Hostname: page-component-78c5997874-j824f Total loading time: 0 Render date: 2024-11-05T04:29:34.878Z Has data issue: true hasContentIssue false

A US perspective on special operations and the law of armed conflict

Published online by Cambridge University Press:  27 September 2024

Kevin Coble*
Affiliation:
Judge Advocate, US Army Military Professor, Stockton Center for International Law, US Naval War College, Newport, RI, United States
John C. Tramazzo*
Affiliation:
Judge Advocate, US Army Military Professor, Stockton Center for International Law, US Naval War College, Newport, RI, United States
Rights & Permissions [Opens in a new window]

Abstract

This article outlines and evaluates several unique challenges associated with legal support to special operations. It describes the essential differences between special tactics, techniques and procedures and conventional military operations. It offers a US perspective on how treaty and customary international laws apply to various special operations, including precision attacks against “high-value targets”, hostage rescue missions, and support to partner and proxy forces. It examines the benefits and drawbacks of heavy reliance on special operations during armed conflict, including an assessment of the legal challenges that arise when special operations forces become a primary feature of a military campaign. Finally, it highlights how the assumption of substantial military and political risk impacts the application of international law to special operations at the tactical level.

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
Copyright © The Author(s), 2024. Published by Cambridge University Press on behalf of International Committee of the Red Cross

Introduction

Special operations forces (SOF) perform a variety of missions across the spectrum of operating environments. For instance, amid the armed conflict between Ukraine and Russia, SOF on both sides are collecting intelligence, engaging in sabotage and attacking critical targets.Footnote 1 In the Gaza Strip, the West Bank and Lebanon, Israeli special operations units are attacking Hamas and Hezbollah leaders and attempting to rescue hostages, some of whom are held underground.Footnote 2 And in the 2023 conflict over the Nagorno-Karabakh region, Azerbaijani forces deployed four ground-based SOF units and a special naval warfare unit “deep into the enemy's rear areas to target and destroy [Armenian] command and control networks, critical infrastructure, and air defense systems”.Footnote 3

Other militaries, particularly those from Western countries, rely heavily on SOF to achieve tactical, operational and strategic effects during armed conflict.Footnote 4 Inter alia, SOF conduct intelligence, reconnaissance and surveillance (ISR) activities,Footnote 5 direct precision air strikes from both manned and unmanned aerial platforms,Footnote 6 enforce United Nations (UN) Security Council resolutions,Footnote 7 coordinate internet-based influence campaigns,Footnote 8 and enable partners and proxies.Footnote 9

SOF occupy a particular place of prominence in the US military. Today, US SOF are reportedly active in more than 140 countries and spend nearly $13 billion each fiscal year.Footnote 10 They are the United States’ “primary tool” for combating transregional terror groups like al-Qaeda and the Islamic State of Iraq and Syria (ISIS) in the Middle East, Africa and Central Asia.Footnote 11 Consequently, the number of personnel assigned to US SOF units increased from 38,000 in 2001 to 73,000 in 2020,Footnote 12 a force larger than the German Army.Footnote 13 Special operators endured over half of American military casualties between 2001 and 2022 despite comprising just 3% of US armed forces, a testament to the United States’ heavy reliance on SOF and the intensity of their combat operations.Footnote 14

Many scholars and practitioners have assessed SOF-peculiar operational capabilities. Some have analyzed and criticized certain SOF drone strikes, raids and proxy warfare campaigns,Footnote 15 while others have written about the ethics of special tactics and programmes.Footnote 16 However, in open-source material, only a handful of scholars have examined how the law of armed conflict (LOAC) governs special operations.Footnote 17 This article seeks to fill that void by exposing readers to various practical considerations and challenges associated with legal support to SOF.

The first part of this article defines special operations and describes why they are, in fact, special. The second part analyzes key legal issues associated with select special operations. First, it discusses how the law of armed conflict regulates high-value targeting (HVT). Second, it describes how the law applies to certain hostage rescue tactics, techniques and procedures. Third, it explains various legal challenges associated with SOF support to partner and proxy forces. Finally, in the third part of the article, we offer our conclusion, including a reminder that applying international law to military operations requires an appreciation of context and a balance between humanity and military necessity.

What are special operations and what makes them “special”?

American SOF trace their roots to the Office of Strategic Services (OSS). During World War II, the OSS's mission was to “‘effect physical subversion of the enemy,’ in three distinct phases: infiltration and preparation, sabotage and subversion, and direct support to guerrilla, resistance, or commando units”.Footnote 18 Modern US domestic law reflects these activities and more. In accordance with the US Code, special operations tasks include “direct action, strategic reconnaissance, unconventional warfare, foreign internal defense, civil affairs, military information support operations, counterterrorism, humanitarian assistance, theater search and rescue, and such other activities as may be specified by the President or the Secretary of Defense”.Footnote 19 The “other activities” phrase leverages the flexibility and adaptability of SOF; for example, the secretary of defence designated USSOCOM as the coordinating authority for countering the proliferation of weapons of mass destruction in 2016.Footnote 20

The North Atlantic Treaty Organization (NATO) and its member States also consider tasks like direct action, strategic reconnaissance, unconventional warfare and counterterrorism to fall within the ambit of special operations.Footnote 21 So do the United States’ strategic competitors, RussiaFootnote 22 and China.Footnote 23 Additionally, some States employ specialized military units to conduct covert actions (e.g., illicit financing and political subversion) that are more regularly associated with civilian intelligence services.Footnote 24 However, it is important to note that euphemistic descriptions of conventional military operations as “special”, such as Russia's so-called “special military operation” in Ukraine, do not place such operations within the commonly accepted definition of special operations.Footnote 25

Special operations differ from conventional military operations in three significant ways. First, they are conducted by carefully chosen, highly trained and well-equipped military personnel.Footnote 26 In the US military, special operators are specially selected from their services, are older on average than their conventional counterparts, possess far greater operational experience, and complete advanced training in languages, cultures and special operations techniques.Footnote 27 American SOF also benefit from specific congressional funding for brain health care, cognitive performance assessments and family support programmes.Footnote 28 In other words, SOF are not “general purpose” (i.e., conventional) forces and, in our view, should not be systematically employed to conduct conventional military operations.Footnote 29

Second, unlike general purpose forces, “special operations require unique modes of employment, tactics, techniques, procedures, and equipment”.Footnote 30 These tactics and techniques may include high-altitude parachuting, special boat insertions, the wear of non-standard uniforms or indigenous clothing to assure secrecy or concealment, the use of non-standard weapons and ammunition, and other tactics that emphasize speed, shock, surprise and overwhelming violence.Footnote 31 Unlike conventional warfare, which involves “large-scale, sustained combat operations”,Footnote 32 special operations typically involve lightly armed, agile teams that “strike enemies where and when they are most vulnerable” and withdraw rapidly.Footnote 33 As one author has explained, SOF can “carry out tactical actions producing strategic effect out of proportion to the amounts of personnel and equipment committed”.Footnote 34 For example, only twenty-three US Navy SEALs participated in the 2011 raid against Osama bin Laden, which lasted “a few short minutes” but marked a significant milestone in the Global War on Terror.Footnote 35

Third, special operations “are characterized by … a high degree of risk”.Footnote 36 The employment of SOF, particularly in “hostile, denied, or politically and diplomatically sensitive areas”,Footnote 37 reflects an acceptance of “political or military risk not associated with operations by conventional forces”.Footnote 38 In the British Army, for example, SOF “can be authorised to operate at higher risk beyond the remit of conventional forces”.Footnote 39 As a result, national command authorities often select special operators to conduct the most high-risk or strategically important missions because of their talent, resources and experience.

Applying the law of armed conflict to certain categories of special operations

The United States often uses SOF for various types of operational missions. We have selected three categories of operational activity for close legal examination: HVT, hostage rescue operations and proxy force operations.

High-value targeting

SOF conduct “surgical strikes against sensitive targets” and the “capture of enemy leaders”.Footnote 40 These operations are commonly referred to as HVT operations and occur in both international and non-international armed conflicts. HVT is not a legal term of art; instead, it describes “lethal strikes, raids, and/or offensive cyber operations to capture or kill key enemy combatants and materiel”.Footnote 41 During the conflict in Vietnam, for example, a special operations unit called OPS-35 identified, raided and attacked critical targets along the Ho Chi Minh Trail, which “compelled Hanoi to divert resources that would otherwise have been directed to military operations against South Vietnam”.Footnote 42 In the decades that followed, SOF from numerous States sought to “decapitate” enemy forces by capturing or killing high-value individuals during armed conflicts in the Balkans, Libya, Panama, Sierra Leone, Somalia and Iraq.Footnote 43 These missions were not always successful, partly because of the high risks and difficulties of targeting senior leaders, and the utility of decapitation campaigns remains questionable.Footnote 44 Nevertheless, the prospect of degrading an enemy force's command structure remains an attractive military strategy that warrants high-risk efforts to remove senior leaders from the battlefield.Footnote 45

Following 11 September 2001, US SOF assumed primary responsibility for identifying and attacking senior terror group leaders like Al-Qaeda's Osama bin Laden and Abu Musab al-Zarqawi and the Taliban's Mullah Akhtar Mohammed Mansour.Footnote 46 Likewise, members of the Canadian Special Operations Forces Command, British 22 Special Air Service (SAS) and Australian Special Air Service Regiment targeted and interdicted key enemy leaders in Iraq, Afghanistan and Syria.Footnote 47 French SOF assumed responsibility for targeting the most senior members of Al-Qaeda in the Islamic Maghreb.Footnote 48 More recently, US SOF led coalition efforts to identify and kill “particularly charismatic or effective members of [the so-called Islamic State group]”, including its most senior leaders, Abu Bakr al-Baghdadi and his successor Abu Ibrahim al-Hashimi al-Qurayshi.Footnote 49

Targeting senior leaders like these requires talent, operational experience, integration with other government agencies, moral intuition,Footnote 50 unique assets and authorities,Footnote 51 decentralized decision-making, and speed. Special operations personnel are selected, trained and equipped to identify and either capture or attack high-value enemy targets. In addition, they often enjoy relatively permissive rules of engagement (ROE) and regular access to embedded legal advisers who specialize in the LOAC.

