ebook img

DTIC ADA618714: Covert Action: Title 10, Title 50, and the Chain of Command PDF

0.43 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview DTIC ADA618714: Covert Action: Title 10, Title 50, and the Chain of Command

Navy SEALs and Afghan commandos conduct village clearing operation in Shah Wali Kot district, Kandahar Province Covert Action ok) Title 10, Title 50, and the Chain of Command ho S P. el ni a D my ( By J o s e p h B . B e r g e r I I I S. Ar U. R ecent media reports have that he had directed “the[n] Director of the the military operation that went in and got bin Pentagon officials considering CIA [Leon Panetta], to make the killing or Laden.5 “putting elite special operations capture of bin Laden the top priority of our troops under CIA [Central war against al Qaeda” and that the operation, Despite his self-effacing trumpeting Intelligence Agency] control in Afghanistan carried out by a “small team of Americans” of Vice Admiral McRaven’s role, Panetta’s after 2014, just as they were during last year’s was done “at [his] direction [as President].” In comment highlights that critical confusion raid on [Osama bin Laden’s] compound.”1 the following days, senior executive branch exists among even the most senior U.S. leaders This shell game would allow Afghan and U.S. officials garrulously provided explicit details, about the chain of command and the appro- officials to deny the presence of American from the now-iconic White House Situation priate classification of such operations. troops in Afghanistan because once “assigned Room photograph to intricate diagrams of Openly describing the raid as both a to CIA control, even temporarily, they become the Abbottabad compound and the assault “covert operation” and “military operation,” spies.”2 Nearly simultaneously, Department force’s composition. Most noteworthy was Panetta asserted he was the “commander,” of Defense (DOD) leaders were warned to Panetta’s unequivocal assertion the raid was a describing a chain of “command” that went “be vigilant in ensuring military personnel covert action: from the President to Panetta to McRaven. are not inappropriately utilized” in perform- Panetta’s public comments are problematic, ing “new, expanding, or existing missions,” Since this was what’s called a “Title 50” opera- as is describing a chain of command that ensuring the force is aligned against strategic tion, which is a covert operation, and it comes excludes the Secretary of Defense and pur- choices “supported by rigorous analysis.”3 directly from the president of the United States ports to route command authority through the Placing Servicemembers—uniformed who made the decision to conduct this opera- CIA director. Title 50 is clear: members of the Army, Navy, Marine Corps, tion in a covert way, that direction goes to me. and Air Force—under CIA control demands And then, I am, you know, the person who The term “covert action” means an activity such rigorous analysis. The raid on bin then commands the mission. But having said or activities of the United States Government Laden’s compound provides a framework. that, I have to tell you that the real commander to influence political, economic, or military In his May 1, 2011, televised address, was Admiral [William] McRaven because he conditions abroad, where it is intended that President Barack Obama reported “to the was on site, and he was actually in charge of the role of the United States Government will American people and to the world that the United States ha[d] conducted an operation that killed Osama bin Laden.”4 President Lieutenant Colonel Joseph B. Berger III, USA, wrote this essay while a student at the National War College. It Obama initially detailed little beyond noting won the 2012 Secretary of Defense National Security Essay Competition. 32 JFQ / issue 67, 4th quarter 2012 ndupress.ndu.edu Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 3. DATES COVERED 2012 2. REPORT TYPE 00-00-2012 to 00-00-2012 4. TITLE AND SUBTITLE 5a. CONTRACT NUMBER Covert Action: Title 10, Title 50, and the Chain of Command 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) 8. PERFORMING ORGANIZATION National Defense University,Joint Force Quarterly,260 Fifth Avenue REPORT NUMBER (Building 64, Room 2504) Fort Lesley J. McNair,Washington,DC,20319 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSOR/MONITOR’S ACRONYM(S) 11. SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION/AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY NOTES 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF 18. NUMBER 19a. NAME OF ABSTRACT OF PAGES RESPONSIBLE PERSON a. REPORT b. ABSTRACT c. THIS PAGE Same as 8 unclassified unclassified unclassified Report (SAR) Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 BERGER not be apparent or acknowledged publicly, but of command; spies conducting intelligence Changed Character of the does not include . . . (2) traditional . . . military activities under executive authority have no Battlefield and Enemy activities or routine support to such activities.6 such protections. This distinction rests on a In the decade since 9/11, DOD and constitutional, statutory, treaty, and doctri- CIA elements have become “operationally The administration did the opposite, nal framework underpinning the military synthesi[zed].”10 A senior intelligence official making patently clear the raid’s nature concept of command authority. recently noted that “the two proud groups of and, in exhaustive detail, the precise role U.S. power relies on moral and legal American secret warriors had been ‘decon- of the United States. Instead of categoriz- legitimacy. Exclusive state control over the flicted and basically