2020 digest chapter 18

38
Contents CHAPTER 18 ................................................................................................................................. 667 Use of Force .............................................................................................................................. 667 A. GENERAL............................................................................................................................... 667 1. January U.S. Air Strike in Iraq ......................................................................................... 667 2. Other Actions in Response to Iran .................................................................................. 675 3. Bilateral and Multilateral Agreements and Arrangements ............................................. 677 a. North Macedonia Accession to NATO ......................................................................... 677 b. Status of Forces Agreement with Trinidad and Tobago .............................................. 677 c. Agreement with Supreme Headquarters Allied Powers Europe .................................. 678 d. Status of Forces Agreement with Antigua and Barbuda ............................................. 678 e. Greece Mutual Defense Cooperation Agreement ....................................................... 678 f. Defense Agreement with the Netherlands on personnel in the Caribbean.................. 678 g. Rwanda Status of Forces Agreement .......................................................................... 678 h. Poland Enhanced Defense Cooperation Agreement.................................................... 678 i. U.S.-Netherlands Defense Agreement......................................................................... 680 j. Guatemala Status of Forces Agreement ..................................................................... 680 4. International Humanitarian Law .................................................................................... 680 a. UN Security Council resolution on humanitarian access in the DRC ........................... 680 b. Applicability of international law to conflicts in cyberspace ....................................... 681 B. CONVENTIONAL WEAPONS.................................................................................................. 687 Lethal Autonomous Weapons Systems (“LAWS”) ................................................................. 687 C. DETAINEES ............................................................................................................................ 700 Al Qahtani v. Trump ........................................................................................................... 700 Cross References ...................................................................................................................... 703

Upload: others

Post on 07-Dec-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

Contents CHAPTER 18 ................................................................................................................................. 667

Use of Force .............................................................................................................................. 667

A. GENERAL ............................................................................................................................... 667

1. January U.S. Air Strike in Iraq ......................................................................................... 667

2. Other Actions in Response to Iran .................................................................................. 675

3. Bilateral and Multilateral Agreements and Arrangements ............................................. 677

a. North Macedonia Accession to NATO ......................................................................... 677

b. Status of Forces Agreement with Trinidad and Tobago .............................................. 677

c. Agreement with Supreme Headquarters Allied Powers Europe .................................. 678

d. Status of Forces Agreement with Antigua and Barbuda ............................................. 678

e. Greece Mutual Defense Cooperation Agreement ....................................................... 678

f. Defense Agreement with the Netherlands on personnel in the Caribbean .................. 678

g. Rwanda Status of Forces Agreement .......................................................................... 678

h. Poland Enhanced Defense Cooperation Agreement .................................................... 678

i. U.S.-Netherlands Defense Agreement......................................................................... 680

j. Guatemala Status of Forces Agreement ..................................................................... 680

4. International Humanitarian Law .................................................................................... 680

a. UN Security Council resolution on humanitarian access in the DRC ........................... 680

b. Applicability of international law to conflicts in cyberspace ....................................... 681

B. CONVENTIONAL WEAPONS .................................................................................................. 687

Lethal Autonomous Weapons Systems (“LAWS”) ................................................................. 687

C. DETAINEES ............................................................................................................................ 700

Al Qahtani v. Trump ........................................................................................................... 700

Cross References ...................................................................................................................... 703

667

CHAPTER 18

Use of Force

A. GENERAL

1. January U.S. Air Strike in Iraq

On January 8, 2020, U.S. Permanent Representative to the UN Kelly Craft provided a letter to the president of the Security Council, in accordance with Article 51 of the UN Charter reporting the actions taken in self-defense. U.N. Doc. No. S/2020/20. The body of the letter follows.

___________________

* * * * In accordance with Article 51 of the Charter of the United Nations, I wish to report, on behalf of

my Government, that the United States has undertaken certain actions in the exercise of its

inherent right of self-defence. These actions were in response to an escalating series of armed

attacks in recent months by the Islamic Republic of Iran and Iran-supported militias on United

States forces and interests in the Middle East region, in order to deter the Islamic Republic of

Iran from conducting or supporting further attacks against the United States or United States

interests, and to degrade the Islamic Republic of Iran and Islamic Revolutionary Guard Corps

Qods Force-supported militias’ ability to conduct attacks. These actions include an operation on

2 January 2020 against leadership elements of Iran’s Islamic Revolutionary Guard Corps Qods

Force on the territory of Iraq. The United States is prepared to take additional actions in the

region as necessary to continue to protect United States personnel and interests.

Over the past several months, the United States has been the target of a series of

escalating threats and armed attacks by the Islamic Republic of Iran. These have included a

threat to the amphibious ship USS Boxer on 18 July 2019, while the ship was conducting a

planned inbound transit of the Strait of Hormuz, by an Iranian unmanned aerial system, which

was previously reported to the Council, as well as an armed attack on 19 June 2019 by an Iranian

surface-to-air missile on an unmanned United States Navy MQ-4 surveillance aircraft on a

routine surveillance mission monitoring the Strait of Hormuz in international airspace. The

actions taken by the United States occurred in the context of continuing armed attacks by the

Islamic Republic of Iran that have endangered international peace and security, including attacks

on commercial vessels off the port of Fujayrah and in the Gulf of Oman that threaten freedom of

668 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

navigation and the security of international commerce, and missile and unmanned aircraft attacks

on the territory of Saudi Arabia.

Additionally, Qods Force-backed militias have engaged in a series of attacks against

United States forces. Qods Force-backed militia groups in Iraq, including Kata’ib Hizballah,

have conducted a series of indirect fire attacks targeting bases where United States forces in Iraq

are located. On 27 December 2019, one such attack resulted in the death of a United States

Government contractor and injury to four United States service members, all of whom were

present in Iraq with the consent and at the request of the Iraqi Government for counter-ISIS

operations notified to the Council in the United States letter dated 23 September 2014. In

immediate response to this 27 December attack, the United States struck five targets associated

with Kata’ib Hizballah in Iraq and Syria on 29 December 2019. Kata’ib Hizballah and other

Qods Force-backed militias then participated in an attack on the United States Embassy in

Baghdad on 31 December 2019, which resulted in significant damage to Embassy property.

Since our response, Iran on 7 January launched more than a dozen ballistic missiles

against United States military and coalition forces in Iraq. It is clear that these missiles were

launched from Iran and targeted at least two Iraqi military bases hosting United States military

and coalition personnel at Al-Asad and Erbil.

The United States wishes to note—as it has done repeatedly over the past years—that we

remain committed to a diplomatic resolution. We stand ready to engage without preconditions in

serious negotiations with Iran, with the goal of preventing further endangerment of international

peace and security or escalation by the Iranian regime.

* * * * On March 4, 2020, the general counsel for the U.S. Department of Defense, Paul

C. Ney, Jr., delivered remarks at Brigham Young University Law School, entitled “Legal Considerations Related to the U.S. Air Strike Against Qassem Soleimani.” The remarks are excerpted below and available at https://www.defense.gov/Newsroom/Speeches/Speech/Article/2181868/dod-general-counsel-remarks-at-byu-/#:~:text=Paul%20C.,Law%20School%20in%20Provo%2C%20Utah.

___________________

* * * *

… On January 2, 2020, at the direction of the President of the United States, the U.S. military

conducted an air strike in Iraq targeting Qassem Soleimani, a major general in the Islamic

Revolutionary Guard Corps of Iran, and the commander of an expeditionary Revolutionary

Guards unit called the Qods Force. Among others also killed in the strike was Abu Mahdi al-

Muhandis, the leader of Kata’ib Hizballah, also known as KH, a Qods Force-backed Shia militia

in Iraq.

President Trump directed the strike on Soleimani in response to an escalating series of

attacks in preceding months by Iran and Iran-backed militias, including KH, against U.S. forces

and interests in the Middle East region. The strike was ordered to protect U.S. personnel; to deter

Iran from conducting or supporting further attacks on U.S. forces and interests; to degrade Iran’s

669 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

and Qods Force-backed militias’ ability to conduct attacks; and to end Iran’s strategic escalation

of attacks on U.S. interests.

My aim today is to explain the international and domestic law underpinnings of the

January 2nd air strike. Much of what I will explain is reflected in publicly available documents

that the U.S. Government has already provided to the United Nations Security Council and to

Congress. The key legal conclusions are already a matter of record.

In the Pentagon, we always begin with the Bottom Line Up Front or B-L-U-F. Here’s the

BLUF for my remarks today. First, with respect to international law, the President directed the

January 2, 2020, air strike against Soleimani as an exercise of the United States’ inherent right to

act in self-defense, consistent with Article 51 of the Charter of the United Nations and customary

international law. Second, as to U.S. domestic law, the President had legal authority to order the

strike against Soleimani pursuant to his Article II constitutional power as Commander-in Chief

to use armed force to protect U.S. personnel and property in Iraq and U.S. interests in the Middle

East, and also pursuant to statutory authority under the 2002 Authorization for Use of Military

Force (AUMF) to “defend the national security of the United States against the continuing threat

posed by Iraq.”

I hope that by explaining how international law and U.S. domestic law applied to the

facts surrounding that operation, you will understand better why the strike on Soleimani was

lawful.

* * * *

Although the threat posed by Saddam Hussein’s regime was the initial focus of the

statute, the United States has relied upon the 2002 AUMF to authorize the use of force for the

purpose of establishing a stable, democratic Iraq and addressing terrorist threats emanating from

Iraq, even after Saddam Hussein’s demise.

Additionally, from 2003 to 2008, as sectarian violence erupted with the fall of the former

Ba’athist regime, President Bush directed a campaign against al-Qa’ida in Iraq pursuant to the

2001 Authorization for Use of Military Force or “2001 AUMF,” authorizing the use of force

against groups like al-Qa’ida—the “organization” responsible for the terrorist attacks of

September 11, 2001. In 2014, al-Qa’ida’s Iraq faction split from al-Qa’ida’s core leadership and

became the Islamic State of Iraq and Syria, or ISIS.

As Iraq became more stable, the United States and Iraq signed a cooperation agreement

in November 2008 that included defense and security related commitments and a recognition of

the importance of cooperation to “improve and strengthen security and stability in Iraq and the

region.” The two countries also signed an agreement providing for the withdrawal of U.S.

military personnel from Iraq by the end of 2011.

* * * *

U.S. forces, Iraqi Security Forces, and forces from countries participating in the Global

Coalition to Defeat ISIS (or D-ISIS) together fought to reverse ISIS’s conquests in Iraq and

helped liberate the Iraqi people from ISIS’s brutal control. Today, 100 percent of the territory

ISIS once held in Iraq has been returned to Iraqi government control. But despite the defeat of

ISIS’s control of territory in Iraq, ISIS remains a threat, and so U.S. forces have remained in Iraq

670 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

to support Iraqi forces and ensure the enduring defeat of ISIS. There are presently more than

5,000 U.S. military personnel in Iraq.

As the United States has sought to establish stability in Iraq and to address terrorist

threats in and emanating from Iraq, Iran has remained a malign presence there and throughout

the Middle East. According to the Defense Intelligence Agency, Iran remains “implacably

opposed” to the United States, the U.S. presence in the Middle East, and U.S. support for certain

governments in the region, all of which Iran views as threats to its goals of regime survival and

regional dominance.

To achieve these goals, Iran typically uses “unconventional warfare elements and

asymmetric capabilities,” including “a complex network of State and non-State partners and

militant proxies” in the Middle East. The Islamic Revolutionary Guard Corps Qods Force is

Iran’s “primary tool” for conducting unconventional warfare and providing support to its foreign

partners and proxies like Hizballah, Hamas, and the Houthis.

* * * *

Qassem Soleimani had commanded the Qods Force beginning in the late 1990s and

orchestrated the group’s ascendance. He was the lead architect behind Iran’s campaign of

terrorism, assassinations, arms-smuggling, and violence throughout the Middle East, including

against U.S. personnel in Iraq. Soleimani’s malign activities have not been limited to the Middle

East. In 2011, Soleimani supervised a Qods Force plot to assassinate Saudi Arabia’s Ambassador

to the United States with explosives at a Washington, D.C. restaurant. … In April 2019, the

United States designated the Islamic Revolutionary Guard Corps, “including the Qods Force,” as

a foreign terrorist organization, citing, among other things, the Qods Force’s support for terrorist

groups and plots in the United States, Europe, Africa, and the Middle East.

