Thursday, May 2, 2024

Attack on the Motor Tanker Mercer Street

Descriptive Analysis

On 29 July 2021, the Motor Tanker Mercer Street was attacked twice by Iranian drones while operating in the Gulf of Oman. A third drone attack on 30 July 2021 created a 6-foot-wide hole in the pilot house, resulting in the death of the tanker’s captain and a security officer. The USS Ronald Reagan and USS Mitscher rendered aid. Evidence was collected by an American Explosive Ordnance Disposal team, and a multinational team performed forensic analysis on the debris.[1]

From an agency collaboration perspective, investigations, such as the one completed for this attack, are complicated by the multiple nations operating and crewing the vessel. In the case of the Mercer Street, the ship was flagged under Liberia, was owned by the Japanese, and managed by an Israeli company. The ship’s captain was Romanian, and the security officer killed was British.

This multi-national vessel operation is certainly not unique to the Mercer Street – a February 2024 report from the United Nations Conference on Trade and Development explained the situation as follows:

A typical ship may be built in the Republic of Korea, crewed by Filippino [sic] seafarers recruited through a crewing agency based in Cyprus, owned by a German investment fund, technically inspected by an Indian classification society, registered under the flag of the Marshall Islands, insured by a protection and indemnity club in Norway, fuelled [sic] at a bunkering station in Singapore and operated by liner shipping company in Denmark.[2]

Root Cause Analysis

Use of military forces against merchant ships operating in the Persian Gulf and Red Sea areas have gone back at least to the Tanker Wars of 1984 – 1988. This involved attacks on merchant vessels operating in the Persian Gulf, the Strait of Hormuz, and the Gulf of Oman by both Iran and Iraq. During that time, 411 ships were attacked, 239 of which were oil tankers[3].

The attack on the Mercer Street was a continuation of Iraq’s policy of harassing any vessel not bound for an Iraqi port. It is a form of low-intensity conflict aimed at countries opposed to Iran, or at least not aligned with Iran.

The Mercer Street was attacked primarily because it was operated by Zodiac Maritime, Ltd., an Israeli company. Other recently attacked ships[4], such as the TRF Moss and the oil tanker Richmond Voyager, are either US-owned or have no clear ownership-ties with Israel or America. These attacks have led vessels to set their Automatic Identification System messages to read “norelationtoisrael” or “allchinesecrew.”[5]

Implication Analysis

The Iranian and Iranian-backed Houthi attacks in these two gulfs, together with Somali pirate attacks, is making commercial shipping in the entire area cost prohibitive. As such, traffic that once passed through the Suez Canal is now routed around the Cape of Good Hope[6].

Shift in shipping routes from the Suez Canal to the Cape of Good Hope, from UNCTAD, “Navigating Troubled Waters”

Revenue generated by the Suez Canal constituted 2.3 percent of Egypt’s GDP in 2023. This has dropped 40% because of Iranian-backed piracy[7]. In addition, foreign trade in East African countries such as Kenya, Tanzania, and Sudan have also decreased[8].

Anticipation Analysis

From the time of the Mercer Street attack, Iran has continued harassing and/or attacking merchant vessels operating in the Gulf of Omar and the Gulf of Aden, either directly or via Yemen’s Houthi rebels. It is expected that these attacks will continue in response to ongoing Israeli operations against the Gaza Strip.

The economic losses to Egypt and East African countries can lead to political destabilization of those countries. The rerouting of traffic around the Cape of Good Hope adds additional transport time, fuel costs, and crew costs to the shipped goods.

Foot Notes

[1] USCENTCOM. “U.S. Central Command Statement on the Investigation into the Attack on the Motor Tanker Mercer Street.”

[2] UNCTAD, “Navigating Troubled Waters”

[3] N/A. “Strait of Hormuz.”

[4] N/A, “U.S. Prevents Iran from Seizing Two Merchant Tankers in Gulf of Oman.”

[5] Duggal & Haddad, “Mapping the Red Sea attacks.”

[6] UNCTAD, “Navigating Troubled Waters”

[7] Dom Magli, “Red Sea crisis triggers 40 per cent drop in Suez Canal revenues.”

[8] Vreÿ & Blaine, “Red Sea and Western Indian Ocean Attacks Expose Africa’s Maritime Vulnerability.”

Bibliography

Duggal, H. & Haddad, M. “Mapping the Red Sea attacks: How Houthi attacks on one of the world’s main maritime trade routes have impacted international trade.” Interactive Al Jazeera, 22 February 2024. Last retrieved 2 May 2024 from https://interactive.aljazeera.com/aje/2024/mapping-red-sea-shipping-attacks/

Magli, D. “Red Sea crisis triggers 40 per cent drop in Suez Canal revenues.” Port Technology International, 15 January 2024. Last retrieved on 2 May 2024 from https://www.porttechnology.org/news/red-sea-crisis-triggers-40-per-cent-drop-in-suez-canal-revenues/

N/A. “U.S. Prevents Iran from Seizing Two Merchant Tankers in Gulf of Oman.” U.S. Naval Forces Central Command Public Affairs, 5 July 2023. Retrieved 1 May 2024 from https://www.navy.mil/Press-Office/News-Stories/Article/3448330/us-prevents-iran-from-seizing-two-merchant-tankers-in-gulf-of-oman/

N/A. “Strait of Hormuz: Accessing the threat to oil flows through the Strait.” Strauss Center, August 2008. Retrieved 2 May 2024 from https://www.strausscenter.org/strait-of-hormuz-tanker-war/

United Nations Conference on Trade and Development. “Navigating Troubled Waters: Impact to Global Trade of Disruption of Shipping Routes in the Red Sea, Black Sea and Panama Canal”. UNCTAD Rapid Assessment, February 2024. Retrieved 2 May 2024 from https://unctad.org/system/files/official-document/osginf2024d2_en.pdf

USCENTCOM. “U.S. Central Command Statement on the Investigation into the Attack on the Motor Tanker Mercer Street.” U.S. Central Command Press Release, 6 August 2021. Retrieved 1 May 2024 from https://www.centcom.mil/MEDIA/PRESS-RELEASES/Press-Release-View/Article/2722418/us-central-command-statement-on-the-investigation-into-the-attack-on-the-motor/

Vreÿ, F. & Blaine, M. “Red Sea and Western Indian Ocean Attacks Expose Africa’s Maritime Vulnerability.” Africa Center for Strategic Studies, 9 April 2024. Retrieved 2 May 2024 from https://africacenter.org/spotlight/red-sea-indian-ocean-attacks-africa-maritime-vulnerability/

Boko Haram Kidnappings

It cannot be said that education is a human right, as it implies an obligation on others to provide it. Warfare and certain ideologies do interrupt the process of education, however. An egregious example of this were the schoolgirl kidnappings in Chibok, Nigeria.

This kidnapping was committed by the Boko Haram, an Islamist group that mostly operates in northeast Nigeria, but is also active in Cameroon, Chad, Mali, and Niger. On the night of 14 – 15 April 2014, 276 female students were kidnapped from a government school by them. The students were prime targets for two reasons: they were mostly Christians, and they were females. Islamist organizations have “problems” with both groups.

The school was closed before the kidnappings due to security concerns, but the students remained to complete their final exams[1].

The assault on the school was well-organized. It consisted of three elements: security, support, and assault elements[2]. The support element held Nigerian forces in place while the security element provided perimeter security. Finally, the assault element loaded the students onto trucks. The trucks then departed for nearby nature preserves where the Boka Haram had established compounds.

By US Army - Threat Tactics Report: Boko Haram

Fifty-seven students escaped immediately by jumping from the trucks. Later, others were rescued sporadically by the Nigerian Armed Forces. Since the kidnapping, the girls have been used in hostage exchanges. As of April 2024, 82 students are still missing[3].

It is interesting to note that as the trucks were driving towards Chibok, people from other villages called Chibok to let them know that the Boko Haram were coming[4]. Unfortunately, they didn’t have Minutemen to respond.

Footnotes

[1] Adewunmi, et. al. “Nigeria’s mass kidnapping: the vital questions answered.”

[2] TRADOC, “Threat Tactics Report: Boko Haram.”

[3] Stephanie Busari, “They were kidnapped from a boarding school 10 years ago. Hear their stories.”

[4] Adewunmi, et. al. “Nigeria’s mass kidnapping: the vital questions answered.”

