Security and International Law 9781849466349, 9781474201612, 9781782255888

Of the many challenges that society faces today, possibly none is more acute than the security of ordinary citizens when

200 27 3MB

English Pages [445] Year 2016

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Foreword
Preface
Contents
Abbreviations
Contributors
Introduction
Part I: Conceptions of Securityand International Law
1. Security Agendas and International Law: The Case of New Technologies
I. Introduction
II. The Proliferation of Security Agendas
III. Security Communities and the Achievement of Agreements
IV. The UN as a Security Community on New Technologies
V. Drones, International Law and the UN
VI. Conclusion
2. Human Security and International Law: The Potential Scope for Legal Development within the Analytical Framework of Security
I. Introduction
II. Locating Human Security within the Analytical Framework of Security
III. Shifting the Focus
IV. Expanding Security Agendas
V. Extending the Means to Address Security Threats
VI. Conclusion
3. Human Security versus Environmental Security: At Legal Loggerheads
I. Introduction
II. Environmental Exemplars
III. Political Problems
IV. Fundamental for Food Security
V. Harming Health
VI. Personal Perils and Condemned Communities
VII. Embracing Economics
VIII. Finding Common Ground
IX. Conclusion
4. Regional Security and International Law
I. Introduction
II. The Development of Regional Organisations as Security Providers
III. Regional Security Providers and their Place within the Legal Framework of the United Nations
IV. Military Cooperation between Regional Actors and the United Nations
V. Multilateralism and its Challenges for the Relationship between the United Nations and Regional Actors
VI. Conclusion
5. International Criminal Justice and Security
I. Introduction
II. Peace v Justice? Or Peace through Justice?
III. The Security Council and the ICC: An Awkward Relationship?
IV. Conclusion
6. Security and International Law: The 'Responsibility to Protect'
I. Introduction
II. The Development of the 'Responsibility to Protect' Doctrine
III. The Concept of '(In)Security' in the Responsibility to Protect
IV. Security and Responsibility: An Alternative Conception
V. The Responsibility to Protect and International Law: The Problem with an 'Evolving Norm'
VI. Conclusion
Part II: Security Threats and International Law
7. International Law and the Iranian Nuclear Crisis: Lessons for International Security and Arms Control
I. Introduction
II. The Nuclear Non-Proliferation Regime
III. Iranian Arguments
IV. Article III of the NPT and the Additional Protocol
V. The IAEA Board of Governors
VI. The Inalienable Right to Peaceful Uses of Nuclear Energy
VII. Conclusion
8. Contemporary Maritime Piracy as a Threat to International Peace and Security
I. Introduction
II. The Current Geography
III. An Asymmetrical Threat
IV. Piracy's Expandable Reach
V. A Multifarious International Criminal Offence
VI. The International Response
VII. Conclusion
9. Terrorism: A Threat to Security?
I. Introduction
II. The Foundational Principle
III. The State and its Need for Security
IV. The Origins in Ethics of Human Rights
V. The Consequentialist War against Terrorism
VI. Conclusion
10. Abusive Governments as a Threat
I. Introduction
II. Collective Responses to Governmental Abusiveness
III. International Peace and Security and Territorial Administration
IV. Governmental Abusiveness and the (Ir)Relevance of Democratic Legitimacy
V. Conclusion
11. Protecting Security Interests in International Investment Law
I. Introduction
II. Protecting Security Interests in those BITs that Contain a 'Security Interest' Exception
III. Protecting Security Interests in those BITs that do not Contain an 'Essential Security Interests' Exception
IV. Conclusion
12. Securing the Polar Regions Through International Law
I. Introduction
II. What does 'Security' Mean and How Can International Law Contribute to it?
III. Is International Law Capable of Defining the Polar Regions?
IV. International Regimes Protecting the Polar Regions: Openness and Transparency
V. Conclusion
13. Climate Change as a Threat to International Security
I. Introduction
II. Security Implications of Climate Change
III. The International Legal Response: Achievements and Shortcomings of the Climate Change Negotiations from a Security Perspective
IV. The Three Pillars
V. The Failures of the International Legal Response to Climate Change and the Securitisation of the Problem
VI. Politics, Multilateralism and Climate Security: What Role for International Law?
VII. Conclusion
14. Cyber-Threats and International Law
I. Introduction
II. Cyber-Threats
III. The International Law Framework Applicable to Cyber-Threats
IV. Cyber-Attacks and the jus ad bellum
V. Conclusion
Index
Recommend Papers

Security and International Law
 9781849466349, 9781474201612, 9781782255888

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up
File loading please wait...
Citation preview

SECURITY AND INTERNATIONAL LAW Of the many challenges that society faces today, possibly none is more acute than the security of ordinary citizens when faced with a variety of natural or man-made disasters arising from climate and geological catastrophes, including the depletion of natural resources, environmental degradation, food shortages, terrorism, breaches of personal security and human security, or even the global economic crisis. States continue to be faced with a range of security issues arising from contested t­ erritorial spaces, military and maritime security and security threats relating to energy, infrastructure and the delivery of essential services. The theme of the book encompasses issues of human, political, military, socio-economic­, environmental and energy security and raises two main questions. To what extent can international law address the types of natural and man-made security risks and challenges that threaten our livelihood, or very existence, in the twenty-first century? Where does international law fall short in meeting the problems that arise in different situations of insecurity and how should such shortcomings be addressed? Volume 58 in the series Studies in International Law

Studies in International Law Recent titles in this series Integration at the Border: The Dutch Act on Integration Abroad and International Immigration Law Karin de Vries An Equitable Framework for Humanitarian Intervention Ciarán Burke Democratic Statehood in International Law: The Emergence of New States in Post-Cold War Practice Jure Vidmar International Law and the Construction of the Liberal Peace Russell Buchan The OIC, the UN, and Counter-Terrorism Law-Making: Conflicting or Cooperative Legal Orders? Katja Samuel Statelessness: The Enigma of the International Community William E Conklin The Reception of Asylum Seekers under International Law: Between Sovereignty and Equality Lieneke Slingenberg International Law and Child Soldiers Gus Waschefort The Contractual Nature of the Optional Clause Gunnar Törber Non-State Actors in International Law Edited by Math Noortmann, August Reinisch and Cedric Ryngaert The Rule of Law at the National and International Levels: Contestations and Deference Edited by Machiko Kanetake and André Nollkaemper Human Rights Obligations of Non-State Armed Groups Daragh Murray For the complete list of titles in this series, see ‘Studies in International Law’ link at www.hartpub.co.uk/books/series.asp

Security and International Law

Edited by

Mary E Footer, Julia Schmidt, Nigel D White and Lydia Davies-Bright

OXFORD AND PORTLAND, OREGON 2016

Published in the United Kingdom by Hart Publishing Ltd 16C Worcester Place, Oxford, OX1 2JW Telephone: +44 (0)1865 517530 Fax: +44 (0)1865 510710 E-mail: [email protected] Website: http://www.hartpub.co.uk Published in North America (US and Canada) by Hart Publishing c/o International Specialized Book Services 920 NE 58th Avenue, Suite 300 Portland, OR 97213-3786 USA Tel: +1 503 287 3093 or toll-free: (1) 800 944 6190 Fax: +1 503 280 8832 E-mail: [email protected] Website: http://www.isbs.com © The editors 2016 The editors have asserted their right under the Copyright, Designs and Patents Act 1988, to be identified as the authors of this work. Hart Publishing is an imprint of Bloomsbury Publishing plc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission of Hart Publishing, or as expressly permitted by law or under the terms agreed with the appropriate reprographic rights organisation. Enquiries concerning reproduction which may not be covered by the above should be addressed to Hart Publishing Ltd at the address above. British Library Cataloguing in Publication Data Data Available ISBN: 978-1-78225-588-8 Library of Congress Cataloging-in-Publication Data Names: Footer, Mary E., editor.  |  Schmidt, Julia Ruth, editor.  |  White, Nigel D., 1961–, editor.  |  Davies-Bright, Lydia, editor.  |  International Law Association. British Branch, sponsoring body. Title: Security and international law / edited by Mary E Footer, Julia Schmidt, Nigel D White and Lydia Davies-Bright. Description: Oxford ; Portland, Or. : Hart Publishing Ltd, 2016.  |  Series: Studies in international law ; volume 58  |  Includes papers presented at the 2012 Spring Conference of the International Law Association’s British Branch held at the University of Nottingham.—ECIP foreword.  |  Includes bibliographical references and index. Identifiers: LCCN 2016005225 (print)  |  LCCN 2016005577 (ebook)  |  ISBN 9781849466349 (hardback : alk. paper)  |  ISBN 9781782255895 (Epub) Subjects: LCSH: International law—Congresses.  |  Security, International—Congresses. Classification: LCC KZ1240 .S43 2012 (print)  |  LCC KZ1240 (ebook)  |  DDC 341.7/2—dc23 LC record available at http://lccn.loc.gov/2016005225 Typeset by Compuscript Ltd, Shannon

Foreword Whenever essays based on papers delivered at a conference are published, there is a risk that they do not wear well with the inevitable passage of years or the different medium of their presentation. This is very definitely not the case with this excellent publication. The University of Nottingham offered to host the 2012 Spring Conference of the International Law Association’s British Branch with the challenging theme of the inter-relationship­between international law and ‘security’ in its latest and most diverse expression. The theme was explored by some outstanding speakers, generating lively and relevant discussion. It would have been disappointing if these had not found some more permanent record. This book amply fulfils that need. The editors were closely involved in Nottingham’s successful Conference, and have expertly brought these essays together to constitute an important body of work on one of the most troubling aspects of current affairs—both international and domestic. The basic dilemma between appraisal of actions by governments and international bodies to address— ‘defeat’ is so often the phrase used—terrorism and insecurity in the light of established international law, and trying to fit international law into the ways in which states have responded to real or perceived threats to international peace and security, comes out starkly from these essays. International law’s efficacy as a regime whereby states consent to constrain their actions has rarely, if ever, been under greater strain. All those with relevant responsibility should read these essays, and consider whether the measures so far adopted (and often re-cycled) will lead to a safer world for its citizens, or merely serve the interests of increasing chaos. There is much too for scholars of international law and of international relations to ponder in this important work. Jeremy P Carver CBE President, British Branch International Law Association August 2015

vi

Preface Of the many challenges that society faces today, possibly none is more acute than the security of ordinary citizens when faced with a variety of natural or man-made disasters arising from climate and geological catastrophes, including the depletion of natural resources, environmental degradation, food shortages, terrorism, breaches of personal security and human security, or even the global economic crisis. States too continue to be faced with a range of security issues arising from contested t­erritorial spaces, military and maritime security and security threats relating to energy, infrastructure and the delivery of essential services. The theme of the book encompasses issues of human, political, military, s­ ocio-economic­, environmental and energy security and raises two main questions. To what extent can international law address the types of natural and manmade security risks and challenges that threaten our livelihood, or very existence, in the twenty-first century? Where does international law fall short in meeting the problems that arise in different situations of insecurity and how should such shortcomings be addressed? This collection of essays, which arose out of the ILA British Branch Annual Spring Conference, held in Nottingham in April 2012, examines the concept of security in international law—how international law shapes security and how security shapes international law. The different aspects of this relationship will be outlined in the Introduction to the book, and aspects will be considered in each chapter. Different facets of security are considered in Part I, including how different international legal regimes such as international environmental law and international criminal justice intersect with what has been traditionally viewed as a concept or value protected by collective security law. Part II analyses in detail more specific threats and considers how both general international law and applicable specific regimes have responded. Mary E Footer Julia Schmidt Nigel D White Lydia Davies-Bright

viii

Contents Foreword���������������������������������������������������������������������������������������������������������������v Preface�����������������������������������������������������������������������������������������������������������������vii Abbreviations��������������������������������������������������������������������������������������������������� xvii Contributors�����������������������������������������������������������������������������������������������������xxiii Introduction�����������������������������������������������������������������������������������������������������xxxi Part I: Conceptions of Security and International Law 1. Security Agendas and International Law: The Case of New Technologies��������������������������������������������������������������� 3 Nigel D White I. Introduction���������������������������������������������������������������������������������������� 3 II. The Proliferation of Security Agendas�������������������������������������������� 5 III. Security Communities and the Achievement of Agreements������������������������������������������������������������ 8 IV. The UN as a Security Community on New Technologies���������������������������������������������������������������������������� 11 V. Drones, International Law and the UN���������������������������������������� 18 VI. Conclusion���������������������������������������������������������������������������������������� 23 2. Human Security and International Law: The Potential Scope for Legal Development within the Analytical Framework of Security������������������������������������ 25 Hitoshi Nasu I. Introduction�������������������������������������������������������������������������������������� 25 II. Locating Human Security within the Analytical Framework of Security������������������������������������������������� 27 III. Shifting the Focus����������������������������������������������������������������������������� 32 IV. Expanding Security Agendas��������������������������������������������������������� 34 V. Extending the Means to Address Security Threats��������������������� 37 A. Multidimensional Approach to Security������������������������������ 37 B. Pathology of Human Security������������������������������������������������ 39 VI. Conclusion���������������������������������������������������������������������������������������� 41 3. Human Security versus Environmental Security: At Legal Loggerheads������������������������������������������������������������������������������ 43 John Pearson I. Introduction�������������������������������������������������������������������������������������� 43 II. Environmental Exemplars�������������������������������������������������������������� 46

x  Contents III. IV. V. VI. VII. VIII. IX.

Political Problems�������������������������������������������������������������������������� 49 Fundamental for Food Security�������������������������������������������������� 51 Harming Health����������������������������������������������������������������������������� 53 Personal Perils and Condemned Communities������������������������ 55 Embracing Economics������������������������������������������������������������������ 58 Finding Common Ground����������������������������������������������������������� 61 Conclusion�������������������������������������������������������������������������������������� 65

4. Regional Security and International Law������������������������������������������� 69 Julia Schmidt I. Introduction����������������������������������������������������������������������������������� 69 II. The Development of Regional Organisations as Security Providers�������������������������������������������������������������������� 71 III. Regional Security Providers and their Place within the Legal Framework of the United Nations���������������������������� 75 IV. Military Cooperation Between Regional Actors and the United Nations���������������������������������������������������������������� 82 V. Multilateralism and its Challenges for the Relationship Between the United Nations and Regional Actors���������������������������������������������������������������������� 84 A. Multilateralism and the View from the UN���������������������� 85 i. NATO and Kosovo��������������������������������������������������������� 85 ii. ECOWAS and Liberia���������������������������������������������������� 87 B. Multilateralism and the View from Regional Actors���������������������������������������������������������������������� 88 VI. Conclusion�������������������������������������������������������������������������������������� 91 5. International Criminal Justice and Security��������������������������������������� 93 Olympia Bekou I. Introduction����������������������������������������������������������������������������������� 93 II. Peace v Justice? Or Peace Through Justice?������������������������������ 94 III. The Security Council and the ICC: An Awkward Relationship?��������������������������������������������������������� 99 A. The Security Council, the ICC, and the Crime of Aggression����������������������������������������������������������� 100 B. Referrals by the Security Council—Article 13(b) of the Rome Statute������������������������������������������������������������� 101 C. Preconditions for Referring a Situation to the Court�������������������������������������������������������������������������� 103 D. Deferrals by the Security Council—Article 16 of the Rome Statute������������������������������������������������������������� 107 E. Cooperation in the Field: The ICC and UN Peacekeeping Operations����������������������������������������������������111 IV. Conclusion������������������������������������������������������������������������������������ 114

Contents xi 6. Security and International Law: The ‘Responsibility to Protect’������������������������������������������������������������ 115 Alexandra Bohm I. Introduction������������������������������������������������������������������������������������ 115 II. The Development of the ‘Responsibility to Protect’ Doctrine������������������������������������������������������������������������ 117 A. The International Commission on Intervention and State Sovereignty 2001���������������������������� 117 B. The United Nations General Assembly World Summit 2005��������������������������������������������������������������� 118 C. Implementing the Responsibility to Protect, 2009������������� 119 D. RtP Now���������������������������������������������������������������������������������� 120 III. The Concept of ‘(In)Security’ in the Responsibility to Protect��������������������������������������������������������������� 121 A. The Cause of Threats to Individual Security���������������������� 121 B. The International Community’s Role in Enabling Security������������������������������������������������������������������� 122 i. Prevention and Assistance�������������������������������������������� 122 ii. Reaction and Response�������������������������������������������������� 122 IV. Security and Responsibility: An Alternative Conception����������������������������������������������������������� 123 A. The Importance of Mass Atrocity Crimes��������������������������� 124 B. The Cause of Crises: Civil and Political vs Socio-Economic Rights���������������������������������������������������������� 126 C. The Role of the International Community in Insecurity—to the Rescue?����������������������������������������������� 129 D. RtP’s Unanswered Questions: A Return to ‘Humanitarian Intervention’������������������������������������������������ 131 V. The Responsibility to Protect and International Law: The Problem with an ‘Evolving Norm’��������������������������������������� 133 VI. Conclusion�������������������������������������������������������������������������������������� 136 Part II: Security Threats and International Law 7. International Law and the Iranian Nuclear Crisis: Lessons for International Security and Arms Control�������������������� 141 Tom Coppen I. Introduction������������������������������������������������������������������������������������ 141 II. The Nuclear Non-Proliferation Regime�������������������������������������� 144 III. Iranian Arguments������������������������������������������������������������������������� 149 IV. Article III of the NPT and the Additional Protocol������������������� 152 V. The IAEA Board of Governors����������������������������������������������������� 155 VI. The Inalienable Right to Peaceful Uses of Nuclear Energy�������������������������������������������������������������������������� 159 VII. Conclusion�������������������������������������������������������������������������������������� 162

xii  Contents 8. Contemporary Maritime Piracy as a Threat to International Peace and Security�������������������������������������������������������� 167 Alexandros XM Ntovas I. Introduction������������������������������������������������������������������������������������ 167 II. The Current Geography���������������������������������������������������������������� 171 III. An Asymmetrical Threat��������������������������������������������������������������� 173 IV. Piracy’s Expandable Reach����������������������������������������������������������� 178 V. A Multifarious International Criminal Offence������������������������� 184 VI. The International Response���������������������������������������������������������� 190 VII. Conclusion�������������������������������������������������������������������������������������� 197 9. Terrorism: A Threat to Security?��������������������������������������������������������� 207 Lydia Davies-Bright I. Introduction������������������������������������������������������������������������������������ 207 II. The Foundational Principle���������������������������������������������������������� 209 A. The (Modern) Origin of the Inviolability of Human Dignity���������������������������������������������������������������������� 209 B. International Human Rights Law���������������������������������������� 210 C. The Inviolability of Human Dignity Revisited������������������ 212 III. The State and its Need for Security��������������������������������������������� 213 A. Concept of the State��������������������������������������������������������������� 213 B. The Nation State��������������������������������������������������������������������� 216 i. Defending the Nation��������������������������������������������������� 216 C. The Meaning of Security������������������������������������������������������� 218 D. The Security Narrative���������������������������������������������������������� 220 IV. The Origins in Ethics of Human Rights�������������������������������������� 223 A. The Repositioning of Human Rights on the Moral Field����������������������������������������������������������������������� 223 B. Consequentialism������������������������������������������������������������������� 224 C. Deontology������������������������������������������������������������������������������ 225 D. Consequentialism v Deontology������������������������������������������ 225 V. The Consequentialist War Against Terrorism���������������������������� 226 A. A Just War Against Terrorism����������������������������������������������� 226 B. The Montreal Convention and Lockerbie Case����������������� 227 i. Lockerbie Bombing������������������������������������������������������� 228 ii. From Specific to General Threat���������������������������������� 232 C. The Destruction of One��������������������������������������������������������� 235 i. ‘One’ is no Longer Safe������������������������������������������������� 237 ii. ‘One’ no Longer Counts����������������������������������������������� 238 iii. Jean Charles de Menezes as One��������������������������������� 242 iv. Osama bin Laden as One��������������������������������������������� 245 VI. Conclusion�������������������������������������������������������������������������������������� 246

Contents xiii 10. Abusive Governments as a Threat��������������������������������������������������� 249 Jure Vidmar I. Introduction���������������������������������������������������������������������������������� 249 II. Collective Responses to Governmental Abusiveness������������������������������������������������������� 250 A. Governments, Legitimacy and Effective Control������������������������������������������������������������������ 250 B. International Response to Coup Governments������������������������������������������������������������������������ 253 C. Collective Denial of Legitimacy to an Incumbent Government������������������������������������������������������ 255 III. International Peace and Security and Territorial Administration���������������������������������������������������������� 260 A. East Timor����������������������������������������������������������������������������� 261 B. Kosovo����������������������������������������������������������������������������������� 264 IV. Governmental Abusiveness and the (Ir)Relevance of Democratic Legitimacy���������������������������������� 267 A. The Scope of the Right to Political Participation������������������������������������������������������������������������� 268 B. A Switch to Democracy?����������������������������������������������������� 269 V. Conclusion������������������������������������������������������������������������������������ 271 11. Protecting Security Interests in International Investment Law������������������������������������������������������������������������������������ 273 Prabhash Ranjan I. Introduction���������������������������������������������������������������������������������� 273 II. Protecting Security Interests in those BITs that Contain a ‘Security Interest’ Exception���������������������������� 275 A. Type I BITs—BITs Containing ‘Essential Security Interest’ Exception Without Self-Judging Language���������������������������������������� 276 i. Meaning of ‘Essential Security Interests’������������������ 277 ii. Scope of ‘Essential Security Interests’����������������������� 277 B. The Question of Threshold������������������������������������������������� 280 C. Measures Should be ‘Necessary’ to Protect Security Interests���������������������������������������������������� 283 D. Essential Security Interests in BITs Containing Self-Judging Language����������������������������������� 292 III. Protecting Security Interests in those BITs that do not Contain an ‘Essential Security Interests’ Exception��������������������������������������������������������������������� 295 IV. Conclusion������������������������������������������������������������������������������������ 298

xiv  Contents 12. Securing the Polar Regions Through International Law��������������������������������������������������������������������������������� 301 Jill Barrett I. Introduction���������������������������������������������������������������������������������� 301 II. What does ‘Security’ Mean and How Can International Law Contribute to it?������������������������������������������ 303 III. Is International Law Capable of Defining the Polar Regions?����������������������������������������������������������������������� 306 A. How does International Law Define ‘the Polar Regions’?������������������������������������������������������������� 307 B. How does International Law Define ‘Antarctica’?�������������������������������������������������������������������������� 308 C. Key Differences Between the Antarctic Treaty and the CCAMLR Boundaries������������������������������� 311 D. How does International Law Define the ‘Arctic’?��������������������������������������������������������������������������� 312 i. IMO Polar Shipping Guidelines 2009—Arctic Waters���������������������������������������������������� 313 ii. IMO Polar Code—Arctic Waters������������������������������� 313 iii. Arctic Council�������������������������������������������������������������� 314 iv. Treaties Adopted by the Arctic Council States�������������������������������������������������������������� 315 v. Arctic Ocean Conference������������������������������������������� 317 E. Implication of the Different Approaches to Boundaries in each Polar Region���������������������������������� 317 IV. International Regimes Protecting the Polar Regions: Openness and Transparency�������������������������������������� 319 A. Antarctic Treaty System—How to Join����������������������������� 319 i. Accession to the Antarctic Treaty����������������������������� 319 ii. Recognition of Antarctic Treaty Consultative Party Status������������������������������������������ 320 iii. Criteria for Recognition of Consultative Party Status������������������������������������������������������������������ 321 iv. ATCM Observers and Experts���������������������������������� 328 B. Accession to the Convention on the Conservation of Antarctic Marine Living Resources 1980 (‘CCAMLR’)���������������������������������������������� 328 i. Observers, Acceding States and Non-Party States��������������������������������������������������������� 329 ii. Becoming a Member of the CCAMLR Commission����������������������������������������������������������������� 330 iii. Remarks on the Overall Level of Openness of the ATS to Participation���������������������� 330

Contents xv C. The Arctic Council—How to become a Member������������������������������������������������������������������������������ 332 D. How Can a Non-Arctic State or Organisation Participate in the Arctic Council as an Observer?����������������������������������������������������� 334 V. Conclusion������������������������������������������������������������������������������������ 337 13. Climate Change as a Threat to International Security����������������� 341 Mattia Fosci I. Introduction���������������������������������������������������������������������������������� 341 II. Security Implications of Climate Change�������������������������������� 343 A. Threat to Territorial Sovereignty��������������������������������������� 344 B. Threat to Human Well-Being��������������������������������������������� 345 C. Threat to Economic Development������������������������������������� 346 D. Threat to Peace and Security���������������������������������������������� 347 III. The International Legal Response: Achievements and Shortcomings of the Climate Change Negotiations from a Security Perspective�������������������������������� 348 IV. The Three Pillars�������������������������������������������������������������������������� 350 A. Climate Change Mitigation������������������������������������������������ 350 B. Climate Change Adaptation���������������������������������������������� 351 C. International Cooperation on Finance, Technology and Information���������������������������������������������� 352 V. The Failures of the International Legal Response to Climate Change and the Securitisation of the Problem����������������������������������������������������������������������������������� 355 VI. Politics, Multilateralism and Climate Security: What Role for International Law?��������������������������������������������� 360 VII. Conclusion������������������������������������������������������������������������������������ 364 14. Cyber-Threats and International Law��������������������������������������������� 365 Nicholas Tsagourias and Russell Buchan I. Introduction���������������������������������������������������������������������������������� 365 II. Cyber-Threats������������������������������������������������������������������������������� 366 III. The International Law Framework Applicable to Cyber-Threats�������������������������������������������������������������������������� 369 A. The United Nations Charter����������������������������������������������� 369 B. The Law of State Responsibility���������������������������������������� 369 C. The International Law on the Use of Force���������������������� 370 D. Customary International Law�������������������������������������������� 370 E. International Humanitarian Law�������������������������������������� 370 F. International Criminal Law������������������������������������������������ 371 G. International Law Applicable to Terrorism��������������������� 372 H. Human Rights���������������������������������������������������������������������� 373 I. International Law on Espionage���������������������������������������� 374

xvi  Contents IV. Cyber-Attacks and the jus ad bellum������������������������������������������ 375 A. Cyber-Attacks as Unlawful Uses of Force������������������������ 377 B. Cyber-Attacks and Self-Defence���������������������������������������� 381 C. Cyber-Attacks by Non-State Actors���������������������������������� 385 D. Collective Security��������������������������������������������������������������� 387 V. Conclusion������������������������������������������������������������������������������������ 387 Index����������������������������������������������������������������������������������������������������������������� 391

Abbreviations ACAP

Agreement on the Conservation of Albatrosses and Petrels

ACDA

US Arms Control and Disarmament Agency

AFISMA

African-led International Support Mission to Mali

AMIS

African Union Mission in Sudan

AOR

Area of Responsibility

AP

Additional Protocol

ASEAN

Association of Southeast Asian Nations

ASOC

Antarctic and Southern Ocean Coalition

ASP

Assembly of States Parties

AT

Arctic Treaty

ATCM

Antarctic Treaty Consultative Meetings

ATCP

Antarctic Treaty Consultative Parties

ATS

Antarctic Treaty System

AU

African Union

BASIC

Brazil, South Africa, India and China

BG

Board of Governors

BIMCO

Baltic and International Maritime Council

BIT

Bilateral Investment Treaty

BMP

Best Management Practices

BRIC

Brazil, Russia, India, China and South Africa

CAR

Central African Republic

CARICOM

Caribbean Community

CAT

Convention Against Torture

CBDR

Common But Differentiated Responsibilities

CCAMLR

Convention on the Conservation of Antarctic Marine Living Resources 1980

CCDCOE

Cooperative Cyber Defence Centre of Excellence

CDM

Clean Development Mechanism

CDS

Catch Documentation Scheme

CoE

Council of Europe

xviii  Abbreviations COMNAP

Council of Managers of Antarctic Programs

COP

Conference of the Parties

CRC

Convention on the Rights of the Child

CSA

Comprehensive Safeguards Agreement

CTBT

Comprehensive Test-Ban Treaty

CWC

Chemical Weapons Convention

DDOS

Distributed Denial of Service

DoD

Department of Defence

DPRK

North Korea (Democratic People’s Republic of Korea)

DRC

Democratic Republic of the Congo

EC

European Community

ECHR

European Convention on Human Rights

ECJ

European Court of Justice

ECOWAS

Economic Community of Western African States

ECtHR

European Court of Human Rights

EEZ

Exclusive Economic Zone

ENDC

Eighteen-Nation Committee for Disarmament

ESF

ECOWAS Standby Force

EU

European Union

FCN

Friendship Commerce and Navigation

FRY

Federal Republic of Yugoslavia

G77

Group of 77

GA

General Assembly

GATT

General Agreement on Tariffs and Trade

GCHQ

UK Government Communications Headquarters

HRC

Human Rights Committee

HRLC

Human Rights Law Centre

IAATO

International Association of Antarctica Tour Operators

IAEA

International Atomic Energy Agency

ICC

International Criminal Court

ICCPR

International Covenant on Civil and Political Rights

ICESCR

International Covenant on Economic, Social and Cultural Rights

ICISS

International Commission on Intervention and State Sovereignty

Abbreviations xix ICJ

International Court of Justice

ICRW

International Convention for the Regulation of Whaling

ICS

International Chamber of Shipping

ICTR

International Criminal Tribunal for Rwanda

ICTY

International Criminal Tribunal for Yugoslavia

IDP

Internally displaced persons

IFOR/SFOR

NATO-led Stabilisation Force in Bosnia and Herzegovina

IHL

International Humanitarian Law

IHRL

International Human Rights Law

ILA

International Law Association

ILC

International Law Commission

IMB

International Maritime Bureau of the International Chamber of Commerce

IMF

International Monetary Fund

IMO

International Maritime Organisation

INFCIRC

Information Circular

INTERCARGO International Association of Dry Cargo Shipowners INTERTANKO

International Association of Independent Tanker Owners

IPCC

Intergovernmental Panel on Climate Change

IPCC

Independent Police Complaints Commission

ISO

International Organization for Standardization

ITU

International Telecommunication Union

MARPOL

International Convention for the Prevention of Pollution from Ships 1973 as modified by the Protocol of 1978

MINUSCA

UN Multidimensional Integrated Stabilization Mission in the Central African Republic

MINUSMA

UN Multidimensional Integrated Stabilization Mission

MONUC

UN Mission in the Democratic Republic of Congo

MONUSCO

UN Organisation Stabilisation Mission in the Democratic Republic of the Congo

MoU

Memoranda of Understanding

MPS

Metropolitan Police Service

NAFTA

North American Free Trade Agreement

NATO

North Atlantic Treaty Organisation

NGO

Non-Governmental Organisation

NNWS

Non-Nuclear Weapon States

xx  Abbreviations NPM

Non Precluded Measures

NPT

Nuclear Non-proliferation Treaty

NSA

National Security Agency

NTC

National Transitional Council

NWS

Nuclear-Weapon States

OAS

Organisation of American States

OHCHR

Office of the High Commissioner for Human Rights

OPEC

Organisation of the Petroleum Exporting Countries

OSCE

Organisation for Security and Cooperation in Europe

PCASP

privately contracted armed security personnel

POW

Prisoner of War

PrepComs

Preparatory Committees

REEEP

Renewable Energy and Energy Efficiency Partnership

REIO

Regional Economic Integration Organisations

RMA

Revolution in Military Affairs

RtP

Responsibility to Protect

SAR

Search and Rescue

SC

Security Council

SCAR

Scientific Committee on Antarctic Research

SCSL

Special Court of Sierra Leone

SEA

Single European Act

SOLAS

International Convention for the Safety of Life at Sea 1974

SUA

Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation

TBS

Ticking Bomb Scenario

UAV

Unmanned Aerial Vehicle

UDHR

Universal Declaration of Human Rights

UK

United Kingdom

UN

United Nations

UNAMID

African Union-United Nations Hybrid Operation in Darfur

UNC

UN Charter

UNCLOS

United Nations Convention on the Law of the Sea

UNDP

United Nations Development Programme

UNEP

UN Environment Programme

UNESCO

UN Educational, Scientific and Cultural Organisation

Abbreviations xxi UNFCCC

United Nations Framework Convention on Climate Change

UNGA

United Nations General Assembly

UNIDIR

UN Institute for Disarmament Research

UNMIL

UN Mission in Liberia

UNSC

United Nations Security Council

UNSG

United Nations Secretary General

UNTS

United Nations Treaty Series

UNU-CRIS

United Nations University—Comparative Regional Integration Studies

US

United States

USA

United States of America

USSR

Union of Soviet Socialist Republics

UTA

Union de Transport Aeriens

VCLT

Vienna Convention of the Law of Treaties

WFP

World Food Program

WHO

World Health Organisation

WMD

Weapons of Mass Destruction

WTO

World Trade Organisation

WWII

World War II

xxii

Contributors Jill Barrett Arthur Watts Senior Research Fellow in Public International Law, ­British Institute of International and Comparative Law. She leads the Watts research and events programme in public international law. She has developed research projects and published on a range of subjects including Treaty Law and Practice, Antarctic and Arctic governance, Law of the Sea, legal aspects of democratic participation in Hong Kong and British Contributions to International Law 1915–2015. Jill joined BIICL from the Legal Adviser’s team at the Foreign and Commonwealth Office, where she was a Legal Counsellor. During her twenty-year FCO career, her responsibilities included advising on public international law, EU and UK law on a wide range of subjects and she served as First Secretary (Legal) at the United Kingdom Mission to the United Nations, New York. She was Deputy Agent for the United Kingdom in the Ireland v UK Mox Plant cases under UNCLOS and the OSPAR Convention and represented the UK at a variety of international conferences, such as the Antarctic Treaty Consultative Meeting, Commission on the Conservation of Antarctic Living Marine Resources, London Convention, International Whaling Commission, European Energy Charter, UN Commission on Environment and Development and the UN Framework Convention on Climate Change. She led the Government’s work on creating a new statutory regime for parliamentary scrutiny of treaties. Before joining the FCO, she was Lecturer in Law at SOAS, London University, specialising in the law of the People’s Republic of China, and Lecturer in Law at Durham University. She attended 12 Antarctic Treaty and two CCAMLR meetings during 2002–13; 10 as legal adviser to the United Kingdom delegation; and since leaving the FCO, one as a staff member of the Antarctic Treaty Secretariat, and three as legal adviser to the Antarctic and Southern Ocean Coalition delegation. The views expressed in her chapter are of course personal. Olympia Bekou Professor of Public International Law, University of Nottingham and Head of the International Criminal Justice Unit, Nottingham Human Rights Law Centre. A qualified lawyer, Olympia specialises in international criminal law. She has developed particular expertise in national ­implementing

xxiv  Contributors legislation for the ICC as well as in developing new methodologies that aim to enhance the efficiency and effectiveness of ­international criminal justice processes. In recent years Olympia has been a fellow of the Max Planck Institute for Foreign and International Criminal Law in Freiburg, Germany, and she has also held visiting positions at the TC Beirne School of Law, University of Queensland, Australia, the University of Nantes, France and Istanbul Bilgi University, Turkey. Olympia has provided research and capacity building support for 63 States, through intensive training to more than 75 international government officials and drafting assistance to Samoa (with legislation enacted in November 2007), Fiji and Jamaica and has been involved in training the Thai Judiciary. She has also undertaken capacity building missions in post-conflict situations such as Uganda, the DRC and Sierra Leone. She is Deputy Director of the Case Matrix Network and a member of the Advisory Board and Editor of the Forum of International Criminal and Humanitarian Law. Olympia is responsible for the National Implementing Legislation Database (NILD) of the ICC Legal Tools Project and has researched and taught extensively worldwide. In 2014, she was awarded the University of Nottingham Knowledge Exchange and Innovation Award for Societal Impact in Social Sciences for her work ‘Fighting Impunity through Technology: Strengthening the Capacity of National and International Criminal Justice Institutions to Investigate and Prosecute the Most Serious International Crimes’. Alexandra Bohm Teaching Fellow, University of Sheffield. A non-practising solicitor, ­Alexandra completed her PhD at the University of Sheffield in 2014, on the Responsibility to Protect. Alexandra has broader interests in theoretical and methodological issues in international law and international relations, and has published on this topic and on the use and regulation of private military and security contractors. Russell Buchan Dr Russell Buchan is a senior lecturer in international law at the University of Sheffield. Russell sits on the editorial board of the Journal of the Use of Force in International Law and the International Community Law Review. ­Russell’s monograph was published by Hart Publishing in 2013 and is entitled International Law and the Construction of the Liberal Peace, and was the recipient of the American Society of International Law’s Francis Lieber Prize for an outstanding monograph in the field of the law of armed conflict for 2014. Russell has co-edited, along with Professor Nicholas ­Tsagourias,

Contributors xxv an edited collection entitled A Research Handbook on International Law and Cyberspace, published by Edward Elgar in 2015. Russell is Co-Rapporteur for the International Law Association’s Study Group on Cybersecurity, Terrorism and International Law. Tom Coppen Researcher and PhD Candidate, Center for Conflict and Security Law (CCSL) Utrecht University. Tom received his LLM at Nijmegen University in the Netherlands, after which he studied International Relations at the University of Cape Town, South Africa. His main focus area is the legal nuclear non-proliferation regime, specifically the Non-Proliferation Treaty (NPT), International Atomic Energy Agency (IAEA), as well as export controls. He was a Special Advisor for the Netherlands at the 2010 NPT Review Conference and the 2012 and 2013 NPT Preparatory Commissions. Tom spent two months in Vienna, Austria, where he interviewed dozens of IAEA officials and national representatives in order to research the review and assessment of safeguards information in the context of IAEA non-compliance procedures. In addition to his non-proliferation research, he is an advisor for a project on nuclear security at the CCSL. He has participated as a panel member in several conferences on nuclear nonproliferation and security, and published articles in the Journal of Conflict and Security Law, the Internationale Spectator and the Romanian Journal of Society and Politics. Abstracts of the latter are used in this chapter. Lydia Davies-Bright PhD student, School of Law University of Nottingham. Lydia’s thesis focuses on the relationship between human rights and security and examines the ‘security concession’ made in numerous human rights instruments. She is also researching and publishing in the inter-related areas of democracy, security, terrorism and international law, is a member of the Nottingham Centre for International and Security Law and is a student assistant for the Journal of Conflict and Security Law (Oxford University Press). Lydia also tutors in Understanding Law, Contract Law, Law of Torts and Democracy and the Rule of Law in Post-Conflict Situations. Mary E Footer Professor of International Economic Law, co-Director of the Nottingham International Law and Security Centre and Head of the Business, Trade

xxvi  Contributors and Human Rights Unit in the Nottingham Human Rights Law Centre. Prior to joining the University of Nottingham in 2006, Mary was D ­ eputy Director at the Amsterdam Centre for International Law and senior lecturer at the University of Amsterdam. She has previously held teaching posts in international law at the Erasmus University Rotterdam and University College London and was Senior Program Legal Counsel at the International Development Law Organisation, Rome from 1995–1999. She has been a Fernand Braudel Senior Visiting Fellow at the European University Institute, Florence in 2010, and the first Fellow in Public International Law at the British Institute of International and Comparative Law, London, 1992–1994. Mary is a member of the Executive Board of the European Society of International law, Director of Studies for the British Branch of the International Law Association (ILA) and chair of the ILA Committee on Sustainable Development and the Green Economy in International Trade Law. She read European History and History of Art at the University of East Anglia (BA Hons) before embarking on her law s­ tudies, with a JD in Dutch civil law from the University of the N ­ etherlands ­Antilles, followed by an LLM in Public International Law from UCL and a PhD cum laude from the Erasmus University Rotterdam. Mary has published widely on GATT/WTO matters, trade and investment, law and economic development, the international regulation of (agro)biotechnology, food security and business and human rights. She is author of An Institutional and Normative Analysis of the World Trade Organization (Nijhoff, 2006) and co-editor with Julio Faundez and Joseph J Norton of Governance, Development and Globalization (Blackstone, 2000). Mattia Fosci Formerly a visiting lecturer in International and EU law at University of Leicester, Mattia has recently founded, and is currently managing, an open-source think tank. Mattia is also consulting on a number of ­government-sponsored projects on open access research. He has published in top rated international environmental journals, as well as on legal and policy issues relating to research management and open access to academic research. Mattia holds a doctorate and LLM in International Law from the University of Nottingham, an MA in International Relations and a BA in Political Science from the University of Cagliari, Italy. His doctoral research focused on the multi-level governance of land and forests in the context of emerging international efforts to mitigate climate change. He has published on issues related to Reducing Emissions from Deforestation and Forest Degradation (REDD+), biodiversity law, and environmental governance in developing countries. In 2009–2010 he attended the UNFCCC negotiations on climate change as an accredited observer.

Contributors xxvii He has worked with civil society organisations and the IUCN, and as a consultant in the areas of climate change law, policy and economics. Hitoshi Nasu Senior Lecturer in Law and Co-Director of the Centre for Military and Security Law at the Australian National University. Hitoshi holds a ­ ­Bachelor’s and Master’s degree in Political Science from Aoyama Gakuin University and a Master’s degree and PhD in Law from the University of Sydney. He is the author of International Law on Peacekeeping: A Study of Article 40 of the UN Charter (Nijhoff, 2009) and co-editor of Human Rights in the Asia-Pacific Region: Towards Institution Building (Routledge, 2011), Asia-Pacific Disaster Management: Comparative and Socio-legal Perspectives (Springer, 2013), New Technologies and the Law of Armed Conflict (TMC Asser, 2014), and Legal Perspectives on Security Institutions (Cambridge University Press, 2015). This research was supported under Australian Research Council’s Discovery Project funding scheme (Project Number: DP130103683). Alexandros XM Ntovas Lecturer in Shipping Law, Queen Mary University of London; Centre for Commercial Law Studies. Dr Ntovas has studied law and political sciences in Greece, England, Belgium, France and the Netherlands. His background amalgamates the disciplines of public international and European law with political analysis and international relations, as these finding a common expression in the context of oceanic policy and the law of the sea. He has practiced public and administrative law, and acted on numerous occasions as a policy advisor to governments, including the European Union, the public sector and the maritime industry. His expertise within the Centre for Commercial Law Studies lies in the navigational freedoms and practices, as well as in issues regarding the public aspects of piracy and other issues of contemporary safety and security of ships, and offshore installations. He had previously held a law lectureship at the University of Southampton, where he was also a governing board member of the Institute of Maritime Law. John Pearson Lecturer, University of Manchester. John teaches in Property Law and Environmental Law. He studied at Bangor University where he received

xxviii  Contributors his undergraduate degree and a second LLM. John earlier received an LLM from Lancaster University before returning to receive his doctorate. His research focuses on the protection of the environment, or features thereof, through human rights law. He is also a case reporter for Oxford University Press’ International Law in Domestic Courts publication and member of the Global Network for the Study of Human Rights and the Environment. Prabhash Ranjan Prabhash Ranjan is an Assistant Professor in the Faculty of Legal S ­ tudies, South Asian University, New Delhi. Prabhash holds a PhD in Law from King’s College London where he studied on a King’s College London School of Law Doctoral Scholarship. As a British Chevening scholar, he read for LLM at SOAS and UCL and graduated with a distinction. ­Prabhash has been a Visiting Fellow to the Lauterpacht Centre for International Law, University of Cambridge; Visiting Scholar at University of Sydney; Guest Tutor at King’s College London; Research Assistant at University College London; and Research Consultant to international organisations the UNDP and UN-ESCAP. He has also advised the Indian Government on bilateral investment treaties. He teaches and publishes in the area of international investment law and world trade law. Julia Schmidt Lecturer in European Law, The Hague University of Applied Sciences. Julia obtained her First State Examination in Law at the University of Mannheim, her LLM in European Legal Studies from Glasgow, and completed her PhD at Edinburgh. Before joining the University of Nottingham as a Research Fellow, Julia worked as a tutor in European Union Law at the University of Edinburgh and as a wissenschaftliche Mitarbeiterin at the Institute for Public International Law at the University of Bonn. She is a qualified but non-practising lawyer in Germany. Her research focuses on the EU’s common security and defence policy and military crisis management operations. Nicholas Tsagourias Professor of International Law, University of Sheffield. His teaching and research interests are in the fields of international law and the use of force, international humanitarian law, international criminal law, United Nations Law, international and European constitutional theory. He has published

Contributors xxix widely in these fields. His most recent publications are the book Collective Security: Theory, Law and Practice (Cambridge University Press, 2013) with Nigel White and the Research Handbook on International Law and Cyberspace (Elgar, 2015) edited with Russell Buchan. He sits on the ­editorial board for the Journal of Conflict and Security Law (Oxford University Press) and is a member of the Cyberterrorism Study Group of the International Law Association. Jure Vidmar Leverhulme Early Career Fellow, Faculty of Law and Research Fellow St John’s College University of Oxford. Jure teaches EU law and Public International Law and acts as a research supervisor for several Oxford colleges. Other legal subjects he has taught include Criminal Law, International Human Rights Law, Jurisprudence and Public Law. Prior to taking up his current position, Jure was a Research Fellow at the Institute of European and Comparative Law, University of Oxford, and prior to that he was a Post-Doctoral Researcher at the Amsterdam Center for International Law, University of Amsterdam. As a visiting fellow and guest lecturer, Jure regularly cooperates with the University of Pretoria. His main research interests lie within public international law, human rights, ­European law, and political theory. He is the author of a monograph entitled Democratic Statehood in International Law: The Emergence of New States in Post-Cold War Practice (Oxford, Hart Publishing, 2013) and co-editor (with Erika de Wet) of Hierarchy in International Law: The Place of Human Rights (Oxford, Oxford University Press, 2012). He has also authored a number of articles and book chapters on several topics in international law, including democracy, hierarchy, jus cogens, governments, territorial integrity, statehood and recognition. In 2012, Jure was awarded an Early Career Grant by the Leverhulme Trust which will enable him to carry out a research project entitled ‘Abusive Governments in International Law’. This research is also supported by the John Fell Fund of Oxford U ­ niversity. Jure is an editor of the Hague Yearbook of International Law. Nigel D White Head of the School of Law and Professor of Public International Law, University of Nottingham, formerly Professor of International Law at the University of Sheffield. In addition to publishing a number of articles and essays, Nigel is co-author and author of a number of books including Keeping the Peace (Manchester University Press, 1997), The UN System: Toward International Justice (Lynne Rienner, 2002), The Law of International

xxx  Contributors ­Organisations (Manchester University Press, 2005), Democracy Goes to War: British Military Deployments under International Law (Oxford University Press, 2009), and The Cuban Embargo under International Law: El Bloqueo (Routledge, 2015). He is also editor and co-editor of a number of collections including The UN, Human Rights and Post-Conflict Situations (Manchester University Press, 2005), European Security Law (Oxford University Press, 2007), International Law and Dispute Settlement (Hart Publishing, 2010), and Counter-Terrorism: International Law and Practice (Oxford University Press, 2012). He is co-editor of the Journal of Conflict and Security Law published by Oxford University Press and in its twentieth year. He has undertaken a number of funded research projects including on: the regulation of private military and security contractors; democratic accountability and the deployment of troops; human rights and post-conflict situations; the role of national courts in international law; and counter-terrorism and the rule of law. In recent years he has given written and oral evidence to the UK House of Commons Constitutional Affairs Committee (on war powers), the Foreign Affairs Committee (on the legal consequences of Scottish independence, and the regulation of private military contractors), the All Party Parliamentary Inquiry into Terrorism (on international legal responses to terrorism), and a written submission to the Iraq Inquiry (on the legality of the UK’s use of force in 2003).

Introduction NIGEL D WHITE AND LYDIA DAVIES-BRIGHT

Security is mostly a superstition. It does not exist in nature, nor do the children of man as a whole experience it. Avoiding danger is no safer in the long run than outright exposure. Life is either a daring adventure, or nothing.1

Notwithstanding the wisdom of Helen Keller’s words in the 1950s, security has become the central topic of the twenty-first century, with each day seemingly bringing yet another threat that endangers the lives of citizens and the functioning of states. Politicians, international organisations and security agencies seek to maximise security through a variety of measures. The United Nations has become increasingly active in pursuit of its obligation in Article 1(1) of the UN Charter to maintain international peace and security, with the Security Council passing Resolutions with increasing domestic obligations on Member States.2 Actual and perceived threats to both individual citizens and states range from climate change, geological catastrophes, environmental degradation and food shortages, to terrorism, contested territorial space, armed conflict and threats relating to energy, infrastructure and the delivery of essential services. In responding to perceived threats, states and their citizens pursue protection, sometimes at almost any cost, in a variety of ways. Security and the creation of measures with the stated aim of maximising security have become central to both domestic and international political and legal discourse. This collection of essays, which arose out of the International Law Association (ILA) British Branch Annual Spring Conference, held in Nottingham in April 2012, examines the concept of security in international law—how international law shapes security and how security shapes international law. In order to legitimise restrictive actions, international legal instruments are used to limit or outlaw activities that are seen as potentially dangerous, such as funding groups suspected of sponsoring terrorism, or to attempt to compel actions with the aim of preventing

1 

H Keller, The Open Door (Doubleday, 1957). Such as UNSC Res 1373 (28 September 2001) UN Doc S/RES/1373 (2001), which marked a shift in international law—as it was passed under the UN Security Council’s Chapter VII UN Charter powers, it is binding on all Member States. 2 

xxxii  Introduction s­ ecurity risks, such as climate change agreements that limit carbon emissions and encourage the use of renewable energy sources. This then narrows the sphere of legitimate activity and has both seen and unforeseen consequences for states, groups and individuals seeking to protect themselves from perceived threats. The volume encompasses issues of human, political, military, socioeconomic­, environmental and energy security, and raises two main questions: To what extent can international law address the types of natural and man-made security risks and challenges that threaten our way of life or, indeed, our very existence, in the twenty-first century? And, where does international law fall short in meeting the problems that arise in different situations of insecurity and how should such shortcomings be addressed? The book is divided into two parts, with Part I considering different aspects of security, including how different international legal regimes, such as international environmental law and international criminal justice, intersect with what has been traditionally viewed as a concept or value protected by collective security law. Part II focuses on specific threats and considers how both general international law and applicable specific regimes have responded to perceived and actual security threats. Consideration of the evolving understanding of security and its accommodation and protection in international law begins in Professor Nigel D White’s chapter on security agendas and international law, which sets the scene for considering different aspects of security and international law in Part I. This chapter explains how the development of security from the orthodox military and national perspectives has been challenged by the post-Cold War proliferation of security agendas to include economic security, environmental security, food security, bio-security, health security and human security. This development, reflecting the securitisation of daily life, has influenced international legal understandings of security. The influential Copenhagen School’s conceptualisation of security, as a shared understanding of what is considered a threat, which in turn is depicted as part of the wider trend towards ‘constructivism’ in the theorisation of security, is used to shape the analysis. The Copenhagen School has moved the study of security away from the confines of Realist rationalisation of security threats, towards a more democratic construction of security based on shared understandings of organisations, governments, civil society and other non-state actors, including individuals. These theoretical positions, along with the more juristic perspectives, provide essential insights into how security has been incorporated into international law; for example in shared understandings within the Security Council of what constitutes a ‘threat to the peace’, or what it means to take ‘necessary measures’ to protect civilians or, indeed, whether targeted sanctions are administrative or punitive (penal) measures. It also provides

Introduction xxxiii a more functional way of distinguishing the competencies of different security communities such as the General Assembly, regional organisations and defence organisations. By taking a broad view of the subject, but also by its focus on new technologies, the chapter provides an introduction to the themes contained within this volume and also explains the theoretical framework within which international security law fits. Following on from this, in Chapter 2 Hitoshi Nasu reviews the legal development of the concept of human security and considers the legal limits preventing it from being harnessed more widely in other fields of international law. The idea of taking a human-centred and multi-sectoral­ approach to security, which emphasises the empowerment of people in order to enhance their potential through concerted efforts to develop norms, processes and institutions that systematically address insecurities, arguably precedes the formation of the Westphalian system. However, it only entered policy discourse in 1994 when it was included in the UN Development Programme’s annual ‘Human Development Report’. The ‘people-centred’ concept was presented as a broadening of the security paradigm beyond military concerns. Since then, the concept of human security has facilitated the adoption of treaties aimed at the protection of civilians from armed violence and has also informed debates regarding the interpretation and application of existing rules of international humanitarian law. Nasu argues that the idea of human security challenges international law, not only in respect of its sovereignty-based legal framework, but also, more significantly, by questioning the very notion of security shared by policy-makers and jurists. While human security challenges our traditional conceptions of the concept of security, it is not without its own problems in terms of alternative paradigms given, for example, the inherent tension between humanity (at least in its current phase of development) and the environment. In a continuation of the examination of the concept of human security, John Pearson explores the oppositional relationship between human security and environmental security in Chapter 3. The 1994 ‘Human Development Report’ identified environmental security as one of seven key aspects of the central human security paradigm, alongside economic, food, health, personal, community and political securities. In 2007, climate change was declared in a UN Security Council debate as being ‘the greatest threat to global security,’ but one that ‘can bring us together if we are wise enough to stop it from driving us apart.’ Pearson contends that the inextricable links between the other components of the 1994 definition of human security and the environment ought to place environmental security as the top priority of international law and relations. However, the environment, both in terms of its protection and exploitation, remains one of the most contentious international issues,

xxxiv  Introduction primarily due to the unwillingness of states to prioritise global environmental concerns over national interests. Traditional concepts of human security remain at the centre of international negotiations, leading to an anthropocentric approach that fails to take into account the subject matter of the legal provisions being ­discussed—the environment. It is only where the environment, or an aspect thereof, has been placed at the centre of international legal provisions has any measure of success been achieved. Thus, human security remains elusive and unachievable until environmental security is first safeguarded. Consequently, the chapter argues that the continued reluctance and inability of international law makers to place the environment, and not humans or states, at the heart of efforts addressing shared international risks and ensuring human security has condemned those efforts to perpetual inefficacy or absolute failure. While the idea of ‘international’ security might suggest universal consensus on the concept, it is more likely that deeper meaning and understanding can be achieved at the regional level. In Chapter 4 Julia Schmidt examines another important relationship, that between regional security (understood in terms of the UN Charter) and international law. The UN has recently developed a practice of co-operation with regional organisations in the pursuit of securing international peace and security. In 2012, the European Union was awarded with the Nobel Peace Prize for its contribution to the advancement of peace, reconciliation, democracy and human rights in Europe over the last 60 years. The EU’s ambitions as a security provider are not limited to the European continent. Since its common security and defence policy became operational in 2003, the EU has been engaged in more than 20 civilian and military crisis management missions all over the world. The EU is just one of many regional organisations with a security mandate. Some organisations, such as NATO, have been founded to provide security; others have been designed to further the economic interests of its members and have acquired a security mandate over time. The latter thereby respond to the changing nature and origins of threats in a globalised society which make it impossible for states to secure their citizens independently. In 1945, the UN Security Council was assigned with the task of restoring and maintaining international peace and security. The UN Charter foresees only a secondary role for regional arrangements. In practice, regional organisations, whether they fall within the scope of Chapter VIII of the UN Charter or not, assist the United Nations in hard security tasks, including peace-keeping and peace-enforcement. They provide the UN with much needed resources and rapid reaction mechanisms. Although multilateralism can help to overcome some of the UN’s shortcomings, multilateralism also challenges the universal security system of the United Nations in a

Introduction xxxv number of ways: the use of force by regional actors without an explicit UN Security Council mandate; the legal and political questions raised by regional organisations that view themselves as autonomous legal systems; and the problems created by a lack of clear allocations of responsibilities between the United Nations and regional organisations for the functioning of a universal security system. In addition to regional challenges, at the normative level the idea of international security law is underdeveloped and is often overshadowed by ideas of international criminal law and justice. The idea of law, at its most basic level, is embodied in notions of crime and punishment. Although international criminal law has only flourished in the latter part of the twentieth century, its greater normative content and institutionalisation in the form of courts, gives it the appearance of a developed legal regime, when compared to the underdeveloped and politically-dominated area of international law and security. The weaknesses of the International Criminal Court (ICC) have shown the reality but, moreover, have revealed the uneasy interface between international law and security on the one hand and international criminal justice on the other. In Chapter 5 Olympia Bekou examines the inextricable link between international criminal justice and security. This relationship extends not only to those international criminal justice institutions that have been created as a means of restoring international peace and security in the aftermath of mass atrocity, but also to the permanent ICC, which can be seized of jurisdiction following a referral by the UN Security Council, even where the referred state is not a party to the Rome Statute—as with Libya in 2011.3 In international criminal justice terms, this relationship is also encapsulated in the ‘peace versus justice’ debate. Through examining the creation, operation, and termination of international criminal justice institutions and their interaction with security, Professor Bekou’s chapter sheds light on this relationship. The role that international criminal justice plays in enhancing security highlights the tensions, successes and pitfalls that arise from this interaction. The concepts of human security and individual criminal responsibility are different ways of protecting the individual from threats and abuse of their security. Perhaps the curse of the twenty-first century is that there seems to be almost too many concepts and ideas being argued for, that we end up in both normative confusion as well as a failure to deliver on these promises to vulnerable individuals, whether they be in the IDP [internally displaced persons] camps of Darfur or the beaches of Tunisia. Responses to the threat posed by the use of violence against citizens is continued in Chapter 6 by Alexandra Bohm’s exploration of the role of the 3  After the unanimous passing of UNSC Res 1970 (26 February 2011) UN Doc S/RES/1970 (2011).

xxxvi  Introduction ‘­responsibility to protect’ (RtP) doctrine in protecting vulnerable populations from violence. Although RtP is not a legal doctrine, it nevertheless forms part of arguments that international law is not ‘fit for purpose’ in its ability to meet the security threats of the post-Cold War era. Existing legal ­instruments (such as the Genocide Convention or civilian protection mandates in peacekeeping operations) are perceived as inadequate and do not provide a generally applicable blueprint for action. RtP is presented as a method of filling the lacuna in the international peace and security legal architecture and a means of limiting the use of the state sovereignty argument to prevent intervention in situations of a government committing or allowing atrocities to occur against its own population. In exploring alternative understandings of the role the international community can play in dealing with security threats faced by individuals, Bohm challenges the three central assumptions underpinning RtP: (i) that mass atrocity crimes (and associated intra-state crises) are the key threat to individuals today and, (ii) due to the association with domestic governance failures, domestic reform is key to preventing the development of these crises, and (iii) the international community is well-placed to help prevent such domestic failures and to intervene on behalf of those at risk should prevention fail. Instead, Bohm asserts that the focus of RtP on acute crisis situations in which mass atrocity crimes occur minimises the importance and scale of more chronic, systemic injustices (including, for example, poverty and inequality) and prioritises civil and political rights over socio-economic issues (such as health and education). RtP addresses (some of) the symptoms of global injustice rather than the causes and so there needs to be a recalibration in order to include chronic conditions of poverty and inequality, both because these are important in their own right and because socio-economic justice supports good governance and crisis prevention. Relating this discussion to international law more broadly, Bohm concludes that asking if international law is ‘fit for purpose’ because it does not permit military intervention in situations of violence against civilians is asking the wrong question. A doctrine that attempts to expand the ability of states to use force to halt violence, without considering fully the causes of such violence, should be treated with caution. By permitting an increase in the use of (armed) force, the international community may in fact be increasing insecurity and reducing its ability to protect the individual. This collection of essays then moves on to examine specific security threats in Part II, beginning with Chapter 7, in which Tom Coppen considers what is arguably the most existential issue (though environmental lawyers might not agree)—that of nuclear security. The chapter focuses on international law and the Iranian nuclear crisis to provide a legal analysis of the arguments utilised by both Iran and Western states in d ­ iscussing

Introduction xxxvii Iran’s nuclear programme. Through his analysis of key aspects of the Iranian nuclear programme in light of its obligations under the Nuclear Non-Proliferation Treaty (NPT), Coppen highlights the tension between pursuing nuclear non-proliferation and the use of nuclear power as an alternative energy source. His paper focuses on two demands made to the Islamic Republic by the International Atomic Energy Agency (IAEA) and the UN Security Council: that Iran must ratify and implement an Additional Protocol; and that it must suspend certain ‘proliferation-sensitive’ activities. Iran’s nuclear programme and uranium enrichment activities present proliferation concerns for the IAEA and UNSC and is framed in terms of being a threat to international peace and security. Here the question of whether or not Iran is legally obliged to ratify and implement the IAEA Additional Protocol is answered by an analysis of Article III(1) of the NPT, which compels signatory states to accept safeguard obligations on their nuclear activities, as well as of the IAEA Comprehensive Safeguard Agreement and Model Additional Protocol. Iran routinely relies on the NPT to defend its enrichment programme and asserts its ‘inalienable right’ to peaceful uses of nuclear energy. It is therefore appropriate to analyse relevant key provisions of the NPT, namely Articles II (non-proliferation obligation) and IV (right to peaceful use of nuclear energy and right to participate in exchange of nuclear material). Coppen includes the travaux préparatoires, the Review Conferences and subsequent practice when interpreting the NPT, in order to present an often overlooked method of applying the Vienna Convention of the Law of Treaties when interpreting arms control agreements. In Chapter 8, Alexandros XM Ntovas moves away from the activities of states and explores and evaluates the contemporary nature of the threat to international peace and security posed by contemporary maritime piracy. In a sense this is a return to international criminal law, but in a more traditional form, and not one that has (yet) been brought within the remit of the ICC. Ntovas asserts that, as with other twenty-first century security threats, the scope of piracy has significantly broadened, from a narrow international offence that posed a danger to the safety of specific commercial maritime trading routes, to a general economic threat that endangers the shipping and insurance industries, with consequential impacts on international trade and global supply chains. Modern maritime piracy has significantly expanded in its geographical scope and now poses a threat that transcends maritime zones and land regions. In UNSC Resolutions, what was initially determined as a threat ‘against vessels in the territorial waters of Somalia and the high seas off the coast of Somalia’, was later described as a threat to ‘the region of the Western Indian Ocean’, and then, more recently, as a threat to ‘States in the region and other States’.

xxxviii  Introduction Moreover, in terms of economic development and domestic security and stability, the adverse ramifications of piracy are widespread and have even impacted landlocked countries in the region. Ntovas argues that, in parallel with this extension of geographical scope, piracy has also developed into a multifaceted international offence that incorporates a variety of elements, such as financing, planning, implementing and profiting. In particular, the current modus operandi of pirates in demanding a ransom payment for hostages taken from tourist resorts demonstrates the existence of effective transnational systems that enable the pirates to channel the payment of ransoms through an existing money laundering network in order to access the funds. Although international law provides a broad legal framework applicable to combating piracy, including the maintenance of universal jurisdiction, and the international community is involved in developing more sophisticated responses aimed at emphasising the duty of states in the suppression of piracy, international law enforcement will remain unproductive unless effective law-making and judicial structures are created to comprehensively address the modern legal nature of piracy. It remains to be seen, however, whether the most challenging aspect of combating contemporary maritime piracy emanates from the act itself, or from the growth of a peripheral transactional industry rooted in societies and economies far from the theatre of piratical scenes. In Chapter 9 on the relationship between security and terrorism, Lydia Davies-Bright returns to the acts of states and individuals and examines how the sociological, legal and political impact of acts of terrorism have been felt, responded to and pre-empted over the past decades by looking at key events in the history of terrorism: the Lockerbie bombing and subsequent circumvention of the 1971 Montreal Convention; the 2005 extra-judicial killing of Jean Charles de Menezes in London; and the 2011 extra-judicial killing of Osama bin Laden in Abbottabad. She argues that the journey from confronting terrorism through the criminal law paradigm, with widely supported treaties that reinforce the criminal law approach, to an increase in executive action, with the UNSC overriding such treaties but remaining loosely within the criminal law framework by producing a trial of the Lockerbie suspects, to a military and pre-emptive framework, with the extra-judicial killing of persons that completely bypasses any criminal law process, threatens the security of individuals and undermines a key principle upon which the international legal order was ostensibly built—namely that each human person possesses an inalienable human dignity by virtue of the fact that they are a human person. Within this narrative, Lockerbie can be seen as a crucial moment in the move from the criminal to the military paradigm, with the UNSC beginning to overtly consider terrorism as a general threat to international peace and security. Post 9/11 this then became its default position on all acts of

Introduction xxxix international terrorism—they fall under the UNSC’s mandate in Article 24 of the UN Charter for the maintenance of international peace and security. The general consensus is that exceptional national and international action is required in order to counter this previously unprecedented threat. The resulting curtailing and infringing of individual human rights and civil liberties is perceived as an unfortunate, but necessary, consequence of the fight to protect essential freedoms and values. Davies-Bright argues that the individual citizen is now less secure as the safeguards of human rights and civil liberties are no longer an adequate protection in a world where simply being a suspect is potentially enough to warrant an executive death sentence. Continuing with the theme of threats posed to the individual by manifestations of the state, Jure Vidmar focuses Chapter 10 on the threat to security posed by abusive governments, and considers the normative underpinnings and collective response to the actions of non-democratic governments in the post-Cold War era. Traditionally, governmental legitimacy in international law was a matter of effective control over a certain geographical and defined territory. This doctrine appears to be changing. Post-Cold War, it has been argued that governmental legitimacy in contemporary international law originates in democratic elections and not merely from being able to maintain physical control over a defined area. Concurrent but independent to the pro-democratic endeavour in international law, a practice of international collective responses has developed that denies legitimacy to governments seen as being abusive of their people. The changing doctrine on governmental legitimacy is exemplified in Security Council Resolutions 1970 and 1973 of 2011 on Libya.4 It may be argued that the response to the situation in Libya marks a significant turning point in the attitude of the international community to abusive governments. It may also be invoked as an operationalisation of the controversial concept of the responsibility to protect. However, the international response to Libya may also be put into the context of an already-developing­doctrine. Although legal consequences of governmental abusiveness have varied, the concept seems to have been the motivation behind international responses to the situations in Afghanistan, East Timor, Haiti, Kosovo and Sierra Leone. In these situations the Security Council, acting under Chapter VII of the UN Charter, established the existence of a threat to international peace and security, even though the situations often seemed to be of a domestic, rather than international, nature. Thus, the Security Council has called for the change of effective governments and also used its binding powers to create territorial administrations on the justification of governments being

4 

UNSC Res 1970 (n 3) and UNSC Res 1973 (17 March 2011) UN Doc S/RES/1973 (2011).

xl  Introduction abusive to their own people. This indicates that governmental abusiveness is considered to be a threat to international peace and security, even in the absence of the threat or use of force in international relations. However, Vidmar argues that governments do not lose their legitimacy simply by not adopting a certain political system. Instead, recent practice may suggest that coup regimes will be viewed as illegitimate where they overthrow democratically-elected governments and that, in some circumstances, abusive governments may be internationally denied the right to represent the people they claim to represent. In this context, there appears to be an emergence of a terminological difference between coup and regime-change—under some circumstances, a change of government is internationally unacceptable and in others it is at least tolerated, if not internationally encouraged. The international practice towards changes in government is analysed in order to ascertain the international legal framework governing such situations. Vidmar asserts that a government may lose its international legitimacy on the basis of abusiveness directed against its own people; however, such an occurrence is not automatic but depends upon collective action. Thus, the practice is not uniform and is also dependent upon relevant political and economic factors that influence the international community’s approach and perception of the threat to security. In Chapter 11, Prabhash Ranjan moves the discussion on from the relationship between individuals to consider the relationship between the state and investors by focusing on the protection of a state’s security interests in international investment law. Again we can see how the idea of ‘security’ permeates sub-disciplines of international law, such as international investment law, leading to the question of whether there is an overarching framework of international security law. Alternatively, is security an extra-legal (meta) value that can trump positive law, as it sometimes seems to before domestic courts? The regulatory measures adopted by Argentina in response to its severe economic crisis in 2000 were challenged by foreign investors using the investor-state treaty arbitration provided in Bilateral Investment Treaties (BITs) as being a violation of their rights protected by the BIT. Argentina argued that these measures were necessary for safeguarding its ‘essential security interests’, whereas foreign investors argued that the adopted regulatory measures were not necessary and violated different substantive BIT protections. These disputes have brought to the fore the question of when host states can deviate from their BIT obligations in order to safeguard their essential security interests. The emerging jurisprudence and the scholarly response to these cases pose two fundamental questions: First, whether protecting security interest in BITs is limited to strict security related interests, or does it have a broader meaning to include non-security related interests? Second, when can a regulatory

Introduction xli measure adopted by a host state be deemed to be ‘necessary’ to safeguard its essential security interests? Ranjan’s chapter looks at the nature of essential security interests that may permit a temporary deviation from or suspension of investment treaty obligations. Different investment treaty arbitration tribunals have adopted diverse approaches in interpreting essential security interest in BITs, which can be placed into two broad categories. The first category includes cases where the relevant BIT explicitly recognises ‘essential security interests’ as one of the grounds for the host state to deviate from its treaty obligations and the conditions for its invocation and deviation. This is considered not to be a ‘self-judging’ clause, which means that the BIT provides the host state with the regulatory latitude to deal with threats to its important security interests. Ranjan demonstrates that divergence in the arbitral jurisprudence on interpreting such clauses has added to the confusion regarding when a host state can suspend its treaty obligation to achieve its essential security interests. This confusion is more so because all these cases have interpreted the same treaty provision and almost the same situations differently. The second category of cases is those where the BIT has an explicit exception that is self-judging and it contains a list of activities related to ‘security interests’, allowing the host state to temporarily deviate from its treaty obligations in order to protect those security interests. Given the divergence within the relevant jurisprudence, Ranjan concludes that the substantive law contained in BITs is in need of reform so as to provide clarity regarding the meaning of essential security interests and the conditions in which the host country can temporarily deviate from treaty obligations in order to achieve its essential security interests. Such reformulation will not only help a host state in exercising its regulatory power and defending its essential security interests without violating the BIT, but will also bring about more certainty and predictability in the investment treaty regime. Such reform may then add to the overall global security picture by increasing certainty in investment and other financial and economic contexts. In a globalised world, no element of inter-state relations stands in isolation and insecurity in one area may be manifested in another. A breakdown in investment relations, or perceived slights in the interpretation of treaty provisions, may impact the willingness of states to sit around the negotiating table on other global security issues, such as climate change. In a different zonal approach to the security question, in Chapter 12 Jill Barrett examines the security threat faced by the Antarctic and the ­Arctic—from disputes over territory and maritime delimitation, to weapons testing, hazardous waste disposal and competition for living and mineral resources. The unique ecosystems in those areas have an intrinsic value unrelated to anthropocentric concerns, as well as being crucial for scientific climate research and the effects of sea level rise. With a much

xlii  Introduction weaker international environmental legal protection than the Antarctic, the Arctic is currently facing significant threats as climate projections predict ice-free summers in approximately 20 years, which brings the prospect of rapid increases in navigation, oil and gas exploitation and tourism. This risk has led to calls for a new Arctic Treaty based on the content of the Antarctic Treaty (AT). However, there are many crucial differences between the Arctic and the Antarctic that make such a direct transposition of the AT inappropriate. Antarctica is a land continent, surrounded by sea and islands and with no settled human population, whereas the Arctic consists of a vast ocean, surrounded by states, and is home to approximately four million permanent human inhabitants. The AT has been in force for over 50 years and has achieved its principal security objective of keeping the Antarctica ‘exclusively for peaceful purposes and not … the scene or object of international discord’. The cornerstone of the AT system is the pact that enables sovereignty disputes to be resolved in favour of international co-operation, the whole of Antarctica to be designated a natural reserve, devoted to peace and science, with high standards of environmental protection and a complete ban on mineral exploitation. Nevertheless, the AT system undoubtedly faces challenges and strains, as is evident from recent controversies over continental shelf submissions and responses. Some argue that it is based on outdated colonial notions of sovereignty and so should be replaced by a universal governance regime. In order to maintain and sustain its objectives, the AT system needs to improve compliance, expand its membership, and find more effective ways of engaging non-parties and their nationals and operators. In contrast, the debate over Arctic governance appears almost to be in reverse, with ‘idealists’ extolling the virtues of the AT as a model for the Arctic and ‘realists’ arguing against new institutions, preferring to concentrate on the universal ratification of United Nations Convention on the Law of the Sea and other existing treaties, and to continue informal inter-governmental co-operation through the Arctic Council. However, the security of the Arctic environment will be increasingly affected by the conduct of non-Arctic nations and their nationals. Thus, this issue becomes a global one and the need to bind the international community to standards of socially responsible and environmentally sustainable exploitation of resources may drive the Arctic states to negotiate legally binding instruments for the region. The AT may provide some useful ideas with which to start the negotiation process; however, in order to be effective and achieve security for the Arctic region, significant adaptation would be required. In Chapter 13, Mattia Fosci returns to the issue of the environment and its impact on security, by specifically considering the theme of climate change as a threat to international security. Fosci focuses on the

Introduction xliii increasing climatic variability caused by anthropogenic greenhouse gas emissions—widely regarded as a source of instability and a threat to international security in the twenty-first century. The direct impacts of climate change include extreme weather events and the exacerbation of existing intra- and inter-state tension and conflict. The human consequences of climate-induced migration, reductions in access to freshwater, disruptions to agricultural production and the consequent pressure of negative economic development are often felt by those states with a limited ability to deal with such events, yet are a result of global activity. Thus, given the global nature of the causes and consequences of climate change, any credible solution requires broad international cooperation. In 1992 the UN Framework Convention on Climate Change (UNFCCC) established the applicable international legal regime and focused on mitigating the causes of climate change, with a view to reducing its future impacts. In 1997 the Kyoto P ­ rotocol introduced quantified emission reduction and limitation targets for contracting Parties and a system of penalties for non-compliance­. However, due to political, economic and equity considerations, developing countries were excluded from emission reduction commitments. This, combined with US non-adherence and the general apathy of developed states, has significantly limited the Protocol’s impact. UNFCCC Parties are currently negotiating a new protocol with more stringent mitigation targets, broader participation and a greater e­ mphasis on increasing adaptation capacity in developing countries. However, progress is slow and the prospect of concluding a new protocol in 2015 is far from certain. The failure of the international community to develop and implement an effective legal regime in order to tackle the threat posed by global climate change highlights the limitations of international law when dealing with complex, politically sensitive global problems with far-reaching economic implications. When the stakes are high, states seem to revert from a constructivist to a neorealist model of international relations, whereby multipolar power relations and resource politics prevail over international cooperation and the common environmental concerns of states. Political machinations also prevent more incisive action by the UN Security Council in this area. Thus, the consensus-based model appears to be ineffective in addressing the threat of climate change. Fosci argues that attitudes towards climate change will probably only shift when the first substantial impacts of the phenomenon are felt. Institutions such as the UN Security Council and NATO may then play a bigger part in responding to the emerging security threats, but equally the UNFCCC may also regain prominence in crafting a long-term cooperative solution to the challenges of mitigation and adaptation. Thus, the current role of international law is to maintain international discussions, despite the absence of political will, to clarify country positions, to frame ­problems

xliv  Introduction in a constructive way and to identify a portfolio of possible solutions to the problem. In due course, this may prove of great value to the international community and may facilitate a viable solution to perhaps the most significant security threat of the twenty-first century. The idea of international law providing the language of diplomacy and allowing for common ground to be sought when the political context is right leads us back to the discussions in Chapter 1, in which new technologies are discussed, and to the final chapter of this volume. In Chapter 14, Russell Buchan and Nicholas Tsagourias focus on cyber-attacks and threats. In the modern age, with citizens and states increasingly relying on the internet and other cyber activity for the economic, political and social aspects of daily life, cyberspace has become the source of numerous potential threats in a variety of forms. Cybercrime, cyberterrorism, cyberespionage and cyber-attacks are some of the most common cyber threats that face individuals and states in the twenty-first century. Buchan and Tsagourias identify the most serious threats that arise in and from cyberspace, consider the appropriate international legal regime applicable to such threats and ask whether international law can sufficiently address such threats, or whether new international legal norms are required. In keeping with the other security subjects discussed in this collection, the focus is primarily on military-like cyber-attacks committed against states by other states, or by non-state actors, and assesses the adequacy of the international legal regime on the use of force to protect states from this new security threat. Due to the fast-paced nature of recent technological advancement, existing legal principles and instruments are often reinterpreted in order to provide regulation for a new development. The recognition of cyberspace as requiring its own legal regime would help to foster common understandings of rights, obligations and actions and assist in the dissemination of relevant norms and principles. This may improve the cyber security of both states and individuals, although, as with the other areas discussed in Part II, it would require a significant level of international co-operation and a prioritisation of global security over national and territorial interests. From the contributions to this volume, it is clear that ideas of security have changed over time. From the state-centric militarised position of the Westphalian model that largely conceptualised threats as emanating from without (be it from external enemies, such as in the form of foreign militaries, or from external ideologies that endanger the status quo, as in the religious wars in Europe during the sixteenth and seventeenth centuries), the concept of security appears to have now broadened in order to encompass a variety of threats at the (macro) global level, the state level and the (micro) individual level. However, although technology and the ability to communicate have improved exponentially, along with the overall global

Introduction xlv human population, it may be that the security threats facing humanity in the twenty-first century may in fact be further manifestations of the ageold threats of other human groups and the geology of this planet. As Helen Keller said in the 1950s and as echoed by Salman Rushdie in 2012,5 security is not real and neither humans nor nature experience it. However, the insecurity faced by all life that lives on the earth perhaps makes life more interesting—it certainly makes for interesting academic discussions and affords us the opportunity to examine our interactions through the establishment of legal regimes designed to reduce the level of insecurity faced on a daily basis by all human groups.