integrated’—finally—10 ing it as a covert action under the director’s legitimate use of armed force remains viable years after 9/11.”11 The direct outgrowth is the “command,” the President could have domestically and internationally only where increased reliance on special operations forces conducted the raid as a covert action under exercised within an accepted framework. (SOF) to achieve national objectives against a the Secretary of Defense instead of the CIA Thus, employing DOD forces in a nontradi- “nimble and determined” enemy who “cannot director, or under his own constitutional tional manner entails significant risk. The be underestimated.”12 While the United States authority as Commander in Chief and the policy implications of classification and struc- fought wars on geographically defined battle- Secretary’s statutory authorities, classify- ture are neither semantic nor inconsequential, fields in Iraq and Afghanistan and beyond, ing it as a traditional military activity and and must be understood by senior decision- the underlying legal structure remained con- excepting it from the statute’s coverage. As a makers; likewise, individual Servicemembers stant. In the wars’ background, leaders, advi- traditional military activity, there would have must understand the practical effects. A sors, academics, and others argued about the been no legal limits on subsequent public rigorous risk analysis should therefore inform structure of the appropriate legal and policy discussion. Alternatively, conducting the any deviation, however permissible under framework. Post-Iraq and post-Afghanistan, raid as a covert action within a military chain domestic law. the United States must still address other of command removes the issues the direc- This article focuses on the risks associ- threats, including those that al Qaeda and tor raised in asserting command authority ated with both using military personnel their associated forces present. over Servicemembers. The decisionmaking to conduct kinetic covert action and using The threats have migrated beyond process remains shrouded, but conducting them without a military chain of command. a battlefield defined by sovereign nations’ a raid into a sovereign country targeting a Those risks inform the recommendation borders. When asked recently in “how many nonstate actor using military personnel and to change practice, but not the law. Specifi- countries we are currently engaged in a equipment under the “command” of the CIA cally, the author rejects melding distinct shooting war,” Secretary of Defense Panetta director and classifying it as a covert action operational military (Title 10) and intel- laughed, responding, “That’s a good question. raises significant legal and policy questions. I have to stop and think about that . . . we’re Such decisions threaten the legitimacy and going after al Qaeda wherever they’re at. . . U.S. power relies on moral moral authority of future U.S. actions and clearly, we’re confronting al Qaeda in Paki- and legal legitimacy demand a rigorous examination of those stan, Yemen, Somalia, [and] North Africa.”13 associated risks. The unresolved legal and policy challenges The Abbottabad raid illustrates the ligence (Title 50) authorities into the often will likely increase in complexity on this post-9/11 security environment convergence mentioned Title 60. Properly classifying geographically unconstrained battlefield. of DOD military and CIA intelligence opera- actions—either under the statute as a covert Remaining rooted in enduring principles is tions.7 While dead terrorists attest to this action or exempted from the statute as a critical. DOD conduct of kinetic operations arrangement’s efficacy, many directly chal- traditional military activity—ensures the beyond traditionally recognized battlefields lenge the legal and policy framework behind correct command structure is in place.8 raises significant legal and policy concerns, current DOD-CIA cooperation. The dis- Ultimately, the analysis argues for revisiting especially where the U.S. Government con- course focuses largely on distinctions between the previously rejected 9/11 Commission ducts them without knowledge or consent of Title 10 and Title 50 and the legal basis for recommendation to place paramilitary the host nation, as apparently happened with conducting apparently overlapping military covert action under DOD control.9 the Abbottabad operation.14 Properly catego- and intelligence operations beyond the This article first outlines current and rizing and structuring these operations, while battlefields of Iraq and Afghanistan. Notwith- likely future threats and then explains the vexing for policymakers and their lawyers, standing the potentially misleadingly simple critical terms of art related to covert action carries much greater stakes for the Service- labels of Title 10 and Title 50, these complex and, against that lingua franca, examines why members executing them. issues lack clear answers. Many argue the kinetic military operations should be either legacy structure ill equips the President to classified as traditional military activities or The Need for a Lingua Franca effectively combat the threat. But tweaking kept under a military chain of command. Colloquial usage refers to DOD authori- that structure carries risk. Thus, correctly Analyzing the relevant constitutional, ties as Title 10, and the CIA’s as Title 50. That classifying and structuring our actions within statutory, treaty, and doctrinal elements of is technically inaccurate and misleading since that framework are critical. The law of war command, this article illustrates that a raid DOD routinely operates under both Titles is designed to protect our