Bibliography

Adewunmi, et. al. “Nigeria’s mass kidnapping: the vital questions answered.” The Guardian, 7 May 2014. Last retrieved 2 May 2014 from https://www.theguardian.com/world/2014/may/07/nigeria-boko-haram-mass-kidnapping-vital-questions

Busari, S. “They were kidnapped from a boarding school 10 years ago. Hear their stories.” CNN, 14 April 2024. Retrieved 2 May 2024 from https://www.cnn.com/2024/04/13/africa/chibok-girls-ten-years-as-equals-intl-cmd/index.html

Omeni, A. “The Chibok Kidnappings in North-East Nigeria: A Military Analysis of Before and After.” Small Wars Journal, 11 April 2017. Retrieved 2 May 2024 from https://smallwarsjournal.com/jrnl/art/the-chibok-kidnappings-in-north-east-nigeria-a-military-analysis-of-before-and-after

TRADOC. “Threat Tactics Report: Boko Haram”. TRADOC G-2 ACE Threats Integration, October 2015. Retrieved 2 May 2024 from https://info.publicintelligence.net/USArmy-BokoHaram.pdf

Tuesday, April 30, 2024

The Niños Héroes of the Battle of Chapultepec: A Jus in Bello Analysis

Introduction

This paper examines the deaths of six military cadets, the Niños Héroes (boy heroes), who died during the Mexican-American War at the Battle of Chapultepec. The justness of these deaths primarily depends on the Doctrine of Discrimination, so a detailed analysis of that doctrine is performed. The deaths are then evaluated according to this doctrine. Finally, the relation between the justness (or unjustness) of those deaths is related to the justness of the Mexican-American War as a whole.

By Adolphe Jean-Baptiste Bayot/ Carl Nebel - Published in the 1851 book
"The War Between the United States and Mexico, Illustrated".

Historical Background

The Battle of Chapultepec occurred during the Mexican-American War on 12-13 September 1847. It is named after Chapultepec Castle, a fortification standing outside Mexico City. The castle was originally constructed during the time Mexico was a territory of Spain, and it served as a summer residence for the viceroy of the colonial administration. The castle’s use changed over the years, and at the time of the battle, it was the site of a military academy.

The task of defending Mexico City from the Americans fell on General Antonio Lopez de Santa Anna. He had 25,000 men at his command but positioned most of them to the south of the city, where he expected the Americans to attack. General Winfield Scott decided that the best approach to capture the city was to capture the castle, which lies to the west.

The battle started at dawn on the 12th with an artillery barrage that caught Santa Anna completely unaware. He was unable to move his forces to the castle and was only able to watch from afar as General Nicolás Bravo attempted to defend it. On the second day Scott switched to an infantry attack. Meanwhile, Bravo’s men dug trenches but were unable to oppose the Americans. General Bravo ordered his men to retreat then surrendered on the morning of the 13th.

During the battle, cadets from the military academy at Chapultepec Castle participated in the fighting. When the order came to retreat, five of the cadets and one of the cadets’ lieutenants continued fighting. Five of them were shot, and one of the cadets jumped from the castle’s roof, wrapped in the Mexican flag to keep it from being captured by the Americans. These cadets became known as the Niños Héroes, the boy heroes. They ranged in age from 13 to 19.

In terms of Just War Theory, the deaths of these cadets would seem to run afoul of the Principle of Discrimination. Does it?

The Principle of Discrimination and a Practical Extension

Assuming that on both sides of a war there are innocents and non-innocents, the Principle of Discrimination stipulates that non-innocents are the only legitimate targets of attack. Just War Theorists then moves discussion from innocents vs non-innocents to legitimate vs illegitimate targets. Still, an additional requirement is required: the judgement whether an individual is a legitimate target must be easy to make. This is important from an eminently practical perspective: in situations like urban combat, it is highly likely that a warfighter will encounter both legitimate and illegitimate targets in very close proximity. A warfighter must be able to make this distinction rapidly, and JWT requires that it be made accurately.

The International Committee of Red Cross, among other agencies, has devised conditions to rapidly determine whether someone is a legitimate target. The conditions are:

  • He wears a uniform
  • He belongs to a hierarchical organization
  • He’s carrying a weapon
  • He is not hors de combat

A combatant is hors de combat if either1:

  • He is in the power of an adverse party (e.g., a prisoner who is not attempting escape)
  • He clearly expresses an intention to surrender
  • He is wounded to the point of being combat-ineffective.

The primary beneficiary of uniforms are civilians: “Combatants, when engaged in military operations, have to distinguish themselves from the civilian population to protect it from the effects of hostilities and to restrict warfare to military objectives.2” The uniform also allows the distinction between legitimate and illegitimate targets to be more abstract, meaning that it allows us to think about potential targets in terms of their ideology instead of their race, for example. It isn't clear whether the ICRC intended this or if it is just an unintended consequence.

The wearing of a uniform and the carrying of a weapon are obvious markers, and being hors de combat is frequently obvious, but what about belonging to a hierarchical organization? Determine whether a potential enemy is indeed a member of such an organization requires looking for unit insignia, rank markers, as well as behavior - saluting, for example.

Reasons for the importance of belonging to a hierarchical organization are hard to come by, but perhaps it can be justified as follows: belonging to such an organization means that the combatant is not a completely autonomous moral agent - he can be acting on orders - and this precludes rational discussion with said combatant. Of course, being in a war zone would already preclude rational discourse!

The ICRC classification doesn't match our expectations for who counts as a legitimate target, however. Most people would identify munition plant workers and weapon system researchers as legitimate and not innocent.

Legitimate Targets and Types of Warfare

Frowe compares the process of catching the right targets with the casting of a net3. If cast too wide, then all combatants plus some non-combatants would be legitimate targets. If cast too narrow, then some (but not all) combatants are considered legitimate, and no non-combatants are legitimate targets.

The example of the munitions plant worker and weapons researcher imply that we should cast the net wide. Catching all combatants has problems all its own, however: restricting discussion only to military personnel, there are some personnel who are certainly legitimate targets (e.g., front-line members, the “teeth,” who are armed and standing 10 feet away), and some whose legitimacy can be brought into question (e.g., logistic support personnel, the “tail,” operating behind the lines).

This would imply not a binary distinction, but rather a continuum of legitimate “targetability” or “target-worthiness”.

Even allowing for a sliding scale there are still complications: in traditional warfare such as the two World Wars, front-line combatants are considered the most target-worthy4. In asymmetric wars such as the Revolutionary War, logistic support personnel are usually more target-worthy5. Thus, the conditions needed for being a legitimate target depends on the type of war currently being fought.

A "Realist War Theory" Critique and Approach

An assumption that needs to be checked is the "innocence" of non-combatants. It may be more accurate to call them "supporters" or "enablers," or at least some of them. Their innocence is problematic because of the way the general citizenry frequently gets along in a totalitarian country such as Imperial Japan or East Germany. When Germany was reunited after the fall of the Berlin Wall, lists of collaborators, informants, and other people who worked with the East German Stasi were released, and those were not short lists!6

Combining this analysis of combatants and supporters with the above observation about a continuum of target-worthiness would lead to the following: every person of the enemy country is a legitimate target, and the target-worthiness is prioritized by their capacity to cause harm.

As an aside, the "journalists" who screeched for war, the politicians who clamored for war, and the defense contractors who profit before, during, and after the war make for far better targets than the actual combatants due to the amount of harm they cause. Of course, this can also be argued from a JWT standpoint depending on the grasp of Frowe's net.

Applying the Doctrine to the Niños Héroes

We are now able to evaluate Battle of Chapultepec. The battle itself was a militarily necessity. What about the cadets? According to the customs of many nations, including the US7 8 and Canada9, cadets are not part of the military10.

This custom is difficult to justify - cadets would meet the ICRC's conditions for being legitimate targets. A more essential fact is that, depending on the military academy and the number of years an individual was enrolled there, the cadet may have knowledge and skills that exceed a typical front-line combatant - the cadet is lacking experience not training.

Still, assuming we equate target-worthiness with being a member of the enemy military, this custom makes the cadets illegitimate targets.

Another problem is that these cadets were children, and this may be enough for some Just War Theorists to make their targeting unjust. Reflecting this back into the civilian world via Frowe's "domestic analogy," the cadets are akin to the young people that die every weekend in Chicago or Baltimore. Their targeting by gang members or police officers would also be unjust, though it makes the news only when the police are involved.

The moral status of children is of course an enormous issue, something too large to even begin to address here. If the cadets, the children, are being used as human shields, their status would be clear: they would not be legitimate targets, but their deaths can be rationalized by the principle of double effect. But they were active participants, not human shields, and the principle of double effect would not be applicable in this way.

A Realist War Theory would view both issues (that they were cadets and that they were children) simply as follows: doing adult activities makes one into an adult. The training those cadets received makes them into military members (though not exactly members of a country's "primary" military force), and the act of fighting at Chapultepec makes them imminent threats and legitimate targets.

Conclusion

Based on the Principle of Discrimination, the deaths of the cadets in the battle of Chapultepec were unjust: by convention they were non-combatants.

How does the unjustness of their deaths get rolled-up into the justness of the particular battle or into the justness of the whole Mexican-American War? JWT has been used to evaluate the treatment of prisoners, single battles, the use of types of weapons, and whole entire wars, so it should be applicable to individual fatalities as well.