Proportionality

The legal rules governing the conduct of hostilities in armed conflict always apply to special operations, but HVT presents unique compliance challenges, especially in the realm of proportionality. The proportionality rule, which is customary international law in both international and non-international armed conflicts,Footnote 52 requires combatants to “refrain from … launch[ing] any attack which may be expected to cause incidental loss of civilian life, injury to civilians, [or] damage to civilian objects … which would be excessive in relation to the concrete and direct military advantage anticipated”.Footnote 53 A commander's assessment of “military advantage” is not limited to the “immediate tactical gains but may be assessed in the full context of the war strategy”.Footnote 54 Still, anticipated military advantages must always be “concrete and perceptible … rather than … hypothetical and speculative”.Footnote 55 In theory, and regardless of a conflict's classification, effective HVT operations deliver tangible effects.

Because the LOAC permits attacks against military objectives “when it is known that some civilian deaths or injuries will occur”,Footnote 56 attacks against genuinely “high-value” targets, which might include people or objects, might lawfully cause extensive collateral damage, so long as it is not excessive in relation to the military advantages gained by the attack.Footnote 57 In other words, because an attack against a high-value target can produce particularly significant concrete and direct military advantages, extensive collateral damage may not be unlawfully excessive.Footnote 58 This is a blunt reality of war and one of the most daunting challenges associated with legal support to lethal special operations.

Take, for instance, a situation in which SOF have positively identified an elusive and particularly dangerous chemical weapons developer who is located in an urban centre inside a conflict zone. Suppose further that intelligence indicates that the chemical weapons developer is building a mustard gas weapon and planning to use it to attack military forces in the region. In that case, the law allows the SOF commander to attack the chemical weapons developer in the urban centre even though some civilian harm may occur as a direct result. However, if credible intelligence indicates that the chemical weapons developer is planning a large-scale chemical attack against civilians in a densely populated city outside of the conflict zone (i.e., a terrorist attack), the tolerance for collateral damage may be much higher.

The challenge lies in determining how much harm the LOAC and domestic policy tolerate.Footnote 59 To answer this question, a commander and their legal adviser must understand and consider the law, contextual factors, the applicable ROE, and the staff's recommendations. Additionally, because “there is no agreed-upon metric for determining how much civilian harm would be excessive in light of the expected military advantage”, the commander must rely on his or her experience and intuition.Footnote 60 In a potential future large-scale armed conflict, highly proscriptive ROE and policy-driven targeting restrictions commonly used during counterterrorism operations may be replaced by broader, intent-driven ROE. This will be particularly true for SOF, which generally operate with relative autonomy and independent initiative as opportunities arise.Footnote 61 As a result, these challenges will only increase in future conflicts.

Extreme targeting dilemmas are not hypothetical for commanders within SOF or their supporting legal advisers.Footnote 62 In Iraq and Syria, US SOF identified and targeted ISIS chemical weapons developers like Abu Malik, a chemical engineer who worked in Saddam Hussein's “Muthana”, where he developed sarin gas weapons before joining Al-Qaeda in 2005.Footnote 63 US SOF killed Abu Malik in 2015 near Mosul after discovering intelligence indicating that he was coordinating mustard gas attacks against civilians in Europe. According to Gregory Koblentz, an expert on chemical and biological weapons, “[i]f Abu Malik had survived, his experience working for Saddam's program would have made the threat of the Islamic State's chemical weapons much higher”.Footnote 64 In our view, the removal of Abu Malik from the battlefield in Iraq delivered a direct and concrete blow to ISIS and spared many innocent civilians from the horrors of a chemical weapons attack.Footnote 65 Consequently, the operation to kill him may have also justified substantial harm to the civilian population in Mosul.

Throughout Operation Inherent Resolve in Iraq and Syria, US SOF attacked other high-value targets, including senior leaders and members with unique technical, scientific and financial skills. They did so under ROE that sometimes explicitly permitted civilian casualties and damage to civilian objects.Footnote 66 In particular, US SOF targeted ISIS's external operators (i.e., those seeking to conduct mass casualty attacks in cities outside of the conflict zone) before they could coordinate large-scale suicide attacks against civilians.Footnote 67 As recently as April 2023, US SOF conducted an air strike in Syria, killing Khalid ‘Aydd Ahmad al-Jabouri, a senior ISIS leader responsible for planning terror attacks in Europe.Footnote 68 While US Central Command quickly pointed out that the strike caused no collateral damage, the LOAC would have tolerated collateral damage provided that the responsible commander determined that it was not excessive in relation to the concrete and direct military advantages anticipated from the attack.

Nevertheless, “society is intolerant of civilian casualties”.Footnote 69 Retrospective proportionality assessments conducted by external organizations, media outlets and governments are often unforgiving because they are based on the actual effects of an attack rather than the harm anticipated by the commander at the time of the attack.Footnote 70 Consequently, many individuals have criticized US SOF for harming civilians, labelling some military operations as “unnecessary”,Footnote 71 “shameful”Footnote 72 and “reckless”.Footnote 73 Even after US SOF killed ISIS leader Abu Bakr al-Baghdadi in Syria in 2019, mainstream media reports focused on allegations that US forces had killed two civilians near the targeted compound but not on the necessity of, or the military advantages gained by, killing ISIS's most senior leader.

Under the LOAC, one cannot judge whether collateral damage is excessive without grasping the totality of the circumstances and a military objective's value.Footnote 74 Therefore, critics should never disregard the apparent military benefits of an attack just because it caused civilian harm. Admittedly, most outside observers will not fully understand the military advantages gained by attacking high-value targets because the intelligence used to characterize targets as “high-value” is typically derived from protected human sources or classified electronic surveillance programmes. Thus, armed forces cannot adequately explain the lawfulness of some attacks that cause collateral damage. Still, “[c]ombat … is an inherently messy, imprecise, bloody business”, and as Professor Michael Schmitt has argued, critics must “be cautious about wrapping lex ferenda in the cloak of lex lata”.Footnote 75

On the other hand, it is crucial to recognize how counterproductive civilian harm can be. Even legally justified collateral damage can “erode international support and affect foreign policy”.Footnote 76 As retired general Stanley McChrystal observed in Afghanistan, “[w]e're going to lose this … war if we don't stop killing civilians”.Footnote 77 The pursuit of high-value targets can impede an accurate view of the strategic landscape. In addition, some special operations personnel may view every potential target as “high-value”, which is a subjective and imprecise term. Theoretically, SOF should not bear primary responsibility for targets of “low” or “moderate” value. However, when SOF assume primary responsibility for an entire military campaign, some targets may be described as “high-value” even if they are not.

The relatively low-intensity campaigns of Iraq and Afghanistan revealed this operational design flaw. For example, as the inspector-general of the Australian Defence Force noted in the Afghanistan Inquiry Report,

[w]hile … Special Forces provide an attractive option for an initial deployment, it is a misuse of their capability to employ them on a long-term basis to conduct what are essentially conventional military operations. Doing this on a protracted basis in Afghanistan detracted from their intended role in the conduct of irregular and unconventional operations and contributed to a wavering moral compass.Footnote 78

In our view, commanders and staff officers within SOF must refrain from labelling routine targets (e.g., “rank and file” members of a hostile force or basic enemy fighting positions) as “high-value” because doing so may unintentionally result in causing unnecessary collateral damage. Effective SOF legal advisers must understand this dynamic and help commanders assign appropriate values to targets when conducting proportionality assessments.

Feasible precautions

Like all armed forces engaged in combat, SOF must also take feasible precautions when planning and conducting attacks. Article 57 of Additional Protocol I (AP I) requires combatants to “take all feasible precautions” to minimize the “incidental loss of civilian life, injury to civilians and damage to civilian objects”.Footnote 79 The International Committee of the Red Cross (ICRC) considers this principle to be customary international law applicable in international and non-international armed conflicts.Footnote 80 The United States has not ratified AP I and is therefore not bound by it, but US officials acknowledge that the obligation to “take feasible precautions” reflects customary international law.Footnote 81 The Department of Defense (DoD) Law of War Manual recognizes the duty to “take feasible precautions to reduce the risk of harm to the civilian population” and considers the word “feasible” to mean “practicable or practically possible, taking into account all circumstances ruling at the time, including humanitarian and military considerations”.Footnote 82

Within SOF, feasible precautions include actions like increasing the number of airborne ISR assets monitoring a target, including commercial, off-the-shelf drones; using human intelligence sources to verify the presence of civilians within a target building; providing advanced warnings to civilians through innovative, internet-based messaging; and using specialized munitions to minimize collateral damage. For example, prior to conducting attacks against chemical weapons developers in Iraq and Syria, US SOF “selected special incendiary bombs designed to generate a small blast radius but intense heat, to vaporize weapons, supplies and any residual gases that might otherwise escape”.Footnote 83 Similarly, US SOF have reportedly relied on the AGM-114R9X variant of the Hellfire missile, which uses six blades and kinetic energy to destroy targets.Footnote 84 These inert missiles do not use any explosives and therefore cause “little damage beyond the target”.Footnote 85

Next, when conducting raids,Footnote 86 SOF might employ a “tactical callout” to compel enemy fighters to surrender, placing them hors de combat,Footnote 87 and allow civilians to escape before a raiding force enters the structure.Footnote 88 For example, on 3 February 2022, a small contingent of US SOF conducted a raid in Syria's Idlib province that led to the death of Islamic State leader Abu Ibrahim al-Hashimi al-Qurayshi. While the national command authority considered an air strike to kill al-Qurayshi, the president ultimately chose to conduct a raid in order to mitigate the potential for harm to civilians in the compound.Footnote 89 Before dawn, special operations aviation personnel transported some two dozen assaulters to the town of Atmeh, Syria. During a “tense standoff”, the raiding force blasted warnings in Arabic over loudspeakers while one soldier conducted a “tactical callout” with a bullhorn, telling everyone in the house to surrender.Footnote 90 As a result, ten civilians were spared from harm before Qurayshi detonated a suicide vest on the third floor, killing himself, his wife and two of his children.Footnote 91 These are just a few examples of feasible precautions that SOF may employ to mitigate civilian harm during high-risk special operations.

In addition, SOF can enable “feasible precautions” for general purpose forces by conducting special reconnaissanceFootnote 92 behind enemy lines, and sometimes in civilian clothes, to verify targets before a larger operation. For example, during the Persian Gulf War, “SOF placed navigation beacons at key F-111 ingress points allowing for critical radar updates, thus improving bombing accuracy and reducing the possibility of collateral damage”.Footnote 93 In this regard, strategic reconnaissance may require a trade-off between legal principles (i.e., failing to distinguish oneself but for the purpose of taking feasible precautions), thus increasing the legal risk to the special operators in order to decrease the risk of physical harm to civilians and civilian objects.