5  R Singh, ‘Hay Festival 2012: Salman Rushdie on Security and The Satanic Verses’ The Telegraph (3 June 2012) www.telegraph.co.uk/culture/hay-festival/9309641/Hay-Festival2012-Salman-Rushdie-on-security-and-The-Satanic-Verses.html.

xlvi

Part I

Conceptions of Security and International Law

2

1 Security Agendas and International Law: The Case of New Technologies NIGEL D WHITE

You will not apply my precept,’ he said, shaking his head. ‘How often have I said to you that when you have eliminated the impossible, whatever remains, however improbable, must be the truth?1

I. INTRODUCTION

‘S

ECURITY’ AS A concept would provide a serious challenge to ­Sherlock Holmes in terms of detecting any definite meaning, any core of truth within it. In terms of the international legal order, ­‘security’ is not viewed as a legal principle but is seen as the ‘primary’ purpose of the principal inter-governmental organisation of the post-1945 legal and political order.2 It is worth considering the relevant provisions of the UN Charter in greater detail because they contain a tension between security and justice, by placing security (partly) within the framework of international law. Article 1 of the Charter declares that the purposes of the UN are: 1. To maintain international peace and security, and to that end: to take effective measures for the prevention and removal of threats to the peace, and for the suppression of acts of aggression or other breaches of the peace, and to bring about by peaceful means, and in conformity with the principles of justice and international law, adjustment or settlement of international disputes or situations which might lead to a breach of the peace; 1  Sherlock Holmes to Doctor Watson in A Conan-Doyle, The Sign of Four (London, P ­ enguin, 1982) 51, emphasis in original. 2  Certain Expenses of the United Nations (Advisory Opinion) [1962] ICJ Rep 151 at 168 where the Court stated that ‘the primary place ascribed to international peace and security is ­natural, since the fulfilment of the other purposes will be dependent upon the attainment of that basic condition’.

4  Nigel D White 2. To develop friendly relations among nations based on respect for the principle of equal rights and self-determination of peoples, and to take other appropriate measures to strengthen universal peace; 3. To achieve international co-operation in solving international ­problems of an economic, social, cultural or humanitarian ­character, and in ­promoting and encouraging respect for human rights and for fundamental freedoms for all without distinction as to race, sex, ­language, or religion; and 4. To be a centre for harmonising the actions of nations in the attainment of these common ends. International lawyers tend to focus their attention on the principles of the UN Charter contained in Article 2, which include principles ­applicable to the UN, of sovereign equality and non-intervention, and duties upon states, primarily the obligation to settle disputes peacefully and the duty to refrain from the threat or use of force. However, Article 1(1), is ­important for international law more broadly because it sets the UN the task of ­pursuing peaceful settlement of disputes in accordance with ­international law but, read literally, it does not subject the UN’s collective measures taken to tackle threats to, or breaches of, the peace to the same legal framework. The prospect of UN security action unbound by international law runs like a red line through the Charter: the principle that the UN should not intervene in domestic affairs does not prejudice action taken by the Security Council under Chapter VII.3 The ban on the use of force allows for only two exceptions—self-defence against an armed attack and military action taken to combat threats to and breaches of the peace as authorised by the Security Council under Chapter VII.4 The content of the Charter seems to favour ‘security’, especially the collective coercive type found in Chapter VII, over ‘law’. The achievement of peace and security is the raison d’être for the establishment of the UN, and international law is instrumental or ­ ­secondary to that. However, paragraphs 2, 3 and 4 of Article 1 contain the basis for the development of a much more impressive legal architecture that could, potentially, provide a robust framework for security action by placing both the development of self-determination of peoples and the promotion of respect for individual human rights as purposes of the UN, alongside the achievement of peace and security. Within the human rights legal framework subsequently created by the UN in instruments and t­ reaties that followed the Charter,5 freedoms and rights

3 

Article 2(7) UN Charter 1945. Articles 2(4), 51 and 42 UN Charter 1945. 5  Universal Declaration of Human Rights (adopted 10 December 1948) UNGA Res 217 A(III) and the International Human Rights Covenants of 1966. 4 

Security Agendas and International Law 5 are curtailed by considerations of security, both national and human. While security was born free in 1945, it has gradually been shackled by legal constraints. However, those shackles are not strong enough to prevent the Security Council from behaving as if it remained unbound by international law. Rather than focus this chapter on the Security Council, a topic covered in detail in many books and articles,6 the focus will be on the shifting ground of security agendas and those communities established to deliver them. The chapter then considers whether this has involved the application or development of international laws to constrain potential threats, using the example of new technologies. Essentially, the chapter reviews whether, in the twenty-first century, the UN tackles new security threats in an executive manner through the Security Council, or whether it has (also) addressed these issues through legal frameworks and constraints. The relationship between security and law is one that is played out at all levels, from local, to national, to regional and then international. It is a delicate one—too greater emphasis on security erodes rights and freedoms and may lead to despotism, while too greater emphasis on law may prevent action necessary to tackle existential threats. In the 1960s, international lawyers had come to view the ‘harnessing of technology by public international institutions’ as opening ‘encouraging prospects for the control and direction of social change’. However, that view has changed so that today ‘technology is no longer seen ­predominantly as promise but often rather a threat’ and, furthermore, concern is widespread that the ‘ability of public international organizations to manage technological change has been very limited’.7 New technologies seem to be a long way ahead of specific legal regulation, especially at the international level where consensus is difficult to achieve, and yet, without such regulation, they represent possible threats to peace and security when, with effective legal controls, they have the potential to enhance both peace and security. II.  THE PROLIFERATION OF SECURITY AGENDAS

Drawing on the work of the Copenhagen School, ‘security’ can be best understood as the absence of existential threats against states, other

6  Eg V Lowe, A Roberts, J Walsh and D Zaum (eds), The United Nations Security Council and War (Oxford, Oxford University Press, 2010); ND White, ‘The Security Council, the Security Imperative and International Law’ in M Happold (ed), International Law in a Multipolar World (Abingdon, Routledge, 2012) 4. 7  M Koskenniemi, The Gentle Civilizer of Nations (Cambridge, Cambridge University Press, 2002) 512.

6  Nigel D White s­ecurity actors, peoples and individuals.8 The development of international relations to encompass ‘collective security’ and ‘human security’ has not meant that ‘state security’ is no longer important. What it does mean is that we have different, often competing, conceptions of security. Realist understandings of state or national security have prevailed for much of the twentieth century. The focus of Realism is on the safety of the nationstate, which results in placing national interests over collective interests and, thereby, national security over both collective security and human security, unless they coincide.9 The Realist vision of security is still strong and has survived the Cold War confrontation between two heavily armed superpowers. Several factors can be pointed to explain its survival. Firstly, states clearly still represent threats to other states, particularly those possessing nuclear weapons or other weapons of mass destruction (WMD). Secondly, what were once mainly domestic threats, such as ­terrorism, have become transnational and, more generally, globalisation has led to internal security-focused politics becoming increasingly e­xternalised.10 This means that national security issues are increasingly played out on a global scale, as evidenced by the terrorist attack on the United States of 11 September 2001 that led the US to wage a ‘war on terror’, more specifically a war against al-Qaeda, impacting around the globe (as shall be seen below when ‘drone wars’ are considered). Nonetheless, despite the continuing strength of national security, the concept of security has not only widened to include non-military threats, such as those arising from food or environmental insecurity, but has also deepened to encompass human security.11 Richard Falk defines ‘security’ in a very ‘human’ way as the ‘negation of insecurity as it is specifically experienced by individuals and groups in concrete situations’.12 The focus of international debate is increasingly on human security, which has been defined to include ‘economic, environmental, social and other forms of harm to the overall livelihood and well-being of individuals’.13 Clear ­evidence of the widening understanding of security is found in the ­pivotal post-Cold War UN Security Council summit held in January 1992. As an organ that was built on Realist foundations, requiring agreement amongst its five permanent members (China, France, Russia, UK, and USA) for any substantive decision, the UN Security Council had hitherto almost ­exclusively concerned itself with state and military security. 8  B Buzan, O Waever and J de Wilde, Security: A New Framework for Analysis (Boulder, Lynne Rienner, 1998) 5. 9  H Morgenthau, Politics among Nations (New York, A Knopf, 1972) 973. 10  P Hough, Understanding Global Security (Abingdon, Routledge, 2008) 2. 11  ibid 8. 12  R Falk, On Humane Governance: Toward a New Global Politics (Cambridge, Polity, 1995) 147. 13  FO Hampson, ‘Human Security’ in PD Williams (ed), Security Studies: An Introduction (Abingdon, Routledge, 2008) 229, 231.

Security Agendas and International Law 7 However, at its summit it declared that the ‘absence of war and military conflicts amongst States does not itself ensure international peace and security’ and that ‘non-military sources of instability in the economic, social, humanitarian and ecological fields have become threats to peace and security’.14 As noted by Don Rothwell, the ‘traditional view of security defines it in military terms with the primary focus on state protection from threats to national interests’. However, with the end of the Cold War, ‘security discourse has expanded beyond the traditional military domain with the proliferation of security agendas including economic security, environmental security, food security, bio-security, health security and human security’.15 As identified by Hitoshi Nasu, during the Cold War ‘national security from external military attacks and threats was recognised as the ultimate raison d’être of sovereign states’.16 The Security Council supplemented this with the concept of international security in the post-Cold War period, evidenced by its authorisation to coalitions of willing states, starting with Coalition action against Iraq,17 to undertake military actions to deal with threats to and breaches of international peace. Attempts to understand security as a fixed concept fail to capture the securitisation of many aspects of daily life. Rather, security should be understood, according to the Copenhagen School, as a ‘shared understanding of what is considered a threat’.18 As Ronald Dannreuther explains, this reflects the turn towards ‘constructivism’ in the theorisation of security ‘with its focus on subjective ideas and intersubjective understandings’, which ‘accords a greater weight of how ideas and perceptions influence and structure international reality’.19 The constructivist approach of the Copenhagen School shifts ‘attention away from an objectivist analysis of threat assessment to the multiple and complex ways in which security threats are internally generated and constructed’.20 Furthermore, the Copenhagen School moves the study of security away from the narrow confines of the Realist neo-scientist ‘rationally calculating the multiple security threats’, towards a more democratic construction of security

14  UNSC ‘Security Council Summit Statement Concerning the Council’s R ­ esponsibility in the Maintenance of International Peace and Security’ (31 January 1992) UN Doc S/ 23500. 15  DR Rothwell, KN Scott and AD Hemmings, ‘The Search for Antarctic Security’ in AD Hemmings, DR Rothwell and KN Scott (eds), Antarctic Security in the Twenty-First Century: Legal and Policy Perspectives (Abingdon, Routledge, 2012) 3. 16  H Nasu, ‘Law and Policy for Antarctic Security’ in Hemmings et al, ibid, 19. 17  UNSC Res 678 (29 November 1990), UN Doc S/RES/678 (1990). 18  ibid 25; Buzan, Waever and de Wilde (n 8), 23–26. 19 R Dannreuther, International Security: The Contemporary Agenda (Cambridge, Polity, 2007) 40. 20  ibid 42.

8  Nigel D White based on shared understandings found in organisations, governments, civil society and other non-state actors, including individuals.21 The Copenhagen School identifies those objects that are existentially threatened as ‘referent objects’.22 The referent object for security has ­‘traditionally been the state and, in a more hidden way, the nation’. This signifies that ‘for a state, survival is about sovereignty, and for a nation, it is about identity’. However, following the constructivist approach, ‘securitising actors can attempt to construct anything as a referent object’.23 For the Copenhagen School, the ‘referent object’ is traditionally the state, although with new security agendas developing all the time, the object can be collective concepts, such as the environment or regions, such as Antarctica, and this is reflected in the UN Security Council’s expansion of the concept of threat.24 These ideas are very helpful in understanding the fact that security has expanded, although it remains largely state-centric, and that it is best viewed through a constructivist lens as being founded on inter-subjective understandings within legitimate fora, such as the UN Security Council, UN General Assembly, and regional organisations, such as the Organisation of American States (OAS), ­African Union (AU), EU, Arab League and Association of S ­ outheast Asian Nations (ASEAN). III.  SECURITY COMMUNITIES AND THE ACHIEVEMENT OF AGREEMENTS

In 1957, Karl Deutsch, having considered various historical arrangements of states that had succeeded in removing conflict within their membership, defined a ‘security community’ as ‘one in which there is a real assurance that the members of that community will not fight each other physically, but will settle their disputes in some other way’. He went on to say that ‘if the entire world were integrated as a security-community, wars would be automatically eliminated’. By integration, he did not mean amalgamation into one state, rather the attainment of a ‘sense of community and of institutions and practices strong enough and widespread enough to assure, for a long time, dependable expectations of peaceful change’.25 ‘Whenever states become integrated to the point that they have a sense of community’ there is ‘assurance that they will settle their differences short of war’.26

21 ibid. 22 

Buzan, Waever and de Wilde (n 8) 36.

23 ibid. 24 

Nasu (n 16) 25–26. K Deutsch, Political Community and the North Atlantic Area: International Organization in the Light of Historical Experience (New York, Greenwood, 1957) 5–6. 26  E Adler and M Barnett, ‘Security Communities in Theoretical Perspective’ in E Adler and M Barnett (eds), Security Communities (Cambridge, Cambridge University Press, 1998) 4. 25 

Security Agendas and International Law 9 Community building is a product of ‘shared understandings, transnational values and transaction flows’ and, once established, a ­security c­ ommunity generates stable expectations of peaceful change.27 Although the UN collective security organisation has not approached Karl Deutsch’s concept of a security community, evidenced by the continuation of regular and frequent conflicts in the post-1945 world order, it has helped humankind to achieve the basic condition of any security community—survival.28 There is evidence that the UN emerged from the Second World War as a form of ‘security community’ in order to consolidate the hard won peace by continuing the alliance that had defeated Germany and Japan. Ian Brownlie considered that the prosecution of the Second World War by the Allies against the Axis powers went beyond ­collective defence and became a war of sanction, the purpose of which was to remove a ­danger to world peace by extirpating the source of aggression. He stated that such a war of sanction in the UN period no longer has any place unless it is an ‘organized community action’. Indeed, Brownlie views the prosecution of the Second World War as linking into the creation of the UN, even though the organisation was not formally created until the War’s end, as the ‘majority of states entered the war against the Axis Powers on the basis of the United Nations Declaration of 1942 and the Moscow ­Declaration of 1943’.29 Following this line of argument, a security community was constituted in 1945 when the UN was established, but its origins can be traced back to 1942 when the Allied powers proclaimed themselves the ‘United Nations’ not only to defend themselves from Axis aggressors, but to defeat them completely and then shape a global peace.30 The UN certainly was a much changed collective security organisation when compared to the League of Nations, with the founding states of the UN collectively giving the smaller ‘executive’ or ‘governing body’, the Security Council of 15 states (increased from 11 in 1965), ‘primary responsibility’ in the realm of restoring or maintaining international peace and security.31 The Security Council’s powers are specified under ­Chapters VI and VII of the UN Charter, with the former containing a range of ­recommendatory powers in relation to the peaceful settlement of disputes or situations that might endanger the peace, including fact-­finding and recommending methods of adjustment or terms of settlement.32

27 

ibid 4–6. Deutsch (n 25) 3. 29  I Brownlie, Principles of Public International Law, 7th edn (Oxford, Oxford University Press, 2008) 332–33. 30 But see JW Wheeler-Bennett and A Nicholls, The Semblance of Peace: The Political ­Settlement after the Second World War (London, Macmillan, 1972) 528–53. 31  Article 24(1) UN Charter. 32  Articles 34, 36, 37, 38 ibid. 28 

10  Nigel D White The  powers contained in Chapter VII to demand provisional measures, such as cease-fires, to take a range of non-forcible measures, including economic sanctions, and to take military action,33 are contingent upon the Council making a determination of a ‘threat to the peace’, ‘breach of the peace’ or ‘act of aggression’.34 The Security Council has adopted an expansive interpretation of ‘threat to the peace’ to include not only threats of force and threats to inter-state security, but also to cover internal violence and conflicts that have the potential to spill over into neighbouring states, as well as threats from terrorists and pirates.35 The concentration of power in the hands of the Security Council has led to a continuing debate as to where competence lies, if at all, if the Council is unable to act due to collective inaction or, as was the case during the Cold War, due to the pernicious use of the veto. While the voting rules of the Security Council were an improvement on the requirements of unanimity in the League of Nations’ Covenant,36 they still require consensus within the P5.37 The veto was so prevalent during the Cold War, cast primarily by the Soviet Union (who used its veto 77 times in the first 10 years of the UN) and later by the US, that the UN was often reduced to a bystander (as during the war in Vietnam 1959–75) or, at best, to a forum for diplomacy between the superpowers (for example during the Cuban Missile Crisis of 1962). The veto is evidence that the Security Council was not fashioned as an automatic ‘instrument of action’ rather, as Inis Claude pointed out, its basic function is as a forum for negotiation and diplomacy.38 It follows that it is fallacious to argue that the UN had failed simply because it was unable to take action against the US and Soviet Union during the Cuban Missile Crisis. The UN still served as a forum for negotiation between the two superpowers, enabling both to climb down from their position of near nuclear confrontation. If the Council fails to fulfil even its basic function as a forum for diplomacy, then it can be argued that it has not carried out its primary role for the maintenance of international peace and security, as placed upon it by the UN Charter,39 and authority must therefore pass

33 

Articles 40, 41, 42 ibid. Article 39 ibid. 35 For example UNSC Res 1373 (28 September 2001) UN Doc S/RES/1373 (2001) re ­terrorism; and UNSC Res 1846 (2 December 2008) UN Doc S/RES/1846 (2008) re piracy. See generally C Henderson, ‘The Centrality of the United Nations Security Council in the Legal Regime Governing the Use of Force’ in ND White and C Henderson (eds), Research Handbook on International Conflict and Security Law (Cheltenham, Edward Elgar, 2013) 120. 36  Article 5 Covenant of the League of Nations 1919. 37  Article 27(3) UN Charter requires decisions to be ‘made by an affirmative vote of nine [originally seven] members including the concurring votes of the permanent members’. 38  I Claude, ‘The Security Council’ in E Luard (ed), The Evolution of International ­Organization (London, Thames and Hudson, 1966) 83–88. 39  Article 24(1) UN Charter. 34 

Security Agendas and International Law 11 to another security community, either to the UN General Assembly or, ­arguably, to established and competent regional security organisations. Having outlined security agendas and communities, this chapter now considers how the advent of new technologies has affected security and how the UN has responded to these developments by helping to shape a normative framework for regulating new technologies and for dealing with any emerging threats. At this stage, it should be reiterated that the response to new technologies should be a combination of normative development (by the General Assembly and other norm-making bodies within the UN) and executive action dealing with immediate existential threats. Although that executive action is not confined to responding to breaches of international law, the legitimacy of such action is enhanced if it does indeed amount to an enforcement of existing law. IV.  THE UN AS A SECURITY COMMUNITY ON NEW TECHNOLOGIES

Bearing in mind that a security community is not simply concerned with creating a normative framework within which to tackle disputes and threats, nonetheless it is surprising that, in general terms at least, the UN has struggled to produce a normative framework for new technologies. In other areas of international relations, UN soft law, in the form of declarations, has eventually led to UN hard law, in the form of binding treaties. This has happened in human rights law, environmental law and, to a more diffuse extent, arms control law, but we see little of this development as regards new technologies, for example on the issue of cyber security. It is not that the UN is unaware of the issue—in 1999, for instance, the General Assembly adopted a resolution calling upon states to ‘promote at multilateral levels the consideration of existing and potential threats in the field of information security’ and went on to invite states to inform the Secretary General on the advisability of ‘developing international principles that would enhance the security of global information and telecommunications systems to help to combat information terrorism and criminality’.40 The cagey language of this resolution reflects a profound disagreement between the membership of the UN, specifically within the P5 of the ­Security Council. As related by Mary Ellen O’Connell, Russia has promoted a treaty along the lines of the Chemical Weapons Convention to regulate cyberspace, which it viewed as a similar dual use issue— ‘Russia’s proposed treaty would ban a country from secretly embedding

40  UNGA ‘Developments in the field of information and telecommunications in the context of international security’ Res 53/70 (4 December 1998), UN Doc A/RES/53/70.

12  Nigel D White malicious codes or circuitry that could be later activated from afar in the event of war’. The US, however, differed in its approach following the ­success of the Stuxnet worm cyber-attack on Iran.41 It is difficult to construct a treaty or other legal regulatory mechanism that governs something as complex and multidimensional as the use of cyberspace. Achieving consensus on something that can be seen both as an important modern form of freedom of information and as a threat to security is one of the greatest challenges facing the UN. The item on ‘developments in the field of information and telecommunication in the context of international security’, first placed on the agenda of the General Assembly in 1999, has remained there as an annual item, though little progress has been made. In 2010, the General Assembly identified that there were a number of existing and potential threats in the field of information security. The Assembly urged states to develop ‘strategies’ to address ‘threats emerging in the field, consistent with the need to preserve the free flow of information’. Intriguingly, the Assembly also considered that the ‘purpose of such strategies could be served through further examination of relevant international concepts aimed at strengthening the security of global information and telecommunications systems’. The Assembly went on to invite states to look at the recommendations contained in the Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International ­Security, in particular both the aforementioned ‘concepts’ as well as ‘measures’ that might be taken to strengthen information security.42 Unfortunately, the Report did not develop the ‘concepts’ that might constitute a normative framework to shape the use of cyberspace. States’ responses to the Assembly’s request contain some discussion of relevant ‘concepts’. The Australian ­Government stated that ‘existing international law ­provides a framework for protection from information security threats arising from a variety of actors’, mentioning a range of existing international legal ­principles applicable to the use of cyberspace (sovereign equality, the prohibition on the use of force and international humanitarian law), but admitted that greater discussion among states was necessary to refine the scope of applicability of these principles to threats emanating from the cyber realm.43 The United States stated that principles of the jus ad ­bellum and jus in bello were applicable, while the UK used the more modern terminology of the law governing the use of force and armed conflict.44

41  ME O’Connell, ‘Cyber Security without War’ (2012) 17 Journal of Conflict and Security Law 187, 205–06. 42  UNGA Res 65/41 (8 December 2010) UN Doc A/RES/65/41. 43 UN Disarmament Study Series 33, ‘Developments in the Field of Information and ­Telecommunication in the Context of International Security’ (UN, 2011) 22–23. 44  ibid 35–36, 56.

Security Agendas and International Law 13 A further Governmental Expert Group Reports has followed,45 but with a similar lack of content that does not address the suggested limitations in state responses to laws governing the use of force and armed conflict. Such an approach narrowly confines security threats to cyber-warfare in a literal sense, when many non-kinetic cyber-operations and cyber-crimes do not reach that level and yet may still constitute security threats. One problem is to convert new understandings of threats to security into legal concepts, principles and rules that together will shape a legal regime, the purpose of which is to enable organisations and states, and other security actors, to address such threats. One of the barriers to this is the way international law is divided into subject areas. New technologies raise concerns as a cross-cutting issue of security in a number of areas. General principles and specific norms from various specialist areas of international law may be applicable: arms control law, human rights law, international humanitarian law and international environmental law, to name the most obvious. However, when new technologies are used to destabilise states, such as cyber-attacks on another state’s internet ­capabilities, as happened in Estonia in 2007, specialist legal regimes give way to discussions revolving around general principles of international law, such as non-intervention,46 which can have limited traction in international affairs. Furthermore, the problems of identifying the origins of such attacks, moreover, of attributing such attacks in terms of state responsibility, add to the problems of regulation. The strict rules on attribution of acts of private individuals to states, as embodied in the Articles on the Responsibility of States for Internationally Wrongful Acts of 2001,47 as well as in the jurisprudence of the International Court of Justice,48 do not assist in inducing states to stop the acts of private individuals that interfere in the security of other states. However, more recognition should be given to the underdeveloped general principle of due diligence found in ­international law, initially raised by the International Court of Justice in

45 UNGA Res 68/243 (27 December 2013) UN Doc A/RES/68/243; UN Doc A/68/98 (2013) paras 16–25. See further UN Doc A/66/359 circulated at the request of the Permanent Representatives of China, the Russian Federation, Tajikistan and Uzbekistan, containing a draft international code of conduct for information security, which was subsequently ­co-sponsored by Kazakhstan and Kyrgyzstan. 46  R Buchan, ‘Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?’(2012) 17 Journal of Conflict and Security Law 212. 47  Article 8 of which states that ‘the conduct of a person or group of persons shall be considered as an act of State under international law if the person or group of persons is in fact acting on the instructions of, or under the direction or control of, that State in carrying out that conduct’. 48  Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v United States of America) (Merits) [1986] ICJ Rep 14, 62–64; Application of the Convention on the Prevention and Punishment of the Crime of Genocide (Bosnia and Herzegovina v Serbia and Montenegro) (Merits) [2007] ICJ Rep 43, para 406.

14  Nigel D White the Corfu Channel case in 1949 when it pointed to ‘every State’s ­obligation not to allow knowingly its territory to be used for acts contrary to the rights of other States’.49 At least this establishes that states have some ­positive obligations to prevent cyber-attacks being launched from their territories against other states, even though the territorial state might not be behind the attack. Furthermore, within the UN there are a number of ‘security communities’: the ‘hard’ security community of the Security Council, with its ­mixture of executive and legislative competences; the ‘softer’ human rights focused competence of the General Assembly; and the specialist organs and regimes on matters such as disarmament, telecommunications, space, air and human rights. Often then, as regards new technologies, there is a lack of a clear UN ‘security community’ within which inter-subjective agreement can be forged. More broadly, the role of science and technology in the context of international security and disarmament was added to the General ­ ­Assembly’s disarmament agenda in 1988. In introducing a draft resolution in the First Committee, the Indian delegate, in a remarkably p ­ rescient speech, recounted that increasing resources were being devoted to developing new weapons systems, such as the graduated use of nuclear ­explosive power, miniaturisation and large-scale computing capabilities, and fuel and laser technology, all of which were transforming the security environment. He stated that because of these technological developments, work should be initiated to develop a shared perception of the problems involved and to make concerted efforts to resolve them.50 Thus, the UN had the opportunity at the outset of the upcoming ­Revolution in Military Affairs (RMA),51 unleashed towards the end of the Cold War, to put in place some soft law. It must not be forgotten that the UN had responded to earlier technological revolutions by creating ­enduring legal regimes for airspace (following the huge growth of ­civilian aviation at the end of the Second World War)52 and outer space in the 1950s and 1960s (in response to the launch of the first Sputnik satellite by the USSR and the imminent large scale utilisation of outer space).53

49 

Corfu Channel Case (UK v Albania) (Merits) [1949] ICJ Rep 4, 22. Office for Disarmament Affairs, ‘The Role of Science and Technology in the Context of International Security and Disarmament’ www.un.org/disarmament/topics/ scienceandtechnology/. 51  See generally CS Gray, Strategy for Chaos: Revolution in Military Affairs and the Evidence of History (Abingdon, Routledge, 2004). 52 See Chicago Convention on International Civil Aviation 1944, laying down the ­principles of air law and constituting an effective regulatory organisation—the International Civil Aviation Organisation (ICAO). 53  See UNGA Res 1962, ‘Declaration of Legal Principles Governing the Activities of States in the Exploration and Use of Outer Space’ (13 December 1963) UN Doc A/RES/1962 (XVIII); Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, including the Moon and Other Celestial Bodies (1967). 50  UN

Security Agendas and International Law 15 Unfortunately, the UN General Assembly did not seize the opportunity. The 1988 Assembly resolution requested that the Secretary ­General follow future scientific and technological developments, especially those which had potential military applications, to evaluate their impact on international security and to submit a report on this to the Assembly in 1990.54 The Report of the Secretary General of 1990 was a ­product of meetings, reports and a conference involving scientific and other experts. It consisted of a general overview of technological advances and their implications for international security. Mention was made of ‘mini-nukes’, laser and particle beams, space technology, materials technology, information technology and biotechnology, but all of these were seen as ‘evolutionary and largely incremental’ rather than revolutionary.55 In other words, these technological developments were viewed as developments of existing technologies and, therefore, the implication was that there was adequate existing regulation. Reference was made in the Report to existing arms control treaties, but little analysis of their inadequacies or gaps between them was made, which is suggestive of a lack of legal expertise in the ­compilation of the Report. Bearing in mind that the Report came at the end of the Cold War, the opportunity to start shaping new law was lost. Some statements in the Report show that new technologies or new developments in existing technologies would prove to be problematic, especially in the area of information technology, which was seen as ‘extraordinarily pervasive technology’ that could be harnessed by the military sector. ‘Advanced computers’, ‘artificial intelligence’ and ‘robotics’ were all envisaged in the Report, but their potential negative impacts were not considered, although the positive ones in terms of disarmament verification were.56 The ­Assembly simply took note of the Report and vowed to give the matter on-going attention.57 The matter remains on the UN agenda, but normative development has not occurred. In 2007, the Assembly adopted a resolution that expressed concern about the development of unilateral export control regimes emplaced to prevent the export of dual use goods and technologies, which tend to impede the economic and social development of developing ­countries, urging the development of multilateral ‘non-discriminatory guidelines for international transfers of dual-use goods and technologies and high technologies with military applications’. There was no c­ onsensus on this resolution.58

54  UNGA Res 43/77A (7 December 1988) UN Doc A/RES/43/77A, 129 in favour, 7 against with 14 abstentions. 55  UN Doc A/45/568 (1990), para 83. 56  ibid para 65. 57  UNGA Res 45/61 (4 December 1990) UN Doc A/RES/45/61, adopted without a vote. 58  UNGA Res 61/55 (6 December 2006) UN Doc A/RES/61/55, 108–54 with 16 abstentions.

16  Nigel D White There is no doubt that outside the highly charged atmosphere of the UN’s political organs, the UN does significant work on identifying and analysing new technologies. For example, the UN Institute for Disarmament Research (UNIDIR) has looked at existing legal frameworks for cyber war. A report by Nils Meltzer on ‘Cyberwarfare and International Law’ in 2011 is a good example, although the legal focus is again restricted to the jus ad bellum and the jus in bello. Clearly, these are important areas of law which, as Meltzer concludes, mean that ‘the phenomenon of cyberwarfare does not exist in a legal vacuum, but is subject to well established rules and principles’. He goes on to say: That being said, transposing these pre-existing rules and principles to the new domain of cyberspace encounters certain difficulties and raises a number of important questions. Some of these questions can be resolved through classic treaty interpretation in conjunction with a good measure of common sense, whereas others require a unanimous policy decision by the international ­legislator, the international community of states.59

Meltzer perhaps understates the problem here—while the rules regulating the use of force and conduct of warfare may be applicable to cyber operations, they fail to capture their essence and, therefore, a great deal of cyber threats are not caught by those frameworks since they neither constitute the use of armed force nor are used in wartime. Thus, while the cyber operations that occurred during the Russian intervention in ­Georgia in 2008 were probably covered by the jus in bello and jus ad bellum, those ­conducted against Estonia in 2007 were not. The cyber operations of the type used against Estonia are more likely to be the norm than those ­conducted as an aspect of a military operation. Although the jus ad bellum and jus in bello are important areas of law that act as possible constraints on what can be called cyber-warfare, the regulation of cyberspace at levels falling short of war, use of force, or armed conflict remains to be achieved. At this level, one might expect the legal framework to be centred on human rights law as the use of cyberspace not only raises security concerns, but also concerns about freedoms of thought, opinion and expression, and the rights to association and privacy. The way human rights law is structured, however, leads to problems of extraterritorial application of protection when a state interferes with the rights of citizens in another state. The UN Human Rights Council adopted a resolution on ‘the promotion, protection and enjoyment of human rights on the internet’ in 2012, which affirmed that the ‘same rights that ­people have offline must also be protected online, in particular freedom of e­ xpression, which is applicable regardless of frontiers and through any

59 

N Meltzer on ‘Cyberwarfare and International Law’ (UNIDIR, 2011) 36.

Security Agendas and International Law 17 media of one’s choice’ in accordance with common Article 19 of the Universal Declaration of Human Rights 1948 and International Covenant on Civil and Political Rights 1966.60 The UN General Assembly has also concerned itself with the use of the internet, but mainly from the perspective of inequality between developed and developing states in terms of access to and usage of the ­internet—what it terms a ‘digital divide’.61 Other UN agencies (for example the International Telecommunication Union (ITU), UN Educational, Scientific and Cultural Organisation (UNESCO)) have the internet on their agenda, but from a more specialised or technical angle.62 Little of this helps us to tackle the fact that freedom of expression, although guaranteed by human rights norms, can, by the very terms of human rights treaties, be subject to restrictions that are provided by law and necessary for the protection of ‘national security’. In its 1988 General Comment on Article 17 of the International Covenant on Civil and Political Rights (right to privacy), the Human Rights Committee stated that to be lawful interference with the right, the relevant national legislation must ‘specify in detail the precise circumstances in which such interferences may be permitted’. Furthermore, a ‘decision to make use of such authorised interference must be made only by the authority designated under the law, and on a case-by-case basis’.63 This indicates that the sort of blanket covert surveillance of email and SMS messages undertaken in recent times by the US and UK is not in conformity with Article 17. Such jurisprudence has not stopped the massive trawling of internet traffic by the US (the National Security Agency’s Prism Operation) or UK (Government Communications Headquarters’ (GCHQ) Tempora Operation), nor, even more worryingly, does it appear robust enough to state clearly that such interference is unlawful. Both states have defended their actions as being lawful on the basis that they are necessary and proportionate counter-terrorism measures. This can be seen as an argument for ‘security’ prevailing over ‘human rights’ or, more accurately, that human rights are qualified and not absolute and allow for ‘security’ to be taken

60  A/HRC/RES/20/8, 5 July 2012, adopted without a vote. See also A/HRC/RES/12/16, 2 Oct 2009, adopted without a vote. 61  UNGA Res 66/184 (22 December 2011) UN Doc A/ UN Doc A/66/184, adopted without a vote. But see broader Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion or expression on the Internet UN Doc A/66/290 (2011); also UNGA Res 68/167 (18 December 2013) UN Doc A/RES/68/167, on the right to privacy in a digital age. 62  See broader Report of the Special Rapporteur on the promotion and protection of the right to freedom of opinion or expression on the Internet, ibid. 63  Human Rights Committee GC 16, 8 April 1988, para 8. Interference, to be justified, also has to be ‘proportionate’ and ‘necessary’, Antonius Cornelis Van Hulst v Netherlands (HRC, 2004) para 7.8 and 7.10.

18  Nigel D White into consideration, but such arguments have to be tested and should not be accepted at face value. V.  DRONES, INTERNATIONAL LAW AND THE UN

With the odd exception, such as the regulation of outer space, international law tends to develop as a reaction to change. In this way it might be anticipated that new non-kinetic technologies that can be used to disable computer networks, or to carry mass covert surveillance of e-mail traffic, may take decades to bring within a clear legal framework, depending on how quickly states come to realise that it is in their mutual self-interest to effectively regulate cyber-space. It may, in any case, prove to be an ­impossible task as it raises the question of whether states can actually ­regulate something that has escaped the confines of sovereignty—it may simply be too late to put the genie back into the bottle. In this scenario, states will fall back on general principles of international law, such as the norm prohibiting intervention in a state’s political or economic affairs, which will not prevent cyber operations but will enable selective condemnation in the General Assembly and, occasionally, executive responses to particular threats by the Security Council. However, when it comes to new technologies that seem to provide straightforward improvement in military efficacy, such as Unmanned Aerial Vehicles (UAVs), commonly known as drones, it should be expected that existing international law will be adequate. Indeed, this is quite commonly the argument made in the literature, given that drones are seen as mere ‘platforms’ for the launch of weapons such as missiles and not new weapons per se.64 Furthermore, drones are portrayed by their users and supporters as upholding the value of security rather than undermining it.65 Nonetheless, the increasing use of drones does raise security concerns for a number of reasons. When they are used for surveillance they are potential threats to personal security and privacy. When used for ­targeting purposes they not only raise security concerns for civilians potentially caught in the blast (the problem of collateral losses), but they also seem to either extend the battlefield, thereby bringing the instability inherent in war, or constitute the extraterritorial application of force for the p ­ urposes of some extreme form of law enforcement. Under this model of law enforcement,

64  D Turns, ‘Droning On: Some International Humanitarian Law Aspects of the Use of Unmanned Aerial Vehicles in Contemporary Armed Conflicts’ in C Harvey, J Summers and ND White (eds), Contemporary Challenges to the Laws of War (Cambridge, Cambridge ­University Press, 2014) 199. 65  For critical evaluation see C Gray, ‘Targeted Killings: Recent US Attempts Obama to Create a Legal Framework’ (2013) Current Legal Problems 1.

Security Agendas and International Law 19 capture, arrest and trial are replaced by summary execution. All of these conceptions of drone use challenge the notion that they represent a new era of clean, clinical and legitimate use of force. Drones are being increasingly used for surveillance, normally as part of domestic law enforcement operations. As with the exponential growth of surveillance cameras generally, the usage of drones is accepted as a benign and acceptable form of security. As is oft-stated by politicians and lawabiding citizens, ‘if you’re not doing anything wrong, there is no reason to object’ to such surveillance.66 Indeed, it is possible to see such measures as upholding basic rights. Both the International Covenant on Civil and Political Rights 1966 and the European Convention on Human Rights 1950 guarantee the ‘right to liberty and security of person’.67 Surveillance in order to stop crime, especially violent crime, can be argued to be an aspect of a government’s positive duties to prevent human rights violation and provide security. Indeed, there is plenty of jurisprudence that allows the state a wide margin of appreciation for secret surveillance, as a measure ‘necessary in a democratic society in the interests of national security’,68 provided that there are measures in place to prevent abuse.69 Nonetheless, this conception of security can lead to a very intrusive state where the p ­ rioritisation of security in all aspects of life erodes other rights and freedoms expected in a democratic society, for example, the right to privacy.70 The European Court of Human Rights has provided a general definition of privacy, which should raise concerns about the growing use of state s­ urveillance, including by drones. According to the Court, privacy includes a ‘zone of interaction of a person with others, even in a public context, which may fall within the scope of “private life”’. In addition, the Court opined that a ‘person’s reasonable expectations as to the ­privacy may be a significant, though not necessarily conclusive factor’ to be ­considered when determining whether a person’s private life is affected by measures taken outside a person’s home or private premises.71

66  William Hague, UK Foreign Secretary, stated in 2013 that ‘If you are a law-abiding citizen of this country going about your business and your personal life you have nothing to fear—nothing to fear about the British state or intelligence agencies listening to the contents of your phone calls or anything like that’, ‘Prism: Claims of GCHQ Circumventing Law are “Fanciful Nonsense”, says Hague’, The Guardian, 9 June 2013. 67  Article 5 Convention for the Protection of Human Rights and Fundamental Freedoms (European Convention on Human Rights, as amended) (ECHR); Article 9(1) International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR). 68  Klaas and others v Germany (ECtHR 6 September 1978) para 451. 69 L Doswald-Beck, Human Rights in Times of Conflict and Terrorism (Oxford, Oxford ­University Press, 2011) 451. 70  Article 8(1) ECHR; Article 17(1) ICCPR. 71  Gillan and Quinton v United Kingdom Judgment, 12 January 2010, para 61.

20  Nigel D White Despite this tentative protection of public spaces from state intrusion, it must be borne in mind that a margin of appreciation is found within the definitions of the rights themselves. For instance, in protecting the right to a ‘private life’, the European Convention goes on to declare that ‘no interference with the exercise of this right’ by the government is p ­ ermitted except in accordance with the law and is necessary in a democratic society in the ­interests of national security, public safety or economic well-being of the c­ ountry, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of rights and freedoms of others.72

Perceptions and assertions of security by governments are difficult for the courts to resist, particularly in times of terrorism that are characterised by random attacks against civilians, even when government actions to protect the lives and security of its citizens may appear to tread on the very freedoms it is fighting to protect. Due diligence obligations upon governments are obligations of conduct, rather than result, and so a ­ ­failure by government to prevent specific acts of terrorism is not necessarily an indication that the state has failed to fulfil its duties under human rights law. The random nature of many terrorist actions means that it is very difficult to prevent each and every one. When considering how these obligations have been interpreted by the Human Rights Committee in the context of the rights to life and security under the International Covenant on Civil and Political Rights,73 it is clear that states must take reasonable and appropriate measures to protect individuals within their jurisdiction who are subject to known threats to their lives.74 The European Court of Human Rights has similar jurisprudence, stating in one judgment that a government that ‘knew or ought to have known … of a real and immediate risk to the life of an identified individual or individuals from the criminal acts of a third party’, must take ‘measures within the scope of their powers, which, judged reasonably, might’ be ‘expected to avoid that risk’.75 As has been stated in reviewing this jurisprudence: Applying this jurisprudence by analogy to terrorist attacks creates some ­challenges: the bombing of civilians on aircraft or commuter trains and the hijacking of aircraft suggests a random choice of victims, rather than the ­selection of an ‘identified individual or individuals’ as victims.76

72 

Article 8(2) ECHR. Articles 6 and 9 ICCPR. 74  Delgado Paez v Columbia, Human Rights Committee Communication No 195/1985, 12 July 1990, para 5.5. 75  Osman v United Kingdom (1998) 29 EHRR 245. 76  ES Bates, Terrorism and International Law: Accountability, Remedies and Reform (Oxford, Oxford University Press, 2011) 83–84. 73 

Security Agendas and International Law 21 When drones are used outside of a state’s jurisdiction, whether for ­surveillance or for targeting purposes, and when lethal force is used against individuals, the human rights issues become more complex. While human rights obligations apply to individuals within a state’s territory, there is considerable debate about when they apply to individuals outside its territory but, arguably, within its jurisdiction. When considering the use of armed force from a drone against a terrorist suspect, the question is whether the individual is within the jurisdiction of the state using force. Although there is some Inter-American case-law that supports the application of the right to life in these circumstances,77 there is contrary European jurisprudence.78 Rather than considering whether the state using force has enough control over the targeted individual for the purposes of evaluating whether there is an assertion of jurisdiction in these circumstances, it would be better for the Courts to focus on the fact that the operator of the drone, often a distance away from the target, is clearly under the control of the state using force.79 If jurisdiction is established, such uses of targeted force from drones, when taken outside of armed conflict, are violations of the right to life as there is usually no imminent threat to the state to justify its use of force as a last resort.80 Indeed, the use of lethal force from drones seems to be an extreme and, paradoxical as it may sound, unlawful version of law enforcement where it is easier to kill suspects than to capture them ­(particularly as capturing suspects would put them clearly within the ­capturing state’s jurisdiction).81 Furthermore, the use of drones for targeting suspected terrorists appears to be an attempt to externalise a state’s security measures to ­counter ­terrorism by taking out targets in another state’s territory before they have chance to hit the drone state’s territory or nationals. The US has tried to justify this by arguing what is the ultimate justification for using lethal force—that there is a global armed conflict against terrorists or, at the very least, a transnational armed conflict against Al Qaeda and its associates. This argument is an attempt to justify a lower standard for when lethal force can be used as, in simple terms, a use of lethal force is

77  Armando Alejandre Jr, Carlos Costa, Mario de la Pena and Pablo Morales v Cuba (Brothers to the Rescue), Case 11.589, Report No 86/99, 28 September 1999, para 25. 78  Bankovic and others v 17 NATO States, Admissibility Decision (Grand Chamber), 12 December 2001, paras 52–53. 79  F Hampson, ‘The Scope of the Extra-Territorial Applicability of International Human Rights Law’ in G Gilbert, F Hampson and C Sandoval (eds), The Delivery of Human Rights: Essays in Honour of Sir Nigel Rodley (Abingdon, Routledge, 2011) 181–82. 80  P Alston, ‘Study on Targeted Killings’, Report to the Human Rights Council, UN Doc A/HRC/14.24/Add.6 (2010) paras 85–86. 81  Ocalan v Turkey App No 46221/99 (ECtHR, 12 March 2003) para 125.

22  Nigel D White allowed in an armed conflict if the target is either a military objective, a combatant, or a civilian who is directly participating in hostilities, and the anticipated collateral damage (‘incidental loss of civilian life’) is not ­excessive in relation to the expected military advantage.82 The US has interpreted these rules liberally: to carry out ‘signature’ strikes on the basis that the targeted individual is performing suspicious activities; to target funerals where there is a concentration of Taliban leaders; to target drug lords (who are criminals not combatants); and sometimes to order strikes outside of a conflict-zone, for example, in Yemen in 2002 and again in 2011.83 It seems that after the devastating attacks on the US of 11 September 2001, governments (and not just the US) have re-assessed their security priorities, have reasserted national security (often on the basis that this is the best way to protect human security) and have acted in violation of basic norms governing when coercion can be used by the state against individuals to protect. This has either been as a result of the extension of the battlefield or the extension of law enforcement. While the majority of states may support this, or, more accurately, remain supine in the face of these erosions, the securitisation of post-9/11 life has meant that (the right to) security has been elevated to a ­pre-­eminent position in political rhetoric and action in contradistinction to its position as one of a number of human rights and protections ­provided by international law.84 Thus, while there are international norms applicable to drone use, a great deal of it is underdeveloped, indeterminate or ineffectual. The UN itself has not tackled drone usage in any meaningful way. Although this is ­probably to be expected in the executive body, it is disappointing to see that the plenary body has also failed to fulfil its functions as a ­security community with the ability to shape normative frameworks, confining itself instead to exhortation in general resolutions to the effect that ­counter-terrorism efforts by states should be undertaken in conformity with international human rights law, refugee law and international humanitarian law.85

82 

Article 55, Additional Protocol I 1977; Turns (n 64) 207. Casey-Maslen, ‘The Use of Armed Drones in S Casey-Maslen (ed), Weapons under International Human Rights Law (Cambridge, Cambridge University Press, 2014) 400–03. 84  See generally L Lazarus, ‘The Right to Security—Securing Rights or Securitising Rights?’ in R Dickinson, E Katselli, C Murray and OW Pederson (eds), Examining Critical Perspectives on Human Rights (Cambridge, Cambridge University Press, 2012) 87. 85  Eg UNGA Res 68/178 (18 December 2013) UN Doc A/RES/68/178. 83 S

Security Agendas and International Law 23 VI. CONCLUSION

The UN system has confronted the issue of new technologies since the late 1980s, but has made limited progress on either consolidating applicable law or developing new laws and mechanisms. The fact that new technologies bring in aspects of many areas of policy and law—arms control, human rights, conflict, peace and security—means that specific frameworks need to be shaped by the UN Security Council, General Assembly, Secretary-General and other UN bodies. The uncertainty as to how to accommodate different security agendas within the framework of international law produces its own insecurity, so that we are caught in what appears to be a spiralling security dilemma in which one state’s uncensored increase in security measures leads another state to increase theirs to a point where they feel more secure, which, in turn, leads the first state to further increase their security preparation. Clarification of the applicable law and law-making can, of course, take place outside the UN, but as such it will be uneven, piecemeal and will lack the universality and legitimacy that the UN brings. The ever-growing use of cyber measures and drones are just two examples of how technology is outstripping law. We might not be able to determine the truth as to the legal meaning of ‘security’ in a logical Holmesian manner, but we should be able to achieve agreement on what it means in the case of new technologies.

24

2 Human Security and International Law: The Potential Scope for Legal Development within the Analytical Framework of Security HITOSHI NASU*

I. INTRODUCTION

H

UMAN SECURITY IS a human or people-centred and multi-sectoral approach to security. It means the protection of people from critical and pervasive threats and situations, and the empowerment of people to develop their potential, through ­concerted efforts to develop norms, processes and institutions that systematically address insecurities.1 Even though the idea of human security, at its core, arguably precedes the formation of the Westphalian system,2 it was the UN Development Programme (UNDP) that captured it in policy ­discourse in its 1994 Human Development Report.3 Since then, human

*  This research was partly supported under the Australian Research Council’s Discovery Project funding scheme (Project Number: DP130103683). I thank Shiang Ye for her research assistance at the final stage of the preparation of this manuscript. 1  Commission on Human Security, ‘Human Security Now’ (2003) www.­­humansecuritychs.org/finalreport/index.html. See generally, D Chandler and N Hynek (eds), Critical Perspectives on Human Security: Rethinking Emancipation and Power in International Relations (London/New York, Routledge, 2011); M Goucha and J Crowley (eds), Rethinking Human Security (Chichester, Wiley-Blackwell & UNESCO, 2008); S Tadjbakhsh and AM Chenoy, Human Security: Concepts and Implications (London/New York, Routledge, 2007); Mary Kaldor, Human Security: Reflections on Globalization and Intervention (Cambridge, Polity, 2007); G Frerks and BK Goldewijk (eds), Human Security and International Security (Wageningen, Wageningen Academic Publishers, 2007); SN MacFarlane and YF Khong, Human Security and the UN: A Critical History (Bloomington, Indiana University Press, 2006); M Tehranian (ed), Worlds Apart: Human Security and Global Governance (London, IB Tauris, 1999). 2  E Rothschild, ‘What is Security?’ (1995) 124(3) Daedalus 53, 60–65. 3 UN Development Programme (UNDP), Human Development Report 1994 (United Nations, 1994) 22.

26  Hitoshi Nasu security has been incorporated into key UN policy documents, such as the 2000 UN Millennium Declaration,4 the 2004 Report of the UN SecretaryGeneral’s High-Level Panel,5 the 2005 In Larger Freedom Report,6 and the UN ­Secretary-General’s Report on Human Security in 2010 and 2012.7 World leaders affirmed, in the 2005 World Summit Outcome, the notion of human security as encompassing ‘the right of people to live in freedom and dignity, free from poverty and despair’8 and since then, have continued to debate the notion of human security in the UN General Assembly.9 Consequently, the policy debate concerning security has moved beyond traditional state-centric security paradigms.10 There is no doubt that the notion of human security has paved the way for a shift in focus away from the domain of national security and towards a broader spectrum, which assists in defining new security concerns or redefining the terms of the debate surrounding traditional security threats.11 Within the field of international law the idea has facilitated, for example, the adoption of new treaties concerning the protection of civilians during, and in the aftermath of, armed violence and has also informed debates as to how certain rules of international law should be interpreted or applied. Yet, the actual impacts of human security for the development of international law have so far been limited to a few specific areas, such as arms control, forced displacement and humanitarian intervention. This chapter considers legal or structural obstacles to harnessing the notion of human security more widely across all areas of international law. It does not intend to provide a comprehensive analysis of how the idea of human security has influenced the development of international law, as earlier studies have already examined this question in many

4 

UNGA Res 55/2 (8 September 2000) UN Doc A/RES/55/2. High-Level Panel on Threats, Challenges and Change, ‘A More Secure World: Our Shared Responsibility’ (2004) UN Doc A/59/565, 23 (identifying ­economic and social threats, transnational organised crime, as well as inter-state conflict, internal c­ onflict, terrorism, and weapons of mass destruction as global security threats). 6  KA Annan, In Larger Freedom: Towards Development, Security and Human Rights for All (New York, United Nations, 2005) para 78 (listing poverty, deadly infectious disease and environmental degradation as global security threats on the grounds that these can have equally catastrophic consequences). 7  Report of the Secretary-General, ‘Human Security’ (2010) UN Doc A/64/701; Report of the Secretary-General, ‘Follow-up to General Assembly Resolution 64/291 on Human ­Security’ (2012) UN Doc A/66/763. 8  2005 World Summit Outcome, UNGA Res 60/1 (24 October 2005) UN Doc A/RES/60/1, para 143. 9 UN Doc A/66/PV.112 (4 June 2012); UN Doc A/64/PV.88 (20 May 2010); UNGA Thematic Debate on Human Security (22 May 2008) www.un.org/ga/president/62/­ ­ ThematicDebates/humansecurity.shtml. 10  For different security paradigms in political science, see, eg, P Battersby and JM ­Siracusa, Globalization and Human Security (Lanham, Rowman & Littlefield Publishers, 2009) 39–68. 11  K O’Brien, ‘Are We Missing the Point? Global Environmental Change as an Issue of Human Security’ (2006) 16 Global Environmental Change 2. 5 Secretary-General’s

Human Security and International Law 27 ­different respects.12 Rather, this chapter examines the potential of human security’s normative effects in the areas where it has not influenced the development of international law. To that end, after locating the notion of human s­ ecurity within the analytical framework of security in general (Section II), this chapter examines the extent to which the notion of human security has, or has not, informed the development of international law in each of three different dimensions comprising the analytical framework of ­security, namely: (1) the focus (referent object) of security; (2) the scope of security issues; and (3) the means by which security threats are addressed. II.  LOCATING HUMAN SECURITY WITHIN THE ANALYTICAL FRAMEWORK OF SECURITY

When world leaders agreed upon adopting the notion of human security in the 2005 World Summit Outcome, the definitional issue was expressly left for subsequent discussion.13 Subsequently, UN Member States ­discussed human security in the General Assembly on 22 May 2008, in which different perspectives were presented and the potential benefits of broadening human security were weighed against the risks it might pose. While some states highlighted the risk of draining human security of any real operational value and applicability, other states underlined the risk of limiting the concept too narrowly, referring to the benefit of improving the living conditions of those most in need.14 Following the thematic debate, the UN Secretary-General Ban Ki Moon was tasked with seeking the views of UN Member States on the notion and definition of human security.15 In his 2012 report, however, the ­Secretary-General chose to set out the core values, scope, approach and

12  See, eg, H Nasu, ‘The Place of Human Security in Collective Security’ (2013) 18 Journal of Conflict & Security Law 95; T Farer, ‘Human Security: Defining the Elephant and Imagining Its Tasks’ (2010) 1 Asian Journal of International Law 1; A Edwards and C Ferstman (eds), Human Security and Non-Citizens: Law, Policy and International Affairs (Cambridge, Cambridge University Press, 2010); B von Tigerstrom, Human Security and International Law: Prospects and Problems (Oxford/Portland OR, Hart Publishing, 2007); B Saul, ‘The Dangers of the United Nations’ “New Security Agenda”: “Human Security” in the Asia-Pacific Region’ (2006) 1 Asian Journal of Comparative Law 10; MC Kettemann, ‘The Conceptual Debate on Human Security and its Relevance for the Development of International Law’ (2006) 1(3) Human Security Perspectives 39; G Oberleitner, ‘Human Security: A Challenge to International Law?’ (2005) 11 Global Governance 185; N Thomas and WT Tow, ‘The Utility of Human Security: Sovereignty and Humanitarian Intervention’ (2002) 33(2) Security Dialogue 177; R McRae and D Hubert (eds), Human Security and the New Diplomacy: Protecting People, Promoting Peace (Quebec, McGill-Queen’s University Press, 2001). 13  UNGA Res 60/1 (24 October 2005) UN Doc A/RES/60/1, para 143. 14 See, UNGA Thematic Debate on Human Security (22 May 2008) www.un.org/ga/­ president/62/ThematicDebates/humansecurity.shtml. 15  UNGA Res 64/291 (27 July 2010) UN Doc A/RES/64/291, para 3.

28  Hitoshi Nasu common understanding of human security, rather than define it in s­ pecific and clear terms.16 While some states have lamented the lack of a clear definition,17 this approach appears overall to have been well received.18 Switzerland, in particular, supported the approach, arguing that a ­precise scientific or legal definition ‘would ultimately limit its intrinsic usefulness’.19 The definitional debate of human security comes down to how we understand ‘security’ as much as what we mean by ‘human’. Security is an elastic and dynamic concept, susceptible to change resulting from both objective conditions and the subjective perception of threats.20 It is often described as ‘an essentially contested concept’,21 due to the fact that it can be understood differently, depending on its objects, the perception of threats, the protected values and the means through which these values can be protected.22 Likewise, human security is not a coherent or objective concept that can be defined with a definite and precise meaning, but rather forms part of an evolving conception of security that reflects the impacts of different values and norms on international relations.23 There can be no single meaning or definition of human security. Indeed, different states, policy makers and scholars have envisaged different ­ ranges of human security issues.24 Nevertheless, the analytical framework of ­security in general can provide a conceptual way of understanding the debates c­ oncerning the current state and role of human security in the development of international law.25 In the discourse of security studies, human security is, first and foremost, understood as a shift in the ‘referent objects’ of security from 16 

Report of the Secretary-General (2012) (n 7). Doc A/66/PV.112 (4 June 2012) 6–7 (Cuba), 8 (Venezuela), 11–12 (Russia), 17 (­Malaysia), 21 (China). 18 ibid, 3 (European Union), 4 (Jordan on behalf of the Human Security Network), 7 ­ (Mexico), 9 (Japan), 10 (Australia), 11 (Switzerland), 14 (Costa Rica), 14–15 (India), 16 (Thailand). 19  ibid, 11. 20  A Wolfers, ‘“National Security” as an Ambiguous Symbol’ (1952) 67(4) Political Science Quarterly 481, 484–85. 21  B Buzan, People, States and Fear: The National Security Problems in International Relations (Brighton, Wheatsheaf, 1983) 6. 22  See generally, DA Baldwin, ‘The Concept of Security’ (1997) 23 Review of International Studies 5. 23 E Newman, ‘Human Security and Constructivism’ (2001) 2 International Studies ­Perspectives 239. 24  See, eg, A Acharya, ‘Human Security: East versus West’ (2001) 56 International Journal 442. 25  For the author’s earlier work on the analytical framework of security in the context of international law, see H Nasu, ‘Law and Policy for Antarctic Security: An Analytical Framework’ in AD Hemmings, DR Rothwell and KN Scott (eds), Antarctic Security in the Twenty-First Century: Legal and Policy Perspectives (London/New York, Routledge, 2012); H Nasu, ‘The Expanded Conception of Security and International Law: Challenges to the UN ­Collective Security System’ (2011) 3(3) Amsterdam Law Forum 15. See also, Tadjbakhsh and Chenoy (n 1) 13–19. 17 UN

Human Security and International Law 29 sovereign states, or the international community, to human beings.26 Ambiguity remains as to whether it is particular individual persons or human beings as a collective mass that constitute the referent object in the discourse of human security. Peter Hough, for example, understands human security as the ‘deepening’ of security, placing individual ­persons at the centre of security analysis and policy-making.27 Barry Buzan, on the other hand, warns against the ‘reductionism’ caused by human security in international security thinking, emphasising the collectivity of security enterprises as an essential element of referent objects.28 This issue informs the debate, as will be discussed below, regarding the extent to which human security overlaps with, or distinguishes itself from, human rights. Secondly, not only does human security shift the focus of referent objects to human beings, it also entails a broadened, multi-sectoral understanding of security and addresses a wider range of causes of insecurity as part of security policy agendas.29 Furthermore, various human ­security threats are mutually reinforcing and interconnected because of their causal effect—for example, violent conflicts can lead to a reduction in food production and poverty, or vice versa—often spreading across national borders into a wider region.30 Yet, such a potentially unlimited expansion of human security has been criticised as the concept becomes too ambiguous to be of any use for policy-making,31 in that ‘virtually any kind of unexpected or irregular discomfort could conceivably constitute a threat to one’s human security’.32 26 According to the ‘securitisation’ theory developed by the Copenhagen School, the ­ iscourse of security is understood as a ‘speech act’ in the processes of constructing a d shared understanding of what is considered a threat. In such processes, the securitisation theory identifies ‘referent objects’ (which are seen to be existentially threatened) as distinguished from ‘securitising actors’ (who securitise issues) and ‘functional actors’ (who affect the dynamics of decision-making). See, B Buzan, O Wæver and J de Wilde, Security: A New Framework for Analysis (Boulder, Lynne Rienner, 1998) 23–36. 27 P Hough, Understanding Global Security (London/New York, Routledge, 2004) 8–10. See also, G King and CJL Murray, ‘Rethinking Human Security’ (2001) 116 Political Science Quarterly 585, 592–97; DT Graham and N Poku, Migration, Globalisation and Human Security (London/New York, Routledge, 2000) 17. 28  B Buzan, ‘A Reductionist, Idealistic Notion that Adds Little Analytical Value’ (2004) 35 Security Dialogue 369. 29  Commission on Human Security (n 1); Tadjbakhsh and Chenoy (n 1) 29–30; MacFarlane and Khong (n 1) Ch 4. 30  UNDP (n 3) 22–23; UN Human Security Unit, Human Security in Theory and Practice: Application of the Human Security Concept and the United Nations Trust Fund for Human Security (New York, United Nations, 2009) 7–8; Tadjbakhsh and Chenoy (n 1) 16–17. 31  A Mack, ‘A Signifier of Shared Values’ (2004) 35(3) Security Dialogue 366, 367; K Krause, ‘The Key to a Powerful Agenda, if Properly Delimited’ (2004) 35(3) Security Dialogue 367; SN MacFarlane, ‘A Useful Concept that Risks Losing its Political Salience’ (2004) 35(3) ­Security Dialogue 368. 32  R Paris, ‘Human Security: Paradigm Shift or Hot Air?’ (2001) 26(2) International Security 87, 89.

30  Hitoshi Nasu In response to such criticism, a much narrower, minimalist conception of human security has emerged, placing human security squarely within the context of violence and conflict, such as the protection of civilians, women and children in armed conflict.33 It was this narrow conception of human security that provided a theoretical foundation for the ­development of the ‘responsibility to protect’ concept and the associated debate on military intervention to protect civilian populations from mass ­atrocities.34 ­However, this narrow conception of human security has also been subjected to criticism for prioritising values favoured by the Global North over those held in the Global South.35 Thirdly, unlike traditional, state-centred security, which is often concerned with threats of armed attack, human security is to be achieved in a multidimensional and comprehensive manner. The Commission on Human Security emphasises both protection and empowerment in an integrated approach to address a range of insecurities.36 Human ­security incorporates the idea of human development, pioneered by Mahbub ul Haq, which has helped shift the focus of development issues from ­economic growth to the quality and richness of human lives.37 The idea of empowerment also closely relates to emancipation. As Ken Booth observes: ‘Security’ means the absence of threats. Emancipation is the freeing of people (as individuals and groups) from those physical and human constraints which stop them carrying out what they would freely choose to do. War and the threat of war is one of those constraints, together with poverty, poor education, ­political oppression and so on. Security and emancipation are two sides of the same coin. Emancipation, not power or order, produces true security. ­Emancipation, ­theoretically, is security.38

Thus, progressive advocates consider that human security represents a transformation of the traditional notion of security into the protection and empowerment of the individual and the promotion of social

33  See, eg, Tadjbakhsh and Chenoy (n 1) 30–31; MacFarlane and Khong (n 1) Ch 5; Human Security Centre, Human Security Report 2005: War and Peace in the 21st Century (Oxford, Oxford University Press, 2005) viii. 34  International Commission on Intervention and State Responsibility, The Responsibility to Protect (International Development Research Centre, 2001) 15; G Evans, The Responsibility to Protect: Ending Mass Atrocity Crimes Once and For All (Washington DC, Brookings Institution, 2008) 34–35. 35  Tadjbakhsh and Chenoy (n 1) 35–36. YF Khong, ‘Human Security: A Shotgun Approach to Alleviating Human Misery?’ (2001) 7 Global Governance 231. Cf M Duffield, Global ­Governance and the New Wars: The Merger of Development and Security (London, Zed Books, 2005) 31–34. 36  Commission on Human Security (n 1) 10–12. 37  ibid, 8. 38  K Booth, ‘Security and Emancipation’ (1991) 17 Review of International Studies 313, 319.

Human Security and International Law 31 ­ rogress through the merging of development and security.39 However, p when translated into practice, human security tends to take the form of ­government foreign aid programmes, as has been the case with Japan’s development aid,40 in particular the UN Trust Fund for Human Security that they created.41 Additionally, much narrower, but more distinct, approaches to promoting human security have been considered. The ‘rights-based’ approach to human security, for example, attempts to explain that human rights underpin the normative and conceptual foundation of human security and serve as the means of ensuring human security.42 Another perspective is the state-based approach, as represented by the ‘responsibility to protect’ concept, which seeks out ways in which sovereign states can address security threats to human beings, rather than threats to their own national security or their international relations.43 However, due to the controversies over its precise focus and scope, there is a risk of human security being misused or misguiding the debate when such familiar ideas and existing legal frameworks are relied upon as the means of addressing human security concerns (as will be discussed in Section V B on the ­pathology of human security). At least one of the reasons why human security has been widely advocated and received into policy agendas worldwide is the very recognition that existing ideas and legal frameworks do not sufficiently address contemporary security threats from the viewpoint of human beings.44 Any discussion about the means to address human security issues must begin by critically assessing the adequacy of existing ideas and legal frameworks. Within the analytical framework of security, human security serves as a catalyst for expanding the horizon of contemporary security debates. The question relevant to this chapter is: to what extent can the idea of human security inform the development of international law, challenging its sovereignty-based structure? The remainder of this chapter examines this

39 T McCormack, ‘Human Security and the Separation of Security and Development’ (2011) 11(2) Conflict, Security & Development 235, 241. 40 For details, see, eg, M Sato, ‘Human Security and Japanese Diplomacy: Debates on the Role of Human Security in Japanese Policy’ in G Shani, M Sato, and MK Pasha (eds), ­Protecting Human Security in a Post 9/11 World: Critical and Global Insights (New York, Palgrave Macmillan, 2007). 41  For details, see, eg, OA Gómez S, ‘What is a Human Security Project? The Experience of the UN Trust Fund for Human Security’ (2012) 24 Global Change, Peace & Security 385. 42 See, eg, FO Hampson, Madness in the Multitude: Human Security and World Disorder (Oxford, Oxford University Press, 2002) 16–23; BG Ramcharan, Human Rights and Human Security (Leiden, Martinus Nijhoff, 2002) 3–10. 43  See, eg, Report of the Secretary-General (2010) (n 7) paras 20–22. 44 Thus, von Tigerstrom describes the basic functions of human security as ‘agenda-­ setting’, ‘question-framing’ and ‘critiquing existing approaches’: von Tigerstrom (n 12) 45–49. See also, O’Brien (n 11) 2.

32  Hitoshi Nasu question in three different dimensions comprising the analytical framework of security, namely: (1) the focus (referent object) of security; (2) the scope of security issues; and (3) the means by which security threats are addressed. III.  SHIFTING THE FOCUS

Even though human security is, first and foremost, designed to shift the focus or referent object of security away from the state to the individual, the idea of a human-centred approach itself is not alien to international law.45 International law, while being built upon the traditional, inter-state paradigm, has developed to accommodate a human-centred approach by incorporating, for example, the principle of equality and non-­ ­ discrimination, the principle of respect for human dignity and the principle of humanity.46 These principles have underpinned the ­development of i­ nternational human rights law, refugee law and international humanitarian law, particularly in the second half of the ­twentieth century. If human security could only provide a shift towards a more human-­ centred approach, it would not offer much value to further ­development of i­ nternational law. What distinguishes human security from the human-centric approach to international law, particularly international human rights law, is its place within the analytical framework of security. The human-­centred approach to international law, as traditionally conceived, does not ­necessarily address the interests of human beings within the paradigm of security. Human security can even be considered a sub-set of the humancentred approach to international law, which has only recently evolved within the overall trend of expanding the concept of security in international policy discourses. Conceived as such, human security is inherently a public interest concerned with the security of individuals as members of the community, rather than each individual’s own personal security.47 The manifestation of the human-centred approach to international law in the paradigm of security, through the form of human security, has challenged the traditional conception of security as the sovereign prerogative of states.

45 

See, von Tigerstrom (n 12) Ch 3. Accordance with International Law of the Unilateral Declaration of Independence in respect of Kosovo (Advisory Opinion) [2010] ICJ Rep 403, 596–607 (separate opinion of Judge Trindade). See more generally, AA Cançado Trindade, International Law for Humankind: Towards a New ‘Jus Gentinum’ (Leiden, Martinus Nijhoff, 2010); T Meron, The Humanization of International Law (Leiden, Martinus Nijhoff 2006). 47  See also, Kaldor (n 1) 191; Sato (n 40) 92. 46 

Human Security and International Law 33 It is for this reason that the adoption of the 1997 Ottawa Treaty,48 the 1998 Rome Statute,49 and the 2000 Optional Protocol to the Convention on the Rights of the Child,50 amongst the body of human rights treaties, has been seen as legal development motivated and facilitated by embracing and prioritising human security over national security. Security concerns regarding human beings have essentially pushed international standards of behaviour into the areas that were traditionally neglected by s­overeign states.51 Additionally, a more progressive view has been expressed, ­elevating human security into a norm, which requires proportionality assessment under international humanitarian law to demonstrate that the legitimate military objective cannot be achieved by other means, rather than simply considering that the civilian casualty is not excessive in ­relation to the concrete and direct military advantage ­anticipated.52 According to this progressive view, human security is considered a normative, additional factor to be taken into account in balancing between military necessity and humanitarian concerns which, unlike the human rights-based approach, does not suggest an obligation to avoid or minimise any risk to civilians.53 Thus, human security plays a much broader function than human rights by contributing to the development and r­ e-interpretation of legal rules, but is at the same time narrower than human rights, in that it is concerned with the ‘security’ of human beings, their survival, livelihood and dignity.54 Although the adoption of a new treaty, or re-interpretation of existing legal rules, may have been influenced and motivated by the idea of human security, whether this truly addresses human security concerns held by individuals is a different matter. States’ approach to human security issues may well be selective and deal only with what states consider to be a threat to human beings, rather than what individuals perceive to be a threat to themselves. Furthermore, human security issues may well be addressed

48 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of ­ nti-Personnel Mines and on their Destruction (adopted 18 September 1997, entered into A force 1 March 1999) 2056 UNTS 211. 49  Rome Statute of the International Criminal Court (adopted 17 July 1998, entered into force 1 July 2002) 2187 UNTS 90. 50  Optional Protocol to the Convention on the Rights of the Child on the Involvement of Children in Armed Conflicts (adopted 25 May 2000, entered into force 12 February 2002) 2173 UNTS 222. 51  See, eg, R McRae, ‘Human Security in a Globalised World’ in McRae and Hubert (n 12) 25; RA Matthew, ‘Human Security and the Mine Ban Movement I: Introduction’ in RA Matthew, B McDonald and KR Rutherford (eds), Landmines and Human Security: ­International Politics and War’s Hidden Legacy (New York, State University of New York Press, 2004) 3–19. 52  Farer (n 12) 8. See also, Kaldor (n 1) 186. 53  For discussion, see, eg, K Watkin, ‘Assessing Proportionality: Moral Complexity and Legal Rules’ (2005) 8 Yearbook of International Humanitarian Law 3, 34–41. 54  See also, von Tigerstrom (n 12) 42.

34  Hitoshi Nasu only in the way that states consider appropriate, rather than the way in which individuals themselves require them to be addressed. Illustrative of this point are the issues of internal displacement and the protracted refugee situation (where the displaced people are often encamped on border areas for a prolonged period of time), which illuminate the inadequacy of the state-oriented, monolithic understanding of ‘refugee protection’ ­without having regard to the dynamics and complexity of specific ­situations and individuals under the existing international refugee law.55 There remains scope for revisiting even human-centred rules of international law so as to better accommodate the particular needs and circumstances of those who are suffering or perceiving threats. IV.  EXPANDING SECURITY AGENDAS

Despite the conceptual debate concerning its scope, as outlined above, there is no denying that human security has provided a theoretical foundation for expanding the range of security issues to be addressed, at least as policy agendas, including economic security, food security, health ­security and environmental security.56 The human security perspective makes a significant contribution to how we consider the wider range of security issues. It enables a consideration of the root causes of such issues, which are usually observed and felt at the local or regional level, from the ­perspective of those who are actually suffering or perceiving the threats, irrespective of their causal relationship with an armed conflict the ­state-centred notion of security is primarily concerned about. Thus, human security is not simply a security multiplier, but demands the incorporation of ‘non-traditional’ security agendas, which pose challenges to the survival and well-being of peoples arising from non-military sources,57 as perceived by those who are suffering from the original causes, rather than as their consequences for armed conflict. However, an attempt to address ‘non-traditional’ security agendas from a human security perspective to international law is not straightforward. The basic premise of international law inevitably poses a s­ tructural ­obstacle to ‘mainstreaming’ human security within the ­existing ­framework of

55  See, eg, A Okudaira and H Nasu, ‘Revisiting the Concept of Protection in International Refugee Law: Implications of the Protracted Refugee Situation on the Thai-Myanmar Border’ in A Francis and R Maguire (eds), Protection of Refugees and Displaced Persons in the Asia Pacific Region (Farnham, Ashgate, 2013); A Edwards, ‘Human Security and the Rights of Refugees: Transcending Territorial and Disciplinary Borders’ (2009) 30 Michigan Journal of International Law 763, 805; TA Aleinikoff, ‘State Centered Refugee Law: From Resettlement to Containment’ (1992) 14 Michigan Journal of International Law 120. 56  UNDP (n 3) 24–30. 57  See generally, eg, M Caballero-Anthony, R Emmers and A Acharya (eds), Non-Traditional Security in Asia: Dilemmas in Securitisation (Farnham, Ashgate, 2006).