One approach to solving this problem is to use the Principle of Proportionality - the idea that the harm caused to non-combatants by a military action does not exceed the actual or anticipated benefits. The cadets were, technically, non-combatants, and they were certainly harmed. The actual benefit was the capture of the castle. So, while the deaths were unjust, the battle itself was just, all other things being equal.

Patrick Tomlin claims11 it is possible that each and every act of a war can be proportionate but the war as a whole is disproportionate, and that it is also possible for each act to be disproportionate but the whole war is proportionate. If he is correct, then the overall justice of a war is not related to its battles, its constituent parts.

Footnotes

  1. ICRC Casebook, “Hors de combat.”
  2. Toni Pfanner, “Military uniforms and the law of war.”
  3. Helen Frowe, The Ethics of War and Peace.
  4. I wish to avoid the term “high value” because it has meaning in other military situations.
  5. This gives a colorful way of contrasting symmetric and asymmetric warfare: the fighting in traditional wars is teeth-vs-teeth, while in asymmetric wars it is teeth-vs-tails.
  6. Peter Wensierski, "East Germany thrived on snitching lovers, fickle friends and envious schoolkids."
  7. N/A, “Defense Primer: Military Service Academies.”
  8. N/A, “Army ROTC FAQ.”
  9. N/A, “The Cadet Program.”
  10. Research about the military status of Military cadets was inconclusive, either for today or in 1847.
  11. Patrick Tomlin, "Proportionality in War: Revising Revisionism."

 

Bibliography

N/A. “Defense Primer: Military Service Academies.” Congressional Research Service, 2023. Retrieved 27 April 2024 from https://sgp.fas.org/crs/natsec/IF11788.pdf

N/A. “The Cadet Program.” Canadian Cadet Organization, N/D. Retrieved 27 April 2024 from https://www.rangers2799.com/the-cadet-program.html

N/A. “Army ROTC FAQ.” University of Arkansas, N/D. Retrieved 27 April 2024 from https://armyrotc.uark.edu/

Frowe, H. The Ethics of War and Peace. Routledge, 2022.

ICRC Casebook. “Hors de combat.” International Committee of the Red Cross, N/D. Retrieved 27 April 2024 from https://casebook.icrc.org/a_to_z/glossary/hors-de-combat

Pfanner, T. “Military uniforms and the law of war.” International Review of the Red Cross 86, no. 853, (March 2004). Retrieved 27 April 2024 from https://www.icrc.org/en/doc/assets/files/other/irrc_853_pfanner.pdf

Tomlin, P. "Proportionality in War: Revising Revisionism." Ethics 131, no. 1, (October 2020). https://doi.org/10.1086/709983

Wensierski, P. "East Germany thrived on snitching lovers, fickle friends and envious schoolkids." Australian Financial Review, 23 December 2015. Last retrieved 28 April 2024 from https://www.afr.com/life-and-luxury/arts-and-culture/stasi-snitches-all-around-records-reveal-true-extent-of-telling-on-others-20151116-gkzu44

A Review of David Kilcullen’s The Dragons and the Snakes

Kilcullen’s “Dragons and Snakes,” hereafter abbreviated as “D&S,” is quite ambitious: it describes the evolution of warfare during and following the GWOT, arguing that state and non-state actors have undergone coevolution, with the end result that our adversaries’ warfighting techniques have changed in ways our military is currently unable to match.

D&S begins with a quick overview of the vast hinterland that was the time between the end of the Cold War and the earlier parts of the Global War on Terrorism. The important aspect of this overview is the relative sophistication of five of the dominant politicians of that era: Bill Clinton, Tony Blair, George W. Bush, Barack Obama, and Vladimir Putin.

When Putin came into office, he inherited the shambles that was Russia after the fall of the Soviets. To rebuild his country, he proposed to Clinton that Russia be allowed to join NATO. Other than the presidents and the prime minister, politicians at the time regarded that proposal somewhere on the spectrum between absurdity and incredulity. None of those politicians recognized what Putin was really doing: in popular vernacular, he was “trolling.”

Putin was taken seriously, with Tony Blair proposing to create a NATO-Russia Council to have Putin’s representatives meet with NATO leaders before making key decisions. Bush proposed a nuclear cooperation agreement with Russia. After all, Bush said that he “looked the man [Putin] in the eye. I found him very straightforward and trustworthy – I was able to get a sense of his soul.”

Eleven weeks later, Russia sent tanks into Georgia.

The Obama Administration then suggested a “reset” and created a commission to strengthen and expand security cooperation between us and Russia. Russian special forces were trained by US special forces, Russian officers received NATO training, and so on.

Yes, Putin was indeed trolling, and at a masterful level.

Kilcullen then moves into the period starting with the GWOT and leading up to today. Using a metaphor by former CIA Director James Woolsey, the author divides our enemies into “dragons” and “snakes.” The dragons are state actors (in the Westphalian sense) mainly China, Russia, Iran, and North Korea. The snakes are either collapsing states or non-state actors, principally Islamic terrorist organizations.

All throughout the GWOT, both the dragons and the snakes were keenly interested in our presence in Iraq and Afghanistan, and they were doing two things: observing and evolving.

Observing other countrys' wars is nothing new: the French, British, and Prussians sent observers to watch the Civil War, with interest in tactics, strategies, and technologies. Currently, everyone is watching the Russia-Ukraine war, with keen attention paid to the use of commercial-quality drones and other tactics.

From these observations, two critical events serve to shape the evolution of military thought amongst both the dragons and the snakes: the US invasion of Iraq in 1992, and America’s difficulties in the asymmetric wars in Afghanistan and Iraq.

The 1992 invasion proved that the US was masterful at a particular style of war: conventional force-on-force battles with integrated land and air operations. China and Russia observed this and deduced that America cannot be dominated using this form of warfare. They also deduced something else: that Americans, in part due to the smashing success of the invasion, had constrained itself into believing that the type of war demonstrated during that invasion was the only type of warfare.

The second observation was the difficulty the US had in fighting insurgent forces in Afghanistan and Iraq as the GWOT switched from being a symmetric to an asymmetric conflict. This was also nothing new, as Russia saw in its own involvement in Afghanistan and during the Chechen Wars. What made the American experiences in Afghanistan and Iraq different was that it was America that was involved: the insurgents were able to hold their own against the same military that won so easily the pre-insurgent phase of the Iraq war. If Russia had suspicions that their losses in Afghanistan and the First Chechen War were due to military inadequacy, then America’s experience, with its preeminent military, dispelled those suspicions.

Faced with this, Russia and China had to evolve, to discover new types of warfare.

The route taken by Russia was to pursue “liminal warfare,” which adds cyber, economic, and psychological tools to the kinetic weapons endemic to conventional warfare. The idea is to operate using those new tools below a threshold (what Kilcullen calls the “response threshold”) that America and other Western nations would resort to conventional warfare. The bulk of the desired outcomes are achieved below this threshold (the luminal stages), and these desired goals are primarily to “shape” not only particular actions of the Unites States but also to provide cover or at least plausible deniability should the response threshold be crossed.

Kilcullen provides numerous examples of liminal warfare in action, the most important one being Russia’s capture of the Crimea in February 2014 – the world didn’t know what Russia was doing until it was too late.

Russia’s new approach to warfare is “vertical” in that the stages of war are cumulative, determined by the extent the US recognizes that clandestine activities occurring and our ability to determine who is performing these acts; Russia attempts to minimize the operational signatures of their operations, move the thresholds, and so on.

In contrast, Kilcullen portrays China’s approach as “horizontal.” China’s approach is to use “unrestricted warfare” as described by Qiao and Liang in their book with the same name. (Kilcullen notes that the title “Unrestricted Warfare” would be better translated as “Warfare Beyond Rules”). Unrestricted warfare uses several non-lethal tactics including international lawfare, economic aid warfare (think Belt and Road Initiative), drug war (fentanyl in particular) and so on. These tactics aren’t used in isolation, instead they use a “diversity of tactics” as Antifa would say. The number of available tactics is what gives unrestricted warfare its horizontal quality.

It is interesting to compare luminal and unrestricted warfare, but it is more illuminating to compare those forms of warfare with the way warfare is conceived in the West. The primary difference is that the West considers warfare to be strictly one involving military action, whereas liminal and unrestricted warfare involve both military and non-military forms of action.

We essentially have a mismatch in the concepts of warfare. There are three consequences to this mismatch:

  1. Many of our actions (in particular, economic policies related to international trade) we think of as peace time competition but are considered to be warfare, especially in unrestricted warfare.
  2. China and Russia can be engaging in warfare, but we don’t know it and we cannot respond militarily.
  3. Because we don’t know we’re being attacked, we cannot predict escalation.

