulated policy architecture and is sup-
ported by a well-developed systems architecture designed to monitor compliance
and aid enforcement of the rules regulating flight operations. Maritime transporta-
tion, while there are local exceptions around the globe, has generally evolved over
the centuries into a hodgepodge of interconnecting, often disparate policies, sup-
ported by semi- or completely incompatible sensor and information systems.
58
Joseph L. Nimmich and Dana A. Goward
In the United States, the maritime domain is made even more complex by
highly fragmented, some might say near chaotic, governance. A National Academy
of Sciences study determined there were at least eighteen federal agencies that have
responsibility for regulating some aspect of US maritime transportation and that
there is little to no formal method of coordinating their efforts.2 Add to these fed-
eral agencies a variety of agencies and organizations from the individual states,
coastal cities, specially commissioned port authorities, marine exchanges, private
facility operators, etc., and you have a truly dizzying picture. It explains the old say-
ing that, "if you have seen one port, you've just seen one port." There are 361 com-
mercial seaports in the United States and all have different combinations of
geography, governance, sensors, operating rules, ownership, mix of activities and
so on. It is not a situation that easily lends itself to improvements in safety, security,
or the efficient flow of commerce.
While the attacks of September 1 1 were conducted through the aviation sys-
tem, the pre-existing aviation systems and policy architectures allowed for an ex-
ceptionally rapid and coordinated response. Near real-time visibility of the
airspace of the United States and effective means of communication throughout
the aviation system meant that the threat could rapidly be contained. Over five
thousand aircraft were safely landed in less than two hours. Afterward, those same
policy and system architectures provided forensics and made it very easy to insert
policy changes and systems modifications to prevent further attacks. While one
can debate whether or not those changes were the correct ones, once decided
upon, they were easily and effectively implemented as a part of overall, coherent
policy and systems structures.
We do not have the same advantages in the maritime domain. There is no mari-
time equivalent of the National Airspace System Plan3 that details the various parts
of the system and how they are to work together and ensure that each is appropri-
ately considered in governance. Maritime system policies, developed by eighteen
different federal agencies, have no uniting structure and, in aggregate, have huge
gaps. As one example, over thirteen million recreational craft have virtually unfet-
tered access to the nation's commercial and military harbors. While the individual
states require that these boats be registered, many have no or lax titling practices,
making boat registration much easier to obtain legitimately or fraudulently. And,
unlike motor vehicle registrations, vessel data is not easily exchangeable and acces-
sible by enforcement officials. An enforcement officer in Florida, for example, has a
very difficult time, if it can be done at all, verifying information for a vessel that ap-
pears to be registered in Michigan. Further, and most importantly, few boaters are
currently required to know how to safely operate their vessel and understand mari-
time rules and regulations. Most states do not even require that a boat operator
59
Maritime Domain Awareness: The Key to Maritime Security
carry personal identification. Imagine the impact on highway safety and law en-
forcement if drivers were not only untrained and unlicensed, but not even required
to carry photo identification.
Compounding the lack of a complete and coherent maritime policy structure is
a lack of systems to enforce those policies we do have. In 2003, four Cuban Coast
Guard members decided they no longer wanted to work in Castro's Cuba. One
night they drove their small patrol boat north until, at about three o'clock in the
morning, they found the Hyatt Hotel marina in Key West, Florida. They walked
around Key West for two hours until they located a patrolling police officer and
surrendered.4 One can imagine them handing over their side arms and explaining
that their AK-47s were still in the boat. Despite comprehensive laws that establish
strict requirements for international maritime arrivals, our lack of adequate mari-
time surveillance results in an average of fourteen successful, illegal, malicious in-
cursions into the United States each and every week. We can only hope that the
damage is limited to landing illegal migrants, tons of narcotics, and the occasional
well-armed Cuban Coast Guardsman.
A Culture of Secrecy
Another part of the burden of maritime history and tradition is a culture of secrecy.
Dealers in commodities don't want competitors to know the sources and destina-
tions of their cargos. Fishermen don't want others to fish their favorite spots. Owner-
ship of commercial vessels is often concealed through a network of contracts and
paper corporations. On the vast and largely ungoverned and unpoliced global com-
mons that are the world's oceans, being difficult to find has been key to protection
from pirates, the navies of hostile nations, and others that would do a vessel harm.
This tradition of secrecy, along with the nature of the sea and ships, has led to
maritime transportation being the preferred vector for some of the world's most
infamous and evil cargos. Slaves, contraband, narcotics, conventional weapons to
start a new war, or a weapon of mass destruction to inflict terror, all these and more
can be transported in greater quantities, and often with greater secrecy, by sea than
by any other mode. Maritime commerce brings near limitless good to the world,
but its culture of secrecy has allowed it to bring significant evil as well.
The international community has always struggled to maximize the good and
minimize the evil brought by maritime transportation. We want to take advantage
of the sea's bounty to feed our children but don't want to destroy the fishing
grounds and starve our grandchildren. We want to ensure the free flow of com-
merce but don't want illegal substances and people smuggled ashore. We want
freedom of navigation, but are concerned that a vessel carrying thousands of tons
60
Joseph L. Nimmich and Dana A. Goward
of explosive cargo can sail mere miles off our coast, en route from one foreign port
to another, with no obligation to report its position or course, or obey our direc-
tions. We are concerned that some day such a vessel will be transiting off one of our
ports or a defense facility or a large city when it suddenly turns toward shore — and
disaster will strike.
We understand that in an information age security lies not in secrecy, but in
transparency. And we are becoming convinced that it is time to begin shedding the
burden of thousands of years of maritime history and tradition.
So how shall this be done? Improving governance with a more coherent and sys-
tematic approach to maritime regimes (policies, rules, regulations, statutes) is cer-
tainly required. We must also ensure that sufficient patrol and enforcement assets
are deployed to deter and respond to violations of those policies. First and fore-
most though, we must understand the maritime domain and what is going on
within it, so that we can formulate good policy, effectively deploy assets and ensure
the uninterrupted free flow of commerce.
Maritime Domain Awareness — See, Understand, Share
Our goal must be to achieve " [a]n effective understanding of anything in the mari-
time environment that can effect [sic] the safety, security, economy, or environ-
ment of the United States," the definition of "maritime domain awareness" in the
National Strategy for Maritime Security.5 Achieving awareness will require that
maritime activities and actors become more transparent, that what is seen is prop-
erly understood, and that this visibility and understanding be shared as widely as
possible among members of the maritime community.
See.
We must overcome the traditional culture of secrecy and make all activity and ac-
tors more transparent. Evil can dwell only in dark and hidden places. Transparency
leads to self-correcting behavior by shining a light that exposes bad actors and rein-
forces the ethic of good ones. It levels the playing field by revealing the cheat and re-
moving his advantage. It improves safety and commerce by better informing users
of hazards, conditions and routes. And it helps us focus scarce enforcement re-
sources in the most important areas.
Understand.
Watching the flow of maritime activities and actors is of little use unless what is
being seen can be understood. Decision makers must be able to differentiate a nor-
mal and innocent scene from one containing anomalies that deserve further
61
Maritime Domain Awareness: The Key to Maritime Security
investigation. When available, intelligence, analysis and pattern recognition must
be integrated into a context of broad situational awareness to understand motives
and intent. The goal is to deter and prevent all threats and all hazards. Without un-
derstanding, the best surveillance system in the world will only be able to docu-
ment adverse events as they unfold.
Share.
If we are to be successful in our maritime safety, security, and stewardship efforts,
we will need to harness the abilities, authorities, time and efforts of all stakeholders.
"Unity of command" among various levels of our federal, state and local govern-
ments, agencies of foreign governments, industry partners, etc. is unachievable and
undesirable. Rather, we must foster "unity of effort" in pursuit of our mutual goals
and interests through proactive, aggressive information exchange. Sharing data,
analysis, operating pictures and the like as broadly as possible (given appropriate
security and permissions) will provide multiple benefits and help with at least two
significant problems:
• We don't know what we know. Information needed to make critical
decisions often exists but is not available and correlated by those who might use it.
Data that showed multiple men of foreign origin traveling with no luggage had
purchased airline tickets shortly before flight time on four different airlines
existed on the morning of September 11, 2001. Had this data been available and
shared widely in an aviation safety and security community that understood the
potential threat, the world today might be a far different place.
• The challenge of complexity. The pursuit of maritime safety, security and
stewardship involves widely diverse players with far different sets of authorities,
responsibilities and capabilities — and these players operate in unique and varied
geographic and maritime locations. Shared awareness empowers each player and
fosters unity of effort in dozens of ways, from better informing individual
missions and avoiding "blue on blue" conflict, to drawing on the unconscious
knowledge of local experts. Done properly, it enables each member of the
maritime community to use shared data and knowledge to create a unique picture
in support of its own needs and missions. This enables each to bring the full force
of its unique authority, experience and expertise to the overall effort.
The Way Ahead
In the abstract, Maritime Domain Awareness (MDA) is a state of being, a goal that
will never be completely obtained as we strive for ever greater understanding. More
62
Joseph L. Nimmich and Dana A. Goward
concretely, it is something that mariners have been obtaining, to a degree, since the
first dugout canoe was launched and people felt the pull of the current and the
pressure of the wind.
As now envisioned, Maritime Domain Awareness is a process that collects,
fuses, and analyzes data about activities in, and the conditions of, the maritime en-
vironment and then disseminates the data gathered and analysis results to decision
makers. Put another way, it's the ability to gather the information to detect what it
is that's the threat, fuse the information to truly know that it is a threat, analyze it so
that the necessary corrective action can be determined, and then be able to move
that information to a command and control mode (the decision maker) to order
the necessary action to be taken. It is a process that will be heavily dependent on
technology, some of which currently exists, some of which will require develop-
ment. The "observables" on which information is collected include the characteris-
tics of the vessel and its history, information on the passengers, crew and cargo,
infrastructure, sea lanes, threats and weather. The collection portion of the process
will involve a wide variety of sources: sensors, both short and long range; open
source; private sector; law enforcement; intelligence agencies; and, of course, our
international partners. Our surveillance capabilities must be persistent and perva-
sive. Some of the sensor technology to meet this requirement already exist, e.g., radars,
cameras and space-based imaging systems; however, nearly all existing systems re-
quire upgrades. Other technologies, including high-altitude, long-endurance un-
manned air vehicles; remotely piloted, unmanned surface and subsurface vessels;
and aerostats and buoys equipped with a variety of sensors are possibilities for the
future system.
The next step in the MDA process is to fuse and analyze data gathered. Unless
that can be accomplished in a timeframe that permits effective action to be taken
against identified threats, the utility of the data will be limited. Processing the mas-
sive quantities of data in a timely manner to create actionable information presents
an enormous challenge. Advanced, automated data-fusion technologies will be
critical to the task, and these do not exist today except as advanced research and de-
velopment projects.
Because MDA can only be achieved through a partnership of many government
agencies, the dissemination of information between agencies and other stake-
holders is essential. Today the sharing of information among agencies is dependent
on existing networks and communication processes. Unfortunately most of those
systems were designed for intra-agency not inter-agency dissemination of infor-
mation. These communication difficulties are further compounded when
nonfederal organizations are considered. While progress has been made, much
needs to be done to develop networked information sharing using Internet-based
63
Maritime Domain Awareness: The Key to Maritime Security
technologies that will be the key to ensuring that the necessary information is pre-
sented to operational commanders and other decision makers in a manner that en-
ables accurate, dynamic and confident decisions and responses to maritime threats.
While much remains to be done to create the MDA process of the future, our
awareness of activities in the maritime domain is better today than at any point in
history. Much of that progress has been made in the five years since 9/11. We now
require major vessels in international trade to carry Automatic Identification System
transmitters so that we can track their movements. US Customs and Border Pro-
tection's National Targeting Center has made huge progress in understanding the
supply chain and tracking cargoes. The International Maritime Organization has
agreed to a fundamental change in the world's view of information to which a
coastal State is entitled concerning ships on international voyages. In 2008 coastal
states will have the right under international convention to know about ships that
are just passing by up to 1,000 nautical miles offshore.6 Yet our understanding of
the sea and activities therein remains highly fragmented and contains huge gaps.
To use an aviation metaphor from 9/ 1 1 , in the maritime environment there are still
a lot of un-reinforced cockpit doors. We have a duty to do better.
To do substantially better will require unity of effort across the entire maritime
community. The National Plan to Achieve Maritime Domain Awareness,7 ap-
proved by the White House in October of 2005, envisioned such an effort and pro-
vided the first few tentative steps forward on what will be a continuing journey. In
the two years since its approval, the interagency process has developed an MDA
Concept of Operations that establishes both a maritime situational awareness en-
terprise and a national MDA governance structure. The new "Director, Global
Maritime Situational Awareness" (GMSA) is an interagency position hosted by the
Coast Guard. Along with the Director, Global Maritime Intelligence Integration (a
pre-existing position within the Office of the Director of National Intelligence), the
GMSA director will co-chair an inter-department MDA Stakeholder Board that
has responsibility for identifying needs, advocating for solutions and ensuring co-
ordination between departments and agencies.
Complementing the progress in governance has been the rapid development of
MDA technology and data sharing projects that are blossoming almost faster than
they can be harvested. One especially noteworthy effort is the MDA Data Sharing
Community of Interest. Jointly sponsored by the Coast Guard and US Navy, with
technical advice from the Defense Department Chief Information Officer's office,
the project is demonstrating the ease of data sharing in a publish-and-subscribe,
network-centric environment that can accommodate members as diverse as local
harbor police and national intelligence analysts. Even more importantly, it is
64
Joseph L. Nimmich and Dana A. Goward
proving once again that technology is the easy part of the equation compared to ad-
dressing political, process and people issues.
Conclusion
Maritime Domain Awareness is the key to Maritime Security. Our current
awareness capabilities fall far short of where we could be — and should be — given
available technologies and a reasonable willingness to work together. Our national
security depends upon continued progress on a journey that has only begun.
Moreover, the public expects we should already be far ahead of where we are. We
should make best speed to meet, and then exceed, those expectations.
Notes
1. For a report of the incident as it was occurring, see CNN.com, Haitian Refugees Jump
Ship and Walk to Shore, http://transcripts.cnn.com/TRANSCRIPTS/0210/29/bn.02.html (last
visited, Feb. 28,2007).
2. Transportation Research Board of the National Academy of Sciences, The Marine
Transportation System and the Federal Role: Measuring Performance, Targeting Improvement
83 (2004).
3. The National Airspace System Plan was developed by the Federal Aviation Administra-
tion. First published in 1981, and updated several times since then, it is a comprehensive plan to
modernize and improve air traffic control and airway facilities services.
4. See NBC6.net, Four Cuban Coast Guardsman Defect in Key West, Feb. 7, 2003, http://
www.nbc6.net/news/1963227/detail.html.
5. The White House, National Strategy for Maritime Security 27 (Sept. 2005), available at
http://www.whitehouse.gov/homeland/4844-nsms.pdf.
6. See International Maritime Organization, Maritime Safety Committee, Long Range
Identification and Tracking, http://www.imo. org/Safety/mainframe.asp?topic_id=905 (last vis-
ited Mar. 8, 2007).
7. The White House, National Plan to Achieve Maritime Domain Awareness (Oct. 2005),
available at http://www.uscg.mil/hq/cg-5/docs/MDA%20Plan%20Oct05-3.pdf.
65
PART III
COMMAND OF THE COMMONS
THE INTERNATIONAL PERSPECTIVE
V
Threats from the Global Commons:
Problems of Jurisdiction and Enforcement
Stuart Kaye*
Introduction
Oceans cover approximately 70 percent of the surface of the Earth. For inter-
national lawyers, this has long been an area which lay beyond the control
of States. Prior to the advent of jurisdiction based on the continental shelf and the
exclusive economic zone (EEZ), almost all of this area was beyond national juris-
diction. Only a tiny belt of sea of usually 3 to 4 nautical miles was subject to the di-
rect control of a coastal State.1 Even today under the 1982 United Nations
Convention on the Law of the Sea (1982 LOS Convention),2 where coastal States
can extend their jurisdiction to the seabed and waters around their littoral out to
200 nautical miles, and the seabed in limited circumstances to as much as 350 nau-
tical miles,3 two-thirds of the world's oceans are beyond any national jurisdiction.
This article considers the challenges facing coastal States attempting to combat
threats to their security that pass through this vast area of high seas, in areas where
the coastal State has no jurisdiction. It will consider the nature of the threats posed
in these areas, and what tools international law provides States in order to respond
to these threats. It will conclude by positing areas where further development may
assist in improving the coastal State's ability to react in a timely and effective fash-
ion to a threat in the global commons. However, before doing so, it is necessary to
consider the limits of the global commons for the purposes of the paper.
Dean of Law, University of Wollongong, Australia.
Threats from the Global Commons: Problems of Jurisdiction and Enforcement
The Global Commons
There are a number of different definitions possible for the extent of the oceanic
global commons. One would be to limit the commons to areas entirely beyond na-
tional jurisdiction and control. This would include the deep seabed, referred to in
the 1982 LOS Convention as the Area, consisting of all of the seabed outside the
continental shelf of any State, and the waters beyond the EEZ of any State.4 These
are commons as jurisdiction is vested, in the case of the Area, in the International
Seabed Authority as part of the common heritage of mankind,5 and in the case of
the high seas, jurisdiction by States is limited to vessels flying their flag, except in
very specific and limited circumstances.
Yet in a number of ways, restricting the global commons to these areas does not
adequately indicate the freedom from State jurisdiction that is available even in
the waters of the EEZ. The EEZ only gives a coastal State jurisdiction over eco-
nomic activity, marine scientific research and environmental matters.6 It does not
give a coastal State jurisdiction to interfere with freedom of navigation, the laying
of submarine cables or pipelines, or to stop and board vessels unless they infringe
coastal State laws concerned with the EEZ.7 This means that even if a foreign vessel
had individuals onboard who had committed serious crimes against the coastal
State, it would not be open for the coastal State to apply its law to that vessel. In
some respects then, the EEZ remains an area of commons, even though the coastal
State may still be able to regulate economic activities such as fishing and seabed
mining. A similar situation is reflected for aerial navigation, as the airspace over
the EEZ and high seas is international airspace, where there is a right of freedom of
aerial navigation.8
In the context of this article, the global commons will be treated as areas where
the activities of vessels not subject to effective flag-State control cannot, for the
most part, be regulated. This will certainly include the high seas, but would also en-
compass the EEZ, where, although the coastal State would possess the right to pro-
tect economic activities, it would lack the jurisdiction to regulate most other actors
and activities from whence a threat may come.
Threats from the Global Commons
There are two distinct types of threats that come from the high seas. The first en-
compasses threats against the ports and territory of a coastal State that originate
from the sea. Such threats might be through the shipment of weapons of mass de-
struction (WMD) or related delivery systems to a port for use against a State or its
allies, or the use of a vessel in a direct attack. In the latter case, this could be from a
70
Stuart Kaye
naval vessel, or could be accomplished using a commercial vessel which has been
chartered, commandeered or hijacked and which is destroyed in the port of a State
to cause damage to facilities or human life.
The first type of attack has yet to occur in the West, although it has occurred in the
Middle East against Western interests.9 Even so, threats from shipping have been the
focus of a tremendous amount of planning and cooperative effort internationally.
The Proliferation Security Initiative10 and the International Ship and Port Facility
Security Code (ISPS Code)11 at an international level, or the United States' Con-
tainer Security Initiative12 internally, are excellent examples of responses to this di-
rect threat from the sea. States have moved cooperatively to put in place legal
measures designed to protect shipping and maritime infrastructure from terrorist
threats, and to better cooperate in sharing data and intelligence.13 Significant prog-
ress in these areas has been made in a relatively short space of time, especially con-
sidering the scale and reach of the measures within the ISPS Code and that they
were adopted and functioning well within five years of the 9/11 attacks.14
The first type of threat in some ways is relatively easily dealt with from a legal
point of view. Once a vessel enters the port of a State, unless it is sovereign immune,
it becomes subject to the regulation of the port State, whose criminal laws can be
applied to activities taking place onboard.15 An attempt to ship WMD into a port
would attract the jurisdiction of the port State, and enforcement action against the
ship could be taken inside the port by local authorities. Even if the offending vessel
is sovereign immune, it can be asked to vacate the port and the territorial waters of
the port State, and must comply in an expeditious fashion. Additionally, the ac-
tions of the offending vessel may give rise to a valid claim for damages against the
flag State for any breaches of the law of the port State committed by the vessel.16
Port States can also close the port to international traffic or refuse vessels entry
for failure to comply with entry requirements. For example, the Australian Mari-
time Identification System requires vessels to provide data to Australian authori-
ties of the vessel's crew, cargo, route and previously visited ports. This data is
sought when the vessel is within 1,000 nautical miles of the Australian continent.
Although there is no territorial jurisdiction to enforce such a measure, it has been
effective because failure to provide the data may result in the vessel being refused
entry to the port and subsequent arrest if it enters the territorial sea with an inten-
tion to proceed to its intended port. The right of entry becomes tied to additional
conditions, which can be used to improve security and give operators a clearer pic-
ture of the maritime security environment in adjacent waters.17
The second type of threat is one directed at activities in the global commons. Ac-
tivities in the commons include transportation, fishing, oil and gas exploitation,
and communications via submarine cable. Each of these activities is vulnerable to
71
Threats from the Global Commons: Problems of Jurisdiction and Enforcement
attack from ships and aircraft on a range of levels, and it is appropriate to consider
each in turn.
Attacks on ships at sea have been a feature of maritime transportation since an-
cient times. The legal concept of piracy is of great antiquity, and the ability of States
to deal with piratical acts against their shipping is quite extensive.18 The 1982 LOS
Convention, codifying existing customary international law, provides for universal
jurisdiction over vessels engaged in piracy, provided that enforcement action is un-
dertaken by marked government vessels in areas outside the territorial sea of third
States.19 This potentially gives great freedom of action to flag States to use their
armed forces to protect their shipping from pirate activity.
In practice, the availability of universal jurisdiction to deal with piracy has been
limited by two key factors. Firstly, universal jurisdiction over piracy is limited to in-
cidents taking place outside the territorial sea. The 1982 LOS Convention retains
the paramountcy of the coastal State's sovereignty within the territorial sea, and
consistent with the regime of innocent passage, non-coastal State vessels lack the
power to effect an arrest of a pirate vessel in these waters.
The second factor is of greater relevance to recent concerns over security. The
traditional definition of piracy is the attacking of a vessel in pursuit of personal
profit.20 This motivation for profit distinguishes piratical acts from activities with a
purely political motivation. Since terrorists are generally not motivated in their at-
tacks by the possibility of personal profit, but rather the advancement of a political
cause or the desire to frighten and disrupt lawful activities, it has been accepted that
terrorist acts at sea do not fall under the umbrella of piracy.
While attacks on shipping present a threat from the global commons, there are
other and different threats posed to other activities taking place in the world's
oceans. Oil and gas exploitation of offshore fields means that there are large and ex-
pensive facilities permanently moored in areas remote from coastal areas. These
platforms, loading facilities and pipelines are extremely vulnerable to hostile action.
They are exploiting and storing quantities of flammable gases or liquids, which
could be set alight by terrorist action, or alternatively could be the source of signifi-
cant environmental harm.
Terrorist attacks against oil and gas platforms have not taken place, although the
occupation of Brent Spar by Greenpeace in 199521 demonstrated the relative ease
with which terrorists could occupy an offshore platform and the difficulties inher-
ent in their removal. Attacks against oil and gas facilities have taken place in the
context of armed conflicts, and the facilities are particularly vulnerable. The lack of
a terrorist attack has not prevented international concern over the potential threat,
and has led to international law providing coastal States and others greater powers
to protect such facilities.
72
Stuart Kaye
Submarine cables and pipelines are also an example of vulnerable assets in the
global commons. All States have the right to lay cables and pipelines along the sea
floor outside the territorial sea. These cables and pipelines cannot be restricted by
the coastal State, although there is a right for coastal States to be consulted with re-
spect to the route such cables or pipelines might take. As with oil and gas platforms,
a concrete terrorist threat against these facilities has yet to occur, but the possibility
of damage and disruption is not insignificant. Terrestrial attacks against pipelines
in Iraq and Nigeria have caused rises, albeit temporary, in world oil prices.22 At-
tacks against submarine pipelines would have the added difficulties of causing
widespread environmental harm, possibly to the EEZ of another State, and be far
more expensive and difficult to repair. Submarine cables, especially fiber optic ca-
bles, still carry the bulk of the world's telephonic and electronic data, and their dis-
ruption could harm world communication in some areas for an extended period.23
In both cases, the risk of harm from attack is not insubstantial. The locations of
pipelines and cables are marked on commercially available charts and the coordi-
nates of cables can be downloaded from the Internet without cost. This because
both pipelines and submarine cables are vulnerable to accidental damage by mari-
ners engaged in lawful activities. Notice of their location reduces the risk of harm.
The practical upshot of this legitimate and sensible precaution is to make the tar-
geting of such facilities much easier for those engaged in potential terrorist activi-
ties against them.
Responses
International law has for many years permitted ships and flag States to protect
themselves from attack. The fact that piracy attracts universal jurisdiction in areas
beyond the territorial sea emphasizes this fact. Any ship that is subjected to an at-
tack by pirates outside the territorial sea can receive assistance, and the pirates
taken into custody by the warships of any State.
In the context of responding to attacks on its nationals or ships flying its flag, a
flag State has a right of self-defense and can take steps to protect individuals and
ships. This would permit naval escort of ships by the flag State and a right to take
action to protect those ships from attack. Difficulties may arise where a State's
nationals are onboard vessels that are flagged to another State. This makes efforts at
protection problematic, and would require the flag State to consent to warships of
another State providing protection. However, the provision of protection to other
flagged vessels is by no means impossible with such consent and there is ample pre-
cedent for it during times of armed conflict.24 Such difficulties were avoided during
the Iran-Iraq war when, after tankers entering the Persian Gulf had come under
73
Threats from the Global Commons: Problems of Jurisdiction and Enforcement
fire from Iran, the United States Navy (and navies of other neutral nations) formed
convoys of neutral-flag merchant vessels, or escorted or accompanied neutral-flag
merchant vessels carrying cargoes to and from neutral States.25
In the context of protecting shipping from terrorist attack, a separate instru-
ment was negotiated under the auspices of the International Maritime Organiza-
tion (IMO) to facilitate a response. The Convention for the Suppression of Unlaw-
ful Acts Against the Safety of Maritime Navigation26 (SUA Convention) was nego-
tiated as a direct result of the 1985 hijacking of the Italian liner Achille Lauro.27 The
necessity for an international response was manifested in part because of differ-
ences within the international community as to whether the attack constituted pi-
racy. This was because of the requirement that piracy be for "private" ends, and the
fact the group that attacked the vessel, the Palestinian Liberation Front, staged the
attack for political purposes. Other States, including the United States, considered
that the attack amounted to piracy, and were concerned that responses to an inci-
dent of this type might be undermined if it were not considered a piratical act.28
Obviously, with this difference of view it was necessary to create an international
instrument to clarify the response to what was still manifestly an illegal act.
The response adopted was the 1988 SUA Convention. It dealt with certain acts
against shipping, including seizing a ship, acts of violence against individuals on a
ship, damage to a ship or its cargo so as to endanger its safe navigation, endanger-
ment of the safety of a ship by interfering with maritime navigational facilities or
sending a false signal.29 The purpose motivating the acts is not relevant, and there-
fore there would be some overlap with piracy, although the scope of the SUA Con-
vention is necessarily much wider. The SUA Convention applies to ships that have
journeyed outside the territorial sea of a single State, or are scheduled to pass out-
side the territorial sea.30 Parties to the SUA Convention have jurisdiction to deal
with such offenses, based on the ship's presence in their territorial sea, possession
of their flag or other means.31 However, the SUA Convention did not deal directly
with the boarding of vessels where jurisdiction might be asserted by another State.
The Preamble of the SUA Convention provides "matters not regulated by this
Convention continue to be governed by the rules and principles of general interna-
tional law," which would limit non-flag State intervention to acts covered under
Article 110 of the 1982 LOS Convention, in this context acts of piracy.32 There are
also provisions to allow for either prosecution or extradition of individuals be-
lieved to have committed offenses.33
In 2005 the SUA Convention was amended by a new protocol pertaining to
maritime terrorism against shipping.34 The focus of the 2005 amendments is
weapons of mass destruction (WMD) and their non-proliferation.35 New offenses
were created, including using a ship as a platform for terrorist activities,36 and the
74
Stuart Kaye
transportation of a person who has committed offenses under the SUA Conven-
tion,37 or any of another nine listed anti-terrorism conventions.38 The 2005
amendments also widen the scope for third party boarding of ships, although flag-
State authorization is still required for such a boarding.39
States also were of the view that maritime terrorism need not be limited to ships,
but could also be directed at offshore oil and gas installations. This led to the adop-
tion of a protocol to the SUA Convention (1988 Protocol)40 that dealt with similar
acts committed against offshore petroleum installations at the same time as the
SUA Convention.41
The 1988 Protocol applies to "fixed platforms," which is liberally defined to in-
clude all petroleum producing structures.42 It also limits application to facilities on
the continental shelf. This excludes the application of the protocol to installations
in the territorial sea of a coastal State, in the ordinary course of events.43 The of-
fenses under the 1988 Protocol are analogous to those under the SUA Convention.
These include seizing a platform by force, destruction or damage threatening the
safety of a platform, the placing of a device designed to damage or destroy or en-
danger the safety of a platform, or threats, intimidation, or acts of violence against
persons onboard a platform.44
States under the 1988 Protocol have a similar jurisdictional envelope as under
the SUA Convention. The 1982 LOS Convention makes it clear that States have ju-
risdiction over offenses taking place on fixed platforms on their continental shelf,
and this is confirmed in the 1988 Protocol.45 In addition, under the Protocol, States
also have jurisdiction if either the offender or the victim is a national of the State, if
the offender is stateless and a habitual resident of the State, or if the offense is in-
tended to coerce the State concerned.46
The 1988 Protocol does not deal with the issue of boarding of fixed platforms,
and as with the SUA Convention, the preamble reiterates "that matters not regu-
lated by this Protocol continue to be governed by the rules and principles of general
international law," apparently limiting direct unilateral intervention against acts
against platforms to the coastal State. This was to ensure that a coastal State would
retain sole jurisdiction over activities on its platforms, and another State could not
assert it had a right to board a platform, based on having jurisdiction over an of-
fense. The absence of a boarding provision would not prevent a coastal State from
giving a third State an ad hoc authorization to board its installation.
The 1988 Protocol was also amended by protocol in 2005,47 with amendments
similar in nature to the 2005 SUA Convention amendments. New offenses, includ-
ing using explosives or radioactive material or a biological, chemical, nuclear
(BCN) weapon to cause death, serious injury or damage to an installation; 48 releas-
ing oil or gas from an installation in a manner calculated to cause death, serious
75
Threats from the Global Commons: Problems of Jurisdiction and Enforcement
injury or damage;49 or the threat to commit such offenses,50 were created.51 A State
party must take the measures necessary to apply its jurisdiction to its nationals and
fixed platforms on its continental shelf in respect to these offenses.52 Much of the
rest of the SUA Convention and the 2005 amendments, in relation to extradition,
cooperation concerning data and evidence, and domestic implementation, are ap-
plied by the 2005 Protocol mutatis mutandis.53
The 2005 SUA Convention amendments and 1988 Protocol amendments will
enter into force after the twelfth ratification without reservation54 for the SUA
Convention amendments55 and ninety days after the third ratification without
reservation56 for the Protocol amendments.57 Given the current wide participation
in the SUA Convention and 1988 Protocol, both the Convention amendments and
Protocol amendments are likely to enter into force relatively quickly.
Responses in relation to the protection of submarine cables and pipelines have
been less forthcoming. The 1982 LOS Convention does provide that a coastal State
must be consulted over the route a cable or pipeline on its continental shelf may take,
but not that the coastal State has jurisdiction over the cable or pipeline.58 If a cable or
pipeline owned by a coastal State or its nationals were damaged, the LOS Convention
provides that the flag State of the vessel, or of the nationality of the offender responsi-
ble, has jurisdiction to deal with the harm caused.59 A coastal State could only assert
jurisdiction in the event the damage to the cable or pipeline also caused harm to the
environment, on the basis of the coastal State's EEZ jurisdiction.60
A coastal State asserting jurisdiction over an attack on a pipeline presents more
options than the situation for submarine cables. An attack on an oil pipeline would
probably cause environmental damage, and therefore provide a basis for a coastal
State to assert its jurisdiction.61 Article 79(4) of the 1982 LOS Convention creates
an implication that a coastal State can make laws dealing with leaks from pipelines.
A coastal State might also respond to an attack on a cable or pipeline on the basis of
self-defense. To do so it would need to demonstrate the importance of the threat-
ened infrastructure to itself, and that a use offeree is proportionate in the circum-
stances. This will always be a question of fact, and would be dependent upon the
cable being vital telecommunications infrastructure, or a pipeline carrying essen-
tial oil or gas for the national economy.62 Even in those circumstances, an isolated
attack, not immediately detected by the coastal State, or indeed other States using
the cable or pipeline, might make it difficult to justify a response involving the use
of force.
One way to increase the ability of States to respond to attacks on pipelines and
submarine cables might be to base an argument upon Article 3fois(l)(a)(iii) of the
2005 SUA Convention amendments. This provision creates an offense where an
individual "uses a ship" to cause damage.63 If the employment of a ship to aid
76
Stuart Kaye
terrorists in attacking a cable or a pipeline could be described as a "use" of a ship
in the context of Article 3bis, then there could be jurisdiction. It is submitted that
such a wide definition is almost certainly beyond the anticipated scope of the of-
fense. If the definition could sustain such stretching, the consent of the flag State
would still be required to effect a boarding,64 and the flag State be a party to the
2005 Protocol amending the SUA Convention.
Placing jurisdiction over pipelines and submarine cables outside the territorial
sea in the control of the flag State of the offending vessel is, under the 1982 LOS
Convention, problematic. If terrorists attacked a pipeline or cable with a chartered
vessel, perhaps a fishing trawler, the vessel may well be flagged in a State with an
open registry. This would substantially undermine the prospects of enforcement
action, as it is clear that a number of States with open registries that have attracted
fishing vessels, such as Georgia, Togo or Equatorial Guinea,65 have no capacity to
deal with attacks even close to their coasts.
Reliance on flag-State jurisdiction in the context of cables and pipelines
serves to highlight a broader problem, that is, the limitations of flag-State juris-
diction over vessels. While the jurisdiction of a flag State remains the para-
mount mechanism to determine the applicable law aboard a vessel, in the case of
States with open registries the connection to flag States can be so diffuse as to be
meaningless. In that circumstance, it is difficult to conceive that effective enforce-
ment at sea can take place. Flag-of-convenience States have no capacity to enforce
their laws on ships flying their flag around the world, and may have little incentive
to cooperate with other States to remedy the deficiency. The United States has
sought to tackle the problem in the context of the Proliferation Security Initiative
with boarding agreements with a number of States with open registries, including
Liberia and Panama;66 they fall short of permitting boarding in a wider range of
circumstances.
Conclusion
The international community has shown great energy in tackling threats in the
global commons. The SUA Convention and Protocol in their 2005 iterations rep-
resent a substantial and positive step forward in the legal protection of ships and
platforms in the global commons beyond the territorial sea. However, it is appar-
ent that States have yet to create protection for the totality of activities that take
place beyond the territorial sea. Adequate jurisdictional mechanisms to ensure an
effective response to attacks on submarine cables and undersea pipelines do not ex-
ist, nor does it appear there are international efforts in progress to remedy the
11
Threats from the Global Commons: Problems of Jurisdiction and Enforcement
situation. It can only be hoped that it is not the reality of an attack that acts as the
catalyst to produce positive change in these areas.
Notes
1. The United States, the British Empire and France all maintained 3 nautical mile territo-
rial seas until after World War II. The Scandinavian nations asserted 4 nautical mile territorial
seas from the late eighteenth century until after the war. See D.P. O'CONNELL, 1 THE INTERNA-
TIONAL LAW OF THE SEA 131-138 (LA. Shearer ed., 1982).
2. United Nations Convention on the Law of the Sea, Dec. 10, 1982, 1834 U.N.T.S. 396
[hereinafter 1982 LOS Convention].
3. Article 76 of the Law of the Sea Convention deals with the limits of the continental shelf.
4. Id, art. 1(1).
5. Id,, art. 136.
6. Id., art. 56.
7. Id., art. 58(1).
8. Id.
9. For example, the separate attacks in Aden harbor against the French flagged tanker MV
Limburg and the US destroyer USS Cole (DDG 67) would fall into this category. See Jessica
Romero, Prevention of Maritime Terrorism: The Container Security Initiative, 4 CHICAGO JOUR-
NAL OF INTERNATIONAL LAW 597, 598 (2003).
10. See generally Stuart Kaye, Proliferation Security Initiative in the Maritime Domain, in IN-
TERNATIONAL Law Challenges: Homeland Security and Combating Terrorism 141-64
(Thomas McK. Sparks & Glenn M. Sulmasy eds., 2006) (Vol. 81, US Naval War College Interna-
tional Law Studies).
11. See generally Rachael B. Bralliar, Protecting U.S. Ports with Layered Security Measures for
Container Ships, 185 MILITARY LAW REVIEW 1, 23-35 (2005).
12. See generally Romero, supra note 9; Math Noortmann, The US Container Security Initia-
tive: A Maritime Transport Security Measure or an {international Public Security Measure?, 10
lus Gentium 139(2004).
13. See generally Michael A. Becker, The Shifting Public Order of the Oceans: Freedom of Nav-
igation and the Interdiction of Ships at Sea, 46 HARVARD INTERNATIONAL LAW JOURNAL 131
(2005); Justin S. C. Mellor, Missing the Boat: The Legal and Practical Problems of the Prevention of
Maritime Terrorism, 18 AMERICAN UNIVERSITY INTERNATIONAL LAW REVIEW 341 (2002).
14. See generally Rosalie Balkin, The International Maritime Organization and Maritime Se-
curity, 30 TULANE MARITIME LAW JOURNAL 1 (2006); Thomas J. Schoenbaum & Jessica C.
Langston, An All Hands Evolution: Port Security in the Wake of September 11th, 11 TULANE LAW
REVIEW 1333 (2003).
15. See Wildenhus's Case, 120 U.S. 1, 12 (1887).
16. 1982 LOS Convention, supra note 2, art. 31.
1 7. Natalie Klein, Legal Implications of Australia's Maritime Identification System, 55 INTER-
NATIONAL & Comparative Law QUARTERLY 337 (2006); Cameron Moore, Turning King
Canute into Lord Neptune: Australia's New Offshore Protection Measures, 3 UNIVERSITY OF NEW
England Law Review l (2006).
18. Ivan A. Shearer, Starke's International Law 247-250 (1994); Hersch Lauterpacht,
l International Law: A Treatise 557-567 (1948).
19. 1982 LOS Convention, supra note 2, arts. 107 and 110.
78
Stuart Kaye
20. Id., art. 101.
21. See http://www.greenpeace.org/international/about/history/the-brent-spar (last visited
Feb. 20, 2007).
22. See, e.g., Jaime Wilson, Iraq hit by Fresh Attack on Oil Pipeline, THE GUARDIAN (Lon-
don), Aug. 18, 2003, at 1, available at http://www.guardian.co. uk/Iraq/Story/0„ 1020878
,00.html; Edward Harris, Nigerian Militants Attack Oil Pipeline, Boat, DESERET NEWS (Salt
Lake City), Feb. 21, 2006 available at http://www.findarticles.eom/p/articles/mi_qn4188/
is_20060221/ai_nl6162905.
23. For example, the value of submarine cables to Australia alone has been estimated at over
US $5 billion per year to the national economy. See Australian Communications and Media Au-
thority, Information Sheet, Proposed Protection Zones Off Sydney, New South Wales, http://
www.acma.gov.au/acmainterwr/_assets/main/lib 1 00668/information%20sheet.pdf (last visited
Feb. 27, 2007).
24. For example, Allied convoys during both World War I and World War II were escorted
by a range of Allied warships and contained a variety of Allied merchant shipping.
25. George K. Walker, The Tanker War, 1980-88: Law and Policy 363 (2000) (Vol.
74, US Naval War College International Law Studies).
26. Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navi-
gation, Mar. 10, 1988, 1678 U.N.T.S. 201 [hereinafter SUA Convention].
27. Malvina Haberstam, Terrorism on the High Seas: The Achille Lauro, Piracy and the IMO
Convention on Maritime Safety, 82 AMERICAN JOURNAL OF INTERNATIONAL LAW 347, 349
(1985). In 1985 the IMO adopted Assembly Resolution A. 584(14) to encourage States to take
measures to combat terrorist activity against ships.
28. Samuel Pyeatt Menefee, Anti-Piracy Law in the Year of the Ocean: Problems and Opportu-
nity 5 INTERNATIONAL LAW STUDENTS ASSOCIATION JOURNAL OF INTERNATIONAL & COMPAR-
ATIVE LAW 309, 310-313 (1999); Haberstam, supra note 27, at 270-291.
29. SUA Convention, supra note 26, art. 3.
30. Id., art. 4.
3 1 . The SUA Convention also contemplates jurisdiction based on passive personality, or at-
tempted coercion of the State concerned. See id., art. 6.
32. The deficiency was to some extent addressed by Article 8 of the SUA Convention, which
provided a mechanism for the master of a vessel to hand individuals over to a "receiving State,"
other than the flag State. See id., art. 8.
33. Id., art. 10.
34. Protocol of 2005 to the Convention for the Suppression of Unlawful Acts Against the
Safety of Maritime Navigation, Oct. 14, 2005, IMO Doc. LEG/CONF. 15/21, available at
http://www.austlii.edu.aU//cgi-bin/disp.pl/au/other/dfat/treaties/notinforce/2005/30.htmPquery
=suppression %20of%20unlawful%20acts. [hereinafter 2005 SUA Safety of Maritime Naviga-
tion Protocol].
35. Id., art. 'ibis.
36. Jd.,art3fozs(D(a)(3).
37. Id., art iter.
38. Id., Annex.
39. Id., art 8. See the discussion in Ted L. McDorman, Maritime Terrorism and the Interna-
tional Law of Boarding Vessels at Sea: Assessing the New Developments, http://www.law.berkeley
.edu/centers/ilr/ona/pages/mcdorman.htm (last visited Feb. 20, 2007).
79
Threats from the Global Commons: Problems of Jurisdiction and Enforcement
40. Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Lo-
cated on the Continental Shelf, Mar. 10, 1988, 1678 U.N.T.S. 304 [hereinafter 1988 SUA Proto-
col].
4 1 . HOSSEIN ESMAELI, THE LEGAL REGIME OF OFFSHORE OIL RIGS IN INTERNATIONAL LAW
132(2001).
42. 1988 SUA Protocol, supra note 40, art. 1 . This definition includes artificial islands, instal-
lations and structures engaged in exploration or exploitation of the seabed or some other eco-
nomic purpose.
43. Id., art. 1(2).
44. Id., art. 2(1). The offenses include attempting, abetting and threatening to commit an of-
fense. Id., art. 2(2).
45. Given that Article 60 of the Law of the Sea Convention gives a coastal State exclusive ju-
risdiction to regulate the operation and use of an installation, and the Protocol does not displace
general international law upon matters to which it does not address itself. Id., Preamble.
46. Id., art. 3.
47. Protocol of 2005 to the Protocol for the Suppression of Unlawful Acts Against the Safety
of Fixed Platforms Located on the Continental Shelf, Oct. 14, 2005, IMO Doc. LEG/CONF. 15/
22, available at http://bar.austlii.edu.au/au/other/dfat/treaties/notinforce/2005/31.html [here-
inafter 2005 Fixed Platforms Protocol].
48. Id., art. 2bis(&).
49. Id., art. 2&is(b).
50. Id., art. 2bis(c).
51. Id., art. Iter.
52. Id., art. 3(1).
53. Id., art 1.
54. 2005 SUA Safety of Maritime Navigation Protocol, supra note 34, art. 18.
55. Only State parties to the SUA Convention who have made no reservations to the applica-
tion of that Protocol can become parties to the 2005 SUA Convention amendments. See id., art. 17.
56. 2005 Fixed Platforms Protocol, supra note 47, art. 9.
57. Only State parties to the SUA Protocol who have made no reservations to the application
of that Protocol can become parties to the 2005 SUA Fixed Platforms Protocol. See id., art. 8.
58. 1982 LOS Convention, supra note 2, art. 79.
59. Id., art. 113.
60. Id., art. 79(4).
61. See discussion in 2 UNITED NATIONS CONVENTION ON THE LAW OF THE SEA: A COM-
MENTARY 909-917 (Myron H. Nordquist ed., 1993).
62. For example, see W. Michael Reisman, International Legal Responses to Terrorism 22
Houston Journal of International Law 3, 55-8 (1999); Davis Brown, Use of Force Against
Terrorism After September 11th: State Responsibility, Self-Defense and Other Responses 11
Cardozo Journal of International & Comparative Law l, 40- 1 (2003).
63. 2005 SUA Safety of Maritime Navigation Protocol, supra note 34, art. 3bis(l).
64. Id., art. 8bis{5){b).
65. These States were identified by the Commission on the Conservation of Antarctic Ma-
rine Living Resources (CCAMLR) as "flags of non-compliance" in 2005. See CCAMLR Annual
Report, Report of the Standing Committee on Implementation and Compliance, Annex 5, avail-
able at http://www.ccamlr.Org/pu/e/e_pubs/cr/05/a5.pdf (last visited Feb. 20, 2007).
66. Agreement between the Government of the United States of America and the Govern-
ment of the Republic of Liberia Concerning Cooperation to Suppress the Proliferation of
80
Stuart Kaye
Weapons of Mass Destruction, their Delivery Systems, and Related Materials by Sea, Feb. 11,
2004, available at http://www.state.gOv/t/isn/trty/32403.htm. Amendment to the Supplemen-
tary Arrangement between the Government of the United States of America and the Govern-
ment of the Republic of Panama to the Arrangement between the Government of the United
States and the Government of Panama for Support and Assistance from the United States Coast
Guard for the National Maritime Service of the Ministry of Government and Justice, May 12,
2004, available at http://www.state.gOv/t/isn/trty/32858.htm.
81
VI
Preemption by Armed Force
of Trans-boundary Terrorist Threats:
The Russian Perspective
Bakhtiyar R. Tuzmukhamedov*
A zealous legalist would argue that Russia, or rather its predecessor the Soviet
Union, has repeatedly demonstrated its inclination to use armed force in
the absence of an actual attack against itself. Precedents that would likely be cited
include the "Winter War" of 1939-40 against Finland, and the interventions in
Hungary in 1956 and in Czechoslovakia in 1968. Some might add the deployment
to Afghanistan in 1979 or, in paradoxical contradistinction to those examples, the
Wehrmacht attack against the USSR which was launched in 1941, at least as
claimed by Nazi leaders and some contemporary historians, to forestall an immi-
nent Red Army assault.
Whatever the merits of those alleged precedents, in its declaratory policy and
formal acts, the Soviet Union abided by a rather narrow, or restrictive, interpreta-
tion of the principle of non-use of force. It acceded to the Treaty for the Renuncia-
tion of War (the Kellogg-Briand Pact) of 19281 and was a party to the Convention
for the Definition of Aggression of 1933. 2 Although the latter might seem a less
classical source, Justice Jackson in his opening address for the United States at the
* Professor, Diplomatic Academy, Moscow, Russia. The views expressed herein are solely those
of the author.
Preemption of Trans-boundary Terrorist Threats: The Russian Perspective
Nuremberg Military Tribunal described it as "one of the most authoritative
sources of international law on this subject."3
In a conspicuous departure from the Soviet-era official and doctrinally strict,
i.e., narrow, interpretation of the right of self-defense, Russian officials have, since
2002, increasingly been indicating that it might be permissible to use armed force
against extraterritorial sources of imminent threat to Russian security, even in the
absence of an actual armed attack originating from those sources. Those state-
ments, made by politicians, senior military commanders and ultimately by the
president, were enthusiastically endorsed by a handful of Russian legal academics.4
The qualifier that usually accompanies the term "use of force" is "preventive," and
Russian official statements do not seem to be sensitive to nuances of meaning be-
tween that and other adjectives, such as "preemptive," or "anticipatory," or "inter-
ceptive."5 As to the location and nature of the sources of those threats and the
targets of the preventive use of force, while earlier declarations announced an in-
tention to engage them globally,6 their personality notwithstanding, eventually the
declarations came to express a readiness to deal with sources of terrorist threats in
the space adjacent to the Russian territory.
The earlier remarks that caught international attention had been made in July
and August 2002 by Defense Minister Sergey Ivanov and other military command-
ers, and several ranking parliamentarians. These statements, incidentally, were
made soon after President George W. Bush broached preemption in his com-
mencement address at the US Military Academy.7
Those statements were prompted by the events that occurred on the Russian-
Georgian border. Russia claimed that Chechen insurgents found refuge in the
Pankissi Gorge in Georgia, an area where Georgian law and order was nonexistent.
The area was convenient for insurgent rest and recreation, and to regroup and re-
enter Russian territory. Those allegations had been vehemently denied by Geor-
gian authorities, although apparently the US "Train and Equip" mission to
Georgia8 had, as one of its principal objectives, the establishment of viable indige-
nous law-enforcement units that could regain control over the mountainous and
hard-to-reach Pankissi Gorge area. Russian politicians asserted that even though
Georgian authorities could not be implicated beyond doubt in providing shelter to
insurgents, they definitely lacked the capability and determination to deny access
to and freedom of insurgent activity in the area.
President Putin in his statement on September 11, 2002 commemorating the
victims of the 9/11 terrorist attack against the United States looked for legal sup-
port for the Russian position. He said that "should the Georgian leadership be un-
able to secure the area adjacent to the border and continue to ignore the UN SC
Resolution 1373 of 28 September, 2001 . . . , we shall reserve the right to act in
84
Bakhtiyar R. Tuzmukhamedov
accordance with Article 51 of the UN Charter that entitles every member-State of
the United Nations to enjoy an inherent right to individual or collective self-
defense."9 President Putin went further and instructed the uniformed services to
draft engagement plans "to pursue terrorists and destroy their bases that have been
reliably located and identified."10
That statement by President Putin prompted an angry response from the Coun-
cil of Europe whose Parliamentary Assembly insisted that "Article 5 1 of the UN
Charter and Resolution 1269 (1999) of the UN Security Council, as well as Resolu-
tion 1368 (2001) of the UN Security Council of 12 September do not authorize the
use of military force by the Russian Federation or any other State on Georgian ter-
ritory."11 It further called on the Russian authorities to refrain from "launching any
military action on Georgian territory as expressed by the President of the Russian
Federation on 11 September 2002. "12
Not only was the Parliamentary Assembly's declaration rather unfair to Presi-
dent Putin, it was also inaccurate. The Russian president looked to Security Coun-
cil Resolution 1373 for authority, and that reference was conspicuously ignored by
the Council of Europe. It should be recalled that Resolution 1373 specifically urged
UN member-States to deny terrorists movement across borders and to ensure that
refugee status is not granted to persons suspected of terrorist activity.13 Russia was
concerned that Georgia was unable or unwilling to abide by those and other provi-
sions of the resolution. Additionally, President Putin had not ordered that imme-
diate military action be undertaken on the territory of a sovereign State. Rather, he
ordered that contingency plans be made, conditional on Georgia's capacity to ef-
fectively control its own territory.
Putin's statement may also be interpreted as an implicit extrapolation, whether
conscious or not, of the right of hot pursuit from the realm of the law of the sea14 to
trans-boundary law-enforcement. His phrase about "pursuit of terrorists" obvi-
ously alluded to situations when culprits would be pursued and apprehended, or
accounted for, either on the Russian territory, or, pursuit having commenced on
the Russian territory and continued across the border, on the territory of an adja-
cent State.15 It is also worth noting that the Russian president construed Article 51
of the UN Charter as entitling a State to the right of self-defense against an armed
attack by actors other than a State.
It is true that Article 5 1 does not unequivocally refer to a State as a perpetrator of
an attack; however, if one were to accept that "Article 2 (4) explains what is prohib-
ited, Article 51 what is permitted,"16 and Article 2 (4) refers to relations between
members of the United Nations, that is, States, then Article 51 should apply to
States, too. It should be recalled that in its Advisory Opinion on the Legal Conse-
quences of the Construction of a Wall in the Occupied Palestinian Territory ■, the
85
Preemption of Trans-boundary Terrorist Threats: The Russian Perspective
International Court of Justice uttered a dictum, albeit argumentative, that "Article
51 of the Charter recognizes the existence of an inherent right of self-defence in the
case of armed attack by one State against another State."17
While suspected terrorist bases in certain neighboring countries and prospec-
tive targeting of those bases have been a recurring theme in remarks by Russian se-
nior officials since 2002, most often they have not been country- specific.18
In most instances, the statements describing situations that would justify the
employment of the armed forces beyond Russian territory to preempt an attack are
related to a terrorist threat. Occasional references to threats to lives and security of
large numbers of Russian citizens or a "Russian-speaking population" imply mili-
tary support for their evacuation from a zone of an armed conflict or a humanitar-
ian disaster. Even fewer statements are also made that it is admissible to use force
preemptively to meet the demands of unspecified "Russian interests" or of its alli-
ance commitments.
The declared targets of forceful action are individual terrorists, organized
groups of terrorists and their bases. The means to be used in a preemptive strike
against those targets are almost unrestricted, nuclear arms being the only clear ex-
ception. According to the defense minister, such a strike would not amount to full-
fledged combat action, but would be delivered "to avert a single terrorist threat."
As to the geography of preemptive action, it is realistic to look at areas adjacent
to Russian territory. An utterance by the chief of the General Staff that those strikes
could be delivered "anywhere on the globe"19 appeared inconsistent with the state-
ments of the commander-in-chief addressing "interdiction of organized terrorist
groups attempting to penetrate our territory" and "pursuing and engaging terror-
ists."20
Official declarations always underscored that Russian forces will target terror-
ists and their infrastructure, rather than persons and institutions of a sovereign
State on whose territory the former found refuge. Whether done consciously or
not, this seems to be an attempt to stave off prospective charges of committing an
act of aggression. It is worth noting that political and military leaders never miss a
chance to underscore that armed force would be used in strict compliance with the
constitution, statutes and international law.
So far those declarations have not comprised a comprehensive official doctrine
explaining under what circumstances and according to what criteria Russia would
be inclined to use a military tool to meet a ripening threat. The constitution, how-
ever, addresses "an imminent threat of aggression"21 against the Russian Federation
(Article 87.2), in which case the president shall introduce martial law by a decree. A
decree on the introduction of martial law and a decree on the introduction of the
86
Bakhtiyar R. Tuzmukhamedov
state of emergency are the only acts by the president that require approval by the
Council of Federation; all other decrees remain his unilateral prerogative.
The federal constitutional law "On Martial Law" describes the imminent threat
of aggression as "activities by a foreign State (States) committed in violation of the
UN Charter and generally recognized principles and norms of international law
that immediately indicate that an act of aggression against the Russian Federation
is being prepared, including the declaration of war against the Russian Federation"
(Article 3.3).22 The legal gap is further filled by a recent federal law "On Counter-
acting Terrorism" of 2006,23 as amended, which supersedes an earlier federal law
"On Combating Terrorism" of 1998,24 as amended.
The new law explicitly provides for the use of armed force against targets outside
Russian territory, on the high seas and, presumably, in international airspace. In
this context, it does not speak about preemption; however, the broad range of tasks
indicates that military power might be required to deal with threats that are not
necessarily imminent.
Terrorism is defined in very broad terms as "an ideology of violence and practi-
cal impact on the decision making by bodies of State power, bodies of local self-
government and international organizations, by way of intimidation of population
and/or by other illegal violent actions" (Article 3(1)). The law is more specific
when it further defines "terrorist activity" as comprising such diverse elements as
planning, preparation, funding and perpetration of a terrorist act; incitement to
commit a terrorist act; organizing a terrorist group; recruiting, arming and train-
ing of terrorists; complicity in planning and committing a terrorist act; and propa-
gandizing of terrorist ideology and calls to engage in it. Finally, a terrorist act is
defined as "explosion, arson or other acts intimidating population and putting
human life at risk of death, leading to substantial loss of property, or to other grave
consequences, with an intent to exert impact on the decision making by bodies of
State power or international organizations, as well as a threat to commit those acts
with same purposes" (Article 2(3), as amended).25 It is against those acts, or perpe-
trators thereof, or means employed to commit them that the armed forces shall be
used under the new law.
The law is conspicuously vague as to the outer limits of the airspace where the
military may be ordered to engage a terrorist threat. It does not speak about inter-
national airspace. Moreover, it refers to an aircraft "not responding to radio mes-
sages from ground controllers to cease violating the rules of navigation in the
airspace of the Russian Federation, or to radio messages and visual signals being
transmitted by the aircraft of the Russian Armed Forces" (Article 7(2)). Unad-
dressed is the question of whether that provision could come into conflict with
Article 3 bis of the Chicago Convention of 1944.26
87
Preemption of Trans-boundary Terrorist Threats: The Russian Perspective
Turning to sea space, the law refers to internal waters and the territorial sea, as
well as to the continental shelf and to "national maritime navigation." Obviously,
the continental shelf may extend as far as 350 nautical miles from the baselines. As
to "national maritime navigation," it is not immediately clear whether the law im-
plies navigation within territorial limits or extends to ships flying the Russian flag
anywhere on the seas, with a possible exception of those chartered by foreign
entities.
There is no need, however, to read between the lines of the law to deduce
grounds for the use of the Russian military against terrorist targets beyond national
borders. Article 10 specifically addresses the issue of trans-boundary deployment
of units, as well as engagement of targets outside Russian territory without crossing
the border.27 Remarkably, the law never mentions foreign territory as an area of de-
ployment; rather, the phrase that is used in the lead-in paragraph of Article 10.1 is
"interdiction of international terrorist activity beyond territorial bounds of the
Russian Federation."
As to internal procedures, the order to fire at terrorists from Russian territory
will be given by the president unilaterally in the exercise of his constitutional pow-
ers as the supreme commander-in-chief. To send troops across the border, the
president would first need to obtain consent from the Council of Federation.28
While the original version of the law required that the president submit informa-
tion regarding the proposed strength of the unit, the areas of deployment and its
duration, that provision was deleted by the Federal Law of July 27, 2006. 29
The law addresses "the interdiction of terrorist activity," which implies preemp-
tion due to the broad range of elements of "terrorist activity" as they are defined by
the law. The law makes a general reference to international treaties as sources of au-
thority, along with Russian legislation, for trans-boundary employment of the
armed forces; however, soon after the adoption of the federal law "On Counter-
acting Terrorism," Defense Minister Sergey Ivanov stated that the law by itself pro-
vides sufficient grounds for unilateral and preemptive use of force against terrorist
targets on foreign soil.30
This author is not qualified to appraise the true capacity of the Russian military
to engage terrorists who threaten Russian citizens and assets abroad. Unfortu-
nately, however, the recent drama with Russian embassy personnel in Baghdad
sadly proved that neither Russia nor local authorities, not even the occupying pow-
ers, were able to control the hostage crisis or save lives of internationally protected
persons.31
The law "On Counteracting Terrorism" lists several principles, some of which
would sound similar to ones found in the established international law. For exam-
ple, consider the principle of "proportionality of measures undertaken to counter
88
Bakhtiyar R. Tuzmukhamedov
terrorism to the level of terrorist threat" (Article 2 (2)). One can immediately trace
the origins of that principle back to the 1837 Caroline incident, in which the Caro-
line, a vessel used to supply Canadian rebels fighting British rule, was captured, set
ablaze and sent over Niagara Falls. One US citizen perished.
Several Soviet, and now Russian, students of international law have at least ac-
knowledged the Caroline doctrine, and some have given it a careful examination.32
While it has not been widely accepted in Russia, some of the official statements re-
garding the preemptive use of force could be construed as falling within the pur-
view of the Caroline doctrine, which, if properly adapted, could add a degree of
legitimacy to current approaches.
Traditionally, the most often quoted source for the Caroline doctrine has been a
paragraph in the diplomatic note from Daniel Webster, the US secretary of state, to
Henry Fox, the British minister in Washington, DC, dispatched on April 24, 1841.
It is from this note that current international law derives the principles of necessity
and proportionality.33 But we might discover no less substantive statements on
questions of law in other parts of Webster's letter, as well as in a later note from
Lord Ashburton, the British minister plenipotentiary on special mission, to Secre-
tary Webster, and in the address of President Tyler to the US Congress in the after-
math of the Caroline case.34
If the Russian government were to contemplate putting into effect provisions of
the federal law "On Counteracting Terrorism" that regulate deployment of Russian
armed forces outside Russian territory, it might consider several decision-making
guidelines on the preemptive use of force — first and foremost, necessity and pro-
portionality. Recourse might be had to Lord Ashburton's allusion to circumstances
under which the principle of "inviolable character of the territory of independent
nations"35 could be suspended. According to the British minister, "it must be so for
the shortest possible period, during the continuance of an admitted overruling ne-
cessity, and strictly confined within the narrowest limits imposed by that neces-
sity."36 That limitation could be developed further to include severe restrictions on
the choice of target, which should only be the immediate source of the threat, and
that that source ought to be in the space adjacent to the State's own territory. The
decision should also include consideration of the scale of the threat and the ex-
pected gravity of the consequences of inaction.
A decisive argument in favor of a preemptive use of force would be the explicit
consent to or request of a State on whose territory the source of the threat is located
because that State is not capable of coping with it. It might be worthwhile to con-
sider an attack if a neighboring State, on whose soil or under whose flag on the high
seas or in international airspace the threat is maturing, is expressly unwilling to
control it.
89
Preemption of Trans-boundary Terrorist Threats: The Russian Perspective
A unilateral resort to force might have to be considered if the imminence of
threat does not leave time to refer the issue to the United Nations Security Council
or to a regional arrangement, or if there is a continual record of passivity of those
institutions in similar situations, but in any case the Security Council will have to
be notified to comply with requirements of Article 51 ("Measures taken by Mem-
bers in the exercise of this right of self-defence shall be immediately reported to the
Security Council ") of the UN Charter. That means that the existence of a threat,
its gravity and imminence will have to be proven beyond reasonable doubt, and
that, in turn, would necessitate the disclosure of sources and means of collection of
information, bearing in mind that what one party would deem to be waterproof
evidence justifying a preemptive strike, could be strongly rejected by another party.
Resort to armed force would also be proof that other means, including diplomatic
and law-enforcement, turned out to be ineffective, or may have been used
unskillfully.
A State using armed force to divert a seemingly imminent attack shall be ex-
pected to bear full responsibility for injuries and damages inflicted upon innocent
persons and their property. A precursor for those injuries might well be inaccurate
information about the exact location of a source of terrorist threat and its pre-
paredness for an attack.
Finally, the location and duration of preemptive action must be clearly defined
to the personnel involved in it, who should be given precise orders and rules of en-
gagement. No action may commence without reliable and executable plans of
evacuation.
Those guidelines are general and some are self-evident. They would need to be
made specific for a particular contingency.
Russia is not the only State that declared its intention to use, as an extreme
means, armed force to eliminate an imminent threat of a massive terrorist attack
and, should dire need arise, project its force beyond its borders. Of course, those
making such statements should make sure that resolute declarations are supported
by adequate resources and the strong will to use them. Otherwise those declara-
tions are likely to be counterproductive and self-harming.
There is a question that could bother a zealous legalist: as more nations, some
of them bearing enormous might, submit that they would use armed force in self-
defense not only to react to an actual attack, but also to preempt an imminent as-
sault, or even prevent it from materializing in the future, would it not give impetus
to claims that a customary rule of international law has already been conceived?37
90
Bakhtiyar R. Tuzmukhamedov
Notes
1. Treaty Providing for the Renunciation of War as an Instrument of National Policy, Aug.
27, 1928, 46 Stat. 2343, 94 L.N.T.S. 57 available at http://www.fletcher.tufts.edu/multi/texts/his-
torical/bhl 15.txt.
2. Convention for the Definition of Aggression, July 3, 1933, 147 L.N.T.S. 52, available at
http://www.letton.ch/lvx 33da.htm.
3. 2 Trial of the Major War Criminals Before the International Military Tribunal:
Nuremberg, 14 November 1945 to 1 October 1946, at 98, 148.
4. E.g., S. Goltsov & Yu Maleev, Primeneniye Vooruzhennoy Sily Gosudarstvom Kak Mera
Preventivnoy Samozashchity Ad Hoc ot Vneshney Ugrozy (The Use of Armed Force by State as a
Measure of Ad Hoc Preventive Self-Protection From an External Threat), 4 MOSCOW JOURNAL
of International Law 45 (2004).
5. The latter term may be attributed to YORAM DlNSTEIN. See YORAM DlNSTEIN, WAR, AG-
GRESSION and Self Defence 190-92 (4th ed. 2005).
6. Chief of the General Staff General Yuri Baluyevsky warned that strikes could be delivered
"anywhere on the globe." KRASNAYA ZVEZDA (THE RED STAR), Sept. 9, 2004.
7. President George W. Bush, Graduation Address at West Point Qune 1, 2002), available
at http://www.whitehouse.gov/news/releases/2002/06/20020601-3.html.
8. Information on the Georgia Train and Equip Program may be found on the website of
the US embassy in Georgia at http://georgia.usembassy.gov/gtep.html.
9. President Vladimir Putin, Statement Commemorating the Victims of the 9/11 Attacks
(Sept. 11, 2002), available at http://president.kremlin.ru/text/appears/2002/09/29426.shtml.
10. Id.
1 1 . PARLIAMENTARY ASSEMBLY OF THE COUNCIL OF EUROPE, The situation in Georgia and
its consequences for the stability of the Caucasus region, 28th sitting, Recommendation 1580
(2002), available at http://assembly.coe. int/Main.asp?link=/Documents/AdoptedText/ta02/
EREC1580.htm.
12. Id.
13. In that Resolution (U.N. Doc. S/RES/1373 (Sept. 28, 2001)), the Security Council de-
cided that "all States shall prevent the movement of terrorists or terrorist groups by effective bor-
der controls and controls on issuance of identity papers and travel documents, and through
measures for preventing counterfeiting, forgery or fraudulent use of identity papers and travel
documents" (para. 2g), and called upon all States "to ensure, in conformity with international
law, that refugee status is not abused by the perpetrators, organizers or facilitators of terrorist
acts, and that claims of political motivation are not recognized as grounds for refusing requests
for the extradition of alleged terrorists" (para. 3g).
14. The 1982 United Nations Convention on the Law of the Sea expounds the right of hot
pursuit in the homonymous Article 111:
1. The hot pursuit of a foreign ship may be undertaken when the competent
authorities of the coastal State have good reason to believe that the ship has violated the
laws and regulations of that State. Such pursuit must be commenced when the foreign
ship or one of its boats is within the internal waters, the archipelagic waters, the
territorial sea or the contiguous zone of the pursuing State, and may only be continued
outside the territorial sea or the contiguous zone if the pursuit has not been interrupted.
It is not necessary that, at the time when the foreign ship within the territorial sea or the
contiguous zone receives the order to stop, the ship giving the order should likewise be
91
Preemption of Trans-boundary Terrorist Threats: The Russian Perspective
within the territorial sea or the contiguous zone. If the foreign ship is within a
contiguous zone, as defined in article 33, the pursuit may only be undertaken if there
has been a violation of the rights for the protection of which the zone was established.
2. The right of hot pursuit shall apply mutates mutandis to violations in the exclusive
economic zone or on the continental shelf, including safety zones around continental
shelf installations, of the laws and regulations of the coastal State applicable in
accordance with this Convention to the exclusive economic zone or the continental
shelf, including such safety zones.
3. The right of hot pursuit ceases as soon as the ship pursued enters the territorial sea
of its own State or of a third State.
4. Hot pursuit is not deemed to have begun unless the pursuing ship has satisfied itself
by such practicable means as may be available that the ship pursued or one of its boats
or other craft working as a team and using the ship pursued as a mother ship is within
the limits of the territorial sea, or, as the case may be, within the contiguous zone or the
exclusive economic zone or above the continental shelf. The pursuit may only be
commenced after a visual or auditory signal to stop has been given at a distance which
enables it to be seen or heard by the foreign ship.
5. The right of hot pursuit may be exercised only by warships or military aircraft, or
other ships or aircraft clearly marked and identifiable as being on government service
and authorized to that effect.
United Nations Convention on the Law of the Sea, Dec. 10, 1982, 1833 U.N.T.S. 397.
15. In an attempt to foresee and deal with the consequences of possible intrusions of foreign
law enforcement officers, members of the Commonwealth of Independent States negotiated and
signed on June 4, 1999 the Treaty on the Procedures for the Stay of, and Interaction Between,
Law- Enforcement Officers on the Territories of States-Members of the Commonwealth of Inde-
pendent States. While such stays, as a general rule stated in the opening two sentences of Article
6(1), should have the consent of the receiving State, the remaining provisions of that paragraph
allowed for restricted non-consensual penetration of a foreign territory in "hot pursuit" of per-
sons who committed criminal offenses on the territory of a party engaged in such pursuit. The
treaty allowed for such penetration if timely and proper notification and a request for permis-
sion was impracticable. While effective February 6, 2001, the treaty was not ratified by Russia or
Georgia. For official publication of the treaty, see SODRUZHESTVO (COMMONWEALTH), THE IN-
FORMATION BULLETIN OF THE COUNCIL OF HEADS OF STATE AND COUNCIL OF HEADS OF GOV-
ERNMENT OF THE CIS, No. (32), at 27-33. On December 22, 2006 the Chairman of the
Government of the Russian Federation signed an executive order instructing the Ministry of
Foreign Affairs to notify the depositary of the treaty of Russia's "intention not to become a Party"
thereof. Sobraniye Zakonodatel'stva Rossiyskoy Federatsii (The Collection of Laws of the Rus-
sian Federation) No. 52 (Part III), art. 5640 (Dec. 2006) [hereinafter SZ RF].
16. ROSALYN HIGGINS, PROBLEMS AND PROCESS: INTERNATIONAL LAW AND HOW WE USE
IT 240 (1994).
1 7. Legal Consequences of the Construction of a Wall in the Occupied Palestinian Territory,
2004 I.C.J. 56 (July 9), available at http://www.icj-cij.org/icjwww/idocket/imwp/
imwpframe.htm.
18. For a more extensive discussion of statements made by senior Russian officials and re-
spective citations, see Bakhtiyar Tuzmukhamedov, Uprezhdayushchee Primenenie Sily:
Vozmozhniye Kriterii Dopustimost (Pre-Emptive Use of Force: Conceivable Criteria of
Permissibility), RUSSIAN YEARBOOK OF INTERNATIONAL LAW 2005, at 47 (2006).
92
BakhtiyarR. Tuzmukhamedov
19. Supra note 6.
20. Supra note 9.
21. The Russian Constitution and statutes apply the term "aggression" at variance with its
use in the UN Charter and with the definition of aggression within the meaning of UN General
Assembly Resolution 3314. Under the latter, the act of aggression is to be established by the UN
Security Council, rather than by a national authority, and until the Council has acted, a trans-
boundary use of armed force remains an armed attack. G.A. Res. 3314, U.N. GAOR, 29th Sess.,
2319th plen. mtg., U.N. Doc. A/RES/3314 (Dec. 14, 1974). President Putin repeatedly referred to
incursions of insurgents from Chechnya, a constituent entity of the Russian Federation, into
Dagestan, another such entity, as "aggression." See, e.g., the Russian official version of his inter-
view on Larry King Live, Sept. 8, 2000 at http://president.kremlin.ru/appears/2000/09/08/
0000_type63379_28866.shtml. His words, "direct aggression," were translated into English as
"armed direct attack" in the transcript of the show at http://transcripts.cnn.com/
TRANSCRIPTS/0009/08/lkl.00.html. However, the term "aggression" applies to a trans-boundary
armed attack, rather than to a use of armed force confined to national borders, and it should not
be attributed to non-State actors unaffiliated with governments; otherwise, such attribution
might offer extra weight to such actors' claims to official status. President Putin occasionally
demonstrates awareness that the way he applies the term "aggression" may not be proper in the
legal sense. In the aftermath of the 1999 insurgent attack into Dagestan, he spoke about the "fear-
less resistance to aggression" of the Dagestani citizenry. But, according to Putin, "It should be
said that if we abstract ourselves from precise legal terms, that indeed was an aggression commit-
ted by international terrorists." See http://president.kremlin.ru/appears/2000/12/29/0000
_type63376type63378_595 1 1 .shtml.
22. SZRFNo. 2, art. 375 (Feb. 2002).
23. SZRFNo. 11, art. 1146 (Mar. 13,2006).
24. SZ RF No. 31, art. 3808 (Aug. 13, 1998).
25. In the absence of a universally recognized conventional definition of terrorism, the UN
Security Council suggested a legal ersatz definition according to which terrorism may be de-
scribed as
criminal acts, including against civilians, committed with the intent to cause death or
serious bodily injury, or taking of hostages, with the purpose to provoke a state of terror
in the general public or in a group of persons or particular persons, intimidate a
population or compel a government or an international organization to do or to
abstain from doing any act, which constitute offences within the scope of and as defined
in the international conventions and protocols relating to terrorism, are under no
circumstances justifiable by considerations of a political, philosophical, ideological,
racial, ethnic, religious or other similar nature.
S.C. Res. 1566, 1 3, U.N. Doc. S/RES/1566 (Oct. 8, 2004).
26. The amendment, known as Article 3 bis, was adopted on May 10, 1984. It was prompted
by the downing nine months earlier by Soviet Air Defense of the Korean Air Lines Boeing 747-
200 Flight KAL 007. It provides as follows:
a) The contracting States recognize that every State must refrain from resorting to the
use of weapons against civil aircraft in flight and that, in case of interception, the lives of
persons on board and the safety of aircraft must not be endangered. This provision shall
not be interpreted as modifying in any way the rights and obligations of States set forth
in the Charter of the United Nations.
93
Preemption of Trans-boundary Terrorist Threats: The Russian Perspective
b) The contracting States recognize that every State, in the exercise of its sovereignty,
is entitled to require the landing at some designated airport of a civil aircraft flying
above its territory without authority or if there are reasonable grounds to conclude that
it is being used for any purpose inconsistent with the aims of this Convention; it may
also give such aircraft any other instructions to put an end to such violations. For this
purpose, the contracting States may resort to any appropriate means consistent with
relevant rules of international law, including the relevant provisions of this
Convention, specifically paragraph a) of this Article. Each contracting State agrees to
publish its regulations in force regarding the interception of civil aircraft.
c) Every civil aircraft shall comply with an order given in conformity with paragraph
b) of this Article. To this end each contracting State shall establish all necessary
provisions in its national laws or regulations to make such compliance mandatory for
any civil aircraft registered in that State or operated by an operator who has his
principal place of business or permanent residence in that State. Each contracting State
shall make any violation of such applicable laws or regulations punishable by severe
penalties and shall submit the case to its competent authorities in accordance with its
laws or regulations.
d) Each contracting State shall take appropriate measures to prohibit the deliberate
use of any civil aircraft registered in that State or operated by an operator who has his
principal place of business or permanent residence in that State for any purpose
inconsistent with the aims of this Convention. This provision shall not affect paragraph
a) or derogate from paragraphs b) and c) of this Article.
Amendment of Convention on International Civil Aviation with Regard to Interception of Civil
Aircraft, ICAO Doc. 9437, A25-Res. (May 10, 1984), reprinted in 23 INTERNATIONAL LEGAL
MATERIALS 705 (1984).