Human Security and International Law 35 international law.58 International law is a system of law based on the ­consent of sovereign states and hence, does not allow much scope for accommodating non-state entities and individuals as subjects of international law.59 This structural obstacle of international law inhibits the full potential of human security being harnessed to address ­‘non-traditional’ security issues. An example illustrating this problem is the issue of food security. The idea of food security has evolved over the last four decades from ‘food supply security’, focusing solely upon the availability of food supply as a security concern,60 to a more comprehensive concept of ‘physical and economic access to sufficient, safe and nutritious food’.61 It is the concept of human security that arguably facilitated this shift, as the 1994 UNDP Human Development Report expressly provides that food security requires not just enough food to go around … [but] requires that people have ready access to food—that they have an ‘entitlement’ to food, by growing it for themselves, by buying it, or by taking advantage of a public food distribution system.62

This statement was made ahead of the 1996 World Food Summit where states, for the first time, embraced this wider understanding of food security.63 Nevertheless, the international trade rules,64 including those intended to address food security issues,65 have remained as the legal and structural barriers to the adoption of flexible food security ­policies by individual countries.66 This is also despite the fact that the 2001 Doha Ministerial Declaration acknowledged that a range of non-trade

58  Cf W Benedek, MC Kettemann and M Möstl (eds), Mainstreaming Human Security in Peace Operations and Crisis Management: Policies, Problems, Potential (London/New York, Routledge, 2011). 59  A Clapham, ‘The Role of the Individual in International Law’ (2010) 21 European Journal of International Law 25. Cf C Grossman and DD Bradlow, ‘Are We Being Propelled Towards a People-Centered Transnational Legal Order?’ (1993) 9 American University Journal of ­International Law and Policy 1. 60  Report of the World Food Conference, Rome, 5–16 November 1974 (New York, United Nations, 1975) 2. 61  Rome Declaration on World Food Security (adopted 13 November 1996) para 1, www. fao.org/docrep/003/w3613e/w3613e00.htm. 62  UNDP (n 3) 27. 63  Rome Declaration on World Food Security (n 61). 64  Modern international trade law can arguably be conceived of as aiming to fulfil human security objectives with reference to the improvement of living standards for all people and sustainable development: R Howse and M Mutua, Protecting Human Rights in a Global Economy: Challenges for the World Trade Organization (Montreal, International Centre for ­ Human Rights and Democratic Development, 2000) 4. 65  See especially, Agreement on Agriculture (adopted 15 April 1994, entered into force 1 January 1995) 1867 UNTS 410. 66  For details, see, eg, A Joshi, ‘Food Security in the Great Lakes Region: Reconciling Trade Liberalisation with Human Security Goals’ in RG Rayfuse and N Veisfelt (eds), The ­Challenge of Food Security: International Policy and Regulatory Frameworks (Cheltenham, Edward Elgar, 2012) 44, 53–56; C Gonzalez, ‘Institutionalizing Inequality: The WTO, Agriculture and

36  Hitoshi Nasu concerns, such as food security, should be taken into account.67 This ‘trade-centric’ approach to human security is also evident in the trade protection of intellectual properties, which has been criticised as denying traditional farmers’ accessibility to plant genetic resources for food and agriculture.68 The expansion of the security concept through the optic of human ­security has also influenced the mandate and activities of the UN ­Security Council, which may appear to be the most appropriate forum to incorporate a range of non-traditional security issues, given that it has the primary responsibility for the maintenance of international peace and security within the UN system. Yet it is a state-centric, military-oriented conception of security that underpins the UN collective security s­ ystem, whose constitutive and legitimising aim has traditionally been the absence of armed aggression.69 Mainstreaming human security, to address non-­traditional security issues within its framework, requires transformation of its normative and institutional foundations into those that adopt human security as the driving force, in the search for substantive legitimacy based on universal values.70 As this author has discussed elsewhere, whilst the incorporation of a civilian protection mandate into peacekeeping operations has gone some way towards this direction, the prevailing view remains that non-­ traditional security issues, such as health security, food security and ­climate change, are relevant to the UN Security Council only to the extent that those matters relate to conflicts.71 Thus, at least as it currently stands, the idea of human security has not been fully harnessed into collective security decision-making. It, therefore, remains to be seen whether, and to what extent, the legal and political structure of the UN collective security system is capable of accommodating human security perspectives when dealing with traditional or non-traditional security issues. The answer to this question may well depend on whether, and how, the multi-­sectoral

­ eveloping Countries’ (2002) 27 Columbia Journal of Transnational Law 431, 476–81; MG Desta, D ‘Food Security and International Trade Law: An Appraisal of the World Trade Organization Approach’ (2001) 35 Journal of World Trade 449. 67  WTO Doha Ministerial Declaration, adopted 14 November 2001, Doc WT/MIN(01)/ DEC/1, paras 13–14. 68 ‘Report of the Special Rapporteur on the Right to Food’ (23 July 2009) UN Doc A/64/170, para 10. See generally, R Ramcharan, International Intellectual Property Law and Human ­Security (The Hague, TMC Asser, 2013). 69 See, eg, M-F Cuéllar, ‘Reflections on Sovereignty and Collective Security’ (2004) 40 ­Stanford Journal of International Law 211, 215–20; H Charlesworth, ‘The Inadequacy of ­“Collective Security”’ (2000) 9 Finnish Yearbook of International Law 39, 41–44. 70 H Nasu, ‘Operationalising the “Responsibility to Protect” and Conflict Prevention: Dilemmas of Civilian Protection in Armed Conflict’ (2009) 14 Journal of Conflict & Security Law 209, 232–33. 71  Nasu (n 12).

Human Security and International Law 37 approach required to realise human security can be integrated into ­collective security actions, which forms the subject of the next section. V.  EXTENDING THE MEANS TO ADDRESS SECURITY THREATS

A.  Multidimensional Approach to Security The concept of human security functions as a goal as much as the means to achieve the goal. As the 1994 Human Development Report sets out, it promotes not only the ‘protection’ of human beings but also the ­‘empowerment’ of people to develop their potential, through concerted efforts to develop norms, processes and institutions that systematically address insecurities. The UN Secretary-General Ban Ki-Moon, in his 2010 Human Security Report, also considers that the concept of human security introduces a practical framework for identifying specific insecurities, as well as for considering the institutional and governance arrangements that are needed to ensure the survival, livelihood and dignity of individuals and communities in a multidimensional and comprehensive manner.72 ­Conceived as such, the role of human security as a security multiplier also extends the means by which security threats are to be addressed. Nevertheless, the prevalent position among states remains that human security is to be achieved within the existing framework of international law and, therefore, does not entail new legal obligations for states, ­effectively rejecting any shift away from the traditional idea of security being provided by the sovereign state.73 Within the European Union, it is considered that ‘Respect for all human rights and the rule of law should remain at the core of any application of the human security approach’.74 Although the concept of human security itself may not create any new legal obligations, it does not mean that human security is devoid of any legal and normative values. Indeed, as the Australian delegation to the UN General Assembly observed, human security provides a ‘normative framework’ to ensure that collective actions are not fragmented and that they directly benefit affected populations.75 It is in this normative context that mainstreaming human security can make a contribution in developing or re-conceptualising rules of ­international law. As examined above, human security has motivated and

72 

Report of the Secretary-General (2010) (n 7) para 26. Doc A/66/PV.112 (4 June 2012) 6 (Egypt), 7 (Cuba, Mexico), 8 (Venezuela), 12 ­(Russia), 15 (India), 19–20 (Syria). See also, Report of the Secretary-General (2012) (n 7) para 36(c). 74  UN Doc A/66/PV.112 (4 June 2012) 3. 75  ibid, 10 (Australia). 73 UN

38  Hitoshi Nasu influenced the adoption of new treaties, so far mainly in the area of armed conflict law,76 which could and should expand into other areas, such as international trade law.77 The notion of human security could also allow international and regional courts and tribunals to expand their approach to security. Judge Koroma, for example, in considering the request for the indication of provisional measures in Armed Activities on the Territory of the Congo, held in his Declaration that the Court’s role in maintaining ­international peace and security includes the promotion and protection of human security and the right to life, having regard to the real and s­ erious threats that existed to the population of the region concerned.78 In the Kosovo Advisory Opinion, Judge Trindade relied upon human ­security in observing that states have the ‘duty to protect and to empower their inhabitants’.79 Such a positive obligation upon states has been recognised in the ­context of the right to security through international, regional and domestic human rights jurisprudence.80 A reading of human security into the positive obligation of states to protect their inhabitants from violence and to empower, however, raises concern for the tension between liberty, as an individual right, and security (including human security), as a public or collective interest.81 Should human security be incorporated into the right to security, so as to re-conceptualise or expand the right, the question ­inevitably arises as to how the potential conflict between the right to ­security (for example, of the public from terrorist threats) and other human rights, such as the right to liberty and fair trial (for example, of ­suspected terrorists) should be reconciled.82 Some may argue that the right to security is superior to other human rights,83 whereas others consider that the right to security should be narrowly confined to avoid such conflict.84 Indeed, as will be discussed below, a certain application of a

76 

See above (nn 48–50) and accompanying text. Note the legal and structural obstacles to the adoption of flexible food security policies under the current WTO regime, as introduced above in nn 60–68 and accompanying text. 78  Case Concerning Armed Activities on the Territory of the Congo (New Application: 2002) (Democratic Republic of the Congo v Rwanda) (Provisional Measures) [2002] ICJ Reports 219, 253–54. 79  Kosovo (Advisory Opinion) (n 46) 594. 80 See, eg, J Spigelman AC, ‘The Forgotten Freedom: Freedom from Fear’ (2010) 59 ­International and Comparative Law Quarterly 543, 549–59; S Fredman, ‘The Positive Right to Security’ in BJ Goold and L Lazarus (eds), Security and Human Rights (Oxford/Portland OR, Hart Publishing, 2007); L Lazarus, ‘Mapping the Right to Security’ in Goold and Lazarus (ibid). 81  Spigelman (n 80) 549. 82  For discussion, see, eg, Piet Hein van Kempen, ‘Four Concepts of Security—A Human Rights Perspective’ (2013) 13 Human Rights Law Review 1. 83  Cf J Waldron, ‘Security and Liberty: The Image of Balance’ (2003) 11 Journal of Political Philosophy 191, 208–09. 84  See, eg, Lazarus (n 80) 344. 77 

Human Security and International Law 39 human security ­perspective leads to a pathological use of human ­security as a ­ justification for controversial measures within the existing legal framework. B.  Pathology of Human Security While human security is, as argued above, essentially a public interest, concerned with the security of individuals as members of the community, rather than each individual’s own personal security, too much emphasis on the collective, as opposed to each individual, blurs the line between human security and national security. In a twisted sense, human s­ ecurity can be conceived of as a necessary precondition to a society in which human rights can be exercised and, thus, justify derogation from the human rights of certain individuals. This is the line of argument adopted by former Canadian Attorney-General Irwin Cotler, in assessing the human rights compatibility of controversial counter-terrorism legislation, describing it as ‘“human security” legislation that purports to protect both national security and civil liberties’.85 A similar position was adopted by former Australian Attorney-­General Philip Ruddock in his theoretical, human security-based rationale for Australia’s controversial counter-terrorism legislation. According to ­ Ruddock: Human security is a broad concept focused on the individual or community, rather than the state. Human security rests upon security for the individual ­citizen, which requires not only the absence of violent conflict, but also respect for human rights and fundamental freedoms … While it is accepted that any tightening of security arrangements will impact on certain rights, a more useful debate is to consider whether tightening security arrangements is in the interests of protecting fundamental human rights as a whole.86

This argument was advanced as a justification for depriving certain ­individuals of their fundamental rights and freedoms, on the grounds that it ultimately promotes human security by preserving a society in which rights and freedoms can be exercised without a fear of terrorism. What we see in this line of argument is reliance on the normative goal of human security, as a way of shifting the balance between national security and

85  I Cotler, ‘Thinking Outside the Box: Foundational Principles for a Counter-Terrorism Law and Policy’ in RJ Daniels, P Maklem and K Roach (eds), The Security of Freedom: Essays on Canada’s Anti-Terrorism Bill (Toronto, University of Toronto Press, 2001) 112. 86 P Ruddock, ‘A New Framework: Counter-Terrorism and the Rule of Law’ (2004) 16 The Sydney Papers 113, 116–17.

40  Hitoshi Nasu individual human rights, without explaining why the shift is towards the reduction of human rights (not the other way), or to what extent it can be shifted.87 The notion of human security is only given limited consideration as a normative goal, without being projected into the third analytical security dimension, concerning the means by which security threats are to be addressed. Human security is not a language of oppression, but rather one of empowerment and emancipation. Another area that illustrates the potential pathological use of human security concerns the debate on humanitarian intervention. In particular, early literature on human security considers this concept to be ‘interventionist by nature’, encompassing the use of force for more cosmopolitan goals.88 This, again, reflects the pitfall of a limited understanding of human security as being only a ‘normative goal’ and the failure to harness its potential in full as the ‘means’ to address security threats. It would be too much to expect a human security approach to have positive impacts on the future debate about humanitarian intervention, given the inherent dilemma posed by competing norms and moral imperatives, which ­cannot simply be resolved by embracing human security as a substitute for national security.89 Irrespective of the true intention behind the notion of human ­security, lingering concerns over the concept have been associated with the ­ ­suspicion that it might be used to justify unwarranted intervention in vulnerable countries for political reasons, without having regard to the real needs and priorities of their peoples and even, perhaps, at the expense of their social and political stability.90 Policy-makers in Southeast Asia, for example, have been wary of the ‘freedom from fear’ aspect of human security, due to their apprehension that it may justify external intervention in their internal affairs that often involve violations of human rights and international humanitarian law.91 The UN Secretary-General’s f­ollow-up

87 See, B Golder and G Williams, ‘Balancing National Security and Human Rights: ­ ssessing the Legal Response of Common Law Nations to the Threat of Terrorism’ (2006) A 8 Journal of Comparative Policy Analysis 43, 53. 88  G Oberleitner, ‘Human Security: A Challenge to International Law?’ (2005) 11 Global Governance 185, 194. See also, Kaldor (n 1) 182–97; N Thomas and WT Tow, ‘The Utility of Human Security: Sovereignty and Humanitarian Intervention’ (2002) 33(2) Security Dialogue 177. Cf P Upadhyaya, ‘Human Security, Humanitarian Intervention, and Third World ­Concerns’ (2004) 33 Denver Journal of International Law and Policy 71. 89 See especially, S Chesterman, Just War or Just Peace? Humanitarian Intervention and ­International Law (Oxford, Oxford University Press, 2001); von Tigerstrom (n 12) Ch 4. See also, D Chandler, ‘Resilience and Human Security: The Post-Interventionist Paradigm’ (2012) 43(3) Security Dialogue 213. 90  UN Doc A/66/PV.112 (4 June 2012), 6 (Egypt), 8 (Venezuela), 9 (Japan), 14 (Costa Rica), 15 (India), 21 (China). 91  Y Nishikawa, Human Security in Southeast Asia (London/New York, Routledge, 2010) 37; A Acharya, Promoting Human Security: Ethical, Normative and Educational Frameworks in ­South-East Asia (Paris, UNESCO, 2007) 21.

Human Security and International Law 41 report on human security, and the subsequent debate in the UN General Assembly in 2012, put an end to the idea of linking human security with military intervention. The report emphasises a common understanding that human security does not entail a threat or use of force and is implemented with full respect for the purposes and principles of the UN Charter, including the full respect for state sovereignty and the principle of nonintervention­.92 Moreover, human security is now clearly distinguished, and even dissociated from its sibling, the ‘responsibility to protect’ ­doctrine,93 presumably due to the political stigma attached to the latter in the aftermath of NATO’s intervention in Libya in March 2011 as the implementation of the doctrine under Security Council Resolution 1973.94 Nevertheless, concern for the misuse or abuse of human security for the political interests of powerful states remains strong. Indeed, the ­persistent call for reaching an agreement on the definition of human ­security, expressed by a few states during the UN General Assembly debate on human security in 2012, appears to stem from the fear that a vaguely framed concept could potentially be misused.95 However, as examined above, it is the limited understanding of human security, rather than the ambiguity of the concept itself, that invites the misuse or abuse of the ­concept. Harnessing the full potential of human security, rather than ­seeking to define it in narrow terms, appears to be a better way to address the concern. VI. CONCLUSION

Notwithstanding (or thanks to) its amorphous nature, human security functions as a security multiplier in all three dimensions of the analytical framework of security. It provides a normative and practical framework to ensure that concerted efforts to develop norms, processes and institutions systematically address insecurities, from the perspective of those who are actually suffering or perceiving the threats. However, this chapter has demonstrated that its limited normative impact so far has been due to the restricted application of the notion, as much as the legal and structural obstacles within the existing framework of international law. Thus, the idea of human security challenges international law, not only in respect of

92 

Report of the Secretary-General (2012) (n 7) para 36. Report of the Secretary-General (2012) (n 7) paras 22–23. See also, UN Doc A/66/PV.112 (4 June 2012) 6 (Egypt), 7 (Cuba), 9 (Japan), 12 (Russia), 15 (India), 16 (Brazil), 18 (Malaysia), 19 (Pakistan), 20 (Syria). Cf Report of the Secretary-General (2010) (n 7) paras 23–24. 94  See, D Berman and C Michaelson, ‘Intervention in Libya: Another Nail in the Coffin for the Responsibility-to-Protect?’ (2012) 14 International Community Law Review 337. 95  See, eg, UN Doc A/66/PV.112 (4 June 2012) 16 (Brazil), 19 (Syria). 93 

42  Hitoshi Nasu its sovereignty-based legal framework but, more significantly, in relation to the very notion of security shared by policy-makers and jurists. By embracing and promoting the notion of human security to its full potential, existing obligations, such as those towards refugees, internally displaced people and those who are in protracted refugee situations, can be revisited in order to facilitate a more appropriate implementation that accommodates their perspective.96 It may also promote the adoption of new treaties, amendment or re-interpretation of existing treaty obligations in a broader range of areas, such as food security, health security and ­climate change. The potential of human security’s normative effects is yet to be fully harnessed. Therefore, it remains to be seen to what extent mainstreaming human security will actually challenge the sovereignty-based framework of international law and to what extent the legal and political structure of the UN collective security system is capable of accommodating human security perspectives, in dealing with traditional or non-­ traditional security issues. Embracing and harnessing the full potential of human security is also important in order to prevent a misuse or abuse of the notion for promoting or attempting to justify restrictive, oppressive means to achieve security under the guise of ‘human security’. A practical framework ­provided by human security broadens the way in which we can consider and address security issues—not simply through a rights-based approach or development aid, but more importantly, by recognising and promoting its contribution to new legal development and new jurisprudence. The normative and practical impacts of human security on the development of international law thus depends on the extent to which states, policymakers and jurists are prepared to move beyond the definitional debate and embrace its perspective and philosophy of empowerment in their decision-making processes.

96 

Okudaira and Nasu (n 55) 171–83.

3 Human Security versus Environmental Security: At Legal Loggerheads JOHN PEARSON

I. INTRODUCTION

T

HE UNITED NATIONS Development Report of 1994 entitled ‘New Dimensions of Human Security’ (UNDR 1994), introduced the ­concept of ‘human security’—highlighting it as ‘the key ­challenge for the 21st century.’1 In itself, such a claim might be said to be little more than rhetoric, but the recommendations of the second chapter of the report indicated a wide-reaching intention. The final point for consideration, put forward in the chapter, recommended ‘that today’s framework of global institutions be reviewed and redesigned to prepare those institutions fully for doing their part in tackling the urgent challenges of human ­security.’2 Indeed, by way of ensuring the validity of the concept, a significant proportion of the chapter is dedicated to defining the term—a process repeated in a later Report of the Secretary General of the United Nations in 2010 concerning Human Security.3 Although numerous definitions of human security are considered in both texts, two recur and will form the focus of this chapter. The first is the most basic and widely espoused construction of the concept that ‘all ­individuals, in particular vulnerable people, are entitled to freedom from fear and freedom from want, with an equal opportunity to enjoy all their rights and fully develop their human potential,’4 often referred to s­ imply

1  UN Development Programme (UNDP), Human Development Report 1994 (UNDP Report, 1994) 39. http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_ nostats.pdf. 2  ibid 40. 3  United Nations General Assembly (UNGA), ‘Human Security Report of the SecretaryGeneral 64/701’ (2010) UN Doc A/64/701 (UN Human Security Report) www.afes-press. de/html/pdf/UNGA_A64701_ReportOfTheSecretaryGeneralOnHumanSecurity.pdf. 4 UNGA, ‘World Summit Outcome’ UNGA Res 60/1 (16 September 2005) UN Doc A/RES/60/1 (UNGA Res 60/1).

44  John Pearson as ‘the freedom from fear and freedom from want.’ The second is the ­composite construction of the concept under which ‘the main elements of human security’ are said to comprise the ‘seven key components’5— economic, food, health, environmental, personal, community and ­political securities. These definitions and constructions are all bound together by the core reasoning behind the initial proposal that The concept of security has for too long been interpreted narrowly as security of territory from external aggression, or as protection of national interests in foreign policy or as global security from the threat of a nuclear holocaust.6

As such, the concept of human security is put forward as a new ‘­framework’ on which national and international institutions, governmental and otherwise, can base their policies and actions. The framework, as defined in the 1994 UNDP Report7 and subsequent texts,8 misrepresents the reality of the threats to both the seven key ­component securities of the concept and the broader aim of ‘freedom from want and freedom from fear.’ Ultimately, ensuring a common level of security for all peoples, relative to both the innumerable social, cultural, economic and political realities of themselves and their states, is highly improbable, if not impossible, without it being set at so low a threshold as to be meaningless. As such, a solid and enforceable basis for universal human security, from which the more subjective components may be aspired to by states with the capacity to do so, is both a necessary and more achievable goal. Such a framework would protect the elements upon which less regimented and universal development can be built through the imposition of minimum obligations that all parties can meet and can progress from. Examples of this approach already exist in the international legal sphere in the fields of human rights and environmental law. Human rights law offers protection relating to many of the issues raised by the discussion concerning the scope and definition of human security within the texts considered above. They demand basic standards in relation to fundamental provisions and certain ‘minimum core obligations’9 where an element of relativity is required. Environmental law, however, presents both commonalities and potential conflicts to the proposed

5 

UN Human Security Report (n 3) 14. UNDP Report 1994 (n 1) 22. 7  UNDP Report 1994 (n 1) 24. 8  UN Human Security Report (n 3) I(4) and UNGA Res 60/1 (n 4) 31. 9  UN Committee on Economic, Social and Cultural Rights (CESCR), ‘General Comment No 3 the Nature of States Parties’ Obligations (Article 2(1))’ in ‘Note by the Secretariat, Compilation of General Comments and General Recommendations Adopted by Human Rights Treaty Bodies’ (12 May 2003) UN Doc HRI/GEN/1/Rev.6 (CESCR General Comment No 3) 10. 6 

Human Security versus Environmental Security: At Legal Loggerheads 45 c­oncept of human security, though its subject matter offers arguably a more effective basis from which it might be possible to achieve the aims of the concept. However, enforcing human security, or directly seeking a basis for it through legal measures, would be fraught with difficulties. This is owing to the problem of identifying objective criteria upon which to base provisions that both address the needs of individuals and garner the necessary compliance of states with the resultant obligations imposed upon them. The inappropriate nature of a legal approach to guaranteeing a minimum level of human security in itself is accepted, albeit implicitly, in the drafting of the 2012 General Assembly Resolution on the issue. The Resolution states that ‘Human security does not entail additional legal obligations on the part of States,’10 thereby relegating it to being a mere policy framework to be considered in the formulation of, and as an aim for, prospective legislative provisions. A framework for on-going policy and action in the area of human ­security, however, requires an element of underpinning or a structure upon which it can be based. For example, economic, social and cultural rights are subject to progressive implementation that suggest goals in a manner akin to a policy framework, but have minimum core obligations to ensure efficacy. While some states will forego short term gains and interests in the name of achieving long term stability, they are in the minority. Thus, in order to ensure that minimum standards capable of supporting the most basic aspects of human security are preserved, and from which a higher level of the concept might serve as an aspiration, provisions of a binding nature are essential. Relativity in particular contexts is, however, an essential consideration to ensure the highest legitimacy and e­ fficacy of any such measure. This is evidenced by the perpetual debate over the ­merits of universalism and cultural relativism in human rights law. Both the fields of human rights and environmental law have developed methods of dealing with the aforementioned issues of relativity where ­necessary and offer a means that could afford a suitable legal basis for the elements of human security. Environmental security, in particular, represents a basis that could allow states to meet the minimum human security standards suggested above. This could be achieved through a relative legislative approach, of the type accepted as fundamental, in order to include the innumerable aspects of the framework as it is currently defined. This is because many of the ­elements of human security, and certainly those with which the individual is most concerned and reliant upon, demand a requisite level

10  UNGA, ‘Follow-up to Paragraph 143 on Human Security of the 2005 World Summit Outcome’ UNGA Res 66/290 (25 October 2012) UN Doc A/RES/66/290, 3(h).

46  John Pearson of e­ nvironmental security to ensure them. Thus, it is suggested that in order for human security to be achieved, a legislative basis centred upon ensuring environmental security, without which human security cannot be assured, must be laid down. Using existing examples of provisions and approaches from the fields of environmental and human rights law, and suggesting protections that might be afforded in a similar manner, it is suggested that only through ensuring environmental security is it possible to achieve the same result for human security. This proposition is illustrated in a number of ways, firstly, through ­established environmental law where, only when the environment has been placed above solely anthropocentric concerns, has it been truly effective in safeguarding not only environmental concerns, but also ­ factors inextricably linked to the composite construction of human ­ ­security. The result demonstrates that environmental security can exist without human security, but the reverse is not true. The two concepts ­cannot therefore be regarded as mutually exclusive. Moreover, acceptance that a stable and consistent environment is integral to ensuring the concept of human security (as defined by the United Nations), and is attainable to any worthwhile degree in practice, is necessary. The potential for the two concepts to conflict in their role as a framework for international legal and policy development is therefore not only apparent, but also real in practice and in need of resolution. II.  ENVIRONMENTAL EXEMPLARS

The means by which protection has been afforded to the environment has varied widely, with the efficacy of some measures being severely ­questioned whilst the success of other means has been extoled to an ­equivalent degree. Arguably one of the clearest examples of this is the void in efficacy between the international legal responses to atmospheric damage caused by carbon dioxide and chlorofluorocarbons (CFCs).11 The presence of both in the atmosphere has been increased or caused by human action and yet the action to curtail their impacts varies considerably. Whilst the responses could never be identical, aspects of the regulation of CFCs, which are regarded as the cause of its success, were not transferred to any noticeable degree onto those aimed at constraining atmospheric carbon dioxide and other greenhouse gases, which appear in later treaty texts. 11  Whilst better examples of contrasting success and failure in international ­environmental protection are available, the provisions used are well recognised and have particular ­relevance to the contentions concerning human security. Many thanks to Dr Elizabeth Kirk for her contribution here.

Human Security versus Environmental Security: At Legal Loggerheads 47 A number of other factors have irrefutably influenced the success of efforts to reduce emissions of carbon dioxide through legal mechanisms, but the basic elements of the drafting approach, which has been taken to ensure the reduction of levels of emissions of the gas, are starkly contrasted to those used to achieve the same goal in relation to CFCs. This is reflected, it is suggested, in the positioning of environmental concerns in the hierarchy of considerations taken in the drafting and application of the legal instruments in question. The preamble of the Montreal Protocol on Substances that Deplete the Ozone Layer12 is clear in its ‘determination’ to protect the ozone layer by taking precautionary measures to control equitably total global emissions of substances that deplete it, with the ultimate objective of their elimination on the basis of developments in scientific knowledge, taking into account technical and economic considerations and bearing in mind the developmental needs of developing countries.13

The Kyoto Protocol14 to the United Nations Framework Convention on ­Climate Change15 by contrast merely refers back to the aims contained within the preamble of the Convention itself, which state the ‘­ determination’ to ‘protect the climate system for present and future generations’, whilst also considering the need for ‘sustained economic growth’, and that provisions ‘will be environmentally, socially and economically most effective if they are based on relevant scientific, technical and economic considerations’.16 The Montreal Protocol accounts for technical and economic considerations separately in relation to CFC reduction, suggesting they are of secondary concern, as opposed to Kyoto, which considers their environmental, economic and social viability as a whole, implying equality in the significance of each of those elements in achieving the aims of the ­Convention. Again, this may be an oversimplification as the number of practices and processes emitting carbon dioxide are far greater and include a far broader range of naturally occurring substances, however, valid and accepted parameters for their reduction are available. Approaches akin to those aimed at eliminating the production of CFCs altogether may ­therefore be transferrable. The reluctance of the Kyoto Protocol to focus upon the ­environmental concerns of climate change and to regard the economic and social

12  Montreal Protocol on Substances that Deplete the Ozone Layer UN Doc UNEP/002565 (1987) (1987) 26 ILM 1550 (Montreal Protocol). 13  ibid Preamble. 14 Kyoto Protocol to the United Nations Framework Convention on Climate Change (adopted 10 December 1997, entered into force 16 February 2005) (1998) 37 ILM 22. 15 United Nations Framework Convention on Climate Change (adopted 9 May 1992, entered into force 21 March 1994) (1992) 31 ILM 849 (UNFCCC). 16  ibid Preamble.

48  John Pearson c­onsiderations, which present little or no negative consequences to the environment, as necessarily peripheral to the central aim of reducing ­carbon dioxide to a measurable level has cemented its inefficacy. The ­Protocol is riddled with numerous concessions to anthropocentric ­concerns, most significantly, the imposition of a trading scheme allowing states to, in effect, ‘buy their way out’ of their international obligations under the treaty text in order to preserve their economic, social and developmental concerns. In turn, this has undermined the ability of the mechanism to curtail emissions globally, as evidenced by the recent passing of the threshold of 400 ppm17 of carbon dioxide in the atmosphere, which is considered to be a significantly difficult point from which to return. The assertion that international law is ultimately based on the consent of sovereign states is a valid one. The undeniable success of the M ­ ontreal Protocol would suggest, however, that this is not based solely upon naïve utopianism. Indeed, as further evidence, at the time of its drafting the ­Montreal Protocol was not universally regarded as the best means of achieving the cessation of the use of CFCs, yet it is now hailed as one of the most successful framework mechanisms in the history of e­ nvironmental law.18 The Kyoto Protocol by contrast lacks certain key parties, such as the United States, and is regarded by many as a ‘deeply flawed agreement that manages to be both economically inefficient and politically impractical.’19 Moving from the political difficulties in achieving consent to international treaties, the contrast in the success of the two protocols in p ­ ractice can be attributed to the differences in drafting and the priority that was given to the environmental goals, which form their respective purposes. The Montreal Protocol aims at the elimination of the use of certain ­substances in their entirety. Whilst such a goal with respect to carbon dioxide and other greenhouse gases is not possible, and could not therefore be set, achieving and legally imposing ‘carbon neutrality’ in particular industries, or in relation to certain products in the manner utilised by the Montreal Protocol, is not so inconceivable. The United Nations itself is committed to such a goal for the organisation by 2020, according to its 2012 report,20 which also contains a foreword by Secretary General Ban Ki Moon stipulating his belief that Member States have given the ­organisation ‘a mandate’ to achieve such aspirations.

17 

Parts per million. Former Secretary General to the United Nations Kofi Annan is widely quoted as having said that ‘Perhaps the single most successful international agreement to date has been the Montreal Protocol.’ K Annan, We the Peoples: The Role of the United Nations in the 21st Century (New York, United Nations Department of Public Information, 2005) 56. 19 WJ McKibbin and PJ Wilcoxen, ‘The Role of Economics in Climate Change Policy’ (2002) 16(2) Journal of Economic Perspectives 107. 20  A Steiner, ‘Foreword’ in UN Environment Programme (UNEP), A Vision of a Sustainable UN—2020 (UNEP, 24 October 2012) www.greeningtheblue.org/sites/default/files/vision_ sustainable_UN_27.01.13_3.pdf. 18 

Human Security versus Environmental Security: At Legal Loggerheads 49 In spite of this, the construction of the framework of human security reflects a priority hierarchy akin to that of the Kyoto Protocol rather than the Montreal Protocol, even though the latter has been hailed as the greater success. Given that the framework of human security ‘calls for people-centred, comprehensive, context specific and preventive responses’21 to threats to its component securities, this hierarchy undermines that core concept. This is because placing the concerns of developed and stable human situations alongside environmental concerns in any priority s­ tructure, fails to reflect the accepted position of the United Nations Development Programme that ‘the poorest regions of the world, which contribute least to the causes of global climate change, are most vulnerable to its consequences’.22 Instead, such a hierarchy is based on the flawed approach of balancing the concerns of the developed minority against environmental considerations. The assertion that the present approach fails to take into account the overriding importance of environmental security for all peoples is an ­ undeniably bold one. However, when the critical role of the environment in terms of the present and future goals for each of the other components of the human security framework is considered, the inadequacies of the current structure in arguably affording the most fundamental aspects of human security are evident. In this regard, the argument is that without some ­concept of environmental security being assured, other aspects of human security as overriding considerations are neither achievable nor justifiable. III.  POLITICAL PROBLEMS

Arguably the most difficult of the seven key components of human ­security to illustrate as dependent on environmental security, is that of political security. Broadly defined as comprising freedom from political repression by the state and organs thereof,23 the immediate relevance of the environment in avoiding such eventualities is not apparent. However, the UNDR 1994, which introduced human security in the form it is now conceived, itself proclaimed the connection between the two concepts. Indeed, upon reflection, and considering some contemporary and ­historical socio-political tensions, it is clear that ‘when people perceive threats to their immediate security, they often become less tolerant … Or where people see the basis of their livelihood erode such as their

21 

UN Human Security Report (n 3) 69. Development Programme—Global Environment Facility, ‘Annual Report: ­Adapting to Climate Change’ (May 2010) (UNDP-GEF, Annual Report) 16 www.un.org/ru/­ publications/pdfs/unep%20annual%20report%202010.pdf. 23  UNDP Report 1994 (n 1) 32. 22  UN

50  John Pearson access to water, political conflict can ensue.’24 Given also the variety of ­political ­situations internationally, both in terms of structure and form, and in relation to ­current affairs, the ‘emphasis on the interconnectedness of threats’25 in the field of human security would suggest that threats to political security ­arising from other factors would be the primary concern for this framework. Similarly, the ‘preventive’ approach of human security supports the ­contention that it is the causes of political insecurity that ought to be the focus of policy and legal approaches to ensuring human security. Indeed, to attempt to prevent political security without preventing its causes would be farcical. Enabling political regimes, regardless of the form they take, to provide for the most basic needs of its population is, therefore, the most logical approach to ensuring this component of human security. In this regard, ensuring environmental security, and the ‘basis of their l­ ivelihood’ in the broadest sense, is integral to preventing political ­insecurity from arising by virtue of discontent among peoples. Essentially, whilst political security is by no means guaranteed ­absolutely by protecting an environment capable of meeting the most basic needs of peoples, the failure to do so will dramatically increase the likelihood of political in security. As Sands notes, ‘a failure to protect the environment adequately may give rise to individual human rights ­violations, ­particularly in relation to rights associated with the enjoyment of a person’s home and property.’26 Similarly, it was noted in the Brandt Report that ‘ensuring survival’ through securing the most basic environmental features was necessary ‘to make the world more peaceful and less ­uncertain.’27 As such, it is clear that the United Nations’ suggested ­framework of human ­security for the development of international law and relations does not recognise this previously acknowledged ­necessity to ensure environmental security in order to avoid almost inevitable ­political insecurity.

24 

ibid 23. UN Human Security Report (n 3) 30. 26  P Sands and J Peel, Principles of International Environmental Law, 3rd edn (Cambridge, Cambridge University Press, 2012) 797. 27 Brandt Commission, North-South: A Program for Survival. (Report of the Independent ­Commission on International Development Issues) (London and New York, Pan Books, 1980) 77. 25 

Human Security versus Environmental Security: At Legal Loggerheads 51 IV.  FUNDAMENTAL FOR FOOD SECURITY

A connection between food and environmental security is far more apparent. In numerous texts published by the United Nations, it is stated that climate change is expected to affect agriculture and food security through its impacts on water availability, land and crop productivity, and the distribution and productivity of rangelands, fisheries and other ecosystems.28

The impact of adverse climatic and environmental changes upon almost all food sources is undeniable. For this reason there is considerable irony in the fact that livestock production to supply said food accounts for 18 per cent of greenhouse gas emissions, 26 per cent of the ice free terrestrial ­ ­ surface of the planet and eight per cent of global human water use.29 This set of statistics is compounded by the fact that ‘it is estimated that 30–50% (or 1.2–2 billion tonnes) of all food produced on the planet is lost before reaching a human stomach.’30 As such, preserving the ­environment through policies aimed both directly at that goal and at reducing the consumption of natural resources to produce food, including the waste thereof, will in turn eliminate a threat to food security. Such a suggestion, it must be conceded, is fairly broad in nature. Although the notion of climate change has been alluded to as a seminal factor, the issues of consumption and pollution of both water and land, the emission of non-greenhouse gases and non-organic waste, as well as the ability to produce the requisite energy needed to produce food on a scale to support a burgeoning global populace, are all inextricably linked to food security. All of these factors are subject to, or have proposed, p ­ olicy prescriptions or legislative instruments concerning them as a whole, or aspects thereof. This is illustrated by the fact that tailored responses to each are achievable. By contrast, the construction of an instrument to assure a prescribed level of security would not be possible owing to the inexorable p ­ lethora of ­ variables that such a text would have to take into account. The ­environmental factors listed above, as well as the domestic economic, social and health issues in each individual state, would have to be assessed and amalgamated to arrive at any comprehensive framework that is i­nclusive of all the potential factors influencing food security globally. Such an

28 

UNDP-GEF, Annual Report (n 22) 35. Nations Food and Agriculture Organisation, ‘Livestock’s Long Shadow: ­Environmental Issues and Options’ (Rome, May 2006) xxi–ii. 30 Institution of Mechanical Engineers, ‘Report: Global Food: Waste Not Want Not’ (­ January 2013) Executive Summary www.imeche.org/docs/default-source/reports/­ Global_Food_Report.pdf?sfvrsn=0. 29 United

52  John Pearson achievement, if possible, would result in the construction of an instrument that is likely to be so diluted as to be condemned to ineffectiveness. This criticism has already been levelled at international legal developments in relation to the closely aligned notion of sustainable ­ ­development.31 There it is contended that an inability to clarify the ­definition of the concept of sustainable development, and factors influencing it, have led to its ‘dilution into a concept with little meaning’.32 By contrast, the prioritisation of environmental security allows for the incorporation of scientifically imposed aims of a specific nature but also reflective of a global reality, such as the much vaunted rise in global temperature or parts of carbon dioxide per million in the atmosphere, to act as an indicator of the effectiveness of efforts to curb climate change. Multinational cooperation on environmental security could thus bring about national or regional approaches to achieving food security relative to particular national or regional situations. As a result, gaps in nutritional balances, poor harvests or the inability to grow particular foodstuffs could be balanced by economic markets and multilateral trade agreements. This in turn would reduce the need to create as great a volume of potentially cumbersome and ineffectual policy and legislation that must grapple with a concept so diverse, in terms of both its form and influencing factors, as that of food security. The contention that environmental security ought to be prioritised to avoid undermining the other component parts of human security, and therefore the proposed framework itself, does not account for factors of a non-environmental nature. More specifically in relation to food security, the issue of equitable food distribution domestically and internationally is one with considerable repercussions for, and emanations from, political security, given that ultimately not all individuals cultivate their own food and very rarely does an individual provide for all of their own and their dependants’ needs. Nor does such an approach assure healthy and ­balanced diets for the global populace potentially achieved by a free ­market in food, itself subject to social and political influence. However, we can be sure that failing to prioritise what ultimately allows us to cultivate food in the most basic sense, will inevitably result in food shortages and potentially give rise to threats to the political, economic, social and health security of individuals. As such, the interconnected nature of the component aspects of human security is not negated by the

31 See D Tladi, Sustainable Development in International Law: An Analysis of Key ­Enviro-Economic Instruments (Pretoria, Pretoria University Law Press, 2007) 80 www.pulp. up.ac.za/pdf/2007_03/2007_03.pdf. 32  D Tladi, ‘Sustainable Development, Integration and the Conflation of Values: The Fuel Retailers Case’ in D French (ed), Global Justice and Sustainable Development (Leiden, Martinus Nijhoff Publishers/Brill Academic, 2010) 76.

Human Security versus Environmental Security: At Legal Loggerheads 53 suggested prioritisation of environmental security. Achieving such an aim through a narrow approach would not be possible, given the aforementioned diversity of potential and interrelated factors that comprise food security. Assuring the basic environment on which measures to achieve the goals on which food security is based, is arguably realisable; certainly, the creation of provisions that bring about the critical factors in protecting food security is achievable. Even so, regulating a notion as subjective as ‘adequate food’33 or ‘dietary needs’34 could be fraught with difficulties and disagreement. Indeed, General Comment No 12 of the Economic and Social Council of the United Nations concedes, in its pronouncement on the right to adequate food, that ‘the precise meaning of “adequacy” is to a large extent determined by prevailing social, economic, cultural, climatic, ecological and other conditions, while “sustainability” incorporates the notion of long-term availability and accessibility’.35 Thus, the concept of sustainability is inexorably bound up with environmental stability. As such, there is already a degree of recognition of the overbearing significance of environmental security to the other aspects of human ­ ­security and, indisputably, in the case of food security. In this regard, instruments prescribing the maintenance of certain thresholds within the natural environment have both been suggested and put into force. The Kyoto Protocol is one such instrument. The absence of a text prescribing a specific target for nutrition, without any element of subjectivity, is notable and illustrative of the premise of this chapter—that only once ­environmental security has been adequately assured can any concept of food security also be achieved. V.  HARMING HEALTH

Similar to food security, the concept of health security bears apparent connections to, and dependencies upon, a certain standard of environment. The quality of air, cleanliness of water and avoidance of malnutrition through the production of food, as detailed above, are all critical aspects of ensuring the requisite level of health to describe an individual as secure in this regard. In turn, these aspects are all dependent upon the

33  UN CESCR, ‘General Comment No 12 Right to Adequate Food (Article 11)’ in ‘Note by the Secretariat, Compilation of General Comments and General Recommendations Adopted by Human Rights Treaty Bodies’ (12 May 2003) UN Doc HRI/GEN/1/Rev.6 (CESCR ­General Comment No 12). 34  ibid 9. 35  ibid 7.

54  John Pearson aforementioned standard of environment security that is capable of supporting the needs of individuals. Such aspects could, however, be ensured through the imposition of anthropogenic solutions to natural problems. For example, food could be transported to areas where it might otherwise not grow; similarly, water could be piped to arid areas or locations where natural water sources have been contaminated. The threats posed by adverse or abnormal environmental conditions are, however, far broader than the provision of the basic biological needs of air, food and water. By way of illustration, ‘Almost 40% of world ­materials consumption converts to the built environment,’36 and, whilst efforts are being made to increase the sustainability of both building practices and the materials used therein globally, absolute reduction of consumption is impossible. Thus, environmental security also plays a role in ensuring shelter for individuals, another aspect of health and also personal security that calls for some discussion. One area in which the potential threat to health security arising from adverse or abnormal environmental conditions has been subjected to ­considerable research is the area of infectious disease and sanitation. This is especially true in relation to developing states that suffer the impacts of environmental change most acutely. Focus has been placed on diseases such as dengue fever and malaria, the latter of which ‘is an extremely climate-sensitive tropical disease, making the assessment of potential change in risk due to past and projected warming trends one of the most important climate change/health questions to resolve.’37 The knock-on effects of climate and ecosystem alteration in relation to such carrier-borne diseases with their carriers, Arthropods, which are ‘exquisitely sensitive to climate’,38 are potentially immense. In a similar vein, the availability and quality of water, which is heavily dependent upon environmental security, is key in ensuring the reduction of c­ holera and diarrhoea, two of the largest killers of vulnerable individuals in the developing world. Therefore, to consider the role of water separately as an aspect of both food security and health security, fulfilling both differing and allied roles in each instance, would be farcical. Water is needed both to produce food and quench thirst and also to provide vital sanitation.

36 FM Pulselli, RM Pulselli and E Simoncini, ‘Environmental Accounting of Buildings: Outcomes from the Energy Analysis’ in U Mander, CA Brebbia and E Tiezzi (eds), Sustainable City IV: Urban Regeneration and Sustainability (Southampton, WIT Press, 2006) 490. 37  JA Patz, and SH Olson, ‘Malaria Risk and Temperature: Influences from Global Climate Change and Local Land Use Practices’ (2006) 103(15) Proceedings of the National Academy of Sciences of the United States of America 5635. 38 PR Epstein, HF Diaz, S Elias, G Grabherr, NE Graham, WJM Martens, E Mosley-­ Thompson, and J Susskind, ‘Biological and Physical Signs of Climate Change: Focus on ­Mosquito-borne Diseases’ (1998) 79(3) Bulletin of the American Meteorological Society 409.

Human Security versus Environmental Security: At Legal Loggerheads 55 Applying a global framework that attempts to secure both functions of water would potentially give rise to a clash of priorities. Similarly, infrastructures to supply water to all regions vary considerably from ­ one state to another. To prescribe a policy that fits all situations would be immensely difficult and any enforceable provisions to ensure these aims would be rendered ineffectual. In this regard, therefore, the most ­universal approach would again be represented by the application of ­specific and measurable environmental standards aimed at preserving both water quantity and quality. This might take the form of the reduction of water consumption, increases in recycling and the restriction or elimination of practices that excessively consume or make unrecyclable this essential resource. Similar measures might be applied to reduce consumption of natural resources in the construction industry. Meanwhile, food security could be taken into consideration in the construction of such a framework based around the security of an environment that is able to support the most basic aspects of human health for all. From such a basis, aspects of health security in relation to individual states, regions and even continents could be applied at a more appropriate level and in response to specific threats. Thus, whilst malaria is a significant health concern in Africa, to consider it within the formulation of a global framework on health security would be remiss when a regional measure would be more appropriate to that specific threat. By contrast, the provision of adequate water for sanitation and food to stave off malnutrition and to avoid diseases brought about by such deficiencies, and at the same time reducing the spread of more regionally focused diseases by maintaining a more predictable climate, is an appropriate global focus. Such aims would therefore be best served by the ­prioritisation and active protection of environmental security as a basis for a framework on which health security and the other component securities of human security could be established. VI.  PERSONAL PERILS AND CONDEMNED COMMUNITIES

The concepts of personal and community security may be considered in conjunction with, and in relation to, the potential threats that unfavourable environmental conditions might pose. Personal security is firstly derived from the desire of the individual to be free from potential physical harm or violence. Community security recognises the desire of individuals to be a member of a community and to reap the benefits thereof. This is irrespective of whether the basis for said interaction between individuals is cultural, religious, geographical or otherwise. In both cases, the form of security and threats thereto can take numerous forms and can also be undermined or enhanced by environmental factors.

56  John Pearson As has been acknowledged, ‘When people perceive threats to their i­mmediate security, they often become less tolerant … Or where ­people see the basis of their livelihood erode such as their access to water, ­political conflict can ensue.’39 More specifically, the 1994 UNDP Report that defines the concept of human security, as discussed here, re-iterates the point that there is an increased likelihood of reduced tolerance, x ­ enophobic p ­ ractices and instances of oppression resulting in violent protests as a result of concerns regarding immediate security.40 Such individual and ­ communal perceptions of threat are incomprehensibly numerous and subjective. However, as Walker states: for some people and some social groups the environment is an intrinsic part of living a ‘good life’ of prosperity, health and well-being, while for others the e­ nvironment is a source of threat and risk, and access to resources such as energy, water and greenspace is limited or curtailed.41

This variation in perceptions and instances of threats raises feelings of insecurity that severely constrain the efficacy of any response thereto whether based on policy or legislation. An all-encompassing response to all potential threats to personal and community security is unequivocally unachievable. Indeed a response to all potential threats to any one of the component securities of the suggested framework of human s­ ecurity, ­considered by the UNDP Report 1994, is arguably unfeasible. As such the framework should reflect that reality, and nowhere is this truer than in relation to personal and community security, and threats thereto. No ­single framework could hope to encompass all possible causes of threats to personal security and community security. The suggested inefficacy of such an approach is based on the argument that the potential threats, which are under consideration, are highly ­variable owing to differing historical, political and social contexts within a state or region and even within smaller federal subdivisions. For example, the relations between the indigenous peoples of the United States of America and Canada and their respective state organs contrast in numerous crucial ways, such as in relation to property ownership and even when it comes to the classification of ‘indigenous’. Similarly, the causes of threats to an individual’s personal security could be equally as diverse. Even where such threats only emanating directly from state organs are considered, such as persistent police or armed forces brutality, violent protest against policies, or intentional segregation and ill-treatment of a designated group, the underlying causes are incomprehensibly divergent. The threats to these two component securities arising from the 39 

UNDP Report 1994 (n 1) 23.

41 

G Walker, Environmental Justice: Concepts, Evidence and Politics (Oxford, Routledge, 2012) 1.

40 ibid.

Human Security versus Environmental Security: At Legal Loggerheads 57 continuing political violence in Syria and the protests in London arising from the imposition of raised tuition fees for higher education students ­differ both in form and severity, similarly the source of discontent in each case that provoked the responses constituting those threats is not shared equally. Similarly, any international response to these examples would be based on significantly dissimilar political, social and economic contexts and degrees of influence external to the state. These two instances are by no reasonable means comparable and yet both give rise to threats to personal and community security, if the definitions provided in the 1994 UNDP Report,42 which suggest they are components of the broader framework of human security, are taken into account. To maintain, therefore, that a ­single conceptual framework for on-going and future policies and actions by states, within regions or on a global scale, could hope to take into account such variation and respectfully direct future measures would, at best, be remiss. Thus, the potential causes that can be addressed on a level outside of those wildly variant national contexts ought to form the basis of any framework originating from outside them, with issues of a nature primarily relative to states being subject to similarly relative domestic responses. Such an approach is akin to the notion of ‘weak cultural relativism’ proposed by Donnelly in his consideration of approaches to strik­ ing a ­balance between a utopian vision of a universal human rights regime and respect for the diversity of culture globally. He suggests an approach in which ‘Universality is initially presumed, but the relativity of human nature, communities, and rules checks potential excesses of ­universalism.’43 Whilst Donnelly only considers the implications of imposing rules over, or submission to, cultural variations in relation to human rights law and the moral validity thereof, his premise is ­undeniably applicable to the l­ imitations of the concept of human security considered above. Beginning from the premise that there are some policies capable of ­forming a universally applicable framework to which all states could adhere in relation to threats to community and personal security, and indeed entire component securities, is appropriate, the perception that all eventualities within all states could be encompassed by any such framework is farcical. In addition, it would potentially lead to the ‘excesses of universalism’ of which Donnelly warns. The imposition of a framework that fails to take into account the variability of national,

42 

UNDP Report 1994 (n 1) 30–32. J Donnelly, Universal Human Rights in Theory and Practice (New York, Cornell University Press, 2003) 90. 43 

58  John Pearson social and ­economic contexts could lead either to it being disregarded by states or to the rejection of its implementation by the very individuals whose rights it is intended to secure. The difficulty in imposing a ­framework such as that of human security, as suggested in the 1994 UNDP Report,44 and any necessary legislative underpinning, rests in finding universal threats and concerns that can be combatted effectively using ­international responses. The scientific basis for a human security framework that safeguards the aspects of environmental security underpinning it, and which is in turn integral to ensuring the other component securities, is by its very nature universal. This is because it is composed of accepted and collated data and knowledge from states. Thus, responses to threats may be based on the objective conclusions attained by analysis of said data. Political and economic considerations can then be taken into account where necessary, for example, in the cases of a need for positive responses bearing considerable costs or the restriction of highly profitable commercial enterprises. This was the case in relation to the provisions concerning CFCs in the Montreal Protocol,45 at the time the most widely used refrigerant globally. VII.  EMBRACING ECONOMICS

The economic costs of prioritising environmental security are potentially dissuasive from implementing such an approach in some instances. This is especially true where the necessary action requires the use of t­ echnology or resources held primarily by developed nations. In such instances it is regrettably often the geographic regions where the ­ security of the ­environment must be assured as a priority to avoid the most damaging threats to the other component securities that are subject to the s­ overeignty of lesser developed nations. The potentially massive increase in the prevalence of carrier borne ­diseases, such as malaria and dengue fever, owing to relatively minor climatic changes, discussed above, is a prime example of this irony. ­Ultimately, however, the distribution of resources and the sharing of technological and scientific knowledge and equipment will be determined largely by bilateral or multilateral agreements made outside of the sphere of the institutions imposing any framework based upon, or akin to, that of human security. This reality is predicated upon and defers to the continuing respect for the sovereignty of states,46 all but e­ liminating the ­potential 44 

UNDP Report 1994 (n 1) 24. Montreal Protocol (n 12). 46  See in this regard H Steinberger, ‘Sovereignty’ in R Bernhardt (ed), Encyclopedia of Public International Law, Vol IV (Amsterdam, Elsevier, 2000) 501. 45 

Human Security versus Environmental Security: At Legal Loggerheads 59 for any ­ legislative instrument that could impose such ­ magnanimous action. As such, economic considerations of this nature must be accepted as being beyond the realms of any such framework o ­ utside of a g ­ eneral non-­ binding obligation to share and promote the sharing of such resources where their use is inextricably bound up with the aim of said policy framework. Whilst the suggested framework must negate to the greatest degree any possible economic influence upon the principles and policies espoused within it and any binding provisions arising therefrom, the role of that framework, based upon the prioritisation of environmental security in ensuring elements of economic security, is a significant consideration. The concept of economic security presented by the 1994 UNDP Report focuses on the notion of ‘a basic income—usually from productive and remunerative work’.47 However, in the more recent conceptions of the framework, a broader approach to this component security is ­evident. Indeed, in relation to the global financial and economic crisis, ‘the ­multidimensional effects’,48 and, most pertinently, the ‘ecological costs’49 thereof, have been recognised. Whilst the concept suggested in the 1994 UNDP Report reflected an emphasis on job and income security, rather than a more broad conception of the economic security of individuals, the breadth in the more recent considerations50 of the concept are reminiscent of the notion of the human right to a livelihood,51 and the ability to sustain oneself and dependants,52 as perceived in international law. Indeed, the 2012 text following the earlier resolution of 2010, which considered only economic variations and issues in relation to states, also recognises the threats to the ‘livelihood’ of individuals. Such a progression is reflective of the reality that whilst macroeconomic policy, which supports financial and commercial infrastructures, is an area of concern, and onto which a framework might be applied, ensuring the ability to provide for the most basic needs of individuals at a national level is paramount. Sustenance, sanitation and shelter are the three key needs in this regard, yet in the modern context rarely is a family or group able to provide all of these for itself in its entirety. Instead, some semblance of an economic transaction will occur and will do so regardless of the ­macroeconomic climate. Instead, it is predicated on the most basic of abilities to provide. An individual would be far less concerned, if indeed

47 

UNDP Report 1994 (n 1) 25. UN Human Security Report (n 3) 35. 49 ibid. 50  ibid 6 and UNGA Res 60/1 (n 4). 51  International Covenant on Economic, Social and Cultural Rights (adopted 16 December 1966, entered into force 3 January 1976) 993 UNTS 3 (ICESCR) Article 11. 52  As interpreted in UN CESCR General Comment No 12 (n 33). 48 

60  John Pearson at all, with macroeconomic issues were they able to provide for all their own needs for themselves and their dependants, without the need for any external assistance or interaction. In this regard, it is essential that basic environmental factors enabling such actions are assured, as highlighted in the 2010 resolution where an emphasis is placed upon the reality of the ‘interconnectedness of threats’53 and ‘interdependence of the challenges we face’.54 Specifically, the text considers that ‘the impact of rising food prices along with climate-related emergencies, protracted conflicts and the global financial and economic crisis is of particular concern to human security.’55 It does not, however, consider whether all such impacts might, in part at least, potentially stem from environmental security concerns and threats. The connection to food prices and climatic issues is apparent and the ­relationship between the discontent arising from such issues is often a cause, or increases the likelihood, of conflict of a physical nature, which in turn poses a threat to personal and community securities. Similarly, the more traditional notions of economic security are subject to the influence of environmental alterations and impacts. The recent rises in food prices are partially attributable to extreme weather and climatic conditions, which in turn place inflationary pressures on economic policy makers the world over.56 Continued reliance upon non-renewable fuel sources, and the inevitable political influence their possession gives a state, are also issues with inextricable environmental security aspects and give rise to concerns about the other component securities that have already been discussed.57 The stability of the market relies, amongst other things, upon environmental factors. Fluctuations in stock market prices of significant corporations and the value of key national currencies in response to events of an environmental nature are clear evidence of this. Irrefutable proof of the impact of human activities on climatic and weather conditions is not, however, universally accepted. Indeed, where it is, the degree of the said impact is certainly not uncontested. As such, all threats to human security arising from natural sources, whether caused by our actions or otherwise, cannot be controlled by politicians or ­lawyers. However, measures to stabilise food prices, impose the greater use of ­sustainable energy sources, eliminate harmful emissions and pollution,

53 

UN Human Security Report (n 3) 30. ibid 31. 55  ibid 38. 56  International Monetary Fund, ‘Global Monitoring Report: Food Prices, Nutrition and the Millennium Development Goals’ (IMF, 2012) 114. 57 J Scheffran, M Brzoska, PM Link, HG Brauch and J Schilling (eds), Climate Change, Human Security and Violent Conflict: Challenges for Societal Stability (London, Springer, 2012) 763. 54 

Human Security versus Environmental Security: At Legal Loggerheads 61 or reduce waste, can be imposed through a legislative underpinning to a conceptual framework such as human security. Those tasked with implementing a human security framework must take into account that the security of the environment represents a ­foundation stone to its success. In turn, such a foundation adds an element of certainty to factors such as those outlined above, thereby giving rise to a more stable basis for economic security where the ability to afford the most basic of needs is more commonplace than at present. The hope of reducing poverty to zero is a highly utopian, if admirable, goal. Ultimately, however, the distribution of even the most fundamental of resources is bound up with incalculable external factors, ranging from economic, through political, to even community concerns. To suggest that any significant improvement in the current levels of income and resource distribution, job security, or the ability to provide for oneself and dependants could be achieved and maintained without a stabilisation of the key aspects of environmental security to the greatest degree possible, would be remiss. As such, the connection suggested between the component concepts of human security and environmental security is also evident in relation to economic security. Whilst environmental security does not ensure economic security alone, the lack of the fundamental aspects of environmental security, nationally, regionally or globally, doom any prolonged concept of economic security to failure or meaninglessness. By way of example, an individual with considerable wealth and an assured occupational status is by no means secure if he cannot feed himself or his family owing to a lack of supply of basic foodstuffs. In such a scenario, his economic security, in terms of monetary wealth, becomes diminishingly relevant. VIII.  FINDING COMMON GROUND

The concept of human security is based upon the common needs and concerns of all peoples. It has an ethical basis that resembles the foundation of human rights law in ‘inherent human dignity.’58 Individual fundamental human rights, enshrined in all human rights texts, are based upon common moral and ethical positions shared by all peoples to some degree, such as the value of human life, the degrading and barbaric nature of torture, a fair trial to deal with breaches of the law, democracy and equality. Whilst all human rights are not universally applied, for the most part, a

58  Universal Declaration of Human Rights (adopted 10 December 1948) UNGA Res 217 A(III) (UDHR) Preamble.

62  John Pearson base level of fundamental aspects of the rights, as drafted, can be found in the form of non-derogable rights or minimum core obligations placed upon states in international treaties. Nevertheless, common positions in relation to the component securities of human security, which were considered above, are not so forthcoming. As has been discussed, a degree of relativity is required when suggesting a universal framework that might be potentially applicable to all situations. For any framework to be applicable and its goals achievable, a degree of commonality must be found onto which some structure of compliance with measures to achieve those goals can be mapped. As Blanco and Razzaque rightly argue, ‘in order to have an effective system of compliance it is necessary to have an agreed system of rules and standards’.59 Thus, in order to have both a basis upon which to build the framework and any degree of success and direction to its development, there must be some degree of compliance. Returning to the a­ nalogy of human rights, the right to life,60 by way of example, is disputed in relation to the death penalty and abortion, and indeed various levels are applied in its enforcement.61 While arbitrary killing, on the part of the state, is u ­ niversally regarded as a breach of the right, the establishment of ­universal minimum standards for the component securities is not so simple. Contempt for the arbitrary taking of another human life is a shared norm throughout different cultural, political and social structures across the globe, with clear parameters between the living and the dead and without an established defence prescribed by law. Shared economic norms, beyond the ability to provide for the most basic of human needs, are not as readily ascertainable. Even those needs themselves, and the means by which they may be met, vary from an individual in a developed state to one in a less developed situation. As Donnelly states, ‘“human needs” is almost as obscure and controversial a notion as “human nature”’.62 Job and income security are suggested as indicators of a level of human security within the 1994 UNDP Report,63 though this fails to take into account the broader application of economic security, as espoused by the later texts concerning the framework that is supposed to cater for the most basic needs of the individual. To illustrate, although this would be

59  E Blanco and J Razzaque, Globalisation and Natural Resources Law (Cheltenham, Edward Elgar, 2011) 251. 60 International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR) Article 6. 61  With regard to abortion, see American Convention on Human Rights (Pact of San José) (adopted 22 November 1969, entered into force 18 July 1978) 1144 UNTS 123 Article 6; with regard to the death penalty, see ICCPR Article 6. 62  Donnelly (n 43) 13. 63  UNDP Report 1994 (n 1) 38.

Human Security versus Environmental Security: At Legal Loggerheads 63 unlikely to be the case, the relevance of employed status or the comfort of an income for an individual would be non-existent if they did not, by extension, afford the ability to provide the basic necessities of life for ­oneself and one’s family owing to prevailing environmental conditions. Health is by no means a universal concept either, average life expectancy, degree of inoculation from viral infection, access to clean and safe ­drinking water and a toilet are by no means universally assured to any degree, nor do they, even if assured, ‘secure’ health. Imposing a reality with these factors effectively assured through a global framework and based, where possible, upon an objective legislative basis, without ­taking into consideration local realties, would fail. The effective regulation of access to drinking water, for example, considering the natural prevalence of the resource, the availability and efficiency of recycling and use for other needs, such as food production, or economic realities facilitating payment for water in every instance, would not be possible. Similarly, the concept of food security is reliant upon unpredictable ­factors at a level that is unmanageable from any degree of detachment, such as the global context. Local prevalence of water, weather, native fauna and flora, cultural and traditional preferences and economic incentives for producing non-edible products are a mere selection of the ­factors that may have a considerable impact upon this component security, as has been discussed. As such, finding common standards applicable to all situations would again be nigh on impossible. Even the notions of ‘an ­adequate standard of nutrition’ or ‘sufficient food’ are fraught with subjectivity with regards to differing perceptions of adequacy and sufficiency.64 The imposition of a specific, personal, political or community reality, or aspects thereof, would not only potentially increase tension in certain contexts, increasing the likelihood of disturbance and thus threats to the very securities intended to be protected, but might also constitute a breach of the aforementioned human rights to freedom of speech, expression and association. Indeed, the imposition of political, community and personal standards at a national or regional level is arguably, from a ­historical perspective, one of the most common causes of conflict. This fact has been recognised by the concept of self-determination, which is present in numerous international legal texts, especially concerning human rights, and is itself inextricably connected to the suggested framework of human security.

64  In this regard, one need only consider that there was a need to publish a text suggesting methods to achieve the realisation of this concept. See United Nations Food and Agriculture Organisation, ‘Methods to Monitor the Human Right to Adequate Food’ (Rome, 2008).

64  John Pearson Common environmental standards are, however, potentially ascertainable and indeed have been found in relation to a number of factors. The inherently scientific nature of such standards is arguably at the root of this reality. Common scientific standards in relation to food and health s­ ecurity may be equally achievable, but the aforementioned need to consider c­ultural, political and economic realities is unavoidable. E ­ nvironmental standards, which are common to all states and regions, are, however, both ascertainable and universally implementable, whether through abstention from particular practices, or through greater efficiency in other practices. As a basis for a policy framework such as human s­ ecurity, this allows for minimum standards not only to be set, but also to be enforced. The ability afforded by the scientific basis for environmental protection to set objective and specific thresholds that can form the basis for binding provisions, as evidenced by international environmental law ­generally, is the key to the identification and implementation of such a basis. As the other component securities of the human security framework cannot provide such a basis, as discussed above, there is also an argument of practicality to using this component security as an enforceable basis upon which to build the framework. Whilst this contention is based upon the presumption that such a base is required, the likelihood of states foregoing their self-interests to ensure human security to a minimum degree common to all states, and not reneging on a non-binding commitment to do so at any point, even in the face of threats to their own security, is miniscule. Gillespie suggests one theory amongst many to explain the current actions of states with regard to environmental protection at a level above the national sphere. The ‘self-interest justification’ theory proposes that ‘nations pursue interests at the cost of other nations’65 and there is undeniably evidence of this to some degree in negotiations regarding innumerable environmental texts. An enforceable minimum obligation, akin to that suggested in relation to economic, social and cultural rights in international human rights law,66 would, however, potentially ensure a basic standard of environment to support the progression of human security. Provisions enshrining such a basic standard of environment would also allow states to compare and criticise each other in relation to those obligations, thereby improving adherence to them by enabling them to utilise diplomatic pressure to direct others to meet the targets set. A communal model of enforcement

65  A Gillespie, International Environmental Law Policy and Ethics (Oxford, Oxford University Press, 2002) 25. 66  CESCR General Comment No 3 (n 9) 10.

Human Security versus Environmental Security: At Legal Loggerheads 65 and compliance, reducing ‘the need for enforcement mechanisms’,67 and that goes beyond monitoring of the standards set, would thus emerge in a manner akin to that suggested by Blanco and Razzaque. This is a far cry from the theory of ‘deep ecology’, whereby the need to protect the ­environment is placed above the need to protect the individual or state. However, discerning a common standard, a minimum that all, or most, states would be happy to pursue individually and to be held to ­collectively, would achieve a similar result. Such a position would, ­theoretically, sit between the anthropocentric and deep ecological approaches, finding a middle ground between human needs and ecological preservation. Such a reality would not be possible if human security alone were to be p ­ rioritised above the composite elements that have already been discussed. Instead, a narrower anthropocentric paradigm, based on short term considerations, would emerge and the environment would ‘only be ­ conserved on account of the instrumental values attributed to it by ­ humans’,68 and without an overbearing consideration for the impacts to the environment as a whole. The setting of specific thresholds would also lead to greater cooperation in achieving them, where the benefits of shared action warrant such decisions and a judgement could be more ­easily reached in light of clear and universal goals of the type offered by scientifically backed environmental standards. Again, it should be reiterated that such a reality in no way assures human security globally. Yet, to fail to protect that which underpins it in incalculable and inextricable ways, as the environment does, would be foolhardy. IX. CONCLUSION

The concept of human security is by no means a completely flawed one, indeed the consideration of the numerous influences on the ‘freedom from want and freedom from fear’ suggested by the composite definition, is more reflective of the interconnectedness of reality than many measures that are constructed within the international legal and political sphere. Rarely, if ever, is a non-binding text so inclusive of factors that might ­otherwise be deemed irrelevant or excluded, owing to overbearing ­political and participatory considerations. As Helm points out in relation to the Kyoto Protocol, although the dilemma he outlines is more broadly valid, ‘trying to be too ambitious early has left the main players … on the side-lines.’ While ‘some element of international altruism’ is necessary to

67  68 

Blanco and Razzaque (n 59) 251. Gillespie (n 65) 17.

66  John Pearson achieve environmental aims, the reality is that in relation to undertaking efforts to fulfil some of them, in many senses, ‘countries are better off if they do not’.69 In order to construct a basis onto which binding legal obligations can be applied in order to keep states committed to the common goals such a framework aspires to achieve, common minimum grounds must be found. As Helm goes on to state with regard to any binding international ­environmental legal text when ‘sufficient countries ratify it so that it comes into effect, it provides perhaps the only credible means of asserting moral pressure’70 on other states. Economic, political, community and personal securities are inherently variable and are influenced by an incalculable number of factors. ­Similarly, the most basic aspects of health and food securities can be threatened by an equally immeasurable series of possibilities. A basis for a framework aimed at ensuring such securities, must be constructed around common standards, objectively measurable and attainable by all, whilst allowing the requisite elements of relativity. This balancing act has plagued the development of international law in a broad sense, but the balancing of community, national and regional concerns with global goals is no more prevalent than in relation to environmental law. In spite of this, however, irrefutable successes have been achieved in this field where short term anthropocentric concerns have not been given priority—the Montreal Protocol, discussed earlier in the chapter, is a clear example. To have any hope of achieving the goals it espouses, the framework of human security and legislation stemming from this concept must also take this approach. As has been shown, whilst human security and the six other component securities, beyond that of environmental security, are not guaranteed by a minimum level of environmental security, the ­failure to achieve any definition of them without it, is. There is something of an irony that it is an environmental threat to human security that forms the basis of an analogy of the delicate nature of the concept, when it is stated that Among these seven elements of human security are considerable links and ­overlaps. A threat to one element of human security is likely to travel like an angry typhoon to all forms of human security.71

However, it is another environmentally inspired analogy that more aptly describes the relationship between the component aspects of human

69 D Helm, ‘Climate Change Policy: a Survey’ in D Helm (ed), Climate-Change Policy (Oxford, Oxford University Press, 2005) 26. 70 ibid. 71  UNDP Report 1994 (n 1) 33.

Human Security versus Environmental Security: At Legal Loggerheads 67 s­ ecurity, which have already been considered, that of the house built upon the sand, which is doomed to collapse. Human security and ­environmental security as conceptual frameworks would only be at legal loggerheads where an implementation of the former failed to consider the integral role of the latter, or where efforts were made to apply it absolutely, without any regard to this fact. Thus, the construction of a framework aimed at ensuring freedom from want and fear, and any legislative or ­policy ­instruments stemming therefrom, would be predestined to fail if it did not take into account the inextricable reliance we, as individuals and as a national, regional and global society, retain upon the natural environment around us to provide for the most basic needs of that which it sets out to secure—the human being.

68

4 Regional Security and International Law JULIA SCHMIDT

I. INTRODUCTION

I

N THE AFTERMATH of World War II, Robert Schuman proposed to secure peace in Europe by linking the key industries of the former ­enemies France and Germany together. The coal and steel industries of both countries were to ‘be placed under a common High ­Authority, within the framework of an organization open to the participation of the other countries of Europe’.1 Luxembourg, Italy, Belgium and the ­Netherlands joined both states in the European Coal and Steel Community in 1951. After several rounds of enlargement, the EU today counts 28 Member States. In October 2012, the EU’s ‘successful struggle for peace and ­reconciliation and for democracy and human rights’ and its ­contribution to the transformation of ‘most of Europe from a continent of war to a continent of peace’ was awarded the Nobel Peace Prize.2 The EU has gone through a profound transformation as a regional ­security provider—not only in its perceived role, but also in its actions. Early attempts, inspired by the Korean conflict of 1950, to create a ­European Defence Community, under whose umbrella Member States’ troops would have transformed into a European army,3 failed.4 During the time of the

1 R Schuman, The Schuman Declaration (9 May 1950) http://europa.eu/about-eu/ basic-information/symbols/europe-day/schuman-declaration/index_en.htm. 2  The Norwegian Nobel Committee, ‘Announcement The Nobel Peace Prize for 2012’ (Oslo, 12 October 2012), nobelpeaceprize.org/en_GB/laureates/laureates-2012/announce-2012/. 3  Article 9 EDC. 4 On the European Defence Community see M Trybus, ‘The Vision of the European Defence Community and a Common Defence for the European Union’ in M Trybus and ND White (eds), European Security Law (Oxford, Oxford University Press, 2007) 13–42; RA Wessel, The European Union’s Foreign and Security Policy: A Legal Institutional Perspective (The Hague, Kluwer Law International, 1999) 1–5.

70  Julia Schmidt Cold War, Europe was often viewed as being incapable of becoming a major military actor.5 Due to the pressure of the superpowers on Europe, its potential to influence questions of security was regarded as being ­limited to its own continent—if possible anywhere.6 Today, Europe has moved away from being a civilian power.7 Within the last 15 years especially, it has responded to new types of threats and has acquired a new security mandate. When confronted with its inability to adequately respond to the Balkan crisis on its doorstep in the 1990s, the Cologne E ­ uropean ­Council marked the birth of the EU’s common security and defence policy.8 A process was put in motion that equipped the EU with the legal capacity and the civilian and military means to engage in ‘missions outside the Union for peace-keeping, conflict prevention and strengthening international security’.9 Civilian and military means may be used by the EU to fulfil the so-called ‘Petersberg tasks’ that include, but are not limited to, ‘joint disarmament operations, humanitarian and rescue tasks, military advice and assistance tasks, conflict prevention and peace-keeping tasks, tasks of combat forces in crisis management, ­including peace-making and post-conflict stabilisation’.10 Within the last decade, the EU has conducted more than 30 civilian and military crisis management missions all over the world. So far, European military c­ risis management operations have been dominated by humanitarian and peacekeeping m ­ issions,11 but the 12 EU has the legal capacity, and has expressed the political will, to engage in robust peace-enforcement as a last resort.13 The EU is just one of many regional organisations with a security mandate. Some organisations, such as NATO, have been founded to ­

5  F Duchêne, ‘Europe’s Role in World Peace’ in R Mayne (ed) Europe Tomorrow: Sixteen Europeans Look Ahead’ (Fontana, Fontana/Collins in association with Chatham House and PEP, 1972) 32, 37. 6  Duchêne (n 5) 37–39. 7 For a discussion on the concept of a civilian power Europe, see C Bretherton and J Vogler, The European Union as a Global Actor, 2nd edn (Abingdon, Routledge, 2006) 41–42. 8 Cologne European Council, Presidency Conclusions, 3 and 4 June 1999, Annex III, ­European Council Declaration On Strengthening The Common European Policy on Security and Defence para1. 9  Article 42(1) Consolidated version of the Treaty on European Union (26 Ocotober 2012) OJ C 326/13 (TEU). 10  Article 43(1) TEU. 11  See, eg Operation CONCORDIA/FYROM, Council Joint Action 2003/92/CFSP on the European Union military operation in the Former Yugoslav Republic of Macedonia [2003] OJ L 34/26; Operation EUFOR RD Congo, Council Joint Action 2006/319/CFSP on the ­European Union military operation in support of the United Nations Organisation Mission in the Democratic Republic of the Congo (MONUC) during the election process [2006] OJ L116/98. 12  Article 43(1) TEU. 13  European Council, ‘A Secure Europe in a Better World: European Security S ­ trategy’ (Brussels, 12 December 2003) consilium.europa.eu/uedocs/cmsUpload/78367.pdf ­[hereinafter European Security Strategy] 11.

Regional Security and International Law 71 ­ rovide security; others have been designed to further economic interests p and have acquired a security mandate over time.14 The latter respond to the changing nature and origins of threats in a globalised society, which make it impossible for states to secure their citizens independently. The 1945 design of the UN Charter places the primary responsibility to restore and maintain international peace and security on the United Nations Security Council (UNSC) and foresees only a secondary role for regional arrangements. In practice, regional organisations, whether they fall within the scope of Chapter VIII of the UN Charter or not, assist the UN in hard security tasks, including peace-enforcement. They provide the UN with much needed resources and rapid reaction mechanisms. Although ­multilateralism can help to overcome some of the UN’s shortcomings, multilateralism also challenges its universal security system. This chapter begins with a brief overview of the developments that ­enabled regional organisations to become security providers and focuses in particular on regionalism and a changed perception of threat-relations. This is followed by an analysis of the legal framework provided by the UN Charter for the use of force by regional security providers, such as the EU, the Economic Community of Western African States (ECOWAS), NATO and the African Union (AU). It will be argued that it may be necessary to draw a distinction between regional organisations acting under ­Chapter VIII of the UN Charter and international organisations of regional ­character acting under Chapter VII. By looking at the intervention in Mali in 2013, Section IV turns to the cooperation between regional actors and the UN in military matters in practice. The final section addresses the challenges ­created by multilateralism for the system of the UN, by examining the practice of some regional actors who used force without a prior and explicitly obtained UNSC mandate and the autonomy claims put forward by others. II.  THE DEVELOPMENT OF REGIONAL ORGANISATIONS AS SECURITY PROVIDERS

Regionalism and a changed perception of threat-relations have been i­ nfluential in the development of regional organisations as security ­providers. The EU is often referred to as a key example of regionalism15

14 EJ Kirchner and R Domínguez, ‘Regional Organizations and Security Governance’ in EJ Kirchner and R Domínguez (eds), The Security Governance of Regional Organizations (­London, Routledge, 2011) 1, 3 and 5. 15  M Schulz, F Söderbaum and J Öjendal, ‘Introduction: A Framework for Understanding Regionalization’ in M Schulz, F Söderbaum and J Öjendal (eds), Regionalization in a Globalizing World: A Comparative Perspective on Forms, Actors and Processes (London, Zed Books, 2001) 1.

72  Julia Schmidt and is viewed as a role model for other regions to strengthen cooperation and integration.16 Regionalism is a developing concept.17 In its o ­ rigin, the project of the EU has been linked to ‘old-regionalism’.18 In the first two decades of the Cold War, regionalism was traditionally imposed from the outside and was seen as a strategy to achieve prosperity and ­security.19 ‘New regionalism’ started to emerge in Europe in the mid-1980s with the Single European Act (SEA) and began to spread to other parts of the world later on.20 The SEA codified the results achieved by the ­system of ­European Political Cooperation, a predecessor of the EU’s common f­ oreign and security policy. The inclusion of political elements into a ­system of economic integration is one of the characteristics of ‘new regionalism’, which is based on the notion that economic matters are linked to other parts of society, such as security.21 ‘New regionalism’ has been conceived as a product of several developments in the universal system, one of them being globalisation.22 In contrast to ‘old regionalism’, ‘new regionalism’ is ­usually associated with a process from below which is encouraged from within the region23—a development that ­enabled regional ­organisations to ‘become actors in their own right’.24 The development of regional organisations as security providers is also interlinked with a change in the perception of threats and security concepts. At the time of the Cold War, states were considered not only to be the main providers of security, but also to be its main referent objects. State security was often approached as a zero-sum game25 and threats were predominantly perceived to come from the outside and to be military in nature. International security was viewed as being particularly threatened by the possibility of a nuclear war, the usage of biological weapons

16  M Schulz; F Söderbaum and J Öjendal, ‘Conclusion’ in Schulz, Söderbaum and ­Öjendal (n 15) 250, 262; J Peterson et al, ‘The Consequences of Europe: Multilateralism and the New Security Agenda’ (2008) Mitchell Working Paper Series 3/2008, Europa Institute, The ­University of Edinburgh www.law.ed.ac.uk/file_download/series/41_­theconsequencesofe uropemultilateralismandthenewsecurityagenda.pdf, 6. 17 Sometimes, a distinction is made between regionalism and regionalisation and ­definitions appear to differ widely. See, eg P Schmitt-Egner, ‘The Concept of ‘Region’: ­Theoretical and Methodological Notes on its Reconstruction’ (2002) 24 Journal of European Integration 179, 187; Schulz, Söderbaum and Öjendal (n 15) 5–7. 18  Schulz, Söderbaum and Öjendal (n 15) 3. 19  ibid, 3–4. 20  ibid, 3. 21 R Thakur and L Van Langenhove ‘Enhancing Global Governance through Regional Integration’ (2006) 12 Global Governance 233, 234. 22  Schulz, Söderbaum, and Öjendal (n 15) 3–4. 23  ibid, 4. 24  B Hettne and F Söderbaum, ‘The UN and Regional Organizations in Global Security: Competing or Complementary Logics?’ (2006) 12 Global Governance 227, 227. 25  P Bilgin, Regional Security in the Middle East: A Critical Perspective (London, Routledge, 2005) 20.

