Reconsidering the Imminence Requirement in a Post-9/11 World

THIS ARTICLE WAS ORIGINALLY PRINTED ON APR 4, 2013 AND IS BEING RE-PRINTED FOR “CHALLENGES OF INTELLIGENCE COLLECTION WEEK.”

AbbottabadOne of the most vexing questions in international law is determining under what circumstances a state may lawfully use military force against another state or non-state actor. The U.N. Charter takes a very conservative approach: use of force, according to Article 51, is authorized “if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security.”1 The international community has long since abandoned the notion that a state must wait until it is actually under attack before it can employ military force. Instead, the concept of “imminence” has been read into Article 51. Daniel Webster famously articulated this rule after the so-called Caroline case: preemptive force can be used only if there is “a necessity of self-defence, instant, overwhelming, leaving no choice of means, and no moment of deliberation.”2 But even this more deferential rule has proven unworkable in the age of modern warfare. Modern military technology and techniques allow aggressors to launch devastating attacks without significant notice. Additionally, terrorist groups have become increasingly sophisticated in both their tactics and capability to evade detection. To combat these threats, states often gather intelligence that must be acted on in a matter of hours, and special forces are prepared to respond to threats on extremely short notice. For example, President Obama ordered U.S. Navy SEALS to attack a compound in Abbottabad, Pakistan that was believed to be housing Al Qaida leader Osama Bin Laden. Although the operation turned out to be a major success, Obama later explained that his advisors were only 55% confident that Bin Laden was in the compound.3 Of course, there was no suggestion that Bin Laden was planning an imminent attack on the United States, or even that he would soon relocate to a new hideout. The time-sensitive nature of the intelligence and the enormous stakes, however, justified the use of military force without any delay to collect more detailed intelligence or seek the aid of the Pakistani government. The Abbottabad raid is an example of how the traditional notion of imminence must be adapted to meet the needs of the Global War on Terror. This post seeks to explain why such a shift is needed and suggests a framework for evaluating the use of military force when a threat is not imminent in the traditional sense.

Changing Nature of Threats

The notion of imminence is an intuitive concept for most people. The requirement is familiar from domestic criminal law, which allows a person to use deadly force in self-defense if he believes such force is “immediately necessary for the purpose of protecting himself against the use of unlawful force….”4 The imminence requirement is also consistent with the predominant view of international relations, enshrined in Article 2(4) of the U.N. Charter, that states are to refrain from using force against another state unless authorized by international law.5 This rule, although a good starting point, is strained by the realities of the current international system.

The imminence requirement developed in a time when military conflict occurred almost exclusively between sovereign nations. It was relatively simple to detect a neighbor amassing conventional forces along your border or positioning naval forces off your shore. It also developed in a time when wars were fought by conventional means: by soldiers on battlefields. The need for imminence applied only in deciding to initiate military force. Once two states were at war, there was generally no requirement of imminence before engaging enemy forces.6 The rise of non-state terrorist groups has altered this dynamic in two important ways. First, terrorist groups have developed tactics that are difficult to anticipate. If states wait until a terrorist attack is imminent, they may be unable to prevent a catastrophe and may have difficulty attributing blame after the fact. Second, because terrorist groups are non-state actors, it is often unclear who is a combatant that may be targeted and who is merely a bystander or sympathizer.

Despite the difficulties of applying the imminence requirement in a post 9/11 world, the Obama administration has continued to acknowledge a need for imminence when using military force against members of Al Qaida and other terrorist groups. In a Department of Justice white paper the Obama administration concluded that deadly force could be used against an American citizen abroad if that citizen “poses an imminent threat of violent attack against the United States” and capture is infeasible.7 In a 2011 address, John Brennan, who at the time was President Obama’s Homeland Security Advisor, remarked that imminence would continue to play an important role in constraining America’s use of military force to conform to international law. Importantly, he qualified his support by stating: “a more flexible understanding of ‘imminence’ may be appropriate when dealing with terrorist groups, in part because threats posed by non-state actors do not present themselves in the ways that evidenced imminence in more traditional conflicts.”8 Articulating this new approach to imminence will be an important foreign policy challenge as the U.S. continues to prosecute the war or terror. The U.S. must develop a conception of imminence that both maintains the legitimacy of our military actions under international law and allows us to act preemptively against terrorist attacks.