27. The latter is described as "employment of armaments from the territory of the Russian
Federation against terrorists and (or) their bases beyond" the territory of the Russian Federation
(Art. 10.1 (1)).
28. Article 102.1(d) of the Russian Constitution delegates to the Council of Federation the
power of "making decisions on the possibility of the use of the Armed Forces of the Russian Fed-
eration outside the territory of the Russian Federation." Until the adoption of the federal law
"On Counteracting Terrorism," that provision had been invoked to authorize the deployment of
Russian units to international peacekeeping operations. For an in-depth discussion of the distri-
bution of national defense powers in Russia, see Bahktiyar Tuzmukhamedov, Russian Federa-
tion: the pendulum of powers and accountability, in DEMOCRATIC ACCOUNTABILITY AND THE
USE OF FORCE IN INTERNATIONAL LAW 257 (Charlotte Ku & Harold K. lacobson eds., 2002).
29. SZRFNo. 31 (Part 1), art. 3452 (July 29, 2006).
30. Sergey Ivanov, Press Conference (Mar. 28, 2006), http://www.mil.ru/articles/articlel2865
.shtml.
3 1 . Four Russian embassy personnel were kidnapped in Baghdad on June 3, 2006 from a Rus-
sian embassy vehicle. A fifth was killed during the attack on the vehicle. On June 25, a group
linked to al-Qaida reported that it executed the four diplomats. See Al-Qaida group claims Rus-
sian deaths, UPI, June 25, 2006, available at http://www.arcamax.com/cgi-bin/news/
newsheadlines/s-88252-152190review=4.
32. Most notable are DAVID LEVIN, MEZHDUNARODNOYE PRAVO I SOKHRANENIYE MlRA
(International Law and the preservation of Peace) 148 (1971); Eduard Skakunov,
Samooborona v Mezhdunarodnom Prave (Self-Defense in International Law) 21,
57-58, 80-81 (1973). More recent references may be found in Vladimir Kotlyar, Pravo na
94
Bakhtiyar R. Tuzmukhamedov
Preventivnuyu Samooboronu i Sovremennoe Mezhdunarodnoe Pravo (The Right to Preventive Self-
Defense and Contemporary International Law) GOSUDARSTVO I PRAVO (STATE AND LAW), No.
10 (2005), at 76-77. See also Tuzmukhamedov, supra note 18, at 37-40 and Tuzmukhamedov,
Uprezhdeniye Siloy: "Karolina" I Sovremennosf (Preemption by Force: "Caroline" and Modernity),
ROSSIYA V GLOBALNOY POLITIKE (RUSSIA IN GLOBAL AFFAIRS) No. 2 (2006), at 205.
33. Daniel Webster wrote, "It will be for that Government [Her Majesty's] to show a neces-
sity of self-defence, instant, overwhelming, leaving no choice of means, and no moment for de-
liberation." Letter from Daniel Webster, US Secretary of State, to Henry Fox, British Minister in
Washington (Apr. 24, 1841 ), IN 4 TREATIES AND OTHER INTERNATIONAL ACTS OF THE UNITED
STATES OF AMERICA 449 (Hunter Miller ed., 1934).
34. The letters exchanged between Webster, Fox and Ashburton and an extract from Presi-
dent Tyler's message to the Congress are also available at http://www.yale.edu/lawweb/avalon/
diplomacy/britain/br- 1 842d.htm.
35. Letter from Lord Ashburton, Minister Plenipotentiary on Special Mission, to Daniel
Webster, US Secretary of State (July 28, 1 842), 4 TREATIES AND OTHER INTERNATIONAL ACTS OF
THE UNITED STATES OF AMERICA, supra note 33, at 451.
36. Id.
37. Interviewed by the Italian daily newspaper Corriere Delia Sera on November 3, 2003,
President Putin stated that "if the principle of preventive use of force would assert itself in inter-
national practice, in international life, then Russia shall reserve the right to act in a similar mode
to protect its own national interests," http://www.kremlin.rU/text/appears/2003/l 1/54926. shtml
(last visited Sept. 30, 2006). See also W. Michael Reisman & Andrea Armstrong, The Past and Fu-
ture of the Claim of Preemptive Self-Defense, 100 AMERICAN JOURNAL OF INTERNATIONAL LAW
525 (2006).
95
VII
Security in the Strait of Malacca and the
Regional Maritime Security Initiative:
Responses to the US Proposal
Yann-huei Song*
Introduction
The Regional Maritime Security Initiative (RMSI), proposed in 2004 by Admiral
Thomas B. Fargo, former commander of the US Pacific Command, is one of
the American maritime security programs and initiatives designed to promote re-
gional cooperation and improve maritime security in the East Asia and Pacific re-
gion, especially in the straits of Malacca and Singapore.1 The main goal of RMSI is
to develop a partnership of willing nations, working together under international
and domestic law, to identify, monitor and intercept transnational maritime
threats, in particular piracy, armed robbery and terrorist attacks at sea.2 This initia-
tive is now coordinated jointly by the US Pacific Command and the US Depart-
ment of State.3
The Strait of Malacca, six hundred miles long and only one and a half miles
wide at its narrowest point, is a confined stretch of water between Peninsular Ma-
laysia and the Indonesian island of Sumatra. From an economic and strategic
perspective, it is one of the most important shipping lanes in the world, the
equivalent of the Suez Canal or Panama Canal. The Strait of Malacca forms the
* Research Fellow, Academia Sinica, Taiwan. Fulbright Visiting Scholar, the Asia-Pacific
Research Center, Stanford University.
Security in the Strait of Malacca and Regional Responses to the US Proposal
seaway connecting the Indian Ocean with the South China Sea and the Pacific
Ocean, linking three of the world's most populous nations: India, Indonesia and
China. Annually, approximately fifty thousand large vessels, and daily, an average
of forty-five oil tankers, pass through the strait.4 Daily, about six hundred cargo
vessels carrying everything from Japanese nuclear waste bound for reprocessing fa-
cilities in Europe to raw materials for China's booming economy traverse the Strait
of Malacca.5 It is estimated that two-thirds of the world's liquefied natural gas
(LNG);6 between one-fifth and one-quarter of the world's sea trade; half of the
global oil shipments carried by sea; and over 80 percent of the oil and gas imports
of China, Japan, Taiwan and South Korea come through the Strait of Malacca. The
number of ships passing through the strait is projected to increase due to the rapid
economic growth of the countries in the Asia-Pacific region. It has been estimated
that within the next twenty years two-thirds of China's petroleum imports will
flow from the Middle East, most probably through the Strait of Malacca.7 While
two alternative waterways are available for international shipping (the Sunda Strait
and the Lombok and Makassar straits through Indonesian archipelagic waters), if
the Strait of Malacca was closed a detour through these alternative routes would
add a significant amount of shipping time and cost.
In recent years the Strait of Malacca has increasingly become the target of piracy
and armed robbery against vessels. This upsurge in the violence directed against
shipping is not surprising given the high volume of transiting traffic, the geograph-
ical nature of the strait, the significant political and economic instability in the
area, and the lack of resources and weak maritime law enforcement capacity of the
littoral States. Since the September 11, 2001 terrorist attacks in the United States,
increasing attention has been given to the threat of maritime terrorism, prolifera-
tion of weapons of mass destruction (WMD) and the security of the maritime
transport sector in general. As a result of this changed strategic environment in the
Strait of Malacca area, there has also been a growing conviction among the littoral
States of the need to establish a burden-sharing arrangement, based on Article 43
of the 1982 United Nations Convention on the Law of the Sea (1982 LOS Conven-
tion).8 Such an arrangement would be designed to help cover the gradually increas-
ing cost of providing essential maritime infrastructure in the Strait of Malacca and,
over the years, to keep the waters clear of pollution, safe for navigation, and free
from the threat of pirate and terrorist attacks.
User States, especially China, Japan, South Korea and Taiwan, which are depen-
dent on the strait for the smooth and efficient transit of cargo, in particular energy
supplies, also raised concerns about the safety and security of their vessels and have
demanded that enhanced security measures be taken by the States that border the
Strait of Malacca.9 Other user States that are among the major maritime powers,
98
Yann-huei Song
such as the United States, also raised maritime security concerns regarding the po-
tential threat of transnational crimes, maritime terrorism and armed attacks
against their naval and commercial vessels traversing the strait. As a result, the mar-
itime powers began to explore possible means of becoming involved more directly in
the management of security matters in the Strait of Malacca. These efforts, how-
ever, were regarded by the littoral States as an attempt to "internationalize" the
safety and security of the Strait of Malacca. In response, the littoral States reiterated
their positions that enhancing safety and security and managing environmental is-
sues in the strait are primarily their responsibility.
It is against this background that, when the idea of a RMSI was first introduced
in Admiral Fargo's speech to the US Congress on March 31, 2004, Indonesia and
Malaysia strongly rejected the idea of patrols by foreign powers in the Strait of
Malacca. The governments of these two nations also raised the concern that a US
naval presence in the strait would actually attract terrorist attacks and bolster the
appeal of extremists. However, Singapore, with its economy heavily dependent on
global commercial traffic through the strait, sees piracy, armed robbery and mari-
time terrorism as major security threats, and therefore supported the RMSI, argu-
ing that it is an intensive and complex task to safeguard the waterways against
maritime terrorism and that no single State has the resources to deal effectively
with the maritime security threat in the Strait of Malacca.
In response to the serious concerns of Indonesia and Malaysia, the American se-
curity initiative was modified to delete the original proposal to deploy US forces to
conduct patrols in the strait. On the other hand, due in large measure to the pros-
pect of foreign intervention in safeguarding the security of the Strait of Malacca,
Indonesia, Malaysia and Singapore agreed to carry out coordinated sea and air patrols
to curb piracy and armed robbery, and to increase maritime security. The decision
of the Joint War Committee (JWC) of Lloyd's Market Association in June 2005 to
declare the Strait of Malacca a "war-risk and terrorist zone" also prompted the
three littoral States to take a series of unilateral, bilateral and trilateral cooperative
actions to improve the security environment of the Strait of Malacca.
Malaysia, for instance, announced that its armed police will be placed on board
selected tug boats and barges traversing the Strait of Malacca. In addition, an
escort service will be provided for vessels carrying valuable goods in the strait.
Malaysia also declared that it will begin twenty-four-hour surveillance of the
strait.10 A new Malaysian Maritime Enforcement Agency (MMEA) was also estab-
lished and began patrolling the Strait of Malacca in November 2005. Bilateral coor-
dinated patrols between Malaysia and Indonesia, and between Indonesia and
Singapore, have also been worked out to bring together their respective agencies
involved in anti-piracy and anti-robbery activities. In July 2004, Indonesia,
99
Security in the Strait of Malacca and Regional Responses to the US Proposal
Malaysia and Singapore launched a new trilateral coordinated patrols initiative
(Malsindo) in the Strait of Malacca, which was seen as another major response of
the littoral States to the increasingly challenging issue of safety and security of the
strait. In addition, in August 2005, the three littoral States agreed to implement
joint air patrols over the Strait of Malacca in a bid to boost security in the waterway,
which has been dubbed the "Eyes in the Sky" plan. In April 2006, Indonesia, Ma-
laysia and Singapore signed an agreement to form a Joint Coordinating Committee
on the Malacca Straits Patrols (MSP) and Standard Operational Procedures on Co-
ordinated Patrols.11
The purpose of this article is to examine the development of the US-proposed
RMSI and its influence on national and regional efforts being undertaken to en-
hance security in the Malacca strait and will focus, in particular, on the littoral
States' responses to the American security initiative. The paper first looks into the
background of the introduction of the idea of RMSI by the US Pacific Command in
March 2004; second, it provides an overview of the RMSI and the implementation
of the initiative; third, it examines the preliminary national responses of the three
States that border the Strait of Malacca to the US initiative; fourth, it summarizes
the views of selected ocean law and maritime security experts on the legality, justifi-
cation and political implications of the initiative; fifth, it addresses the steps taken
by the littoral States unilaterally, bilaterally and multilaterally, between July 2004
and June 2006, to enhance security in the Strait of Malacca; sixth, it summarizes the
important regional responses and efforts to help enhance security in the Malacca
strait; seventh, it discusses the role played by existing mechanisms in the region in
processes to help develop cooperative efforts to improve security in the strait; and
finally, it offers the author's observations regarding policy outcomes in terms of lit-
toral States' responses to the US-proposed RMSI and the challenges lying ahead for
advancing maritime security in the Strait of Malacca.
Background for the Regional Maritime Security Initiative Concept
The September 11, 2001 attacks and subsequent anthrax attacks in the United
States profoundly changed the Bush administration's strategic thinking on na-
tional security. This change was reflected in the National Security Strategy of the
United States of America and the National Strategy to Combat Weapons of
Mass Destruction, which were released by the White House in September 2002
and December 2002, respectively.12 This new strategic thinking is defined by ( 1 )
the way in which the United States uses force in the post-9/1 1 world, (2) how the
United States defines defense and (3) the way the United States approaches prolif-
eration.13 Under the new strategy, winning the war against terrorism and stopping
100
Yann-huei Song
the proliferation of WMD have become priority missions of the American armed
forces. In the maritime domain,14 preventing terrorist attacks and criminal or hos-
tile acts has also emerged as one of the key US policy objectives that guide the na-
tion's maritime security activities.
In October 2000, terrorists in a boat laden with explosives carried out a suicide
bombing of the USS Cole (DDG 67) in the harbor at Aden, Yemen. Seventeen US
sailors were killed and over thirty others were wounded. The attack, organized by
Osama bin Laden's al-Qaeda terrorist organization, was carried out by suicide
bombers Ibrahim al-Thawr and Abdullah al-Misawa.15 After the September 11th
attacks, the United States became more concerned about potential terrorist attacks
in the Strait of Malacca area, as demonstrated in late 2001 and early 2002 when US
and Indian naval forces collaborated to protect American merchant shipping at the
northern end of the strait.16 The US perception of the maritime security threat in
Southeast Asia and the Malacca strait was further reinforced in late 2002 and 2003
by three elements: (1) increasing concerns over the association of piracy with ter-
rorist organizations in the region; (2) US and foreign security intelligence reports
indicating that US-flag vessels, both civilian and military, could be attacked by ter-
rorist groups when sailing through the strait or anchoring at ports; and (3) the in-
creasing number of reports of pirate and maritime terrorist attack incidents that
occurred in Southeast Asia and in the Strait of Malacca.
According to the available evidence obtained by the US Central Intelligence
Agency (CIA) and other Western intelligence services, terrorist groups have al-
ready considered striking at maritime targets, particularly in the Strait of Malacca.
The video tapes seized from the Indonesian terrorist group Jemaah Islamiyya (JI),
which included footage of Malaysian maritime police patrols, indicate that this ter-
rorist group was observing security procedures operating in the strait. Members of JI
have been trained in seaborne guerrilla tactics, such as suicide diving capabilities and
ramming. A basic diving manual recovered in Kandahar in Afghanistan was seen as
further evidence of a larger plan to launch maritime attacks by the al-Qaeda net-
works and it is well known that JI has links with al-Qaeda.17 It is believed that other
terrorist groups in Southeast Asia, such as the Free Aceh Movement (also known as
Gerakan Aceh Merdeka (GAM)), the Abu Sayyaf Group, the Moro Islamic Libera-
tion Front (MILF) and the Moro National Liberation Front (MNLF), are also en-
gaging in maritime piracy or terrorist attacks in the region. Following the arrests of
several JI operatives in Singapore in December 2001, it was revealed that the terrorist
group was plotting to blow up US warships docked at the Changi Naval Base in Singa-
pore.18 Warnings about terrorist groups' plans to seize US-flag vessels in the Strait of
Malacca had also been issued by US intelligence services.19
101
Security in the Strait of Malacca and Regional Responses to the US Proposal
A number of reports on pirate and maritime terrorist attacks in late 2002 and
2003 also increased US concerns about possible attacks against its vessels transiting
the waterways in the Strait of Malacca and Southeast Asia. In October 2002, the
MV Limburg, a French oil tanker, was attacked by an explosive-laden boat.20 The
organizer of the attack was Abd al Rahman al Nashir, who was also believed to have
been responsible for the attack on the Cole. The Limburg attack not only high-
lighted the vulnerability of cargo ships to terrorist attacks but also confirmed US
concerns that it is not beyond the capabilities of terrorist groups to carry out assaults
on maritime interests such as vessels and ports. In March 2003, the Indonesian
chemical tanker Dewi Madrim was boarded by ten pirates from a speedboat in the
congested southern reaches of the Strait of Malacca. The pirates were equipped
with machine guns and machetes and carried VHF radios. Having disabled the
tanker's communications and tied up the crew, the pirates took the helm and navi-
gated the vessel for about an hour before departing with the master and first officer
as hostages. According to a study by Aegis Defence Services, a London-based de-
fense and security consultancy, the temporary hijacking of the Dewi Madrim was
an attempt by terrorists to learn how to pilot a ship, and the kidnapping was aimed
at acquiring expertise to help the terrorists mount a maritime attack. The Dewi
Madrim attack was therefore considered the equivalent of the tactics of the al-
Qaeda hijackers who perpetrated the September 1 1th attacks after going to a flight
school in Florida.21 Singapore's defense minister, Tony Tan, also stated that the
Dewi Madrim incident and others like it were practice runs for a terrorist attack.22
In February 2004, six al-Qaeda-linked Muslim militants of the Abu Sayyaf Group
bombed SuperFerry 14, leaving over one hundred people dead. Philippine presi-
dent Gloria Arroyo confirmed that the attack was the work of terrorists.23 In addi-
tion to the maritime terrorist attacks, pirate attacks in the Strait of Malacca also
increased from sixteen to twenty-eight in 2003 and from twenty-eight to thirty-
seven in 2004.24 According to the International Maritime Bureau's piracy report-
ing center, seventy of the 251 global reports of piratical attacks in the first nine
months of 2004 occurred in the Strait of Malacca.25
The US Pacific Command is the headquarters responsible for all American air,
ground and maritime military forces in the Asia-Pacific region. The Strait of
Malacca and Southeast Asia are within the area of responsibility of this command,
the mission of which is to promote security and peaceful development in the re-
gion by deterring aggression, advancing regional security cooperation, responding
to crises, and fighting to win.26 Since the September 1 1 attacks, prosecuting and
winning the global war on terrorism has become one of the command's major fo-
cus areas. In response to the increasing maritime security threat in the Strait of
102
Yann-huei Song
Malacca and Southeast Asia, as demonstrated above, the US Pacific Command de-
veloped the concept of RMSI.
The Development and Overview of the Regional Maritime Security Initiative
On March 31, 2004, in testimony before the House Armed Services Committee re-
garding US Pacific Command posture, Admiral Thomas B. Fargo, its commander,
stated that despite notable successes in the war on terrorism, the United States re-
mained deeply concerned about transnational threats from terrorist organizations
such as al-Qaeda, JI and the Abu Sayyaf Group in the Asia-Pacific region. The
United States sensed increasing synergy between transnational threats like terror-
ism, illicit drugs, trafficking in humans, piracy and especially WMD proliferation.
To improve international cooperation against these transnational security threats,
President George Bush launched the Proliferation Security Initiative (PSI) and the
State Department proposed the Malacca Straits Initiative in 2003. To help
operationalize these initiatives, the US Pacific Command introduced the concept
of RMSI.27 During the question and answer session at the same hearings, in re-
sponse to the questions raised by Congressman Rick Larsen about RMSI and its re-
lationship to the PSI, Admiral Fargo cited the lack of information and intelligence
on the transnational maritime threat. The Admiral noted that there was wide-
spread support for RMSI and stated:
I just came back from Singapore and had a very solid conversation with the "Sings" and
they're going to help us with this. My instinct, it probably ought to start at the Strait of
[Malacca] and work its way out, because the Straits of [Malacca] are fundamental to
the movement of all of the energy through the region. . . . We need to know who's
moving through the sea space. We need to know the status of ships. We need
participation from the vast majority of them so that we can single out and cue on those
that aren't within the law.28
It was Admiral Fargo's belief that RMSI would receive a very broad range of sup-
port from the countries in the region, including the three littoral States of the
Malacca strait.29
As far as the means to implement the initiative are concerned — in particular, to
carry out maritime interdiction operations in the Strait of Malacca — the Admiral
indicated that
We're looking at things like high-speed vessels, putting Special Operations Forces on
high-speed vessels, putting, potentially, Marines on high-speed vessels so that we can
use boats that might be incorporated with these vessels to conduct effective
103
Security in the Strait of Malacca and Regional Responses to the US Proposal
interdiction in . . . these sea lines of communications where terrorists are known to
move about and transit throughout the region.30
This proposal later became the main reason two of the littoral States of the Malacca
strait — Indonesia and Malaysia — rejected the idea of RMSI. In response to the
strong reactions from the littoral States, US ambassador to Indonesia Ralph L.
Boyce clarified the statement in Jakarta in April 2004, saying, "Admiral Fargo never
said the US was going to send its marines or special forces to the Straits of Malacca.
The AFP story . . . was misleading."31 The US embassy in Malaysia also made the
same clarification, adding that the RMSI would be conducted within existing inter-
national laws.32 Having clarified Admiral Fargo's proposal, the US State Depart-
ment continued to call on the nations in the Asia-Pacific region to work more
closely to deal with the transnational threats, in particular, terrorism, piracy and
other crimes, including drug trafficking and human trafficking. US deputy assis-
tant secretary of state for East Asia Matthew Daley, for instance, warned at the Dia-
logue on Security in Asia, held in Singapore in April 2004, that "Asia's waters are
prime targets for Al-Qaeda and other terrorists" and "[wjhether we are talking
about acts of piracy or terrorist attacks or even transnational problems, such as
trafficking of persons or drugs, the terrorist aspect is not to be underestimated."33
Daley also stressed that the concern over the potential maritime terrorist attacks
was not simply theoretical but was going to be an essential area of multilateral co-
operation in the Asia-Pacific region in the months and years to come.34
In May 2004, Admiral Fargo further elaborated his idea of RMSI at the Military
Operations and Law Conference held in Victoria, British Columbia, where he also
emphasized the importance of conducting the initiative under existing interna-
tional laws, including the laws of war and respect for national sovereignty. As he
explained at the conference:
The goal of RMSI is to develop a partnership of willing regional nations with varying
capabilities and capacities to identify, monitor, and intercept transnational maritime
threats under existing international and domestic laws. This collective effort will
empower each participating nation with the timely information and capabilities it
needs to act against maritime threats in its own territorial seas. As always, each nation
will have to decide for itself what response, if any, it will take in its own waters.
Information sharing will also contribute to the security of international seas, creating
an environment hostile to terrorism and other criminal activities. Any RMSI activity in
international waters will, again, be in accordance with existing international law.35
There were five elements in the RMSI proposed by Admiral Fargo. These are
(1) increased situational awareness and information sharing, (2) responsive
104
Yann-huei Song
decision-making architectures, (3) maritime interdiction capabilities, (4) littoral
security and (5) interagency cooperation. He also made it clear that RMSI is not a
treaty or an alliance and that the initiative will not result in a standing naval force
patrolling the Pacific. Admiral Fargo added that the initiative differs from the PSI in
the sense that it is not a global effort, but will focus on maritime transnational
threats in the Asia-Pacific region. Moreover, RMSI is not a challenge to sovereignty,
and activities undertaken under the initiative will not violate existing international
and domestic laws.36
In July 2004, the United States and the Philippines co-hosted the Maritime
Threats Workshop held in Cebu in the Philippines. A major topic of the workshop
was the US-proposed RMSI, which "emphasizes information sharing, providing
cueing of emerging threats, contributing to the security of international seas, and
most important, creating an environment hostile to terrorism and other criminal
activities."37 It was stated that RMSI could empower each nation to take action it
deems necessary to protect itself in its own waters, thereby enhancing the region's
collective security. While the participants agreed that RMSI could provide a plan of
action to address the transnational maritime threats in the region, they also recom-
mended the use of existing fora and international/regional programs that are ap-
propriate to address RMSI objectives in order to avoid establishing additional
mechanisms. The existing mechanisms include the Association of Southeast Asian
Nations (ASEAN), the ASEAN Regional Forum (ARF) and the Asia-Pacific Eco-
nomic Cooperation group (APEC).38
In November 2004, an overview of RMSI was provided on the website of the US
Pacific Command, along with links to the US Pacific Command Strategy for Re-
gional Maritime Security and other RMSI-related documents. These documents
provide a more accurate understanding of RMSI, its strategic intent and status.39
The Strategy for Regional Maritime Security stated clearly in its executive sum-
mary that RMSI "is designed to deny the use of the maritime domain by those who
pose a threat to the Asia-Pacific region's maritime security, including transnational
terrorists and criminals."40 The nations participating in this initiative will utilize a
cross-discipline, interagency approach to facilitate the development of regional
maritime security capacities and conduct activities to establish and maintain a se-
cure maritime environment. Implementation of RMSI will be accomplished by co-
ordinating activities between the United States and the participating nations in the
region that support the following common elements of maritime security: (1) in-
creased situational awareness and information sharing; (2) responsive decision-
making architectures; (3) enhanced maritime interception capacity; and (4)
agency, ministerial and international cooperation.41
105
Security in the Strait of Malacca and Regional Responses to the US Proposal
According to the regional maritime security strategy, RMSI activities will be un-
dertaken in the territorial waters of the participating nations and international wa-
ters of the Pacific and Indian oceans to counter "maritime threats" that include
terrorism, maritime piracy, illegal trafficking (i.e., narcotics, weapons, human and
illicit cargo) and other criminal activities in the maritime domain.42 RMSI will be
implemented through a cooperative effort, emphasizing interactions with the gov-
ernments, international organizations and private sectors in the region, and will be
based upon existing bilateral and multilateral arrangements. The international or-
ganizations dealing with maritime security issues in the region include, but are not
limited to, ASEAN, ARF, ASEAN Security Community (ASC), APEC, Council for
Security Cooperation in the Asia Pacific (CSCAP), International Maritime Bureau
(1MB), North Pacific Heads of Coast Guard Agencies, United Nations International
Maritime Organization (IMO) and the Western Pacific Naval Symposium
(WPNS).43
The strategic intent of RMSI is to carry out the four common elements of mari-
time security mentioned earlier through cooperative efforts. Accordingly, the
RMSI-participating nations will establish procedures, processes and standards to
fuse information and the means to share the information; support the develop-
ment of responsive decision-making architectures and regional maritime security
capacity through agency, ministerial and international unity of effort; engage in
appropriate fora to gain the requisite understanding of existing maritime security
capacities; and develop cooperative arrangements to monitor, identify and inter-
cept suspect vessels and transnational threats in territorial and international waters,
consistent with international and domestic law. RMSI will also leverage appropri-
ate elements of national and international resources and capabilities and will com-
plement ongoing cooperative security activities such as bilateral and multilateral
exercises, the Container Security Initiative (CSI), Counterdrug (CD) Operations,
Customs-Trade Partnership Against Terrorism (C-TPAT), International Port Secu-
rity Program (IPSP), International Ship and Port Facility Security (ISPS) Code,
Maritime Domain Awareness (MDA), Multinational Planning Augmentation
Team (MPAT), Proliferation Security Initiative (PSI), Regional Cooperation Agree-
ment on Anti-Piracy (ReCAAP), and Secure Trade in the APEC Region (STAR).44
Table 1 (below) illustrates security in the Asia-Pacific maritime continuum.
In December 2004, President Bush promulgated National Security Presidential
Directive 41 and Homeland Security Presidential Directive 13 (NSPD-41/HSPD-13),
which established US policy, guidelines and implementation actions to enhance
US national interests and homeland security by protecting US maritime interests.
The directives also established a Maritime Security Policy Coordinating Commit-
tee to coordinate interagency maritime security policy efforts. In recognition of the
106
Yann-huei Song
importance of the maritime domain to US national security interests, and given the
potential threat to US maritime security, the US government decided to
[Djeploy the full range of its operational assets and capabilities to prevent the Maritime
Domain from being used by terrorists, criminals, and hostile States to commit acts of
terrorism and criminal or other unlawful or hostile acts against the United States, its
people, economy, property, territory, allies, and friends, while recognizing that
maritime security policies are most effective when the strategic importance of
international trade, economic cooperation, and the free flow of commerce are
considered appropriately.45
It thus became US policy "to take all necessary and appropriate actions, consistent
with U.S. law, treaties and other international agreements to which the United States
is a party, and customary international law as determined for the United States by the
President, to enhance security and protect U.S. interests in the Maritime Domain."46
PSI
MDA
CSI
RMSI
ISPS
TITLE
Proliferation
Security Initiative
Maritime Domain
Awareness
Container
Security Initiative
Regional Maritime
Security Initiative
International Ship &
Port Facility Security
Code
US & INTL.
AGENCIES
National
Security Council
US Coast Guard
US Navy
US Department
of Homeland
Security-
Customs &
Border
Protection (CBP)
US Department of
State
United Nations
US Department of
State
USPACOM
International Maritime
Organization
US Department of
Defense
AREA
Worldwide/Global
US & Territories
Worldwide/Global
Asia-Pacific Region
Worldwide/Global
FOCUS
Deter & disrupt
WMD (& related
material/delivery
systems)
proliferation
transported on the
sea, air & ground.
Reduce
proliferation by
deterring suppliers
& customers, &
making
proliferation more
costly & difficult.
Attain effective
understanding of
anything
associated with
the global
maritime
environment that
could impact the
security, safety,
economy or
environment of
the US.
US-bound
shipping cargo
container safety.
Exchange
program with
CBP officers
stationed in
select ports.
About 7 million
containers
arriving in US
ports annually.
90% of global
trade via cargo
containers.
Partnership of
willing nations
enhancing
capabilities &
leveraging
capacities through
unity of effort to
identify, monitor &
intercept
transnational
maritime threats
consistent with
existing
international &
domestic laws.
Provide a
standardized,
consistent framework
for evaluating risk &
enabling governments
to offset changes in
threats with changes
in vulnerability for
ships & port facilities.
Table 1: Security in the Asia-Pacific Maritime Continuum
Source: US Pacific Command, RMSI: The Idea, The Facts47
107
Security in the Strait of Malacca and Regional Responses to the US Proposal
Accordingly, President Bush directed the secretaries of defense and homeland
security to jointly lead a collaborative interagency effort to draft a recommended
National Strategy for Maritime Security.48 In concert with the development of the
national strategy, the following actions were tasked: ( 1 ) Maritime Domain Awareness,
(2) Global Maritime Intelligence Integration, (3) Domestic Outreach, (4) Coordi-
nation of International Efforts and International Outreach, (5) Maritime Threat
Response, (6) Maritime Infrastructure Recovery, (7) Maritime Transportation
System Security, and (8) Maritime Commerce Security.49 While the term "Regional
Maritime Security Initiative" was not found in the directive, it is clear that Admiral
Fargo's concept of RMSI had been incorporated into NSPD-41/HSPD-13.
In February 2005, Admiral William J. Fallon was nominated by President Bush
and confirmed by the US Senate to succeed Admiral Fargo as the new Commander,
US Pacific Command. Thereafter, RMSI continued to constitute an integral part of
the command's maritime security strategy. As reflected in Admiral Fallon's re-
marks at the 4th Annual Shangri-La Dialogue held in Singapore in June 2005, the
concept of RMSI remains very much alive. He noted that RMSI was launched by
his predecessor and reiterated US Pacific Command's concern over the maritime
security threat in the Asia-Pacific region. He pointed out that because knowledge
of activities in the sea space is incomplete, unseen threats can develop and therefore
it is essential to develop close cooperation among nations and between maritime
organizations, both State and non-governmental, in the region. In addition, with
due respect for national sovereignty, Admiral Fallon suggested that organizational
and operational issues should be priority items for agreement for the purpose of
enhancing maritime security in the Asia-Pacific region.50
In September 2005, the National Strategy for Maritime Security51 was issued by
the White House, listing the following threats to US maritime security: ( 1 ) nation-
State threats associated with terrorism and WMD attacks; (2) terrorist threats, in
particular those associated with attacks by possible use of WMD and attacks at or
from the sea; (3) transnational criminal and piracy threats; (4) environmental de-
struction; and (5) illegal seaborne immigration. The US perception of maritime
terrorist threats is reflected in the following security assessment:
Terrorists can also develop effective attack capabilities relatively quickly using a variety
of platforms, including explosives-laden suicide boats . . . and light aircraft; merchant
and cruise ships as kinetic weapons to ram another vessel, warship, port facility, or
offshore platform; commercial vessels as launch platforms for missile attacks;
underwater swimmers to. infiltrate ports; and unmanned underwater explosive
delivery vehicles. Mines are also an effective weapon because they are low-cost, readily
available, easily deployed, difficult to counter and require minimal training. Terrorists
can also take advantage of a vessel's legitimate cargo, such as chemicals, petroleum, or
108
Yann-huei Song
liquefied natural gas, as the explosive component of an attack. Vessels can be used to
transport powerful conventional explosives or WMD for detonation in a port or
alongside an offshore facility.52
To achieve the objectives of the National Strategy for Maritime Security, the fol-
lowing five strategic actions are to be taken collectively by the United States, other
willing nations and international organizations: ( 1 ) enhance international cooper-
ation, (2) maximize domain awareness, (3) embed security into commercial prac-
tices, (4) deploy layered security and (5) assure continuity of the marine
transportation system.53 Specifically referring to the management of security in the
Strait of Malacca, it is the policy of the United States to "use the agencies and com-
ponents of the Federal Government in innovative ways to improve the security of
sea-lanes that pass through international straits."54 The United States intends to
work with its regional and international partners to expand maritime security ef-
forts. Since regional maritime security regimes are a major international compo-
nent of the US national strategy, and are essential for ensuring the effective security
of regional seas, the United States is willing to work closely with other governments
and international and regional organizations to enhance the maritime security ca-
pabilities of other key nations by adopting the following measures:
• Offering maritime and port security assistance, training and consultation;
• Coordinating and prioritizing maritime security assistance and liaison
within regions;
• Allocating economic assistance to developing nations for maritime security
to enhance security and prosperity;
• Promoting implementation of the Convention for the Suppression of
Unlawful Acts Against the Safety of Maritime Navigation and its amendment and
other international agreements; and
• Expanding the International Port Security and Maritime Liaison Officer
programs, and the number of agency attaches.55
In addition to the National Strategy for Maritime Security, the relevant US de-
partments and agencies have developed eight supporting plans to address the spe-
cific threats and challenges of the maritime environment, which include:
• The National Plan to Achieve Maritime Domain Awareness;56
• The Global Maritime Intelligence Integration Plan;57
• The Maritime Operational Threat Response Plan;58
• The International Outreach and Coordination Strategy;59
• The Maritime Infrastructure Recovery Plan;60
109
Security in the Strait of Malacca and Regional Responses to the US Proposal
• The Maritime Transportation System Security Recommendations;61
• The Maritime Commerce Security Plan;62 and
• The Domestic Outreach Plan.63
In November 2005, the Department of State submitted the International Out-
reach and Coordination Strategy for the National Strategy for Maritime Security64
to the White House. The strategy aims to advance the policies set by President Bush
in the National Security Strategy,65 the National Strategy for Homeland Security66
and the National Strategy for Maritime Security and to help accomplish the presi-
dent's vision of a fully coordinated US government effort to protect the nation's in-
terests in the maritime domain. In order to achieve the strategic goals of the
International Outreach and Coordination Strategy, the US Department of State
works together with the US Pacific Command to implement RMSI. In February
2006, it was reported that the State Department has proposed a $4.8 billion military
aid budget for Fiscal Year 2007, in which $2 million is allocated to RMSI.67 On
March 7, 2006, Admiral Fallon, in testimony before the Senate Armed Services
Committee, stated that "[w] inning the war on terrorism is U.S. Pacific Com-
mand's highest priority" and that Southeast Asia remains the command's focal
point in the war on terror.68
On February 15-17, 2006, the United States held a conference in Alameda, Cali-
fornia to discuss ways and means to help coordinate potential donor contributions
in maritime security efforts in the Malacca strait. Sponsored by the US Department
of State and the US Coast Guard, this meeting was attended by the US Pacific Com-
mand, like-minded countries using the strait, the International Maritime Bureau
(1MB), private sector representatives and other observers. The three littoral States
of the Malacca strait — Indonesia, Malaysia and Singapore — were not invited to the
conference. China was invited to the conference but did not attend. Taiwan was
not invited because of sensitive political reasons.
The Alameda conference was an important initiative and was held under the IMO
framework. However, in comparison with the news coverage on the US-proposed
RMSI back in May 2004, surprisingly no reports on the Alameda conference were re-
ported in the media, except an item in the Defense News regarding India's announce-
ment during the conference that its maritime surveillance force would jointly patrol
the Strait of Malacca with the United States,69 a very brief report on the conference at
the US Department of State's Fact Sheet on Maritime Security in the East Asian and
Pacific Region,70 and the commentary on the Institute of Defence and Strategic
Studies website entitled "Burden Sharing in the Straits: Not So Straightforward" by
Sam Bateman.71 The latter commented that the Alameda conference appeared to
pre-empt the initial task of the littoral States in identifying and prioritizing their
110
Yann-huei Song
needs to enhance safety and security and manage environmental matters, and allo-
cated a leading role to the user States of the Strait of Malacca. In addition, this meet-
ing appeared to attach little significance to Article 43 of the 1982 LOS Convention72
that has been the key focus of the littoral States over the past five years and the cor-
nerstone of the IMO initiative that was discussed and agreed to at the Meeting on the
Straits of Malacca and Singapore: Enhancing Safety, Security and Environmental
Protection held in Jakarta, Indonesia in September 2005.
Before proceeding to the discussion of the littoral States' initial responses to the
US-proposed RMSI, it is important to mention briefly a fact sheet provided by the
US Department of State,73 mainly because the document describes the US mari-
time security policy, especially in the Malacca strait area. According to this fact
sheet, it is the US policy to seek to develop cooperative mechanisms to enhance the
safety, security and environmental protection of strategic waterways in the East
Asia and Pacific region, in particular the Strait of Malacca. The United States will
work with like-minded countries and those littoral States responsible for safe-
guarding the important strategic waterways in the region. The fact sheet further
provides that it is the common goal of the United States, like-minded nations and
the littoral States bordering the strategic waterways "bilaterally and multilaterally,
to develop a partnership of willing nations to enhance the overall capabilities and
capacities to identify, monitor, and respond to maritime threats consistent with le-
gal authorities and frameworks."74
Especially in the Strait of Malacca, the United States will work with global part-
ners to ensure ( 1 ) recipient and user-State donor coordination based on the bur-
den sharing of resources, (2) the interoperability of the partners' activities, (3) the
sustainability of the joint strategies and (4) the prevention of redundancy among
other maritime security efforts. Each of these four aims, as set forth in the fact
sheet, must match both the priorities and needs of recipient States. The United
States will work with responsible States, user States, multilateral organizations and
private sector partners75 on planning, capacity building, information sharing, In-
ternational Ship and Port Facilities Security (ISPS) Code implementation, techni-
cal assistance, training and exercises, private sector outreach, maritime
environmental stewardship and counterterrorism.
Littoral States' Perceptions of the Regional Maritime Security Initiative
It is clear that right before the US Pacific Command's announcement of the RMSI
concept, Admiral Fargo had secured support for the initiative from the government
of Singapore, as demonstrated in the question and answer portion of his testimony
before the House Armed Services Committee on March 31, 2004. Admiral Fargo
111
Security in the Strait of Malacca and Regional Responses to the US Proposal
stated that "I just came back from Singapore and had a very solid conversation with
the [Singaporeans] and they're going to help us with [RMSI]."76 The Admiral ex-
pected a very broad range of support for RMSI, mainly because "[a] 11 of the coun-
tries in the region are concerned about the transnational threat,"77 which includes
terrorism, proliferation and the trafficking in humans. The initial reactions from
the governments of Indonesia and Malaysia to the RMSI proposal in May and June
2004 proved that Admiral Fargo's assessment of regional support for the initiative
was incorrect, especially in regard to the notion of putting US Special Operations
Forces or marines on high-speed vessels to conduct maritime interdiction in the
Strait of Malacca. The three littoral States' perceptions of, and initial reactions to,
RMSI are examined below.
Indonesia
Shortly after the media's disclosure of the US plan to deploy troops in the Strait of
Malacca, Indonesia's Ministry of Foreign Affairs issued a statement on the official
position of the country in its opposition to the plan, arguing that Indonesia and
Malaysia, in accordance with the 1982 LOS Convention, were solely responsible for
guarding the Strait of Malacca.78 Nugroho Wisnumurti, former director general
for political affairs of Indonesia's Ministry of Foreign Affairs, pointed out that
Fighting terrorism through regional cooperation in Southeast Asia, or any part of the
globe for that matter, is something to be applauded. However, fighting terrorism in the
Malacca and Singapore Straits by allowing the use of military force by any country
other than the coastal states (Malaysia, Indonesia and Singapore) is another matter.79
Indonesian Navy Chief Admiral Bernard Kent Sondakh joined the opposition,
calling the idea of sending special operations troops to the Strait of Malacca under
RMSI "baseless."80 During the Second Indonesia-United States Security Dialogue,
held in Washington, DC, April 22-23, 2004, the Indonesian delegation sought clar-
ification regarding the US policy towards the Strait of Malacca. In response, the US
delegation clarified the concept of RMSI and gave assurances that the United States
would respect Indonesia's sovereignty over its waters. The US delegation further
agreed to continue to consult with Indonesia and other regional nations.81
In June 2004, when attending the 3rd Asian Security Conference (known as the
"Shangri-La Dialogue") in Singapore, US defense secretary Donald H. Rumsfeld
told a group of Asian reporters that RMSI was an idea in its early stage and would
not threaten sovereignty. The Secretary clarified that "[a]ny implications that it
would impinge in any way on the sovereign territorial waters of some countries
would be inaccurate."82 Admiral Walter F. Doran, the United States Pacific Fleet
112
Yann-huei Song
commander, who accompanied Secretary Rumsfeld at the conference, also told re-
porters that Admiral Fargo's testimony did not imply that establishing new US
bases and units or stationing elite forces in the region are part of RMSI. Admiral
Doran pointed out that the main idea of the initiative was to build on normal navy-
to-navy contacts and discussions to raise maritime situational awareness in the
Asia-Pacific region.83
Despite the clarification made by high-ranking officials of the US government,
including Admiral Fargo and Defense Secretary Rumsfeld, Indonesia's concerns
over the possible intervention by foreign maritime powers, in particular the United
States, in the management of the Strait of Malacca remained. As reported, Indonesia
was displeased with joint naval patrols conducted by the navies of India and the
United States for several months in 2003. 84 The reasoning behind this displeasure
was Indonesia's worries about US involvement in a broader strategy that favored a
permanent Indian presence in Southeast Asia, with the endorsement of Singapore.85
According to another analysis, while the US government repeatedly stated that
RMSI was still in its early stage and was mainly concerned with sharing informa-
tion, rather than with deploying US troops in the Strait of Malacca, Indonesia con-
tinued to raise its objection to the US proposal, largely because of its long-standing
policy of seeking regional solutions to regional security problems, and its govern-
ment's need to appease a large, anti- American nationalist and Islamist domestic
political audience. In addition, Indonesia perceived that the US proposal repre-
sented a challenge to regional self-management of security issues.86
Malaysia
The government of Malaysia, taking the same position as that of Indonesia, ob-
jected strongly to the US idea of sending troops to help patrol in the Strait of
Malacca under the proposed RMSI. Yab Dato Seri and Najib Tun Razak, Malay-
sia's deputy prime minister and defence minister respectively, stated in early April
2004 that "[i]n principle, ensuring the security of the Straits of Malacca is the re-
sponsibility of Malaysia and Indonesia and for the present we do not propose to in-
vite the United States to join the security operations we have mounted there."87
The defence minister continued, a[e]ven if they [the Americans] wished to act,
they should get our permission, as this touches on the question of our national
sovereignty."88 Najib Razak denied that Malaysia and Indonesia needed help from
non-littoral States to police the Malacca strait which, despite periodic raids by pi-
rates on smaller cargo vessels, was generally safe for shipping. Moreover, he
pointed out that while Malaysia maintained good relations with the United States,
including joint military training, and that US vessels, including warships, were free
to use the strait, to launch military operations in those waters the United States
113
Security in the Strait of Malacca and Regional Responses to the US Proposal
should first obtain permission from the governments of Malaysia and Indonesia.89
Mohamed Nazri Abdul Aziz, a minister in Malaysia's Prime Minister's Depart-
ment, warned that if the littoral States do not properly safeguard security in the
Strait of Malacca, foreign powers maybe prone to intervene in managing the secu-
rity matters in the strait, which would pose a threat to Malaysia's sovereignty.90
In June 2004, while continuing to reject the notion of the sending of US troops
to the Strait of Malacca, Malaysia agreed to discuss the issue of protecting the strait
from piracy and potential terrorist attacks with the United States.91 In the same
month at the 3rd Shangri-La Dialogue, Malaysia again stressed its opposition to a
US military presence in defending the Strait of Malacca and Southeast Asia from
terrorist attacks but also agreed to the principles of sharing intelligence and block-
ing terrorists' financial and logistical networks. Najib Tun Razak reminded the
participating defense ministers of Malaysia's concerns over the negative impact of
a foreign military presence on security and political stability in the region, because
it would "set us back in our ideological battle against extremism and militancy."92
The government of Malaysia was aware of Singapore's strong support for the
US-proposed RMSI and accused Singapore of calling on foreign powers to inter-
vene in security matters in the Strait of Malacca. Malaysia also disagreed with Singa-
pore's security assessment with regard to the link between pirate attacks and mari-
time terrorism. Malaysia did not believe that the problem of piracy in the Strait of
Malacca was critical; what occurred were only minor robberies, as pointed out by
Rahim Husin, Malaysia's director of the Maritime Security Policy Directorate. In ad-
dition, Malaysia claimed that its law enforcement agencies were more than capable
to ensure security in the strait without intervention from anyone.93
Singapore
Since the September 11 attacks, Singapore has been working closely with the
United States to deal with the potential threats posed by terrorism and WMD pro-
liferation. Similar to the actions taken by Japan, Singapore participates actively in
US-led security initiatives, such as the CSI and PSI. In August 2005, Singapore
hosted the multinational PSI interdiction training exercise, Deep Sabre, in the
South China Sea. Singapore also signed a new framework agreement with the
United States for a strategic cooperation partnership in defense and security. The
agreement expands the scope of bilateral cooperation between the two nations in
such areas as anti-terrorism, anti-proliferation of WMD, joint military exercises
and training, policy dialogues, and defense technology.94 Based on the close secu-
rity relations between Singapore and the United States, it comes as no surprise to
see Singapore expressing its strong support for the US-proposed RMSI. As stated
114
Yann-huei Song
earlier, shortly before the announcement of RMSI, Admiral Fargo had talks with
the government of Singapore and obtained its support for the initiative.95
In the area of managing security in the Strait of Malacca, Singapore complained
frequently about the lack of political will to take effective actions and weak law en-
forcement capacities of the other States that border the Malacca strait to counter
the threat posed by transnational crimes, such as piracy and armed robberies at sea.
To enhance the safety and security in the strait, Singapore has been calling upon re-
gional States and interested extra-regional powers to put pressure on the littoral
States, in particular Indonesia. Singapore's perception of the maritime security
threat has been greatly reinforced by the attacks on Cole in 2000, Limburg in 2002
and Dewi Madrim in 2003. It has become Singapore's major worry that pirate at-
tacks might be linked to terrorist organizations that may launch terrorist attacks in
the Malacca strait area.
Singapore's reactions to the US-proposed RMSI were first reflected in the state-
ment made by its defence minister Teo Chee Hean in April 2004 that "the task of
safeguarding the regional waters against maritime terrorism was complex and no
single State had the resources to deal effectively with this threat."96 In response to
this statement, Malaysia's foreign minister Datuk Seri Syed Hamid pointed out
that if Singapore had concerns about security in the Strait of Malacca, it should first
discuss them with the littoral States of Malaysia and Indonesia.97 In May 2004, dep-
uty prime minister and coordinating minister for security and defence Tony Tan
Keng Yam further elaborated Singapore's concerns over the threat of maritime ter-
rorism in Southeast Asia and the lack of security in the Strait of Malacca. Tony Tan
stated that "[t]he possible nexus between piracy and maritime terrorism is proba-
bly the greatest concern to maritime security."98 To counter the threat posed by pi-
racy and maritime terrorism, Singapore advocates a comprehensive approach that
covers three overlapping domains, namely domestic, regional and international.
Domestically, each country can tighten its port security by putting in place addi-
tional or enhanced measures. Regionally, the responsibility of the littoral States for
the maritime security in the region must be recognized. At the same time, the litto-
ral States should take unified and concerted action to enhance the security of stra-
tegic waterways. Internationally, key players, such as the United Nations, IMO and
other nations that have a stake in the safety and security of international water-
ways, must be involved to protect important sea lines of communications (SLOC)
against pirate attacks and maritime terrorism.99
At the 3rd Shangri-La Dialogue held in June 2004, Tony Tan reiterated Singa-
pore's concern over potential maritime attacks, pointing out that a ship sunk in the
right spot in the Strait of Malacca would cripple world trade. He also raised the
possibility of hijacked ships being turned into "floating bombs" and crashed into
115
Security in the Strait of Malacca and Regional Responses to the US Proposal
critical infrastructure such as oil refineries or ports.100 It was later reported that
Singapore proposed the idea that US Marines help patrol the Strait of Malacca,
which further reinforced the belief of Malaysia and Indonesia that Singapore was
using the terrorist threat as a tool to justify the US presence in the region.101
Selected Ocean Law and Maritime Security Experts' Views on RMSI
In addition to the initial reactions of the three littoral States to the US-proposed
RMSI, there can also be found comments made by ocean law and maritime experts
in the region on the legitimacy, implications and possible impact of the initiative,
some of which are summarized below.
Malaysian Ocean Law and Maritime Security Experts
Mohd Zaki Mohd Salleh102 viewed the US concept of sending its troops to the Strait
of Malacca under RMSI as a political ploy by Singapore. If the United States were
allowed to patrol the strait on grounds of security, he argued, it would indirectly
mean that Malaysia and Indonesia had recognized the presence of a superpower in
the region. Mohd Zaki expressed the opinion that Singapore was concerned about
Malaysia's efforts to modernize its armed forces, which posed a threat to Singa-
pore's sense of superiority in the region. To maintain that feeling of superiority,
Singapore needed the US military presence in the Strait of Malacca and Southeast
Asia. In addition, he did not believe that the problem of piracy in the region had
reached a critical stage. The main reason for the sharp increase of pirate attacks in
the Strait of Malacca area was, he argued, the economic slowdown in 1 997-98. 103
B.A. Hamzah104 maintained that the idea of inviting the US Navy to patrol the
Strait of Malacca had no legal basis. Hamzah argued that since the adoption of the
1982 LOS Convention, which introduced transit passage rights in straits used for
international navigation, the littoral States' control over the Strait of Malacca has
been effectively eroded, given the fact that Malaysia, Indonesia and Singapore had
ratified, and were bound by the convention. However, while foreign ships and air-
craft enjoy the right of transit passage through the straits, they must refrain from
any threat or use of force against the sovereignty, territorial integrity and political
independence of the States that border the strait. In particular, foreign ships and
aircraft are prohibited from taking any military or non-military posture that can be
construed by the littoral States as undermining their security. Hamzah elaborated
that such posture includes naval patrols and training flights by foreign forces which
are considered inconsistent with transit passage rights. Accordingly, both Malaysia
and Indonesia were right in opposing the US proposal to send troops to patrol the
Strait of Malacca. In short, in Hamzah's view, clearly there is no legal basis under
116
Yann-huei Song
international law, especially the 1982 LOS Convention, for a third party to conduct
enforcement action in strategic waterways, except when asked or permitted by the
States bordering the strait concerned. He also rebutted the argument that the lack
of effective enforcement capacity of the bordering States constitutes a justification
for foreign intervention in managing security matters in the Strait of Malacca.105
He said,
The idea of a maritime power putting undue pressure on the bordering countries to
allow their navy to patrol the Straits of Malacca is ludicrous even if the bordering states
had no adequate capabilities to undertake enforcement on their own. What is more, in
this case, when both Indonesia and Malaysia have adequate military capabilities to deal
effectively with the current level of maritime threats in the Straits of Malacca.106
Hamzah also questioned the real intention of the United States and Singapore in
introducing the idea of sending naval forces to patrol the Strait of Malacca under
RMSI, as he wrote: " [a] re the US and its ally looking for a new enemy in the region
using the Straits of Malacca as a pretext? Or, are we witnessing the unfolding of a
hidden agenda?"107
Mat Taib Yasin108 offered five reasons to explain why both Malaysia and Indo-
nesia rejected the US proposal of sending troops to help patrol the Malacca
strait.109 First, the two nations doubted the sincerity of the US offers. This doubt
centered around the question of why US assistance would come only in the form of
naval patrols since there are other ways and means to help the littoral States to en-
hance security in the strait. "Given that deployment of military forces is often con-
strued as symbols of intervention and aggression . . . the Littoral States should be
forgiven for harboring this doubt," he stated.110 The US proposal also reminded
Malaysia and Indonesia of the past history of colonialism. Second, Malaysia and
Indonesia opposed the US proposal because of the problem of legality. Under ex-
isting international law, in particular the 1982 LOS Convention, "there is no legal
rationale for foreign powers to patrol the Straits unless or until requested by Litto-
ral States."111 The third reason was the littoral States' fear of "loss of command and
control." As demonstrated in the past, once foreign powers are in the strait, it is dif-
ficult to persuade them to leave. Fourth, the littoral States were concerned that the
United States may resort to the use of excessive force as demonstrated in its global
war against terrorism. And finally, Malaysia and Indonesia were concerned about
the spillover effects of geopolitical rivalry between the major powers in the Strait of
Malacca, which includes the US strategy to contain China by controlling China's
access to the strait.112
117
Security in the Strait of Malacca and Regional Responses to the US Proposal
American Maritime Security Expert
Mark J. Valencia113 viewed the dispute over the legitimacy of the US-proposed
RMSI as a clash between the littoral States, which retain their sovereignty over the
Strait of Malacca under the legal regimes of innocent passage and transit passage,
and foreign maritime powers, which want passage of their naval and commercial
vessels in the strait to be absolutely guaranteed. As the number of pirate attacks and
the concern over the potential security threat posed by maritime terrorism in
Southeast Asia, and especially in the Strait of Malacca area, continued to grow, the
United States and other nations such as Japan and Australia began to advocate the
right to intervene in the management of the strait. The intention to intervene was
further reinforced by the worries that the littoral States — Malaysia and Indonesia —
either did not have the will or capability to fulfill their responsibility to protect the
strait. As a result, Singapore, the United States and other like-minded nations
claim that it is the responsibility of the "international community" to intervene.
However, Malaysia and Indonesia believed that the threat has been exaggerated for
the purpose of justifying international intervention. To avoid unilateral and pre-
emptive intervention led by the United States, the littoral States — Malaysia, Indo-
nesia and Singapore — should act proactively. The only defense of the littoral States
against the possibility of unilateral foreign intervention in the management of se-
curity matters in the Strait of Malacca is to agree to jointly patrol the strait and sup-
press piracy and the threat of terrorism there.114
Chinese Maritime Security Expert
Ji Guoxing115 pointed out that China was concerned that the US-proposed RMSI
will exceed transit passage rights and encroach upon the sovereignly and sovereign
rights of the littoral States, in contravention of the 1982 LOS Convention.116 Due to
its rapid economic growth, China relies more on maritime transportation and oil
imports, which makes it more important to ensure the security of SLOC. Around 60
percent of China's oil imports come from the Middle East and must go through the
Strait of Malacca. The strait has been closely linked with China's economic and energy
security. Accordingly, China is very much concerned about security in the Strait of
Malacca and who is in control of the strait. Ji Guoxing pointed out that it is doubt-
ful whether the US-proposed RMSI aims to block China's energy channel and to
contain China's economic development. China's policy is to support global anti-
terrorism efforts, support the idea of enhancing security in the Strait of Malacca
and participate in regional cooperation to guarantee SLOC security. It is also
China's hope that the United States and related nations could establish a terrorism
prevention mechanism in the strait through consultative cooperation under the
framework of the 1982 LOS Convention to safeguard the strait's security.117
118
Yann-huei Song
Littoral States' Responses to RMSI: July 2004 to June 2006
In response to the US-proposed anti-terrorism patrols in the Strait of Malacca un-
der RMSI, and perceiving a foreign intervention in the management of security
matters in the strait and a foreign military presence in the region to be a threat to
their sovereignty, Malaysia and Indonesia began to take domestic measures and
cooperate with Singapore to enhance security in the strait. In addition, they also
began to seek US and other user States' involvement in their efforts to enhance se-
curity in the Malacca strait, mainly by providing training, logistic support, patrol-
ling vessels, or technological and financial aids. International organizations, such
as the IMO, and regional cooperative mechanisms such as ARF and APEC, were
also called upon to provide help. The littoral States' political willingness to take
more effective actions to improve security in the strait was further motivated by a
decision of the Joint War Committee (JWC) of Lloyd's Market Association in June
2005, which declared the Strait of Malacca a "high-risk zone" and added it to its list
of areas which are at risk to war, strikes, terrorism and related perils.118 The littoral
States were very much concerned over the JWC decision, mainly because it could
result in higher insurance premiums for the ships that transit the strait or call at lit-
toral States' ports, which, in turn, would hurt their economy. While repeatedly
claiming that the JWC decision was not justified, the littoral States also realize that
unless more effective action was taken to improve safety and security in the Strait
of Malacca, the strait would not be removed from the JWC "high-risk zone" list. In
this section, the national responses of the three littoral States of the Malacca strait
to the US-proposed RMSI from July 2004 until June 2006 are examined.
Domestic Actions Taken by Littoral States to Combat Maritime Crimes
Indonesia
To improve its capacity to handle the security problems in the Strait of Malacca,
Indonesia formed Navy Control Command Centers (Puskodal) in Batam and
Belawan119 and set up six regencies at the immediate borders of the Strait of
Malacca and Strait of Singapore, namely, Rokan Hilir, Bengkalis, Siak, Palawan,
Indragiri Ilir and Karimun, which are believed the most vulnerable and dangerous
areas for pirate attacks.120 The main purpose of setting up these regencies was to in-
crease the people's welfare, alleviate poverty, and thus dissuade the local people
from engaging in piratical activities. Tens of regencies along the straits of Malacca
and Singapore and around the three chokepoints will be set up in the future.121 In
July 2005, an Indonesian maritime policy unit was established to help fight pirates
and maintain Malacca security.122
119
Security in the Strait of Malacca and Regional Responses to the US Proposal
In September 2005, Indonesia decided to install radars at nine locations along
the Strait of Malacca to strengthen security in the area and announced that the In-
tegrated Maritime Security System (IMSS) in the strait will soon be introduced.123
Given that most of the cases involving maritime crimes in Indonesia's conven-
tional courts often produce problematic verdicts, which do not have the required
deterrent effect, the government of Indonesia considered establishing maritime
courts to try criminals operating in Indonesian waters.124 Anti-piracy and anti-terror
exercises were also being held to enhance security in the Strait of Malacca. For in-
stance, in July 2005, the Indonesian Navy launched a three-month operation,
named Gurita (Octopus) in a bid to fight rampant pirate attacks in the strait125 and
in March 2006, an anti-terrorism drill was held in the Strait of Malacca.126
Malaysia
The government of Malaysia has also adopted a number of domestic measures to
deal with the maritime threat posed by piracy and armed robberies in the Strait of
Malacca. In fact, some of these measures had been implemented before RMSI was
announced in May 2004. For instance, in 2003, Malaysia erected a string of radar
tracking stations along the Strait of Malacca to monitor traffic and acquired new
patrol boats to combat piracy.127 In 2004, the Royal Malaysian Navy intensified its
training activities and patrols in the northern reaches of the Strait of Malacca be-
yond the one- fathom curve in an effort to combat piracy and maritime terror-
ism.128 In April 2005, it was reported that the Malaysian Maritime Enforcement
Agency (MMEA) would be formed to be responsible for patrols in the Strait of
Malacca.129 This new agency began patrolling the strait in December 2005. 13° Ma-
laysian maritime police were also asked to increase anti-piracy operations and to
help ensure the safety and security of the Strait of Malacca.131 In February 2006,
Malaysia announced its plan to step up anti-piracy patrols in the Strait of Malacca
by adding up to fifteen new high-speed police boats and conducting joint maritime
exercises with Indonesia, Thailand and Singapore.132
Singapore
When undertaking efforts to fight piracy and maritime terrorism, the government
of Singapore encounters a dilemma of conflicting interests between protecting its
shipping industries and stressing that maritime threats in the Strait of Malacca are
real and therefore asking the littoral States to adopt more cooperative law enforce-
ment measures to protect against pirate and maritime terrorist attacks. The basis
for the JWC to declare the strait a high-risk zone was the security assessment done
by its consultant, Aegis Defence Services. In August 2005, the JWC stated that the
Strait of Malacca would remain on the "high-risk zone" list "until it was clear that
120
Yann-huei Song
the measures planned by governments and other agencies in the area had been im-
plemented and were effective."133 While taking note of shipping industry concerns
over rising insurance costs, the government of Singapore has consistently empha-
sized the potential maritime security threat in the Strait of Malacca and asked co-
operation from the other two littoral States to enhance security in the strait. A
number of unilateral anti-piracy and anti- terrorism measures have also been taken
by Singapore, such as deploying a fleet of remote-controlled vessels,134 providing
two Fokker planes for joint Malacca strait patrols,135 deploying armed security teams
on board selected merchant vessels entering and leaving its territorial waters,136 and
laying high-tech sonar arrays on the seabed across the Malacca strait.137 More im-
portantly, Singapore has been very active in pressing Malaysia and Indonesia to
agree to a tripartite coordinated patrolling program in the strait and to the involve-
ment of other ARF members and user States in the management of security matters
in the Malacca strait.
In addition to the selected domestic anti-piracy and anti-terrorism measures as
mentioned above, Malaysia, Indonesia and Singapore have also cooperated closely
with the IMO by implementing amendments to Chapter XI-2 (Special Measures to
Enhance Maritime Security) of the International Convention for the Safety of Life
at Sea, in particular to the International Ships and Port Facility Security (ISPS)
Code and to the Automatic Identification System (AIS).138 Indonesia and Malaysia
also held a special meeting in Jakarta in September 2005 to enhance security in the
Strait of Malacca. Both joined the US Container Security Initiative, Indonesia in
March 2003 and Malaysia in March 2004.
Bilateral Cooperative Programs in the Strait of Malacca
Between Littoral States
In 1992, long before the announcement of the RMSI concept by the US Pacific
Command, Indonesia and Singapore agreed to establish a bilateral program to pa-
trol the Strait of Singapore, which involved the setting up of direct communication
links between the navies and the relevant agencies of the two littoral States. Coordi-
nated patrols under the program were carried out for three months in the strait.139
In May 2005, the navies of both Indonesia and Singapore launched Project
SURPIC, which is a sea surveillance system. Under the system, the two navies can
share a common real-time sea situation picture of the Singapore strait.140
Similarly, bilateral cooperative efforts had also been made by Indonesia and
Malaysia to help improve safety and security in the Strait of Malacca. In 1992, a
Maritime Operation Planning Team was established by the two nations to coordi-
nate their joint patrols in the strait, which are conducted four times a year and
121
Security in the Strait of Malacca and Regional Responses to the US Proposal
involve maritime institutions such as customs, search and rescue, and police.141 In-
donesia and Malaysia also carry out joint patrols in the Strait of Malacca under the
agreed Malindo program. In November 2005, Malaysia and Singapore conducted a
joint exercise, codename Ex Malapura, in the Malacca strait to promote security in
the area, which was the seventeenth joint exercise between the two navies.142 In April
2006, Malaysia and Indonesia held another joint aerial exercise, code-named Elang
Malindo XXII.143
Between Littoral States and User States
Bilateral cooperative programs or agreements have also been concluded between
the littoral States and user States of the Malacca strait, in particular, the United
States. In July 2005, as mentioned earlier, a strategic framework agreement for a
closer cooperation partnership in defense and security was signed between Singa-
pore and the United States, in which the two nations agreed to work toward en-
hanced cooperation in the areas of anti-WMD, anti-terrorism, search and rescue
and disaster management, intelligence exchange and defense technology.144 While
both Malaysia and Indonesia raised concerns over the US-Singapore Strategic
Framework Agreement, in particular their perception that a strong US military
presence in the region would constitute a potential threat to their sovereignty,145
they are willing to improve their military relations with the United States. In 2004
and 2005, Indonesia and the United States held the second and third security dia-
logue respectively, in which the two countries exchanged views on a wide range of
security and defense issues, including security in the Strait of Malacca.146 In May
2005, joint anti-terrorism exercises between the United States and Indonesia were
held at sea off Jakarta.147 At the end of 2005, the United States offered to help Indo-
nesia modernize its armed forces and provide technical assistance to support joint
security operations in the Strait of Malacca by Indonesia, Malaysia and Singapore.148
In January 2006, it was reported that Indonesia and the United States would re-
evaluate their security cooperation following the lifting of the US arms embargo in
November 2005, especially in dealing with terrorism and security in the Strait of
Malacca and in Southeast Asia.149 In the same month, the government of Indonesia
submitted its request to the United States for technical support in the form of ra-
dar, sensors and improved patrol boat capability to secure the Strait of Malacca.150
Indonesia's cooperation with the United States to fight terrorism and enhance se-
curity in the Malacca strait was also discussed during the visit of US secretary of
state Condoleezza Rice to Jakarta in mid-March 2006. 151 Later that same month,
Indonesia and the United States conducted a joint exercise on small craft
counterterrorism maritime interdiction techniques.152 During her visit to Indone-
sia in March 2006, Secretary Rice noted that maritime security is a top priority in
122
Yann-huei Song
Southeast Asia, and that the United States is working with Indonesia and others to
close the strait to drug smugglers and human traffickers, pirates and weapons
proliferators.153 $1 million in aid was allocated to Indonesia to help that nation im-
prove security in the Strait of Malacca, according to Admiral Fallon.154 In April
2006, it was reported that the United States would soon provide Indonesia with an
early warning system to support security maintenance in the Strait of Malacca. It
will be installed at several points along Indonesia's territory on the waterway and on
maritime patrol aircraft. In addition, the United States also promised to exchange in-
telligence information with the three littoral States on various matters relating to the
situation and condition of the Malacca strait.155 Indonesia also announced that dis-
cussions would be held with the United States at the fourth Indonesia-United States
Security Dialogue in Washington on April 23-30, 2006 on issues relating to the secu-
rity of the Strait of Malacca, anti-terrorism, bioterrorism and cyberterrorism, as well
as the security of Southeast Asia generally.156
While differences over the question of securing the Strait of Malacca and the
concern about an enhanced US military presence in the strait still exist, Malaysia
also moved to consider accepting help from the United States to strengthen secu-
rity in the strait through improved military relations between the two nations. In
May 2005, for instance, Malaysia's deputy prime minister and defence minister
Najib Razak discussed security in the Malacca strait with visiting US deputy secre-
tary of state Robert Zoellick. During the visit, the Acquisition and Cross-Servicing
Agreement (ACSA) was signed, which provides a framework for cooperation in
military logistic matters between the two nations.157 During his visit, Deputy Secre-
tary Zoellick stated that the United States respects the role of the littoral States as
the players with the responsibility for maritime security in the strait but at the same
time is exploring ways to help Malaysia and Indonesia develop their capacities to
deal with piracy and other crimes in the strait.158 In February 2006, Deputy Prime
Minister Najib Razak and Admiral Fallon held talks in Kuala Lumpur to discuss pi-
racy and potential terrorist threats in the Strait of Malacca and the waters of
Sabah.159 In early June 2006, Defense Secretary Rumsfeld urged increased ties be-
tween the militaries of the United States and Indonesia during his Jakarta visit. He
also discussed with Indonesian Defense Minister Juwono Sudarsono enhancing
cooperation between the two nations in the fight against terrorism and the threat
of piracy in the Strait of Malacca. They also discussed how the United States could
provide military equipment to Indonesia to enhance Indonesia's military capabil-
ity to eradicate piracy in the Malacca strait.160
In addition to the bilateral cooperation between the littoral States and the
United States, cooperation has also been developed between the littoral States and
other main user States of the Malacca strait, such as Japan. In March 2005, in
123
Security in the Strait of Malacca and Regional Responses to the US Proposal
response to a pirate attack against a Japanese-owned tugboat in the Strait of Malacca,
Japan advised the littoral States of the strait that it was ready to send patrol vessels
and aircraft to combat piracy. This offer was met with objections by both Malaysia
and Indonesia.161 In May 2005, Indonesia's navy chief of staff Admiral Slamet
Soebijanto said that Indonesia welcomed any assistance from foreign nations in se-
curing the Strait of Malacca, including from Japan, as long as it was not in the form
of military force. In response, Japan sent a team to Indonesia tasked with studying
what type of patrol ships Indonesia needed to deal with maritime crime in the
strait.162 In June 2005, during bilateral trade talks, Japan and Indonesia agreed to
strengthen their cooperation to enhance the safety of navigation in the Strait of
Malacca.163 In July of that year, Indonesia announced that four patrol boats pro-
vided by Japan would carry out patrolling missions in the Malacca strait. In addi-
tion, Japan donated US$50 million to Jakarta to help safeguard the waterways.164 It
was also reported in December 2005 that Japan and the three littoral States jointly
drew up electronic sea charts of the Straits of Malacca and Singapore to help pre-
vent accidents or piracy in the areas.165 In February 2006 the government of Japan
pledged again to grant technical aid consisting of detectors and patrol boats to pro-
tect the Malacca strait from possible terrorist attacks. Japan's Nippon Foundation
also announced its decision to donate a patrol training vessel to Malaysia as part of
ongoing efforts to reduce piracy and improve maritime security in the Strait of
Malacca.166 In June 2006, the Japanese government announced that it would do-
nate three patrol boats to Indonesia to help fight terrorism and piracy.167 In April
2006, Malaysian and Australian naval forces conducted a five-day exercise, code-
named Mastex, in the Malacca strait.168 In May 2006, Japan and Indonesia held in-
tensive talks on security in the Malacca strait.169
Tripartite Cooperative Patrolling Programs of the Littoral States
It seems safe to point out that the most important development in terms of en-
hancing security in the Strait of Malacca is the establishment of routine sea and air
patrols by the maritime security organizations of Indonesia, Malaysia and Singa-
pore. As stated earlier, the main motivations for reaching the tripartite cooperative
patrolling agreements among the three littoral States were the increasing demand
from the user States and the international community for more effective law en-
forcement measures to deal with the problem of piracy and possible maritime ter-
rorist attacks, the increasing concern of the littoral States over possible
intervention of foreign powers by sending their troops to the area and the decision
of Lloyd's JWC that declared the Strait of Malacca a war-risk area. In July 2004 In-
donesia, Malaysia and Singapore launched a coordinated patrol program, known
as the Malsindo Coordinated Patrol (MCP). Under the program, seven warships
124
Yann-huei Song
from Indonesia, five from Malaysia and five from Singapore are deployed to main-
tain security in the Strait of Malacca. However, it should be noted that the warships
of the participating nations are prohibited from carrying out patrolling activities in
another participating nation's territorial waters.170 In securing the Malacca strait
under the MCP, control points have been set up in Belawan and Batam (Indone-
sia), Lumut (Malaysia) and Changi (Singapore). Another control point, Phuket
(Thailand), will be set up when Thailand joins the "Eyes in the Sky" program.171
In addition to the tripartite coordinated sea patrol program, the three littoral
States also reached agreement to begin air patrols over the Malacca strait to curb
piracy and increase security in the strategic waterway under the "Eyes in the Sky"
program. The initiative for multinational maritime air patrols was proposed by
Malaysia's deputy prime minister and defence minister Najib Razak at the Shangri-
La Dialogue held in June 2005. 172 Under the "Eyes in the Sky" program, each litto-
ral State of the Malacca strait will provide two maritime aircraft per week to patrol
the strait. The aircraft will only patrol the waterway and will not be allowed to fly
over the land. While the maritime patrol aircraft would be allowed to fly above an-
other participating nation's waters in the strait, they must fly no less than three
nautical miles from that country's land. It was also agreed that each patrol aircraft
will have a Combined Maritime Patrol Team (CMPT) on board, consisting of a
military officer from each of the participating nations. The CMPT will establish a
comprehensive surface picture over the patrol area. During the initiative stage for
the implementation of the maritime air patrol program, only the three littoral
States and Thailand can participate. But the implementation of the second phase of
the "Eyes in the Sky" program could involve participation by extra-regional na-
tions, such as the United States, subject to the principle that the sovereignty of the
littoral States must be respected.173 Although the "Eyes in the Sky" program was
launched in September 2005, it was not until April 2006 that the three littoral States
signed an agreement on the formation of a joint coordinating committee on the
Malacca Straits Patrols (MSP) and Standard Operational Procedures on Coordi-
nated Patrols.174 Under the agreement, cross-border hot pursuit cannot be carried
out without prior arrangements between the littoral States. While Singapore and
Indonesia, as well as Malaysia and Indonesia, have bilateral agreements allowing
for cross-border hot pursuit, Singapore and Malaysia have no such agreement and
must seek permission before entering each other's territorial waters. It was pointed
out that the tripartite patrol agreement is an "open arrangement with opportuni-
ties for the international community to participate," but only with the consent of
Indonesia, Malaysia and Singapore.175 In June 2006, at the 5th Shangri-La Dia-
logue, held in Singapore, both India and Japan expressed their willingness to assist
the littoral States in patrolling the Strait of Malacca.176
125
Security in the Strait of Malacca and Regional Responses to the US Proposal
Regional Responses and Efforts in Helping Improve Security in
the Malacca Strait
Regional Maritime Security Discussion in the Shangri-La Dialogue
Maritime security in the Strait of Malacca has become one of the important issues
discussed at the Asian Security Conference, organized by the International Insti-
tute for Strategic Studies and dubbed the "Shangri-La Dialogue." At the 3rd
Shangri-La Dialogue, held in Singapore in June 2004, the US-proposed RMSI and
the concept of sending American troops to help patrol the Strait of Malacca were
heatedly discussed. Malaysia opposed strongly an enhanced US military presence
in defending the strait and Southeast Asia from terrorists but agreed to the princi-
ples of shared intelligence and blocking terrorists' financial and logistical networks.
US defense secretary Donald Rumsfeld, in his speech at the same meeting, de-
scribed the global war on terrorism as a battle against ideological extremism and
stressed the need to cooperate and share intelligence to fight terrorism effectively.
At the same time, he sought to ease fears among the Southeast Asian nations, par-
ticularly Malaysia and Indonesia, that RMSI might encroach on their sovereignty.
The secretary clarified that the initiative was still in its infancy and that " [a]ny im-
plications that it would impinge in any way on the territorial waters of some coun-
tries would be inaccurate."177
The American-proposed RMSI and the possible involvement of foreign powers
in the management of security in the Strait of Malacca were continuously discussed
at the 4th Shangri-La Dialogue in June 2005. At the conference, the participating
defense ministers agreed that regional maritime security, particularly in the Strait
of Malacca, was a matter of common concern in the region. A consensus was
reached based on three broad principles: ( 1 ) the littoral States must shoulder the
primary responsibility for the security of regional waterways, (2) the user States
and the international community have a significant role to play and (3) new coop-
erative measures should be forged in a manner that was respectful of sovereignty
and consistent with international law. Nations in the region recognized the need to
enhance practical forms of maritime security cooperation in accordance with these
principles.178 In June 2006, the participating defense ministers at the 5th Shangri-
La Dialogue discussed ways to advance maritime security cooperation. However,
the discussions were strictly off the record.179 It seems clear that both the littoral
States and user States (particularly the United States) of the Malacca strait are
adopting an approach of closed door consultations and collaboration to enhance
maritime security in the Strait of Malacca.