Regional Security and International Law 73 and the race in conventional arms.26 Although it has been recognised that developing countries and newly-independent small states would face their own security issues, these have not yet been linked to the security of other actors.27 The main security concepts of the Cold War, including the balance of power, the politics of deterrence, collective security and ­neutrality, reflect the state centred approach of that time.28 The Copenhagen School of Security Studies introduced a wider and deeper understanding of security, which moves away from the state as the main referent object and the dominance of military threats.29 Instead, Barry Buzan, Ole Wæver and Jaap De Wilde distinguish five security areas—the military, the political, the economic, the environmental and the societal sectors.30 The referent objects of threats in these security sectors are broadened to contain individual species (including humankind), types of habitat, the climate and the biosphere, as well as collective identities.31 According to the Copenhagen School, every issue can be securitised in a process that first, represents a politicised issue as an existential threat to a specific reference object and second, uses a specific rhetoric of survival as well as the need for priority of action.32 Securitisation is finalised once the target audience accepts the existence of the threat.33 In recent years, regional organisations have started to use security language in a manner that appeared to have previously been reserved for states. The EU and NATO, for example, adopted their own security strategies, in which they define key threats and strategies on how to tackle these.34 Both expressed the aim to get involved in the whole-life

26  UN Department for Disarmament Affairs, Report of the Secretary-General, Concepts of Security (New York, United Nations Publication, 1986) [hereinafter Concepts of Security] paras 65–84. 27  ibid, paras 85–94. 28 Alternative security concepts include the policy of non-alignment, the concept of ­peaceful coexistence as well as the notion of common security. On mainstream and alternative security concepts see Concepts of Security (n 26) paras 14–57. 29  B Buzan, O Wæver and J De Wilde, Security: A New Framework for Analysis (London, Lynne Rienner, 1998) 36, 49. On the other hand, for Jef Huysmans the understanding of the concept of security is not so much about a broader approach to threat relations, but rather about competing security rationalities that are hidden in the widening debate. See J Huysmans, The Politics of Insecurity: Fear, Migration and Asylum in the EU (Abingdon, ­Routledge, 2006) 28. 30  Buzan, Wæver and De Wilde (n 29) 22–23. 31  ibid, 22–23. 32  ibid, 23–26. 33 R Emmers, ‘Securitization’ in A Collins (ed), Contemporary Security Studies (Oxford, Oxford University Press, 2007) 109, 112; S Marsh and W Rees, The European Union in the ­Security of Europe: Form Cold War to Terror War (Abingdon, Routledge, 2012) 1–2. 34 European Security Strategy (n 13) 2–10; NATO Summit Lisbon, 19–20 November 2010, Heads of State and Government, ‘Active Engagement and Modern Defence: Strategic C ­ oncept for the Defence and Security of the Members of the North Atlantic Treaty ­Organization’ (NATO Public Diplomacy Division, Brussels 2010) [hereinafter NATO ­Summit

74  Julia Schmidt cycle of a crisis, including conflict-prevention as well as post-conflict ­stabilisation. Whereas the EU and NATO prefer the term of crisis management, ­ECOWAS and the AU use the terminology of conflict prevention, ­management and resolution.35 Regional security governance has been divided by Emil Kirchner, James Sperling and Roberto Domínguez into four policies—the policies of ­assurance, prevention, protection and compellence.36 Policies of assurance include post-conflict reconstruction, such as policing and border control missions, as well as confidence building measures.37 Policies of prevention refer to a wide range of efforts aimed at the eradication of the root causes of conflict, such as democracy promotion and humanitarian aid.38 Policies of protection intend to protect society from threats coming from the outside, including terrorism, organised crime and environmental ­disasters.39 Policies of compellence are linked to the resolution of conflicts through the use of force and primarily refer to peacekeeping and peace enforcement measures.40 All of the mentioned security policies have been described as the outcome of functions and instruments provided for and used by regional security actors, which include institution building and conflict resolution on the one hand and persuasive as well as coercive measures on the other.41 The EU, ECOWAS, NATO and the AU have taken on some of these ­security functions that their members struggle to fulfil independently and have developed regional mechanisms of managing security.42 Whereas ECOWAS and the AU aim to do this by addressing intra-regional

Lisbon 2010] 6–13. ECOWAS considers ‘Peace, Security, and Good Governance’ as one of its six strategic pillars and also addresses certain threats and security issues in its conflict prevention framework. See ECOWAS, ‘Regional Strategic Plan (2011–2015): A Proactive Mechanism for Change’ (2010) 13 www.spu.ecowas.int/wp-content/uploads/2011/08/ REGIONAL-STRATEGIC-PLAN-RFV-in-English.pdf and Regulation MSC/REG.1/01/08, The ECOWAS Conflict Prevention Framework [hereinafter ECOWAS Conflict Prevention Framework] paras 66, 69. The AU identifies a detailed set of common security threats in its Solemn Declaration on a Common African Defence and Security Policy 6–10. 35  ECOWAS Conflict Prevention Framework (n 34); Article 2 Protocol Relating to the Establishment of the Peace and Security Council of the African Union; Assembly of the African Union, Report of the Peace and Security Council on its Activities and the States of Peace and Security in Africa, Assembly/Au/5(XXI), 26–27 May 2013 para 3. 36  EJ Kirchner and J Sperling, EU Security Governance (Manchester, Manchester University Press, 2007) 2, 15; Kirchner and Domínguez (n 14) 2, 8, 11–12. 37  Kirchner and Domínguez (n 14) 8, 11. 38  ibid, 8, 11. 39  ibid, 8, 11–12. 40  ibid, 8, 12. 41  ibid, 12. 42  The contribution of regional actors to the stability of their members and the efforts of some in directly addressing threats to peace and security has been recognised by the UN Secretary-General’s High-level Panel on Threats, Challenges and Change, ‘A More Secure World: Our Shared Responsibility’ (2004) [hereinafter A More Secure World] para 271.

Regional Security and International Law 75 ­disputes,43 the EU intends to secure its citizens by addressing external conflicts with its crisis management operations.44 Although NATO has been designed as a collective defence organisation, it has expressed its intention to cover crisis management as a whole45 and has been engaged in peace-keeping operations outside its sphere of membership.46 In the following, emphasis will be put on hard security tasks and the policies of compellence and in particular on the use of military force by regional actors. The next section will take a closer look at the legal framework ­governing the actions of regional security providers. III.  REGIONAL SECURITY PROVIDERS AND THEIR PLACE WITHIN THE LEGAL FRAMEWORK OF THE UNITED NATIONS

Under the Covenant of the League of Nations, regional organisations have not been assigned with a specific role for securing the maintenance of peace.47 This has changed under the UN Charter, and regional ­organisations now have a more prominent role to play. Chapter VIII establishes their primary responsibility for the pacific settlement of local disputes that can pose a threat to international peace and security48 and integrates regional arrangements and agencies into the UN’s system of collective security. According to Article 53 (1) of the UN Charter, The Security Council shall, where appropriate, utilize such regional arrangements or agencies for enforcement action under its authority.

By doing so, Chapter VIII has often been viewed as a compromise between a universal system of collective security on the one hand and a decentralised or regionalised security system on the other.49 Whether the UN ­system has moved away from the perception of regionalism as a ­competitor to universalism50 will be addressed in Section V. What constitutes a regional arrangement or a regional agency within the meaning of the UN Charter is not entirely clear, due to a lack of ­definitions provided by the UN Charter itself. The drafting history of the

43 Article 58 ECOWAS Treaty in conjunction with Article 3 Protocol Relating to the ­ echanism for Conflict Prevention, Management, Resolution, Peace-keeping and Security; M Article 4 AU Constitution. 44  Article 42(1) TEU. 45  NATO Summit Lisbon 2010 (n 34) 7–8. 46  See, eg the NATO-led Kosovo force or KFOR, based on UNSC Resolution 1244 (1999). 47  Article 21 Covenant of the League of Nations. 48  Articles 33, 52(2) UN Charter. 49  R Wolfrum, ‘Der Beitrag regionaler Abmachungen zur Friedenssicherung: ­Möglichkeiten und Grenzen’ (1993) 53 Zeitschrift für ausländisches öffentliches Recht und Völkerrecht 576, 577. 50 A Abass, Regional Organisations and the Development of Collective Security: Beyond Chapter VIII of the UN Charter (Oxford, Hart Publishing, 2004) 21, 22.

76  Julia Schmidt Charter suggests that both terms have been deliberately chosen to be wide in scope51 and it is sometimes debated whether there is any practical need at all to draw a distinction between agencies and arrangements.52 If such an attempt is made, however, then regional agencies are ascribed with a higher level of organisational structure. A non-universal international organisation that entails permanent institutions and that enjoys international legal personality is usually referred to as a regional agency, whereas an arrangement is said to lack these features.53 Political commitments can be sufficient and a legally binding founding treaty is not essential.54 In the following, reference will be made to regional organisations as referring to both agencies as well as to arrangements. What needs to be decided, however, is the type of international organisation that qualifies as being regional within the meaning of ­ ­Chapter VIII. Views on this matter are deeply divided55 and are influenced, not only by the definition and scope of the regional element of Chapter VIII, but also by the diverging views on the relationship between Chapters VI, VII and VIII of the UN Charter, as well as on the degree of autonomy regional organisations enjoy in the context of the use of force. Geographical proximity between the members of an international organisation is not always regarded to be essential for the determination of a regional organisation, as long as its members share at least some abstract values.56 In practice, however, it seems difficult to define the area of a region and of sub-regions without political bias.57 The criteria of shared values appear to be rather vague, too, unless these are identified and agreed upon by the states that want to be members of that region.58 The functions that have been assigned to regional organisations under Chapter VIII, however, suggest that there needs to be some ­geographical limit to the operating area of regional organisations when they are acting

51 UN Secretary-General, ‘A Regional-Global Security Partnership: Challenges and Opportunities’ (Report), 28 July 2006, A/61/204–S/2006/590 [hereinafter A Regional-Global Security Partnership] para 77. 52  Wolfrum (n 49) 577. 53 United Nations, Office of Legal Affairs, Codification Division, Handbook on the ­Peaceful Settlement of Disputes between States (OLA/COD/2394) (New York, United Nations ­Publication, 1992) para 232. 54  C Walter, ‘Security Council Control over Regional Action’ (1997) 1 Max Planck Yearbook of United Nations Law 131. 55  See Abass (n 50) 9–20. 56  See, eg Abass (n 50) 25; and Tom Farer for an opposing view. TJ Farer, ‘The Role of Regional Collective Security Arrangements’ in TG Weiss (ed), Collective Security in a Changing World: A World Peace Foundation Study (London, Lynne Rienner, 1993) 153, 162. 57 Chapter VIII of the UN Charter also extends to sub-regions. See, eg UN General ­Assembly, ‘2005 World Summit Outcome’, 24 October 2005, A/Res/60/1 para 170. 58  ND White, ‘The EU as a Regional Security Actor within the International Legal Order’ in M Trybus and ND White (eds), European Security Law (Oxford, Oxford University Press, 2007) 329, 332–33.

Regional Security and International Law 77 under Chapter VIII. After all, regional organisations have been assigned with the task of settling ‘local disputes’ peacefully.59 The purpose of this task is to solve a conflict, which is confined to a certain area, and to ­prevent it from spreading by using the regional organisation’s insight and ­closeness to the subject matter and its perceived legitimacy in order to ­prevent the need for an intervening third party.60 The perceived legitimacy of a regional organisation to settle local disputes builds on the identification of shared values and goals the members of this organisation aim to achieve through their membership. Therefore, enforcement action under Chapter VIII has to have the character of regional action.61 What constitutes regional action also has been interpreted differently. For Hans Kelsen, it is sufficient that the sphere of influence of a regional organisation is limited and determined in its founding treaty, but does not have to be restricted to internal activities.62 Rather, the reference in ­Article 53(2) UN Charter to regional action against any former enemy state would indicate the possibility of regional enforcement action outside its own membership.63 Although the role foreseen for regional ­organisations in the maintenance of international peace and security is only l­imited to ­matters that are ‘appropriate for regional action’, without explicitly l­inking their sphere of action to its members,64 such a wide interpretation of regional action might be difficult to reconcile with the above described traditional purpose and functions of regional organisations under Chapter VIII, which is to contribute to international security by addressing intra-regional disputes, in order to prevent the regional organisation becoming a source of threat and instability itself.65

59 

Article 52(2) and (3) UN Charter. Wolfrum (n 49) 577. 61  H Kelsen, ‘Is the North Atlantic Treaty a Regional Arrangement?’ (1951) 45 American Journal of International Law 163. 62  ibid, 163, 165. 63  ibid, 165. 64  Article 52(1) UN Charter. 65 Also restricting Chapter VIII to non-universal organisations that operate intra-­ regionally are E De Wet, ‘The Relationship between the Security Council and Regional Organizations during Enforcement Action under Chapter VII of the United Nations Charter’ (2002) 71 Nordic Journal of International Law 7; R Tavares, Regional Security: The Capacity of International Organizations (London, Routledge, 2010) 9; and United Nations University—­ Comparative Regional Integration Studies (UNU-CRIS), Project on Regional Security & Global G ­ overnance, R Tavares et al, ‘Capacity Survey: Regional and other Intergovernmental Organizations in the Maintenance of Peace and Security’ (2008) biblio.ugent.be/input/dow nload?func=downloadFile&recordOId=938841&fileOId=938848 [hereinafter UNU-CRIS] 17. On this topic, see also Z Deen-Racsmány, ‘A Redistribution of Authority between the UN and Regional Organizations in the Field of the Maintenance of Peace and Security?’ (2000) 13 ­Leiden Journal of International Law 297, 308, 309 and IF Dekker and EPJ Myjer, ‘Air Strikes on Bosnian Positions: Is NATO Also Legally the Proper Instrument of the UN?’ (1996) 9 ­Leiden Journal of International Law 411, 413. 60 

78  Julia Schmidt Due to the growing interconnectedness of threats in a globalised world, some regional actors have shifted their security focus to threats having their origin outside their region, in an attempt to stop external threats from becoming internal ones, and thereby intend to contribute to global security. The increased engagement and success of international ­organisations that fulfil crisis management tasks and act as peace-keepers in regional ­disputes outside their sphere of membership contributed to a broader understanding of Chapter VIII. The role of the EU in the ­peaceful ­settlement of disputes in its neighbourhood, especially, as well as its involvement in crisis management operations of a humanitarian ­character on the African continent, has been influential in its perception as a regional organisation within the meaning of Chapter VIII.66 A functional approach to the UN Charter, which acknowledges the ­contribution of regional actors to the maintenance of international peace and security, does not necessarily require the interpretation of regional organisations under Chapter VIII and in the context of the use of force to extend to organisations acting outside their area of membership. Instead, other Charter provisions could be used to govern their relationship with the UN. Regional actors that intend to use enforcement measures against a non-member can be authorised to do so by the UNSC under Chapter VII, according to Article 48(2) UN Charter. If the same organisation plans on using force intra-regionally, this organisation, too, would require UN authorisation, this time however within the framework of Chapter VIII and according to Article 53(1) UN Charter.67 This narrow approach to Chapter VIII could prevent Article 48(2) UN Charter from becoming an empty vessel and would be in line with the systematic relationship between the individual provisions entailed in ­ Chapter VIII. According to Article 52 UN Charter, regional organisations have been allocated with the primary responsibility of solving local ­disputes peacefully.68 Article 53 UN Charter turns to enforcement action by ‘such’ regional organisations and thereby indicates that regional ­organisations should not be interpreted differently within Chapter VIII— irrespective of whether they engage in peaceful or forceful dispute

66  S Blockmans, ‘EU Global Peace Diplomacy: Instruments to Support Status Processes’ in B Van Vooren, S Blockmans and J Wouters (eds), The EU’s Role in Global Governance: The Legal Dimension (Oxford, Oxford University Press, 2013) 110, 114; S Blockmans and RA Wessel, ‘The European Union and Peaceful Settlement of Disputes in its Neighbourhood: The ­Emergence of a New Regional Security Actor?’ in A Antoniadis, R Schütze and E Spaventa (eds), The European Union and Global Emergencies: A Law and Policy Analysis (Oxford, Hart Publishing, 2011) 73, 79–82; White (n 58) 332–35. 67  See in particular E De Wet (n 65) 10 and C Walter, ‘Regional Arrangements and the United Nations Charter’ in R Wolfrum (ed), The Max Planck Encyclopedia of Public International Law (Oxford, Oxford University Press, 2012) 746, 751. 68  Article 52(2) UN Charter.

Regional Security and International Law 79 s­ ettlement mechanisms. Practical needs might speak in favour of limiting a regional organisation’s special responsibility in solving local disputes to intra-regional ones. If ‘local disputes’ were not limited to a regional organisation’s area of membership,69 but would refer to any dispute that is restricted to a certain space (which again could be defined in a narrow or in a broad sense), regional organisations would be asked to get involved in a huge amount of conflicts and crises all over the world. An attempt to limit this obligation to the organisation’s neighbourhood, in order to avoid spill-over effects of conflicts, or to limit this obligation to activities in any part of the world that are potentially capable of endangering the internal security of a region, such as terrorist activities, or civil wars that result in a high number of displaced persons and flows of refugees, might not be feasible in practice due to the interconnectedness of threats and the vagueness of some of the concepts used. Restricting the primary responsibility for the peaceful settlement of disputes, instead, to areas that are of a special interest to the region itself—perhaps because of a shared cultural, colonial or ideological past—would reintroduce criteria for the definition of a region that have been rejected above. If, however, regional organisations within the meaning of chapter VIII were restricted to organisations that operate within their area of membership, their primary responsibility for the peaceful settlement of disputes might be more easily attainable. Attempts to settle disputes between its own members amicably are encouraged by a deeper awareness of the negative impact an unresolved dispute could have on the functioning of the region as a whole. A narrow interpretation of Chapter VIII would not disregard the ­achievements of organisations, such as the EU, in the peaceful settlement of disputes on its doorstep, or in more distant parts of the world.70 Article 33 UN Charter, in combination with Article 52 UN Charter, ­ ­provides ­Member States of a region with the choice of peaceful means of settling disputes that are available in their regional forum.71 The resort to regional arrangements or agencies, however, is just one of the enumerated tools of peaceful dispute settlement techniques under C ­ hapter VI. International organisations are not prevented from offering such ­ ­mechanisms to actors outside their membership if the third party consents to it. In this ­scenario, the organisation could act as an independent negotiator or mediator, for example, and its action would also be covered by Article 33 UN Charter. 69 

Dekker and Myjer (n 65) 413. the achievements of the European Union, see, eg F Hoffmeister, ‘The European Union and the Peaceful Settlement of International Disputes’ (2012) Chinese Journal of ­International Law 77. 71 United Nations, Office of Legal Affairs, Codification Division, Handbook on the ­Peaceful Settlement of Disputes between States (OLA/COD/2394) (New York, United Nations ­Publication, 1992) para 237. 70 On

80  Julia Schmidt The suggested differentiated approach to international organisations, according to their sphere of action, would not lead to an unjust result, when comparing the obligations of regional organisations under ­Chapter VIII with the obligation of international organisations of a regional ­character, under Chapter VII. Although the reporting duty of regional organisations under Chapter VIII is not explicitly codified with regards to military enforcement action under Chapter VII, it also exists for measures based on Article 42, 48(2) UN Charter in practice.72 It has been suggested that this reporting obligation mirrors the UN’s responsibility to exercise overall authority and control over delegated enforcement action.73 Restricting Chapter VIII to organisations that act intra-regionally leads to the exclusion of collective defence organisations, such as NATO. It has often been stated that NATO’s refusal to declare itself as a regional organisation within the meaning of Chapter VIII would have been ­ ­politically motivated and was driven by the desire to escape the UNSC’s control.74 Under Article 54 UN Charter, the UNSC has to be kept fully informed, even of activities in contemplation, whereas Article 51 UN ­Charter only requests an immediate report of measures that have already been taken in the ­exercise of the right to individual or collective self-defence. The ­exclusion of collective defence organisations from Chapter VIII when they are acting out of area, however, would leave all international actors acting in self-defence—whether they are states, regional organisations or ­international organisations of a regional character—subject to the same reporting ­obligations as codified by Article 51 UN Charter.75 Some UN statements could support the differentiated approach to regional organisations and international organisations of a regional ­character that is proposed in this chapter. For example, the report of the UN Secretary-General on ‘A Regional-Global Security Partnership: ­Challenges and Opportunities’ mentions that other organisations, which do not ­consider themselves as falling under Chapter VIII, are not excluded from a partnership with the UN.76 Rather, Other provisions such as those of Chapters VI, VII and IX are applicable to these partners for the same role. So none is excluded, and each has a role to play within the partnership.77

72  ND White and Ö Ülgen, ‘The Security Council and the Decentralised Military Option: Constitutionality and Function’ (1997) XLIV Netherlands International Law Review 378, 410. 73  E De Wet, The Chapter VII Powers of the United Nations Security Council (Oxford, Hart Publishing, 2004) 272; D Sarooshi, The United Nations and the Development of Collective Security: The Delegation by the UN Security Council of its Chapter VII Powers (Oxford, Clarendon Press, 1999) 249–50. 74  Dekker and Myjer (n 65) 414. 75  EW Beckett, The North Atlantic Treaty, the Brussels Treaty and the Charter of the United Nations (London, Steven & Sons Limited, 1950) 17–18. 76  A Regional-Global Security Partnership (n 51) paras 82, 84 77  A Regional-Global Security Partnership (n 51) para 82.

Regional Security and International Law 81 These statements have been primarily addressed to alliance organisations such as NATO, but they are broad enough to cover new emerging ­international actors such as the EU, which lacks the competence to use military enforcement measures against its Member States and, according to the definition proposed above, cannot qualify as a regional organisation within the meaning of Chapter VIII in the context of the use of force.78 The EU has only been equipped with the capacity to deploy military crisis management operations outside its territory.79 In contrast to the EU, the AU has declared itself to be a regional organisation80 and has also been recognised by the UN to fall within the scope of Chapter VIII.81 ECOWAS, too, considers its cooperation with the UN to be covered by Articles 52–54 UN Charter.82 The just mentioned regional security providers vary greatly in nature and in design. The aim of the previous part was to show that they try to achieve regional security in different ways—by addressing internal threats, or by stopping external threats from becoming internal ones. Some regional actors will be prepared and competent to do both. If a regional actor tries to contribute to international security by intra-regional action, either through peaceful83 or forceful means, then it qualifies as a ‘regional organisation’ under Chapter VIII. If the same regional actor addresses external threats before they can become a source of internal instability and is acting outside its sphere of membership, its peaceful or forceful action can be regulated by Chapters VI and VII. In this case, the regional actor could be referred to as an ‘international organisation of a regional ­character’. Thus, the same organisation can put on different hats when it is contributing to regional, and thereby international, security. Building on this, it could then be argued that a changed security environment makes it necessary to include regional actors into the system of the UN as a whole and not to limit their role to Chapter VIII. The next part will focus on the mechanisms set up by the EU, ECOWAS and the AU to govern regional security concerns in practice. 78 Suggesting that ‘the EU is not a traditional regional organisation in the sense of ­ hapter VIII’ is J Cloos, ‘EU-UN Cooperation in Crisis Management—Putting Effective C ­Multilateralism into Practice’ in J Wouters, F Hoffmeister and T Ruys (eds), The United Nations and the European Union: An Ever Stronger Partnership (The Hague, TMC Asser Press, 2006) 259, 265. 79 Article 42(1) TEU. See also The Protocol on Permanent Structured Cooperation in which a reference to Chapter VIII of the UN Charter is avoided. According to the Protocol, the High Contracting Parties recognise ‘that the United Nations Organisation may request the Union’s assistance for the urgent implementation of missions undertaken under Chapters VI and VII of the United Nations Charter’. Protocol (No 10) on permanent structured cooperation ­established by Article 42 of the Treaty on European Union [2012] OJ C326/255. 80  Article 17(2) Protocol Relating to the Establishment of the Peace and Security Council of the African Union [hereinafter PSC Protocol]. 81 UN Secretary-General, ‘Cooperation Between the United Nations and Regional and Other Organizations’ (Report), 9 August 2012, A/67/280-S/2012/614 paras 3 and 4–25. 82  Regulation MSC/REG.1/01/08, The ECOWAS Conflict Prevention Framework, para 40. 83  Article 52 in conjunction with Article 33 UN Charter.

82  Julia Schmidt IV.  MILITARY COOPERATION BETWEEN REGIONAL ACTORS AND THE UNITED NATIONS

Regional actors supply the UN with much needed military resources and assist it in maintaining and restoring international peace and ­security. According to the design of the UN Charter, the UNSC should have access to a standing UN army under its direct command and control. Until today, no Article 43 UN Charter agreement has been signed. Regional actors can step in to fill this void. The possibility of authorising regional organisations to use force intra-regionally has been explicitly codified in ­Article 53(1) UN Charter. Although its legal foundations are debated,84 the competence of the UNSC to authorise Member States, or to authorise an ­international organisation of a regional character itself to act outside its area of m ­ embership, has been recognised in practice.85 Regional actors offer the opportunity for decentralised enforcement action of a centralised decision of the UN. In recent years, some regional actors have developed specific capabilities and procedures, in order to assist the UN. The EU considers its crisis management operations as a way to support the UN in its efforts to promote international peace and ­security.86 As part of EU rapid response, the battlegroup-concept was ­developed.87 Battlegroups are composed of 1,500 troops and can be deployed for a period of up to 120 days within 10 days. They have been designed to ‘strengthen the EU’s ability to respond to possible UN requests’.88 If a rapid response to a crisis is needed, the EU has ­developed two models of deployment—the stand-by model and the bridging model. The stand-by model consists of an EU reserve in support of a UN ­mission.89 The bridging model is designed to give the UN time, either to organise a new operation, or to reorganise an existing one by deploying an

84 

See De Wet (n 73) 260–65 and Sarooshi (n 73) 16–19. See, eg UNSC Resolution 678 (29 November 1990), UN Doc S/RES/678 para 2 or UNSC Resolution 1244 (10 June 1999), UN Doc S/RES/1244 para 7; UNSC Resolution 1671 (25 April 2006), UN Doc S/RES/1671 paras 7–8. 86  European Council, ‘EU-UN Co-operation in Military Crisis Management ­ Operations: Elements of Implementation of the EU-UN Joint Declaration’, 17–18 June 2004 www.­ consilium.europa.eu/uedocs/cmsUpload/EU-UN%20co-operation%20in%20Military% 20Crisis%20Management%20Operations.pdf [hereinafter EU-UN Co-operation in Military Crisis Management Operations] para 7. Operation Artemis, Council Joint Action 2003/423/ CFSP on the European Union military operation in the Democratic Republic of Congo [2003] OJ L143/50, eg, has been conducted at the request of the United Nations. See Council of the European Union, ‘Joint Declaration on UN-EU Co-operation in Crisis Management’, ­Brussels, 19 September 2003, 12730/03, para 2. 87  Headline Goal 2010, approved by General Affairs and External Relations Council on 17 May 2004, endorsed by the European Council of 17 and 18 June 2004, para 4 [hereinafter Headline Goal 2010]. 88  ibid, para 4. 89  EU-UN Co-operation in Military Crisis Management Operations (n 86) para 13. 85 

Regional Security and International Law 83 autonomous EU mission.90 The EU’s operation EUFOR Tchad/RCA was conducted as a military bridging operation.91 The AU has contributed to international peace and security in Africa through a variety of operations and has also cooperated with the UN for that purpose. For example, the African Union Mission in Sudan (AMIS) was replaced by the African Union/UN Hybrid operation in Darfur (UNAMID).92 The AU has set up its own security structure to provide regional security, which includes the Peace and Security Council, a ­continental early warning system and an African Stand by Force (ASF).93 ­ECOWAS also actively engages with the UN. Senior members of staff from both organisations meet regularly to exchange ideas about how to further cooperation.94 ECOWAS introduced the ECOWAS Standby Force (ESF) with the objective to guarantee peace and security in situations of conflict and disaster through effective observation and monitoring, preventive deployment and humani­ tarian intervention, and to train and equip multi-purpose composite standby units made up of military and civilian components in Member States, within the framework of the African Standby Force Arrangement.95

The military intervention in Mali in 2013 can be used as a recent example of inter- and intra-regional efforts in providing security in the Sahel region within the framework of the UN. In March 2012, a military coup had ­ overthrown the democratically elected Government of Mali, in response to the latter’s inability to deal with the Tuareg rebels in the North of the country.96 In an attempt to restore the constitutional order ECOWAS, and later also the AU, adopted economic sanctions against the military junta.97 In April, Mali signed a framework agreement with ECOWAS about the development of a ‘road map for the restoration of the ­constitutional order’.98 The rebels have been accused of serious human rights violations against Mali soldiers and civilians99 and they have declared the independence of the North of Mali, which it is increasingly feared will become a new centre for terrorists associated with the Al Qaida

90 

ibid, para 9. Council Joint Action 2007/677/CFSP on the European Union military operation in the Republic of Chad and in the Central African Republic [2007] OJ L279/21, Article 1(1). 92  UNU-CRIS (n 65) 23–25. 93  Articles 2, 12, 13 PSC Protocol. 94  UNU-CRIS (n 65) 73. 95  ECOWAS Conflict Prevention Framework (n 34) para 89. 96  T Scheen, ‘Militärputsch gegen Präsident Touré’, Frankfurter Allgemeine Zeitung (22 March 2012) www.faz.net/aktuell/politik/ausland/mali-militaerputsch-gegen-­praesident-toure11693388.html. 97  UNSC Resolution 2056 (5 July 2012), UN Doc S/RES/2056 para 6. 98  UNSC Resolution 2071 (12 October 2012), UN Doc S/RES/2071 preamble. 99 ibid. 91 

84  Julia Schmidt ­network.100 ­Gradually, radical Islamists have taken over control from the Tuareg rebels in Timbuktu and Gao.101 In September 2012, the transitional authorities of Mali and ECOWAS addressed the Secretary-General and asked for a UNSC mandate regarding the deployment of a stabilisation force in Mali.102 In December 2012, the Security Council authorised the deployment of AFISMA, an African-led International Support Mission, to take all necessary means to support the ‘Malian authorities in their ­primary responsibility to protect the population’.103 In January 2013, after a request from the transitional authorities from Mali, France militarily intervened to end the armed attacks of terrorists and extremists against the Malian south.104 Although AFISMA was originally supposed to be deployed in September 2013, AFISMA forces started to arrive a few days after the French troops.105 In early 2013, the European Union launched a military mission to contribute to the training of Malian armed forces, in an attempt to support them in the fight against terrorists.106 In July 2013, the UN Multidimensional Integrated Stabilization Mission (MINUSMA) took over from AFISMA.107 V.  MULTILATERALISM AND ITS CHALLENGES FOR THE RELATIONSHIP BETWEEN THE UNITED NATIONS AND REGIONAL ACTORS

The military engagement of the African Union, ECOWAS and the EU in Mali can serve as one example of multilateral action within the framework of the UN. There appears to be no generally agreed definition of multilateralism.108 One essential element, however, seems to be the commitment of more than two actors to collective action under the framework of a more or less formalised regulating system to achieve certain

100 T Scheen, ‘In Timbuktu weht die schwarze Fahne’, Frankfurter Allgemeine Zeitung (7 April 2012) www.faz.net/aktuell/al-qaida-in-mali-in-timbuktu-weht-die-schwarze-fahne11710837.html. 101 ibid. 102  UNSC Resolution 2071 (2012) preamble. 103  UNSC Resolution 2085 (20 December 2012), UN Doc S/RES/2085 para 9d. 104  UNSC Resolution 2100 (25 April 2013), UN Doc S/RES/2100 preamble. For an assessment of France’s military intervention, see K Bannelier and T Christiakis, ‘Under the UNSC’s Watchful Eyes: Military Intervention by Invitation in the Malian Conflict’ (2013) 26 Leiden Journal of International Law 855. 105  Security Council Report, ‘February 2013 Monthly Forecast’ (31 January 2013). www. securitycouncilreport.org/monthly-forecast/2013-02/mali_4.php. 106 Council Joint Decision 2013/34/CFSP on a European Union military mission to ­contribute to the training of the Malian Armed Forces (EUTM Mali) [2013] OJ L14/19 Article 1. 107  UNSCR 2100 (2013) para 7. 108  Peterson et al (n 16) 2.

Regional Security and International Law 85 goals, such as security.109 Multilateralism can be studied from different ­perspectives. Through the lens of the UN, it examines the ways in which actors, such as regional organisations, are envisaged by the UN system itself to ­contribute to the maintenance and restoration of international peace and security. This top-down approach to the relationship between the UN and regional actors concentrates on the legal limits for regional action in the context of the use of force and focuses on the scope and functions of Chapters VII and VIII. When taking on the perspective of regional actors, such as the EU, multilateralism can be linked to this actors’ strategic approach in addressing global threats and problems.110 In this context, regional actors have to identify how they perceive their relationship with the UN (as well as with other regional actors) and decide to what extent they view themselves as autonomous legal systems. The next part will first take a closer look at the challenges created by multilateralism viewed from the UN. Particular emphasis will be given to some controversial practices of regional ­security providers who have engaged in the use of force without a prior and explicitly obtained UNSC mandate. The second section will turn to claims of autonomy put forward by other regional actors, such as the EU. A.  Multilateralism and the View from the UN The UN Charter provides the framework in which the autonomy of regional actors in the context of the use of force has to be assessed. The practice of some regional actors, such as NATO in Kosovo or ECOWAS in Liberia, has fuelled the discussion as to whether regional ­security ­providers need to be authorised by the UNSC to use force and, if a­ nswering this ­question in the affirmative, what qualities an authorisation needs to ­possess in order to be regarded as legal. i.  NATO and Kosovo In the later stages of the Kosovo crisis in the 1990s, the Security Council adopted Resolution 1199, which finally determined that ‘the deterioration of the situation in Kosovo’ was ‘a threat to peace and security in the

109 E Newman, A Crisis of Global Institutions?: Multilateralism and International Security (London, Routledge, 2007) 10. 110  KE Jørgensen, ‘A Multilateralist Role for the EU?’ in O Elgström and M Smith (eds), The European Union’s Roles in International Politics: Concepts and Analysis (London, Routledge, 2006) 30, 44.

86  Julia Schmidt region’.111 During the debate in the Security Council it became ­obvious that Russia was of the opinion that Resolution 1199 did not consider the use of force, despite its reference to Chapter VII,112 and that Russia would veto any draft resolution authorising all necessary means.113 In 1998, NATO Secretary-General Solana stated that NATO was prepared to threaten and to use force to end the humanitarian catastrophe in Kosovo, without another UNSC resolution.114 When violence started to increase again and the humanitarian situation worsened, NATO started a range of air strikes in March 1999.115 In the absence of an explicit UNSC resolution authorising the use of force, justification was sought in the doctrine of humanitarian ­intervention, but also in an implicit ex post authorisation through the UNSC.116 In June 1999, the UNSC adopted Resolution 1244, which established an international security presence, under the auspices of the UN, made up of states and relevant international organisations. For this ­purpose they were authorised to use ‘all necessary means’. As the use of ‘all necessary means’ is textually linked to the future tasks of the security presence, it is difficult to be convinced by an interpretation of Resolution 1244 as an ex post authorisation to use force. Although the UNSC appeared to approve of the results of the NATO air campaign, it might be necessary to distinguish between an approval of the results and an approval of the means.117 International organisations of a regional character, such as NATO, have to be explicitly authorised in advance by the UNSC before they can ­lawfully engage in the use of force under Chapter VII.118 The authorisation technique that has developed over time, to compensate for the missing standing UN force which would have been under the Security C ­ ouncil’s command and control, requires the Security Council to be in overall authority and control with regards to the actual exercise of delegated

111 

UNSC Resolution 1199 (23 September 1998), UN Doc S/RES/1199. Gazzini, ‘NATO Coercive Military Activities in the Yugoslav Crisis (1992–1999)’ (2001) 12 European Journal of International Law 391, 405. 113 B Simma, ‘NATO, the UN and the Use of Force: Legal Aspects’ (1999) 10 European ­Journal of International Law 1, 7. 114  ibid, 7. 115  Gazzini (n 112) 407. 116  For a discussion see Simma (n 113) 10; N Blokker, ‘Is the Authorization Authorized? Powers and Practice of the UNSC to Authorize the Use of Force by “Coalitions of the Able and Willing”’ (2000) 11 European Journal of International Law 541, 546; V Gowlland-Debbas, ‘The Limits of Unilateral Enforcement of Community Objectives in the Framework of UN Peace Maintenance’ (2000) 11 European Journal of International Law 361, 374; De Wet (n 73) 307. 117  N Krisch, ‘Unilateral Enforcement of the Collective Will: Kosovo, Iraq, and the Security Council’ (1999) 3 Max Planck Yearbook of United Nations Law 59, 85 and 86; see also ND White, ‘The Legality of Bombing in the Name of Humanity’ (2000) 5 Journal of Conflict and Security Law 27, 32. 118  Walter (n 54) 177. 112 T

Regional Security and International Law 87 enforcement powers.119 The Security Council should be able to ensure that the use of force is exercised in line with the purposes and principles of the UN Charter.120 The need for the UNSC to be in overall control of a military operation, and in particular its ability to start and terminate it, originates from the centralisation of the use of force under the present UN Charter system.121 ii.  ECOWAS and Liberia In Liberia, ECOWAS militarily intervened, without being explicitly authorised to use force by the UNSC, in order to end the human rights violations during the Civil War.122 Following the military intervention, the UNSC commended ‘ECOWAS for its efforts to restore peace, security and stability in Liberia’.123 ECOWAS’ initiative generated hardly any international opposition124 and has, therefore, been referred to as one of the few examples of uncontested implicit UNSC approval.125 It seems doubtful whether regional organisations that intend to use force intra-regionally, such as ECOWAS in Liberia, enjoy greater autonomy in the context of the use of force under Chapter VIII than international organisations, ad hoc coalitions of states or individual states would do under Chapter VII. The assessment of the autonomy of regional organisations in the context of the use of force has to start with the relationship between Chapter VII and Chapter VIII. Only if the latter is seen to be self-standing could it provide regional organisations (at least in theory) with the competence to determine a threat to the peace, breach of the peace, or act of aggression and could attribute them with the decision-making authority to resort to the use of force intra-regionally, without the involvement of the UNSC.126 However, it is more convincing to interpret ­Chapter VIII as being systematically linked to Chapter VII. Once the UNSC has followed the two-step procedure of Chapter VII, by declaring an Article 39 UN Charter situation and by adopting a resolution authorising the use of force, regional organisations may be utilised to implement this decision.127

119 

White and Ülgen (n 72) 385–87. Sarooshi (n 73) 35, 156. 121  De Wet (n 73) 294. 122  J Lobel and M Ratner, ‘Bypassing the Security Council: Ambiguous Authorizations to Use Force, Cease-Fires and the Iraqi Inspection Regime’ (1999) 93 American Journal of ­International Law 124, 132. 123  UNSC Resolution 788 (19 November 1992), UN Doc S/RES/788 para 1. 124 C Greenwood, ‘International Law and the NATO Intervention in Kosovo’ (2000) 49 International and Comparative Law Quarterly 926, 929. 125  Lobel and Ratner (n 122) 132. For a more critical view see De Wet (n 73) 299–301. 126  Abass (n 50) 53–54. 127  A Orakhelashvili, Collective Security (Oxford, Oxford University Press, 2011) 259–61. 120 

88  Julia Schmidt In fact, the wording of Article 53(1) UN Charter itself requires regional enforcement action to be authorised by the Security Council and to be under its ‘authority’. Thus, regional military measures under Chapter VIII, too, need to be explicitly and a priori authorised to be lawful. Therefore, regional organisations do not enjoy greater autonomy in the context of the use of force than other military actors. They are only able to decide autonomously in the context of the peaceful settlement of disputes under Chapter VI, in matters of collective self-defence and in the context of consensual peace-keeping missions, but not in the adoption of military enforcement measures.128 B.  Multilateralism and the View from Regional Actors Regional security providers often seem to avoid clear legal statements as to how they classify their relationship with the UN and whether they need UN authorisation to lawfully engage in the use of force. The North ­Atlantic Treaty does not regulate NATO’s relationship with UNSC ­resolutions, but it emphasises the commitment of its Member States to the principles and purposes of the UN Charter, including the Security Council’s primary responsibility for the maintenance of peace and security.129 ­ECOWAS, too, reaffirms its Member States’ commitment to the UN Charter130 and refers to the Charter as one, but not the only, normative standard for its engagement in conflict prevention—next to the Constitutive Act of the AU.131 Whether the UNSC enjoys not only the primary, but also the sole, ­authority to authorise the use of force is left unaddressed. The AU expressly codifies its right to intervene in one of its Member States, following a decision by its Assembly in the case of war crimes, crimes against humanity and genocide.132 Whether or not this statement can be interpreted as a declaration of autonomy in the context of the intraregional use of force and a rejection of the need for a prior and explicit UNSC authorisation can be debated. The Constitutive Act of the African Union identifies the encouragement of international cooperation as one of its objectives and aims to take due account of the UN Charter therein.133 One way of interpreting Article 4 (h) to be in line with the latter would be to read it as the creation of the internal competence of the AU to use force

128  White (n 58) 338, 344; ND White, ‘The Ties that Bind: The EU, the UN and International Law’ (2006) XXXVII Netherlands Yearbook of International Law 57, 94. 129  Articles 1, 7 North Atlantic Treaty. 130  Article 2 PSC Protocol. 131  ECOWAS Conflict Prevention Framework (n 34) para 40. 132  Article 4(h) Constitutive Act of the African Union [hereinafter AU Constitution]. 133  Article 3(e) AU Constitution.

Regional Security and International Law 89 against its Member States—a competence not all regional actors enjoy. In order to be lawful, a military intervention by the AU against one of its Member States would still need to be authorised by the UNSC in advance, either in accordance with the first or second sentence of Article 53(1), depending on whether the impetus for a military intervention stems from the UNSC or the AU itself. In political statements, the EU promotes an ‘international order based on effective multilateralism’ with the UN framework at the centre.134 ­Additionally, although primary law of the EU reveals its strong commitment to the principles of the UN Charter and international law,135 it ­nevertheless avoids a clear legal statement as to whether the EU is bound by the UN Charter itself. In 2008, the European Court of Justice added to this confusion in Kadi when it stressed the autonomy of the European legal order and confirmed its jurisdiction to review EU legislative acts giving effect to a UNSC resolution in the light of its internal system of fundamental rights.136 However, it seems doubtful whether Kadi intended to indicate that the European Union can exist outside the framework of the UN as an emerging international security provider. Rather Kadi might need to be interpreted as a product of its time and in light of several tensions ­underlying the multi-layered European legal system. In the still early fight against international terrorism, the UNSC adopted Resolution 1267 (1999), condemning the training and sheltering of ­terrorists on Afghan territory and providing for the freezing of funds and financial resources of persons and entities as designated by the ­Sanctions ­Committee.137 On several occasions, the UNSC adopted new resolutions in order to strengthen the flight ban and the freezing of funds. The EU reacted to all changes and adopted corresponding secondary legislation in its desire to implement the UN sanction regime against the Taliban and their supporters in the European legal order, without raising serious human rights concerns. Mr Kadi appeared on the list of persons suspected of supporting terrorism, which was annexed to Council Regulation No 881/ 2002.138 In reaction to the freezing of his funds and a travel ban,

134 

European Security Strategy (n 13) 9. Articles 3(5), 21(1), 42(1) TEU. 136 Joined Cases C-402/05 P and C-415/05 P Yassin Abdullah Kadi and Al Barakaat ­International Foundation v Council and Commission [2008] ECR I-6351 paras 316, 317 ­[hereinafter Kadi Grand Chamber]. 137  For the facts of the Kadi case, see Case T-315/01 Yassin Abdullah Kadi v Council and ­Commission [2005] ECR II-3649 [hereinafter Kadi] paras 10–36. 138 Council Regulation (EC) No 881/2002 of 27 May 2002 imposing certain specific ­restrictive measures directed against certain persons and entities associated with Usama bin Laden, the Al-Qaida network and the Taliban, and repealing Council Regulation (EC) No 467/2001 prohibiting the export of certain goods and services to Afghanistan, strengthening the flight ban and extending the freeze of funds and other financial resources in respect of the Taliban of Afghanistan, OJ L139/9. 135 

90  Julia Schmidt Mr Kadi challenged the lawfulness of the Community regulation by alleging three breaches of human rights, namely the right to a fair hearing, the right to respect of property and the right to effective judicial review.139 When the Court was confronted with the question of whether it was competent to review secondary EU law implementing UNSC resolutions, in the light of its own human rights standards, it chose to safeguard the functioning of its own legal system and, in particular, its relationship with European Member States on the one hand and its relationship with the European Court of Human Rights on the other. In Kadi, the Court also left several questions about the precise relationship between the European legal order and UNSC resolutions unaddressed. The ECJ only offered a clear indication of the limit of the possible binding nature of UNSC ­resolutions, by stating that they could not enjoy primacy over primary EU law.140 The question of whether they enjoy primacy over secondary EU law was avoided. It seems possible that the European Courts will return to their UN-law friendly approach of the past. In Bosphorus141 and Ebony Maritime,142 two cases that concern the interpretation of EU instruments intended to give effect to UNSC resolutions establishing the comprehensive sanction regime directed against the former Yugoslavia, the Court held that the wording and purpose of UNSC resolutions would have to be kept in mind when interpreting secondary EU law.143 The real impact of Kadi could therefore be seen in the awareness it created for human rights concerns underlying the listing and de-listing procedure of targeted ­sanctions in the UN and European legal order. Viewed from this angle, Kadi may have been influential in encouraging the reform process of the de-listing procedure in both legal systems.144 The autonomy claims made by some regional actors challenge the ­universal security system provided by the UN, in the sense that they point towards the limits of this system. Especially in the case of the ­European Union, these claims have been influenced by the EU’s i­nternal system of human rights, which the EU also intends to use as guidelines in its external activities. By using its own human rights standard, the EU

139 

Kadi (n 137) para 59. Kadi Grand Chamber (n 136) para 308. 141  Case C-84/95 Bosphorus Hava Yollari Turizm ve Ticaret AS v Minister for Transport, Energy and Communications and others, Ireland [1996] ECR I-3953 [hereinafter Bosphorus]. 142  Case C-177/95 Ebony Maritime SA and Loten Navigation Co. Ltd v Prefetto della Provincia di Brindisi and other [1997] ECR I-1111 [hereinafter Ebony Maritime]. 143  Bosphorus (n 141) para 14. Ebony Maritime (n 142) para 20. 144  See also A Posch, ‘The Kadi Case: Rethinking the Relationship between EU Law and International Law?’ (2009) 15 Columbia Journal of European Law Online 1, 5. On the progress made in the de-listing procedure, see D Cortright and E De Wet, ‘Human Rights Standards for Targeted Sanctions’ (2010) Sanctions and Security Research Program, Policy Brief SSRP 1001-01 www.fourthfreedomforum.org/wp-content/uploads/2011/04/Sanctions-andHuman-Rights.pdf. 140 

Regional Security and International Law 91 tries to e­ stablish its own legitimacy as an international security provider. Although these claims might highlight some shortcomings of the universal system, they also encourage debate and are influential in the dynamic interpretation of the UN legal order and international law. After all, the UN, like regional security providers, is faced with a c­ hanging security environment and needs to develop ways of addressing new threats. The attempts of regional actors to interpret UNSC statements in favour of implied ex post authorisations to use force, when they have not obtained an explicit a priori mandate, as well as the recent Mali conflict during which ECOWAS had requested UNSC authorisation in advance of ­AFISMA’s engagement, indicate that regional actors still aim to be part of the universal security system provided by the UN and that they draw from its legitimacy when they engage in military crisis management. VI. CONCLUSION

The importance and contribution of regional actors in providing regional, and thereby international security, has been acknowledged by the UN through the frequent use of the terminology of ‘partnership’.145 Regional security threats are not limited to threats having their origin within the region. They can also come from outside. Through measures against non-members, regional actors increasingly try to prevent external threats from becoming a trigger for internal insecurity. They thereby attempt to prevent their region from becoming a source of international instability itself. The growing interconnectedness of threats also contributed to a changed perception of collective self-defence, which moves away from the notion of defence as a response to military invasions towards a functional approach to crisis management, wherever such a crisis occurs—either inside or o ­ utside the region.146 A changed global security environment, therefore, supports the inclusion of regional actors into the system of the UN as a whole and not the limitation of their role to Chapter VIII and intra-regional action. This open approach to the UN Charter reflects the broad understanding of regional security that has been proposed in this chapter. Regional security is not only part of global security, but is also intrinsically tied to it. Increasingly, regional stability cannot be achieved by intra-regional

145 

A Regional-Global Security Partnership (n 51). ‘NATO Ten Years After: Learning the Lessons’ (2 September 2011) NATO Review www.nato.int/docu/review/2011/11-september/10-years-sept-11/EN/index.htm; Heads of State and Government Participating in the Meeting of the North Atlantic Council in Strasbourg/Kehl (4 April 2009) Declaration on Alliance Security, Press Release www.nato. int/cps/en/natolive/news_52838.htm?mode=pressrelease. 146 NATO,

92  Julia Schmidt action alone. If a regional security provider tries to contribute to international security through internal action, either through peaceful or forceful means, then it qualifies as a ‘regional organisation’ under Chapter VIII. If the same regional actor addresses external threats and is acting outside its sphere of membership, its peaceful or forceful action can be regulated by Chapter VI and VII. As far as the military is concerned, it does not seem to matter whether the measures of regional security providers fall within the scope of Chapter VIII or VII when they address regional threats. Apart from when they are acting in self-defence, they need to be authorised by the UNSC to use force. One problem that still has to be overcome, however, is the sometimes unclear allocation of roles and responsibilities between regional security providers and the UN.147 Regional security providers are not always willing and prepared to get involved in a regional conflict.148 When they decide to get engaged, however, regional actors can add value to the UN system.

147 

UNU-CRIS (n 65) 26. Hettne, ‘Europe: Paradigm and Paradox’ in Schulz; Söderbaum and Öjendal (n 15) 22, 36. 148  B

5 International Criminal Justice and Security OLYMPIA BEKOU*

I. INTRODUCTION

I

NTERNATIONAL CRIMINAL JUSTICE is inextricably linked with the notion of security. A number of international criminal justice ­institutions have been set up by the principal security organ of the United Nations, the Security Council, in response to and as a m ­ easure to tackle situations where the international peace and security has been disturbed. M ­ oreover, the jurisdiction of the International Criminal Court (ICC, the Court), the first permanent international criminal justice ­institution, can be both triggered and blocked by the Security Council. In addition, the Council may play a role in regards to cooperation. The interaction between international criminal justice institutions and security is further exemplified in the peace and justice debate, which is relevant in situations where the Security Council operates and in settings where international criminal tribunals would also typically engage. However, the interplay of s­ ecurity and international criminal justice is wider than the operation of the S ­ ecurity Council.1 This chapter will explore this interaction between the concept of international criminal justice and security. It will primarily discuss ­ ­institutional relationships, through an examination of selected international criminal tribunals and their interaction with the Security Council. *  I would like to thank Daley Birkett for his research assistance. All errors and omissions are mine alone. 1 See, eg Court of Justice of the Economic Community of Western African States ­(ECOWAS), Hissein Habré v Republic of Senegal, Judgment, Case No ECW/CCJ/APP/07/08, 18 November 2010, www.courtecowas.org/site2012/pdf_files/decisions/judgements/2010/ HISSEIN_HABRE_v_REPUBLIQUE_DU_SENEGAL.pdf. Indeed, the Extraordinary African Chambers were established by the Government of Senegal following the ruling by ECOWAS that international custom requires that the former should establish a special ad hoc tribunal of ­international character to prosecute Mr Habré rather than instituting proceedings in its national courts. The Security Council had no involvement in the establishment of this tribunal.

94  Olympia Bekou Furthermore, by focusing on the role played by international criminal justice in enhancing security, the tensions, successes, and drawbacks ­ ­arising from such interaction will be highlighted. Whilst it is not appropriate to examine the structure of the Security Council and its division of power in this chapter, to better understand the relationship between the Security Council and international criminal justice institutions, its role will be framed around the following three axes: (i) Security Council involvement in the creation or termination of some of the international criminal institutions, (ii) possibility of intervention in their operation, and (iii) enhancement of State cooperation. II.  PEACE V JUSTICE? OR PEACE THROUGH JUSTICE?

International criminal justice institutions do not operate in a vacuum— they operate alongside a host of local, regional and international actors, each often with overlapping, and sometimes even conflicting, objectives. Such institutions frequently function in situations of ongoing insecurity, instability—even outright conflict. The relationship between international criminal justice and security is, therefore, perhaps best shown through an examination of the ‘Peace and Justice’ debate. This has been further compounded by the movement of the UN towards the direction of justice.2 Over the years, the understanding of peace has also changed. The division of peace into negative, ie the absence of war, and positive peace, a more sophisticated notion of peace tackling underlying problems,3 is useful in the peace and justice discussion, as international criminal justice is mostly associated with the latter.4 Therefore, when balancing the equation between peace and justice, States must remain alert to the implications that their actions may have on the work of international criminal justice institutions, particularly in the context of peace negotiations. A major step in bridging the gap between peace and justice5 was the very creation—by resolutions under Chapter VII of the UN Charter—of

2 See N White, The United Nations System: Toward International Justice (Boulder, Lynne ­Rienner, 2002) 48–58. 3  On the notion of positive peace see, eg, ibid, 48–51. 4  See JN Clark, ‘From Negative to Positive Peace: The Case of Bosnia and Hercegovina’ (2009) 8 Journal of Human Rights 360–84. 5  The representative of Hungary noted in the discussion of UNSC Res 808: ‘The way the international community deals with questions relating to the events in the former Yugoslavia will leave a profound mark on the future of that part of Europe, and beyond. It will make either easier or more painful, or even impossible, the healing of the psychological wounds the conflict has inflicted upon peoples, who for centuries have lived together in harmony and good neighbourliness, regardless of what we may hear today from certain parties to

International Criminal Justice and Security 95 the International Criminal Tribunal for the former Yugoslavia in 1993 (ICTY) and the International Criminal Tribunal for Rwanda (ICTR) in 1994 (together, ad hoc tribunals) by the Security Council.6 As observed by Richard Goldstone, the ad hoc tribunals’ first Chief Prosecutor, the decision for their creation ‘was necessarily founded upon the recognition of a direct link between peace and justice’.7 At the time of their creation it was envisaged that the Tribunals’ life span would be linked to the return of peace.8 This direct link became more tenuous over time, as evidenced by their continued existence to date and in the resolutions outlining their completion strategy, where reference to their contribution to lasting peace and security is made only in the Preamble and not in any of the operative ­paragraphs.9 As regards the ICC, several references to peace and justice can be found in the preambles of the Rome Statute of the International Criminal Court (Rome Statute),10 as well as that of the Negotiated ­Relationship Agreement between the International Criminal Court and the United Nations (UN-ICC Agreement).11 Several justifications have been put forward in support of the proposition that justice leads to an enduring peace.12 First, criminal trials can

the conflict. We cannot forget that the peoples, the ethnic communities and the national minorities of Central and Eastern Europe are watching us and following our work with close attention’. (Provisional Verbatim Record of 22 February 1993, UN Doc S/PV.31758, 19–20.) Moreover, Slovenia maintained that ‘the establishment of such a tribunal is a necessary and very important step, given the fact that those responsible for such crimes would be judged by an impartial judicial body as well as the fact that it could also contribute positively to the finding of solutions for the restoration of peace in the above-mentioned regions’. (Letter from the Permanent Representative of Slovenia to the United Nations addressed to the SecretaryGeneral, UN Doc S/25652 (22 April 1993).) 6  See UNSC Res 827 (25 May 1993) UN Doc S/RES/827; UNSC Res 955 (8 November 1994) UN Doc S/RES/955. 7  R Goldstone, ‘Justice as a Tool for Peace-Making: Truth Commissions and International Criminal Tribunals’ (1995–96) 28 New York University Journal of International Law and Politics 485, 486. 8  Report of the Secretary-General Pursuant to Paragraph 2 of Security Council Resolution 808, UN Doc S/25704 (1993) para 28. 9 See UNSC Res 1503 (28 August 2003) UN Doc S/RES/1503 and UNSC Res 1534 (26 March 2004) UN Doc S/RES/1534. 10  See Rome Statute of the International Criminal Court (adopted 17 July 1998, entered into force 1 July 2002) 2187 UNTS 3, preamble para 3. On the peace versus justice debate in the context of the ICC, see JN Clark, ‘Peace, Justice and the International Criminal Court: Limitations and Possibilities’ (2011) 9 Journal of International Criminal Justice 521. 11  See UNGA Res 58/874 (20 August 2004) UN Doc A/RES/58/874 for the draft text. The final text of the Agreement is available at www.icc-cpi.int/nr/rdonlyres/916fc6a2-78464177-a5ea-5aa9b6d1e96c/0/iccasp3res1_english.pdf. 12  For a critical view see WM Reisman, ‘Stopping Wars and Making Peace: Reflections on the Ideology and Practice of Conflict Termination in Contemporary World Politics’ (1998) 6 Tulane Journal of International & Comparative Law 5, 46: ‘The wars in former Yugoslavia ­provide acutely painful examples of the limited utility of war crimes tribunals for stopping wars and making peace’. cf DD Ntanda Nsereko, ‘The Role of the International Criminal Tribunals in the Promotion of Peace and Justice: The Case of the International Criminal

96  Olympia Bekou assist, particularly if regime change occurs, in purging threatening leaders and rehabilitating rogue States.13 Second, consistent with the objectives of international criminal justice, a key characteristic is the individualisation of guilt.14 The emphasis on individual guilt as opposed to an entire nation is important, ‘if there is to be any real hope of defusing ethnic tensions in th[e] region’.15 However, the problem with this approach is deciding where to draw the circle of guilt which, inevitably, results in selectivity.16 Third, criminal trials offer a forum for public and official acknowledgement of the victims, which, in turn, assists their healing process.17 This ­‘catharsis’18 is perhaps one of the most compelling justifications for j­ustice as part of a lasting peace. Fourth, holding trials helps to establish an ­accurate, if trialspecific, record of history.19 Fifth, the experience of domestic ­criminal law shows that criminal conduct is arguably better ­controlled through ­policing and able criminal justice.20 The same could also be applicable to situations of mass atrocity. Perhaps the most powerful argument in support of peace through ­justice is deterrence.21 Although neither the specific nor the general deterrent effect22 of international criminal justice institutions can be measured empirically,23 throughout the more than 20 year period during which such institutions have been operational, deterrence has continued to be put f­ orward as a key reason for their significance. Having explored some of the justifications behind the supposition that justice brings ­lasting peace, it has to be noted that the foregoing justifications are by no means exhaustive, nor can they be objectively verified by reference to hard ­ ­evidence in practice. Court’ (2008) 19 Criminal Law Forum 373; F Jessberger and J Geneuss, ‘The Many Faces of the International Criminal Court’ (2012) 10 Journal of International Criminal Justice 1081, 1091 (as regards the stigma attached to arrest warrants issued by the ICC); MC Nmaju, ‘The Role of Judicial Institutions in the Restoration of Post-Conflict Societies: The Cases of Rwanda and Sierra Leone’ (2011) 16 Journal of Conflict and Security Law 357. 13 G Bass, Stay the Hand of Vengeance: The Politics of War Crimes Tribunals (New Jersey, Princeton University Press, 2000) 287–89; 295–96. 14  Goldstone (n 7) 488. 15  T Meron, ‘The Case for War Crimes Trials in Yugoslavia’ (1993) 72 Foreign Affairs 122, 134. For a critical view on the issue of individualisation of guilt, see J Alvarez, ‘Rush to ­Closure: Lessons of the Tadic Judgment’ (1998) 96 Michigan Law Review 2031, 2032–35; 2082–89. 16  Bass (n 13) 297. As regards to allegations of selective justice at the ICC, see Clark (n 10) 524–27. 17  See, eg, Goldstone (n 7) 489. 18 PR Williams and MP Scharf, Peace with Justice? War Crimes and Accountability in the ­former Yugoslavia (Washington DC, Rowman & Littlefield, 2002) 20–21. 19  Goldstone (n 7). 20  ibid, 490. 21 ibid. 22  P Akhavan, ‘Justice in the Hague, Peace in the Former Yugoslavia? A Commentary on the United Nations War Crimes Tribunal’ (1998) 20 Human Rights Quarterly 737, 746. 23 See, eg, MC Bassiouni, Introduction to International Criminal Law (Leiden, Martinus Nijhoff, 2012) 1060. cf P Akhavan, ‘Beyond Impunity: Can International Criminal Justice ­Prevent Future Atrocities?’ (2001) 95 American Journal of International Law 7.

International Criminal Justice and Security 97 The timing of when justice efforts should occur is far more controversial. Whether justice for atrocities should form part of peace negotiations or should be delayed until peace has returned, has been particularly controversial. Whilst the notion of no peace without justice is certainly appealing, reconciling peace and justice is often problematic in practice.24 It has been argued that during complex peace negotiations, it might be necessary to sometimes delay justice for peace.25 The case of the former Yugoslavia offers an example of the interaction between peace and justice. Atypically, the establishment of the ICTY by the Security Council preceded the Dayton Peace Agreement and was therefore at the forefront of the peace negotiations. At the same time, persons indictable by the ICTY were also the key players in the negotiating process.26 It was soon realised that no viable peace could be achieved without their participation and, at least at that stage, peace seemed to be more important than justice.27 The binary of peace and justice is often seen through the lens of whether or not international criminal courts have been successful. For instance, it has been argued with regard to the ICTY that it had failed to bring peace on the ground because at least two of the most serious events in the Yugoslav conflict occurred even though the ICTY was operational.28 The Šrebreniča massacre and human rights abuses in Kosovo took place despite the operation of the Tribunal. This argument, although factually correct, should not be seen as evidence that the ICTY has failed to that end: the return of peace is a process and, arguably, a long one. Even incidents of the scale and intensity of the foregoing should not be regarded as proof that international criminal justice does not work. Regardless, it is difficult to measure the success or failure of the ad hoc tribunals in this area; their merits, from which their success can be ­ ­determined, must be viewed as a whole and not fragmented into the ­various aspects of their operation. Similarly, when it comes to ­assessing the contribution of the ICC to the restoration of peace, given that the Court has, at the time of writing, rendered three verdicts, namely in 24 See KM Clarke, ‘Kony 2012, the ICC, and the Problem with the Peace-and-Justice Divide’ (2012) 106 American Society of International Law Proceedings 309; R Cryer, ‘Prosecuting the Leaders: Promises, Politics and Practicalities’ (2009) 1 Gottingen Journal of ­International Law 45. See also, generally, L Keller, ‘Achieving Peace with Justice: The International ­Criminal Court and Ugandan Alternative Justice Mechanisms’ (2008) 23 Connecticut Journal of ­International Law 209; Clark (n 10) 522–29; 538–44. 25 See Anonymous, ‘Human Rights in Peace Negotiations’ (1996) 12 Human Rights ­Quarterly 249, 256–58. 26  And it would have been unrealistic to expect that they would agree to a treaty providing for their surrender to the Tribunal. 27 O Schuett, ‘The International War Crimes Tribunal for Former Yugoslavia and the ­Dayton Peace Agreement: Peace versus Justice?’ (1997) 4 International Peacekeeping 91, 101. 28 See, eg, D Orentlicher, ‘That Someone Guilty be Punished: The Impact of the ICTY in Bosnia’ (2008) Open Society Justice Initiative 26 www.opensocietyfoundations.org/sites/ default/files/that-someone-guilty-20100708.pdf.

98  Olympia Bekou Prosecutor v Thomas Lubanga Dyilo29 and Prosecutor v Germain Katanga and Mathieu Ngudjolo Chui,30 it is arguably difficult to assess whether it has in fact ­facilitated peace in the situation countries.31 The link between peace and justice has also been affirmed in ­ongoing conflicts. In that respect, the situation of Ukraine and Syria merit some discussion. On 17 April 2014, Ukraine lodged a declaration accepting the jurisdiction of the Court over acts committed on its territory from 21 November 2013 to 22 February 2014 under Article 12(3) of the Rome ­Statute,32 and a preliminary examination was opened by the ICC ­Prosecutor.33 It may be that the Security Council had no involvement in the referral of this particular situation to the ICC. The voluntary d ­ eclaration however, signifies the hope that ICC involvement will act as a catalyst for the return of peace in this country. Perhaps more poignant is the situation in Syria. Proponents of peace and justice, consider a Syrian referral to the ICC to be a key aspect of the return to peace in that country. A referral of this situation to the Court by the Security Council under its Chapter VII has been advocated,34 but at the time of writing, has yet to materialise, despite the ongoing conflict.35 Be that as it may, and given that Syria is

29  Trial Chamber I convicted Mr Lubanga Dyilo of committing war crimes on 14 March 2012, sentencing him to 14 years’ imprisonment. See Judgment pursuant to Article 74 of the Statute, ICC-01/04-01/06-2842 (14 March 2012); Decision on Sentence pursuant to Article 76 of the Statute, ICC-01/04-01/06-2901 (10 July 2012). 30  Trial Chamber II, having earlier severed the charges, acquitted Mr Ngudjolo Chui on 18 December 2012. See Judgment pursuant to Article 74 of the Statute, ICC-01/04-02/12-3-tENG (18 December 2012). Mr Katanga was convicted of committing one count of crime against humanity and four counts of war crimes on 7 March 2014. See Jugement rendu en application de l’Article 74 du Statut, ICC-01/04-01/07-3436 (7 March 2014). 31  For a critical view, see CL Sriram, ‘Conflict Mediation and the ICC: Challenges and Options for Pursuing Peace with Justice at the Regional Level’ in K Ambos, J Large and M Wierda (eds), Building a Future on Peace and Justice: Studies on Transitional Justice, Peace and Development: The Nuremberg Declaration on Peace and Justice (New York, Springer, 2009) 303–19, 305. cf F Bensouda ‘International Justice and Diplomacy’ New York Times (New York, 19 March 2013) www.nytimes.com/2013/03/20/opinion/global/the-role-of-the-icc-ininternational-justice-and-diplomacy.html. 32  See Declaration on Recognition of the Jurisdiction of the Court (9 April 2014) www. icc-cpi.int/en_menus/icc/press%20and%20media/press%20releases/Documents/997/ declarationRecognitionJuristiction09-04-2014.pdf; Letter from the Ministry of Foreign Affairs (6 April 2014) www.icc-cpi.int/en_menus/icc/press%20and%20media/press%20releases/ Documents/997/UkraineMFAdocument16-04-2014.pdf. 33  See WWW.icc-cpi.int/en_menus/icc/press%20and%20media/press%20releases/Pages/ pr999.aspx. 34  See, eg, A Jones, ‘Seeking International Criminal Justice in Syria’ (2013) 89 International Law Studies 802. 35  A number of States have endorsed the referral of the situation in Syria to the Court. See, eg, Letter from the Permanent Representative of Switzerland to the UN to the President of the Security Council (14 January 2013) www.news.admin.ch/NSBSubscriber/message/ attachments/29293.pdf. Sent by Switzerland on behalf of 58 States, including permanent members of the Security Council, France and the United Kingdom, the letter called for ­referral to the ICC ‘without exceptions and irrespective of the alleged perpetrators’.

International Criminal Justice and Security 99 not a State party to the Rome Statute, should a referral occur, due care should be taken not to replicate the weaknesses of previous referral resolutions, which shall be examined in the sections below. Overall, the relationship between peace and justice is not an easy one. Following mass atrocity, the return of positive peace takes time and is dependent on a great many factors. The engagement of international ­criminal justice institutions both as a means of restoring peace and in terms of delivering justice can assist in reaching that point more quickly and in a lasting manner. III.  THE SECURITY COUNCIL AND THE ICC: AN AWKWARD RELATIONSHIP?

As seen already, the relationship between international criminal justice and the UN system for the maintenance of international peace and security began with the creation of the ad hoc tribunals for the former Yugoslavia and Rwanda. However, given the imminent completion of their mandate, the focus of the remainder of this chapter rests on the development of this relationship after the establishment of the first permanent International Criminal Court with the adoption of the Rome Statute on 17 July 1998. The following section will therefore explore the evolving ways in which the Court and the Security Council cooperate inter se. The Rome Statute provides for ICC jurisdiction over four ‘core’ international crimes, namely genocide, crimes against humanity, war ­ crimes, and aggression—crimes which, according to the drafters, are so grave as to ‘threaten the peace, security and well-being of the world’.36 In order that the Court might consequently be best-placed to help bring an end to impunity for such crimes and to deter their future commission, the ­former was established in relationship with the UN system and cognisant of the Principles and Purposes of its Charter.37 Among these Purposes is the maintenance of international peace and security.38 The UN and the ICC are therefore expected to closely cooperate in order to mutually reinforce their shared goal of preventing the future commission of international crimes, which obstruct the maintenance of international peace, security, and, in turn, justice.39

36 

Rome Statute (n 10) preamble para 3. preamble paras 7, 9. See also, generally, ibid, Arts 2, 13, 16; UN-ICC Agreement (n 11). 38  See Charter of the United Nations (opened for signature 25 June 1945, entered into force 24 October 1945) 1 UNTS XVI (UN Charter) Art 1. 39 See, eg, RS Lee, ‘Introduction: The Rome Conference and its Contributions to ­International Law’ in RS Lee (ed) The International Criminal Court: The Making of the Rome Statute (Dordrecht, Kluwer, 1999) 1–39, 35–36. 37  ibid,

100  Olympia Bekou The Court is independent in the performance of its functions,40 but its relationship with the Security Council is somewhat complicated. The ­relevant provisions in the Rome Statute were notoriously difficult to ­negotiate41 and an acceptable solution was only reached at the end of the Rome Conference as part of the so-called ‘package deal’.42 Although the Council had no actual role in the establishment of the permanent ICC, it was made clear from the beginning that the former should play its part in the eventual operation of the Court. The ensuing role allocated to the Security Council vis-à-vis the Court is three-fold: dealing with ­aggression, referral and finally deferral of situations to the Court. The Security Council may also play an important role in the ICC cooperation regime, ­particularly in cases of enforcement of requests arising from referrals. The potential effects of the Security Council on State interaction with the ICC will now be examined as regards each of the foregoing functions. A.  The Security Council, the ICC, and the Crime of Aggression Turning to the first aspect of the Security Council’s relationship with the Court, the former has a role with regard to the crime of a­ ggression.43 Under Article 15bis of the Rome Statute, the Court will be able to e­ xercise 40  This independence is safeguarded in the Rome Statute. See Article 4, which refers to the Court as a whole, and Articles 40 and 42, which specifically mention the independence of the judges and the Prosecutor, respectively. Moreover, this independence is recognised by the United Nations in the UN-ICC Agreement (n 11). 41  See, eg, SA Williams and WA Schabas, ‘Article 13’ in O Triffterer (ed), Commentary on the Rome Statute of the International Criminal Court: Observers’ Notes, Article by Article (Oxford, Hart Publishing, 2008) 563–74; M Bergsmo and J Pejić, ‘Article 16’ in Triffterer, 595–604; L Yee, ‘The International Criminal Court and the Security Council’ in Lee (n 39) 143–52; L Condorelli and S Villalpando, ‘The Relationship of the Court with the United Nations’ in A Cassese, P Gaeta and JRWD Jones (eds), The Rome Statute of the International Criminal Court: A Commentary (Oxford, Oxford University Press, 2002) 219–34; Casesse et al, ‘Referral and Deferral by the Security Council’, ibid 627–56; WA Schabas, The International Criminal Court: A Commentary on the Rome Statute (Oxford, Oxford University Press, 2010) 293–304; 325–34. 42  It is noted that the solution adopted does not resemble the original 1994 ILC Draft. See Draft Statute for an International Criminal Court, Report of the ILC on the work of its ­forty-sixth session (2 May–22 July 1994) UN Doc A/49/10, 29–161, legal.un.org/ilc/­ documentation/english/A_49_10.pdf (ILC Draft). 43  For an overview of the crime of aggression as agreed by the States Parties at ­Kampala, see D Scheffer, ‘The Complex Crime of Aggression under the Rome Statute’ (2010) Leiden Journal of International Law 897; RS Clark, ‘Amendments to the Rome Statute of the ­International Criminal Court Considered at the First Review Conference on the Court, Kampala, 31 May– 11 June 2010’ (2010) 2 Gottingen Journal of International Law 689; J Trahan, ‘The Rome Statute’s Amendment on the Crime of Aggression: Negotiations at the Kampala Review Conference’ (2011) 11 International Criminal Law Review 49; M Politi, ‘The ICC and the Crime of ­Aggression: A Dream that Came Through and the Reality Ahead’ (2012) 10 Journal of International Criminal Justice 267; R Heinsch, ‘The Crime of Aggression After Kampala: ­Success or Burden for the Future?’ (2010) 2 Gottingen Journal of International Law 713.