nation’s military conducted like the Abbottabad raid, while 10 and 50.15 Instead of Title 10, this article forces when they are engaged in traditional legally permissible, is best conducted as a tra- uses the term military operations; instead of military activities under a military chain ditional military activity. Title 50, it uses CIA operations or the more ndupress.ndu.edu issue 67, 4th quarter 2012 / JFQ 33 Essay winnErs | Covert Action President delivers statement on successful special operations raid on Osama bin Laden compound in Pakistan a) uz o S e et P e ( us o H e hit W specific covert action. All three terms require cision.20 DOD activities “may be both covert should be limited to clandestine” activities, clarification. and clandestine . . . focus[ing] equally on as this would ensure military personnel are CIA operations are all CIA activities operational considerations and intelligence- protected by the law of war,24 a critical point except covert action. Covert action is the related activities.”21 Appropriately, DOD offi- examined in detail later. narrow, statutory subset of Presidentially cials assert that, absent a Presidential covert Military operations are DOD activities approved, CIA-led activities.16 Unfortunately, action finding, they “conduct only ‘clandes- conducted under Title 10, including activities colloquially, covert action “is frequently tine activities.’” 22 They characterize clandes- intended or likely to involve kinetic action. used to describe any activity the govern- tine activities as those “conducted in secret but Pursuant to an order issued by the Secretary ment wants concealed from the public.”17 which constitute ‘passive’ intelligence infor- of Defense, they are conducted by military That common usage ignores the fact that a mation gathering.”23 Interchanging the terms personnel under DOD command and in traditional military activity, notwithstand- and mixing them with intelligence functions accordance with the law of war. They specifi- ing how “secretly” it is executed, is by statute is inaccurate and dangerous; practitioners cally exclude DOD’s intelligence activities not a covert action. DOD defines a covert must draw clear distinctions. The sponsorship (for example, the Joint Military Intelligence operation as one “planned and executed as of a covert action is hidden, not the act itself. Program); like the CIA’s, those intelligence to conceal the identity of or permit plausible The specific acts of the U.S. Government in activities are conducted pursuant to Title 50. denial by the sponsor,” where “emphasis is influencing a foreign election (for example, Statutorily assigned responsibility helps placed on concealment of the identity of the posters, marches, election results, and so distinguish between CIA operations and sponsor rather than on concealment of the forth) would be visible, but not the covert military operations. Although the President operation.”18 While not in conflict with the sponsorship of those acts. For clandestine can designate which department, agency, or statutory definition, the DOD definition is acts, the act itself (for example, intercepting entity of the U.S. Government will participate incomplete; it fails to recognize the President’s a phone call) must remain hidden. The CIA in the covert action, the statute implicitly role and ignores the exception of traditional and DOD can conduct clandestine operations tasks the CIA as the default lead agency: “Any military activities.19 Practitioners should use without Presidential approval, whereas covert employee . . . of the [U.S.] Government other the statutory definition. action triggers statutory requirements for a than the [CIA] directed to participate in any The concept of clandestine operations Presidential finding and congressional noti- way in a covert action shall be subject either to further blurs colloquial and doctrinal impre- fication. Some have argued DOD’s “activities the policies and regulations of the [CIA], or to 34 JFQ / issue 67, 4th quarter 2012 ndupress.ndu.edu BERGER written policies or regulations adopted . . . to control of the military commander. Activities clear chain is rooted in the uniquely military govern such participation.25 that are not under the direction and control of concept of command and the President’s Executive order 12333 (EO 12333) makes a military commander should not be consid- constitutionally defined role as Commander that default tasking explicit: ered as “traditional military activities.”29 in Chief. It clarifies congressional oversight responsibility, results in unquestioned jurisdic- The Director of the [CIA] shall . . . conduct That nonstatutory definition frames the tion, and forms the basis of the strongest legal covert action activities approved by the follow-on analysis. That functional and his- argument for combatant immunity. Part 1B President. No agency except the [CIA] (or the torical definition turns on who is in charge. represents the President as chief executive, Armed Forces of the United States in time of Activities under the “direction and exercising oversight and control of the CIA war declared by the Congress or during any control of a military commander” meet the under Title 50. This hierarchy lacks the legal period covered by a report from the President requirement to be excepted from the statute; command authority exercised over military to the Congress consistent with the War Powers those with a different command and control personnel in 1A. Finally, part 1C represents the Resolution. . . .) may conduct any covert action arrangement are not traditional military paradox created by the covert action statute’s activity unless the President determines that