126
Yann-huei Song
Tripartite Ministerial Meeting of the Littoral States on the Malacca and
Singapore Straits
In August 2005, ministers of foreign affairs of the three littoral States met in Batam,
Indonesia to discuss matters relating to the safety of navigation, maritime security
and environmental protection in the straits of Malacca and Singapore.180 A Joint
Statement was issued after the meeting, in which the three nations reaffirmed their
sovereignty and sovereign rights over the Malacca and Singapore straits, which are
defined under the 1982 LOS Convention as straits used for international naviga-
tion. The ministers stressed that the main responsibility for the safety, security and
environmental protection in the straits lies with the littoral States. The ministers
emphasized that measures undertaken in the straits in the future should be in ac-
cordance with international law, including the 1982 LOS Convention. It is based
on this understanding that the three littoral States acknowledged the interest of
user States and relevant international agencies and the role they could play in respect
to the straits. Moreover, in recognition of the importance of engaging the States
bordering the funnels leading to the Malacca and Singapore straits and the major
users of the straits, the three littoral States supported continuing discussion on the
overall subject of maritime security in the Southeast Asia region within the frame-
work of ASEAN and ARF. They also acknowledged the good work carried out by
the Tripartite Technical Experts Group (TTEG) on Safety of Navigation in the straits
of Malacca and Singapore and recognized the efforts of the Revolving Fund Com-
mittee (RFC) in dealing with issues of environmental protection in the straits.181
The ministers recognized the importance of the Tripartite Ministerial Meeting
on the straits of Malacca and Singapore in providing the overall framework for co-
operation among them and supported the convening of the chiefs of defence forces
of Malaysia, Indonesia, Singapore and Thailand Informal Meeting in Kuala
Lumpur on August 1-2, 2005. More importantly, the ministers agreed to address
the issue of maritime security comprehensively, which includes trans-boundary
crimes such as piracy, armed robbery and terrorism. They also perceived the need
to address the issue of trafficking in persons, smuggling of people and weapons,
and other trans-boundary crimes through appropriate mechanisms. In recogni-
tion of the interest of others in maintaining the safety of navigation, maritime secu-
rity and environmental protection in the straits, the ministers welcomed the
assistance of the user States, relevant international agencies and the shipping com-
munity in the areas of capacity building, training and technology transfer, and
other forms of assistance, provided that the main responsibility of the littoral States
in managing the straits is respected and that the assistance is offered in accordance
with the 1982 LOS Convention. The ministers expressed their displeasure with the
decision of the Joint War Committee of Lloyd's Market Association that declared
127
Security in the Strait of Malacca and Regional Responses to the US Proposal
the straits of Malacca and Singapore a high-risk zone for piracy and terrorism with-
out consulting with the littoral States and taking into account the existing anti-piracy
and anti-terrorism measures undertaken by them. Finally, the ministers welcomed a
special meeting on enhancing safely, security and environmental protection in the
Malacca and Singapore straits to be held in Jakarta in September 2005. 182
IMO Jakarta Meeting on the Straits of Malacca and Singapore: Enhancing
Safety, Security and Environmental Protection
Due to a genuine concern over possible terrorist attacks in the Strait of Malacca,
the IMO Council decided in November 2004 to convene a high-level conference to
consider ways and means of enhancing safety, security and environmental protec-
tion in the straits.183 Accordingly, the IMO Jakarta Meeting on the Straits of
Malacca and Singapore: Enhancing Safety, Security and Environmental Protection
was held in September 2005. At the conference, Mr. Efthimios Mitropoulos, secretary-
general of the IMO, pointed out in his opening remarks that
[w]ith regard to the question of security versus sovereignty (or vice versa), while I can
understand and fully respect the sensitivity of any State over the issue, I also believe
that, whilst States have the right of non-interference in their internal affairs, they also
have concurrent responsibilities towards their own people, the international
community and their international engagements. Whatever the answer to this, there
can be no excuse for inactivity, whether the danger is clear and present or perceived as a
future possibility.184
Accordingly, the secretary-general called on the three littoral States bordering
the straits of Malacca and Singapore, user States of the straits, industry and all other
stakeholders to work together to produce an outcome conducive to building confi-
dence in any efforts undertaken jointly to enhance safety, security and environ-
mental protection in the straits. The secretary- general also made it clear that any
action undertaken in the future should be based on the consent, support and coop-
eration of the littoral States concerned, which should be invited to play a principal
role in all developments. In addition, any action undertaken must be consistent
with international law, including the relevant provisions of the 1982 LOS Conven-
tion.185 The meeting produced the Jakarta Statement,
which emphasizes the need to balance the interest of the littoral States and the user
States while respecting the littoral States' sovereignty, and to establish a mechanism to
facilitate cooperation between them to discuss issues relating to the safety, security and
environmental protection of the Straits of Malacca and Singapore, including exploring
possible options for burden sharing.186
128
Yann-huei Song
For the purpose of enhancing the safety, security and environmental protection
of the Malacca and Singapore straits, the thirty-four nations participating in the
meeting agreed
• that the work of the Tripartite Technical Experts Group (TTEG) on Safety of
Navigation in enhancing the safety of navigation and in protecting the marine
environment in the Straits, including the efforts of the TTEG in relation to the
implementation of Article 43 of the 1982 LOS Convention in the Straits, should
continue to be supported and encouraged;
• that a mechanism be established by the three littoral States to meet, on a
regular basis, with user States, the shipping industry and others with an interest in
safe navigation through the Straits, to discuss issues relating to the safety, security
and environmental protection of the Straits, as well as to facilitate cooperation in
keeping the Straits safe and open to navigation, including exploring the possible
options for burden sharing, and to keep the IMO informed, as appropriate, of the
outcome of such meetings;
• that efforts should be made through the three littoral States to establish and
enhance mechanisms for information exchange within and between States,
building, where possible, on existing arrangements, such as TTEG mechanisms,
so as to enhance maritime domain awareness in the Straits and thus contribute to
the enhancement of co-operative measures in the areas of safety, security and
environmental protection; and
• to promote, build upon and expand co-operative and operational
arrangements of the three littoral States, including the Tripartite Technical Expert
Group on Maritime Security, coordinated maritime patrols in the Straits through,
inter alia, maritime security training programs and other forms of cooperation,
such as maritime exercises, with a view to further strengthening capacity building
in the littoral States to address security threats to shipping.187
The IMO has also been invited to consider, in consultation with the littoral
States, convening a series of follow-on meetings for the littoral States to identify
and prioritize their needs, and for user States to identify possible assistance to re-
spond to those needs, which may include information exchange, capacity build-
ing, training and technical support, with a view to promote and coordinate
cooperative measures.188 A Memorandum of Understanding (MOU) by and
among the governments of the three littoral States and IMO for the implementa-
tion of a regional Marine Electronic Highway (MEH) demonstration project in
the straits of Malacca and Singapore (MEH MOU) and a Memorandum on Ar-
rangements by and among the three littoral States, IMO, International Hydro-
graphic Organization (IHO), International Association of Independent Tanker
129
Security in the Strait of Malacca and Regional Responses to the US Proposal
Owners (INTERTANKO) and International Chamber of Shipping (ICS) to imple-
ment specific activities of Article 4 of the MEH MOU were signed.189 Also at the
meeting, China, South Korea and Norway were encouraged to join Japan in mak-
ing financial contributions to the Malacca Straits Council. Over the past thirty-
five years or so, the Nippon Foundation of Japan had contributed more than
US$100 million to the council.190
Tokyo Ministerial Conference on International Transport Security
In January 2006, the Ministerial Conference on International Transport Security
was held in Tokyo, attended by the transport ministers of the G-8 members and
six Asian nations, namely, Australia, China, Indonesia, Malaysia, Singapore and
South Korea. The purpose of this conference was to discuss international trans-
port security issues. A ministerial declaration and three ministerial statements on
security in the international maritime transport sector, aviation security and land
transport security were adopted by the conference. The Ministerial Statement on
Security in the International Maritime Transport Sector stressed the importance
of ensuring continued compliance with the provisions of Chapter XI-2 of the 1974
International Convention for the Safety of Life at Sea (SOLAS Convention) and
the ISPS Code, which were adopted in December 2002 and entered into force in
July 2004. 191
The participants in the conference welcomed the adoption of the 2005 Proto-
col to the 1988 Convention for the Suppression of Unlawful Acts Against the
Safety of Maritime Navigation (SUA Convention), and the 2005 Protocol to the
1988 Protocol for the Suppression of Unlawful Acts against the Safety of Fixed
Platforms Located on the Continental Shelf. Among the unlawful acts covered by
the 1988 SUA Convention in Article 3 are the seizure of ships by force, acts of vio-
lence against persons on board ships and the placing of devices on board a ship
which are likely to destroy or damage it.192 In addition, the IMO was invited by the
transport ministers
[t]o consider, in cooperation with WCO [World Customs Organization], the
development and adoption, as necessary, of appropriate measures to enhance the
security of the maritime transport of containers in the international supply chain,
while respecting efficiency and international harmonization;
to undertake a study and make, as necessary, recommendations to enhance the security
of ships other than those already covered by SOLAS chapter XI-2 and the ISPS Code, in
an effort to protect them from becoming targets of acts of terrorism, piracy, or armed
robbery and to prevent them from being exploited or used as means for committing
such acts.193
130
Yann-huei Song
In May 2006, the IMO announced that parties to the SOLAS Convention had
given initial acceptance to new security measures, which require ships to be tracked
by satellite to fight terrorism and to prevent the introduction of WMD into the
supply chain. Under the new Long-Range Identification and Tracking (LRIT) reg-
ulation, which is expected to become effective in January 2008, merchant ships will
be required to transmit information about their identity, location and date and
time of their position through satellite-based technology.194 The new regulation on
LRIT is included in the 1974 SOLAS Convention's Chapter V on Safety of Naviga-
tion, through which LRIT is introduced as a mandatory requirement for passenger
ships, including high-speed craft and cargo ships of three-hundred gross tonnage
and upwards, as well as mobile offshore drilling units on international voyages.195
The Plan to Establish the ReCAAP Information Sharing Center
To help enhance safety and security in the Strait of Malacca, Japan launched an ini-
tiative in 2001, aiming to set up an anti-piracy cooperative framework among
ASEAN countries, China, Japan, South Korea, India, Sri Lanka and Bangladesh. As
a result, the Regional Cooperation Agreement on Combating Piracy and Armed
Robbery Against Ships in Asia (ReCAAP) was concluded in Tokyo in November
2004. 196 The agreement was opened for signature by Bangladesh, Brunei, Cambo-
dia, China, India, Indonesia, Japan, Laos, Malaysia, Myanmar, the Philippines,
South Korea, Sri Lanka, Thailand and Vietnam, and enters into force ninety days
after the date on which the tenth instrument of notification by a State mentioned
above, indicating the completion of its domestic requirements, is submitted to the
government of Singapore, the depository of the agreement.197 As of June 2006,
twelve nations198 had signed, and with the exception of Brunei, had ratified the
ReCAAP agreement, which entered into force on September 4, 2006. 199
A key pillar of the ReCAAP is the Information Sharing Center (ISC), which will
be established in accordance with Part II of the agreement. The ISC, located in Sin-
gapore, is an international organization with major functions of facilitating com-
munication and information exchanges between the member nations and
improving the quality of statistics and reports on piracy and armed robbery against
ships in the region. It was reported that one of the major reasons for the failure of
Malaysia and Indonesia to sign the agreement to date was their displeasure with the
decision to set up the ISC in Singapore. However, it should be noted that it was
mentioned in the Batam Agreement that Malaysia and Indonesia "take note of the
ISC, and agreed to cooperate with the center.200
131
Security in the Strait of Malacca and Regional Responses to the US Proposal
The Role of Existing Regional Mechanisms Promoting Maritime
Security Cooperation
ASEAN and ARF
Cooperative measures to deal with the problem of piracy and maritime security
threats among member States of the ASEAN201 and participating nations in the
ASEAN Regional Forum (ARF)202 had been sought long before the announcement
of RMSI by the US Pacific Command in May of 2004. As early as November 2001
ASEAN adopted a declaration on joint action to counter terrorism.203 In May 2002
a special ASEAN ministerial meeting on terrorism was held in Kuala Lumpur in
which a joint communique on terrorism and the Work Program to Implement the
ASEAN Action Plan to Combat Transnational Crimes were adopted.204 In August
2002, the United States and ASEAN, and in January 2003 the European Union and
ASEAN, issued joint declarations of cooperation to combat international terror-
ism.205 All member States of ASEAN, including the three littoral States of the
Strait of Malacca, were called upon to solidify governmental efforts in areas of in-
formation exchange, training, legislation, law enforcement, institution building
and extra-regional cooperation. In December 2003, the ASEAN-Japan Seminar
on Maritime Security and Combating Piracy was held in Tokyo. This was fol-
lowed by another ASEAN-US Workshop on Enhancing Maritime Anti-piracy
and Counter-terrorism Cooperation in the ASEAN Region held in Manila in
April 2004.206
On May 9, 2006, the first ASEAN defense ministers meeting was held in Kuala
Lumpur, at which the issues of human security and transnational crimes such as
terrorism, piracy, trafficking, smuggling and cooperation for disaster relief were
discussed. To deal with these issues, considered as ASEAN's immediate security
challenges, the ministers agreed
• to promote regional peace and stability through dialogue and cooperation
in defense and security;
• to give guidance to existing senior defense and military officials' dialogue
and cooperation in the field of defense and security within ASEAN and with
dialogue partners;
• to promote mutual trust and confidence through greater understanding of
defense policies and threat perceptions, security challenges as well as
enhancement of transparency and openness; and
• to contribute to the establishment of the ASEAN Security Community as
stipulated in the Bali Concord II and to promote the implementation of the
Vientiane Action Programme.207
132
Yann-huei Song
As far as efforts undertaken by the participating nations of ARF are concerned,
in June 2003 the Statement on Cooperation Against Piracy and Other Threats to
Maritime Safety was adopted at the tenth ARF meeting.208 In the statement, the
participating States and organizations recognized that "[pjiracy and armed rob-
bery against ships and the potential for terrorist attacks on vulnerable sea shipping
threaten the growth of the Asia-Pacific region, and disrupt the stability of global
commerce, particularly as these have become tools of transnational organized
crime."209 They also recognized that "[mjaritime security is an indispensable and
fundamental condition for the welfare and economic security of the ARF region"
and that a[e]nsuring this security is in the direct interest of all countries, and in
particular the ARF countries."210 They promised to achieve effective implementa-
tion of relevant international maritime instruments that aim to enhance the safety
and security of shipping and port operations. The relevant instruments include the
1982 LOS Convention, the 1988 SUA and its Protocol for the Suppression of Un-
lawful Acts Against the Safety of Fixed Platforms Located on the Continental Shelf,
the 1974 SOLAS Convention and the relevant amendments to that convention,
and the ISPS Code. ARF member nations are encouraged to become parties to the
relevant international maritime conventions, if they had not yet done so.211 At the
1 lth ARF meeting, held in July 2004, the participating ministers affirmed that "ter-
rorism, irrespective of its origins, motivations or objectives, constitutes a threat to
all peoples and countries, and to the common interest in ensuring peace, stability,
security and economic prosperity in the region and beyond."212 They also adopted
the ARF Statement on Strengthening Transport Security against International Ter-
rorism, which expressed the determination of the ARF participants to take con-
crete and cooperative measures in safeguarding their means of transportation from
terrorist threats.213
In September 2004 the ARF Workshop on Maritime Security was held in Kuala
Lumpur, Malaysia. During the discussion, the participants identified piracy, trans-
national organized crimes (such as smuggling) and terrorist activities as major
threats to maritime security.214 They concurred that there was no single nation that
could handle maritime security alone and therefore cooperation, based on inter-
national law, is a must to manage maritime security effectively. In the context of
the Malacca strait, the participants welcomed the coordinated sea patrols among
Indonesia, Malaysia and Singapore, and other bilateral cooperation with India, noting
that this was in line with the primary responsibility of the three littoral States of the
straits of Malacca and Singapore. They also noted that the proposed Maritime
Electronic Highway to be applied in the straits could enhance the transparency of
navigation and overall traffic control and also provide the basis for intensive moni-
toring of the real-time navigational situation.215 During the discussion on the way
133
Security in the Strait of Malacca and Regional Responses to the US Proposal
to enhance cooperation on maritime security, the participants recognized that col-
lective effort is vital to address maritime security threats. However, the collective
effort should be undertaken on the basis of mutual respect for sovereignty, territo-
rial integrity and in accordance with the UN Charter and other recognized interna-
tional law. The use of bilateral and regional agreements was believed to be a useful
method to enhance maritime security. It was also pointed out that there is need for
comprehensive action, including enhancing cooperation on fighting piracy and
armed robbery in the region between ARF participants' shipping and international
organizations. The meeting was divided into three breakout sessions to further
discuss the issue of maritime security. Breakout Session I (Managing Maritime
Challenges and Threats) highlighted the need to establish intergovernmental
agreements, such as standard operating procedures, and to develop a regional con-
tingency plan where and when possible and appropriate.216 Breakout Session III
(Enhancing Cooperation on Maritime Security) identified four areas for enhanc-
ing cooperation on maritime security, namely, cooperative frameworks; common
understanding of threats; information exchange mechanisms, policies and proce-
dures; and national capacities.217
In March 2005 Singapore and the United States co-hosted a meeting on an ARF
Confidence Building Measure (CBM) on Regional Cooperation in Maritime Secu-
rity in Singapore. In his speech at the meeting, Singapore's Defence Minister Teo
Chee Hean urged that "[i]t would be useful for the ARF to move beyond dialogue
on maritime security and work towards conducting an ARF maritime security ex-
ercise in the near future."218 During the discussion at the meeting, some partici-
pants suggested that maritime security cooperation in the region should be
formulated in accordance with the following three broad principles: (1) the pri-
mary responsibility for the safety and security of key waterways like the Malacca
and Singapore straits should lay with the littoral States; (2) due to the multiplicity
of stakeholders, and the complexity of the task at hand, there should be a role for all
stakeholders, including interested nations, international organizations like the
IMO, the shipping community and even multinational organizations; and (3) the
cooperative effort should proceed on the basis of consultation and in accordance
with international law.219 Meeting participants agreed that ARF should play an im-
portant role in forging regional cooperation in maritime security, given that its wide
membership encompasses the key stakeholders in regional maritime security.220 In
July 2005, at the 12th ARF meeting, the participating ministers welcomed ARF's sus-
tained efforts in promoting maritime safety and security and noted the following
four areas for future cooperation: multilateral cooperation, operational solutions to
maritime safety and security, shipping and port security, and application of tech-
nology for maritime safety and security.221 They also adopted the ARF Statement
134
Yann-huei Song
on Information Sharing and Intelligence Exchange and Document Integrity and
Security in Enhancing Cooperation to Combat Terrorism and Other Transna-
tional Crimes.222 The establishment of a Regional Marine Training Centre had also
been discussed at the ARF workshops and the ARF Senior Officers Meeting.223
Council for Security Cooperation in the Asia Pacific
The Council for Security Cooperation in the Asia Pacific (CSCAP) was established
at a meeting in Kuala Lumpur in June 1993.224 The CSCAP Charter was adopted in
December 1993 and was subsequently amended in August 1995.225 The purpose of
setting up the CSCAP was to provide a structured process for regional confidence
building and security cooperation among nations and territories in the Asia- Pacific
region. Working groups are the primary mechanism for CSCAP activity. Four
working groups were established in 1993-94. These were concerned with (1) mari-
time cooperation, (2) the enhancement of security cooperation in the North Pacific/
Northeast Asia, (3) confidence- and security-building measures, and (4) coopera-
tive and comprehensive security. In December 2004, a restructuring of the CSCAP
working groups was undertaken to better reflect changes taking place in the strate-
gic environment in the region. Consequently, the four CSCAP working groups are
no longer active. Instead, six study groups were established: ( 1 ) Capacity-building
for Maritime Security Cooperation in the Asia Pacific, (2) Countering the Prolifer-
ation of WMD in the Asia Pacific, (3) Future Prospects for Multilateral Security
Frameworks in Northeast Asia, (4) Human Trafficking, (5) Regional Peacekeeping
and Peacebuilding, and (6) Enhancing the Effectiveness of the Campaign Against
International Terrorism with Specific Reference to the Asia Pacific Region. These
study groups were to complete their functions in December 2006. CSCAP held
general meetings before 2003 on a regular basis in accordance with its charter. In
December 2002, it was decided to change the term "General Meeting" to "General
Conference." The first CSCAP General Conference was held in December 2003,
but was referred to as the 4th CSCAP General Conference. The 5th CSCAP General
Conference was held in December 2005.
A number of non-binding documents had previously been adopted at different
CSCAP working group meetings to address the issues concerning maritime safety
and shipping security before the September 11th terrorist attacks in the United
States.226 CSCAP Memorandum No. 1, for example, encourages CSCAP members
to undertake "[cooperative efforts to ensure the security of sea-lanes and sea lines
of communication, with the enhancement of capabilities and maritime surveil-
lance, safety, and search rescue operations."227 Paragraph 3 of CSCAP Memoran-
dum No. 4 encourages member nations to become parties to the 1982 LOS Con-
vention and other relevant international instruments, recognizing that this will
135
Security in the Strait of Malacca and Regional Responses to the US Proposal
contribute to the strengthening of peace, security, cooperation, sustainable devel-
opment and friendly relations in the Asia-Pacific region. Paragraph 15 of the same
Memorandum encourages CSCAP member nations to consult with regard to the
ratification, implementation and participation in relevant international conven-
tions and instruments concerning maritime safety. CSCAP Memorandum No. 5
urges member nations to adopt measures that would promote law and order at sea
and reduce the incidence of maritime crime, which includes piracy and maritime
terrorism.
Since the September 11th terrorist attacks, CSCAP Memorandums No. 6 and
No. 7 were adopted in December 2002 and July 2003 respectively,228 and a "Report
on International Terrorism" was issued in March 2002 after the CSCAP Study
Group Meeting held in Kuala Lumpur, Malaysia in February 2002. CSCAP Mem-
orandum No. 7 recognizes the importance of the concept of human security and
encourages CSCAP member nations to, inter alia, endorse and implement rele-
vant UN conventions and protocols, and supporting regional agreements, against
terrorism and transnational crimes. The Report on International Terrorism
identifies the elements of a comprehensive strategy to combat terrorism in the
Asia-Pacific region. It urges CSCAP working groups to coordinate their research
agendas in order to advance collective efforts in combating international terror-
ism. CSCAP member nations are encouraged to ratify the various UN conven-
tions in relation to transnational crimes and related issues, adopt the UN resolu-
tion on terrorism and implement international and regional resolutions on
transnational crimes and terrorism. In addition, it is stated in the report that the
CSCAP Working Group on Maritime Cooperation will continue to examine the
following issues: ( 1 ) the vulnerability of naval and commercial shipping, off-
shore platforms, ports and harbors and coastal settlements to terrorist attack;
(2) the threat of maritime terrorism generally, including the use of ships as ve-
hicles for conducting terrorist attacks; and (3) the potential for reducing vulner-
abilities and countering the threat from maritime terrorist attacks.229
At the 5th CSCAP General Conference, emerging security challenges in the
Asia-Pacific region were widely discussed, which included terrorism, human traf-
ficking, the development of WMD, maritime security threats, natural disasters and
the recent threat of infectious diseases in the region. Maritime security is one of the
seven topics chosen to be discussed at the conference. In addition, one of the spe-
cial speeches delivered at the meeting was on the Indonesian perspective of security
in the Strait of Malacca. During the discussion, there were common concerns
among Indonesia and other States which are also stakeholders in the security of the
Strait of Malacca, which included the safety of navigation, the protection of the
marine environment, the need to cooperate on search and rescue, contingency
136
Yann-huei Song
plans against pollution, elimination of piracy and armed robberies, and preventing
maritime terrorism. Based on experience over the last three decades, it was the In-
donesian view that
• the problems of the Straits of Malacca and Singapore could be solved
through practical/technical mechanisms and cooperation;
• cost and burden sharing in promoting safety and security of navigation are
possible with the cooperation of Japan, and are increasingly necessary and
essential;
• user States should voluntarily cooperate with the coastal nations to promote
the safety of navigation and to protect the marine environment in the straits, as
well as in law enforcement activities;
• what is needed now is a more authoritative and permanent institution to
follow up on previous measures; and
• while cooperation and assistance from user States are needed and required
under the 1982 LOS Convention, there are certain situations with which
Indonesia would not be comfortable, such as the stationing or hiring of foreign
navies or marines, arming commercial vessels with offensive weapons, and joint
patrols of foreign navies in the straits.230
During discussion after the speech, the debate about the relationship between
piracy and terrorism was raised. There was also a discussion on sovereignty, espe-
cially linking issues such as the resistance towards foreign navies, and also relations
with user States.231
APEC
In October 2001, APEC leaders meeting in Shanghai signed a statement on
counterterrorism in which they pledged to cooperate fully, through close commu-
nication and cooperation among economic policy and financial authorities, to en-
sure that international terrorism does not disrupt economies and markets.232 In
October 2002, APEC leaders in Los Cabos, Mexico issued a Statement on Recent
Acts of Terrorism in APEC Members Economies, in which they condemned ter-
rorist acts in the APEC region, including those that occurred in Bali, in the Philip-
pines and in Moscow earlier that month. They also encouraged joint efforts of
APEC economies in mitigating the adverse impact of terrorist attacks in the af-
fected economies and called for strengthened international cooperation to support
efforts to eliminate terrorism and restore confidence in the region.233
In the Statement on Fighting Terrorism and Promoting Growth, adopted on
October 26, 2002, APEC leaders declared their intention to work together to secure
137
Security in the Strait of Malacca and Regional Responses to the US Proposal
the flow of goods and people through measures to, inter alia, promote ship and
port security plans, install automatic identification systems on certain ships, and
enhance cooperation on righting piracy in the region between APEC fora and orga-
nizations such as the International Maritime Bureau Piracy Reporting Center and
the IMO. The Secure Trade in the APEC Region (STAR) program aims to increase
container and port security and to develop mechanisms to track shipments more
effectively throughout the supply chain. In addition, APEC countries are asked to
ratify the International Convention for the Suppression of the Financing of Terror-
ism, and to implement quickly and decisively all measures needed to prevent ter-
rorists and their supporters from accessing the international financial system, as
called for in UN Security Council Resolutions 1373 and 1390.234 At the APEC
STAR III Conference,235 held in Incheon, Korea, February 25-26, 2005, Maritime
Security Panel 3 discussions explored possible means of cooperation among APEC
economies and relevant international organizations in protecting key APEC sea
lanes such as the straits of Malacca and Singapore from terrorist attacks and acts of
piracy, and provided suggestions in relation to trade implications from an APEC-
specific perspective. It was concluded that
• APEC should provide proactive law enforcement support in the search for a
long-term solution to deal with maritime security,
• various levels of cooperation are required,
• APEC economies should endeavor to share information and intelligence,
and
• an "Assistance Fund" that brings all stakeholders together would be
helpful.236
The Western Pacific Naval Symposium and the Five Power Defence
Arrangement
The basic structure of the Western Pacific Naval Symposium (WPNS)237 and the
Five Power Defence Arrangement (FPDA),238 with their traditional focus on mili-
tary security, precluded dealing with non-conventional security threats, such as piracy
and maritime terrorism. However, in response to the changing regional maritime
security environment, both WPNS and FPDA felt the need to reconsider the focus
of some of their activities. In June 2004, Malaysia's deputy prime minister Najib
Razak stated that for the FPDA to stay relevant, it has to be "reconfigured" to deal
with new threats in the form of terrorism. Australian defence minister Robert Hill
also agreed that the FPDA should extend the scope of its activities to include
counterterrorism training.239 At the 3rd Shangri-La Dialogue, held in Singapore in
June 2004, the need to expand beyond traditional territorial threats to deal with
138
Yann-huei Song
non-conventional security threats such as maritime terrorism was recognized. It
was believed that maritime security exercises could soon be commonplace among
the FPDA armed forces.240 As a result, in September 2005 the five powers held a
joint naval exercise in the waters off Malaysia and Singapore that was designed to
tackle terrorism rather than wage conventional war. The exercise reflected the
growing concerns in Southeast Asia and, in particular, the Strait of Malacca over
the problem of piracy and terrorist attacks.241 In March 2006 it was proposed that
Australia, Britain and New Zealand, the three non-littoral member States of the
FPDA, be invited to join the "Eyes in the Sky" program as long as the sovereignty of
the littoral States of the Malacca strait is respected.242
The WPNS is also slowly adapting to the new maritime security environment in
the Asia-Pacific region, in particular dealing with the threat of piracy, sea robbery
and maritime terrorist attack. To adjust its focus of activities, the WPNS may need
to consider how the maritime security environment is changing and how to engage
with coast guards so that regional maritime security issues can be effectively ad-
dressed.243 More importantly, the WPNS might be selected by the US Pacific Com-
mand as an alternative regional forum to discuss maritime security issues.244
Possible adjustments were to be addressed by the WPNS in WPNS Workshop 2006
and in the 10th WPNS to be held in Hawaii June 25-29 and October 29 to Novem-
ber 2, 2006, respectively.
Positive Results from Littoral States' Responses to the US-Proposed RMSI
Within such a short period of time, about three years since May 2004 until today, secu-
rity in the Strait of Malacca has been improved significantly mainly because of the
cooperative efforts undertaken by the littoral States in response to the US-pro-
posed RMSI and the likelihood of American unilateral deployment of its forces to
help patrol the strait, and also in response to the decision by the British-based Joint
War Committee of Lloyd's Market Association to put the strait on its list of war-risk
areas in June 2005. According to the figures released by the 1MB in its 2005 Annual
Report on Piracy Against Ships, the number of pirate attacks in the Malacca strait
dropped from thirty-eight in 2004 to only twelve attacks in 2005. 245 There were no
reported pirate attacks in the Strait of Malacca from January 1 to March 31, 2006,
compared with eight in 2004 and four in 2005. 246 "Action by law enforcement agen-
cies, notably in Indonesia and the Malacca strait, has continued to be effective" and
"Indonesia in particular, has increased its efforts to defeat piracy by way of a show of
force in known (pirate) hotspots," said the 1MB in April 2006.247
In addition to the Malsindo joint sea patrols and the "Eyes in the Sky" joint air pa-
trols, launched by Indonesia, Malaysia and Singapore in July 2004 and in September
139
Security in the Strait of Malacca and Regional Responses to the US Proposal
2005, respectively, a number of domestic anti-piracy and anti-terrorism measures
and bilateral cooperative programs have also been developed to safeguard the
Strait of Malacca. New national organizations or units such as Malaysia's Maritime
Enforcement Agency (MMEA) and Singapore's Accompanying Sea Security Team
(ASSeT) were established to be responsible for maritime security matters. The
ReCAAP Information Network System was launched in April 2006 and the
ReCAAP Information Sharing Centre was to be established after the entrance into
force of the ReCAAP Agreement. Moreover, bilateral cooperation between the lit-
toral States and user States, in particular, the United States, Japan and India, has
been strengthened to help improve maritime security in the Strait of Malacca and
in Southeast Asia. The littoral States, especially Indonesia, have received the offer
by user States of technical aids, patrol training and equipment. It is expected that
the littoral States will receive more financial and technical assistance from the user
States, including China and South Korea in the future. At the same time, it has been
reiterated that the sovereignty of the littoral States will be respected. Regional and
international concerns over safety and security in the Strait of Malacca will con-
tinue to serve as an important external policy factor in the process of enhancing se-
curity in the strait and in the region. Continued discussions on the issue of
enhancing maritime security in the Strait of Malacca under the IMO framework
and in the existing regional security organizations, such as ASEAN, ARF, CSCAP,
APEC, FPDA, WPNS and the Shangri-La Dialogue, are anticipated.
Challenges Ahead for the Management of Security in the Malacca Strait
Notwithstanding the many positive developments in relation to the management
of security in the Strait of Malacca since June 2004, there are challenges lying ahead
for both littoral and user States. One of the challenges is to petition the Joint War
Committee to remove the Strait of Malacca from its list of war-risk areas. The ship-
ping industries of the three littoral States of the strait have been asking the Com-
mittee to change its risk assessment, but without avail. Unless the littoral States are
able to prove the effectiveness of their coordinated patrolling programs, it is likely
that the strait will remain on the list.
The effectiveness of the tripartite coordinated air and sea patrolling programs
agreed to by the three littoral States has also been questioned. A Singaporean mari-
time security analyst listed three limitations to the effectiveness of the cooperative
programs: ( 1 ) the nations view independence and sovereignty very strongly and
therefore generally are reluctant to agree to participate more actively in coopera-
tive activities; (2) there is a gap between the nations with regard to law enforcement
capacities; and (3) there exists political suspicion among them, in addition to the
140
Yann-huei Song
lack of political frameworks that could facilitate more cooperative maritime secu-
rity efforts. Ironing out their differences over the seriousness of the maritime secu-
rity threats and the possible association between piracy and maritime terrorism in
the Strait of Malacca and in Southeast Asia will be a challenge to the littoral States.
It has been pointed out that the law enforcement capacities of Malaysia and Sin-
gapore are good, but Indonesia's difficult resource problems need to be resolved if
piracy and possible maritime terrorist attacks are to be dealt with effectively. It re-
mains to be seen to what extent and how soon these problems can be resolved, either
by significant investment provided by the littoral States themselves or by financial
and technical aid from user States, such as the United States, Japan and India now,
as well as Australia, China and South Korea in the future. The development of a
closer strategic and military cooperation between the littoral States and foreign
powers, in particular, the United States, could help justify the decision to offer
more assistance to help the littoral States enhance their maritime security capabili-
ties. The United States and Indonesia have resumed military ties, but progress to-
wards greater accountability and complete military reform in Indonesia remains to
be seen. The governments of Indonesia and Malaysia could reconsider their posi-
tion on the PSI, such as by partially or selectively participating in the PSI activities.
A positive development in this regard is the announcement made by the US gov-
ernment that it "stand [s] ready to help Indonesia and Malaysia, Singapore and
Thailand to secure the Straits of Malacca."248 In addition, the signing of the Strate-
gic Framework Agreement between the United States and Singapore in July 2005
could be welcomed by the other two littoral States as a positive development help-
ful to the enhancement of maritime security in the Strait of Malacca in particular
and in Southeast Asia in general.
Another challenge to the effective management of security in the Strait of
Malacca is how to find an acceptable approach that can compromise between the
littoral States' sovereign concerns and the user States' demand for a more direct in-
volvement in security matters in the strait. This requires that both sides reach
agreement on establishing a burden-sharing mechanism or a multilateral/interna-
tional cooperative security mechanism in the Strait of Malacca area. To help estab-
lish a burden-sharing mechanism, there is a need to amend Article 43 of the 1982
LOS Convention for the purpose of expanding the scope of burden sharing to in-
clude those costs associated with the management of security in the Strait of
Malacca. The early establishment of a regional marine training center or a piracy/
terrorism information sharing center would be seen as another important test of
the political will of the littoral States and the concerned nations in the region to en-
hance security in the Strait of Malacca and in Southeast Asia.
141
Security in the Strait of Malacca and Regional Responses to the US Proposal
Finally, it would be important for the littoral States to become contracting par-
ties to the IMO's 1988 SUA Convention, the 2005 Protocol to the 1988 SUA Con-
vention, and the 2004 ReCAAP agreement. At present, among the littoral States of
the Malacca strait, only Singapore has ratified the 1988 SUA Convention and the
ReCAAP agreement. It remains a challenge to have both Indonesia and Malaysia
ratify the aforementioned maritime security-related international treaties.
Conclusion
Under the pressure spreading outwards from the United States, in particular
through the proposal of RMSI and the consideration of deploying forces to deal
with potential maritime security threats in the Strait of Malacca and Southeast
Asia, the three littoral States — Indonesia, Malaysia and Singapore — were forced to
adopt additional domestic anti-piracy and anti-terrorism measures and to develop
tripartite coordinated sea and air patrol programs to improve security in the strait.
New governmental agencies or units, such as the Malaysian Maritime Enforcement
Agency, the Singaporean Accompanying Sea Security Team, and the Indonesian
Maritime Policy Unit, have been formed to be responsible for managing security in
the strait. More patrol boats have been acquired and new monitoring systems have
been set up to help strengthen the littoral States' control over traffic in the strait. Bi-
lateral cooperative programs have also been developed between the littoral States
themselves and between the littoral States and user States, such as the United
States, Japan and India, and perhaps in the future with China, South Korea and
other nations, to keep the region's important waterways safe.
A number of important political statements, such as the Batam Agreement, the
Jakarta Agreement of 2005 and the first ASEAN Defence Ministers' Statement of
May 2006 have been adopted or issued, in which both littoral and user States are
urged to take more cooperative actions to help enhance security in the Malacca
strait. It seems that a more effective, collaborative approach to deal with the mari-
time security matters in the Malacca strait and in Southeast Asia has been devel-
oped since the first half of 2004. It is believed that this development will benefit the
international maritime community and, in particular, the shipping industries that
rely heavily on safe navigation of the Strait of Malacca. However, piracy and mari-
time terrorism and other transnational crimes in the strait and in Southeast Asia
are likely to remain a major maritime security concern for governments and ship-
ping industries for some years to come.
To deal effectively with maritime security threats in the Strait of Malacca, a
number of challenges need to be overcome. These include the effectiveness of the
implementation of the agreed tripartite coordinated sea and air patrols programs,
142
Yann-huei Song
and the littoral States' ratification of the maritime security-related international
conventions, in particular, the 2004 ReCAAP agreement, the 1988 SUA Conven-
tion and the 2005 protocol to the 1988 SUA Convention. There is also a need to es-
tablish a burden-sharing agreement that is acceptable to both the littoral and user
States. But the challenge to be overcome as soon as possible is to have Lloyd's Joint
War Committee remove the Strait of Malacca from its list of war-risk areas.
Notes
1 . Other maritime security programs and initiatives include the Advance Electronic Cargo
Information (24-Hour Rule), Container Security Initiative (CSI), Megaports Initiative, Trans-
shipment Country Export Control Initiative (TECI), Proliferation Security Initiative (PSI),
Maritime Transportation Security Act (MTSA), the International Ship and Port Facility Security
(ISPS) Code, International Port Security Program (IPSP), Customs-Trade Partnership Against
Terrorism (C-TPAT), US Coast Guard International Training Programs, Smart Box Initiative,
96-Hour Advance Notice of Arrival, Advance Passenger Information System Rule (APIS), the
National Plan to Achieve Maritime Domain Awareness, the Global Maritime Intelligence Inte-
gration Plan, the Maritime Operation Threat Response Plan, the International Outreach and
Coordination Strategy, the Maritime Infrastructure Recovery Plan, Maritime Transportation
System Security Recommendations, the Maritime Commerce Security Plan and the Domestic
Outreach Plan. See US Department of State, International Outreach and Coordination Strategy
for the National Strategy for Maritime Security (2005), available at http://www.dhs.gov/
xlibrary/assets/HSPDJOCPlan.pdf.
2. For the principal threats to US maritime security, see US Department of Homeland Se-
curity & US Department of Defense, The National Strategy for Maritime Security 3-6 (2005),
available at http://www.whitehouse.gov/homeland/4844-nsms.pdf.
3. International Outreach and Coordination Strategy for the National Strategy for Mari-
time Security, supra note 1, app. B, at 4.
4. Strait of Malacca, Wikipedia, the Free Encyclopedia, http://en.wikipedia.org/wiki/
Strait_of_Malacca (last visited Mar. 27, 2007); C. S. Kuppuswamy, Straits of Malacca: Security
Implications, Paper No. 1033, South Asia Analysis Group (SAAG), June 18, 2004, http://
www.saag.org/papersll/paperl033.html.
5. Gal Laft & Anne Korin, Terrorism Goes to Sea, FOREIGN AFFAIRS, Nov.-Dec. 2004, at 67.
6. Id.
7. Henry J. Kenny, China and the Competition for Oil and Gas in Asia, ASIA-PACIFIC RE-
VIEW, Nov. 2004, at 41.
8. The 1982 LOS Convention opened for signature on December 10, 1982 and entered into
force on November 16, 1994. For the text, see UN Doc. A/Conf.62/122, Oct. 7, 1982, reprinted in
21 INTERNATIONAL LEGAL MATERIALS 1261-1354 (Nov. 1982). As of April 28, 2006, the Con-
vention had 149 contracting parties. For the status of the Convention visit the website of the
United Nations' Division for Ocean Affairs and the Law of the Sea, http://www.un.org/Depts/
los/reference_files/status2006.pdf.
9. Thomas Orszag-Land, UN Launches Global Initiative to Defend Malacca Straits, JANE'S
TERRORISM & SECURITY MONITOR, Jan. 19, 2005, http://www.janes.com/security/international
_security/news/jtsm/jtsm050125_l_n.shtml.
143
Security in the Strait of Malacca and Regional Responses to the US Proposal
10. Malaysia to Boost Malacca Straits Security with 24-Hour Radar System — Report, AFX IN-
TERNATIONAL FOCUS, Mar. 18, 2005, http://www.mpsint.com/newsletter/archives/_2005/
03182005.html#0003.
11. Thailand to Join Malacca Strait Security System, THAI PRESS REPORTS, Apr. 22, 2006,
http://www.thaivisa.com/forum/index.php?showtopic=668748cmode=threaded.
12. President of the United States, The National Security Strategy of the United States of
America (2002), available at http://www.whitehouse.gov/nsc/nss.pdf; President of the United
States, National Strategy to Combat Weapons of Mass Destruction (2002), available at http://
www.whitehouse.gov/news/releases/2002/ 1 2/WMDStrategy.pdf.
13. Ilan Berman, The Bush Strategy at War, NATIONAL INTEREST, Winter 2003/2004, at 51.
14. The term "maritime domain" was defined in the 2004 National Security Presidential Di-
rective NSPD-41 /Homeland Security Presidential Directive HSPD-13 as "all areas and things of,
on, under, relating to, adjacent to, or bordering on a sea, ocean, or other navigable waterway, in-
cluding all maritime-related activities, infrastructure, people, cargo, and vessels and other con-
veyances." NSPD-41/HSPD-13 is available at http://www.fas.org/irp/offdocs/nspd/nspd41.pdf.
15. USS Cole Bombing, Wikipedia, the Free Encyclopedia, http://en.wikipedia.org/wiki/
USS_Cole_bonibing.
16. Prabhu Chawla, Indo-US Military Alliance: Falling Back On India, INDIA TODAY, Nov.
19, 2001, at 24; India Plays Water Cop in Malacca with US, INDIAN EXPRESS, Apr. 19, 2002.
17. See Ali M. Koknar, Terror on the High Seas, SECURITY MANAGEMENT ONLINE, June 2004,
http://www.securitymanagement.com/library/001617.html; The Sinister Strait — The Next Target
for Terrorism and US Intervention, JANE'S FOREIGN REPORT, July 1, 2004, http://www.janes.com/
security/international_security/news/fr/fr040630_l_n.shtml; Briefings, Malaysia's Terrorism
Dilemma, JANE'S INTELLIGENCE DIGEST, June 18, 2004, http://jid.janes.com/docs/jid/search.jsp
(then search for "Malaysia's Terrorism Dilemma"); Catherine Zara Raymond, How Real is the
Threat From Maritime Terrorism? THE POWER AND INTEREST NEWS REPORT (PINR), Dec. 12,
2005, http://www.pinr.com/report.php?ac=view_report&report_id=4108danguage_id=l; Next
for Terrorists: Seaborne Attacks, WORLDNETDAILY.COM, Mar. 18, 2005, http://www
.worldnetdaily.com/news/article.asp?ARTICLE_ID=43358.
1 8. Ellen Nakashima & Alan Sipress, Singapore Announces Arrest of 21 Militants, WASHING-
TON POST, Sept. 17, 2002, at A14.
19. Catherine Zara Raymond, The Malacca Straits and the Threat of Maritime Terrorism,
The Power and Interest News Report (PINR), Aug. 24, 2005, http://www.pinr.com/report
.php?ac=view_report&report_id=3528danguage_id= 1 .
20. Jack Plaxe, International Maritime Terror and Security, JOURNAL OF
COUNTERTERRORISM & HOMELAND SECURITY INTERNATIONAL, Fall 2004, at 16, 17.
21. Peril on the Sea, THE ECONOMIST (US Edition), Oct. 4, 2003; Christopher Myrick, Piracy
Doubts Over Attacks on Chem. Ships in Malacca Straits, CHEMICAL NEWS & INTELLIGENCE, Mar.
27, 2003.
22. John S. Burnett, The Next 9/1 1 Could Happen at Sea, NEW YORK TIMES, Feb. 22, 2005, at
A17, available at http://www.nytimes.com/2005/02/22/opinion/22burnett.html?ex= 12668 14800&en
=94f6daa54bb 1 803c&ei=5090&partner=rssuserland.
23. Philippines Charges Six Al-Qaeda- Linked Militants for Ferry Bombing, AGENCE FRANCE-
PRESSE, Oct. 11, 2004; Bong Reblando, Task Force Aboard Ship Holds Man Suspected as Terrorist,
MANILA BULLETIN, Mar. 12, 2004.
24. Richard Scott, Increased Piracy Makes High Seas More Dangerous, JANE'S DEFENCE
WEEKLY, Mar. 31, 2004, at 24; Richard Scott, Piracy— Scourge of the Seas, JANE'S DEFENCE
WEEKLY, May 11, 2005, at 20.
144
Yann-huei Song
25. Niall Chorney, Japan Urges Increased Protection in Malacca Strait, JANES.COM, Jan. 21,
2005, http://www2.janes.com/index.html (search by article title then follow hyperlink).
26. Details of the missions and area of responsibility of the US Pacific Command are avail-
able at http://www.pacom.mil/about/pacom.shtml (last visited Mar. 28, 2007).
27. Admiral Thomas B. Fargo, US Navy, Commander, US Pacific Command, Testimony be-
fore the House Armed Services Committee, United States House of Representatives, Mar. 3 1 , 2004,
available at http://www.pacom.mil/speeches/sst2004/04033 lhousearmedsvcscomm.shtml.
28. Id., Q&A Session, available at http://www.pacom.mil/speeches/sst2004/040331hasc-qa
.shtml.
29. Id.
30. Id.
31. Veeramalla Anjaiah, No Plan to Deploy Troops to Malacca Strait: U.S., JAKARTA POST,
Apr. 20, 2004, at 2.
32. Indonesia Shuns US Help in Malacca, CHINA DAILY, Apr. 13, 2004.
33. US Warns Asian Maritime Terror Threat Needs Closer Government Cooperation, AFP.COM,
Apr. 22, 2004, http://findarticles.eom/p/articles/mi_kmafp/is_200404/ai_kepm452294.
34. Id.
35. Admiral Thomas B. Fargo, US Navy, Commander, US Pacific Command, Remarks at
US Pacific Command, Military Operations and Law Conference, Victoria, British Columbia,
Canada, May 3, 2004, available at http://www.pacom.mil/speeches/sst2004/040503milops
.shtml.
36. Id.
37. Robert Wohlschlegel, Curtis W. Turner & Kent Butts, Maritime Threats Workshop,
United States Army Pacific's: Defense Environmental and International Cooperation (DEIC)
Workshop, Center for Strategic Leadership, US Army War College, Issue Paper, Vol. 09-04, Oct.
2004, at 2, available at http://www.carlisle.army.mil/usacsl/Publications/IP09-04.pdf.
38. Id.
39. Information on the RMSI and other RMSI-relevant documents were removed from the
Pacific Command's website (http://www.pacom.mil/about/pacom.shtml). My last visit was on
October 16, 2005.
40. Commander, United States Pacific Command, Strategy for Regional Maritime Security,
Nov. 2004, at 3.
41. Id.
42. Mat 5-6.
43. Id. at 6-7.
44. Mat 11-13.
45. NSPD-41/HSPD-13, supra note 14, at 2.
46. Mat 2-3.
47. Available at http://www.pacom.mil/rmsi (last visited Oct. 16, 2005).
48. NSPD-41/HSPD-13, supra note 14, at 4.
49. Id. at 5-9.
50. Admiral William J. Fallon, US Navy, Commander, US Pacific Command, Remarks at
the 4th Shangri-La Dialogue, Enhancing Maritime Security Cooperation, June 5, 2005, available
at http://www.pacom.mil/speeches/sst2005/050606-emsi-shangrila.shtml.
51. The National Strategy for Maritime Security, supra note 2.
52. Id. at 4.
53. For details of these strategic actions, see id. at 13-24.
54. Id. at 15.
145
Security in the Strait of Malacca and Regional Responses to the US Proposal
55. Id.
56. This plan lays the foundation for an effective understanding of anything associated with
the maritime domain that could impact the security, safety, economy or environment of the
United States, and of identifying threats as early and as distant from our shores as possible. Text
available at http://www.dhs.gov/xlibrary/assets/HSPD_MDAPlan.pdf.
57. This plan uses existing capabilities to integrate all available intelligence regarding poten-
tial threats to US interests in the maritime domain.
58. This plan facilitates a coordinated US government response to threats against the United
States and its interests in the maritime domain by establishing roles and responsibilities that en-
able the government to respond quickly and decisively.
59. This strategy provides a framework to coordinate all maritime security initiatives under-
taken with foreign governments and international organizations, and solicits international sup-
port for enhanced maritime security. Text available at http://www.state.gov/organization/
64251.pdf.
60. This plan recommends procedures and standards for the recovery of the maritime infra-
structure following an attack or similar disruption. Text available at http://www.dhs.gov/
xlibrary/assets/HSPD_MIRPPlan.pdf.
6 1 . These recommendations provide strategic context to holistically improve the security of
the Marine Transportation System. Text available at http://www.dhs.gov/xlibrary/assets/
HSPD_MTSSPlan.pdf.
62. This plan establishes a comprehensive methodology to secure the maritime supply
chain. Text available at http://www.dhs.gov/xlibrary/assets/HSPD_MCSPlan.pdf.
63. This plan engages non-Federal input to assist with the development and implementation
of maritime security policies resulting from NSPD-41/HSPD-13. Text available at http://
www.dhs.gov/xlibrary/assets/HSPD_DomesticOutreach.pdf.
64. The text of this strategy is available at http://www.state.gOv/r/pa/prs/ps/2005/57280
.htm.
65. Text available at http://www.whitehouse.gov/nsc/nss.html.
66. Text available at http://www.whitehouse.gov/homeland/book.
67. Joshua Kucera, US Military Aid Totals $4.8bn, JANE'S DEFENCE WEEKLY, Feb. 15, 2006,
at 13.
68. See Samantha L. Quigley, War on Terror Victory Tops PACOM's Priorities, AMERICAN
FORCES PRESS SERVICE NEWS ARTICLES, Mar. 7, 2006, available at http://www.defenselink.mil/
news/newsarticle.aspx?id= 1 5243.
69. Vivek Raghuvanshi, India — New Delhi to Join Malacca Patrols, DEFENSENEWS.COM,
Feb. 23, 2006, http://www.defensenews.com/story.php?F=1555509&C=navwar.
70. Fact Sheet, U.S. Department of State, Bureau of Public Affairs, Maritime Security in the
East Asia and Pacific Region, Apr. 21, 2006, available at http://www.state.gOv/r/pa/scp/2006/
64956.htm.
71. Sam Bateman is co-chair of the CSCAP Study Group on Capacity Building for Maritime
Security Cooperation, and senior fellow at the Institute of Defence and Strategic Studies,
Nanyang Technology University, Singapore. For the commentary, see Sam Bateman, Burden
Sharing in the Straits: Not So Straightforward, IDSS COMMENTARIES (17/2006), Mar. 20, 2006,
http://www.rsis.edu.sg/publications/Perspective/IDSSO 1 72006.pdf.
72. Supra note 8.
73. Fact Sheet, supra note 70.
74. Id.
146
Yann-huei Song
75. "Responsible States" refers to the littoral States and those nations whose sovereign terri-
tory encompasses strategic waterways, such as Indonesia, Malaysia and Singapore, in the Strait of
Malacca area. "User States" includes the international community, shipping nations and other
potential assistance providers. "Multilateral Organizations" includes the IMO and other related
UN agencies, World Customs Organization, ASEAN, ARF, and APEC. "Private Sector Partners"
refers to the shipping industry, including passenger and cargo carriers, seafarers, and other inter-
ested parties. Id.
76. Q & A Session, supra note 28.
77. Id.
78. Tiarma Siboro, RI Opposes U.S. Deployment in Malacca Straits, JAKARTA POST, Apr. 7,
2004, at 4.
79. Nughoho Wisnumurti, Upholding Security in the Malacca Straits, JAKARTA POST, Apr.
12, 2004, at 7.
80. U.S. Initiative in Malacca Strait 'Baseless': RI Navy, JAKARTA POST, Apr. 12, 2004, at 4.
8 1 . Press Release, Joint Statement Between the United States of America and the Republic of
Indonesia (Apr. 23, 2004), http://www.whitehouse.gov/news/releases/2003/10/20031022-l.html
[hereinafter Joint Statement].
82. John D. Banusiewicz, Officials Clarify Maritime Initiative Amid Controversy, AMERICAN
FORCES PRESS SERVICE NEWS ARTICLE, June 4, 2004, available at http://www.defenselink.mil/
news/Jun2004/n06042004_200406048.html.
83. Id.
84. See Vivian L. Forbes & Encik Mokhzani Zubir, Ensuring Security in the Malacca Strait:
Solutions Offered and Suggested Implementation, paper presented at LIMA International Mari-
time Conference on Enhancing Security in the Straits of Malacca: Amalgamation of Solutions to
Keep the Straits Open to All, Awana Porto Malai, Langkawi, Malaysia, Dec. 4-5, 2005, at 4, avail-
able at http://www.mima.gov.my/mima/htmls/conferences/LIMA05/index.htm (then follow
"Ensuring Security in the Malacca Strait: Solutions Offered and Suggested Implementation"
hyperlink).
85. Id.
86. Tim Huxley, Piracy and Maritime Terror in Southeast Asia: Dire Straits, IISS STRATEGIC
Comments, July 2004, at l.
87. Mark Baker, Malaysia Rebuffs US Sea Force Plan, GLOBAL POLICY FORUM, Apr. 6, 2004,
http://www.globalpolicy.org/empire/intervention/2004/0406usmalacca.htm. See also Malaysia
Rejects US Help to Guard Malacca Straits Against Terrorists, AFX- ASIA, Apr. 4, 2004; V. Ramanan,
US Cannot Deploy Forces in Straits, NEW STRAITS TIMES (Malaysia), Apr. 5, 2004, at 3.
88. Baker, supra note 87.
89. Id.
90. Donald Urquhart, Asian Coast Guard Meeting to Focus on Terrorism Threat; Malaysia
Announces Creation of Coast Guard, BUSINESS TIMES (Singapore), June 17, 2004.
9 1 . Richard Hubbard, Malaysia Rejects Use of Outside Forces in SEAsia, REUTERS, June 6, 2004,
http://www.iiss.org/conferences/the-shangri-la-dialogue/press-coverage/press-coverage-2004/
reuters— -malaysia-rejects-use-of-outside.
92. See Foreign Military Presence a Setback to War on Terror, IISS.ORG, June 6, 2004,
http://www.iiss.org/conferences/the-shangri-la-dialogue/press-coverage/press-coverage-2004/
bernamacom-malaysian-national-news-agency.
93. Shahrullizan Rusli & Noor Soraya Mohd Jamal, American Intervention on Piracy in
Straits ofMalaka Not Needed, BERNAMA.COM, Apr. 28, 2004.
147
Security in the Strait of Malacca and Regional Responses to the US Proposal
94. See Strategic Framework Agreement between the United States and the Republic of Sin-
gapore for a Closer Cooperation Partnership in Defense and Security, July 12, 2005, http://
www.us-asean.org/DefSec/SFA.doc.
95. Singapore Confirms Talks With US Over Troops in Malacca Straits, AFX.COM, Apr. 5,
2004.
96. P. Vijian, M'sia Continues to Bolster Maritime Security, FINANCIAL TIMES, Apr. 27, 2004.
97. Id.
98. Tony Tan, deputy prime minister and coordinating minister for security and defence,
Keynote Address at the 2004 IDSS Maritime Security Conference (May 21, 2004). A summary of
Dr. Tan's address is available at http://www.rsis.edu.sg/publications/conference_reports/
MaritimeConference04.pdf.
99. Id.
100. Going for the Jugular; Shipping in South-East Asia, THE ECONOMIST (US edition), June
12, 2004.
101. Kuppuswamy, supra note 4.
102. Rush & Jamal, supra note 93.
103. Id.
104. Mr. Hamzah is the former director general of the Maritime Institute Malaysia (MIMA).
1 05. B.A. Hamzah, No Basis for US Patrols, NEW STRAITS TIMES (Malaysia), July 3 1 , 2004, at 8.
106. Id.
107. Id.
108. Retired from the Royal Malaysian Navy in the rank of Captain and now a research fellow
at MIMA.
1 09. Mat Taib Yasin, Sharing the Burden of Ensuring Safety and Security of Navigation in the Straits
of Malacca, paper presented at the Symposium on Maritime Security in the South China Sea,
Dec. 8-9, 2005, at 4-5, http://www.mima.gov.my/mima/htmls/conferences/LIMA05/MTaib%20
-%20Sharing%20the%20burden%20of%20maintenance%20of%20safety%20and%20security
%20of%20navigation%20in%20the%20Straits%20of%20Malacca.pdf.
110. Mat 4.
111. Id. Quoting B.A. Hamzah, supra note 105.
112. Id. at 5.
113. Former senior research fellow at the East-West Center in Honolulu.
114. Mark J. Valencia, Malacca Strait: Clash of Sovereignty?, JAKARTA POST, Nov. 8, 2004.
115. Professor at the School of International and Public Affairs, Shanghai Jiao Tong Univer-
sity, China.
116. Ji Guoxing, U.S. RMSI Contravenes UN Convention on the Law of the Sea, Center for Stra-
tegic & International Studies, PACNET #29, July 8, 2004, available at http://www.csis.org/media/
csis/pubs/pac0429.pdf.
117. Id.
118. Marcus Hand & James Brewer, Malacca Strait Declared a High Risk Zone by Joint War
Committee: Decision Could Increase Premiums in Affected Area, LLOYD'S LIST, July 1, 2005, at 3.
119. Bernard Kent Sondakh, National Sovereignty and Security in the Strait of Malacca, paper
presented at the conference on "The Straits of Malacca: Building a Comprehensive Security En-
vironment", Maritime Institute of Malaysia, Kuala Lumpur, Malaysia, Oct. 11-13, 2004, at 8,
http://www.mima.gov.my/mima/htmls/conferences/som04/papers/sondakh.pdf.
120. Robert Mangindaan, Maritime Terrorism Threat: An Indonesian Perspective, paper pre-
sented at the Observer Research Foundation Workshop on Maritime Counter Terrorism, Nov.
29-30, 2004, at 4, http://www.observerindia.com/reports/maritime/paper_indn.pdf.
148
Yann-huei Song
121. Id.
122. Indonesian Maritime Policy Contributes to Security in Malacca Straits, THAI PRESS RE-
PORTS, July 20, 2005.
123. RINavy to Install Radar Along Malacca Strait, ANTARA (Indonesia), Sept. 3, 2005; Indo-
nesian Defence Minister Attends Border Committee Meeting in Malaysia, BBC WORLDWIDE MON-
ITORING, Dec. 16, 2005; Integrated Maritime Security System to Debut in Malacca Strait, ASIA
PULSE, Sept. 9, 2005.
124. Tony Hotland, Admiralty Courts in the Making, JAKARTA POST, June 23, 2005, at 4.
125. Navy Launches Operation to Secure Malacca Strait, JAKARTA POST, July 13, 2005, at 4.
126. Irwan Firdaus, Indonesian Navy Holds Anti-Terror Drill in the Malacca Strait, ASSOCI-
ATED PRESS, Mar. 8, 2006; Indonesian Navy Holds Anti-Terror Drill in Malacca Strait, THAI PRESS
REPORTS, Mar. 10,2006.
127. Nick Brown, Malaysia Asks for Help to Fight Piracy, JANES.COM, Oct. 3, 2003, http://
www2.janes.com/index.html (search by article title then follow hyperlink); Iskander Sazlan,
Counter Maritime Terrorism: Malaysia's Perspective, paper presented at the Observer Research
Foundation Workshop on Maritime Counter Terrorism, Nov. 29-30, 2004, at 13, http://
www.observerindia.com/reports/maritime/paper_maly.pdf.
128. Admiral Dato Sri Mohd Anwar bin H.J. Mohd Nor, Chief of Navy, Royal Malaysian
Navy, Malaysia's Approach, Presentation at ARF Regional Cooperation in Maritime Security
Conference (Mar. 2-4, 2005).
129. Report: Malaysia Forms New Maritime Agency to Patrol Malacca Straits From June, ASSO-
CIATED PRESS, Apr. 27, 2005.
130. Malaysia to Increase Patrol in Malacca Strait, THAI PRESS REPORTS, Dec. 6, 2005.
131. Malaysia's Maritime Police Increase Anti-Piracy Operations, BBC WORLDWIDE MONI-
TORING, June 1,2005.
132. Malaysia to Step Up Anti-Piracy Patrols in Malacca Strait, AFX INTERNATIONAL FOCUS,
Feb. 9, 2006, available at http://www.homelandsecurityus.net/ports%20and%20maritime
%20terrorism/malacca%20straitmalaysia_to_step_up_anti.htm.
1 33. James Brewer, Joint War Committee Stands by Strait Ruling, LLOYD'S LIST, Aug. 1 7, 2005,
at 1.
134. Singapore Navy Unveils Fleet of Remote- Controlled Vessels, AGENCE FRANCE-PRESSE,
May 17, 2005, available at http://www.defensenews.com/story.php?F=854788&C=asiapac.
135. Singapore to Contribute 2 Fokker Planes for Joint Malacca Strait Patrols, CHANNEL
NEWSASIA, Sept. 8, 2005, available at http://sg.news.yahoo.eom/050908/5/singaporel67228.html.
1 36. Singapore — Navy Will Escort Commercial Ships, REUTERS, Mar. 2, 2005; Armed Teams to
Guard Merchant Ships Entering Singapore Port, LLOYD'S LIST, Mar. 1, 2005, at 1.
137. Singapore Newspaper Highlights, ASIA PULSE, Mar. 30, 2005.
138. Current information regarding the Convention and its various amendments is available
at http://www.imo.org/ (then follow "Conventions," then "Status of Conventions," then
"SOLAS" hyperlinks) (last visited Mar. 30, 2007).
139. Robert Go, Singapore Strait Patrols Keep Pirates at Bay, STRAITS TIMES (Singapore), May
16,2002.
140. News Release, Ministry of Defense, Singapore, Singapore and Indonesian Navies Launch
Sea Surveillance System (May 27, 2005), available at http://www.mindef.gov.sg/imindef/
news_and_events/nr/2005/may/27may05_nr2.html.
141. Sondakh, supra note 1 19, at 11.
142. Malaysia, Singapore Conduct Joint Exercise in Malacca Strait, THAI PRESS REPORTS, Nov.
29, 2005.
149
Security in the Strait of Malacca and Regional Responses to the US Proposal
143. Joint Exercise Expected to Enhance RI, KL Diplomatic Ties, ANTARA (Indonesia), Apr. 24,
2006.
144. Strategic Framework Agreement between the United States of America and the Republic
of Singapore for a Closer Cooperation Partnership in Defense and Security, supra note 94. See
also Joint Statement between President Bush and Prime Minister Lee of Singapore, July 12, 2005,
available at http://www.whitehouse.gov/news/releases/2005/07/20050712.html.
145. Singapore: Country Outlooks, EIU VlEWSWlRE.COM, Aug. 9, 2005.
146. Joint Statement, Indonesia-United States Security Dialogue III, Jakarta, Aug. 2-3, 2005,
available at http://unitkom.indonesian-embassy.or.jp/menue/index.htm (then follow "Indonesia-
United States Security Dialogue III" hyperlink); Joint Statement, supra note 81.
147. U.S., Indonesian Navies Hold Joint Anti-Terror Exercise off Jakarta, ASSOCIATED PRESS,
May 10, 2005.
148. P.S. Suryanarayana, A Strategic Move, FRONTLINE, Jan. 14-27, 2006, available at http://
www.flonnet.com/fl2301/stories/20060127001405900.htm; US Offers Technical Aid for Malacca
Strait Security, ANTARA (Indonesia), Dec. 2, 2005; U.S. to Donate Old Ships to Indonesia to Help
Secure Malacca Strait, Official Says, ASSOCIATED PRESS, Dec. 7, 2005.
149. RI, US to Re-Formulate Security Cooperation, ANTARA (Indonesia), Jan. 13, 2006.
150. Indonesia Requests US Technical Assistance for Malacca Strait Security, BBC WORLDWIDE
MONITORING, Jan. 23, 2006.
151. Rice Visit to Strengthen RI-US Ties in Fighting Terrorism: Legislator, ANTARA (Indonesia),
Mar. 2, 2006.
152. Indonesian and US Navies Conduct Counter-Terrorism Exercise, ANTARA (Indonesia),
Mar. 14, 2006.
153. Piracy Remains Threat in Southeast Asia, ASSOCIATED PRESS, Mar. 20, 2006, available at
http://www.cbsnews.com/stories/2006/03/20/ap/world/mainD8GF7SVG0.shtml.
154. Rumsfeld Calls for New Indonesian Ties, NINEMSN.COM, Mar. 10, 2006, available at
http://news.ninemsn.com. au/article.aspx?id=9076 1 .
155. US Offers Early Warning System to Secure Malacca Strait, XINHUA GENERAL NEWS SER-
VICE, Apr. 22, 2006.
156. RI to Seek US Affirmation on Proposed Strategic Partnership, ANTARA (Indonesia), Apr.
19, 2006.
157. Malaysia, U.S. Ink Military Pact, Seek Malacca Strait Security, ASIA POLITICAL NEWS,
May 9, 2005, available at http://www.findarticles.eom/p/articles/mi_mOWDQ/is_2005_May_9/
ai_n 13829466; Malaysia and US Renew Defence Pact, Discuss Malacca Strait Security, AGENCE
FRANCE- PRESSE, May 9, 2005, available at http://www.defensenews.com/story.php?F
=837204&C=asiapac; US Looks at Malacca Piracy Fight Options, LLOYD'S LIST, May 10, 2005, at
12.
158. Robert Zoellick, US deputy secretary of state, Remarks at the US Ambassador's Resi-
dence, Kuala Lumpur, Malaysia (May 9, 2005), http://usunrome.usmission.gov/UNISSUES/
sustdev/docs/a505 1205.htm.
159. Malaysia, US Discuss Counter-Terrorism Cooperation in Malacca Straits, THAI PRESS RE-
PORTS, Mar. 3, 2006.
160. US Wanted Military Cooperation Boosted, JAKARTA POST, June 7, 2006, at 1; US, Polish
Defense Ministers Visit RI to Boost Military Ties, JAKARTA POST, June 6, 2006, at 23.
161. Koizumi Seeks Anti-Piracy Cooperation with Asian Nations, ASIA POLITICAL NEWS, Mar.
28, 2005, available at http://www.findarticles.eom/p/articles/mi_mOWDQ/is_2005_March_28/
ai nl3481892.
150
Yann-huei Song
162. Japan to Provide Vessels to Assist Indonesia with Malacca Strait Security, BBC MONI-
TORING International reports, May 23, 2005.
163. Japanese, Indonesian Leaders Agree to Launch Trade Talks, Cooperation on UN Reform,
BBC MONITORING INTERNATIONAL REPORTS, June 2, 2005.
1 64. Indonesia May Deploy Four Japanese Ships to Tackle Piracy in Malacca Straits, BBC MON-
ITORING INTERNATIONAL REPORTS, July 20, 2005; Japan, Indonesia to Discuss Security Aid for
Malacca Straits, ASIA PULSE, Sept. 29, 2005.
165. Japan, 3 Nations Draw Up Electronic Sea Charts of Malacca Strait, JAPAN ECONOMIC
NEWSWIRE, Dec. 19, 2005.
166. Japan to Provide Technical Aid to Safeguard Malacca Strait, ANTARA (Indonesia), Feb. 7,
2006; News In Brief, LLOYD'S LIST, Mar. 24, 2006, at 5.
167. Japan to Give Patrol Boats to Indonesia, to Relax Arms Export Ban, BBC MONITORING IN-
TERNATIONAL REPORT, June 8, 2006.
168. Malaysia, Australia Conduct Naval Exercise in Malacca Strait, BBC MONITORING ASIA
PACIFIC— POLITICAL, Apr. 21, 2006.
169. RI, Japan Intensifying Talks on Malacca Strait Security, ANTARA (Indonesia), May 24,
2006.
170. K.C. Vijavan, 3-Nation Patrols of Strait Launched; Year-Round Patrols of Malacca Straits
by Navies of Singapore, Indonesia, Malaysia Aimed at Deterring Piracy and Terrorism, STRAITS
Times Interactive, July 21, 2004.
171. Thailand to Join Malacca Strait Security System, THAI PRESS REPORTS, Apr. 25, 2006.
172. Interactions Among World Powers Can Be Source of Strength: Minister Teo, CHANNEL
NEWSASIA, Aug. 4, 2005.
1 73. Graham Ong & Joshua Ho, Maritime Air Patrols: The New Weapons Against Piracy in the
Malacca Straits, IDSS COMMENTARIES, 70/2005, Oct. 13, 2005, http://www.idss.edu.sg/publications/
Perspective/IDSS702005.pdf.
174. Indonesia, Malaysia, Singapore Agree to Malacca Strait Security Procedures, BBC MONI-
TORING ASIA PACIFIC— POLITICAL, Apr. 22, 2006.
175. Donald Urquhart, Malacca Strait Air and Sea Patrols Under One Umbrella, BUSINESS
TIMES (Singapore), Apr. 22, 2006.
176. Marcus Hand, Asia-Pacific Nations Pledge Joint Action on Malacca Strait Protection:
Terrorism Threat Adds to Concern Over Piracy, LLOYD'S LIST, June 6, 2006, at 3; S. Ramesh, In-
dia Willing to Help Littoral States Patrol Malacca Straits, CHANNEL NEWSASIA, June 3, 2006,
available at http://www.iiss.org/whats-new/iiss-in-the-press/press-coverage-2006/june-2006/
india-willing-to-help-littoral-states-patrol-.
177. Christopher Marquis, U.S. Tries to Soothe Southeast Asia on Security Initiative, NYTlMES
.COM, June 4, 2004, http://www.nytimes.com/2004/06/04/international/asia/04CND-RUMS
.html?ex= 1 1 69 1 82800&en=d9a66565fe42750 1 &ei=5070.
178. Regional Maritime Security Being Common Concern, CHINA NEWS, June 4, 2005, avail-
able at http://www.iiss.org.uk/whats-new/iiss-in-the-press/press-coverage-2005/june-2005/
regional-maritime-security-being-common-conce.
179. The sideline discussion on Advancing Maritime Security Cooperation was chaired by
Professor Tommy Koh, chairman of Singapore's Institute of Policy Studies, and included presen-
tations from Malaysia's Admiral Tan Sri Dato'Sri Mohd Anwar bin Hj Mohd, Chief of Defence
Force, Malaysia; Air Chief Marshal Djoko Suyanto, Commander in Chief, National Defence
Forces, Indonesia; and Admiral William J. Fallon, Commander, United States Pacific Com-
mand.
151
Security in the Strait of Malacca and Regional Responses to the US Proposal
180. This was the 4th Tripartite Ministerial Meeting of the Littoral States on the Straits of
Malacca and Singapore. It was held on August 1-2, 2005.
181. Batam Joint Statement of the 4th Tripartite Ministerial Meeting of the Littoral States on
the Straits of Malacca and Singapore, Batam, Indonesia, Aug. 1-2, 2005, available at http://
app.mfa.gov.sg/2006/press/view_press.asp?post_id=1406 [hereinafter Batam Joint Statement].
182. Id.
183. Press Briefing, IMO to Take Straits Initiative, Nov. 19, 2004, available at http://
www.imo.org/ About/mainframe. asp?topic_id=848&doc_id=4466.
184. Efthimios E. Mitropoulos, secretary-general, International Maritime Organization,
Opening Remarks, http://www.imo. org/Newsroom/mainframe.asp?topic_id= 1 028&doc_id
=5269 (Sept. 7, 2005).
185. Id.
186. See Identical letters dated 28 October 2005 from the Permanent Representatives of Indo-
nesia, Malaysia and Singapore to the United Nations addressed to the Secretary-General and the
President of the General Assembly, 60th Session, A/60/529, (Nov. 1, 2005), available at http://
daccessdds.un.org/doc/UNDOC/GEN/N05/583/13/PDF/N0558313.pdf?OpenElement. The text
of the Jakarta Statement is at Annex II.
187. Id., Annex II, at 9-10.
188. Mat 10.
1 89. Nicolaos L. Charalambous, Protection of Vital Shipping Lanes 5-6, paper presented at the
Maritime Cyprus 2005 Conference (Sept. 26-28, 2005), available at http://www.shipping
.gov.cy/maritime_cyprus/downloads/speakers/speech/n_charalambous.pdf.
190. See High-Powered Jakarta Meeting Agrees That Vessels Should Chip In, THESTAR.COM,
Sept. 12, 2005; Abd. Rahim Hussin, The Management of Straits of Malacca: Burden Sharing as the
Basis for Co-Operation, paper presented at the LIMA International Maritime Conference 2005,
Awana Porto Malai, Langkawi, Malaysia (Dec. 4-5, 2005).
191. The Ministerial Declaration and Ministerial Statements adopted at the Ministerial Con-
ference on International Transport Security, Tokyo, Japan, Jan. 12-13, 2006, http://www
.mlit.go.jp/sogoseisaku/kokusai_e/minister/outline_e.pdf.
192. The 2005 Protocol to the SUA Convention adds a new Article 3 bis which states that a
person commits an offense within the meaning of the Convention if that person unlawfully and
intentionally
• when the purpose of the act, by its nature or context, is to intimidate a
population, or to compel a government or an international organization to do or
to abstain from any act
• uses against or on a ship or discharges from a ship any explosive, radioactive
material or BCN (biological, chemical, nuclear) weapon in a manner that
causes or is likely to cause death or serious injury or damage;
• discharges, from a ship, oil, liquefied natural gas, or other hazardous or
noxious substance, in such quantity or concentration that causes or is likely to
cause death or serious injury or damage;
• uses a ship in a manner that causes death or serious injury or damage;
• transports on board a ship any explosive or radioactive material, knowing that it
is intended to be used to cause, or in a threat to cause, death or serious injury or
damage for the purpose of intimidating a population or compelling a government
or an international organization to do or to abstain from doing any act;
• transports on board a ship any BCN weapon, knowing it to be a BCN weapon;
152
Yann-huei Song
• transports on board a ship any source material, special fissionable material, or
equipment or material especially designed or prepared for the processing, use or
production of special fissionable material, knowing that it is intended to be used
in a nuclear explosive activity or in any other nuclear activity not under
safeguards pursuant to an IAEA comprehensive safeguards agreement; and
• transports on board a ship any equipment, materials or software or related
technology that significantly contributes to the design, manufacture or delivery
of a BCN weapon, with the intention that it will be used for such purpose.
Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navigation,
1988, http://www.imo. org/Conventions/mainframe.asp?topic_id=259&doc_id=686.
193. Ministerial Statement on Security in International Maritime Transport Sector para. 10,
adopted at the Ministerial Conference on International Transport Security, Tokyo, Japan, Jan.
12-13, 2006, http://www.mlit.go.jp/sogoseisaku/kokusai_e/minister/maritime_e.pdf.
194. Shipping Nations Agree Satellite Tracking Rule, REUTERS, May 19, 2006.
195. The SOLAS regulation on LRIT establishes a multilateral agreement for sharing LRIT in-
formation for security and search and rescue purposes, among SOLAS contracting governments,
in order to meet the maritime security needs and other concerns of such governments. This new
regulation does not create or affirm any new rights of States over ships beyond those existing in
international law, particularly, the 1982 LOS Convention, nor does it alter or affect the rights, ju-
risdiction, duties and obligations of States in connection with that convention. The LRIT infor-
mation that ships will be required to transmit includes the ship's identity, location and date and
time of their position. There will be no interface between LRIT and AIS. One of the more impor-
tant distinctions between LRIT and AIS, apart from the obvious one of range, is that, whereas
AIS is a broadcast system, data derived through LRIT will be available only to the recipients who
are entitled to receive such information, and safeguards concerning the confidentiality of those
data have been built into the regulatory provisions. SOLAS contracting governments will be en-
titled to receive information about ships navigating within a distance not exceeding 1000 nauti-
cal miles off their coast. Additional information on the new regulation is available at http://
www.imo.org (then follow "Conventions," then "SOLAS," then "Amendments year by year,"
then "May 2006 amendments — LRIT" hyperlinks).
196. Moritaka Hayashi, Introductory Note to the Regional Agreement on Combating Piracy and
Armed Robbery Against Ships in Asia, 44 INTERNATIONAL LEGAL MATERIALS 826 (2005).
197. Regional Agreement on Combating Piracy and Armed Robbery Against Ships in Asia,
art. 18, 44 INTERNATIONAL LEGAL MATERIALS 829, 834, available at http://www.mofa.go.jp/
mofaj/gaiko/kaiyo/pdfs/kyotei_s.pdf.
198. They are Brunei, Cambodia, India, Japan, Laos, Myanmar, the Philippines, Singapore,
South Korea, Sri Lanka, Thailand and Vietnam.
199. See Rebecca Chew, ReCAAP Off to a Good Start, NAUTILUS, 3d Qtr., 2006, at 4, available
at http://www.mpa.gov.sg/infocentre/pdfs/nl06-03.pdf.
200. Batam Joint Statement, supra note 181, para. 10.
201. The ten members of ASEAN are Brunei, Cambodia, Indonesia, Laos, Malaysia,
Myanmar, the Philippines, Singapore, Thailand and Vietnam.
202. ARF groups twenty-five nations, comprising the ten members of ASEAN and Australia,
Canada, China, East Timor, the European Union, India, lapan, Mongolia, New Zealand, North
Korea, Pakistan, Papua New Guinea, Russia, South Korea and the United States.
203. 2001 ASEAN Declaration on Joint Action to Counter Terrorism, http://www.dfa
.gov.ph/about/offices/7thasean.htm.
204. The text of the communique is available at http://www.aseansec.org/5961.htm.
153
Security in the Strait of Malacca and Regional Responses to the US Proposal
205. The texts of the ASEAN-US Joint Declaration for Cooperation to Combat International
Terrorism and of the Joint Declaration on Cooperation to Combat Terrorism between the Euro-
pean Union and ASEAN are available at http://www.aseansec.org/10574.htm and http://
www.aseansec.org/14031.htm, respectively.
206. See ASEAN Marine Related Activities, 2005/MRCWG/016, Agenda Item: 13, informa-
tion submitted by ASEAN to APEC Marine Resource Conservation Working Group meeting,
Phuket, Thailand, May 17-19, 2005.
207. Lianita Prawindarti, The First ASEAN Defence Ministers Meeting: An Early Test for the
ASEAN Security Community?, IDSS COMMENTARIES, May 16, 2006, http://www.rsis.edu.sg/
publications/Perspective/IDSS0342006.pdf.
208. The full text of the Statement is available at http://www.aseansec.org/14837.htm.
209. Id., para. 1 (a).
210. M,para. 1 (c).
211. Id., para. 2.
212. See para. 19, Chairman's Statement, Eleventh Meeting of ASEAN Regional Forum, Ja-
karta, Indonesia, July 2, 2004, available at http://www.aseansec.org.
213. Id., para. 26.
214. See Co-Chair's Report, ASEAN Regional Forum Workshop on Maritime Security, Sep.
22-24, 2004, Kuala Lumpur, Malaysia, para. 9, available at http://www.aseansec.org.
215. Id., paras. 11 8c 15.
216. Id., para. 25.
217. Id., para. 33.
218. Singapore Proposes Maritime Security Exercises for Asian Security Forum, AGENCE
FRANCE-PRESSE, Mar. 2, 2005.
219. Co-Chairs' Report, ARF CBM on Regional Cooperation in Maritime Security, Mar. 2-4,
2005, Singapore, para. 19, available at http://www.aseansec.org.
220. Id., para. 20.
221. Chairman's Statement, Twelfth Meeting of the ASEAN Regional Forum (ARF), Vientiane,
July 29, 2005, available at http://www.aseansec.org.
222. Id., para. 37.
223. Increase Asia-Pacific Cooperation for Maritime Security: Defence Minister, ZEE NEWS,
June 3, 2006, available at http://www.iiss.org/whats-new/iiss-in-the-press/press-coverage-2006/
june-2006/increase-asia-pacifk-cooperation.
224. See Kuala Lumpur Statement 8 June 1993: Establishment of the Council for Security Co-
operation in the Asia Pacific, http://www.cscap.org/kl.htm.
225. The CSCAP Charter and revised CSCAP Charter are available at http://www.cscap.org/
charter.htm.
226. CSCAP Memorandum No. 1: The Security of the Asia Pacific Region (Apr. 1994);
CSCAP Memorandum No. 2: Asia Pacific Confidence and Security Building Measures; CSCAP
Memorandum No. 3: The Concepts of Comprehensive Security and Cooperative Security;
CSCAP Memorandum No. 4: Guidelines for Regional Maritime Cooperation (Dec. 1997);
CSCAP Memorandum No. 5: Cooperation for Law and Order at Sea (Feb. 2001), all available at
http://www.cscap.org/publications.htm.
227. CSCAP Memorandum No. 1, para. C (4), supra note 226.
228. CSCAP Memorandum No. 6: The Practice of the Law of the Sea in the Asia Pacific (Dec.
2002) and CSCAP Memorandum No. 7: The Relationship between Terrorism and Transna-
tional Crime (July 2003). CSCAP Memorandum No. 6 is available at http://www.cscap.org/
publications.htm. A copy of CSCAP Memorandum No. 7 is on file with author.
154
Yann-huei Song
229. Terrorism in Southeast Asia: Perspectives from the Region, A CSCAP Roundtable Discus-
sion Featuring Kumar Ramakrishna, Dino Patti Djalal, Carolina Hernandez, and Mohamed
J awhar Hassan, ISSUES & INSIGHTS, PACIFIC FORUM CSIS (Feb. 2003), Appendix D (Report on
International Terrorism CSCAP Study Group Meeting, Kuala Lumpur, Mar. 25-26, 2003),
http://www.csis.org/media/csis/pubs/issuesinsights_v03n02.pdf.
230. Addressing Emerging Security Challenges in the Asia Pacific Region, Report, Council for
Security Cooperation in the Asia Pacific, 5th General Conference, Jakarta, Dec. 6-7, 2005 at 17,
http://www.cscap.ca/pdf/2005%20General%20Conference%20Report.pdf.
231. Id.
232. APEC Leaders Statement on Counter-Terrorism, Shanghai, China, Oct. 21, 2001, http://
www.infojapan.org/policy/economy/apec/2001/leader.html.
233. APEC Leaders' Statement on Recent Acts of Terrorism in APEC Member Economies, Los
Cabos, Mexico, Oct. 26, 2002, http://www.mofa.go.jp/policy/economy/apec/2002/state_terro2
.html.
234. APEC Leaders' Statement on Fighting Terrorism and Promoting Growth, Oct. 26, 2002,
http://www.sccp.org/sccplibrary/otherdocs/LeadersStmtFightTerroNGrowth.pdf.
235. The First APEC STAR Conference was held in Bangkok, Thailand in 2003; the Second
STAR Conference in Vina del Mar, Chile, 2004; the Third STAR Conference in Incheon, Korea,
2005; and the Fourth STAR Conference in Hanoi, Vietnam in February 2006.
236. Chairman's Summary Report and Recommendations of the APEC STAR III Conference,
Incheon, Korea, Feb. 25-26, 2005, http://www.apec.org/apec/documents_reports/counter_terrorism
_task_force/2005.html#STAR (then follow "STAR Conference" and "Chairman's Summary Re-
port and Recommendations of the APEC STAR III Conference" hyperlinks).
237. The origin of WPNS lies in the biennial International Seapower Symposium conducted
by the United States Navy. It changed in 1988 when the Australian chief of naval staff agreed to
host the first WPNS in Sydney. Members of the WPNS include Australia, Brunei, Cambodia,
China, France, Indonesia, Japan, Malaysia, New Zealand, Papua New Guinea, the Philippines,
Russia, Singapore, South Korea, Thailand, Tonga, the United States and Vietnam. Four observ-
ers are Bangladesh, Canada, Chile and India.
238. The FPDA was established in 1971 to ensure the defense of Malaysia and Singapore. Par-
ticipating nations are Australia, Britain, Malaysia, New Zealand and Singapore.
239. Azrin Asmani, FPDA: Malaysia Open to Review of its Scope, STRAITS TIMES (Singapore),
June 7, 2004.
240. Dominique Loh, FPDA to Focus on Non-Conventional Threats to Regional Maritime Se-
curity, CHANNEL NEWSASIA, June 7, 2004, available at http://app-stg.nscc.gov.sg/data/
2004_04_7FPDA.doc.
241. Maritime Concerns Drive Southeast Asia War Games, REUTERS, Sept. 5, 2005.
242. Malaysia Says Australia, UK, New Zealand May Play Role in Malacca Strait Security, AFX
INTERNATIONAL FOCUS, Mar. 27, 2006.
243. See The Western Pacific Naval Symposium, SEMAPHORE, Newsletter of the Sea Power
Centre — Australia, Issue 14, July 2005, available at http://www.navy.gov.au/spc/semaphore/
2006_14.pdf.
244. Evelyn Goh, Singapore and the United States: Cooperation on Transnational Security
Threats, paper presented for 26th Annual Pacific Symposium, Honolulu, Hawaii, June 8-10,
2005, at 7, available at http://www.ndu.edu/inss/symposia/Pacific2005/goh.pdf.
245. Frank Kennedy, Piracy Declines Sharply in Malacca Straits, GULFNEWS.COM, Feb. 6,
2006, http://archive.gulfnews.com/articles/06/02/06/ 1 00 1 6604.html.
155
Security in the Strait of Malacca and Regional Responses to the US Proposal
246. Based on the April 2006 IMB's Piracy and Armed Robbery Against Ships report for the
period January 1 to March 31, 2006. See Katy Glassborow, 1MB Report Charts Piracy's Shifting
Trends, JANES.COM, May 4, 2006, http://www2.janes.com/index.html (search by article title then
follow hyperlink).
247. En-Lai Yoh, Pirate Attacks Drop to Zero in Malacca Strait But Global Attacks Rise, Says
Watchdog, ASSOCIATED PRESS WORLDSTREAM, May 3, 2006.
248. See Paul X. Rutz, Rice: U.S., Indonesia Must Continue Work on 'True Partnership, ' AMERI-
CAN FORCES PRESS SERVICE, Mar. 16, 2006, http://www.defenselink.mil/news/newsarticle
,aspx?id= 15153.
156
VIII
Actual and Future Threats Emanating
from the Commons: A Chilean Approach
Francisca Moller and Jorge Balaresque*
Introduction
Strategy is about solving problems — in fact, the best strategy is the best solu-
tion to that problem. This very simple way of looking at strategy is in itself
very complex. The problem that needs to be solved must be well defined and un-
derstood and the strategic solution has to be feasible with the means that are in
hand. To complicate things further, most of the situations that need solving are
probably all "in the future." Additionally, the problem may be simply stated as
"terrorism," but we all know that is not enough. Apart from some novelist, who
could have conceived that commercial airplanes could be used in such a horrible
manner as they were on September 11?
This "solution" must also fit scenarios that themselves will undoubtedly differ
from region to region throughout the world, even from country to country. A reso-
lution that is good for one region or country may not be applicable to another.
Thus, when in 1947, a Chilean lawyer from Vina del Mar — does anybody today re-
member his name?1 — presented his theory of an expanded coastal State territorial
* Francisca Moller is Professor of International Law, Chilean Naval War College ( Academia de
Guerra Naval). Rear Admiral Jorge Balaresque, Chilean Navy (Ret.), is Professor and Head of the
Strategy Department, Chilean Naval War College. The views expressed in this article are those of
the authors alone and do not necessarily represent the views of the Chilean Government, the
Chilean Navy or the Chilean Naval War College.
Threats Emanating from the Commons: A Chilean Approach
sea, who anticipated that it would evolve into the 200-nautical-mile exclusive eco-
nomic zone (EEZ) that is now universally accepted? In 1947, he was presenting a
solution for the risk to the national whaling industry as foreign whalers operating
just off Chilean shores were very quickly exterminating the mammals.
Solutions also have their own levels of responsibility: the political or grand strategic level
decision makers have to be able to recognize the problems, state their objectives and
create the necessary means — and perhaps the legal structure — to attain them. On the
other hand, the "means" or forces that will implement the policies need clear-cut in-
structions as to what they can or cannot do in resolving the problem. As we all know
with regard to threats at sea, there will always be a conflict between the freedom of the
seas and certain control measures that would help to confront the threats effectively.
Globalization has resulted in the rapid advance of communications capabilities
and technology, a great mobility of humans and capital, a weakening of commercial
barriers and the creation of important multinational corporations, which every day
acquire a greater importance in international affairs. All this has made borders
more permeable and the world economies more interdependent, with all the ad-
vantages and disadvantages that this entails. Globalization provides enormous ben-
efits and opportunities, but it also has negative effects. Unfortunately the benefits
are still concentrated in a few nations, creating false expectations, rivalries, tensions
and divisions among the rest. We know that today most conflicts are intra-State
conflicts. These originate for multiple reasons, including lack of governance, cor-
ruption and ethnic and religious problems. All of these are causes of instability, civil
war, social disorder, systematic violations of human rights, massive migration and
frontier tensions. These effects not only create instability in the States where they oc-
cur but also have the potential to cause negative repercussions within the region or
throughout the whole international system. The world has seen a polarization of
those who support and those who oppose globalization. The former focus on the
possible benefits associated with participating in the global economy. The latter are
concerned that they are too far removed from the level of economic development
that would permit them access to globalization's benefits, or they consider global-
ization to be the cause of all their problems — the loss of national identity, the relax-
ation of moral values and the weakening of the principle of sovereignty of States.
In a globalized world, we have not only the traditional threats, but new threats
giving rise to new risks have emerged. These are not planned or organized by a
State — at least not openly. These risks rise from the proliferation of international
criminal organizations, piracy, cyber attacks, small arms trafficking, the spread of
weapons of mass destruction, drug trafficking and terrorism. We must also men-
tion potential AIDS and bird flu pandemics and natural disasters and other prob-
lems, such as droughts, floods, soil degradation and overexploitation of natural
158
Francisca Moller and Jorge Balaresque
resources. All these phenomena are considered transnational, as they cross inter-
national boundaries.
Writing from the perspective of a distant country our objective is to show the
importance of the sea to Chile as a maritime nation and how turning to some "old"
ideas may help find an effective and efficient way to create the indispensable coop-
eration needed to confront the "new" threats that affect the world.
The New Threats at Sea
The sea has always contributed to human development through its four main at-
tributes: its resources, its utility as a means of transportation and trade, as a means of
exchanging information and, finally, as a source of power and dominion.2 In the
past, the maritime resources of most States were mainly dedicated to pursuing their
national interests relating to military power and dominion. Today the new threats,
particularly those which threaten the environment and transportation, must be con-
fronted in a new way. "Good order at sea"3 requires three very important issues to be
addressed effectively: maritime awareness, maritime policy and integrated maritime
governance. Simply reflecting on the titles of these issues indicates the need for a
wide base of understanding if we are to succeed in combating the new threats.
Today the use of the global commons presents much more complex problems
than when it was referred to as a "wide common" by Admiral Mahan late in the
nineteenth century.4 Today the threats and risks cover a very wide range. We will
only discuss some that we consider especially important.
As addressed at the ASEAN Regional Forum in 2003, piracy, which has existed
from time immemorial, has now emerged in a new form: "Piracy and armed rob-
bery against ships and the potential for terrorist attacks on vulnerable sea shipping
threaten the growth of the Asia- Pacific region and disrupt the stability of global
commerce, particularly as these have become tools for transnational organized
crime."5 Other threats from and on the global commons include smuggling, drug
trafficking, illegal immigration, banditry, human smuggling and slavery, environ-
mental attack, trade disruption, and weapons proliferation, including weapons of
mass destruction and terrorism.6
Chilean Maritime Interests
Chile, with its unique shape, is not a very large country in terms of its land territory,
but its length entitles it to a huge expanse of territorial and exclusive economic
zone waters. If you add to this Chile's geographical position in the world, plus an
159
Threats Emanating from the Commons: A Chilean Approach
economic system that is outward looking, you can understand that for Chileans the
sea is of great importance.
From 1990 to 2005, Chile's foreign trade by sea rose from thirty million metric tons
to seventy million tons. In 2005, 85 percent of Chile's foreign trade was by sea. That
year, Chilean exports transported by ship totaled $14.5 billion to Asia and Oceania,
$9.8 billion to Europe, $7.6 billion to North America and $125 million to Africa.7
Although Chile is far removed from many areas of the world, events occurring
elsewhere can quickly and negatively impact Chile. As an example, although the
rise in foreign trade was generally steady from 1990 to 2005, the 1997 Asian eco-
nomic crisis, which had nothing to do with Chile, led to a decrease in Chilean ship-
ping and hardships for the Chilean economy that lasted for several years.
Key Vulnerabilities
Chile heavily depends on its sea lines of communication. Nearly 90 percent of its
increasing foreign trade must travel by sea, 100 percent of fuel imports come by sea
and by 2009 most of the natural gas needed will come as liquefied natural gas on
ships whose cargoes can themselves be a weapon of mass destruction in the hands
of terrorists and will, of course, require special security.
Although Chile is in a geographic region that to date has not been the subject of
serious terrorist threats, the government is aware of the dangers that terrorism
presents. This is why Chile is party to numerous international conventions.8 The
latest international treaties ratified are an expression of our agreement with the in-
ternational effort to combat terrorism following the 9/11 attacks.
Illegal fishing and overexploitation of fishery resources are a worldwide concern
and Chile is no exception. To address these, the government has imposed quotas
on Chilean fishing companies that fish in our exclusive economic zone and
Presential Sea, but it has not been possible to prevent illegal fishing by foreign en-
terprises that are obviously overexploiting some areas and endangering certain
highly migratory and straddling stocks.
Pollution of our seas is also a major threat to Chile. As one example, Chile is one
of the most important producers of salmon, which require clean water.
The Panama Canal is of primary importance for Chile. Chilean shipping is the
fourth largest world user and largest South American user of the canal. Any inter-
ruption to the flow of shipping through the canal will immediately affect our econ-
omy and Chilean exports may become uncompetitive because of increased
shipping costs and times.
The Strait of Magellan and Drake Passage, although not the busiest sea lanes in
the world, are of great importance as an alternative to the Panama Canal. The use
160
Francisca Moller and Jorge Balaresque
of these passages is growing yearly as a consequence not only of the increase in
world trade, but also due to the increase in post-Panamax vessels (those too large to
transit the Panama Canal), vessels carrying dangerous cargoes prohibited from ca-
nal transits, and technology advances that now allow larger ships to sail the high
latitudes safely. These increases in the use of the Strait of Magellan and Drake Pas-
sage raise the risk of collisions.
Chilean Policy
Chilean defense policy recognizes that — apart from providing the traditional aspects
of protecting the citizens and national interests and safeguarding territorial integrity
and sovereignty — a modern view must include international security and stability as
factors that affect Chile's own national security.9 Although oriented in the first place to
dissuade any threats, it recognizes that defense forces must be prepared to act coer-
cively in defense of national interests if dissuasion doesn't work. It also quite definitely
expresses that Chile is prepared to cooperate with other States,10 especially under UN
mandates, as the best way to address non-conventional threats.
In the near term, Chilean foreign policy has the challenge of increasing Chile's
place in this new globalized and interdependent world. Chile is today a nation that
has left behind its traditional insularity, and, faced with globalization, has chosen
to try to influence it so as to minimize its risks and to take part in its opportunities.
Accomplishing these objectives will require diversified strategies.11
Taken together Chilean defense and foreign policies present three challenges:
first, contributing to international peace and security; second, participating in
Latin American governability and social cohesion; and, finally, becoming a bridge
and platform between Latin America and Asia.
In meeting these challenges, the Chilean Navy is prepared — no easy task,
considering the size of the area to protect, the limited assets available and the
growing maritime interests — not only to fulfill the traditional naval role of national
defense, but to participate actively in preserving Chile's other maritime interests.
In that regard, in Chile the functions normally performed by coast guards in
other nations are the responsibility of the navy. Finally, the navy also participates
in international cooperation initiatives with other countries, particularly, as indi-
cated previously, in operations conducted under UN auspices.
For many years, the navy has participated in multilateral and bilateral exercises
with other navies to develop the interoperability necessary for effective operations
in the maritime environment. An interesting example was the sponsorship of Pan-
amanian Maritime Force training, and creating and participating in special exer-
cises to increase security in the Panama Canal area.
161
Threats Emanating from the Commons: A Chilean Approach
The Chilean navy is today a very efficient armed service comprised of a sound
and modern organization of men, infrastructure and the technical means to pro-
vide effective command and control. It is a navy that is fully capable of the necessary —
and indispensable — coordination in its operations with international and govern-
ment specialized agencies. The navy effectively covers Chilean territory from the
maritime boundary with Peru in the north to the Antarctic in the south and is
equipped with the aircraft and ships to control the open waters under Chilean ju-
risdiction and our littoral and internal waters.
Chile has developed a maritime power appropriate for its level of development
and a navy that is organized and equipped consistent with the principle that "a fleet
that concentrates on maintaining a presence on the high seas and patrolling in sup-
port of the sea lanes of communication is far more effective in identifying and
countering threats to one's national security than a coastal-defense fleet."12
Confronting the New Threats
It is important to point out initially that in confronting the threats of the twenty-
first century, it is necessary to find appropriate responses to those threats within
the international system and responses that are consistent with international law.
Under the law of the sea, the flag State has the responsibility of exercising jurisdic-
tion and control over vessels registered under its flag and has the obligation of carry-
ing it out in accordance with its own national legislation, the 1982 United Nations
Convention on the Law of the Sea (1982 LOS Convention)13 and international
conventions approved within the International Maritime Organization (IMO)
framework. The 1982 LOS Convention permits a State that has reason to believe
that jurisdiction and control have not been executed properly regarding a specific
vessel registered with another State to communicate this to the flag State, which is
to investigate and take any necessary actions to remedy the situation.14
Recognizing that the flag State has not always effectively fulfilled its obligation
of exercising jurisdiction and control over its flag vessels, the principle of port-
State control is provided for by various international conventions.15 This principle
empowers their port State to inspect foreign shipping in their ports. In addressing
port-State control, special mention must be made of the International Ship and
Port Facility Security Code (ISPS Code).16 The primary objective of the ISPS Code
is to strengthen the security of international shipping, ports, waterways and the
high seas by directing governments, shipping companies and port operators to en-
hance the security of the maritime enterprise. The ISPS Code also places responsi-
bility on port authorities to undertake detailed security assessments, including
response plans, to identify threats and vulnerabilities.17
162
Francisca Moller and Jorge Balaresque
On the other hand, the 1982 LOS Convention provides explicit rights to the
coastal State within its EEZ regarding fishing and to prevent, reduce and control
pollution of the maritime environment.18 There also are conventions that permit a
coastal State to act beyond its EEZ, such as the International Intervention
Convention19 in instances in which an accident beyond the EEZ causes pollution
that may affect the coastal State, the International Convention for Search and Res-
cue (SAR)20 and others.
The Presential Sea as a Useful Tool for Confronting the New Threats
When the Presential Sea concept was first advanced, the threat was uncontrolled
exploitation of fishing stocks, particularly migratory and straddling fishing re-
sources. Today the threats are far more diverse, but we believe the Presential Sea is
an alternative that can be useful in confronting these new threats.21
But, what is the Chilean Presential Sea? Geographically, it is that part of the ocean
space between the outer limits of Chile's continental exclusive economic zone and
the meridian which, passing through the western edge of Easter Island's continental
shelf, extends north to the international boundary with Peru and south to the South
Pole.22 It is depicted as follows:
: ■■■.-■:..,'.,' '. .i.
Figure 1. Chilean Presential Sea and SAR Area of Responsibility
163
23
Threats Emanating from the Commons: A Chilean Approach
The Presential Sea is an area in which Chile maintains a presence to protect the
national interests and takes part in economic activities that will contribute to na-
tional development. "This concept expresses the will to be present in this part of
the high seas with the aim of projecting maritime interests regarding the rest of the
international community, watch over the environment, preserve the natural re-
sources, with exact adherence to International Law."24
The Presential Sea is Consistent with International Law
The concept of the Presential Sea was first articulated in 1991. Immediately there
were critics who expressed concern that the Presential Sea was an attempt to assert
Chilean jurisdiction beyond those limits established in the 1982 LOS Convention.
One writer described it as "a very disturbing precedent."25
Professor Vicuna, who served as president of the Chilean Delegation to the
Third United Nations Conference on the Law of the Sea (1973-1983), responded
to those critics:
The meaning and extent of the Presential Sea can be explained in the light of the
developments set forth above since it closely responds to the expression of a special
interest of the coastal State, in this instance Chile, but which can also be applied to
many other geographical situations throughout the World. ... [I]t involves firstly the
participation in and surveillance of the activities undertaken by other States in the high
seas areas of particular interest to the coastal State. In this regard it is not a question of
excluding any State from such areas, but, on the contrary, of ensuring the active
inclusion of the coastal State concerned. . . .
There is no question of exclusive coastal State rights involved in this concept, or the
drawing of new maritime boundaries in a legal sense; neither should participation in
such activities be understood as a kind of compulsory intervention by the coastal State
in the activities undertaken in by other countries, but only as ensuring its own right to
operate actively in the area. The concept expressly safeguards the legal status of the high
seas established by the United Nations Convention on the Law of the Sea It follows
that the approach has been conceived in a manner entirely consistent with the current
status of the Law of the Sea.26
Satya Nandan, who headed the Fijian delegation to the Third United Nations
Conference on the Law of the Sea and served as chairman of the conference work-
ing groups on the exclusive economic zone, delimitation of maritime boundaries
and the high seas, in addressing the accomplishments of the 1982 LOS Convention,
believed:
164
Francisca Moller and Jorge Balaresque
A major achievement of the 1982 Convention was to rationalize different uses and
thereby reconcile the competing interests of states. The balance thus attained has
greatly reduced the proliferation of incoherent regimes, as states adopt national
legislation to conform to the regimes of the Convention. In that sense, the Convention
has had a stabilizing effect, reducing uncertainty and instability in the peaceful use of
the oceans.27
He continued:
For the future, the interest of all nations in a peaceful order of the oceans lies in
uniform and consistent application of the principles established in the Convention.
Differences between parties and non parties to the Treaty, and even between non
parties, may be resolved by observing the norms of cooperative conduct and
international resolution established by the Convention. Open conflicts and
confrontations and unilateral assertions of new jurisdictional regimes will not
contribute to the stability and certainty necessary in the international movement
toward the rule of law. . . .28
Jane Dalton observed a few years later that
[T]he Mar Presencial is a juridical concept offered to support Chilean national
aspirations. The challenge to Chile and the international community is to attain
Chilean aspirations within the framework of the existing Convention regime. The Mar
Presencial may be the tool that enables Chile to do so. It must not be the tool by which
the erosion of the regime begins.29
Beyond the fact that Chile desires a greater participation in Pacific Ocean activi-
ties, whether those are international trade, protection of the maritime environ-
ment, conservation of its resources or addressing threats arising on or coming
from its waters, it has never been Chile's intention to act unilaterally, but through
active participation in international organizations, specifically, the United Nations,
the Organization of American States and the International Maritime Organization.
Maritime Domain Awareness
It is interesting to note how a similar concept to the Presential Sea has been devel-
oped by the United States, which has labeled it Maritime Domain Awareness
(MDA).30 Admiral Thomas Collins, commandant of the US Coast Guard, speaking
at the US Naval War College, stated:
From a risk- mitigation perspective, MDA is perhaps the highest return element of our
application of maritime power. Simply put, MDA is processing comprehensive
165
Threats Emanating from the Commons: A Chilean Approach
awareness of the vulnerabilities, threats, and all matters of interest on the water. It
means having extensive knowledge of geography, weather, position of friendly vessels
and potential threats, trends, key indicators, anomalies, intent and the activities of all
vessels in an area of concern, including the innocent. ... If knowledge is power, and
MDA provides us the requisite knowledge of the maritime [spectrum], then MDA is
the key to maritime power. MDA, and the knowledge it will bring, will allow maritime
forces to respond with measured and appropriate force to meet any threat on, below or
above the sea and, taken to an ultimate state, will provide the necessary awareness to
create "nonevents," proactively preventing incidents, challenges, and devastation.31
International Cooperation and Voluntary Agreements
Vice Admiral John Morgan, deputy chief of naval operations for information,
plans and strategy, and Rear Admiral Charles Martoglio, director of the Strategy
and Policy Division, in the US Navy's Office of the Chief of Naval Operations, in
describing the importance of the seas and the interests of all nations in ensuring the
security of the oceans, stated:
Promoting and maintaining the security of the global maritime commons is a key
element because freedom of the seas is critical to any nation's long-term economic
well-being. The impact of the commons on trade, international commerce, and the
movement of people is significant, making security on the high seas, and in the world's
littorals, harbors, and ports, a cornerstone of prosperity. Likewise, the exploitation of
the maritime domain by nations, groups, or individuals must be considered a global
challenge. Policing and protecting the maritime commons against a wide spectrum of
threats is a high priority for all nations interested in the economic prosperity and
security that comes from a safe and free maritime domain."32
Admiral Collins, in his 2003 address at the International Seapower Symposium,
described how 9/11 forced the United States to rethink its approach to maritime
power in the context of maritime security as resting purely on military power in
indicating:
[Mjaritime security is a concerted effort that encompasses more than just protecting
the nation's national interest against hostile nations, clearly. It includes protection
against terrorist attacks; protection of our sovereign natural resources, environment,
and the like. To reduce these risks in this new security environment, it requires a special
application, I think, of concerted, integrated maritime power at four major areas of
emphasis: to (1) increase our awareness of all activities and events in the maritime
environment; (2) very importantly, build and administer an effective maritime
security regime both domestically and internationally; (3) increase military and civil
operational presence — persistent presence — in our ports and coastal zones and
166
Francisca Moller and Jorge Balaresque
beyond, for a layered security posture; and (4) improve our response posture in the
event a security incident does occur.33
The twenty-three States attending the 2003 ASEAN Regional Forum empha-
sized the importance of national and regional cooperation to the maintenance of
maritime security:
To deal with this increasingly violent international crime, it is necessary to step up
broad-based regional cooperative efforts to combat transnational organized crime,
including through cooperation and coordination among all institutions concerned,
such as naval units, coastal patrol and law enforcement agencies, shipping companies,
crews, and port authorities;
Such efforts must be based on relevant international law, including the 1982 Law of the
Sea Convention;
It is important that there be national and regional cooperation to ensure that maritime
criminals and pirates do not evade prosecution;
Effective response to maritime crime requires regional maritime security strategies and
multilateral cooperation in their implementation;
National, Regional and International efforts to combat terrorism also enhance the
ability to combat transnational organized crime and armed- robberies [sic] against
ships.34
We think international organizations have an important role, particularly the
International Maritime Organization (IMO), which effectively addresses a wide
variety of maritime affairs, in furthering international cooperation. International
instruments and recommendations/guidelines have been approved for the sup-
pression of piracy and armed robbery against ships and fixed platforms, including
the 1988 Convention for the Suppression of Unlawful Acts Against the Safety of
Maritime Navigation35 and its Protocol for the Suppression of Unlawful Acts
Against the Safety of Fixed Platforms Located on the Continental Shelf36; the 1974
International Convention for the Safety of Life at Sea,37 particularly the new Chap-
ter XI-2, the International Ship and Port Facilities Security Code38; the 2005 Proto-
col of the Convention for the Suppression of Unlawful Acts Against the Safety of
Maritime Navigation39; and the Protocol of 2005 for the Suppression of Unlawful
Acts Against the Safety of Fixed Platforms Located on the Continental Shelf.40 IMO
167
Threats Emanating from the Commons: A Chilean Approach
measures adopted to enhance maritime security have greatly contributed to
strengthening international maritime security.
The contributions of international organizations have been recognized in a
range of international conferences; for example, in January 2006, the Tokyo Minis-
terial Conference on International Transport Security "welcomed and supported
the vigorous maritime security activities undertaken by relevant international or-
ganizations, particularly, the International Maritime Organization (IMO) and the
World Customs Organization (WCO)."41
Also, the Ninth Asia Pacific Heads of Maritime Safety Agencies (APHMSA) Forum,
held in Vina del Mar, Chile from April 18-22, 2006,42 stressed that the fight against
international terrorism and criminal acts at sea constitutes a goal for all States, with
the purpose of assuring people's integrity and development through safe and free
trade, and that cooperation among member States is imperative in addressing
these non-traditional threats. During the forum, the US delegation explained the
meaning of Maritime Domain Awareness (MDA). The communique issued at the
conclusion of the forum addressed MDA as follows:
It was also acknowledged by the Forum that for MDA to be effective, information from
all maritime mission areas must be integrated, and that the sharing of maritime
information among international partners, particularly among APHMSA members, is
essential in achieving transparency. . . .
Noting the great potential for MDA to contribute to many aspect [s] of maritime safety,
SAR, environmental protection, as well as security, the Forum suggested further work
should be carried out or discussed at [a] future meeting regarding the precise benefits
which can be derived.43
There are a number of voluntary agreements created by the United States after
9/11 that are designed to address threats from and on the sea. These include the
Container Security Initiative (CSI),44 the Proliferation Security Initiative (PSI)45
and the Regional Maritime Security Initiative (RMSI),46 directed specifically at the
Strait of Malacca. While the international community supports their objectives,
[They] have received a mixed bag of responses from the maritime nations. The PSI
raises some fundamental issues under the United Nations Convention of the Law of
the Sea (UNCLOS). Maritime specialists argue that under the customary international
law all vessels have the freedom of movement on the high seas and therefore the
freedom of navigation on the high seas is absolute. Therefore, there is no justification
in boarding and searching a ship if it has a nationality, not engaged in piracy or slave
trade. Analysts doubt the right of the powerful nations to violate the basic principles
and norms enshrined in the UNCLOS The daunting challenge however, is how to
168
Francisca Moller and Jorge Balaresque
address these Initiatives in a comprehensive, yet cost-effective way, without
challenging sovereignty issues and dramatically restraining the flow of commerce."47
Another author's concerns were not just with the legal issues raised by the CSI
and PSI but with their focus on protecting US interests and the unilateral process
by which they were created:
So far, many states have gone along with CSI and PSI. However, the high costs of
compliance evoke images of colonialism and hegemony. The stationing of U.S.
Customs officials in the sovereign ports of foreign states might be seen as intrusive. PSI
and CSI may also limit the rights of commercial vessels operating internationally to
remain free from arbitrary search and seizure. The initiatives are directed exclusively
toward safeguarding U.S.-bound shipping Further, they exclude WMD and related
shipments by the U.S. to its allies. On the whole, CSI and PSI lack transparency,
reciprocity, and accountability; they are unilateral U.S. measures prompted by the 9/11
attacks.
It may be that this is the necessary cost of increased maritime security in the twenty-
first century. If many countries are willing to accept this type of non-consultative and
unilaterally- driven process that would indicate a very significant change in the way
international regulations are framed and implemented. It would constitute a major
shift from negotiated multilateralism of the post-war system to cooperative
unilateralism under post- Cold War American hegemony.48
We believe that necessary changes or modifications to international legislation
must be accomplished within the framework of the United Nations. The history of
efforts to create new international conventions or modify existing ones has shown,
however, that this can sometimes be a lengthy process. In the face of the new
threats and the dangers they create, the international community must be prepared
to act promptly to adopt procedures that provide effective responses to terrorism
and proliferation.
The law of the sea has developed and evolved over centuries of the use of the
oceans. Sometimes those changes can occur rapidly; other times — and more fre-
quently— changes require a lengthy period. An example of the latter is the defini-
tion of piracy as it appears in the 1982 LOS Convention,49 a definition that has
existed essentially unchanged for hundreds of years. In addressing the need to
change the law, the political advisor to Striking Force NATO observes:
In recent years, efforts have been made to loosen the restrictive UNCLOS definition [of
piracy]. The 1988 Rome Convention on Suppression of Unlawful Acts at Sea (SUA)
dropped the high seas and private act limitations of Article 101, but SUA focuses on
jurisdiction, not enforcement. The signatories are required to criminalize such acts,
169
Threats Emanating from the Commons: A Chilean Approach
and to either exercise jurisdiction over persons in their territory, or to extradite them to
another state with a valid stake in the action. Crucially, it does not authorize hot
pursuit.
What then, can states and navies, legally do?
On the high seas, and within one's own waters, boarding and arrest can be exercised
under the universal jurisdiction rubric, or where the pirates are of that state's
nationality. . . .
Also relevant are recent anti-terrorist initiatives, such as the 2005 revisions to the SUA
convention that allow states to agree that others may board vessels flying their flag after
notification.
In practice, acts of piracy and maritime terrorism may be indistinguishable, the
question of intent usually determined after the fact. Thus initiatives to suppress
terrorism may assist in the fight against piracy, and vice versa.50
We believe a more straightforward approach is to make proliferation of weap-
ons of mass destruction a global crime, like slavery or piracy. Today the law pro-
vides that warships of any nation have the right to visit a ship where there is
reasonable ground for suspecting that the ship is engaged in slavery or piracy or is
stateless.51 Given the new threats, it is not reasonable that action cannot be taken in
cases of terrorism at sea.
Conclusion
Chile is dependent on the sea. In our opinion, Chile recognizes the threats created
by the current international environment to the use of the oceans and is forward
looking in identifying future circumstances that could affect the nation. The Chil-
ean government has developed and articulated policies that provide appropriate
guidance to government agencies in directing their organizations to carry out
those policies. Specifically in the case of the navy, it has developed and adapted its
means towards the objectives established by the government.
Effective responses to illicit acts require multilateral cooperation at both the in-
ternational and regional level. While the possible solutions to the new threats are to
be found principally working with the United Nations and the International Mari-
time Organization, we must look beyond them to various national public and pri-
vate agencies and organizations that are in charge of maritime security. The
solutions adopted to date are properly focused by involving not only governments
170
Francisca Moller and Jorge Balaresque
but also shipping companies, port authorities, customs officials, navies, coast
guards, etc.
We believe that ensuring "good order at sea" worldwide requires an improved
level of awareness, effective policy and integrated governance. The United Nations
must be the structure within which States act to develop the long-term legal frame-
work. We recognize, however, that there must be a mechanism, such as that pro-
vided by the International Maritime Organization, there to provide the short-term
guidance required for the maritime power of States to effectively confront the
threats not just as they arise, but hopefully before they appear.
The 1982 Law of the Sea Convention has been the vital legal structure to keep
order at sea. Even if the prerogatives of the flag State are irreplaceable, port-State
control has become an efficient complement. Even so, we think that whatever pre-
rogatives the law of the sea confers upon individual States, the Presential Sea con-
cept is a useful tool for the surveillance of the high seas adjacent to the exclusive
economic zone. It provides an "area of responsibility" for States to provide the
control of that sea space necessary to address the new threats, without affecting in
the least the freedom of the seas. On the contrary, it preserves the freedom to use
the seas and makes that use safer for mankind.
Notes
1. Fernando Guarello Fitz-Henry.
2. Geoffrey Till, Seapower: A Guide for the Twenty-First Century (2004).
3. Id.
4. Alfred Thayer Mahan, The Influence of Sea Power Upon History 1660-1783, at
25(5thed. 1894).
5. Chairman's Statement, Tenth ASEAN Regional Forum, Annex D, ARF Statement on
Cooperation Against Piracy and Other Threats to Maritime Security, July 18, 2003, available at
http://www.dfat.gov.au/arf/statements/ 1 0_piracy.html.
6. John G. Morgan, Jr. & Charles W. Martoglio, The 1000-Ship Navy Global Maritime Net-
work, NAVAL INSTITUTE PROCEEDINGS, Nov. 2005, at 15, available at http://www.military.com/
forums/0, 1 5240,8 1 652,00.html.
7. Chilean Maritime Authority (Direccion General del Territorio Maritimo),
boletin estaditico maritimo 95 (2005).
8. For a listing of the conventions which Chile has signed and ratified, see MINISTER OF NA-
TIONAL DEFENSE, BOOK OF THE NATIONAL DEFENSE OF CHILE 47 (2002), available at http://
www.defensa.cl/libro_2002/ingles/index.htm [hereinafter CHILEAN DEFENSE WHITE BOOK],
9. Mat 52.
10. Id. at 46.
11. Ignacio Walker, Chilean Foreign Minister, Scenarios Facing Chile for the Bicentennial:
A Vision of State, Address at the Opening of the Academic Year, National Academy of Political
and Strategic Studies, Santiago, Chile, Apr. 1, 2005, available at http://www.anepe.cl/3_foro/
Conferencias/clasemag_walker.htm.
171
Threats Emanating from the Commons: A Chilean Approach
12. Jane Gilliland Dalton, The Chilean Mar Presencial: A Harmless Concept or a Dangerous
Precedent?, 8 The International Journal of Marine and Coastal Law 397, 409 (1993).
"Mar Presencial" and "Mar Presential" are two terms for the same concept.
13. United Nations Convention on the Law of the Sea, Dec. 10, 1982, 1833 U.N.T.S. 3, re-
printed in 21 INTERNATIONAL LEGAL MATERIALS 1261 [hereinafter 1982 LOS Convention]. The
convention was ratified by Chile in 1997.
14. Id., art. 94.6
15. See, e.g., 1982 LOS Convention, supra note 13, art. 218. In addition, the IMO has encour-
aged the establishment of regional port State control organizations. Chile is a member of both
the Vina del Mar (Latin America) and Tokyo (Asia and Pacific) regional Memorandums of Un-
derstanding.
16. The ISPS Code imposes new international regulations upon the shipping industry, in-
cluding, inter alia, requirements for security plans for "ships and port facilities." See The Interna-
tional Ship and Port Facility Security Code, http://www.imo.org/Newsroom/
mainframe.asp?topic_id=583&doc_id=2689#code (last visited Mar. 13, 2007).
17. Vijay Sakhuja, Looking Beyond International Ship and Port Facility Security (ISPS) Code,
South Asia Analysis Group, http://www.mima.gov.my/mima/htmls/mimarc/news/newsflash
_files/news-cut/aug05.htm (last visited Mar. 19, 2007).
18. 1982 LOS Convention, supra note 13, Parts V and XII.
19. International Convention Relating to Intervention on the High Seas in Cases of Oil Pol-
lution Casualties, Nov. 29, 1969, 26 U.S.T. 765.
20. International Convention on Maritime Search and Rescue, Apr. 27, 1979, 1405 U.N.T.S. 97.
21. In May 1990, Admiral Jorge Martinez Busch, commander-in-chief of the Chilean Navy,
speaking in Vina del Mar, Chile, said, "The great task of the present generation is the effective
utilization of our seas." Perhaps today's "great task" is to preserve the ability to effectively coun-
ter threats from and on the seas.
22. Chilean Defense White Book, supra note 8, at 24.
23. Chilean Maritime Authority (Direccion General del Territorio Maritimo), Chilean
Presential Sea and SAR Area of Responsibility, Presentation at the Chilean Naval War College
(2005).
24. Chilean Defense White Book, supra note 8, at 24.
25. Dalton, supra note 12, at 415.
26. Francisco Orrego Vicuna, "The Presential Sea": Defining Coastal States' Special Interests
in High Seas Fisheries and Other Activities, 35 GERMAN YEARBOOK OF INTERNATIONAL LAW 265
(1992).
27. Dalton, supra note 12, at 417, summarizing the views expressed in Satya Nandan, Pros-
pects for the Future: The UN and Peaceful Uses of the Oceans, 18 LAW OF THE SEA INSTITUTE PRO-
CEEDINGS 259, 261 (1985).
28. Dalton, supra note 12, at 417, summarizing Nandan, supra note 27, at 263.
29. Dalton, supra note 12, at 418.
30. For a discussion of Maritime Domain Awareness from a US perspective, see Joseph L.
Nimmich & Dana A. Goward, Maritime Domain Awareness: The Key to Maritime Security, which
is Chapter IV in this volume, at 58.
3 1 . Thomas H. Collins, Maritime Power for the Twenty-First Century, Luncheon Address at
the Sixteenth International Seapower Symposium, US Naval War College, Newport, Rhode Is-
land, Oct. 27, 2003.
32. Morgan & Martoglio, supra note 6, at 14.
33. Collins, supra note 31.
172
Francisca Moller and Jorge Balaresque
34. Statement on Cooperation Against Piracy and Other Threats to Maritime Security, supra
note 5.
35. Convention for the Suppression of Unlawful Acts Against the Safety of Maritime Navi-
gation, Mar. 10, 1988, 1678 U.N.T.S. 201.
36. Protocol for the Suppression of Unlawful Acts Against the Safety of Fixed Platforms Lo-
cated on the Continental Shelf, Mar. 10, 1988, 1678 U.N.T.S. 304.
37. International Convention for the Safety of Life at Sea (SOLAS), 1974, http://www.imo.org/
Conventions/contents.asp?topic_id=257&doc_id=647 (last visited Mar. 19, 2006).
38. See supra text accompanying note 17.
39. Protocol of 2005 to the Convention for the Suppression of Unlawful Acts Against the
Safety of Maritime Navigation, Oct. 14, 2005, IMO Doc. LEG/CONF. 15/21, available athttp://
www.austlii.edu.au//cgi-bin/disp.pl/au/other/dfat/treaties/notinforce/2005/30.html?query
=suppression%20of%20unlawful%20acts.
40. Protocol of 2005 to the Protocol for the Suppression of Unlawful Acts Against the Safety
of Fixed Platforms Located on the Continental Shelf, Oct. 14, 2005, IMO Doc. LEG/CONF. 15/
22, available at http://bar.austlii.edu.au/au/other/dfat/treaties/notinforce/2005/31.html.
41. Tokyo Ministerial Conference on International Transport Security pays tribute to IMO
measures, IMO NEWS, Mar. 5, 2006, at 8, available at http://www.imo.org/includes/
blastDataOnly.asp/data_id%3D14397/IMONews 12006.pdf. Transport ministers from Austra-
lia, Canada, China, Germany, Indonesia, Republic of Korea, Russian Federation, Singapore,
United Kingdom and United States participated in the conference.
42. The forum was attended by delegations from Australia, Canada, Chile, China, Hong
Kong, Japan, Malaysia, New Zealand, Solomon Islands, Philippines, Korea, Singapore, United
States, Vanuatu and Vietnam.
43. Ninth Asia Pacific Heads of Maritime Safety Agencies Forum, Communique, available at
http://www.directemar.cl/apec/documents/ChileCommunique.pdf (last visited Mar. 19, 2007).
44. For a discussion of the CSI, see Ryan P. Stiles, The International Dimension of Homeland
Security, in INTERNATIONAL LAW CHALLENGES: HOMELAND SECURITY AND COMBATING TER-
RORISM 3, 11-12 (Thomas McK. Sparks 8c Glenn M.Sulmasyeds., 2006) (Vol. 81, US Naval War
College International Law Studies).
45. For a discussion of the PSI, see Stuart Kaye, The Proliferation Security Initiative in the
Maritime Domain, in id. at 141.
46. For a discussion of the RMSI, see Yann-huei Song, Security in the Strait of Malacca and
the Regional Maritime Security Initiative: Responses to the US Proposal, which is Chapter VII in
this volume, at 97.
47. Vijay Sakhuja, Securing Maritime Landscape in a Post-9/11 World (Jan. 31, 2005), http://
203.201.253. 16/cms/sites/orfonline/modules/strategictrend/StrategicTrendDetail.html?cmaid
= 1 903&mmacmaid= 1 904.
48. David Rosenberg, Dire Straits: Competing Security Priorities in the South China Sea (Apr.
13, 2005), http://www.zmag.org/content/showarticle.cfm?SectionID=17&ItemID=7632.
49. 1982 LOS Convention, supra note 13, art. 101.
50. James Henry Bergeron, Piracy and the Law, JANE'S NAVY INTERNATIONAL, May 1, 2006,
at 14.
51. 1982 LOS Convention, supra note 13, art. 110.
173
PART IV
PUBLIC PERCEPTION AND THE LAW
IX
Piercing the Fog:
National Security, Media and the Government
Harvey Rishikof *
Introduction
At the Naval War College's 2006 Global Legal Challenges conference, I sat as a
member of the Public Perceptions Under the Law panel. The panel was
charged with the following questions:
1 . How does the media shape public perceptions of the law? Does the media
generally shape such public perceptions in an accurate way? Does the
media understand the law well enough to accurately inform the public of
legal issues — and the related law — surrounding such issues? Does the
media have an obligation to understand — and then provide an accurate
recitation/analysis of — such law? Is there any responsibility on the part
of the government to "educate" the media concerning legal issues and
the law?
2. Do public perceptions of the law ever serve to help shape national policy
decisions? Should policy makers be attuned to the public's perception of
the law affecting a particular legal issue? Or, can policy makers effect
* Chair, Department of National Security Strategy and Professor of National Security Law,
National War College, Washington, D.C. The views expressed in this article are those of the
author and do not reflect the official policy or position of the National Defense University, the
National War College, the Department of Defense or the US Government.
Piercing the Fog: National Security, Media and the Government
decisions on the basis that the "national interests" concerns of the
American populace will often outweigh its concern as to whether certain
US actions are — or are not — lawful?
3. Is the general public generally well or ill informed on legal issues? Should
the government play an active role in "educating" the public on such
issues through the media? For example, should the government act to
correct an incorrect media analysis of the law affecting a current event?
Does the government itself have a responsibility to accurately reflect the
law? That is, to what extent should the government advocate a particular
analysis of a legal issue when there are clearly differing views of the
applicable law? Is the American public's view of/respect for the law affected
by its perception of its elected representatives' "respect" for such law?
4. What role do other "players" in the international community play in
shaping the public's view of the law, that is, the Arab, the Israeli, the
British, the Chinese, the Russian and Korean street? How?
5. What role should academia play in "educating" the public on the law?
Should academia see itself as a counterweight to any governmental
attempt to "shape" the public's perception of the law? Is this a
productive — or divisive — role that academia might play?
My article answers these provocative questions in four parts: The Media — Pro-
fession or Business?; Government and Media: Public Law Diplomacy — Facts and
Fictions; The International Community and the Public: The Image Struggle; and
The Academic Community — The Proper Role? My goal is to provide perspective
on the issues and raise some provocative points for future discussion and analysis.
The Media — Profession or Business?
The media is a critical shaper of public opinion about the law. But the definition of
media has evolved. In the modern era we have become inundated with law and me-
dia from general press publications, specialized press publications, general televi-
sion shows, Court TV, movie documentaries, "mockumentaries," Hollywood
movies, fiction thrillers, news magazine shows (e.g., Frontline), websites and, the
newest, the blogosphere. Since legal opinions on complicated subjects can easily be
50 to 100 pages in length, the logic of legal opinions are hard to summarize for the
general public. In the end, the final result of some cases is clear — guilty or not
178
Harvey Rishikof
guilty, constitutional or not constitutional. Many other cases, however, are much
more subtle and deal with the nuances of congressional fact-finding and the defer-
ence owed to judicial review. These cases construe the inner workings of separation
of power, federalism and/or political power. Easy and facile summaries usually dis-
tort the meanings. Increasingly fact and fiction, entertainment and education
merge, and the lines between advocacy and information blend and blur.
In many cases involving the Supreme Court, there may be vigorous dissents and
multiple concurrences in the majority. Sorting out the holding or the center of
gravity of the logic of the analysis can be challenging. Television commentators are
usually given two or three minutes to explain the case. Print media has more space,
but, unless the case addresses a "high-profile" issue, there is immediate coverage
the day the opinion is handed down, and then little follow up editorial discussion.
Perhaps the Sunday papers will have a more in-depth analysis or the Sunday talk
shows will take up the issue. Although law reviews remain the serious vehicle for
the legal academic community, their style and format condemn them to the
rarified communities of law students and professors.
Occasionally a "news magazine show," e.g., 60 Minutes, will do an extended 20-
minute segment. These shows will help shape the "general" sense of the meaning of
the case or issue. Increasingly, websites and blog pages have become, by default, the
place of extended commentary, analysis and focus. But this, in the end, is a limited
conversation among a select group of the "legal elite chattering class."
What is the media's obligation or responsibility? To my mind, this is a tricky
question. As a first proposition, and at the risk of being overly controversial, let us
conceive of the media as a business, not a profession. Reporters, journalists and
producers work for corporations that need to sell their products. Print media is
under severe attack by the new emerging technologies. Print reporters for national
papers, magazines, blogs and journals have gained personal reputations and fol-
lowings. Some media or commentators claim to be "neutral" in their reporting
and analysis; others clearly reflect a bias or viewpoint and write with a "spin," e.g.,
"Activist liberal judges are rewriting the Constitution and should be impeached."
Particular commentators stand out and have become "opinion makers." Their as-
sessments carry weight, and often in conversation one notes the dialogue: "Did you
see X's (column, commentary or blog)? Do you agree?" Their influence turns on
a number of factors — quality of analysis, accuracy in reporting, position in the
media, insightfulness and clever commentary. The marketplace determines their in-
fluence; some markets prefer reinforcement, others accuracy and some satire, e.g.,
The Daily Show.
Rather than a "profession," however, the media are more akin to skilled arti-
sans, writers and performers commenting on the law and legal events, giving
179
Piercing the Fog: National Security, Media and the Government
perspectives and views. Although there is some distinction between the "op-ed"
section and "news" sections of the media, increasingly the market place is eroding
what once was an arguable separation. The obligation of the media is to "inform."
There is no constitutional or statutory requirement for "accuracy or analysis." Re-
porters are not sanctioned or regulated by the State and are not disbarred from the
profession — no one can arrest them for practicing without a license. In fact, the
First Amendment protects the media/press function from the preying regulatory
interests of Congress:
Congress shall make no law respecting an establishment of religion, or prohibiting the
free exercise thereof; or abridging the freedom of speech, or of the press; or the right of
the people peaceably to assemble, and to petition the government for a redress of
grievances.
Both rumor and fact are protected by the speech and press clauses. Lawyers and
doctors have no such protection — imagine if they did? Albeit there are libel suits,
but for public figures the bar is high. The concept of "if it bleeds, it leads" is alive
and well in the United States. Moreover, US news and commentary crowds out
news from other parts of the world.
War correspondents have a particular challenge. Reporting the truth may dam-
age the war effort. Revealing military mistakes undermines confidence in the over-
all ability of US forces. Yet once embedded with the troops, the identification with
the effort and the fact that the troops are protecting the reporter has to have an ef-
fect. Giving the "soda straw" perspective is powerful, immediate and visceral, but is
it relevant to the grand campaign? Finally, a hard professional question for the US
media is the following hypothetical. Imagine a situation whereby Osama bin Laden
contacts a US reporter and offers an exclusive interview to tell his side of the story
in a third country location — not in the United States or in Iraq. Would a US re-
porter contact the military to tell of the offer? Would the US reporter agree to have
a "global positioning" chip embedded in or on his person? Would a foreign jour-
nalist, offered the same opportunity, make the same choices as the US journalist?
Are US reporters reporters, US nationals or professionals?
Government and Media: Public Law Diplomacy — Facts and Fictions
Faced with a media that is a business and a First Amendment that protects the in-
forming function, broadly defined, how should a government respond? What is
the government's role in the public perception of the law? Should the government
play an active role in "educating" the public on such issues through the media? For
180
Harvey Rishikof
example, should the government act to correct an incorrect media analysis of the
law affecting a current event? What is the appropriate role for the government in
responding to the shaping of the legal message for the public?
First, the concept of government must be defined. Our government is com-
posed of the executive, legislative and judicial branches. Historically, the federal ju-
dicial branch has not involved itself in public information or public diplomacy
campaigns. State judges, some of whom compete for public office, have been more
"active" in explaining themselves during election periods. US federal judges, how-
ever, have been unique in the restraint they have shown as controversy mounts
about the role of federal judges or the interpretation of an opinion. Although
judges have written books, articles and law reviews, they rarely consent to be inter-
viewed and refuse to comment on current cases. Often is heard the refrain, "The
case speaks for itself." This is not true in all legal jurisdictions. In Canada, for exam-
ple, the Administrative Assistant to the Chief Justice will hold press conferences to
explain the meaning of a case recently handed down. This would be unprecedented
in the US federal system.
Judicial independence is protected by bar associations, nongovernmental orga-
nizations, think tanks and law schools speaking on behalf of the judiciary. In fact,
attacking judges' independence has been a recurring historical phenomenon in the
United States and public opinion heretofore has been mobilized to prevent other
parts of the government from disciplining the courts. The defeat of the proposed
Franklin Delano Roosevelt "court packing" plan in the 1930s resulted in even more
independence being granted to the judiciary.1 Prior to the failed plan, the judiciary
submitted its budget through the Department of Justice and the Attorney General
of the United States. Once the plan was defeated, Congress passed legislation so
that the judiciary submits its budget independently and directly to Congress
through the Office of Management and Budget.
This leaves the executive and the legislative branches. It is often the case that the
government is divided, with one party controlling the presidency and the other
controlling one or both houses. The legislature, with its power to hold public hear-
ings, can address judicial opinions directly with extensive deliberations. Scores of
witnesses — experts, pundits and academics — can be called to testify even under
oath and render their opinions about critical legal issues. A legislative record is cre-
ated, and these proceedings are covered by the media and commentated upon. Vir-
tual media frenzies can be created with daily interviews, stories and gavel-to-gavel
coverage of high-interest committee hearings.
Senators and members of the House of Representatives have enormous power
to shape the public debate through this process. The legislature can fill the public
space with interviews, studies and research papers and conduct behind-the-scenes
181
Piercing the Fog: National Security, Media and the Government
lobbying and negotiating with the executive branch. In fact, members of the execu-
tive branch can be subpoenaed and forced to testify about events, positions and
views. Although the President can invoke executive privilege, the Congress, public
and media carefully scrutinize such tactics.
The executive has an enormous array of tools at its disposal to "spin" legal issues
and positions taken by the President. It is now a well-established Sunday morning
ritual to have the President's men and women fan out across the talk shows with
the same song sheet and present the White House position. The President's press
conferences and ability to address the nation from the Oval Office, to "go directly"
to the people over the heads of the media, is a powerful tool to influence the debate
on legal policy issues. Pronouncements on legal issues by the President carry signif-
icant weight since it is assumed the leading legal minds of the administration have
researched those issues and support the positions being taken.
Recently the prosecution of "leaks" of even high-ranking government officials
and the subpoenaing of reporters by US attorneys for the identity of sources have
demonstrated a new weapon by the executive to control the flow of information.
The revelation by syndicated columnist Robert Novak of Valerie Plame Wilson as
an undercover CIA officer, and the subsequent investigation by the US Attorney
for the Northern District of Illinois, Patrick J. Fitzgerald, involving I. Lewis
"Scooter" Libby, Vice President Dick Cheney's former chief of staff and national
security adviser, and the holding of Judith Miller of the New York Times for con-
tempt in not revealing her source is clear evidence of the executive's power to shape
the terrain for the flow of information.
Moreover, the prosecution of the American Israel Public Affairs Committee's
(AIPAC) director of foreign policy, Steve Rosen, and an Iran specialist, Keith
Weissman, in addition to Lawrence Franklin, an Iran analyst at the Department of
Defense (DoD), will be the first time the federal government has charged two pri-
vate citizens with leaking State secrets. According to the indictment, Rosen and
Weissman repeatedly sought and received sensitive information, both classified
and unclassified, and then passed it on to others in order to advance their policy
agenda. In the case, it is alleged that Rosen and Weissman received the information
from a DoD official, Franklin, who wanted the information passed on to other offi-
cials. For some legal experts, the prosecution threatens political and press freedom
by making the flow of information and ideas a crime. Federal prosecutors are using
the Espionage Act for the first time against Americans who are not government of-
ficials, do not have security clearances and, by all indications, are not a part of a for-
eign spy operation. The prosecution of the strategic leak whereby one part of the
executive charges another part of the executive raises the question of who is using
whom in the process of shaping opinion.
182
Harvey Rishikof
The press and the legal communities are carefully watching these cases to see
how the courts will strike the balance between leaks, information flow, national se-
curity, the First Amendment and the right to know. The resolution will help shape
the debate for the future.
The International Community and the Public: The Image Struggle
What role do other "players" in the international community have in shaping the
public's view of the law — that is, the Arab, the Israeli, the British, the Chinese, the
Russian and Korean street? The issue of the public is best understood in the context
of public diplomacy to include the several publics involved, for example, in the
War on Terrorism (US, European, Afghani, Iraqi, other Middle Eastern). Since 9/
11, the US public's approval rating for the Iraqi conflict has steadily trended down-
ward from 90% to about 40%. The world media are central to shaping public per-
ceptions, but the expectation that the media will simply be "fair" is misplaced. How
much the US public is affected by foreign press is unclear. Aljazeera loops pictures
of noncombatant Palestinians being killed by Israeli forces and then cuts to US
forces in Iraq and noncombatant Iraqi corpses. The number of Iraqi dead is still
not fully reported in the US media, but the world community opposed to the war
focuses on the civilian casualties. The world media approaches the subject with its
own views and that is the way it is and should be.
Covering the war by leaving Baghdad's Green Zone is a dangerous enterprise.
According to Reporters Without Borders, the war in Iraq has proved to be the dead-
liest for journalists since World War II. As of November 2006, a total of 135 jour-
nalists and media assistants have been killed in Iraq since the war began on March
20, 2003. This is more than the number killed during 20 years of war in Vietnam or
the civil war in Algeria. Iraq is also one of the world's biggest marketplaces for hos-
tages, with 38 journalists kidnapped in three years. Five of them were executed.
Three are still being held by their abductors. Around 63 journalists were killed in
Vietnam during the 20 years from 1955 to 1975. A total of 49 media professionals
were killed in the course of their work during the war in the former Yugoslavia
from 1991 to 1995. During the civil war in Algeria from 1993 to 1996, 77 journalists
and media assistants were killed.2
One can have only admiration and deep respect for those reporters and com-
mentators willing to sacrifice their lives to tell the story of Iraq. Informing the pub-
lic accurately on legal issues emanating from the conflict is even more problematic,
especially given the growing gap between US and European views on relevant in-
ternational law questions. The gap is largely a topic of conversation among elites,
however, and the participation of the media and the public is not central. The 2006
183
Piercing the Fog: National Security, Media and the Government
US election demonstrates, however, that the status of the war affected the Ameri-
can people and coverage and commentary was critical.
But there are critical cultural differences between the United States and the
world. Europe, for example, believes that the death penalty is a violation of human
rights while the United States and the Supreme Court hold that the death penalty is
part of US culture and heritage. In this sense, "soft power," as understood by Jo-
seph Nye,3 is not effective if the message runs counter to world opinion.
Legal commentators are a new, vibrant phenomenon; they and other shapers of
public perceptions are delivering information very rapidly and in ever-new ways
technologically. Commentators on the blogosphere now have tremendous power,
as do the dominant images that ultimately become adopted as emblems of a con-
flict in the public consciousness. Which picture will be the iconic emblem of the
war — the statue of Saddam Hussein coming down? Or the hooded detainee from
Abu Ghraib? Or the pictures of the long lines of a free and democratic Iraq voting?
For Vietnam, the pictures of Saigon police chief Nguyen Ngoc Loan's raised pis-
tol to the temple of a suspect and of the young girl, Kim Phuc, who ran naked from
the napalm attack on her village became the public's images of the war frozen in the
minds of the US population.
These pictures of Vietnam captured what appeared to be violations of interna-
tional law, and became metaphors, right or wrong, for the war. Reality may be very
different from the image or perception. Recently, Dominic Johnson and Dominic
Tierney have argued that the Tet offensive of January 1968 was actually an unmiti-
gated disaster for the communists (no targets were held and approximately 40,000
Vietcong were killed), but the attack was viewed as a defeat for the United States
due to the previous overblown expectations of public opinion that victory was near
following President Johnson's expansive rhetoric before the offensive, the fact the
US embassy was placed under direct fire, and the way the media portrayed the of-
fensive and the Vietcong resurgence.4 The fog of battle can cloud press coverage
and portrayal. As has often been noted, truth is the first casualty of war. Perception
is critical. When the stakes are high, however, and pictures and facts of casualties
contradict the government's portrayal of reality, the public's mood can swing dra-
matically, particularly in election season.
The Academic Community — The Proper Role?
What role should academia play in educating the public on the law? Should aca-
demia see itself as a counterweight to any governmental attempt to shape the pub-
lic's perception of the law? Is this a productive — or divisive — role that academia
might play?
184
Harvey Rishikof
The academic role in educating the public is often equivocal: the academic
search for long-term truths and guiding principles does not often yield informa-
tion that readily impacts public perceptions. Increasingly, academics are flooding
the airwaves, blogs and documentaries, and giving on-the-spot commentary. The
O.J. Simpson trial began a trend that has continued in force. From the perspective
of John Stuart Mill, this is all good — the more speech in a democracy the better. Let
the marketplace of ideas sort out the cacophony of voices. Often the same "usual
suspects" show up for the pithy quote in the article by the well-known journalist or
commentator. (I must confess to pleading guilty on this charge.) Other academics
have chosen to start their own blogs where they keep a running commentary on the
legal issues that fall under their expertise. It is only a question of time before the Su-
preme Court cites a blog as a source of authority for an opinion.
Independence and tenure give academia a special voice in the legal debates.
When the legal community uniformly disagrees with the government's position, it
has an impact on the public's sense of propriety. How much impact is unclear.
Moreover, the most significant question is what effect the community has on the
court deciding the issues. Are judges or justices swayed by amicus briefs from re-
spected members of the legal community overwhelmingly agreeing on a position?
More often than not, the community will be divided, with respected voices on both
sides of the "vs." The judge's own independence is the final arbiter, not the aca-
demic community. The academic community acts more like a searchlight illumi-
nating the different paths. The court must choose the route, and then be held
responsible.
Conclusion
So where does this leave the debate of national security, media and the govern-
ment? Piercing the fog of confusion is never an easy task. Essential to our democ-
racy is open debate. Our cacophony, like our democracy, is the best approach given
the alternatives. Unlike the United Kingdom, the United States has no Official Se-
crets Act,5 although the combination of the Title 18 provisions criminalizing fraud
and related activity in connection with computers6 and the State-secrets privilege,
tied to prosecutions under the Espionage Act,7 brings such a regime closer. Faced
with such a threat, some have called for a federal shield law for reporters and Sena-
tors Richard Lugar, Arlen Specter, Christopher Dodd and Charles Schumer spon-
sored the Free Flow of Information Act of 2006. 8
Until such time when such a United Kingdom approach takes hold, our system
remains one of no prior restraints, few media regulations (e.g., the Federal Com-
munication Commission), private law suits for defamation, a private multi-faceted
185
Piercing the Fog: National Security, Media and the Government
media, an independent legal system, unregulated new worldwide technologies of
communication, a ship of State that "leaks" from the top and a literate audience.
True, it is an audience more interested in Monday Night Football, Judge Judy, The
Daily Show, and Dancing with the Stars, but it is an audience that has the right and
the ability to engage and become involved if it so chooses. We call it, in short, free-
dom of the press. Warts and all, the best remedy is more commentary, to para-
phrase John Stuart Mill.
Notes
1. FDR allegedly presented the Judiciary Reorganization Bill of 1937 to relieve the work-
load of elderly judges. The bill would have allowed FDR to appoint one judge for each sitting
judge over age 70 and six months with at least ten years of experience. FDR could have appointed
six more Supreme Court justices immediately, increasing the size of the court to 15 members. A
Congress dominated by Democrats would have been expected to appoint judges friendly to FDR
and his New Deal agenda. The measure was opposed by senior leaders of the Democratic party
and defeated. Controversy still surrounds the reason why Supreme Court Justice Owen Roberts
changed his vote, prior to the bill's defeat in Congress, on a minimum wage law, but his vote be-
came known as "the switch in time that saved nine."
2. This information is compiled from the Reporters Without Borders website. See http://
www.rsf.org/special_iraq_en.php3 and http://www.rsf.org/article. php3?id_article= 16793 (both
last visited Dec. 27, 2006). The numbers of journalists and media killed in Iraq are continually
increasing. For example, by December that figure had risen from 135 in November to 139.
3. See, e.g., JOSEPH S. NYE, JR., SOFT POWER: THE MEANS TO SUCCESS IN WORLD POLITICS
(2004).
4. See Dominic Johnson & Dominic Tierney, The Wars of Perception, NEW YORK TIMES,
Nov. 28, 2006, at A23.
5. Official Secrets Act, 1989.
6. 18 US Code sec. 1030 (2000).
7. Public Law No. 65-24, 40 Statutes at Large 217 (1917).
8. S. 2831, 109th Congress (2006).
186
X
The Military and the Media in Perspective:
Finding the Necessary Balance
James P. Terry*
In reviewing the recent events in Iraq and the War on Terrorism vis-a-vis the
media, the one obvious question asked by all Americans today, including those
in military service, is who do the media represent. Do they represent the voice of
the American people, or do they represent a defined elite concerned with a change
in the political landscape in the United States?
Recent Background to Current Contentiousness
Two recent incidents, I believe, are indicative of the current unease between the
military and the media and force us to reflect on who and what the media repre-
sents in their reporting on military activities. In early 2005, Newsweek, owned by
the Washington Post Company, published a story by Michael Ishikoff claiming
that a copy of the Koran had been flushed down a toilet by an American interroga-
tor at Guantanamo, Cuba, in front of Muslim interviewees. When evidence was
produced that showed it to be false, Newsweek belatedly retracted the story but only
after much damage to the US military's image occurred in those countries with
whom we must cooperate in the War on Terrorism.1 More importantly, the rioting
that followed resulted in 16 deaths in Afghanistan and elsewhere. Newsweek,
* Colonel, United States Marine Corps (Ret.).
The Military and the Media in Perspective: Finding the Necessary Balance
moreover, wanted no part of the White House's request that it help repair the dam-
age. And, unfortunately, no journalist from any major news organization wrote
that they should.
The current reporting of the Haditha story also bears mentioning. The rush to
judgment of the Marines involved by the US media without waiting until the facts
are determined has been viewed by many as simply reflective of the media's ten-
dency to believe the worst. More significantly, the fact that the incident was re-
ported immediately to superiors by the Marines involved, that those in command
were made aware of the civilian deaths contemporaneous with the incident, and
that the squad involved has consistently claimed that they followed their rules of
engagement in clearing the buildings from which they took fire, have all been con-
veniently overlooked by the mainstream media in their reporting. More impor-
tantly, there has been no investigative reporting on standard procedures for
clearing buildings from which fire is taken and no interest in reporting the context
in which these deaths occurred.
What is most difficult to understand is why the press, most of whom have not
served in the military, so often chooses to believe foreign sources proven incorrect
in the past, and disregard the voices of fellow Americans who are daily placing
themselves in harm's way for our nation's foreign interests. Military lawyers also
ask why the press ignores the basic legal principles that apply in irregular
belligerencies where unlawful combatants are engaged with national forces — in
this case coalition forces and forces of the new Iraqi government. We must also ask
why there is such a bent to discredit and criticize US efforts rather than understand
the rationale behind coalition actions aimed at ensuring we can "stay the course" in
Iraq and the reasons for the immediate actions in support thereof.
With that said, our charge must be to assess the relationship between the media
and the military as it relates to an understanding and articulation of the legal pa-
rameters of the current conflict in Iraq as covered by the press — that is, Operation
Iraqi Freedom. Our goal should be to increase mutual understanding at both the
personal and institutional levels of what the legal regime actually represents with
respect to the military's operational requirements in the War on Terrorism and the
legal framework under which the current conflict is being pursued. One would
hope that the effort here today can help lead to practical solutions to areas of friction
in communication between the two. Finally, our ultimate quest must be how can
we maintain a vibrant, robust freedom of expression while protecting the nation's
capacity to fight our wars effectively.
188
James P. Terry
The Legal Principles Underlying Irregular Belligerencies:
Often Ignored in the Reporting on Iraq
The Nature of the Current Violence
As discussed below in detail, the media's use of the now firmly ingrained term, "in-
surgents," or "insurgency," is both factually and legally incorrect and reflects the
media's misunderstanding of the conflict.
The Global War on Terrorism was clearly not contemplated when the four
Geneva Conventions, addressing wars between national entities, were signed in
1949.2 The violence in Iraq currently perpetrated by al Qaeda and elements of the
former regime is being spearheaded by individuals under no known national au-
thority, with no command structure that enforces the laws and customs of warfare,
and with no recognizable, distinguishing military insignia. More importantly, they
represent no identifiable national minority in Iraq. Their attacks have injured and
killed civilians of all ethnic groups, as well as more than 2,500 US military person-
nel attempting to assist the democratic government in Baghdad to succeed. Their
use of children and women as lookouts and information gatherers is reminiscent of
Vietnam and raises serious questions about the status of those individuals when
acting on behalf of terrorist fighters in Iraq. The fact that this status is seldom, if
ever, acknowledged by the press raises serious concerns for the military in their ef-
forts to assure the public of our adherence to the law of war.
It is important to understand that terrorist violence provides no legal gloss for
its perpetrators. The critical international law principles applicable to the violence
in Iraq are found in the 1949 Geneva Conventions in Common Article 33 relating
to internal armed conflicts and the principles enunciated in the two Additional
Protocols to these Conventions negotiated in 1977.4 The minimal protections af-
forded by Common Article 3, for example, include prohibitions on inhumane
treatment of noncombatants, including members of the armed forces who have
laid down their arms. Specifically forbidden are "murder of all kinds, mutilation,
cruel treatment and torture; taking of hostages; outrages upon personal dignity, in
particular, humiliating and degrading treatment," and extrajudicial executions.
Provision must also be made for collecting and caring for the sick and wounded.