Additional Factors to Consider

Altering the criteria for the lawful use of military force is a delicate task. Taken to an extreme, a more flexible rule could stipulate that force is appropriate whenever the potential benefits of a military operation outweigh the potential costs.9 This is the decision-making process envisioned by proponents of International Realism. States, as rational actors, would take any action in which the expected benefit exceeded the expected cost. Because, in the realists’ view, the international system is anarchic, there are no extra-national rules that govern when use of force is appropriate. The views of realists, however, have been largely rejected by the United States. If force is used in an unbounded manner, we risk losing legitimacy with the international community. Instead, the new paradigm must incorporate additional factors while still limiting the use of force by imposing legal constraints.

In a 2012 speech Attorney General Eric Holder suggested a new framework for determining which threats are imminent. When considering use of force against a terrorist target, the United States would consider the window of opportunity to act, the possible harm that missing the window would cause to civilians, and the likelihood of heading off future disastrous attacks against the United States.10 This framework is a step in the right direction. The primary shortcoming of the traditional imminence doctrine is that it fails to adequately consider the potential cost of failing to act. The magnitude of a potential threat is an important consideration in deciding when preemption is justified. It is appropriate to preempt a nascent nuclear attack at a much earlier stage than would be appropriate for an attack using conventional weapon. Considering the window of opportunity allows decision makers to weigh the risks of inaction. A related concept is the so-called “zone of immunity.” This term was coined by Israeli Defense Minister Ehud Barak, and refers to a situation in which failure to take prompt military action will result in the enemy being immune from future attack.11 For example, Barak argued that after a certain point, Iran’s nuclear program would be sufficiently safeguarded that no aerial strike could disable it. When there is potential for a zone of immunity, the relevant question should not be when an attack is imminent, but when immunity is imminent. This flexibility does not mean that force can be used without limits. As Attorney General Holder explained, the use of force is always constrained by four fundamental principles: necessity, distinction, proportionality, and humanity.12 With these limitations intact, it is appropriate to consider the window of opportunity, zone of immunity, and the magnitude of harm that a successful terrorist attack would occasion.

Using Technology to Develop New Standards

Technology has profoundly affected the manner in which states react to threats to their national security. Its effect on the imminence standard is mixed. Some technologies have made it easier to collect and act on intelligence, thus expanding the window of opportunity to preempt terrorist attacks. For example, the use of satellite surveillance and unmanned aerial vehicles (UAVs, or “drones”) allows U.S. forces to track, observe, and engage individual terrorists remotely and without putting American service members in harm’s way.13 The ability to gather intelligence remotely and project power rapidly over long distances permits the United States to wait longer before initiating an attack because terrorist operations can be detected at earlier stages and individuals can be engaged on short notice by UAVs. In this sense, new technologies make the imminence standard more demanding. But technology can also compress the timeframe available for decision-making. For example, the decision to freeze financial assets of suspected terrorists must be made quickly and without notice due to the possibility the assets will be electronically transferred.14 Similarly, the advent of cyber-terrorism means terrorist groups can launch attacks on American infrastructure or financial institutions with no notice.15 These developments require the relaxation of the imminence requirement. Perhaps most importantly, technology can aid in decision-making by evaluating the imminence of potential attacks. Sophisticated computer programs can aid in weighing the risks and benefits of using force. In the near future, we may be able to develop systems that can gather intelligence, decide whether an imminent threat exists, and employ deadly force to eliminate the threat.16 Whether this type of technology can be used more widely will depend on whether it can incorporate the legal and ethical rules discussed in this article.