activities. “Command” is unique to the attempts to overlap the parallel structures of another agency is more likely to achieve a par- military and the definition appears to draw a 1A and 1B; it is often described as Title 60. ticular objective.26 bright line rule; but the CIA director blurred The current Congressional Authoriza- the line by asserting “command” over a tion for the Use of Military Force allows the The statute, coupled with EO 12333, DOD element.30 The confusion questions the President to “use all necessary and appropriate unequivocally places all covert action necessary nature and scope of leadership by force” to prevent “future acts of international squarely under the CIA’s control; the narrow a “military commander.” What level or rank terrorism against the United States.”32 This exception for DOD is currently inapplicable. of command is required? Must the chain of statutory grant of power creates the paradox: While the Executive order expressly tasks command from that military commander here, where the Senate vote was 98 to 0 and the director with conducting covert action, run directly back to the Commander in Chief the House vote was 420 to 1, the President’s it does not task the Secretary of Defense.27 solely through military channels? Must it run executive authority (as Commander in Chief Default CIA primacy and the absence of through the Secretary of Defense? Can it run and chief executive) is greatest,33 the exercise statutory specificity in defining traditional through the director if there is a military com- of those powers blurs the clear lines of parts military activities create risk when DOD con- mander below him? Given Goldwater-Nich- 1A and 1B of the illustration. Merging the two, ducts kinetic covert action. ols,31 what about the geographic combatant although permissible under the covert action commander? In short, what does the wiring statute, creates risk. The Unique Nature of Traditional diagram look like? These questions highlight Consequently, questions about Military Activities three baseline possibilities as depicted in the the nature and structure of the chain of One practitioner described traditional figure below. command demand rigorous scrutiny and military activities’ exclusion from covert Part 1A of the figure reflects DOD’s Title cannot be left to ad hoc arrangements. action’s definition as “the exception that swal- 10 chain of command, illustrating the broad- Defining military command determines lows the rule.”28 But while DOD-CIA opera- est historical, functional, and consequential whether or not the activity is a traditional tional convergence blurs the issue, the excep- definition of traditional military activity. The military activity and therefore not under the tion need not swallow the rule. Functionally, anything done by a uniformed member of a Chain of Command Possibilities nation’s armed forces is a “military” activity; the nuanced requirement is to understand President as President as which are traditional military activities. That Commander in Chief President Chief Executive definition can be consequential, functional, or historical—or a combination of some or Secretary of all three approaches. The statute’s legislative Defense Director, CIA Director, CIA history provides the best clarification, noting the conferees intended that: Combatant Commander CIA Personnel Subordinate “Traditional military activities” include activi- Military ties by military personnel under the direction Commander and control of a United States military com- Subordinate mander (whether or not the U.S. sponsorship Commander Covert Action of such activities is apparent or later to be “Command” Constitutional and Constitutional and Structure as acknowledged) . . . where the fact of the U.S. Statutory Chain of Statutory Described by role in the overall operation is apparent or to be Command Executive Hierarchy Director Panetta acknowledged publicly. In this regard, the con- ferees intend to draw a line between activities Figure 1A Figure 1B Figure 1C that are and are not under the direction and ndupress.ndu.edu issue 67, 4th quarter 2012 / JFQ 35 Essay winnErs | Covert Action ambit of the statute. The criticality of this tion, “A civilian, other than the President as assets, nor did it grant the President a caveat categorization is twofold: it is the core of the Commander-in-Chief . . . may not exercise like that with the Secretary of Defense’s state’s monopoly on the legitimate use of command.”40 Goldwater-Nichols allows the authority.49 Although the director’s duties force and cloaks Servicemembers in the legal President to exercise command through his include the transfer of “personnel within the armor of combatant immunity. Secretary of Defense. Command rests on con- NFIP,” which includes DOD personnel, such stitutional and statutory authority (including transfers are limited to personnel within Chain of Command, or Control? the Uniform Code of Military Justice) and the DOD’s Joint Military Intelligence Program Since George Washington’s Presidency, customs and practices of the Service. Remov- (JMIP).50 SOF are not part of the JMIP. When the Secretary of War (later Defense) has ing military personnel from that hierarchy— DOD does transfer any JMIP personnel to the served without interruption as a Cabinet illustrated in part 1C of the figure—changes CIA, the director must “promptly” report that member. The President’s role, enshrined in their fundamental nature. This is Panetta’s transfer to both the intelligence oversight and the Constitution, is clear: “The President assertion: he was in “command” 41 of the raid Armed Services Committees of both houses.51 shall be Commander-in-Chief of the Army on Osama bin Laden’s