The 1977 Geneva Protocols had their roots in wars of national liberation follow-
ing World War II. Colonial powers, to include the United States, France, Great
Britain, and the Netherlands, had engaged these liberation movements militarily,
often with little regard for the law of armed conflict. In the 1974 conference
hosted by the Swiss government in Geneva, the need to regulate conflicts of a
non-international character was addressed in Article 96(3) of Additional Protocol I
and is the subject of Additional Protocol II. At the conference, the Swiss
189
The Military and the Media in Perspective: Finding the Necessary Balance
Government invited members of national liberation organizations to participate,
but not vote.
The participation of non-State actors helped shape the drafting of Article 96,
paragraph 3 of Additional Protocol I. This section provides that a party to a conflict
with a State army can unilaterally declare it wants the 1949 Geneva Conventions
and the 1977 Protocols to apply. This would, of course, offer greater protection for
members of national liberation movements. Under Article 96, however, parties
authorized to make such a declaration had to establish that they were involved
in "armed conflicts in which people are fighting against colonial domination
and alien occupation and against racist regimes in the exercise of their right of
self-determination."5 In Iraq, however, terrorists are trying to unseat the govern-
ment that has been overwhelmingly approved by the people. Moreover, al Qaeda
has made no statement that it desires the Geneva Conventions to apply.
These terrorists, or unlawful combatants, however described, have no juridical
existence other than as common criminals. Additional Protocol I, Article I con-
flicts, or those between a nation and a recognized insurgency seeking a legal status,
differ from the present terrorist violence in that participants in Article I conflicts
opposing government forces are required to meet certain minimum requirements.
These are: ( 1 ) that they operate under responsible command and are subject to in-
ternal military discipline; (2) that they carry their arms openly; and (3) that they
otherwise distinguish themselves clearly from the civilian population.6 In return
they are accorded certain protections when captured. It is doubtful that those per-
petuating violence in Iraq today meet these criteria for the status of insurgent.
Moreover, they are exploiting every ethnic group for their own vicious ends, with-
out regard for these requirements.
The fact that these terrorists have no recognized and protected status under the
Geneva Conventions or their Protocols, and employ methods completely banned
by the laws of armed conflict, is likewise seldom articulated by mainstream report-
ers. In addition, al Qaeda's failure to adhere to the most basic tenets of interna-
tional law on the battlefield is never addressed. What is addressed is every claimed
violation of the law by American service members, often responding to acts of sav-
agery by Muslim extremists claiming to act on behalf of Allah, not on behalf of a
national or sub-national entity. The fact that these claimed violations of the law of
war by Americans are often subsequently found to be without substance seems to
never appear in print.
The Status of the Al Qaeda and Other Anti-Government Participants
While the press today insists on calling these terrorists "insurgents" the fact that
they are the basest of criminals, and not insurgents with minimal juridical status
190
James P. Terry
under Article I, Protocol I, as discussed above, is never recited. The fact that they do
not represent even a significant minority of the Sunnis, Shiites or Kurds is never ex-
plained. (We know this because 70% from all sectors voted in the December 2005
elections for a democratic government.) And there is never a call in the press for the
Iraqi people to stand up and denounce these perpetrators of violence who are even
now sucking the lifeblood from the fledgling Iraqi Government.
The law of armed conflict is based largely on the distinction between combat-
ants and noncombatants. Unfortunately, in Iraq, the clear distinction normally
witnessed in conflict (i.e., belligerents on the one hand and the civilian populace on
the other) is significantly blurred. Nor are all elements that are perpetuating the vi-
olence today working toward the same ends. Baathist operatives within the Sunni
elite who were formerly within Saddam's inner circle are trying to prevent the
fledgling democracy from succeeding. The al Qaeda leadership is focused on driv-
ing the Western influences from Iraq and it is likewise targeting any supporters of
the current coalition effort to help the new Iraqi government sustain democracy.
Certain members of the Shiite leadership have used the turmoil as an opportunity
to settle scores while at the same time refusing to commit completely to the new re-
gime until it is determined that it can succeed. Shiite religious leaders like Sistani
are remaining silent. The Kurds have opted to remain on the sidelines in the north
and take a wait and see approach while at the same time ostensibly supporting the
new regime. Then there are the local rivalries, and in Iraq, all politics are local. I saw
that in Fallujah in late 2004 and in early 2005 when I was there on behalf of the Sec-
retary of State.
The point is that the Marines under scrutiny at Haditha responded to attack in a
very complex environment. The key question had to be whether they followed the
legally scrubbed rules of engagement and, equally important, whether the rules of
engagement followed, if in fact they were followed, actually applied to the facts on
the ground as they presented themselves to the Marines involved. Major General
Bargewell, the investigating officer, is now carefully examining these questions on
behalf of the Secretary of Defense.
These cross currents, and the fact that our Marines and Army forces are dealing
with a period of carefully orchestrated violence, need to be more accurately por-
trayed by the media. The fact that individuals, including women and children, who
participate actively and directly in support of combat activities (such as providing
combat intelligence, physically shielding combatants, etc.) themselves become
combatants and are legitimate targets of attack, needs to be explained. That is why
it is so critical that reporting on events such as the Haditha killings receive careful
review and careful attention.
191
The Military and the Media in Perspective: Finding the Necessary Balance
Finding the Appropriate Military-Media Relationship
We must ask then, what is the appropriate balance in reporting in the current
struggle in Iraq? How can the media report events in a more accurate way? What
can the military do to provide the legal insights necessary for the media to fully un-
derstand the operational legal issues that have and will arise? There is no question
that public perceptions of the law and, more specifically, perceived violations of the
law shape national policy decisions. This was never more true than in Vietnam,
where the My Lai murders helped to sour the Vietnamese public on our continued
presence there, and the US public on our continued participation in that conflict.
In the present conflict in Iraq, the allegations concerning the alleged murders at
Haditha and other similar incidents are even now shaping national policy deci-
sions. It was no accident that when President Bush visited Baghdad on June 13,
2006 he met with the new Iraqi Prime Minister and expressed support for contin-
ued US presence on the one hand, while urging the Iraqis to move quickly to train
their own forces and to take the lead in their own defense.
There is also no question that the climate under which the military and the me-
dia operate has intensified since September 1 1, 2001. A 2005 Gallup Poll found that
large majorities of both the military respondents and the public believe that news
stories about the military tend to be too negative.7 Members of all three groups,
military, media and the public, however, believe that embedding the media within
the operational forces enhances the public's understanding of the war, helps the
morale of the troops, improves the public's perception of the military and im-
proves the credibility of the media coverage. It is the understanding which flows
from embedding, not mere information, which makes the difference between fair
coverage and something less.
The Practical Effects of Embedding
It was during the Bosnian peacekeeping operation in 1995 that reporters were first
authorized and assigned to accompany US forces as part of an authorized compre-
hensive program. This was short-lived, however, as a sensitive conversation be-
tween a commander and his men concerning racist attitudes of one of the Balkan
parties to the conflict was reported by a Wall Street Journal reporter (Tom Ricks).
The program was robustly adopted, however, by US military commanders in Op-
eration Iraqi Freedom in 2003. The more than 600 reporters who were approved
for the program received a week-long "boot camp" of sorts aboard ship and at sites
such as Marine Corps Base Quantico, Virginia; Fort Dix, New Jersey; and facilities
192
James P. Terry
in Kuwait.8 New York Times journalist Andrew Jacobs found it to be "alternatively
enlightening, entertaining, horrifying, and physically exhausting."9
While nearly all reporters involved in the program during Operation Iraqi Free-
dom believed it gave them a greater feel for the war and a better understanding of
the military as a result of their training and experience, there were concerns by
publishers that negative stories by embedded reporters never caught the public's
attention. These included stories of failed supply planning, civilian casualties, frat-
ricide and theft. I believe that this lack of traction for negative stories can be largely
attributed to the overwhelming success of the initial campaign and the belief on the
part of most Americans that the coalition force had done a remarkable job, despite
the reported negative events.
While the embedding program was not institutionalized during Vietnam and
earlier, one only has to recall the excellent reporting of Ernie Pyle in the Pacific dur-
ing World War II to understand that the embedding of individual reporters has a
long and proud history. In Vietnam, Joe Galloway, who subsequently wrote We
Were Soldiers Once, with Major General Hal Moore, spent 25 years traveling "up
close and personal" with military units — primarily Marine and Army infantry
commands. It was his reporting in the la Drang Valley (pronounced Na Trang) in
November 1965 with an Army Battalion of the 1st Cavalry Division facing over-
whelming odds which catapulted him onto the world stage. Galloway described his
feelings on his reporting this way:
There, in the mud, is where war is most visible and easiest understood. There no one
will lie to you; no one will try to put a spin on the truth. Those for whom death waits
around the next bend or across the next rice paddy have no time and little taste for the
games that are played with such relish in the rear. No one ever lied to me within the
sounds of the guns.10
The commitment by the media to embedding their reporters in Iraq has now
waned. While at one time several hundred reporters were assigned to operating
units, today that number stands at no more than 25. More than 40 media person-
nel, to include reporters, cameramen and assistants, have perished in attacks dur-
ing the War on Terror. When a newsperson is attacked, as has happened recently in
the case of Bob Woodruff and others, the story becomes their injuries and their
prognosis and not that of the American servicemen who may have died in service
to his or her nation while providing them protection. That aspect of the military-
media relationship and the related reporting has not been ignored by the American
people.
What marked the initial success of the embedding process, in my view, was the
fact that the additional experience and training provided these reporters enabled
193
The Military and the Media in Perspective: Finding the Necessary Balance
them to turn the situation into an educational opportunity for their audience.
Through their understanding of the events in the context of the operational re-
quirements of the conflict, they were less likely to resort to quick criticism, "got-
cha" reporting and wildly negative predictions. As Navy Commander Brendon
McClane has suggested in an excellent recent article in Parameters magazine, the
next step should be to bring trusted reporters into the operations center to gain a
needed context for their stories.11 While this would have to be carefully tailored de-
pending on the conflict and the sensitivity of the information, one can reasonably
conclude that reporters like Rick Atkinson, Major Garrett and Ted Koppel, with a
long history of trust by commanders, would be likely first candidates.
Access to the operations center would also give access to an understanding of
the rules of engagement approved for and employed by the force involved. Rules of
engagement, although highly classified, nevertheless provide the legal and opera-
tional roadmap for our military's response to attack, both geographically and with
regard to weapons systems and procedures. The understanding of these approved
operational procedures, which are trained to by our forces, would preclude un-
founded claims of violations, because these rules are drafted after careful review of
the legal restrictions applicable and after a careful review of the combatant status of
individuals engaged. When a civilian woman or child is acting as a combatant, the
fact that the individual no longer enjoys civilian protections should be understood
by every journalist reporting the story, even if that fact is personally distasteful.
When a civilian family is harboring a terrorist in their house who is firing on US
troops serving in Iraq and representing the interests of the democratically elected
government, as is alleged to have happened at Haditha, the reporters need to know
that the home is no longer a protected place but has become a safe haven for the en-
emy. These are the basics, but they often seem not to be within the lexicon used by
the fourth estate.
When we have reporters who understand the law, have good judgment and have
integrity, their reporting tends to be clear, more accurate and in context. When
they do not exhibit these traits, their reporting can be misleading and worse, it
tends to frustrate the military and, as we witnessed after Vietnam, preclude an ef-
fective dialogue in future military engagements.
Notes
1. See Howard Kurtz, Media vs. the Military, WASHINGTONPOST.COM, May 23, 2005, http://
www. findarticles.eom/p/articles/mi_mONTQ/is_2005_May_23/ai_nl 38 10 168 for an insightful
discussion of how this unfounded report and the similar inaccurate reporting by Dan Rather on
60 Minutes Wednesday in late 2004 concerning President Bush's Air National Guard service have
soured many Americans on the credibility of the press with respect to military reporting.
194
James P. Terry
2. Convention for the Amelioration of the Condition of the Wounded and Sick in Armed
Forces in the Field, Aug. 12, 1949, 75 U.N.T.S. 31 [Geneva Convention I]; Convention for the
Amelioration of the Condition of Wounded, Sick and Shipwrecked Members of Armed Forces at
Sea, Aug. 12, 1949, 75 U.N.T.S. 85 [Geneva Convention II]; Convention Relative to the Treat-
ment of Prisoners of War, Aug. 12, 1949, 75 U.N.T.S. 135 [Geneva Convention III]; and Con-
vention Relative to the Protection of Civilian Persons in Time of War, Aug. 12, 1949, 75 U.N.T.S.
287 [Geneva Convention IV], all reprinted in DOCUMENTS ON THE LAWS OF WAR (Adam Rob-
erts & Richard Guelff eds., 3d ed. 2000), at 197, 222, 244 and 301, respectively.
3. The text of Common Article 3 may be found in id. at 198.
4. Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the
Protection of Victims of International Armed Conflicts (Protocol I), June 8, 1977, 1125 U.N.T.S.
3, and Protocol Additional to the Geneva Conventions of August 12, 1949, and relating to the
Protection of Victims of Non-International Armed Conflicts (Protocol II), June 8, 1977, re-
printed in id. at 422 and 483, respectively.
5. See discussion in Waldmar Solf & Edward Cummings, A Survey of Penal Sanctions Under
Protocol I to the Geneva Conventions of August 12, 1949, CASE WESTERN RESERVE UNIVERSITY
Journal Of International Law, Spring 1977, at 205.
6. DOCUMENTS ON THE LAWS OF WAR, supra note 2, at 423. Article 1(2) of Protocol I states
that "civilians and combatants remain under the protection and authority of the principles of in-
ternational law derived from established custom, from the principles of humanity and from the
dictates of public conscience." Id.
7. The Gallup Poll conducted in 2005 showed a comparison of public perceptions and the
changes that have occurred in the military- media relationship since a similar poll was conducted
in 1999. The complete Gallup Poll results can be found at http://www.mccormicktribune.org/
journalism/militarymedia2005.pdf#search=%22site%3Awww.mccormicktribune.org%22 (last
visited Aug. 24, 2005).
8. See Mark Mazzetti, Dispatches from Media Boot Camp, SLATE, Nov. 18, 2002, http://
www.slate.com/id/2073993/entry/2074127/ (with the Navy); Mark Mazzetti, Dispatches from
Media Boot Camp, SLATE, Nov. 20, 2002, http://www.slate.com/id/2073993/entry/2074330/
(with the Marines).
9. Andrew Jacobs, My Week at Embed Boot Camp, NEW YORK TIMES SUNDAY MAGAZINE,
Feb. 3, 2003, at 34-35.
10. Joseph Galloway, The Military and the Media: One Man's Experience, Address De-
livered at the US Army War College (2001), recounting experiences from la Drang Valley in
Vietnam (on file with author).
11. See Brendon McClane, Reporting from the Sandstorm: An Appraisal of Embedding, PA-
RAMETERS, Spring 2004, at 77.
195
XI
National Security, the Law and the Media:
Shaping Public Perceptions
Linda Robinson*
The American news media play a significant role in shaping public percep-
tions of national security policies and their legality, and therefore have a
great responsibility to carry out their function with the highest possible degree of
professionalism. Since the September 11, 2001 terrorist attacks, many complex and
sensitive issues involving national security and the law have arisen, which have in-
creased the challenge for the news media to perform its role with diligence and ac-
curacy. Some of the cases reflect inherent tensions between principles of civil
liberties, privacy rights, due process and national security; for example when pub-
lic disclosure and debate can conflict with national security imperatives that may
require secrecy for success of a policy that aims to protect citizens. A given policy's
legality may be called into question, or there may be no settled law or legal interpre-
tation governing that policy. While media coverage of national security policies
can provoke controversy, it can also result in legislative, judicial or executive action
to clarify legal gray areas. This has been the case with detention and interrogation
policies for those captured in Iraq, Afghanistan, and in connection with the war on
terrorism. In some cases, the media is alleged to mislead the public with distorted,
partial or erroneous characterizations of national security policies or events. This
issue has arisen with regard particularly to the coverage of the war in Iraq. Media
* Senior Writer, U.S. News & World Report.
National Security, the Law and the Media: Shaping Public Perceptions
and government practices may contribute to the perception that the "full story" is
not being told. Systemic trends in the news media business have made it more diffi-
cult in many instances to meet professional standards, which have been tradition-
ally embraced but are not formally codified. Finally, a polarized and partisan
political climate in the country has contributed to a public discourse marked by
more heat than light.
The press sees itself as performing a watchdog function to protect the public's
interest and to inform the public on the vital issues of the day. It has been a hall-
mark of the news media to guard its independence and to investigate alleged
wrongdoing, particularly on the part of government and those in positions of
power. Such a predisposition should not, however, become a presumption of
wrongdoing. Journalists should aggressively pursue the facts and let them speak for
themselves. When covering national security issues, journalists may encounter di-
lemmas over handling classified information or information that may provide as-
sistance to those who would do the country harm. While there are certainly many
cases where information is overly classified with scant justification, as was ac-
knowledged in the 9/11 commission report,1 the news media have a responsibility
to carefully weigh the consequences of publishing classified information.
Two news stories amply illustrate the challenges of reporting on national secu-
rity law. The New York Times reported that the National Security Agency (NSA)
was conducting warrantless surveillance of Americans inside the United States, re-
lying on a classified legal opinion that it was legal to do so when the NSA had reason
to believe that the person was in contact with a suspected agent of a foreign power
or terrorist entity. The article reported concerns by other US officials that the pol-
icy, which was adopted after the 9/11 attacks, violated the 1978 Foreign Intelligence
Surveillance Act (FISA)2 by not obtaining warrants from the FISA court. The law
requires warrants for eavesdropping on "U.S. persons," but the policy's legal pro-
ponents considered that the executive branch has the authority needed so long as
one of the parties was outside the United States.3
In this very complicated case, there is a clear legal gray area that is now under re-
view by the Justice Department, and which was questioned by the head FISA court
judge and by some legislators who were briefed on the policy. Technology has also
evolved since the 1978 law was written and subsequently amended. Yet the admin-
istration did not seek its revision by Congress or judicial review for fear of compro-
mising the secrecy it felt the program required. The New York Times withheld
publication of some details that the executive branch argued would harm US na-
tional security interests, but it disagreed with the government's contention that the
very disclosure of the program would render it ineffective and decided to publish
the story.4 The extremely sensitive nature of the case led the executive branch to
198
Linda Robinson
restrict the explanations it offered to both the public and to Congress. In 2007 the
Bush administration decided to submit requests for surveillance warrants to the
FISA court rather than contest the legality of its program.
Another news story that generated a great deal of controversy (as well as acco-
lades, for like the NSA story, it too won a Pulitzer prize) was the Washington Post's
revelation that the Central Intelligence Agency (CIA) had been holding suspected
terrorists at secret detention sites in several countries since 9/1 1.5 The policy of ex-
traordinary renditions has been in effect since the previous decade, but in the days
after 9/11 the executive branch decided to detain US suspects outside US territory
to keep them out of the US courts' jurisdiction. Those suspects have now been re-
manded to their countries of origin or transferred to Guantanamo Bay Naval Base
in Cuba, to a US detention facility run by the US military and monitored by the In-
ternational Committee of the Red Cross. Court rulings led to legislation establish-
ing new legal processes for detainees, and military policy on interrogation tactics
has been changed to explicitly prohibit some of the practices (such as simulated
drowning or "waterboarding") allegedly used at the CIA sites.
There has been no determination in the US justice system of the legality of the
practices of rendition and secret detention, although some of the detainees are pur-
suing the matter in court. Investigations were also conducted in Europe, where
some of the secret sites were allegedly located. The exposure of a practice in which
US and foreign intelligence agencies have cooperated has led to controversy and
strains in those countries. The description of alleged coercive interrogation tech-
niques by the CIA also coincided with the ongoing controversy over interrogation
and detention practices in Iraq. The abuses of detainees at Abu Ghraib prison in
Iraq, as recorded on digital photos that a US soldier turned over to investigators,
led to prosecution of some of the US soldiers involved. The photos had already
been circulating among soldiers, but the publication and dissemination of them
caused widespread outrage and attention to the issue. Investigations and congres-
sional hearings brought to light many of the administrative and policy shortcom-
ings that contributed to the occurrence of the abuses. While the issuance of new
rules for detention and interrogation practices may help prevent recurrences and
mitigate the perceptions created abroad, the Abu Ghraib scandal and the wide cov-
erage it received remains one of the symbolic events of the Iraq war.
There have been criticisms more generally that the press coverage of the Iraq
war has been inaccurate and has undermined Americans' support for the war. In
addition, US officials have been frustrated in their efforts to respond to the very
effective use of media by adversaries in Iraq and in the al Qaeda movement. Their
pronouncements and their videotapes of attacks on US soldiers or of their cap-
tives quickly find their way onto the Internet and the airwaves, enabling the
199
National Security, the Law and the Media: Shaping Public Perceptions
adversaries to disseminate their message and, in many instances, give the first ac-
count of events.
Regarding the quality of American news coverage of the war in Iraq, the allega-
tion of bias in coverage can be partly attributed to a "shoot the messenger" phe-
nomenon, since the war effort has been bedeviled by numerous setbacks and errors
of commission and omission. In this reporter's judgment, however, the media can
also be fairly criticized for emphasizing violent attacks over less salacious and often
positive events such as reconstruction efforts. But the more serious lapses have oc-
curred either through media ignorance of military affairs or a failure to seek and
weigh all the relevant data and analyses to produce in-depth, comprehensive ex-
aminations of the war's conduct. The public policy debate would greatly benefit
from more sustained efforts to understand what is an extremely complicated con-
flict that has eluded easy answers.
The US government, including the US military, has lamented that it is losing the
"battle of ideas" and that it often has a much longer response time than its adver-
saries. Frequently, the decision-making chain regarding release of information is
long and cumbersome. Yet the military in particular has adopted some effective
policies that help provide news media with access to the battlefield, senior officials
and other events and voices that merit coverage. Embedding media with military
units has provided journalists with firsthand information that they cannot obtain
elsewhere. While the process of embedding media has been criticized by some as a
means to control journalists, in this reporter's experience, the ground rules im-
posed primarily restrict the timing of news dispatches to protect operational secu-
rity and, in some instances, specific tactics whose effectiveness would be
compromised by detailed description. In any event, embedded reporting provides
one avenue for reporting and should not be the sole means of news gathering. US
commanders have in some cases taken extraordinary steps to provide access or in-
formation, allowing selected reporters wide access to battlefields and commanders'
deliberations. In one case the commander of the Multi-National Force-Iraq re-
leased video footage of a Predator that was tracking insurgents in order to provide
fuller news coverage of an attack on the US embassy in Baghdad, when the partial
coverage had led the news media to dwell on the attack even after its perpetrators
had been identified and apprehended.6
Providing more access and information often helps the press produce better in-
formed and more in-depth coverage and analysis, provided that it invests the necessary
time to take advantage of the opportunity for sustained research. Unfortunately, many
pressures within the news business today militate against such "best practices." At
times the news media is driven by competing pressures, and while journalists should
200
Linda Robinson
always insist on the time and resources to do work that meets professional standards,
they can be forced into less than ideal compromises.
There are several developments and trends that affect the nature and quality of
news gathering and interpretation, many of which are not widely known or under-
stood outside news media circles. Some of the country's largest newspapers, which
have suffered declining circulation, have been sold or are for sale. The quest for
continued double-digit profit margins continues despite the fact that revenues are
shrinking along with advertising bases. Most notably, the number of personnel and
the size of budgets for news gathering have declined markedly in the past decade.
Foreign news gathering has been de-funded to a significant degree. News organiza-
tions now rely more heavily on contract and freelance personnel known as "string-
ers" and "fixers" and contract video footage. These contract personnel, who are
sometimes foreign nationals, may not have the same training, experience or pro-
fessional standards that prevail in the mainstream US media.
Even as personnel have been reduced, the demand for output has grown. The
evolution of the media has produced more outlets that have to be supplied with
news "content": typically a journalist will file stories to his or her primary publica-
tion or broadcast show, but be required as well to supply stories to one or more
websites, blogs, newsletters, and commentary or analysis to other media outlets
which may be owned by the parent company or merely as part of the growing phe-
nomenon known as "media convergence." Fortunately, senior reporters at na-
tional publications can often secure the time and resources necessary for complex
and sensitive stories, but the pressures are real and growing. The rise of 24-hour ca-
ble news and now the Internet's proliferating platforms have created enormous de-
mand for "content" which must be supplied and updated regularly.
Commentary frequently fills this demand since it costs virtually nothing to pro-
duce, compared to reported content. All "expert" opinion is not equal, however,
and often the commentators do not fully understand the complex issues on which
they speak. Ratings pressures can also feed this tendency toward opinion journal-
ism, which was ushered in by the rise of talk radio stations. While the news media
have always included columnists and editorials, which feature opinions, some
practitioners feel that opinion and bias can creep into news coverage if reporters
and editors are not vigilant in maintaining the traditional distinction between re-
portage and opinion writing.7
Americans' sources of information have diversified in the past decade, but the
traditional news media remain a primary source of and conduit for information,
analysis and commentary about national security issues, even as nontraditional
media such as blogs and webzines continue to grow. The continuing influence of
the "mainstream media," particularly large-circulation daily newspapers, national
201
National Security, the Law and the Media: Shaping Public Perceptions
newsmagazines and network and cable news is such that they play a powerful role
in framing the national debate, defining top news stories and shaping public opin-
ion through the approaches they take to these stories. In cases where the news me-
dia breaks a story, they single-handedly inject a new topic into the national debate
and force others to react to the issue as framed by the media. The tremendous in-
fluence that the news media wields makes it incumbent on them to practice their
craft according to the highest standards of professionalism. If the media is per-
ceived as inaccurate or biased, it will lose credibility and find its ability to perform a
useful societal function greatly diminished.
Notes
1. 9/11 Commission Report: Final Report of the National Commission on Terrorist At-
tacks Upon the United States (2004), available at http://www.9-llcommission.gov/report/
911Report.pdf.
2. 50 US Code sec. 1801-1811 (2000).
3. James Risen & Eric Lichtblau, Bush Lets U.S. Spy on Callers Without Courts, NEW YORK
TIMES, Dec. 16, 2005, at Al.
4. Id.
5. Dana Priest, CIA Holds Terror Suspects in Secret Prisons, WASHINGTON POST, Nov. 2,
2005, at Al.
6. Thomas F. Metz et al., Massing Effects in the Information Domain: A Case Study in Aggres-
sive Information Operations, MILITARY REVIEW, May-June 2006, at 2.
7. John Carroll, then editor of the Los Angeles Times, expressed this concern in an internal
memo that he sent to his editors on May 22, 2003, which was widely commented on in media cir-
cles. The memo is available at www.laobserved.com/carrollmemo.html (last visited Jan. 22,
2007).
202
PARTY
LUNCHEON ADDRESS
XII
Luncheon Address
International Legal Public Diplomacy
John B. Bellinger III
*
From the beginning of this Administration, Secretary Rice has made very clear
to me that, in addition to providing first-rate legal advice to the State Depart-
ment's officials, she expects the Office of the Legal Adviser to play a key role in our
public diplomacy dialogue. Secretary Rice is aware that the historic commitment of
the United States to international law and the rule of law has been questioned after
September 11th, and she has personally and repeatedly reaffirmed our respect for
and adherence to the rule of law, and our strong commitment to meeting our inter-
national legal obligations. "The United States," she has said, "has been and will
continue to be the world's strongest voice for the development and defense of in-
ternational legal norms." She said that we respect our international legal obliga-
tions and international law and we will continue to do so. And, apropos for today's
discussion, she added this: "We're going to continue to make that very clear to the
world."
Secretary Rice has asked me to ensure that I and my staff play a lead role in this
effort, as we work to garner support around the world for US positions. I have
therefore made it one of my top priorities as Legal Adviser to ensure that we effec-
tively communicate our message to the rest of the world so that the international
community understands our commitment to international law and the rule of law,
Legal Adviser to the Secretary of State of the United States.
International Legal Public Diplomacy
as well as the carefully considered legal bases and rationales underpinning policy
decisions made by the United States.
Countering Myths
This task is not always an easy one. We hear increasingly that the United States is
not strongly committed to international law and international institutions. We
hear that the United States acts "lawlessly" on the world stage. The United States
refused to ratify the Kyoto Protocol. We "unsigned" the Rome Statute. We with-
drew from the ABM Treaty. We went to war in Iraq without a legal basis under in-
ternational law. And we have violated the Geneva Conventions by holding
terrorists in Guantanamo without giving them lawyers or charging them with
crimes. This is a troubling pattern of criticism, but US experts in international and
national security law, including the lawyers in my office and many of you, are well
positioned to explain why none of these acts were "lawless" and why many of these
criticisms are simply wrong.
Of course, there are some challenges in public legal communications that do not
necessarily exist with respect to our public communications generally. We need,
for example, to maintain applicable legal privileges and cannot therefore always
discuss exactly how we came to a particular position. Moreover, while legal strate-
gic communications is about persuasion and listening, our commitment to stating
the law correctly provides a firm limit to what we can say. Likewise, we are not al-
ways able to counter the facts underlying a legal debate because we cannot discuss
information that could compromise the success of intelligence, law enforcement
and military operations. This dilemma has made the job of explaining our legal po-
sition on renditions particularly difficult. Before asserting legal positions, we also
need to consider carefully whether and how this might prejudice future policy po-
sitions or options. For example, one difficulty with publicizing lawful interroga-
tion techniques to help address concerns of allies is that this public disclosure
might facilitate terrorists' training activities.
Another challenge unique to legal communications is identifying and respond-
ing to policy differences that are recast as disputes about law. The United States is,
for example, often criticized for not supporting international law because it failed
to sign or ratify a treaty. This happened with respect to the Kyoto Protocol, which
the United States did not think was sound public policy and would harm the US
economy. The decision not to ratify the Protocol was made on that basis and per-
fectly legal under international law.
With that background, I want to describe some of the specific public diplomacy
efforts of the Office of the Legal Adviser, and I hope to encourage the US military
206
John B. Bellinger III
and other government lawyers and officials participating in this colloquium to en-
gage in strategic dialogue about important legal issues as part of your work in the
international arena. President Bush has said that public diplomacy is the job of
every member of his Administration, and has directed Under Secretary for Public
Diplomacy and Public Affairs Karen Hughes to ensure that every agency and de-
partment gives public diplomacy the same high level of priority that he does. By
talking more clearly — and more often — about our legal positions, as Secretary Rice
has said we must do, we can dispel myths, correct misunderstandings, and share
and communicate some of America's most basic values.
The Broader Context
The State Department's overall communications strategy involves three strategic
imperatives. Our first objective is to offer people throughout the world a positive
vision of hope that is rooted in America's belief in freedom, justice, opportunity
and respect for all. President Bush and Secretary Rice have emphasized that people
around the world should know that we stand for human rights and human free-
dom everywhere. Second, we seek to isolate and marginalize violent extremists and
confront their ideology of tyranny and hate. One of the chief ways we do this is by
undermining the efforts of extremists to portray the United States and the West as
in conflict with Islam. We work to empower mainstream voices and demonstrate
respect for Muslim cultures and contributions. Finally, we seek to foster a sense of
common interests and values between Americans and people of different coun-
tries, cultures and faiths throughout the world.
Work of the Office of the Legal Adviser
Communications about our legal positions are an important part of the Depart-
ment's overall strategy. Some of the key communications challenges in our war
with al Qaeda and the Taliban, and the conflict in Iraq, illustrate the point. For ex-
ample, my office has had a central role in explaining the legal basis for our deten-
tion operations in Guantanamo and Iraq. We have also responded to the terrible
abuses at Abu Ghraib and recent allegations of misconduct by US Marines at
Haditha. More generally, I have personally participated in numerous meetings,
conferences, symposia and similar gatherings in the United States and abroad re-
garding important legal topics relating to the conflict with al Qaeda and other is-
sues, and I have led several delegations of US government officials to international
conferences in Geneva.
207
International Legal Public Diplomacy
In each of these instances, I and my staff talk about the law to help our counter-
parts in ministries of foreign affairs around the world, as well as international orga-
nizations, non-governmental organizations, opinion makers and the public,
understand our legal rationales and, in nations that lack a strong rule of law tradi-
tion, to help people understand the importance of law in forming good policy. At
the same time, we listen to what colleagues, opinion makers and the general public
around the world are saying about the law. By listening to their views and paying
attention to their concerns, we show respect for them and we ultimately provide
better advice to our clients.
Detention Operations
Let me turn to my first example of how the Office of the Legal Adviser has engaged
in public diplomacy to advance the Department's overall communications strat-
egy, namely our central role in explaining the legal basis for our detention
operations.
The Office of the Legal Adviser is clearly aware of the concerns people have
raised with respect to our detention operations, especially the detention facilities at
Guantanamo Bay and our rendition of terrorists in limited circumstances. I have
personally engaged directly with my counterparts around the world to explain our
legal positions on these matters and to discuss our shared interests in preventing
terrorist attacks, gathering intelligence and bringing terrorists to justice. I have
traveled to numerous European capitals to meet with legal advisers and other rep-
resentatives from foreign ministries, the EU and international organizations, and
conducted press events and roundtables with those that have a key influence on
public opinions and policies. My main goal has been to explain more clearly the le-
gal bases for our detention activities and address the legal concerns that have been
raised over the last few years, including by our friends and partners. To do this, I
have had to do three main things. First, I have explained with specificity how the
US government complies with its Constitution, its laws and its international legal
obligations in its detention activities. Second, I have worked to clarify misconcep-
tions about various decisions by our government as well as misunderstandings
about various aspects of international law and the Geneva Conventions. Finally, I
have emphasized that the US government recognizes that many issues relating to
our detention of captured enemy fighters remain a matter of concern in Europe,
and elsewhere, and promised to talk more often and more clearly about the issues;
at the same time, I have asked that responsible officials and commentators in Eu-
rope promote more balanced discussion within their own nations, among them-
selves and with the United States about the issues.
208
John B. Bellinger III
With respect to compliance with our legal obligations, it has not been enough
for me to reiterate that the US government complies with its Constitution, its laws
and its treaty commitments in its detention activities. I have spent many hours sit-
ting with lawyers, officials, reporters and commentators explaining the various US
criminal laws and international legal obligations that prohibit torture, and describ-
ing how US courts have interpreted those laws in specific circumstances. Likewise,
I have talked about specific cases of unlawful treatment of detainees and described
how the United States vigorously investigated and, where the facts have warranted
it, prosecuted and punished those responsible. Unfortunately, it is easy to capture a
criticism about a complex legal matter in a pithy sound bite — "prisoners linger in
Guantanamo no-man's land" or "US torture camp at Guantanamo" — but it re-
quires paragraphs of explanation to describe how the United States is, in fact, com-
plying with its legal obligations.
In each of these discussions I emphasize that, even if I cannot persuade my lis-
teners that the position of the US government is clearly correct, at least there is
"method" to what some perceive as our "madness," and that the positions we have
taken are legally defensible.
One particular area that has been largely misunderstood by Europeans is the
way in which the United States applies the Convention Against Torture's prohibi-
tion against sending a person to a country "where there are substantial grounds
that he would be in danger of being subjected to torture." The European Court of
Human Rights has interpreted this prohibition such that it is impermissible for
members of the Council of Europe to remove a person to a country where that per-
son might be tortured. Our Senate, on the other hand, has opted for a standard that
it is impermissible to remove a person to a country where it is "more likely than
not" that that person would be tortured. Both of these standards are valid and each
ensures compliance with the relevant Convention Against Torture obligation.
It has been extremely helpful to describe our standard in detail to my European
colleagues and to explain that our standard emerged from a democratic process
when our Senate ratified the Convention Against Torture in 1990 and was not de-
veloped by this or any other Administration. Many Europeans have been receptive
to the point that our standard, although different than theirs, was carefully consid-
ered, promulgated by our Senate and intended to fulfill our obligations under the
Convention. Also, I have emphasized that we share common values — above all
a prohibition on torture and on cruel, inhuman or degrading treatment of any
detainee — and common objectives in our counterterrorism efforts, including
gathering potentially life-saving intelligence from captured terrorists. And, I have
pointed out that we have foiled a number of deadly plots against cities and citizens
209
International Legal Public Diplomacy
in Europe and elsewhere as a result of our law enforcement and intelligence
cooperation.
Another area of concern with respect to our detention activities has involved
our use of the concept of unlawful combatants. Certain academics and others have
asserted that the term is not found in the Geneva Conventions but rather was in-
vented by this Administration. I consistently point out that these criticisms are
wrong: the concept of unlawful combatants is well recognized in international law
by courts, in military manuals and by international legal scholars. By citing specific
historical examples of the use of the term unlawful combatants and showing that
the United States did not simply make up this term for its own purposes, I have
persuaded many European colleagues that the term does, in fact, describe a long-
standing category of actors. Some of these colleagues, of course, continue to dis-
agree with our application of the concept, but they know that our legal analysis is
rigorous and that we are genuinely concerned with ensuring that our detention ac-
tivities comport with all of our relevant legal obligations.
Another important misconception that I have tried to correct involves Presi-
dent Bush's signing statement in bringing into law the Detainee Treatment Act, the
legislation that includes the well-known McCain Amendment. The President's
signing statement included a standard statement indicating that he would interpret
the Act consistent with his authorities under our Constitution. Critics argue, and it
has almost become urban legend, that the President's statement "proves" that he
intends to rely on his constitutional authority to ignore the McCain Amendment.
In response, I point out that the President's signing statement reflects a frequently
used executive branch position about the execution of laws within the context of
the President's constitutional responsibilities, and was not meant to indicate that
the President planned to ignore the provisions of the Act.
Our detention activities involve complex legal questions and people around the
world have raised concerns about those activities. Often, our job is not so much a
matter of explaining the Geneva Conventions or international legal principles,
about which foreign audiences tend to be reasonably well informed — albeit some-
times with different views — as it is about communicating our commitment to
those principles and explaining clearly US law and the bases for our legal decisions
and practices. We talk about how US law comports with our international legal ob-
ligations, how US legal positions are well considered by all branches of our govern-
ment, and we offer alternative explanations for what may seem to be substantive
legal differences. When people understand our strong commitment to treating de-
tainees in accordance with our constitutional, statutory and international legal ob-
ligations, they understand that we stand for the proper treatment of all people in all
contexts.
210
John B. Bellinger III
Abu Ghraib and Haditha
A second example of how the Office of the Legal Adviser has engaged in public di-
plomacy to advance the Department's overall communications is our work in re-
sponding to the terrible abuses at Abu Ghraib and recent allegations of misconduct
by US Marines at Haditha.
I have personally engaged in outreach on both of these subjects at home and
abroad, in coordination with the Department of Defense and other relevant agen-
cies, and people have appreciated hearing candidly from the State Department's
Legal Adviser that the United States takes these incidents very seriously, acts on
them promptly, investigates thoroughly and holds the wrongdoers accountable for
their actions. We know that one of the great strengths of our nation is its ability to
recognize its failures, deal with them and act to make things better. When we ex-
plain that we continue to do just that in the war on terror, we reaffirm one of our
most basic values for people around the world. In addition, as a practical matter,
lawyers play an important role in responding to events like Abu Ghraib and
Haditha because we can discuss with authority the specific legal procedures to in-
vestigate the incidents and prosecute wrongdoers. Since extremists take full advan-
tage of incidents like Abu Ghraib and Haditha to portray the United States as evil,
only rhetorically concerned about human rights and in conflict with Islam, we
undercut the terrorists' efforts by addressing abuses and allegations head-on and
describing our investigative and prosecutorial procedures.
With respect to crises like the abuses at Abu Ghraib and the allegations of mis-
conduct at Haditha, one of the most important elements of our communications
strategy is speed. In an age of mass media and electronic communication, the
United States is competing for attention and credibility in a time when rumors can
spark riots and protests, as we saw in connection with the inaccurate Newsweek
report regarding a US soldier flushing a Koran down a toilet, and information,
whether it is substantiated by facts or based on mere rumors, spreads instantly
around the world and across the Internet. In these circumstances, we need to act
quickly to counter misinformation and undermine the efforts of extremists to por-
tray us as evil.
One of the key ways we achieve speed at the State Department is through our
rapid response unit, a recent initiative of the Secretary and Karen Hughes. Early
each morning our rapid response unit meets to determine what the critical media
issues for that day are around the world and what our strategy should be to respond
to them. Our lawyers work closely with the rapid response unit to ensure legal is-
sues are properly addressed and that the legal bases for our positions and decisions
are accurately and appropriately communicated.
211
International Legal Public Diplomacy
Whether we are responding to a crisis like Abu Ghraib or Haditha or working to
explain our legal positions to audiences around the world, talking directly to the
press is an important element of our communication strategy. The media plays an
important role in shaping perceptions around the world so, just as it is necessary to
meet privately with government officials, NGOs and opinion makers, we need to
speak publicly to the press to explain our positions. Outreach to Arab media has
been especially important after September 1 1th and I have reached out to them, and
the foreign press center generally, as often as possible during my tenure. The foreign
press, including Arab media like al- Jazeera, has been very receptive to hearing our le-
gal positions and replaying them in the Arab and Muslim world and elsewhere.
Delegations and Meetings
Before closing, let me briefly touch on the final example where I and my staff en-
gage in public diplomacy as an important part of the Department's overall com-
munications strategy — an example that actually cuts across all of our legal public
diplomacy efforts. In addition to the strategic dialogues about critical issues of mu-
tual interest with my European colleagues that I mentioned, I have made it a prior-
ity, at the urging of Secretary Rice and Under Secretary Hughes, for me and my
staff to talk more often and more clearly about legal matters around the world. We
look for opportunities and have increased our budget to attend meetings, confer-
ences, symposia and similar gatherings to listen carefully to our colleagues; show
respect for important issues and international law and institutions generally; ex-
plain clearly the legal bases for our policies and actions; and advocate forcefully
to convince other nations to cooperate with us and live up to their own
commitments.
Since becoming Legal Adviser, I have spoken at events hosted by the American
Society of International Law, the American Bar Association, the Atlantic Council
of the United States, George Washington University Law School, Princeton Uni-
versity and other institutions. Last year, I spoke at the Round Table on Current
Problems of International Humanitarian Law in San Remo, Italy, which is the pre-
mier conference in the field. I have invited numerous groups and colleagues from
around the world to the State Department to discuss critical issues of mutual inter-
est. Whenever possible and appropriate, I have tried to involve the Secretary and
other colleagues in our international legal public diplomacy efforts. Many of you
might have heard or read the Secretary's remarks at the last two Annual Meetings
of the American Society of International Law, the American Bar Association's re-
cent Rule of Law Symposium in Washington, DC, or the Diplomatic Reception of
the Washington Foreign Law Society at the State Department last year.
212
John B. Bellinger III
I have led two delegations to international conferences in Geneva to work to en-
able the Israeli national society, the Magen David Adorn, to join the International
Movement of the Red Cross and Red Crescent. In May 2006, 1 led another delega-
tion of senior US government officials to Geneva where we presented our second
periodic report to the UN Committee Against Torture, and then responded to the
Committee's subsequent report, which contained its main findings and recom-
mendations to the United States.
The Office of the Legal Adviser's leadership of the delegation to the UN Com-
mittee Against Torture is an excellent example of how the Department's lawyers
contribute to the Department's overall communications strategy by effectively
participating in meetings, conferences and delegations around the world. We pro-
vided the Committee with an extensive report and thorough answers to the many
questions they posed, demonstrating our commitment not only to fulfilling our
obligations under the Convention Against Torture, but to engaging in a productive
dialogue with the Committee. Moreover, by sending a high-level delegation to
Geneva to present our report and engaging in a dialogue with the Committee, we
demonstrated our respect for our obligations under international law and our
commitment to the Convention's principles.
Conclusion
Our legal public diplomacy efforts have not gone unnoticed. Following our Con-
vention Against Torture presentation, for example, the Economist newspaper de-
voted an entire article to describing "some welcome signs of a change of tone from
the Bush administration." They commended our delegation for fielding tough
questions on the treatment of detainees with unusual candor and even deference,
and cited our discussion with European colleagues on renditions and other deten-
tion issues. The Economist was unwilling to applaud our policies, but they were
willing at least to say that "public relations are improving."
I hear time and again from people around the world that they are grateful for
our increased dialogue about critical matters of law — even if we only agree to dis-
agree in some cases, the dialogue is essential. People want to know what we stand
for and why. And if we do not tell them, our critics — or worse, extremists — will tell
them for us. This is why I and my staff will continue to work to communicate effec-
tively our message to the rest of the world so that the international community
understands our commitment to international law and the rule of law, as well as
the carefully considered legal bases and rationales underpinning our actions. I en-
courage each of the US military and other government lawyers and officials — or
future lawyers and officials — here to review your own work and consider how you,
213
International Legal Public Diplomacy
too, can play a role in our public diplomacy dialogue. As the President has said,
public diplomacy is an important part of each of our jobs. We each need to see our-
selves as international diplomats as we conduct our work.
214
PART VI
CHALLENGES OF
STRATEGIC COMMUNICATIONS
XIII
Strategic Communications and the Decline of
US Soft Power
Gene E. Bigler*
Abstract
Four strategic communications practices tend to build on one another in con-
tributing to the widely noted and continuing decline in US soft power. First
is the problem of inattention to audiences. By neglecting them as we prosecute the
war on terrorism, the war of ideas seems to swell more with critics and combatants
than allies. Second, recent approaches to strategic communications tend to em-
phasize process and consistency in uniting messages, but the role of the national
executive in achieving convergence maybe more crucial. That is, sending identical
or even reinforcing messages may not be as important as making sure that the mes-
sages are consistent with audience expectations about US policy. Third, Depart-
ment of State (DoS) financing for public diplomacy has increased only
incrementally, if that, while the Department of Defense (DoD) weight in the total
flow of strategic communications, as in foreign policy generally, seems to have es-
calated along with its budget. The continuing deterioration of opinion suggests
that the mix of communications is not working, and it certainly contradicts expert
advice on the resources needed for public diplomacy.
Finally, the growing concern about the militarization of US foreign policy may
reflect the rejection of the "military as messenger" for the United States, even if
* Visiting Professor-Practitioner of International Relations, University of the Pacific, Stockton,
California.
Strategic Communications and the Decline of US Soft Power
civilians actually make the policy. The US affirmation of the preemptive use of
force puts the military at the forefront of US strategic policy, just as the conflicts in
Afghanistan and Iraq have overwhelmed and tended to color the perception about
the rest of our policy. Thus, the increasingly dominant role and resource endow-
ment of DoD in strategic communications might actually worsen the impact on US
soft power. While general flaws in US policy and deficiencies in the work of DoS
may also contribute to the deterioration of America's international image, recent
experience suggests that DoD dominance of strategic communications, and of for-
eign policy in general, may be increasingly responsible for the deterioration of US
international standing.
Opinions of the United States and American Soft Power
Continue to Decline Together
Notwithstanding the global outpouring of sympathy for the United States follow-
ing the September 11, 2001, terrorist attacks on the World Trade Center and the
Pentagon, many observers noted a downturn in public support for the United
States during 2002 that reflected widespread deterioration in opinions of the
United States. The Pew Research Center for People and the Press reported in De-
cember 2002 that images of the United States had become increasingly tarnished
in the publics of NATO allies, former East European nations, developing nations
and especially Muslim nations and on a variety of dimensions.1 That report went
on to detail how pluralities had become critical of American unilateralism, but
this did not extend to rejection, except in Muslim nations, of the approach the
United States was taking to the war on terrorism. On the other hand, the report
was prescient in recognizing that a potential war with Iraq might "further fuel
anti- American sentiment."
As the Pew Center expected, important policy actions, such as the invasion of
Iraq, apparently caused a further deterioration in opinions of the United States. At-
titudes, even among allied nations, toward the US approach to the war on
terrorism also turned sharply negative, and despite some break in the trend during
2005, the overall slide in global opinion of the United States continued to worsen
and spread.2 Of course, this is a heavily nuanced phenomenon, and lots of other
variables and the particular circumstances of each nation are important. This is
also characteristic of the factors which are closely related to soft power, a nation's
ability to attract and persuade others. Opinions are really a snapshot of people's
orientations at a specific moment in time.
Professor Joseph S. Nye, Jr., and a number of others have shown that soft power
is also highly situational.3 While acknowledging the influence of other factors that
218
Gene E. Bigler
contribute to anti-Americanism and the decline in soft power, Nye's perspective
concurs with the observation of Australian foreign policy commentator Paul Kelly
that:
[T]he lesson of Iraq is that the US's soft power is in decline. Bush went to war having
failed to win a broader military coalition or UN authorization. This had two
consequences: a rise in anti-American sentiment, lifting terrorist recruitment; and a
higher cost to the US for the war and reconstruction effort.4
Besides the loss of soft power to influence the situation in Iraq, the growing anti-
Americanism and deterioration in opinions of the United States will influence our
soft power in other contests as well. For instance, recent research on human rights
shows that majorities in such allied nations as Great Britain and Germany no lon-
ger see the United States as an effective advocate of human rights.5 Without enter-
ing into details, it is not surprising to hear corridor concerns and read blogger
speculation about declining US soft power as a contributor to such differing for-
eign policy problems as cooperation in managing nuclear confrontations with Iran
and North Korea, the improvement of multinational peacekeeping and humani-
tarian operations in Darfur, or even the advancement of America's trade agenda.
This forum is not the place for a full exegesis of the way in which public diplo-
macy, strategic communications and propaganda are intertwined in wielding soft
power. The broad tendencies of interest here and the degree of consensus about the
interconnectivity among them was manifest in the use of a common frame of refer-
ence for our conference discussions provided in a timely article by Linda Robin-
son.6 In that article, Robinson describes a visit Secretary of Defense Donald
Rumsfeld made to the Army War College in March 2003 in which he lumped all
these concepts into a broad "war of ideas" in which he believes America is doing a
very poor job: "If I were grading, I would say we probably deserve a D or D plus as a
country as to how well we're doing in the battle of ideas that's taking place in the
world today. . . ."7
Not surprisingly, Secretary Rumsfeld has followed up his expression of con-
cern with some specific actions to study and improve the strategic communica-
tions morass in which America has been entrapped for several years. In this re-
gard, his reaction has been concrete and definitely action oriented because of his
executive authority, but the realizations that prompted his action are not dissimi-
lar to the concerns that motivated the production of over thirty studies and rec-
ommendations within the US government over the last few years to address the
problem of public diplomacy. Nor indeed has DoD been alone in trying to deal
with the issue. In fact, prior to the recent actions in DoD, much of the effort had
219
Strategic Communications and the Decline of US Soft Power
been concentrated at DoS through the appointment of high profile individuals to
take charge of the public diplomacy effort. Prominent advertising executive
Charlotte Beers was appointed under secretary for public diplomacy and public
affairs in December 2002. She was followed by former State Department spokes-
person Margaret Tutwiler, and then after a two-and-a-half-year vacancy, the presi-
dent called on his campaign and White House communications adviser Karen
Hughes to take the job and launch yet another reform effort in the fall of 2005.
In 2006, Secretary Rumsfeld proposed some important new initiatives, many of
which will only get under way as this volume is being published. Despite the good
intentions of all those involved (and in which the author was also personally en-
gaged until July 2005), the hypothesis that informs this analysis is that the new stra-
tegic communications effort in DoD may, as we have seen to a certain degree with
the increasing efforts and new leadership at DoS, actually be prelude to further
worsening of the US image and a greater loss of soft power. It may even be possible
that the increasing effort in strategic communications at DoD will actually aggra-
vate and further spread and deepen America's soft power problem. As suggested by
the Pew study in 2002, 8 the fundamental problem is one of policy. This analysis
takes that idea a step further by demonstrating that a fundamental part of the pol-
icy problem centers on the increasing visibility and ubiquity of the military in
America's global communications. Indeed, this may be increasingly at the root of
America's loss of soft power as we shall see later.9
Audience May Be as Crucial as the Message
As mentioned previously, policy is the crucial issue for the deterioration in opin-
ions of America and American soft power.10 Yet strategic communications plays an
important role, and despite the increasing overall effort put forth by the United
States, a good deal of the effort may even be counterproductive. One of the key
problems is simply an inattention to audiences or attention to the wrong audi-
ences, especially at the highest levels of government. Implicitly, the US Executive
Branch and Congress appear to have decided that they don't care about the opin-
ion of most of the English-speaking world and traditional American allies in West-
ern Europe. Congress has pushed for, and the Executive has complied with, the
drastic reductions of public diplomacy spending, cut back or transferred out per-
sonnel, and curtailed the broadcasting of the Voice of America to countries that
have been traditional friends and allies. Not surprisingly, opinions of the United
States have declined markedly in most of these countries. Expanding private-sector
communications, increasing tourism and trade, and even the popularity of
220
Gene E. Bigler
American films and TV shows obviously does nothing to stem nor reverse this in-
creasing trend.
The private sector has, however, helped us understand and become more aware
of just how bad the opinion trends are because they have learned, especially from
the once path-breaking work on global public opinion performed by the United
States Information Agency (USIA), that tracking what people think around the
world is important. The Office of Intelligence and Research (INR) in DoS inherited
this tradition, and it continues to do technically respected, policy relevant research,
but not much of it in comparison to yesteryear.11 Today, there is a lot more publicly
available data in the private sector on how German or Italian or Spanish or Latin
American attitudes toward the United States are changing, so at least we do have a
broad sense of what's happening.12
The problem for policy is that these private studies provide only a tiny window
on the broad trend in audience opinions. The research needed for the formulation
of a communications strategy is much more complicated and expensive. INR still
does some of this research, but rather than showing the way to the private sector,
the work that INR does now on DoS's global audiences is just a fragment of what is
done for most international private- sector marketing campaigns or in presidential
elections in many countries. Candidates for governor or senator in most states
have far more research resources available for shaping their campaigns than do US
embassies in important posts over a two- or three-year span. Most of the studies
about improving public diplomacy place a lot of emphasis on the need for more
public opinion and other types of audience research, but overall funding for re-
search has increased only incrementally over the last few years. The funds that are
available have been concentrated much more on the Middle East and a few other
priority regions and, even with the increases, the overall effort and systematic at-
tention to audiences in the US government has declined greatly since the Cold War
began to wind down.
The audience problem has also become more complicated because of changing
technology. Without entering into detail, it has to be recognized that speeches de-
livered by the president and other high administration officials are often intended
more for a domestic audience than overseas publics. However, words intended to
arouse patriotism in the United States often have different, if not always opposite,
effects overseas, but virtually any speech or op-ed piece or other public position
taken by senior American officials is often disseminated more widely outside the
United States than in and is readily available for hostile exploitation. For many in
the Middle East, the "war of ideas" to which many US officials have made reference
has been misunderstood, and partly because it has been wickedly portrayed, as a
confrontation with Islam itself. In the context of a war on terrorism in which the
221
Strategic Communications and the Decline of US Soft Power
support of foreign publics is vital, the need for more cautious and restrained rheto-
ric at home is obvious.
Technology complicates the issue further, especially in Iraq and Afghanistan
where the United States has suddenly opened the doors, not just to freedom, but to
a media diversity that those people have never before experienced. Saddam
Hussein used nearly universal access to terrestrial TV broadcasts, while repressing
radio, satellite TV, computer/Internet and every other form of media access, to
dummy down and shape the information that people had in his "brave new
world." The freedom provided by the United States after the invasion included a
sudden explosion of exposure to information and the right to opine that the Iraqis
love, as shown by the meteoric spread in the use of satellite TV and their high par-
ticipation rates in polls and election turnout. Whenever even a few hours of elec-
tricity could be had, the availability of inexpensive satellite dishes also brought
Arab, Iranian and lots of other new media sources. Afghanistan also opened up
dramatically in comparison with the past, albeit the geographic, economic and
other limitations are much more severe than in Iraq so the opening has not been
nearly as pervasive.
Still another dimension, and in the long run in Iraq and Afghanistan perhaps the
most serious of the audience problems, is that insurgents intermingle with other
groups of people ranging from the actual supporters of enemy combatants to sympa-
thizers with the United States. In these nations and those on the margin of every con-
flict, DoS and elements of DoD are separately engaged, have different missions and
separately conduct political communications operations in the same arena and ad-
dress overlapping populations. This is much less a problem of DoS than it is for
DoD and our military units in the field because the nature of the DoS message is, in
fact, public diplomacy. The intention is to be persuasive, arouse sympathy, create
goodwill and so on. For military units, much of the time, the purpose of the unit's
presence is combat or combat support or force protection. All these missions, by
their nature and before there is any communications per se, at least partially convey
a message of potential threat and danger. By early 2004, polls in Iraq consistently
showed that most Iraqi people did not want the United States to withdraw forces be-
cause of their fear of anarchy, but they also didn't want them anywhere nearby be-
cause of the danger of those forces being targeted or engaging in combat.
This paper cannot do more than raise a serious concern about the audience is-
sue in combat zones, but experience in Iraq also suggested that we may not have
paid as close attention to the importance of not contaminating messages to the
noncombatant population with those actually intended for the enemy. Discussions
with officers involved in information operations in Iraq first raised this question,
especially when hostilities became particularly widespread or prolonged in a given
222
Gene E. Bigler
area. After all, at both the practical level and conceptually, in a combat zone, the
overriding mission of the armed forces is the application of force to subdue the en-
emy, not win hearts and minds.13
Evidence for the difficulty of separating out this condition conceptually is fairly
common in the military literature and suggests that operationally the difficulty
would be much greater. For instance, a thoughtful article by William Darley on the
application of Von Clausewitz's traditional war theory to information operations
fails to distinguish at all between the mission of compelling an enemy and the
problem of that enemy being in the midst of a population that we seek to make our
friends. That is, in writing about examples related to Desert Storm where the
United States was and departed as an invading force, he fails to mention the all per-
vasive distinction of our having become an occupying power trying to befriend the
Iraqi people as we are during Operation Iraqi Freedom.14 In another far more com-
plex study that centers on information operations during the 2004 combat that
raged in Fallujah, the authors pay more attention, and rightly so, to enemy informa-
tion operations.15 Yet, the study lacks as careful attention to the actual engagement of
the audience both before and after the attack, thus implying that the deterioration of
Iraqi opinion afterwards was largely due to the success of enemy information opera-
tions. However, given the predisposition of the Iraqi people toward intensive combat
operations of the sort launched in Fallujah, opinion may have declined even without
the enemy's apparently successful information operations.
Legal issues in the national security arena raise particularly thorny problems for
strategic communications because of their complexity. Here the chief audience
consideration centers on the capacity of the audience to comprehend the issue in
comparison with the likelihood that a few simplistic images will totally dominate
the perceptions and conclusions of the mass public and most other audiences. The
debate over whether adherence to the Geneva Conventions should be included in
the US military code of conduct or the treatment of detainees is a perfect example.
Certainly lawyers and political leaders may perceive ambiguity in the text of the
Geneva Conventions, but what most people understand is simply that the Geneva
Conventions have symbolized a globally accepted minimal standard of conduct in
war for generations.
Getting On the Same Page Counts Less Than Whose Page We Are On
Rear Admiral Thorp initiated this panel with an articulate analysis of the impor-
tance of "process" for strategic communications in order to keep all the elements of
an organization in harmony with respect to "a good policy." He emphasized the
importance of consistency in policy and actions and the extraordinary difficulty of
223
Strategic Communications and the Decline of US Soft Power
accomplishing this in the context of national security, public diplomacy and inter-
national relations, thereby going beyond the natural emphasis of his remarks on
developing a "culture of communications" within DoD. In my view that approach
is analogous to the problem of ensuring that all the elements of an organization are
on the same page, and I would agree with that approach for a single, even very com-
plex organization, such as DoD. However, I think it falls short of the nature of the
interrelatedness required for our national strategic communications and the rela-
tionship of DoD to the national undertaking.16
For the strategic communications of the United States to function properly in
advancing our national interests, especially in the soft power arena, the policy and
actions of at least our most visible national organizations and disparate actors must
be understood "to converge" on a single purpose. In the myriad reports related to
America's public diplomacy problem, this concern has generally been related to
the need to integrate the public diplomacy effort with the executive leadership for
foreign policy. For instance, in a Defense Science Board report, this is described as
"leadership from the top":
A unifying vision of strategic communication starts with Presidential direction. Only
White House leadership, with support from cabinet secretaries and Congress, can
bring about the sweeping reforms that are required.
Nothing shapes U.S. policies and global perceptions of U.S. foreign and national
security objectives more powerfully than the President's statements and actions, and
those of senior officials.17
In another excellent analysis and proposal by the Public Diplomacy Council
about what needs to be done, the stress is more on the institutional connections to
the presidency that are needed. Two of the five major recommendations — num-
bers one and four — that are advanced focus on this concern:
1 . Establish an agency within the Department of State and the National Security
Council process, the U.S. Agency for Public Diplomacy (USAPD), to manage the
U.S. government's civilian information and exchanges functions and to coordinate
all U.S. government public diplomacy efforts. . . .
4. Establish by Presidential Directive an Interagency Committee on Public
Diplomacy at the Cabinet Level to coordinate and direct the national public
diplomacy strategy, with a permanent secretariat and associated working groups, co-
chaired by the Deputy National Security Advisor for Communication and the
Director of the new USAPD Agency.18
224
Gene E. Bigler
The concern here could also be understood as one of process if that involves mak-
ing sure that the entire US government strategic communications effort converges
on the direction that the president, and through him, the National Security Council
and its key components provide for the comprehensive enterprise.19 However, the
American experience since the start of the US effort to respond in earnest to the Sep-
tember 1 1 terrorist attacks suggests that a still broader definition of convergence is
needed. One of the remarkable consequences of those attacks was the sense of global
empathy that they evoked. In an obvious allusion to President Kennedy's quip to the
beleaguered people of Berlin, Paris' Le Monde showed just how strong the feelings
were around the world in its September 12 headline, "we are all Americans!" Yet not
long after the Bush Administration began to prosecute the war on terrorism and to
hunt the perpetrators of the attacks, opinion of the United States began to decline.
Although there may have been widespread sympathy for the United States, it
also appears that there were some definite expectations about how the United
States would conduct the war on terrorism that were rapidly frustrated, and that
this type of frustration definitely escalated and spread antipathy. Accordingly, con-
vergence in strategic communications needs to be concerned with more than sim-
ply getting all the messages on the same page as the president's, but for these to have a
favorable impact they must also be in harmony with people's expectations about
those producing them. Thus it is not just that the messages from the White House
and DoS and DoD need to be consistent with those from the presidency, as that
these all need to harmonize with people's expectations about the actions and values
that America represents. Convergence, then, speaks to the coincidence between
message and behavior in order to enable strategic communications to achieve the
persuasive capacity or provide the desirable model that creates soft power.20
Many early frustrations about the US conduct of the war on terror came most
vividly and boisterously from Muslim nations and Muslim people living in the
West as a result of the sudden dramatic increase in security operations in which
the negative profile always involved them. The characteristics of the September 1 1
terrorists suddenly intruded on the lives of tens of thousands of students,
businesspeople, international travelers and immigrants, and, despite the over-
whelming sympathy of most of these people for prosecuting the war on terrorism,
it suddenly called into question the sincerity of the US commitment to respect
human and civil rights, as well as religious and ethnic tolerance.
Gradually, a series of other actions by the United States further contradicted val-
ues that the United States was expected to honor and advance in the world arena.
For instance, the open questioning by senior US officials about the applicability of
the protections under the Geneva Conventions long before actual revelations
about abuses was not expected. After all, the United States had already been the
225
Strategic Communications and the Decline of US Soft Power
overwhelming global military power for the better part of a generation, so if the
Geneva Conventions did not apply to the United States, then why should they apply
to anyone. The recent harsh rejection by the Bush Administration of the Interna-
tional Criminal Court (ICC) was quickly linked to the questioning of the Geneva
Conventions as a sign that the United States was putting itself above the law after
having represented itself as one of the leading advocates of international law for over
fifty years.
Despite the fact that it was under the Clinton Administration that the United
States had opted out of joining both the Kyoto Protocol and the ICC after taking
part in their negotiation, the way the Bush Administration opted to harden the US
position seemed to represent a sudden increase in US unilateralism, and that in-
creased resentment. Since the United States was viewed as the supreme power of
the era, it appeared to be rebuffing its global responsibilities and undermining for-
eign perceptions of institutions that provided for the common good.21 Anyone can
Google "truth President Bush" and immediately find harsh, partisan criticisms of the
president that may not, however, be recognized as partisan by outside observers.22
Once the war in Iraq got under way, this pattern of perceptions in foreign audi-
ences was repeatedly reaffirmed by events which seemed to constitute prima facie
contradictions of the US assertion of lawfulness in the conduct of the war against
terrorism. Media stories appeared all over the world about ambiguity in rules of
engagement in combat and how individual troops interpreted them or said they
were taught to interpret them.23 The revelation of the abuses of Abu Ghraib prison-
ers was just the most sensational of a series of cases in which US troops were
brought up on charges of misconduct and while that perhaps should have been ex-
pected, the majority of the Iraqi people reacted with surprise and disappointment
that American troops had proven just as fallible as any others might be. Finally, the
long-running saga of Guantanamo scandals, court reversals of government prac-
tices, and the Administration's widely lampooned discussion of alternative proce-
dures and other euphemisms for torture communicated a sense of American
disdain for the protections of the Geneva Conventions. Rather than converging to
demonstrate the consistency of American behavior with the rhetoric we projected,
whatever consistency there may have been in our messages was being completely
overwhelmed by contradictions in our performance.24
When Resources Matter
Nearly all the major reports on fixing public diplomacy call for major increases in
the allocations available for DoS and for the functions that used to be performed by
USIA. The Defense Science Board Report calls for the current resources (both
226
Gene E. Bigler
funding and personnel) of DoS to be tripled,25 but neglects the subject of additional
resource needs of DoD to support strategic communications almost entirely. The
Public Diplomacy Council recommends a 300-percent increase in personnel and a
four-fold increase in program budgets over a five-year period.26
Such reports directly attribute the loss of the US voice and the declining public
image around the world to a decline in funding, pointing out how despite the suc-
cess during the Cold War there was a subsequent pattern of neglect.27 Certainly, the
constantly declining overall resource base and the constraint it placed on public di-
plomacy activities was a major consideration at every stage of my career experience
in the field. On the other hand, organization, coordination and technique seem to
have been the more important issues for DoD and the work of its professionals in
the field of strategic communications. And while my personal experience in direct
discussion of strategic communications with DoD and military colleagues was
largely limited to four years of service in Italy during the Balkans conflicts and on
other theater-wide issues that promoted extensive collaboration and during the
last few years in Iraq and Washington, DC, I don't recall that declining resources
was ever a major concern of theirs.
Of course, part of the answer for this difference in perspective may be attribut-
able simply to the fact that the DoD budget is dozens of multiples of the size of the
foreign affairs budget, before even counting the costs of Iraq and Afghanistan.28 In-
deed, the order of magnitude of the difference in resource availability probably has
a great deal to do with the reasons that a sophomoric mistake could be made in
DoD to enable the Lincoln Group to pay journalists in Iraq for writing friendly sto-
ries, thereby undermining the credibility of any favorable information that might
appear.29 And during the days of the Coalition Provisional Authority when re-
sources were carefully husbanded for public diplomacy operations per se, a British
production company could be paid millions of dollars out of military funds to run
vague, feel-good-about-democracy advertisements on Iraqi television.30
The tendency to confuse strategic communications with advertising may be in
part responsible for the tendency in the US government to fund DoD strategic com-
munications relatively lavishly in comparison with the starvation diet for public di-
plomacy.31 Every member of Congress understands how expensive media
advertising can be and vaguely recognizes that DoS does not engage in that activity
because the broadcasting function was handed off to the Broadcasting Board of Gov-
ernors when USIA was merged into DoS. Moreover, additional ad hoc funding goes
to DoD for direct support of military operations. All this means that strategic com-
munications becomes the umbrella for consideration of resource allocations and
moves all the further from public diplomacy. Yet it also means that the broader con-
cerns of public diplomacy and its practitioners will be harder to integrate into the
227
Strategic Communications and the Decline of US Soft Power
frameworks for orienting and controlling strategic communications. Practically
speaking, this also explains why there were no public diplomacy specialists in the
direct chain of command over the "feel good" advertising in Iraq.
More basic than the focus on strategic communications is the problem of
whether it is the strategic communications or the public diplomacy effort that ac-
tually breeds the soft power. With a few exceptions, I think that this point is often
lost because of the failure to understand the fundamental difference between the
way soft power is developed and used. Strategic communications tends to be con-
sidered within the context of the achievement of a relatively specific government
objective, while public diplomacy includes such communications but places them
in the context of the broader relationship of societal trust, empathy and, hopefully,
admiration.32 Since a broader objective and a non-specific time frame are also in-
volved in public diplomacy, this makes it harder for the government to fund it as
part of the traditional annual appropriations process.
Thus, the budgetary process disfavors the needed funding of public diplomacy,
but in doing so, it may also prejudice strategic communications, or help explain
why the Bush Administration drive is still not bearing fruit. That is, I think it rea-
sonable to hypothesize that many, and certainly some of the more important, stra-
tegic communications objectives require the existence of a somewhat favorable
climate of opinion for the messages to be credible and effective. Accordingly, the
neglect for the longer-term public diplomacy effort may doom even a very intense
strategic communications campaign.
Undermining the Credibility of the Military as Messenger
The Bush administration's conduct of the war against terrorism has given rise to an
increasing chorus of concern about the militarization of US foreign policy over the
last few years. Of course, some of the most articulate voices, such as Chalmers
Johnson's, had begun to raise concerns and link them to historic arguments, espe-
cially about American imperialism, and how the conduct of American policy had
been associated with antipathy toward America in a given region, especially East
Asia and the Philippines, in response to specific actions, such as the expansion of
the Vietnam conflict, even before the September 1 1 attacks.33 Johnson pursues his
basic argument and expands it in the light of developments in the war on
terrorism34 and Andrew Bacevich provides a broader focus on military history to
develop parallel concerns focused on the Middle East.35 The problem in Johnson's
view is that
228
Gene E. Bigler
[s] lowly but surely the Department of Defense is obscuring and displacing the
Department of State as the primary agency for making and administering foreign
policy. We now station innumerably more uniformed officers than civilian diplomats,
aid workers, or environmental specialists in foreign countries — a point not lost on the
lands to which they are assigned. Our garrisons send a daily message that the United
States prefers to deal with other nations through the use or threat of force rather than
negotiations, commerce, or cultural interaction and through military-to-military, not
civilian-to-civilian, relations.36
While the militarization of policy may be responsible for the deterioration of
the US image, it is not something for which the military bears direct responsibility
or can even fix.37 The problem is akin to that which each military unit now faces
when they enter the field in Iraq. Most Iraqis fear having any contact with or even
being in the vicinity of the US military, not because they have personally had a
bad experience, but because they are aware that Americans are the targets of at-
tacks that are dangerous to anyone near them and that the response to attacks has
led to great damage in the surrounding areas, whether intentional or not. Indeed,
the crux of the US problem, at least for the war on terrorism, may be in the strat-
egy that the United States elected for pursuing the war on terrorism. That is, in
the decision to justify the preemptive use of force for defending American
interests.
President Bush's speech at the opening of the United Nations General Assem-
bly on September 12, 2002, provided the first public exposition and justification
for the use of preemptive military force by the United States against Saddam
Hussein's regime in Iraq. That speech unleashed a wave of global controversy
and debate because the US position seemed to hark back to a classical legitimat-
ing of war that was supposed to have been superseded by the creation of the
United Nations collective security system. Within a few days, the Congressional
Research Service, much better known for the quality than the celerity of its
work, issued a report stating that "the historical record indicates that the United
States has never, to date, engaged in a 'preemptive' military attack against another
nation."38
Yet on September 19, 2002, the preemptive use of military force was incorpo-
rated as a cornerstone of the US national security strategy and the war on terrorism
and thereby set the stage for the subsequent US invasion of Iraq in 2003. Despite
the initial military success in Iraq, the reaction of much of the international com-
munity continued to worsen and harden despite any justification by the United
States about the potential threat of weapons of mass destruction or links to terror-
ist organizations that had attacked the United States. Not only were the ethics of
the US position questioned, but the gradual debunking of every rationale for the
229
Strategic Communications and the Decline of US Soft Power
attack except the spread of democracy further weakened the preemptive doc-
trine.39 According to foreign policy analyst Julia Sweig, the US loss of global respect
was due to the imposition of US hegemony on the world community in the way
that it had long exercised power in Latin America.
It had been one thing for the global powers that once held a stake in the region to yield
grudgingly to U.S. hegemony with the Western Hemisphere in the nineteenth and
twentieth centuries. But it was quite another for the United States to subject the entire
world community — including former and aspiring world powers — to the fast-and-
loose approach to diplomacy, military intervention, sovereignly, and international law
that had long been the U.S. currency in America's regional sphere of influence.40
Other commentators have emphasized graver problems than the unilateralism and
arrogance represented by the US action. Stanley Hoffman comments on how sev-
eral international analysts link the preemptive strike doctrine to the deterioration
of a sense of international order and cites a commentary on the US national secu-
rity strategy by Henry Kissinger to that effect: "if each nation claims that right to
define its preemptive rights, the absence of any rules could spell international
chaos."41 More to the point for this analysis, British commentator David Mepham
notes how the negative impact of the loss of US credibility directly undermines
public trust in the United States and actually increases the sense of insecurity in the
global community that the United States is supposedly making safer.42
Conclusion
The discussion of the first three areas of strategic communications practices dis-
cussed in this analysis was made in the spirit of offering experience-based sugges-
tions for improving foreign opinions of the United States and supporting better
achievement of policy objectives. For instance, a more explicit focus on the nature
of the understanding that an audience brings to an issue should provide the frame-
work for shaping of messages for it, especially given the complexity of legal issues
and lawyerly discourse. However, the observation that these practices tend to be
building upon one another is intended to suggest how limited the prospects may
actually be for improvement in any area to make a difference for the soft power
trend overall. That is, simply transferring resources from the strategic communica-
tions effort in DoD to the public diplomacy work of DoS probably won't begin to
reverse the negative trend. The crucial consideration now probably relates to the
way the world has come to consider the exercise of power by the United States. Un-
til we show that we are less inclined to rely on the use of our military or the use of
preemptive military force in the face of strategic frustrations, the improvement in
230
Gene E. Bigler
our strategic communications craft will not actually serve to increase US soft
power or to improve our long-term ability to advance our interests.
Notes
1. What the World Thinks in 2002, PEW GLOBAL ATTITUDES PROJECT (The Pew Research
Center for People & the Press, Washington, DC), Dec. 4, 2002, http://people-press.org/reports/
pdf/165.pdf.
2. America's Image Slips, But Allies Share US Concerns About Iran, Hamas, PEW GLOBAL AT-
TITUDES PROJECT (The Pew Research Center for People & the Press, Washington, DC), June 13,
2006, http://pewglobal.org/reports/display.php?ReportID=252.
3. Since developing the concept of soft power in 1990, Professor Nye has returned to it in a
number of works. The most comprehensive is JOSEPH S. NYE, SOFT POWER: THE MEANS TO
Success in World Politics (2004).
4. Paul Kelly, Power Pact, THE AUSTRALIAN (Sydney), July 26, 2003, at 1, cited in id. at 127.
5. Publics in Europe and India See US as Violating International Law at Guantanamo,
WORLD PUBLIC 0PINI0N.ORG, Jan. 23, 2007, http://www.worldpublicopinion.org/pipa/articles/
btjusticehuman_rightsra/229.php?nid=&id=8cpnt=229.