International Criminal Justice and Security 101 j­urisdiction over the crime of aggression provided that a ­ number of ­procedural hurdles are met.44 That which is especially relevant to the ­present chapter, however, is the requirement under subsection 6 that, should the Prosecutor decide to investigate the alleged commission of the crime of aggression, the former must ascertain the position taken by the S ­ ecurity Council thereon. If the latter determines that an act of aggression has taken place, the Prosecutor may proceed; if not, ­however, the ­Prosecutor may ­proceed six months thereafter, but only with the ­authorisation of the ­Pre-Trial Chamber. In light thereof, the original proposal by the I­nternational Law Commission (ILC), according to which, prior to the commencement of any prosecution, the Security Council would have had to positively determine the commission of an act of aggression, has been dropped.45 However, in view of the inability of the Court to exercise j­urisdiction over the crime of aggression until ratification or acceptance by 30 States Parties to the Rome Statute and, in addition, no earlier than 1 January 2017, this chapter will focus on the role of the ­Security Council in referring situations to the Court, deferring situations under i­ nvestigation thereby, and in matters of cooperation. B. Referrals by the Security Council—Article 13(b) of the Rome Statute Security Council referrals pursuant to Article 13(b) of the Rome Statute fall within the so-called ‘trigger mechanisms’ of the Court’s jurisdiction. This particular aspect of the Rome Statute caused much controversy in n ­ egotiations prior to and during the Rome Conference.46 States’ views were divided: some consistently opposed any role for the S ­ ecurity ­Council,47 while others felt that such a role ought to be recognised.48 ­Several justifications may be put forward for the inclusion of referrals in the Rome Statute. It has been argued that referrals are necessary in order to ­acknowledge the proper role of the Security Council.49 In other words, because the S ­ ecurity Council is the principal organ of the UN entrusted with the maintenance of international peace and security, this

44 

See Rome Statute (n 10) Art 15bis. cf Rome Statute (n 10) Art 15ter. 46  See Williams and Schabas (n 41); Yee (n 41); Condorelli and Villalpando (n 41); Schabas (n 41). 47  Mainly India, supported by Mexico. See A/CONF.183/C.1/L.81, 15 July 1998. 48  Yee (n 41) 147. ‘At the Rome Conference, a clear majority of delegations supported the power of the Security Council to initiative proceedings of the Court’. 49  See, eg, P Kirsch, JT Holmes and M Johnson, ‘International Tribunals and Courts’ in D Malone (ed), The UN Security Council: From the Cold War to the 21st Century (Boulder, Lynne Rienner, 2004) 288. 45 

102  Olympia Bekou r­ esponsibility ought to be acknowledged by the ICC, which operates in situations where this peace and security have been disrupted. Moreover, it has been suggested that the Security Council, when referring a situation to the Court, is more likely to secure the necessary political support for the prosecution in ­question given that an indictment emanating therefrom carries more political weight than that arising from a State referral.50 This argument therefore bestows a ‘higher status’ upon Security Council referrals. Although this is not enshrined in the Rome Statute, in the r­eality of international politics it is likely that a Security Council referral will be of greater importance.51 Insofar as this assists in strengthening State ­compliance with the ICC regime, this is not necessarily deplorable. Referrals under Article 13(b) apply primarily to States which are ­members of the UN and which are also parties to the Rome Statute. In this case, of course, either another State, or the Prosecutor proprio motu is also able to initiate proceedings.52 However—for many—it is more ­controversial that the provision allowing for referrals by the Security Council may be applied in relation to States which are members of the UN but which are not States Parties to the Rome Statute. Accordingly, ­Security Council referrals assist in expanding access to the Court.53 Had the ­Security Council not been allowed to refer cases to the ICC, the Court would only have been able to be seized of jurisdiction through State ­referral or proprio motu action by the Prosecutor. Given the Court’s lack of universal jurisdiction,54 the fact that a Security Council referral does

50 See E Minogue, ‘Increasing the Effectiveness of the Security Council’s Chapter VII Authority in the Current Situations before the International Criminal Court’ (2008) 62 Vanderbilt Law Review 647, 673–75; GP Fletcher and JD Ohlin, ‘The ICC—Two Courts in One?’ (2006) 4 Journal of International Criminal Justice 428, 431–32. There is no guarantee, however, that when the Security Council has referred a situation to the ICC, it will support the Court regarding measures taken pursuant thereto. See, eg, L Oette, ‘Peace and Justice, or Neither? The Repercussions of the al-Bashir Case for International Criminal Justice in Africa and Beyond’ (2010) 8 Journal of International Criminal Justice 345, 358–59. 51  Along the same lines, India, in explaining its vote in the final session of the Plenary of the Rome Conference, made the following statement: ‘The power to refer is now unnecessary. The Security Council set up ad hoc tribunals because no judicial mechanism then existed to try the extraordinary crimes committed in the former Yugoslavia and in Rwanda. Now, however, the ICC would exist and the States Parties would have the right to refer cases to it. The Security Council does not need to refer cases, unless the right given to it is predicated on two assumptions. First, that the Council’s referral would be more binding on the Court than other referrals; this would clearly be an attempt to influence justice. Second, it would imply that some members of the Council do not plan to accede to the ICC, will not accept the obligations imposed by the Statute, but want the privilege to refer cases to it. This too is unacceptable’. Cited in M Bergsmo, ‘The Jurisdictional Regime of the International Criminal Court (Part II, Articles 11–19)’ (1998) 6 European Journal of Crime, Criminal Law and Criminal Justice 345, 353. 52  In accordance with Article 13(a) and 13(c) Rome Statute, respectively. 53  See, eg, Minogue (n 50) 649; Kirsch, Holmes and Johnson (n 49) 288. 54  Universal jurisdiction is absent from Article 12 of the Rome Statute as a basis for ICC jurisdiction. During the negotiations at the Rome Conference, it was suggested that the

International Criminal Justice and Security 103 not have to go through the jurisdictional hurdles under Article 12 of the Rome Statute, gives the Court fresh impetus to perform its functions. Although this was not discussed in the negotiation of the Rome Statute, the ­Security Council is able to refer to the ICC any situation relating to the core crimes within the Rome Statute—regardless of whether a State is party to the Statute or whether it has accepted the Court’s jurisdiction on an ad hoc basis. This has proved to be a welcome development for ­international criminal justice. A brief examination of the conditions that must be met in order that the Security Council might refer a situation to the ICC demonstrates that this procedure is equally welcome for the relationship between international criminal justice and the maintenance of peace and security. C.  Preconditions for Referring a Situation to the Court Turning now to the specifics of Article 13(b), the first observation is that the Security Council can only refer a ‘situation’ to the ICC. This term was the subject of much discussion. As early as the 1994 ILC Draft, it was noted that the Security Council ‘would not normally refer to the court a “case” in the sense of an allegation against named individuals’.55 The ILC members had suggested the term ‘matter’, which alluded to a situation to which Chapter VII of the UN Charter was applicable.56 In the 1995 and 1996 PrepComs, the options were still open and the terms ‘matters’, ‘cases’, and ‘situations’ were examined. The term ‘cases’ was eventually dropped before the Rome Conference.57 At the same time, ‘matters’ was thought to be too specific by a number of delegations, whereas the term ­‘situations’, too broad by the rest.58 The choice of the term ‘situation’ is in line with the language used generally in the Charter59 and in ­Chapter VII

Court should have universal jurisdiction for genocide, crimes against humanity and war crimes. However, this suggestion did not go very far. For an examination of States’ unwillingness to include universal jurisdiction in the Rome Statute resulting in the rejection of a German ­Proposal on the issue, see, generally, HP Kaul and C Kreß, ‘Jurisdiction and Cooperation in the Statute of the International Criminal Court: Principles and Compromises’ (1999) 2 Yearbook of International Humanitarian Law 143. See also O Bekou and R Cryer, ‘The ICC and ­Universal Jurisdiction: A Close Encounter?’ (2007) 56 International & Comparative Law ­Quarterly 49. 55 

See ILC Draft (n 42).

57 

Yee (n 41) 149.

56 ibid. 58 ibid.

59 Indeed, similar debates took place during negotiations regarding the wording of ­ rticle 34 of the UN Charter. See, generally, T Schweisfurth, ‘Article 34’ in B Simma, A D-E Khan, G Nolte and A Paulus (eds), The Charter of the United Nations: A Commentary (Oxford, Oxford University Press, 2012) 1097.

104  Olympia Bekou in ­particular, to which referral is directly linked. In addition, it is also found in ­Article 13(a) of the Rome Statute, which provides for State referrals. Once the Security Council has referred a situation to the Court’s ­Prosecutor, it cannot influence the conduct of individual criminal prosecutions that may arise as a result thereof.60 The Prosecutor is the one who will ‘individualise’ the case as such. Any other process would impact on the independence of the Court in the performance of its functions. Regardless, the Prosecutor enjoys prosecutorial discretion: in other words, it is for the Prosecutor to decide whether or not to initiate an investigation following a referral. Prosecutorial discretion is a fundamental aspect of the ICC regime.61 It is clear from Article 53 of the Rome Statute that the Prosecutor can, in accordance with the provisions thereof, opt to initiate an investigation or decide that there is not a sufficient basis to prosecute. Article 53 further provides for the opportunity for the Security Council to request the Pre-Trial Chamber to review the decision of the Prosecutor and to request that his or her decision be reconsidered. This is a significant provision, because it submits the decision of one person to a review by a body.62 The second condition provided under Article 13(b) of the Rome Statute is that, when referring a situation to the Court, the Security Council must be ‘acting under Chapter VII of the Charter of the United Nations’. As noted above, this chapter of the UN Charter concerns measures to maintain and restore international peace and security. The link between Chapter VII— and, in turn, the maintenance of international peace and security—and the Court, which aims to deliver international criminal justice, reveals that the drafters of the Rome Statute had in mind the link between peace and justice when drafting this provision. It can, moreover, be inferred from this intent that the Court represented—at least in the minds of the drafters of the Rome Statute—a concrete step towards restoring international peace and security. Theoretically, at least, the question arises as to whether the UN ­General Assembly is able to refer a case to the Court, acting under the ‘Uniting for

60  See, eg, SA Williams, ‘Article 11’ in Triffterer (n 41) 539–45. cf D Scheffer, ‘Staying the Course with the International Criminal Court (2001–02) 35 Cornell International Law Journal 47, 90. 61 See, generally, AM Danner, ‘Enhancing the Legitimacy and Accountability of ­Prosecutorial Discretion at the International Criminal Court’ (2003) 97 American Journal of International Law 510; MR Brubacher, ‘Prosecutorial Discretion within the International ­Criminal Court (2004) 2 Journal of International Criminal Justice 71. 62 For potential problems on this approach, see D Sarooshi, ‘The Peace and Justice ­Paradox: The International Criminal Court and the UN Security Council’ in D McGoldrick, P Rowe and E Donnelly (eds) The Permanent International Criminal Court: Legal and Policy Issues (Oxford, Hart Publishing, 2004) 99–100.

International Criminal Justice and Security 105 Peace’ resolution.63 There is no specific mention of this possibility in the Rome Statute, nor was it debated in the negotiations which ­preceded its adoption. Could it be argued that, failing to reach a decision, the power of the Security Council to refer situations to the Court is ­transferred to the General Assembly? Although extremely unlikely to occur in ­practice—and, indeed, this has not occurred in the first 10 years’ of the Court’s ­operation—it could be suggested that, since the power to deal with situations that threaten international peace and security is, exceptionally, granted to the General Assembly, the power to refer a situation to the Court would not contravene the aims of Article 13(b) of the Rome Statute.64 Indeed, given the persistent deadlock in the Security Council over, for example, the protracted armed conflict in Syria,65 a more robust role for the General Assembly might be welcome for the maintenance of international peace and security and, in turn, the delivery of justice for the alleged commission of core international crimes.66 Of the situations before the Court at the time of writing,67 two have been referred thereto by the Security Council acting under its Chapter VII ­powers, namely the Situation in Darfur, Sudan68 and the Situation in Libya.69 Following the referral of the Situation in Darfur and the decision by the Prosecutor to open an investigation, arrest warrants were issued for those individuals allegedly responsible for the commission of crimes under ICC jurisdiction, including against the President of Sudan, Omar al-Bashir.70 The Security Council has, however, been accused of neglecting its obligation to restore international peace and security by referring the

63  UNGA Res 377(V) (3 November 1950). The adoption of this resolution by the ­General Assembly allows it to take measures for the maintenance of international peace and ­security where there appears to be a threat to the peace, breach of the peace or act of aggression and in the event in which the Security Council is blocked due to lack of unanimity. For an ­analysis of the potential use of this resolution in modern international relations, see AJ Carswell, ‘Unblocking the Security Council: The Uniting for Peace Resolution’ (2013) 18 Journal of C­onflict and Security Law 453. 64  Although discussion was made in the ILC in order to include in the Rome Statute a provision which would enable the General Assembly to refer a situation to the Prosecutor independently and with the Security Council, this was dropped at an early stage. See ILC Draft (n 42) 44, para 5. 65 R Aloisi, ‘A Tale of Two Institutions: The United Nations Security Council and the ­International Criminal Court’ (2013) 13 International Criminal Law Review 147–68. 66  See Carswell (n 63); C Stahn, ‘How is the Water? Light and Shadow in the First Years of the ICC’ (2011) 22 Criminal Law Forum 175, 178. 67 See www.icc-cpi.int/en_menus/icc/situations%20and%20cases/Pages/situations%20 and%20cases.aspx. 68  See UNSC Res 1593 (31 March 2005) UN Doc S/RES/1593. 69  See UNSC Res 1970 (26 February 2011) UN Doc S/RES/1970. 70 For an analysis of immunities for State officials in light of this warrant, see, eg, D Akande, ‘The Legal Nature of Security Council Referrals to the ICC and its Impact on Al Bashir’s Immunities’ (2009) 7 Journal of International Criminal Justice 333.

106  Olympia Bekou situation to the ICC, rather than taking effective measures to bring an end to the humanitarian crisis in Darfur.71 If, as discussed earlier in the present chapter, justice is able to bring peace to conflict situations, it is arguable that, by referring the situation to the Court, the Security Council was in fact taking affirmative action under Chapter VII of the Charter. The referral of the Situation in Libya to the Court by the Security ­Council led to the issuance of arrest warrants for then Libyan Head of State ­Muammar Gadaffi,72 Saif Al-Islam Gaddafi, and Abdullah Al-Senussi. At the time of writing, however, the latter two suspects have yet to be surrendered to the ICC, despite having been apprehended and placed in custody by Libyan authorities. Indeed the decisions by the ICC Pre-Trial Chamber as regards the admissibility of the cases against Mr Gaddafi and Mr Al-Senussi, respectively, raise interesting questions of complementarity beyond the scope of the present chapter.73 However, for the purposes of the present chapter, it is notable that State Parties to the Rome Statute are obligated to cooperate with the Court pursuant to the terms thereof; non-State Parties, however, other than the State subject to referral by S ­ ecurity Council resolution, ie Sudan and Libya, are not.74 Indeed, the absence of an obligation in resolution 1970 for non-State Parties to cooperate with the Court enabled Mauritania, a non-State Party to the Rome Statute, to freely arrest Mr Al-Senussi and surrender him to Libya. In the same way, Sudanese President Omar al-Bashir is able to visit non-States Parties to the Rome Statute because they are not subject to any obligation

71  See M Happold, ‘Darfur, the Security Council, and the International Criminal Court’ (2006) 55 International & Comparative Law Quarterly 226. For further criticism, see L Condorelli and A Ciampi, ‘Comments on the Security Council Referral of the Situation in Darfur to the ICC’ (2005) 3 Journal of International Criminal Justice 590 (for its reference to immunity for nationals from non-States Parties to the Rome Statute and to exemption agreements and for its failure to provide for compensation to victims). cf R Cryer, ‘Sudan, Resolution 1593, and International Criminal Justice’ (2006) 19 Leiden Journal of International Law 195 (recognising the selectivity and incompleteness of the resolution, concludes that it is generally positive and welcome). 72  The case against Muammar Gadaffi was terminated following his death. See Decision to Terminate the Case Against Muammar Mohammed Abu Minyar Gaddafi, ICC-01/11-01/11-28 (22 November 2011). 73 See Decision on the admissibility of the case against Abdullah Al Senussi, ICC-01/11-01/11 (11 October 2013); Decision on the admissibility of the case against Saif Al-Islam Gaddafi, ICC01/11-01/11 (31 May 2013); Judgment on the appeal of Mr Abdullah Al-Senussi against the ­decision of Pre-Trial Chamber I of 11 October 2013 entitled ‘Decision on the admissibility of the case against Abdullah Al-Senussi’, ICC-01/11-01/11 (24 July 2014). For analysis of these issues, see, eg, C Stahn, ‘Libya, the International Criminal Court and Complementarity: A Test for “Shared Responsibility”’ (2012) 10 Journal of International Criminal Justice 325; F Mégret and M Giles Samson, ‘Holding the Line on Complementarity in Libya: The Case for Tolerating Flawed Domestic Trials’ (2013) 11 Journal of International Criminal Justice 571. 74  See, eg, J Trahan, ‘The Relationship between the International Criminal Court and the U.N. Security Council: Parameters and Best Practices’ (2013) 24 Criminal Law Forum 417, 462–63.

International Criminal Justice and Security 107 to arrest him under the terms of resolution 1593. It has been suggested that the S­ecurity Council ought to strengthen the cooperation regime with the ICC by placing a positive obligation on all UN Member States to cooperate when referring a situation to the Court in future.75 D. Deferrals by the Security Council—Article 16 of the Rome Statute A rather more invasive role for the Security Council—and one which bears particular relevance to the relationship between international ­criminal ­justice and security—is provided in Article 16 of the Rome ­Statute, ­entitled ‘Deferral of investigation or prosecution’. Under this provision, the S ­ ecurity Council is empowered to delay the ICC’s handling of a p ­ articular case for a limited period of time, should the Security Council believe that action taken by the Court is likely to hamper its efforts to maintain international peace and security.76 As noted above, the presence of this provision in the Rome Statute caused much controversy during the Rome Conference and was the subject of lengthy negotiations.77 On the one hand, Article 16 further details the close link between collective s­ ecurity and international criminal justice but, on the other hand, it subjects the operation of the Court to the will of a political organ, which as noted above, is inherently subject to inaction when unable to reach agreement.78 Supporters of this divisive provision maintained throughout the negotiations that it would prevent the Court from interfering with the maintenance of international peace and security, which is the primary responsibility of the Security Council.79 Notwithstanding, there seems to be an oxymoron here: although the Security Council’s creation of the ad hoc tribunals seems to suggest that justice leads to peace—that is to say, positive peace—in the case of the ICC, it appears that, at least occasionally, peace and justice

75 

See ibid, 463–64. cf Cassese, who argues that the Council ‘may request the Prosecutor to defer his activity only if it explicitly decides that continuation of his investigation or prosecution may amount to a threat to the peace’. A Cassese, ‘The Statute of the International Criminal Court: Some Preliminary Reflections (1999) 10 European Journal of International Law 144, 163. 77  See P Kirsch and JT Holmes, ‘The Rome Conference on an International Criminal Court: The Negotiating Process’ (1999) 93 American Journal of International Law 2. 78  India, in explaining its vote in the final session of the Rome Conference, observed that: ‘The power to block is in some ways even harder to understand or to accept. On the one hand, it is argued that the ICC is being set up to try crimes of the gravest magnitude. On the other, it is argued that the maintenance of international peace and security might require that those who have committed these crimes should be permitted to escape justice, if the Council so decrees. The moment this argument is conceded, the Conference accepts the proposition that justice could undermine international peace and security’. Cited in Bergsmo (n 51) 358. 79  Yee (n 41) 150. 76 

108  Olympia Bekou are mutually exclusive and, in that respect, the operation of the Court must temporarily be put on hold. The origins of Article 16 of the Rome Statute can be traced back to ­Article 23(3) of the ILC Draft. The latter, however, did not allow for the commencement of a prosecution in situations subject to Security Council action under Chapter VII of the UN Charter, unless the Council decided otherwise.80 This approach was eventually dropped during the negotiation process, giving more independence to the Court and to the States ­Parties to the Rome Statute. Had this provision been accepted, it would have been akin to the provision of Article 12 of the UN ­Charter. An equivalent ­provision to deferral is not found either in the case of the ad hoc ­tribunals, despite their creation by Security Council resolutions and where the ­inclusion of a similar provision could have perhaps been expected due to the fact that they were created on this basis. Despite the shift away from the ILC Draft following the so-called ‘Singapore ­Compromise’,81 it is ­ nevertheless notable for the relationship between international ­criminal justice and peace and security that a political organ—the ­Security ­Council—has the power to make political decisions and to thereafter impose them on the Court.82 In an attempt to minimise the impact of this controversial procedure, perhaps the most striking feature of the Rome Statute is that it places a legal framework on action taken by the Security Council. This ­framework was, moreover, formulated without the consent of all five permanent members thereof. The Rome Statute contains preconditions for the ­ exercise of Article 16, which potentially impose limits on action by the Council. In this sense, it is important for the interaction of State Parties with the ICC because, provided that these preconditions are accepted by the Council, their ­interaction with the Court is channelled through an agreed framework and State consent is accordingly less restricted by the Security ­Council than it could have been without the presence of these preconditions. However, it is important to emphasise that, in terms of United Nations law, Article 16 may be ignored by the Security Council, which is able to override the conditions laid down therein. Security Council ­resolutions

80 

See ILC Draft (n 42) Art 23(3). (n 41) 150. Singapore put forward a proposal in the August 1997 session of the Preparatory Committee, by which it reversed the process detailed in the ILC Draft, but it was not until support came in December 1997 from the United Kingdom that this proposal shaped Article 16 of the Rome Statute as finally agreed. 82  On the UN Security Council-ICC relationship, see V Gowlland-Debbas, ‘The Relationship between Political and Judicial Organs of International Organisations: The Role of the Security Council in the New International Criminal Court’ in L Boisson de Chazournes, C Romano and R Mackenzie (eds), International Organisations and International Dispute ­Settlement: Trends and Prospects (Ardsley NY, Transnational Publishers, 2002) 195, 212–17. 81 Yee

International Criminal Justice and Security 109 1422 and 1487 are examples thereof.83 Such resolutions, part of the US ­offensive against the Court, go beyond Article 16. Even though the ­language used therein purports to respect Article 16 of the Rome ­Statute, by referring, for instance, to Chapter VII of the UN Charter, and by ­complying with the 12-month period specified in Article 16, in essence, it completely d ­ isregards the provision. Article 16 was introduced in the Rome Statute to ensure that the Court does not, by its investigations or prosecutions, harm the Security Council’s efforts in restoring peace and security. For a referral to be made there is a clear prerequisite that such a situation exists. However, in the context of resolutions 1422 and 1487, there was no specific situation under examination by the Court ­hindering the ­Security C ­ ouncil in the performance of its mandate.84 Rather, the ­foregoing resolutions c­onstituted an unprecedented, wide-ranging and thoroughly unnecessary intervention in a purely consensual system, and were ­nothing less than an assault on the Court.85 In June 2004, resolution 1487 was not renewed, amidst concerns about the treatment of Iraqi ­prisoners in the Abu Ghraib prison in Baghdad, restoring some faith in the Security Council and its role in international criminal justice and allowing State Parties to the Court to continue to enjoy protection under the Rome Statute. This episode d ­ emonstrates the potential impact that the Security Council is able to have on the ability of the Court to distribute justice on the one hand and, arguably, the way in which the maintenance of ­international peace and security is prioritised at the expense of the ­dispense of justice by ­international ­criminal mechanisms on the other. More recently, both Kenya and the African Union have consistently ­pursued efforts to secure a deferral of the proceedings against Kenyatta

83  UNSC Res 1422 (12 July 2002) UN Doc S/RES/1422; UNSC Res 1487 (12 June 2003) UN Doc S/RES/1487. 84  Operative paragraph 1 of UNSC Res 1422 is particularly revealing: ‘Requests, consistent with the provisions of Article 16 of the Rome Statute, that the ICC, if a case arises involving current or former officials or personnel from a contributing State not a Party to the Rome Statute over acts or omissions relating to a United Nations established or authorized operation, shall for a twelve-month period starting 1 July 2002 not commence or proceed with investigation or prosecution of any such case, unless the Security Council decides otherwise’. See also operative paragraph 1 of UNSC Res 1487, which repeats its counterpart in UNSC Res 1422 verbatim. 85 For an analysis of the wider issues surrounding UNSC Res 1422, see R Cryer and ND White, ‘The Security Council and the International Criminal Court: Who’s Feeling ­Threatened? (2002) 8 International Peacekeeping 141; C Stahn, ‘The Ambiguities of Security Council Resolution 1422’ (2002) 14 European Journal of International Law 85; S Zappalà, ‘The Reaction of the US to the Entry into Force of the ICC Statute: Comments on UNSC ­Resolution 1422 (2002) and Article 98 Agreements’ (2003) 1 Journal of International Criminal Justice 114; M El Zeidy, ‘The United States Dropped the Atomic Bomb of Article 16 of the ICC S ­ tatute: Security Council Power of Deferrals and Resolution 1422’ (2002) 35 Vanderbilt Journal of ­Transnational Law 1503. UNSC Res 1422 also raises issues of collective security which are beyond the scope of this chapter.

110  Olympia Bekou and Ruto under Article 16 of the Statute. Since the establishment of the African Union (AU) Contact Point on the matter of Africa and the ICC,86 the AU and a number of its Member States have expended considerable diplomatic capital in order to lobby for an Article 16 deferral. Most notably, in November 2013, one week before the annual session of the Assembly of States Parties (ASP) was to specifically consider the issue of prosecuting serving heads of state, the Security Council was presented with a draft resolution to be adopted under Chapter VII to defer the ­proceedings against Ruto and Kenyatta for one year.87 While it was made clear by three of the permanent five members of the Council that this resolution would not be allowed to pass (resolutions requiring the affirmative vote of at least nine council members and no veto by a P5 member), the vote forced by Rwanda once again heightened the tension leading up to the 2013 ASP meeting a week later. With seven Council members voting in favour of the ­deferral (Azerbaijan, China, Morocco, Pakistan, Russia, Rwanda and Togo), the draft failed to meet the requisite number of votes needed to be adopted.88 However, notably, not a single state voted against the ­resolution, choosing instead to abstain.89 From a political perspective, the decision to abstain rather than to vote against the resolution may be seen as an attempt to mitigate the effect of the draft resolution upon relations between Kenya and the states opposed to a deferral. The statements in explanation of the vote provide some ­suggested consequences of the vote; the representative of ­Guatemala stated that the vote ‘had erected a “barrier of distrust”’ between the ­countries submitting the draft in full knowledge that it would not be adopted and those opposed to making a deferral.90 Had states voted against the r­esolution or a P5 Member exercised the veto—themselves knowing that was ­unnecessary given that there were already ­insufficient votes in favour of the deferral, it may have unnecessarily exacerbated the sense of ­division that appears to have taken hold. EU Member States which abstained explained that the draft resolution’s sponsors had failed to demonstrate that the ICC proceedings against the Kenyan leaders posed a threat to international peace and security—the requisite t­ hreshold for the exercise of the ­Council’s Chapter VII power,91 while France’s representative stated that the vote was inappropriate given the ongoing dialogue

86 

African Union Decision Ext/Assembly/AU/Dec.1 at para 10(iii). Security Council, ‘Security Council Resolution Seeking Deferral of Kenyan ­Leaders’ Trial Fails to Win Adoption, with 7 Voting in Favour, 8 Abstaining’, Press Release 15 ­November 2013 (SC/11176). 88 ibid. 89 The abstaining states were Argentina, Australia, France, Guatemala, Luxembourg, Republic of Korea, United Kingdom and France. ibid. 90  UN Security Council Press Release (n 87). 91  ibid, Statement in explanation of the vote by the UK Representative. 87 UN

International Criminal Justice and Security 111 of the Council with African states, including those on the Council.92 In contrast Rwanda, speaking after the vote stated ‘let it be written in history that the Council failed Kenya and Africa on this issue’, while statements condemning the outcome were also made by the representative of Kenya, and the representative of Ethiopia in his country’s capacity as Chair of the African Union.93 E. Cooperation in the Field: The ICC and UN Peacekeeping Operations The Security Council is able to play a crucial role in the cooperation regime between the Court and (non-)States Parties to the Rome Statute.94 ­Moreover, cooperation between the UN and the ICC is mandated by the Negotiated Relationship Agreement concluded by the parties in 2004.95 Of the many forms of cooperation undertaken pursuant to this obligation, that which has particular relevance to the relationship between i­nternational criminal justice and security is the increasing collaboration between UN peacekeeping operations and the ICC in situation-States. In the early years of the Court’s operation, interaction with peacekeeping missions mainly took place through the Office of the Prosecutor; in fact, several Memoranda of Understanding (MoU) were concluded between the p ­ arties in order to facilitate better cooperation and to enable the Court to take advantage of the unique position of peacekeeping missions in situationStates.96 For example, in the Democratic Republic of the Congo (DRC),

92 

ibid, Statement in explanation of the vote by the French Representative. Statements in explanation of the vote by the Rwandan, Kenyan and Ethiopian Representatives. 94  The role of the Security Council is explicitly envisaged with regard to cooperation in Article 85(5)(b) of the Rome Statute. 95  UN-ICC Agreement (n 11) Art 3: ‘The United Nations and the Court agree that, with a view to facilitating the effective discharge of their respective responsibilities, they shall cooperate closely, whenever appropriate, with each other and consult each other on matters of mutual interest pursuant to the provisions of the present Agreement and in conformity with the respective provisions of the Charter and the Statute’. See also Art 18 as regards the obligation for the UN to enter into agreements with the Prosecutor to facilitate cooperation. 96  See, eg, Memorandum of Understanding between the United Nations and the International Criminal Court Concerning Cooperation between the United Nations Organization Mission in the Democratic Republic of the Congo (MONUC) and the International Criminal Court, ICC-01/04-01/06-1267-Anx2 (7 April 2008) www.icc-cpi.int/iccdocs/doc/ doc469628.pdf (MoU). The Court concluded a similar agreement with the UN Operation in Côte d’Ivoire (ONUCI) on 12 June 2013 and is now in the process of negotiating a comparable ­memorandum with the United Nations Multidimensional Integrated Stabilization Mission in Mali (MINUSMA). See ‘Report of the Court on the status of ongoing cooperation between the International Criminal Court and the United Nations, including in the field’ ICC-ASP12/42 (14 October 2013) (Report on ICC-UN Cooperation). 93  ibid,

112  Olympia Bekou the UN p ­eacekeeping operation—the UN Organisation ­ Stabilisation ­Mission in the Democratic Republic of the Congo (MONUSCO), f­ ormerly MONUC—is particularly well-placed to provide the Court with ­certain measures of assistance, including, but not limited to, logistical support, security, and facilitating access to evidence, witnesses, and other ­documents and ­information relevant to ICC investigations. It is noted, however, that c­ ooperation between the Court and MONUSCO ­pursuant to the MoU thereto may take place only following a request by the Court and with prior ­written consent from the Government of the DRC.97 Cooperation between MONUSCO and the Court under the MoU is therefore both conditional and indirect and, as a result, inherently limited.98 However, with the adoption of resolution 2098 by the UN Security Council, there has been an apparent shift in the way in which MONUSCO is able to cooperate with the Court in practice.99 Resolution 2098, inter alia, authorised the formation of ‘Intervention Brigades’, empowered to provide more proactive assistance to the Court.100 Although still mandated to cooperate with the ICC by working with the Government of the DRC, it has been argued that MONUSCO is no longer prevented from entering into direct contact with the Court without having to seek an explicit authorisation from the Government.101 At the very least, resolution 2098 has strengthened the cooperation regime between MONUSCO, the ­Government of the DRC, and the ICC in the same way that Security Council resolution 1638,102 which mandated the Nations Mission in ­Liberia (UNMIL) to apprehend and detain former Liberian President Charles ­Taylor for the purpose of facilitating his transfer to the Special Court of Sierra Leone (SCSL), strengthened the cooperation regime as between the UN and that tribunal.103

97 

Ibid, MONUSCO MoU. a thorough analysis of the MoU, see M Melillo, ‘Cooperation between the UN Peacekeeping Operation and the ICC in the Democratic Republic of the Congo’ (2013) 11 Journal of International Criminal Justice 763–82. 99  See UNSC Res 2098 (28 March 2013) UN Doc S/RES/2098 para 12. In this resolution, ‘the Security Council authori[sed] MONUSCO, through its military component […] to take all necessary measures to […] [s]upport and work with the Government of the DRC to arrest and bring to justice those responsible for war crimes and crimes against humanity in the country, including through cooperation with […] the ICC’. [Emphasis added.] This mandate was extended until 31 March 2015 by UNSC Res 2147 (28 March 2014) UN Doc S/RES/2147. 100  UNSC Res 2098 (28 March 2013) UN Doc S/RES/2098, para 9. 101  Melillo (n 98) 780–81. Note, however, that ‘the main obligation to cooperate with the ICC lies with the DRC, having ratified the ICC Statute and referred this specific situation to the Court’. ibid, 781. 102  UNSC Res 1638 (11 November 2005) UN Doc S/RES/1638. 103  See M Frulli, ‘A Turning Point in International Efforts to Apprehend War C ­ riminals: The UN Mandates Taylor’s Arrest in Liberia’ (2006) 4 Journal of International Criminal J­ ustice 351. Similarly, the ability of IFOR/SFOR, the NATO-led multinational force in Bosnia and 98  For

International Criminal Justice and Security 113 In a similar vein, in April 2014, the Security Council adopted r­ esolution 2149, which established the UN Multidimensional Integrated ­Stabilization Mission in the Central African Republic (MINUSCA).104 Among the i­ nitial, ‘priority tasks’ of this peacekeeping mission is cooperation with the Court in order to apprehend those suspected of the ­commission of core international crimes.105 This mandate—­proactive from the outset—­ significantly strengthens the UN-ICC cooperation regime in the Central African Republic (CAR). That the Security ­Council chose to adopt similar wording in the foregoing resolution to that employed in resolution 2098 suggests an evolving pattern in the way in which the former e­ nvisages the fulfilment of its obligation to cooperate with the Court under the Rome Statute and the UN-ICC Agreement. Such a development is to be welcomed: the assistance that a 12,000-strong force created under UN auspices is able to provide in the CAR—a State Party to the Rome Statute that has long struggled with an increasingly worsening and complex security situation—cannot be underestimated.106 As noted by the Court in its Report to the Assembly of States Parties on the status of ongoing cooperation with the UN, including in the field,107 the ability to frame and carry out broader, more proactive mandates requires a willingness to cooperate not only on the part of the UN and the ICC but also from the situation-State. Though the Security Council explicitly stated in resolution 2098 that the creation of ‘Intervention Brigades’ in the DRC was ‘on an exceptional basis and without creating a precedent or any prejudice to the agreed principles of peacekeeping’,108 it is hoped that by strengthening the mandate of MONUSCO in this way—namely by developing closer synergies between the Court, UN peacekeeping o ­ perations, and national legal actors—the former might be better equipped to avert the future commission of core international crimes, which not only

­ erzegovina, to execute arrest warrants strengthened the cooperation regime as between H the States in question and the ICTY. See, eg, P Gaeta, ‘Is NATO Authorized or Obliged to Arrest Persons Indicted by the International Criminal Tribunal for the Former Yugoslavia?’ (1998) 9 European Journal of International Law 174. 104 

UNSC Res 2149 (10 April 2014) UN Doc S/RES/2149. ibid, para 30(f)(i): ‘To support and work with the Transitional Authorities to arrest and bring to justice those responsible for war crimes and crimes against humanity in the [CAR], including through cooperation with States of the region and the ICC’. Note the similarities with UNSC Res 2098 (n 99) para 12. 106 See, eg, ICC Office of the Prosecutor, ‘Statement of the Prosecutor of the International Criminal Court, Fatou Bensouda, in relation to situation in Central African Republic’ (7 August 2013); ibid, ‘Statement of the Prosecutor of the International Criminal Court, Fatou Bensouda, in relation to the escalating violence in the Central African Republic’ (9 December 2013). 107  Report on ICC-UN Cooperation (n 96). 108  UNSC Res 2098 (n 99) para 9. 105 

114  Olympia Bekou obstruct the maintenance of international peace and security but also the delivery of justice. Indeed, as discussed above, although the possibility for ­overlap between peace and justice exists in situations where issues of security are present, broader mandates such as that in resolution 2098 reduce the scope for competition. IV. CONCLUSION

The interplay between international criminal justice and security ­covers a number of areas. The chapter has highlighted some aspects of this interaction. The Security Council is empowered to make important ­ ­decisions that affect the international community as a whole. The C ­ ouncil, through its function in the field of international criminal justice, intervenes, thereby affecting interaction between States and the institutions established to deliver such justice. However, this role differs amongst institutions: from the hegemony of the Security Council in relation to the ad hoc tribunals to the accommodation thereof in the establishment of the Rome Statute system of justice, the involvement of the Security Council in international criminal justice has diminished from a position of absolute control to that of a partnership with States and institutions. This evolution is welcome insofar as it avoids international criminal justice becoming too closely linked to security, thereby protecting the institutions established for the purposes of delivering justice from excessive and adverse politicisation. The notions of international criminal justice and security are, for ­better or worse, interrelated: the Court, responsible for, inter alia, delivering the former and the Security Council, tasked with primary responsibility for maintaining the latter, principally operate in conflict and post-conflict situations. It is hoped that these organs can, through ever closer cooperation, continue to offer reciprocal support in order to realise their—at least indirectly—shared objective of combating impunity for the c­ ommission of the four core crimes falling under the jurisdiction of the ICC—the most serious international crimes of concern to the international community as a whole—which, by their very nature, create, foster, and thrive on ­insecurity and thereby hamper efforts by the Security Council to maintain and restore peace.

6 Security and International Law: The ‘Responsibility to Protect’ ALEXANDRA BOHM*

I. INTRODUCTION

O

NE OF THE most significant areas of security and international law is that of threats to the security of individuals. As this book deals elsewhere with the concept of ‘human security’, this chapter is dedicated to one particular conception of how to address the threats to individual security posed by mass atrocity crimes—the doctrine of ‘Responsibility to Protect’ (RtP). RtP was born in 20011 with the publication of a report by the International Commission on Intervention and State Sovereignty (ICISS)2 aimed at being a comprehensive doctrine capable of overcoming the deadlock between state sovereignty/non-intervention and human rights, which had characterised the humanitarian intervention debate in previous decades, due to its broader understanding of security crises.3 RtP’s core idea is the primary responsibility of a state towards the security of its population and the secondary responsibility of the international community in this regard. The idea has undergone several ‘­evolutions’ from its promulgation in 2001, through the General

*  This chapter has benefitted from comments by Dr Garrett Brown and Dr Richard Collins, as well as discussions at the following conferences: ILA British Branch Annual Conference 2012 (University of Nottingham); Responsibility to Protect in Theory and in Practice 2013 (University of Ljubljana); Beyond the Responsibility to Protect: Towards Responsible Use of International Law 2013 (University of Hull). Parts of this chapter—especially Section III— draw upon A Bohm, ‘Responding to Crises: the Problematic Relationship between Security and Justice in the Responsibility to Protect’ (2013) 4 Global Policy 247. 1  The idea of sovereignty as responsibility towards a state’s own citizens was first introduced in 1996 in the context of refugees—see especially: F Deng et al, Sovereignty as Responsibility: Conflict Management in Africa (Washington DC, Brookings Institution Press, 1996). 2 ICISS, The Responsibility to Protect (Ottowa, International Development Research Centre, 2001). 3  For references to this ‘deadlock’ see, eg: K Annan, Millennium Development Report to the 55th Session of the UNGA (5 September 2000) UN Fact Sheet DP1/2083/Rev.1; ICISS (n 2) foreword vii.

116  Alexandra Bohm ­ ssembly’s adoption of parts of the ICISS report in its World Summit A Outcome Document in 2005,4 to the Secretary General’s Report on the implementation of the doctrine in 2009.5 These evolutions have demonstrated areas of clear consensus between states and also areas where issues are clearly unresolved and lacking international consensus on human protection. This chapter addresses some of these issues by exploring the role of the RtP doctrine in providing security to vulnerable individuals. It does so in the light of the book’s two main questions—whether international law can address the types of security risks that threaten our existence in the twenty-first century and where and how international law might fall short in meeting the problems that arise in situations of insecurity. To answer these questions, the chapter critically engages with RtP, examining how it constructs the nature of insecurity and what assumptions are made about the role of international law in providing security. ­Section II introduces the idea of ‘responsibility to protect’ and its development. Section III examines some key assumptions underpinning RtP. The first assumption is the very foundation of RtP—that the internal crises in which mass atrocity crimes occur are the key threat to individual security today. The second assumption is that because these crises are associated with weak, failing or non-democratic regimes, domestic governance reform is the most important crisis-prevention strategy. The third assumption is that, given that the fault lies with the government that has failed to protect its people, the international community’s role is to respond by rescuing those at risk, should prevention fail. Section IV argues that these assumptions provide an incomplete picture of the situations of insecurity in which mass atrocity crimes occur and, thus, give a faulty analysis of suitable prevention measures. It criticises RtP’s assumptions for neglecting more chronic socio-economic problems, related to violence and insecurity, and consequent mass abuses of civil and political rights. Related to this implicit decoupling of socio-economic from civil and political rights, this section also argues that RtP insufficiently addresses the role of the international community in actually contributing to the sorts of crises that RtP attempts to address. Section V considers the place of RtP in international law and relates arguments about RtP to those concerning international law’s ‘fitness for purpose’ in addressing security threats in the twenty-first century more generally. Some concluding thoughts are then offered.

4  UNGA, ‘World Summit Outcome Document’ UNGA Res 60/1 (24 October 2005) (Outcome Document). 5  B Ki-moon, ‘Implementing the Responsibility to Protect: Report of the Secretary General’ UNGA 63rd Session (12 January 2009) UN Doc A/63/677.

Security and International Law 117 II.  THE DEVELOPMENT OF THE ‘RESPONSIBILITY TO PROTECT’ DOCTRINE

RtP has been discussed widely following the ICISS report, including in the UN High Level Panel Report of 20046 and various more recent reports by the Secretary General. This section discusses the three most detailed iterations of the RtP concept in order to understand how it has developed and which of its concepts remain problematic: the ICISS report of 2001, the UN World Summit in 2005 and the Secretary General’s implementation report of 2009. A. The International Commission on Intervention and State Sovereignty 2001 The 2001 ICISS report was commissioned by the Canadian Government to find a way forward from the state sovereignty–human rights deadlock, which had characterised the earlier humanitarian intervention debate.7 Having met with a wide range of actors, including non-governmental organisations (NGOs), governments and civil society groups, the Commission produced a detailed report covering the changing international context of security threats; changes in the terms of the humanitarian intervention debate and the meaning of sovereignty; the three ‘pillars’ of responsibility (to prevent, to react and to rebuild); together with operational issues relating to military intervention, including the question of Security Council authority. Finally, the report ended with thoughts for the ‘way forward’ from the analysis therein to action in the future.8 The changing international context includes new security issues, such as the increase in intra-state conflicts frequently associated with weak states and frequently involving high civilian casualties.9 At the same time, the report comments that, since the end of World War II, international law has increasingly become concerned with protecting the individual through increasing numbers of human rights treaties (including the Genocide Convention and various more general human rights conventions).10 In this context, the report notes that a principle of intervention is emerging for human protection purposes—including military intervention in extreme cases of major harm to civilians.11 In light of this, the Commission­ 6  UN, ‘A More Secure World: Our Shared Responsibility’ Report of the High Level Panel on Threats, Challenges and Change (29 November 2004) UN Doc A/59/565. 7  ICISS (n 2) 2. 8  ICISS (n 2) 69. 9  See ICISS (n 2) 4. 10  ICISS (n 2) 6 para 1.25, 14. 11  ICISS (n 2) 16 para 2.25.

118  Alexandra Bohm r­ ecommended c­ hanging the terms of the debate from a ‘right to intervene’ to a ‘responsibility to protect’, focusing on the victims rather than the interveners and encompassing a broader responsibility than just that of military ­intervention.12 The core principle of the report is that Where a population is suffering serious harm, as a result of internal war, insurgency, repression or state failure, and the state in question is unable or unwilling to halt or avert it, the principle of non-intervention yields to the international responsibility to protect.13

The ICISS report did not receive an immediate response from the international community, but was debated four years later by the General Assembly as part of its World Summit. B.  The United Nations General Assembly World Summit 2005 In two paragraphs of its ‘Outcome Document’, the General Assembly endorsed the key principle of RtP in its 2005 World Summit.14 Paragraph 138 of the Outcome Document refers to states’ responsibility to protect their populations from genocide, war crimes, ethnic cleansing and crimes against humanity, and encourages the international community to assist states in exercising this responsibility.15 Paragraph 139 acknowledges the responsibility of the international community to help protect populations against these crimes. It notes that this responsibility is to be carried out peacefully in accordance with Chapters VI and VIII of the UN Charter or, if necessary, by acting collectively through the Security Council and ­Chapter VII, on a case-by-case basis, where a state is ‘manifestly failing’ in its protective duty. It also recommends that the General Assembly continue to consider the responsibility to protect populations, ‘bearing in mind the principles of the Charter and international law’.16 Although this has been hailed as a revolutionary norm,17 the Outcome Document is a somewhat cautious approach to the detailed content of the full ICISS report, such as in its reference to the option of General Assembly-mandated action,18 or to the suggestion made by ‘a senior representative of one of the Permanent 12  ICISS (n 2) 17, para 2.29; G Evans, ‘Responsibility to Protect: An Idea whose Time has Come … and Gone?’ (2008) 22 International Relations 283. 13  ICISS (n 2) xi. 14  UNGA, Outcome Document (n 4). 15  UNGA, Outcome Document (n 4) para 138. 16  UNGA, Outcome Document (n 4) para 139. 17 See, eg, R Cooper and J Kohler, Responsibility to Protect: Global Moral Compact (­Basingstoke, Palgrave MacMillan, 2005); N Wheeler, ‘A Victory for Common Humanity? The Responsibility to Protect after the 2005 World Summit’ (2005) 2 Journal of International Law and International Relations 95, 97. 18  ICISS (n 2) 48 para 6.7; 53 paras 6.29–6.30.

Security and International Law 119 Five countries’ that the Security Council’s ‘P5’ might refrain from using their veto power.19 Nevertheless, it seems that the idea of both states and the international community having a responsibility towards individuals at risk from mass atrocities has been accepted by the General Assembly, which instructed Secretary General Ban Ki-moon to continue to report on the matter. C.  Implementing the Responsibility to Protect, 2009 One of the results of the General Assembly’s request to the Secretary General was the report ‘Implementing the Responsibility to Protect’, produced in 2009.20 The report suggests a three-pillar strategy for implementing the responsibility to protect (different from the pillars in the 2001 report of prevention, reaction and rebuilding). These are: the state’s responsibility to protect (pillar 1); the international community’s responsibility to assist, especially with capacity-building (pillar 2); and the need for a timely and decisive response to a crisis (pillar 3).21 In relation to these pillars, the report suggests that RtP is about strengthening sovereignty through international assistance, rather than weakening it through intervention (coercive action is mentioned only briefly when Ki-moon encourages the P5 not to use their veto in RtP situations).22 Prevention, through pillars 1 and 2, is viewed by the report to be critical.23 Nevertheless, the 2009 report does deal with the issue of intervention and, in doing so, seems to be at odds with the 2001 ICISS report’s understanding of sequencing, which uses ‘just war’ criteria to guide the decision on when military intervention might be appropriate.24 In contrast to ICISS’ endorsement of the need for military intervention to be a last resort, Ki-moon’s report argues that there is no need for a chronological sequencing of the different possible RtP responses and that the UN should not prize procedure over results.25 Thus, at times, the Secretary General’s 2009 report appears more expansive than the 2001 ICISS report on the use of force, at other times its focus is less on military intervention.

19 

ICISS (n 2) 51 para 6.21. Ki-moon (n 5). 21 Ki-moon (n 5) 2. Pillar 2 has also been understood more in terms of rebuilding— see A Nollkaemper and J Hoffmann, Responsibility to Protect: From Principle to Practice (­Amsterdam, Pallas, 2012) 15. 22  Ki-moon (n 5) 27 para 61. 23  Ki-moon (n 5) 9 para 11b. 24  ICISS (n 2) 32 para 4.16; 36 paras 4.37, 4.38. 25  ICISS (n 2) 22; Ki-moon (n 5) 9 para 12, 22 para 50. The ICISS does recognise the difficulty of the ‘last resort’ concept, but nevertheless emphasises the need for caution before military intervention. 20 

120  Alexandra Bohm D.  RtP Now From these documents, key unresolved areas of RtP can be seen to centre on the need for a chronological sequence of actions before military intervention is used as a last resort and on the use of the veto by the P5 members of the Security Council. These points will be returned to later, when considering the issue of military intervention and the relationship of RtP with international law. The point to be made now is that, notwithstanding these unresolved issues, it is claimed that RtP’s supporters ‘have won the battle of ideas’.26 Certainly the General Assembly has continued to debate the matter after the World Summit and encouraged the Secretary General to continue to report back on relevant issues, including reports on ‘early warning and assessment’27 and ‘a timely and decisive response’.28 Scholars have also noted that RtP has been hailed as coming of age in recent years.29 Others have praised it as being a ‘crucial concept’,30 ‘the most dramatic normative development of our time’31 and a valuable tool in raising awareness of our collective responsibility to protect individuals from certain types of insecurity and violence.32 With recent references to RtP in Security Council resolutions in relation to the situation in Libya,33 it appears that the international community has now largely accepted the overall concept of RtP, if not all of its details and operational issues. The next section examines the provisions of RtP more closely, identifying what assumptions RtP makes about how situations of insecurity arise and how they are best dealt with, in particular the roles played by the ‘unable or unwilling’ irresponsible state and by the ‘international community’ of responsible states.

26  So claims Simon Adams (the Executive Director of the Global Centre for the Responsibility to Protect, a major RtP NGO), see S Adams, ‘Responsibility to Protect’ speech to opening plenary session of the Responsibility to Protect in Theory and in Practice Conference (Ljubljana, 11–12 April 2013). 27  B Ki-moon, ‘Early Warning, Assessment and the Responsibility to Protect’ (14 July 2010) UN Doc A/64/864. 28  B Ki-moon, ‘Responsibility to Protect: Timely and Decisive Response’ (25 July 2012) UN Doc A/66/874-S/2012/578. 29 See, eg A Orford, ‘Moral Internationalism and the Responsibility to Protect’ (2013) 24 European Journal of International Law 83. 30  N Wheeler and F Egerton, ‘The Responsibility to Protect: “Precious Commitment” or a Promise Unfulfilled?’ (2009) 1 Global Responsibility to Protect 114. 31  R Thakur and T Weiss, ‘R2P: From Idea to Norm—and Action?’ (2009) 1 Global Responsibility to Protect 22. 32 See, eg R Cohen, ‘The Responsibility to Protect: Human Rights and Humanitarian Dimensions’ Harvard Human Rights Journal Annual Symposium (20 February 2009); Adams (n 26). 33 See, eg UNSC Res 1973 (2011) UN Doc S/RES/1973. Other situations have also ­merited a reference to RtP, such as Syria—see, eg UNSC Res 2042 (14 April 2012) UN Doc S/RES/2042; UNGA Res A/HRC/RES/S-16/1; UNGA Res A/RES/66/176; UNGA Res A/RES/66/253, all urging the Syrian Government to protect its population.

Security and International Law 121 III.  THE CONCEPT OF ‘(IN)SECURITY’ IN THE RESPONSIBILITY TO PROTECT

Quite clearly, RtP is designed to address situations in which civilians suffer grave harm at the hands, or through the neglect, of their government that has failed in its primary responsibility towards its population. The 2001 report refers to this failure as the state having the primary responsibility and being unable or unwilling to fulfil it.34 The 2005 Outcome Document refers to the state’s ‘manifest failure’ to protect its population.35 The ICISS report notes that millions are at risk of atrocities and RtP is designed to deliver ‘practical protection for ordinary people, at risk of their lives, because their states are unwilling or unable to protect them’.36 This role of the state towards its own citizens is reflected in pillar 1 of the 2009 report, which notes that ‘it is the enduring responsibility of the State to protect its populations … from genocide, war crimes, ethnic cleansing and crimes against humanity, and from their incitement’.37 RtP is thus designed to be a narrow doctrine, addressing only these mass atrocity crimes and the local government’s role in carrying them out or in failing to prevent them.38 The doctrine is also designed to be ‘deep’ because, although the focus of RtP claims to be on prevention, flexible responses to crises also involve a ‘wide array of protection and prevention instruments’ from Chapters VI, VII and VIII of the Charter.39 RtP’s definition of insecurity relates specifically to threats from (or failures of) the citizens’ own government in relation to the civil and political rights of the state’s own citizens (limited to the mass atrocity crimes of genocide, war crimes, crimes against humanity and ethnic cleansing). Again, clearly, the very existence of the doctrine assumes that something can be done about mass atrocity crimes specifically, with RtP specifying that it is Chapter VI, VII and VIII measures that are appropriate. This is discussed further in the next subsection on the causes of crises. A.  The Cause of Threats to Individual Security Perhaps unsurprisingly for a report that deals with grave civil and political rights abuses, the 2001 ICISS report relates the primary causes of conflicts or state collapse to failures in domestic governance—in particular, 34 

ICISS (n 2) foreword viii. UNGA, Outcome Document (n 4) para 139. 36  ICISS (n 2) 11 para 2.1. 37  Ki-moon (n 5) 8 para 11.a. 38  Ki-moon (n 5) 8 para 10.b. 39 Ki-moon (n 5) 8 para 10.c; A Dieng, Secretary General’s Special Representative for ­Genocide, Opening Speech to Responsibility to Protect in Theory and in Practice Conference (Ljubljana, 11–12 April 2013). 35 

122  Alexandra Bohm commenting that a ‘firm national commitment to ensuring fair treatment and fair opportunities for all citizens provides a solid basis for conflict prevention’.40 The 2009 report comments that populations will be at risk if ‘national political leadership is weak, divided or uncertain about how to proceed’ (for example, against rebels).41 It also deplores the lack of education and training on human rights in states at risk from RtP crimes.42 Mass atrocity crimes are therefore taken to be caused by the government responsible for the civil and political rights of its citizens.43 Mass atrocities being the fault of the government, RtP then considers the role of the international community in response to national governance failures. It is to this that the next section turns. B.  The International Community’s Role in Enabling Security i.  Prevention and Assistance The international community’s secondary responsibility to protect populations at risk from mass atrocity crimes involves helping states prevent crimes on their territory and responding to the commission of such crimes should preventive efforts fail. RtP recommends that the international community help local efforts to identify triggers of conflict44 and support local human rights and good governance initiatives45 to strengthen national governance. The international community’s assistance to states should be through diplomatic encouragement, human rights training and other governance capacity-building assistance,46 by UN Special Advisors and the Bretton Woods institutions,47 or through rule of law and other human rights issues being addressed in existing aid programmes.48 ii.  Reaction and Response If the international community’s preventive efforts fail and a crisis develops, the international community must then exercise its responsibility to react. This responsibility can be fulfilled using economic, political and legal, as well as military, means.49 ICISS acknowledges that sanctions can 40 

ICISS (n 2) 19 para 3.2. Ki-moon (n 5) 15 para 29. 42  Ki-moon (n 5) 16 para 33. 43  Ki-moon (n 5) 12; ICISS (n 2) 11, 19. 44  ICISS (n 2) 19 para 3.4. 45  ICISS (n 2) 19 para 3.3. 46  Ki-moon (n 5) 15 para 29–30; 20 para 44. 47  Ki-moon (n 5) 15 para 30. 48  ICISS (n 2) 27 para 3.41; Ki-moon (n 5) 21 para 47. 49  ICISS (n 2) 19. 41 

Security and International Law 123 be a blunt instrument and, as such, it may be necessary to consider military action.50 ICISS devotes significant space to endorsing ‘just war’ criteria to assess the legitimacy of a military response.51 The 2009 report refers to the broad range of tools available under the Security Council’s Chapter VI, VII and VIII powers, as well as the role of the General Assembly,52 diplomatic sanctions and arms control.53 The report notes, however, that given the widely different circumstances in which mass atrocity crimes occur, ‘there is no room for a rigidly sequenced strategy or for tightly defined ‘triggers’ for action’.54 A significant role of the international community is therefore envisaged by RtP, both in helping states improve weak domestic governance for conflict prevention and in responding to domestic failures with a variety of measures. RtP’s key assumptions about threats to security, outlined above, focus on the state-citizen relationship and the national government’s duty not to abuse its citizens’ civil and political rights. Adhering to liberal scholar Fernando Teson’s view that ‘a major purpose of states and governments is to protect and secure human rights’, RtP envisages a cosmopolitan role for the international community whose human rights obligations to individuals everywhere can require it to rescue individuals from gross human rights abuses55 and to encourage weak national governments not to abuse their populations in the first place. The next section goes on to demonstrate that RtP contains an impoverished conception of the role of the international community in the security of individuals in other states and, therefore, it cannot successfully address insecurity and violence. IV.  SECURITY AND RESPONSIBILITY: AN ALTERNATIVE CONCEPTION

This section will address RtP’s construction of the nature of security threats by suggesting an alternative understanding of these threats. It critiques the very need for a doctrine focused on mass atrocity crimes because such a doctrine inevitably assumes that the ‘international community’ is wellplaced to rescue people from this particular type of insecurity, rather than having a role in creating systemic causes of insecurity. The alternative conception of insecurity offered below links socio-economic development to

50 

ICISS (n 2) 29. ICISS (n 2) 32–37 para 4.18–4.43. 52  Ki-moon (n 2) 8–9 para 11c; 22 para 49. 53  Ki-moon (n 2) 25 paras 57, 58. 54  Ki-moon (n 5) 22 para 50. 55 F Teson, ‘The Liberal Case for Humanitarian Intervention’ in J Holzgrefe and R Keohane (eds), Humanitarian Intervention: Ethical, Legal and Political Dilemmas (Cambridge, Cambridge University Press, 2003) 93; see also F Teson, ‘Collective Humanitarian Intervention’ (1995–96) 17 Michigan Journal of International Law 323, 342. 51 

124  Alexandra Bohm security more explicitly than RtP does, arguing that, without adequately addressing this issue (and the international community’s role in contributing to the causes of insecurity), the international community can only ever respond to the symptoms, and not the causes, of insecurity. A.  The Importance of Mass Atrocity Crimes This section contends that, while horrific, mass atrocity crimes are not necessarily the primary insecurity faced by vulnerable populations today. Creating a doctrine to enable urgent responses to these particular crimes elevates the importance of certain types of death over other types, without justification, and risks adding to the injustices suffered by the most vulnerable people by drawing attention away from equally important, and related, situations of insecurity. Some statistics highlight this point. There are 18 million poverty-related deaths annually, with 2,000 million people lacking access to basic drugs, 2,500 million lacking access to basic sanitation, 1,020 million chronically undernourished and 34 million people suffering from HIV and AIDS.56 This contrasts with the 1998 statistics of 588,000 deaths from war and 736,000 from social violence57 and, of course, the famous death toll numbers of 800,000 in Rwanda and suggestions of 100,000 in Syria. Alex Bellamy describes this issue as ‘structural violence’, rather than organised military violence, being the main contemporary problem facing humanity.58 In this regard, he contrasts ‘death by politics’ (state sponsored killing) with ‘death by economics’ (such as starvation). The latter is somehow seen as being outside the interest or responsibility of international law and the ‘international community’.59 The perception of mass atrocity crimes as the most urgent security issue reflects a tendency of international lawyers to focus on crises, rather than on systemic chronic issues, and thus not consider the relationship between the two. As Hilary Charlesworth notes, ‘using crises as our focus means that what we generally take for “fundamental” questions and enquiries are very restricted’.60 Sundya Pahuja describes this phenomenon as ‘the power of a question to define an outcome’61—if mass atrocity crimes are 56  H Charlesworth, ‘International Law: A Discipline of Crisis’ (2002) 65 Modern Law Review 377, 391; T Pogge, ‘Politics as Usual: What Lies Behind the Pro-poor Rhetoric?’ Yale University Lecture (2010) 12–13. 57  A Hurrell, Order and Justice in International Relations (Oxford, Oxford University Press, 2003) 42. See also A Bellamy, ‘Humanitarian Responsibilities and Interventionist Claims in International Society’ (2003) 29 Review of International Studies 320, 329. 58  Bellamy (n 57) 329. 59  Bellamy (n 57) 332. 60  Charlesworth (n 56) 377. 61  S Pahuja, ‘Don’t Just Do Something, Stand There! Humanitarian Intervention and the Drowning Stranger’ (2005) 5 Human Rights & Human Welfare 51.

Security and International Law 125 posed as the most urgent security threat to individuals, the outcome of a doctrine to deal with them seems natural. RtP succumbs to this crisisfocus, both in its very existence and in its limited acknowledgement that ‘global justice’ can be related to mass atrocity crimes. A focus on the more chronic problems outlined above would suggest that if we have a responsibility towards individuals in other states (as Teson suggests), it should include not just responding to crises in which mass atrocity crimes may occur, but also responding to the significant numbers suffering from these chronic problems. RtP does not explain why the ‘millions’ suffering from state repression and collapse are in need of a doctrine to help them, compared to the greater number of people dying from poverty-related causes. The existence of a doctrine addressing mass atrocities also suggests that they are a separate act or acts, unrelated to other global problems. This does not enable a comprehensive understanding of the situations in which mass violence occurs. Proponents such as Adama Dieng (the Secretary General’s Special Representative for the Prevention of Genocide) argue that RtP is supposed to be a narrow doctrine and so benefits from this limited focus.62 Gareth Evans (one of ICISS’ co-chairs) describes this as limiting the doctrine to ‘extreme, conscience-shocking cases’.63 This may calm the fears of those who see RtP as expanding the number of situations when it is acceptable to use military force, but, in more general terms, it does not explain why the deaths of 18 million human beings from poverty is not as conscience-shocking. Whilst efforts addressing underdevelopment and efforts addressing mass atrocity crimes are not necessarily mutually exclusive, there is a real risk that the focus on mass atrocity crimes will draw attention, effort and, crucially, funds away from causes, such as global health and poverty, and towards the defence industry and military intervention. Even if mass atrocity crimes are the major problem of our time, more conscienceshocking­than the 18 million poverty-related deaths every year, RtP still neglects the relationship between atrocities and more chronic problems. The focus on crimes occurring during crises reflects a prioritising of certain civil and political rights over other human rights. Scholars frequently refer to ‘fundamental’ human rights,64 without explaining whether all human 62  Dieng (n 39). The limited focus of RtP is a source of criticism for some who believe there is no justification for the choice of its four crimes, which are not necessarily obviously related in terms of causes and, possibly, appropriate responses—see, eg A Gallagher, Genocide and its Threat to Contemporary International Order (Basingstoke, Palgrave, 2013) 7. 63  Evans (n 12). 64  See, eg T Meron, ‘On a Hierarchy of International Human Rights’ (1986) 80 American Journal of International Law 1; WM Reisman, ‘Sovereignty and Human Rights in Contemporary International Law’ (1990) 84 American Journal of International Law 866, 872; P Malanczuk, Humanitarian Intervention and the Legitimacy of the Use of Force (Amsterdam, Het Spinhuis, 1993); M Kahler, ‘Legitimacy, Humanitarian Intervention, and International Institutions’ (2011) 10 Politics, Philosophy & Economics 20.

126  Alexandra Bohm rights are fundamental (as the term ‘human’ would imply) or whether some rights are more fundamental than others—though Holzgrefe and Keohane’s reference to the word ‘fundamental’ rights in their definition of humanitarian intervention suggests that only those rights triggering an intervention are the fundamental ones.65 This issue warrants further discussion, which takes place below. B. The Cause of Crises: Civil and Political vs Socio-Economic Rights The primary importance of certain civil and political rights stems from the ‘triumph of liberalism’66 at the end of the Cold War and the declining influence of socialism and socio-economic rights. At this time, liberal international lawyers and others began to champion democracy and civil and political rights. For example, Thomas Franck comments that, in relation to coup attempts in Haiti and Russia, ‘the international community vigorously asserted that only democracy validates governance’.67 Teson asserts that anarchy and tyranny (non-democracy) are the worst forms of injustice because it is under these conditions that evils, such as genocide, are perpetrated.68 In addition, John Rawls’ theory of justice focuses more on the civil and political arena than socio-economic issues—equality­of civil and political opportunities can never be compromised and increased socio-economic equality is not a justification for civil and political inequalities.69 In a similar vein, RtP relates insecurity strictly to the government’s failure to protect its people’s civil and political rights.70 It constructs the biggest threat to individual security as mass abuses of civil and political rights and constructs the blame for abuse to lie with the government when those rights are violated on a grand scale. Although one paragraph of the 2001 report by ICISS does refer to the role of Cold War debts and the trade policies of richer countries in preventing poorer states from addressing some of the root causes of conflicts, such as poverty,71 it then ties these

65 

Holzgrefe and Keohane (n 55) 1. F Fukuyama, ‘The End of History’ (Summer 1989) National Interest. 67 T Franck, ‘The Emerging Right to Democratic Governance’ (1992) 86 American Journal of International Law 46, 47. See also A D’Amato, ‘The Invasion of Panama was a Lawful Response to Tyranny’ (1990) 84 American Journal of International Law 516, 516; AM Slaughter, ‘International Law in a World of Liberal States’ (1995) 6 European Journal of International Law 503, 509; Teson, ‘The Liberal Case’ (n 55) 93–94. 68  Teson, ‘The Liberal Case’ (n 55) 102. 69  J Rawls, A Theory of Justice (Harvard, Harvard University Press, 1999) 61. 70  See section III B above. 71  ICISS (n 2) 20 para 3.4, 22 para 3.22. 66 

Security and International Law 127 causes back to the civil and political rights arena of national democratic participation and national responsibility, suggesting that national poverty and inequality is to be solved by national good governance.72 Very little of the 2001 report considers the potential ‘direct’ responsibility of the international community for socio-economic underdevelopment in poorer countries (rather than viewing national political constitution as responsible for socio-economic development).73 The 2009 report is slightly more promising in this regard, referring to aid and development as part of conflict prevention in stronger terms than ICISS does. But this report still largely sees the relationship the other way round, noting (no doubt correctly) that mass atrocity crimes halt development, such as tourism and capital investment.74 There is, therefore, a significant disparity between civil and political rights and socio-economic rights in RtP. This disparity is worrying in itself, given the number of people suffering from poverty and RtP’s claimed cosmopolitan concern for ‘a humanity that cares more, not less, for the suffering in its midst, and a humanity that will do more, and not less, to end it’.75 It is also worrying because development and security are related—underdevelopment and poverty contribute significantly to violence and instability. Kofi Annan highlights the general importance of socio-economic development when commenting that ‘a young man with AIDS who cannot read or write and lives on the brink of starvation is not truly free.’76 Thomas Pogge points to the inability of severely poor citizens to combat corrupt and anti-democratic governments.77 James Richardson suggests that ‘Arbitrary acts of violence against the underprivileged, or acts of omission such as the dispossession without restitution of those who inadvertently stand in the way of “development’’’ are just as important as ‘negative’ rights (which are the focus of RtP).78 Fearon and Laitin found that poverty was a key factor contributing to civil war and Suzuki and Krause found that economic development reduced the risk of civil war.79

72 

ICISS (n 2) 19 para 3.2. (n 2) 23 para 3.22; D Chandler, ‘The Responsibility to Protect: Imposing the ­“Liberal Peace”?’ (2004) 11 International Peacekeeping 59, 62. 74  Ki-moon (n 5) 16 para 32. 75 K Annan, ‘Two Concepts of Sovereignty’ Address to the General Assembly (20 September 1999) 1. 76  K Annan, ‘In Larger Freedom: Towards Security, Development, and Human Rights for All’ Report of the Secretary General (UN, 2005). 77  Pogge (n 56) 20. 78  J Richardson, ‘Contending Liberalisms: Past and Present’ (1997) 3 European Journal of International Relations 5, 25. 79 JD Fearon and DD Laitin, ‘Ethnicity, Insurgency, and Civil War’ (2003) 97 American Political Science Review 75; S Suzuki and V Krause, ‘Trade Openness, Economic Development and Civil War Onset in the Post-Colonial World, 1950–1992’ (2005) 5 Conflict, Security and Development 23. 73 ICISS

128  Alexandra Bohm RtP’s national civil-political focus is in contrast to the General Comments issued by the Committee on Cultural, Economic and Social Rights, which suggest that all states must respect the economic, social and cultural rights of individuals in other countries—this appears to go unnoticed by RtP and its proponents.80 In RtP terms, a national commitment to good governance and political participation and representative governance is of limited value if, for example, an individual cannot read the ballot papers or is dying of starvation and so unlikely to have an investment in their future. This means that RtP’s commitment to protecting vulnerable individuals from abuses is rather empty without a prior commitment to the socio-economic­ rights that strengthen the ability of citizens to meaningfully participate in democracy and good governance measures—the high-level human rights training in prevention is of little use if individuals cannot exercise these rights ‘on the ground’. There is strong evidence that development contributes significantly to security and conflict prevention, suggesting that the structural violence of inequality and poverty is prior to outbreaks of military violence.81 In order to be meaningful, the international community’s responsibility to protect, whether in ICISS’ terms of prevention or Ki-moon’s terms of assistance, should include a ­genuine commitment to development and poverty alleviation. The idea of the international community’s duty to assist states in preventing abuse suggests that the international community’s relationship with problem states is currently neutral, being neither a help nor a hindrance. If the blame for these crises lies with the local government, then, in response to a failure at the national level, it is logical that the international community could perceive a need for action in response.82 A further issue meriting consideration is the degree of responsibility already borne by the international community in contributing to underdevelopment, violence and insecurity. The chapter now links socio-economic issues to the role of the international community in crises, challenging its role as rescuer.

80  Committee on Economic, Social and Cultural Rights, General Comments No 12 para 36; No 14 para 39 and No 15 paras 31, 33 and 34 refer to the responsibility of all states parties to respect, protect and facilitate the enjoyment of economic, social and cultural rights in other countries. 81  Fearon and Laitin (n 79); Suzuki and Krause (n 79). See also Bellamy (n 57); J Galtung, Peace by Peaceful Means (London, Sage, 1996); S Zizek, Violence (London, Profile, 2008). 82 WM Reisman, ‘Some Lessons From Iraq: International Law and Domestic Politics’ (1991) 16 Yale Journal of International Law 203, 203; L Gordenker and T Weiss, ‘The Collective Security Idea and Changing World Politics’ in T Weiss (ed), Collective Security in a Changing World (Boulder, Lynne Reiner, 1993) 14; Teson, ‘Collective Humanitarian Intervention’ (n 55) 342.

Security and International Law 129 C. The Role of the International Community in Insecurity—to the Rescue? In response to Bellamy’s description of an international community which shows more concern for death by politics than by economics, this section demonstrates that the international community contributes significantly to ‘death by economics’. Because this socio-economic insecurity is related to acts of violence, the international community therefore contributes to much of the violence within the states, which are then perceived to be unwilling or unable to fulfil their responsibility to protect. The idea that rich states contribute to the underdevelopment of poor states is not new. Whilst it is beyond the scope of this chapter to engage fully with development literature, it is at least plausible that rich country development policies are not helping the global poor, with loan conditions that increase inequality and decrease education, welfare and employment. For example, during the 1990s, developed countries reduced their development assistance by 27 per cent.83 Thomas Pogge also points to the asymmetrical global trading regime that allows rich countries to favour their companies through tariffs, quotas and subsidies, at an estimated cost to poor countries of $700 billion, whilst poor countries struggle to obtain affordable generic drugs and crop seeds as a result of the market access conditions imposed upon them by rich countries.84 Because socio-economic underdevelopment has been shown in section IV B as being linked to violence and conflict, the international community’s responsibility for socio-economic injustice means that they have a responsibility for contributing to the violence from which they wish to rescue people. Two examples demonstrate these points well. In the Balkan crisis, Anne Orford argues that the key threats to peace were viewed to be local historical ethnic tensions; set against the local cause of threats, the question for international actors was that of rescue.85 In contrast to this view of threats to individuals, Orford points out the contribution made by the economic liberalisation project of the World Bank and International Monetary Fund to the increasing instability in, and eventual violent breakup of, the former Yugoslavia. She notes that before the two international financial institutions’ (IFI) interventions into the country, the different Yugoslavian provinces had been able to coexist peacefully with a degree of autonomy from the central government, without perceiving a need for full separation. The IFIs required the central government to enact constitutional changes, 83  T Pogge, ‘Priorities of Global Justice’ (2001) 32 Metaphilosophy 6, 7, citing UNDP, Development Report (Oxford, Oxford University Press, 2000) 218. 84  Pogge (n 83) 12; Pogge (n 56) 20. 85 A Orford, ‘Locating the International: Military and Monetary Interventions after the Cold War’ (1997) 38 Harvard International Law Journal 443, 444; A Orford, Reading Humanitarian Intervention (Cambridge, Cambridge University Press, 2003) 18.

130  Alexandra Bohm which increased centralised control at the expense of autonomous regions, as well as decreasing educational opportunities and reducing constitutional protections for workers.86 This led to a decrease in income per capita, increased unemployment and attendant social unrest, together with a perception within the various regions that independence would be necessary to be able to reverse the damaging social changes introduced by the central government and the IFIs.87 Pre-existing nationalist sentiments had previously been managed through regional autonomy, but were fuelled by the increasing sense of insecurity, instability and social exclusion resulting from the constitutional reforms and increased centralisation decreed by the IFIs. This is a very different, and more complex, picture than that of purely local factions fighting for local reasons, with the only question for the international community being whether or not it should intervene to protect individuals at risk from local violence. The problematic role of the international community in intra-state violence can also be demonstrated in the case of Rwanda, where ­ ­Belgium’s colonial policy of elevating Tutsis to senior economic positions at the expense of the Hutu population is said to have led to many of the ethnic tensions that led to the genocide in 1994.88 Rwanda’s exposure to the international market in coffee and the economic problems caused by the ­collapse in coffee prices is also said to have contributed significantly to the tensions through rapid increases in poverty and resulting social unrest.89 Far from helping prevent instability and violence, international aid agencies and development programs are also alleged to have contributed to the ‘structural violence’ of poverty, inequality and humiliation of the local population, which was largely excluded from meaningful participation in decisions (and jobs) in the development process.90 Mahmood Mamdani goes even further than suggesting that colonialism contributed to ethnic tension, arguing that in Rwanda and Darfur colonialism actually created racial differences that would not otherwise have existed in these countries.91 Whether Mamdani is correct or not, it is difficult to deny the link between these non-military interventions (whether overtly colonial or through the practices of IFIs) that leave countries impoverished and 86 

Orford, ‘Locating the International’ (n 85) 453. Orford, ‘Locating the International’ (n 85) 454; Bellamy (n 57) 330. 88  B Jones, ‘Intervention without Borders: Humanitarian Intervention in Rwanda, 1990–94’ (1995) 24 Millennium Journal of International Studies 225. 89 RH Robbins, Global Problems and the Culture of Capitalism (Boston, Allyn and Bacon, 2002) 269; P Verwimp, ‘The Political Economy of Coffee, Dictatorship, and Genocide’ (2003) 19 European Journal of Political Economy 161. 90  P Uvin, Aiding Violence: The Development Enterprise in Rwanda (Bloomfield, Kumarian Press, 1998) 107, 136 and 143. 91 M Mamdani, When Victims Become Killers: Colonialism, Nativism and the Genocide in Rwanda (Princeton, Princeton University Press, 2001) 13, 42 and 80; M Mamdani, Saviours and Survivors: Darfur, Politics and the War on Terror (Brooklyn, Verso, 2009) 6, 15, 59 and 271. 87 

Security and International Law 131 acts of violence that spring from such impoverishment. This link does not mean that those carrying out acts of violence should not bear any responsibility for their actions; but if RtP really aims to prevent violence, or react usefully to it, then it cannot ignore the broader context in which violence occurs or the wider range of actors responsible for violence. Bellamy concurs that focusing on the need for acts of ‘intervention’ ensures that military interventions are perceived as discrete acts, rather than a different part of the spectrum of the international community’s historical, ongoing, long-term involvement in ‘problem’ states.92 This section has suggested that the international community is a significant contributor to violence taking place in the countries that RtP deems incapable of protecting their citizens. This calls into question RtP’s genuine commitment to root cause prevention as it is merely addressing the symptoms. The result of focusing on symptoms over causes is the perceived importance of military intervention in response to these symptoms—it is to this issue that the chapter now turns. D. RtP’s Unanswered Questions: A Return to ‘Humanitarian Intervention’ Section II noted the unresolved issues in RtP surrounding military intervention—‘just war’ questions of last resort and the right authority to sanction/permit action. Despite its claimed focus on prevention and protection for victims, rather than the ‘rights’ of interveners, and wider approach than purely military intervention,93 the ICISS report devotes 13 pages on military issues—far more than on root cause prevention or responses other than military action, such as diplomacy and sanctions. Ironically, it suggests that military action might be appropriate because sanctions can be a blunt instrument.94 The 2009 report takes the question of military intervention further (though less of the report is focused on the topic), stressing that chronological sequencing of responses is not necessary in response to a crisis, so that military intervention does not have to be a last resort. This focus on military action is troubling for two reasons. First, it risks neglecting a true commitment to prevention (particularly the long-term socio-economic issues outlined above). Second, if it is agreed that military intervention does not have to be a last resort in particular ‘worst case’ scenarios, it becomes all too easy to view each crisis as one of the 92  Bellamy (n 57) 329. See also A de Waal, ‘Darfur and the Failure of the Responsibility to Protect’ (2007) 83 International Affairs 1039. 93  Evans (n 12) 285. 94  ICISS (n 2) 29 para 4.5.

132  Alexandra Bohm ‘worst case’ scenarios requiring immediate military action. The idea that one needs to decide what to do in these difficult, worst case situations, presumes that we are already willing, able, committed and actually doing everything else in the non-worst case scenarios, with the only remaining problem being the few worst cases. A similar situation arises in relation to the need for Security Council authorisation—it becomes easy to view any veto as illegitimate because it prevents a perceived-necessary military response, without considering that perhaps a veto might suggest that it is the proposed military response that is, in fact, illegitimate. For example, the Russian and Chinese vetoes of action in response to the Syrian crisis might not necessarily be illegitimate simply because they have the effect of preventing military action. Given the controversy surrounding the Libyan intervention and subsequent regime change, as well as the war crimes committed by the National Transitional Council, a resulting reluctance to authorise further military interventions is unsurprising.95 This repeated return to the issue of military action at the expense of serious long-term prevention efforts, suggests that RtP and humanitarian intervention are not ‘very different concepts’ as Gareth Evans has argued.96 In fact, Thomas Weiss comments that ‘the acknowledgment by the 2005 World Summit … has reinforced the legitimacy of humanitarian intervention as a policy option’97 and even the ICISS report itself says that its report is about humanitarian intervention.98 To criticise the constant focus on military intervention is not to say that use of force can never be an acceptable policy option. The point being made here is that the absence of a genuine commitment to doing everything that can be done, before contemplating military intervention, will mean that any use of force is unlikely to be perceived as legitimate. Doing ‘everything’ should not be taken to be diplomacy and sanctions in response to a crisis, but should also include a serious long-term commitment to poverty and inequality reduction as part of the international community’s responsibility towards vulnerable individuals. The ‘do something or do nothing’99 approach to military intervention in response to a crisis reflects the assumption highlighted in section IV C, that the international community is currently ‘doing nothing’ and has the option of ‘doing something’ (ie military intervention) to save people.