In the months preceding the January 2nd air strike against Soleimani, Iran and Iran-

supported militias had engaged in a series of attacks against U.S. personnel and property in Iraq

and against U.S. interests and Allies and partners in the Middle East. In June 2019, an Iranian

surface-to-air missile destroyed an unmanned U.S. Navy surveillance aircraft while it was on a

routine mission in international airspace monitoring the Strait of Hormuz.

The U.S. response to the attack at that time was measured and muted, but Iran continued

its pattern of aggression against U.S. interests in the region. In July 2019, USS Boxer, an

amphibious assault ship, came under threat from Iranian unmanned aerial systems while

conducting a planned transit of the Strait of Hormuz. Iran has also attacked and seized

commercial ships in the area, threatening freedom of navigation. And, Iran-backed Houthi rebels

in Yemen shot down two U.S. unmanned surveillance aircraft in Yemeni airspace and conducted

multiple missile and other attacks in Saudi Arabia targeting airports and other civilian facilities.

Moreover, on September 14, 2019, Iran launched a devastating air attack on a gas plant and an

oil refinery in Saudi Arabia.

In the weeks preceding the air strike against Soleimani, provocations against the United

States intensified with a series of attacks by Iran-supported militias on U.S. personnel and

property in Iraq. KH, the Qods Force-backed Shia militia group, fired rockets at bases in Iraq

where U.S. forces are located. Between November 9 and December 9, 2019, Qods Force-backed

militia groups fired rockets at the Qayyarah West Air Base, Al Asad Air Base, and the Baghdad

Embassy complex. Then, on December 27, KH attacked the K-1 Air Base in Kirkuk, killing a

U.S. contractor and injuring U.S. and Iraqi military personnel. In response, U.S. forces struck a

671 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

number of KH installations in Iraq and Syria to degrade the group’s ability to launch additional

attacks. Then, on December 31, KH and other Iran-backed militia groups organized a

demonstration that turned violent at the U.S. Embassy in Baghdad, inflicting significant damage

to U.S. property and imperiling U.S. lives.

* * * *

First, let’s talk about international law.

The U.N. Charter generally prohibits States from resorting to the use of force against

another State without a legal basis. This rule is part of the law governing the resort to force, or, to

use the Latin term, jus ad bellum. The United States recognizes three circumstances in which a

resort to force in a foreign country is not generally prohibited under international law: (1) use of

force authorized by the U.N. Security Council acting under the authority of Chapter VII of the

U.N. Charter; (2) use of force in the exercise of the inherent right of self-defense; and (3) use of

force in an otherwise lawful manner with the consent of the territorial State.

The strike targeting Soleimani in Iraq was taken under the second justification I

mentioned – in U.S. self-defense – consistent with Article 51 of the U.N. Charter. Article 51

provides in relevant part that: “Nothing in the present Charter shall impair the inherent right of

individual or collective self-defense if an armed attack occurs against a Member of the United

Nations . . . .”

Article 51 thus recognizes the inherent right of States to resort to force in individual or

collective self-defense against an armed attack. In accordance with Article 51, the United States

reported the air strike to the UN Security Council on January 8, 2020, in written correspondence

from the U.S. Ambassador to the United Nations, Kelly Craft, to the other members of the

Security Council, through the President of the Security Council.

The use of force in self-defense is subject to the customary international law

requirements of necessity and proportionality.

As the DoD Law of War Manual explains, “[t]he jus ad bellum condition of necessity

requires that no reasonable alternative means of redress are available. For example, in exercising

the right of self-defense, diplomatic means must be exhausted or provide no reasonable prospect

of stopping the armed attack or threat thereof.”

Applying this legal standard to the facts which I just described, the United States had

been subject to an escalating series of armed attacks by Iran and by Iran-supported militias in the

Middle East, including Iraq. This included the threat to USS Boxer by Iranian unmanned aerial

systems and an armed attack by an Iranian surface-to-air missile on an unmanned U.S. Navy

MQ-4 surveillance aircraft in international airspace in the Persian Gulf region. And the strike

against Soleimani occurred in the larger context of continuing armed attacks by Iran that

endangered international peace and security, attacks on commercial vessels in the Gulf of Oman,

attacks on the territory of Saudi Arabia, and attacks by Qods Force-backed militias against U.S.

forces in the previous several months. Although I cannot speak to the classified information that

senior leaders reviewed, I hope you can see, based simply on these facts that are publicly known,

why our senior leaders and the President were reasonable in believing that the use of force was

necessary. Attacks against U.S. forces and interests were assessed to be highly likely to continue

in the absence of a military response in self-defense to restore deterrence.

Moreover, the strike on January 2d was also consistent with the international law

requirement that our measures in self-defense be “proportionate to the nature of the threat being

672 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

addressed.” As DoD communicated to the public at the time, “General Soleimani was actively

developing plans to attack American diplomats and service members in Iraq and throughout the

region.” “He had orchestrated attacks on coalition bases in Iraq over the last several months,”

and he also approved the demonstration that turned violent at the U.S. Embassy in Baghdad just

two days earlier on December 31. Targeting the Iranian commander responsible for

orchestrating, planning, and supporting recent attacks against the United States and planning new

attacks was a proportionate response to the threat of such attacks.

Some have questioned whether another Iranian armed attack against the United States

was “imminent” at the time of the strike targeting Soleimani. This is a red herring, as the saying

goes. Under international law, an imminent attack is not a necessary condition for resort to force

in self-defense in this circumstance because armed attacks by Iran already had occurred and were

expected to occur again.

Of course, although such analysis was not necessary in this case given this recent history

of past attacks, the threat of an imminent armed attack can also justify a resort to force under

international law. That is, although Article 51 refers explicitly to self-defense only in response to

an actual armed attack, the United States maintains that international law also includes the right

to use force where an armed attack is imminent. This view of the United States is widely known

and also shared by many like-minded states in the international community.

In addition to regulating the resort to force, international law also regulates the conduct of

hostilities. The law of war requires, for example, that attacks be directed against military

objectives, that precautions be taken to reduce the likelihood of civilian casualties, and that any

damage caused be proportionate to the military objective. The law of war does not prohibit

targeting specifically identified leaders of adversary militaries—they may be made the object of

attack as enemy combatants.

As the leader of the Qods Force, Soleimani was a legitimate military target in Iraq under

the international law governing the conduct of hostilities. The others killed in the U.S. strike

were the leader and members of KH, an Iran-backed militia. As such, they, too, were “military

objectives” who could be made the object of attack under the law of war.

To sum up, the January 2, 2020, air strike against Soleimani in Iraq was lawful as a

matter of international law as an exercise of the inherent right of self-defense recognized by

Article 51 of the U.N. Charter. An imminent attack is not a necessary condition for use of force

in self-defense under Article 51 when an armed attack has already been perpetrated and the

response is necessary and proportionate.

Let me turn now to a discussion of the legal basis for the strike under U.S. domestic law.

The use of military force requires a basis in domestic law. The President may rely on

congressional authorizations for the use of force – such as the 2001 AUMF and the 2002 AUMF

– and the President may rely on Article II constitutional authority. In the absence of statutory

authorization, the President’s constitutional authority to direct military action can be distilled

into two inquiries. First, whether the President could reasonably determine that the action serves

important national interests. Second, whether the “anticipated nature, scope and duration” of the

conflict might rise to the level of a war under the Constitution.

Applying this domestic law framework to the circumstances of the strike targeting

Soleimani, the President had a sufficient legal basis both under his constitutional authority and

pursuant to the statutory authority of the 2002 AUMF.

First, with respect to the question of the President’s constitutional authority to order the

strike, the important national interest to prevent or respond to attacks on U.S. personnel and

673 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

property is at the very heart of his constitutional power as Chief Executive and Commander-in-

Chief. Past Presidents have used force specifically in response to attacks on U.S. embassies and

personnel, including by State actors abroad. For instance, in April 1986, President Reagan

directed air strikes against the Libyan leader Qaddafi and his intelligence services in Libya

following terrorist attacks that killed and wounded American soldiers and civilians at a

discotheque in Germany. And in June 1993, President Clinton ordered the launch of cruise

missiles on Iraqi Intelligence Headquarters based on “compelling evidence” that Iraqi

intelligence had tried to assassinate former President George H.W. Bush in Kuwait. President

Clinton also ordered air strikes in August 1998 against Usama bin Laden and al-Qa’ida in

Afghanistan and Sudan, in response to al-Qa’ida bombings of the U.S. Embassies in Nairobi and

Dar es Salaam, which had killed more than 250 persons.

Let’s turn now to the second constitutional law inquiry: whether the air strike on

Soleimani presented a sufficient risk of broadened conflict with Iran such that pre-approval by

Congress may have been required. Although the Constitution vests in the President independent

authority to use force, it reserves to Congress the power to “declare War” and the authority to

fund military operations. This was a deliberate choice of the Founders. In the Federalist Papers,

for example, Alexander Hamilton noted that the President lacks the authority of the British King,

which “extends to the declaring of war and … the raising and regulating of fleets and armies.”

For that reason, the President’s decision to use armed force cannot be sustained over time

without the acquiescence, indeed the approval, of Congress, for it is Congress that must

appropriate the money to fight a war. The Department of Justice’s Office of Legal Counsel

(OLC) has similarly recognized that the President should seek congressional approval prior to

initiating military action that would bring the Nation into the kind of protracted conflict that

would rise to the level of a “war” in the constitutional sense.

So what does a “war” in the constitutional sense mean? The relevant Department of

Justice OLC opinions say that we must engage in a “fact-specific assessment of the ‘anticipated

nature, scope, and duration’ of the planned military operations.” Under this standard, military

operations may rise to the level of “war” in the constitutional sense when the actions are likely to

lead to “prolonged and substantial military engagements, typically involving exposure of U.S.

military personnel to significant risk over a substantial period.” Some of the most relevant facts

in this analysis would include the numbers of additional forces to be deployed, the quantity of

munitions expended, estimates regarding U.S. and enemy casualties, and whether ground forces

are to be deployed into a war zone. Making an assessment of the anticipated nature, scope, and

duration of planned military operations is one of those judgments that are, as Justice Jackson

described, “delicate, complex, and involve large elements of prophecy,” which have traditionally

been committed to the Executive branch, given its military, diplomatic, and intelligence

resources.

The strike against Soleimani did not involve a substantial military engagement, the

deployment of additional U.S. forces, or the risk of significant casualties. The operation was

circumscribed: it consisted of one targeted air strike in Iraq, executed by an unmanned aerial

vehicle, designed to avoid civilian casualties or substantial collateral damage, and intended to

prevent future attacks against U.S. persons and interests in Iraq and throughout the region. It was

not “aim[ed] at the conquest or occupation of territory nor . . . at imposing through military

means a change in the character of a political régime.”

At the same time, there existed risk that the operation could escalate into a broader

conflict. Although Soleimani and the Qods Force were not a conventional military formation, the

674 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

Qods Forces is a part of the military of Iran, which has significant armed forces and military

assets that could respond with armed force.

However, the President decided based upon available intelligence that the targeted

operation would be unlikely to escalate into a full-scale war, and that, by restoring deterrence of

further attacks orchestrated by the Qods Force, the strike could in fact result in a de-escalation of

the conflict between the United States and Iran. As the President himself said, the strike on

Soleimani was taken to stop a war, not to start one. Indeed, the United States government made

clear immediately after the January 2d air strike—as it had planned to do before launching the

operation— that the strike reflected a limited engagement and that the United States did not seek

a broader war with Iran.

Subsequent events appear to have confirmed the reasonableness of the assessment that

the strike would not provoke an uncontrolled escalation. On January 7, 2020, Iran responded to

the strike on Soleimani by firing ballistic missiles at U.S. military and coalition forces at two

bases in Iraq. But the United States did not itself respond to this new attack with further air

strikes, although it took precautions to minimize casualties and damages. Immediately after the

missile attacks, Iran’s foreign minister, Javad Zarif, asserted that his country “took and

concluded proportionate measures” in response to the targeting of Soleimani, adding that Iran

“do[es] not seek escalation or war.”

In sum, given the narrow scope of the mission, the available intelligence, and the efforts

to avoid escalation, it was reasonable for the President to have determined that the nature, scope,

and duration of hostilities directly resulting from the strike against Soleimani in Iraq would not

rise to the level of war with Iran for constitutional purposes.