6. Linda Robinson, The Propaganda War, U.S. NEWS & WORLD REPORT, May 29, 2006, at 29.
7. Id.
8. What the World Thinks in 2002, supra note 1.
9. This conclusion has been partially influenced by the growing literature on the
militarization of America's foreign policy, but it has also been developed empirically. It was orig-
inally inspired by observations and experience as the counselor for public opinion and polling
for the Coalition Provisional Authority in Baghdad during 2004. That prompted the inquiry and
findings reported here. The results of these polls have not been widely disseminated, but a few
well known public accounts are available, such as Robin Wright, Iraqis Back New Leaders, Poll
Says, WASHINGTON POST, June 25, 2004, at A19 and John Solomon, Poll of Iraqis Reveals Anger
Toward U.S., ASSOCIATED PRESS, June 15, 2004, available at http://www.commondreams.org/
headlines04/06 15-08.htm. Militarization will be discussed further below.
10. Leon Hadar ridicules the idea of using marketing and communications gurus and ap-
proaches to address such a fundamental issue as the loss of American credibility, and perhaps the
greatest anti-Americanism yet experienced, with the quip: "You can't sell a soap that doesn't
wash. It's the policy, stupid." See Leon Hadar, Innocent Abroad, AMERICAN CONSERVATIVE, Dec.
19, 2005, available at http://www.amconmag.com/2005/2005_12_19/article2.html.
1 1 . The author was on the staff of USIA's Office of Research from 1 984-88. My work as the
counselor for public opinion and polling for the Coalition Provisional Authority during 2004
was closely coordinated with the current Office of Research in INR.
12. Pew Research Center studies have already been cited {supra notes 1 & 2), but there are
many excellent sources ranging from organizations that mainly provide access to polling data
from others, such as http://www.angus-reid.com, to organizations that do their own research,
e.g., http://www.latinobarometro.org, to those that combine these functions and a lot more, e.g.,
http://worldpublicopinion.org.
13. The report of the Defense Science Board makes this point more generally with respect to
the special problem of the terrorism frame of communications that marginalizes other signifi-
cant issues and obscures the difference between tactical and strategic considerations. See Office of
the Secretary of Defense for Acquisition, Technology and Logistics, Report of the Defense Science
231
Strategic Communications and the Decline of US Soft Power
Board Task Force on Strategic Communication 17 (2004), available at http://www.acq.osd.mil/
dsb/reports/2004-09-Strategic_Communication.pdf.
14. William M. Darley, Clausewitzs Theory of War and Information Operations, 40 JOINT
Force Quarterly 74 (2006).
15. The most important reference to noncombatants was to the successful effort made to get
them to leave the city. Thomas F. Metz et al., Massing Effects in the Information Domain: A Case
Study in Aggressive Information Operations, MILITARY REVIEW, May-June 2006, at 26, available
at http://www.army.mil/professionalwriting/volumes/volume4/july_2006/7_06_2.html.
16. The emphasis here is on DoD, but DoS does not differ in emphasizing unity of message.
For instance, Luanne Traud highlights the emphasis Karen Hughes placed on the creation of a
new rapid response unit to get the US government on the same page. See Luanne Traud, Stay the
Course; Speak on Message, ROANOKE TIMES, May 17, 2006, at B9, available at http://
uscpublicdiplomacy.com/index.php/newsroom/johnbrown_detail/060519_pdpr/.
17. Report of the Defense Science Board Task Force on Strategic Communication, supra
note 13, at 3.
18. Public Diplomacy Council, a Call for Action on Public Diplomacy 3-4
(2005), available at http://pdi.gwu.edU/merlin-cgi/p/downloadFile/d/7536/n/off/other/l/name/
ACALLFORACTIONONPUBLICDIPLOMACYO 1 -2005prin/.
19. A significant step in this direction was taken in 2005 with the establishment of the Policy
Coordination Committee on Public Diplomacy and Strategic Communications and the position
of deputy national security advisor for strategic communications and global outreach as part of
the reorganization of the National Security Council. Karen Hughes emphasizes the importance
of the creation by DoS of a rapid response unit as a measure that "literally gets the U.S. govern-
ment on the same page." See Traud, supra note 16. Yet the argument here is that even getting the
entire US government on message is still not the crucial consideration.
20. Intellectual discourse about public diplomacy has grown rapidly in recent years and is
benefiting from significant contributions from outside the United States. Jan Melissen has been
one of the more significant international contributors. Although his focus tends to be more on
actions centered in the foreign ministry, the concept of "societization" of public diplomacy that
he has advanced is similar to the idea of convergence mentioned here. While Melissen also
stresses the increasing significance of two-way communications in the field, he does not include
the two-way perspective within the concept of "societization." See Jan Melissen, Reflections on
Public Diplomacy Today, Remarks Before the Conference on Public Diplomacy (Feb. 6, 2006),
available at http://ics.leeds.ac.uk/papers/vpO 1 .cfm?outfit=pmt&folder=7&paper=2655.
21. Unilateralism and U.S. Foreign Policy 15 (David M. Malone & Yuen Foong eds.,
2003).
22. This is consistent with the underlying problem of fragmentation of political culture, the
subject of the brilliant analysis in Donna Oglesby's paper, A Pox on Both Our Houses, delivered at
the American Political Science Association Conference on International Communication and
Conflict on August 3 1 , 2005. Oglesby suggests that the problem is still more profound because of
the fragmentation of political culture.
23. See, e.g., Rod Nordland & Babak Dehghanisheh, Rides of Engagement, NEWSWEEK, Nov.
29, 2004, at 24, available at http://www.msnbc.msn.com/id/6542346/site/newsweek/.
24. This discussion has concentrated on legal issues and is concerned with the global context
of strategic communications. Within Iraq itself, the discord, rather than convergence, between
communications and perceptions was much less concerned with legal matters. Polls in 2003-04
repeatedly demonstrated that the failure of the United States to deliver the promised benefits of
232
Gene E. Bigler
improved peace and security and quality of life, including availability of electricity, jobs and so
on, was strongly related to the steady increase in negative attitudes toward the United States.
25. Report of the Defense Science Board Task Force on Strategic Communication, supra
note 13, at 8.
26. A CALL FOR ACTION, supra note 18, at 3.
27. Stephen Johnson & Helle Dale, How to Reinvigorate U.S. Public Diplomacy 2-6, HERI-
TAGE FOUNDATION BACKGROUNDER, No. 1645, Apr. 23, 2003, available at http://www.heritage
.org/Research/NationalSecurity/bgl645.cfm.
28. DoS may have been the original source of its own funding disadvantage in the foreign
policy arena when it joined with the still fledgling DoD to endorse the call for a dramatic buildup
of military forces in the famous National Security Council Report No. 68, United States Objec-
tives and Programs for National Security, Apr. 14, 1950, available at http://www.fas.org/irp/
offdocs/nsc-hst/nsc-68.htm. Describing the resource imbalance that had been developed thirty
years later, Zbigniew Brzezinski said: "In the Department of State you have the glory of the office,
to fly around in a big plane and to appear at international meetings. But you don't have the clout.
The Secretary of Defense spends money while the Secretary of State begs for money." Quoted in
DAVID ROTHKOPF, RUNNING THE WORLD: THE INSIDE STORY OF THE NATIONAL SECURITY
Council and the Architects of American Power 181 (2005). Of course, as the merger of
USIA into DoS was undertaken during the 1990s, the overall post-Cold War decline in funding
for public diplomacy first accelerated and then kept deteriorating until at least 2004, despite the
statutory safeguards for Fulbright exchanges and a few favored programs, the appointment of
politically prominent under secretaries, and the many studies that called for more funding.
29. A DoD inquiry led by Rear Admiral Scott Van Buskirk concluded that propaganda ef-
forts, including the paying of reporters, could damage US credibility and should be stopped. Da-
vid S. Cloud, U.S. Urged to Stop Paying Iraqi Reporters, NEW YORK TIMES, May 23, 2006, at A19,
available at http://www.nytimes.com/2006/05/24/world/middleeast/24propaganda.html?ex
= 1306123200&en=87f776e901aal26a&ei=5088&partner=r. Of course, military public affairs
manuals have always taught this, and the many competent, hard-working military public affairs
officers at the field grade level and above that I have known have been well aware of this precept.
Accordingly, I am left with the impression that there was inadequate military supervision of the
activity or such an abundance of resources that the decision may have been made at a lower level.
30. One commercial upon which much hope was based showed Iraqi youth of apparently
different backgrounds joyfully playing soccer together as an apparent metaphor for the task of
national unification. Unfortunately, the use of the spot had to be curtailed abruptly when news
got out that it had been produced in a neighboring country with local children, presumably be-
cause security conditions in Iraq prevented filming it there with Iraqi children.
31. In a survey of embassy public affairs officers in 2003, half reported to the US Govern-
ment Accountability Office (GAO) that they lacked sufficient officers to carry out public diplo-
macy activities. See Jess T. Ford, State Department Efforts Lack Certain Communications
Elements and Face Persistent Challenges (May 3, 2006), available at http://www.gao.gov/
new.items/d06707t.pdf. Mr. Ford, the Director, International Affairs and Trade, GAO, was testi-
fying before the Subcommittee on Science, the Departments of State, Justice, and Commerce,
and Related Agencies, House Committee on Appropriations.
32. For instance, Professor Nye argues that one of the most successful of all soft power epi-
sodes was the Cold War exchange program that brought Alexander Yakovlev to the United States
in 1958 and exposed him to the pluralist ideas that later influenced the development oiglasnost
and perestroika. This, and most of the other classic episodes of public diplomacy described nicely
233
Strategic Communications and the Decline of US Soft Power
on http://www.softpowerbeacon.blogspot.com by Mark Safranski, emphasize the long-term
framework in which successful public diplomacy takes place.
33. Chalmers Johnson's book, BLOWBACK: THE COSTS AND CONSEQUENCES OF AMERICAN
EMPIRE (2000), focuses specifically on the unexpected consequences of America's overseas mili-
tary presence and actions. Stuart C. Miller's work, BENEVOLENT ASSIMILATION: THE CONQUEST
OF THE PHILIPPINES, 1899-1903 (1982), is more limited in scope. Both analyses are rooted in a
concern for overseas expansion through military action that harks back to Charles Beard, Wil-
liam Appelman Williams, Richard Van Allstyne and others.
34. Chalmers Johnson, The Sorrows of Empire: Militarism, Secrecy and the End
of the Republic (2004).
35. Andrew Bacevich, The New American Militarism: How Americans Are Se-
duced by War (2005).
36. JOHNSON, supra note 34, at 5.
37. Further evidence for Bush Administration preference in the use of the military over civil-
ian resources in the conduct of foreign policy came out just as this paper was being completed.
See Mark Mazzetti, Military Role in U.S. Embassies Creates Strains, Report Says, NEW YORK
TIMES, Dec. 20, 2006, at A8, available at http://www.nytimes.com/2006/12/20/washington/
20embassy.html?ex=1324270800&en=e8eb89f0fecldf44&:ei=5088&partner=rssnyt&:emc=rss.
Mazzetti reported that the Senate Foreign Relations Committee staff had just completed a report
showing that "the expansion of the Pentagon's presence in American embassies is creating fric-
tions and overlapping missions that could undermine efforts to combat Islamic radicalism." Id.
38. See Richard F. Grimmett, U.S. Use of Preemptive Military Force, Congressional Research
Service (Sep. 18, 2002), available at http://fpc.state.gov/documents/organization/13841.pdf.
39. The Carnegie Council organized a high-level debate on the question of evaluating the
preemptive use of force that was the subject of an entire issue of volume 17, no. 1 of their journal
ETHICS AND INTERNATIONAL AFFAIRS (Spring 2003). On the deepening of the controversy, see
Howard LaFranchi, Bush's 'Preventive War' Doctrine Under Seige, CHRISTIAN SCIENCE MONI-
TOR, Feb. 4, 2004, at 1, available at http://www.commondreams.org/headlines04/0204-03.htm.
40. Julia E. Sweig, Friendly Fire: Losing Friends and Making Enemies in the Anti-
American Century 53 (2006).
41 . Stanley Hoffman, The Foreign Policy the U.S. Needs, THE NEW YORK REVIEW OF BOOKS
(Aug. 10, 2006), available at http://www.nybooks.com/articles/19217. Hoffman quotes Henry
Kissinger's statement in American strategy and pre-emptive war, TRIBUNE MEDIA SERVICES, Apr.
13, 2006, available at http://www.iht.com/articles/2006/04/13/opinion/edkiss.php.
42. LaFranchi, supra note 39, quotes the associate director of the London-based Institute for
Public Policy Research as saying: "The lack of credibility brought on by going to war in Iraq on
the basis of inaccurate intelligence has undermined public trust and made the world more inse-
cure."
234
XIV
Strategic Communications and
the Battle of Ideas
Mari K. Eder*
[I] have been commenting on the challenges our country — not just our gov-
ernment— but our country faces in fighting a war in this new media age. And
while the enemy is increasingly skillful at manipulating the media and using the
tools of communications to their advantage, it should be noted that we have an
advantage as well: and that is, quite simply, that truth is on our side and ulti-
mately . . . truth wins out.
/ believe with every bone in my body that free people, exposed to sufficient informa-
tion, will, over time, find their way to right decisions.
Donald Rumsfeld1
This quote and other like comments in recent months have served to reignite
the public debate about strategic communications, propaganda and how
our government communicates, at home and to the world.
A great deal of that frustration centers on the existing capability of current pub-
lic affairs communications structures to deliver the nebulous benefits of "strategic
communications." This situation is not unique to the Department of State, the De-
partment of Defense (DoD), the Army and the other military Services or elsewhere
in the executive branch of government. Yet as our government works on trans-
forming to meet the requirements of a new age, the question of how to transform
and strategically develop communications is one of great concern.
Brigadier General, US Army.
Strategic Communications and the Battle of Ideas
At issue is the concern that America does not communicate clearly with the
world. Oftentimes there is concern that the US government sends "mixed mes-
sages" or fails to clearly and consistently communicate policy. While this has the
potential to frustrate allies and confuse both potential friends and enemies, it also
conveys weakness in the national will to any nation seeking to understand the in-
tent of the United States with regard to international relations. The recent Supreme
Court ruling on tribunals is a case in point.2 Did the Court's ruling that military tri-
bunals are illegal convey a strategic or mixed political message to international
audiences?
A review of international news in the days following the ruling reveals reactions
ranging from appreciation of the American democratic process to cautious opti-
mism or even outright skepticism. BBC News from London bluntly termed the rul-
ing a "Stunning rebuff to President Bush," and the French press generally followed
a similar theme of "Supreme Court Disavows Bush." German national radio hailed
the ruling as a "Victory for the Rule of Law." Civilian news media from Spain and
Italy to Pakistan and China agreed, while in Sweden editorial writer Henrik
Bredberg, in the liberal South Sweden newspaper Sydsvenskan, commented "Now
the judicial power has put a check on the executive power. Thanks for that."3
The Arab press reaction was more skeptical. In London's Al-Hayat Arabic news-
paper, columnist Jihad al-Khazin commented,
This was all great news, so great that it was reported by all American and international
media outlets and continues to draw reactions until this very day, but none of it is true,
or, if we wish to be accurate, will never see the light of day, because on the same day that
the Bush Administration declared its commitment to the Supreme Court's ruling, the
Senate Judiciary Committee was holding hearings on the treatment of accused
terrorists.4
In March 2006, Under Secretary of State for Public Diplomacy and Public Af-
fairs Karen Hughes gave a speech on transformational public diplomacy at the
Baker Institute for Public Policy. In her remarks she talked about six key areas in
which transformation is fundamentally changing the way the State Department
does business. She first discussed how funding is increasing for programs that are
working. In particular, she mentioned international exchange programs, a direct
form of community outreach, albeit on a global scale. She noted, "People who
come here see America, make up their own minds about us and almost always go
home with a different and much more positive view of our country."5
Hughes went on to discuss the State Department's emerging strategy concern-
ing public communications. While acknowledging the rapidity of global commu-
nications, she touted the Department's new Rapid Response Center — not a
236
Man K. Eder
completely new concept, but a hybrid based on the successful model used by De-
partment of Defense public affairs during the kinetic phases of the recent wars in
Afghanistan and Iraq. The Center monitors daily communications worldwide and
provides a summary to diplomatic outposts, along with America's message in re-
sponse. This information enables American government representatives to be
more effective advocates for US policy. Additionally, the establishment of regional
hubs to position spokesmen in key media centers like Dubai will ensure even
greater presence and reach. Hughes has likewise given ambassadors and foreign
service officers greater freedom to reach out, both directly and through the civilian
news media.
Finally, Hughes said the State Department is placing greater emphasis on using
public diplomacy to shape policy. From her travels, she learned that America hasn't
always shaped programs to make their benefits clear to average people. She said,
" [The President has] now instructed us to look at ways to make our programs more
effective, to set clearer goals, focus our programs and partner with the private sec-
tor .. . then make sure we communicate what we are doing — a perfect example of
the intersection of public diplomacy and policy."6
Defense Communications Strategy
In his recent speech to the Council on Foreign Relations, Secretary of Defense
Donald Rumsfeld commented on the Defense Department's view of the way
ahead:
[Gjovernment public affairs and public diplomacy efforts must reorient staffing,
schedules and culture to engage the full range of media that are having such an impact
today.
Our U.S. Central Command, for example, has launched an online communications
effort that includes electronic news updates and a links campaign, that has resulted in
several hundred blogs receiving and publishing Centcom content.
The U.S. government will have to develop the institutional capability to anticipate and
act within the same news cycle. That will require instituting 24-hour press operation
centers, elevating Internet operations and other channels of communications to the
equal status of traditional 20th century press relations. It will result in much less
reliance on the traditional print press, just as the publics of the U.S. and the world are
relying less on newspapers as their principal source of information.
And it will require attracting more experts in these areas from the private sector to
government service. . . .
237
Strategic Communications and the Battle of Ideas
We need to consider the possibility of new organizations and programs that can serve a
similarly valuable role in the war on terror in this new century. . . . There's no
guidebook ... no roadmap ... to tell our hard working folks what to do to meet these
new challenges.7
DoD efforts to focus on the need to improve public affairs were brought to the
forefront in 2004 during a "Tank brief to the Service chiefs of staff on the subject of
public affairs. That session was held as the result of a continuing debate centering on
the frustration of commanders with a communications process that had not only
been ill defined, but little understood. It is reminiscent of the comment by Admiral
Ernest J. King, Chief of Naval Operations, who reportedly said the following in the
early days of WWII, "I don't know what the hell this 'logistics' is that Marshall [Army
Chief of Staff General George C. Marshall] is always talking about, but I want some
of it!"8 Many felt the same about strategic communications although few knew what
it was or how it should work. To this day, strategic communications remains poten-
tially the most misused and misunderstood term in the military lexicon.
Following that session, DoD began to move to grow a strategic communications
capability and structure, supported by the findings of the Quadrennial Defense
Review (QDR). Recognizing the importance of applying strategy to communica-
tion, the position of Deputy Assistant Secretary of Defense (Joint Communication)
(DASD(JC))was created in December 2005. This billet was established to "Shape
DoD-wide processes, policy, doctrine, organization and training of the primary
communication supporting capabilities of the Department. These include public
affairs, defense support for public diplomacy, visual information, and information
operations including psychological operations."9 The terms of reference estab-
lished for the creation of this position state that it exists to maximize DoD's capa-
bility to communicate in an aggressive and synchronized manner. It clearly
represents the first formal recognition of the need for a military communication
advocate at the highest level.
One of the primary tasks of the DASD(JC) is to drive communications transfor-
mation in DoD and to implement decisions from the 2006 QDR to improve all as-
pects of strategic communications. A working roadmap is being developed to
provide strategic direction, objectives, milestones and metrics for success. Just as
importantly, the roadmap identifies program and budget implications of strategic
communications initiatives.10 There are three overarching objectives the roadmap
seeks to achieve:
1 . To define roles and develop Strategic Communications doctrine for the primary
communication supporting capabilities: public affairs, information operations,
military diplomacy and defense support to public diplomacy.
238
Marl K. Eder
2. Resource, organize, train and equip the DoD's primary communication support
capabilities.
3. Institutionalize a DoD process in which Strategic Communication is
incorporated in the development of strategic policy, planning and execution.
There has never been a validated joint requirement for public affairs. No re-
quirement had been established for a public affairs capability to support joint/
combined/expeditionary operations. The consequences of this omission set the
groundwork for failure in communicating operations that developed rapidly and
on the global media stage. What commanders expect/want is not described in any
detailed fashion so the Services were left to estimate requirements through their
own doctrine; thus there should be no surprise that capabilities did not match de-
mands or expectations.
Along with the establishment of the position of the DASD(JC), DoD took steps
to formally assign responsibility for communication proponency, to establish a
joint structure to provide a rapidly deployable communications capability and to
build a capacity to develop both communications doctrine and materiel. These
capabilities were embedded in the mission set and function of the Joint Forces
Command-based Joint Public Affairs Support Element (JPASE).
The evolving JPASE organization exists to support the integration of communi-
cations into warfighter training, to develop operational public communications
programs and policies to support the warfighter and to provide the combatant
commander with a rapidly deployable military public affairs capability at the begin-
ning of an operation, when public communications are most critical and have the
potential to be most effective.
In the past several years, much discussion in the Army has centered on the in-
ability of the existing public affairs structure to serve the Army with a strategic
communications capability. In fact, the function had not been empowered and has
been barely resourced to succeed. Despite repeated recommendations from studies
such as the McCormick Foundation's report America s Team; The Odd Couple — A
Report on the Relationship Between the Media and the Military11 following the Gulf
War, the Army did not prioritize the public affairs resources necessary for it to
serve as the information combat force multiplier it can — and should be. Journalist
Richard Halloran explained it this way more than fifteen years ago:
The most important element in the relationship between a journalist and a PAO
[public affairs officer] is the policy of the PAO's commander. A commander with an
open attitude communicates that tone to his subordinates and enables the PAO to do
his job. A commander who wants a palace guard will get it, and with it, most likely, a
239
Strategic Communications and the Battle of Ideas
bundle of bad press clippings. . . . Equally important, when things beyond the PAO's
reach go wrong, and they will, the commander must protect him against the wrath
from above, just as he would protect another staff officer.12
The Army public affairs field not only failed to improve in the years following
the first Gulf War, its stature even declined. How did this happen to a career field
that seemed to be advancing well, as recently as a few years ago? It happened sur-
prisingly in plain view — of Army leaders, public affairs practitioners and the audi-
ences the Army serves. It happened despite a plethora of studies on the "military-
media relationship," although nearly all of these deal with the relationship between
military leaders and the media. Very few ever address the actual communications
business of public affairs or the public affairs professionals who facilitate relation-
ships on both sides of issues.
The balance may have changed as the role of Information Operations began to
rise and gain influence and recognition, at the expense of the less- well-funded and
operationally regarded public affairs organization. This occurred concurrently
with the advent of the term strategic communications and its subsequent growth in
appeal and stature. It seems that one reason for the appeal of both information op-
erations and strategic communications lies in the inherent nature of the one-way
communications that use of the term invokes. Many senior Army operators, as
they have historically, don't trust the press and by association, similarly distrust
their press officers. And while some believe Information Operations, by its very na-
ture, doesn't necessarily require or involve interaction with public affairs or the
media, it is absolutely essential that public affairs professionals have complete ac-
cess to, and situational awareness of, any communication interaction in the global
information environment. It can be, after all, the most seemingly insignificant
communication that can have international or strategic consequences.
Even as the QDR addressed the need to implement a culture of strategic com-
munications within the Department of Defense via the Strategic Communications
Execution Roadmap, the Services were beginning to move forward to make sense
of a concept that has been broadly but poorly defined, and often little understood.
In the Army, the concept of developing a strategic communications process was
initiated in 2004 with the establishment of a Strategic Communications team
within the Office of the Director of the Army Staff.
While the team's charter required linking communications to Army strategy
and priority programs, it has taken nearly two years for the effort to mature to a
level that can best be described as "walk" in the "crawl, walk, run" paradigm. Since
then, the responsibility for all Army strategic communications planning was trans-
ferred to the Office of the Chief of Public Affairs, along with the attendant staffing
240
Mart K. Eder
and funding for contract support. Using an enterprise approach to communica-
tions across the Army, the new staff is tasked to understand and define their char-
ter; develop relationships with Headquarters strategists, subject matter experts and
other communicators; and create the structure, processes, culture and image to
communicate the Army's story. Through the Strategic Communications Coordi-
nation Group they moved to develop plans and associated products, such as the
Army Communications Guide, furthering understanding of significant Army
themes and messages, campaigns and events by a variety of audiences.
Today, there is growing senior staff-level support for the application of strategy to
communications and acceptance of collaborative planning processes in crafting ma-
jor communications campaigns. This initial framework for public affairs is serving as
a sense-making device, a construct that allows us to make sense of a new idea.
The progress to date cannot be described as grand strategy on the national level,
or even DoD-level application of strategic communications. The impact of strate-
gic communications planning and processes at the Department of the Army is that
strategic communications has become well-nested in the Army's strategy for trans-
formation and solidly linked to the National Military Strategy (Addendum, Figure
1). This is significant. By beginning the hard, detailed, day-to-day work of estab-
lishing coordination and development/design processes for communications
planning first at the Headquarters, and in the next year, throughout the Army's
subordinate commands, the Army has taken the initial difficult steps of building an
understanding of what strategic communications is and how strategic communi-
cations planning can work.
These efforts have already paid dividends in linking communications to the
Army's long-term programs and processes in supporting transformation (Adden-
dum, Figure 2). As national concepts of strategic communications planning mature
and the Department of Defense implementation of strategic communications pro-
cesses evolve, the Army's efforts to date will ensure the Army is ready to support
and complement those efforts.
Former Special Assistant to the Secretary of Defense Larry DiRita said the head-
ache of transformation is worth it: "The old-fashioned idea that you develop the
policy and then pitch it over the transom to the communicator is over. You're con-
tinually thinking about communication throughout the course of the policy devel-
opment process."13 This is the baseline for, and well-codified in, the recent QDR.
The Public Affairs Officer
At the unified commands, public affairs capabilities had been historically dimin-
ished through restrictions in force and grade structure. A colonel/captain-level
241
Strategic Communications and the Battle of Ideas
public affairs officer (PAO) serving on the Unified Commander's staff absolutely
cannot compete on a level playing field with the two-star J-3s and J-4s for the Com-
mander's time and attention. The senior communicator on a four-star combatant
commander's staff must be, at a minimum, a one-star flag officer. Otherwise, the
message is that the communications function is significantly less important than
the other command and staff functions.
An effort to remedy this situation through a proposal for brevet promotions did
not advance this past year at DoD, but shows promise for the future. Recommen-
dations supporting this change first surfaced over fifteen years ago and, while the
recommendations have great merit, they have languished in a zero-growth envi-
ronment as being "just too hard" to accomplish.
In 1995 the Freedom Forum First Amendment Center's report, America s Team;
The Odd Couple, focused on the relationship between the media and the military.
The study was extensive and the recommendations detailed and exacting. The re-
port recognized the need for strategic public affairs leadership at the unified com-
mands, stating, "In major conflicts such as Desert Storm, the Secretary of Defense
and the Chairman of the Joint Chiefs of Staff should consider assigning an officer
of flag or general rank in the combat theater to coordinate the news media aspects
of the operation under the commander of U.S. military forces."14
This did occur at US Central Command in the early days of Operation Iraqi
Freedom. As operations in the Central Command theater began to generate opera-
tional velocity on the international stage, it became apparent the public affairs col-
onel did not have the staff muscle to serve the command at that required level. Rear
Admiral Craig Quigley, a career public affairs officer, was detailed from the Office
of the Secretary of Defense Public Affairs to Central Command to serve as the
Director of Public Affairs. Upon his retirement, Jim Wilkinson, a White House ap-
pointee with general officer-commensurate rank, was assigned to take his place.
When Wilkinson left at the conclusion of major ground combat operations, US
Central Command looked for a civilian of his stature, experience and connections
to take his place. That search was unsuccessful and the Central Command public
affairs effort slowly began to revert back to its pre-war configuration and
capability.
By the summer of 2004, US Central Command's public affairs staff complexion
had changed drastically from what it was at the height of the conflict. From a staff
of 70, headed by a general officer or civilian equivalent, to a staff of barely ten, the
office remained functional despite the split operations between Tampa, Florida
and Doha in Qatar. Obviously, such a limited staff was unable to deal with the
tempo of communications requirements, either with American or international
audiences, that had increased since the end of the conflict. This was not due to a
242
Mart K. Eder
lack of proficiency on the part of the staff, but was a direct result of the immense
nature of the continuing demands of the global information environment.
Information Operations began to expand to fill that void, although later the
overlap in mission sets was largely resolved with an expanded staff in the public af-
fairs office. That office generated a strategic communications approach to reaching
American, allied and Iraqi audiences and initiated an aggressive communications
outreach focus.
The Army's position is that all general officers are both senior leaders and senior
communicators. The Army focuses on the need to broaden the baseline communi-
cations skills of all Army officers and make them all communicators. Those who
choose the Public Affairs Functional Area career path must understand this reality.
Following DoD's lead, Army public affairs proponency is likewise reviewing the ca-
reer paths, training and education for all its public affairs officers. For example, ad-
vanced degree opportunities are much broader, including such disciplines as mass
communications, strategic communications, diplomacy, international relations or
even public administration. The Army recognizes its communications profession-
als need to be more broadly capable, culturally aware and able to operate in vola-
tile, uncertain and stressful information environments.
The PAO is grounded in the operational Army through a base career as a soldier
and a leader, commander and staff officer. Once entering the communications
career field, this pentathlete can provide a broad range of communications capa-
bilities to a commander. The PAO typically manages a portfolio that spans the full
spectrum of information delivery, from internal product development, to staff
participation in the military decision-making process, to outreach innovation, leg-
islative liaison, crisis communications, speech/testimony writing and communica-
tions operations, as well as strategic communications planning.
Army public affairs officers are already leaders, spokesmen and Army champi-
ons, translators and advocates. They are strategic communications planners and
independent thinkers and decision makers. Future plans are to broaden their expe-
rience base to ensure that PAOs are agile, flexible, culturally aware, sophisticated in
emerging communications technologies and savvy in dealing with all types of media.
Additionally, the notion of "broadening" career experiences for all Army officers is
expanding through the Joint, Interagency, Intergovernmental, Multinational
(JIIM) opportunities program. There are a number of other natural opportunities
for an officer with this broad skill set to pursue: recruiting/marketing, legislative li-
aison, strategist, scholar or interagency fellow.
Of late, both the Army and the Air Force have placed individuals with opera-
tional backgrounds in the position of chief of Service communications. Kenneth
Bacon, a former reporter who became Pentagon spokesman during the Clinton
243
Strategic Communications and the Battle of Ideas
administration, has commented on this recent trend. "By far, the Navy and the
Marines have been the most successful at public affairs,"15 he said. In the Navy in
particular, he added, "They get these guys as young lieutenants, they work their
way up through the system, and they know one of them is going to end up as Chief
of Naval Information [the top Navy spokesman] ."16 This is not true in the Army or
the Air Force.
In his recent testimony before the House Armed Services Subcommittee on Ter-
rorism, Unconventional Threats and Capabilities, Rear Admiral Frank Thorp
agreed. "The Navy ... is the only military service to consistently promote Public Af-
fairs professionals to flag rank," he stated. And now, "Only one of the four services
communication efforts are led by a career-qualified communication professional."17
So while the officers now heading Air Force public affairs have made "a good
start," Bacon said, "if you really want to improve public affairs, you need to make it
a productive career path: Build a strong cadre of young officers and promote them
up the chain until one of them becomes the top person in public affairs."18 The ad-
vent of broad-based strategic communications processes and the pentathlete con-
cept for officer career development certainly makes this outcome possible for the
Army's public affairs career professionals.
Vision
The emergence of strategic communications as a concept around which we can
build solid, meaningful and timely national communication of policy is logical and
ripe for development. At the national level our greatest asset is the recognition that
from the seat of government, communications must be tied to national strategy
and policy. Strategic communications is evolving as a process, one of necessity
born in collaboration and integrated into every operation emanating from the na-
tional security strategy of the United States. Within the executive branch of gov-
ernment, we must be able to communicate consistently and clearly with America's
allies and foes, with international audiences across the world stage and remove the
haze of suspicion born of mixed, changing or incomplete messages.
In DoD, our most promising efforts center on the evolving QDR Roadmap and
ongoing efforts to organize, equip, and train career public affairs officers and sup-
port change in the communications field, while educating the force as to the broad
range of capabilities this joint field can offer the joint commander. Strategic com-
munications is not public affairs, but what it brings to public affairs is the strategic
tie, focus and structure.
In the Army, the advent of strategic communications offers the resurrection of a
small, historically marginalized career field, providing both challenge and
244
Man K. Eder
opportunity for sophisticated career communications professionals. The door is
open for these pentathletes to fulfill the need for strategic communications plan-
ning, to teach awareness and broaden the communications capabilities across the
Army, and to provide strong communications support to the warfighter. This is the
potential for strategic communications — to offer insight and understanding of
how to apply information as a formidable element of national power.
Strategic communications is the process that serves as our route to the future,
an acknowledgement of the need to craft communications with forethought, in-
sight, and necessary ties to national strategy and US government policy objectives.
It is logically led by career public affairs officers who have the training, experience,
capability and potential to make it successful.
Notes
1. Donald Rumsfeld, Remarks at the Council on Foreign Relations (Feb. 17, 2006), avail-
able at http://www.defenselink.mil/Speeches/Speech.aspx?SpeechID=27 (emphasis added).
2. Hamdan v. Rumsfeld, 126 S. Ct. 2749 (2006).
3. Henrik Bredberg, SYDSVENSKAN, June 30, 2006.
4. Al-Khazin, Commander in Chief Who Never Commanded, AL-HAYAT (London), July 17,
2006, at 20.
5. Karen P. Hughes, Remarks at the Shell Distinguished Lecture Series, Baker Institute for
Public Policy (Mar. 29, 2006), available at http://www.state.gOv/r/us/64106.htm.
6. Id.
7. Rumsfeld, supra note 1.
8. Robert D. Heinl, Jr., DICTIONARY OF MILITARY AND NAVAL QUOTATIONS 175 (1966).
9. Lawrence DiRita, Terms of Reference, Deputy Assistant Secretary of Defense (Joint
Communication) in the Office of the Assistant Secretary of Defense (Public Affairs), (Jan. 6,
2005) (on file with author).
10. Draft Quadrennial Defense Review Execution Roadmap for Strategic Communication
(Feb. 2006) (on file with author).
1 1 . America's Team; the Odd Couple — A Report on the Relationship Between the
MEDIA AND THE MILITARY (Frank Aukofer & William P. Lawrence eds., 1995) [hereinafter
America's Team; The Odd Couple].
12. Richard Halloran, Soldiers and Scribblers Revisited: Working With the Media, PARAME-
TERS, Spring 1991, at 10.
13. Linda Robinson, The Propaganda War, U.S. NEWS & WORLD REPORT, May 29, 2006, at
29-31.
14. America's Team; The Odd Couple, supra note 1 1, at 3.
15. Sydney Freedberg, Jr., NATIONAL JOURNAL Daily Briefing, Feb. 17, 2006.
16. Id.
17. Statement of Frank Thorp, Deputy Assistant Secretary of Defense (Joint Communica-
tion) at a closed door hearing of the House Armed Services Subcommittee on Terrorism, Un-
conventional Threats and Capabilities, 109th Congress (July 19, 2006).
18. Freedberg, supra note 15.
245
Man K. Eder
ADDENDUM
247
Strategic Communications and the Battle of Ideas
"3
a
a
o
U
c3
O
Oh
<u
•i— >
wo
G
<u
op
248
Mari K. Eder
som
SAVM
SNV3W
> s s " y 22
S ■Jo t g 'g> !s
o. ro o y s
_o co
O LL
CD
c
0"fn
CD
« ra
rr
«5 6
.= o
"O ■"
<
r
\
oj 2
f
2 =3
,2 «
CD "
o> c
3 .2
X3 CO
<o "t!
At O
_1 c
W-
CD —
"i 3
*- c
r^ F
31
> '■=
CD CO
« £
•E o
Q £
K
/
L
/"
— \
<
CD
O
O
High
oldier
ded a
>>
15
3
C
o w >
O
C
CD
CI)
*- o
CD CD CL
0)~|
C
§ -5 CD
X
3
CD
O
>
f^e*
^.
O O CD
<.
O O £
o- £ ^ IS
h-
o
m
■o
o
w
$
<
O O «
'55 ft 2
\f
O CD
u o
vv
/v.
III
? c g
CD c _
EC cd "
SQN3
/*
-2 .5> §
CD CD Q.
*- Oi "D
c ^ c
CD £ CD
l§^
O co -o
too
Q. CD u-
«5 io -,
-til
a? ca e
e-8 ^£
"\/*
CD CD
0 ^ .2 ro
cd _ro ^ o
"O 3 CD H
= T3 a. !_
3 O X o
CO 5- LU ■■
V.
~\C
J\.
« .2
2 =
co £
> co
5 a.
"D CO
£ °
CD
-I CD
°l
CD ro
CD CD
Qo
"V
J\.
O CO
< E
i_ ro
■&»
CD o
2 rx
oj
o
CD
X
LU
-/\.
^
a
OS
S-H
H
H
3
SAVM
SNV3W
249
XV
Challenges of Strategic Communication
Michael A. Brown
*
Successful strategic communication is vital to ensure the success of US policy
abroad and at home and to restore global credibility damaged by recent scan-
dals and our inability to compete in a global market for American ideals on a timely
and relevant basis. The United States is constantly under the international micro-
scope, and how we deal with issues like North Korea, Iran and the recent outbreak
of hostilities between Lebanon and Israel is debated, discussed, supported and vili-
fied in the international community on a daily basis. It is critical that we do not fall
into the realm of "Do as I say, not as I do" as we craft our strategic message to the
global community. Too often the actions we take speak louder than what we say —
most especially when those actions are not consistent with our strategic message.
We need to consider many points of view when dealing with the issue of strate-
gic communication, with generational, ideological, religious, global and regional
impacts requiring a consistent and coordinated theme or message. Strategic com-
munication is about shaping choices at many levels to avoid crisis or lessen crisis,
defeat propaganda, explain a position (legally, morally or ethically) and shape the
future. The message is dynamic, continually requiring assessment and change, and
requires an agile and coordinated approach both horizontally and vertically
through all levels of government. We can no longer focus on single areas of respon-
sibility— every action or inaction has the potential to be global in nature. The wider
Rear Admiral, United States Navy.
Challenges of Strategic Communication
coordination of strategic communication as a consideration into all aspects of mil-
itary planning and operations will not only enhance military effectiveness as a tool
to advance US strategic interests, but will heighten awareness of both legal and eth-
ical considerations that are vital in allowing the United States to regain, then main-
tain, the high ground in global perception management. This is where our
challenge lies. We must ensure a common understanding of strategic goals/
themes/messages with cooperation and message alignment across legislative liai-
son, interagency coordination, public affairs, fleet operations and information op-
erations, while remaining credible and garnering trust. Key considerations are
balancing credibility with ethical, legal and political considerations to create effec-
tive strategic communications policy. Slow "official" response damages credibility
and undermines what is eventually released. We must plan from the beginning
with an effects-based model derived from our strategic goals.
What are our liabilities when employing the news media, public opinion and the
Internet as weapons of war? Who coordinates all the information activities under
the strategic communication umbrella? How is it synchronized? Should it be
through designated personnel in the field or at senior levels in the Pentagon or the
State Department where sometimes sensitive policy decisions can be made? At
what point does trading speed for "the right answer" hurt our overall strategic
communication effort, when our enemies are capable of responding faster and
faster? Timeliness has become critical; the hostilities in Lebanon being a prime ex-
ample. Since the cessation of hostilities, Hezbollah has already made news as they
begin to rebuild the damage done by Israeli missiles and provide services and funds
to the people of southern Lebanon who are returning to their homes, while the
United Nations is still struggling to reach a satisfactory agreement with all parties
regarding a UN peacekeeping force.
Coordinating a coherent strategic message is further complicated by new media
outlets such as blogs, chat rooms and text messaging, which are becoming pre-
ferred sources for information — regardless of validity — in some demographic
groups, and make "managing" information release impossible. Yet they also offer
new opportunities to influence key audiences and undermine adversaries. How are
we to compete in this Infosphere? What is the role of the military and how do we
synchronize within the government? The globalization of media and the abbrevi-
ated news cycle (anyone with a cell phone can become a potential "reporter") can
transform all levels of military operations into potentially devastating strategic lia-
bilities (e.g., the alleged murder of Iraqi civilians by US marines in Haditha in
November 2005). The public will accept some level of moral ambiguity if the stakes
are high. However, if there is not a jointly negotiated, practical ethical standard of
252
Michael A. Brown
conduct, and despite the overall legality of the undertaking, the operation can re-
sult in a tactical win but a strategic loss.
In the end, strategic communication, via public affairs, information operations
and other capabilities, involves complex legal issues requiring careful review and
national level coordination. We must divine the proper roles and responsibilities
for all and develop a process which is both timely and meets the needs of all partici-
pants in the Department of Defense and the rest of the government. Considering
the stakes involved in "fighting the long war"1 against dispersed, global terrorist
networks, the balance between ethical considerations, credibility and gain (e.g., the
potential reduction in US casualties, damage to infrastructure, domestic and global
economies and deterrence of enemy actions) makes strategic communication a job
for all — ambassadors, Foreign Service Officers, Cabinet officials and members of
Congress, as well as those of us in the Department of Defense.2
Notes
1. Department of Defense, Quadrennial Defense Review Report 9-18 (Feb 6, 2006), avail-
able at http://www.defenselink.mil/pubs/pdfs/QDR20060203.pdf.
2. An Around-the-World Review of Public Diplomacy: Hearing Before the House Committee
on International Relations, 109th Congress 34-42 (2005) (statement of Karen Hughes, Under
Secretary for Public Diplomacy and Public Affairs, US Department of State).
253
PART VII
GLOBAL DISASTERS
XVI
Global Disasters: Pakistan's Experience
Ikram ul Haq*
Introduction
The earthquake that struck Pakistan on October 8, 2005 left behind wide-
spread devastation and enormous loss of life with extensive damage to eco-
nomic assets, infrastructure and social service delivery. The devastation was spread
over 30,000 square kilometers of Himalayan terrain. It affected half a million
households, destroyed most of the educational institutions in the affected area and
killed over 73,000 people, including 18,000 children. The majority of health care
units collapsed, communications infrastructure was rendered unusable, all essen-
tial utilities were disrupted and the area was strewn with two hundred million tons
of debris. Families lost their breadwinners, senior citizens were left alone to fend
for themselves, children lost their parents and parents are still mourning lost and
injured children. Infrastructure that took years to construct, disappeared in six
minutes. The misery did not end there. Hundreds of post-earthquake tremors
multiplied the shock and trauma. The administrative machinery that could have
helped the victims survive the disaster, itself collapsed and perished. The rugged
mountainous terrain made it more difficult and winter in the Himalayas threat-
ened the lives of the survivors, already traumatized. This, the worst natural calam-
ity in Pakistan's history, has changed the lives of millions and is one from which it
will take many years and at a cost of billions of dollars to recover.
* Brigadier General, Pakistan Army. The views expressed in this article are those of the author
alone and do not necessarily represent the views of the Pakistan government, the Pakistan
Defence Force, or the Pakistan Army.
Global Disasters: Pakistan's Experience
This article will focus on an assessment of the damage caused by the disaster, an
examination of the impediments and challenges faced in the conception and con-
duct of relief operations, and the lessons that were learned.
Damage Assessment
The earthquake struck Pakistan without warning at 8:50 am (local time) on the
morning of October 8, 2005. With its epicenter several miles northeast of the city of
Muzaffarabad, the earthquake registered 7.6 on the Richter scale, similar in inten-
sity to the earthquake that devastated San Francisco in 1906. Widespread destruc-
tion occurred throughout Pakistan-administered Kashmir, Pakistan's North-West
Frontier Province (NWFP) and the western and southern parts of the Kashmir val-
ley in Indian-administered Kashmir. A total of 147 aftershocks were experienced
throughout that day. By October 27, that number had swelled to 978 and included
aftershocks reaching intensities of up to 6.2 on the Richter scale. By early Novem-
ber, the official Pakistan government estimate of Pakistani dead reached 73,338,
with 128,304 being injured, many very severely. The earthquake triggered land-
slides that literally buried entire villages and roads. Some 59 percent of the residen-
tial structures in the region were leveled, including 67 percent of education
institutions in which 18,095 children perished in collapsed school buildings.
Health care facilities were similarly devastated, with 63 percent of the region's
medical capacity being damaged or destroyed. Rescue and recovery operations in
the mountainous area were hampered by the destruction of up to 37 percent of the
road infrastructure, including critical bridges. Government services were equally
impacted with estimates of damage to electric capability reaching 60 to 70 percent,
telecommunications 30 to 40 percent and water supply 30 to 40 percent.1
Response Challenges
Among the major challenges that were faced in the immediate aftermath of the di-
saster were both institutional and informational vacuums. With respect to the for-
mer, Pakistan had a National Crisis Management Cell (NCMC), but this
institution lacked the necessary resources and capacity. Once the earthquake shook
Pakistan, it was soon realized that the gravity of the disaster had overwhelmed the
ability of the NCMC to handle the situation. As a result, we were pretty much left in
an institutional vacuum to deal with the enormity of the crisis. This institutional
failing was compounded by the informational vacuum. The scale of devastation
and human trauma, coupled with the idiosyncrasies of the mountainous terrain
and weather, and the administrative paralysis that engulfed the region, led to an
258
Ikram ul Hag
information vacuum as to the exact nature and extent of the damage and, in turn,
the appropriate response to generate. Among the major challenges faced were the
rescue of the injured and the location and removal of the dead, facilitation of the
rapid induction of disaster relief forces, and reaching out to remote villages, while
confronting chaos in the impacted cities. To illustrate the scope of the problem, it
was determined that some 470,000 tents were immediately needed to shelter the
multitudes rendered homeless.
Conception and Conduct of Relief Operations
At the National Level
The ability to organize a swift response to the enormous magnitude of the destruc-
tion and suffering was made even more difficult by the reality that the existing in-
frastructure was either very poor or totally destroyed. Realizing the gravity of the
disaster, the government immediately established the Federal Relief Commission
(FRC) with a mandate to manage the entire spectrum of relief efforts. All national
agencies concerned with the relief and rehabilitation efforts, including the armed
forces, the cabinet ministries of health, interior and foreign affairs, as well as corre-
sponding communication and information divisions, functioned through the FRC
and formed a part of the national team. FRC served as the primary interface be-
tween the government and international organizations, as well as foreign authori-
ties and various nongovernmental organizations (NGOs) focusing on the relief
and rehabilitation of the stricken area.
The FRC was organized to work with two distinct wings, the civilian and the
military. The civilian wing, comprised of ministerial representatives and coordina-
tors, looked after the inter-department and inter-agency issues, while the military
wing was responsible for the operationalization of rescue and relief efforts.
The disaster response concept consisted of four complementary strategies, i.e.,
search, rescue, relief and recovery; consequent management; rehabilitation; and
reconstruction. The FRC focused on the first two strategies while the rehabilitation
and restoration domains were addressed by the Earthquake Rehabilitation and Re-
construction Authority (ERRA). The entire effort was undertaken under one lead-
ership platform, thereby ensuring judicious distribution of disaster relief through a
synergized operation. The maintenance of law and order, the revival of civic order,
and restoration and early recovery aspects of the concept were the main thrust
lines. The FRC was fully supported by the nation, key players and stakeholders. The
decisive vision and leadership by the government throughout the crisis provided
ideal working parameters and impetus to the FRC, foreign governments, individ-
ual donors, the public and all of the governmental departments.
259
Global Disasters: Pakistan's Experience
The approach adopted at the national level to meet the crises was premised on
several distinct but interfacing considerations. The FRA functioned on the basic
principle of a "one-window operation" with accessibility to all. This ensured the
maximum possible coordination at both the national and operational levels to re-
alize an economy of effort in achieving the desired results. "Reaching out" in all af-
fected areas was given top priority. All available means of transportation, to
include foot movement, animal transport, motor vehicles and helicopters, were
used to "reach out" to affected people to provide systematic, timely and equitable
distribution of relief goods and services. Of immediate concern as the weather de-
teriorated was the implementation of a strategy for the speedy construction of tem-
porary shelters and a functioning logistic chain that extended to the forward-most
places. For the first time, the government put into practice the UN "cluster ap-
proach" to managing various aspects of disaster management.2 Of particular utility
was the Strategic Leaders Forum consisting of the heads of the main international
relief and non-governmental organizations, and individual donors.
At the Operational Level
The Pakistan Armed Forces, in general, and the Pakistan Army in particular, were
responsible for all operational aspects of multi-agency and multi-organization re-
lief efforts. Two Army infantry brigades were deployed within 24 hours of the ini-
tial shock, and within 48 hours a full division had been deployed. The decision to
deploy three divisional headquarters was taken within the first 72 hours as the
enormity of the task became clearer. By the end of October, over 80,000 troops
were deployed in the disaster zone.
At the operational level, the relief operation was conceived and executed in
three stages, with each stage gradually blending into the subsequent stage, and with
considerable overlap in some areas.
Stage One (October 8-20) was the immediate rescue and relief operation. The
main focus of Stage One was the rescue of survivors, the location and removal of
dead bodies from the debris, the evacuation and treatment of the injured and the
provision of food and shelter to those most in need. Special emphasis was placed
on providing for the care and protection of vulnerable women and children.
Stage Two (October 20-December 31) concentrated on creation of stability in
the face of widespread chaos. It was a very crucial effort, as Stage Two became a race
against time, i.e., about 3.5 million homeless people had to be adequately
provisioned and protected against the fast approaching winter. The urgency of the
endeavor was reflected in the fact that the United Nations and other relief agencies
were predicting a second wave of deaths due to exposure of the vulnerable popula-
tion to the harsh winter. The main activities conducted during this stage were the
260
Ikram ul Hag
provision of shelter (tents and robust transitional shelters) and the creation of tent
villages; providing food and medical support; distribution of monetary compensa-
tion for the dead, the injured and damaged homes; restoration of civic and social
amenities and institutions, with priority given to health and education sectors;
and, perhaps most importantly, bringing local government and administration
back to its feet.
Stage Three (January 1-March 31) sought to ensure that the stability created
during the previous stage was maintained throughout the harsh winter. Key ele-
ments of Stage Three included monitoring the provision of critical support activi-
ties to ensure that food, shelter and medical services were sustained throughout the
winter and into the spring, and working to ensure a smooth transition from provi-
sion of relief to the reconstruction and rehabilitation of devastated urban and rural
areas.
Reconstruction and Rehabilitation
After six months, the emergency relief phase was over and focus shifted towards re-
building the shattered areas. The Earthquake Reconstruction and Rehabilitation
Authority (commonly known as ERRA) was established to plan, coordinate, moni-
tor and regulate reconstruction and rehabilitation activities in all earthquake af-
fected areas. The ERRA developed a comprehensive three-year plan involving
eleven development sectors, with special focus on housing, health, education and
livelihood in earthquake- affected areas. Some $3.5 billion was earmarked for that
purpose, effective as of the first week of April of 2006.
The National Response
The spontaneous outpouring of compassion and generosity by the people of Paki-
stan, both at home and abroad, on a scale never witnessed before, helped the gov-
ernment meet fiscal shortfalls. Pakistanis from all walks of life stepped forward,
demonstrating our nation's highest values of caring and sharing that brought con-
solation and hope to the affected. From soldiers and voluntary relief workers to lo-
cal NGOs, the people of Pakistan stepped forward to protect and nurture the
earthquake victims.
The International Response
The people of Pakistan were overwhelmed by the generosity of the response of the
world community and voluntary organizations. Simply put, they have been of
great support to us. I take this opportunity to praise in the highest possible terms
the work of the volunteers, men and women, foreign governments, armed forces of
261
Global Disasters: Pakistan's Experience
friendly countries, the aid workers, the international organizations, NGOs and the
global civil society who worked tirelessly and selflessly to make a difference to those
who suffered. We are also deeply grateful for the generous support and assistance
of individual donors worldwide in providing desperately needed relief to the earth-
quake victims.
United States
I had the opportunity to personally observe US relief efforts while at the US Central
Command (CENTCOM). The United States responded immediately and gener-
ously to Pakistan's call for assistance following the earthquake. The US military was
in Pakistan on October 10, just two days after the earthquake. At the peak of the
initial relief efforts, more than 1,200 personnel and 25 helicopters provided vital
transport, logistics, medical and engineering support in the affected areas. US heli-
copters, nicknamed "Angels of Mercy," changed the dimension of relief efforts and
helped save hundreds of lives. I have not the words to begin to thank the United
States for its assistance. To give you some idea of the assistance provided by the
United States, a total of $510 million was pledged for earthquake relief and recon-
struction efforts. Over 250 US military and civilian cargo airlift flights delivered
more than 7,000 tons of medical supplies, food, shelter material, blankets and res-
cue equipment to Pakistan. Approximately 5,200 helicopter missions were flown,
delivering 15,000 tons of supplies and transporting more than 18,000 people. US
medical teams treated approximately 35,000 patients, while US engineers cleared
40,000 tons of debris, built a camp for displaced people, completed numerous sani-
tation projects and adopted a village that included building five schools and 50
homes. Moreover, the United States donated an 84-bed Mobile Army Surgical
Hospital and established two forward-area refueling point systems to increase heli-
copter efficiency during reconstruction.
North Atlantic Treaty Organization
NATO was a vital part of a very large effort aimed at providing disaster relief in Pa-
kistan. In total, some 1,000 NATO engineers and supporting staff, as well as 200
medical personnel, worked in Pakistan during the operation. NATO airlifted sup-
plies, donated by NATO member and partner nations, as well as by the UN High
Commissioner for Refugees, via two air bridges from Germany and Turkey. That
critical effort required 168 NATO flights that delivered almost 3,500 tons of relief
supplies. NATO helicopters transported more than 1,750 tons of relief goods to
remote mountain villages and evacuated over 7,650 disaster victims. A NATO
hospital treated approximately 4,890 patients and conducted 160 major surgeries,
while mobile NATO medical units treated 3,424 patients in the remote mountain
262
Ikram ul Hag
villages. NATO also contributed significantly to the World Health Organization
immunization program that has helped to prevent the outbreak of disease. NATO
engineers were active in repairing nearly 60 kilometers of roads and removing
over 41,500 tons of debris, thereby enabling the flow of aid, commerce and hu-
manitarian assistance. NATO engineers also supported the Pakistan Army in Op-
eration Winter Race, by constructing 110 multi-purpose shelters for the
population living in the mountains. An additional nine school and health struc-
tures were completed and thirteen tent schools erected. NATO also set up an avi-
ation fuel farm in Abbottabad, which carried out some 1,000 refuelings for
civilian and military helicopters.
Lessons Learned
Combating the disastrous earthquake has been a unique and challenging experi-
ence, which fostered many lessons that can serve as guidelines for dealing with such
a calamity in the future. Among the lessons that have universal application are
those concerned with government institutions, disaster management strategy, ex-
peditious acquisition of information, the role of the media, mobilization and de-
ployment of friendly forces, cooperation with friendly armed forces and nations,
capacity building and the development and enforcement of design codes.
Institutions
Creation of the FRC within the Prime Minister Secretariat, which works directly
under the prime minister, has been a success story. A proposal is now under active
consideration to create a permanent National Disaster Management Authority
(NDMA), with appropriate legislative authority to work directly under the Prime
Minister's Secretariat. Similar disaster management capabilities are likely to be es-
tablished at the provincial level, to include control centers with requisite facilities.
Each will be maintained by a small nucleus staff, which can be suitably augmented
during a crisis.
Disaster Management Strategy
A well-thought-out and comprehensive disaster management strategy, encom-
passing the likely scenarios, delineation of responsibilities and capacity-building
guidelines must be evolved.
Expeditious Acquisition of Information
Expeditious acquisition of information regarding the extent of damage to essential
infrastructure can greatly assist in the provision of rapid and effective relief and
263
Global Disasters: Pakistan's Experience
rescue. It soon became apparent that serious information shortfalls existed in our
system. Our experience demonstrates that up-to-date data pertaining to housing,
civic facilities and other details about each area should be available in the national
database. Clearly, this would be most useful for rapid damage assessment.
Some capability to undertake rapid mapping and damage assessment in the disas-
ter zone should be created. High-resolution satellite imagery/aerial photography
could prove crucial to ascertaining the location and nature of the damage
sustained.
Role of the Media
The media can make a major contribution in any relief operation. The main areas
of media contribution during the earthquake relief operation in Pakistan included
the transmission of graphic images of the destruction and the miseries of the af-
fected populace and timely, on-scene reports of the progress of relief and recovery
operations. Media reporting of the devastation stirred up great emotions within
the country, which created a flood of relief activity. Similarly, the international
media was able to mobilize the relief effort at the international level.
Local media acted as a potent watchdog on the progress of the relief and recov-
ery operation. Although at times unfairly critical, the media helped in keeping us
on our toes. Lastly, sustained media coverage proved instrumental in keeping do-
nors, both national and international, motivated to continue their generous
support.
Mobilization and Deployment of Friendly Forces
Disaster management is basically a race against time. Mobilization and deploy-
ment of some friendly forces took as long as two months because of the limited ca-
pability of the providing nation to mobilize sooner. It is recommended that
nations and alliances having the potential — and the will — to provide much needed
assistance develop the capability for rapid deployment for timely disaster response.
Cooperation with Friendly Armed Forces and Nations
The support received from friendly nations and their armed forces proved to be ex-
tremely useful. This reality highlights the need to formalize mechanisms for more
effective cooperation and coordination should the need arise in the future. To that
end, peacetime agreements with friends and allies with the potential to assist in di-
saster management and the willingness to do so must be in place before disaster
strikes. These agreements should include memoranda of understanding between
participating nations pledging delineated capabilities. This, in turn, will facilitate
the conduct of joint mock disaster relief exercises.
264
Ikram ul Hag
A multinational forum to share disaster relief and recovery experiences with
each other should be created. Many nations have suffered major disasters in the re-
cent past. There is much that can be learned through the sharing of each other's
experiences.
Capacity Building
Although some agencies in Pakistan had the experience and appropriate potential
to assist in disaster management, it became painfully apparent that they did not
possess the expertise nor were they equipped to handle a large-scale earthquake.
Accordingly, additional capacity must be created, both in trained manpower and
in equipment, for specific disaster relief and rescue tasks.
Development and Enforcement of Design Codes
The extent of damage in a major calamity can be greatly reduced if residential and
commercial buildings are constructed in accordance with proper architectural de-
signs. There is a clear and impelling need to develop building design codes based
upon rigorous scientific studies. Effective provision must then be made for their
enforcement through legislative measures.
Conclusion
As noted previously, Pakistan was overwhelmed by the caring and enthusiasm of
the world community and voluntary organizations which have been so generous in
providing desperately needed relief to the earthquake victims. Having transitioned
from the relief and crisis control stage to the rehabilitation and reconstruction
phase of the recovery, the Government of Pakistan is maintaining its thrust to rein-
troduce the normalcy of life through the revival of essential infrastructure and the
civil order. At the same time, we are brainstorming a permanent "Disaster Man-
agement Agency" for preparedness and coordination of a coherent response to any
future challenge.
Notes
1 . Depictions of the widespread human and physical devastation caused by the earthquake
are available at http://en.wikipedia.org/wiki/2005_Kashmir_earthquake (last visited Mar. 12,
2007).
2. See Action Aid International, The Evolving UN Cluster Approach in the Aftermath of
the Pakistan Earthquake: an NGO Perspective, available at http://www.actionaid.org/pakistan/
images/ ActionAid%20Report%20on%20UN%20Cluster%20Approach%20April%202006.pdf
(last visited Mar. 12, 2007).
265
XVII
Australian Defence Force Experience with
Non-Government Organizations in
Humanitarian Assistance and Disaster Relief
Operations
Evan Carlin
*
Recent experience suggests that humanitarian assistance and disaster relief
operations are a growth industry for military forces. In the last 12 months
alone, the Australian Defence Force (ADF) has provided emergency aid to victims
of the Pakistan earthquake; the Indian Ocean tsunami; the Nias, Indonesia earth-
quake (in which nine ADF personnel died in a helicopter crash); and Cyclone
Larry, a category 5 tropical cyclone that tore across the north Queensland coastline
of Australia in early 2006.
Figures from the World Health Organization's Centre for Research on Epide-
miology of Disasters show that from 1990 to 2003 there was a 180% increase in the
number of people affected by natural disasters: 255 million people in 2003 up from
90 million in 1990.1 Between 1990 and 2000 in Asia alone there were 215 so-called
"non-complex" relief operations (floods, earthquakes, volcanic eruptions, etc.,
where host nations were the primary responders).2 Operation Shaddock, for
* Lieutenant Colonel, Australian Defence Force. The author is not authorized, nor does he
purport, to speak for the Australian government or the Australian Defence Force.
Australian Experience with NGOs in Humanitarian Operations
example, saw the ADF come to the aid of Papua New Guinea following a tsunami
on July 17, 1998 that killed over 3,000 people.
Complex relief operations, on the other hand, involve the delivery of humani-
tarian assistance to societies riven by warring factions, civil disorder or population
displacement, any or all of which problems might be compounded by the misery of
a natural disaster. One example is the multinational force led by the ADF to render
humanitarian aid, provide security and instill the rule of law in guiding Timor-
Leste to become the first new nation of the twenty-first century.
However one might categorize emergency relief operations, it is traditionally
the case that military forces are called upon to provide the humanitarian or disaster
aid required often with little, or indeed no, notice. Military forces have the re-
sources at hand to quickly reach inaccessible places. But increasingly, some non-
government organizations (NGOs) rival the capacity of military forces to transport
large volumes of supplies in relief operations. The Brookings Institution cites a case
in point: "During the highly visible airlift of food into Afghanistan during the win-
ter of 2001-02, the U.S. military delivered only a tiny fraction of the total brought
in through conventional operations by WFP [World Food Program] and NGOs
like IRC [International Red Cross] ."3 Not only do such NGOs have the capacity to
deliver aid where required — they can do it cheaper than military forces.
Perhaps relief operations should be left to specialist NGOs. This is the prefer-
ence of some NGOs, such as Medecins Sans Frontieres, who seek to provide aid re-
lief unencumbered by politics and military association. This would permit military
forces to maintain their focus on their core function of warfighting. Military forces
usually are only too pleased to hand over the reins of relief operations as soon as
practicable to NGOs or UN agencies. For some time the United States has been un-
easy about the resources of its armed forces being diverted from its core function,
as noted by the US Congressional Research Service (CRS):
For over a decade, some Members of Congress have expressed reservations about U.S.
military involvement in peacekeeping. The Bush Administration's decision to reduce
the commitment of U.S. troops to international peacekeeping seems to reflect a major
concern: that peacekeeping duties [defined by the CRS to include "providing security
for humanitarian relief efforts"] are detrimental to military "readiness," i.e., the ability
of U.S. troops to defend the nation.4
Certainly there is no shortage of NGOs around the world ready and willing to assist
in relief operations. It is estimated that within three weeks of the 2004 Boxing Day
tsunami in Southeast Asia there were over 109 NGOs operating in Indonesia, 84 in
Sri Lanka and 35 in Thailand.5
268
Evan Carlin
The fact remains, of course, that military forces are indispensable for relief oper-
ations in hostile or uncertain security environments. Moreover, despite the capac-
ity of NGOs for economical long-term lease of aircraft in relief operations, military
forces are unmatched in their ability to rapidly deliver aid to remote places, partic-
ularly in the maritime environment. The day after the 2004 tsunami, Australian
soldiers departed for Sumatra and within a week had established a water purifica-
tion plant in Banda Aceh. Military forces have the capacity to bring instantaneous
infrastructure to a devastated area. As simply stated in Royal Australian Navy doc-
trine: "Naval forces are self-supporting and do not create logistic burdens in situa-
tions where infrastructure has been destroyed or severely damaged."6
The NATO Review neatly assessed the military contribution to relief operations
in these terms:
The recent disasters in the United States and Pakistan have highlighted how useful
certain military capabilities can be when first responders find themselves
overwhelmed. Strategic airlift is crucial to transport urgently needed relief supplies as
commercial aircraft are not always available in sufficient numbers. Moreover,
helicopters have proven essential in the first phase of a disaster-relief operation when
roads are often too badly damaged to be passable and sealift capabilities are critical to
sustaining the relief effort in a more cost-effective way in the weeks and months
following a disaster. Rapidly deployable military hospitals and medical personnel can
also help out overburdened first responders. In addition, military engineers, water
purification units and search-and-rescue teams all have the skills that can greatly
improve crisis-response capabilities and save lives.7
Whether wrought by climate change or happenstance, the world has recently
witnessed a succession of natural disasters of such scale as to pose transnational
challenges that require international cooperation and understanding. This need
was clearly evident in the most devastating of these disasters, the Indian Ocean tsu-
nami of Boxing Day 2004.8 The tsunami was triggered by an enormous undersea
earthquake (9.3 on the Richter scale) that ruptured the earth's crust for over 1,000
kilometers, releasing tremendous energy. This, the second most powerful earth-
quake ever recorded,9 generated a tsunami whose destruction in the immediate re-
gion was shocking, and a global tragedy.
What frameworks exist for civilian-military and international cooperation in re-
lief operations? On December 19, 1991, UN General Assembly Resolution 46/1 82 10
created the Department of Humanitarian Affairs, designed to strengthen the coordi-
nation of humanitarian emergency assistance. The resolution outlined 30 guiding
principles "in accordance with the principles of humanity, neutrality and impartial-
ity"11 for the provision of relief aid. It reaffirmed the primary responsibility of States
269
Australian Experience with NGOs in Humanitarian Operations
to care for the victims of natural disasters within their borders but asserted that
"the United Nations has a central and unique role to play in providing leadership
and coordinating the efforts of the international community to support the af-
fected countries."12 The resolution makes it clear that coordination is the key tool
in humanitarian operations.
The UN Charter makes no specific reference to the use of military forces in hu-
manitarian operations. There is an inherent tension between the roles of civilian
agencies and military forces in relief operations. This was evident, for example, in
1994 during Operation Restore Hope in which US military and international civil-
ian aid agencies worked through a Civil Military Operations Center (CMOC) to
overcome their "cultural differences" for the common good of Rwandan refugees
in Zaire.13
In a perfect world there should naturally be complementarity between military
forces and NGOs in relief operations. The Geneva Conventions and their Addi-
tional Protocols14 refer to impartial relief societies concerned with the provision of
humanitarian aid and the protection of relief agency personnel. Surely this pro-
vides common ground with military forces whose duty it is to protect civilians un-
der the law of armed conflict.
In 1994 the Oslo Guidelines on the Use of Military and Civil Defence Assets in
Disaster Relief15 were adopted by various nations to provide effective interaction of
military and civilian actors in disaster relief operations. In subsequent years, the
Oslo Guidelines were developed by the UN's Office for the Coordination of Hu-
manitarian Affairs (OCHA). After a review of a number of operations, OCHA con-
ceded that in a range of international relief operations:
[T]he coordination between the international military forces and the responding UN
humanitarian agencies and other international civilian actors has been critically
examined by a number of participants and observers and found to be in need of
improvement. The success that was achieved in the use of military resources and
coordination was due largely to the extraordinary efforts of the personnel in the field. 16
Also in 1994, the International Red Cross and Red Crescent Movement pub-
lished its Code of Conduct for disaster relief operations.17 This code stipulates ten
principles founded upon the need for impartiality — that aid should be given on the
basis of and in proportion to need alone.
The conduct of civil-military relief operations requires impartiality and cooper-
ation but also cultural sensitivity and political sagacity. This was evident no more
so than in the international relief operation in the wake of the 2004 Boxing Day
tsunami.
270
Evan Carlin
About 250 kilometers from the epicenter of the earthquake, Aceh suffered the
full brunt of the tsunami's force. This was a catastrophe in one of the most iso-
lated and politically charged areas of Southeast Asia and a source of political in-
stability for more than a century.18 Before the arrival of international aid workers,
the Indonesian government had quarantined Aceh. Indonesian forces regularly
clashed with the Free Aceh Movement, or GAM, rebels. The local population is as
devoutly Muslim as anywhere in the world and Sharia law is in force. For nearly
three decades, Aceh was embattled, silent and closed off from the outside world.
The earthquake and tsunami left survivors devastated and prey to the entreaties
of al-Qaida and Jamah Islamia, whose members, undoubtedly, were gathering to
hand.
The first foreigners on the scene and with the greatest lift capacity were forces
from Australia, Singapore and the United States. Troops were unarmed and relied
upon Indonesian security to conduct relief operations. As an Indonesian com-
mander remarked, "If you want to carry a weapon, you'd better choose a side."
During the three months that the ADF conducted relief operations in Aceh, some
200 people were killed in skirmishes between GAM and Indonesian forces.
It was into this situation that thousands of troops and hundreds of civilian re-
lief workers descended. While foreign forces and NGOs scurried to organize
themselves, stoic Indonesian soldiers set about the grimmest of tasks, tirelessly
clearing waste and debris and disposing of the dead in accordance with local prac-
tice. Many of these soldiers had themselves lost loved ones. Many had no family or
homes to which to return. When the tsunami struck, Indonesian troops were con-
ducting an amphibious landing exercise. All those soldiers perished, along with
some 1,000 of their comrades at their headquarters at Banda Aceh. Offshore the
USS Bonhomme Richard Expeditionary Strike Group and USS Abraham Lincoln
provided considerable muscle and heavy lift. US Navy aviation assets were crucial
to the aid effort.
The ADF's primary concern was to ensure that the relief effort was in accor-
dance with Indonesian priorities. The view that Indonesians knew best what Indo-
nesians required was a fundamental precept of Australian, Singaporean and
American forces. Through the Civil- Military Aid Coordination Conference
(CMAC) this view was shared by other foreign forces and the majority of NGOs.
The CMAC met daily in Medan, the transport hub of northern Sumatra. An Indo-
nesian colonel, with an Australian lieutenant colonel as deputy, chaired the meet-
ings. The CMAC was the principal means of sharing information about the
progress of the mission, road conditions, security concerns, aid priorities, bottle-
necks and expectations.
271
Australian Experience with NGOs in Humanitarian Operations
Expectation management was a prime concern for the CMAC. The thousands
of military and civilian aid workers who descended upon Indonesia burned with
the desire to help. The mood was reflected by Dr. Fiona Terry, founder of the Aus-
tralian section of Medecins Sans Frontieres: "Humanitarian action is more than a
technical exercise at nourishing or healing a population defined as in need; it is a
moral endeavor based on solidarity with other members of humanity."19 The role
of the CMAC (and its Secretariat comprised initially of ADF, Singaporean and US
officers, with representatives of the Australian Government Aid Program
(AUSAID), the US Agency for International Development (USAID) and the UN
Joint Logistic Centre (UNJLC)) was to manage the prosaic but crucial tasks of set-
ting priorities, allocating scarce air assets and ensuring that relief supplies were effi-
ciently and effectively distributed.
In those early weeks of the operation, certain misconceptions about the needs of
Aceh proved difficult to dispel. It fairly quickly became evident that the survivors
suffered relatively few serious injuries and that there were sufficient medical staff
and equipment for their needs. It proved challenging to stem the tide of doctors
and nurses to the region. The real needs were engineers for reconstruction, envi-
ronmental health officers to counter disease and qualified NGOs to manage the
camps of displaced persons.
A considerable amount of aid donated from around the world was undoubtedly
well intended but misguided. The warehouses in Medan were brimming with
sweaters, Western-style tinned baby food, hillocks of canned baked beans, crates of
boiled fruitcake and mounds of precooked meals for which the people of tropical
Aceh had neither the need nor the appetite. Truckloads of disposable diapers were
a mystery to these people and contributed yet more waste in a region blanketed in
litter. The pressing need was, in fact, for dried fish, rice noodles, powdered milk
and cloth diapers.20
The best NGOs were informed, organized and relatively self-sufficient. In par-
ticular, the International Organization for Migration (IOM) had vehicles and was
well organized. The World Food Program (WFP) had aircraft and their own tem-
porary accommodation. The Red Cross and Red Crescent Movement and
Medecins Sans Frontieres were experienced, politically informed and focused on
finding solutions, and Caritas efficiently directed its energies to pastoral care.
The NGOs who experienced the most frustration and were perhaps less effective
were those who were impractical, ignorant of Sharia law, failed to calibrate security
concerns into their plans, complained that the Indonesian government did not un-
derstand them and failed to appreciate that a humanitarian disaster must be ad-
dressed in its context. Some NGOs, in their callow enthusiasm, failed to appreciate
that the consent of any nation to welcome large and diverse numbers of
272
Evan Carlin
international military and civilian relief workers is rarely unconditional and open-
ended. The most egregious error by a few naive aid workers was to unilaterally set
off for Aceh by road through Sumatran jungles only to break down and themselves
become "secondary victims" of the disaster requiring assistance.
The most effective NGOs were not necessarily the large, established organiza-
tions. A capable group of well-connected volunteers from a Sydney suburban
council proved effective. Surfers Without Borders diligently hired boats and ac-
cessed the otherwise inaccessible parts of western Sumatra to paddle ashore with
supplies. And, improbably, Save the Sumatran Orangutans delighted the CMAC
by arriving with a sumptuous swag of donations to put to good use — for humans.
The ADF completed its mission in Aceh in three months. "Completed," of
course, is a relative term. The measure of success in relief operations is a matter of
delivering the greatest good in the time available. The CMAC worked efficiently,
certainly diligently, and aid was directed purposefully and quickly. It proved an ef-
fective mechanism, as OCHA describes, for bridging the "humanitarian gap be-
tween the disaster needs that the relief community is being asked to satisfy and the
resources available to meet them."21
Notes
1. Salvano Briceno, Director, United Nations Inter-agency Secretariat of the International
Strategy for Disaster Reduction (UN/ISDR), Statement at the Conference on Education, United
Nations Educational, Scientific and Cultural Organization (UNESCO), International Bureau of
Education (IBE), Geneva (Sept. 9, 2004).
2. Report from the Conference on Evolving Roles of the Military in the Asia-Pacific (Mar.
28-30, 2000), Honolulu, Hawaii, hosted by the Asia-Pacific Center for Strategic Studies, avail-
able at http:/ /www. apcss.org/Publications/Report_Evolving_Roles.html.
3. Steven Hansch, Humanitarian Assistance Expands in Scale and Scope, in SECURITY BY
Other Means: Foreign Assistance, Global Poverty and American Leadership (Lael
Brainard ed., 2006).
4. Nina M. Serafino, Peacekeeping and Related Stability Operations: Issues of U.S. Military
Involvement, Congressional Research Service (Oct. 4, 2004), available at http://www.senate.gov/
~hutchison/IB94040.pdf.
5. Commander, US Navy Warfare Development Command, Tactical Memo 3-07.6-05,
Humanitarian Assistance/Disaster Relief Operations Planning 4-2 (2005), available at http://
www.au.af.mil/au/awc/awcgate/navy/tm_3-07-6-05_navy_ha&dr_ops_plng.pdf.
6. Australian Maritime Doctrine - RAN Doctrine l - 2000, ch. 7 (D.J. Shackleton
ed., 2000), available at http://www.navy.gov.au/spc/amd/amdintro.html.
7. Maurits Jochems, NATO's Growing Humanitarian Role, NATO REVIEW, Spring 2006,
http://www.nato.int/docu/review/2006/issuel/english/art4.html.