95  See, eg O Corten and V Koutroulis, ‘The Illegality of Military Support to Rebels in the Libyan War: Aspects of jus contra bellum and jus in bello’ (2013) 18 Journal of Conflict Security Law 95; A Bellamy and P Williams, ‘The New Politics of Protection’ (2011) 87 International Affairs 825, 846; S Zifcak, ‘The Responsibility to Protect after Libya and Syria’ (2012) 13 ­Melbourne Journal of International Law 1, 11. 96  Evans (n 12) 290. 97  T Weiss, Humanitarian Intervention (Cambridge, Polity, 2007) 89. 98  ICISS (n 2) foreword vii. 99  S Chesterman, Just War or Just Peace (Oxford, Oxford University Press, 2001) 108.

Security and International Law 133 Section IV’s argument—that the international community is not in fact ‘doing nothing’ in relation to unstable states, but is in fact contributing to this instability—should suggest caution in endorsing the international community’s subsequent desire to ‘do something’ in response to outbreaks of violence. These problems with RtP are important in their own right, but are particularly important in the wider context of international peace and security law more generally when considering arguments about the legal status of RtP. V.  THE RESPONSIBILITY TO PROTECT AND INTERNATIONAL LAW: THE PROBLEM WITH AN ‘EVOLVING NORM’

The relationship of the RtP doctrine to international law is far from ­settled, with a variety of descriptions attaching to the documents that go to make up RtP—a ‘concept’; an ‘idea’; a ‘political push’; ‘political commitment’ or an ‘evolving norm’.100 Sceptics argue that RtP is a political and not a legal doctrine as it has not achieved customary status under international law, any more than its predecessor concept of humanitarian intervention, and the General Assembly’s World Summit endorsement of RtP was very limited and only to the extent that the idea was in line with existing i­nternational law.101 Proponents argue that RtP is already part of international law, bringing together different strands of extant law on states’ human rights obligations to their own populations and to others (eg under the Genocide Convention),102 the Rome Statute of the International Criminal Court and reports such as the 2004 High Level Panel 100 eg, M Notaras and V Popovski, ‘The Responsibility to Protect’ (United Nations ­ niversity, 5 April 2011) (concept); Evans (n 12) (idea, new norm, concept); A Bellamy, U ‘The Responsibility to Protect—Five Years On’ (2010) 24 Ethics and International Affairs 143 (political commitment); UN High Level Panel (n 6) 65–66 paras 201–02 (emerging norm); M Wood, ‘The Responsibility to Protect’ speech to the opening plenary of the Responsibility to ­Protect in Theory and in Practice Conference (Ljubljana, 11–12 April 2013) (political push). For a summary, see A Bellamy, Responsibility to Protect: The Global Effort to End Mass Atrocities (­Cambridge, Polity, 2009) introduction. 101  On humanitarian intervention, see Chesterman (n 99). On RtP see, eg N Zupan, The RtoP: The Soft Law Riddle and the Role of the United Nations (Ljubljana, GV Zalozba, 2012) 541–61; C Stahn, ‘Responsibility to Protect: Political Rhetoric or Emerging Legal Norm?’ (2007) 101 American Journal of International Law 99 (noting that the question of authorisation has been consistently referred back to the Security Council, demonstrating that the law on exceptions to Art 2(4) of the UN Charter remains unchanged); D Amneus, ‘Has Humanitarian Intervention Become Part of the International Law under the Responsibility to Protect Doctrine?’ in Nollkaemper and Hoffmann (n 21) 157 (arguing that there has been no change in customary international law); A Hehir, ‘The Responsibility to Protect and International Law’ in P Cunliffe (ed), Critical Perspectives on the Responsibility to Correct: Interrogating Theory and Practice (Abingdon, Routledge, 2011). 102  O Bring, ‘Responsibility to Protect’ speech to opening plenary of the Responsibility to Protect in Theory and in Practice Conference (Ljubljana, 11–12 April 2013). See also E Luck, ‘Interview Remarks’ UN News Centre, 1 August 2011, cited by Zupan (n 101) 532.

134  Alexandra Bohm report on ‘Threats, Challenges and Change’ and the 2005 ‘In Larger Freedom’ report by Kofi Annan.103 This means that there is nothing new in RtP and it has not changed international peace and security law on the use of force. Using UN reform reports, in addition to more formal sources of international law, to argue that RtP is a coherent unified legal norm is controversial, but the fact that parts of RtP reflect existing international law may lend legitimacy to the concept. The idea that RtP is uncontroversial because it simply reflects existing international law sits uneasily with those aspects of RtP that seek to move beyond the existing legal framework—especially the need for UN Security Council authorisation for military intervention. An example of this is the thinking of Anne Peters, who admits that the legal status of RtP is not settled, but suggests that if RtP were a legal norm, then Security Council veto action could potentially be illegal and the P5 would be obliged to give reasons for any veto—something which she suggests may, in any event, be an existing procedural obligation.104 The push for implementation of RtP, now that the ‘battle for ideas’ is apparently won,105 will be problematic if these key areas are not resolved. What exactly is to be implemented, the 2001 report’s just war criteria requiring military intervention to be a last resort, or Ki-moon’s suggestion that there is no need for a chronologically sequenced response? Nina Zupan laments that ‘the contestability of the [RtP] can indeed slow down and reduce the efficacy of its ­implementation’.106 However, the contested nature of key parts of RtP suggests that these are not ready to be implemented. If an idea has only achieved consensus on a limited number of points, then implementation should not push beyond this consensus—particularly not if relying on the level of consensus for legitimacy. ICISS mentions the suggestion that the Security Council P5 refrain from using their veto not as a consensus, but as an idea from one of the P5 representatives, one out of 193 Member States of the UN, and the 2005 Outcome Document restates that RtP should be in line with existing international law.107 Military intervention without Security Council authorisation does not form part of the consensus on RtP, and yet the 2009 report, and much debate on the topic, seems to presume that implementation of RtP requires a way to deal with the (presumed) illegitimate veto—any veto preventing military action must necessarily be illegitimate because it is preventing military action.

103  N Schriver, ‘The Responsibility to Protect’ speech to the opening plenary session of the Responsibility to Protect in Theory and in Practice Conference (Ljubljana, 11–12 April 2013). 104  A Peters, ‘The Responsibility to Protect and the Permanent Five: The Obligation to Give Reasons for a Veto’ in Nollkaemper and Hoffmann (n 21) 199. 105  Adams (n 26). 106  Zupan (n 101) 547–48. 107  UNGA, Outcome Document (n 4) 139.

Security and International Law 135 Despite its ‘contestability’, the idea that the RtP doctrine is a necessary and welcome development permeates international legal discourse and relates to the idea that extant international (peace and security) law is not ‘fit for purpose’ in its ability to meet the security threats of the postCold War era.108 Gillian Triggs argues that generally ‘international law is responding dynamically to the contemporary concern for the humanitarian needs of the individual’109 but is still not able to respond adequately, is still not fit for purpose, because it does not allow military intervention without Security Council authorisation.110 This idea that international law is not fit for purpose can be seen not just in relation to intervention for ‘human protection’ purposes, but in other areas of law, including ‘cyber war’ and terrorism, where a threat is identified as too novel for existing law to be able to respond adequately.111 In contrast to calls to move international law ‘forward’ to enable a military response in RtP situations, others note that the rules prohibiting use of force exist for good reason and the migration of human rights issues away from multilateral resolution and into the area of peace and security, use of force, is problematic. Philip Alston argues that the focus on ad hoc interventions, in response to civil and political crises, allows the interveners to avoid supporting existing multilateral human rights promotion and protection regimes.112 Mary Ellen O’Connell notes that the risk of increasing the range of permissible uses of force is an overall increase in violence and instability.113 Brazil’s concept of ‘responsibility while protecting’ draws attention to the very high costs of an intervention, in terms of casualties and increased violence, aptly demonstrated in Kosovo when the NATO bombing campaign was

108  This idea formed part of Sir Daniel Bethlehem QC’s opening remarks at the conference upon which this volume is based (n *). See also D Bethlehem, ‘International Law and the Use of Force: The law as it is and as it should be’ written evidence submitted to the House of Commons Foreign Affairs Committee (Seventh Report, 2004): ‘there are significant shortcomings in the traditional body of legal rules relevant to the use of armed force … Recent events … pose a challenge to the adequacy and coherence of the law in this area’; at 6 he summarises the main question for the Committee as ‘Is international law adequate to the task required of it in contemporary international society?’ para 2.2 109  G Triggs, ‘Public International Law: Is it Fit for Purpose?’ (2007) 7 Legal Information Management 113, 118. 110  Triggs (n 109) 119. 111  On cyber war, see Chapter 14 of this volume and the special edition of the Journal of Conflict and Security Law, in particular M O’Connell, ‘Cyber Security without Cyber War’ (2012) 17 Journal of Conflict and Security Law 187. On terrorism, see eg O Okafor, ‘­Newness, Imperialism, and International Legal Reform in our Time: A Twail Perspective’ (2005) 43 Osgoode Hall Law Journal 171. 112 P Alston, ‘The Security Council and Human Rights: Lessons to be Learned from the Iraq-Kuwait Crisis and its Aftermath’ (1991) 13 Australian Yearbook of International Law 107, 107. 113  M O’Connell, ‘Responsibility to Peace: A Critique of R2P Mary Ellen O’Connell’ in P Cunliffe (ed), Responsibility to Protect: Critical Perspectives (London, Routledge, 2011).

136  Alexandra Bohm said to increase ethnic cleansing during the ensuing chaos.114 ‘Fitness for purpose’ therefore seems to be synonymous with the expectation that international law should permit military intervention in more situations than it currently does. As noted, this risks increasing the overall level of violence and instability in the world. In relation to the questions posed by the editors of this volume (to what extent international law can address the types of security threats in the twenty first century and where international law might fall short in this regard), RtP suggests that international law is capable of addressing the security threat of atrocities, but that it currently falls short in doing so, particularly in relation to the authorisation of military force. In contrast with this theme, this chapter has suggested that asking if international law is ‘fit for purpose’ because it does not permit military intervention to provide security, is asking the wrong question. International law does not necessarily fall short just because it does not mirror the ideas in RtP about when military intervention should occur and how it should be authorised. VI. CONCLUSION

This chapter outlined the development of the RtP doctrine and examined some problems with RtP’s view of the key threats to individuals and their security in the post-Cold War era. The problems identified were the prioritising of mass atrocity crimes over other suffering and death; the focus on civil and political rights abused by a local government; the assumption that the international community is well-placed to undertake a s­ econdary responsibility to protect by assisting with conflict prevention; and the assumption that a new doctrine is required because existing international law is not capable of responding adequately to the question of intervention without Security Council authorisation. The chapter demonstrated these problems by highlighting an alternative understanding of the source and type of threats to the security of vulnerable individuals. Here the chapter explored the role of the international community in contributing to the insecurity of individuals across the globe, both through chronic socio-economic underdevelopment in general and its role in suppressing national political participation and through more specific examples of international community policies, which contribute to the very crises to which the international community wants to respond. The chapter then 114  Speech given by President Dilma Rousseff during the general debate, 66th UN General Assembly Session (21 September 2011) www.un.int/brazil/speech/11d-Pr-Dilma-Roussefopening-of-the-66th-gerneral-assembly.html; E Herring, ‘From Rambouillet to the Kosovo Accords: NATO’s War Against Serbia and its Aftermath’ in K Booth (ed), The Kosovo Tragedy: The Human Rights Dimension (London, Frank Cass, 2001) 225, 229. See also D Levine, ‘Some Concerns about the Responsibility not to Veto’ (2011) 3 Global Responsibility to Protect 323.

Security and International Law 137 suggested that the way RtP views crises (and the role of the national government and international ‘community’ of states) leads to an assumption that the rules on the use of force need to be revisited, such that military intervention can be undertaken not as a last resort and not requiring Security Council authorisation. Linking this to international law more generally, the chapter examined RtP’s relationship with the international legal regime governing peace and security and related this to general debates about the extent to which international law is ‘fit for purpose’ in addressing contemporary problems. The central questions of this book relate to the adequacy of international law in responding to contemporary security threats. This chapter has argued that RtP constructs the nature of threats, and so the best response to them, in such a way as to suggest that certain aspects of international law are not capable of responding to the security threat of mass a­ trocity crimes (chiefly, the strict procedures of the UN in relation to international peace and security). In its attempt to respond to this security threat, RtP addresses some of the symptoms of global insecurity, rather than the fundamental causes. Those who wish to do good in responding to situations of insecurity, and who believe that the international community has a responsibility towards vulnerable individuals across the globe, should therefore refocus their efforts on chronic conditions of poverty and ­inequality, both because these are important in their own right and because these efforts are likely to reduce the sorts of crises that RtP was designed to address. In relation to the human rights-state sovereignty paradigm involved in RtP, assuming that international law is not fit for purpose because it does not permit military interventions into another state is a flawed assumption. There are good reasons to limit the scope of permissible military intervention. A doctrine which tries to expand the ability of states to use force to halt violence, without considering and addressing more fully the causes of such violence (in particular the role of these ‘­rescuer’ states in helping create the instability in the first place), should be treated with caution.

138

Part II

Security Threats and International Law

140

7 International Law and the Iranian Nuclear Crisis: Lessons for International Security and Arms Control TOM COPPEN

I. INTRODUCTION

T

HIS CHAPTER EXPLORES certain characteristics of major legal instruments dealing with nuclear non-proliferation, as well as the role of international arms control law in the context of the conflict surrounding Iranian nuclear activities. It focuses on an interpretation of relevant provisions of the Nuclear Non-Proliferation Treaty (NPT), as well as on certain institutional aspects of the International Atomic Energy Agency (IAEA) safeguards procedure. By analysing the role of arms control law in the context of the dispute over Iran’s nuclear activities, this chapter aims to provide more insight into the role and potential of this field of law in maintaining international peace and security. Both the NPT and the IAEA are arms control instruments. Arms control, in the definition of the US Arms Control and Disarmament Agency (ACDA), consists of ‘efforts to reduce the likelihood of war and to limit the effects if it occurs’.1 States, in general, regard the right to arm themselves as a sine qua non of their ability to protect their territory and national sovereignty. For many states, their ability to project military power is also an important pillar of foreign policy. The right to build up national defences is understood to be unlimited. In the absence of a

1 United States Arms Control and Disarmament Agency (ACDA), ‘Arms Control and National Security’ (Washington DC, 1968) 3. See also, eg AH Chayes and A Chayes, ‘From Law Enforcement to Dispute Settlement: A New Approach to Arms Control Verification’ (1990) 14(4) International Security 147.

142  Tom Coppen binding international obligation stating otherwise, no restrictions apply to the right of states to possess any number or types of arms.2 To voluntarily relinquish this right by entering into such obligations, for example, by signing an arms control treaty, is therefore a decision that may have far-reaching military and internationally political consequences for states. This explains why arms control treaties often require lengthy and difficult negotiations3 and why their ratification by national legislators may take even longer.4 National security and national interests are overriding concerns in the field of arms control law. Other interests include principles of non-interference, sovereign equality of states, good faith, or cooperation.5 International politics and diplomacy play a large role in the field of arms control law and often continue to do so even after a treaty has been concluded.6 The law of arms control is ‘mainly treaty law as distinct from custom and general principles’.7 Its subject matter warrants predictability, stability and reciprocity, which is the reason that states have traditionally favoured treaty-making in this field of law.8 Arms control treaties are normally a confirmation of the political status quo, arranged between dominant states to codify a de facto political or military situation that is in their best interest.9 Once a treaty has been concluded, the adherent states benefit from the predictability and stability that is created by the legal

2  Military and Paramilitary Activities in and against Nicaragua (Nicaragua v United States of America) (Judgment) [1986] ICJ Rep 1984, para 269; Legality of the Threat or Use of Nuclear Weapons (Advisory Opinion) [1996] ICJ Rep 1996, para 21. 3  Negotiations on the NPT started in 1959 and lasted nine years; on the Biological Weapons Convention (BWC), they started in 1966, lasting six years; on the Chemical Weapons Convention (CWC), they also started in 1966, only to be concluded 26 years later. 4  The Comprehensive Test-Ban Treaty (CTBT), concluded in 1996, still has not been ratified by several key states, preventing its entry into force to date. 5 Arms control law is, according to Feldman, based on ‘the principles of equality and undiminished security’. S Feldman, ‘The Place of Arms Control and Disarmament in the System of International Law’ in J Dahlitz and D Dicke (eds), The International Law of Arms Control and Disarmament—Vol I Arms Control and Disarmament Law (Geneva, United Nations, 1991) 41; see also G Den Dekker, The Law of Arms Control: International Supervision and Enforcement (The Hague, Martinus Nijhoff, 2001). 6  The International Law Association (ILA) concluded at its London Conference that ‘the end of the negotiations [of an arms control treaty] is, in fact, only the beginning of the arms control process’. ILA, Committee on Arms Control and Disarmament Law, 5th Report (London, 2000) 3. 7 ibid. 8  J Dahlitz, ‘The Role of Customary Law in Arms Limitation’ in Dahlitz and Dicke (n 5); G Den Dekker and T Coppen, ‘Termination and Suspension of, and Withdrawal from, WMD Arms Control Agreements in Light of the General Law of Treaties’ (2012) 17(1) Journal of Conflict and Security Law 1. 9  Or, as Knut Ipsen phrases it, arms control treaties are the ‘terminating point of political evolution’. K Ipsen, ‘Explicit Methods of Arms Control Treaty Evolution’ in Dahlitz and Dicke (n 5) 76.

International Law and Iranian Nuclear Crisis 143 certainty of written norms. This need for legal certainty has also led to a strong tendency by states that are party to multilateral treaties to preserve that treaty regime and, if possible, to attempt to achieve universal membership.10 On the other hand, states will attempt to preserve some political and legal flexibility within the regime of arms control agreements. This apparent paradox is explained by the fact that states feel that they must not be constrained, by too rigid treaty rules, from taking necessary measures to protect their vital interests, such as national security. Policy and international politics are more dynamic than the development of international law.11 Treaties thus need to preserve flexibility to deal with economic, political, military or technological developments—which may happen gradually or suddenly.12 For these reasons, states under arms control regimes retain the required level of autonomy through the use of open, multi-interpretable, central norms therein, or the incorporation of special withdrawal clauses.13 The dispute over the Iranian nuclear programme is extremely complicated, involving political and legal arguments from both sides. This chapter analyses three Iranian arguments against the legitimacy of IAEA resolutions adopted against it. These allegations must be examined in the light of the NPT and the IAEA institutional framework. First, there is the assertion that the Additional Protocol (AP) is not a legal obligation but a voluntary confidence-building measure; second, Iran claims that the resolutions adopted by the IAEA Board of Governors violate procedural rules of the IAEA Statute; third, Iran maintains that the demand of the Board for Iran to suspend uranium enrichment is illegal as it conflicts with Article IV of the NPT. After these issues have been examined, the results are, in turn, assessed in light of the general reaction of the international community to the nuclear activities of Iran.

10  The desire of the NPT Member States to achieve universal adherence to the treaty is reflected in its Review Conference Final Documents. See NPT RC 1975 Final Document, NPT/CONF/35/I Annex I, 10; NPT RC 1985 Final Document, NPT/CONF.III/64/I Annex I, 17; NPT RC 1995 Final Document Decision 2, NPT/CONF.1995/32 (Part I), Annex, para 2; NPT RC 2000 Final Document, NPT/CONF.2000/28 (Part I), 19 para 5–6; NPT RC 2010 Final Document, Review section, NPT/CONF.2010/50 (Vol I), 17–18. 11  See Ipsen (n 9); see also, eg A von Baeckmann, ‘The Treaty on the Non-Proliferation of Nuclear Weapons (NPT)’ in S Sur (ed), Verification of Current Disarmament and Arms Limitation Agreements: Ways, Means and Practices (Geneva, UN Institute for Disarmament Research (UNIDIR), 1991) Chapter 6. 12  Dahlitz (n 8); Den Dekker and Coppen (n 8). 13  See, eg Article X NPT; Article XVI CWC; Article IX CTBT; Article 31 of the Treaty for the Prohibition of Nuclear Weapons in Latin America and the Caribbean (LANWFZ Treaty); Article XIV of the New START Treaty; Article 1 of the African Nuclear Weapon Free Zone Treaty (ANWFZ Treaty); Article XV of the Anti-Ballistic Missile Treaty.

144  Tom Coppen II.  THE NUCLEAR NON-PROLIFERATION REGIME

The concept of nuclear non-proliferation is as old as nuclear weapons themselves.14 International law, however, did not immediately play a significant role in the context of non-proliferation. The conclusion, in 1957, of the Statute of the IAEA constituted the first major building block of the international legal nuclear non-proliferation regime.15 A decade later, two others followed: the Treaty of Tlatelolco on a Nuclear-Weapon Free Zone in Latin America and the Caribbean, and the NPT Treaty.16 The NPT’s entry into force in 1970 changed the dynamics of nuclear non-proliferation for good. Although many other international treaties and agreements, as well as politically binding arrangements, were concluded over the decades that followed, the NPT remains the only global treaty on nuclear non-proliferation and has slowly increased its membership until, today, only four states remain outside the treaty.17 The NPT divides its Member States into nuclear-weapon states (NWS) and non-nuclear weapon states (NNWS). States that conducted a nuclear explosion before 1967 belong to the former category, all others are NNWS.18 All NPT states must refrain from furthering the wider dissemination of nuclear weapons. NNWS are under an additional obligation not to acquire nuclear weapons in any way and to place their nuclear facilities under IAEA safeguards in order to verify that nuclear material is not diverted to nuclear-explosive related purposes.19 At the same time, NPT states are under an obligation to ‘pursue negotiations in good faith’ towards nuclear and general disarmament. In practice, however, this obligation mostly falls to the NWS and almost exclusively focuses on nuclear disarmament.20 Another substantive provision of major importance to the

14  The US and UK had developed foreign policies to stop Nazi Germany from acquiring nuclear weapons before the US managed to construct its first nuclear weapon itself. See JT Richelson, Spying on the Bomb: American Nuclear Intelligence from Nazi Germany to Iran and North Korea (New York, Norton & Company, 2007). The term ‘non-proliferation’ is understood here to cover all efforts, short of the use of force, that aim to prevent states from acquiring or developing nuclear weapons, or nuclear-related equipment, materials or technology with the aim of developing a nuclear weapon. Such efforts may be of a legal, political or economic character, they may be uni-, bi- or multilateral. Counter-proliferation are initiatives involving the threat or use of force aimed at halting the spread or development of nuclear weapons. Usually, they are more of a roll-back than of a preventive nature. 15  Statute of the International Atomic Energy Agency 1957. 16  UN Secretariat (1968) 634(9068) 326–66; UN Secretariat (1970) 729(10485) 168–75. 17  Democratic People’s Republic of Korea, India, Israel, Pakistan. All four have developed nuclear weapons as non-NPT states. 18  Article IX NPT. 19  Articles I, II and III NPT. 20  Article VI NPT; see also, eg Review Conference Final Documents NPT/CONF.2010/50 (Vol I); NPT/CONF.2000/28 (Part I); most recently, the discussions at the 2013 NPT PrepCom reflected the same idea.

International Law and Iranian Nuclear Crisis 145 non-proliferation regime, Article IV, codifies the ‘inalienable’ right of all states to use nuclear energy for peaceful purposes and to participate in the ‘fullest possible’ exchange of materials, equipment and technology. Moreover, it obliges developed states to contribute to the development of peaceful applications of nuclear energy, with ‘due considerations for the needs of the developing areas of the world’. Thus, non-proliferation, nuclear disarmament and peaceful uses of nuclear energy together constitute the three main ‘pillars’ of the NPT.21 Diverging interests of states and differing emphasis on the three pillars have caused major political disaccord between the NPT Member States, especially between the NWS and their closest allies on the one side and the Non-Aligned Movement (NAM) on the other.22 These disagreements mostly surface at NPT Review Conferences and Preparatory Committees (PrepComs), which form the mechanism for supervision and review of the implementation of the treaty.23 Originally, Article VIII provided that a Review Conference was to be organised five years after the entry into force of the NPT. Until the indefinite extension of the duration of the NPT in 1995, the NPT states simply agreed at every Review Conference to hold another one in five years. With the adoption of the 1995 decision on the strengthening of the review process for the NPT, its Member States formally agreed to hold a Review Conference every five years and to convene PrepComs in each of the three years prior to the Conference.24 In political terms, Review Conferences and PrepComs have allowed for the continuing influence of negotiation and diplomacy after the conclusion of the NPT. In legal terms, combined with the open norms used throughout the provisions of the NPT, they ensure its flexibility. Given that policy is more dynamic than law, Review Conferences are a way for the NPT Member 21  On the NPT, see T Coppen, ‘The Role and Rationale of the Nuclear Non-Proliferation Treaty in the Twenty-First Century’ (2012) 7 Romanian Journal of Science and Politics 2. See also M Shaker, The Nuclear Non-Proliferation Treaty: Origin and Implementation 1959–1979 (­London, Oceana Publications, 1980); ND White, ‘Interpretation of Non-Proliferation Treaties’ in DH Joyner and M Roscini (eds), Non-Proliferation Law as a Special Regime (Cambridge, ­Cambridge University Press, 2012) 87; DH Joyner, Interpreting the Nuclear Non-Proliferation Treaty (Oxford, Oxford University Press, 2011). 22  These conflicts surfaced once again at the 2013 NPT PrepCom. For discussions on the NPT, see summary records of Review Conferences and PrepComs. See also, eg R Broinowski, Flaws in the Nuclear Non-Proliferation Treaty (Australian Institute of International Affairs, 2010); O Njølstad (ed), Nuclear Proliferation and International Order: Challenges to the NonProliferation­ Treaty (New York, Routledge, 2011); DH Joyner, International Law and the Proliferation of Weapons of Mass Destruction (New York, Oxford University Press, 2009); JI Garvey, ‘A New Architecture for the Non-Proliferation of Nuclear Weapons’ (2007) 12(3) Journal of Conflict and Security Law 339; HD Sokolski, Reviewing the Nuclear Nonproliferation Treaty (NPT) (Washington, Strategic Studies Institute, 2010). 23  Article X NPT, on duration and withdrawal, also fulfils an important function in this context: see Den Dekker and Coppen (n 8). 24  Decision 1 of the 1995 Review and Extension Conference of NPT Parties, Final Document, NPT/CONF.1995/32 (Part I), 8.

146  Tom Coppen States to ensure the continued relevance of the treaty because it enables them to establish authoritative interpretation of its articles that may alter over time. Thus, these Conferences should be considered as a method of treaty evolution within the field of arms control.25 Finally, the review cycle incorporates an important element of supervision—a diplomatic procedure for review, assessment and dispute settlement.26 The negotiation records of the NPT reflect this role. Discussions indicate that the function of what was to become Article VIII(3) was to supervise the fulfilment of the obligations of the treaty by its members. Initially, the review procedure of the NPT was linked in particular to the disarmament pledge by the NWS, in order to address concerns of the NNWS that the wording of Article VI was too weak.27 Later, treaty review was understood to cover the NPT as a whole, including all its operative articles and complete preamble. In other words, Review Conferences were meant to take stock of progress on nonproliferation, disarmament and the easing of international tensions; in this way, they also serve as a safeguard for the treaty’s effectiveness.28 The IAEA is the primary international organisation entrusted with the supervision of nuclear non-proliferation norms.29 Article III NPT obliges Member States to conclude safeguards agreements with the IAEA and the IAEA supervises these agreements in accordance with its Statute. Indirectly, it thus contributes to the supervision of the NPT, but it is important to emphasise that the IAEA can only establish and enforce compliance with its own safeguards agreements, not with the provisions of the NPT, which has its own review mechanism. The mandate of the IAEA is much broader than merely supervision of non-proliferation norms. The IAEA was established to ‘accelerate and enlarge the contribution of atomic energy to peace, health and prosperity throughout the world’ and, only in that context, it should ensure ‘that assistance provided by it or at its request or under its supervision or control is not used in such a way as to further any military purpose’.30 After the entry into force of the NPT, the safeguards function of the IAEA grew more important. The IAEA now 25 K Ipsen, ‘Explicit Methods of Arms Control Treaty Evolution’ in Dahlitz and Dicke (n 5) 78. 26  ibid, 82. 27 See summary records of the Eighteen Nation Committee on Disarmament (ENDC) ENDC/PV.224, 20. See also, eg statements by Canada (ENDC/PV.226, 8); Burma (ENDC/ PV.250, 29); and the UK (ENDC/PV.326, 17). See also ECB Schnoettle, Postures for NonProliferation­: Arms Limitation and Security Policies to Minimize Nuclear Proliferation (London, SIPRI, 1979). 28  See, eg statements made at the ENDC by the US (ENDC/PV.325 p 9); Sweden (ENDC/ PV.335, 10); Italy (ENDC/PV.338, 11); the UK (ENDC/PV.350, 4; and Romania (ENDC/ PV.376, 10). 29  On the supervision of compliance with arms control agreements in general, see Den Dekker (n 5); EPJ Myjer, ‘The Law of Arms Control and International Supervision’ (1990) 3(3) Leiden Journal of International Law 99; Sur (n 11); Dahlitz and Dicke (n 5). 30  Article II IAEA Statute.

International Law and Iranian Nuclear Crisis 147 spends roughly equal shares of its budget on verification and fostering peaceful applications of nuclear energy respectively.31 The IAEA is an independent international organisation with full legal capacity, privileges and immunities, consisting of three main bodies: the General Conference, the Board of Governors (BG) and its Secretariat.32 As such, its structure does not depart from the general form of international organisations, with a plenary policy-making body, an executive body and an administrative body.33 In 1970, in response to the obligation in Article III(1) NPT, the IAEA created the Comprehensive Safeguards Agreement (CSA), which contained a model on which subsequent individual safeguards agreements between states and the IAEA were to be based.34 Shortcomings of the CSA came to light over the years, however, with the case of Iraq developing a nuclear weapons programme whilst under IAEA safeguards as the most prominent example.35 Some of these shortcomings were of a legal nature: the CSAs were too limited in scope; routine access to declared facilities was limited; and too many safeguard exemptions existed.36 Other deficiencies were practical: the IAEA did not verify the absence of undeclared activities; the safeguards budget was constrained whilst the burden increased; and the development of nuclear technology meant that the IAEA safeguards methods were outdated. To remedy these flaws the IAEA finalised the Model Additional Protocol (AP) in May 1997.37 When a state signs an AP, it serves as an addition to the existing CSA: together they form the integrated safeguards system. By signing the AP a state grants the IAEA rights that go beyond those in the CSA. The purpose of the AP is the same as that of the CSA, which is to enable the IAEA to detect the diversion of significant quantities of nuclear material in a timely manner.38 The AP, however, strengthens the effectiveness and improves the efficiency of the

31  See Resolution adopted by the General Conference, ‘Regular Budget Appropriations for 2012’, IAEA document GC(55)/RES/5 of 22/09/11. On the development of the IAEA, see D Fischer, History of the International Atomic Energy Agency: The First Forty Years (IAEA, 1997) www.iaea.org. 32  Articles V–VII, XV IAEA Statute. 33  See, eg J Klabbers, An Introduction to International Institutional Law, 2nd edn (Cambridge, Cambridge University Press, 2004). 34 IAEA document INFCIRC/153; ND White, The Law of International Organisations (­Manchester, Manchester University Press, 1996). 35  L Rockwood, The IAEA’s Strengthened Safeguards System (2002) 7(1) Journal of Conflict and Security Law 123; MD Rosenthal et al, Review of the Negotiation of the Model Protocol Additional to the Agreement(s) between State(s) and the International Atomic Energy Agency for the Application of Safeguards Volumes I-III (Brookhaven National Laboratory, 2010). 36  These concern small quantities of nuclear material, see IAEA document INFCIRC/153, para 36–37. The AP partially remedies this, see INFCIRC/540, Article 2(vii). 37  IAEA document INFCIRC/540; see also Rockwood (n 35); Rosenthal et al (n 35). 38  IAEA document INFCIRC/153, para 2. The paragraph applies to the AP through its Article 1.

148  Tom Coppen IAEA.39 It reflects the view of the IAEA that effective safeguards depend on the verification of not only the correctness but also the completeness of a state’s declaration, which requires IAEA’s awareness of all nuclear and nuclear-related activities of that state. It also depends on the extent to which inspectors have access to relevant locations.40 The non-proliferation regime has a number of weak spots that are exacerbated by the political problems within the regime. For example, the fact that most nuclear technology can be used for both peaceful purposes and military applications makes it not only extremely hard to supervise compliance with non-proliferation norms in practical terms, but it also leads to disagreements on the relation between non-proliferation and the peaceful use of nuclear energy. At the same time, the enforcement of nonproliferation norms in the BG is sufficiently difficult with the necessary political support. Without it, it is impossible. This is even truer for the UN Security Council (UNSC) which is, as the primary organ responsible for maintaining international peace and security, the ultimate enforcer of arms control instruments, including the IAEA and the NPT.41 This is illustrated by the Democratic People’s Republic of Korea, which has continued and improved its nuclear weapons programme despite UNSC sanctions, leading to nuclear tests in 2006, 2009 and 2013.42 States that have a conflict with the IAEA, moreover, can use feelings of general dissatisfaction with the discriminatory distinction between NWS and NNWS under the NPT to rally support for their cases. This chapter focuses on the matter of Iran’s nuclear activities, which has highlighted these problems.43 Since the 2003 allegations that the Islamic Republic of Iran had been engaging in undeclared nuclear activities, the international community has been concerned about the proliferation danger that Iran poses. This concern is not only shared by Israel or Western states, but also by states in Iran’s direct and 39 

See the preamble of INFCIRC/540. See INFCIRC/540 Articles 4, 5, 9; see also Rosenthal et al (n 35). 41  The IAEA Statute provides that the Board may refer a non-compliant state to the UNSC: see Article XII. In the case of the NPT, the UNSC is involved upon a notice of withdrawal (see Article X NPT). Other multilateral arms control treaties have envisioned a similar role for the UNSC see, eg Article VI and XIII of the BWC; Article VIII.36 of the CWC; or Article IX of the CTBT. The UNSC, in addition, has a potential role to play in the supervision of any arms control arrangement, regardless of the provisions therein, in case it establishes that a violation of such arrangement threatens international peace and security. This is a logical consequence of its position in the collective security system. It can, according to Article 39 of the UN Charter, act autonomously in such cases. 42 See UNSC Res 1718 (2006) UN Doc S/RES/1718; UNSC Res 1874 (2009) UN Doc S/RES/1874; UNSC Res 1928 (2010) UN Doc S/RES/1928; UNSC Res 1985 (2011) UN Doc 1985. 43  For an overview of the Iranian nuclear crisis, see eg M El-Baradei, The Age of Deception 1st edn (New York, Metropolitan Books, 2011); SH Mousavian, The Iranian Nuclear Crisis: A Memoir (Washington, Carnegie Endowment, 2012); N Negm, Transfer of Nuclear Technology under International Law: Case Study of Iraq, Iran and Israel (Leiden, Martinus Nijhoff, 2009); S Chubin, Iran’s Nuclear Ambitions (Carnegie, Washington, 2006). See also ‘Iran Country Profile’ NTI (February 2013) www.nti.org/country-profiles/iran/. 40 

International Law and Iranian Nuclear Crisis 149 indirect neighbourhoods.44 The international pressure against Iran has led to the adoption of several resolutions by both the IAEA and the UNSC.45 Iran, however, continues to defy the demands of both international organisations and disputes the legality of the resolutions adopted against it.46 III.  IRANIAN ARGUMENTS

Overall, Iran emphasises its preparedness to compromise and cooperate with the IAEA, but only on a purely voluntary basis.47 From the Iranian perspective the IAEA has, under pressure from certain Western states, stepped far beyond its legal mandate. Underlying this position is the idea that the rights of the IAEA, as well as the obligations of Iran as an IAEA Member State, are limited. Thus, Iran claims, while it is being ‘bullied’ by the IAEA and the West, it is still prepared to compromise and to reach an agreement on mutually acceptable terms. The key to such a solution is, however, that it is purely voluntary in nature. On the other hand, pressuring and threatening Iran, according to its negotiators, will only lead to further entrenchment of its position and cessation of voluntary cooperation with the IAEA.48 This way of thinking is reflected in several aspects of official reactions by Iranian diplomats to IAEA reports. One example is the debate over the implementation of the modified Code 3.1 of the Subsidiary Agreement to Iran’s Comprehensive Safeguards Agreement (CSA). Iran maintains that the modifications to Code 3.1, which provide that it should have declared the construction of certain of its nuclear facilities before the point at which they were discovered, are merely recommendations by the IAEA, not binding amendments. For this reason, according to Iran, it did not violate its CSA by not declaring these facilities. Another example concerns the mandate of the Secretariat to verify not only the correctness, but also the completeness of Iran’s declarations under its safeguards agreement. In short, this boils down to the question of whether the IAEA may report

44 

See, eg Mousavian (n 43). UNSC Res 1696 (2006) S/RES/1696; UNSC Res 1737 (2006) UN Doc S/RES/1737; UNSC Res 1747 (2007) UN Doc S/RES/1747; UNSC Res 1929 (2010) UN Doc S/RES/1929; UNSC Res 1984 (2011) UN Doc S/RES/1984; UNSC Res 2049 (2012) UN Doc S/RES/2049. See IAEA Board of Governors resolutions GOV/2003/69 of 12/09/03; GOV/2003/81 of 26/11/03; GOV/2004/21 of 13/03/04; GOV/2004/49 of 18/06/04; GOV/2004/79 of 18/09/04; GOV/2004/90 of 29/11/04; GOV/2005/64 of 11/08/05; GOV/2005/77 of 24/09/05; GOV/2006/14 of 4/02/06; GOV/2009/82 of 27/11/09; GOV/2011/69 of 18/11/11; and GOV/2012/50 of 13/09/12. 46  See, eg Iranian Government communications INFCIRC/817 of 24/05/11; INFCIRC/847 of 20/12/12; INFCIRC/849 of 13/03/13; INFCIRC/850 of 25/03/13 www.iaea.org. 47 ibid. 48  See various statements made by Iran at the IAEA BG and NPT Review Conferences; see also Mousavian (n 43). 45  See

150  Tom Coppen that it is unable to verify the absence of undeclared nuclear activities in Iran. This is the basis for the demands by the Secretariat to be granted access to military sites, such as Parchin, which are non-nuclear in nature, but might be the site of nuclear-weapons related testing.49 This chapter, however, focuses on three Iranian arguments that directly touch upon the two fundamental agreements of the international legal non-proliferation regime: the NPT and the Statute of the IAEA. The first argument concerns the question of whether or not Iran is obliged to sign and ratify an AP. Iran, together with a large part of the NAM, as well as states such as Argentina and Brazil, argues that it is a voluntary instrument: it opposes the idea that implementing an AP is in any way an international obligation.50 The discussion focuses on the application of Article III NPT: although it provides that all NPT states must conclude safeguards agreements with the IAEA, in the view of these states this obligation only concerns the implementation of a CSA. Changing this standard by making the implementation of an AP compulsory would be a unilateral reinterpretation of the NPT without any binding legal force. For Iran, this issue is of particular importance as, according to its claims, the IAEA is under the mistaken notion that Iran must implement the AP and it is ‘requesting illegal measures and mislead[ing] the [BG]’ by asserting that Iran is not providing the necessary cooperation, including by not implementing its AP.51 The consequence, according to Iran, of this ‘misrepresentation of Iran’s commitments’ is that any ‘action requested by the Board of Governors in this respect would be unconstitutional, politically-motivated and illegal’. Iran asserts that despite this, it implemented the AP for over two and a half years as a voluntary confidence-building measure.52 The second argument is that the BG resolutions against Iran are ‘­illegal’ because the IAEA has violated Article XII.C of its own Statute by establishing non-compliance and referring Iran to the UNSC.53 In other words, the BG resolutions in question contravene the applicable rules of the institutional legal framework of the IAEA. This assertion rests on three arguments: —— Non-compliance can only be found by the BG where it has been determined previously by the Secretariat. In this case, the Secretariat never found Iran to be in non-compliance with its safeguards obligations; 49 See D Joyner, ‘Iran’s Nuclear Program and the Legal Mandate of the IAEA’ Jurist (9 November 2011) jurist.org/forum/2011/11/dan-joyner-iaea-report.php; C Ford, D Joyner and A Persbo, ‘Iran and the Bomb: The Legal Standards of the IAEA’ Colloquium, Bulletin of the Atomic Scientists (November–December 2012) www.thebulletin.org. 50  See, eg, Recommendation 33 of the NAM Working Paper NPT/CONF.2010/WP.46 of 28/04/10; Statement by Brazil, NPT/CONF.2010/MC.II/SR.1 of 10/06/10. 51  INFCIRC/849 (n 46) para 71. See also, eg, INFCIRC/847 (n 46) para 68–74. 52  INFCIRC/849 (n 46) para 72–73. 53  INFCIRC/849 (n 46) para 88.

International Law and Iranian Nuclear Crisis 151 —— According to the Statute and Article 19 of the CSA between Iran and the IAEA, a reference to the UNSC is only possible ‘if the Board, upon examination of relevant information reported to it by the Director General, finds that the Agency is not able to verify that there has been no diversion of nuclear material required to be safeguarded under this Agreement, to nuclear weapons or other nuclear explosive devices’.54 In the case of Iran, this condition cannot be fulfilled, as the DG has consistently reported that no declared nuclear material in Iran has been diverted towards military purposes; —— The reports of the IAEA Director General have not described Iran’s nuclear programme as a ‘threat to peace and security’—a statutory condition for referral to the UNSC under Article III.B.4 of the Statute. Third, Iran argues that its right to use nuclear energy for peaceful purposes under Article IV NPT, which is central to the pillar-structure of the treaty, is violated by the adoption of various BG and UNSC resolutions.55 In its reaction to the report on its nuclear activities by the IAEA Director General of February 2013, Iran put forth this argument in more detail, focusing on the demand of the IAEA BG that it suspend its uranium-enrichment related activities.56 While suspension of enrichment has been a demand of the IAEA, the UNSC and Western states since 2003, Iran has always maintained that its right to conduct uranium enrichment is protected by Article IV NPT. The Iranian point of view on the applicable legal instruments, and its opposition to a majority of the international community therein, provides useful insight into the purpose and nature of arms control law. First, it demonstrates how the development of the applicable rules is required in order to keep an arms control regime, in this case the non-proliferation regime, effective. On the other hand, it also indicates that concerns about national sovereignty can fuel opposition to such developments. This means that the flexibility that arms control instruments need in order to remain effective is at direct odds, in this case, with the desire of states for legal certainty and their aversion to changing standards. Iran’s legal approach, it has been noted, encompassed a harsher stand towards the international community on the nuclear crisis, which was primarily conceived by the more hard-line Ahmadinejad Government.57 Furthermore, its constant emphasis on its ‘nuclear rights’ has gained it some ­measure

54 

INFCIRC/214 of 13/12/1974, para 19 www.iaea.org. eg, the Working Paper submitted by Iran to the 2013 NPT PrepCom NPT/ CONF.2015/PC.II/WP.39 of 19/04/13. 56  Enrichment is one of the most significant steps towards the fabrication of a uranium weapon and is therefore regarded as one of the most ‘proliferation-sensitive’ nuclear-related activities. 57  See Mousavian (n 43). 55 See,

152  Tom Coppen of support from other NAM states that are concerned that the more ­powerful states at the IAEA will be capable of dictating the terms of nuclear safeguards if they remain unopposed. A similar strategy was followed by Syria, when it defended itself against allegations of non-compliance with its own safeguards obligations.58 Both cases have led to significant tension and unrest within the IAEA framework. IV.  ARTICLE III OF THE NPT AND THE ADDITIONAL PROTOCOL

This section deals with the question of whether or not Article III NPT, containing the safeguards and obligations of states, compels its Member States to conclude an AP in addition to their CSA. This is different from the question of what type of agreement an AP is: NPT Member States have agreed that the AP, once concluded, is a binding agreement between the IAEA and the state concerned.59 The issue at hand here, however, is whether Iran is obliged, as an NPT Member State, to both sign and ratify an AP. While Iran and the NAM are of the opinion that regarding the AP as anything else other than a voluntary confidence-building measure would be an unacceptable unilateral reinterpretation of the NPT, other states argue that a CSA with AP represent the current verification standard under Article III.60 To judge these claims it is necessary to turn to the general rules of treaty interpretation of the Vienna Convention of the Law of Treaties (VCLT).61 In short, the VCLT provides that the interpretation of treaty terms shall take into account subsequent agreement and practice: a treaty’s travaux préparatoires are of secondary importance in its interpretation.62 In terms of subsequent agreement, form is subject to intention in the sense that what form such an agreement takes matters less than whether or not a manifest intention exists, which the understanding between treaty parties would

58 See, eg DG report GOV/2008/60 (19/11/2008); BG resolution GOV/2011/41 (09/06/2011). 59 See, eg para 17 of the NPT 2010 Review Conference Final Document, NPT/ CONF.2010/50 (Vol I). While Iran signed an AP, it never ratified it and ceased its voluntary implementation of the measures therein in 2005. It does not consider itself bound to the provisions of its AP and Article 18(a) of the Vienna Convention of the Law of Treaties (VCLT) supports this claim. 60  See, eg NPT/CONF.2010/28 (03/05/2010); NPT/CONF.2010/35 (05/05/2010); NPT/ CONF.2010/48 (28/05/2010); NPT/CONF.2010/WP.69 (11/05/2010). 61 See Articles 31 and 32 VCLT. As the VCLT codifies customary law, it applies ­retroactively to the NPT: Avena and Other Mexican Nationals (Mexico v United States of America) (­Judgment) [2004] ICJ Rep, para 83; Sovereignty over Pedra Branca/Pulau Batu Puteh, Middle Rocks and South Ledge (Malaysia v Singapore), (Judgment) [2008] ICJ Rep, para 37. 62  International Law Commission (ILC), Draft Articles on the Law of Treaties with Commentaries, Yearbook of International Law, Vol II (1966) 19. See also White (n 21).

International Law and Iranian Nuclear Crisis 153 constitute an agreed basis for that treaty’s interpretation.63 ­Subsequent practice must be ‘concordant, common and consistent’, e­stablishing a ‘discernible pattern implying the agreement of the parties regarding its interpretation’.64 Indications as to the role of subsequent practice and agreements in the interpretation of a treaty might also be found in that treaty itself.65 In this context, and in light of the significant role of the Review Conferences to review, strengthen, implement and ensure compliance with the NPT, it must be understood that the conclusions and recommendations thereof were indeed intended to be authoritative, although they were never meant to have any direct legal effect. Review Conferences, therefore, play an important role in the interpretation of the NPT in the context of establishing subsequent agreement and practice. Although the NPT cannot be reinterpreted by referring to a Final Document alone, recurring agreement at Review Conferences could indicate subsequent agreement in the sense of Article 31 VCLT. Such agreement, if supplemented by common, concordant and consistent practice of the NPT Member States, is a crucial element in establishing the correct meaning of the terms of the NPT. The history of the treaty’s negotiation is, in such case, only of secondary relevance. There is, however, no direct subsequent agreement or practice regarding what is the verification standard of Article III NPT. Until 1985 states were in agreement that Article III demanded the implementation of a CSA, but that consensus disappeared with the development of the AP. Review Conferences have, however, reflected consistent consensus on a related issue. At every single conference, NPT states have agreed that the safeguards required under Article III should evolve to keep pace with technological or political developments. This includes Review Conferences that did not manage to produce a consensus Final Document, as well as those held after the AP had come into existence. NPT states agreed at every opportunity that the safeguards system should be developed so that its efficiency and effectiveness may be improved.66 In 1990, the NPT states expressed their desire for IAEA safeguards reform in a report that called on the Conference to ‘affirm its determination to strengthen further the barriers against the proliferation of nuclear weapons’, inviting the IAEA to consider studying new safeguard approaches including, for example,

63  Kasikili/Sedudu Island (Botswana v Namibia) (Judgment) [1999] ICJ Rep; RK Gardiner, Treaty Interpretation (Oxford, Oxford University Press, 2008) 217. 64  Japan—Taxes on Alcoholic Beverages, WTO Appellate Body, Report, AB-1996-2 (4 October 1996) 13. 65  Case concerning rights of nationals of the United States of America in Morocco (Judgment) [1952] ICJ Rep, 211. 66 NPT/CONF/35/I, Annex I, 3; NPT/CONF.III/64/I, Annex I, 4–5, para 12; NPT/ CONF.1995/32 (Part I), Annex, Decision 2, para 11 on 11; NPT/CONF.2000/28 (Part I) para 16; NPT/CONF.2010/50 (Vol.I), Part I, Action 32, 26.

154  Tom Coppen randomised inspections and calling for the universal application of IAEA safeguards to all peaceful nuclear activities in all states.67 These recommendations were linked to the actual process of the creation of the AP by the 1995 Conference, which further commended the IAEA for its work.68 In 2000, at the first Review Conference after the AP was adopted, all NPT states fully endorsed the Protocol, which it considered to be an integral part of the IAEA safeguards system.69 The background to the evolving nature of Article III can be found in the travaux préparatoires of the NPT. The negotiation process reflects a discrepancy between the purpose and the scope of the Article. Its purpose was formulated very broadly as ensuring the non-diversion of nuclear energy from peaceful uses to nuclear weapons or other nuclear explosive devices.70 The material scope of the Article, by contrast, was restricted to the flow of nuclear material within the state. This was the basis of the system underlying the CSA-based verification system of the IAEA, which transpired to be too limited to achieve the purpose of Article III(1). Although they could not predict the weaknesses of the CSA that would eventually surface, states did seem to realise, back in 1968, that at some point in the future the scope of Article III(1) NPT may have to be extended in order to fully ensure the effective functioning of the obligation therein. Records of NPT negotiations at both the Eighteen-Nation Committee for Disarmament (ENDC) and the UN General Assembly (UNGA) support this claim. The US representative, for example, stressed that no treaty amendment would be required to revise the IAEA safeguard documents, a statement for which he received support from various other delegations.71 Thus, the concept of IAEA safeguards evolving to keep pace with technological or political developments was embedded in Article III(1) at the time of the conclusion of the NPT. In conclusion, not only have the NPT Member States continuously called for the improvement of IAEA safeguards, but they have also given the IAEA a mandate to achieve such improvements in 1990 and 1995, culminating in the creation of the AP. It has been agreed by the same Member States that the CSA alone cannot fulfil the purpose of Article III(1), which includes verifying the absence of undeclared nuclear activities in a state. The only reason that the AP is a separate document, and thus requires a separate ratification by states, is that the IAEA found that it did not have 67 

Report of Main Committee II, adopted by consensus, NPT/CONF.IV/MC.II/1.

68 NPT/CONF.1995/MC.II/1. 69 

NPT/CONF.2000/28 (Part I). See, eg, statements by the USSR, ENDC/PV.357, 8–9 or ENDC/PV.370 para 60; and the US, ENDC/PV.357, 15–16 or ENDC/PV.370 28. 71 ENDC/PV.357 para 50 ENDC/PV.329, para 4; ENDC/PV.358 para 70. See also, eg, verbatim records of the discussions of the NPT at the First Committee of the 1968 UNGA: A/C.1/PV.1561–72. 70 

International Law and Iranian Nuclear Crisis 155 the authority to unilaterally update the CSA and thereby interpret Article III(1). Arguing that the AP is a voluntary measure is incompatible with the progressive nature of Article III(1), which all NPT states have repeatedly emphasised and mandated the IAEA to implement. Article III(1) demonstrates how the NPT reconciles requirements of both flexibility and legal certainty: it allows external factors to influence the implementation of the treaty, but on the other hand safeguards states’ concerns that their sovereignty will be limited without their consent. In this case, however, there has been consistent consensus regarding the progressive nature of the treaty provision in question. The Iranian argument is therefore contrary to a correct interpretation of the NPT: according to both subsequent agreement and its travaux ­préparatoires, in implementing Article III NPT one must acknowledge the evolving nature of safeguards, which in turn requires states to accept that the IAEA safeguards system must develop in order to remain capable of fulfilling the goals of preventing proliferation. In other words, the demand of the IAEA BG does not violate the NPT: Iran is, if it wants to implement the obligations of the NPT in good faith, under an obligation to sign and ratify an AP, in which case it will be bound by the provisions therein. This conclusion still leaves open the question on what institutional grounds the BG may demand Iran to implement an AP. This question is discussed later in this chapter. V.  THE IAEA BOARD OF GOVERNORS

The second Iranian argument against the validity of the BG resolutions is that they were adopted in violation of the applicable institutional and procedural legal framework of the IAEA. In this context, Iran has referred to Article XII.C of the IAEA Statute, as well as to the CSA. Provisions in the constituent document or other legal texts of an international organisation regarding specific competences of its organs are often unclear or vague, and the IAEA is no exception. Therefore, in order to determine whether the actions of the IAEA BG are ultra vires, it is necessary to establish whether or not they reflect a correct interpretation of the relevant IAEA legal documents in light of subsequent practice. Although the VCLT applies to the IAEA Statute, the context is different from that of the NPT.72 Constituent documents of international organisations are treaties that establish a subject of international law with specific functions and powers: they create a living body that might evolve beyond the intentions of its creators, for example, in order to react to unforeseen flaws in its legal framework,

72 

Article 5 VCLT.

156  Tom Coppen or political or technological developments.73 In the case of the IAEA, the introduction of the NPT safeguards system is such a development. Thus, the adaptation of the constituent document of an international organisation may be necessary. The most logical mechanism for doing so is a formal amendment procedure. Such procedures combine flexibility and legal certainty, allowing for the organisation to react to changing circumstances that require institutional developments, while the formal requirements for amendment alleviate states’ concerns about losing part of their sovereignty to the organisation. Unfortunately, this is also the main drawback of such procedures. They are normally cumbersome, inflexible and therefore impractical.74 Moreover, if an amendment is not accepted by all Member States, it might lead to procedural problems at a later stage.75 A second option for revision of the constituent document of an international organisation is through legislation. The organs of an international organisation can use their authority to issue regulations that adapt the constituent document of the organisation. This does not mean that the constituent document itself has to be amended: through its regulatory powers an organ may, for example, issue an authoritative interpretation of the constituent document that can adapt it to changing circumstances. In the context of the IAEA, the CSA constitutes an adaptation of the Statute in certain ways.76 In itself, INFCIRC/153, although approved by the IAEA Member States, is not legally binding: it is a model law that does not have direct external effects. Rather, the individual agreements between states and the IAEA, based on INFCIRC/153, bind the parties involved.77 The last two options for the revision of constituent documents are interpretation and modification. The interpretation of a constituent document is to ‘select one particular alternative among a multitude of possible meanings, [enabling] the interpreting agency to adapt institutional arrangements of an international organisation to changing circumstances’.78 This does not

73 

Klabbers (n 33) 66. See, in this case, Article XVIII of the IAEA Statute. 75  See Klabbers (n 33); HG Schermers and NM Blokker, International Institutional Law: Unity within Diversity, 3rd edn (The Hague, Martinus Nijhoff, 1995); A Chayes and AH Chayes, The New Sovereignty: Compliance with International Regulatory Agreements (Cambridge, Harvard University Press, 1995). 76  Eg, it changes the scope of the IAEA safeguards system for NPT Member States. Instead of preventing the diversion of nuclear material to military purposes, the CSA aims to prevent diversion to explosive purposes. This means that, eg, naval propulsion is not covered, but peaceful nuclear explosions are. 77 EP Hexner, ‘Teleological Interpretation of Basic Instruments of Public International Organizations’ in S Engel and RA Métall (eds), Law, State and International Legal Order: Essays in Honour of Hans Kelsen (Knoxville, University of Tennessee Press, 1964); White (n 34); ­Klabbers (n 33). Iran’s safeguards agreement with the IAEA, which has been in force since 1974, can be found at the website of the IAEA: see document INFCIRC/214 of 13/12/1974, www.iaea.org. 78  Hexner (n 77) 124. 74 

International Law and Iranian Nuclear Crisis 157 include, however, the authority to ‘exceed interpretative radius by selecting option outside admissible meanings’, which amounts to a modification of the document.79 In case of a modification, the consent of the Member States of the organisation is required in order for it not to be ultra vires. It is a general principle of international institutional law that the organs of an international organisation are primarily responsible for the interpretation of its constituent document.80 Both interpretation and modification may take place by way of established practice of the international organisation in question if such practice is supported by the Member States, consistent and uniform.81 This does not, however, mean that a large number of comparable cases are required to establish a certain practice: depending on the support of the Member States of the organisation, one instance can be enough. The IAEA should be considered ‘in its own circumstances’.82 In this case, it means that the existence of opposition against a certain practice can be relevant: although such opposition could vary from minor to substantial, it might not be significant enough to prevent the adoption of a non-compliance resolution.83 The existence of a substantial minority opposition, however, weakens the legal force of the practice in question; acceptance of the majority vote does not ‘commit dissenters to the principle on which such a majority acts’.84 At the same time, minority opposition against a modification of the IAEA Statute by the BG can render it ultra vires. Did the BG act ultra vires by adopting a non-compliance resolution that was not based on a non-compliance finding by the Secretariat, as Iran claims? Article XII.C provides that the inspectors ‘shall report any noncompliance to the Director General who shall thereupon transmit the report to the Board of Governors. The Board shall call upon the recipient State or States to remedy forthwith any non-compliance which it finds to have occurred’.85 While unclear about the exact relation between the non-compliance findings of the Secretariat and the BG, it is within the range of admissible meanings of the text to argue that one needs not necessarily be based on the other. Nor does the CSA suggest this: it provides that the BG may only take actions under Article XII.C based on reports by the IAEA Director General, but does not state that these need to conclude that the state in question is in non-compliance.86 This is consistent with the separation 79 ibid.

80  Klabbers (n 33) 91, 101; CF Amerasinghe, Principles of the Institutional Law of International Organizations, 2nd edn (Cambridge, Cambridge University Press, 2005); P Sands and P Klein, Bowett’s Law of International Institutions, 5th edn (London, Sweet and Maxwell, 2001). 81  See Hexner (n 77); Sands and Klein (n 80) 456; Klabbers (n 33) 91. 82  Sands and Klein (n 80) 456. 83  IAEA BG resolutions can be adopted by simple majority, Article VI.E of the Statute. 84  Amerasinghe (n 80) 51–52. 85  Emphasis added. 86  IAEA document INFCIRC/153, para 19.

158  Tom Coppen between the roles of the Secretariat and the BG: the former reviews states’ compliance with their safeguards obligations, the latter makes the final assessment.87 Corresponding with the administrative character of the Secretariat, it analyses and evaluates safeguarding information, translating technological data into a legal-political qualification. This qualification may be one of ‘non-compliance’, or, as it did in recent cases, the Secretariat may limit itself to concluding that states failed to meet their safeguards obligations.88 Its 2011 report on Syria did not even go this far: in this case, the Secretariat merely stated that Syria had ‘very likely’ built a reactor that should have been declared to the IAEA.89 After the review, the BG makes the final assessment on whether or not states are formally in compliance with their obligations, in accordance with its executive, political character. It must be concluded that nothing in the IAEA Statute or practice prevents it from doing so without a ‘non-compliance’ qualification from the Director General. Amongst IAEA Member States, there is little opposition to this practice, except in the case of Syria, where many found that the ‘very likely’ conclusion was too thin a basis for a non-compliance resolution by the BG. In both the cases of Iran and Libya, however, such sentiment was shared by only a small number of states. Thus, the Iranian argument does not stand: the BG did not act ultra vires by interpreting the Statute as it did; moreover, there was no significant opposition, in this case, to the absence of a non-compliance finding by the Secretariat. Second, can the BG make a finding of non-compliance if the Secretariat concludes that all declared material remains in peaceful uses? The first non-compliance resolution was based primarily on a 2003 report by the Director General, which asserted that it would ‘take some time before the Agency is able to conclude that Iran’s nuclear programme is exclusively for peaceful purposes’.90 The latest report before the 2005 non-compliance resolution concluded that it was not possible to verify that there were no undeclared activities in Iran; the findings of the reports by the Director General have, since then, not varied much.91 In other words, while the IAEA concludes that Iran’s declarations under its CSA are correct, it cannot conclude that they are complete as well: Iran is critical of this conclusion because it allegedly violates paragraph 19 of its CSA.92 There is nothing

87 

Den Dekker (n 5). the conclusions in the cases of on Iraq and the North Korea (Democratic People’s Republic of Korea) (DPRK) with those on Iran and Libya: see IAEA documents GOV/2530 para 13; INFCIRC/419 para 28; GOV/2005/77 para 1; GOV/2004/12. 89 GOV/2011/30. 90  GOV/2005/77, para 1; GOV/2003/75, para 52. 91  GOV/2005/67, para 51; see also, eg GOV/2013/6, para 51. 92  As pointed out above, this chapter does not deal with the question of whether the Secretariat has the mandate to investigate the completeness of Iran’s reports, but with the question of whether the BG may make a non-compliance finding based on such information. 88 Compare

International Law and Iranian Nuclear Crisis 159 in this provision, however, that supports such an argument. First, it mentions that the BG must make its decision upon examination of ‘relevant information’ provided to it: this wording is not exhaustive, meaning that the BG can take into account other information apart from the fact that all declared nuclear material in Iran has remained in peaceful purposes. Second, the BG must reach the conclusion that the IAEA is not able to verify that there has been no diversion of material required to be safeguarded under the CSA: this means, as paragraph 2 of the CSA clarifies, all such materials, regardless of whether they are declared or not. Third, paragraph 19 of the CSA requires the BG to take account of the assurance provided by the safeguards measures applied when making its decision. Clearly, this means it can make its own judgment on whether or not the application of the CSA in Iran guarantees the absence of undeclared activities. Thus, the BG is not incorrect with its interpretation of paragraph 19 of the CSA by finding that Iran is in non-compliance with its safeguards obligations despite the conclusion of the Secretariat that no declared material was diverted; therefore, it cannot be concluded that the BG violated the IAEA Statute. The final procedural argument by Iran was that the BG had not concluded that the Iranian nuclear programme is a threat to international peace and security. While this is true, there is nothing in the IAEA Statute to indicate that this is, in any way, a formal requirement for referral to the UNSC. Article III.B.4 refers to matters that are ‘within the competence of the UNSC’, this does not mean that such matters must automatically be a threat to peace and security. In fact, it is the UNSC, not the BG, which must make this determination. Article XII.C does not mention any threat to peace and security, nor does the CSA. In the context of the 2011 non-compliance resolution on Syria, a number of states did oppose the adoption of such a resolution because there was no immediate threat to international peace and security, since the nuclear installation in question had been destroyed and so did not pose any danger of proliferation. None of these states, however, claimed that the lack of such a threat would make a non-compliance resolution illegal. Thus, although the military and security-related impact of a violation of the safeguards regime can be a factor in the political decision to make a formal assessment of compliance or non-compliance, it must not be regarded as a procedural prerequisite for such a finding. VI.  THE INALIENABLE RIGHT TO PEACEFUL USES OF NUCLEAR ENERGY

The third Iranian argument under discussion is that its rights to peaceful uses of nuclear energy under Article IV NPT are violated by the

160  Tom Coppen r­ esolutions of the BG, in particular by its demand for the suspension of uranium enrichment. In order to determine whether this is indeed the case, the first matter that needs to be settled is whether Article IV NPT, which confirms the NPT states’ inalienable right to use nuclear energy for peaceful purposes, protects the right of states parties to enrich uranium. Article IV(1) of the NPT is often understood as creating a right for NPT states parties to use nuclear energy for peaceful purposes in exchange for their abstention from the development of nuclear weapons. This is erroneous, since this right is a sovereign right that any state possesses regardless of NPT membership. Rather, it is suggested that Article IV(1) demarcates the line between peaceful uses of nuclear energy and nuclear proliferation. It limits the former by stating it can only be exercised in accordance with Articles I, II and III.93 Article IV(1), however, also codifies the rule that the right to nuclear energy for peaceful purposes can only be limited by rules emanating from the NPT itself. Thus, it limits and safeguards the right to peaceful nuclear energy at the same time. The exact scope of ­Article IV(1) is unclear: there is no agreement on what particular activities are permitted and protected under the NPT. No subsequent agreement has been reached at NPT Review Conferences; in this case, the rules of treaty interpretation dictate a closer look at the NPT negotiation records, in particular those dealing with Article II. After all, non-proliferation obligations limit the application of Article IV(1): thus, ‘peaceful use’ ends where ‘manufacture’ of a nuclear explosive begins. The NPT does not define at what point a civilian nuclear programme should be regarded as the manufacturing of a weapon. This means, ­simply put, that one way to interpret the treaty is to regard all nuclear ­activities as peaceful until a nuclear explosive device is actually assembled. To ­prevent such interpretations, the USSR proposed to prohibit ‘preparations to manufacture’ a nuclear weapon, but the proposal was rejected. The Swedish representatives at the negotiations asked what was exactly going to be prohibited by the treaty, wondering at which point of the process of nuclear weapon manufacture it would be ‘reasonable and feasible’ to introduce international blocking.94 In the end, the travaux préparatoires of the NPT indicate that apart from peaceful nuclear explosives, which would be regulated by Articles II and V, no type of nuclear equipment, technology or activity should be considered as beyond the scope of ­Article IV(1). ­During the treaty negotiations, several states issued statements that corroborate this conclusion: any non-explosive activity, including those

93  Subsequent agreement and practice link Article IV to Article III NPT. See, eg the 2010 Review Conference Final Document, NPT/CONF.2010/50 (Vol 1), para 31. 94 See the 1966 USSR draft of the NPT, document ENDC/164; statements by Sweden, ENDC/PV.243, 11–12; ENDC/PV.342, 10–12.

International Law and Iranian Nuclear Crisis 161 which are now considered ‘sensitive’, such as uranium enrichment or the extraction of plutonium from spent fuel, is allowed under the NPT.95 This means that Iran does have a right to enrich uranium that is protected by Article IV NPT. Since no subsequent agreement was ever reached on this topic, this is the correct interpretation of the NPT to date. The next question is whether the BG resolutions demanding Iran to suspend its enrichment activities are violating this right. It has been stressed already that the IAEA does not have a mandate to supervise or implement the NPT; this means that the BG does derive any right to suspend the rights under Article IV from the NPT itself. The Statute, on the other hand, mentions that the BG may take enforcement measures in case a non-compliant state fails ‘to take fully corrective action’.96 Paragraph 18 of the CSA elucidates this phrase, providing that the BG can call upon a state to take any action that it deems ‘essential and urgent’ in order to ensure verification of the non-diversion of peaceful nuclear material. ­Paragraph 19, of the CSA obliges the BG, in the context of taking action under ­Article XII.C of the Statute, to afford the non-compliant state ‘every reasonable opportunity’ to furnish the BG with reassurance of its compliance. In other words, the BG may call upon a state to take any corrective measure based on the CSA; it may also request such actions as non-binding­, confidence-building measures. It is accepted practice within the IAEA that it does both: while the BG has formulated a number of strict demands on Iran over the years, it has also included numerous provisions in its resolutions that are slightly more softly worded. These ‘request’, ‘urge’, or ‘decide that it is essential’ or ‘urgent’ that Iran take a certain course of action. Such requests included the provision of information and access to the IAEA; reconsideration of the decisions to begin testing at a conversion facility or construct a heavy-water facility; but also the request to suspend uranium enrichment or to implement the measures of the AP.97 In its more recent resolutions, the BG points out the lack of confidence in Iran’s intentions and invites it to engage in constructive discussions for a peaceful resolution to the ­matter.98 The differences between BG demands and requests are not always clear, for example, the BG requests that Iran implement an AP, but also calls upon it to implement the UNSC resolutions, which also includes the implementation of measures in the AP. It must be assumed, though, that the BG recognises a difference between 95  See, eg statement by Chancellor Brandt to the German Bundestag, 1/02/67 in Documents on Disarmament 1967 (Washington DC, ACDA, 1967) 51; Aide-mémoire by Switzerland to the ENDC, document ENDC/204, 1966; Statement by Foster to the US Senate Foreign Relations Committee, 10/07/68 in Documents on Disarmament 1968 (Washington DC, ACDA, 1968). See also Shaker (n 21) 251. 96  Article XII.C IAEA Statute. 97  GOV/2004/49, para 3, 8; GOV/2004/79, para 4. 98  See GOV/2006/14, para 5; GOV/2011/69, para 4; GOV/2012/50, para 4.

162  Tom Coppen confidence-building measures and corrective actions. In this context, the requests by the BG were attempts to find a peaceful resolution to the dispute with Iran within the framework of the IAEA through engagement and confidence-building.99 The BG cannot base a demand for Iran to suspend uranium enrichment on the NPT, since it does not possess the competence to suspend or issue legally binding demands that effectively suspend Article IV, which includes uranium enrichment activities under its scope. This does not mean, h ­ owever, that the BG cannot request such suspension as a ­confidence-building measure under Article XII.C of the Statute and paragraph 19 of the CSA. Iran is free to disregard such requests, but it should be noted that doing so may ultimately lead to the adoption of corrective measures, such as suspension or curtailment of IAEA assistance.100 It is important to point out that this is not the case for similar demands made by the UNSC, which were made under Chapter VII of the UN Charter and are therefore legally binding.101 The competences and powers of the UNSC and the IAEA BG must be clearly distinguished, as in this context references to the UNSC in resolutions by the BG can create confusion. Looking back at the BG demand for the implementation of an AP, a different legal situation may be discerned. It was concluded that the implementation of both CSA and AP represent the verification standard under the NPT. In other words, the BG is not limiting or violating Iran’s rights under the NPT, and so therefore not acting ultra vires when it demands the implementation of an AP as a corrective measure under Article XII.C of the Statute and paragraph 18 of the CSA.102 VII. CONCLUSION

It is argued that, at times, the role of international law in the context of issues that have an overriding impact on the national security of states, such as the non-proliferation of nuclear weapons, is limited or even negligible. Knowledge of the applicable international law amongst diplomats, delegates, researchers, policy makers and non-governmental organisations is often limited. At the same time, those with a realist view on nuclear non-proliferation argue that even if such law exists, it will always be s­ ubservient to national and international stability and security

99 

Conversations with officials at Permanent Missions in Vienna, 2013. See Article XII.C IAEA Statute. 101  See, eg B Simma, The Charter of the United Nations: A Commentary, 2nd edn (Oxford, Oxford University Press, 2002) Vol I. 102  See also C DeFrancia, ‘The continuing role of item-specific agreements in the IAEA safeguards system’ (2011) 88 Nuclear Law Bulletin 33. 100 

International Law and Iranian Nuclear Crisis 163 ­considerations.103 The international dispute over the nuclear activities in Iran is interesting because the Islamic Republic, in its defence, uses mostly legal arguments to contest the legitimacy of the actions taken against it. This is logical since Iran is, in this conflict, the weaker party in political, economic and military terms: the law is traditionally an instrument to protect weaker states from arbitrary actions by stronger states. Iran has attempted to change the discourse of the discussion over its nuclear activities towards its legal rights and obligations under the international nuclear non-proliferation regime. Nevertheless, the preceding paragraphs illustrate that at least part of the Iranian argument in defence of its position, specifically those that relate directly to major legal instruments, such as the NPT and the IAEA Statute, can be proven faulty. What does this say about the character and nature of international law in the context of nuclear non-proliferation? First, the analysis of the applicable provisions of the NPT and the IAEA Statute necessary for an assessment of the Iranian arguments proves that this particular field of arms control law is capable of evolution and development. Because of the potential impact on national security of its subjects, arms control regimes must be able to maintain their relevance in the face of economic, political, technological or military developments. The NPT, with its system of Review Conferences and PrepComs, possesses this adaptability. In legal terms, such conferences are a source of subsequent agreement and practice that preserve the relevance of the NPT by interpreting its provisions in order to adapt to changing circumstances in ways that the NPT members deem necessary. Such developments take time as they require repeated agreement and practice. That they have maintained the status of the NPT by evolving it throughout its 40-plus years, however, is indisputable. In addition to Articles III(1) and IV(1), there are several other provisions of the NPT that have likewise been adapted. For instance, a number of legal loopholes in Articles I and II, such as the possibilities of providing assistance to a nuclear weapons effort of a NWS or a non-NPT member by another NWS, or that of a NNWS providing assistance to a nuclear weapons programme in any other state, were closed off by subsequent Review Conferences.104 The use of nuclear explosions for peaceful purposes was banned.105 Also, as mentioned previously, Article VI was confirmed as

103  On realism, see eg J Snyder, ‘One World, Rival Theories’ (2004) 145 Foreign Policy 52; TV Paul, RJ Harknett and JJ Wirtz (eds), The Absolute Weapon Revisited. Nuclear Arms and the Emerging International Order, 4th edn (Cambridge MA, MIT Press, 2001); SD Krasner, ‘­Sovereignty’ (2001) 122 Foreign Policy 20; C Brown and K Ainley, Understanding International Relations, 4th edn (New York, Palgrave MacMillan, 2009); S Walt, ‘International Relations: One World, Many Theories’ (1998) 110 Foreign Policy 34. 104  Coppen (n 21). 105  Article V is interpreted in light of the ban on all nuclear explosions in the CTBT: see NPT/CONF.2010/50 (Part I), para 78.

164  Tom Coppen being primarily the burden of the NWS. The Review Conference cycle also provides a way to reconcile the legal framework of the NPT with the impact of politics on arms control law by allowing the latter to influence the former. Second, despite this evolving nature, states’ concerns for their national sovereignty are respected in the field of nuclear arms control law. The ­argument that the requirement of a CSA plus AP as the verification standard under Article III is a unilateral interpretation of the NPT and a violation of the sovereign right of states not to enter into agreements against their will is a misrepresentation of the legal situation. Rather, states have agreed to a developing system of safeguards, within the range of the object and purpose of the NPT. In this sense, the opposition to the AP is contrary to implementing the NPT in good faith. On the other hand, the scope of Article IV(1) has never changed due to consistent opposition to such alterations to its interpretation. For this reason, Iran, just as any other NPT state, possesses an inalienable right to enrich uranium. Thus, the NPT provides both flexibility and legal certainty to its Member States.106 It is important to note that within the IAEA legal framework there is more emphasis on flexibility and the development of the ­organisation, than on legal certainty. This difference may be explained by the fact that the IAEA is an international organisation, a living subject of international law. It is easier to develop a certain practice within the IAEA BG due to its majority vote rule. IAEA organs have, moreover, a significant margin of ­appreciation when it comes to interpreting the provisions of the IAEA Statute. In other words, the position of minority blocs within the IAEA legal framework is weaker than within that of the NPT. Even substantial groups of states with dissenting positions cannot prevent a certain practice being adopted if there is a majority in favour of it, nor can they successfully claim that such practice is ultra vires if it is within the confines of interpretation of the Statute. They can, however, weaken the political strength of such practice. This chapter has demonstrated that, at the very minimum, a solid legal counter-argument against the Iranian position is possible. In practice, however, those critical of Iran’s nuclear programme have largely failed to make such an argument. Despite the fact that Iran has issued several written communications, declarations and explanatory notes over the years that fundamentally put forth the same legal arguments, and despite the fact that these arguments form the core of Iran’s public defence of its nuclear programme, neither discussions at the IAEA BG nor the NPT conferences reflect a thoroughly thought-out legal response by Western states. Resolutions are normally limited to reiterations of expressions of serious

106 

Coppen (n 21).