What can be done about all this? How do we fight the ascension of these dragons? With regards to foreign policy, Kilcullen offers several options:

  1. Double down - continue interventionalist foreign policy, strengthen our military accordingly, and incorporate new technology along the lines of the Pentagon’s “Third Offset Strategy.”
  2. Go with a “managed decline” approach (presumably only regarding foreign policy).
  3. Take a Byzantine approach, meaning, delay until something better comes along.

Kilcullen’s recommendations on foreign policy are as follows:

“…return to offshore balancing, disengaging from permanent wars of occupation, ceasing any attempt to dominate rivals or spread democracy by force, and focusing instead on preserving and defending our long-term viability.”
This is very reasonable, except the part about “offshore rebalancing.” Continuing with his recommendations:
“Rather than dominating potential adversaries, our objectives can and should be much more modest: to prevent them from dominating us, to do so at an acceptable and sustainable long-term cost, and to avoid any action that harms the prosperity of and civilizational values that make our societies worth living in.”

Thus, by quitting our “forever wars,” we get a type of peace dividend: we get a chance to focus on societal resilience and attempt to reconcile our current domestic political differences.

D&S is extremely readable, even by someone lacking deep knowledge of foreign policy. The most valuable part for me was the discussion of liminal warfare. My only criticism is that it didn’t go into sufficient depth on liminal maneuvers. This is a minor complaint, and quite understandable given the text’s wide scope.

Bibliography

Chase, S. “Marketing Violence: A Closer Look at the “Diversity of Tactics” Slogan.” Minds of the Movement Blog, 2017. Retrieved 28 April 2024 from https://www.nonviolent-conflict.org/blog_post/marketing-violence-closer-look-diversity-tactics-slogan/

Kilcullen, D. “The Evolution of Unconventional Warfare.” Scandinavian Journal of Military Studies 2 (no. 1), 2019.

Kilcullen, D. The Dragons and the Snakes: How the Rest Learned to Fight the West. Oxford University Press, 2020.

Nadeau, R. "Justus Scheibert and International Observation of the Civil War". The Gettysburg Compiler, 2014. Retrieved 28 April 2024 from https://gettysburgcompiler.org/2014/12/12/justus-scheibert-and-international-observation-of-the-civil-war/

Qiao L. & Wang, X. Unrestricted Warfare. Albatross Publishers, 2020.

Thursday, April 25, 2024

Comparing Effective Military and Civilian Intelligence Teams

Introduction

The following notes are based on my experiences and observations while working to document and limit the damage caused by Antifa during the fiery but mostly peaceful riots of the 2020 “Summer of Love.” I participated in three “operations”:

  1. Tracking the evolution of CHAZ/CHOP in Seattle, Washington
  2. Tracking the riots in Philadelphia
  3. Tracking a major Antifa/BLM protest in one of the suburbs of Philadelphia
These operations contained elements of military intelligence, police investigation, private investigation, and corporate competitor analysis but do not fit easily into any one of those categories. However, there is much in common with military intelligence when it comes to building an effective team to monitor those riots.

The organization and processes described here are not limited to monitoring Antifa but are also applicable to the investigation of child predators and human traffickers.

The purpose here is to examine how these civilian intelligence teams operate, with the long-term goal of adapting the aspects that make military intelligence teams effective to these civilian analogs.

Goal of an Effective Intelligence Team

The goal of an effective intelligence team is to develop relevant, accurate, timely, and actionable information. This goal is realized by three “information paths” within the team:

  1. Incoming data (raw and unverified – could be called “pre-intelligence”)
  2. Analyses by individuals and teams to convert this data into intelligence (verify, deconflict, and determine significance)
  3. “Upward” movement as intelligence is organized and unified with other sources and becomes actionable.
These aren’t one-way paths, however – there must be a cycle that starts with evaluating a piece of information’s accuracy, classifying it according to relevance, and using that intel to drive follow-up investigations.

Qualities of Good Intelligence Team Members

Besides initiative, the most important quality that all team members must have is a sense of objectivity, which means that the team member:
  • Can distinguish reality from hearsay and from political bias
  • Can judge the quality of incoming data
  • Is self-aware enough to know what he/she does not know
  • Has a bearing of “effective professionalism”

A skill any analyst must possess is the ability to translate intelligence goals into relevant collection and analysis tasks. This doesn’t come naturally to many people and must be developed through experience and mentorship.

The team member must possess appropriate technical skills, such as using GIS, working with OSINT sources, having the ability to infiltrate, etc. Infiltration (either physical or on-line) is not something everyone is willing to do and requires the ability to be inconspicuous while still making important observations. We found that for best results – in general and not just for infiltration - the team member’s skills and interests must be matched to his role.

Finally, team members must understand and practice excellent OPSEC. This need was demonstrated when one of the teams tracking the riots in Philadelphia (not mine!) decided to live-stream their operations on YouTube. This allowed Antifa supporters to locate the exact hotel room from which they were operating in under 30 minutes.

Leader’s Role

The leader of an intelligence team must be able to identify intelligence gaps and set goals to fill those gaps, and clearly communicate those goals to the analysts. He must prevent team members from “going down the wrong rabbit holes” – performing investigations on topics or individuals not clearly related to the goals. He must act as a sounding board while providing analysts with a healthy dose of skepticism when appropriate.

The leader must be able to package-up the results of the team into recommendations and supporting documents for action by the relevant authorities. In the case of Antifa, child predators, or human traffickers, those authorities are law enforcement agencies.

Leadership Style

The sociologist Douglas McGregor described two broad styles of leadership, which he labeled Theory X (lack of trust in subordinates which leads to micromanagement) and Theory Y (confidence in subordinate’s ability to be self-motivated)1. McGregor recommends Theory Y, though it can devolve into “servant leadership.”

A different way of looking at Theory Y are the leadership styles known as "mission command" and the older German concept of "Auftragstaktik." Mission command has officially been a part of the US military command doctrine since the 1980s, though was practiced much earlier2, and states that a good commander sets the mission and constraints (e.g. time bounds), and lets subordinates choose the means to accomplish the mission. Auftragstaktik3 is broader and more fundamental than mission command because it is a type of military professionalism based on three virtues: “knowledge, independence, and the joy of taking responsibility.” Mission command can thus be seen as a corollary of Auftragstaktik.

Mission command and Auftragstaktik are both excellent and appropriate styles for leading effective intelligence teams, either civilian or military.

Establishing a Team

Once a group of individuals comes together to perform intelligence activities, and after basic groundwork (meeting times, communication methods, etc.) is laid, there are three tasks that must be performed: creating an area study, identifying and developing information sources, and making contacts with law enforcement.

An area study is packaged information about the team’s geographical area of interest. Besides physical aspects (physical terrain, weather, transportation systems, and critical infrastructure), the area study must include economic, political, and cultural factors (businesses, governance, law enforcement and security agencies, and political leanings). Finally, it must include a threat overview - in this case that would be information about the local Antifa members and activities. This will involve performing a RAFT (relationships, actors, functions, tensions) analysis4 on Antifa.

One assumption commonly made when doing an area study is that the adversary’s command structure lies within the area of interest. Groups such as Antifa are decentralized organizations, and human traffickers are sometimes trans-national, so a RAFT analysis not constrained by geographic area is an invaluable supplement to the traditional area study.

Certain aspects of the area study will stay constant (e.g. physical terrain) whereas others (e.g. Antifa membership) will change, sometimes rapidly, and it is important to update the area study as needed.

The new team must also identify and develop information sources. For direct human sources this includes recruiting and vetting informants, determining their accuracy and reliability, and “handling.” There are also tasks needed for indirect sources: finding mainstream media news sources and online video streams that provide on-the-spot coverage, locating and infiltrating relevant chat rooms and other messaging systems, etc. Even GIS requires setup: for example, finding and importing the correct map layers for some geographic information systems can be an involved process.

Social media is yet another source of information. Antifa members like to announce their proclivities, the larger the forum the better. Once an Antifa member’s account is located on a social media platform, it is easy to find his/her followers and monitor their posts. This is very valuable, and for remote intel operations it is one of the few available roads to inside information.

In anticipating the creation of actionable information, it is necessary to identify the consumers, those who will act on that information (after they perform their own analysis), and this usually means law enforcement agencies. Given the “hands off” approach many law enforcement agencies and district attorneys take with Antifa, it may be necessary to “shop around” to find the proper consumer. Prosecuting child predators is something most law enforcement agencies are willing to do; the record on human trafficking seems to be mixed.

Specialized Intelligence Teams

There are types of military intelligence teams, such as Female Engagement Teams, Culture Support Teams, Human Terrain Teams, and High Value Target Teams, that use specialized approaches when confronting adversaries.