compound. Transfers between other executive branch ele- and Navy of the United States.”34 With the Titles 10 and 50 define the specific ments trigger no such requirements. Congress Secretary of Defense, this embodies the duties of the Secretary of Defense42 and Title only intended CIA control over DOD intel- Founders’ vision of civilian control of the 50 the CIA director’s.43 The duties are neither ligence assets and was clearly concerned about military. The Secretary of Defense’s appoint- identical nor interchangeable. In Title 50, even that. Goldwater-Nichols reinforces this ment requires the “Advice and Consent of the Congress explicitly states that DOD shall analysis. Senate.”35 While the President can relieve him function “under the direction, authority, Goldwater-Nichols codifies geographic and replace him with an inferior officer (that and control of the Secretary of Defense” in combatant commanders’ nearly inviolable is, the Deputy Secretary of Defense), Senate- order to “provide for their unified direction command authority: “all forces operating confirmed executive branch officials are under civilian control.”44 Placing the Services within the geographic area assigned to a not fungible. He cannot interchange officials under the Secretary of Defense is necessary to unified combatant command shall be assigned individually confirmed to fulfill separate and “provide for the establishment of [a] clear and to, and under” his command.52 Two excep- unique duties—something James Madison direct line of command.”45 Congress is equally tions supplant that authority. Servicemembers warned about in Federalist 51.36 clear in Title 10, granting the Secretary com- assigned to U.S. Embassies (for example, the Longstanding U.S. practice is an unbro- plete authority over DOD: “there shall be a Defense Attaché) are under the Ambassador’s ken chain of command from the President, Secretary of Defense, who is the head of the control and the Defense Intelligence Agency’s through his Secretary of Defense, to a subordi- [Department], appointed . . . by the President, command. For those Servicemembers, dip- nate uniformed commander. Even Goldwater- by and with the advice and consent of the lomatic protections have replaced law of war Nichols’s37 streamlining the military warf- Senate.”46 The statute allows the Secretary to protections, but the Secretary of Defense ighting chain of command to run from the “perform any of his functions or duties, or remains in the chain of command. The President through the Secretary and directly [to] exercise any of his powers through” other second exception, carved from Goldwater- to the unified combatant commanders did not persons, but only persons from within DOD.47 Nichols’s “unless otherwise directed by the President” language, covers DOD participa- tion in covert action.53 Goldwater-Nichols’s Goldwater-Nichols codifies geographic combatant silence on the Secretary of Defense remaining commanders’ nearly inviolable command authority in the chain of command indicates Congress did not intend to change the default hierar- alter that fundamental practice.38 Combatant Two caveats exist to the Secretary of chy. DOD recognized that point by defining commanders simply replace Service chiefs. Defense’s “authority, direction, and control”: combatant command as being “under a single The civilian leader between the Commander the Secretary’s authority is “subject to the commander” and running “through the Secre- in Chief and his senior uniformed commander direction of the President” and the 1947 tary of Defense.”54 All these say nothing about remains unchanged—a specific individual National Security Act.48 The latter covers covert action. confirmed by the Senate to execute statu- DOD personnel within the National Foreign The statute and EO 12333 put the tory duties. The inviolate concept of civilian Intelligence Program (NFIP). The former director “in charge” of the conduct of covert control of the military and the Senate’s Advice appears to be an exception that swallows the actions.55 CIA “ownership” means any and Consent requirement make assertion of rule. But even in empowering the President non-CIA employee supporting a covert action any executive authority to “trade out” duties to limit his Secretary’s authority, Congress “belongs” to the CIA. However, the CIA lacks between Cabinet officials implausible. The did not specifically authorize any change to DOD’s legal command structure and no CIA President can place military personnel under the fundamental command of military forces. official possesses the command authority CIA control, but control is not command. Likewise, in defining the director’s limited inherent in an officer’s commission.56 The Command is the inherently military authorities over military personnel, Congress CIA can only be in charge, not in command. “privilege” that is “exercised by virtue of maintained the military command structure The director cannot give a lawful order that office and the special assignment of members over military operations. would be legally binding on Servicemem- of the US Armed Forces holding military Congress neither allows the director bers. The Constitution unequivocally grants grade.”39 In fact, under the Army regula- command nor control of DOD operational Congress the authority to “make Rules for 36 JFQ / issue 67, 4th quarter 2012 ndupress.ndu.edu BERGER Special operations forces use fast-rope insertion technique during assault and secure building training ey) ul a C n o as my (J Ar S. U. the Government and Regulation of the land individual is subject to criminal prosecution ments for those not considered part of the and naval Forces.”57 Those rules, the Uniform for his wartime