Conclusion

Developing a modern definition of imminence is an important and challenging goal for policy makers. Imminence is a concept that resists a strict legal definition and is better suited for practical determinations. In 2010, Nasser Al-Aulaqi filed a lawsuit in federal court seeking to prevent the U.S. government from killing his son, Anwar Al-Aulaqi, who had allegedly been placed on the U.S. government’s “kill list.”17 Al-Aulaqi wanted a court order stating that his son could be killed only if the government could show that he “presents a concrete, specific, and imminent threat….”18 The court held that it could not issue such an order because it was a political question: “the imminence requirement of [the plaintiff’s] legal standard would render any real-time judicial review of targeting decisions infeasible.”19 Despite being difficult for courts to apply, the administration should seek to develop a definition of imminence that will serve as a guide for future military actions against suspected terrorists. In doing so, it can provide the flexibility needed to respond to evolving threats while maintaining the respect of the international community.

George Fleming is a law student at Harvard Law School and former surface warfare officer in the U.S. Navy.

—————————————————————————————————————————

1. U.N. Charter art. 51 (emphasis added).
2. Daniel Webster, The Papers of Daniel Webster: Diplomatic Papers: Volume 1, 1841-1843, 62 (Kenneth E. Shewmaker & Anita McGurn eds., Dartmouth Publishing Group, 1983).
3. “Obama on bin Laden: The Full “60 Minutes” Interview” (May 2, 2011), available at http://www.cbsnews.com/8301-504803_162-20060530-10391709.html.
4. Model Penal Code § 3.04(1) (1962) (emphasis added).
5. See U.N. Charter art. 2, para. 4 (“All Members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the Purposes of the United Nations.”). This understanding is at odds with the international realism school of thought. Under that theory, states use military force as a means of advancing their interests in an anarchic system. See generally Kenneth Waltz, Theory of International Politics (1979).
6. For example, during World War II, American fighters targeted and destroyed an aircraft carrying a Japanese official who planned the attack on Pear Harbor. See Harold Hongju Koh, Legal Advisor, U.S. Department of State, Keynote Address at the Annual Meeting of the American Society of International Law: The Obama Administration and International Law (Mar. 25, 2010). See also U.S. Army Field Manual, 27-10, The Law of Land Warfare, ¶ 31 (1956) (authorizing attacks on individual officers).
7. Department of Justice White Paper, Lawfulness of a Lethal Operation Directed Against a U.S. Citizen Who Is a Senior Operational Leader of Al-Qa’ida or an Associated Force (2013).
8. John Brennan, Assistant to the President for Homeland Sec. & Counterterrorism, Keynote Address at the HLS-Brookings Program on Law and Security (Sep. 16, 2011).
9. A very simple formula would compare (probability of success × benefits of success) with (probability of failure × cost of failure) + (cost of inaction).
10. Eric Holder, Attorney General, U.S. Department of Justice, Speech at Northwestern University School of Law (Mar. 5, 2012).
11. Mark Landler & David Sanger, U.S. and Israel Split on Speed of Iran Threat, N.Y. Times, Feb. 8, 2012.
12. See Holder speech, supra note 10.
13. See generally Jane Mayer, The Predator War, New Yorker, Oct. 26, 2009.
14. See, e.g., Exec. Order No. 13,382, 70 C.F.R. 38567 (2005).
15. See generally Matthew C. Waxman, “Cyber-Attacks and the Use of Force: Back to the Future of Article 2(4), 36 Yale J. Int’l Law. 421 (2011).
16. See, e.g., Kenneth Anderson & Matthew Waxman, “Law and Ethics for Robot Soldier,” Policy Review, 176 (Dec. 1, 2012). An example of this type of technology is the Navy’s AEGIS Combat System
17. Al Aulaqi v. Obama, 727 F. Supp. 2d 1 (2010). Anwar Al-Aulaqi was killed by an American UAV in 2011.
18. Id.
19. Id. at 72 (internal quotation marks omitted).