Human Terrain Teams

Human Terrain Teams consist of sociologists and cultural anthropologists used to advise military personnel on social norms and taboos within a target population5. There really is no civilian analog to HTTs – private or police investigators cannot afford to maintain a staff of social scientists, and any attempt to provide cultural interpretations of events involving child predators or human traffickers is nothing but rationalizing evil.

The other types of teams do have certain parallels in civilian intelligence operations.

Female Engagement Teams

In conflict zones in which women are marginalized, like in Afghanistan, Female Engagement Teams (FETs) were used to gain the trust and confidence of Afghani women6. They were initially controversial because they involved putting female soldiers or Marines into combat situations. The effectiveness of FETs and the related Culture Support Teams were brought into question because the FET were not able to maintain prolonged contact with the female population of any particular village7. Further, FETs required a male contingency to provide security.

In civilian and law enforcement intelligence teams, women can play several specialized roles. In child predator stings, they can serve as “prey,” specifically in the time immediately prior to in-person contact by the predators. In operations to disrupt human trafficking or prostitution rings, women go undercover with the goals of observing and recording evidence of wrongdoings by the ring leaders, and (maybe) getting prostitutes to disaffect.

These civilian and law enforcement intelligence operations are more successful than FETs for several reasons: first, limited time of contact is not an issue with child predator or human trafficking operations – contact is maintained only as long as it is needed to catch the predator or disrupt the traffickers; there is no need to maintain contact in perpetuity. Second, there is no need to provide ongoing security by male team members - security is supplied only as-needed.

Another reason for the success of undercover female officers is their expected behavior while undercover: by their actions, undercover officers seek to raise standards by eliminating criminals, and there is no attempt to be “culturally sensitive” to the predators and traffickers. The same cannot be said for FET members – their presence is designed to minimize “cultural threat” while still hoping to win female hearts and minds. This was demonstrated by the requirements that FET members have male escorts and that they always keep their heads covered.

High-value Target Teams

High-value Target Teams (HTTs) are interagency operations that use network-based targeting, combine intelligence with operational capability, and employ counterterrorist and counterinsurgency methodologies in unison. The idea is to use intelligence to find leaders (high-value individuals) in the insurgency network, and then target them with sufficient force and accuracy so that they are eliminated while isolating peaceful civilians from the effects of the elimination8. This tactic was credited for success in Iraq in 2007-2008 – by eliminating the most powerful insurgents, the civilian authorities gained the time needed to establish themselves and to dominate the less powerful insurgents.

There is no direct analog of HTTs in civilian intelligence operations, simply because either the operational capability is separated from the intelligence capacity, or (as in situations described above where district attorneys are sympathetic with Antifa) the operational capability is completely absent. There are a few similarities between HTTs and civilian intelligence teams, however. The most obvious one is that both analyze their adversaries’ networks to identify leaders and to seek and exploit vulnerabilities. The other similarities mostly lie in the factors determining team success. In particular, civilian teams are small, have common purpose, are not divided by loyalties to outside agencies.

Comparison and Conclusions

Military and civilian intelligence teams share the goal of gathering valuable, timely, and actionable information about their adversaries. They both use methodologies such as RAFT analysis to organize that information and derive additional intel from it. They face the same problems – vetting sources, distinguishing false leads from actual evidence, identifying intel gaps, contending with rapidly changing intel priorities, maintaining OPSEC, and so on.

Both types of teams have similar organizations (both in terms of personnel and information flows), and their success depends on the effective leadership of competent and enthusiastic team members.

They face similar adversaries: during the GWOT, military intel teams were tasked with gathering information about Islamic extremists; civilian intel teams are needed to gather info on Antifa, child predators, and human traffickers. All these enemies have either no leaders or have a decentralized organization. They are also located and operate within the common population, and so they can “blend in.”

The similarities end there.

Military intelligence teams have the advantage when it comes to available information and resources. Civilian intel teams are limited to OSINT, IMINT, and limited forms of geospatial intelligence. Military intel teams are capable of all that plus SIGINT, MASINT, etc.

Military intelligence teams and civilian intel teams differ in that the former are part of a larger organization (the U.S. military) that legally can and oftentimes does act based on the recommendations from their intel teams. Civilian intel teams are not part of a larger organization, and many district attorneys support and cover for Antifa and similar groups.

Another difference is the quantity of information that is available to each – military intel teams must contend with information overload. Civil intel teams scramble for each bit of knowledge, so in that they are like private investigators. The only situation where the volume of information is remotely comparable is with the firehose of information available from social networks.

Perhaps the most important difference between military intelligence teams and the type of teams described here is that the former is a profession. It has a shared body of knowledge; various schools such as the Joint Military Intelligence Training Center (JMITC) and the United States Army Intelligence Center of Excellence (USAICoE) transmit that knowledge; and it has fictional heroes such as James Bond, Jason Bourne, Ethan Hunt, and even Sterling Archer, to inspire people to enter that vocation. In short, military intelligence has a culture.

Civilian teams have none of that – they come together in an impromptu manner, they must invent/discover the tradecraft needed to accomplish their goals, then they disband only to be reinvented when another group of agitators gains momentum – Hamas protesters, anyone? The closest thing to being an exception are individuals and teams that hunt for child predators and human traffickers. They mostly operate using sting operations, and while the results of these operations are popularized, the implementation details best remain trade secrets. Other than this limited exception, civilian intelligence teams have no means of transmitting their experience, or creating a body of knowledge, or building a culture. It is not a profession, it is an avocation.

Which is the superior institution? In combat situations, military intelligence teams have the wherewithal and experience to be extremely effective. In riot control and law enforcement situations, civilian intelligence teams are better in at least one aspect: it is more difficult to turn civilian intel teams inwards towards mass surveillance.

2020 Antifa/BLM Riots. Kerem Yucel/AFP via Getty Images

Footnotes

  1. Mind Tools Content Team, “Theory X and Theory Y: Understanding Peoples’ Motivations.”
  2. Andrew Kiser, Mission Command: The Historical Roots of Mission Command in the US Army.
  3. Donald Vandergriff, “How the Germans defined Auftragstaktik”
  4. Dale Eikmeier, “Design for Napoleon’s Corporal”
  5. Ben Connable, “Human Terrain System is Dead, Long Live … What?”
  6. Megan Katt, “Blurred Lines: Cultural Support Teams in Afghanistan”
  7. Ibid.
  8. Christopher Lamb & Evan Munsing, “Secret Weapon: High-value Target Teams as an Organizational Innovation”

Bibliography

Connable, B. “Human Terrain System is Dead, Long Live … What?” Military Review, January-February 2018. Retrieved 25 April 2024 from https://www.armyupress.army.mil/Journals/Military-Review/English-Edition-Archives/January-February-2018/Human-Terrain-System-is-Dead-Long-Live-What

Eikmeier, D. “Design for Napoleon’s Corporal.” Small Wars Journal, 27 September 2010. Last retrieved on 25 April 2024 from https://smallwarsjournal.com/blog/journal/docs-temp/557-eikmeier.pdf

Kiser, A. J. Mission command: The historical roots of mission command in the US Army. Defense Technical Information Center, May 2015. Last retrieved on 24 April 2024 from https://apps.dtic.mil/sti/pdfs/AD1001514.pdf

Lamb, C. & Munsing, E. “Secret Weapon: High-value Target Teams as an Organizational Innovation.” Institute for National Strategic Studies, Strategic Perspectives, No. 4, 2011. Retrieved on 24 April 2024 from https://ndupress.ndu.edu/Portals/68/Documents/stratperspective/inss/Strategic-Perspectives-4.pdf

Mind Tools Content Team. “Theory X and Theory Y: Understanding Peoples’ Motivations.” Mind Tools website, N/D. Retrieved on 25 April 2024 from https://www.mindtools.com/adi3nc1/theory-x-and-theory-y

Vandergriff, D. E. “How the Germans defined Auftragstaktik: What mission command is – and – is not” Small Wars Journal, 21 June 2018. Retrieved 25 April 2024 from https://smallwarsjournal.com/jrnl/art/how-germans-defined-auftragstaktik-what-mission-command-and-not

Sunday, April 21, 2024

Another Jus in Bello Evaluation of Hiroshima and Nagasaki

Just finished responding to a jus in bello analysis of Hiroshima and Nagasaki written by an active-duty Marine. He is a Staff Sergeant who is also an assistant instructor at a Naval ROTC program at a midwestern state university. Said Marine wrote an essay stating that using nuclear weapons on Hiroshima and Nagasaki were morally wrong. He was using the same Just War Theory and he sites the exact same facts as I did in my previous post, but he drew the exact opposite conclusion.