The tactics of hostage rescue operationsFootnote 94

The non-international armed conflict between the US-led coalition and ISIS in Syria, Iraq and elsewhere was marked by a series of hostage situations. As Human Rights Watch noted in 2020, ISIS's expansion in Iraq and Syria “featured horrendous public abuses”, including detentions and kidnappings.Footnote 95 Hostage rescue operations are a core special operations activity.Footnote 96 The following section analyzes specific tactics related to hostage rescue operations. While it includes examples from domestic hostage rescue operations to illustrate the use of specific tactics, the analysis focuses on the legal aspects of hostage rescue during armed conflict.

The specialized SOF units that train for and execute hostage rescue missions must grapple with two fundamentally competing interests. On the one hand, the primary purpose of any hostage rescue mission is to save lives. However, to succeed in achieving the principal goal, special operators may need to employ lethal force against the hostage-takers or their sentinels. When hostage-taking occurs during armed conflict, the hostage-takers may be subject to attack under the LOAC's rules regarding combatants,Footnote 97 organized armed groups,Footnote 98 or civilians directly participating in hostilities.Footnote 99 However, hostage-takers are often co-located with their hostages, which significantly complicates the tactical operation and demands unique tactics, techniques and procedures. As a result, rescuers seek to separate hostage-takers from their hostages and protect the hostages from the effects of violence.

Riot control agents

One technique that US SOF may employ to separate the hostage-takers from their hostages is the use of riot control agents (RCAs). Article II(7) of the Chemical Weapons Convention (CWC) defines RCAs as “[a]ny chemical … which can produce rapidly in humans sensory irritation or disabling physical effects which disappear within a short time”.Footnote 100 Classic examples of RCAs include tear gas and pepper spray, which cause “irritation to the eyes, mouth, throat, lungs, and skin”.Footnote 101 Other RCAs include the chemical agent chloropicrin, which induces “severe vomiting and excessive tear formation”.Footnote 102 In the past, militaries and specialized police units have used RCAs to separate hostage-takers from hostages (i.e., to enable the distinction between lawful targets and civilians), to incapacitate hostage-takers temporarily, or to flush hostage-takers out from enclosed areas and tunnel systems. While many of these operations have occurred during peacetime (e.g., a law enforcement hostage rescue operation occurring outside of an armed conflict), the United States’ unique position on the CWC allows US SOF to use RCAs in an armed conflict in certain, limited circumstances.

Due to their temporary effects, the United States does not consider RCAs to be “chemical weapons” banned by the Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacteriological Methods of Warfare.Footnote 103 However, Article I(5) of the CWC, which applies in both international and non-international armed conflicts, prohibits the “use [of] riot control agents as a method of warfare”.Footnote 104 It is not entirely clear how the CWC's phrase “as a method of warfare” operates regarding the use of RCAs in armed conflict because the treaty does not define the term.Footnote 105

In the absence of a treaty definition and as a condition for ratifying the CWC, the United States interprets “method of warfare” consistent with Executive Order 11850, which predates the CWC.Footnote 106 This domestic presidential policy specifically authorizes the use of RCAs in war “in defensive military modes to save lives”.Footnote 107 As a result, when approved by a proper authority, US military personnel may use RCAs in situations where “civilians are used to mask or screen attacks and civilian casualties can be reduced or avoided” and during “rescue missions in remotely isolated areas, of downed aircrews and passengers, and escaping prisoners”.Footnote 108

While the United States looks to how RCAs are being employed to determine whether their use is lawful (i.e., are the RCAs being used as a method of warfare?), other States may look to the classification of the conflict between the hostage-rescuers and hostage-takers. The CWC does not prohibit the use of RCAs for “law enforcement including domestic riot control purposes”.Footnote 109 States, particularly those in Europe, generally rely on law enforcement organizations or paramilitary forces (e.g., Germany's GSG-9, France's GIGN, Belgium's SIE, and Ireland's Garda ERU)Footnote 110 to conduct hostage rescue operations domestically and abroad.Footnote 111 Incidentally, some scholars have expressed a view that the use of RCAs during a hostage rescue operation conducted by specialized law enforcement units may not be prohibited by the CWC, even during armed conflict.Footnote 112

Hostage rescue operations are fundamentally about saving lives. Thus, US SOF may lawfully use RCAs to separate hostages from hostage-takers within a building that has been transformed into a defensive strongpoint, to disable hostage-takers physically, or to flush hostage-takers from a building in which hostages are isolated, restrained or unable to escape. While the use of tear gas or pepper spray in an underground tunnel, like those beneath Gaza,Footnote 113 might incapacitate everyone within the tunnel, including hostages, it would not kill or permanently injure them. In other words, in our view, US SOF may use RCAs during hostage rescue operations to increase the chances that hostages will survive, not as a method of warfare.

Use of expanding bullets

Another potential tactic unique to hostage rescue operations in armed conflict is the use of expanding ammunition. Hostage rescue operations typically involve close quarters and short ranges, as they often occur within a confined space. Therefore, hostage-rescuers may prefer to use expanding bullets to mitigate the risk that a fired round may strike and then pass through a hostage-taker, travel through a wall, or ricochet, ultimately hitting or killing a hostage or fellow rescuer. Unlike standard, jacketed bullets, such as the United States’ M855A1 round, which are used to penetrate hard targets, expanding bullets flatten upon impact.Footnote 114 This flattening effect increases the bullet's stopping power by maximizing its surface area upon initial impact but decreases its ability to continue penetrating the object. As the late Professor Yoram Dinstein noted, in the context of hostage rescue operations, “[t]he use of [expanding] bullets maximizes the chances that the hostage-taker will be instantly put out of action (preventing him from injuring the hostages); and it also minimizes the risk that a bullet would pass through his body and strike a hostage”.Footnote 115

The ICRC takes the position that customary international law prohibits the use of “expanding bullets” in both international and non-international armed conflicts.Footnote 116 The ICRC derives its position from a variety of sources,Footnote 117 including the 1899 Hague Declaration concerning Expanding Bullets, which states that “[t]he Contracting Parties agree to abstain from the use of bullets which expand or flatten easily in the human body, such as bullets with a hard envelope which does not entirely cover the core or is pierced with incisions”.Footnote 118 The United States is not a party to this instrument, and also, by its own terms, the 1899 Hague Declaration only applies to “war” between the contracting parties.Footnote 119

The United States does not view the 1899 Hague Declaration as reflective of customary international law in armed conflict.Footnote 120 Instead, since 1899, the United States has maintained the position that expanding bullets, like all other munitions, are “only prohibited if they are calculated to cause superfluous injury”.Footnote 121 This position is consistent with the customary international law prohibition regarding superfluous injury and unnecessary sufferingFootnote 122 and the United States’ corresponding treaty obligations under Article 23(e) of the 1907 Hague Regulations, which prohibits parties from “employ[ing] arms, projectiles, or material calculated to cause unnecessary suffering”.Footnote 123

In addition, the Rome Statute of the International Criminal Court makes the use of expanding bullets a war crime in both international and non-international armed conflicts.Footnote 124 However, a required element of those offences is that “[t]he perpetrator was aware that the nature of the bullets was such that their employment would uselessly aggravate suffering or the wounding effect”.Footnote 125 Again, many States have concluded that Article 8 of the Rome Statute only criminalizes “the use of expanding bullets that are also calculated to cause superfluous injury”.Footnote 126

Importantly, as the late Hays Parks noted in a 1990 legal opinion for US Special Operations Command, “the fact that a weapon causes suffering does not lead to the conclusion that the weapon causes unnecessary suffering, or is illegal per se”.Footnote 127 Instead, the “calculated to cause” standard requires an analysis of the design intent of the munition or weapon.Footnote 128 In the case of expanding bullets, they were specifically designed to increase stopping power and decrease penetration in order to limit collateral damage. This design characteristic makes expanding bullets particularly effective during hostage rescue missions, during which forces must quickly neutralize a threat while minimizing the chances that the bullet will over-penetrate the target or structure. As a result, expanding bullets are not “calculated to cause unnecessary suffering”, and nor would their use for these purposes be unlawful.Footnote 129

In conclusion, based on the United States’ view, US SOF may lawfully use expanding ammunition during hostage rescue missions in armed conflict, so long as it is not used for the purpose of causing unnecessary suffering. As with RCAs, specialized law enforcement units that conduct hostage rescue operations may lawfully use expanding bullets for law enforcement purposes, even during armed conflict.Footnote 130 During hostage rescue operations, there are significant “humanitarian concerns for protection of the innocent civilians taken hostage or otherwise placed at risk, the members of the rescue force, or the civilian population in the surrounding area”.Footnote 131 Therefore, hostage-rescuers may use expanding ammunition “in such very close life-threatening situations” for the purpose of “employ[ing] a projectile that deposits all of its energy in the target. This provides for high target selectivity by maximizing the disabling effect on the target while minimizing the aforementioned risk to hostages or dangerous material.”Footnote 132

The wear of non-standard uniforms

Finally, surprise is an essential element of hostage rescue. According to Tomer Israeli, who served in both Shin Bet (Israeli Secret Service) and the Israeli Army Special Forces unit Sayeret Matkal, “surprise is the key”.Footnote 133 Similarly, US Army doctrine recognizes surprise as a critical element of a successful raid, explaining that in such a raid, “the unit overcomes any enemy forces at or near the objective in a violently executed surprise attack using all available firepower for shock effect”.Footnote 134

History reveals that to preserve the element of surprise, hostage-rescuers have worn both non-standard uniforms and civilian clothes when conducting hostage rescue operations. For example, in 1977, German GSG-9 and British SAS soldiers wore civilian clothing during the successful hostage rescue of Lufthansa Flight 181 in Mogadishu, Somalia.Footnote 135 Members of the SAS wore non-standard uniforms again in 1980 during a hostage rescue operation in the Iranian Embassy in London.Footnote 136 The American commandos involved in Operation Eagle Claw (the failed attempt to rescue American hostages in Tehran in 1980) wore non-standard uniforms approved by the Joint Chiefs of Staff and the president.Footnote 137 While most of these examples are of domestic hostage rescue operations, during an armed conflict, military members must distinguish themselves from the civilian population if they wish to remain entitled to prisoner of war (PoW) status and retain combatant immunity.Footnote 138

As a result, the tactic of wearing non-standard uniforms or civilian attire during a hostage rescue operation in an armed conflict requires additional analysis. Article 4(A)(2) of Geneva Convention III is often misconstrued as requiring combatants to wear uniforms during armed conflict,Footnote 139 but as Hays Parks explained in his seminal article, Article 4(A)(2) contains “no language requiring military personnel to wear a uniform, nor prohibiting them from fighting in something other than a full, standard uniform. Nor does it make it a war crime not to wear a uniform.”Footnote 140

During armed conflict, military members may lawfully wear non-standard uniforms.Footnote 141 This attire includes items such as camouflage-pattern garments, distinctive insignia, or military equipment (e.g., body armour) which otherwise distinguishes the wearer from the civilian population.Footnote 142 A non-standard uniform usually complies with Article 4(A)(2)'s conditions, allowing the wearer to maintain their entitlement to PoW status and their combatant immunity.Footnote 143 While international law does not prohibit military members from wearing civilian attire to collect intelligence or conduct acts of sabotage,Footnote 144 they would not be entitled to PoW status or combatant immunity if captured during an international armed conflict.Footnote 145 In sum, hostage-rescuers conducting operations in an armed conflict may lawfully wear standard uniforms, non-standard uniforms, or even civilian attire in certain circumstances.