International Law and Iranian Nuclear Crisis 165 concerns regarding aspects of the Iranian nuclear programme, general references to Articles I, II and IV NPT, assertions that Iran violated its safeguarding obligations and political and strategic considerations, such as the lack of confidence in Iran’s good faith as well as the proliferation risks that the Iranian nuclear programme allegedly poses.107 In this way, the role that international law can play within the nonproliferation­regime, and especially in crises such as these, is overlooked. While not wishing to ignore the fact that international legal considerations alone will not bring an end to this dispute, several advantages of an increased emphasis on the legal aspects of the Iranian nuclear programme can be identified. First, it might be of significant diplomatic value. It was pointed out that the legitimacy of the programme, as well as its conformity with international law, is the cornerstone of the public position of the Islamic Republic. Conversely, attacking the legitimacy of international actions taken against it is its main line of defence against international pressure, as well as IAEA reports and resolutions from the BG or the UNSC. Pointing out the flaws in Iran’s arguments would weaken its position. Moreover, it could affect the positions of NAM states that have grown hesitant towards the approach to the Iranian nuclear crisis taken by the international community, especially in the context of their own rights under the non-proliferation regime. Respecting the arguments put forth by Iran, which are based on these rights, by acknowledging and discussing them, instead of merely brushing them aside, would prove to third party states that these rights are safeguarded and respected. Ignoring them, by contrast, may lead to disputes and weaken the perceived legitimacy of the system. Both the right to peaceful uses of nuclear energy and the protection from arbitrary treatment should be positive incentives for states to support the nuclear non-proliferation regime. A system of benefits of compliance with the rules, in combination with costs for non-compliance, would encourage states to decide that it is in their interest to do the former. This would not only solve the Iranian nuclear crisis, but also that of North Korea (Democratic People’s Republic of Korea). In addition, it may have encouraged the Syrian regime to divulge its nuclear activities before the conflict broke out. There are also arguments of a non-political nature to be made for a legal approach. The issue at stake here is to induce Iran, by enforcement or otherwise, to comply with non-proliferation norms. In this sense, the problem is one of arms control supervision.108 Failure to engage in discussion on the applicable law represents a missed opportunity to conduct a comprehensive dialogue on the supervision of both the NPT and the IAEA that is long overdue. Before any rule of law can be enforced, its provisions 107  108 

Article II IAEA Statute. See n 16.

166  Tom Coppen must be interpreted; in the context of arms control supervision, this is a ­process that takes place mainly through diplomatic channels, such as discussions between IAEA Member States or NPT Review Conferences.109 This ‘creative function’ of supervision stimulates the progressive development of international law. It is of crucial importance for addressing the weaknesses of the non-proliferation regime. The single positive aspect of the Iranian crisis is that it provides an incentive for extensive dialogue on how to strengthen the non-proliferation regime—this opportunity should not be squandered.

109 See, eg Myjer (n 29); EPJ Myjer, ‘The Organization for the Prohibition of Chemical Weapons: Moving Closer towards an International Arms Control Organization? A Quantum Leap in the Institutional Law of Arms Control’ in EPJ Myjer (ed), Issues of Arms Control and the Chemical Weapons Convention: Obligations Inter Se and Supervisory Mechanisms (The Hague, Martinus Nijhoff, 2001); see also G Den Dekker, ‘The Effectiveness of International Supervision in Arms Control Law’(2004) 9(3) Journal of Conflict and Security Law 315; Chayes and Chayes (n 75).

8 Contemporary Maritime Piracy as a Threat to International Peace and Security ALEXANDROS XM NTOVAS

I. INTRODUCTION

W

HEN REFERRING TO piracy on the high seas in academic literature, it has become commonplace to do so by employing expressions similar to those used by the Permanent Court of International Justice in The SS Lotus case, which was of the opinion that piracy has constituted a genuinely international offence, giving rise to a sui ­generis universal criminal jurisdiction, since time immemorial.1 ­Maritime piracy, as classically defined and codified by the 1958 Convention on the High Seas2 and the 1982 United Nations Convention on the Law of the Sea (UNCLOS),3 is a serious criminal offence. The international law related to piracy is primarily provided in UNCLOS through Articles 100–07, which set out the broad legal framework with respect to its suppression. In short, the Convention establishes a firm obligation for states to co-operate­ and exercise universal jurisdiction over crimes related to acts of piracy

1 

SS Lotus Case (France v Turkey) (Judgment) (1927) PCIJ Rep Series A No 10, para 70. on the High Seas (adopted 29 April 1958, entered into force 30 September 1962) 450 UNTS 11. See Article 5 and the auxiliary provisions in Articles 14 and 16–22. The drafting of the Convention largely reflected the preparatory work of the UN International Law Commission, see ILC, ‘Report of the International Law Commission Covering the Work of its Eighth Session’ (23 April–4 July 1956) UN Doc A/CN.4/104 published in (1956) II ­Yearbook of the International Law Commission 253; which in turn had been influenced by the codificatory study by the Harvard Law School leading to the Draft Convention on Piracy, available in the supplement series of (1932) 26 American Journal of International Law 739. 3 Convention on the Law of the Sea (adopted 10 December 1982, entered into force 16 November 1994) 1833 UNTS 3 (UNCLOS; the Convention). UNCLOS incorporated, with drafting amendments, the piracy provisions of the 1958 High Seas Convention and progressively developed its definition as to envisage the possible implication of an aircraft in such attacks. 2  Convention

168  Alexandros XM Ntovas c­ ommitted on the high seas.4 For the purpose of the Convention, piracy is defined in Article 101 as consisting of any of the following acts: (a) any illegal acts of violence or detention, or any act of depredation, committed for private ends by the crew or the passengers of a private ship or a private aircraft, and directed: (i) on the high seas, against another ship or aircraft, or against persons or property on board such ship or aircraft; (ii) against a ship, aircraft, persons or property in a place outside the jurisdiction of any State; (b) any act of voluntary participation in the operation of a ship or of an aircraft with knowledge of facts making it a pirate ship or aircraft; (c) any act of inciting or of intentionally facilitating an act described in subparagraph (a) or (b).

Vessels engaged in, or suspected of engaging in, acts of piracy as defined above may be boarded, searched and seized by warships or military aircraft, or other ships or aircraft clearly marked and identifiable as being in the government service of, and authorised to that effect by, any state.5 The courts of the seizing state may decide upon the penalties to be imposed, in accordance with the applicable national law, and may also determine the action to be taken with regard to the ships, aircraft or property, subject to the rights of third parties acting in good faith.6

4 Article 100 UNCLOS. With respect to the legal construction of the crime of piracy in terms of space, it should be noted that the ‘high seas’ is an area that encompass the waters beyond the territorial sea of a state—ie, a zone that extends up to 12 nautical miles from the coast—and therefore a state may assume, in a manner consistent with the Convention, universal jurisdiction over piratical activities within the Exclusive Economic Zone of another state. See R Jennings and A Watts (eds), Oppenheim’s International Law, 9th edn (­London, Longman, 1992) 753. Correspondingly, acts of the same nature occurring in the internal waters, territorial sea or archipelagic waters of a state are classified as ‘armed robbery’ against ships. See further, International Maritime Organisation (IMO), ‘Code of Practice for the Investigation of the Crimes of Piracy and Armed Robbery against Ships’ (29 November 2001) A.922(22), defining armed robbery against ships as ‘any unlawful act of violence or detention or any act of depredation, or threat thereof, other than an act of “piracy”, directed against a ship or against persons or property on board such ship, within a State’s jurisdiction over such offences’. 5  Article 105 UNCLOS in conjunction with Article 107. A pirate ship or aircraft is further defined in Article 103 ‘A ship or aircraft is considered a pirate ship or aircraft if it is intended by the persons in dominant control to be used for the purpose of committing one of the acts referred to in article 101. The same applies if the ship or aircraft has been used to commit any such act, so long as it remains under the control of the persons guilty of that act.’ In addition, Article 102 envisages that acts of piracy may be ‘committed by a warship, government ship or government aircraft whose crew has mutinied and taken control of the ship or aircraft are assimilated to acts committed by a private ship or aircraft’. Issues regarding the retention or loss of the nationality of a pirate ship or aircraft and incurring liability for seizure without adequate grounds are being addressed by Articles 104 and 106 respectively. On the specific rules and evolving standards regarding interdiction of vessels, see D Guilfoyle, Shipping Interdiction and the Law of the Sea (Cambridge, Cambridge University Press, 2009). 6  Article 105 UNCLOS.

Maritime Piracy as International Threat 169 The 1979 International Convention against the Taking of Hostages7 and the 1988 Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation8 are also closely related to the piracy provisions in UNCLOS. The Hostages Convention requires states to criminalise hostage-taking, as well as attempts to commit or participate in hostagetaking, and to render these offences punishable by appropriate penalties that take into account their grave nature. Furthermore, the SUA Convention ensures criminalisation of these activities in domestic law so as to establish jurisdiction and prosecute persons committing unlawful acts against ships, such as inter alia the seizure of ships by force and acts of violence against persons on board ships.9 With a view to establishing jurisdiction over piracy, the UN Security Council (UNSC) has in particular extended a rather broad call for flag, port and coastal states, as well as states either of the nationality of victims or of the perpetrators, to co-operate in determining jurisdiction. Such states should also assist in the investigation and prosecution of all persons responsible for such acts, to ensure that all pirates—consistent with applicable international law—are handed over to the relevant judicial authorities.10 The present chapter seeks to explore and evaluate the current nature of the threat posed by contemporary maritime piracy in the context of global ‘securitization’,11 a process wherein security is construed across paradigms, including reflective theories and social constructivism alike, as an emerging common value.12 It is argued that in the twenty-first century, piracy has been transformed from a serious, yet narrowly ­ ­conceptualised, international criminal offence, into a much broader and critical menace that threatens the peace and security of the international public order.13

7  International Convention against the Taking of Hostages (adopted 17 December 1979, entered into force 3 June 1983) 1316 UNTS 205 (Hostages Convention). See eg, the preambular provisions of UNSC Res 2020 (22 November 2011) UN Doc S/RES/2020. 8 Convention for the Suppression of Unlawful Acts against the Safety of Maritime ­Navigation (adopted 10 March 1988, entered into force 1 March 1992) 1678 UNTS 221 (SUA Convention). See eg, UNSC Res 1846 (2 December 2008) UN Doc S/RES/1846 para 15. 9 RC Beckman, ‘The 1988 SUA Convention and 2005 SUA Protocol: Tools to Combat Piracy, Armed Robbery, and Maritime Terrorism’ in R Herbert-Burns, S Bateman and P Lehr (eds), Lloyd’s MIU Handbook of Maritime Security (London, Taylor Francis, 2008) 187. 10  UNSC Res 1950 (23 November 2010) UN Doc S/RES/1950 para 12. 11  See, among others, P Hough, Understanding Global Security (London, Routledge, 2004). 12  B Buzan, ‘New Patterns of Global Security in the Twenty-First Century’ (1991) 67(3) International Affairs 431. 13  Piracy was not, and is still not (as was insightfully pointed out by Cassese) punished for the sake of protecting a community value, in spite of the fact that all states are authorised to capture on the high seas and bring to trial pirates in order to safeguard their joint interest in fighting a common danger and consequent real or potential damage, A Cassese, International Criminal Law, 2nd edn (Oxford, Oxford University Press, 2008) 12.

170  Alexandros XM Ntovas Next to the threat traditionally directed towards the safety of c­ ommercial maritime routes, international navigation and personally to seafarers, piracy nowadays has evolved into a major asymmetrical economic hazard that profoundly affects the shipping and insurance industry, with subsequent adverse impacts on international trade and the global supply chain. In spatial terms, contemporary maritime piracy has revealed an alarming ability to become more sophisticated and daring in extending its threat geographically to regions beyond the immediately affected adjacent seas. Indicatively, a mere perusal of UNSC resolutions, which have been adopted in the space of four years, startlingly reveals that piracy now poses a threat that can transcend maritime zones and land regions. What initially had been determined as a threat ‘against vessels in the territorial waters of Somalia and the high seas off the coast of Somalia’,14 was later developed into a threat to ‘other States in the region’15 and soon after emerged as a threat to ‘the region of the Western Indian Ocean and adjacent sea area’.16 Moreover, in terms of economic development and domestic security and stability, the adverse ramifications of piracy have proven to be so widespread in their reach as to affect even ‘littoral countries, including their hinterland areas and landlocked countries in the region’.17 In parallel with the extensive geographical scope, contemporary maritime piracy is also being transformed into a multifarious international criminal offence that comprises diverse constitutive elements, such as financing, planning, organising and profiting from unlawful gains. In particular, the methods employed by piracy financiers, who encounter minimal control while moving and using their assets—as evidenced by the use of effective arrangements constructed to channel ransoms through existing banking and other financial networks and also through moneylaundering activities and undertakings connected to other aspects of transnational organised crime and, possibly, terrorism. International law sets the broader legal framework applicable to combating piracy in enabling the development of complex and interfacing responses in relation to the duty of states to co-operate for its suppression. Yet, law enforcement at sea will not yield any lasting solution unless effective laws on the international and domestic plane, with appropriate judicial structures to uphold them, are created to address the contemporary legal nature of piracy in all of its aspects, including the underlying causes. In the meantime, it remains to be seen whether the most c­hallenging aspect in combating contemporary maritime piracy emanates from the act 14 

UNSC Res 1816 (2 June 2008) UN Doc S/RES/1816 Recital 12 in the preamble. UNSC Res 1918 (27 April 2010) UN Doc S/RES/1918 Recital 2 in the preamble. 16  UNSC Res 2020 (n 7) Recital 2 in the preamble. 17  UNSC Res 2039 (29 February 2012) S/RES/2039 Recital 3 in the preamble. 15 

Maritime Piracy as International Threat 171 itself at sea, or from the fact of having stimulated criminal networks and a peripheral transactional industry, which are rooted in societies and economies far away from the theatre of piracy.18 II.  THE CURRENT GEOGRAPHY

The first decade of the twenty-first century witnessed a sharp rise in pirate attacks on ships off the coast of Somalia, with the statistics on reported incidents marking 2011 as the annus horribilis for the international community regarding piracy at sea. It was the year that the world experienced a sudden and unprecedented spread in piratical incidents in the Gulf of Aden and the wider region. 2012 was a rather encouraging year, having signalled a reduction in successful incidents off the coast of Somalia, which was further confirmed during 2014, when piratical activity worldwide reached its lowest levels in seven years.19 This is because piratical activity was less pronounced than in the past and the number of successful attacks had been further reduced.20 The joint efforts made by the international community in consultation with, and active participation of, the shipping industry to counter piracy, in particular off the coast of Somalia, have led to a set of comprehensive measures and initiatives, that, after many years of maritime insecurity, may allow for a more certain future. The mobilisation, and continuous presence in affected regions, of naval forces through operations aimed at protecting merchant ships and disrupting piratical attempts, has been a key aspect in international and regional co-operation. This co-operation has increased and operationally it has extended ashore in respect of the gathering of intelligence and sharing of information. In parallel, the improved implementation of the International Maritime Organization

18  For instance, according to experts on the activities undertaken by transnational crime syndicates, the management of ransom negotiations and pay-outs in Somalia indicated that ‘money goes as far as Canada and capitals in Europe’, as quoted in MO Hassan and E ­Kennedy ‘Somali Piracy Backed by International Network’ NBC News (10 December 2008) www.nbcnews.com/id/28158455/ns/world_news-africa/t/somali-piracy-backedinternational-network/#.VgkB2Ua8oYs. See also MN Murphy, ‘Twenty-first-century HighSeas Piracy off Somalia’ in BA Elleman (ed), Commerce Raiding: Historical Case Studies, 17552009: Economic Warfare, Maritime Security, and Military Escalation (Paine, US Naval War College Press, 2014) 253ff. 19  Piracy and Armed Robbery against Ships, Report for the period 1 January–31 December 2014 (London, IMB, January 2015) available upon request from the ICC International Maritime Bureau. 20  International Chamber of Commerce (ICC), ‘Lowest First Quarter Figures since 2007 but no Room for Complacency, Reports IMB’ (24 April 2014) icc-ccs.org.

172  Alexandros XM Ntovas (IMO) guidelines21 and the widespread adoption of industry-developed Best Management Practices (BMP) for self-protection and situational awareness measures22—including the deployment by some flag-states of vessel protection military detachments on board, or privately contracted armed security guards—have also been instrumental in deterring pirate attacks. Finally, the development of a substantive legal framework and judicial network for the prosecution of suspected pirates and the imprisonment of those convicted, coupled with several initiatives within a broader statebuilding process, have started to gradually address its underlying causes. Meanwhile, and despite the decreasing figures in East Africa, the threat of piracy has grown in a slower but more violent way, and at an alarmingly pace, on the opposite side of the continent, in the region of West Africa. In 2013 Nigerian-based attacks stood at their highest level since 200823 and of the 67 reported piracy incidents that the Oceans beyond Piracy report logged in 2014, only 42 per cent occurred in territorial waters. This is a noticeable trend showing incidents expanding beyond 12 nautical miles, where historically up to 80 per cent of piracy attacks occurred within territorial waters.24 The number of attacks in the South China Sea, the Indian Ocean, South America and the Caribbean continues to vary seasonally, but overall remains at traditional levels.25 For instance, the latest available figures in 2015 reveal that a total of 134 incidents of piracy and armed robbery against ships were reported to the IMB Piracy Reporting Centre in the first six months of 2015—an increase on the 116 reports for the corresponding

21 The IMO has been relentlessly addressing the issue of piracy through numerous r­ esolutions and recommendations containing guidance to governments, ship-owners, shipoperators, shipmasters and crews on preventing and suppressing acts of piracy and armed robbery against ships; see in particular IMO, ‘Measures to Prevent Acts of Piracy and Armed Robbery against Ships’ (17 November 1983) A.545(13); IMO, ‘Prevention and Suppression of Acts of Piracy and Armed Robbery against Ships’ (6 November 1991) A.683(17); IMO, ‘Measures to Prevent and Suppress Piracy and Armed Robbery against Ships’ (4 November 1993) A.738(18). 22  This is a set of guidelines, developed by various industry bodies together with navy officials aiming to assist commercial vessels transiting the dangerous waters in the Gulf of Aden and off the east coast of Somalia to avoid, deter or delay piracy attacks; BMPs are regularly updated in light of new incidents that indicate the need for adjustment in response to the methods employed by pirates, International Maritime Bureau of the International Chamber of Commerce (IMB), ‘BMP4: Best Management Practices for Protection against Somalia Based Piracy’ (Edinburgh, Witherby Publishing Group, 2011) icc-ccs.org/images/stories/ pdfs/bmp4.pdf. 23  See, ICC—Commercial Crime Services, ‘IMB Piracy Report Highlights Violence in West Africa’ (ICC,18 July 2013); ICC—Commercial Crime Services, ‘IMB Warns of West Africa Piracy Threat’ (ICC, 7 March 2014) icc-ccs.org. 24  The State of Maritime Piracy 2014, Annual Report (Colorado, Oceans Beyond Piracy/One Earth Future Foundation, 2015) 39. 25  ICC—Commercial Crime Services, icc-ccs.org.

Maritime Piracy as International Threat 173 period in 2014. However, this increase is attributed mostly to the rise in small coastal tanker hijackings in Southeast Asia26 and is likely to follow a decreasing trend in the second half of 2015.27 III.  AN ASYMMETRICAL THREAT

Piracy traditionally poses a serious security threat to the use of commercial maritime routes and safety of international navigation in general for slow-moving cargo carriers and tankers, which serve more than 90 per cent of global trade. Particularly in the region of the Gulf of Aden, piracy has posed an exceptional threat due to the strategic importance of the navigational routes along the coast of Somalia for regional and global seaborne trade—indicatively 20 per cent of global trade by volume passes through the Gulf of Aden. In terms of human cost, since the first known hijacking in April 2005 until April 2013 as many as 3,741 crewmembers of 125 different nationalities had been captured by pirates based in ­Somalia alone.28 Where vessels have been successfully hijacked, the life of the crew was put at high risk owing to physical and psychological abuse, or because of health problems resulting from limited access to food, water and medical support, especially in cases where hostages were held for prolonged periods.In the case of the rescued MV Iceberg-1, a vessel that had been abandoned by the ship-owner subsequent to capture, this was three years, but it was even longer in the cases of the MV Asphalt Venture and MVPrantalay-12. The grave concern of the UNSC has repeatedly been expressed in view of the increased level of violence reported during and throughout piratical incidents, the growing practice of hostage-taking, the inhuman conditions that hostages faced in captivity and also recognising the adverse impact on their families.29 Given the long-term psychological effects of piracy on ­seafarers and their families, its human impact will continue even if no additional hostages are taken. In addition to the abuses suffered by seafarers, families are now the targets of harassment by pirates and ­secondary victimisation by exploitative lawyers or criminals, while a

26 ICC, ‘Maritime Piracy Report Reveals Continued SE Asian Attacks against Small ­Tankers’ (ICC, 22 July 2014) icc-ccs.org. 27  Situation of Piracy and Armed Robbery Against Ships in Asia in July 2015 (Singapore, Information Sharing Centre—Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia, July 2015). 28  The Pirates of Somalia; Ending the Threat, Rebuilding a Nation (Washington DC, The World Bank, 2013). 29  UNSC Res 1976 (11 April 2011) UN Doc S/RES/1976, UNSC Res 2020 (n 7) and UNSC Res 2125 (18 November 2013) UN Doc S/RES/2125.

174  Alexandros XM Ntovas f­ urther challenge is created by perceived gaps in the awareness and benefit programmes available to reduce risks to seafarers.30 Moreover, disturbing evidence has revealed the recruitment of children by piracy networks, especially off the coast of Somalia.31 Next to the threat traditionally directed towards the safety of commercial maritime routes, international navigation and the devastating human impact, piracy nowadays has also evolved into a major asymmetrical economic hazard. It has profoundly affected the shipping and insurance industry, with subsequent adverse impact on international trade by raising the cost of transporting goods and endangering the continuity of supply chains as security across the maritime trading systems is a critical part of the current global environment.32 Precautionary measures, such as re-routing vessels in order to avoid high-risk areas, or transiting at higher speeds, are costly. Indicatively, it has been estimated that rerouting a single tanker from Saudi Arabia to the United States around the Cape of Good Hope, in order to avoid passing through the Gulf of Aden, adds approximately 2,700 miles to each voyage and about $3.5 million in annual fuel costs.33 For vessels traversing high-risk areas, it has been evidenced that they cannot be successfully hijacked when traveling at 18 knots or faster, yet fuel consumption significantly increases at this speed, at an annual cost for containerships of up to $2.7 billion. In addition, higher labour charges will apply while transiting high-risk areas for those wishing not to exercise the right to refuse to sail and to return to their country of origin at no cost. Seafarers are entitled to a bonus of 100 per cent of their base wage for the duration of time they are in such an area, captivity pay in the event they are taken hostage, and doubled compensation for death and ­disability.34 Moreover, piracy has radically changed the insurance landscape, as in some instances ship-owners and/or ship-operators became insolvent due to not being able to charter vessels that are held by pirates for long periods of time. Released vessels may have been substantially damaged from their time in captivity or even wrecked, as in the case of the MV Albedo that sank on 6 July 2013 after being held by Somali pirates since November 2010.

30  K Hurlburt, The Human Cost of Maritime Piracy (Colorado, Oceans Beyond Piracy, 2013) 2–31. 31  UNSC Res 1950 (n 10). 32  P Barnes and R Oloruntoba, ‘Assurance of Security in Maritime Supply Chains: Conceptual Issues of Vulnerability and Crisis Management’ (2005) 11(4) Journal of International Management 538. 33  United States Maritime Administration, ‘Economic Impact of Piracy in the Gulf of Aden on Global Trade’, (November 2008) marad.dot.gov. 34  See, J Bellish, The Economic Cost of Somali Piracy (Colorado, Oceans Beyond Piracy, 2011) 20–22, and M Walje, The State of Maritime Piracy 2014 (Colorado, Oceans Beyond Piracy, 2014) 14.

Maritime Piracy as International Threat 175 Significantly higher insurance premiums, such as ‘Kidnap and Ransom’ and/or ‘War Risk’, will therefore apply.35 A further economic burden in response to the increasing numbers of piratical incidents globally is the need to have recourse to Privately Contracted Armed Security Personnel (PCASP) on board for the protection of their vessels, after an ill-fated proposal by the International Chamber of Shipping (ICS) for the establishment of a UN force of armed military guards that could be deployed in small numbers on board merchant vessels as part of effective counter-piracy measures in the area.36 For shipoperators, a $75,000 outlay on private security is worth paying to avoid lengthy hijackings and delays. This is an arrangement also favoured by marine insurers and charterers. Eventually, this cost nonetheless is generally passed on to clients and then ultimately to consumers.37 The Security Council has encouraged the implementation of selfprotection­measures such as avoidance, evasion and defensive techniques by vessels, and the establishment by the IMO through a consultative process of a legal basis for the use, exclusively in high-risk areas, of PCASP on board.38 These have proved largely successful in preventing pirates from boarding vessels and enabling rescues by naval forces from seized vessels.39 Nevertheless, the use of PCASP has given rise to vitally important and interrelated questions concerning their proper handling under national policies and their personal accountability in connection with flagstates’ responsibility to ensure the rules on the use of force are consistent with international humanitarian law and international human rights.40 The international legal framework in place at the moment is based on UNCLOS Article 94 that requires all states to exercise jurisdiction and control in administrative, technical and social matters over ships flying their flag; in effect, however, this subjects the use of PCASP on board to the discretion and control of each flag-state in accordance with its national legislation. Port and coastal states’ laws may also apply to such vessels in waters under the respective jurisdictions as the presence of ­ammunition, 35 See further P Sooksripaisarnkit, ‘Piracy and The Global Insurance Industry’ in CH Norchi and G Proutiere-Moulion (eds), Piracy in Comparative Perspective: Problems, Strategies, Law (Portland, Hart Publishing, 2012) 275. 36  International Chamber of Shipping, ‘Letter dated 11 August 2001 from the C ­ hairmen of International Chamber of Shipping, INTERCARGO, INTERTANKO and BIMCO addressed to the Secretary-General of the United Nations’ (11 August 2011) bimco.org/~/ media/About/Press/2011/Letter_to_Ban_Ki-Moon_-_Piracy.ashx. 37  H Healy, ‘How the War on Piracy became Big Business’ New Internationalist (September 2013) newint.org/features/2013/09/01/pirates-keynote. 38  UNSC Res 2125 (n 29) para 26. 39 IMO, ‘Piracy and Lives Lost—IMO Secretary-General Sets Ambitious Targets’ IMO News (2013 Issue 1) 9. 40 J Kraska, ‘International and Comparative Regulation of Private Maritime Security Companies Employed in Counter-piracy’ in D Guilfoyle (ed), Modern Piracy (Cheltenham, Edward Elgar Publishing, 2013).

176  Alexandros XM Ntovas weapons and security-related equipment on board raises a number of ­reasonable concerns related to the embarkation, disembarkation and carriage of such armed personnel.41 From the ongoing negotiations conducted in the Maritime Safety Committee of the IMO transpires a catholic cautiousness, especially at high-level panels, over the employment of PCASP in considering them a measure to be used only in exceptional circumstances on vessels transiting high-risk areas, based on a thorough risk assessment and following consultations with the ship-owners.42 The IMO, with the contribution of the International Organization for Standardization (ISO) in this regard, has developed since 2011 a set of international minimum standards for the training and certification for Private Maritime Security Companies when providing shipboard deployment of PCASP in high-risk areas. These standards include among other guidance on matters regarding risk assessment, selection criteria, insurance cover, the exercise of command and control at all times when on board, and establishing, in particular, rules for the use of force as agreed between the ship-owner, the private maritime security company and the master of the vessel.43 It should be noted, however, that these guidelines are not intended to endorse or institutionalise the use of PCASP, and do not address all the

41  See further in A Petrig, ‘The Use of Force and Firearms by Private Maritime Security Companies against Suspected Pirates’ (2013) 62(3) International and Comparative Law Quarterly 667. 42  High-risk areas are set and defined, taking into account actual incidents of piracy, by the insurance and maritime industry, see BMP4 (n 22) Section 2, 4. 43 ‘On interim guidance to private maritime security companies providing contracted armed security personnel on board ships in the High Risk Area’ IMO (Maritime Safety Committee), ‘Interim Guidance to Private Maritime Security Companies Providing Privately Contracted Armed Security Personnel on Board Ships in the High Risk Area’ (25 May 2012) MSC.1/Circ.1443; revised by IMO (Maritime Safety Committee), ‘Revised Interim Guidance to Shipowners, Ship Operators and Shipmasters on the Use of Privately Contracted Armed Security Personnel on Board Ships in the High Risk Area’ (25 May 2012) MSC.1/ Circ.1405/Rev.2 to take into account consequential amendments arising from further developments. The guidelines should be read in conjunction with ISO, ‘Ships and Marine Technology—Guidelines for Private Maritime Security Companies (PMSC) Providing ­ ­Privately Contracted Armed Security Personnel (PCASP) on Board Ships (and Pro Forma Contract)’ (15 December 2012) ISO/PAS 28007:2012, which was lastly revised—as of the time of writing—in April 2015 in the form of BS ISO/PAS 28007:2015 version. This contains essential information for private maritime security companies and for ships selecting service providers; addresses security management system elements, such as resilience, planning, resources, training and awareness, communication and documentation. It outlines operational requirements for dealing with issues, such as scene and casualty management, incident reporting and investigation, health and safety and customer complaints; and further includes recommendations for performance evaluation, such as monitoring, audits, management and continual improvement. Implementation will help security companies demonstrate their ability to provide privately contracted armed personnel on board ships. See www.iso.org/iso/home.html. At the moment, the International Chamber of Shipping, in co-operation with the Security Association for the Maritime Industry, continues to work on the elaboration of rules on the use force by PCASP.

Maritime Piracy as International Threat 177 legal issues that might be associated with their use on board vessels.44 Recently, the IMO—in view of the proliferation of piratical attacks in the area—called upon flag-states whose ships are operating in the region of West Africa to implement the newly developed ‘Interim Guidelines for Owners, Operators and Masters for Protection against Piracy and Armed Robbery in the Gulf of Guinea Region’, developed by the ICS, the Baltic and International Maritime Council (BIMCO), the International Association of Independent Tanker Owners (INTERTANKO) and the International Association of Dry Cargo Shipowners (INTERCARGO) and supported by the North Atlantic Treaty Organisation (NATO) Shipping Centre.45 Finally, the payment of ransoms for the release of the vessel, cargo and crew payment—constituting essentially an element of the ship-operator’s­ duty of care—remains the greatest and, in policy terms on both the international and domestic plane,46 the most controversial aspect in the economics of piracy. According to confirmed figures recently becoming available, Somali pirates have reportedly collected between $339 million and $413 million in ransoms between April 2005 and December 2012; a figure that does not include the cost of ransom delivery, the negotiators’ fees, or the cost of consultants and attorneys.47 However, despite the general decrease in pirate attacks, when pirates do succeed in hijacking a vessel, the demanded ransom may rise to unprecedented levels; for instance, the ransoms paid for the release of MT Smyrni at the beginning of 2013 are reported to have totalled US$13 million. The overall cost of piracy to states and societies has been heavy to date. In one of the most detailed assessments of the international and regional costs of Somali piracy, the World Bank evaluates that piracy cost the global economy an estimated yearly loss to the world economy in excess of $18 billion in increased trade costs, an amount that dwarfs the estimated US$53 million average annual ransom paid since 2005.48 In the wake of the robust response by the international community to the situation in Somalia and the broader region of the Gulf of Aden, the cost to the global 44 As stated in IMO, MSC.1/Circ.1443 (n 43), the guidelines do not represent any fundamental change of policy by the IMO in this regard. If a flag-state decides to permit this practice, it is up to that state to determine the conditions under which authorisation will be granted. 45  IMO, ‘Interim Guidelines for Owners, Operators and Masters for Protection against Piracy in the Gulf of Guinea Region’ (15 August 2013) Circular letter No 3394—the decision for this was taken by the Maritime Safety Committee, at its 92nd session (12–21 June 2013), recognising the gravity of the issue of piracy and armed robbery against ships in the Gulf of Guinea and the extreme violence exhibited. The interim guidelines for the Gulf of Guinea should be read in conjunction with BMP4 (n 22). 46  A Anyimadu, Coordinating an International Approach to the Payment of Ransoms: Policy Options for Reducing Ransom Payments (London, Chatham House, 2012). 47  See Bellish (n 34) and Walje (n 34). 48  World Bank, Pirate Trails: Tracking the Illicit Financial Flows from Pirate Activities off the Horn of Africa (Washington DC, World Bank, 2013).

178  Alexandros XM Ntovas economy fell by almost half in 2013, with the Oceans beyond Piracy 2014 report putting the total cost of Somali piracy—by far the largest single threat to international shipping in recent years—at only US$3.2 billion in 2013.49 Nonetheless, piracy in West Africa and Southeast Asia has been on the rise since 2014,50 and according to other international market-based reports across the ‘pirate value chain’, carried out by specialists in economic intelligence, estimate that the overall cost to the international community may likely increase to a much higher figure by 2015, given the rebound on maritime trade volume, the geographical expansion of piracy incidents and the use already of more sophisticated tactics.51 IV.  PIRACY’S EXPANDABLE REACH

In spatial terms, contemporary maritime piracy has revealed an alarming ability to become more sophisticated and daring in extending its threat to regions beyond the immediately affected adjacent seas. In fact, a mere perusal of UNSC resolutions adopted over a five-year timespan (2008–2013) reveals that modern piracy poses a threat that is capable of transcending maritime zones and even diffused into immediate and more distant from the shore land regions. More specifically, the very first time that piracy was invoked within the context of a Resolution addressing an international threat is that of 1816 (2008) where the Security Council, following up a report by the IMO,52 determined that [t]he incidents of piracy and armed robbery against vessels in the territorial waters of Somalia and the high seas off its coast exacerbated the situation in Somalia which continued to constitute a threat to international peace and security in the region.53

The concern at the time was not limited to the safety of commercial maritime routes and international navigation, but also reflected the negative impact of piratical activities on the prompt, safe and effective delivery of humanitarian aid to Somalia through vessels in the maritime convoys operated by the World Food Program (WFP), upon which as many as three-and-a-half million Somalis were dependent for food aid and other humanitarian assistance. By then it had already been established that the upsurge of piracy in the territorial waters of Somalia and the high seas 49  The State of Maritime Piracy 2013, Annual Report (Colorado, Oceans Beyond Piracy/One Earth Future Foundation, 2014). 50  The State of Maritime Piracy 2014 (n 24). 51 ‘The Economics of Piracy; Pirate Ransoms & Livelihoods off the Coast of Somalia’ Geopolicity (Dubai, May 2011). 52  IMO, ‘On Piracy and Armed Robbery against Ships in Waters off the Coast of Somalia’ (23 November 2005) A.979(24). 53  UNSC Res 1816 (n 14) Recital 12 in the preamble.

Maritime Piracy as International Threat 179 off its coast was the outcome of the continuing civil conflict and political instability in the interior of the country.54 In turn, these circumstances were at the same time also the root cause of the problem, as the limited livelihood opportunities in the country, together with the onshore rule of law and governance vacuum, allowed piracy to arise.55 In particular, the Monitoring Group on Somalia, in its report of 27 June 2007, confirmed, inter alia, that piracy off the coast of Somalia, unlike in other parts of the world, is caused by a lack of lawful administration and the inability of the authorities to take affirmative action against the perpetrators, which allows the ‘pirate command centres’ to operate without hindrance at many points along the coast of Somalia, using its coastline as a safe haven from which to launch their operations.56 Moreover, the inadequate enforcement of the arms embargo imposed on Somalia in relation to the ongoing conflict and deteriorating humanitarian situation permitted ready access to the arms and ammunition used by the pirates, driving the phenomenal growth in piracy.57 ­Following 54  There were also concerns that environmental arguments may have been used by pirates to justify their criminal activities in the international media. In the face of such allegations, the UNSC reaffirmed Somalia’s rights in respect to offshore natural resources, including fisheries, in accordance with international law and requested the Secretary-General to report on the protection of Somali natural resources and waters—particularly on illegal fishing and illegal dumping, including of toxic substances; see, UNSC Res 1950 (n 10) para 6 and UNSC Res 1976 (n 29) para 7. However, subsequent reports by the UN Secretary-General (UNSG) found little evidence to justify claims that illegal fishing and dumping are factors responsible for forcing Somali youths to resort to piracy and moreover that there was no evidence of toxic waste dumping on land and at sea; see UNSG Reports 661 (2011) and 783 (2012). This position has been recently revised, as the Security Council—following the ‘Report of the Secretary-General on the Situation with Respect to Piracy and Armed Robbery at Sea off the Coast of Somalia’ (2015) UN Doc S/2015/776, see paras 6, 22, 56 and 58—expressed serious concerns regarding illegal fishing in Somalia’s EEZ and noted the complex relationship between such practice and piracy; see, UNSC Res 2244 (23 October 2015) UN Doc S/RES/2244 Recital 24 in the preamble, and UNSC Res 2246 (10 November 2015) UN Doc S/RES/2246 Recital 9 in the preamble. 55  UNGA, ‘Report of the Secretary-General on the Situation with Respect to Piracy and Armed Robbery at Sea off the Coast of Somalia’ (2013) UN Doc S/2013/623. 56  ‘Report of the Monitoring Group on Somalia Pursuant to Security Council Resolution 1724 (2006)’, paras 89–91 and 118–19, in UNSC, ‘Letter Dated 17 July 2007 from the Chairman of the Security Council Committee Established Pursuant to Resolution 751 (1992) Concerning Somalia Addressed to the Presidentof the Security Council’ (17 July 2007) UN Doc S/2007/436. 57 UNSC Res 1851 (16 December 2008) UN Doc S/RES/1851 para 9. The Somalian embargo has been imposed since 1992 by means of UNSC Res 733 (23 January 1992) UN Doc S/RES/733, which established an embargo on the delivery of all weapons and military equipment. It has been subsequently revised, more importantly by UNSC Res 1725 (6 December 2006) UN Doc S/RES/1725 and UNSC Res 1744 (21 February 2007) S/RES/1744 in order to allow weapons and military equipment intended solely for the purpose of developing the Somali security sector institutions. In December 2009 the UNSC also imposed an arms embargo on Eritrea, partly in response to reports that it had violated the arms embargo on Somalia. It must be pointed out that the overall arms embargo on Somalia has been recently reaffirmed by UNSC Res 2244 (23 October 2015) UN Doc S/RES 2244, which extended the provisions relating to arms supplies to the Somali Federal government until 15 November 2016.

180  Alexandros XM Ntovas UNSC authorisation, the Monitoring Group on Somalia launched an investigation58 from which it was established that proceeds coming from the payment of piracy ransoms were being used to finance violations of the embargo on all delivery of weapons and military equipment to Somalia. Further, weaknesses caused by the crisis situation in Somalia, are the lack of capacity of the Transitional Federal Institutions to interdict, or upon interdiction, to prosecute pirates; and to patrol and secure either the international sea lanes off the coast of Somalia or Somalia’s territorial waters.59 In view of the situation, and having thus deemed piracy in this frame of reference, the UNSC, acting under Chapter VII of the Charter of the United Nations and with the co-operation and advanced consent of the Transitional Federal Government, authorised states to enter the territorial waters of Somalia for the purpose of repressing acts of piracy and armed robbery,60 and make use therein in a manner consistent with the relevant international law of ‘all necessary means’.61 Within a year of the UNSC being seized of the matter, the dramatic proliferation of incidents demonstrated that piracy was not only an ongoing threat in the territorial waters and the waters off the coast of Somalia but it had been extended into the Arabian Sea and western Indian Ocean.62 According to the International Maritime Bureau of the International

58 The Monitoring Group on Somalia was established by means of UNSC Res 1519 (16 December 2003) S/RES/1519 with its mandate to be renewed and expanded through a stream of resolutions including UNSC Res 1558 (17 August 2004) UN Doc S/RES/1558; UNSC Res 1587 (15 March 2005) UN Doc S/RES/1587; UNSC Res 1630 (14 October 2005) UN Doc S/RES 1630; UNSC Res 1676 (10 May 2006) UN Doc S/RES/1676; UNSC Res 1724 (29 November 2006) UN Doc 1724; and UNSC Res 1766 (23 July 2007) UN Doc 1766. 59  ‘Report of the Monitoring Group on Somalia Pursuant to Security Council Resolution 1811 (2008)’, para 266, in UNSC, ‘Letter Dated 10 December 2008 from the Chairman of the Security Council Committee Established Pursuant to Resolution 751 (1992) Concerning Somalia addressed to the President of the Security’ (10 December 2008) UN Doc S/2008/769. 60  The reference to armed robbery should be noted as the latter has been distinguished from acts of piracy above, that Somalia formally has been claiming a territorial sea extending 200 nautical miles from its coast since 1972. This issue became particularly controversial after the adoption of UNCLOS, which only allows for territorial waters up to 12 nautical miles, and Somalia’s ratification on 24 July 1989, which was made without any declarations or reservations. On 6 September 2011, the ‘Roadmap to End the Transition’ called on Somalia, among others, to declare an exclusive economic zone (EEZ) and establish internationally recognised Somali waters in accordance with UNCLOS, a requirement that was later also stressed by the SC in UNSC Res 2077 (21 November 2012) UN Doc S/RES/2077 para 4, with a view to enabling an effective counter-piracy legislation and clarifying the legal basis for the protection of its sovereign rights with respect to natural resources and its jurisdiction over the marine environment. 61  UNSC Res 1816 (n 14) para 7. Hence the consent has been provided in the form of letters from the Permanent Representative of Somalia to the United Nations on the basis of which the UNSC, by means of subsequent resolutions, renews the provisions of UNSC Res 1816 (n 14) relating to counter piracy operations undertaken by other states and regional organisations in Somalian waters. 62  See, UNSC Res 1851 (n 57), UNSC Res 1897 (30 November 2009) UN Doc S/RES/1897 and UNSC Res 1918 (n 15).

Maritime Piracy as International Threat 181 Chamber of Commerce (IMB), pirates equipped with heavier weaponry had become more violent and were using hijacked ocean-going vessels as mother ships to carry out sophisticated—in organisation and method— attacks.63 This enabled them to expand the geographical range of their activities, as notably evidenced by the hijacking of the M/V Sirius Star some 500 nautical miles off the coast of Kenya and other subsequent unsuccessful attempts east of Tanzania. At that time Somali pirates could operate across 2.5 million square nautical miles of ocean; a size equivalent to that of the continental US, as stated by the US Bureau of PoliticalMilitary Affairs. In view of this situation the UNSC expressed its grave concern in noting that states in the region and other states beyond the immediate region were affected by the threat of piracy.64 The consequent deployment of international naval forces, operating within Somali waters pursuant to relevant authorisations by UNSC resolutions, along with the implementation of preventive measures by merchant vessels, eventually resulted in a significant reduction of successful piratical attempts in the following years. That, however, did not stop other attacks from occurring or being attempted in international waters as pirates had retained their capacity to operate given the substantial ransoms already collected by their financiers. Nevertheless, the UNSC remained gravely concerned as there was evidence of the expansion of onshore criminal activities by networks involved in piracy owning to growing pressure at sea. Some of the proceeds are reportedly being reinvested into drug trafficking, weapons and alcohol smuggling, human trafficking, and kidnapping for ransom of humanitarian and other international aid foreign workers, as well as civilians.65 These piracy networks, having built significant paramilitary capacities on land, still continue to pose a threat to the stability and security of ­Somalia and have the potential to destabilise the region. The Security Council, returning to the situation in 2013, remained gravely concerned that the incidents of piracy were still an important factor exacerbating the situation in Somalia which itself continued to pose a threat to international peace and security in the region. The large amounts of illicit cash flowing from escalating ransom payments fuelled additional criminal activities onshore and corruption which contributed to ongoing ­instability and

63  IMB, ‘Piracy and Armed Robbery against Ships, Report for the Period 1 January–30 June 2011’ ICC (July 2011) available upon request at icc-ccs.org. 64  UNSC Res 2015 (24 October 2011) UN Doc S/RES/2015 and UNSC Res 2020 (n 7). 65  While it is unclear if maritime piracy for ransom could be considered a subset of the much broader kidnapping for ransom phenomenon, there is a money laundering and proceeds of crime component to each, see further in Financial Action Task Force, Organised Maritime Piracy and Related Kidnapping for Ransom (Paris, Organisation for Economic Co-operation and Development, 2011).

182  Alexandros XM Ntovas lawlessness in the country and undermined the establishment of effective governance.66 Contemporary maritime piracy has also proved to pose a major threat to international peace in terms of economic development and domestic security and stability for states which enjoy much more stable political and social conditions in comparison to Somalia, as demonstrated through its recent rise in the West Africa sub-region. However, piracy, particularly in the Gulf of Guinea, a sub-region stretching from Guinea in the northwestern part of the African continent to Angola in the south-central part, is not a recent phenomenon. Since the late 1990s, this region has been facing piratical attacks targeting the cargo of tankers, particularly oil shipments and generally during ship-to-ship bunkering operations with a view to stealing oil cargo.67 The level of personal physical violence against seafarers has often been greater, and more brutal. More recently, however, there have been more cases of seafarers being taken hostage for ransom and held in captivity for long periods in often appalling conditions.68 However, since 2010, incidents of piracy in the area have risen significantly meaning that the region had the second most acute piracy problem on the African continent, with oil-producing countries such as Gabon, Angola and Nigeria frequently targeted for their high value petroleum assets. Nigeria has frequently stressed the devastating effect of piracy on maritime navigation and on the economies of the countries in the region, and underlined that the fight against piracy is a collective responsibility, due to lack of states’ capacity in the region to tackle maritime insecurity alone, with many pirate attacks occurring beyond national territorial waters and reaching into the exclusive economic zones.This is highlighted by the hijacking of MT Kerala in January 2014; a crude tanker that was captured in Angolan waters by pirates who disabled its identifications system and communication equipment and painted over its identifying markers, only to be released eight days later off the coast of Nigeria after offloading almost 13,000 tons of its diesel cargo to other ships.69 Following an open debate in the Security Council on ‘Peace and Security in Africa: Piracy in the Gulf of Guinea’ in 2011, the Council adopted its first ever resolution on the issue of piracy in the Gulf of Guinea, expressing its deep concern about the threat posed by piracy and armed robbery to international navigation, and in particular its damaging impact on 66 

UNSC Res 2125 (n 29). MN Murphy, ‘Petro-Piracy: Predation and Counter-Predation in Nigerian Waters’ in D Guilfoyle (ed), Modern Piracy (Cheltenham, Edward Elgar Publishing, 2013) 61–90. 68  International Chamber of Shipping, Annual Review (London, 2013) 19. 69 ‘MT Kerala Hijack—Game Changer or Inside Job?’ Dryad Maritime (12 May 2014) www.dryadmaritime.com/mt-kerala-hijack-game-changer-or-inside-job/. See also ICC, ‘IMB Warns of West Africa Piracy Threat’ ICC News (07 March 2014) icc-ccs.org/ news/911-imb-warns-of-west-africa-piracy-threat. 67  See

Maritime Piracy as International Threat 183 security, trade and economic activities in the sub-region.70 The ensuing robust counter-piracy operations led by Nigeria resulted in the displacement of pirates to the waters of neighbouring vulnerable countries,such as Benin.71 Although the international community had been more prepared to address the ongoing situation in the Gulf of Guinea, drawing on the processes already developing in relation to Somalia and western Indian Ocean, the Security Council, four months after its first resolution on the matter, revisited the situation in expressing further concerns about the adverse ramifications of piracy. These were so widespread in their reach as to affect even ‘littoral countries, including their hinterland areas and landlocked countries in the region’.72 More specifically, Benin—a state heavily reliant on national revenues from port services and transit fees—was severely affected by the continuation of piratical attacks carried out by displaced pirates in its waters during 2011 and 2012. For instance, due to the escalation in pirate attacks off its coast, the country has been added to the list of high-risk shipping areas by the London marine insurance group of ‘Joint War Committee’,73 leading to increased insurance rates for vessels operating in its waters and hence resulting in a dramatic decline in the number of ships entering the port of Cotonou. The consequential decrease in national revenue affected the ability of the state to function in the short term, and hampered its efforts to consolidate democratic governance, implement socio-economic development programmes, institute reforms and attract foreign investment for the exploration and exploitation of Benin’s offshore oil and gas reserves.74 Moreover, Benin’s trade and economic activities with landlocked states in the Sahel region, such as Burkina Faso, Mali and Niger, which depend on Cotonou’s transit port services, have also been affected. Likewise, the economic activities of these states have been disrupted. Finally, next to the economic impact of piracy on the West African sub-region, at the time reaching an annual loss of $2 billion,75 more alarming concerns have been voiced over possible political motivations for some of the pirate attacks

70 

UNSC Res 2018 (31 October 2011) UN Doc S/RES/2018. of the United Nations Assessment Mission on Piracy in the Gulf of Guinea (7 to 24 November 2011)’ in UNSC, ‘Letter Dated 18 January 2012 from the Secretary-General Addressed to the President of the Security Council’ (19 January 2012) UN Doc S/2012/45 (Gulf of Guinea Piracy Report 2011). 72  UNSC Res 2039 (n 17). 73  The Joint War Committee comprises underwriting representatives from both the Lloyd’s and International Underwriting Association company markets, representing the interests of those who write marine hull war business in the London market. The current Hull War, Piracy, Terrorism and Related Perils Listed Areas are detailed in JWLA021; see lmalloyds. com/Web/market_places/marine/JWC/Joint_War.aspx. 74  Gulf of Guinea Piracy Report 2011 (n 71) para 12. 75  Ibid paras 32–35. 71 ‘Report

184  Alexandros XM Ntovas that may be seeking to use piracy as a weapon to affect political developments in specific regional states.76 V.  A MULTIFARIOUS INTERNATIONAL CRIMINAL OFFENCE

In parallel with the extensive geographical scope, contemporary maritime piracy has evolved over time into a rather multifarious international criminal offence, which makes it capable of projecting its threat onto the land domain of states adjacent to the affected maritime regions, as well as other states beyond it. Piracy in the region has increased to such an extent that it is now considered to be a form of transnational organised crime,77 complete with established procedures, a successful business model, and well-organised and well-funded backing.78 Under international law the definition of piracy explicitly covers any act of inciting or intentionally facilitating such attacks, and thus covers material acts beyond those strictly concerning the objective conduct of piracy at sea. Consequently, land-based activities concerning financing, planning, organising attacks at sea, or unlawfully profiting from its proceeds must be considered as falling within the meaning of acts inciting and intentionally facilitating piracy.79 It is beyond any doubt that Somalia-based piracy, in particular, has been fundamentally transformed into a major criminal enterprise driven primarily by the opportunity for financial gain and the quest for illicit profit.80 As in the case of any other criminal activity, it demonstrates transnational aspects in activities with regard to organising, financing and facilitating the attacks, as well as in channelling and investing proceeds from ransom payments into criminal activities that are not limited to piracy, such as drugs, weapons and alcohol smuggling, and human trafficking.81 In a report by the Monitoring Group on Somalia and Eritrea, it was pointed out that members of Somali diaspora, among others, have increasing involvement in the broader pirate business. More ­specifically,

76 

Ibid para 60. ‘international’ and ‘transnational’ crime are not used interchangeably as they are two distinctly different qualities in terms of legally characterising an activity, with the former being essentially a crime against humanity, T Obokata, Transnational Organised Crime in International Law (Oxford, Hart Publishing, 2010) 30ff. 78 United Nations Office on Drugs and Crime (UNODC), ‘Awash with Money— Organized Crime and its Financial Links to Somali Piracy’ UNODC (25 May 2011) unodc. org/unodc/en/frontpage/index.html. 79  UNSC Res 1976 (n 29) para 15. 80  UNSC Res 2077 (n 60) Preambular provisions. 81  UNODC, ‘Ransom Money Laundered by Pirates Affects Stability in the Horn of Africa, says UNODC Chief’ UNODC (22 February 2012) unodc.org/unodc/en/frontpage/index. html. 77  NB

Maritime Piracy as International Threat 185 a ­growing proportion of Somalis involved in piracy are members of the diaspora, who hold dual nationality, and facilitate the movement and investment of piracy proceeds. For example, international investigations have identified and documented several financial transfers between Somali pirates and individuals in the Somali diaspora, linked to a number of hijacking cases such as, among others, the MV Al Khaliq in 2009, MV Orna in 2010, MV Irene SL in 2011, MV Rosalio D’Amato in 2011, and MV Enrico Ievoli in 2011.82 More recently, with the general decline of piratical activities, it was also noted that a network of individuals, including known pirate leaders, was engaged in providing private security for unlicensed fishing vessels in Somali waters and was connected to weapons-smuggling and Al-Shabaab networks in north-eastern Somalia.83 While the payment of ransom may be construed as contravening public policy, it is the only way to free crew being held hostage, along the vessel and its cargo.84 This inevitably has grave implications such as the indirect international breach of the arms embargo in Somalia, as well as violation of domestic legislation against the funding of terrorism, but seemingly a middle ground has emerged in which such payments are viewed as extortions and therefore involuntary acts. In this context governments have maintained a balanced view in refraining from preventing ransom deals,85 with the London-led International Piracy Ransoms Task Force in the meantime working to develop a new strategic partnership between flag-states, the private sector and law enforcement agencies to bring together those tackling piracy and those subjected to it in a united effort to break the piracy business model.86 Given the transnational criminal character of contemporary maritime piracy, the UNSC has urged states, in co-operation with international police organisations and the United Nations Office on Drugs and Crime 82  ‘Report of the Monitoring Group on Somalia and Eritrea Pursuant to Security Council Resolution 2002 (2011)’ in UNSC, ‘Letter Dated 11 July 2012 from the Chair of the Security Council Committee Pursuant to Resolutions 751 (1992) and 1907 (2009) Concerning ­Somalia and Eritrea Addressed to the President of the Security Council’ (13 July 2012) UN Doc S/2012/544 paras 42–43 and 46. 83  ‘Report of the Monitoring Group on Somalia and Eritrea Pursuant to Security Council Resolution 2060 (2012): Somalia’ in UNSC, ‘Letter Dated 12 July 2013 from the Chair of the Security Council Committee Pursuant to Resolutions 751 (1992) and 1907 (2009) concerning Somalia and Eritrea Addressed to the President of the Security Council’ (12 July 2013) UN Doc S/2013/413 paras 42–43 and 64. 84  CM Douse, ‘Combating Risk on the High Sea: An Analysis of the Effects of Modem Piratical Acts on the Marine Insurance Industry’ (2010) 201(135) Tulane Maritime Law Journal 267. 85  R Lough, ‘Piracy Ransom Cash Ends up with Somali Militants’ Reuters (6 July 2011) uk.reuters.com; and M Wiese Bockmann, ‘Somali Pirates Battled in London as Banks Curb Dollar Supply’ Bloomberg (22 July 2012) bloomberg.com. 86 The Task Force was established after an initiative by the UK Government after the London Conference on Somalia in February 2012. See further, gov.uk/government/news/ piracy-ransoms-task-force-publishes-recommendations.

186  Alexandros XM Ntovas (UNODC), to investigate, collect and share information on international criminal networks involved in piracy off the coast of Somalia.87 In this context emphasis is placed on tracking and disrupting illicit financial flows that are linked to piracy and other forms of organised crime. A recent study by the World Bank, UNODC, and International Criminal Police Organization (INTERPOL), explaining in detail the financial cycle of piracy, is particularly informative. The largest amount of the ransom payments, that are being secretly conducted, is managed by the financiers who usually move a part of them outside the country through crossborder cash smuggling, trade-based money-laundering activities, bank wire transfer and by abusing Money of Value Transfer Services (MVTS).88 Subsequently, the greater part of the proceeds are invested into a range of sectors within Somalia for money-laundering purposes, and are also being recycled into financing criminal activities; including further piracy acts, human trafficking, migrant smuggling, drug trafficking, and investing in militias and military capacities on land in Somalia. UNODC, through its ‘Global Programme against Money-Laundering, Proceeds of Crime and the Financing of Terrorism’, and in co-operation with the Contact Group on Piracy off the Coast of Somalia (CGPCS) works towards increasing global understanding of money flows linked to piracy through information exchange, capacity-building, coordination and technical assistance in the East Africa and Horn of Africa regions. Important initiatives under development are those aiming at the prevention of illicit cross-border movement of cash, as well as the regulation of informal remittance systems, and the establishment of a code of conduct to ensure that Somali MVTS meet international standards within a national framework to counter money-laundering and the financing of terrorism. These efforts aim to establish an operational and effective relation between authorities and providers of money or value transfer services, which will facilitate the effective gathering of financial information and support investigations targeting financiers of pirates.89

87 

See eg UNSC Res 1950 (n 10) paras 16–17 and UNSC Res 1976 (n 29) para 16. Bank, Pirate Trails: Tracking the Illicit Financial Flows from Pirate Activities off the Horn of Africa (Washington DC, World Bank, 2013). In fact, only a fraction of the ransoms goes to the low-level pirates, who typically receive a standard fee per ship, amounting to as little as 1%–2.5% of an average payment, while an undefined amount is paid to the local community that provides goods and services to pirates, including food, repair services and khat, which is a legal drug in Somalia. Reportedly, financiers may retain up to 75% of the total ransom, S Rastello, ‘Pirates Hauling $400 Million Pocket 1%–2.5% Share’ Bloomberg (4 November 2013) bloomberg.com. 89  Pursuant to UNSC Res 1851 (n 57), the Contact Group on Piracy off the Coast of Somalia (CGPCS) was established on 14 January 2009 to facilitate the discussion and coordination of actions among states and organisations to suppress piracy off the coast of Somalia. This international forum has brought together more than 60 countries and international organisations, all working towards the prevention of piracy off the Somali coast. Working Group 5, 88  World

Maritime Piracy as International Threat 187 Since 2012, UNODC has also been providing technical assistance to police, financial intelligence units, customs authorities and other law enforcement agencies in Somalia and Ethiopia, Kenya, and the United Republic of Tanzania which have been identified as three of the main transit points for financial operations leaving and entering Somalia. To this end, the Maritime Piracy Task Force of INTERPOL has operationalised a global database that improves evidence collection, consolidates and exchanges information about piracy off the coast of Somalia, and further facilitates the development of actionable analysis for law enforcement. Extensive links between piracy and transnational organised crime have also been documented in West Africa. It should be noted that piracy in this region may find its root causes in high levels of youth unemployment, wide income disparities within society, the uncontrolled circulation of illicit weapons and the prevalence of corruption, but mainly thrives on the criminal activity associated with disorder surrounding the regional oil industry, the single most important industry in the entire region, with the occurrence of a booming black market for fuel as the one operating in Nigeria. For this reason, as discussed earlier, piracy attacks aim predominately at the cargo of vessels carrying petroleum products and oil that subsequently can be easily smuggled outside the region, which reveals the extent of a highly organised criminal phenomenon involving a parallel industry with a developed supply chain and growing sophistication.90 As pointed out elsewhere, the players in the illicit oil bunkering industry are diverse, with regionally recruited pirates forming syndicates that, among others, consist of corrupt governmental officials and the armed groups they sponsor, corrupt elements in the military and the oil industry, and militants.91 The geographic scope of these activities furthermore demonstrates the expansive multinational network of informants and buyers that pirates, through such syndicates, have access to.92

chaired by Italy, focuses on how to advance information sharing internationally and between industry and government authorities to disrupt the pirate enterprise ashore and works with other key partners, such as INTERPOL, national law enforcement/prosecution agencies currently pursuing piracy investigations/prosecution and the World Bank in order to better understand how illicit financial flows associated with maritime piracy are moving in the area. WG5 works with WG2 to create new opportunities for prosecutors and investigators to exchange information about, de-conflict their ongoing investigations and proactively target the top organisers, financiers and negotiators of Somali piracy for arrest and prosecution. The CGPCS established WG5 in the 9th Plenary Session to efficiently tackle this problem. 90 Royal Institute of International Affairs, ‘Maritime Security in the Gulf of Guinea— Report of the Conference held at Chatham House, London, 6 December 2012’ (Maritime Security in the Gulf of Guinea Conference, London, March 2013) 12. 91 UNODC, Transnational Organized Crime in West Africa: A Threat Assessment (Vienna, UNODC, 2013) 50. 92 J Bridger, ‘Piracy in the Gulf of Guinea: Oil Soaked Pirates’ US Naval Institute (10 March 2014) news.usni.org/2014/03/10/piracy-gulf-guinea-oil-soaked-pirates.

188  Alexandros XM Ntovas The threat of piracy through transnational criminal networks has been channelled without strain and with great efficiency in the economies of states like Benin that are Nigeria’s neighbour. Benin has become susceptible to such networks due to limited law enforcement capacity, porous borders and its location as a major import-export hub. Responding to a formal appeal for international assistance to fight piracy in the country and throughout the Gulf of Guinea,93 a UN multidisciplinary mission, assessing the scope of the threat, confirmed the occurrence of systematic and organised attacks on the cargo of oil and chemical vessels at a ­distance of over 40 nautical miles offshore. These activities have been attributed to criminal organisations from neighbouring countries following counter-piracy operations conducted by Nigeria off its coast. The complicity of Benin nationals based onshore and corrupt officials at the Port of ­Cotonou has given rise to the establishment of an underground industry that thrives on the trafficking in petroleum, and the purchase and sale of smuggled fuel.94 The Commission on Crime Prevention and Criminal Justice, under the aegis of the UN Economic and Social Council, has repeatedly included piracy off the coast of Somalia and in the Gulf of Guinea in its resolutions addressing transnational organised crime committed at sea, with a view to stressing its implications as a global problem that threatens security, stability and the rule of law, and undermines economic ­prosperity and sustainable development. In doing so, it has frequently stressed that transnational organised criminal activities at sea are diverse, and in some cases interrelated, and that criminal organisations are adaptive and take ­advantage of the vulnerabilities of states. Therefore, the strengthening of international co-operation at all levels is essential in order to prevent and control such activities. Yet, it is imperative that states, first, take appropriate measures, consistent with their domestic legislation and legal frameworks, to strengthen law enforcement, with a view to preventing, combating and eradicating transnational organised crime committed at sea, in accordance with their rights and obligations under international law.95 The discussion over plausible links existing between piracy and the financing of terrorism, in particular of regional or international Islamist terrorist organisations, is extremely fervent due to the restricted availability of information or indeed lack of conclusive evidence suggesting 93  UNGA, ‘Report of the Secretary-General on the Activities of the United Nations Office for West Africa’ (2011) UN Doc S/2011/811 para 45. 94 UNSC, ‘Letter Dated 18 January 2012 from the Secretary-General Addressed to the ­President of the Security Council’ (19 January 2012) UN Doc S/2012/45. 95  See Commission on Crime Prevention and Criminal Justice, ‘Combating the Problem of Transnational Organized Crime Committed at Sea’ (2011) 20/5 and ‘Promoting International Cooperation and Strengthening Capacity to Combat the Problem of Transnational Organized Crime Committed at Sea’ (2013) 22/6.

Maritime Piracy as International Threat 189 meaningful connections, but according to experts this would be the next step for piracy if it is allowed to expand.96 Although piracy contradicts the Sharia principles and pirates choose their alliances carefully, being fully aware of the imminent implications to follow if they establish connections with terrorists, it is feared that Somali piracy might have been supplying weapons to, or have become a source of finance for, Al Shabaab and Al Qaeda, as well as funding Islamist insurgencies across Africa like ­Hizbul Islam. Islamists are reported to tap into the cash-flows generated by piracy, and as a matter of fact were extremely interested in the military equipment carried on the Ukrainian flagged MV Faina that was released after the payment of a US$3.2 million ransom.97 In addition, a passive collusion might be inferred by the relocation of the pirates in areas controlled by AlShabaab, which suggests that there are ad hoc personal, rather than institutional, agreements guaranteeing facilitations to the pirates regarding anchorage and the development of bases, in return for a portion of their ransom money.98 Even though such associations may be nurtured by mutual convenience rather than shared ideology, the potential scope and actual extent of mutually beneficial co-operation between pirates and some members of Islamist insurgent groups is significant because it may contribute to instability in Somalia and exacerbate already established threats to global security.99 In the meantime, and while the line between maritime piracy and conventional criminality is becoming increasingly blurred in Nigeria and other states in the region,100 terrorist groups in the Islamic Maghreb—like Boko Haram, which is directly targeting Nigeria—appear aptly well-funded.101 The IMB—based solely on comparing the two business models for attacks—neither confirms nor denies the existence of any links at the level of financiers,102 but the correlation of the dynamics between the two criminal activities is a fact that may open to speculation a nervously emerging relationship with terrorism, like in Somalia,103 especially since 96 

Royal Institute of International Affairs Report (n 90) 21. Shortland and M Vothknecht, ‘Combating “Maritime Terrorism” off the Coast of Somalia’ (2011) 27 European Journal of Political Economy 133. 98 UNSC, ‘Letter Dated 24 January 2011 from the Secretary-General Addressed to the President of the Security Council (Somalia—Report of the Special Adviser to the SecretaryGeneral on Legal Issues Related to Piracy off the Coast of Somalia)’ (24 January 2011) UN Doc S/2011/30 para 24. 99  World Bank, The Pirates of Somalia: Ending the Threat, Rebuilding a Nation (Washington DC, World Bank, 2013) 73ff. 100  S Starr, ‘Maritime Piracy on the Rise in West Africa’ (2014) 7(1) Combating Terrorism Center at West Point—CTC Sentinel 23. 101  See, A Kamal-Deen, ‘The Anatomy of Gulf of Guinea Piracy’ (2015) 68(1) Naval War ­College Review 106 and also globalsecurity.org/military/world/para/boko-haram.htm. 102  S Rothwell, ‘Somali Piracy: Gone for Good?’ International Relations and Security Network (16 May 2013) isn.ethz.ch. 103 N Anyu and S Moki, ‘Africa: The Piracy Hot Spot and its Implications for Global ­Security’ (2009) 20(3) Mediterranean Quarterly 95. 97 A

190  Alexandros XM Ntovas political and security consultants know little of the group’s funding sources. In a series of recent interviews, an expert from the Modern Security Consulting Group openly stated that ‘[the organisation] has so many sources of income including in Nigeria and the whole region…it does get money from the piracy, especially from the west coast of Africa; drug trafficking helps, smuggling’.104 Although there are no verified links, Boko Haram is more than likely to be benefitting from offshore piracy,105 and this concern has been reportedly voiced by the US,106 which nevertheless has not yet imposed sanctions under the 13536 Executive Order (2010) ‘Blocking Property of Certain Persons Contributing to the Conflict in Somalia’. VI.  THE INTERNATIONAL RESPONSE

Responding to the immediate threat posed by maritime piracy to international humanitarian efforts in Africa and the safety of one of the crucial maritime routes in the world, the international community has deployed an unprecedented military presence at sea in the affected regions.107 Since December 2008, the EU has mobilised the naval forces of its Member States for Operation Atalanta following UNSC Resolutions 1814 (2008) and 1816 (2008) regarding the rising levels of piracy and armed robbery off the Horn of Africa and in the Western Indian Ocean.108 Its mandate covers the protection of WFP vessels delivering aid to displaced persons in Somalia, and the protection of African Union Mission in Somalia (­AMISOM) shipping. In addition, its forces operate as a deterrence, prevention and repression unit off the Somali coast, where they also offer protection to vulnerable shipping on a case by case basis, and also contribute to the monitoring of fishing activities off the coast of Somalia.109 In parallel and under similar counter-piracy duties, NATO has likewise launched operations Allied Protector and Ocean Shield which havesignificantly enhanced the safety of commercial maritime routes and

104 

See Modern Security Consulting Group, mosecon.com/tag/yan-st-pierre/. Haram: Coffers and Coffins; A Pandora‘s Box—the Vast Financing Options for Boko Haram’ (Beacham Publishing’s Terrorism Research & Analysis Consortium, 2015) trackingterrorism.org/article/new-financing-options-boko-haram/smuggling-and-piracy. 106  ‘US Concerned Gulf of Guinea Piracy could be Funding Boko Haram Violence’ (Pilot Africa, 27 March 2013) pilotafrica.com. 107 See further in JA Roach, ‘Countering Piracy off Somalia: International Law and ­International Institutions’ (2010) 104(3) American Journal of International Law 397; Z Keyuan, ‘­Maritime Enforcement of United Nations Security Council Resolutions: Use of Force and Coercive Measures’ (2011) 26(2) International Journal of Marine and Coastal Law 235. 108  See, UNSC Res 1814 (15 May 2008) UN Doc S/RES/1814, and UNSC Res 1816 (n 14). 109  Further on the role of EUNAVFOR, see eunavfor.eu/. 105  ‘Boko

Maritime Piracy as International Threat 191 international navigation in the region, eg,110 the establishment and monitoring of the Internationally Recommended Transit Corridor within the Gulf of Aden since August 2008.111 The above naval forces operate closely with the multinational naval partnership of Combined M ­ aritime Forces, which focus on the areas of defeating terrorism, preventing piracy, encouraging regional co-operation, and promoting a safe maritime environment.112 The concentrated action by the three counter-piracy maritime forces, as well as their interface with independently deployed naval missions from several other UN Member States and naval forces of the states of the Southern African Development Community has resulted in the reduction of piratical attacks in some regions currently.113 Apart from their purely operative role during counter-piracy missions, the various naval forces also undertake an important law enforcement task in the context of shiprider agreements as required under UNSC Resolution 1851 (2008).114 These are special arrangements concluded in accordance with UNCLOS, the SUA Convention, the 2000 United Nations Convention against Transnational Organized Crime and other relevant instruments, between the states and regional organisations fighting piracy off the coast of ­Somalia with countries willing to take custody of pirates in order to embark law enforcement officials from countries, in particular of the region, in order to facilitate the investigation and prosecution of persons detained as a result of these operations.115 The importance of that role was further

110 For the NATO counter-piracy operations, see www.nato.int/cps/en/natolive/­ topics_48815.htm. 111  Marlo Maritime Liaison Office, cusnc.navy.mil/marlo/Guidance/Corridor.htm. 112  See in particular the mission of Combined Task Force 151 to disrupt piracy and armed robbery at sea and to engage with regional and other partners to build capacity and improve relevant capabilities in order to protect global maritime commerce and secure freedom of navigation, www.combinedmaritimeforces.com. 113  Among the states that have deployed naval forces conducting counter-piracy operations are China, India, Indonesia, Japan, the Republic of Korea, Malaysia, Pakistan and the Russian Federation, which have co-operated in the Gulf of Aden, as authorised by UNSC Res 2077 (n 60). See further in UNGA, ‘Report of the Secretary-General: Oceans and the Law of the Sea 68/71’ (2013) UN DocA/68/71/Add.1. An important operational parameter in this context isthe Shared Awareness and De-confliction Initiative, which was established in 2008 as a mechanism of meetings aimed at co-ordinating activities between the states and coalitions involved inmilitary counter-piracy operations in the Gulf of Aden and the w ­ estern Indian Ocean. The meetings are held in Bahrain at regular intervals and are ­co-chaired on a rotational basis by the Coalition Maritime Forces, NATO and EU Naval Forces. See ­oceansbeyondpiracy.org/matrix/shared-awareness-and-deconfliction-shade. 114  UNSC Res 1851 (n 57). See further in T Treves, ‘Piracy, Law of the Sea, and Use of Force: Developments off the Coast of Somalia’ (2009) 20(2) European Journal of International Law 411. 115  For the normative framework pertaining to transfers, along with a thorough discussion of the counter-piracy enforcement powers and their legal constraints, see R Geiß and A Petrig, Piracy and Armed Robbery at Sea: The Legal Framework for Counter-Piracy Operations in Somalia and the Gulf of Aden (Oxford, Oxford University Press, 2011) Chapters 3 and 4.

192  Alexandros XM Ntovas ­ ighlighted by UNSC Resolution 1976 (2011), urging states and internah tional organisations to share evidence and information for counter-piracy law enforcement purposes with a view to ensuring the effective prosecution of suspected, and imprisonment of convicted, pirates in conformity with international human rights law.116 The international enforcement response to maritime piracy has been significantly less pronounced in West Africa, given the different political geography existing in that part of the continent, where both Central and West Africa officials have underscored the need for implementing African solutions to African problems. In part this approach confirms an underlying regional wariness over perceptions of external interference that can be conveyed through the presence of foreign warships patrolling in the Gulf of Guinea, similar to the international naval operations off the coast of Somalia, but also out of the fear that it might be more destabilising than helpful in attracting criminal or terrorist attacks targeting the foreign warships.117 Hence the states in the region have retained a leadership role in this regard, supported by several regional organisations; namely, the Economic Community of West African States (ECOWAS), the Economic Community of Central African States (ECCAS) and the Gulf of Guinea Commission (GGC).118 International assistance therefore was provided for the immediate aim of facilitating and coordinating regional efforts on the basis of joint counter-piracy operations by the states of the region, and of supporting national capacity-building in the implementation of effective and practical measures enhancing maritime safety and security. The establishment in the long term of a joint maritime security architecture to counter piracy is placed under the auspices of the African Union (AU) in the context of the 2050 Africa’s Integrated Maritime Strategy,119 with one of the first actions to be the development and implementation of transnational and trans-regional maritime security coordination centres covering the whole region of the Gulf of Guinea, building on the 2008 ‘Memorandum of Understanding on the establishment of a sub-regional integrated coastguard network in West and Central Africa’ developed by the Maritime Organization of West and Central Africa (MOWCA) and the

116  A concise report on the basic international legal implications of counter piracy, looking at the legality of such acts in the context of international humanitarian law and human rights standards, is offered in Geneva Academy of International Humanitarian Law and Human Rights, Counterpiracy under International Law (Geneva, Geneva Academy, 2012). 117 UNSC, ‘Letter Dated 18 January 2012 from the Secretary-General Addressed to the President of the Security Council’ (18 January 2012) UN Doc S/2012/45 para 51. 118  In a summit that took place in Yaoundé, Cameroon, on 24–25 June 2013, the heads of states and the officials of the ECOWAS, ECCAS and GGC considered a comprehensive response to illicit and illegal activities in the Gulf of Guinea and adopted a series of key strategic documents to this end. 119  See pages.au.int/maritime/documents/2050-aim-strategy.

Maritime Piracy as International Threat 193 IMO.120 The basic legal framework at the moment is set by the ‘Code of Conduct concerning the repression of piracy, armed robbery against ships, and illicit maritime activity in west and central Africa’,121 being supported by the currently underfunded West and Central Africa Maritime Security Trust Fund.122 International counter-piracy and law enforcement operations will remain unproductive unless effective law-making and judicial structures are created to address the modern legal nature of piracy in all of its aspects. In this respect the main challenge initially arose out of the inadequate domestic legislation and the limited or lack of capacity in Somalia and other states in the region to undertake the custody and prosecution of suspected pirates after their capture at sea, which in some cases even led to pirates being released without facing justice regardless of whether there was sufficient evidence to support prosecution. The domestic law in a number of states, especially at the time, lacked provisions criminalising piracy and/or procedural provisions for the effective criminal prosecution of suspected pirates. This, in general, hindered—if not undermined—a more robust international counter­ piracy action for several years against the pirates off the coast of Somalia particularly, but recently there has also been a concern with regards to West African piracy where states in the region enjoy more stable political and social conditions. For instance, a recent UN report observed that Benin’s legal framework needs to be reformed regarding essential matters, such as the definition of piracy, in order to effectively address this threat. Characteristically, it indicated two recent piracy cases where suspected pirates were charged with generic offences, such as armed robbery, premeditated murder and conspiracy, due to the definition of the crime of piracy being outdated and inconsistent with UNCLOS. Moreover, universal jurisdiction, as provided under the Convention, was not incorporated in the Maritime Code of the country, thereby limiting Benin’s piracy jurisdiction to acts committed by either its citizens or on board ships under its flag.123 To this end the IMO, acting on a series of

120 The Memorandum aims at enhancing maritime safety, security and law enforcement throughout the region and forms the basis of the maritime security strategy within the ­African Maritime Transport Charter adopted by the AU in Durban in October 2009; see further in IMO, Strengthening Maritime Security in West and Central Africa (London, IMO, 2013) www.imo.org/en/MediaCentre/HotTopics/piracy/Documents/west%20africa %20Maritime%20Security.pdf. 121 Signed in Yaoundé on 25 June 2013, imo.org/ourwork/Security/westafrica/ Documents. See IMO, ‘IMO SG Welcomes New Piracy Code for West and Central Africa’ IMO News (2013 Issue 2) 6–7. 122  IMO, ‘Resolution on Prevention and Suppression of Piracy, Armed Robbery against Ships and Illicit Maritime Activity in the Gulf of Guinea’ (29 November 2013) A.1069(28). 123  UNSC, ‘Letter Dated 18 January 2012 from the Secretary-General Addressed to the President of the Security Council’ (19 January 2012) UN Doc S/2012/45 para 14.