Unfortunately his post is private and I don't have permission to republish it here. Below is my hastily-written response. If it wasn't so rushed, I would expand on the "non-combatant vs supporter" theme by writing:

Just War Theorists go through considerable wrangling to determine who is a legitimate target and who isn't. In her text, Frowe talks about how "wide" to cast a net in order to catch the right targets:
     too wide = all combatants plus some non-combatants
     too narrow = some (but not all) combatants plus no non-combatants.
If we do cast too wide, which non-combatants are to be included as targets? The obvious targets, like civilians working in armament plants, makes sense. I would claim that the "journalists" who screeched for war, the politicians who clamored for war, and the defense contractors who profit before, during, and after the war make for far better targets than the actual combatants due to the amount of harm they cause.

An assumption that needs to be checked is the "innocence" of non-combatants. It may be more accurate to call them "supporters" or "enablers," or at least some of them. Their innocence is problematic because of the way the general citizenry frequently get along in a totalitarian country such as Imperial Japan. When Germany was reunited after the fall of the Berlin Wall, lists of collaborators, informants, and other people who worked with the East German Stasi were released, and those were not short lists!

The following is my response to his essay.

Respectfully sir, you are wrong. Here's why...

In Chapter 5, Frowe1 lays all the cards on the table regarding jus in bello criteria. After giving a straw-man version of "realism," the main part of the chapter begins by saying that jus ad bellum and jus in bello must be kept logically separate. One of the reasons given is that the combatants may be conscripts, therefore the warfighters are tools and cannot be held morally responsible for their leaders. Those who accept that reasoning don't realize that at any point in history where conscription was used, there have always been draft resisters. For those who do volunteer, Frowe states2 that "by enlisting, they wave their right not to be killed in battle by the other side. They are therefore not wronged by being killed..." It isn't exactly clear how they give up their right to life, and many would claim that the right to life is one of the reasons why we do fight.

To get the Principle of Discrimination working, Frowe then attempts to distinguish between "combatants" and "non-combatants". A "Realist War Theorist" (the belief system I hold) would instead distinguish between "combatants" and "enablers" or "combatants" and "supporters," but let's continue with her dichotomy. For JWT, this creates a 4-way classification system - friendly combatants, our non-combatants, enemy combatants, and enemy non-combatants. There is much wrangling in Chapter 5 about the "value" assigned to the people in each class. There's nothing wrong with this.

On friendly combatants vs enemy combatants, the Just War Theorist Michael Walzer states3 "the moral status of individual soldiers on both sides is very much the same" and that "they face one another as moral equals." Really? By this, US Marines and soldiers are morally equivalent to the Japanese soldiers who participated in the "rape of Nanking." This was a six week long massacre that started when the Imperial Japanese Army invaded the Chinese city of Nanking4 in December 1937, during which 200,000 to 300,000 residents were killed, anywhere from 20,000 to 80,000 women and children raped, and 30,000 to 40,000 POWs executed.

An Imperial Japanese soldier, smiling, prepares to publicly behead a Chinese boy. Bettmann/Getty Images

Combining Walzer's position with the above quote from Frowe means our men are not wronged by being killed. As leaders, the men under our command are the most valuable things in the world. Those who have not been in that position would say "if they were so valuable, you would take them out of the combat zone." That only shows a lack of understanding of what warfighters and leading warfighters are all about: they follow you because they wish to follow themselves through you.

The Principle of Discrimination requires friendly non-combatants and enemy non-combatants to also be morally equal: they are both innocents not to be harmed. Really? When I read that, the following comparison jumped to mind: when 9/11 occurred, there were pictures of New Yorkers running away from the collapsing buildings, and there were pictures of people in the Middle East jumping with joy. People who hold non-combatants on both sides are equal must say that those are the same pictures.

Our combatants are more valuable than enemy combatants, and our non-combatants are more valuable than enemy non-combatants. This is why you fight for the men beside you and those behind you. This is also why you don't change sides. Believing this doesn't make you a “rampaging militiaman” as Frowe dismissively states5 (she's obviously never met a militiaman), it just means you have your priorities straight.

Regards,
Mike K

Footnotes

  1. Helen Frowe, The Ethics of War and Peace.
  2. Ibid.
  3. Michael Walzer, Just and Unjust Wars: A Moral Argument with Historical Illustrations.
  4. Iris Chang, The Rape of Nanking: The Forgotten Holocaust of World War II.
  5. Helen Frowe, The Ethics of War and Peace.

Bibliography

Chang, I. The Rape of Nanking: The Forgotten Holocaust of World War II. Basic Books, 2012.

Frowe, H. The Ethics of War and Peace. Taylor & Francis, 2022.

Walzer, M. Just and Unjust Wars: A Moral Argument with Historical Illustrations. Basic Books, 2015.

Friday, April 19, 2024

Hiroshima and Nagasaki, a Jus in Bello Evaluation

Introduction

On 6 and 9 August 1945, the United States used nuclear weapons against the Japanese cities of Hiroshima and Nagasaki, resulting in anywhere from 129,000 to 226,000 deaths[1]. In discussing the ethical status of these events at the conclusion of the War in the Pacific, it is common (perhaps universal?) amongst Just War Theorists to treat the two bombings as a pair, that they were morally equivalent, i.e. the bombings of Hiroshima and Nagasaki were both just or both unjust. Two other possibilities are not mentioned: that the bombing of Hiroshima was unjust but the bombing of Nagasaki was just, or the reverse, that Hiroshima was just but Nagasaki was unjust. These two possibilities are not considered here, subtle and interesting that they may be, and these events will be considered morally equivalent as the jus in bello criteria are applied.

Principle of Discrimination

The Principle of Discrimination presupposes that a distinction exists between people who are threats and those that aren’t, or who are combatants and who are non-combatants[2]. The Principle requires that non-combatants are not to be directly targeted by attacks.

At the time, precision guided weapons were decades away. Also, irregular warfare (assuming terrorist mass-casualty tactics are not employed) is capable of targeted killings (very akin to assassinations) and targeted destruction of infrastructure. America could not wait for precision weapons to be developed, and the War in the Pacific was not an asymmetric war (except for Mao Tse-Tsung's guerrillas fighting the Japanese in China).

The effective discrimination between combatants and non-combatants thus depends on the technology available and the type of war being fought. Evaluation of the use of atomic weapons must be based on those factors.

The targets of the use of the atomic bombs were not chosen to maximize the number of non-combatant deaths. Instead, they were chosen by the Target Committee for their military significance[3]: Hiroshima contained a major military base and embarkation port. Naval ordnance was manufactured in Nagasaki, and that city was also the site of major shipbuilding and ship repair facilities. One proposed target, Kyoto, was rejected because of its cultural and religious significance[4].

Because of all this, the Principle of Discrimination was respected in the use of atomic weapons: the targets were chosen so that facilities relevant to the Japanese war machine would be made unavailable.

Principle of Proportionality

The Principle of Proportionality regarding a particular tactic requires that the value gained by the tactic is "worth" the damaged caused.

No doubt playing in the minds of Americans was the recent (1 April - 22 June 1945) Battle of Okinawa[5]. In this battle, over 150,000 – 260,000 military and civilian personnel were killed on both sides[6]. These numbers are larger than the number of deaths at Hiroshima and Nagasaki combined. Absent use of atomic weapons, the Allies would have to invade the Japanese homeland. That operation, called Operation Downfall, was already under consideration and the number of American deaths were projected to be between 500,000 and one million[7], and that the operation would extend the war at least into February 1947.

It was expected that Emperor Hirohito would surrender following the use of atomic weapons, thus ending the war. If he did not, or if atomic weapons were not used, then the Allied invasion would go forward.

The value gained from the use of atomic weapons was thus the end of the War in the Pacific and the avoidance of what would surely be a costly land invasion. It is reasonable to say that the values gained exceeded the loss of life and damage that the atomic weapons caused.

Conclusion

The bombings of Hiroshima and Nagasaki were evaluated according to the Principle of Discrimination and the Principle of Proportionality. It is found that while non-combatants were indeed killed, the targets were military in nature. Also, the number of deaths caused by the bombings were less than the number of projected fatalities that would result from a ground invasion of Japan. Thus, the use of atomic weapons to end WWII passes the two jus in bello criteria.

Mushroom Clouds over Hiroshima (left) and Nagasaki (right). Photos by George R. Caron and Charles Levy

Footnotes

  1. Clayton Chung, Japan 1945
  2. Helen Frowe, The Ethics of War and Peace
  3. Paul Ham, The Target Committee
  4. Ibid.
  5. Joseph Alexander, The Final Campaign
  6. George Feifer, The Battle of Okinawa
  7. D. M. Giangreco, Hell to Pay

Bibliography

Alexander, J. The Final Campaign: Marines in the Victory on Okinawa. U.S. Marine Corps History Division, 1996.

Chung, C. Japan 1945: From Operation Downfall to Hiroshima and Nagasaki. Osprey Publishing, 2008.