But suppose the hostage-rescuers wore civilian clothes and concealed their weapons until the last possible moment before launching a surprise attack against the hostage-takers. Article 37(1) of AP I prohibits “kill[ing], injur[ing] or captur[ing] an adversary by resort to perfidy”. AP I defines perfidy as

[a]cts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international law applicable in armed conflict, with intent to betray that confidence …. [This includes] the feigning of civilian, non-combatant status.Footnote 146

As explained by Yoram Dinstein, “[t]he act of feigning civilian status becomes unlawful perfidy – and a war crime – if (and only if) there is an intentional betrayal of confidence by inviting the enemy to believe that a person is a civilian and then, e.g., pulling a hidden weapon and opening fire”.Footnote 147

While the United States is not a party to AP I, it acknowledges that it is customary international law that “combatants may not kill or wound by resort to perfidy” during armed conflict.Footnote 148 Further, as the ICRC has noted, the “rule [prohibiting perfidy] is supported by official statements and other practice pertaining to non-international armed conflicts”.Footnote 149 Thus, while SOF can certainly conduct reconnaissance of an objective area in civilian clothing, they must distinguish themselves from the civilian population during the actual hostage rescue despite the vital importance of surprise. Practically, special operators may comply with this obligation during armed conflict by simply wearing a distinctive insignia, load-bearing equipment (e.g., a vest or belt used to carry ammunition, firearms or first aid) or body armour and carrying arms openly. However, it remains imperative that SOF legal advisers be cognizant of these obligations and the tactical nuances of the operation (i.e., the context) when advising commanders during hostage rescue operations.

Proxy force operations

SOF do not only attack high-value targets or respond to crises; theatre-level commanders often incorporate SOF into broader campaign plans. One way SOF can achieve military objectives abroad, particularly in hostile, denied and politically sensitive environments, is by working “by, with, and through” foreign partners or proxy forces.Footnote 150 The US military understands “by, with, and through” to mean an approach in which “operations are led by … partners, state or nonstate, with enabling support from the United States or U.S.-led coalitions, and through U.S. authorities and partner agreements”.Footnote 151 Special operations can provide partners and proxiesFootnote 152 with training, equipment, intelligence and planning advice, and in armed conflict, they may direct or conduct combat operations alongside those forces.Footnote 153

In the US military, SOF are primarily responsible for “assess[ing], train[ing], advis[ing], and assist[ing] host-nation military and paramilitary forces” to enable “these forces to maintain the host nation's internal stability, to counter subversion and violence in their country, and to address the causes of instability”.Footnote 154 SOF can also enable resistance movements or insurgencies to “coerce, disrupt, or overthrow a government or occupying power by operating through or with an underground, auxiliary, and guerrilla force in a denied area”.Footnote 155 Within the US military, responsibility for this type of “unconventional warfare” belongs to US Army Special Forces,Footnote 156 also known as the Green Berets.Footnote 157

In 2014, US SOF began providing training, equipment and close air support to “vetted Syrians”, now known as the Syrian Democratic Forces (SDF), to destroy ISIS's so-called caliphate in Syria and prevent ISIS from conducting attacks outside of the conflict zone.Footnote 158 In Libya and Somalia, US SOF provided “direct, on-the-ground support” to local forces battling ISIS, Al-Shabaab and Al-Qaeda.Footnote 159 SOF from other nations, including the United Kingdom, France and Canada, have also reportedly supported partner operations to defeat terror networks in the Middle East and Africa.Footnote 160

A significant challenge arises, however, when an effective partner or proxy force engages in unlawful acts. In some circumstances, the only combat-proven partners may be local indigenous or guerrilla forces that are inexperienced or undisciplined. While “by, with, and through” operations may initially mitigate political risk, if a partner or proxy force violates the LOAC, the relationship could cause significant domestic and international repercussions for the supporting nation or jeopardize an entire operation. Indeed, the US military recently cancelled a series of military engagements in Africa, including “special operations and cyber courses”, due to human rights abuses among proposed partner forces.Footnote 161

The potential dilemma for SOF is that building relationships with a partner force requires substantial time and effort. Special operators may spend years or decades operating in a particular region of the world so they can commit to a deep cultural education, develop language fluency and build long-term relationships with State and non-State groups within that region.Footnote 162 US SOF endeavour to build a global network of “true partners who can confront their own threats” and who share intelligence about challenges to US interests.Footnote 163 When a particularly effective or habitual partner force violates the LOAC, withdrawal can be difficult. Often, the partner force may be the only source of reliable human intelligence in an area, a guarantor of safe access to an otherwise hostile region, or the only effective means for combating a threat. Embedded legal advisers can help ensure that special operators fulfil their duty to identify, document, report and assist with correcting LOAC violations, even though reported abuses may derail hard-earned relationships and strategically important programmes.

The United States’ support of El Salvador during its non-international armed conflict with the Farabundo Martí National Liberation Front (Frente Farabundo Martí para la Liberación Nacional, FMLN) highlights this challenge. In the late 1970s, El Salvador, a strategic US partner in Central America, faced collapse due to civil unrest and insurgent activity.Footnote 164 By 1981, the armed conflict had intensified, and as a result, the US Congress authorized the deployment of fifty-five Army Green Berets and Navy SEALs to help the Salvadoran military fight the FMLN and restore peace to the country.Footnote 165

Immediately, respect for human rights and the LOAC became one of the biggest challenges for SOF in El Salvador.Footnote 166 Special Forces personnel had to build rapport with their Salvadoran military counterparts, many of whom were “notorious human rights violators”.Footnote 167 In addition, many of the Salvadoran military rank and file were untrained conscripts who had been “led to believe [by their officers] that villagers who sympathized or aided and abetted the insurgents were legitimate military targets under the rules of engagement”.Footnote 168 Consequently, the Salvadoran military remained “in garrisons abusing civilians” rather than conducting effective operations against the FMLN.Footnote 169

However, US SOF could not overtly provide LOAC training because even mentioning the term “was a real turn-off” to the Salvadoran military.Footnote 170 Therefore, the special operators had to rely on creative means to encourage compliance. For example, US SOF “emphasized the distinction between combatants and civilians by teaching ambush techniques [that incorporated a civilian into] the scenario. If the soldiers killed the civilian … they failed the exercise.”Footnote 171

While El Salvador's compliance with the LOAC throughout the conflict was mixed, SOF's subtle LOAC training helped professionalize the Salvadoran military, and increased US pressure caused the Salvadoran government to implement LOAC reforms.Footnote 172 As a result, the Salvadorans became less abusive, which led to the FMLN's loss of a “valuable source of propaganda and recruiting justification”.Footnote 173 Ultimately, the Salvadoran military successfully repelled the FMLN's attempts to overthrow the government, and in 1992, the two sides agreed to a formal ceasefire.Footnote 174

International law requires States to respect the LOAC and the treaties to which they are bound.Footnote 175 However, whether States are obligated to ensure that others respect international law is subject to debate.Footnote 176 While the ICRC broadly interprets this obligation, some States, including the United States, have taken a narrower view.Footnote 177 Despite this view, the United States, as a matter of policy, seeks to promote adherence to the LOAC by othersFootnote 178 and looks to its partners’ compliance with the LOAC in “assessing the lawfulness of [the United States’] assistance to, and joint operations with, those military partners”.Footnote 179

Specifically, US federal law prohibits the DoD from providing “assistance to units of foreign security forces that have committed a gross violation of human rights”.Footnote 180 While the so-called Leahy Laws do not define the term “gross violation of human rights”, the Department of State (DoS) has interpreted it to include “torture or cruel, inhuman, or degrading treatment or punishment, prolonged detention without charges, causing the disappearance of persons …, or other flagrant denial of the right to life, liberty, and the security of person”, as well as “rape under color of law”.Footnote 181 Other acts, such as LOAC violations, can also fall within this definition.Footnote 182 Thus, before US SOF provide any training, equipment or assistance to a foreign force, the DoS must make sure that the unit and certain key members in the unit have not committed any Leahy Law violations.Footnote 183 Once embedded with a foreign force, if members of that force violate the LOAC, US SOF must immediately report, and potentially investigate, the allegation even if no US personnel were involved.Footnote 184 If the allegation is substantiated, the US government must then help the foreign government take “all necessary corrective steps”,Footnote 185 to include “bringing the responsible members of the unit to justice”,Footnote 186 in order for all US assistance to that unit to continue. Practically, embedded US SOF typically help foreign partner forces take the necessary corrective actions because of their relationship and co-location.

Additionally, States “are obliged by international law to refrain from actively encouraging violations of either treaties to which they are Party or ‘cardinal’ rules of the law of war”.Footnote 187 In its 1986 Nicaragua judgment, the International Court of Justice (ICJ) found that the US Central Intelligence Agency (CIA) had provided its Nicaraguan Contra proxy force with significant training, equipment, financing and direction.Footnote 188 Despite this, the Court determined that the Contras were not subject to the CIA's control and did not attribute their LOAC violations to the United States.Footnote 189 This case illustrates the challenges involved in attributing a surrogate force's LOAC violations to the supporting State.Footnote 190

In the Nicaragua case, however, the ICJ did find evidence that the CIA had actively encouraged the Contras to violate the LOAC via the dissemination of a poorly worded psychological warfare manual, which was reportedly written by an unsupervised, low-level employee.Footnote 191 Consequently, the Court held “[t]he United States is thus under an obligation not to encourage persons or groups engaged in the conflict in Nicaragua to act in violation of the provisions of Article 3 common to the four 1949 Geneva Conventions”.Footnote 192 The Court derived this obligation from “the general principles of humanitarian law” and stated that common Article 3 “constitutes a minimum yardstick” applicable in both international and non-international armed conflicts.Footnote 193 As a result, special operators who are deployed to remote regions of the world, and their supporting legal advisers, must ensure that all surrogate force training, planning and advice promotes compliance with the LOAC.