Although the President had constitutional authority under Article II to direct the January

2nd air strike, he also had statutory authority under the 2002 AUMF. Pursuant to the 2002

AUMF, Congress has authorized the President “to use the Armed Forces of the United States as

he determines to be necessary and appropriate in order to . . . defend the national security of the

United States against the continuing threat posed by Iraq.” As I mentioned earlier, although the

threat posed by Saddam Hussein’s regime was the initial focus of the 2002 AUMF, the United

States has relied consistently upon the 2002 AUMF to authorize the use of force for the purpose

of establishing a stable, democratic Iraq and addressing terrorist threats emanating from Iraq

under the George W. Bush, Obama, and Trump Administrations. Such uses of force need not

only address threats from the Iraqi Government apparatus but may also address threats to the

United States posed by militias, terrorist groups, or other armed groups in Iraq. For example, the

Obama Administration invoked the 2002 AUMF (along with the 2001 AUMF) as domestic legal

authority for conducting military operations against ISIS in Iraq and also operations in Syria to

address threats emanating from Iraq.

The air strike against Soleimani in Iraq is consistent with this longstanding interpretation

of the President's authority under the 2002 AUMF. The use of force was tailored narrowly to

Soleimani’s presence in Iraq and his support to – including in some cases the direction of –

militias that attacked U.S. personnel and bases in Iraq. U.S. national security officials believed

that Soleimani was actively planning additional attacks on U.S. personnel in Iraq and in the

region. Soleimani, as the leader of the Qods Force directly orchestrating hostilities against U.S.

personnel and property in Iraq, was a necessary and appropriate target for the President to use

force against under the 2002 AUMF.

* * * *

675 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

On July 9, 2020, the State Department issued a press statement by Secretary Pompeo rejecting the opinion of a UN special rapporteur related to the U.S. strike that killed Soleimani. The statement, available at https://2017-2021.state.gov/un-special-rapporteur-gives-more-cause-to-distrust-un-human-rights-mechanisms/, reaffirms the U.S. rationale for the strike:

… The strike that killed General Soleimani was in response to an escalating series of armed attacks in preceding months by the Islamic Republic of Iran and militias it supports on U.S. forces and interests in the Middle East region. It was conducted to deter Iran from launching or supporting further attacks against the United States or U.S. interests, and to degrade the capabilities of the Qods Force.

The United States is transparent regarding the international law basis for the strike. As we outlined in a January 8, 2020, letter to the UN Security Council submitted in accordance with Article 51 of the UN Charter, the strike was undertaken in the exercise of the United States’ inherent right of self-defense. …

2. Other Actions in Response to Iran On March 12, 2020, the U.S. Department of Defense issued a statement regarding the strikes conducted by U.S. forces against Kata’ib Hizbollah (“KH”) in Iraq. The statement is excerpted below and available at https://www.centcom.mil/MEDIA/STATEMENTS/Statements-View/Article/2110837/statement-by-the-department-of-defense/.

___________________

* * * *

…These strikes targeted five weapon storage facilities to significantly degrade their ability to

conduct future attacks against Operation Inherent Resolve (OIR) coalition forces. These weapons

storage facilities include facilities that housed weapons used to target U.S. and coalition troops.

These strikes were defensive, proportional, and in direct response to the threat posed by

Iranian-backed Shia militia groups (SMG) who continue to attack bases hosting OIR coalition

forces.

Yesterday’s attack on Camp Taji killed two U.S. and one U.K. service members and

wounded 14 others. It marked the latest in a series of rocket attacks conducted by Iranian-backed

SMGs against U.S. and coalition personnel—killing five and wounding dozens more, including

Iraqi Security Forces.

“The United States will not tolerate attacks against our people, our interests, or our

allies,” Secretary of Defense Dr. Mark T. Esper said. “As we have demonstrated in recent

months, we will take any action necessary to protect our forces in Iraq and the region.”

During discussions with senior Iraqi officials, the department re-emphasized its

commitment to the force protection of coalition service members and to preventing SMG attacks

on coalition forces.

676 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

These terror groups must cease their attacks on U.S. and coalition forces or face

consequences at a time and place of our choosing.

The U.S. and the coalition remain committed to the lasting defeat of ISIS, and the long-

term security, stability, and sovereignty of Iraq.

* * * *

On April 22, 2020, the State Department issued a fact sheet on Iran’s history of naval provocations. The fact sheet is excerpted below and available at https://2017-2021.state.gov/irans-history-of-naval-provocations/.

___________________

* * * *

Iran has long used its naval forces to terrorize the international maritime community… . In 2015,

during negotiations of the Iran Deal and after its adoption, the U.S. Navy recorded 22 incidents

of unsafe and unprofessional conduct by the IRGC Navy (IRGCN), many that risked collision.

An additional 36 incidents of unsafe and unprofessional conduct were recorded in 2016.

This includes the January 2016 incident where IRGC naval forces seized two U.S. Navy

riverine boats and detained ten U.S. sailors for a period of 15 hours, violating their rights under

the Geneva Convention by parading them in front of their propaganda cameras.

When President Trump took office, he initiated a comprehensive review of the United

States’ Iran policy in light of the Iran Deal’s failure to address the regime’s growing threats to

international peace and security. During this review period, Iran continued its dangerous naval

activity.

• In March 2017, the USNS Invincible was forced to change course to avoid collision with

multiple approaching IRGCN fast-attack small crafts.

• In July 2017, an IRGCN vessel came within 150 yards of the USS Thunderbolt in the

Persian Gulf, forcing it to fire warning shots.

• In August 2017, an unarmed Iranian drone flew close to the USS Nimitz as fighter jets

landed at night, threatening the safety of the American pilots and crew.

In October 2017, President Trump announced a new Iran policy that made clear the

United States would not tolerate the status quo from Iran, nor appease their provocations.

Following the President’s announcement, incidents of IRGC naval harassment sharply declined

and remained depressed even after the United States withdrew from the JCPOA.

In May 2019, Iran began a panicked campaign of aggression to extort the world into

granting it sanctions relief.

• On May 12, 2019, IRGC naval personnel placed and detonated limpet mines on two

Saudi, one UAE, and one Norwegian-registered ships while they were harbored in UAE

territorial waters near Fujairah Port.

• On June 13, 2019, IRGC naval personnel placed and detonated limpet mines on one

Japanese ship and one Norwegian owned ship while they transited the Gulf of Oman. The

U.S. later released a video showing IRGC naval personnel removing one of their limpet

mines off the side of the Japanese tanker.

677 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

• On June 19, 2019, IRGC personnel deployed a surface-to-air missile to shoot down a

U.S. unmanned aircraft operating over international waters in the Strait of Hormuz. IRGC

Commander Hossein Salami announced that Iran had shot down the drone, claiming that

it was operating within Iran’s territorial waters.

• On July 19, 2019, the IRGC Navy seized the British-flagged, Swedish-owned Stena

Impero tanker while it was transiting the Strait of Hormuz. On the same day, the IRGC

also temporarily detained the Liberian-flagged Mesdar tanker. The Stena Impero and her

crew were detained in Iran for more than two months as negotiating leverage.

At the same time the Iranian regime is seeking sanctions relief, it focuses its resources

and efforts to harass the international maritime community.

• On April 14, 2020, the IRGC Navy forcibly boarded and detained the Hong Kong-

flagged SC Taipei oil tanker in international waters, and sailed the tanker into Iranian

waters.

• On April 15, 2020, eleven IRGC Navy small boats disrupted five U.S. naval vessels

conducting a routine exercise by repeatedly engaging in high speed, harassing

approaches. The Iranian vessels repeatedly crossed the bows and sterns of the U.S. ships

coming as close as to within 10 yards of a US Coast Guard Cutter.

In response to the elevated risk posed to commercial vessels transiting the Strait of

Hormuz, the United States spearheaded the creation of the International Maritime Security

Construct (IMSC), a coalition of eight European, Middle Eastern, and Asian nations committed

to ensuring freedom of navigation and the free flow of commerce through the strait. Since the

IMSC was stood up in August 2019, Iranian mine attacks have ceased.

President Trump will not tolerate or appease Iran’s foreign policy of violence and

intimidation. Iran must act like every other normal nation, not a nation that sponsors piracy and

terror.

* * * * 3. Bilateral and Multilateral Agreements and Arrangements

a. North Macedonia Accession to NATO

As discussed in Digest 2019 at 615, the Protocol to the North Atlantic Treaty on the Accession of the Republic of North Macedonia was signed and received U.S. Senate advice and consent to ratification in 2019. On March 27, 2020, North Macedonia deposited its instrument of accession with the United States as depositary. See State Department press statement, available at https://2017-2021.state.gov/north-macedonia-joins-the-nato-alliance/. North Macedonia acceded at the 30th member of NATO. The protocol is available at https://www.state.gov/20-319.

b. Status of Forces Agreement with Trinidad and Tobago On January 1, 2020, the extension of the U.S. status of forces agreement with Trinidad and Tobago entered into force via exchange of notes at Port of Spain on December 17,

678 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

2019 and January 30, 2020. The agreement is available at https://www.state.gov/trinidad_and_tobago-20-101.

c. Agreement with Supreme Headquarters Allied Powers Europe The Agreement Between the United States and the Supreme Headquarters Allied Powers Europe (“SHAPE”) entered into force January 2, 2020 after an exchange of letters at Casteau October 18, 2019 and January 2, 2020. The agreement is available at https://www.state.gov/shape-20-102.

d. Status of Forces Agreement with Antigua and Barbuda On January 24, 2020 the U.S. status of forces agreement with Antigua and Barbuda entered into force. The agreement was signed at Washington on March 12, 2014. The text of the agreement is available at https://www.state.gov/antigua_and_barbuda-20-124.

e. Greece Mutual Defense Cooperation Agreement On February 13, 2020, the agreement amending and extending U.S. defense cooperation with Greece, which was signed at Athens on October 5, 2019, entered into force. The agreement is available at https://www.state.gov/greece-20-213. The original defense cooperation agreement from 1990 was previously extended every year from 1998, to 2017.

f. Defense Agreement with the Netherlands on personnel in the Caribbean The U.S.-Netherlands defense agreement on the status of U.S. personnel in the Caribbean part of the Kingdom of the Netherlands entered into force on April 22, 2020. The agreement was effected by an exchange of notes at The Hague in 2018 and extends the application of a previous 2012 agreement with the Netherlands to Curacao. The text of the agreement is available at https://www.state.gov/netherlands_20-422.

g. Rwanda Status of Forces Agreement

On May 28, 2020, the Status of Forces Agreement with Rwanda entered into force upon signature at Kigali. The agreement is available at https://www.state.gov/rwanda-20-528.

h. Poland Enhanced Defense Cooperation Agreement

On August 15, 2020, in Warsaw, the United States and Poland signed an enhanced defense cooperation agreement (“EDCA”). The State Department fact sheet on the

679 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

EDCA is excerpted below and available at https://2017-2021.state.gov/u-s-poland-enhanced-defense-cooperation-agreement/. The EDCA entered into force on November 13, 2020 and is available at https://www.state.gov/poland-20-1113-enhanced-defense-cooperation-agreement/.

___________________

* * * *

The United States values our strong bilateral relationship with Poland. We look forward to

Poland’s swift ratification of the EDCA, which will permit us to implement fully the enhanced

defense cooperation [agreement]…

POLAND IS A CLOSE FRIEND OF THE UNITED STATES AND A LINCHPIN OF

REGIONAL SECURITY

• The U.S.-Poland relationship is strong and getting stronger. We are fellow democracies,

with a deep commitment to the rule of law, human rights, and individual freedom.

• Warsaw has been a strong NATO Ally since its accession to the Alliance in 1999, and

serves as a linchpin of regional security. Poland is a crucial strategic U.S. Ally in Central

Europe. Polish troops stand shoulder-to-shoulder with U.S. forces in Afghanistan and

elsewhere, and provide critical support to the Defeat-ISIS Campaign.

• The United States leads the enhanced Forward Presence battle group in Poland and

deploys a rotational Armored Brigade Combat Team under Operation Atlantic Resolve,

funded through the European Deterrence Initiative.

THE U.S.-POLAND EDCA PROVIDES THE LEGAL FRAMEWORK FOR OUR

COUNTRIES TO WORK TOGETHER

• The EDCA reflects the shared vision outlined in the joint declarations signed by

Presidents Trump and Duda in 2019, and reaffirmed during President Duda’s June 2020

visit to Washington, to deepen our defense cooperation.