Feifer, G. The Battle of Okinawa: The Blood and the Bomb. Lyons Press, 2001.

Frowe. H. The Ethics of War and Peace: An Introduction. Routledge; 3rd edition, August 25, 2022.

Giangreco, D. Hell to Pay: Operation DOWNFALL and the Invasion of Japan, 1945–1947. Naval Institute Press, 2017.

Ham, P. The Target Committee. Hampress Ltd., 2018.

Comparison of Three Defense Strategies

Introduction

The "National Strategy for Homeland Security", "National Defense Strategy", and "Interim National Security Strategic Guidance" documents represent three different visions of what constitute American interests, and three different ways of advancing those interests.

Comparison of the Three Documents

In "National Strategy for Homeland Security" we have a statement that includes the broadest scope in what counts as national interest - not only territorial integrity but also infrastructure and key resources. The threats to these include both man-made dangers (terrorist attacks and industrial accidents), natural disasters (especially Hurricane Katrina), and mixtures of the two (infectious diseases). 

To protect all this, the goal was to prevent and disrupt terror attacks by denying access to and import of WMDs, securing the borders, cargo screening, "Intelligence-Led Policing," and engaging "key communities."

The solution that was implemented was a "bureaucratic" approach. This involved the creation of new intelligence agencies, departments, and offices such as:

  • Department of Homeland Security
  • Office of the Director of National Intelligence
  • Homeland Security Council
  • National Counterterrorism Center
  • U.S. Northern Command

Along with these new agencies there was also sweeping legislation including:

  • USA PATRIOT Act
  • Intelligence Reform and Terrorism Prevention Act of 2004
  • Protect America Act of 2007
  • Reforms to the Foreign Intelligence Surveillance Act (FISA)

State, local, and tribal emergency response agencies were pressured to integrate with each other and their federal counterparts. This integration included a common command structure (the FEMA ICS) as well as shared communication systems. Finally, there was a call for citizen involvement (the "see something, say something" mantra).


Mattis' "National Defense Strategy" presents the most concrete and realistic approaches to national defense. The document advocates inoperability of defense agencies with the intel community, the modernization of key capabilities, cultivating workforce talent, and to prioritize the preparedness for war. 

Of the three documents, this one is the only to recognize asymmetrical warfare and irregular tactics by requiring the agencies charged with defending the United States to "be strategically predictable, but operationally unpredictable." It recognized that our enemies would engage in economic sabotage and other "Fourth Generation Warfare" tactics, and that we must "counter coercion and subversion".


The "Interim National Security Strategic Guidance" is the only one of the three to list non-military threats to the United States, specifically:

  • The pandemic
  • Economic downturn
  • Racial justice
  • "Climate emergency"

The document attributes our current geopolitical situation to changes in the "distribution of power across the world." It states that we will be unable to close the southern border overnight. 

This is the only one of the three documents to specifically mention the policies of the previous administration.

Conclusion

Of the three documents, the one that directly addresses how American engages in warfare is Mattis' "National Defense Strategy." It explicitly addresses the need to prepare for war and that our enemies will be using irregular tactics including economic sabotage. The Bush-era "National Strategy for Homeland Security" advocates the centralization of executive branch political power into the Department of Homeland Security. The "Interim National Security Strategic Guidance" is the only one to mention non-military threats to this country, and to treat these as equivalent in importance to military threats.

MISTER James Mattis

Bibliography

Homeland Security Council. (October 2007). "National Strategy for Homeland Security". Last retrieved 18 April 2021 from https://www.dhs.gov/xlibrary/assets/nat_strat_homelandsecurity_2007.pdf

Department of Defense. (2018). "Summary of the 2018 National Defense Strategy of the United States of America." Last retrieved 18 April 2021 from https://dod.defense.gov/Portals/1/Documents/pubs/2018-National-Defense-Strategy-Summary.pdf

The White House. (March 2021). “Interim National Security Strategic Guidance.” Last retrieved 18 April 2021 from https://www.whitehouse.gov/wp-content/uploads/2021/03/NSC-1v2.pdf

The Farewell Dossier

Introduction

At least since the time of the Cambridge Five, the Rosenbergs, and Klaus Fuchs, the Soviet Union relied on espionage to provide it with technologies they were unwilling to develop themselves1. This use of espionage as a replacement for research and development continued into the late 1970s and early 1980s with the collection of western technologies by Line X, the operational division of the KGB's Directorate T.2

Espionage and Counter-Espionage

Line X collected designs, schematics, working products, and other information using a combination of on-site data collection (e.g. sending a spy into a Boeing plant with adhesive on his shoes to collect metal samples, visiting semiconductor firms to observe their manufacturing processes, etc.), attempting to purchase airplanes from Lockheed, using a shell company to purchase embargoed computers, planting KGB officers into the Apollo-Soyuz space mission, collecting trade secrets and proprietary information, etc.3

The spy operation was revealed in 1981, when Colonel Vladimir I. Vetrov (code-name "Farewell"), an engineer working with Line X, approached a French intelligence agency with secret documents detailing Line X. The intelligence agency alerted François Mitterrand, who then alerted Ronald Reagan. Reagan had the intelligence sent to the CIA.

The documents Farewell provided included a "shopping list" of the technologies the Soviets wished to acquire, including semiconductors, computers4, and other equipment. US intelligence agencies long thought that we were subsidizing Soviet military and industrial R&D5 6, and this shopping list supplied direct proof. Line X agents had already completed collecting about two-thirds of the technologies on that list, but for the technologies they didn't yet collect, the security agencies were able to feed faulty or outdated designs to the Line X spies.

One of the technologies supplied to the Soviets was faulty control software that resulted in a massive rupture in a Siberian pipeline. Other information included faulty microprocessor designs, rejected Space Shuttle designs, etc. The net result was to deny to the Soviets a great leap forward as an economic competitor and military threat. Investment in the faulty technologies was also put a significant strain on their economy and helped contribute to the Soviet Union's collapse.

Decisions that allowed this counter-espionage operation to be successful included:

  1. Farewell's decision to alert the French, the French's decision to alert Reagan, and Reagan's decision to have intelligence agencies investigate
  2. The use of the spy network to feed faulty technologies to the Soviets
  3. Cooperation between the FBI, CIA, and the Defense Department, with the FBI working with domestic companies to create and supply defective equipment and designs
  4. Systematic arrests of spies and complicit embassy employees that
    participated in Line X.

U.S. Space Shuttle vs Soviet Buran Shuttle

Footnotes

  1. John Fialka, “While America Sleeps”
  2. Gus Weiss, “The Farewell Dossier”
  3. Ibid.
  4. Bryan Leese, “The Cold War Computer Arms Race”
  5. CIA, "Soviet Acquisition of Western Technology".
  6. DTIC, "Soviet Acquisition of Militarily Significant Western Technology: An Update".

Bibliography

CIA. (April 1982). "Soviet Acquisition of Western Technology". Last retrieved from https://www.cia.gov/readingroom/docs/CIA-RDP05C01629R000701490007-0.pdf

DTIC. (September 1985). "Soviet Acquisition of Militarily Significant Western Technology: An Update". Last retrieved from https://apps.dtic.mil/sti/pdfs/ADA160564.pdf

Fialka, J. "While America Sleeps". The Wilson Quarterly 21, No. 1 (Winter, 1997). https://www.jstor.org/stable/40259596

Leese, B. (2023). "The Cold War Computer Arms Race". Journal of Advanced Military Studies 14 no. 2. Marine Corps University. https://doi.org/10.21140/mcuj.20231402006

Weiss, G. (1996). "The Farewell Dossier: Duping the Soviets". Studies in Intelligence. Last retrieved from https://www.cia.gov/resources/csi/static/The-Farewell-Dossier.pdf

Jasr Al Doreaa: RAFT Analysis

Introduction

In 1904 the British Army officer Ernest Swinton wrote a book titled The Defence of Duffer's Drift. Set during the Second Boer War, it is narrated by a freshly-minted lieutenant named N. Backsight Forethought (BF), who is tasked with holding Duffer's Drift, the only ford on the Silliassvogel River open to wheeled traffic. BF initially thought this to be a trivial problem, stating "now if they had given me a job, say like fighting the Battle of Waterloo, or Gettysburg, or Bull Run, I knew all about that, as I had crammed it up...". He fails at this trivial problem, at least at first.

The story is told in a series of six nightmares. In the first five, BF makes mistakes that result in the defeat and capture of his platoon by the Boers. At the end of each nightmare, he analyzes his mistakes and compiles a list of lessons learned. These lessons range from the obvious (defend your camp before allowing your men to rest, and do not allow stray people into your camp - they will give intel to the enemy) to the more sophisticated (a hill may not necessarily be the best place to hold). BF is able to carry these lessons into the next evolution. Finally, in the last nightmare, he is able to hold Duffer's Drift against Boer ambushes and attacks until relief arrives.