8. The 2004 Boxing Day tsunami is listed by the Congressional Research Service as the sixth-
deadliest natural disaster since 1900:
273
Australian Experience with NGOs in Humanitarian Operations
Date
Location
July 1931
China
July 1959
China
July 1939
China
Nov. 12, 1970
Bangladesh
July 27, 1976
China
Dec. 26, 2004
Indian Ocean
Event
Estimated
Fatalities
Flood
3.7 million
Flood
2 million
Flood
500,000
Cyclone
300,000
Earthquake
242,000
Earthquake and Tsunami
224,495
[Note: Other figures estimate the tsunami death toll at between 229,866 and 275,000]
May 22, 1927 China Earthquake 200,000
Dec. 16, 1920 China Earthquake 180,000
Sep. 1, 1923 Japan Earthquake 143,000
1935 China Flood 142,000
Daniel Kronenfeld & Rhode Margesson, The Earthquake in South Asia: Humanitarian Assistance
and Relief Operations 20, Congressional Research Service (Mar. 24, 2006), available at http://
www.whprp.org/NLE/CRSreports/06May/RL33196.pdf.
9. The most powerful earthquake recorded was one measuring 9.5 that struck Chile in
1960. Seth Stein & Emile Okal, Size and Speed of the Sumatra Earthquake, NATURE, Mar. 3, 2005,
at 434, 581.
10. Strengthening of the Coordination of Humanitarian Emergency Assistance of the
United Nations, G.A. Res. 46/582, U.N. Doc. A/RES/46/182 (Dec. 19, 1991).
11. Id., Annex, Guiding Principles, para. 2.
12. Id., Annex, Guiding Principles, para. 12.
13. John E. Lange, Civilian-Military Cooperation and Humanitarian Assistance: Lessons from
Rwanda, PARAMETERS, Summer 1998, at 106.
14. See, e.g., Common Article 3 of Convention for the Amelioration of the Condition of the
Wounded and Sick in Armed Forces in the Field, Aug. 12, 1949, 75 U.N.T.S. 31 [Geneva Conven-
tion I]; Convention for the Amelioration of the Condition of the Wounded, Sick and Ship-
wrecked Members of the Armed Forces at Sea, Aug. 12, 1949, 75 U.N.T.S. 85 [Geneva
Convention II]; Convention Relative to the Treatment of Prisoners of War, Aug. 12, 1949, 75
U.N.T.S. 135 [Geneva Convention III]; and Convention Relative to the Protection of Civilian
Persons in Time of War, Aug. 12, 1949, 75 U.N.T.S. 287 [Geneva Convention IV]; all reprinted in
DOCUMENTS ON THE LAWS OF WAR (Adam Roberts & Richard Guelff eds., 3d ed. 2000) at 197,
222, 244 and 301, respectively. See also Article 17 of Protocol Additional to the Geneva Conven-
tions of 12 August 1949, and Relating to the Protection of Victims of International Armed Con-
flicts (Protocol I), June 8, 1977, 1125 U.N.T.S. 3; and Article 18 of Protocol Additional to the
Geneva Conventions of 12 August 1949 and Relating to the Victims of Non-International
Armed Conflicts (Protocol II), June 8, 1977, 1125 U.N.T.S. 609; reprinted in id. at 419 and 481,
respectively.
15. An updated (November 2006) version of the 1994 Oslo Guidelines on the Use of Military
and Civil Defence Assets in Disaster Relief is available at http://www.reliefweb.int/rw/lib.nsf/
db900SID/AMMF-6VXJVG/$FILE/OCHA-Nov2006.pdf?OpenElement.
16. OCHA, http://ochaonline.un.org/ (last visited Aug. 27, 2006).
274
Evan Carlin
17. See Code of Conduct for the International Red Cross and Red Crescent Movement and
NGOs in Disaster Relief, available at http://www.gdrc.org/ngo/codesofconduct/ifrc-codeconduct
.html.
18. In 1 883 when Krakatoa exploded in the Sunda Strait, the noise impelled the Dutch garri-
son at the other end of Sumatra to battle stations, they having assumed that Achinese insurgents
had blown up a local fort. See SIMON WINCHESTER, KRAKATOA: THE DAY THE WORLD EX-
PLODED 264 (2003).
19. Fiona Terry, Condemned to Repeat? The Paradox of Humanitarian Action
244 (2002).
20. For further discussion of these issues, see Steven Hansch, Humanitarian Assistance Ex-
pands in Scale and Scope, in SECURITY BY OTHER MEANS, supra note 3.
21. November 2006 version of the 1994 Oslo Guidelines, supra note 15, at 7.
275
XVIII
Disaster Response:
Key Legal Issues for US Northern Command
Kurt Johnson*
Introduction
During Labor Day weekend 2005, Hurricane Katrina had its own impact in
Colorado Springs, Colorado. Over 100 men and women worked at a fever-
ish pace in the Joint Operations Center and the Combined Intelligence Fusion
Center at US Northern Command (NORTHCOM) as New Orleans residents were
threatened by floodwaters creeping up to their rooftop safe havens. Similar scenar-
ios were repeated for days.
As this was the first time within the United States that a natural disaster of this
proportion had involved NORTHCOM, unique issues arose regarding the use of
Department of Defense (DoD) resources and capabilities in support of hurricane
relief operations within the United States. This article discusses NORTHCOM' s
missions, authorities and significant legal issues associated with defense support of
civil authorities during disaster relief operations.
Dual Missions
NORTHCOM is a unique geographic combatant command as it has dual missions —
homeland defense (HLD) and defense support of civil authorities (DSCA) — that
must be performed in our nation's homeland. The legal authority for
Captain, JAGC, US Navy.
Disaster Response: Key Legal Issues for US Northern Command
NORTHCOM's HLD mission is rooted in Article II, Section 2 of the US Constitu-
tion: the President's authority as Commander-in-Chief. The legal authority for the
DSCA mission is based in statute. An example is the Stafford Act.1
Legal Authorities
Stafford Act
The Stafford Act is the primary legal authority for federal emergency and disaster
assistance to state, local and tribal governments. Under the Act, federal disaster re-
lief may be initiated in four circumstances:
a. Presidential declaration of a major disaster2 at the request of a governor,3
b. Presidential declaration of an emergency4 at the request of a governor,5
c. Secretary of Defense (SECDEF) utilization of DoD resources, upon
request of a governor and at the direction of the President, to perform
emergency work for the preservation of life and property during the
immediate aftermath of an incident (before the President makes a major
disaster or emergency declaration),6 or
d. Presidential declaration of an emergency when the affected area is one in
which "the United States exercises exclusive or preeminent responsibility
and authority" under the Constitution or laws of the United States.7 The
President may make this declaration on his own volition without a
governor's request.
In the first two circumstances, the Stafford Act requires that the governor of an
affected state request a presidential declaration of a major disaster or emergency.
The governor's request must be based on a finding that the disaster "is of such se-
verity and magnitude that effective response is beyond the capabilities of the state
and the affected local governments and that Federal assistance is necessary."8 The
governor must certify that he or she has executed the state's emergency plan and
will comply with the cost-sharing requirements of the Stafford Act. The President
may then declare that a major disaster or emergency exists.
Upon the declaration of a major disaster or emergency, the governor and the
Federal Emergency Management Agency (FEMA) Regional Director execute a
FEMA-state agreement.9 The agreement describes the incident, the period for
which assistance will be made available, and the type and extent of the federal assis-
tance. It also contains the commitment of the state and local government(s) with
278
Kurt Johnson
respect to the amount of funds to be expended. An emergency is an event that does
not qualify under the definition of major disaster.10 Assistance authorized by an
emergency declaration is limited to immediate and short-term assistance essential
to save lives, to protect property and public health and safety, or to lessen or avert
the threat of a catastrophe.11 Total assistance provided in any given emergency dec-
laration may not exceed five million dollars, except when FEMA determines that
continued emergency assistance is immediately required; there is a continuing and
immediate risk to lives, property, public health and safety; and necessary assistance
will not otherwise be provided on a timely basis.12
The third circumstance occurs in the immediate aftermath of an incident which
may ultimately qualify for Stafford Act assistance but before the President actually
makes a major disaster or emergency declaration. The governor may request DoD
resources to perform emergency work on public and private lands that is essential
for the preservation of life and property.13 "Emergency work" is defined as includ-
ing "clearance and removal of debris and wreckage and temporary restoration of
essential public facilities and services,"14 but may also include search and rescue,
emergency medical care and reduction of immediate threats to life, property and
public health and safety.15
The fourth circumstance that initiates federal disaster relief does not require a
request from a governor.16 The President may declare an emergency and provide
federal assistance to the governor when the affected area is one in which "the
United States exercises exclusive or preeminent responsibility and authority."17
The President is required to consult the governor, if practicable, to determine if an
emergency exists. President Clinton exercised this authority in the aftermath of the
bombing of the Alfred P. Murrah Federal Building in Oklahoma City.18 This was
the first and only use of this authority since its inception in 1988 and was likely used
because the Murrah was a federal building housing multiple federal agencies.
In comparing the power of the federal government with that of the states in
terms of disaster response and assistance, one must consider the Tenth Amend-
ment to the US Constitution, which reads, "The powers not delegated to the
United States by the Constitution, nor prohibited by it to the States, are reserved to
the States respectively, or to the people." State and local governments derive their
authority to respond to disasters and emergencies and to enforce law from their
"police power," which is inherent in the sovereignty of every state and is reserved to
the states through the Tenth Amendment. The Stafford Act affirms the primacy of
the state's role in disaster response, because federal assistance is premised on a re-
quest from the state governor and is not imposed on the state, except in those cases
where the federal government exercises exclusive or preeminent authority over the
area affected.
279
Disaster Response: Key Legal Issues for US Northern Command
NORTHCOM's dual missions present an interesting spectrum of authority
within which to act. The line between civil support and homeland defense is not
easily distinguishable and often one leads into, or overlaps with, the other. In re-
sponding to a major disaster or emergency, authorities must decide if DoD's role is
one of civil support or homeland defense, which of course depends on the nature
of the major disaster or emergency. One can think of a number of scenarios where
this determination could go either way. Without limiting DoD's national defense
mission, Homeland Security Presidential Directive (HSPD) 5 establishes a pre-
sumption that domestic incidents including "terrorist attacks, major disasters, and
other emergencies" shall be addressed by the US government in a single, compre-
hensive response, with the Secretary of Homeland Security acting as principal fed-
eral official and coordinating all federal operations in response and recovery.19
National Response Plan
Where DoD's civil support mission is clear, it begins with the National Response
Plan (NRP).20 Under the NRP, incidents begin as local events with local police, fire
and emergency medical services as the first responders. If these first responders are
overwhelmed, they request assistance from the governor of the state. The governor
may choose to deploy his/her state's National Guard to assist, and may also rely on
assistance from other states if an Emergency Management Assistance Compact
(EMAC) exists.
An EMAC is an agreement among member states that outlines the legal agree-
ments and procedures for providing assistance to other member states in the event
of an emergency or disaster. It was established in 1996, has weathered the storm
when put to the test, and stands today as the cornerstone of mutual aid. The EMAC
mutual aid agreement and partnership between states exist because from hurri-
canes to earthquakes, wildfires to toxic waste spills, and terrorist attacks to biologi-
cal and chemical incidents, all states share a common enemy: the threat of disaster.
Since being ratified by Congress and signed into law in 1996, 50 states, the Dis-
trict of Columbia, Puerto Rico and the Virgin Islands have enacted legislation to
become members of EMAC. EMAC is the first national disaster-relief compact to
be ratified by Congress since the Civil Defense and Disaster Compact of 1950.
The strength of an EMAC and the quality that distinguishes it from other plans
and compacts lies in its governance structure, its relationship with federal organi-
zations, states, counties, territories and regions, and the ability to move just about
any resource one state has to assist another state, including medical resources.
If the state is overwhelmed or the governor determines specific assistance is
needed from the federal government, the governor will call the President or his
staff and request a declaration of major disaster or emergency. The President will
280
Kurt Johnson
turn to the Secretary of Homeland Security, who will take the appropriate action
for incident management. The primary federal agency, most often FEMA, may re-
quest military support through the Office of the Secretary of Defense. The Joint Di-
rector of Military Support (JDOMS) will evaluate the request based on legality,
lethality, risk, readiness, budget and appropriateness.21 If approved, SECDEF will
give the mission to NORTHCOM and NORTHCOM will support the primary fed-
eral agency as directed. It should be clearly understood that the National Response
Plan is only a plan. It does not provide statutory authority under which DoD may
expend federal funds and take action.
Posse Comitatus Act
Although civil support within the homeland is not new to the military, the nature
of support needed during the 2005 hurricane season presented some unique issues
for NORTHCOM. Whenever military operations are conducted within the home-
land, authorities must consider the Posse Comitatus Act (PCA).22 Since the Con-
stitution leaves police power to the states, the PCA ensures that the Army and Air
Force are not used as a police power. The PCA applies to the Navy and Marine
Corps by DoD policy. The PCA restrictions essentially prohibit the direct, active
participation of military forces in enforcing civil criminal laws. This includes pro-
hibitions against arrest, search and seizure, and detention. The PCA does not apply
to the Coast Guard.23 It also does not apply to the National Guard in state active
duty (SAD) or Title 32 (Federally Funded) statuses. Congress has provided many
exceptions to the PCA, most notably the Insurrection Act.24 Although there has
been much discussion of amending the PCA, NORTHCOM's position is that its
ability to execute its mission is not adversely affected by PCA restrictions.
Enforcement of the Laws to Restore Public Order
The John Warner National Defense Authorization Act for Fiscal Year 2007 (NDAA
FY07) changed the name of chapter 15 of Title 10 from "Insurrection" to "Enforce-
ment of the Laws to Restore Public Order."25 Formerly and commonly referred to
as the Insurrection Act statutes, 10 US Code 331-333 provides statutory exceptions
to the PCA that could involve the execution of NORTHCOM's civil support mis-
sion. During Hurricane Katrina, early news coverage depicted a city of lawlessness:
police were gone, looting was common and violence was rampant. This news cov-
erage led to discussions about whether the President should invoke the Insurrec-
tion Act. As the Insurrection Act statutes existed at the time of the Hurricane
Katrina disaster, it did not appear that legal authority existed for the President to
invoke the Insurrection Act.
281
Disaster Response: Key Legal Issues for US Northern Command
The Insurrection Act statutes describe three triggers that allow the President to
use military force to suppress insurrections. The first trigger is a state request, as
was done in the 1992 Los Angeles riots.26 The second trigger is when unlawful ob-
structions, combinations, or assemblages, or rebellion against the authority of the
United States make it impracticable to enforce federal law.27 This was done in the
1957 and 1963 public school desegregation cases. The third trigger, now expanded
as a result of language in the Fiscal Year 07 National Defense Authorization Act, al-
lows the President to restore public order and enforce the laws of the United States
when, as a result of a natural disaster, epidemic, or other serious public health
emergency, terrorist attack or incident, or other condition in any State or posses-
sion of the United States, the President determines that domestic violence has oc-
curred to such an extent that the authorities of the State or possession are incapable
of maintaining public order, and such violence results in a condition that deprives
the people of constitutional rights or obstructs execution of US laws.28 The Presi-
dent may also do so to suppress in a state any insurrection, domestic violence, un-
lawful combination, or conspiracy, if such insurrection, violation, combination or
conspiracy results in a condition that deprives the people of constitutional rights or
obstructs execution of US laws.
Where the President invokes the "Laws to Restore Public Order" because public
order cannot be maintained and the violence deprives people of constitutional
rights, the President may federalize the National Guard and Reserve for not more
than 365 days. He may also direct SECDEF to provide supplies, services and equip-
ment to affected persons (independent of the normal process under the Stafford Act).
Although the new provisions of the NDAA FY07 expanded the President's au-
thority, the provisions would not necessarily have completely addressed the "law-
lessness" situation that existed in New Orleans during Hurricane Katrina. Under
the new provisions, the President would have had two significant hurdles to over-
come before he could invoke the "Enforcement of the Laws to Restore Public Or-
der" provisions that now exist and send in Title 10 troops over the objection of or
absent a request from the governor. While the first hurdle would have been met
(authority to act in public emergencies such as natural disaster) in the absence of
effective government, the second hurdle (finding deprivation of constitutional
rights) would arguably still have presented problems. Although Katrina-like situa-
tions are now clearly contemplated in statute, the President must still find an asso-
ciated deprivation of constitutional rights. No President since 1963 (public school
desegregation) has been willing to make such a finding.
282
Kurt Johnson
Unity of Effort
As stated earlier, the federal government's ability to respond to an emergency is
constrained by the constitutional provisions which reserve police power to the
states. The states have authority to call forth militias (the National Guard) to sup-
press insurrections, quell civil disturbances or respond to natural disasters and
other catastrophic events. Given that each state sovereign has its own militia, it is
impossible for Title 10 forces in the homeland to achieve unity of command with a
state's militia. However, unity of effort is a goal that can be achieved through im-
proved communication and coordination. The "Forces for Unified Commands"
memorandum29 envisions the establishment of a "coordinating authority" be-
tween Title 10 forces and non-federalized National Guard forces so that this unity
of effort may be achieved. This authority is not command authority or authority to
compel agreement, but rather authority delegated to a commander for coordinat-
ing specific functions and activities involving two or more forces. It is an authority
to require consultation. This type of coordination would give SECDEF insight into
how Title 32 funds are spent and give NORTHCOM and the National Guard situa-
tional awareness of each other's missions, locations, platforms, capabilities and
rules for the use of force, promoting unity of effort among all forces. This coordi-
nation could be a condition precedent to SECDEF approval of Title 32 funding.
Dual-Status Commander
Another way to achieve unity of effort is through the establishment of a dual-status
commander, a command arrangement discussed, but not used, during the 2005
hurricane season. There are two types of dual-status commanders. One involves
providing a Title 10 officer a commission in a state National Guard thereby allow-
ing him or her to exercise command and control over federal status (Title 10)
forces and state status (Title 32/SAD) National Guard forces. The other involves
placing a National Guard officer on Title 10 orders, while allowing that officer to
retain his or her state authority, thereby enabling unity of command of both fed-
eral and state status forces.
32 US Code 315 authorizes the detail of regular members of the Army and Air
Force to duty with a state National Guard by the Secretary of the Army or Secretary
of the Air Force. With permission of the President, it allows an Army or Air Force
officer to accept a commission in the National Guard if such is offered by the gov-
ernor of the respective state. This authority has been used to authorize Title 10 offi-
cers to exercise command and control over National Guard units.
32 US Code 325 authorizes a National Guard officer familiar with the state and
local area of operations to command in both a federal and state status. This author-
ity was used in the 2004 G8 Summit, the 2004 Democratic and Republican national
283
Disaster Response: Key Legal Issues for US Northern Command
conventions and Operation Winter Freeze, a five-month NORTHCOM mission in
late 2004 and early 2005, which occurred on the northeast border of the United
States. This is also the command arrangement that will be used for the Ground Based
Midcourse Missile Defense units of the Colorado and Alaska National Guards.
Both options provide unity of effort, rather than unity of command, allowing
both federal and state military forces to enhance their situational awareness.
There is no formal approval process for either situation. It usually begins with
informal coordination between the state and NORTHCOM. Typically, action offi-
cers at NORTHCOM and the National Guard discuss various courses of action
with a recommendation for the use of a dual-status commander. Then the state
National Guard staff and NORTHCOM staff determine whether to seek approval
from their respective chains of command. In all four 2004 events in which dual-
status National Guard officer arrangements were approved, the governor sent an
approval package, including a signed Memorandum of Agreement, to the Presi-
dent and/or SECDEF for signature (for certain events, the President has delegated
approval to SECDEF).
The dual-status commander arrangement does not simultaneously authorize
the use of Title 32 funding30 for National Guard forces for operational missions.
Title 32 funding approval is a separate process. Moreover, this arrangement does
not "dual status" the forces or staff, whether federal or state status, commanded by
the dual-status commander. The dual-status commander has two reporting chains
and must consider the implications of the different rules and restrictions for each
force under his or her command. It is likewise important that staff members,
whether Title 10 or National Guard, understand their separate roles and missions.
DoD as Lead Federal Agency
Could DoD ever be tasked by the President to be the lead federal agency in a cata-
strophic event? Clearly, the Homeland Security Act of 200231 confers statutory re-
sponsibility for federal response to catastrophic incidents to the Department of
Homeland Security (DHS). One could argue that DoD could lead a component of
the federal response as long as DHS maintained overall responsibility for the re-
sponse as a whole. One could also conceive of a situation in which an incident is of
such magnitude as to jeopardize national security, such that the President, under
his Article II authority, could place DoD in the lead.
Conceptually, there is a critical void in the immediate aftermath of a major di-
saster (for discussion purposes, the first 48-72 hours after a disaster). Conceivably,
local responders are incapacitated or busy attending to their own families; state as-
sistance is forthcoming, but will take time to assemble sufficient National Guard
forces and other responders into effective units; the governor has not yet requested
284
Kurt Johnson
federal assistance or, if requested, it will take a short period of time for the National
Response Plan to gear up and provide that assistance. In the meantime, American
lives are at risk. DoD has the capability to respond quickly with well-trained units
in constant communications unaffected by the disaster, and to sustain itself indefi-
nitely. The overarching question is whether DoD has legal authority to fill that
early and critical void.
Immediate Response Authority
There are situations that allow DoD to respond without prior approval from the
chain of command. When imminently serious conditions resulting from any civil
emergency or attack exist and time does not permit prior approval from higher
headquarters, local military commanders and responsible officials of other DoD
components are authorized to take necessary and immediate action to respond to
requests of domestic civil authorities in order "to save lives, prevent human suffer-
ing or mitigate great property damage." Such actions are generally referred to as
"immediate response."32
Ordinarily, assistance to civilian authorities is provided on a cost reimburse-
ment basis. However, it should not be delayed or denied because of the inability or
unwillingness of the requester to make a commitment to reimburse DoD. Addi-
tionally, those providing immediate response are required to notify the National
Military Command Center (NMCC), through the chain of command, as soon as
practical of the request for assistance, the nature of the response and any other rele-
vant information related to assistance provided.
Generally, notice should reach the NMCC within hours of the decision to pro-
vide assistance. Immediate response has generally been contemplated as assistance
provided in response to a natural disaster or other catastrophic incident. The assis-
tance provided is in support of local officials and at their request. This response is
generally limited in terms of time and geographic proximity of the commander
and/or the requested capability to the incident.
Incident Awareness and Assessment
One of the most sensitive issues in the homeland is the use of intelligence assets
during domestic operations. Consider the ramifications of flying a U-2 reconnais-
sance plane over the Gulf Coast during hurricane disaster relief operations. Beyond
perceptions, one must consider if there is authority to use intelligence capabilities
for non-intelligence missions (such as search and rescue and damage assessment)
following a natural disaster. "Incident Awareness and Assessment" (IAA) is the
term used to describe the use of intelligence assets, specifically intelligence, surveil-
lance and reconnaissance (ISR) assets, in support of disaster relief operations.
285
Disaster Response: Key Legal Issues for US Northern Command
Foreign intelligence (FI) and counterintelligence (CI) are the only authorized
"intelligence activities" of the DoD intelligence community and must be con-
ducted consistent with DoD Directive 5240.1 and DoD 5240. 1-R.33 In essence, this
means that whenever DoD conducts an "intelligence activity," there must be a for-
eign nexus, as required by the definitions of foreign intelligence and
counterintelligence. DoD intelligence community officials have opined that
SECDEF may approve use of DoD intelligence component capabilities for mis-
sions "other than intelligence activities" because the SECDEF has inherent author-
ity to use any assets or personnel within the DoD to complete a DoD mission. In
those instances, the mission must be a valid DoD mission, and SECDEF must ap-
prove both the mission and specific use of the DoD intelligence component
capabilities.
Essentially, in order to use DoD intelligence component capabilities (personnel,
units, planning, collection, analysis, production) for non-intelligence activities,
there must be a Request for Forces (RFF) submitted through the command to the
Joint Staff for review and approval by SECDEF. The request must identify the mis-
sion and specify the DoD intelligence component capability requested. The result-
ing execute order will be approved by SECDEF and specify what DoD intelligence
component capabilities maybe used and any operational parameters or limitations
on the use of that capability.
These procedures give SECDEF the flexibility to use DoD assets for dual mis-
sions. For example, during a hurricane disaster support mission, the DoD intelli-
gence components could be conducting intelligence activities (FI and CI) under
existing authorities. Additionally, DoD intelligence component capabilities could
be used for a non-intelligence mission by doing planning, tasking, analysis and
production in support of search and rescue (SAR) and damage assessment. The
second mission could involve a Request for Assistance (RFA) from a primary fed-
eral agency to DoD. In this situation, SECDEF approval would authorize the use of
intelligence assets for non-intelligence purposes. Mission direction would be coor-
dinated with the primary federal agency. Additionally, the RFA process is a "fee for
service" operation. The primary federal agency would agree to pay for the cost of
the IAA employment.
Leaders, at all levels, frequently seek to build situational awareness. Building sit-
uational awareness requires data to be collected by a combination of satellite, air-
borne, and ground sensors. The key is to create a means to bring all of this disparate
data together into one coherent picture for decisionmakers and planners. The
amount and type of data required differs depending on whether the leader is mak-
ing strategic, operational or first responder decisions. The requirement for
286
Kurt Johnson
situational awareness must be evaluated carefully, so that IAA assets are efficiently
and effectively used.
Sensitive Information
The use of information about US persons and non-DoD persons and organizations
is restricted depending on the mission of the DoD component involved. During di-
saster relief operations, force protection is always a concern when sending troops
into a joint operating area. While this is true whether operating overseas or in the
homeland, the rules in the homeland are more restrictive. Sensitive information
falls into two major categories. The first category deals with information on US
persons subject to intelligence oversight (IO) rules. The rules for this category of
information apply only to DoD intelligence components.34 The second category
deals with information concerning the activities of persons and organizations not
affiliated with DoD. The rules for this category apply to everyone except DoD intel-
ligence components. The policy set forth in a 1980 directive, DoD Directive
5200.27, applies.35
The general rule for this second category is that collecting, reporting, processing
or storing information concerning individuals or organizations not affiliated with
DoD is not permitted. This includes non-DoD persons/organizations within the
50 states, the District of Columbia, Puerto Rico, US territories and non-DoD affili-
ated US citizens anywhere in the world. There are exceptions to the general rule.
Information maybe gathered if it is essential to the accomplishment of the follow-
ing defense missions:
• Protection of DoD functions and property. This exception encompasses
threats to DoD military and civilian personnel and defense activities, installations
and property. Only the following activities justify acquisition of non-DoD
persons/organizations information:
• Subversion of loyalty, discipline or morale of DoD military or civilian
personnel by encouraging violations of law, disobedience of orders or
disruption of military activities;
• Theft of arms, ammunition or equipment; or destruction or sabotage
of DoD facilities, equipment or records;
• Unauthorized demonstrations on DoD active or reserve installations;
• Direct threats to DoD military/civilian personnel in connection with
their duties or to other persons authorized protection by DoD resources;
• Activities endangering facilities that have classified defense contracts
or that have been officially designated as "key defense facilities"; and
287
Disaster Response: Key Legal Issues for US Northern Command
• Crimes for which DoD has responsibility for investigating or
prosecuting.
• Personnel security. Investigations regarding clearances for members of DoD
and DoD applicants and persons needing access to classified information.
• Operations related to civil disturbances. If specifically authorized by
SECDEF and there is a distinct threat of civil disturbance exceeding the law
enforcement capability of state and local authorities.
Information collected under DoD Directive 5200.27 authority must be de-
stroyed within 90 days unless retention is otherwise authorized. The dilemma is
drawing the line between information needed for force protection purposes and
information that is more appropriately handled by local law enforcement.
International Assistance
The United States has extensive experience providing assistance to other nations in
the wake of disasters, but there is little recent precedent for the United States to re-
ceive international assistance following a homeland disaster. During Hurricane
Katrina, many foreign countries offered assistance. For example, Canada sent
ground troops, Mexico sent a mobile kitchen to provide food, and Germany and
Denmark offered water pumps. Federal regulations, however, hindered the provi-
sion of the assistance in some cases. US Department of Agriculture regulations pre-
vented the use of food from foreign nations whose health regulations did not meet
US standards. In addition, the process to accept these "gifts" of assistance often
meant assistance did not come as quickly as it was needed. In the case of foreign
troops on the ground assisting in relief efforts, issues regarding the rules under
which they would operate arose. Examples include rules for the use of force and
medical credentials. The United States clearly has to resolve these issues as the par-
adigm of international assistance has changed.
Conclusion
As new hurricane seasons approach, NORTHCOM will continue to grapple with
these legal issues and others that arise from various manmade and natural disaster
relief situations. While homeland defense is NORTHCOM's number one respon-
sibility, the mission to support civil authorities is very important, and often at the
forefront of NORTHCOM's daily activities. NORTHCOM is called upon on a reg-
ular basis to assist other federal agencies in responding to natural and man-made
disasters at the direction of the President or the Secretary of Defense. Because DoD
support is often unique, NORTHCOM will continue to coordinate with federal,
288
Kurt Johnson
state and local authorities to provide assistance, as directed, whenever and wher-
ever it is needed.
Notes
1 . Robert T. Stafford Disaster Relief and Emergency Assistance Act, 42 US Code sec. 5 1 2 1 -
5206 (2000).
2. "Major disaster" is defined as any natural catastrophe (including any hurricane, tor-
nado, storm, high water, wind driven water, tidal wave, tsunami, earthquake, volcanic eruption,
landslide, mudslide, snowstorm or drought) or, regardless of cause, any fire, flood or explosion,
in any part of the United States, which in the determination of the President causes damage of
sufficient severity and magnitude to warrant major disaster assistance under this chapter to sup-
plement the efforts and available resources of States, local governments and disaster relief orga-
nizations in alleviating the damage, loss, hardship or suffering caused thereby. 42 US Code sec.
5122(2) (2000).
3. 42 US Code sec. 5170(2000).
4. "Emergency" is defined as any occasion or instance for which, in the determination of
the President, federal assistance is needed to supplement state and local efforts and capabilities to
save lives and to protect property and public health and safety, or to lessen or avert the threat of a
catastrophe in any part of the United States. 42 US Code sec. 5122(1) (2000). Such response
should not be confused with Emergency Response authority discussed in DoD Directive
3025.12, infra note 32.
5. 42 US Code sec. 5170(2000).
6. 42 US Code sec. 5170b(c) (2000).
7. 42 US Code sec. 5191(b) (2000).
8. 42 US Code sec. 5170, 5191 (2000).
9. 44 Code of Federal Regulations sec. 206.44 (2005).
10. 44 Code of Federal Regulations sec. 206.35 (2005).
1 1. 46 Code of Federal Regulations sec. 206.63 (2005).
12. 46 Code of Federal Regulations sec. 206.66 (2005).
13. 42 US Code sec. 5 170b(c)( 1 ) (2000); 44 Code of Federal Regulations sec. 206.34 (2005).
14. 42 US Code sec. 5170b(c)(6)(B) (2000).
15. See US Code sec. 5170b(a)(3) (2000), which addresses "work and services to save lives
and protect property."
16. "The President may exercise any authority vested in him by section 5192 of this title
[emergency declaration] or section 5193 of this title [amount of assistance] with respect to an
emergency when he determines an emergency exists for which the primary responsibility for the
response rests with the United States because the emergency involves a subject area for which,
under the Constitution or the laws of the United States, the United States exercises exclusive or
preeminent responsibility and authority. In determining whether or not such an emergency ex-
ists, the President shall consult the Governor of any affected State, if practicable. The President's
determination maybe made without regard to subsection (a) of this section [i.e., a request for as-
sistance from the Governor]." 42 US Code sec. 5191(b) (2000).
17. Id.
18. Notice of Presidential Declaration of a Major Disaster for the State of Oklahoma
(FEMA-1048-DR), 60 Federal Register 21819-02 (1995).
289
Disaster Response: Key Legal Issues for US Northern Command
19. Press Release, White House, Homeland Security Presidential Directive/HSPD-5 (Feb.
28, 2003), http://www.whitehouse.gov/news/releases/2003/02/20030228-9.html.
20. The National Response Plan of May 25, 2006 establishes a comprehensive all-hazards
approach to enhance the ability of the United States to manage domestic incidents. It forms the
basis of how the federal government coordinates with state, local and tribal governments and the
private sector during incidents. The NRP is available at http://www.dhs.gov/xlibrary/assets/
NRP_FullText.pdf.
21. Department of Defense, DoD Directive 3025.15, Military Assistance to Civil Authorities
para 4.2 (1997), available at http://west.dtic.mil/whs/directives/corres/pdf/d302515_021897/
d302515p.pdf.
22. 18 US Code sec. 1385 (2000).
23. The PCA does not apply to the Coast Guard. Jackson v. Alaska, 572 P. 2d 87 (Alaska
1977). This is most clear in terms of the Coast Guard's Title 14 (Armed Forces) operations. PCA
limitations are also inapplicable to the Coast Guard's Title 10 (Coast Guard) authority because
the PCA, on its face, does not reference or limit the Coast Guard. Additionally, the PCA makes
an explicit exception "in cases and under circumstances expressly authorized by . . . Act of Con-
gress." Congress has expressly given the Coast Guard certain federal law enforcement duties by
statute, e.g., 14 US Code sec. 2 and 89 (2000). While a DoD directive places PCA-like restrictions
on the Navy and Marine Corps, the Coast Guard is not subject to this regulation. Department of
Defense, DoD Directive 5525.5, DoD Cooperation with Civilian Law Enforcement Officials
(1986), available at http://www.fas.org/irp/doddir/dod/d5525_5.pdf. The Coast Guard would
only be subject to DoD and Department of the Navy policy limitations if made "a service in the
Navy" by Presidential order or in a declaration of war by Congress. 14 US Code sec. 3 (2000).
24. 10 US Code sec. 331-333(2000).
25. John Warner National Defense Authorization Act for Fiscal Year 2007, Public Law No.
109-364, sec. 1075(2006).
26. 10 US Code sec. 331 (2000).
27. 10 US Code sec. 332(2000).
28. 10 US Code sec. 333 (2000), amended by John Warner National Defense Authorization
Act for Fiscal Year 2007, supra note 25.
29. The "Forces for Unified Commands" is a memorandum in which the Secretary of De-
fense documents his direction for the assignment of forces to combatant commands and to US
Element North American Aerospace Defense Command.
30. When performing duty pursuant to Title 32, US Code, a National Guard member is un-
der the command and control of the state but paid with federal funds.
31. Homeland Security Act of 2002, Public Law No. 107-296, sec. 101 (b)(1)(D), 116 Stat-
utes at Large 2142 (2002).
32. See Department of Defense, DoD Directive 3025. 1, Military Support to Civil Authorities
para. 4.5 (1993), available at http://www.dtic.mil/whs/directives/corres/pdf/d30251_011593/
d30251p.pdf; Department of Defense, DoD Directive 3025.15, Military Assistance to Civil Au-
thorities para. 4.7.1 (1997), available at http://west.dtic.mil/whs/directives/corres/pdf/
d302515_021897/d3025 15p.pdf; and Memorandum from the Deputy Secretary of Defense, Re-
porting "Immediate Response" Requests from Civil Authorities (Apr. 25, 2005).
33. Department of Defense, DoD Directive 5240.1, DoD Intelligence Activities (1988),
available at http://www.dtic.mil/whs/directives/corres/pdf/d52401_042588/d52401p.pdf, con-
tains guidance for DoD intelligence components for the collection, retention and dissemination
of information concerning US persons. Department of Defense, DoD 5240. 1-R, Procedures
Governing the Activities of DoD Intelligence Components that Affect United States Persons
290
Kurt Johnson
(1982), available at http://www.dtic.mil/whs/directives/corres/pdf/52401r_1282/p52401r.pdf,
contains detailed procedures to enable DoD intelligence components to carry out their assigned
functions while ensuring their activities that affect US individuals are carried out in a manner
that protects the constitutional rights and privacy of such persons.
34. Executive Order No. 12,333, 46 Federal Register 59,941 (Dec. 4, 1981); DoD Directive
5240.1, supra note 33; and DoD 5240. 1-R, supra note 33, IO rules apply.
35. By directive, DoD establishes policy, limitations, procedures and operational guidance
pertaining to the collecting, processing, storing and disseminating of information concerning
persons and organizations not affiliated with DoD. It is the non-intelligence component equiva-
lent of intelligence oversight rules. Department of Defense, DoD Directive 5200.27, Acquisition
of Information Concerning Persons and Organizations Not Affiliated with the Department of
Defense (1980), available at http://www.dtic.mil/whs/directives/corres/pdf/d520027_010780/
d520027p.pdf.
291
XIX
The Law of International Disaster Response:
Overview and Ramifications
for Military Actors
David Fisher
*
As military lawyers are well aware, the international legal framework for the
protection and assistance of civilians in conflict situations is well developed
and deeply integrated into the ways lawyers and laypeople think and talk about
war. The Geneva Conventions of 1949, the cornerstone of international humani-
tarian law (IHL), have now achieved universal adhesion;1 over seventy nations
have formed national commissions on IHL;2 and IHL is being studied and written
about in universities, military academies and other forums around the world. In
contrast, the law of international disaster response, referred to in recent years as
"International Disaster Response Laws, Rules and Principles" or "IDRL," has been
described as "neglected"3 and "far from complete,"4 with no centralized regime
equivalent to the Geneva Conventions, few academic resources dedicated to the is-
sue and, until recently, little attention from the international disaster relief
community.
* Senior Legal Research Officer for the International Federation of Red Cross and Red Crescent
Societies' program on International Disaster Response Laws, Rules and Principles. The views
and opinions expressed in this paper are those of the author and do not necessarily represent
those of the International Federation.
The Law of International Disaster Response
Yet, over the last thirty- five years, there have been over fourteen thousand non-
conflict disasters worldwide, resulting in more than 2.3 million deaths and affect-
ing an astonishing 5.8 billion persons.5 In the overwhelming majority of these di-
sasters, the governments, civil society and communities of the affected States have
borne the brunt of relief and recovery themselves. However, international response
activities have also necessarily been frequent6 and are increasing in proportion to
the growing number and severity of disasters in recent years.7 Moreover, interna-
tional disaster operations can sometimes be just as legally challenging as conflict
relief, commonly involving barriers to the entry and effective use of relief person-
nel, goods, equipment and transport vehicles, as well as regulatory dilemmas for af-
fected States — particularly in light of the growing number and diversity of
international disaster responders.
For their part, military actors have long been engaged in disaster relief,8 but their
involvement at the international level also appears to be on the rise. This increased
engagement has led to a greater concern among military lawyers about the legal
pitfalls involved,9 as well as concerns in the humanitarian community about the
consequences of the "militarization" of international disaster assistance.
This paper will sketch the history and broad outlines of the current interna-
tional legal framework for transborder disaster relief and recovery10 and discuss
some of the most common legal problems that arise in international operations. It
will then look — from a civilian's perspective — at some of the ramifications for mil-
itary actors. It will conclude with some thoughts on where the international com-
munity might choose to go from here.
Historical Background
While there are early precedents for international relief in peacetime, it was not un-
til the mid-nineteenth century that momentum slowly began to build toward in-
ternational systems to address national calamities.11 For example, in 1851, France
convened the first of a series of international sanitary conferences to negotiate
agreements to combat the cross-border spread of diseases.12 In 1869, a resolution
of the second International Conference of the Red Cross affirmed the role of na-
tional Red Cross societies in providing relief "in case of public calamity which, like
war, demands immediate and organized assistance."13 In the late nineteenth and
early twentieth centuries, multilateral telegraph and telecommunications treaties
were adopted with specific provisions about emergency communications,14 and
maritime agreements were reached codifying customary norms on rescue and as-
sistance to vessels in distress.15 -
294
David Fisher
It was under the auspices of the League of Nations that the first serious attempt
was made to create a comprehensive approach to international disaster relief. In
1927, a conference of forty- three States adopted the Convention and Statutes Es-
tablishing an International Relief Union (IRU).16 The Convention stipulated that
the IRU should serve as a centralized operational agency, funneling international
funds and support in disaster settings, coordinating other actors and promoting
study and research on disaster management.17 It entered into force in 1932 and
eventually attracted thirty member States. However, it was never able to effectively
carry out its mission, due mainly to the crippling lack of funds incident to its in-
ability to command regular contributions from member States.18 It intervened in
two disasters and sponsored several scientific studies, but by the late 1930s, the IRU
had already effectively ceased to function, though it was not officially terminated
until 1967.19
After the failure of the IRU, international law on disaster relief developed in a
fragmented and mostly unplanned manner, and institutional mandates were
shared among a number of actors. In the 1950s, several States, notably the United
States, began concluding bilateral treaties regulating the delivery of relief goods.20
A second and third wave of bilateral treaties, mainly concerned with mutual
assistance, were agreed upon in the 1970s and the 1990s respectively, mainly in
Europe.21 Moreover, a number of multilateral treaties in other sectors of the law
(such as customs harmonization,22 marine and air transport23 and environmental
protection24) began to include provisions relevant to international disaster re-
sponse, and recent decades have seen an upsurge in disaster-focused instruments
(both "hard" and "soft"), particularly at the regional level.
A second attempt to develop a comprehensive treaty on disaster relief was made
in 1984, when the United Nations Disaster Response Office (UNDRO), the fore-
runner to the Office for the Coordination of Humanitarian Affairs (OCHA), devel-
oped a "Draft Convention on Expediting the Delivery of Emergency Assistance"
and presented it to the Economic and Social Council (ECOSOC).25 The Draft Con-
vention sought to set out basic rules for the entry and operation of international di-
saster relief from States and humanitarian organizations, including with regard to
visas, customs clearance, transport rules, communications and liability. ECOSOC
referred the text to the UN's Second Committee,26 which, despite expressions of
support from several States,27 took no official action on it, and the convention was
never adopted.
295
The Law of International Disaster Response
The Current International Legal Framework
As a result of the foregoing, the current international legal and institutional frame-
work for IDRL is dispersed, with gaps of scope, geographic coverage and precision.
Still, there are a number of instruments that are worth highlighting — both for their
potential uses and for their weaknesses.
Global Treaties
One of the most successful disaster law instruments in terms of ratification is the
Convention on Assistance in the Case of a Nuclear Accident or Radiological Emer-
gency of 1 986 (hereinafter Nuclear Accident Convention) ,28 Adopted in the imme-
diate wake of the Chernobyl accident, the Nuclear Accident Convention has
garnered ninety-six State parties.29 It lays out basic rules for the initiation, coordi-
nation and operation of international assistance operations in case of nuclear or ra-
diological events, touching on the transit of equipment and personnel, privileges
and immunities, and costs. However, as its name indicates, it is relevant only to nu-
clear and radiological emergencies — among the least frequent of the various types
of major disasters.30 Moreover, by its terms, it applies only to States, the Interna-
tional Atomic Energy Agency (IAEA) and other "inter-governmental organiza-
tions," despite the essential role that the Red Cross/Red Crescent Movement, non-
governmental organizations (NGOs) and other non-State actors have played in the
recovery from the Chernobyl disaster.31
In contrast, the two global customs treaties with specific provisions on disaster
response both apply to "relief consignments" regardless of their source. They are
thus relevant to the full range of international relief actors. Specifically, Annexes
B.3 and J. 5 of the Convention on Simplification and Harmonization of Customs
Procedures ("Kyoto Convention") as amended in 199932 call on States to exempt
"relief consignments" from many normal customs processes, duties and restric-
tions. Similarly, Annex B.9 of the Convention on Temporary Admission ("Istanbul
Convention") of 199033 provides for exemptions from customs duties for certain
types of equipment intended for re-export after a disaster relief operation. How-
ever, their membership is quite small,34 and, in particular, includes only a handful
of the most disaster-prone States.35
Another recent convention that applies to the full range of international disas-
ter responders is the Tampere Convention on the Provision of Telecommunica-
tion Resources for Disaster Mitigation and Relief Operations of 1998.39 The
Tampere Convention calls for the elimination or reduction of regulatory barriers
to the importation and operation of telecommunications equipment and person-
nel for disaster response purposes. It is the only instrument of its kind that extends
296
David Fisher
privileges and immunities, equivalent to those granted to the United Nations, to
NGO personnel (though only those directly connected to relief telecommunica-
tions).40
The Tampere Convention entered into force on January 8, 2005, and its first test
came in Sri Lanka (which had ratified it in 1999) with regard to the response to the
December 26, 2004 tsunami. Unfortunately, it appears that its provisions were in-
voked neither by the government nor by international relief providers, although
some of them encountered problems with regard to the import and use of telecom-
munications equipment.41 On the other hand, some practitioners have reported
success in referring to the treaty, even with regard to operations in States not party
to it, as evidence of an international consensus on the need to facilitate the use of
telecommunications in relief.42 Still, like the customs conventions, membership in
the Tampere Convention remains limited43 and currently includes only four of the
twenty-five most disaster-prone States.44
In 2000, the International Civil Defence Organization drafted a Framework
Convention on Civil Defence Assistance36 to improve mutual assistance between
civil defense organizations in international disaster response operations. The
Framework Convention sets out mechanisms for the offer and acceptance of assis-
tance, regulations for how such assistance should be carried out, provisions for the
reduction of administrative and customs barriers and "necessary" privileges and
immunities for responders, and commitments to facilitate transit of civil defense
units. It also calls on parties to supplement its provisions with more detailed agree-
ments to carry out its spirit.37 Though it has twenty-six signatories, to date only
thirteen States have ratified or acceded to it, including no Western States.38
A further IDRL convention with limited membership (twenty-two parties, in-
cluding twenty-one States and the European Community45) is the Food Aid Con-
vention.46 Originally adopted in 1967, it has gone through several revisions, the
most recent of which was in 1999. It sets out annual quotas of certain types of food
aid47 to be provided by each member (whether bilaterally or through NGOs or
"multilateral channels") to certain recipient States, covering both emergency and
non-emergency situations. It also sets out a number of guidelines as to the type and
manner in which food aid should be delivered, including adherence to "basic hu-
manitarian principles," international quality standards and local dietary habits,
and attention to the particular needs of women and children and other vulnerable
groups, as well as potential harmful effects on local harvests and markets.
Critics have charged that the Food Aid Convention fails to effectively stabilize
food aid because quotas have been set very low (substantially below the total
amount of food aid given by most members) and have been repeatedly renegoti-
ated downward in periods of tight supplies and that little effort is made to monitor
297
The Law of International Disaster Response
the quality requirements.48 The convention is currently set to expire on June 30,
2007, if it is not extended or renegotiated.49
Limited membership is unlikely to be a problem for the revised International
Health Regulations (IHR) adopted by the World Health Assembly in 2005 and
scheduled to enter into force in 2007,50 inasmuch as the constitution of the assem-
bly provides that all instruments adopted by that body will be binding on all mem-
ber States unless they explicitly "opt out."51 The revised IHR were prompted by
communications failures in the SARS outbreak of 2003 and has been described as a
radical development in international health law.52 It expands the scope of its prede-
cessor instrument (which only applied to three types of disease) by obligating State
parties to report on all diseases that might constitute a transborder public health
threat and by greatly expanding the authority of the World Health Organization
(WHO) to act upon information of outbreaks. Significantly, this includes for-
malizing WHO's authority to receive and act upon reports originating from non-
governmental actors.53 Beyond this preventive aspect, the IHR's provisions requir-
ing national public health restrictions on import of goods to be kept to a reasonable
minimum in line with the potential threat might also be of use in a disaster re-
sponse setting in which goods and personnel must quickly cross borders.
Regional Law
Each of the major regions has also adopted at least some law on disaster response,
though there is great variation in its scope. As in other areas of international law,
Europe boasts the most elaborate framework of agreements. These include, among
others, the Fourth Lome Convention of 1989,54 which sets out guidelines for assis-
tance by Europe to African, Caribbean and Pacific States; the Council of Europe —
Open Partial Agreement (EUR-OPA) Major Hazards Agreement of 1987, which
created a framework of regular high-level meetings to improve cooperation in di-
saster response and prevention;55 the European Community Civil Protection
Mechanism, first adopted in 2001, which helps to coordinate the extraterritorial
work of civil protection offices;56 the Convention on the Transboundary Effects of
Industrial Accidents of 1992, one of the most important treaties on man-made di-
sasters;57 subregional instruments such as the Agreement between Denmark, Fin-
land, Norway and Sweden on Cooperation across State Frontiers to Prevent or
Limit Damage to Persons or Property or to the Environment in the Case of AcciT
dents of 1989;58 and the Agreement among the Governments of the Participating
States of the Black Sea Economic Cooperation (BSEC) on Collaboration in Emer-
gency Assistance and Emergency Response to Natural and Man-Made Disasters of
1998 (hereinafter BSEC Agreement).59
298
David Fisher
In the Americas, the Inter-American Convention to Facilitate Disaster Assis-
tance was adopted in 199160 with a number of provisions designed to lower bu-
reaucratic and other barriers to easy entry of foreign disaster assistance; however, it
was only ratified by three States.61 Greater success was seen with the agreements
creating subregional inter-governmental mechanisms for disaster response, in-
cluding the Coordination Centre for Natural Disaster Prevention in Central Amer-
ica (CEPREDENAC),62 the Andean Committee for the Prevention and Response
to Disasters (CAPRADE),63 and the Caribbean Disaster Emergency Response
Agency (CDERA).64
In Africa, there has been little systematic lawmaking at the regional level on di-
saster response.65 One exception is the Inter-Governmental Authority on Develop-
ment (IGAD),66 originally created with the primary purpose of building
cooperation to address issues of drought and desertification. Moreover, in recent
years, proposals have been discussed to adopt a disaster-specific instrument in the
Southern African Development Community (SADC).67
The most recent regional IDRL treaty was adopted in Asia in the wake of the
2004 tsunami. The Association of Southeast Asian Nations' (ASEAN) South Asian
Association for Regional Cooperation Agreement on Disaster Management and
Emergency Response of 2005 (not yet in force) (hereinafter ASEAN Agreement)68
is remarkable for its broad scope — covering disaster risk reduction, relief and re-
covery and addressing all types of international disaster responders — as well as for
its attention to some of the key problem areas, including visas, customs, transport
and coordination issues in international operations. It will also create a dedicated
"Asian Coordinating Centre for Humanitarian Assistance" with broad responsi-
bilities to share information and assist in coordinating disaster assistance to mem-
ber States both in the region and from international actors.
Bilateral Treaties and Agreements
The overwhelming bulk of existing international IDRL instruments are bilateral
agreements between States and between States and international humanitarian or-
ganizations. There are well over one hundred bilateral treaties, most of them in Eu-
rope.69 In general, they tend to cover issues of initiation of assistance, entry of
personnel and goods, command and control of response teams, assignment of
costs (generally to the receiving State), and guarantees against liability (always in
favor of the responding State). Bilateral agreements with humanitarian organiza-
tions (mostly with international organizations, such as UN agencies, but also, in-
creasingly, with major international NGOs) tend to set out the parameters of the
organization's long-term activities in the nation as well as any applicable legal
privileges.
299
The Law of International Disaster Response
Soft Law, Guidelines and Models
Beyond the "hard law" described above, there are an important number of relevant
"soft law" instruments, such as resolutions or declarations of international bodies,
as well as guidelines, models and codes developed mainly by experts or by the hu-
manitarian community itself. Some of these, though admirably crafted, have been
mainly forgotten. However, others have formed the basis for systems of interna-
tional cooperation in disaster response that are certainly as important as any cur-
rently based on "hard law."
Among the best-known resolutions are UN General Assembly Resolution 46/
182 of 1991, which sets out general parameters for UN humanitarian assistance
and the role of the Office for the Coordination of Humanitarian Affairs (OCHA),
and 57/150 of 2002, which called on States to facilitate the entry and operation of
international urban search and rescue teams in disaster settings and, in turn, called
on those teams to comply with the quality standards set out in guidelines devel-
oped and facilitated by an international advisory group. The Hyogo Framework for
Action, adopted by an international conference in 200570 and later affirmed by a
resolution of the UN General Assembly, also includes institutional and regional
preparedness for relief among its primary priorities,71 but this element has not
been emphasized in the follow-up activities of States and the United Nations.
An important resolution that is less well known today is the Measures to Expe-
dite International Relief, adopted by both the International Conference of the Red
Cross and the UN General Assembly in 1977.72 This resolution discussed in some
detail some of the most practical types of legal facilities governments should ensure
for international disaster assistance providers. Unfortunately, it has rarely been
evoked in modern operations.
A number of "off-the-shelf models and guidelines have also been produced
with the intention to speed agreements between affected States and international
actors wishing to provide assistance. For military actors, the Oslo Guidelines on the
Use of Military and Civil Defence Assets in Disaster Relief, as updated in 2006 and
discussed in greater detail below, is the most important example. Further guidance
can be found in the UNITAR Model Rules for Disaster Relief of 1996 and the Max
Planck Institution Draft International Guidelines for Humanitarian Assistance of
199 1.73 However, few of these latter documents are well known by disaster re-
sponse professionals.
The most important instruments relating to the responsibilities of disaster assis-
tance providers are the Code of Conduct of the International Red Cross and Red
Crescent Movement and Non-Governmental Organizations in Disaster Relief of
1994 and the Sphere Project Humanitarian Charter and Minimum Standards in
Disaster Response as updated in 2004, both developed by humanitarian
300
David Fisher
organizations to serve as minimum standards of behavior and performance in di-
saster relief.74 Both have been well disseminated, and most established humanitar-
ian organizations have indicated that they use them. However, the absence of any
formal mechanism for monitoring and verification of these claims renders an as-
sessment of their impact difficult.
Institutional Mandates and Privileges
In addition to these disaster-specific instruments, the international community
has provided a number of institutions with formal mandates to engage in humani-
tarian relief, including in disaster situations. The intricacies of this institutional
structure have been described elsewhere75 and will not be explored here, except to
note that they include both global and regional institutions. At the global level,
these include UN agencies and organs and the Red Cross/Red Crescent Movement
among others. At the regional level, organizations such as ASEAN, the South Asian
Association for Regional Cooperation (SAARC), IGAD, the European Commu-
nity Civil Protection Mechanism, CEPREDENAC and CDERA have also been ac-
corded important roles with regard to the coordination of international disaster
response.
To a varying extent, these entities have also been provided specific facilities per-
tinent to their operations. For example, the Convention on Privileges and Immu-
nities of the United Nations of 194676 and the Convention on Privileges and
Immunities of the Specialized Agencies of 194777 provide the basis for the recogni-
tion of domestic legal personality of UN entities, as well as important exemptions
to normal rules concerning visas, customs, judicial oversight and other regulatory
systems. Similar privileges and immunities have been accorded to the international
components of the Red Cross/Red Crescent Movement in bilateral agreements
with States.78
Importantly, the NGO sector lacks a formal international legal mandate for its
activities, although its effectiveness and prominence is large and growing, as dis-
cussed further below.
Summary
In short, there are a number of international instruments relevant to disaster re-
sponse but their proliferation has not resulted in a coherent legal system. Likewise,
it has been argued with regard to institutional mandates that "there is no interna-
tional relief system per se, as the diverse set of actors displays little structural inter-
dependence [and lacks] a common boundary, other than the fact that each
component may on occasion contribute to the relief process."79 OCHA is currently
leading a process of reform to address structural coordination and cooperation
301
The Law of International Disaster Response
problems among UN agencies and their humanitarian partners;80 however, the in-
ternational humanitarian community has yet to pay significant attention to the
harmonization of the legal framework.
Legal Problems in International Disaster Response
The absence of a comprehensive system of international law on any particular
topic is not necessarily a reason for concern. The question is whether there are
problems of a legal or regulatory nature that have been left unaddressed. Insofar as
international disaster response is concerned, the answer to this question is that
there are indeed a number of such problems that arise consistently in major inter-
national operations and constitute a substantial drag on their speed, efficiency and
effectiveness. In significant part, these problems can be attributed to the absence of
previously established laws, regulations and institutional structures focused on in-
ternational assistance at the national level. Thus, for example, the Pakistani gov-
ernment has acknowledged that "Pakistan suffered from the lack of a pre-existing
National Disaster Management Authority" and applicable legal structure when the
earthquake struck in October 2005. 81 Likewise, the United States Government Ac-
countability Office issued a report in the wake of Hurricane Katrina concluding
that "FEMA and other agencies did not have policies and procedures in place to en-
sure the proper acceptance and distribution of in-kind assistance donated by for-
eign countries and militaries."82
Typical problems in international response can be roughly divided into two
main categories: legal obstacles to the entry and operation of international relief;
and failures of monitoring, coordination and regulation of international aid. Prob-
lems of both categories usually coincide in the same disaster operations. This sec-
tion will provide a few recent examples.
Obstacles to Entry and Operations
The initiation of international disaster assistance can be difficult for political,
rather than legal, reasons, as some governments have been reluctant to request or
accept needed aid for fear of appearing weak or dependent, to avoid publicity for a
disaster, and/or to demonstrate their disapproval of the offering party.83 Govern-
ments are likewise sometimes unwilling to provide basic information about a di-
saster for similar reasons, leaving potential responders at a loss as to how best to
react.84 On the other hand, it has also been the case that foreign donors have pres-
sured governments to accept assistance they did not really need. For example, it was
reported that a large number of foreign governments insisted on sending field hos-
pitals and medical personnel to Indonesia in the wake of the 2004 tsunami, despite
302
David Fisher
pleas from the Indonesian government and the World Health Organization that
they were not required.85
Frequently, however, the problem is more technical. While many States have
some provision in their law as to which department (frequently the office of the
prime minister or president) may initiate a request for international disaster assis-
tance, the lack of standardized systems for making the determination that outside
help is needed has led to long delays,86 and communication about specific needs is
often imperfect. Thus, for example, after Hurricane Katrina struck in August 2005,
it was reported that a Swedish government plane loaded with water purification
gear, blankets and telecommunications equipment was kept on a runway for
eleven days awaiting clearance to fly to the United States.87 By the time permission
was granted and the plane was able to depart, none of the supplies it carried were
still needed.
Sometimes, entry visas for international disaster response personnel have been
either delayed or refused by the governments of affected States, even after interna-
tional assistance has been requested. For example, several States in Central Amer-
ica have refused visas to relief personnel from other parts of Latin America, in part
due to heightened concerns about illegal immigration.88 In most cases, however,
response personnel have been able to enter affected States on tourist or short-term
visas, but problems have emerged later in the operation. For instance, interna-
tional personnel responding to the 2004 tsunami in Thailand and Indonesia were
required to frequently exit and re-enter those nations in order to renew short-term
visas, incurring both significant expense and disruption to their operations.89
Regulations on the passage of relief transport vehicles and customs delays on in-
coming goods and equipment are other critical barriers in many operations.90 For
example, one year after the tsunami struck Indonesia, over four hundred contain-
ers of relief goods were still awaiting customs clearance in Jakarta and Medan.91 In
the meantime, many of the perishable items rotted, medicines expired, and some
items that were needed at the onset of the response operation (such as tents and
surgical equipment) were no longer required.92 After Hurricane Katrina struck the
United States, the British Ministry of Defence sent five hundred thousand "Meals
Ready to Eat" (MREs) by civil aircraft.93 However, after their arrival in Arkansas, it
was determined that they contained meat products prohibited by US health regula-
tions, and they were therefore stored in a warehouse at significant expense for a
number of months pending distribution to other countries.94
Delays can also arise before goods even reach the borders of the affected nation.
For example, in August 2006, after strong winds in Swaziland left thirteen thousand
persons homeless and exposed to ongoing heavy rains, the IFRC's regional delega-
tion in Harare, Zimbabwe sent a shipment of tarpaulins and tents.95 However, the
303
The Law of International Disaster Response
shipment was delayed at the border with South Africa for five days before they
could proceed to the destination nation, due to problems with customs. Analo-
gously, overflight of transit States can occasionally raise difficulties, as when Paki-
stan reportedly refused to allow flights of Indian aid to Afghanistan to cross its
airspace.96
Sometimes customs delays cause headaches over and above the obvious issue of
forestalling the intended use of the affected goods and equipment. For instance, af-
ter the 1999 earthquake in Turkey, it was reported that relief goods delayed in cus-
toms beyond the statutory storage deadline had been summarily nationalized.97
Somewhat analogously, in Indonesia, storage fees for tsunami relief cargo awaiting
customs clearance mounted so high due to delays that they sometimes exceeded
the value of the relief consignments themselves.98 Charges of this type, as well as
customs duties and other types of taxes, tolls and fees on disaster operations, have
dramatically increased their costs and lowered their effectiveness. In Sri Lanka, for
example, Oxfam was required to pay a £550,000 customs duty in June 2005 to im-
port twenty-five four-wheel vehicles for its tsunami rehabilitation operations.99
Another common issue that some international disaster responders encounter
is obtaining recognition of their domestic legal status in the affected State. In Thai-
land, for example, international NGOs found the local registration process so diffi-
cult to navigate that nearly none were successful in doing so.100 As a result, some
had difficulty opening bank accounts, obtaining work permits, hiring local staff
and applying for tax exemptions.101
Similarly, obtaining recognition of the foreign qualifications of medical person-
nel has frequently proven difficult. In Nepal, for instance, it was reported that
[wjhilst some organisations were aware of the process of obtaining permission from
the Medical Council of Nepal, the process was a lengthy one and not easily adapted to
emergency situations. Other organisations were not aware of the necessary processes,
and in at least one instance a prominent medical NGO was asked to cease activities
altogether for failing to comply with the regulations.102
Furthermore, foreign actors lacking diplomatic or inter-governmental privi-
leges and immunities find themselves exposed to the risk of civil and/or criminal li-
ability in unfamiliar legal systems. On the civil side, local employee recruitment
and termination reportedly provide particularly fertile ground for litigation in di-
saster response operations as domestic labor laws generally fail to accommodate
the speedy and short-term staffing requirements of international disaster response
operations.103 Medical malpractice has also been identified as an area of particular
concern.104 Exposure to criminal investigation was raised as an issue by a number
304
David Fisher
of disaster responders to the 1999 earthquake in Turkey, and one that substantially
affected their operations.105
Problems of Quality and Coordination
Closely related to entry and operation barriers are issues of quality and adequate
coordination of international relief and recovery assistance. In the absence of effec-
tive international mechanisms of control, affected State governments have often
struggled to address the flood of external actors responding to those major disas-
ters with the highest media attention.106
Perhaps the most important quality issue is the arrival of vast quantities of un-
wanted, unneeded and inappropriate relief goods, which embroil customs offices,
fill airports and warehouses, and block the flow of needed goods. For example, in
each of the largest disaster operations of 2005 (e.g., the tsunami in Indonesia, Thai-
land and India; the earthquake in Pakistan; and Hurricane Katrina in the United
States), heaps of used clothing appeared. In tropical Sri Lanka, these included win-
ter coats and hats, dress shoes, pyjama tops (without bottoms) and even "thong
underwear."107 In Muzaffarabad, Pakistan, piles of useless warm-weather clothes
were burned for warmth.108 As noted by the Tsunami Evaluation Coalition (TEC)
report — a major multiagency study of the international response to the 2004 tsu-
nami— "assistance" in the form of used clothes, expired or poorly labeled medi-
cines, inappropriate food (such as canned pork sent to Muslim Indonesia), and
other assorted eccentric items is "not just worthless to the recipients; it has a nega-
tive value. It occupies storage and transport space at the very time when this is
needed for real aid. It then requires special handling to dispose of — all an addi-
tional burden on a response."109
In addition to increased shipments of goods, major disasters are attracting
larger numbers of international actors on the ground. The growth in the numbers
of NGOs becoming involved in disaster response has been particularly impressive.
For example, after the December 2004 tsunami, it was reported that there were two
hundred NGOs working in Aceh.110 In India, nearly three hundred NGOs were re-
ported to be working in Nagapattinam District alone.111 While particularly pro-
nounced after the tsunami, this trend can be seen in other highly televised disasters
as well.112 In addition, more UN agencies, Red Cross and Red Crescent societies,
private companies and unaffiliated individuals are travelling to disaster sites seek-
ing to help.113
Among these new actors, many are inexperienced and some act without suffi-
cient understanding of, or regard for, international standards of quality in disaster
response. As noted by the TEC report, " [t ] here is general agreement that there were
far too many agencies present in Indonesia and Sri Lanka. The low entry barrier to
305
The Law of International Disaster Response
the system permits the entry of inexperienced and incompetent actors," and while
"[experienced agencies are not immune from low quality work . . . the risks are
higher with inexperienced actors."114 Thus, for example, an unidentified NGO was
found to have vaccinated children in a village near Banda Aceh, Indonesia after the
tsunami, leaving no records and no way to determine who had been vaccinated and
who had not.115
Many "traditional" humanitarians in tsunami-affected nations were also
shocked to find themselves working alongside "Scientologist trauma care" workers
who purported to heal tsunami victims by influencing energy waves with their
hands.116 To their dismay, and as noted in one media report from India, "[i]n the
eyes of the local public, [Scientology's] operations are indistinguishable from those
of UNICEF and CARE and the Red Cross."117 Other purportedly "humanitarian"
organizations were accused of proselytizing in several tsunami- affected nations,
and even conditioning aid on religious conversion.118
Probably the most common complaints in disaster operations revolve around
problems of coordination and sharing of information between the various actors.
The proliferation of international responders has done nothing to improve these
problems. In the tsunami operations, for example, "[ajchieving adequate repre-
sentation and consensus among even the larger, mature INGOs and Red Cross
agencies was not easy; but with such a large number of smaller agencies also on the
ground in the first six months, coherent joint planning and implementation was
unlikely."119 Aceh was dubbed an "information black hole" where overfunded hu-
manitarian agencies competed for beneficiaries, overserving some communities
and ignoring the needs of others.120
International coordination mechanisms remain largely voluntary — even
among UN agencies — and have struggled to prevent irregular coverage of disaster-
affected persons.121 For their part, national institutional frameworks for monitor-
ing and coordination of international relief were overwhelmed in both Indonesia
and Sri Lanka, leading to multiple structural changes over the course of the relief
and recovery operations in both nations.122
However, even with a more modest international intervention, governments of
the affected States have experienced significant difficulty in the absence of strong
regulatory and institutional mechanisms. For example, after Tropical Storm Stan
caused massive flooding in Guatemala in October 2005, it was widely recognized
that the national disaster management network "CONRED" and its secretariat
were unable to track and coordinate the activities of the several dozen foreign orga-
nizations and States that arrived to provide assistance.123 In contrast, in Fiji, after a
detailed legal and regulatory structure was put in place for international relief, few
coordination problems were noted in recent disaster operations.124
306
David Fisher
Ramifications for Military Actors
How does all of this relate to military actors? First, as noted above, militaries in a
number of nations are becoming increasingly keen on international disaster relief,
both on a bilateral and multilateral basis. As noted by the United Nations, "Mem-
ber States, even those who do not give a primary role to their military forces in do-
mestic response, are now using their military capacity for relief operations on a
global basis."125 For example, in 1992, Japan amended its law on international di-
saster relief to provide a specific role for its military forces, which have been active
in operations ever since.126 Similarly, in 1996, the Canadian military created a per-
manent disaster response team to be used for foreign disaster operations.127 The
US military, long mandated to participate in international disaster relief, has also
increased its emphasis on "humanitarian" activities in recent years.128 For instance,
its contribution after the 2004 tsunami was its biggest operation in the Asia-Pacific
region since the Vietnam War.129 The Americans, Japanese and Canadians joined
no less than thirty- two other national militaries that responded to the tsunami.130
Similarly, in 1998 NATO created its Euro- Atlantic Disaster Response Coordina-
tion Centre (EADRCC) and has also embraced a "growing humanitarian role" in
disaster response operations, including for Hurricane Katrina in the United States
and the October 2005 earthquake in Pakistan.131 NATO has even gone so far as to
negotiate its own memorandum of understanding with member States for the fa-
cilitation of civilian relief personnel and materiel.132 Proposals have recently been
raised for regional military cooperation mechanisms in Central America and Asia
to facilitate military involvement in disaster relief.133
Second, military responders experience many of the same legal issues and con-
cerns as civilian actors in disaster response operations, as well as issues uniquely re-
lated to the commonly strict domestic regulation of their mandates and roles in
international operations and the special sovereignty and security concerns that the
presence of foreign troops raise for affected States.134 As noted in one summary of
the "lessons learned" from NATO's intervention in Pakistan, "[t]he importance of
working with host governments must not be underestimated. Many issues must be
resolved before operations forces arrive, including terms of entry, force protection,
legal status, communication channels, liaison arrangements, contracting arrange-
ments, use of land for basing and translators."135
Third, military responders face a similarly patchy normative framework. Few
existing disaster-related treaties make specific reference to military involvement,
though many of their more general provisions (for example, on facilitating entry of
goods and personnel) should also apply to military responders. Those that do have
specific reference, such as the ASEAN Agreement,136 the BSEC Agreement,137 and
307
The Law of International Disaster Response
the Agreement of 1974 between Sweden and Norway concerning the Improvement
of Rescue Services in Frontier Areas138 commonly seek to address issues of the
command relationship between the assisting and affected State forces, identifica-
tion of foreign forces (e.g., uniforms) and the carriage of arms. When they are in
place, bilateral or regional (e.g., NATO) status offerees agreements or MOUs ad-
dress a number of the issues that might arise for military actors in disaster opera-
tions.139 However, they are limited in number and difficult to negotiate at the
outset of a disaster.
The pre-eminent "soft law" instrument on military involvement in disaster re-
lief is the Oslo Guidelines on the Use of Military and Civil Defence Assets in Disas-
ter Relief. First developed by the United Nations and endorsed by an international
conference in Oslo in 1994, the Oslo Guidelines were updated and "relaunched" at
a new conference in November 2006. 140 Particularly as updated this year, the
guidelines stress that military relief assets should be considered a last resort when
no civilian alternatives are available.141 They also encourage (though do not re-
quire) military and civil defense forces to act "under UN control" in disaster opera-
tions.142 They set out minimum facilities that should be offered by affected States,
in areas such as legal status, customs, visas, overflight and security, and also set out
coordination structures and basic principles to which military and civil defense op-
erations should adhere. They also include a model agreement addressing these
sorts of issues as an annex.
The emphasis in the Oslo Guidelines on civilian control reflects the current am-
biguity in the humanitarian community about the increasing role of the military in
disaster operations. On the one hand, the capacities and achievements of military
actors in international disaster relief — particularly in the areas of transport and lo-
gistics— are undeniable. For instance, the international military contributions to
the tsunami relief have been described as pivotal to the success in avoiding the
feared "second tsunami" of starvation and disease.143 On the other hand, military
assistance is expensive — sometimes many times more costly than when the same
services are provided by civilian sources144 — and its identification and integration
with humanitarian activities raises thorny policy issues. These are particularly
acute in armed conflict settings, when military attempts to "win hearts and minds"
can confuse the distinction between military and humanitarian agencies, render-
ing the latter more liable to attack.145 However, even in disaster settings, an overly
close identification has been seen as dangerous for public perceptions of the neu-
trality of humanitarian actors. Moreover, there is concern that precedent set for
close integration between military and humanitarian actors in a disaster setting
maybe difficult to alter in a later situation of conflict.146 Thus, the Oslo Guidelines
call for "direct assistance" to be provided as much as possible by humanitarian
308
David Fisher
actors, with militaries instead providing "indirect assistance" (such as transport
and logistical aid) and "infrastructure support" (such as rebuilding roads and gen-
erating power).147
Conclusion and Prospects for the Future
It seems plain that some improvements in the way that international disaster assis-
tance is generally facilitated and regulated would be desirable. While every disaster
setting is in some ways unique, and the very nature of the enterprise (particularly in
sudden-onset disasters) lends itself to some level of improvisation, the fact that a
consistent set of legal problems tends to crop up in disaster settings around the
world suggests that better regulation may have a role in improving the outcome of
disaster relief operations.
At the national level, a workable balance still remains to be struck in most States
between sufficient openness to allow quick entry and easy operation of interna-
tional disaster assistance and sufficient control to ensure the quality and overall ef-
fectiveness of a relief and recovery effort. International actors (both civilian and
military) and affected State governments have suffered alike from this imbalance,
to the detriment of efficient support to affected persons. To address this, more gov-
ernments need to thoroughly analyze such issues and adopt appropriate legislation
and regulations prior to being struck by a disaster. Some — particularly those struck
by major disasters in 2005 148 — are beginning to do so, and others might be led to it
through their activities pursuant to the Hyogo Framework.
At the international level, the dissemination and use of existing instruments
could be much improved.149 Even if this occurs, however, there are significant gaps
in the current framework when measured against the common problem areas.
Nevertheless, one commentator, noting the spotty historical development of inter-
national norms in this area, ongoing State concerns about sovereignty, and the re-
cently enhanced emphasis of the international community on disaster risk
reduction has concluded that "the direct role of international law with respect to
the policy on natural disasters will not grow significantly."150 On the other hand, as
described above, recent years have seen significant "hard" and "soft" law develop-
ments, including the ASEAN Agreement, the International Health Regulations, the
entry into force of the Tampere Convention, the NATO MOU and the revision and
reaffirmation of the Oslo Guidelines. In fact, there seems to be no shortage of will
to address some of the relevant issues, but rather a continuing lack of coherence
and comprehensiveness among current initiatives.
Looking to the future, the International Conference of the Red Cross and Red
Crescent, a forum including all State parties to the Geneva Conventions as well as
309
The Law of International Disaster Response
the various components of the Red Cross/Red Crescent Movement, is scheduled to
take up a set of recommendations on the issues described in this paper in Novem-
ber 2007 — particularly with regard to what States might be encouraged to include
in domestic law and policy. The consultation process leading to that conference,
including regional forums organized with governmental and inter-governmental
partners around the globe, has already begun generating greater publicity and
attention to these issues.151 Moreover, the International Law Commission (a UN
body whose object is the "promotion of the progressive development of international
law and its codification"152) recently decided to place the issue of the "protection of
persons in natural disasters" on its long-term program of work.153 There is thus reason
to hope that there will be greater progress on these issues in the near future.
Notes
1. See Press Release, Jean-Philippe Lavoyer, Head of Legal Division, International Com-
mittee of the Red Cross, A milestone for international humanitarian law (Sept. 22, 2006), avail-
able at http://www.icrc.org.
2. International Committee of the Red Cross, Annual Report 2005, at 26, available at http://
www.icrc.org.
3. International Federation of Red Cross and Red Crescent Societies, World
Disasters report 2000, at 157 (2000).
4. Bosko Jakovljevic, Some Reflections on International Disaster Relief Law, 16 INTERNA-
TIONAL Civil defence Journal 32, 34 (2006).
5. Source: Emergency Disasters Data Base (EM-DAT): The Office of US Foreign Disaster
Assistance/Centre for Research on the Epidemiology of Disasters (OFDA/CRED) International
Disaster Database, http://www.em-dat.net [hereinafter CRED Database] (last visited Oct. 21,
2006).
6. While figures for interventions by the international humanitarian sector as a whole are
difficult to locate, the International Federation of Red Cross and Red Crescent Societies alone
has recorded nearly two thousand international relief operations in 153 nations since its found-
ing in 1919. See International Federation of Red Cross and Red Crescent Societies Powerpoint
Presentation, To improve the lives of vulnerable people by mobilizing the power of humanity
(July 2006) (on file with author).
7. See, e.g., INTER- AGENCY SECRETARIAT OF THE INTERNATIONAL STRATEGY FOR DISAS-
TER Reduction (UN/ISDR), living with Risk: A Global Review of disaster Reduction
INITIATIVES 45 (2004) (noting the increasing incidence of disasters).