• The EDCA supplements the 1951 NATO Status of Forces Agreement (SOFA) and

establishes a framework to enhance and modernize our capabilities, in support of the

NATO Alliance’s collective defense. The United States has similar agreements with other

NATO Allies such as Bulgaria, Hungary, and Romania.

• The EDCA outlines the legal status of U.S. forces in Poland and will provide the

necessary authorities for U.S. forces to access specific Polish military installations and

conduct activities for our mutual defense. This Agreement also supports expanded

infrastructure, and enables an increased U.S. military presence in Poland.

THE U.S.-POLAND EDCA WILL STRENGTHEN NATO AND INCREASE

TRANSATLANTIC SECURITY FOR DECADES TO COME

• The EDCA provides a mechanism for the sharing of logistical and infrastructure costs for

U.S. forces present in Poland. By creating a durable framework for even closer defense

cooperation with a crucial NATO Ally, it strengthens Eastern Flank security and

deterrence.

• Poland’s in-kind contributions under the EDCA will directly benefit the Polish economy.

For its part, the United States will continue to bear the costs of training, equipping, and

deploying U.S. forces to Poland, which is significantly higher than the cost of support

680 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

Poland invests in support of U.S. forces once they are in country. Together, these efforts

improved security and stability for both nations in a cost-effective way.

• The United States and Poland’s extensive coordination and consultation on defense

cooperation matters will be strengthened and streamlined by the EDCA.

* * * *

i. U.S.-Netherlands Defense Agreement The Agreement between the United States of America and the Kingdom of the Netherlands Establishing a Framework for Defense Cooperation Activities was signed July 2, 2018 at Washington and entered into force November 1, 2020 with the exchange of correcting notes. The agreement is available at https://www.state.gov/netherlands-20-1101.

j. Guatemala Status of Forces Agreement The United States-Guatemala Status of Forces Agreement was effected by an exchange of notes at Guatemala November 25 and December 1, 2020 and entered into force December 1, 2020. The agreement is available at https://www.state.gov/guatemala-20-1201.

4. International Humanitarian Law

a. UN Security Council resolution on humanitarian access in the DRC On December 18, 2020, the United States submitted, for the record, an explanation of vote on a draft resolution on the UN Organization Stabilization Mission in the Democratic Republic of the Congo (“MONUSCO”). The statement reflects the U.S. view that requirements in UN Security Council resolutions that parties provide "safe, rapid, and unhindered" humanitarian access should not be combined with the phrase “in accordance with international law,” because "safe, rapid, and unhindered" humanitarian access is not a requirement of international law in all circumstances. The statement follows and is available at https://usun.usmission.gov/explanation-of-vote-on-a-draft-resolution-on-the-un-organization-stabilization-mission-in-the-democratic-republic-of-the-congo/..

* * * *

We further appreciate the Council’s efforts to support MONUSCO’s gradual and responsible

transition and note the importance of ensuring that the DRC government, UN country team, and

other actors are prepared to take over the mission’s important tasks, such as early warning alert

networks.

681 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

However, we must clarify the U.S. position on the language in this resolution regarding

humanitarian access. The United States strongly supports the need for humanitarian access in

conflict areas, having backed language in numerous Security Council resolutions that demands

parties to a conflict provide safe, rapid, and unhindered access to humanitarian aid. Our words

are supported by our actions, as the United States has provided more funding for humanitarian

aid than any other country in the world — more than $10.5 billion last year.

Our concern in this resolution is related to changes made this year regarding how

international law is referred to in the humanitarian context. While the United States recognizes

that in certain circumstances States may have obligations related to humanitarian aid, there is no

universal and unlimited international legal obligation for States to allow and facilitate “safe,

rapid, and unhindered” humanitarian access. Therefore, the United States disagrees with the

insertion of the phrase “in accordance with international law” in paragraph 35 of this resolution,

where its placement suggests that safe, rapid, and unhindered humanitarian access is required by

international law without exception. Nonetheless, the United States remains a strong advocate, in

this Council and more generally, for States and parties to the conflict to allow and facilitate safe,

rapid, and unhindered humanitarian access. We invite other members of this Council to consult

with us regarding how we can maintain strong humanitarian access clauses in Security Council

resolutions while accurately capturing the law.

* * * *

b. Applicability of international law to conflicts in cyberspace On March 2, 2020, General Counsel Ney delivered remarks at the U.S. Cyber Command Legal Conference, addressing considerations for conducting legal reviews of U.S. military cyber operations. Mr. Ney’s remarks are excerpted below and available at https://www.defense.gov/Newsroom/Speeches/Speech/Article/2099378/dod-general-counsel-remarks-at-us-cyber-command-legal-conference/.

___________________

* * * *

I have two objectives today. First, I’ll offer a snapshot of how we in DoD are integrating

cyberspace into our overall national defense strategy. Second, I will summarize the domestic and

international law considerations that inform the legal reviews that DoD lawyers conduct as part

of the review and approval process for military cyber operations. We at DoD now have

considerable practice advising on such operations and are accordingly in a position to begin to

speak from experience to some of the challenging legal issues that cyber operations present.

To set the scene, when I talk about “cyberspace,” I am referring to “the interdependent

network of information technology infrastructures and resident data, including the Internet,

telecommunications networks, computer systems, and embedded processors and controllers.”

Physically, and logically, the domain is in a state of perpetual transformation. It enables the

transmission of data across international boundaries in nanoseconds—controlled much more by

individuals or even machines than by governments—spreading ideas to disparate audiences and,

in some cases, the generating of physical effects in far-flung places.

682 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

1. Today’s Cyber Threat Environment and DoD’s Response

* * * *

2. Framework for Legal Analysis

To evaluate the legal sufficiency of a proposed military cyber operation, we employ a

process similar to the one we use to assess non-cyber operations. We engage our clients to

understand the relevant operational details: What is the military objective we seek to achieve?

What is the operational scheme of maneuver and how does it contribute to achieving that

objective? Where is the target located? Does the operation involve multiple geographic

locations? What is the target system used for? How will we access it? What effects—such as loss

of access to data—will we generate within that system? How will those effects impact the

system’s functioning? Which people or processes will be affected by anticipated changes to the

system’s functioning? Are any of those likely to be impacted civilians or public services?

Answers to these questions will drive the legal analysis.

A. U.S. Domestic Law

Let’s take up considerations of U.S. domestic law first. We begin with the foundational

question of domestic legal authority to conduct a military cyber operation. The domestic legal

authority for the DoD to conduct cyber operations is included in the broader authorities of the

President and the Secretary of Defense to conduct military operations in defense of the nation.

We assess whether a proposed cyber operation has been properly authorized using the analysis

we apply to all other operations, including those that constitute use of force. The President has

authority under Article II of the U.S. Constitution to direct the use of the Armed Forces to serve

important national interests, and it is the longstanding view of the Executive Branch that this

authority may include the use of armed force when the anticipated nature, scope, and duration of

the operations do not rise to the level of “war” under the Constitution, triggering Congress’s

power to declare war. Furthermore, the Supreme Court has long affirmed the President’s power

to use force in defense of the nation and federal persons, property, and instrumentalities.

Accordingly, the President has constitutional authority to order military cyber operations even if

they amount to use of force in defense of the United States. Of course, the vast majority of

military operations in cyberspace do not rise to the level of a use of force; but we begin analysis

of U.S. domestic law with the same starting point of identifying the legal authority.

In the context of cyber operations, the President does not need to rely solely on his

Article II powers because Congress has provided for ample authorization. As I noted earlier,

Congress has specifically affirmed the President’s authority to direct DoD to conduct military

operations in cyberspace. Moreover, cyber operations against specific targets are logically

encompassed within broad statutory authorizations to the President to use force, like the 2001

Authorization for the Use of Military Force, which authorizes the President to use “all necessary

and appropriate force” against those he determines were involved in the 9/11 attacks or that

harbored them. Congress has also expressed support for the conduct of military cyber operations

to defend the nation against Russian, Chinese, North Korean, and Iranian “active, systematic, and

ongoing campaigns of attacks” against U.S. interests, including attempts to influence U.S.

elections.

In addition to questions of legal authority, DoD lawyers advise on the Secretary of

Defense’s authority to direct the execution of military cyber operations as authorized by the

President and statute, “including in response to malicious cyber activity carried out against the

683 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

United States or a United States person by a foreign power,” and to conduct related intelligence

activities. Our lawyers ensure that U.S. military cyber operations adhere to the President’s

specific authorizations as well as the generally applicable NSPM-13.

After concluding that the operation has been properly authorized, DoD lawyers assess

whether there are any statutes that may restrict DoD’s ability to conduct the proposed cyber

operation and whether the operation may be carried out consistent with the protections afforded

to the privacy and civil liberties of U.S. persons. To illustrate, I am going to talk about two

statutes and the First Amendment as examples of laws that we may consider, depending on the

specific cyber operation to be conducted.

* * * *

B. International Law

Those are some highlights of U.S. domestic law considerations that may be implicated by

proposed military cyber operations; let me turn now to international law.

We recognize that State practice in cyberspace is evolving. As lawyers operating in this

area, we pay close attention to States’ explanations of their own practice, how they are applying

treaty rules and customary international law to State activities in cyberspace, and how States

address matters where the law is unsettled. DoD lawyers, and our clients, engage with our

counterparts in other U.S. Government departments and agencies on these issues, and with Allies

and partners at every level—from the halls of the United Nations to the floors of combined

tactical operations centers—to understand how we each apply international law to operations in

cyberspace. Initiatives by non-governmental groups like those that led to the Tallinn Manual can

be useful to consider, but they do not create new international law, which only states can make.

My intent here is not to lay out a comprehensive set of positions on international law. Rather, as I

have done with respect to domestic law, I will tell you how DoD lawyers address some of the

international law issues that today’s military cyber operations present.

I will start with some basics. It continues to be the view of the United States that existing

international law applies to State conduct in cyberspace. Particularly relevant for military

operations are the Charter of the United Nations, the law of State responsibility, and the law of

war. To determine whether a rule of customary international law has emerged with respect to

certain State activities in cyberspace, we look for sufficient State practice over time, coupled

with opinio juris—evidence or indications that the practice was undertaken out of a sense that it

was legally compelled, not out of a sense of policy prudence or moral obligation.

As I discussed a few minutes ago, our policy leaders assess that the threat environment

demands action today—our clients need our advice today on how international legal rules apply

when resorting to action to defend our national interests from malicious activity in cyberspace,

notwithstanding any lack of agreement among States on how such rules apply. Consequently, in

reviewing particular operations, DoD lawyers provide advice guided by how existing rules apply

to activities in other domains, while considering the unique, and frequently changing, aspects of

cyberspace.

First, let’s discuss the international law applicable to uses of force. Article 2(4) of the

Charter of the United Nations provides that “All Members shall refrain in their international

relations from the threat or use of force against the territorial integrity or political independence

of any state, or in any other manner inconsistent with the Purposes of the United Nations.” At the

same time, international law recognizes that there are exceptions to this rule. For example, in the

684 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

exercise of its inherent right of self-defense a State may use force that is necessary and

proportionate to respond to an actual or imminent armed attack. This is true in the cyber context

just as in any other context.

Depending on the circumstances, a military cyber operation may constitute a use of force

within the meaning of Article 2(4) of the U.N. Charter and customary international law. In

assessing whether a particular cyber operation—conducted by or against the United States—

constitutes a use of force, DoD lawyers consider whether the operation causes physical injury or

damage that would be considered a use of force if caused solely by traditional means like a

missile or a mine. Even if a particular cyber operation does not constitute a use of force, it is

important to keep in mind that the State or States targeted by the operation may disagree, or at

least have a different perception of what the operation entailed.

Second, the international law prohibition on coercively intervening in the core functions

of another State (such as the choice of political, economic, or cultural system) applies to State

conduct in cyberspace. For example, “a cyber operation by a State that interferes with another

country’s ability to hold an election” or that tampers with “another country’s election results

would be a clear violation of the rule of non-intervention.” Other States have indicated that they

would view operations that disrupt the fundamental operation of a legislative body or that would

destabilize their financial system as prohibited interventions.

There is no international consensus among States on the precise scope or reach of the

non-intervention principle, even outside the context of cyber operations. Because States take

different views on this question, DoD lawyers examining any proposed cyber operations must

tread carefully, even if only a few States have taken the position publicly that the proposed

activities would amount to a prohibited intervention.