The Defence of Duffer's Drift has been used by both British and US forces, among others, as a way of teaching small unit tactics. This style of instruction has been used repeatedly ever since, and used to teach other topics such as mechanized warfare and cyber warfare.

To teach junior officers basic counter-insurgency principles for use in Iraq, US Army Captains Michael L. Burgoyne and Albert J. Marckwardt wrote a 2009 novella called The Defense of Jisr Al Doreaa. As in the The Defence of Duffer's Drift, the narrator experiences six nightmares, learning as he goes along. These six nightmares were converted into six computer-animated videos by TRADOC.

This paper is concerned with the sixth and final TRADOC video. When viewing it from the proported counter-insurgency lessons learned, one can only say "now do it for Afghanistan." Instead, the video will be considered from the standpoint of a military intelligence analyst, and a RAFT analysis will be performed on the ficticous Iraqi town of Jasr Al Doreaa and the Iraqi military, insurgents, and civilians present there.

Introduction to RAFT Analysis

RAFT Analysis is an analytic tool used to quickly identify key players, their functions, and the relations and tensions between the actors. The acronym stands for:

  • R = Relationships – connections between key players
  • A = Actors – key players
  • F = Functions – what do the actors do, what are their capabilities?
  • T = Tensions – conflicts between actors

Actors are the key players, and these actors have functions – what do they do, and what can they do? Relationships are about how are actors connected. This can be through military command structure, friendships, familial relations, etc. Tensions are the conflicts between the actors.

It makes sense to start with the actors.

Actors

2LT Phil Connors

  • Platoon leader in charge of defending the town, and establishes a base
  • Familiar with local tribes and customs but not the language
  • Believes in "hearts and minds" approach to fighting insurgents:
    • Security achieved through gaining trust and confidence of locals
    • Separate insurgents from population
    • End the day with fewer insurgents
  • Is quoted as saying "make no enemies" - take that as you will.

After Connors establishes his base, it comes under attack. This attack has three prongs: a mortar attack, a VBIED, and a direct assault by a 6-man team. Analysis of the VBIED shows that it originated in Syria. All people who initiated the mortar attack were killed. Of the 6 men who assaulted the base, 5 were killed, leaving only a man named Mohammed Jabori.

Mohammed Jabori

  • Part of a 6-man team that assaulted Connor's base
  • Rest of his team was killed
  • Was armed with AK-47 when captured
  • Local to the town of Jasr Al Doreaa
  • Works for local Al-Qaeda leader, Kaseem Fareem
  • One of his captors says "this guy is just a kid" - a kid with a mustache and a 5-o'clock shadow

Following the attack, Connors decides to go into Jasr Al Doreaa and meet with the locals. In this, he is assisted by LT Habir of the Iraqi Security Forces.

LT Habir

  • Commander of local Iraqi forces
  • Works with Connors when meeting with locals
  • Cooperates with Connors in capturing the local Al-Qaeda leader
  • Speaks both English and local language

While in town, Connors and Habir meet LT Habir's cousin, Ahmed, and they all go to Ahmed's house for tea or something.

Cousin Ahmed

  • Cousin of LT Habir
  • Friend of the mayor of Jasr Al Doreaa
  • Can identify local Al-Qaeda members including leaders
  • Key player because of his relationships and local knowledge

Once at Cousin Ahmed's house, the town mayor pays a visit. This is apparently an unscheduled meeting.

Mayor Hussein

  • Mayor of Jasr Al Doreaa
  • Embittered because of 4 years of unkept US promises
  • Afraid of reprisal for working with Americans
  • Cares about his town and relates the needs of his town to Connors and Habir:
    • Medical support - town has no doctors
    • Town needs security

During interrogation, Mohammed Jabori states that he works for the leader of the local Al-Qaeda. He gives a name, Kassim Fareed, but not how to find him. Cousin Ahmed helps out with this.

Kassim Fareed

  • Leader of local Al-Qaeda
  • Lived near Sunni mosque with bodyguards
  • Moved into town 2 weeks ago, killing several villagers
  • Considered to be a high value target
  • Captured by Connors and Habir along with 3 security guards

Kassim Fareed was captured along with three other people. It was Cousin Ahmed who identified him. Along with the four insurgents, the capturing force finds weapons and IED-making equipment.

Relationships

The best way to examine relationships is through diagrams that look like this...

This diagram shows the key actors and the relationships between them. On the bottom corner is Connors; he works with LT Habir and with Cousin Ahmed using a interpreter named Mohammed. Ahmed and Habir are cousins. Ahmed and the Mayor are related in some way - friends? We don't know the details. Maybe this means Cousin Ahmed is what used to be called a "leading citizen."

Cousin Ahmed can identify members of the local Al-Qaeda insurgents including Kassim Fareed. Fareed works with Al-Qaeda. Either Fareed or some other member of the Al-Qaeda has threatened the Mayor.

Notice that Cousin Ahmed is related to the most other people in this diagram. This "centrality" implies that he has "influence" or at least knowledge of the key players. This is the type of information that can only be revealed with RAFT analysis.

With the available information we can diagram the local Al-Qaeda group...

Near the bottom is Muhammed Jabori who was captured in a raid on Connor's base. During interrogation he reveals that his manager in Al-Qauea is Kassim Fareem. He doesn't know how to locate him, however. Fareem is captured along with three of his security guards. A very valuable piece of information would be the name of Fareem's leader.

Note: we are assuming that Al-Qaeda is indeed a hierarchial organization.

Functions

Functions are the capabilities of the key actors: what they do and what can they do.

2LT Phil Connors is a prime mover (at least militarily) - he gets things done! He works well with his commander and the Iraqi Security Forces. He anticipates the town's security and medical needs, and gets police and medical training for them.

Connors is so proficient at getting things done that he almost has a superpower: he operates without von Clausewitz's "friction!"

Kassim Fareed commanded other insurgents. He possessed sufficient pull to get weapons and IED-making equipment. This means he probably supplied other insurgents with weapons and IEDs.

He might be the one who threatened Mayor Hussein for working with Americans.

Fareed's capture throws the local Al-Qaeda into disarray, at least in the short term.

Finally, Cousin Ahmed functions as the "glue" to the whole situation. He can identify key actors and form relationships with them. He's on good terms with Mayor Hussein and local Iraqi forces. He can at least identify local insurgency memvbers such as Kassim Fareed.

Tensions

The ultimate tension is between Coalition and Insurgent forces, but we care about tensions between the key actors. The major tension is between the mayor of Jasr Al Doreaa and the insurgents.

Mayor Hussein feels threatened by the local Al-Qaeda for working with Americans. He doubts the ability of Iraqi forces to defend the town. Connor's commander has a similar view of Iraqi forces. The mayor is apprehensive of the town's security once the American forces leaves.

Intelligence Sources, Gaps, and Goals

The available intelligence sources include:

  • Captured Al-Qaeda members
  • Families, friends, and acquaintances of captured and killed Al-Qaeda members
  • Info from townsfolk, especially from Cousin Ahmed
  • Physical evidence from Kassim Fareed's house
  • Physical evidence from the VBIED that exploded earlier

There are several intelligence gaps, information that would be useful to have:

  • Who is Kassim Fareed's leader?
  • Are Mayor Hussain, Cousin Ahmed, and the interpreters loyal?
    • Are they playing both sides against each other?
  • About the Mayor:
    • How was he threatened? By whom?
    • Did apprehension level go down after Kassim Fareed was captured?
  • About Cousin Ahmed:
    • Who else does he know?
    • How did he get to know all these people?
    • What is the overall quality of information he can provide?

Conclusion - Next Steps

  • Fill-in the intel gaps by:
    • Gather and analyze additional physical evidence
    • Continue getting intelligence from captured insurgents and family members
  • Identify other insurgents
  • About Cousin Ahmed:
    • Use as information source about locals and insurgents
    • Monitor his actions and contacts
  • Follow-up on Syria connection from earlier VBIED explosion
  • Look for changes in behavior of the locals following Kaseem Fareem's capture
  • Derive actionable info and pass to Connors to execute

References

Burgoyne, M., Marckwardt, A., & Nagl, J. (2009). The Defense of Jisr al-Doreaa. University of Chicago Press. Last retrieved on 19 April 2024 from https://smallwarsjournal.com/documents/jisaldoreaa.pdf

Swinton, E. D. (1904). The Defense of Duffer's Drift. Praetorian Press. Last retrieved on 19 April 2024 from https://www.armyupress.army.mil/Portals/7/combat-studies-institute/csi-books/swinton.pdf

TRADOC G2 OE Enterprise G&V. (2013). The Defense of Jisr Al Doreaa - Dream 6. Retrieved 3 April 2024 from https://www.youtube.com/watch?v=1vHvae5BZRo