A Beginner’s Naval Intelligence Reading List

By Mark Munson

While the very topic of naval intelligence may seem to imply secrecy, there is a substantial literature on the topic available to the general reader. While many of the books below may be well known to many in the field, they remain a useful start for the uninitiated:

Patrick Beesley’s two books about British efforts to collect, analyze, and use intelligence, particularly in support of the fight against German submarine warfare, are the best places to start for anyone interested in the practical application of intelligence at sea. Very Special Intelligence: The Story of the Admiralty’s Operational Intelligence Centre, 1939-1945 discusses the Second World War, while Room 40: British Naval Intelligence 1914-1918 covers the First World War. In both books Beesley contrasts the performance of these organizations during the two wars (the sharing and use of intelligence was much better during the Second World War). The discussion of British Naval Intelligence’s involvement in the famous Zimmermann Telegram and the subsequent U.S. entry into the First World War is fascinating.

The recommendation of John Keegan’s Intelligence in War may seem a little too obvious and on the nose, but his chapters on intelligence during the age of sail, the First World War, and the Battles of the Atlantic and Midway during the Second World War are one of the best summations of how wireless communications largely created what naval intelligence practitioners call OPINTEL (operational intelligence). Before wireless communications navies conducted “scouting” and “reconnaissance,” but intelligence as we understand it today largely results from the wireless revolution.

Christopher Ford and David Rosenberg’s The Admiral’s Advantage: U.S. Navy Operational Intelligence in World War II and the Cold War is a flawed book, in large part because this slim volume uses the excuse of many of its sources still being classified to justify the general lack of detail and substance devoted to its subject. Having said that, it’s virtually the only source available to a general audience that explains the post-Second World War history of U.S. Navy intelligence. Among the more interesting claims it makes is that the U.S. Navy’s famous Maritime Strategy of the 1980s was directly informed by a detailed understanding of Soviet naval doctrine by American intelligence analysts.

Colonel John Hughes-Wilson’s Military Intelligence Blunders and Cover-Ups features regularly in military and academic courses on intelligence. Discussion of Indications and Warning failures include chapters on Pearl Harbor, the 1973 October/Yom Kippur/Ramadan War, and the Falklands.

“Eddie” Layton and “Joe” Rochefort are two figures considered among the founding heroes of the U.S. Navy’s Intelligence and Information Warfare communities, respectively. Layton (he retired as a Rear Admiral) was the Pacific Fleet’s intelligence officer during the Second World War (both during the Pearl Harbor disaster and the later American victories in the Pacific) while Rochefort led the codebreaking effort that enabled the American victory at Midway. Layton’s autobiography And I was There as well as the recently published biography, Joe Rochefort’s War, offer insight into how a few surface line officers in the inter-war period began to specialize in intelligence-related duties. Of note, both Layton and Rochefort participated in a program that sent them to Japan for several years to learn the language and culture first-hand, an investment that seems to have paid off.

U.S. Naval Intelligence has been one of the many elements of the intelligence community supporting the various aspects of what used to be called the Global War on Terrorism. Mark Bowden is probably the most well-known author covering the special operations world over the fifteen years. While Black Hawk Down is his most famous book, Killing Pablo: The Hunt for the World’s Greatest Outlaw offers another look at the formative years of the current U.S. Special Operations complex and how intelligence is collected and used to target individuals. He’s also written articles for the Atlantic on the 2006 killing of Abu Musab Zarqawi in Iraq, American Special Operations in the Philippines, and counter-drug operations in Colombia.

For those interested in film treatments of intelligence in support of counter-terrorism the obvious choice is probably Zero Dark Thirty. My choice, however, is John Malkovich’s adaptation of Nicholas Shakespeare’s the Dancer Upstairs, a fictionalized depiction of the hunt for Abimael Guzmán, the leader of Peru’s Marxist Sendoro Luminoso Maoist guerrillas in the 1980s and 90s (both the book and film are excellent).

Lieutenant Commander Mark Munson is a Naval Intelligence officer currently serving on the OPNAV staff. He has previously served at Naval Special Warfare Group FOUR, the Office of Naval Intelligence, and onboard USS Essex (LHD 2). The views expressed are solely those of the author and do not reflect the official viewpoints or policies of the Department of Defense or the US Government.