Some situations compel us to take into consideration whether the States involved have

consented to the proposed operation. Because the principle of non-intervention prohibits “actions

designed to coerce a State … in contravention of its rights,” it does not prohibit actions to which

a State voluntarily consents, provided the conduct remains within the limits of the consent given.

Depending on the circumstances, DoD lawyers may also consider whether an operation

that does not constitute a use of force could be conducted as a countermeasure. In general,

countermeasures are available in response to an internationally wrongful act attributed to a State.

In the traditional view, the use of countermeasures must be preceded by notice to the offending

State, though we note that there are varying State views on whether notice would be necessary in

all cases in the cyber context because of secrecy or urgency. In a particular case it may be

unclear whether a particular malicious cyber activity violates international law. And, in other

circumstances, it may not be apparent that the act is internationally wrongful and attributable to a

State within the timeframe in which the DoD must respond to mitigate the threat. In these

circumstances, which we believe are common, countermeasures would not be available.

For cyber operations that would not constitute a prohibited intervention or use-of-force,

the Department believes there is not sufficiently widespread and consistent State practice

resulting from a sense of legal obligation to conclude that customary international law generally

prohibits such non-consensual cyber operations in another State’s territory. This proposition is

recognized in the Department’s adoption of the “defend forward” strategy: “We will defend

forward to disrupt or halt malicious cyber activity at its source, including activity that falls below

the level of armed conflict.” The Department’s commitment to defend forward including to

counter foreign cyber activity targeting the United States—comports with our obligations under

international law and our commitment to the rules-based international order.

685 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

The DoD OGC view, which we have applied in legal reviews of military cyber operations

to date, shares similarities with the view expressed by the U.K. Government in 2018. We

recognize that there are differences of opinion among States, which suggests that State practice

and opinio juris are presently not settled on this issue. Indeed, many States’ public silence in the

face of countless publicly known cyber intrusions into foreign networks precludes a conclusion

that States have coalesced around a common view that there is an international prohibition

against all such operations (regardless of whatever penalties may be imposed under domestic

law).

Traditional espionage may also be a useful analogue to consider. Many of the techniques

and even the objectives of intelligence and counterintelligence operations are similar to those

used in cyber operations. Of course, most countries, including the United States, have domestic

laws against espionage, but international law, in our view, does not prohibit espionage per se

even when it involves some degree of physical or virtual intrusion into foreign territory. There is

no anti-espionage treaty, and there are many concrete examples of States practicing it, indicating

the absence of a customary international law norm against it. In examining a proposed military

cyber operation, we may therefore consider the extent to which the operation resembles or

amounts to the type of intelligence or counterintelligence activity for which there is no per se

international legal prohibition.

Of course, as with domestic law considerations, establishing that a proposed cyber

operation does not violate the prohibitions on the use of force and coercive intervention does not

end the inquiry. These cyber operations are subject to a number of other legal and normative

considerations.

As a threshold matter, in analyzing proposed cyber operations, DoD lawyers take into

account the principle of State sovereignty. States have sovereignty over the information and

communications technology infrastructure within their territory. The implications of sovereignty

for cyberspace are complex, and we continue to study this issue and how State practice evolves

in this area, even if it does not appear that there exists a rule that all infringements on sovereignty

in cyberspace necessarily involve violations of international law.

It also longstanding DoD policy that U.S. forces will comply with the law of war “during

all armed conflicts however such conflicts are characterized and in all other military operations.”

Even if the law of war does not technically apply because the proposed military cyber operation

would not take place in the context of armed conflict, DoD nonetheless applies law-of-war

principles. This means that the jus in bello principles, such as military necessity, proportionality,

and distinction, continue to guide the planning and execution of military cyber operations, even

outside the context of armed conflict.

DoD lawyers also advise on how a proposed cyber operation may implicate U.S. efforts

to promote certain policy norms for responsible State behavior in cyberspace, such as the norm

relating to activities targeting critical infrastructure. These norms are non-binding and identifying

the best methods for integrating them into tactical-level operations remains a work in progress.

But, they are important political commitments by States that can help to prevent miscalculation

and conflict escalation in cyberspace. DoD OGC, along with other DoD leaders, actively

supports U.S. State Department-led initiatives to build and promote this framework for

responsible State behavior in cyberspace. This includes participation in the UN Group of

Governmental Experts and an Open-Ended Working Group on information and communications

technologies in the context of international peace and security. These diplomatic engagements

686 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

are an important part of the United States’ overall effort to protect U.S. national interests by

promoting stability in cyberspace.

* * * *

On May 22, 2020, Ambassador Cherith Norman Chalet, acting deputy permanent representative to the UN, delivered the U.S. statement at a UN Security Council meeting on cyber stability and responsible state behavior in cyberspace, held via video teleconference. Ambassador Chalet’s remarks are excerpted below and available at https://usun.usmission.gov/remarks-at-a-un-security-council-arria-formula-meeting-on-cyber-stability-and-responsible-state-behavior-in-cyberspace-via-vtc/.

___________________

* * * *

The United States remains committed to working with all member states to safeguard the

extraordinary benefits of cyberspace. We must all redouble our efforts—and not just in New

York and Geneva—to create accountability for state actions in cyberspace. Cyberspace has

become a central and indispensable domain of global activity, and its protection through

responsible state behavior is critical to ensuring the maintenance of international peace and

security.

The United Nations began discussing the issue of international security in cyberspace in

the early 2000s. For years, the international community struggled to develop an appropriate and

functional framework for enhancing international peace and security in this domain. Since given

the nature of the technology, traditional arms control approaches were not entirely practical or

useful references. Nevertheless, through its three consensus reports in 2010, 2013, and 2015, the

UN Group of Governmental Experts succeeded at established a framework of responsible state

behavior to enable international cyber stability.

This framework consists of three parts: one, the applicability of international law to state

behavior in cyberspace; two, voluntary non-binding norms of state behavior applicable in

peacetime; and three, the implementation of practical Confidence Building Measures, or CBMs.

This framework is strong and sustainable because it is not tied to the current state of technology

and, therefore, not prone to becoming obsolete. It is focused on real-world effects of actions

taken by state actors in the cyberspace. Moreover, the General Assembly, by consensus, affirmed

all three GGE reports. Broad international consensus and the General Assembly’s strong and

repeated support around this framework is the signature accomplishment of our collective cyber

diplomacy over the past decade. These successes must be fully protected and observed.

In addition to the contributions of the UN GGE process, regional organizations, including

the OAS, OSCE, and the ASEAN Regional Forum, have also reinforced and enhanced this

framework. Those groups focused on improving regional security have made great strides in

implementing practical confidence building measures in their regions to improve cyber stability.

There’s no doubt that such measures can contribute substantially to conflict prevention and

stability, and we commend these organizations for their contributions to this effort. The United

States, like many others in the international community, share a vision for maintaining peace,

security, and stability in cyberspace. That is why in 2018, the United States reaffirmed its

687 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

commitment to this vision in our National Cyber Strategy, which commits the United States to

preserve and build upon this framework. It is also why working with other nations to help

strengthen their cyber capacity is an integral part of our approach.

Even though certain states appear willing to undermine this framework, universalizing it

is in all member states’ interests. We must work to ensure that states wanting to act responsibly

in cyberspace have the means to do so, which includes protecting their networks from malicious

state and non-state actors. In this regard, the United States pledges its continued support to

likeminded partners in their efforts to enhance cybersecurity and counter malicious cyber actors,

including combating cybercrime and strengthening public institutions’ protection from malicious

cyber actors.

These issues remain a top priority during the COVID-19 pandemic. We have witnessed

malicious cyber activity that appears designed to undermine the United States and our

international partners’ efforts to protect, assist, and inform the public during this global

pandemic. Malicious cyber activity that impairs the ability of hospitals and healthcare systems to

deliver critical services, for instance, could have deadly results. As noted in the framework,

states should refrain in peacetime from cyber activities that intentionally damage critical

infrastructure – including healthcare and public health services and other important public

services. When states do not abide by the framework of responsible state behavior, there will be

consequences.

In closing, let me be clear, the United States will continue to uphold the stability of

cyberspace and the framework, including through the Group of Governmental Experts and the

Open-Ended Working Group.

* * * *

B. CONVENTIONAL WEAPONS

Lethal Autonomous Weapons Systems (“LAWS”) On February 20, 2020, Attorney-Adviser in the State Department’s Office of the Legal Adviser Amanda Wall addressed the Rio Seminar on Autonomous Weapon Systems on the subject of “LAWS and Human-Machine Interaction.” Her remarks are excerpted below and available at http://funag.gov.br/biblioteca/download/laws_digital.pdf.

___________________

* * * *

I am a member of the U.S. delegation to meetings of the High Contracting Parties to the CCW

and the GGE on emerging technologies in the area of Lethal Autonomous Weapons Systems,

and have participated in the last several meetings in that capacity.

I am going to focus my presentation today on the views of the United States on human-

machine interaction in the area of LAWS. This has been a topic that has been discussed at some

length at the GGE, with a wide diversity of views presented, but having observed those debates

personally, my own view is that there is actually a lot more common ground between the

688 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

positions being expressed at the GGE, and the differences are not so vast as they might seem. In

fact, I would posit that the states participating at the GGE actually have a lot more in common

than they realize.

Let me also say, before I begin, that the United States remains fully supportive of the

work of the GGE and hopes to help to accomplish a strong, substantive outcome by the end of its

current two-year mandate in 2021.

In my time today, first, I am going to talk about how the United States understands

human-machine interaction in the area of emerging technologies in LAWS. Second, I am going

to spend a few minutes talking about why we think that the concept of “human control,” as some

have characterized it, does not fully capture the range of considerations that need to be

undertaken when developing policies and programs for responsible development and use of

LAWS, and why we think it actually may be an oversimplification of some of the very

complicated issues at stake. And, finally, I am going to say a few words about what, we would

argue, should be the focus of the GGE in this regard over the next two years. My remarks today

draw heavily from working papers and views that the U.S. delegation has presented to the GGE,

and, in particular, a U.S. working paper on human-machine interaction.

But to begin, I want to make one point as a legal matter. As Ambassador Candeas noted

in his introduction this morning, it is important to acknowledge first and foremost that IHL,

including the fundamental principles and rules of distinction, proportionality, military necessity,

and precautions in attack, continue to apply regardless of what type of weapon is used. This is

reflected in the GGE’s Guiding Principle (a), as well as in the GGE’s conclusion in paragraph

17(a) of the GGE’s 2019 report.2

In addition to helping assess whether a new weapon falls under a legal prohibition or how

IHL requirements apply, the fundamental principles of international humanitarian law may also

serve as a guide in answering novel ethical or policy questions in human-machine interaction that

are presented by these emerging technologies. For example, it may be appropriate to consider the

following:

• Does military necessity justify developing or using this new technology?

• Under the principle of humanity, does the use of this new technology reduce

unnecessary suffering?

• Are there ways that this new technology can enhance the ability to distinguish between

civilians and combatants?

• And, under the principle of proportionality, has sufficient care been taken to avoid

creating unreasonable or excessive incidental effects?

There has been broad consensus at the GGE that IHL is applicable to the use of force,

including the use of force that is reliant on autonomy or autonomous features and functions. But

how do we go about ensuring that the law, in particular IHL, is complied with in the use of these

weapons, and how do we develop good practices for responsible development and use of these

weapons?

Effectuating the intent of commanders and operators

A big part of the answer to this question rests in human-machine interaction, which is

what I have been asked to discuss today. From the U.S. perspective, the key issue for human-

machine interaction in emerging technologies in the area of LAWS is ensuring that machines

effectuate the intent of commanders and operators of the weapons systems. Weapons that do

what commanders and operators intend them to do can give effect to their specific intentions to

689 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

conduct operations in compliance with IHL and to minimize harm to civilians and civilian

objects.

Much of the U.S. policy and practice in this area is laid out in a 2012 Policy Directive

issued by our Department of Defense. It is DoD Directive 3000.09, titled “Autonomy in Weapon

Systems.” …

Let me elaborate upon the concept of good practices for effectuating the intent of

commanders and operators. It is not necessarily about having a human executing or controlling

every step of a weapon’s operation manually: this does not happen with many weapons systems

that have been in operation for decades. Instead, it is about taking practical steps that, among

other things, enable personnel to exercise judgment over the use of force in an armed conflict,

and reduce the risk of unintended combat engagements So, how do we develop and use weapons

in a way that ensures that weapons give effect to human intent? What measures should we take?