conduct. His deliberately tar- Nation’s army, is the parallel to Servicemem- Code of Military Justice, never contemplated geting and killing others become nonmilitary bers conducting kinetic covert action under CIA personnel exercising command authority and therefore criminal. In World War II’s CIA control. Combatant immunity neces- over Servicemembers. The CIA’s ownership aftermath, widespread acceptance of what sitates prisoner of war status; for those not of covert action is limited. Exclusive CIA constituted an “army” rendered a definition acting as part of the army, that status requires control fails elsewhere; the statute authorizes unnecessary: “Individuals composing the a military chain of command. Replacing the the President to task “departments, agencies, national forces” automatically enjoyed com- Secretary of Defense with the CIA director or entities”58 to conduct covert action. The batant immunity.60 However, for those outside eviscerates this. implication is that DOD can conduct a covert their nation’s military hierarchy, specificity U.S. history records a fundamental belief action exclusively. EO 12333 specifically envi- was necessary. The Third Geneva Convention in the rules for combatant immunity.68 First, sions that.59 Placing DOD elements under CIA grants prisoner of war status—which confers to codify these requirements, the 1863 Lieber control to conduct a kinetic operation is argu- combatant immunity—to those who are Code defined prisoner of war as including “all ably unnecessary. subordinate to a responsible commander, wear soldiers.”69 The code noted noncompliance This chain of command is constitution- a fixed, distinctive insignia recognizable at a with the rules meant no combatant immunity: ally enshrined, codified, and ratified through distance, carry their arms openly, and conduct spies were “punishable with death by hanging longstanding practice; even if Congress had their operations in accordance with the laws by the neck.”70 “Armed prowlers . . . who steal explicitly authorized the President to reroute and customs of war.61 within the lines of the hostile army for the it, doing so creates risk. First, it removes the The command requirement stems from purpose of . . . killing . . . are not entitled to law of war’s protections upon which Service- the “dual principle of responsible command the privileges of the prisoner of war.”71 The members conducting kinetic operations rely. and its corollary command responsibility.”62 code’s noteworthy purpose was not to regulate In such an event, Servicemembers must be The Hague Convention required that a com- conduct between nations, but for application made aware they are no longer protected. mander be “responsible for his subordinates.”63 in a non-international armed conflict and Second, as a state practice, realigning military The Geneva Convention recognized “no maintaining the moral high ground necessary personnel under a nonmilitary framework to part of [an] army . . . is not subordinated to a to facilitate reconciliation with and reintegra- conduct kinetic activities creates precedential military commander,” applying this “from the tion of the confederate states. risk for U.S. allies. Such a decision must be Commander-in-Chief down to the common The law of war’s efficacy rests on the fully informed at all levels. soldier.”64 The later protocols “could not principle of reciprocity. One party provides conceive” of a hierarchy “without the persons the protections to its prisoners believing Chain of Command: who make up the command structure being and hoping its enemies will respond in kind. International Law Context familiar with the law applicable in armed Commendable German and U.S. treatment National armies engaged against each conflict.”65 This is DOD’s unchallenged area of of each other’s prisoners during World War II other have, throughout modern history, expertise.66 Like Congress’s definition of tra- exemplifies this principle; Japanese treatment been cloaked in the law of war’s combatant ditional military activity,67 the commentary’s of U.S prisoners at Bataan proves its imper- immunity. Absent that immunity, a captured definition, when coupled with the require- fections. Regardless, maintaining the moral ndupress.ndu.edu issue 67, 4th quarter 2012 / JFQ 37 Essay winnErs | Covert Action as traditional military activities, maintaining secrecy and preserving individual Service- member protections. The need for continued distinction between covert action and tradi- tional military activities and, where covert, the need for DOD-conducted operations to main- tain a military chain of command, drive these recommendations. The United States should revisit the rejection of the 9/11 Commission’s recommendation that DOD assume responsi- bility for paramilitary covert operations.75 Where DOD participation is neces- sary and primary, the operation should be conducted as an unacknowledged traditional military activity. If the risk analysis drives a K. Fritz) dacetciiosnio, nth teo Pcorensdiduecnt tt hshe ooupledr matiaoinn taasi na tchoev ert erly military chain of command. This ensures Ser- b m vicemembers going in harm’s way have every Ki STapleibcaianl pOrpeesreanticoen isn T Zaasnkg Fholarcve, HWeerastt PMraorviinnecse investigate S. Army ( pthreomte—ctioorn a t hclee aNraetri ounn dtheersyt asenrdvien cga onf pthroe vide U. additional risks they are assuming on behalf high ground is critical. Had Abbottabad gone DOD can undoubtedly conduct secretive of their Nation. JFQ poorly, the United States would have asserted (that is, clandestine and/or unacknowledged) that U.S. personnel in Pakistani custody were actions as traditional military activities NoTEs entitled to the high standards of prisoner of and enjoy the full body of the law of war’s 1 Kimberly Dozier, “AP Sources: CIA-Led war treatment. That would have required protections. The current framework neither Force May Speed Afghan Exit,” ABC News Online, those Soldiers and Sailors to be in compliance envisions nor facilitates placing Servicemem- March 3, 2012, available at <http://abcnews.go.com/ with the law of war. The nonmilitary chain bers under CIA control and preserving the Politics/wireStory/ap-sources-cia-led-force-speed- of command may have been problematic in command relationships necessary to cloak afghan-exit-15840357>. Emphasis added. making that assertion. them in combatant immunity. The Abbot- 2 Ibid. Emphasis added. tabad raid utilized this risk-laden approach. 