Conclusion

SOF from around the world conduct high-risk and politically sensitive missions in dangerous environments. Through the employment of special tactics and unique equipment, SOF can achieve strategically important effects during armed conflict. There is, of course, no special operations exemption to international law, but legal advisers, commanders and commentators must always appreciate how contextual factors affect the application of the LOAC to special operations. The tactical nuances of an operation can drastically affect the application of a legal rule, prohibiting conduct in one setting or permitting action in another. The law represents a challenging balance of interests that special operations personnel and their legal advisers must seek to master.

Footnotes

The views presented in this article are those of the authors and do not necessarily represent the views of the US Department of Defense or its components.

The advice, opinions and statements contained in this article are those of the author/s and do not necessarily reflect the views of the ICRC. The ICRC does not necessarily represent or endorse the accuracy or reliability of any advice, opinion, statement or other information provided in this article.

References

1 See e.g. Bukkvoll, Tor, “Russian Special Operations Forces in Crimea and Donbas”, The U.S. Army War College Quarterly: Parameters, Vol. 46, No. 2, 2016Google Scholar. See also Dieanu, Adrian-Corneliu, “The Role of Ukrainian Special Operations Forces within the War in Ukraine”, Proceedings of the International Science Conference Strategies XXI, Vol. 18, No. 1, 2022Google Scholar, available at: https://revista.unap.ro/index.php/strategies21/article/view/1539 (all internet references were accessed in September 2024); Paul Adams and George Wright, “Ukraine War: Leak Shows Western Special Forces on the Ground”, BBC News, 11 April 2023, available at: www.bbc.com/news/world-europe-65245065.

2 Jerusalem Post Staff, “IDF Special Forces Take Over Gaza Tunnel Shaft, Seen Through Helmet Cam”, Jerusalem Post, 21 December 2023, available at: www.jpost.com/israel-hamas-war/article-779050; Jerusalem Post Staff and Yonah Jeremy Bob, “IDF Special Forces Operate within Lebanon, Target Hezbollah”, Jerusalem Post, 16 January 2024, available at: www.jpost.com/breaking-news/article-782338.

3 Edward J. Erickson, “The 44-Day War in Nagorno-Karabakh: Turkish Drone Success or Operational Art?”, Military Review, August 2021, available at: www.armyupress.army.mil/Journals/Military-Review/Online-Exclusive/2021-OLE/Erickson/.

4 See e.g. Gabriele Pierini and Leonardo Doddi, “Back to the Future: Designing the Role of NATO Special Operations Forces in the 21st Century”, Atlantic Forum, 1 June 2023, available at: www.atlantic-forum.com/atlantica/back-to-the-future-designing-the-role-of-nato-special-operations-forces-in-the-21st-century; Shamir, Eitan and Ben-Ari, Eyal, “The Rise of Special Operations Forces: Generalized Specialization, Boundary Spanning and Military Autonomy”, Journal of Strategic Studies, Vol. 41, No. 3, 2018Google Scholar; Stringer, Kevin D., “Special Operations Forces (SOF): The Integrators for Total Defense and Resistance”, Journal on Baltic Security, Vol. 8, No. 1, 2022Google Scholar.

5 Hardy, John, “Hunters and Gatherers: The Evolution of Strike and Intelligence Functions in Special Operations Forces”, International Journal of Intelligence and Counterintelligence, Vol. 36, No. 4, 2023, p. 1149Google Scholar.

6 Special Operations Forces Acquisition, Technology and Logistics, “Program Executive Office Fixed Wing”, US Special Operations Command, available at: www.socom.mil/SOF-ATL/Pages/programs_new.aspx. See also Andrew Feickert, U.S. Special Operations Forces (SOF): Background and Issues for Congress, RS21048, Congressional Research Service, 9 February 2024, pp. 3–5.

7 See e.g. Burduja, Radu, Use of Special Operations Forces in United Nations Missions: A Method to Resolve Complexity, School of Advanced Military Studies, US Army Command and General Staff College, 2015Google Scholar.

8 Richard D. Clarke, Statement before the 117th Congress, Senate Armed Services Committee, 5 April 2022. See also Herbert Lin and Trisha E. Wyman, “Special Operations Forces and Cyber-Enabled Influence Operations”, in Zachary S. Davis et al. (eds), Strategic Latency Unleashed: The Role of Technology in a Revisionist Global Order and the Implications for Special Operations Forces, Center for Global Security Research, Lawrence Livermore National Laboratory, January 2021.

9 See e.g. Andrew Alcocer, The Role of Special Operations Forces in Defeating the Islamic State and Its Implications for the Future, Johns Hopkins University, 18 May 2021; Solli, Bjørn-Erik, “The Essence of Special Operations – What You Need to Know about Special Operations while Serving at the Joint Operational Level”, Three Swords Magazine, Vol. 37, 2021Google Scholar.

10 Nick Turse, “America's Commandos Deployed to 141 Countries”, Common Dreams, 19 March 2020, available at www.commondreams.org/views/2020/03/19/americas-commandos-deployed-141-countries; “Kelly Opening Statement at Hearing on FY23 Budget Request for U.S. Special Operations Forces and USSOCOM”, press release, US House Armed Services Committee, 28 April 2022, available at: https://armedservices.house.gov/news/press-releases/kelly-opening-statement-hearing-fy23-budget-request-us-special-operations-forces.

11 Michael Vickers, “Special Operations Forces: A Primary Tool”, The Cipher Brief, 15 May 2016, available at: www.thecipherbrief.com/column_article/special-operations-forces-a-primary-tool; see also Michael Gordon, “Explainer: U.S. Strategy to Defeat ISIS”, Wilson Center, 30 September 2022, available at: www.wilsoncenter.org/article/explainer-us-strategy-defeat-isis.

12 “As U.S. Special Ops Role Has Expanded, So Have Impacts on Servicemembers and Their Families”, Government Accountability Office, 31 March 2022, available at: www.gao.gov/blog/u.s.-special-ops-role-has-expanded-so-have-impacts-servicemembers-and-their-families.

13 Walter Haynes, “The Hidden Costs of Strategy by Special Operations”, War on the Rocks, 17 April 2019, available at: https://warontherocks.com/2019/04/the-hidden-costs-of-strategy-by-special-operations.

14 David Vergun, “Officials Describe Special Operations Forces’ Contributions to National Security”, US Department of Defense News, 25 March 2021, available at: www.defense.gov/News/News-Stories/Article/Article/2550459/officials-describe-special-operations-forces-contributions-to-national-security/.

15 See e.g. Katherine Yon Ebright, “Secret War”, Brennan Center for Justice, 3 November 2022, available at: www.brennancenter.org/our-work/research-reports/secret-war; Jack Davies, “Do Western States View Special Operations Forces as Tools with which to Conduct Operations Violating International Legal Restrictions?”, Human Security Centre, 19 October 2022, available at: www.hscentre.org/uncategorized/do-western-states-view-special-operations-forces-as-tools-with-which-to-conduct-operations-violating-international-legal-restrictions/.

16 See e.g. Deane-Peter Baker, Roger G. Herbert and David Whetham, The Ethics of Special Ops: Raids, Recoveries, Reconnaissance, and Rebels, Cambridge University Press, Cambridge, 2023.

17 Notable exceptions include Watkin, Kenneth, “Misuse of Uniforms, Emblems, Flags, Insignia and the Ukraine Conflict”, Texas Tech Law Review, Vol. 56, No. 1, 2024Google Scholar; Christopher B. Rich Jr, Charles B. Johnson and Paul T. Shirk, “By, With, and Through: Section 1202 and the Future of Unconventional Warfare”, Journal of National Security Law & Policy, Vol. 12, No. 3, 2022; Patrick Paterson, Training Surrogate Forces in International Humanitarian Law: Lessons from Peru, Colombia, El Salvador, and Iraq, Joint Special Operations University (JSOU) Report 16-9, JSOU Press, Tampa, FL, 2016; Matthew R. Grant and Todd C. Huntley, “Legal Issues in Special Operations”, in Geoffrey S. Corn, Rachel E. VanLandingham and Shane R. Reeves (eds), U.S. Military Operations: Law, Policy, and Practice, Oxford University Press, New York, 2016; Gregory Raymond Bart, “Special Operations Commando Raids and Enemy Hors de Combat”, The Army Lawyer, July 2007; Parks, W. Hays, “Special Forces’ Wear of Non-Standard Uniforms”, Chicago Journal of International Law, Vol. 4, No. 2, 2003Google Scholar; Stoffa, Adam Paul, “Special Forces, Counterterrorism, and the Law of Armed Conflict”, Studies in Conflict & Terrorism, Vol. 18, No. 1, 1995Google Scholar.

18 Troy J. Sacquety, “The Office of Strategic Services (OSS): A Primer on the Special Operations Branches and Detachments of the Office of Strategic Services”, US Army Special Operations Command History Office, 2007, available at: https://arsof-history.org/articles/v3n4_oss_primer_page_1.html.

19 Title 10 US Code § 167(k).

20 Andrew Feickert, U.S. Special Operations Forces (SOF): Background and Issues for Congress, RS21048, Congressional Research Service, 20 April 2018, p. 8, available at: https://crsreports.congress.gov/product/pdf/RS/RS21048/58.

21 See e.g. NATO Special Operations Headquarters, Comprehensive Defence Handbook, Vol. 1, Ed. A, Version 1, December 2020, p. 86; UK Ministry of Defence, Land Operations, Army Doctrine Publication AC 79140, Land Warfare Development Centre, 2017, pp. 7-12–13; Royal Netherlands Army, “Commando Corps”, available at: https://english.defensie.nl/organisation/army/units/commando-corps.

22 T. Bukkvoll, above note 1, pp. 14–16.

23 Chase, Michael S., “Chinese Special Operations Forces: ‘Lessons Learned’ and Potential Missions”, China Brief, Vol. 7, No. 4, 2007, pp. 2–Google Scholar5. But see Dennis J. Blasko, “Chinese Special Operations Forces: Not Like ‘Back at Bragg’”, War on the Rocks, 1 January 2015, available at https://warontherocks.com/2015/01/chinese-special-operations-forces-not-like-back-at-bragg/.

24 See e.g. Christopher B. Smith, “The Quds Force Model: What Makes Irregular Warfare Effective in Asymmetric Conflict”, master's thesis, Naval Postgraduate School, Monterey, CA, 2020; Jack Watling and Nick Reynolds, The Plot to Destroy Ukraine, Special Report, Royal United Services Institute, 15 February 2022, p. 8.