Measures to ensure the use of autonomy in weapon systems effectuates human

intentions

First, we need to think about how to minimize the probability and consequences of

failures in weapon systems that could lead to engagements that the commander and operators did

not intend. This could happen either because a weapon engaged a target that was not the intended

target, or because it created unacceptable levels of collateral damage. I would note that even an

attack against previously authorized targets could ultimately be “unintended” if there are

significant changes in circumstances between the time of authorization and when the weapon

engaged targets, such that the authorizing official no longer intended the targets to be engaged.

So there is a temporal aspect to it, as well.

There are a number of ways that guidelines in the development and use of weapon

systems can help minimize the probability and consequences of failures in weapon systems—

failures that could lead to unintended engagements. One example is that an autonomous system

might be programmed to operate only within specific geographic boundaries. If deployed and

limited to an area that was a military objective, like an enemy military headquarters complex,

then its use would be analogous to the use of other weapons, like artillery, that are often used to

target areas of land that qualify as military objectives. Another example might be an autonomous

weapon that is equipped with sensors that are designed to detect specific “signatures”—or

unique, identifying characteristics that would be specific to a military objective, like frequencies

of electromagnetic radiation that are generally not found in nature or among civilian objects.

Many states have already used weapons that detect the specific electromagnetic signals emitted

by enemy radar to help ensure that a target is a military objective. These are all examples of

ways that weapons can be developed and used to help effectuate the intent of a commander or

operator by minimizing the probability of unintended engagements and minimizing the

consequences of such engagements if they occur.

Second, we need to think about how to help ensure that weapon systems function as

anticipated. This includes engineering weapon systems to perform reliably. The DoD Directive

that I mentioned before puts in place requirements for verification and validation, and for testing

and evaluation of hardware and software to make sure that they function as anticipated. For

example, before fielding weapon systems that would use autonomy in novel ways, those reviews

must “assess system performance, capability, reliability, effectiveness, and suitability under

realistic conditions.” The Directive also requires “safeties, anti-tamper mechanisms, and

information assurance” to ensure that the weapon functions as it was anticipated to function,

690 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

namely by helping address and minimize the probability or consequence of failures that could

lead to unintended engagements or to loss of control of the system, by adversaries or others.

Third, we need to think about how to help ensure that personnel properly understand the

weapon systems. This includes training personnel, establishing clear human-machine interfaces,

and developing clear doctrine and procedures for use. Studies of accidents involving human use

of automation have shown that failures can often result from operator error, and that better

training and adherence to established tactics, techniques, and procedures and doctrine could have

prevented those mistakes. That is why the DoD Directive generally requires the establishment of

such “[t]raining, doctrine, and tactics, techniques, and procedures”—what we call TTPs. And,

before systems that employ autonomy in new ways are fielded, senior officials must determine

that “[a]dequate training, TTPs, and doctrine are available, periodically reviewed, and used by

system operators and commanders to understand the functioning, the capabilities, and the

limitations of the system’s autonomy in realistic operational conditions.”

Further to this end, the interface between humans and machines should be clear “[i]n

order for operators to make informed and appropriate decisions in engaging targets.” This is why

the DoD Directive requires the interface between people and machines for autonomous and

semi-autonomous weapon systems to:

(a) Be readily understandable to trained operators;

(b) Provide traceable feedback on system status; and

(c) Provide clear procedures for trained operators to activate and deactivate system

functions.

These are just some examples; there are a number of measures that can be taken to help

ensure that weapon systems that use autonomy are developed and used to effectuate human

intention in the use of force. These measures are outlined in greater detail in the working paper

referenced above, which I have provided to this conference and is also available on the CCW’s

website.

Why not “human control”?

One question you may be asking is, why not call this “human control”? After outlining

the policies that our own Department of Defense has in place with regard to the use of autonomy

in weapon systems, my hope is that people in the audience are thinking, well, that sounds a lot

like the measures that would be useful to ensure meaningful human control—because, as I said at

the outset, I think there is much common ground between the position that we have articulated

and the position that has been articulated by those who say we need a norm of meaningful human

control. But, I think there are some key reasons why the U.S. view is that “meaningful human

control” simply is not an adequate way to describe what is needed for responsible use and

development of LAWS, and we continue to think that the term “human control” risks obscuring

some of the genuine challenges that these technologies present.

First, no one can really agree on what “human control” means. In discussing this issue at

the GGE, there have been almost as many different ways of describing “human control” as there

have been delegations in the room. So it has not proven to be a useful construct for building

consensus among members of the GGE.

Second, it is also not a very useful umbrella term as a practical matter. How a weapon

system is controlled is often very specific to the particularities of that weapon system, and

control systems can vary greatly from system to system. This is part of the reason why past

regulation of weapons systems under IHL has not included broadly applicable standards for

691 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

weapon control—the concept in practice does not work very well across different types of

weapons.

Third, I believe the concept of human control mistakes the “means” for the “ends.”

Existing IHL instruments, such as the CCW and its Protocols, do not seek to enhance “human

control” as such. Instead, they seek to ensure that the use of those weapons is consistent with

IHL. Although control over a weapon system can be a useful way in certain circumstances to

ensure that a weapon system is used in compliance with IHL, it is not the only way or always the

best way to do so; that is, “control” is not, and should not be, a means in and of itself—but rather

one of many ways that states can consider in best effectuating human intent in the use of a

weapon system.

Some may say that it is important to emphasize “human control” because they view

developments in the use of automation or autonomy in weapons system as actually decreasing

human control over the use of force. And I think we would say that this emphasis is not

necessarily correct. Technical sophistication does not necessarily mean that there is any less

human involvement in the decision-making regarding how a weapon is used. In fact, the whole

point of some of this technology, for example, sensors and computers, is that it allows humans to

have more options for when, where, and how force is used; that is, essentially to make judgments

about using force and to have the operator’s intent and judgments effectuated by machines

without the operator being required to control every step of that machine’s process manually.

Automated or software control systems can also reduce the degree to which effectiveness in the

execution of those important decisions depends on the perception and skill of an operator, which

can be negatively impacted in combat by various factors, such as fatigue, fear, or deception. And

the use of “smart” weaponry with autonomous functions has actually, I believe, in many ways

increased the degree of control that states exercise over the use of force. For example, by

increasing the precision of the execution of decision-making, the operator arguably is ensuring

better control over the use of force, even though it is not through manual control of every step of

a weapon’s deployment and use. Theoretically, another way to think about it is that, if an

operator might be able to exercise control over every aspect of a weapon system, but the operator

is only reflexively pushing a button that is recommended to him or her by the system, the human

is not really exercising any judgment, even though the human operator is exercising control in

pushing a particular button. What we are looking for here is human intention and human

judgment, not necessarily control.

On the other hand, judgment can be implemented through the use of automation. For

example, use of algorithms or even autonomous functions that take control away from human

operators can better effectuate human intention and avoid accidents. One system that is a useful

case study is the Automatic Ground Collision Avoidance System, which was developed by the

U.S. Air Force in order to help prevent “controlled flight into terrain” accidents. The system

essentially assumes control of the aircraft when an imminent collision with the ground is

detected and then returns control back to the human pilot once the collision is averted. This can

help avoid accidents through an automatic feature that actually removes control by the human

operator briefly in certain circumstances. Another example would be certain defensive

autonomous weapon systems, such as the AEGIS Weapon System and Patriot Air and Missile

Defense System, which have autonomous functions that assist in targeting incoming

missiles. The machine can strike incoming projectiles with much greater speed or accuracy than

a human gunner could achieve manually—so, although the human may not manually control the

speed at which the machine is operating, the human is still exercising judgment over the use of

692 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

force. The machine is really just effectuating that intention and that judgment more efficiently

than a human could do so himself or herself.

Finally, some might argue that it is important to emphasize control because of concerns

that the use of autonomous weapons systems somehow removes individuals from responsibility

for decisions to use force, which are some of the gravest and most serious decisions that a human

being can make. But we do not believe this is true. Human actors are responsible for their

decisions to use force regardless of the nature of weapon used. The lack of manual control over a

weapon system does not remove this responsibility or create an accountability gap. This is, in

fact, recognized in the GGE’s second Guiding Principle. Machines may be able to synthesize

data and apply algorithms faster than a person could, and they may be able to do so more

accurately. But machines are not moral agents, and human beings do not escape responsibility

for their decisions by using a weapon with autonomous functions to execute those decisions, in

the same way that human beings do not escape responsibility for taking a life with a knife or a

gun rather than with their bare human hands.

So, there is no need to stigmatize autonomy as either preventing humans from being held

accountable for their decisions, or as inherently reducing control: autonomy does not necessarily

do either one.

What next for human-machine interaction?

So, with all of this said, what should come next with regard to human-machine

interaction? The reality is that technology

is developing rapidly, and standards developed based on our understandings today could be

obsolete by tomorrow. So, we need to focus on how to ensure that weapons incorporating those

technologies are used in compliance with IHL, and used responsibly, tomorrow. How can we do

that?

The U.S. view is that states should take a proactive approach in addressing human-

machine interaction. States seeking to develop new uses for autonomy in weapon systems should

be affirmatively trying to identify and address these issues in their respective processes for

managing the life-cycle of the weapons. One way to do this is to emphasize the importance of

weapons review policies and practices—if states are thoroughly and properly conducting reviews

of their systems during development and prior to use, they can assess whether the specifics of

that system can be used consistently with IHL rules and principles, and can be used in a

responsible manner.

For example, the DoD Directive requires senior officials to review weapon systems that

use autonomy in new ways. This review, which is additional to the normal weapons review

processes, is required before a system enters formal development and, again, before fielding, to

ensure that military, acquisition, legal, and policy expertise is brought to bear as these new types

of weapons are being developed. You have heard me mention reviews several times during the

course of my remarks today, but I will say it once more: robust review policies and procedures to

ensure lawful and responsible use are one of the most effective ways we can think of to ensure

that weapons that are developed tomorrow, and next week, and next year, are used lawfully and

responsibly.

Another way to do this is by working to clarify how existing IHL applies to particular

systems—the United States developed a paper for the GGE in March 2019 that worked through

three general scenarios for the use of autonomous functions in weapon systems and how IHL

would apply to those three scenarios. More work could be done on this if states are willing to

693 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

share their intended use scenarios and their interpretations of how IHL would apply in such

cases.

But in our view, there is no better place to do this than in the GGE—and the United

States continues to see real value in the conversations that are happening at the GGE, talking

through these very difficult issues in a forum that includes technological, military, and legal

experts from governments, as well as participation by those from outside of governments. The

GGE is really a remarkable and unique venue: a standing body with a mandate to discuss this

extremely complicated, politically fraught topic in a non-politicized way that is grounded in IHL.

Where else do we have a body so well-suited to be working through these difficult issues? And,

in that light, the United States looks forward in particular to continuing these conversations over

the course of the next two years. And we look forward to contributing to a strong outcome before

the end of the current two-year mandate of the GGE. Thank you.

* * * *

On September 11, 2020, the United States provided a statement at the group of government experts (“GGE”) in Geneva on “further consideration of the human element in the use of lethal force and aspects of human-machine interaction in the development, deployment and use of emerging technologies in the area of LAWS.” The statement is excerpted below and available at https://geneva.usmission.gov/2020/09/30/group-of-governmental-experts-on-lethal-autonomous-weapons-systems-laws-agenda-item-5c/.

___________________

* * * *

The United States recognizes the keen interest many GGE participants have expressed in

discussing further the human element and aspects of human-machine interaction in the

development and use of emerging technologies in the area of LAWS. We agree that these are

topics upon which further common understandings can and should be built, given the range of

views currently expressed by various States. We believe that Guiding Principle (c) is an excellent

basis on which we can build these additional common understandings. This guiding principle

recognizes that human-machine interaction should ensure IHL compliance, and also recognizes

the need to consider human-machine interaction comprehensively, across the life cycle of the

weapon system. Therefore, in our view, a positive next step for the GGE in this area would be to

elaborate on good practices in human-machine interaction that can strengthen compliance with

IHL.

In our commentary on Guiding Principle (c), the United States proposed a new

conclusion on human-machine interaction for the GGE’s consideration, along these lines. It

begins by stating that:

“Weapons systems based on emerging technologies in the area of LAWS should

effectuate the intent of commanders and operators to comply with IHL, in particular, by avoiding

unintended engagements and minimizing harm to civilians and civilian objects.”