3 Memorandum from Acting Under Secretary Conclusion This is not to assert that conducting of Defense for Personnel and Readiness for Secre- “From its inception . . . America has the raid as a covert action was illegal. There taries of the Military Departments et al., SUBJECT: venerated the rule of law.”72 Traditional mili- were three likely outcomes: success, failure, Guidance related to Utilization of Military Man- tary activities occur against a rich fabric of or something in between (that is, aborting the power to Perform Certain Functions, March 2, 2012. domestic and international law. Covert action, mission). Neither success nor failure required 4 Remarks by President Barack Obama, while uniquely codified, presents multiple covert action’s plausible deniability. The delivered from the East Room of the White House, dilemmas. Although permissible under U.S. United States immediately publicly acknowl- May 1, 2001, available at <www.whitehouse.gov/ domestic law, covert action is generally illegal edged killing of “public enemy number one”; blog/2011/05/02/osama-bin-laden-dead>. in the target country.73 Again, maintaining the regardless, the crashed helicopter disclosed 5 Interview of Leon Panetta by Jim Lehrer on moral high ground is critical. the U.S. role. A noncatastrophic driven deci- PBS Newshour, “CIA Chief Panetta: Obama Made Although inimical to covert action’s sion to abort (for example, Pakistani detection ‘Gutsy’ Decision on Bin Laden Raid,” May 3, 2011, fundamental premise, overt executive branch of violation of their sovereign airspace) pro- video of interview available at <www.pbs.org/ commentary following the Abbottabad raid vides the sole outcome where the United States newshour/bb/ terrorism/jan-june11/panetta_05-03. highlighted the legal risk associated with would likely have hidden behind the statute’s html>. policy decisions. Placing Servicemembers shield, disavowing all. The covert action clas- 6 50 U.S.C. §413b(e). Emphasis added. 7 Jeff Mustin and Harvey Rishikof, “Project- under CIA command threatens to undermine sification provided an insurance policy, yet the ing Force in the 21st Century—Legitimacy and the the protections they rely on when conducting cost of allowing that policy to “lapse” through Rule of Law: Title 50, Title 10, Title 18, and Art. 75,” kinetic military operations, especially where post-success disclosures undermines the plau- Rutgers Law Review, vol. 63 (Summer 2011), 1235. the activity is more accurately classified as a sibility of such “insurance” in the future. 8 50 U.S.C. §413b(e)(2). traditional military activity. Compare the Abbottabad covert action 9 National Commission on Terrorist Attacks The risk can—and should—be miti- with the recent rescue of a U.S. citizen in Upon the United States, The 9/11 Commission gated by first properly classifying the activity. Somalia, conducted secretively, but not Report, July 2004, 415, available at <www.9- Classifying a traditional military activity as covertly, by “a small number of joint combat- 11commission.gov/report/911Report.pdf>. See also anything else undermines the very categori- equipped U.S. forces.”74 This comparison Richard A. Best, Jr., Covert Action: Legislative Back- zation and its inherent law of war protections. illustrates that such activities can be conducted ground and Possible Policy Questions (Washington, 38 JFQ / issue 67, 4th quarter 2012 ndupress.ndu.edu BERGER DC: Congressional Research Service, 2011), avail- 29 H.R. Rep. No. 102-115, at 5898 (1991) (Conf. 62 Elihu Lauterpacht et al., International Law able at <www.fas.org/sgp/crs/intel/ RL33715.pdf>. Rep.). Emphasis added. Reports, 133 (Cambridge; Cambridge University 10 Mustin and Rishikof, 1236. 30 Panetta interview by Lehrer. Press, 2008), 62. 11 Mark Ambinder, “The Secret 31 The Goldwater-Nichols Department of 63 Regulations Respecting the Laws and Team That Killed bin Laden,” National Defense Reorganization Act of 1986 (P.L. 99-433; Customs of War on Land, annex to Convention (no. Journal Online, May 3, 2011, available at 100 Stat. 992), October 1, 1986. IV) Respecting the Laws and Customs of War on <http://nationaljournal.com/whitehouse/ 32 P.L. 107-40 [S. J. RES. 23, 107th Congress], Land, October 18, 1907, art. 1, 36 Stat. 2277. the-secret-team-that-killed-bin-lawden-20110502>. September 18, 2001. The act authorized the Presi- 64 Yves Sandoz, Christophe Swinarki, and 12 Remarks as prepared for delivery by dent “to use all necessary and appropriate force Bruno Zimmerman, eds., Commentary on the Attorney General Eric Holder at Northwestern against those nations, organizations, or persons Additional Protocols of 8 June 1977 to the Geneva University School of Law, March 5, 2012, available he determines planned, authorized, committed, Conventions of 12 August 1949 (Geneva: Martinus at <www.justice.gov/iso/opa/ag/speeches/2012/ag- or aided the terrorist attacks that occurred on Nijhoff Publishers, 1987), para. 3553. Emphasis speech-1203051.html>. September 11, 2001, or harbored such organizations added. 