AFRICOM’s Chinese Satellites: How To Lose At Mastermind

THIS ARTICLE WAS ORIGINALLY PRINTED ON MAY 3, 2013 AND IS BEING RE-PRINTED FOR “CHALLENGES OF INTELLIGENCE COLLECTION WEEK.”

Easy to learn. Easy to play. Now, much easier to win.
                                   It gets easier with practice.

For many, the game Mastermind is their first adolescent introduction to cryptology.  A code-breaker is given limited turns to discover the encrypted signal of the code-maker.  By choosing to put AFRICOM bandwidth over state-controlled Chinese satellites in 2012, the U.S. Defense Department decided to extend their PRC opponents exponentially more “rounds” to win the game.  The U.S> has won a tactical convenience at the cost of strategic peril.

Defense Department representatives claim the use of the satellites was secure due to the encrypted nature of the transmissions.  However, as in Mastermind, more exposure reveals more information, with which the code-maker can be beaten.  With an unrestricted treasure-trove of data, the cyber-battle proven Dirty Data Dozen of Chinese cyber-warfare will have plenty of material to compare and contrast until base patterns are found and exploited.  This vulnerability is especially worrisome in an area of responsibility rife with corruption issues and general penetration by state-associated Chinese assets.  That access to the satellite transmissions might be doubly useful because of the potential access to the pre-transmitted data, further easing decryption efforts.  This undermines force-wide communications, providing information that will end up not only in the hands of the Chinese, but the actors with whom their intelligence services cooperate.  The U.S. stands not only to lose one game of Mastermind, but most of the tourney.

You must accept that you won’t always have attractive alternatives. The Big Picture may demand tactical sacrifice.

It was only last month that the CNO, ADM Greenert, said that the cyber-EM environment isso critical to our national interests, that we must treat it on par with our traditional domains of land, sea, air, and space…”  The EM-cyber spectrum may be invisible, but they have the same space constraints as those traditional domains.  During the Cold War, if the berths at Bremerton were full, the U.S. Navy would never have requested berthing space in Vladivostok; if the U.S. Army found itself under-equipped, they would never request use of radio towers in East Germany to communicate with West German patrols.  Resources are limited and must be rationed; put simply by Raymond Pritchett, “If this wasn’t the point to tell someone ‘no’ when they ‘needed’ bandwidth, what point is?”  Refusing to prioritize the strategic long-term viability of U.S. communications security over temporary tactical comfort is the laxity alluded to by the CNO when he highlighted the need for a new attitude.  We can start with the lessons learned from a 1970’s board game.

Matt Hipple is a surface warfare officer in the U.S. Navy.  The opinions and views expressed in this post are his alone and are presented in his personal capacity.  They do not necessarily represent the views of U.S. Department of Defense or the U.S. Navy.

Maritime Cryptology at the Crossroads

After more than a decade of land war and a desire to rebalance to Asia, America’s Navy finds itself smaller, and in many ways weaker in certain respects. One area that should be of great concern is the current practice and future of maritime cryptology.

Cryptology at sea was proven decisive during World War II, beginning with the battle at Midway and the breaking of the Japanese naval code “JN25.”[i] Equally important was the allied program that cracked the German Enigma machines, “Ultra,” especially those used by the German Navy. Winston Churchill famously remarked to King George VI that, “It was thanks to Ultra that we won the war.”[ii]

museum
(A selection of seven Enigma machines and paraphernalia exhibited at the USA’s National Cryptologic Museum. From left to right, the models are: 1) Commercial Enigma; 2) Enigma T; 3) Enigma G; 4) Unidentified; 5) Luftwaffe (Air Force) Enigma; 6) Heer (Army) Enigma; 7) Kriegsmarine (Naval) Enigma—M4.)[iii]
Throughout the ensuring Cold War until the fall of the Berlin Wall, naval cryptology played a vital role in meeting national and tactical intelligence requirements. America gained deep insight and understanding of Soviet and Warsaw Pact allied naval operations and was able to obtain priceless strategic intelligence through collection missions operated by the U.S. Navy. The end of the Cold War, ensuing strategic drift and drawdown was shattered by the terrorist attack of 9/11, yet even in the midst of a worldwide “Global War on Terror,” the pressure remained to cut the naval force. Today, the Navy is at its smallest point since World War I. For the Navy to conduct its maritime cryptology mission, it must have presence in the littorals, especially in key strategic areas of the Western Pacific, Indian Ocean and Arabian Gulf and the Mediterranean and elsewhere. A smaller Navy with fewer platforms means the Navy is not always where it needs to be and when it needs to be there.