8. See, e.g., Fred Cuny, Uses of the Military in Humanitarian Relief, Presentation to the In-
ternational Peace Academy, Niinsalo, Finland (Nov. 1989), available at http://www.pbs.org/
wgbh/pages/frontline/shows/cuny/laptop/humanrelief.html.
9. For example, the United States Defense Threat Reduction Agency is currently develop-
ing a "legal deskbook" that will describe the "U.S. and international laws, regulations and poli-
cies that apply when a foreign government requests U.S. assistance after a chemical, biological,
radiological or nuclear, and/or high-yield explosives (CBRNE) event[.]" United States Defense
Threat Reduction Agency, Foreign Consequence Management Legal Deskbook Workshop I
Report, Vicenza, Italy (Sept. 27-28, 2005) (on file with author). See also United States Defense
310
David Fisher
Threat Reduction Agency, Foreign Consequence Management Legal Deskbook Workshop II
Report, McLean, Virginia, (Feb. 2, 2006) (on file with author).
10. For a more exhaustive discussion of the existing instruments, see Victoria Bannon,
Strengthening Disaster Response Laws, Rules and Principles: Overview of the Current System and a
New Way Forward, in TSUNAMI AND DISASTER MANAGEMENT: LAW AND GOVERNANCE (C. Raj
Kumar & D.K. Srivastava eds., 2006).
11. See Peter Macalister-Smith, international Humanitarian Assistance: Disas-
ter Relief Actions in international Law and Organization 17 (1985); Yves Beigbeder,
The Role and Status of International Humanitarian Volunteers and Organiza-
tions 8-9 (1991).
12. See Obijiofor Aginam, International Law and Communicable Diseases, 80 BULLETIN OF
the World Health Organization 946, 947 (2002).
13. See MACALISTER-SMITH, supra note 11, at 17-18. This role was later solidified by the
Constitution of the League of Red Cross Societies (now known as the International Federation of
Red Cross and Red Crescent Societies (IFRC), formed in 1919, and in Article 25 of the Covenant
of the League of Nations, which called on member States to "encourage and promote the estab-
lishment and cooperation of duly authorized national Red Cross organizations having as pur-
poses the improvement of health, the prevention of disease and the mitigation of suffering
throughout the world."
14. See International Federation of Red Cross and Red Crescent Societies, Background In-
formation Sheet: International Regulation of Telecommunications in Disaster Relief (Apr. 25,
2006), available at http://www.ifrc.org/what/disasters/idrl/publication.asp.
15. See, e.g., Convention for the Unification of Certain Rules of Law in Regard to Collisions Be-
tween Vessels, Sept. 23, 1910, 1930 Austl. T.S. No. 14, available at http://www.admiraltylawguide
.com/conven/collisionsl910.html, and the Convention for the Unification of Certain Rules
With Respect to Assistance and Salvage at Sea, Sept. 23 1910, 1936 Austl. T.S. No. 9, available at
http://www.admiraltylawguide.com/conven/salvagel910.html.
16. See Peter Macalister-Smith, Reflections on the Convention Establishing an International
Relief Union of July 12, 1927, 54 LEGAL HISTORY REVIEW 363, 364 (1986).
17. Convention and Statute Establishing an International Relief Union, July 12, 1927,
L.N.T.S. 3115 (1932) [hereinafter IRU Convention].
18. See Macalister-Smith, supra note 16, at 370.
19. Mat 370-72.
20. See Horst Fischer, International disaster response law treaties: trends, patterns and lacunae,
in International Disaster Response Laws, Principles and Practice: Reflections, Pros-
pects AND CHALLENGES 24, 25 (Victoria Bannon ed., 2003).
21. Id.
22. See International Convention on the Simplification and Harmonization of Customs
Procedures, May 18, 1973, 950 U.N.T.S. 269, T.I.A.S. 6633 (1973), and its 1999 Protocol of
Amendment, infra note 32.
23. See, e.g., Convention on Facilitation of International Maritime Traffic, annex 1, sees.
5.11-5.12, Apr. 9, 1965, 591 U.N.T.S. 265; 4 INTERNATIONAL LEGAL MATERIALS 502; Conven-
tion on International Civil Aviation, annex 9, sec. 8.8, Dec. 7, 1944, 61 Stat. 1180, 15 U.N.T.S.
295, reprinted in INTERNATIONAL CIVIL AVIATION ORGANIZATION, INTERNATIONAL STAN-
DARDS and Recommended Practices: Facilitation - Annex 9 to the Convention on In-
ternational Civil Aviation ( 12th ed. 2005).
311
The Law of International Disaster Response
24. See, e.g., Agreement for Cooperation in Dealing with Pollution of the North Sea by Oil
and other Harmful Substances, art. 7, Sept. 13, 1984, Official Journal of the European Commu-
nities, No. L 188/9 (July 16, 1984).
25. See U.N. Doc. No. A/39/267/Add.2 - E/1984/96/Add. 2 (June 18, 1984), available at
http://www.ifrc.org/what/disasters/idrl/publication.asp.
26. See Decision 1984/175, reprinted in Resolutions and Decisions of the Economic and Social
Council: Second Regular Session of 1984, Geneva 4-27 July 1983, Supplement No. 1A (United
Nations, 1984) (taking note of the draft convention and referring it to the General Assembly).
27. See, e.g., Summary Record of the 32nd Meeting, UNGAOR, 39th Sess., UN Doc. No. A/
C.2/39/Sr.32 (Nov. 6, 1984) at 10 (Ecuador); Summary Record of the 35th Meeting, UNGAOR
39th Sess., U.N. Doc. No. A/C.2/39/SR.35 (Nov. 7, 1984) at 3 (Indonesia); Summary Record of
the 37th Meeting, UNGAOR 39th Sess., U.N. Doc. No. A/C.2/39/SR.37 (Nov. 12, 1984) at 12
(Zambia). Several States publicly called for more time for discussion on the Draft Convention.
See, e.g., Summary Record of the 37th Meeting, UNGAOR 39th Sess., U.N. Doc. No. A/C.2/39/
SR.37 (Nov. 12, 1984) at 12 (Philippines); Summary Record of the 34th Meeting, UNGAOR 39th
Sess., U.N. Doc. No. A/C.2/39/SR.34 (Nov. 12, 1984) at 7 (Nordic States).
28. 1439 U.N.T.S. 275(1986).
29. See http://www.iaea.org/Publications/Documents/Conventions/cacnare_status.pdf (last
visited Nov. 1,2006).
30. The CRED EM-DAT database includes radiological emergencies and explosions as sub-
categories along with many other types of man-made disaster under the heading "Industrial Ac-
cidents." See EM-DAT Glossary, http://www.em-dat.net/glossary.htm#I (last visited Nov. 1,
2006). According to the database, industrial accidents as a whole represented 7.1% of all non-
conflict disasters from 1970-2006, amounting to less than half of the number of wind storms
(16.1%) and of floods (19.4%). See CRED Database, supra note 5.
31. An online database on the response to the Chernobyl disaster maintained by the Swiss
Agency for Development and Cooperation lists over one hundred (mostly international) non-
State organizations still actively involved in the response, over twenty years after the accident. See
http://www.chernobylinfo.int (last visited Nov. 1, 2006).
32. Protocol of Amendment to the International Convention on the Simplification and
Harmonization of Customs Procedures of 18 May 1973, June 26, 1999, S. TREATY DOC. No. 108-
6 available at http://www.ifrc.org/what/disasters/idrl/publication.asp (hereinafter Kyoto Con-
vention). This amended version has now superseded the old one for 50 of its original 63 State
parties. The original convention is expected to eventually be entirely defunct as additional State
parties "switch over." See Press Release, World Customs Organization, Revised Kyoto Conven-
tion Continues to Grow (Aug. 3, 2006), available at http://www.wcoomd.org/ie/En/en.html. Of
the two annexes of the original version of the Kyoto Convention directly relevant to disaster re-
lief, only one (Annex F.5) is currently (and probably only temporarily) still in effect during this
transition period, and only between two parties, Kenya and Israel. See World Customs Organiza-
tion, Position as Regards Ratifications and Accessions (at July 1, 2006): International Conven-
tion on the Simplification and Harmonization of Customs Procedures, Doc. No. PG0138Ela,
July 25, 2006, available at http://www.wcoomd.org. Neither of the original annexes ever gar-
nered more than a dozen State adherents. See World Customs Organization, Position as Regards
Ratifications and Accessions (at June 30, 2004): International Convention on the Simplification
and Harmonization of Customs Procedures.
33. Convention on Temporary Admission, June 26, 1990, 1993 Austl. T.S. No. 43, available
at http://www.wcoomd.org [hereinafter Istanbul Convention].
312
David Fisher
34. There are currently eight State parties to Specific Annex B.3, seven parties to Specific An-
nex J. 5 of the Kyoto Convention and thirty-seven parties to Annex B.9 of the Istanbul Conven-
tion. See World Customs Organization, Position as Regards Ratifications and Accessions (as of
July 1, 2006): International Convention on the Simplification and Harmonization of Customs
Procedures (as amended), Doc. No. PG0137Ela; and Position as Regards Ratifications and Ac-
cessions (as of July 1, 2006): Convention on Temporary Admission (as amended), Doc. No.
PG0139Ela; both available at http://www.wcoomd.org/ie/en/Conventions/conventions.html.
35. Of the twenty- five States that have experienced the greatest number of non-conflict
disasters over the last fourteen years (per the CRED Database, supra note 5), three have signed
Kyoto Convention Specific Annex B.3, two have signed its Specific Annex J. 5, and four have
signed Annex B.9 of the Istanbul Convention. Other customs instruments, although lacking spe-
cific reference to disaster situations, might also be helpful. These include the ATA Carnet for the
Temporary Admission of Goods of 1963, available at http://www.wcoomd.org, which allows for
passage without inspection of goods across the borders of transit States, and the Customs Con-
vention on the Temporary Importation of Professional Equipment, June 8, 1961, 1968 Austl.
T.S. No. 6, available at http://www.austlii.edu.au., which allows for duty-free importation of
"any . . . equipment necessary for the exercise of the calling, trade or profession of a person visit-
ing the territory of another country to perform a specific task."
36. 2172 U.N.T.S. 231 (2000).
37. Id., art. 4(b).
38. As of December 1, 2005. See International Civil Defence Organization, Framework Con-
vention on Civil Defence Assistance, May 22, 2000, 2172 U.N.T.S. 38131, http://www.icdo.org/pdf/
org/act-coop-frame-signatures-en.pdf.
39. Tampere Convention on the Provision of Telecommunication Resources for Disaster
Mitigation and Relief Operations, June 18, 1998, United Nations depositary notification
C.N.608.1998.TREATIES-8 of 4 December 1998 (entered into force Jan. 8, 2005). The full text is
available at http://www.ifrc.org/what/disasters/idrl/publication.asp.
40. Id., art. V.
41. See International Federation of Red Cross and Red Crescent Societies, Legal issues from
the international response to the tsunami in Sri Lanka: An International Disaster Response Laws,
Rules and Principles (IDRL) Programme Case Study 16 (July 2006), available at http://
www.ifrc.org/docs/pubs/idrl/report-srilanka.pdf [hereinafter Sri Lanka Case Study].
42. Field interviews by the author.
43. There are currently thirty-five parties to the convention. See United Nations Treaty Da-
tabase, http://untreaty.un.org (last visited Oct. 31, 2006).
44. According to disaster data obtained from the CRED Database, supra note 5.
45. This information was obtained from the United Nations Treaty Service website, http://
untreaty.un.org/ (last visited Jan. 4, 2007). By its terms, ratification or accession to the treaty is
limited to a prescribed list, or those approved by the Food Aid Committee. See Food Aid Con-
vention, infra note 46, art. XXII.
46. The Food Aid Convention is one of two components of the International Grains Agree-
ment of 1995, Apr. 13, 1999, 2073 U.N.T.S. 135, availa ble at http://www.igc.org.uk/en/downloads/
brochure/iga 1 995 .pdf.
47. The "eligible products" — in other words, those that a member State can report toward
its agreed annual quota — are grains, grain and rice products of primary or secondary processing,
pulses, edible oil, root crops, skimmed milk powder, sugar, seed for eligible products and, to a
limited extent, other products "which are a component of the traditional diet of vulnerable
groups or . . . of supplementary feeding programs [.]" Food Aid Convention, supra note 46, at
313
The Law of International Disaster Response
art. III. The Convention does not limit contributions of other types of foods, but they cannot be
counted toward the member's quota.
48. See H. Bruce Huff & Michelle Jimenez, The Food Aid Convention: Past Performance and
Future Role Within the Global Trade and Development Environment 6-7, conference paper pre-
sented at the International Conference on Agricultural Policy Reform and the WTO: Where Are
We Heading?, in Capri, Italy, June 23-26, 2003, available at http://www.ecostat.unical.it/
2003agtradeconf/Contributed%20papers/Huff%20and%20Jimenez.PDF; Sophia Murphy &
Kathy McAfee, U.S. Food Aid: Time to Get It Right 15 (Institute for Agriculture and Trade Policy,
2005), available at http://www.tradeobservatory.org/library.cfm?refid=73512.
49. At its December 2006 session, the Food Aid Committee reportedly also agreed "in principle"
to extend the Convention for another year beyond the June 2007 deadline, subject to confirma-
tion at its next meeting. However, it also agreed to consider amending the treaty at that meeting.
See Press Release, IGC-FAC (Dec. 14, 2006), available at http://www.igc.org.uk/downloads/pr/
pr06071.pdf.
50. World Health Assembly, Revision of the International Health Regulations, Doc. No.
WHA58.3 (May 23, 2005) [hereinafter revised IHR]. In light of the alarming implications of the
recent outbreak of avian influenza, the World Health Assembly adopted a resolution in May
2006 urging member States to voluntarily begin implementing pertinent provisions of the re-
vised IHR immediately. See 59th World Health Assembly, Resolution EB117.R7, Agenda Item
11.1, WHO Doc. A59/87 (May 26, 2006), available at http://www.who.int/gb/eZe_eb 11 7.html.
51. See Constitution of the World Health Organization art. 22, July 22, 1946, available at
http://www.yale.edu/lawweb/avalon/decade/decad05 1 .htm.
52. See Michael Baker & David Fidler, Global Public Health Surveillance Under New Interna-
tional Health Regulations, 12 EMERGING INFECTIOUS DISEASES 1058 (2006).
53. Unfortunately, the revised IHR does not directly provide for measures to protect or even
maintain the confidentiality of these non-State whistleblowers. See David Fidler, From Interna-
tional Sanitary Conventions to Global Health Security: The New International Health Regulations,
4 Chinese Journal of International Law 325, 375 (2005).
54. 1991 Official Journal of the European Communities, Legislation 229.
55. Also known as the "Open Partial Agreement on the Prevention of, Protection against
and Organization of Relief in Major Natural and Technological Disasters," established by Coun-
cil of Europe Committee of Ministers Resolution 87(2) of March 20, 1987. The agreement is
open to both European and non-European States and currently has twenty-five members. See
http://www.coe.int/t/dg4/majorhazards/presentation/presentation_en.asp.
56. Council Decision 200 1 /792/EC, establishing a Community mechanism to facilitate rein-
forced cooperation in civil protection assistance interventions of October 23, 2001, Euratom,
Official Journal L 297/7, Nov. 15, 2001, available at http://eur-lex.europa.eu/LexUriServ/site/en/
oj/200 1 /1_297/1_297200 1111 5en000700 1 1 .pdf.
57. Mar. 17, 1992, 2105 U.N.T.S. 460. See in particular Article 12 and Annex X.
58. Jan. 20, 1989, 1777 U.N.T.S. 249 (No. 31001).
59. Available at http://www.ifrc.org/what/disasters/idrl/publication.asp.
60. Inter-American Convention to Facilitate Assistance in Cases of Disaster (1984), avail-
able at http://www.oas.org/legal/intro.htm.
61. They are Panama, Peru and Uruguay. See IDRL Document Information Sheet, available
at http://www.ifrc.org/Docs/idrl/I128EN_I.pdf.
62. See Nuevo Convenio Constitutive del Centro de Coordinacion para la Prevencion de los
Desastres naturales en America Central (CEPREDENAC), Sept. 3, 2003, SICA Doc. No. STD/C/
314
David Fisher
071/03, available at http://www.cepredenac.org. CEPREDENAC was first formed on October
29, 1993. See CEPREDENAC: Antecedentes, http://www.cepredenac.org/antecedentes.htm.
63. Consejo Andino de Ministros de Relaciones Exteriores, Decision 529, Creadon del
Comite Andino para la Prevencion y Atencion de Desastres (CAPRADE), July 7, 2002, available
at http://www.comunidadandina.org/normativa/dec/D529.htm.
64. See Agreement Establishing the Caribbean Disaster Emergency Response Agency, Feb.
26, 1991, available at http://www.caricom.org/jsp/community/agreement-cdera.htm.
65. See Tracy- Lynn Field, International Disaster Response Law in a Southern Africa Context,
in International Disaster Response, supra note 20, at 83.
66. See Agreement Establishing the Inter- Governmental Authority on Development
(IGAD), Mar. 21, 1996, Doc. No. IGAD/SUM-96/AGRE-Do, available at http://www.igad.org/
aboutZagreement_establishing_igad.pdf. Although IGAD has extended its activities and is now
mainly known for its conflict resolution initiatives, it is still active on issues of drought. See, e.g.,
IGAD Council of Ministers, Resolution on the Drought and Famine Situation in the IGAD
Region, Mar. 18, 2006, available at http://www.igad.org.
67. See L. Amathila, Deputy Prime Minister of the Republic of Namibia, Statement at the
Opening of the SADC Pre-Season Disaster Management Meeting, Windhoek, Namibia, Sept.
19-20, 2005, available at http://www.grnnet.gov.na/News/Archive/2005/september/week3/
disaster _rpt.htm.
68. ASEAN Agreement on Disaster Management and Emergency Response (2005), available
at http://www.aseansec.org.
69. See Horst Fischer, supra note 20, at 24. These treaties have been collected and are avail-
able on the IFRC's IDRL Database at http://www.ifrc.org/what/disasters/idrl/publication.asp.
70. See Report of the World Conference on Disaster Reduction, U.N. Doc. No. A/Conf.206/
6 (Mar. 6, 2005), Resolution 2.
71. See id. at 17-18 (describing "Priority 5").
72. See 23rd International Conference of the Red Cross (1977), res. VI; ECOSOC Res. 2012
(LXIII) (1977); and U.N. GAOR 32nd Sess., 98th plenary meeting, Doc. A/RES/32/56 (1977).
The latter is available at http://www.ifrc.org/what/disaster/idrl/publication.asp.
73. All three instruments are available at http://www.ifrc.org/what/disaster/idrl/publication
.asp.
74. Both documents are available at http://www.ifrc.org/what/disaster/idrl/publication.asp.
75. See, e.g., MACALISTER- SMITH, supra note 11.
76. Convention on the Privileges and Immunities of the United Nations, Feb. 13, 1946, 1
U.N.T.S. 15.
77. Convention on the Privileges and Immunities of the Specialized Agencies, Nov. 21,1 947,
33 U.N.T.S. 261.
78. See Elise Baudot-Queguiner, The Laws and Principles Governing Preparedness, Relief and
Rehabilitation Operations: The Unique Case of the International Federation of Red Cross and Red
Crescent Societies, in INTERNATIONAL DISASTER RESPONSE LAWS, supra note 20, at 127, 131;
Gabor Rona, The ICRCs Status: In a Class of Its Own (Feb. 17, 2004), http://www.icrc.org/web/
eng/siteeng0.nsf/html/5W9FJY.
79. See BEIGBEDER, supra note 1 1, at 10 (citing Randolph Kent).
80. See Office for the Coordination of Humanitarian Affairs, Appeal for Improving Humani-
tarian Response Capacity: Cluster 2006 (Mar. 29, 2006), available at http://www.who.int/hac/network/
interagency/news/2006_Cluster_Appeal.pdf.
81. Farooq Ahmad Khan, Remarks at the ISDR Side Event to ECOSOC 2006: Panel discus-
sion and briefing on progress of the implementation of the Hyogo Framework for Action 2005-
315
The Law of International Disaster Response
2015: Building Resilience of Nations and Communities to Disasters (July 19, 2006), available at
http://www.unisdr.org/eng/isdr-system/docs/ecosoc-19jul-Pakistan%20.ppt.
82. United States Government Accountability Office, Hurricane Katrina: Comprehensive
Policies and Procedures are Needed to Ensure Appropriate Use and Accountability for International
Assistance, at i, Doc. No. GAO-06-460 (Apr. 2006), available at http://www.gao.gov/new.items/
d06460.pdf.
83. See, e.g., Rohan Hardcastle & Adrian Chua, Humanitarian assistance: towards a right of
access to victims of natural disasters, 325 INTERNATIONAL REVIEW OF THE RED CROSS 589 (1998),
available at http://www.icrc.org/Web/eng/siteengO.nsf/html/57JPJD (providing examples).
84. See, e.g., Barbara Demick, Aid Groups in Dark About North Korean Flood, LOS ANGELES
TIMES, Sept. 4, 2006, at A4 (reporting complaints from aid groups about the lack of information
provided by the North Korean government about the effects of recent flooding).
85. See Matthew Moore & Lindsay Murdoch, Water, Not Hospitals, Needed in Aceh, SYDNEY
MORNING HERALD (Jan. 10, 2005), available at http://www.smh.com.au/news/Asia-Tsunami/
Water-not-hospitals-needed-in-Aceh/2005/0 1/09/ 1105205983764.html.
86. See, e.g., International Federation of the Red Cross and Red Crescent Societies, IDRL
Asia-Pacific Study, Fiji, Laws, Policies, Planning and Practices on International Disaster Response
30 (July 2005), available at http://www.ifrc.org/docs/pubs/idrl/idrl-fiji.pdf [hereinafter Fiji Case
Study]; Turkish Red Crescent Society, International Disaster Response Law, 1999 Marmara
Earthquake: Case Study 38 (2006), available at http://www.ifrc.org/Docs/pubs/idrl/report-turkey
.pdf [hereinafter Turkey Case Study].
87. see anne c. richard, role reversal: offers of help from other countries in
- Response to Hurricane Katrina 16 (2006).
88. Based on interviews by the author with Red Cross actors in the region. For examples in
other regions, see, e.g., Fiji Case Study, supra note 86, at 31 (noting delays with visas); Turkey
Case Study, supra note 86, at 48 (same); Sri Lanka Case Study, supra note 41, at 14-15 (noting
that the government of Sri Lanka delayed or refused visas for certain relief personnel — particularly fi-
nance staff — in order to induce responding agencies to hire local staff for those functions).
89. See International Federation of Red Cross and Red Crescent Societies, Legal issues from
the international response to the tsunami in Indonesia: An International Disaster Response Laws,
Rules and Principles (IDRL) Programme Case Study 14 (forthcoming 2007) [hereinafter Indone-
sia Case Study]; International Federation of the Red Cross and Red Crescent Societies, Legal is-
sues from the international response to the tsunami in Thailand: An International Disaster Response
Laws, Rules and Principles (IDRL) Programme Case Study 15 (July 2006) available at http://
www.ifrc.org/docs/pubs/idrl/report-thailand.pdf [hereinafter Thailand Case Study].
90. As a 2003 case study compiling interviews from thirteen countries in South Asia, South-
ern Africa and Central America noted, "[t]he import of relief goods and equipment was an issue
of great concern to the various international actors. In most countries, the imposition of heavy
taxes or cumbersome bureaucratic procedures on the import of goods necessary for relief efforts
presented a source of constant frustration for international assistance." International Federation
of Red Cross and Red Crescent Societies, International Disaster Response Law Project: Report on
findings from South Asia, Southern Africa and Central America 14 (Mar. 2003) [hereinafter Multi-
country Case Study] .
9 1 . See Indonesia Case Study, supra note 89, at 2 1 (citing Help on the Way for Stuck Tsunami
Aid, Jakarta Post, Jan. 14, 2006).
92. Id.
93. See RICHARD, supra note 87, at 18.
94. Id. at 18-19.
316
David Fisher
95. International Federation of Red Cross and Red Crescent Societies, Swaziland: Storm,
DREF Bulletin No. MDRSZ001, Update No. 1 (Aug. 17, 2006), available at http://www.ifrc.org/
cgi/pdf_appeals.pl?06/MDRSZ00101.pdf.
96. Transit Denial by Pak Hampering Afghan Reconstruction, ISLAMIC REPUBLIC NEWS
AGENCY (Aug. 9, 2006), available at http://www.irna.ir/en/news/view/menu-236/
0608097142181634.htm.
97. See Turkey Case Study, supra note 86.
98. See Indonesia Case Study, supra note 89, at 22.
99. See Sri Lanka Case Study, supra note 41, at 17.
100. See Thailand Case Study, supra note 89, at 14.
101. Id.
102. See International Federation of Red Cross and Red Crescent Societies, IDRL Asia-Pacfic
Study: Nepal - Laws, Policies, Planning and Practices on International Disaster Response 28 (July
2005), available at http://www.ifrc.org/docs/pubs/idrl/idrl-nepal.pdf [hereinafter Nepal Case
Study].
103. Based on author's interviews of legal counsel of major international NGOs.
1 04. See, e.g., Ruth Blackham & Karin Margolius, The Legal Standing of Disaster Relief Workers
Abroad: An Australian Perspective, 2 LEGAL MEDICINE JOURNAL No. 1, Abstract 6 (July 2005).
105. See Turkey Case Study, supra note 86, at 49 (noting that over a quarter of organizations
surveyed on this question had been the object of a criminal investigation, which, for most of
them, had seriously hindered their operations).
106. It must be noted, however, that many disasters provoke nowhere near the attention and
assistance required from the international community. This issue of "forgotten emergencies"
might also be seen as a result of the anarchic international assistance "system." They do not
present a particular regulatory problem at the national level, however, and so are not discussed
here in depth.
107. See Patrick Barta & Eric Bellman, Sri Lanka is Grateful, but What to Do with the Ski
Parkas?, WALL STREET JOURNAL, Feb. 3, 2005, at Al.
108. See Aamer Ahmad Khan, Resilience Among Ruins of Muzaffarabad, BBC NEWS (Oct. 28,
2005), http://news.bbc.co.Uk/2/hi/south_asia/4385234.stm.
109. John Telford & John Cosgrave, Joint Evaluation of the International Response to the In-
dian Ocean Tsunami: Synthesis Report 52 (Tsunami Evaluation Coalition, 2006) [hereinafter
TEC Report], available at http://www. tsunami-evaluation. org/The+TEC+Synthesis+Report/
Full+Report.htm.
110. Mat 55.
111. Id.
112. For instance, nearly one hundred NGOs responded to the 2001 earthquake in Gujarat,
India and one hundred twenty responded to the 2003 earthquake in Bam, Iran. See Disasters
Emergency Committee, The Earthquake in Gujarat, India: Report of a monitoring visit for
the DEC para. 15 (Mar. 2001), available at http://apps.odi. org.uk/erd/advsearch. aspx?CallNo
=699,698,666,632,665,499,41 1,416,664,343,357,296,314,415,533,400,100,134,103,380; Interna-
tional Federation of Red Cross and Red Crescent Societies and the Iranian Red Crescent Soci-
ety, Operations Review of the Red Cross Red Crescent Movement Response to the Earthquake in
Bam, Iran 12 n. 19 (May 20, 2004), available at http://www.ifrc.org/cgi/pdf_evaluation.pl?eval04/
Bam-operations-review.pdf.
113. See Arjun Katoch, The Responders' Cauldron: The Uniqueness of International Disaster
Response, 59 JOURNAL OF INTERNATIONAL AFFAIRS 153, 164 (2006).
114. See TEC Report, supra note 109, at 107 & n. 131.
317
The Law of International Disaster Response
115. INTERNATIONAL FEDERATION OF RED CROSS AND RED CRESCENT SOCIETIES, WORLD
Disasters Report: Focus on Information in Disasters 93 (2005) [hereinafter World
Disaster Report].
116. Id. See also Peter Goodman, For Tsunami Survivors, a Touch of Scientology, WASHING-
TON POST, Jan. 28, 2005, at C01, available at http://www.msnbc.msn.com/id/6878931/.
117. Id.
118. See Australian Broadcasting Corporation: The World Today, Claims Tsunami Aid Used
as Evangelical Opportunity (Dec. 19, 2005), http://www.abc.net.au/worldtoday/content/2005/
sl534097.htm; Michael Gartland, Christians Defy Law to Convert Muslims in Tsunami Aftermath,
Johns Hopkins University International Reporting Project (2005), available at http://www
.pewfellowships.org/stories/indonesia/indonesia_christians.htm.
119. Jon Bennett et al., Coordination of International Humanitarian Assistance in Tsunami-
Affected Countries 77 (Tsunami Evaluation Coalition, 2006), available at http://www.tsunami
-evaluation.org/NR/rdonlyres/0E43484A-B99 1 -4EF6-8230-BC3 1 548 1 2BC/0/coordination_final
_report.pdf.
120. See WORLD DISASTER REPORT, supra note 1 15, at 89-92.
121. Id. See also Constanza Adinolfi et al., Humanitarian Response Review (Office for the Co-
ordination of Humanitarian Assistance, 2005), available at http://www.reliefweb.int/library/
documents/2005/ocha-gen-02sep.pdf.
1 22. See Sri Lanka Case Study, supra note 4 1 , at 3-8; Indonesia Case Study, supra note 89, at 5-7.
123. Based on interviews performed by the author in Guatemala City in November 2006 in
preparation of a case study due to be published in early 2007. For a list of foreign organizations
that participated in the relief effort, see the dedicated website created for the disaster by UNDP:
http://www.pnudguatemala.org/stan.
124. See Fiji Case Study, supra note 86, at 31.
125. Press Release, United Nations, UN Updates Guidelines for International Military Aid in
Disaster Relief Operations (Nov. 27, 2006), available at http://www.un.org/apps/news/story
.asp?NewsID=20733&Cr=disaster&Crl=relief.
1 26. See Go Ito & Kazuyuki Sasaki, The Self-Defense Forces Overseas: Japan s Lessons from the In-
dian Ocean Tsunami Assistance, LIAISON, vol. 3, no. 3 (web version), http://www.coe-dmha .org/
Liaison/Vol_3No_3/Dept 1 8.htm.
127. See Disaster Relief: Canada's Rapid-response Team, CBC NEWS, Oct. 17, 2005, at http://
www.cbc.ca/news/background/cdnmilitary/dart.html.
128. See George Topic, A Long Tradition of Cooperation and Support, E- JOURNAL USA,
United States Department of State (Nov. 2004), http://usinfo.state.gov/journals/itps/1104/ijpe/
topic.htm.
129. See TEC Report, supra note 109, at 60.
130. See Katoch, supra note 1 13, at 158.
131. See Maurits Jochems, NATO's growing humanitarian role, NATO REVIEW, Spring 2006,
at 15, available at http://www.nato.int/docu/review/2006/issuel/english/art4.html. For a list of
other operations in which NATO has participated, see NATO Civil Emergency Planning,
NATO's Role in Disaster Assistance (2d ed. 2001), available at http://www.nato.int/eadrcc/mcda-e
.pdf.
132. See Press Release 109 (2006), NATO, NATO Allies and Partners Agree a Memorandum
of Understanding on Crises Assistance (Sept. 13, 2006), available at http://nids.hq.nato.int/
docu/pr/2006/p06- 109e.htm.
133. See Sam Logan, Central America Talks Regional Military Force, ISN Security Watch (Oct. 10,
2006), http://www.isn.ethz.ch/news/sw/details.cfm?id= 16771; Dominique Loh, FPDA Ministers
318
David Fisher
Want to Set Up Disaster Relief Coordination Centre, Channelnewsasia.com, June 5, 2006,
www.channelnewsasia.com/stories/singaporelocalnews/view/21 205 l/1/.html.
134. For example, legal concerns regarding initiation of aid, entry of personnel, vehicles and
goods, liability and coordination were prominently featured in the workshops the United States
Department of Defense has organized on "Foreign Consequence Management." See supra note 9.
135. Tyler Fitzgerald & Salvatore Moccia, Lessons Learned from Pakistan: NATO Response
Force Debuts, Sharpens its Focus, DefenseNews.com, Dec. 5, 2005, http://www.defensenews.com/
story.php?F= 1 405428&C=commentary.
136. See supra note 68.
137. See supra note 58.
138. Mar. 19, 1974, 1424 U.N.T.S. 307 (No. 24063), available at http://www.ifrc.org/Docs/
idrVl98EN.pdf.
139. See Role of the Southern European Task Force in FCM, Remarks of Mark Oswald, in
Defense Threat Reduction Agency, Foreign Consequence Management Legal Deskbook Work-
shop I Report, Vicenza, Italy, 27-28 September 2005 (on file with author).
140. See supra note 125.
141. See Oslo Guidelines on the Use of Military and Civil Defence Assets in Disaster Relief
para. 5 (Rev. Nov. 2006), available at http://ochaonline.un. org/DocView.asp?DocID=5247.
142. Id. at para. 3.
143. See TEC Report, supra note 109, at 59.
1 44. See id. at 57; Jane Barry, A Bridge Too Far: Aid Agencies and the Military in Humanitarian
Response, Humanitarian Practice Network Paper No. 37 (Jan. 2002), available at http://www
.reliefweb.int/rw/lib.nsf/db900SID/LGEL-5FKHH5/$FILE/odi-bridge-jan02.pdf?OpenElement
(providing multiple examples in the conflict context).
145. See Barry, supra note 144, at 1 1-12; Raj Rana, Contemporary Challenges in the Civil- Military
Relationship: Complementarity or Incompatibility?, 86 INTERNATIONAL REVIEW OF THE RED
CROSS 565 (2004), available at http://www.icrc.org/Web/eng/siteeng0.nsf/htmlall/66DDF7/$File/
irrc_855_Rana.pdf.
146. See Guidance Document on Relations between the Components of the Movement and
Military Bodies, para. 6, adopted by Council of Delegates of the Red Cross and Red Crescent,
res. 7, Nov. 18,2005.
147. See Oslo Guidelines, supra note 141, para. 32. The Oslo Guidelines (para. 1) define "di-
rect assistance" as "the face-to-face distribution of goods and services"; "indirect assistance" as
"at least one step removed from the population and involving] such activities as transporting
relief goods and personnel"; and "infrastructure support" as "providing general services, such as
road repair, airspace management and power generation that facilitate relief, but are not neces-
sarily visible to or solely for the benefit of the affected population."
148. These include Pakistan (see supra note 81) and Sri Lanka (see Sri Lanka Ministry of Disaster
Management, Towards a Safer Sri Lanka: A Roadmapfor Disaster Risk Management (Dec. 2005) ),
among others.
149. The IFRC's IDRL Programme has been working toward this end through training, pub-
lications and the creation of a database of existing instruments, http://www.ifrc.org/idrl.
150. See David Fidler, Disaster Relief and Governance after the Indian Ocean Tsuanmi: What
Role for International Law?, 6 MELBOURNE JOURNAL OF INTERNATIONAL LAW 458, 473 (2005).
151. For a description of these forums and their results, see http://www.ifrc.org/idrl.
152. Statute of the International Law Commission (1947) art. 1, available at http://
www.un.org/law/ilc.
319
The Law of International Disaster Response
153. See Report of the International Law Commission, 58th Sess. (May 1-June 9 and July 3-
Aug. 11, 2006), U.N. Doc. No. A/61/10 (2006), at 464.
320
Contributors
Editor's Note: In order to most accurately portray the events of the conference, the bio-
graphical data in this appendix reflects the position in which the authors were serving
at the time of the conference, as set forth in the conference brochures and materials.
Professor Craig H. Allen is Judson Falknor Professor of Law at the University of
Washington, Seattle, Washington. He joined the University of Washington faculty
in 1994, following his retirement from the US Coast Guard. He is a licensed master
mariner, a Fellow in the Nautical Institute and a member of the Royal Institute of
Navigation and the US Maritime Law Association. Professor Allen is on the board
of editors of the Ocean Development and International Law journal and is the au-
thor oiVarwelVs Rules of the Nautical Road. Professor Allen served as the Charles H.
Stockton Professor of International Law at the US Naval War College in the 2006-
07 academic year.
Rear Admiral Jorge Balaresque, Chilean Navy (Ret.), teaches strategy and other
military courses at Chile's Academia de Guerra Naval (Naval War College) in
Valparaiso and is a fellow of the Chilean Maritime History Society. During his
thirty- five-year naval career, he served as a submarine officer, attended the Acade-
mia de Guerra Naval (1983-84) and was the commander of the Second Naval Zone
at Talcahuano.
Mr. John B. Bellinger III is the legal adviser to the secretary of state. He is the prin-
cipal adviser on all domestic and international law matters to the Department of
State, the Foreign Service and the diplomatic and consular posts abroad. He is also
the principal adviser on legal matters relating to the conduct of foreign relations to
other agencies and, through the secretary of state, to the president and the National
Security Council. From February 2001 to January 2005, Mr. Bellinger served as se-
nior associate counsel to the president and legal adviser to the National Security
Council at the White House. He served as counsel for national security matters in
the Criminal Division of the Department of Justice from 1997 to 2001. He served
previously as counsel to the Senate Select Committee on Intelligence (1996), as
general counsel to the Commission on the Roles and Capabilities of the US Intelli-
gence Community (1995-96) and as special assistant to Director of Central Intelli-
gence William Webster (1988-91). From 1991 to 1995, he practiced law with
Contributors
Wilmer Cutler & Pickering in Washington, DC. Mr. Bellinger is a member of the
Council on Foreign Relations and the American Council on Germany and a Fellow
of the British- American Project.
Professor Gene E. Bigler is University Professor-Practitioner of International Re-
lations and Diplomacy at the University of the Pacific, Stockton, California. Before
joining the University of the Pacific he was director of the Office of Strategic and
External Affairs, Bureau of Democracy, Human Rights and Labor in the US De-
partment of State. He served previously as a counselor for public opinion and poll-
ing in the Coalition Provisional Authority in Baghdad; as special assistant in the
Office of International Affairs, Commandant, US Coast Guard; in the US embas-
sies in Panama, Peru and Italy; and in several postings in the US Information
Agency and State Department on South American and Latin American public
opinion and information matters. He has taught in a number of schools and pro-
grams, including Hendrix College in Conway, Arkansas, and in Venezuela and Ec-
uador. Professor Bigler is a frequent conference speaker and consultant, as well as
the author, coauthor or a contributor to numerous agency reports, books, edited
collections and journals.
Rear Admiral Michael A. Brown, US Navy, serves in the Office of the Chief of Naval
Operations as director, Information Operations Division and deputy director of
the Cryptology Division. During his first three years as a commissioned officer he
served on board the USS Vogelsang and the USS Connole. He next attended the Na-
val Postgraduate School and following graduation he was assigned to the National
Security Agency/Central Security Service in the Electronic Warfare and Technol-
ogy Directorate.
In 1989, Rear Admiral Brown transferred to US Naval Security Group Activity,
Edzell, Scotland, where he served as an operations watch officer, communications
department head, and the Collection, Processing, and Reporting Division officer.
Following that tour, he was assigned to Commander, Cruiser Destroyer Group
Two in Charleston, South Carolina. His next assignment was at the Naval War
College; he graduated in 1995. After graduation, he served as the executive offi-
cer, Naval Security Group Activity, Winter Harbor, Maine. In May 1998, Rear Ad-
miral Brown was assigned as the branch chief of the Information Operations Policy
Branch on the chief of naval operations staff. His follow-on assignment was as ex-
ecutive assistant to the commander of Naval Security Group and executive assis-
tant to the special assistant to the chief of naval operations for information
operations. Rear Admiral Brown then became the commanding officer, Naval In-
formation Warfare Activity in Suitland, Maryland. He next became the deputy
322
Contributors
commander/chief of staff, Naval Security Group Command where he was selected
to the rank of rear admiral in 2005.
Lieutenant Colonel Evan Carlin, Australian Defence Force, is the command legal
officer at Headquarters Joint Operations Command in Sydney, Australia. Lieuten-
ant Colonel Carlin's previous positions include chief legal officer at the Deployable
Joint Force Headquarters, staff officer to the judge advocate general of the Austra-
lian Defence Force and Australian exchange legal officer at Headquarters Land
Command in the United Kingdom. While posted to the United Kingdom, Lieuten-
ant Colonel Carlin was deployed to northern Macedonia as the legal adviser at the
Kosovo Verification and Coordination Centre, a NATO headquarters established
prior to the bombing campaign in Kosovo. On his return to Australia, he deployed
to Baghdad as the legal adviser at the Australian National Headquarters in Camp
Victory. In 2004 he deployed with a planning team to Fiji to conduct combined
contingency planning for humanitarian assistance/disaster relief operations in the
South Pacific. In January 2005 he deployed to northern Sumatra with the Austra-
lian task force in response to the tsunami that struck there on Boxing Day. Most re-
cently he has been involved in advising on Australian operations in Iraq and East
Timor.
Mr. Gus Coldebella is the deputy general counsel for the Department of Homeland
Security. He works with the general counsel in managing the Office of the General
Counsel and is responsible for advising the secretary and other senior leadership
on legal issues arising throughout the Department of Homeland Security, as well as
coordinating with legal officers at other executive branch agencies and at the White
House on homeland security-related issues. Mr. Coldebella spearheaded the effort
to respond to congressional and other related inquiries regarding Hurricane Ka-
trina. Until September 2005, Mr. Coldebella was a partner at Goodwin Procter LLP
in Boston. He also prosecuted crimes as a special assistant district attorney in Cam-
bridge, Massachusetts.
Professor Yoram Dinstein is the Yanowicz Professor of Human Rights at Tel Aviv
University (Israel) and a former president of the university. Professor Dinstein
served two appointments (1999-2000, 2002-03) as the Charles H. Stockton Pro-
fessor of International Law at the US Naval War College. He was also a Humboldt
Fellow at the Max Planck Institute for Comparative Public Law and International
Law at Heidelberg (Germany) in 2000-01. Professor Dinstein is a Member of the
Institute of International Law and a member of the Executive Council of the Amer-
ican Society of International Law. He has written extensively on subjects relating to
323
Contributors
international law, human rights and the law of armed conflict. He is the founder
and editor of the Israel Yearbook on Human Rights. He is the author of War, Aggres-
sion and Self-Defence, now in its fourth edition. His latest book is The Conduct of
Hostilities under the Law of International Armed Conflict.
Brigadier General Mari K. Eder, US Army, is the Army's deputy chief of public af-
fairs. She has over twenty-nine years of Army service and has served as an Army
public affairs officer at the installation, division, theater support command and
unified command levels. She has served as an active and reserve officer and as an
Army civilian public affairs officer. Brigadier General Eder has commanded at the
company, battalion and brigade levels. Prior to her current assignment she served
as commander of the 6th Brigade (Professional Development), 80th Division (In-
stitutional Training) while concurrently serving on active duty as chief of staff with
the Reserve Forces Policy Board in the Office of the Secretary of Defense. She has
served at the US European Command in Stuttgart, Germany as the deputy director
of public affairs and at the George C. Marshall European Center for Security
Studies in Garmisch-Partenkirchen, Germany as the director of public affairs. Be-
fore her European assignments, Brigadier General Eder served as director of public
affairs at the US Army Combined Arms Support Command and Fort Lee and in a
variety of reserve positions as both a military police and public affairs officer.
Mr. David Fisher is the senior legal research officer for the International Federa-
tion of Red Cross and Red Crescent Societies' International Disaster Response
Laws, Rules, and Principles (IDRL) Programme, based in Geneva, Switzerland.
Previously, Mr. Fisher held legal research posts for the Office of the United Nations
High Commissioner for Human Rights, the Brookings Institution's University of
Bern Project on Internal Displacement and the Georgetown University Institute
for the Study of International Migration. Mr. Fisher earned his Juris Doctor degree
in 1997 from the University of California's Hastings College of the Law and his
Master of Laws degree in international and comparative law from the Georgetown
University Law Center in 2002. His US legal experience has included both civil and
criminal trial advocacy and a clerkship with the Honorable Stephen H. Levinson of
the Hawaii Supreme Court.
Captain Dana A. Goward, US Coast Guard (Ret.), is the US Coast Guard's director
of Maritime Domain Awareness (MDA) Program Integration. His responsibilities
include development and coordination of maritime surveillance and decision sup-
port systems, and coordination of US Coast Guard efforts with international and
domestic partners. He and his staff also serve as the executive secretariat for the US
324
Contributors
National MDA Implementation Team, which is composed of members from
across the federal government. Captain Goward is a retired Coast Guard officer
who, when on active duty, served afloat, as a federal magistrate, as a regional direc-
tor of human resources and as the director of the world's largest public safety and
security boat operation. Most of his military career, however, was spent as a heli-
copter pilot and he was the commanding officer of the Coast Guard's air station in
New Orleans.
Vice Admiral Lowell E. Jacoby, US Navy, is the director, Defense Intelligence
Agency. His first sea duty tour was as an intelligence officer with Fighter Squadron
Twenty-Four, flying F-8Js off USS Hancock. Following a combat deployment, he
served with the Seventh Fleet Detachment in Saigon, Republic of Vietnam. A series
of shore and sea duty assignments followed his return from Vietnam. Vice Admiral
Jacoby has served as the command's senior intelligence officer in each assignment he
has held, dating back to October 1985. These include Carrier Group Eight, Second
Fleet/ JTF 120, Naval Military Personnel Command and US Pacific Fleet. He was the
second commander, Joint Intelligence Center Pacific and director for intelligence,
US Pacific Command. He served as commander, Office of Naval Intelligence, fifty-
seventh director of Naval Intelligence and Joint Staff J-2 before assuming his present
duties.
Captain Kurt A. Johnson, JAGC, US Navy, is the staff judge advocate for the com-
mander of the North American Aerospace Defense Command and US Northern
Command at Peterson Air Force Base, Colorado. His initial assignments included
tours of duty at Naval Legal Service Office, Guam; Naval Air Station, Whidbey Is-
land, Washington; and at the Port Hueneme Detachment of Naval Legal Service
Office, Long Beach, California. In 1990, Captain Johnson began duties as flag aide
to the judge advocate general of the Navy and served in that capacity at the Penta-
gon until 1992. Upon completion of his postgraduate studies in international law
at the University of Virginia in 1993, he was assigned as staff judge advocate for the
commander, Carrier Group Six (USS America) Battle Group. Captain Johnson's
following assignments included service on the staffs of the commander in chief, US
Pacific Fleet and commander in chief, US Pacific Command, and as the executive
officer, Trial Service Office East, Norfolk, Virginia. In January 2000, he became
commanding officer, Trial Service Office East before returning to duties as execu-
tive officer in September 2000. In August 2001, Captain Johnson became the force
judge advocate for commander, US Naval Forces Central Command, and fleet
judge advocate for commander, US Fifth Fleet, in Manama, Bahrain, and served in
that capacity during Operations Enduring Freedom and Iraqi Freedom. In August
325
Contributors
2003, Captain Johnson took command of Naval Legal Service Office Central, head-
quartered in Pensacola, Florida.
Professor Stuart Kaye was appointed dean of law at the University of Wollongong
in July 2002. Prior to his appointment, he was head of the Law School at James
Cook University in Cairns. He is admitted as a solicitor of the Supreme Court of
New South Wales and as a barrister of the supreme courts of Tasmania and
Queensland and of the High Court of Australia. Professor Kaye has an extensive re-
search interest in the law of the sea and international law generally, and has pub-
lished extensively in these areas. He has written a number of books, including
Australia's Maritime Boundaries, The Torres Strait and International Fisheries Man-
agement. He was appointed by Australia to the International Hydrographic Orga-
nization's Panel of Experts on Maritime Boundary Delimitation in 1995 and in
2000 was appointed by Australia to the list of arbitrators under the 1991 Madrid
Protocol to the Antarctic Treaty. Professor Kaye is the current national chair of the
Australian Red Cross International Humanitarian Law Committee. In 2007, he
will take up a chair in law at the University of Melbourne.
Secretary Paul McHale is the assistant secretary of defense for homeland defense.
In this position, he is responsible for the supervision of all homeland defense activ-
ities of the Department of Defense. In 1972 Secretary McHale entered the US Ma-
rine Corps and spent two years on active duty, including an overseas deployment
as a rifle platoon leader in Okinawa and the Philippines. After release from active
duty, Secretary McHale entered Georgetown Law Center in 1974 and received his
Juris Doctor degree in 1977. For the next five years, he practiced law in Bethlehem,
Pennsylvania. Secretary McHale began his civilian public service career in 1982
when he was elected to the Pennsylvania House of Representatives, where he served
five consecutive terms. He resigned in 1991 following Iraq's invasion of Kuwait,
volunteering for active duty as an infantry officer with the Marine Corps during
Operations Desert Shield and Desert Storm. In January of 1993, Secretary McHale
was elected to represent the 15th Congressional District of Pennsylvania in the US
House of Representatives, where he served for three terms. He is currently a colo-
nel in the Marine Corps Reserve. Secretary McHale has frequently lectured on gov-
ernment, law and military policy on the campuses of many colleges and
universities, including the US Army War College, where he is an adjunct professor,
and the US Naval Academy, where he served as a member of the Board of Visitors.
Secretary McHale is a former member of the Board of Advisors at the US Naval
War College. In 1999, then congressman McHale retired from the House of
326
Contributors
Representatives and became a shareholder in the Allentown law firm of Tallman,
Hudders & Sorrentino, PC. He assumed his current position on February 7, 2003.
Professor Francisca Moller teaches international law at Chile's Academia de Guerra
Naval (Naval War College) in Valparaiso. From 1982 to 2001, she served as a legal
adviser for the Chilean Navy at the Maritime Authority (General Maritime Direc-
torate). Professor Moller is a member of the Board of the Chilean Society of Inter-
national Law, a member of the Chilean Society of Maritime Law and a researcher at
the Center for Strategic Studies of the Navy.
Vice Admiral John G. Morgan Jr., US Navy, is the deputy chief of naval operations
for information, plans and strategy (N3/N5). He graduated from the University of
Virginia in 1972 with a degree in economics. His sea tours include duty in a diesel
submarine, a frigate, a guided-missile destroyer, an Aegis destroyer and cruiser and
a destroyer squadron, as well as on the Second Fleet staff. Major deployments dur-
ing those tours span duty in the US Pacific Command, US Southern Command,
US European Command and US Central Command areas of responsibility. Com-
mand tours include the commissioning of USS Arleigh Burke; commander, De-
stroyer Squadron 26 in the USS George Washington Carrier Battle Group; and
commander, USS Enterprise Carrier Battle Group, which participated in the first
strikes of Operation Enduring Freedom in Afghanistan. Between tours at sea, Vice
Admiral Morgan was assigned to the Joint Chiefs of Staff, the Office of the Chief of
Naval Operations, the Ballistic Missile Defense Organization and the Naval Surface
Forces staff in the Pacific. As a flag officer, his assignments ashore include duty as
the deputy for acquisition strategy in the Ballistic Missile Defense Organization
and the senior military assistant to the secretary of the Navy.
Rear Admiral Joseph L. Nimmich, US Coast Guard, is the assistant commandant
for policy and planning. Prior to this assignment, he served as director of the Mari-
time Domain Awareness Program Integration Office. His twenty- seven-year career
as a Coast Guard officer has been divided between operational assignments ashore
and afloat, and staff assignments in the resource management field. Rear Admiral
Nimmich has served aboard the cutters USCGC Woodrush and USCGC Mesquite
and he has commanded the cutters USCGC Point Ester v, USCGC Red Beech and
USCGC Sorrel. Rear Admiral Nimmich has also served as commander, Coast
Guard Group Key West and has held various staff assignments in both districts and
headquarters, including in the Office of Operational Law Enforcement and the Of-
fice of Budget and Planning and Policy and as deputy chief of staff of the Coast
Guard.
327
Contributors
Professor Harvey Rishikof holds the Chair, Department of National Security
Strategy and is a professor of law and national security studies at the National War
College in Washington, DC. He specializes in the areas of national security, civil
and military courts, terrorism, international law, civil liberties and the US Consti-
tution. His career includes experience in both teaching and public service. He has
served as the legal counsel to the deputy director of the FBI (1997-99) and as the
administrative assistant to and chief of staff for the chief justice of the US Supreme
Court (1994-96). At the National War College, Professor Rishikof has taught
courses in national security law, civilian/military relations and governmental pro-
cess. As dean of the Roger Williams University School of Law, Bristol, Rhode Island
(1999-2001), he introduced courses in national security law and the Constitution
at the US Naval War College. He has authored numerous articles on subjects in
which he specializes. Professor Rishikof s most recent writings have appeared in
such publications as the Villanova Law Review, The Yale Journal of International
Law, 100 Americans Making Constitutional History (Melvin Urofsky, editor), the
Suffolk Journal of Trial & Appellate Advocacy, The Providence Journal and The New
York Times.
Ms. Linda Robinson is a senior writer for U.S. News & World Report specializing in
national security issues. She received the Gerald R. Ford Prize for Distinguished
Reporting on National Defense in 2005. She was a Nieman Fellow at Harvard Uni-
versity and was awarded the Maria Moors Cabot Prize by Columbia University.
She has also been a Senior Consulting Fellow at the International Institute for Stra-
tegic Studies and a Media Fellow at Stanford's Hoover Institution. Before joining
U.S. News in December 1989, Ms. Robinson was senior editor at Foreign Affairs
magazine. Her book about the US Army Special Forces, Masters of Chaos, was pub-
lished in 2004. Since September 11, 2001, Ms. Robinson's work has focused on ter-
rorism and national security. She has written cover stories for U.S. News on US
counterterrorism strategy, intelligence reform, the counterinsurgency in Iraq, the
hunt for Osama bin Laden and the US Special Operations Command. As bureau
chief for Latin America in the 1990s, she covered democratic transitions, coups, six
insurgencies and US military operations in Panama and Haiti. Ms. Robinson's
work has been published in Foreign Affairs, World Policy Journal, Survival, SAIS Re-
view, The New Republic, The New York Times, Outside, Conde Nast Traveler and
elsewhere. She appears frequently on cable and public television programs to dis-
cuss military and international issues. Ms. Robinson is a member of the Council on
Foreign Relations and the International Institute for Strategic Studies.
328
Contributors
Doctor Yann-Huei Song is executive editor of the Chinese (Taiwan) International
and Transnational Law Review and presently a Fulbright visiting scholar at the
Shorenstein Asia-Pacific Research Center, Stanford University. He received a doc-
toral degree in international relations from the Department of Political Science,
Kent State University, Kent, Ohio, and Master of Laws and Juris Doctor degrees
from the School of Law (Boalt Hall), University of California at Berkeley. He is a re-
search fellow at the Institute of European and American Studies, Academia Sinica,
Taiwan, and adjunct professor at National Taiwan Ocean University. Dr. Song's
research interests are in the fields of the law of the sea, international fisheries law,
national ocean policy studies, naval arms control and maritime security. He has
published articles in journals such as the Political Geography Quarterly, Asian Sur-
vey, Marine Policy, Chinese Yearbook of International Law and Affairs, The American
Asian Review, Ocean Development and International Law, Ecology Law Review, In-
ternational Journal of Coastal and Marine Law and The Indonesian Quarterly. Dr.
Song is the author of a book entitled The United States and the South China Sea Dis-
pute: A Study of Ocean Law and Policy.
Colonel James P. Terry, US Marine Corps (Ret.), serves as the chairman of the
Board of Veterans' Appeals. He previously served as principal deputy assistant sec-
retary and deputy assistant secretary for regional, global and functional affairs with
the Bureau of Legislative Affairs at the Department of State from 2001-05. Com-
missioned in 1968, Colonel Terry served as an infantry officer in Vietnam and as
commanding officer of a Marine detachment aboard the USS Ticonderoga. Follow-
ing his graduation from law school at Mercer University in 1973, he served as a Ma-
rine Corps judge advocate until his retirement as a colonel in 1995. He served his
final four years of active duty as legal counsel to the chairman of the Joint Chiefs of
Staff. Following his retirement, he accepted a position in the Senior Executive Ser-
vice in the Department of the Interior. He served as deputy director of the Office of
Hearings and Appeals with responsibility for managing the department's adminis-
trative law judge system. He later served as a judge on the Board of Land Appeals
with responsibility for adjudicating offshore oil and gas royalty cases. In July 2001,
he left the Interior Department to accept the appointment in the Department of
State. Colonel Terry has written more than twenty- five articles on coercion control
and national security law. He is currently completing a book on Soviet military in-
tervention in former Warsaw Pact States for the period 1945 to 1991.
Rear Admiral Frank Thorp IV, US Navy, is the deputy assistant secretary of de-
fense (joint communication), where he is responsible for overseeing Department
of Defense activities directed at shaping department-wide communications
329
Contributors
doctrine, organization and training for the joint force. Prior to this assignment, he
was the special assistant for public affairs to the chairman of the Joint Chiefs of
Staff. During Operation Iraqi Freedom, Rear Admiral Thorp was deployed to
Qatar as the chief of media for US Central Command (forward). From 2000 to
2003 he served as special assistant for public affairs to the chief of naval opera-
tions. His other assignments have included public affairs officer for the Bureau of
Naval Personnel; Naval Surface Forces, US Pacific Fleet; Joint Task Force Middle
East; Cruiser Destroyer Group Twelve; and USS Dwight D. Eisenhower. He has
also served as director of public affairs and congressional notification at the
Navy's Office of Legislative Affairs. Rear Admiral Thorp has also had several as-
signments at the Navy's Office of Information. Prior to specializing in public af-
fairs, Rear Admiral Thorp served as a surface warfare officer forward deployed to
Sasebo, Japan.
Professor Robert F. Turner holds both professional and academic doctorates from
the University of Virginia School of Law, where in 1981 he cofounded the Center
for National Security Law. He has served as its associate director since then except
for two periods of government service in the 1980s and during 1994-95, when he
occupied the Charles H. Stockton Chair of International Law at the US Naval War
College. A veteran of two Army tours in Vietnam, he has served in the Pentagon as
special assistant to the under secretary of defense for policy, in the White House as
counsel to the president's Intelligence Oversight Board, at the State Department as
principal deputy assistant secretary for legislative affairs, and as the first president
of the congressionally established US Institute of Peace. Professor Turner is a for-
mer three-term chairman of the American Bar Association's Standing Committee
on Law and National Security (and for many years editor of the ABA National Se-
curity Law Report). He is the author or editor of a dozen books and monographs,
and of numerous articles in law reviews and professional journals. Professor
Turner has testified before more than a dozen different congressional committees
on issues of international or constitutional law and related topics. He is a member
of the Committee on Present Danger, the Council on Foreign Relations and other
professional organizations.
Professor Bakhtiyar R. Tuzmukhamedov is the counselor to the Constitutional
Court of the Russian Federation. He provides international legal advice both to judges
and to the secretariat of the court. He concurrently serves as professor of international
law at the Diplomatic Academy of the Russian Foreign Ministry. In 1994-95 he was a
civil affairs officer with the UN peacekeeping forces in the former Yugoslavia. In 1999-
2003 he was a member of the group of experts on the International Committee of the
330
Contributors
Red Cross's study on the customary rules of international humanitarian law. Professor
Tuzmukhamedov has authored and coauthored several books published in the former
USSR and in Russia, as well as in the United States and elsewhere. He has also authored
numerous scholarly articles and has been a regular contributor to major national
newspapers. Professor Tuzmukhamedov is deputy editor in chief of the Moscow Jour-
nal of International Law and a member of the Editorial Board of the International Re-
view of the Red Cross. He is a member of the Executive Committee of the Russian
Association of International Law and formerly a rapporteur of the Committee on
Arms Control and Disarmament Law of the International Law Association.
Brigadier General Ikram ul Haq, Pakistan Army, joined Headquarters, US Cen-
tral Command as Pakistan's senior national representative on October 4,
2005. Before assumption of this assignment, he commanded an independent
infantry brigade. Brigadier General ul Haq was commissioned in the Pakistan
Army as an infantry corps officer in April 1981. He has had various command ap-
pointments, including company commander, battalion commander of an infantry
battalion and an antitank battalion. His staff appointments were as a general staff
officer, grades I and II (operations). He is a graduate of Pakistan's Command and
Staff College and National Defence College, and of the Royal Jordanian War Col-
lege. Brigadier General ul Haq has served in Bosnia as part of the United Nations
peacekeeping mission. He has extensive experience performing internal security
and disaster relief duties in Pakistan.
331
Index
Abu Ghraib 184, 199, 207, 211-212, 226
Aljazeera 183
AlQaeda 190
aliens 52, 57
Allen, Craig H. xv-xvi, xxiii, xxvii, 21, 321
al-Qaida 94,271
anti-Americanism 219,231
arms trafficking 158
Article 2, US Consitution 8-10, 85, 87, 89, 31 1
Article 51, UN Charter xix, 85-86, 90
ASEAN 105-106, 127, 131-132, 140, 142, 147, 153-154, 159, 167, 171, 299, 301, 307, 309, 315
Atomic Energy Agency 49, 296
Automatic Identification System 26, 64, 121
B
Baathist 191
Balaresque, Jorge xviii, xxvii, 157, 321
battle of ideas 200,219
Bellinger, John B. xiv-xv, xxi, xxvi, 205, 321-322
Bigler, Gene E. xxii, xxvii, 217, 322
blockade 30, 34, 37, 48
blue on blue 62
Brown, Michael A. xxiii, xxvii, 47, 80, 149, 251, 253, 322
Bush, George W. 10, 84, 91, 100, 103, 106, 108, 110, 144, 150, 192, 194, 199, 202, 207, 210,
213, 219, 225-226, 228-229, 234, 236, 268
Bush administration 100, 199, 213, 228
Carlin, Evan xxiv-xxv, xxviii, 267, 323
Caroline incident 89, 95
Central Intelligence Agency 2, 101, 182, 199,202
Chechen 84
Chernobyl 296,312
civil defense 297,308
civil liberties 13, 197,328
civilian law enforcement xiv, 6, 9, 1 1-12, 16
Clinton administration 244
coastal State 172
333
Index
Cold War 5, 30, 169, 221, 227, 233
Coldebella, Gus xxv, 323
communication strategy 212
computer network attack xix-xx
criminal organization 158
Council for Security Cooperation in the Asia Pacific 106, 135-136, 140, 146, 154-155
Cuba 44,60,65, 187, 199
cyber attacks 158
cyberspace xvii, xix, xxvii, 23, 31, 39-41, 51-52, 55
D
detainee xv, 184, 199, 209-210, 213, 223
detention 197, 199, 207-210, 213, 281
Dinstein, Yoram xix-xx, 91, 323
disaster management 122, 260, 263-265, 295, 306
disaster relief xiv, xxiv-xxv, 132, 259, 262, 264-265, 267, 270, 277-279, 285, 287-289, 293-
296, 301, 307-309, 312, 323, 331
disaster response xxv, 259, 264, 279, 293, 295-305, 307, 311
domestic deployment 8
domestic intelligence 13
drug trafficking 104,158-159
Economy Act 10, 17
Eder, Mari K. xxii-xxiii, xxvii, 235, 324
embedded media 180, 192-193, 200
environmental attack 159
environmental protection 111, 127-129, 168, 295
equal protection 14
espionage 182, 185
exclusive economic zone xvii, 69-70, 73, 76, 92, 158-160, 163-164, 171
executive power 8, 10, 236
extrajudicial 189
Eyes in the Sky xviii, 100, 125, 139
Federalist papers 4-5
Federal Emergency Management Agency (FEMA) 17, 278-279, 281, 289, 302
Fisher, David xxiv, xxvii, 293, 324
fisheries 172, 329
Food Aid 297,313-314
freedom of navigation xviii, 48, 60, 70, 78, 168
334
Index
friendly forces 41, 263-264
From the Sea 30, 45
Geneva Conventions of 1949 xxvii, 189-190, 195, 206, 208, 210, 223, 225-226, 270, 274, 293,
309
Geneva Protocol I xxvii, 189
global economy xxvii, 53, 158
global maritime commons 23, 51, 55, 166
Global Maritime Partnership 32
global perception 224, 252
globalization 23, 41, 53, 55, 158, 161, 252
Guantanamo 187, 199, 206-209, 226, 231
H
Haditha 188, 191-192, 194, 207, 211-212, 252
hegemony 25, 30, 42, 45, 169, 230
Hezbollah 36, 43, 48, 252
hijack 71,74, 102, 115
homeland defense 8, 277, 280, 288
homeland security 8, 106
Homeland Security Act 10, 17, 284, 290
hot pursuit xviii, 85, 91-92, 125, 170
Hughes, Karen P. 207, 211-212, 220, 232, 236-237, 245, 253
human rights 158, 184, 207, 211, 219, 323
humanitarian assistance 263, 267-268, 300, 316, 323
humanitarian law 293, 310, 331
Hurricane Katrina xiv, xxiv-xxv, 9, 11, 13-16, 43, 277, 281-282, 288, 302-303, 305, 307, 316,
323
I
illegal immigration 159,303
imminent threat xix, 84, 86-87, 90
International Maritime Organization (IMO) 48, 64-65, 74, 78-80, 106-107, 1 10-1 11,115,
119, 121, 128-131, 134, 138, 140, 142, 147, 152, 162, 165, 167-168, 170-173
incursions 60, 93
information age 41, 52, 55, 61
information operations 222-223, 238, 240, 252-253
information vacuum 259
innocent passage 36, 72, 118
insurgents xxi, 84, 93, 189-190, 200, 222, 275
intelligence collection 13
335
Index
intelligence oversight 287,291
internal attack 5
internal invasion 5-6
international airspace 25-26, 34, 70, 87, 89
International Criminal Court 226
International Relief Union 295, 311
Iran 73-74, 182, 219, 222, 231, 251, 317
Iraq xi, xiii, 7, 30, 37, 73, 79, 180, 183-184, 186-194, 197, 199-200, 206-207, 218-219, 222-
223, 226-229, 231-234, 237, 242-243, 252, 323, 325-326, 328, 330
irregular belligerencies 188
Israel ix, xi, 15, 26, 36, 43, 48, 178, 182-183, 213, 251-252, 312, 323
J
Jacoby, Lowell E. xv-xvi, xxvii, 22, 25, 29, 41-42, 51, 325
Johnson xxv, xxviii, 277, 325-326
Joint War Committee 99, 119, 127, 139-140, 143, 148-149
journalist 179-180, 183, 185-186, 188, 193-194, 198, 200-201, 227, 239
K
Kaye, Stuart xvii-xviii, xxvii, 69, 173, 326
Kurds 191
Kyoto 206,226,296,312-313
law of the sea 24, 85, 162, 169, 171, 326, 329
lawfare 21, 22, 31, 33, 35-36, 49
lawless 206,281-282
League of Nations 295,311
Lebanon 48,251-252
legal norms 205
legal obligations xxii, 205, 208-210
littoral States 111, 117, 119, 121-122, 124, 127, 139, 151-152
Luce, Stephen B. 28
M
Mahan, Alfred Thayer 27-30, 39, 44-45, 159, 171
mainstream 188,190,201,207
maritime awareness 159
maritime commons 23, 51, 55, 166
maritime community 57-58, 61-62, 64, 142
maritime domain xvi-xvii, 26, 31-32, 58-59, 61, 64, 101, 105-107, 110, 129, 144, 146, 166
336
Index
maritime domain awareness 26, 32, 61, 129
maritime governance 159
maritime security xv-xvi, xviii, 30-32, 38, 57, 58, 71, 97, 99-102, 105-111, 115, 121-124, 126-
127, 129, 132-134, 136, 138-143, 146, 153, 166-170, 329
maritime terrorism 26, 74-75, 98-99, 114-115, 118, 120, 136-139, 141-142, 170
maritime transportation 58-60, 72, 118
mass media 40, 211
McHale, Paul xiv-xv, xxv-xxvii, 3, 326
media coverage 192, 197, 264
Military Purpose Doctrine 8-9
Morgan, John G. xvi, xxvii, 22, 166, 171-172, 327
Muslim extremist 190
N
National Crisis Management 258
National Defense Authorization Act 3, 281-282, 290
National Guard 9, 11-12, 14, 194, 280-284, 290
national interests xviii, 36, 95, 106, 159, 161, 164, 178, 224
National Response Plan xxv, 280-281, 285, 290
NATO 169, 218, 262-263, 269, 273, 307-309, 318-319, 323
natural disaster xiii, xiv, xxiv-xxv, 9-10, 136, 158, 267-270, 273, 277, 282-283, 285, 288, 309-
310,316
neutrals 33, 35, 48
nongovernmental organization (NGO) 36, 48, 181, 208, 212, 259, 260-262, 265, 268-275,
296-297, 299, 301, 304-306, 317
Nimmich, Joseph L. xvi-xvii, xxvii, 22, 32, 46, 57, 172, 327
noncombatants 189, 191, 232
non-lethal weapons 14-15
North Korea 43, 153, 219, 251, 316
Nuremberg 84, 91
O
opinion makers 179,208,212
organized crime 133,159,167
Oslo Guidelines 270, 274-275, 300, 308-309, 319
Panama Canal 97, 160-161
peacekeeping 94, 135, 192, 219, 252, 268, 273, 330-331
piracy xviii, 43, 72-74, 79, 97-99, 101-104, 106, 108, 114-116, 118, 120-121, 123-125, 127-
128, 130-134, 136-142, 144, 147, 149-151, 153, 158-159, 167-171, 173, 282
pirates 30, 32, 60, 73, 102, 113, 119, 123, 149, 167, 170
337
Index
pollution 98, 137, 163
Port Facility Security Code 71, 107, 162, 172
Posse Comitatus 8-9, 11, 13-14, 281
power projection 7, 24, 28-29, 47
preemptive xix, 84, 86, 88-90, 95, 218, 229-230, 234
Presential Sea 160, 163-165, 171-172
Proliferation Security Initiative xvi, 31-32, 71, 77-78, 103, 105-107, 114, 141, 143, 168-169,
173
propaganda xxi, 219, 231, 233, 235, 245, 251
proportionality 88-89
public affairs officer 233, 239, 242-245, 324, 330
public diplomacy xiv, xxi, 181, 183, 205-208, 211-214, 217, 219-222, 224, 226-228, 230, 232-
234, 236-238
public opinion 178, 181, 184, 202, 208, 221, 231, 252, 322
public order 282
public perception 177, 180, 183-185, 192, 195, 197, 308
Q
Quadrennial Defense Review (QDR) 238, 240-241, 244, 253
R
Rapid Response Center 236
reconstruction 200, 219, 259, 261-262, 265, 272, 317
Red Crescent xxiv, 213, 270, 272, 275, 293, 296, 300-301, 305, 309-311, 313, 315-319, 324
Red Cross xxiv, 199, 213, 268, 270, 272, 275, 293-294, 296, 300-301, 305-306, 309-311, 313,
315-319,324,326,330-331
Regional Maritime Security vi, 97, 100, 103, 105, 107-108, 111, 126, 145, 151, 155, 168, 173
Rishikof, Harvey xx, xxvii, 177, 328
Robinson, Linda xx-xxi, xxvii, 197, 199, 201, 219, 231, 245, 328
rule of law 32, 165, 205, 208, 213, 268
Russia vi, xix, 35, 44, 49, 83-90, 92-95, 153, 155, 173, 178, 183, 330-331
Sea Power 21 24,32,42
seabed 70
search and rescue 122, 136, 153, 279, 285-286, 300
search and seizure 9, 169, 281
Secretary of Defense xiv, 3, 191, 219, 231, 233, 237-238, 241-242, 245, 278, 281-284, 286, 288,
290, 324
Shangri-La Dialogue 108, 112, 114-115, 125-126, 138, 140, 145
Singapore xviii, xxiv, 97, 99-104, 108, 110-122, 124-131, 133-134, 137-142, 144, 146-155,
173,271-272
338
Index
slavery xviii, 159, 170
smugglers 123
smuggling 52, 127, 132-133, 159
So San 26, 43
soft power 184, 217-220, 224-225, 228, 230-231, 233
SOLAS 130-131, 133, 149, 153, 173
Song, Yann-Huei xviii, xxvii, 97, 173, 329
sovereignty xviii-xix, xxiii, xxiv, 34, 41, 48, 51, 72, 94, 104-105, 108, 112-113, 116, 118-119,
122, 125-128, 134, 137, 139-140, 148, 158, 161, 169, 230, 279, 307, 309
Soviet Union 29-30, 83, 331
Stafford Act 10, 278-279, 282
strategic communication xxii-xxiv, 37-38, 40, 206, 217-220, 223-225, 227-228, 230-232, 235,
238-241, 243-245, 251-253
SUA 74-77, 79-80, 130, 133, 142-143, 152, 169-170
submarine cables 73
Supreme Court 179, 184-186, 236, 324, 326, 328
surveillance 23, 26, 51-52, 54-55, 60, 62-63, 99, 110, 121, 135, 149, 164, 171, 198-199, 285,
314,324
Taliban 207
Tampere Convention 296-297, 309, 313
territorial sea xvii-xviii, 71-75, 77-78, 88, 91-92, 104, 158
territorial waters 48, 52, 71, 106, 112, 125-126
terrorism xiv, 11-13,26,36,41,49,51-53,55,74-75,93,98-100, 102-108, 110-112, 114-115,
117-124, 126-128, 130-133, 136-142, 144, 149, 155, 157-160, 167-170, 197, 209, 217-
218, 221, 225-226, 228-229, 231, 328
terrorist xviii-xxi, 5-7, 9, 11, 13-14, 26, 36, 41, 43, 48, 52-53, 71-74, 77, 79, 83-88, 90-94, 97-
99, 101-105, 107-108, 114-116, 120, 123-124, 126, 128, 133, 135-139, 141, 144, 147,
159-160, 166, 170, 189-190, 194, 197-199, 202, 206, 208-209, 211, 218-219, 225, 229,
236, 253, 280, 282
Terry, James P. xxi, xxvii, 187, 189, 191, 193, 195, 272, 275, 329
Thorp, Frank xxii, 223, 244-245, 329-330
threat environment 16, 22, 25, 42
Title 10, US Code 11-13, 281-284, 290
Title 32, US Code 12, 281, 283-284, 290
torture 189,209,213,226
transnational maritime threat 97, 103-105
tsunami xxiv, 43, 267-271, 273-274, 289, 297, 299, 302-308, 311, 313, 316-318, 323
Turner, Robert F. xxi, 50, 145, 330
Tuzmukhamedov, Bakhtiyar R. xix, xxvii, 83, 330-331
339
Index
U
ul Haq, Ikram xxiv-xxv, xxvii, 257, 331
UN General Assembly 93, 269, 300
United Nations xviii-xix, xxiv, xxvii, 26, 36, 43, 47, 69, 78, 80, 85, 90-93, 98, 106-107, 115,
143, 152, 162, 164-165, 168-172, 229, 252, 260, 270, 273-274, 295, 297, 300-301, 307-
308,312-313,315,318,324
United States Information Agency 22 1
unity of command xxiii, xxvi, 16, 62, 283-284
unity of effort xvi, xxiii, xxvi, 16, 62, 64, 106, 283-284
unlawful combatants 188,190,210
US Northern Command vii, 277-278, 280, 282, 284, 286, 288, 290, 325
USSCole 27,78, 101, 144
W
war on terrorism 102-103, 110, 126, 183, 187-189, 197, 217-218, 221, 225, 228-229
warrantless surveillance 198
Weapons of Mass Destruction (WMD) 26, 46, 52-53, 70-71, 74, 98, 101, 103, 108-109, 114,
122, 131, 135-136, 144, 169
World Food Program 268, 272
World Health Organization 263, 267, 298, 303, 311, 314
world trade 115,161
ISBN 978-0-16-080068-9
9 0 0 0 0>
9 780160"800689
340