13 Interview of Leon Panetta by Scott Pelley, or persons, in order to prevent any future acts of 65 Ibid., art. 43, para. 1672. 60 Minutes, January 29, 2012, available at <www. international terrorism against the United States by 66 See, for example, Protocol additional to the cbsnews.com/video/watch/?id=7396828n&tag=con such nations, organizations, or persons.” Geneva Conventions of August 12, 1949, and relat- tentMain;contentAux>. 33 See Youngstown Sheet & Tube Co. v. Sawyer, ing to the protection of victims of international 14 See, for example, Adam Levin, “Bin Laden 343 U.S. 579 (1952). armed conflicts (Protocol I) Art. 82, June 10, 1977, raid was humiliating to Pakistanis, Gates and 34 U.S. Constitution, Article 2. 1125 U.N.T.S. 3; see also Commentary on the Addi- Mullen say,” CNN Online, May 18, 2011, available at 35 Ibid. tional Protocols, art. 82, paras. 3340–3345. <http://articles.cnn.com/2011-05-18/us/pakistan. 36 The Federalist Papers, No. 51 (James 67 H.R. Rep. No. 102-115. bin.laden_1_gates-and-mullen-bin-pakistanis?_ Madison arguing for the need for established insti- 68 Statement of Hon. Wilber M. Brucker, s=PM:US>. tutions vice reliance on the good will of incumbent General Counsel, Department of Defense, Hearing 15 See generally Andru E. Wall, “Demystifying leaders). before the Committee on Foreign Relations, United the Title 10-Title 50 Debate: Distinguishing Mili- 37 Goldwater-Nichols, note 32. States Senate, 84th Cong., 1st sess. Brucker notes tary Operations, Intelligence Activities, and Covert 38 10 U.S.C. §162, and the following. during 1955 hearing on the Geneva Conventions Action,” Harvard National Security Journal 85, no. 39 See, for example, Department of the Army before the Senate Committee on Foreign Relations 3 (2011). Regulation 600-20, Army Command Policy, March that the U.S. “Armed Forces have always attempted 16 50 U.S.C. §413b(e). 18, 2008, para. 1-5(a), 1. to comply scrupulously” with these laws of armed 17 Mustin and Rishikof, 1240. 40 Ibid. conflict and their underlying principles. 18 Joint Publication (JP) 1-02, Department 41 Panetta interview by Lehrer; see also 69 General Orders Number 100, Instructions for of Defense Dictionary of Military and Associated figure 1C. the Government of the Armies of the United States Terms (Washington, DC: The Joint Staff, November 42 10 U.S.C. §113 and 50 U.S.C. §403-5 (defin- in the Field, April 1863, arts. 48–80, available at 8, 2010, as amended through November 15, 2011), ing the Secretary’s specific duties with respect to <http://avalon.law.yale.edu/19th_ century/lieber. 81, available at <www.dtic.mil/doctrine/ new_pubs/ the National Foreign Intelligence Program). asp>. Emphasis added. jp1_02.pdf>. 43 50 U.S.C. §403-4. 70 Ibid., art. 88. 19 For a more thorough discussion of what have 44 50 U.S.C. §401. 71 Ibid., art. 84. been categorized as “unacknowledged special oper- 45 Ibid. Emphasis added. 72 United States War Department, The 1863 ations,” see Richard C. Gross, “Different Worlds: 46 10 U.S.C. §113(a). Laws of War (Mechanicsburg, PA: Stackpole, Unacknowledged Special Operations and Covert 47 10 U.S.C. §113(d). 2005), xi. Action,” unpublished monograph, U.S. Army War 48 10 U.S.C. §113(b). 73 See, for example, Richard A. Clarke, Against College, 2009. 49 “Authorities of the Director of Central Intel- All Enemies: Inside America’s War on Terror (New 20 See Greg Miller, “CIA Is in Baghdad, Kabul ligence,” 50 U.S.C. §403, and the following. York: Free Press, 2004), quoting former Vice Presi- for Long Haul: Large Covert Presence Part of U.S. 50 Ibid. dent Al Gore: “Of course it’s a violation of interna- Plan to Exert Power More Surgically,” The Wash- 51 50 U.S.C. §403(d)(5). tional law, that’s why it’s a covert action.” ington Post, February 8, 2012, A1. 52 10 U.S.C. §162(a), and the following. 74 Letter from President Barack Obama to 21 JP 1-02, 53. 53 10 U.S.C. §162, and the following. Hon. John Boehner, Speaker of the House of Repre- 22 50 U.S.C. §413b(a)(1) through (5) for the 54 JP 1-02, 57. Emphasis added. sentatives, entitled “Notification of Special Forces requirements for Presidential findings. 55 Executive order 12333; see also 50 U.S.C. Operation” (Washington, DC: Government Print- 23 Best. §413(b)(a)(3). ing Office, 2012). The President noted the letter was 24 Ibid. See also William Safire, “Covert 56 5 U.S.C. § 3331. sent “consistent with the War Powers Resolution.” Operation, or Clandestine?” The New York Times, 57 U.S. Constitution, Article 1, sec. 8. See 50 U.S.C. §1541, and following (P.L. 93-148). February 14, 2005, available at <www.nytimes. 58 50 U.S.C. §413(b). 75 See, for example, Richard A. Best, Jr., and com/2005/02/13/arts/13iht-saf14.html>. 59 Executive order 12333. Andrew Feickert, Special Operations Forces (SOF) 25 50 U.S.C. §413b(a). Emphasis added. 60 See, for example, Herbert C. Fooks, Prisoners and CIA Paramilitary Operations: Issues for Con- 26 Executive order 12333, United States Intel- of War (Federalsburg, MD: J.W. Stowell Printing, gress (Washington, DC: Congressional Research ligence Activities (As amended by Executive Orders 1924), 25. See also Geneva Convention Relative to Service, updated 2006). 13284 [2003], 13355 [2004], and 13470 [2008]), para. the Treatment of Prisoners of War, August 12, 1949, 1.7(a)(4), available at <www.fas.org/irp/offdocs/eo/ 6 U.S.T. 3316, 75 U.N.T.S. 135, art. 4.A.(3). eo-12333-2008.pdf>. Emphasis added. 61 Ibid., art. 4 (A)(2)(a)-(d). Emphasis added. 27 Ibid., para 1.10(a) through (l). 28 Gross, 7. ndupress.ndu.edu issue 67, 4th quarter 2012 / JFQ 39

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.