The hope was that through force shaping, automation and remote operations, maritime cryptology could continue to thrive in an ever more complex electromagnetic (EM) environment. Adversarial communications have become far more challenging to detect, exploit and prosecute. The Radio Frequency (RF) environment of today is incredibly complex, with tactical, strategic and data communication links operating in all areas of the spectrum and often at frequencies with a very low probability to intercept. Modern encryption techniques have evolved from mechanical electronics to the use of quantum mechanics.[iv]

crypto

The effects of force shaping, automation and remote operations are beginning to take their toll on the tradecraft of maritime cryptology. Today’s junior Sailors and officers have had their training time cut in order to meet growing operational demands on a shrinking Navy. To be successful in the art of cryptology – and it is a practiced art – one must have a deep understanding of the fundamentals of radio signal transmission as well as more than a passing familiarity with the collection equipment. A junior cryptologic technician and junior officer should be able to draw a basic transmitter-receiver diagram and trace the origin of a signal from its original state, such as voice or data, through the transmitter, across a medium and into the collection gear and the operator’s ears. Foundational knowledge required that the basic operator have a working knowledge of the equipment and be able to perform diagnostic and troubleshooting tasks in the event of a malfunction. Finally, operators and junior officers must understand the process of signal intelligence reporting to the tactical unit at sea (indications and warning intelligence) as well as to the national signal intelligence system.

spectrum

At the same time, emerging cyberspace communication networks place entirely new pressures on maritime cryptology. Modern communication, command, control and information sharing are a “network of networks,” an “Internet of things” that require new skill sets and new acquisition and exploitation technologies. Yet the complexity of data systems and volume of data being passed is growing exponentially, outpacing our acquisition and procurement capability. The Navy has tried to mitigate this by relying on commercial off-the-shelf technology (COTS) but this entails its own set of problems. COTS technology must be compatible with legacy systems – some more than twenty years old and built on architecture and code from the late 1980s and early 1990s – and it relies on bandwidth levels that are not always available and reliable. We often find out the hard way that equipment which works well in the sterile lab environment is not up to the task of performing reliably at sea under arduous conditions.

Maritime cryptology is at a cross roads. We must return to the fundamentals of signal intelligence at the same time we are trying to realize the potential of cyberspace operations at sea. This will require a renewed commitment to recruitment and training, and for many middle grade and senior enlisted cryptologic technicians and officers, it means new formal training. Right now, senior enlisted and officers are being asked to take leadership roles in an emerging cyberspace operations field for which they are receiving inadequate or no formal training. We must reconsider recruitment of new junior Sailors and officers who have the background skills, education and knowledge and provide them a career path that emphasizes cryptologic expertise across the spectrum, from “traditional” signals intelligence to modern wireless exploitation. This career path must be grounded in recognizing that maritime cryptology is more art than science, and to become proficient and experienced, one must practice.

The author would like to thank CDR Kevin Ernest who kindly provided his thoughts on the challenges of modern maritime cryptology.

LT Robert “Jake” Bebber is an information warfare officer assigned to the staff of U.S. Cyber Command. The views expressed here are his own and do not represent those of the Department of Defense, the Department of the Navy or U.S. Cyber Command. He welcomes your comments at jbebber@gmail.com.

[i] http://www.navy.mil/midway/how.html

[ii] http://www.history.co.uk/study-topics/history-of-ww2/code-breaking

[iii] http://en.wikipedia.org/wiki/Enigma_machine#cite_note-9

[iv] http://blogs.scientificamerican.com/guest-blog/2012/11/20/quantum-cryptography-at-the-end-of-your-road/

Fostering the Discussion on Securing the Seas.