25 See e.g. Mária Spišiaková and Natalia Shumeiko, Political Euphemisms and Neologisms in Online Media Content: Amid the War in Ukraine, University of Economics in Bratislava, 2022, p. 377, available at: https://conferences.euba.sk/jazykapolitika/www_write/files/2022/spisiakova_shumeiko.pdf (criticizing Russia's use of the term “special military operation” to describe its invasion of Ukraine).

26 See e.g. Research and Technology Organisation, Psychological and Physiological Selection of Military Special Operations Forces Personnel, Final Report of Task Group HFM-171, NATO, October 2012.

27 US Special Operations Command, Fact Book, USSOCOM Office of Communication, 2020, p. 58, available at: https://operationhealingforces.org/wp-content/uploads/2020/12/USSOCOM-2020-Fact-Book.pdf.

28 R. D. Clarke, above note 8, pp. 8–9.

29 See e.g. Inspector-General of the Australian Defence Force Afghanistan Inquiry Report, 2020 (Brereton Report), Chap. 3.01, p. 325, available at: www.defence.gov.au/sites/default/files/2021-10/IGADF-Afghanistan-Inquiry-Public-Release-Version.pdf.

30 Chairman of the Joint Chiefs of Staff, Joint Doctrine for Special Operations, Joint Publication 3-05, 22 September 2020 (JP 3-05), p. I-2, para. 2(a). See, generally, Department of the Army, Army Special Operations, FM 3-05, January 2014 (FM 3-05), p. 1-1–1-5.

31 See JP 3-05, above note 30, p. I-2, para. 2(a); A. Feickert, above note 6.

32 Thomas K. Adams, U.S. Special Operations Forces in Action: The Challenge of Unconventional Warfare, Routledge, New York, 1998, p. xviii.

33 Chairman of the Joint Chiefs of Staff, Doctrine for Joint Special Operations, Joint Publication 3-05, 17 April 1998, p. I-4. See also FM 3-05, above note 30, para. 6-38.

34 Simon Anglim, “British Special Forces in the 2020s: Still a National Asset”, Military Strategy Magazine, Vol. 7, No. 1, 2020, available at: www.militarystrategymagazine.com/article/british-special-forces-in-the-2020s-still-a-national-asset/.

35 Bradley J. Strawser, Killing Bin Laden: A Moral Analysis, Palgrave Macmillan, New York, 2014, p. 27.

36 A. Feickert, above note 6, p. 1.

37 JP 3-05, above note 30, p. ix. See also FM 3-05, above note 30, para. 1-45; US Marine Corps, Marine Corps Special Operations, MCWP 3-05, 4 April 2018 (MCWP 3-05), p. 2-1.

38 NATO Allied Special Operations Forces Command, “About Us”, available at: www.nshq.nato.int/NSHQ/.

39 British Army, “The Army Special Operations Brigade”, available at: www.army.mod.uk/who-we-are/formations-divisions-brigades/field-army-troops/army-special-operations-brigade/.

40 T. K. Adams, above note 32, p. 7. HVT operations fall under the general umbrella of direct action, which is an SOF-specific mission. While direct action may appear similar to general purpose force operations, “[d]irect action differs from conventional offensive actions in the level of physical and political risk, operational techniques, and the degree of discriminate and precise use of force to achieve specific objectives”. MCWP 3-05, above note 37, p. 2-5.

41 Paul Lushenko and Anthony Williams, “Defeating the Islamic State: Reconciling Pressure and Precision High Value Targeting”, Counter Terrorist Trends and Analyses, Vol. 8, No. 9, 2016, p. 10.

42 William Rosenau, “Special Operations Forces and Elusive Enemy Ground Targets: Lessons from Vietnam and the Persian Gulf War”, RAND Corporation, Santa Monica, CA, 2002, available at: www.rand.org/pubs/research_briefs/RB77.html.

43 See, generally, Alexander Stilwell, Special Forces in Action: Elite Forces Operations, 1991–2011, Rowman & Littlefield, London, 2012.

44 See, generally, “Book Review Roundtable: Leadership Targeting, Texas National Security Review”, 12 October 2021, available at: https://tnsr.org/roundtable/book-review-roundtable-leadership-targeting.

45 Ibid.

46 See e.g. Claire Parker and Rachel Pannett, “Here Are the Al-Qaeda and ISIS Leaders Killed in U.S. Strikes or Raids”, Washington Post, 2 August 2022, available at: www.washingtonpost.com/world/2022/02/03/strikes-isis-alqaeda-leaders.

47 See e.g. Leigh Neville, Special Forces in the War on Terror, Osprey, Oxford, 2015; Christopher J. Lamb and Evan Munsing, “Secret Weapon: High-Value Target Teams as an Organizational Innovation”, Strategic Perspectives No. 4, Institute for National Strategic Studies, Washington, DC, March 2011; Stephen J. Day, 9/11 and Canadian Special Operations Forces: How “40 Selected Men” Indelibly Influenced the Future of the Force, Tannenberg, Chicago, IL, 2014.

48 Armelle Charrier and Karim Hakiki, “Counter-Terrorism in the Sahel: A Training Session with French Special Forces”, France24, 6 March 2021, available at: www.france24.com/en/africa/20210603-counter-terrorism-in-the-sahel-a-training-session-with-french-special-forces.

49 Becca Wasser et al., The Air War Against the Islamic State: The Role of Airpower in Operation Inherent Resolve, RAND Corporation, Santa Monica, CA, 2021, p. 201.

50 See e.g. US Department of Defense (DoD), Department of Defense Law of War Manual, Office of the General Counsel, July 2023 (DoD Manual), p. 274, para. 5.12.3: “The evaluation of expected incidental harm in relation to expected military advantage intrinsically involves both professional military judgments as well as moral and ethical judgments evaluating the risks to human life.”

51 See C. J. Lamb and E. Munsing, above note 47, pp. 39–41 (explaining the term “authorities”). See, generally, Christopher S. Chivvis and Andrew M. Liepman, Authorities for Military Operations against Terrorist Groups: The State of the Debate and Options for Congress, RAND Corporation, Santa Monica, CA, 2016; Jennifer Elsea, Defense Primer: Legal Authorities for the Use of Military Forces, IF10539, Congressional Research Service, 14 December 2022.

52 Protocol Additional (I) to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts, 1125 UNTS 3, 8 June 1977 (entered into force 7 December 1978) (AP I), Arts 51(5)(b), 57(2)(a)(iii). See also DoD Manual, above note 50, para. 5.10; Jean-Marie Henckaerts and Louise Doswald-Beck (eds), Customary International Humanitarian Law, Vol. 1: Rules, Cambridge University Press, Cambridge, 2005 (ICRC Customary Law Study), Rule 14, available at: https://ihl-databases.icrc.org/en/customary-ihl/v1.

53 AP I, Art. 57(2)(a)(iii). See also DoD Manual, above note 50, para. 5.10; Michael N. Schmitt, “Conflict in Gregoria and Tanaka: The Law of Targeting”, International Law Studies, Vol. 103, 2024, pp. 15–16.

54 DoD Manual, above note 50, para. 5.6.7.3. See also Yoram Dinstein, The Conduct of Hostilities under the Law of International Armed Conflict, 4th ed., Cambridge University Press, Cambridge, 2022, p. 123, para. 346; DoD Manual, above note 50, para. 5.10.2.1.

55 Y. Dinstein, above note 54, p. 122, para. 343; DoD Manual, above note 50, para. 5.6.7.3; M. N. Schmitt, above note 53, pp. 15–16; Department of the Army, US Marine Corps, The Commander's Handbook on the Law of Land Warfare, FM 6-27/MCTP 11-10C, August 2019 (FM 6-27), para. 2-79-81.

56 Bruce Cronin, “Reckless Endangerment Warfare: Civilian Casualties and the Collateral Damage Exception in International Humanitarian Law”, Journal of Peace Research, Vol. 50, No. 2, 2013, p. 177.

57 See e.g. Charles P. Trumbull IV, “Proportionality, Double Effects, and the Innocent Bystander Problem in War”, Stanford Journal of International Law, Vol. 59, No. 1, 2023, pp. 50–51: “The greater the importance of a military objective, as determined by those planning the attack, the greater the civilian harm permitted by the law.”

58 Yoram Dinstein, “Concluding Remarks: LOAC and Attempts to Abuse or Subvert It”, International Law Studies, Vol. 87, 2011, pp. 486–487.

59 See DoD Manual, above note 50, para. 5.10.2.3, acknowledging that “the decisions and judgments required by the principle of proportionality in conducting attacks have subjective aspects”.

60 C. P. Trumbull IV, above note 57, p. 51. See also DoD Manual, above note 50, para. 5.10.2.3.

61 See, generally, John L. Plaster, SOG: The Secret Wars of America's Commandos in Vietnam, Simon & Schuster, New York, 2019.

62 See e.g. Joby Warrick, “How the Pentagon Got Inside ISIS’ Chemical Weapons Operation – and Ended It”, Politico, 27 February 2021, available at: www.politico.com/news/magazine/2021/02/27/red-line-book-excerpt-chemical-weapons-syria-471784.

63 Columb Strack, “The Evolution of the Islamic State's Chemical Weapons Efforts”, Combating Terrorism Center Sentinel, Vol. 10, No. 9, 2017, p. 20.

64 Joby Warrick, “ISIS Planned Chemical Attacks in Europe, New Details on Weapons Program Reveal”, Washington Post, 11 July 2022, available at: www.washingtonpost.com/national-security/2022/07/11/isis-chemical-biological-weapons.

65 We agree with the experts who believe that “foiling attacks directed at civilians or indiscriminate attacks by the enemy, is a relevant consideration for the evaluation of the military advantage under the principle of proportionality”. International Committee of the Red Cross (ICRC), International Expert Meeting: The Principle of Proportionality in the Rules Governing the Conduct of Hostilities under International Humanitarian Law, Quebec, 22–23 June 2016, p. 29.

66 Neta C. Crawford, “Death Toll: Will the U.S. Tolerate More Civilian Casualties in Its Bid to Vanquish ISIS?”, WBUR, 21 January 2016, available at: www.wbur.org/cognoscenti/2016/01/21/civilian-casualties-iraq-syria-us-war-on-isis-neta-c-crawford. See also Scott Graham, “The Non-Combatant Casualty Cut-Off Value: Assessment of a Novel Targeting Technique in Operation Inherent Resolve”, International Criminal Law Review, Vol. 18, No. 4, 2018, pp. 679–680.