This conclusion is drawn from real-world practice in human-machine interaction and also

recognizes that IHL imposes requirements on human beings. Therefore, good practices in

human-machine interaction to strengthen compliance with IHL should effectuate human beings’

694 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

intent to comply with IHL. Our commentary then goes on to elaborate three categories of

measures to effectuate this objective:

a. Weapons systems based on emerging technologies in the area of LAWS should be

engineered to perform as anticipated. This should include verification and validation and testing

and evaluation before fielding systems.

b. Relevant personnel should properly understand weapons systems based on emerging

technologies in the area of LAWS. Training, doctrine, and tactics, techniques, and procedures

should be established for the weapon system. Operators should be certified by relevant

authorities that they have been trained to operate the weapon system in accordance with

applicable rules. And,

c. User interfaces for weapons systems based on emerging technologies in the area of

LAWS should be clear in order for operators to make informed and appropriate decisions in

engaging targets. In particular, interface between people and machines for autonomous and semi-

autonomous weapon systems should: (i) be readily understandable to trained operators;

(ii) provide traceable feedback on system status; and (iii) provide clear procedures for trained

operators to activate and deactivate system functions.

We are interested in the views of GGE participants on these proposed new conclusions,

which reflect good practices that can strengthen compliance with IHL. These proposed new

conclusions provide the basis for more detailed discussion regarding good practices in

engineering weapons systems, training personnel, and human-machine interfaces. We hope the

GGE can productively articulate good practices that can strengthen compliance with IHL as a

means of developing consensus recommendations on the issue of human-machine interaction.

Human responsibility is a critical dimension of the human element in the use of lethal

force.

We also believe it would be productive for the GGE to address how well-established

international legal principles of State and individual responsibility apply to States and persons

who use weapon systems with autonomous functions. In its commentary on Guiding Principle

(b), the United States has proposed eight new conclusions along these lines for the GGE’s

consideration.

1. Under principles of State responsibility, every internationally wrongful act of a State,

including such acts involving the use of emerging technologies in the area of LAWS, entails the

international responsibility of that State.

2. A State remains responsible for all acts committed by persons forming part of its

armed forces, including any such use of emerging technologies in the area of LAWS, in

accordance with applicable international law.

3. An individual, including a designer, developer, an official authorizing acquisition or

deployment, a commander, or a system operator, is responsible for his or her decisions governed

by IHL with regard to emerging technologies in the area of LAWS.

4. Under applicable international and domestic law, an individual remains responsible for

his or her conduct in violation of IHL, including any such violations involving emerging

technologies in the area of LAWS. The use of machines, including emerging technologies in the

area of LAWS, does not provide a basis for excluding legal responsibility.

5. The responsibilities of any particular individual in implementing a State or a party to a

conflict’s obligations under IHL may depend on that person’s role in the organization or military

operations, including whether that individual has the authority to make the decisions and

judgments necessary to the performance of that duty under IHL.

695 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

6. Under IHL, a decision, including decisions involving emerging technologies in the

area of LAWS, must be judged based on the information available to the decision-maker at the

time and not on the basis of information that subsequently becomes available.

7. Unintended harm to civilians and other persons protected by IHL from accidents or

equipment malfunctions, including those involving emerging technologies in the area of LAWS,

is not a violation of IHL as such. And,

8. States and parties to a conflict have affirmative obligations with respect to the

protection of civilians and other classes of persons under IHL, which continue to apply when

emerging technologies in the area of LAWS are used. These obligations are to be assessed in

light of the general practice of States, including common standards of the military profession in

conducting operations.

We look forward to discussing these and other proposals with other delegations.

* * * *

On September 19, 2020, the United States provided a statement at the GGE on “possible options for addressing the humanitarian and international security challenges posed by emerging technologies in the area of LAWS.” The statement is available at https://geneva.usmission.gov/2020/09/30/group-of-governmental-experts-on-lethal-autonomous-weapons-systems-laws-agenda-item-5e/ and excerpted below.

___________________

* * * *

At the outset, the United States wishes to recognize that one of the principal humanitarian and

international security challenges posed by emerging technologies in the area of LAWS, is how to

use these emerging technologies to achieve humanitarian and security benefits. For example,

guiding principle (h) recognizes that emerging technologies in the area of LAWS can be used to

uphold compliance with IHL. Technology can present risks and opportunities, and taking

advantages of those opportunities can be as important as minimizing risks.

One theme that we have emphasized, and that Ambassador Karklins also mentioned

during his presentation, for the GGE to consider is that form must follow function. It would be

counterproductive to determine what form the outcome our work should take before we work

through the substantive issues. We have proposed in our national commentaries and in our

remarks on the other agenda items substantive conclusions for the GGE to consider. While we

continue to support the Chair’s proposal for substantive intercessional work, we fully understand

the need for this work to be as inclusive as possible and are ready to engage on the substance of

these issues with the appropriate modalities.

That said, in the discussions so far, we have not been persuaded that a new treaty is

necessary because we believe existing IHL provides a robust and coherent framework for the

regulation of emerging technologies in the area of LAWS. In addition, we must be cautious

about predicting the course of technological developments, which are rapid and ongoing. It

makes sense to explore formats that allowed for continued discussion, refinement, and iteration.

We would not want to codify conclusions that would be rendered obsolete in light of

technological developments.

696 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

The GGE has done significant work in elaborating guiding principles, and we continue to

believe that the Guiding Principles have offered parties to the CCW the best vehicle for

clarifying and further developing the normative framework that is immediately available to

parties as they navigate emerging technologies in the area of LAWS. We disagree that these

principles’ utility is limited to guiding the work of the GGE—the decision to endorse the

Guiding Principles at last year’s meeting of High Contracting Parties was intended to begin a

broader process of providing parties to the CCW with meaningful outcomes. But we are glad that

there continues to be consensus that the Guiding Principles serve as the foundation for the

GGE’s work. We should continue the very successful approach that we took last year of

considering how we can elaborate on the guiding principles. To that end, we have proposed

further work on guiding principle (a) by clarifying IHL requirements and by articulating how

principles of State and individual responsibility apply. But we also think the GGE should be

compiling and elaborating upon good practices under other Guiding Principles.

For example, Guiding Principle (d) recognizes that State and individual responsibility

must be ensured through the effective implementation of accountability measures, including the

military chain of command. In its commentary on Guiding Principle (d), the United States has

proposed a number of general practices to help ensure accountability in military operations,

including operations involving the use of emerging technologies in the area of LAWS. These

include:

a. Conducting operations under a clear operational chain of command; and

b. Subjecting members of the armed forces to a system of military law and discipline.

The United States has also proposed practices with respect to the use of weapons

systems, including those based on emerging technologies in the areas of LAWs, which can

promote accountability. These are:

a. Rigorous testing of and training on the weapon system, so commanders and operators

understand the likely effects of employing the weapon system.

b. Establishing procedures and doctrine applicable to the use of the weapon system,

which provide standards for commanders and operators on responsible use and under which they

can be held accountable under the State’s domestic law.

c. Using the weapon system in accordance with training, doctrine, and procedures and

refraining from unauthorized uses or modifications of the weapons system.

Additionally, Guiding Principle (e) reaffirms the importance of a robust practice of

conducting reviews of the legality of weapons. Such reviews are a good practice to facilitate the

implementation of international law applicable to weapons and their use in armed conflict, and

can also help ensure that their humanitarian and security benefits are realized, and any risks

mitigated. To that end, the United States has proposed in its commentary on Guiding Principle

(e) a number of good practices for the legal review of weapons systems.

I highlight a few in particular to this discussion:

1. Legal advisers should be consulted regularly in the development or acquisition process

so that legal issues can be identified and more in-depth reviews can be conducted where

necessary. A weapon system under modification should be reviewed to determine whether the

modification poses any legal issues. New concepts for the employment of existing weapons

should also be reviewed, when such concepts differ significantly from the intended uses that

were considered when those systems were previously reviewed.

* * * *

697 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

5. The legal review should advise those developing or acquiring the weapon system or its

concepts of employment to consider potential measures to reduce the likelihood that use of the

weapon will cause harm to civilians or civilian objects. And,

6. Persons conducting the legal review should understand the likely effects of employing

the weapon in different operational contexts. Such understandings should be produced through

realistic system developmental and operational test and evaluation.

Bearing in mind national security considerations or commercial restrictions on

proprietary information, we also believe the GGE should recommend that States share good

practices on weapons reviews or legal reviews of particular weapons where appropriate.

Finally, both Guiding Principle (f) and Guiding Principle (g) provide an excellent starting

point for addressing humanitarian and security challenges that may arise. Risk assessments, in

particular, allow for a weighing of the benefits of the emerging technologies against potential

risks and also allow for adjustments to be made as further research and development occurs. Risk

assessments can also support the training of commanders and operators by helping them

understand the function, capabilities, limitations, and likely effects of using a weapon system.

The GGE should consider building on the work reflected in paragraphs 23(a) and 23(b) of its

2019 report by further cataloging potential risks and mitigation measures that should be

considered in the design, development, testing, and deployment of weapons systems based on

emerging technologies in the area of LAWS.

* * * * On September 21, 2020, the United States provided a statement on the potential

challenges to international humanitarian law (“IHL”) posed by emerging technologies in the area of LAWS. The statement is excerpted below and available at https://geneva.usmission.gov/2020/09/30/group-of-governmental-experts-on-lethal-autonomous-weapons-systems-laws-agenda-item-5a/.

* * * *

Thank you, Mr. Chair. The United States appreciates the focus of this agenda item on the

application of IHL to emerging technologies in the area of lethal autonomous weapons systems

(LAWS). Guiding Principle (a) reflects the foundational premise that IHL applies to these

weapons, and the GGE’s 2019 report contains significant conclusions on IHL. Of course, much

more work can be done on IHL. This work on understanding how IHL applies is critical to

effectively implementing the other guiding principles, including guiding principles (b), (c), (d),

(e), and (h).

Indeed, reaching common understanding on what existing IHL requires could also help

us re-solve diverging perspectives on whether new law or norms are needed, as such an effort

would help us to better understand our respective legal positions and determine whether these

diverging perspectives are based on different understandings of the requirements imposed by

existing law.

Mr. Chair, the GGE should build on its successful work on IHL by further clarifying IHL

re-quirements applicable to the use of emerging technologies in the area of LAWS. In our

national commentary to Guiding Principle (a), we have proposed that this be done by considering

698 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

how militaries have generally used autonomous functions in weapon systems and articulating

conclu-sions about these general use scenarios.

In particular, we propose examining how the following uses of emerging technologies in

the area of LAWS can be consistent with IHL:

1. Using autonomous functions to effectuate more accurately and reliably a commander

or operator’s intent to strike a specific target or target group;

2. Using emerging technologies in the area of LAWS to inform decision-making.

3. Using weapons systems that autonomously select and engage targets where the human

operator has not expressly intended to strike a specific target or group of targets when ac-tivating

the weapon system.

These use scenarios frame a number of questions that are worth further exploration, such

as: when is it consistent with IHL for a decision-maker to rely on a machine assessment to

consider a target to be a military objective? What factors should inform a proportionality

assessment re-garding the employment of weapons systems that autonomously

select and engage targets?

We have proposed conclusions on these and other issues. For example, we propose that

the GGE build on last year’s report, which recognized the importance of precautions, by

elaborating on the

types of precautions that States have employed in weapon systems with autonomous

functions. On page 4 of our national commentary, we proposed the following:

Feasible precautions must be taken in use of weapon systems that autonomously select

and engage targets to reduce the expected harm to civilians and civilian ob-jects. Such

precautions may include:

i. Warnings (e.g., to potential civilian air traffic or notices to mari-ners);

ii. Monitoring the operation of the weapon system; and

iii. Activation or employment of self-destruct, self-deactivation, or self-neutralization

mechanisms (e.g., use of rounds that self-destruct in flight or torpedoes that sink to the bottom if

they miss their targets).

Reaching more granular understandings like this of IHL requirements would strengthen

the nor-mative and operational framework. For example, it would improve our ability to conduct

legal review of weapons, to train personnel to comply with IHL requirements, and to apply

principles of State and individual responsibility.