67 See e.g. US Central Command, “May 27: Military Airstrikes Continue against ISIS Terrorists in Syria and Iraq”, press release, 27 May 2017, available at: www.centcom.mil/MEDIA/PRESS-RELEASES/Press-Release-View/Article/1196124/may-27-military-airstrikes-continue-against-isis-terrorists-in-syria-and-iraq/; see also Jean-Charles Brisard and Kévin Jackson, “The Islamic State's External Operations and the French-Belgian Nexus”, Counter Terrorism Center Sentinel, Vol. 9, No. 11, 2016.

68 US Central Command, “Strike Kills ISIS Leader in Syria”, press release, 4 April 2023, available at: www.centcom.mil/MEDIA/PRESS-RELEASES/Press-Release-View/Article/3350738/strike-kills-isis-leader-in-syria/.

69 Sara Plesser Neugroschel, “The Danger of a Perfect Strike: The Unintended Consequences of Restrictive Targeting Regimes”, Naval Law Review, Vol. 67, 2021, p. 69.

70 The United States has acknowledged the strategic consequences of collateral damage. In December 2023, the United States released a new policy designed to systematically improve its approach to civilian harm mitigation and response during military operations. See DoD, Civilian Harm Mitigation and Response, DoD Instruction 3000.17, 21 December 2023. According to the policy, however, “[n]othing in this plan is intended to suggest that existing DoD policies or practices are legally deficient or that the actions to be implemented pursuant to this plan are legally required, including under the law of war”. DoD, Civilian Harm Mitigation and Response Action Plan, CHMR-AP, 25 August 2022, p. 3 fn. 1.

71 Matt Frankel, “The ABCs of HVT: Key Lessons from High Value Targeting Campaigns against Insurgents and Terrorists”, Studies in Conflict & Terrorism, Vol. 34, No. 1, 2010, pp. 18, 21.

72 Sarah Yager, “Lost Innocents: The U.S. Military's Shameful Failure to Protect Civilians”, Foreign Affairs, 25 January 2022, available at: www.foreignaffairs.com/articles/united-states/2022-01-25/lost-innocents.

73 Dave Philipps, Eric Schmitt and Mark Mazzetti, “Civilian Deaths Mounted as Secret Unit Pounded ISIS”, New York Times, 27 December 2021, available at: www.nytimes.com/2021/12/12/us/civilian-deaths-war-isis.html.

74 Christof Heyns, Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions, UN Doc. A/HRC/23/47, 9 April 2013, para. 71.

75 Michael N. Schmitt, “Year Ahead – International Humanitarian Law at Risk”, Articles of War, 11 January 2024, available at: https://lieber.westpoint.edu/international-humanitarian-law-risk/.

76 S. P. Neugroschel, above note 69, p. 84.

77 Stanley McChrystal, My Share of the Task: A Memoir, Penguin, New York, 2013, p. 310.

78 Brereton Report, above note 29, p. 325.

79 AP I, Art. 57(2)(a)(ii). See also John Cherry, Kieran Tinkler and Michael N. Schmitt, “Avoiding Collateral Damage on the Battlefield”, Just Security, 11 February 2021, available at: www.justsecurity.org/74619/avoiding-collateral-damage-on-the-battlefield/.

80 ICRC Customary Law Study, above note 52, Rule 15. But see DoD Manual, above note 50, paras 5.2.3.1 (explaining that “[s]ome sources describe the obligation to take precautions as one in which ‘all feasible’ precautions must be taken or that ‘everything feasible’ must be done …. [T]he obligation to take feasible precautions does not require everything that is capable of being done – a standard that would be almost impossible to meet if interpreted literally”), 5.2.3.2, 5.11.

81 DoD Manual, above note 50, paras 5.2.3, 5.2.3.3. See also Michael J. Matheson, “Session One: The United States Position on the Relation of Customary International Law to the 1977 Protocols Additional to the 1949 Geneva Conventions”, American University International Law Review, Vol. 2, No. 2, 1987, pp. 426–427.

82 DoD Manual, above note 50, para. 5.2.3.2. See also DoD Manual, above note 50, para. 5.11; FM 6-27, above note 55, para. 2-81.

83 J. Warrick, above note 62.

84 Mike Stone and Idrees Ali, “Little-Known Modified Hellfire Missiles Likely Killed Al Qaeda's Zawahiri”, Reuters, 2 August 2022, available at: www.reuters.com/world/little-known-modified-hellfire-likely-killed-al-qaedas-zawahiri-2022-08-02/.

85 Ibid.

86 A raid is an “attack to temporarily seize an objective with a planned withdrawal”, with the purpose of “secur[ing] information, captur[ing] personnel or equipment, destroy[ing] a[n enemy] capability, rescu[ing] and recover[ing] individuals and equipment, or confus[ing] an adversary”. Department of the Army, FM 3-90 Tactics, May 2023 (FM 3-90), para. 5-142.

87 Regulations Concerning the Laws and Customs of War on Land, Annexed to Convention (IV) Respecting the Laws and Customs of War on Land, 36 Stat. 2227, 18 October 1907 (entered into force 26 January 1910), Art. 23(c) (1907 Hague Regulations) (forbidding parties “[t]o kill or wound an enemy who, having laid down his arms, or having no longer means of defence, has surrendered at discretion”); AP I, Art. 41; ICRC Customary Law Study, above note 52, Rule 47.

88 See e.g. FM 3-90, above note 86, para. 4-77.

89 “ISIS Leader Killed: U.S. Evacuated 10 Civilians during Raid, Pentagon Says”, New York Times, 3 February 2022, available at: www.nytimes.com/live/2022/02/03/world/us-raid-syria-isis.

90 Ibid.

91 Ibid.

92 Special reconnaissance, also referred to as strategic reconnaissance, is an SOF-specific activity to “collect or verify information of strategic or operational significance, … obtain specific, well-defined, and time-sensitive information … [and place] U.S. or U.S.-controlled ‘eyes on target,’ … in hostile, denied, or politically sensitive territory”. FM 3-05, above note 30, paras 2-37–2-38. See also Title 10 US Code § 167(k)(2); US Special Operations Command, “Core Activities”, available at: www.socom.mil/about/core-activities.

93 Aryea Gottlieb, “The Role of SOF across the Range of Military Operations”, US Air Force, 3 December 1997, pp. 2–3, available at: https://apps.dtic.mil/sti/pdfs/ADA332474.pdf.

94 This section is based on the authors’ blog post, “Israel – Hamas 2023 Symposium – Hostage Rescue Operations and the Law of Armed Conflict”, Articles of War, 20 December 2023, available at: https://lieber.westpoint.edu/hostage-rescue-operations-law-armed-conflict/.

95 Human Rights Watch, Kidnapped by ISIS: Failure to Uncover the Fate of the Missing in Syria, February 2020, p. 1, available at: www.hrw.org/sites/default/files/report_pdf/syria0220_web_0.pdf.

96 US Special Operations Command, above note 92.

97 See, generally, AP I, Art. 43(2).

98 See, generally, DoD Manual, above note 50, para. 5.7.3.

99 See, generally, AP I, Art. 51(3); DoD Manual, above note 50, para. 5.8; Nils Melzer, Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, ICRC, Geneva, May 2009.

100 Convention on the Prohibition of the Development, Production, Stockpiling and Use of Chemical Weapons and on Their Destruction, 82 UNTS 279, 3 September 1992 (entered into force 29 April 1997) (CWC), Art. II(7).

101 Centers for Disease Control and Prevention, “Facts about Riot Control Agents Interim Document”, fact sheet, 4 April 2018, available at: https://emergency.cdc.gov/agent/riotcontrol/factsheet.asp.

102 Center for Health Security, “Pulmonary (Choking) Agents”, fact sheet, Johns Hopkins Bloomberg School of Public Health, 1 May 2023, p. 1, available at: https://centerforhealthsecurity.org/sites/default/files/2023-05/choking-agents-factsheet-230501.pdf.

103 DoD Manual, above note 50, para. 6.16.1. See also ICRC Customary Law Study, above note 52, Rule 75.

104 CWC, above note 100, Art. I(5) (emphasis added). See also ICRC Customary Law Study, above note 52, Rule 75.

105 CWC, above note 100, Art. I(5). See also DoD Manual, above note 50, para. 5.1.1.

106 DoD Manual, above note 50, para. 6.16.2.

107 The White House, “Renunciation of Certain Uses in War of Chemical Herbicides and Riot Control Agents”, Executive Order 11850, 8 April 1975. See also DoD Manual, above note 50, para. 6.16.2.

108 DoD Manual, above note 50, para. 6.16.2.

109 CWC, above note 100, Art. II(9)(d).

110 See e.g. EUROPOL, “ATLAS Network”, 12 April 2023, available at: www.europol.europa.eu/partners-collaboration/atlas-network.

111 See Aidan Hickey, “GSG 9: ‘To Protect the Fatherland’”, Grey Dynamics, 13 March 2024, available at: https://greydynamics.com/gsg-9-to-protect-the-fatherland/; Aidan Hickey, “GIGN: The Hostage Rescue Primacy of the Gendarmerie Intervention Group”, Grey Dynamics, 14 January 2024, available at: https://greydynamics.com/gign-the-hostage-rescue-primacy-of-the-gendarmerie-intervention-group/.

112 Samuel Longuet, “Permitted for Law Enforcement Purposes but Prohibited in the Conduct of Hostilities: The Case of Riot Control Agents and Expanding Bullets”, International Review of the Red Cross, Vol. 98, No. 1, 2016, pp. 266–267, 272.

113 See Howard Altman, “Hostage Rescue Experts on the Daunting Challenges Israel Faces”, The War Zone, 16 October 2023, available at: www.thedrive.com/the-war-zone/hostage-rescue-experts-on-the-daunting-challenges-israel-faces.

114 “M855A1 Enhanced Performance Round”, Military.com, available at: www.military.com/equipment/m855a1-enhanced-performance-round.

115 Y. Dinstein, above note 54, p. 91.

116 ICRC Customary Law Study, above note 52, Rule 77.

117 Ibid.

118 Declaration (IV, 3) concerning Expanding Bullets, The Hague, 29 July 1899 (entered into force 9 April 1900).

119 Ibid.

120 DoD Manual, above note 50, paras 6.5.4.4, 19.7.1.

121 Ibid., para. 6.5.4.4. See also Joshua Berry, “The DOD Law of War Manual Returns Hollow Point Bullets to Armed Conflict”, Just Security, 4 August 2015, available at: www.justsecurity.org/25200/dod-law-war-manual-returns-hollow-point-bullets-armed-conflict/.

122 ICRC Customary Law Study, above note 52, Rule 70.

123 1907 Hague Regulations, above note 87, Art. 23(e).

124 See Rome Statute of the International Criminal Court, UN Doc. A/CONF.183/9, 17 July 1998 (entered into force 1 July 2002), Arts 8(2)(b)(xix), 8(2)(e)(xv).

125 International Criminal Court, Elements of Crimes, ICC-PIOS-LT-03-002/15, 2013, Arts 8(2)(b)(xix), 8(2)(e)(xv) (emphasis added).

126 DoD Manual, above note 50, para. 6.5.4.5.

127 W. Hays Parks, “Memorandum of Law – Sniper Use of Open Tip Ammunition”, The Army Lawyer, Department of the Army Pamphlet 27-50-218, February 1991, p. 87.

128 1907 Hague Regulations, above note 87, Art. 23(e); Sean Watts, “Are Molotov Cocktails Lawful Weapons?”, Articles of War, 2 March 2022, available at: https://lieber.westpoint.edu/are-molotov-cocktails-lawful-weapons/.

129 1907 Hague Regulations, above note 87, Art. 23(e).

130 S. Longuet, above note 112, p. 260.

131 Judge Advocate-General, “International Law Note: Opinion of the Judge Advocate General”, The Army Lawyer, Department of the Army Pamphlet 27-50-155, November 1985, p. 46.

132 Ibid.

133 H. Altman, above note 113.

134 FM 3-90, above note 86, para. 5-142.

135 Eric Sof, “Hijacking of Lufthansa Flight 181 and Brilliant GSG 9 Rescue Operation”, Spec Ops Magazine, 29 December 2012, available at: https://special-ops.org/hijacking-of-lufthansa-flight-181/.

136 “SAS Storm Iranian Embassy in London: May 1980”, BBC News, 17 June 2014, available at: www.bbc.com/news/av/uk-27888748.

137 Mark Bowden, “The Desert One Debacle”, The Atlantic, May 2006, available at: www.theatlantic.com/magazine/archive/2006/05/the-desert-one-debacle/304803/. See also US Army Airborne & Special Operations Museum, “Operation Eagle Claw”, available at: www.asomf.org/operation-eagle-claw/.

138 See Ken Watkin, “Special Forces, Unprivileged Belligerency, and the War in the Shadows”, Articles of War, 8 March 2022, available at: https://lieber.westpoint.edu/special-forces-unprivileged-belligerency-war-shadows/. See also Geneva Convention (III) Relative to the Treatment of Prisoners of War of 12 August 1949, 75 UNTS 135 (entered into force 21 October 1950) (GC III), Art. 4; ICRC, “Glossary: Immunities”, available at: https://casebook.icrc.org/a_to_z/glossary/immunities.

139 W. Hays Parks, above note 17, p. 508.

140 Ibid.

141 Ibid., pp. 518–519.

142 Ibid.

143 Ibid.

144 Ibid., pp. 509–511, 518–519. See, generally, John C. Tramazzo, “Sabotage in Law: Meaning and Misunderstandings”, Articles of War, 23 June 2023, available at: https://lieber.westpoint.edu/sabotage-law-meaning-misunderstandings/; K. Watkin, above note 138.

145 See e.g. 1907 Hague Regulations, above note 87, Art. 31; AP I, Art. 46(1).

146 AP I, Art. 37(1)–(c) (emphasis added).

147 Y. Dinstein, above note 54, p. 308, para. 929.

148 DoD Manual, above note 50, paras 5.4.8, 5.4.8.1, 5.4.8.2.

149 ICRC Customary Law Study, above note 52, Rule 65.

150 See, generally, Joseph L. Votel and Eero R. Keravuori, “The By-With-Through Operational Approach”, Joint Force Quarterly, Vol. 89, No. 2, 2018; C. B. Rich Jr, C. B. Johnson and P. T. Shirk, above note 17; M. R. Grant and T. C. Huntley, above note 17, pp. 564–567.

151 J. L. Votel, above note 150, p. 40. See also C. B. Rich Jr, C. B. Johnson and P. T. Shirk, above note 17, pp. 541–542 fn. 17. Partner or proxy forces may include foreign military forces or “irregular forces, groups, or individuals”. Title 10 US Code § 127e(a); National Defense Authorization Act for Fiscal Year 2018, Public Law 115-91, 12 December 2017, § 1202.

152 The terms “partner forces” and “proxies” are often used interchangeably with the term “surrogate forces”. See e.g. Daniel W. Hancock III, “Funding Surrogate Forces in the Fight against Terrorism”, Military Law Review, Vol. 228, 2020, p. 23.

153 C. B. Rich Jr, C. B. Johnson and P. T. Shirk, above note 17, pp. 541–542. See also J. L. Votel, above note 154, p. 41.

154 FM 3-05, above note 30, para. 2-20.

155 JP 3-05, above note 30, app. B-1, para. 2(a) (emphasis added). See also FM 3-05, above note 30, para. 2-1.

156 FM 3-05, above note 30, para. 4-14.

157 Christopher Klein, “How Green Berets Became the U.S. Army's Elite Special Forces”, History, 7 November 2023, available at: www.history.com/news/green-berets-armys-special-forces.

158 Christopher M. Blanchard, Armed Conflict in Syria: Overview and U.S. Response, RL33487, Congressional Research Service, 8 November 2022, p. 14; C. B. Rich Jr, C. B. Johnson and P. T. Shirk, above note 17, p. 550.

159 Missy Ryan and Sudarsan Raghavan, “U.S. Special Operations Troops Aiding Libyan Forces in Major Battle against Islamic State”, Washington Post, 9 August 2016, available at: www.washingtonpost.com/news/checkpoint/wp/2016/08/09/u-s-special-operations-forces-are-providing-direct-on-the-ground-support-for-the-first-time-in-libya/#; Eric Schmitt, “U.S. Commandos Advise Somalis in Fight against Qaeda Branch”, New York Times, 27 February 2023, available at: www.nytimes.com/2023/02/27/us/politics/somalia-commandos-counterterrorism.html.

160 “British Special Forces ‘Operating Alongside Rebels in Syria’”, Middle East Eye, 7 June 2016, available at: www.middleeasteye.net/news/british-special-forces-operating-alongside-rebels-syria; “French Special Forces Bolstering US-Led Operations in Syria, U.S. Defence Secretary Says”, France24, 27 April 2018, available at: www.france24.com/en/20180427-syria-france-usa-mattis-trump-french-special-forces-sent-bolster-operations-defence; Government of Canada, “Operation IMPACT”, 17 May 2023, available at: www.canada.ca/en/department-national-defence/services/operations/military-operations/current-operations/operation-impact.html.

161 Abigail Hauslohner and Alex Horton, “The Pentagon Planned to Train Troops from Coup States. It Backed Off Under Scrutiny”, Washington Post, 26 January 2024, available at: www.washingtonpost.com/national-security/2024/01/26/pentagon-military-training-human-rights/.

162 FM 3-05, above note 30, para. 4-1.

163 Reveron, Derek S., Exporting Security: International Engagement, Security Cooperation, and the Changing Face of the U.S. Military, 2nd ed., Georgetown University Press, Washington, DC, 2016, pp. xiixiiiGoogle Scholar.

164 P. Paterson, above note 17, pp. 61–65.

165 Ibid., pp. 65, 69, 71.

166 Ibid., p. 66.

167 Ibid.

168 Ibid., p. 67.

169 Ibid., quoting Andrew J. Bacevich, American Military Policy in Small Wars: The Case of El Salvador, Pergamon & Brasseys, Washington, DC, 1988, p. 24.

170 P. Paterson, above note 17, p. 67, quoting Cecil Bailey, “OPATT: The U.S. Army S.F. Advisers in El Salvador”, Special Warfare, Vol. 17, No. 2, 2004, p. 10.

171 P. Paterson, above note 17, pp. 71–72.

172 Ibid., p. 76.

173 Ibid.

174 Ibid., p. 74.

175 See e.g. Geneva Convention (I) for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field of 12 August 1949, 75 UNTS 31 (entered into force 21 October 1950), Art. 1; AP I, Arts 1(1), 80; Vienna Convention on the Law of Treaties, 1155 UNTS 331, 23 May 1969 (entered into force 27 January 1980), Art. 26 (stating that “[e]very treaty in force is binding upon the parties to it and must be performed by them in good faith”).

176 Brian Egan, “International Law, Legal Diplomacy, and the Counter-ISIL Campaign: Some Observations”, International Law Studies, Vol. 92, 2016, p. 245. See also Michael N. Schmitt and Sean Watts, “Common Article 1 and the Duty to ‘Ensure Respect’”, International Law Studies, Vol. 96, 2020.

177 M. N. Schmitt and S. Watts, above note 176, pp. 677, 682.

178 DoD Manual, above note 50, para. 18.1.2.1.

179 B. Egan, above note 176, p. 245.

180 Title 10 US Code § 362. See also Title 22 US Code § 2378d.

181 Michael A. Weber, Global Human Rights: Security Forces Vetting (“Leahy Laws”), IF10575, Congressional Research Service, 5 August 2022, p. 1.

182 Ibid.

183 Ibid., p. 2; Title 22 US Code § 2378d. The term “assistance” includes all assistance under the Foreign Assistance Act of 1961 and the Arms Export Control Act, “and applies to all forms of assistance including training, equipment and other activities” DoS, Welcome to Introduction to Leahy Vetting Policy, Version 2.1, p. 9, available at: www.state.gov/wp-content/uploads/2020/06/PP410_INVEST_v2.1.pdf. See also Title 22 US Code § 2378d.

184 DoD, DoD Directive 2311.01: DoD Law of War Program, Office of the General Counsel, 2 July 2020, § 4.2.

185 Title 10 US Code § 362(b).

186 Title 22 US Code § 2378d(b).

187 M. N. Schmitt and S. Watts, above note 176, p. 694.

188 ICJ, Military and Paramilitary Activities in and against Nicaragua (Nicaragua v. United States), Judgment (Merits), 27 June 1986, para. 115.

189 Ibid., paras 115–116.

190 See, generally, Jennifer Maddocks, “Russia, the Wagner Group, and the Issue of Attribution”, Articles of War, 28 April 2021, available at: https://lieber.westpoint.edu/russia-wagner-group-attribution/.

191 ICJ, Nicaragua, above note 188, paras 117–122.

192 Ibid., para. 220.

193 Ibid., paras 218, 220.