We plan to discuss the issue of human-machine interaction in greater detail during the

appropriate agenda item later this week, but let me just note that in our view, IHL does not

establish a requirement for “human control” as such. Rather, IHL seeks, inter alia, to ensure the

use of weapons is consistent with the fundamental principles and requirements of distinction,

proportionality, and precautions.

The application of IHL to emerging technologies in the area of LAWS is a critical topic,

and we welcome today’s discussion and continued discussions with other delegations regarding

the more technical legal conclusions that we’ve proposed in working papers and our national

commentary regarding how IHL applies in these three use scenarios. In particular, we would

welcome more focused discussions with legal experts on these issues as part of our ongoing

work.

* * * *

699 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

On September 22, 2020, the United States provided a statement at the GGE on, “characterization of the systems under consideration in order to promote a common understanding on concepts and characteristics relevant to the objectives and purposes of the Convention.” The statement is excerpted below and available at https://geneva.usmission.gov/2020/09/30/group-of-governmental-experts-on-lethal-autonomous-weapons-systems-laws-agenda-item-5b/

___________________

* * * *

The United States continues to support identifying general characteristics of systems that are

under the GGE’s consideration in order to facilitate the GGE’s understanding of the relevant

concepts and issues. The flexibility inherent in this approach of identifying characteristics is

important given that scientists and engineers continue to develop new technological

advancements and that our understanding continues to improve. This discussion could also help

delegations understand better what we mean by the terms we are using. Some delegations may be

using the same term to mean different things or some delegations may be using different terms to

mean the same thing.

In identifying characteristics of LAWS, we must not prejudice future decisions regarding

potential outcomes. For example, characteristics should be identified in order to promote

common understandings, not with a view towards advancing a particular policy objective, like a

ban. Similarly, we must be cautious not to make hasty judgments about the value or likely effects

of emerging or future technologies. Frequently, we may change our views of technologies over

time as we gain more experience with them.

In discussing the general characteristics of such systems, we must not lose sight of the

fact that no matter their level of sophistication or how many autonomous features or functions

they have, these weapons systems are tools for human use. Guiding Principle (i) reminds us of

this, stating: “In crafting potential policy measures, emerging technologies in the area of lethal

autonomous weapons systems should not be anthropomorphized.”

In particular, anthropomorphizing emerging technologies in the area of LAWS can lead

to legal and technical misunderstandings that could be detrimental to the efficacy of potential

policy measures. From a technical perspective, anthropomorphizing emerging technologies in the

area of LAWS can lead to mis-estimating machine capabilities. From a legal perspective,

anthropomorphizing emerging technologies in the area of LAWS can obscure the important point

that IHL imposes obligations on States, parties to a conflict, and individuals, rather than

machines. “Smart” weapons cannot violate IHL any more than “dumb” weapons can. Similarly,

machines are not intervening moral agents, and human beings do not escape responsibility for

their decisions by using a weapon with autonomous functions. Anthropomorphizing emerging

technologies in the area of LAWS could incorrectly suggest a diminished responsibility of

human beings simply by the use of emerging technologies in the area of LAWS.

The U.S. Department of Defense policy directive on the use of autonomy in weapon

systems establishes definitions of an “autonomous weapon system” and “semi-autonomous

weapon system” for the purposes of that policy directive. These definitions focus on what we

believe to be the most important issues posed by the use of autonomy in weapon systems — i.e.,

people who employ these weapons can rely on the weapon systems to select and engage targets.

700 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

We will not repeat the specific definitions today, but, for reference, those definitions are

reproduced in the U.S. working paper from November 2017.

In discussing concerns about autonomous weapons, it may be important consider whether

these concerns are fundamentally about the type of weapon system or whether the concerns are

about how weapons systems are used. For example, consider a missile with automated target

recognition capabilities that can select and engage enemy tanks. In one scenario, an operator

identifies a specific target and fires the missile at this target. Under the definitions applied by the

U.S. military, this is a semi-autonomous weapon system. That same weapon system and

capability could, however, be classified as an autonomous system if it is used in a different way.

If the operator does not identify a specific tank, but instead fires the weapon to loiter in an area

and autonomously select and engage tanks, the weapon is classified as an autonomous weapon in

U.S. military practice. The weapon system’s technical characteristics are the same, but how it is

to be used changes whether it is classified as autonomous or semi-autonomous.

Some delegations this morning and yesterday have raised concerns about LAWS being

inherently unpredictable and in the spirit of the interactive discussion that our Chair has invited, I

would ask them to consider whether this concern is based on a characteristic of the weapon

system or whether it is actually based on assumptions about how those weapon systems would be

used. We believe that making progress in our discussions involves developing our common

understanding of how emerging technologies in the area of LAWS can be used consistent with

IHL, and the conclusions we have proposed in our national commentary on guiding principle (a)

try to do that.

* * * *

C. DETAINEES

Al Qahtani v. Trump Mohammed al Qahtani, a Guantanamo detainee, filed a motion in his habeas case asking the court to order the government to conduct a mixed medical commission (“MMC”) to determine his entitlement to repatriation due to his medical issues. Al Qahtani contended that he was eligible for an MMC under Army Regulation AR 190-8, which implements certain international legal obligations applicable in international armed conflicts. The district court ruled in al Qahtani's favor, finding that he is covered by AR 190-8 and ordering the Department of Defense to establish an MMC to evaluate him. Al-Qahtani v. Trump, 443 F.Supp.3d. 116 (D.D.C. 2020). The U.S. government appealed to the D.C. Circuit. The government also moved for a stay pending appeal. The D.C. Circuit granted al Qahtani’s motion to dismiss the appeal on September 29, 2020. Excerpts from the U.S. government’s opposition to al Qahtani’s motion to dismiss are below.* The brief is available at https://www.state.gov/digest-of-united-states-practice-in-international-law/.

___________________

* Editor’s note: On January 11, 2021, the Secretary of the Army issued an “Exception Memorandum,” providing that

AR 190-8 does not apply to any of the detainees presently at the Guantanamo Bay detention facility.

701 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

* * * *

1. a. The Third Geneva Convention establishes rules for the treatment of prisoners of war. The

full protections of the Convention apply to international armed conflicts—that is, to “all cases of

declared war or of any other armed conflict which may arise between two or more of the High

Contracting Parties.” Third Geneva Convention, art. 2. In such conflicts, the Convention applies

even if “one of the Powers in conflict may not be a party to the Convention.” Id. “[T]he Powers

who are parties [to the Convention]” shall “be bound by the Convention in relation to the said

[non-party] Power, if the latter accepts and applies the provisions thereof.” Id. (emphasis added).

By contrast, the full protections of the Convention do not apply to non-international

armed conflicts. “In the case of armed conflict not of an international character,” parties are only

“bound to apply, at a minimum,” certain provisions enumerated in Article 3 of the Convention

that relate to the humane treatment of detainees. Id., art. 3; see generally Hamdan v. Rumsfeld,

548 U.S. 557, 629-31 (2006).

The United States’s conflict with al-Qaida is a non-international armed conflict. Al-Qaida

is a terrorist organization, not a State that is a High Contracting Party to the Third Geneva

Convention. Furthermore, “[n]on-state actors such as al-Qaida” are not “‘Power[s]’ that would

be eligible under Article 2 . . . to secure protection by complying with the Convention’s

requirements.” Hamdan v. Rumsfeld, 415 F.3d 33, 44 (D.C. Cir. 2005) (Williams, J., concurring),

cited approvingly by Hamdan, 548 U.S. at 630. And in any event, al-Qaida neither accepts nor

applies the Convention’s provisions. The full protections of the Convention thus do not apply to

enemy combatants who are part of al-Qaida, as al-Qaida’s members are not entitled to prisoner-

of-war status under the Convention. See White House Press Secretary Announcement of

President Bush’s Determination Re Legal Status of Taliban and Al Qaeda Detainees (Feb. 7,

2002), https://2009-2017.state.gov/s/l/38727.htm. The Convention only obliges the United States

to apply the provisions of Article 3.

b. The Third Geneva Convention requires the parties to an international armed conflict to

repatriate “seriously wounded and seriously sick prisoners of war.” Third Geneva Convention,

art. 109. The Convention’s repatriation provisions are not enumerated in Article 3.

To implement the Convention’s medical-repatriation provisions, the Convention calls for

the appointment of mixed medical commissions to “examine sick and wounded prisoners of war,

and to make all appropriate decisions regarding them.” Id. art. 112. The “appointment, duties,

and functions of these Commissions” are set forth in Annex II to the Convention. Id.

Annex II requires each mixed medical commission to have three members. Third Geneva

Convention annex II, art. 1. One member must be appointed by the detaining power. Id. The two

others “shall belong to a neutral country,” id.; “shall be appointed by the International

Committee of the Red Cross, id. annex II, art. 2; and “shall be approved by the Parties to the

conflict,” id. annex II, art. 3. If the International Committee of the Red Cross cannot arrange for

the appointment of neutral members, such appointment “shall be done by the Power protecting

the interests of the prisoners of war to be examined.” Id. annex II, art. 5. The commission’s

decisions “shall be made by a majority vote,” id. annex II, art. 10, and must be executed by the

detaining power “within three months of the time when it receives due notification of such

decisions,” id. annex II, art. 12.

c. The United States is a High Contracting Party to the Third Geneva Convention. To

carry out the government’s treaty obligations, the Secretaries of the Army, Navy, and Air Force

issued Army Regulation 190-8. This regulation “implements international law” relating to enemy

702 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

prisoners of war and other categories of individuals detained by the U.S. armed forces. AR 190-8

§ 1-1(b); see id. § 1-1(b)(4) (“In the event of conflicts or discrepancies between this regulation

and the Geneva Conventions, the provisions of the Geneva Conventions take precedence.”).

Section 3-12 of the regulation provides for the establishment of mixed medical commissions “to

determine cases eligible for repatriation.” Id. § 3-12(a)(2). The procedures governing those

commissions are based on those specified by Annex II of the Convention. Id.

Section 3-12 states that, to be eligible for examination and potential repatriation, an

individual must fall into one of two categories: Enemy Prisoners of War or Retained Personnel.

AR 190-8 § 3-12(h). The glossary to AR 190-8 defines “Enemy Prisoners of War” as “detained

person[s] as defined in Articles 4 and 5 of the [Third] Geneva Convention,” and in particular, as

individuals “who, while engaged in combat under orders of [their] government, [are] captured by

the armed forces of the enemy.” Id., glossary, sec. II. The glossary defines “Retained Personnel”

as “medical personnel” meeting certain requirements; “[c]haplains”; and “[s]taff of National Red

Cross societies and other voluntary aid societies duly recognized and authorized by their

governments.” Id.; see id. § 3-15(b).

The glossary also addresses “Other Detainee[s].” AR 190-8, glossary, sec. II. “Other

Detainees” are “[p]ersons in the custody of the U.S. Armed Forces who have not been classified

as . . . [Enemy Prisoners of War] (article 4, [GC III]), [Retained Personnel] (article 33, [GC III],

or [Civilian Internees] (article 78, [Fourth Geneva Convention]).” Id.1 Other Detainees “shall be

treated as [Enemy Prisoners of War] until a legal status is ascertained by competent authority.”

Id.20

2. Petitioner Mohammed al Qahtani is a Saudi Arabian national detained at Guantanamo

Bay. In 2005, petitioner filed a habeas petition alleging that his detention was unlawful. The

government responded with a factual return explaining that petitioner—a member of al-Qaida

who unsuccessfully attempted to enter the United States to participate in the September 11

attacks—is being detained pursuant to the 2001 Authorization for Use of Military Force as

informed by the laws of war. Petitioner has not yet filed a traverse challenging the factual basis

for his detention. Petitioner’s habeas case has been stayed at his request since 2010.

* * * *

20 A civilian internee is a “civilian who is interned during armed conflict or occupation for security reasons or for

protection or because he has committed an offense against the detaining power.” AR 190-8, glossary, sec. II. The

regulation does not provide for the examination of civilian internees by a mixed medical commission. Id. § 3-12(h).

703 DIGEST OF UNITED STATES PRACTICE IN INTERNATIONAL LAW

Cross References International crime issues relating to cyberspace, Ch. 3.B.6 CSW resolution on Women and Children Hostages in Armed Conflicts, Chapter 6.B.2.b Children in Armed Conflict, Chapter 6.C Cyber activity sanctions, Ch. 16.A.8 & 16.A.11 Afghanistan, Ch. 17.B.2 U.S. export policy for unmanned aerial systems (“UAS”), Ch. 19.C.2