194  Alexandros XM Ntovas UNSC resolutions,124 adopted on 29 January 2009 the Djibouti Code of Conduct concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden, which aims include assisting the states in that region to develop appropriate regulatory and legislative frameworks to combat piracy, enhancing their enforcement capacity, interdiction of suspect vessels, and prosecution of suspected pirates. A similar initiative is now being developed for the other side of the continent through the Code of Conduct concerning the Prevention of Piracy, Armed ­Robbery against Ships and Illicit Maritime Activity in West and Central Africa.125 In the meantime, the latest developments in the UN reveal a major change in the strategy of the international community to address the problem of piracy off the Somali coast by changing its focus at a judicial level from a regional or international tribunal to a system of specialised anti-piracy courts.126 The proposed scheme envisages a number of states in the region, including Somalia, establishing independently operating courts with substantial international assistance, and assisted by a regional prosecution centre acting in co-operation with the respective jurisdictions. As employed in the context of the various UN documents to date, the term ‘specialised anti-piracy court’ considers ideally a court operating in the respective jurisdiction through its domestic authorities, which include national judges, prosecutors and administrative staff, operating under municipal law and providing for the efficient conduct of piracy cases, conforming to international law and international human rights standards. In terms of structure, the specialised anti-piracy courts system puts in place a scheme of independently operating courts which comprises three components. First, a special national court in Somalia, either established within the jurisdiction of the country—respectively in Somaliland and Puntland, or even operating on an extraterritorial basis outside the Somali domain. Its full operation, however, currently depends on the progress made with regard to capacity-building under the Djibouti Code of Conduct and the ability of the Federal Government to implement the rule of law ashore in Somalia. Second, a number of specialised courts within the national judicial system of other states in the region that will operate in parallel with the Somali courts in exercising universal jurisdiction. At the moment more 124  UNSC Res 1816 (n 14); UNSC Res 1838 (22 May 2008) UN Doc S/Res/1838; UNSC Res 1846 (n 8) and UNSC Res 1851 (n 57). 125  Signed on 25 June 2013. The implementation of this Code takes place within the wider context of UNSC Res 2018 (n 70) and UNSC Res 2039 (n 17) to prevent and repress piracy in the Gulf of Guinea, consistent with the maritime strategies of the AU, ECCAS, ECOWAS and GGC. 126  As set forth in UNSC Res 2015 (n 64).

Maritime Piracy as International Threat 195 than 20 states worldwide have been involved in prosecuting, or have prosecuted, over 1,200 persons suspected of piracy.127 But emphasis is increasingly placed on directing the prosecution and imprisonment by states in the immediate region, such as Kenya, Seychelles, Mauritius and the United Republic of Tanzania, with assistance provided by the UNODC Counter-Piracy Programme, the Trust Fund and other international organisations and donors, in coordination with the International Trust Fund Supporting Initiatives of the Contact Group on Piracy off the Coast of Somalia, as these are considered the pivotal states within the system of specialised anti-piracy courts. Other states in the region conducting prosecutions include France (the Comoros), Madagascar, Oman, the United Arab Emirates, Yemen and India. Qatar also recently expressed its readiness to move in this direction. Third, the ‘Regional Fusion and Law Enforcement Centre for Safety and Security at Sea Regional Anti-Piracy Prosecution & Intelligence Coordination Centre’, established since February 2013 (formerly the Regional Anti-Piracy Prosecution and Intelligence Coordination Centre) in the ­Seychelles, has already started working in tandem with several of the special national courts in the countries mentioned above, and is charged with the task of coordinating the required international support and acting as a focal point for prosecution purposes piracy suspects, as well as providing a standard location for their transfer under shiprider agreements by the patrolling naval forces.128 The Report of the Secretary-General estimates that if, (a) the required changes are effected in the respective domestic legal orders on time, and (b) international assistance becomes available for the implementation of the proposed scheme, the specialised anti-piracy courts in Somalia, Kenya, Seychelles, Mauritius and the United Republic of Tanzania will be able from 2014 onwards to collectively conduct a maximum of 125 piracy prosecutions per year. This will be in accordance with international s­ tandards, involving up to 1,250 suspects, which is a figure that exceeds the total number of all suspects prosecuted globally to date.129

127  UNGA, ‘Report of the Secretary-General on the Modalities for the Establishment of Specialized Somali Anti-piracy Courts’ (15 June 2011) UN Doc S/2011/360. 128 Eg Kenya has, since 2008, distinguished itself in the global war against piracy by undertaking prosecutions in the national courts of suspected pirates arrested in the high seas and handed over by navies under such agreements. See further in PM Wambua, ‘The Jurisdictional Challenges to the Prosecution of Piracy Cases in Kenya: Mixed Fortunes for a Perfect Model in the Global War against Piracy’ (2012) 11 World Maritime University Journal of Maritime Affairs 95. 129 ‘Report of the Special Adviser to the Secretary-General on Legal Issues Related to Piracy off the Coast of Somalia’in UNSC, ‘Letter Dated 24 January 2011 from the SecretaryGeneral to the President of the Security Council’ (25 January 2011) UN Doc S/Res/2011/30. For an overview of the Report, see AXM Ntovas, ‘Towards the Establishment of Specialised Anti-piracy Courts’ (2012) 12(6) Shipping and Trade Law 1.

196  Alexandros XM Ntovas The rationale underlying the creation of such a peculiar system of specialised anti-piracy courts is on the one hand to provide an immediate solution to the vexatious issue of ongoing piratical activities. On the other hand it aspires to offer a viable prospect for the gradual strengthening of the rule of law within Somalia as to allow the country ultimately to assume the total control of all piracy cases emanating from its jurisdiction. The scheme therefore aims at enhancing Somali responsibility and to increasingly introduce its active involvement in efforts to apprehend and prosecute those behind acts of piracy, restore the rule of law in areas harbouring pirates and monitor the coasts. The decision as to specialised national anti-piracy courts reflects the current necessity not only for an immediate restoration of the rule of law off the Somali coast, but also serves the expedient aim of judicial capacitybuilding and gradual development of Somalia’s infrastructure. This will enable Somalia to undertake an increasingly active involvement within the overall context of international efforts and enhance its national responsibility by bringing the country to the forefront of a future comprehensive solution to the problem of piracy. As regards the latter, for example, the UNODC,acting on UNSC Resolution 1976 (2011), launched the Piracy Prisoner Transfer Programme in 2012, which facilitates the transfer of convicted pirates back to Somalia and their imprisonment arrangements. While ensuring humane and secure imprisonment conditions, the Programme aims torehabilitate and successfully reintegratethe prisoners back into society as they will be close to their family, culture, language and religion.130 This matter acquires exceptional importance in relation to children that have been recruited by piracy networks.131 However, as maritime piracy in its contemporary form is not only concerned with the perpetrators or suspects captured at sea, the UNSC has repeatedly expressed the importance for these courts to enjoy a wideranging jurisdiction to also prosecute anyone who incites or intentionally facilitates piracy operations, as well as those financing such acts and laundering its proceeds. It is integral to a comprehensive judicial response, which safeguards future security concerns of the countries affected and other states alike, that also individuals on land responsible for piracy and

130  See further in UNSC, ‘Report of the Secretary-General Pursuant to Security Council Resolution 2020 (2011)’ (22 October 2012) UN Doc S/2012/783 paras 55–58. 131  WG2 of the Contact Group on Piracy off the Coast of Somalia is preparing guidelines on determining the age of apprehended individuals and the handling of juvenile suspects by capturing or prosecuting states, as well as on the detention and prosecution of those who recruit juvenile pirates. The possibility to retrain, re-educate and rehabilitate juvenile suspects, where appropriate, should remain an important consideration. In this regard, states should be guided by the Convention on the Rights of the Child and its standards, as interpreted by the Committee on the Rights of the Child.

Maritime Piracy as International Threat 197 those who enable this criminal activity to thrive be identified and accordingly targeted.132 This would include, as discussed above, key figures of criminal networks involved in piracy who illicitly plan, organise, facilitate, or finance and profit from such activities ashore.133 A limited yet increasing number of states have thus taken measures to amend and update their domestic law as to criminalise the diverse constitutive elements of contemporary piracy. Indicatively, Bangladesh and the Netherlands have enacted relevant legislation to prosecute acts of piracy and armed robbery against individuals who incite, plan, organise, facilitate or finance piracy. The Netherlands, and other states in the European Union, in particular, are currently involved in initiatives for detecting and prosecuting those who finance piracy, including organisers and negotiators, and where ­possible, to seize and confiscate the financial assets of these suspects in co-operation with regional and national authorities in Somalia.134 VII. CONCLUSION

In spite of the declining number of incidents, it would seem premature to conclude that the international and transnational threat of piracy is over. That said, it should be remembered that there were at least two points in time during the previous century where piracy had not been considered ‘[o]f sufficient real interest for the state of the world’135 and therefore suggested that ‘[a]ll provisions on piracy should be deleted, because piracy, being an eighteenth century concept, no longer constituted a general problem’.136 Pirates have not disappeared, they may simply remain at bay, potentially preparing for future attacks137 when they assess the time is 132  See further in UNSC, ‘Report of the Secretary-General pursuant to Security Council Resolution 2020 (2011)’ (22 October 2012) UN Doc S/2012/783 para 69. 133  UNSC Res 1950 (n 10) para 15; UNSC Res 1976 (n 29) para 15–17; UNSC Res 2015 (n 64) Recital 17 in the preamble; and UNSC Res 2020 (n 7) Recital 5 in the preamble. 134  See UNSC, ‘Letter Dated 23 March 2012 from the Secretary-General to the President of the Security Council (Compilation of information received from Member States on measures they have taken to criminalize piracy under their domestic law and to support the prosecution of individuals suspected of piracy off the coast of Somalia and imprisonment of convicted pirates)’ (26 March 2012) UN Doc S/2012/177. 135  Statement by the Polish representative to the Council of League of Nations as to the reasons why the draft on the suppression of piracy should be omitted by the work of a subsequent codificatory conference. The proposal was approved in June 1927, L Azubuike, ‘­ International Law Regime against Piracy’ (2009) 15(1) Annual Survey of International& ­Comparative Law 48–49. 136  Statement by the delegation of Uruguay to the first United Nations Conference for the Law of the Sea during the 1958 negotiations, A Petrig, ‘Private Prevention against Piracy’ (Regional Conference of the International Law Association, Athens, August 2013) (on file with the author). 137  N Rayman, ‘Did 2013 Mark the End of Somali Piracy?’ Time Magazine (6 January 2014) world.time.com/2014/01/06/.

198  Alexandros XM Ntovas right to resume their activities.138 There is no doubt that successful piratical attacks could easily increase, or even resume at the levels recorded during 2011 and 2012. Therefore, a visible presence of naval forces in readiness to undertake vigorous suppressing operations, consistent with international law, is necessary. The shipping industry—namely ship-owners, shipping companies, ship-operators, masters and crews—should also not relax selfprotection policies and become oblivious to this peril. They must ensure continuous implementation of the BMP-4(2011) and all appropriate measures indicated by IMO to protect their ships and those on board.139 In the meantime, the period that currently unfolds in the wake of contemporary maritime piracy represents a crucial opportunity for the international community to influence international law in allowing the establishment of an effective regime for its suppression. The international threat, which has been engendered by contemporary maritime piracy, is yet to be seen at its full extent as it is not of immediate concern to international navigation in relation to the safety of seafarers and commercial nautical routes, nor does it solely impact upon global trade and international economy. Maritime piracy has not been called ‘contemporary’ in this chapter due to any profound change in the operation of pirates at sea, or to provide a current understanding of this concept in strategic terms of naval policy, as has been presented elsewhere.140 It has been described as such for having evolved in the twenty-first century into a transnational criminal activity that affects the seas and lands alike with no state being capable of suppressing it on its own; and, at the same time, for having devolved into a secondary activity that may be employed on the basis of a risk-reward business model to opportunistically obtain significant amounts of money for the financing of other criminal undertakings, and possibly international terrorism.141 This situation thus repositions piracy as a truly international crime, for which the need for coordination and co-operation among states has been underscored by the UN Open-ended Informal Consultative Process 10 years before the annus horribilis.142

138 

International Chamber of Shipping, Annual Review (London, ICS, 2013) 20. IMO, ‘IMO and Shipping Industry Bodies Urge Continued Application of Anti-piracy Measures’ IMO News (2013, Issue 1) 10. 140  J Kraska, Contemporary Maritime Piracy: International Law, Strategy, and Diplomacy at Sea (Santa Barbara, Praeger, 2011). 141  See also the similar approach taken by MN Murphy, Contemporary Piracy and Maritime Terrorism: The Threat to International Security (Abingdon, Routledge, 2013). 142  UNGA, ‘Report on the Work of the United Nations Open-ended Informal Consultative Process Established by the General Assembly in its Resolution 54/33 in Order to Facilitate the Annual Review by the Assembly of Developments in Ocean Affairs at its Second Meeting’ (22 June 2001) UN Doc A/56/121 para 52. See further P Mallia, ‘The Fight against Piracy and Armed Robbery against Ships off the Coast of Somalia’ in NA Gutiérrez, Martínez (ed), Serving the Rule of International Maritime Law—Essays in Honour of Professor David Joseph Attard (Abingdon, Taylor & Francis, 2010) 221–22. 139 

Maritime Piracy as International Threat 199 Maritime piracy thus poses the fundamental challenge of reforms to international law as it calls, amongst other things, for a profound shift in how sovereignty and legitimacy is conceived when they are uncoupled from the territorial aspect of the modern nation-state and also questions preconceived norms with respect to the definition of this crime nowadays, as well as numerous other issues ranging from the monopoly on the legitimate use of force at sea to the allocation of jurisdictions with regard to prosecuting, imprisoning and rehabilitating pirates.143 International law therefore has an important role to play, and historically in relation to piracy has demonstrated the potential to resist its abuse as a mere instrument of politics and special interests, retaining its status as an independent normative authority to correct or regulate such interests.144 Yet, despite the extraordinary situation in Somalia and correspondingly prolific activity demonstrated by the UNSC on the issue of maritime piracy in recent years, international law has regrettably not undergone any significant doctrinal changes that would allow a comprehensive legal framework to develop with a view to effectively addressing this problem worldwide. The threat emanating from maritime piracy has yet to pass the threshold standard of what is considered an international threat on its own merits and within the stricto sensu meaning of ‘[a]cts causing threats to international peace and security’, as for instance in the case of acts of international terrorism pursuant to UNSC Resolution 1368 (2001).145 Accordingly, the long stream of resolutions adopted since 2008 under UN Charter Chapter VII, whereby the UNSC authorised the use of ‘all necessary means’ in suppressing piracy, do not radically change the ­landscape of international law, apart from few pro tempore operational exceptions, such as the reverse of the hot pursuit so as to allow international enforcement units operating on the high seas to trail pirates into waters under coastal jurisdiction. This indeed represents an up-to-date adjustment of a well-established principle of the law of the sea, as codified in UNCLOS. However, the procedural requirement for Somalia’s prior written consent, which is also subject to renewal, and the conceding of such powers only to co-operating states and international organisations, without doubt lessens its importance. Furthermore, the UNSC has repeatedly stressed that such authorisation is to apply only with respect to the situation in Somalia, it does ‘not affect the rights or obligations or ­responsibilities of member states under international law, including any rights or obligations under the Convention, with respect to any other situation’, and also emphasised

143  For an international relations theory approach, see MJ Struett, JD Carlson, MT Nance (eds), Maritime Piracy and the Construction of Global Governance (Abingdon, Routledge, 2012). 144  M Kempe, ‘Even in the Remotest Corners of the World: Globalized Piracy and International Law, 1500–1900’ (2010) 5 Journal of Global History 353. 145  See, UNSC Res 1368 (12 September 2001) UN Doc S/RES/1368.

200  Alexandros XM Ntovas in particular that ‘it shall not be considered as establishing customary international law’.146 By the same token, the authorisation in UNSC Resolution 1851 (2008) to engage in counter-piracy action on Somali soil must be viewed as a mediocre qualification of the territoriality principle, as Chapter VII operations do not need to be endorsed by the receiving state.147 Thus, the limited ambit of the UNSC’s maritime enforcement resolutions may be attributed to the very nature of the existing international structure, which—for better or worse—is profoundly centred upon an old-fashioned, unqualified conception of individual states’ territorial sovereignty.148 At the present stage, where the global community undergoes a phase of transitional securitisation, it would be advisable for international law to evolve congruently with a twofold approach. This should consist of, on the one hand, a codification and progressive development and, on the other hand, a parallel systemic integration by the domestic courts of those states that find themselves at the forefront of combating contemporary maritime piracy, and which are willing to make better use of universal jurisdiction. Subtle refining of legal processes of this kind nonetheless will remain ineffective unless the international community concurrently forge the basis of a domestic framework to promote the social and economic development of the local communities with the aim of sustainable growth as a means to tackle the underlying causes of piracy.149 The political economy of piracy, in Somalia particularly, cannot be transformed by an external top-down intervention based on a formulaic security-development nexus.150 In relation to the former aspect, it should be first noted that along with being consistent with the cardinal principles of general international law, a comprehensive regime to combat maritime piracy shall furthermore overcome certain obfuscation that emanates from the traditional law on piracy. The definition of piracy itself in UNCLOS, for example, has been considered unclear in the sense that piracy is not defined as only one type of act and, depending on the case, has been interpreted even by the courts

146 

UNSC Res 1816 (n 14) para 9. Res 1851 (n 57); D Guilfoyle, ‘Piracy off Somalia: UN Security Council Resolution 1816 and IMO Regional Counter-Piracy Efforts’ (2008) 57 International and Comparative Law Quarterly 695 and ‘Counter-Piracy Law Enforcement and Human Rights’ (2010) 59(1) International and Comparative Law Quarterly 147–49. 148  Also similarly argued by K Zou, ‘Maritime Enforcement of United Nations Security Council Resolutions: Use of Force and Coercive Measures’ (2011) 26(2) International Journal of Marine and Coastal Law 238. 149  World Bank, ‘Ending Somali Piracy Will Need On-Shore Solutions and International Support to Rebuild Somalia’ (World Bank, 11 April 2013) worldbank.org/en/news. 150  GC Oliveira, ‘New Wars at Sea: A Critical Transformative Approach to the Political Economy of Somali Piracy’ (2013) 44(1) Security Dialogue 3. 147  UNSC

Maritime Piracy as International Threat 201 of advanced legal systems as being either too narrow or too vague.151 Yet, amending UNCLOS in this respect, as has been suggested elsewhere,152 would be the least preferable option for policy reasons as well as an unlikely prospect in terms of practical expediency. Contrariwise, building upon it offers a more stable and effective legal framework, given its universal acceptance and constitutional nature as a document maintaining the international public order of oceans.153 As noted elsewhere, maritime security is an amorphous concern sitting within a reasonably well-defined legal framework.154 To this end, codification and progressive development of piracy law in regional instruments, reflecting the needs of the particular area they address, at this stage constitute a more convenient starting point for the complex process, which in time will allow a worldwide consensus. In this sense, a review of the international law on piracy shall aim initially at establishing the creation of a robust system of enforcement at international level by adjusting the current jurisdiction of states in the zones under national authority, namely territorial waters and archipelagic waters, as well as in the EEZ, without however jeopardising the sovereignty of coastal states.155 In this context, the Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in the periphery of Asia is an instrument that must be viewed as the setting for a model on regional co-operation.156

151 Eg United States v Mohamed Ali Said [2010] US Dist; United States v Hasan [2010] US Dist. See B Hart Dubner, ‘On the Definition of the Crime of Sea Piracy Revisited: Customary vs. Treaty Law and the Jurisdictional Implications Thereof’ (2011) 42(1) Journal of Maritime Law & Commerce 71. 152 Among others, see CA Harrington, ‘Heightened Security: The Need to Incorporate Article 3bis (1)(A) and 8bis (5)(E) of the 2005 Draft SUA Protocol into Part VII of the United Nations Convention on the Law of the Sea’ (2007) 16 Pacific Rim Law & Policy Journal 107, and T Garmon, ‘International Law of the Sea: Reconciling the Law of Piracy and Terrorism in the Wake of September 11th’ (2002) 27 Tulane Maritime Law Journal 257. 153  In this respect, it should not be overlooked that in the case of Somalia, piracy proved a more controversial issue, owing to the anomaly caused within the constitutional order of oceans, as the country’s maritime claims have been inconsistent with UNCLOS—an aspect that has been, for the moment, settled with the re-discovery of a 1989 national law that brought Somalia’s previously excessive territorial waters claim into compliance with the Convention. This normalisation subsequently facilitated the implementation, under the Kampala process, of the Somali Maritime Resource and Security Strategy, which was endorsed by the President of the Federal Government of Somalia and participating states at the 14th Plenary of the CGPCS in New York on 1 May 2013, aiming at advancing the capacity of Somalia to regulate, police, secure and exploit its national maritime domain—particularly within the EEZ. 154  V Lowe in his preface to N Klein, Maritime Security and the Law of the Sea (Oxford, Oxford University Press, 2011). 155  JM Isanga, ‘Countering Persistent Contemporary Sea Piracy: Expanding Jurisdictional Regimes’(2009) 59 American University Law Review 1319. 156  Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in the Periphery of Asia (adopted 11 November 2004, entered into force 4 September 2006) www.mofa.go.jp/mofaj/gaiko/kaiyo/pdfs/kyotei_s.pdf.

202  Alexandros XM Ntovas However, reforms of this kind alone would be limited in effectiveness, if not out of date, as they do not take into consideration the strong links of contemporary piracy with the criminal activities onshore. Therefore, the crime of maritime piracy shall also be connected to other constitutive aspects, as argued earlier. There are a number of international instruments in this respect that can provide both substantive and procedural links to piracy and consequently broaden up the jurisdiction of prosecution both ratione personae and ratione materiae, such as the 2003 UN Convention against Transnational Organized Crime157 and the 2003 UN Convention against Corruption.158 Although such criminal offences are evidently manifest in the contemporary nature of maritime piracy,159 they are not currently unified at the international level into a core counter-piracy legal regime for the purpose of enforcement, prosecution and incarceration. As commented in more general terms elsewhere, ‘when considering the narrow definition of piracy coupled with the wide powers to respond to piracy, it may be seen that a small door may be opened to a large room for action. The greatest challenge lies in getting through the door in the first instance.160

In the context of this approach, however, the decision of the international community to set aside the plans for establishing an international or regional tribunal for piracy, as was provided among other options in a 2010 report by the UNSG,161 must be seen as a regressive step. 157  UN Convention against Transnational Organised Crime (adopted 15 November 2000, entered into force 29 September 2003) 2225 UNTS 209 (UNTOC); see also UNGA Res 55/25 (8 January 2001) UN Doc A/RES/55/25. 158 UN Convention against Corruption (adopted 31 October 2003, entered into force 14 December 2005) 2349 UNTS 41; see also UNGA Res 58/4 (31 October 2003) UN Doc A/ RES/58/4. 159  Eg Article 5 UNTOC requires states parties to criminalise, as a distinct offence, the participation in an organised criminal group, either by criminalising the agreement with one or more other persons to commit a serious offence and/or by criminalising the conduct of a person who, with knowledge of the aim of the group to commit criminal activities, either takes an active part in the criminal activities of an organised criminal group or takes part in non-criminal activities in the knowledge that the participation will contribute to the criminal aim of the organised criminal group. In addition, the Convention also requires states to criminalise organising, directing, aiding, abetting, facilitating or counselling the commission of serious crimes involving an organised criminal group. Moreover, Article 6 UNTOC requires states parties to criminalise the conversion or transfer of proceeds of crime for the purpose of concealing or disguising their illicit origin and the concealment or disguise of the true nature or source of proceeds of crime. States are also required to criminalise the acquisition, possession or use of proceeds of crime and the participation or attempt to commit any of these offences, subject to the basic concepts of their legal systems. 160 N Klein, Maritime Security and the Law of the Sea (Oxford, Oxford University Press, 2011) 305. 161  UNSC, ‘Report of the Secretary-General on possible options to further the aim of prosecuting and imprisoning persons responsible for acts of piracy and armed robbery at sea off the coast of Somalia, including, in particular, options for creating special domestic chambers

Maritime Piracy as International Threat 203 This nevertheless leaves scope for domestic courts to undertake a s­ ystemic integration of the various criminal offences, depending on the case as to allow state practice to consolidate in this direction. For example, this could be done in relation to forging an international public policy concerning the payment of ransoms, given the legal implications arising with regard to payments being channelled into the financing of transnational crime or even the funding of terrorism.162 Moreover, it would also address the challenge arising from the lack of appropriate incorporation of the relevant international instruments in national law by states exercising primary jurisdiction, as underscored by the UNSC.163 Remarkably, despite presenting the only true instance that customary international law knows of,164 the assumption of complementary universal jurisdiction in relation to prosecuting piracy has rarely been invoked by domestic courts.165 Its use would allow courts to shape ‘the new architecture of transnational justice’,166 at the same time acting consistently with the cardinal principles of general international law, such as the territoriality or nationality principle. In this context it should be remembered that the collapse of a functioning state, and the resultant vacuum

possibly with international components, a regional tribunal or an international tribunal and corresponding imprisonment arrangements, taking into account the work of the Contact Group on Piracy off the Coast of Somalia, the existing practice in establishing international and mixed tribunals, and the time and resources necessary to achieve and sustain substantive results’ (26 July 2010) UN Doc S/2010/394. In this Report, a number of possible options were proposed to further the aim of prosecution and imprisoning persons responsible for acts of piracy and armed robbery at sea off the coast of Somalia. Clustered into what could be seen at the time as three emerging trends, those options envisaged the possibility of a court being established either in the form of a special national court, or—with international participation—in the form of either a regional or fully fledged international tribunal. The UNSC, in a series of subsequent resolutions, namely UNSC Res 1976 (n 29), UNSC Res 2015 (n 64) and UNSC Res 2020 (n 7) decided to continue its consideration as a matter of urgency and favoured the prospect of establishing specialised anti-piracy courts in Somalia and other states in the region, as discussed earlier. For a synopsis of all the options, see AXM Ntovas, ‘UN Responses to Piracy’ (2010) 10(8) Shipping & Trade Law 4. 162  AS Kolb, TR Salomon and J Udich, ‘Paying Danegeld to Pirates—Humanitarian Necessity or Financing Jihadists?’ (2011) 15 Max Planck Yearbook of United Nations Law 105. 163  Among others, UNSC Res 1976 (n 29) paras 13–14. 164  Case Concerning the Arrest Warrant of 11 April 2000 (Democratic Republic of the Congo v Belgium) (Judgment) [2002] ICJ Rep 3, separate opinion of President Guillaume, para 5. In general see KC Randall, ‘Universal Jurisdiction under International Law’ (1987) 66(4) Texas Law Review 785. Cf S Yee, ‘Universal Jurisdiction: Concept, Logic, and Reality’ (2011) 10(3) Chinese Journal of International Law 503. 165 E Kontorovich and S Art, ‘An Empirical Examination of Universal Jurisdiction for Piracy’ (2010) 104(3) American Journal of International Law 436; see also Y Huang, ‘Universal Jurisdiction over Piracy and East Asian Practice’ (2012) 11(4) Chinese Journal of International Law 623. 166 As in more general terms and broadly argued by DF Orentlicher, ‘The Future of ­Universal Jurisdiction in the New Architecture of Transnational Justice’ in S Macedo (ed), Universal Jurisdiction: National Courts and the Prosecution of Serious Crimes under International Law (Pennsylvania, University of Pennsylvania Press, 2006).

204  Alexandros XM Ntovas of s­ overeignty therefrom, as in the case of Somalia, redefined in the most challenging terms the rationale underlying universal jurisdiction over pirates, who in operating as hostes humani generis167 put themselves ‘outside the jurisdiction of any State’.168 Extended debates over the linkages between contemporary maritime piracy and terrorism must be seen in the context of twenty-first century international security as nothing more than an effete legal exercise and purely political reminiscing of a long passed geopolitical rivalry. The critical question is not whether the international crime of maritime piracy can be conceivably subsumed as a matter of legal definition under that of terrorism. This is a question to be answered easily in the negative, although it would be difficult to do so without noting the irony that international law in terms of suppression also considers terrorism to be nothing more than a criminal act.169 In practice, it is highly likely for piracy to be employed, if not already through the affiliation of its financiers to transnational organised crime, as a secondary criminal activity for the funding of terrorist activities. At the moment, links are more likely to suggest arrangements resulting from mutual convenience rather than a shared ideology. However, there is nothing to prevent particular acts from being characterised as both if piracy is used to raise money or otherwise fund an act of terrorism. One cannot fail to notice that both the upsurge of maritime piracy and the rise of international terrorism in Somalia has taken advantage of the sovereignty vacuum, and therefore the commonly held perception of the two criminal activities being separate and unrelated must be contested in the context of global security.170 This need will certainly be further highlighted in the near future by the increasingly volatile situation in West Africa, where there is a persistently increasing and determinedly aggressive practice of piracy in the Gulf of Guinea, along with a deeply rooted transnational organised network operating in the coastal states, and, more worryingly, a rise of Islamic terrorist activities in the hinterlands, such as the Movement for the Unity and Jihad in West Africa.171

167 

SS Lotus Case (n 1) para 190. phrase reoccurs in UNCLOS Arts 100, 101(a)(ii) and 105. Cf the departure of the extra-territorial doctrine from its original conception, as expressed in Re Piracy Jure Gentium [1934] AC 586 (Privy Council) 589, considering that because pirates commit their crimes beyond the law of nations, they place themselves ‘beyond the protection of any State’; see further in RP Kelley, ‘UNCLOS, but No Cigar: Overcoming Obstacles to the Prosecution of Maritime Piracy’ (2010) 95(6) Minnesota Law Review 2294. 169  R Haywood and R Spivak, Maritime Piracy (London, Routledge, 2012) 75–76. 170  CL Daniels, Somali Piracy and Terrorism in the Horn of Africa (Toronto, Scarecrow Press, 2012). 171 See Movement for the Unity and Jihad in West Africa (Beacham Publishing’s Terrorism Research & Analysis Consortium) trackingterrorism.org/group/movement-unity-andjihad-west-africa-mujao. 168  This

Maritime Piracy as International Threat 205 Given that all of the above processes aim at upholding the rule of law, another more specific concern that ought to be raised in connection with the law-making priorities of the international community in the immediate future is the regulation of private enforcement on the high seas. The international approach for various reasons, including the urgency, number, nature and scope of attacks at sea, as well as the ensuing cost for their suppression, has understandably favoured the development of a stakeholder driven approach to address maritime piracy. In this context the shipping industry has shown an uncritical enthusiasm for the employment of PCSA, which has been a very successful measure and—conveniently­ for governments—it is undertaken at the expense of the shipping industry in the first instance before this cost is transferred to the consumer. The standardisation process in consultation with IMO, which was discussed earlier, should be conducted in a more formalised context and at the public international law level in order to ensure the necessary guarantees. Especially, in view of the fragile balance in the international system during the transitional securitisation where non-state actors have emerged as players, states cannot afford to concede unconditionally such rights to modern ‘privateers’, who eventually, if left unchecked, will contribute in their own special way to lawlessness on the sea. Any life, whether a seafarer’s or a pirate’s, which is unjustifiably lost, is bound to undermine the very notion of the rule of law and therefore the entity being responsible, in private, public, national or international law, should be held accountable. It would thus be in the interest of the international community to protect erga omnes obligations for the respect of human rights through the process for the further refinement and adoption of an international convention on the regulation, oversight and monitoring of Private Military and Security Companies,172 and not be thwarted by private countervailing motives or individual national expediencies in this respect. Finally, a comprehensive and viable solution to contemporary maritime piracy must essentially occur within a broader state-building process. Accordingly, this requires that counter-piracy enforcement at sea should take place alongside a similar rigorous effort to advance the rule of law ashore, to rebuild in Somalia, and improve in the states of West Africa, an effective, uncorrupted and transparent governance system in close co-operation with the national authorities and civil society. Peace and s­ tability, the strengthening of state institutions, sustainable economic

172  An update of the ongoing open-ended intergovernmental process is provided at ohchr. org; See ND White, ‘The Privatisation of Military and Security Functions and Human Rights: Comments on the UN Working Group’s Draft Convention’ (2011) 11(1) Human Rights Law Review 133. In relation to maritime piracy, see A Priddy and S Casey-Maslen, ‘Counter-Piracy Operations by Private Maritime Security Contractors Key Legal Issues and Challenges’ (2012) 10 Journal of International Criminal Justice 839.

206  Alexandros XM Ntovas growth, social development and respect for human rights are necessary to create the conditions for a full and durable eradication of piracy on both sides of the continent. In particular for Somalia, where the ongoing situation still poses an immediate threat to international peace and security, the challenges to the Federal Government that emerged in September 2012 at the completion of the Kampala Accord and the Roadmap to End the Transition are even more complex—as seen in a series of attacks during 2014 and 2015 in ­Mogadishu, Garoowe and Leego by the insurgent group Al Shabaab, which constitute a terrorist threat to Somalia and the international community. Any effort against piracy and terrorism should therefore be indissolubly linked to, and foster reconciliation through, broad-based, inclusive and representative Somali institutions establishing a constitutionally accountable and effective federal government across the country to stability and security through democratic procedures for general elections in 2016. Maritime piracy is steered with the taste of sea salt in the air, but its birth and rising is deeply ingrained in the sand of lawless lands.

9 Terrorism: A Threat to Security? LYDIA DAVIES-BRIGHT

I. INTRODUCTION

S

INCE 9/11, INTERNATIONAL organisations and governments have been focused on the threat of terrorism. The language of war and fear has been used to describe what is perceived to be a serious and dangerous threat to the universal values of democracy, human rights and the rule of law.1 The ‘severe’2 existential threat to domestic and international security posed by (Islamic) terrorism, with the capability to strike at any time, in any place, has been used to justify the increase in exceptional counter-measures purported to increase the security of both state and citizen.3 The modus operandi and modus imperandi of modern terrorism, combined with the ‘ruthless character’ of its actions,4 has instilled fear in the hearts of Western powers and demands a response. In this fight against a shadowy and nebulous enemy, notions of ‘freedom’ and ‘justice’

1  See, eg Former US President GW Bush stating that ‘freedom itself is under attack’, that ‘The terrorists’ directive commands them to kill Christians and Jews, to kill all Americans’ and that terrorists ‘hate … a democratically elected government’ and so the US and its allies were now at ‘war’ in his Address to a Joint Congress (20 September 2001) edition.cnn. com/2001/US/09/20/gen.bush.transcript/; ‘Terrorism … is a global threat to democracy, the rule of law, human rights and stability, and therefore requires a global response.’ UN ­Secretary-General­ K Annan (17 June 2004) SG/SM/9372 www.un.org/News/Press/docs/2004/sgsm9372. doc.htm. 2 UK Government’s assessment of the threat posed by international terrorism: www. gov.uk/terrorism-national-emergency/terrorism-threat-levels. 3 International Commission of Jurists, Assessing Damage, Urging Action: Report of the ­Eminent Jurists Panel on Terrorism, Counter-terrorism and Human Rights (Geneva, ICJ, 2009) foreword v. 4  A Roberts, ‘Countering Terrorism: A Historical Perspective’ in A Bianchi and A Keller (eds), Counterterrorism: Democracy’s Challenge (Oxford, Hart Publishing, 2008) 3.

208  Lydia Davies-Bright have been pursued at the expense of fundamental principles and rules laid down and largely accepted by the international community.5 The counter-terrorism measures and actions of the post-9/11 era repeatedly prioritise state security over individual human rights but, despite considerable expenditure in human and material resources, the threat from terrorism has actually increased6 and Western states remain convinced that an attack from international terrorism is highly likely.7 Thus, the question is raised of whether or not the sacrificing of civil liberties and human rights to security concerns has been worthwhile. This chapter examines how law has been used to legitimise political responses to the perceived threat of terrorism and also its use in justifying and facilitating the expansion and use of, as opposed to limitation of, public powers. The fear of terrorism is used to rationalise measures that infringe human rights. Consequently, in the case of terrorism at least, law follows, rather than regulates, power. It is argued that the individual citizen now enjoys less protection from the use of state power as the safeguards of human rights and civil liberties are no longer adequate protection in a world where being a suspect is potentially sufficient to warrant an executive death sentence. The chapter begins by considering the foundational human rights principle of human dignity, concepts of statehood and security and the foundational principles of ethics that underpin human rights. Against this background, it then examines the idea of the individual as seen through the lens of key events in the developing story of terrorism, specifically, the 1988 Lockerbie bombing and the extra-judicial killings of Jean Charles ­Menezes in 2005 and Osama bin Laden in 2011. It c­ onsiders the ­philosophical basis of the arguments used to justify the prioritisation of security, before concluding that the individual human person no longer counts in the fight against terrorism and is often subordinated to the ­overriding needs of the state in the face of perceived security threats. Thus, it is argued that, as a consequence of the securitisation of terrorism, whilst state security may be enhanced, the individual human person is no safer—and is arguably less safe.

5 See, eg KJ Greenberg and JL Dratel (eds), The Torture Papers: The Road to Abu Ghraib (Oxford, Oxford University Press, 2005) detailing the political and administrative process that led to soldiers torturing detainees in Abu Ghraib and elsewhere in an effort to extract information for use in the fight against terrorism. The torture was committed in direct violation and knowing disregard of the detainees’ non-derogable human right not to be tortured or mistreated—the rationale being that it was necessary to protect freedom and the Western way of life. 6  S Pickering, J McCulloch and D Wright-Neville, Counter-Terrorism Policing: Community, Cohesion and Security (New York, Springer, 2008) 9. 7  UK Government’s assessment (n 2).

Terrorism: A Threat to Security? 209 II.  THE FOUNDATIONAL PRINCIPLE

A.  The (Modern) Origin of the Inviolability of Human Dignity At the end of World War II, states felt compelled to respond to the scale and extent of the systematic violence visited on those peoples who were seen by the Nazi regime as being less than human (less than one). These atrocities ‘outraged the conscience of mankind’8 and states vowed that such events would never be allowed to occur again. By placing the protection of the individual at the heart of the international system, states would be limited in their ability to use force and so ‘freedom, peace and justice’ could be secured.9 To that end, various principles were enshrined in the Universal Declaration of Human Rights (UDHR) and were seen as being a necessary protection against the use and abuse of state power. These rights, which attach to every individual by virtue of his humanity, are (theoretically) inalienable10 (regardless of perceived wrongdoing and despite the belief held by some that if a person has done something wrong, then they should not be afforded the same rights as a person deemed to be innocent—their guilt makes them less worthy11) and have been incorporated in a number of international instruments and upheld in relevant cases.12 Thus, human rights law is based on the foundational principle that each human being is of equal intrinsic value, irrespective of their actions, and each holds inalienable rights. Human rights instruments explicitly state that every human counts as ‘one’ and that the rights belong to ‘all 8  Universal Declaration of Human Rights (adopted 10 December 1948) UNGA Res 217 A(III) (UDHR) Preamble para 2. 9  UDHR Preamble. 10  UDHR Preamble para 1. 11  See, eg the emotive political arguments against lifting the blanket ban on prisoner voting after it was ruled unlawful by the European Court (Hirst v the United Kingdom (No 2) [2005] ECHR 681). In the House of Commons, Shadow Justice Secretary Sadiq Khan said that ‘The public will be rightly concerned at reports prisoners could get a vote. If true, thousands of those serving sentences for serious and violent crimes such as wounding, assault and domestic violence would be given a say in who runs the country.’ ‘Prisoners will not get the vote, says David Cameron’ The Guardian (24 October 2012) www.bbc.co.uk/news/ukpolitics-20053244; David Cameron stated in the House of Commons that ‘It makes me physically ill even to contemplate having to give the vote to anyone who is in prison.’ House of Commons Hansard Debates (3 November 2010) www.publications.parliament.uk/pa/ cm201011/cmhansrd/cm101103/debtext/101103-0001.htm. 12  Eg, the prohibition on torture: Ireland v UK [1978] ECHR 1; Tyrer v UK [1978] ECHR 2, notwithstanding the dissenting opinion of Sir Gerald Fitzmaurice who doubted the absolute nature of the torture prohibition; Convention Against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment (adopted 10 December 1984, entered into force 26 June 1987) 1465 UNTS 85 (CAT); International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR) prohibits torture and ill-treatment, even in the face of a threat to the life of the nation; the Geneva Conventions make torture and ill-treatment universal crimes.

210  Lydia Davies-Bright ­ embers of the human family’.13 Although the inalienability of human m rights has been contested since the European Enlightenment,14 it is a concept essential to the universality, applicability and relevance of human rights. Without it the rights would become class rights and would be held only by those meeting the qualifying criteria. The rights would become a thing to be gifted to the citizenry by a benevolent government or ruler, and so could also be taken away. The rights would then lose their essential function and purpose of protecting humans from (abuses of) state power. B.  International Human Rights Law As human rights violations injure society as a whole, as well as the individual victim,15 International Human Rights Law (IHRL) developed in order to provide ‘a common standard of achievement for all peoples and all nations’16 and to impose obligations17 upon states towards individuals within their jurisdiction. Although the instruments confirm that human rights are inalienable, from its conception IHRL arguably moved away from the philosophical roots of the human rights concept as many legal human rights instruments allow for the derogation of rights in times of p ­ ublic emergency.18 The instruments themselves contain a ­contradiction—the rights belong to all, by virtue of being human, in order

13 

UDHR Preamble. eg Bentham describing the concept of human rights as ‘nonsense on stilts’ JA ­Bentham, ‘Critical Examination of the Declaration of Rights’ in J Bowring (ed), The Works of Jeremy Bentham Vol 2 (New York, Russell and Russell, 1962); M Cranston, ‘Are There Any Human Rights?’ (1983) 112(4) Daedalus 1; Cf American Declaration of Independence (4 July 1776) holding ‘that all men are created equal’ and ‘are endowed … with certain unalienable Rights … among these are Life, Liberty and the pursuit of Happiness’. www.archives.gov/ exhibits/charters/declaration_transcript.html. 15  D Shelton, Remedies in International Human Rights Law (Oxford, Oxford University Press, 2006) 48. 16  UDHR Preamble. 17  Voluntarily accepted by states signing the relevant IHRL treaties. 18 See, eg the 1950 Convention for the Protection of Human Rights and Fundamental ­Freedoms (European Convention on Human Rights, as amended) (ECHR) Article 15(1): ‘In time of war or other public emergency threatening the life of the nation any High Contracting Party may take measures derogating from its obligations under this Convention …’ and ICCPR Article 4(1): ‘In time of public emergency which threatens the life of the nation and the existence of which is officially proclaimed, the States Parties to the current Covenant may take measures derogating from their obligations under the present Covenant …’ and the American Convention on Human Rights, ‘Pact of San Jose’ (signed 22 November 1969 in Costa Rica) (ACHR) Article 27(1): ‘In time of war, public danger, or other emergency that threatens the independence or security of a State Party, it may take measures derogating from its obligations under the present Convention to the extent and for the period of time strictly required by the exigencies of the situation, provided that such measures are not inconsistent with its other obligations under international law and do not involve discrimination on the ground of race, color, sex, language, religion, or social origin.’ 14 See,

Terrorism: A Threat to Security? 211 to protect ­individuals from the state, but a state may assess and declare a situation as being one that requires rights to be suspended.19 Nevertheless, some controls are provided within the human rights instruments and20 there are rights from which derogation is not permitted, under any circumstances, as to violate them is considered malum in se as opposed to malum prohibitum. The right to life21 and the right to be free from torture are two such rights22 and the prohibition is jus cogens and obligatio erga omnes—thus they are absolutely non-derogable.23 The arbitrary deprivation of life24 can be seen as the ultimate and ­complete violation of all human rights, as without a human life there can be no human rights. Torture also attempts to extinguish all human rights as it irrevocably alters the humanity of the victim as they are not treated as a human in possession of human rights and the violence visited upon their person can never be undone. Therefore, to arbitrarily deprive a ­person of their life or to propose to torture an individual is to assert that their characteristics are not the same as the other members of the category, their ‘value’ is less and they do not possess human rights. This presents an intractable problem if human rights are considered universal and inviolable. It would necessitate (at the minimum level) a two-tier s­ ystem with a ‘higher division’ of humans possessing all human rights, and a ‘lower ­division’ whose members possess only some (or maybe none).

19 

Article 15(1) ECHR; Article 4(1) ICCPR; Article 27(1) ACHR. eg Article 15(2) ECHR: ‘No derogation from Article 2, except in respect of deaths resulting from lawful acts of war, or from Articles 3, 4 (paragraph 1) and 7 shall be made under this provision’; Article 4(2) ICCPR: ‘No derogation from articles 6, 7, 8 (paragraphs 1 and 2), 11, 15, 16 and 18 may be made under this provision.’ The rights excluded are the right to life, prohibitions on torture and inhuman or degrading punishment, prohibitions on slavery and servitude and the principle of non-retroactivity. The ICCPR includes the right to freedom of thought, conscience and religion in the list of non-derogable rights. However, this is a right that can be restricted in certain circumstances and so does not require derogation. Article 18(3) ICCPR provides that ‘Freedom to manifest one’s religion or beliefs may be subject to such limitations as are prescribed by law and are necessary to protect public safety, order, health, or morals or the fundamental rights and freedoms of others.’ Again, the necessity for and extent of limitations on the right are essentially decided and assessed by the state. 21  WP Gormley, ‘The Right to Life and the Rule of Non-Derogability Peremptory Norms of Jus Cogens’ in BG Ramcharan (ed), The Right to Life in International Law (Leiden, Martinus Nijhoff, 1985). 22  E de Wet, ‘The Prohibition of Torture as an International Norm of Jus Cogens and Its Implications for National and Customary Law’ (2004) 15 European Journal of International Law 97. 23  MC Bassiouni, ‘International Crimes: Jus Cogens and Obligatio Erga Omnes’ (1996) 59 Law and Contemporary Problems 63. 24  ECHR Article 2(1) provides that ‘No one shall be deprived of his life intentionally save in the execution of a sentence of a court following his conviction of a crime for which this penalty is provided by law.’ Article 2(2) provides three occasions when death resulting from the use of force no more than absolutely necessary will not be considered in contravention to the Convention. 20  See,

212  Lydia Davies-Bright Human rights would thus lose their inherent characteristic of universality and would no longer be effective in helping to secure international peace and security.25 Members of the ‘lower division’ would not enjoy the same protections and freedoms as those in the ‘higher division’, making them ­vulnerable to abuse and also more likely to agitate for change.26 C.  The Inviolability of Human Dignity Revisited Since the signing of the UDHR, previously inviolable principles have been sidestepped or eroded27 as their purpose has seemingly been forgotten. In both the national and international spheres, numerous counterterrorism­measures have been implemented in order to meet new security demands,28 some of which provide politicians and law enforcement agencies with extraordinary powers.29 National governments have shown themselves as being willing to subordinate human rights in their pursuit

25 UDHR Preamble, the source of subsequent IHRL, provides that ‘recognition of the inherent dignity and of the equal and inalienable rights of all members of the human family is the foundation of freedom, justice and peace in the world’. 26  UDHR Preamble para 3. 27  C Gearty, Civil Liberties (Oxford, Oxford University Press, 2007) 49–58. 28  Fourteen universal legal instruments (with four amendments) have been enacted in an effort to prevent terrorist acts: Convention on Offences and Certain Other Acts Committed on Board Aircraft (signed in Tokyo on 14 September 1963); Convention for the Suppression of Unlawful Seizure of Aircraft (signed in The Hague on 16 December 1970) and its Protocol (signed in Beijing on 10 September 2010); Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation (with Final Act of the International Conference on Air Law held under the auspices of the International Civil Aviation Organization at Montreal in September 1971) (concluded in Montreal on 23 September 1971) (Montreal Convention); Convention on the Prevention and Punishment of Crimes Against Internationally Protected Persons, Including Diplomatic Agents (with Resolution 3166 (XXVIII) of the UNGA) (adopted by the UNGA on 14 December 1973); International Convention Against the Taking of Hostages (adopted by the UNGA on 17 December 1979); Convention on the Physical Protection of Nuclear Material (adopted in Vienna on 26 October 1979); Protocol to the Montreal Convention (concluded on 24 February 1988); Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation (concluded in Rome on 10 March 1988) and its first Protocol (concluded in Rome on 10 March 1988) and second Protocol (concluded in London on 14 October 2005); Convention on the Marking of Plastic Explosives for the Purposes of Detection (concluded in Montreal on 1 March 1991); International Convention for the Suppression of Terrorist Bombings (adopted by the UNGA in New York on 15 December 1997); International Convention for the Suppression of the Financing of Terrorism (adopted by the UNGA in New York on 9 December 1999); International Convention for the Suppression of Acts of Nuclear Terrorism (concluded in New York on 13 April 2005); Convention on the Suppression of Unlawful Acts Relating to International Civil ­Aviation (concluding at Beijing on 10 September 2010). UK legislation includes: Terrorism Act 2000; Anti-terrorism, Crime and Security Act 2001; Criminal Justice Act 2003; Civil Contingencies Act 2004; ­Prevention of Terrorism Act 2005; Terrorism Act 2006; Counter-Terrorism Act 2008. 29  See, eg the UK Civil Contingencies Act 2004 that provides for a Minister to be able to enact emergency regulations. These regulations have the potential power to temporarily override almost all other existing legislation.

Terrorism: A Threat to Security? 213 of national security30 and this action has created a tension between respect for human rights and satisfying perceived security requirements31 that needs to be confronted by the international community.32 This tension is arguably a result of the actions of states and individual governments, created in reality through the passing of new laws and measures that prioritise notions and perceptions of security above the protection of human rights. Although the existing legal and human rights framework provides for the prioritisation of security in times of public emergency, there is no requirement that human rights and respect for the integrity of the individual be subordinated to security concerns. By adopting a more utilitarian approach to security, states have moved away from a focus on the individual human person and so have felt more able to trade individual rights for greater collective security. However, pursuing a security strategy that places the universal respect for human rights at its centre would arguably be a more productive approach that would lead to an achievable level of peace and security,33 without the sacrifice of the very principles and values the security measures purport to protect. III.  THE STATE AND ITS NEED FOR SECURITY

A.  Concept of the State The concept of the state has been discussed and debated for centuries, but to no definitive end. However, one common theme is that the state arises as a natural or inevitable consequence of humankind’s social interaction. For Plato, the state was a naturally occurring phenomenon, establishing an ethical community founded on the maintenance of justice.34 Similarly, Aristotle held that ‘the state is both natural and prior to the individual’35 and ‘comes for the sake of life, and exists for the sake of the good life’.36 30 White House, ‘National Security Strategy of the United States of America’ (­Washington DC, White House, 2002) www.state.gov/documents/organization/63562.pdf in which it is stated that the defence of the nation ‘against its enemies is the first and fundamental commitment of the Federal Government’. Logically, this subordinates all other commitments, including human rights, to the needs and demands of national security. 31  ND White, ‘The United Nations and Counter-Terrorism’ in AM Salinas de Frías, KHL Samuel and ND White (eds), Counter-Terrorism: International Law and Practice (Oxford, Oxford University Press, 2012) 56. 32  A Cassese, ‘Terrorism is Also Disrupting Some Crucial Legal Categories of International Law’ (2001) 12 European Journal of International Law 993, 998. 33 WW Burke-White, ‘Human Rights and National Security: The Strategic Correlation’ (2004) 17 Harvard Human Rights Law Journal 249. 34 Plato, The Republic (translated by C Rowe) (London, Penguin Classics, 2012). 35 Aristotle, Politics: Books I and II (translated by TJ Saunders) (Oxford, Oxford University Press, 1995) I.21253a18–29 [3]. 36  Aristotle (n 35) I.21252b27–30 [3].

214  Lydia Davies-Bright Thus, the state has its origins in man who, being inherently social and political, is compelled to form families, which join to become villages, which then merge to become self-sufficient communities (states). In contrast, Locke and Rousseau advanced the ‘social contract’ theory,37 which places original man in a harmonious state of nature where every person had what they required in order to live. The social contract was necessitated by the need for an external authority to maintain peace and order and to preserve every individual’s rights due to an increase in property ownership and consequent rise in avarice. A group was chosen to govern and the people reserved the right to remove these governors from power if they broke the original contract. Hobbes’ concept of the ‘social contract’ was based on the belief that self-preservation and self-interest are inherent qualities of man and so it was natural for man to surrender his rights and freedom to a sovereign authority in order to gain protection and release from the terrible and dangerous state of nature.38 The idea that the state has its roots in nature and is a naturally occurring phenomenon is appealing and emotive. The idea that ‘the state is not an artificial restriction of liberty but [rather] a means of gaining it’ and is the natural goal towards which human life moves39 appeals to the imagination. The idea that the construction of the state is part of being human and is the social framework in which humanity can be liberated is a powerful one. Although there are significant differences in the philosophical perspectives outlined above, all have the state as an important and foundational aspect of human existence (notwithstanding Rousseau’s view that man is inherently asocial). Justifications for the socially constructed reality in which humankind now exists as being ‘natural’ or a logical consequence to (changes in) the natural state, allows for arguments that certain constructions of states are ‘more natural’ than others. Concepts of the final end state, to which humankind (apparently) journeys, is to be found in very particular political and social constructs, born from very definite philosophical roots.40 Nevertheless, despite the appeal of this concept of the state and the various concomitant philosophical arguments, all that can be said with certainty is that ‘the state’ is a sociological structure, meaning simply that it is a human construct (whether or not its origins are

37 J Locke, Two Treatises of Government and A Letter Concerning Toleration (edited by I ­Shapiro) (New Haven, Yale University Press, 2003); JJ Rousseau, The Social Contract (translated by M Cranston) (London, Penguin Classics, 2003). 38  T Hobbes, Leviathan (edited by CB MacPherson) (London, Penguin Classics, 1981). 39  WD Ross, Aristotle (London, Methuen, 1937) 239. 40  Eg, F Fukuyama, The End of History and the Last Man (New York, Free Press, 1992) arguing that liberal democracy was the final state for man and the apex of human development.

Terrorism: A Threat to Security? 215 a naturally occurring phenomenon) and is the collective external expression of a particular human group, which allows and facilitates the expression of that group41 internally and on the international stage. The traditional criteria for statehood are provided in Article 1 of the Convention on the Rights and Duties of States.42 The Montevideo Convention is an example of the state being seen as a sui generis legal identity, which exists and operates purely under its own power and authority, as demonstrated by the provision in Article 3 that ‘The political existence of the state is independent of recognition by the other states.’ This concurs with the philosophical perspectives that the state is a construct resulting from human interaction. A state can survive changes in its borders, occupation and even partition,43 but without a human population,44 there can be no state. This makes the maintenance of a permanent human population essential to state survival. Thus, a state has both a concrete45 and abstract46 form. The concrete state does not depend upon the presence of a coherent and effective government, which is able to exercise control over the defined territory, for its existence. The human population continues to exist, as does the physical landmass, regardless of any over-arching power structure. However, the power structure is what ultimately gives the state its personality and its ability to interact with other states—it is the abstract form of the state that requires protection and support in order to continue to exist.

41  Whether or not the state facilitates the expression of every member of the group is a discussion that lies outside the purview of this chapter. The question of (neo-liberal) democracy as a human right and as a suitable method of ensuring the social and political expression of every member of the populous, was discussed in L Davies-Bright, ‘Is There No Alternative to Democracy for Protecting Human Rights? Lessons from the Arab Spring’ (Presented at the 2013 HRLC Annual Student Conference, University of Nottingham) and L Davies-Bright, ‘Cake or Death? Democracy or …?’ (2012 PhD Seminar Series, University of Nottingham)— both available from the author on request. 42  (Montevideo Convention) ‘The state as a person of international law should possess the following qualifications: a permanent population; b) a defined territory; c) a government; and d) capacity to enter into relations with other states.’ 43  Poland ceased to exist as a separate state after partition in the eighteenth century and only came back into being after World War I. 44  The population does not have to be self-perpetuating, as demonstrated by Vatican City state. 45  The physical territory of the state as defined by its borders (whether geographical, as in a coastline, or constructed). Borders are subject to change and dispute, but that does not necessarily mean the end of that state (eg Poland, Egypt and Israel). 46  The control exercised by the state over its concrete form (eg by patrolling and protecting its borders), combined with the ability to establish institutions (such as an executive, a military and a judiciary) in order to coerce the resident human population.

216  Lydia Davies-Bright B.  The Nation State The dependence of the state upon groups of people for its existence gave rise to the ‘imagined political community’ of the nation47 and the idea that the cultural and ethnic identity of the people (the nation) coincides with the geographical and political entity (the state). Although there are often many commonalities, such as language, other features, such as cultural, religious and political practices, often differ within family units, between neighbours and amongst regions. The majority of the members of the community have no interaction with each other and will never meet, but nevertheless ‘consider themselves to form a nation’48 and are bound together in a deep, ‘horizontal comradeship’.49 The nation-state concept ignores the inherent differences that exist within all human groups and attempts to connect every individual by articulating an idea of ‘national identity’. This identity often ignores individual, sub-regional and regional differences and also ignores the commonalities that transcend state borders, engendering separation and a ‘them’ and ‘us’ mentality that is essential to the construction of the state. It is impossible to construct an internal ‘self’ without an external ‘other’.50 Nationalism ‘invents nations where they do not exist’51 and separates people along arbitrary lines. This perception that a group of people living within a defined physical territory is a homogenous unit (conceived of as a positive characteristic that should be maintained) has, arguably, led to a significant proportion of the wars and conflicts occurring since the decline of the Age of Empire during the end of the eighteenth and beginning of the nineteenth centuries.52 i.  Defending the Nation The fundamental concept of separating human groups along cultural and geopolitical lines justifies the defence of the nation/state group from the external ‘others’. Differences present a threat to group cohesion and expose the lack of uniformity, thereby creating a potential internal threat to the structure of the group. Thus, a certain degree of internal suppression and oppression of ideas and practices that run contrary to the group

47 

B Anderson, Imagined Communities (London, Verso, 2006) 6. H Seton-Weston, Nations and States: An Enquiry into the Origins of Nations and the Politics of Nationalism (Boulder, Westview Press, 1977) 5. 49  Anderson (n 47) 7. 50  D Campbell, Writing Security: US Foreign Policy and the Politics of Identity (Manchester, Manchester University Press, 1998). 51  E Gellner, Thought and Change (London, Verso, 1964) 169. 52  A Wimmer and B Min, ‘From Empire to Nation-State: Explaining Wars in the Modern World, 1816–2001’ (2006) 71(6) American Sociological Review 867. 48 

Terrorism: A Threat to Security? 217 i­dentity is also required.53 Speech acts maintain both the group identity and the differences between those who belong within and without the group. L ­ anguage is used to naturalise ‘a particular political and social order’ and to ‘construct and maintain a hegemonic regime of truth’.54 This is done in a variety of ways, in numerous forums55 and is designed to protect and preserve the group identity as manifested in the ­nation-state.56 As the state is now seen as being deeply connected to the natural state of humankind (perhaps even being the natural state) and so much of p ­ eoples’ individual identity and reason for being has become wrapped up in the concept of the nation to which they belong, it is of vital importance that the state is preserved. Thus, it is logical to suggest that the state operates with the preservation of its existence at the very core of all its actions (which is to be distinguished from the obligation on all states to protect the citizenry).57 The perceived need for a state to protect itself from threats has led to the development of the concept of state security. A state must protect itself (and the people on whom its existence depends) from threats and so is permitted, in international law, to defend itself against an attack.58 According to ‘official discourse’, the world is now

53  As demonstrated by UK Prime Minister David Cameron in his ‘Speech on Radicalisation and Islamic Extremism’ at the Munich Security Conference (5 February 2011) in which he argued that Muslim community groups must adhere to and uphold certain values in order to receive public funds. He also stated that certain values ‘define us as a society: to belong here is to believe in these things.’ webarchive.nationalarchives.gov.uk/20130109092234/http:// number10.gov.uk/news/pms-speech-at-munich-security-conference/. 54  R Jackson, ‘Constructing Enemies: “Islamic Terrorism” in Political and Academic Discourse’ (2007) 42(3) Government and Opposition 394, 397. 55  See eg, R Wodak, R de Cilla, M Reisigl and K Liebhart, The Discursive Construction of National Identity, 2nd edn (Edinburgh, Edinburgh University Press, 1999) for a discussion on the complex construction of national identity. 56  See eg, A Fisher, ‘Selling the Self: The Discursive Construction of Identities in the First UK Televised Prime Ministerial Debates’ (PhD Thesis, University of Nottingham, 2013) for a linguistic analysis of political discourse identifying the group (‘us’) and those who are outside it (‘other’). 57  R Nozick, Anarchy, State and Utopia (Oxford, Blackwell, 1974). 58 As demonstrated in various international materials: Article 1 ECHR imposes a duty on the contracting parties to secure the rights and freedoms contained within Section I for all in their jurisdiction; World Summit Outcome UNGA Res 60/1 (24 October 2005) UN Doc A/RES/60/1; UNSC Res 1674 (28 April 2006) UN Doc S/RES 1674; UNSC Res 1894 (11 N ­ ovember 2009) UN Doc S/RES/1894; UNSC Res 1970 (26 February 2011) UN Doc S/ RES/1970; UNSC Res 1973 (17 March 2011) UN Doc S/RES 1973; UNSC Res 2016 (27 ­October 2011) UN Doc S/RES/2016 in relation to Libya; UNSC Res 1975 (30 March 2011) UN Doc S/ RES/1975 in relation to Côte d’Ivoire; UNSC Res 2014 (21 October 2011) UN Doc S/RES/2014; UNSC Res 2085 (20 December 2012) UN Doc S/RES/2085; UNSC Res 2100 (25 April 2013) UN Doc S/RES/2100 in relation to Mali; UNSC Res 1996 (8 July 2011) UN Doc S/RES/1996; UNSC Res 2126 (25 November 2013) UN Doc S/RES/2126 in relation to Sudan; UNSC Res 2121 (10 October 2013) UN Doc S/RES/2121; UN Res 2127 (5 December 2013) UN Doc S/RES/2127; UNSC Res 2134 (28 January 2014) UN Doc S/RES/2134 in relation to the Central African Republic.

218  Lydia Davies-Bright a very different place and is facing a unique and unprecedented threat. The luxuries of the rule of law and due process can no longer be afforded.59 As asserted by former UK Prime Minister Tony Blair, a primary and central function of government is to ensure the safety of its citizenry above all else—even at the sacrifice of civil liberties and individual ­freedoms.60 In creating a shadowy, external61 enemy that is capable of infiltrating our communities and schools unseen and undetected,62 the political establishment is able to justify the implementation of exceptional measures to protect the public from the enemy that hides within. This plays on latent fears regarding non-integrated groups63 and feeds them back into society to create an idea of solidarity and ‘togetherness’ that appears to strengthen the political unit64 and sense of national identity and gives the impression that the state is fulfilling its function of protector. It also allows mainstream political discourse to ignore and dismiss any assertions that terrorists may have actual grievances and a basis for their anger and frustration.65 C.  The Meaning of Security The modern international community, which, for the purposes of international law, consists mainly of states and international organisations formed by states, was developed and constructed with the primary aim of securing and maintaining international peace and security.66 Despite being present in human rights instruments, which provide for the restriction of certain rights in the interests of national security,67 security is an

59 

Pickering, McCulloch and Wright-Neville (n 6) 7. Heard, ‘Using War on Terror to Flout Own Laws’ Gulf News (4 July 2006) http:// gulfnews.com/opinions/columnists/using-war-on-terror-to-flout-own-laws-1.243286. 61  In the sense that it does not adhere to the values and commitments by which the society in question is defined by its leaders, see UK Prime Minister David Cameron’s speech in Munich (n 53); Pickering, McCulloch and Wright-Neville (n 6) 5 on how non-integrated Muslims (those on the outside) pose a threat as they are innately hostile to ‘Western values’. 62  UK media coverage on the so-called ‘Trojan Horse’ plot to infiltrate UK schools with Islamic extremism, eg C Moore, ‘A Weak Establishment is Letting Islamists Threaten ­British Freedoms’ The Telegraph (18 April 2014) www.telegraph.co.uk/news/uknews/terrorismin-the-uk/10775118/A-weak-establishment-is-letting-Islamists-threaten-British-freedoms. html; Telegraph View, ‘We Must Confront the Challenge of Islamism’ The Telegraph (20 April 2014) www.telegraph.co.uk/news/religion/10775651/We-must-confront-the-challenge-ofIslamism.html. 63  Pickering, McCulloch and Wright-Neville (n 6) 5. 64  C Aradau and R van Munster, ‘Exceptionalism and the “War on Terror”: Criminology Meets International Relations’ (2009) 49 British Journal of Criminology 686, 690. 65  Pickering, McCulloch and Wright-Neville (n 6) 4. 66  UNC Preamble; B Simma and AL Paulus, ‘The “International Community”: Facing the Challenge of Globalisation’ (1998) 9 European Journal of International Law 266. 67  Eg Article 19(3)(b) ICCPR the exercise of the right to freedom of expression may be restricted ‘for the protection of national security or of public order’; Article 8(2) ECHR and 60  LS

Terrorism: A Threat to Security? 219 undefined term. The UN Charter (UNC), which preceded the international human rights instruments, was not substantively strong in terms of international law and rather placed ‘security’ as a discretionary concept at centre stage. In international law, security is generally perceived in terms of national and state security and Article 24 UNC is generally interpreted accordingly. Security can be generally defined as the condition of being protected from harm, the over-arching objective is to protect state sovereignty from a perceived existential threat. However, how those who warrant protection are distinguished and how the harm is identified is by political decision, rather than by legal definition. The term can be utilised to justify action and inaction on the basis that it is in the interests of the state in question to act or to refrain from action.68 Politicians often cite state or national security as a motivation and legitimisation of a particular action, which is usually accepted by the general population.69 The public narrative is now one in which violence by the state towards enemies is seen as being reasonable, acceptable and appropriate.70 However, it is important to ask exactly who/what is being protected and against whom/ what. The discourse around terrorism and counter-terrorism is a real exercise of state power and serves a clear political purpose.71 When a state purports to act in the name of security, yet undermines the principles and structures that offer protection to its population, the question arises as to exactly whose security is being protected. As the securing and protection of individual rights supports the maintenance of international peace and security,72 it logically follows that undermining, threatening and violating these rights will have a detrimental effect on the primary objective of the international community—maintaining and upholding international peace and security.

Article 8(2) Human Rights Act 1998 (UK): ‘There shall be no interference by a public authority with the exercise of [the right to respect for private and family life] except such as is in accordance with the law and is necessary in a democratic society in the interest of national security …’ 68 Eg UK Prime Minister David Cameron justified the actions of UK Government ­ ommunications Headquarters (GCHQ) on the basis of security and also the inaction of both C the UK Government and Parliament in response to the Snowden revelations, ‘The World at One’ BBC Radio Four (25 October 2013). 69  Eg the justification of GCHQ and National Security Agency (NSA) actions by politicians and security services and the condemning of whistle-blower Edward Snowden and the media outlets that facilitated his actions, claiming that they have endangered UK national security, A Sparrow, ‘Guardian Faces Fresh Criticism over Edward Snowden Revelations’ The Guardian (10 November 2013) www.theguardian.com/media/2013/nov/10/ guardian-nsa-revelations-edward-snowden. 70 R Jackson, Writing the War on Terrorism: Language, Politics and Counter-Terrorism (­Manchester University Press, 2005) 1. 71  Jackson (n 70) 2. 72  UDHR Preamble.

220  Lydia Davies-Bright D.  The Security Narrative Post-Cold War there has been a need to create a new meta-security ­narrative in order to maintain and extend existing (inter)national institutions and behaviours. As was the case during the Cold War, the global ‘War on Terror’, declared by the US and UK administrations in response to the events of 9/11, provides an over-arching conflict that supersedes other ‘securitisations’ between regions and states and frames the international security discourse.73 The developments and escalations in the political and legal approaches to terrorism can be viewed in this light. Former US President George W Bush utilised the emotive rhetoric of war74 and placed terrorism at the heart of Western national security imperatives. It became the lens through which subsequent state and non-state activity was viewed and enabled the move towards pre-emptive action in order to counter a particularly dangerous threat. Terrorism in the post-9/11 era is portrayed as presenting a threat peculiar to its epoch, with ‘challenges … qualitatively different from the past’.75 The US and UK have successfully ‘securitised’ the threat of (Islamic) terrorism through the identification of an external enemy so powerful and pervasive that almost any action that is perceived as necessary in order to maintain security can be legitimised. Although disquiet may be voiced over the more extreme activities, such as torture and targeted killings,76 these practices do not cease. Additionally, few challenge the qualitative or quantitative nature of the threat and the critical legal analysis of the actions of the international community has significantly reduced in potency in the post-9/11 era. By polarising the debate, equating dissent with support for terrorism77 and asserting the sovereign right of states to self-defence, the US and its allies were able to quell opposition and control the discussion, despite the lack of a Security Council determination that the events of 9/11 constituted an armed attack that justified a military response.78 73  B Buzan, O Wæver and J De Wilde, Security: A New Framework for Analysis (London, Lynne Rienner, 1998); B Buzan, ‘Will the “Global War on Terrorism” be the New Cold War?’ (2006) 82(6) International Affairs 1101. 74 Former US President GW Bush declared to the USA that ‘The search is under way for those who are behind these evil acts’ and ‘we stand together to win the war against ­terrorism’ Address to the Nation (12 September 2001) http://news.bbc.co.uk/1/hi/world/ americas/1539328.stm; Former US President GW Bush (n 1). 75 C Pantazis and S Pemberton, ‘From the “Old” to the “New” Suspect Community: Examining the Impacts of Recent UK Counter-terrorism Legislation’ (2009) 49 British Journal of Criminology 646, 650. 76  S Jenkins, ‘The Real Threat to Our Way of Life? Not Terrorists or Faraway Dictators, but our own Politicians and Securocrats’ The Guardian (27 August 2013); International Commission of Jurists (n 3). 77  Former US President GW Bush (n 1) ‘Every nation in every region now has a decision to make: Either you are with us or you are with the terrorists.’ 78 EPJ Myjer and ND White, ‘The Twin Towers Attack: An Unlimited Right to Selfdefence?’ (2002) 7 Journal of Conflict and Security Law 5, 7.

Terrorism: A Threat to Security? 221 The ‘securitisation’ of terrorism has infiltrated all levels and aspects of society and is now perceived as a self-evident truth that cannot be sensibly contradicted, in much the same way as the threat of Soviet power and nuclear weapons was seen as a reality. The Soviets presented a clear existential threat through the possible eradication by nuclear ­weapons. Although terrorists do not have such overtly destructive capabilities, the dangers posed by terrorists are portrayed as presenting a similar level of existential threat as the very fabric of civilisation, the ‘freedoms’ upon which society is built79 are challenged by people blowing themselves up. Despite the West seriously overestimating Soviet capability,80 it was known at the time that the USSR had nuclear weapons and functioning and equipped armed forces of significant size. In contrast, al-Qaeda is a disparate network of an indeterminate size and with limited resources and capability.81 Nevertheless, in response to the apparent threat post9/11, states introduced new domestic measures that often went beyond previous legislative limits.82 The use of the security narrative has since gained its own momentum and it has become seemingly impossible to stop as each contribution builds on the last. Human rights and democracy are presented as being under threat from terrorism and so are utilised in the support and promotion of the ‘securitisation’ of terrorism. Acts against terrorism are framed as being necessary to protect human rights and preserve democracy and to defend and protect ‘our way of life’.83 The security strategies are designed to prevent deviation from the politico-social norms through which our reality is constructed. The lack of a universally accepted definition of terrorism84 allows for a flexibility in labelling events and acts by disenfranchised groups and assists in the ‘securitisation’85 of the (counter-)terrorism process. ­Assigning the terrorism moniker de-legitimises an act, a group and any connected ideology—be it political, religious or a combination of both. It becomes seen as being ‘wrong’86 and so a dangerous and pervasive

79  Eg UN Global Counter-Terrorism Strategy UNGA Res 60/288 (20 September 2006) UN Doc A/RES/60/288: ‘terrorism … [is] aimed at the destruction of human rights, fundamental freedoms and democracy …’ 80 H Spruyt, Ending Empire: Contested Sovereignty and Territorial Partition (New York, ­Cornell University Press, 2005) 61. 81  J Bajoria and G Bruno, ‘al-Qaeda’ Council on Foreign Relations (6 June 2012) www.cfr. org/terrorist-organizations-and-networks/al-qaeda-k-al-qaida-al-qaida/p9126. 82  For an examination of post-9/11 counter-terrorism measures, see International Commission of Jurists (n 3). 83  ‘A Strong Britain in an Age of Uncertainty: The National Security Strategy’ (London, Cabinet Office, October 2010) 23. 84  International Commission of Jurists (n 3) 7. 85  Buzan, Wæver and De Wilde (n 73). 86  S Marks and A Clapham, International Human Rights Lexicon (Oxford, Oxford University Press, 2005) 346.

222  Lydia Davies-Bright threat, requiring measures that stretch or ignore previous standards.87 Post-9/11 terrorism is described as being rooted in religious fundamentalism, in a ‘perversion of a proud religion’,88 which serves to further delegitimise89 the actors through the depoliticisation, decontextualisation and dehistoricisation of their motivations.90 The perpetrators are portrayed as being irrational and so, logically, lacking in reason. Such claims instil and encourage fear in the recipient public, which also feed into pre-existing social and political concerns and ‘institutionalize fear of the enemy as the constitutive principle for society’.91 The successful92 securitisation of terrorism as an existential threat, as something coming from a nebulous and threatening ‘other’ that endangers the existence of Western civilisation in a manner akin to the USSR,93 has enabled governments to move beyond the politicisation of the concept, through the legalisation of responses, and to persuade their respective citizenries to accept previously unconscionable measures and derogations from human rights instruments in order to maintain security.94 This circumvention and violation of the very values anti-terrorism measures are purported to defend arguably fuels terrorism as governments are perceived as being hypocritical95 and self-serving. Terrorist events both

87  Views of the terrorist threat being exceptional/especially dangerous are used to justify normally prohibited responses, International Commission of Jurists (n 3) 18–27. 88  White House, ‘National Security Strategy of the United States of America’ (Washington DC, White House, 2006) 1 http://www.comw.org/qdr/fulltext/nss2006.pdf. 89  Representing the reason for the attacks as being rooted in the basic nature and identity of the terrorists and not in any socio-political basis, is an essential rhetorical move and removes the need for discussion, diplomacy and negotiation, Jackson (n 70). 90  Jackson (n 54) 421. 91  Aradau and van Munster (n 64) 689. 92  As evidenced by the continuing use of the term ‘terrorism’, and linking it with the terms ‘threat’ and ‘security’, by politicians and international organisations as a precursor to new action or measures. It appears to be self-evident and unquestioned that terrorism presents a threat to international peace and security and so justifies whatever measures are deemed necessary, Global Counter-Terrorism Strategy UNGA Res 60/288 (20 September 2006) UN Doc A/RES/60/288; Jackson (n 70) 3; S Wood, ‘Terrorism Biggest Threat to National Security, Officials Say’ US Department of Defense News (28 February 2006) www.defense.gov/news/ newsarticle.aspx?id=14735; P Parham (UK Ambassador), ‘Terrorism Continues to Pose a Grave Threat to International Peace and Security’ Statement to UNSC Meeting on Briefings by Chairmen of Subsidiary Bodies of the Security Council (10 May 2013) www.gov.uk/government/ speeches/terrorism-continues-to-pose-a-grave-threat-to-international-peace-and-security. 93  Buzan (n 73). 94  See, eg the infamous Belmarsh Case (A and others v Secretary of State for the Home Department [2004] UKHL 56) where nine non-British nationals were held under the Anti-terrorism Crime and Security Act 2001, Part 4 of which allowed for their indefinite detention, without trial, on the basis that they posed a potential threat to UK national security. 95  MC Bassiouni, ‘Legal Control of International Terrorism: A Policy-Orientated Assessment’ (2002) 43 Harvard International Law Journal 83, 103; individuals are only vulnerable to the bifurcation of the world into good/evil, light/dark once they are convinced that the state is no longer legitimate, E Sprinzak, ‘The Process of Delegitimization: Towards a Linkage Theory of Political Terrorism’ (1991) 3(1) Terrorism and Political Violence 50, 56–57.

Terrorism: A Threat to Security? 223 prior to and post 9/11 demonstrate that terrorism is a phenomenon likely to come from within the society that experiences the attack.96 Thus, the governments and security services are able to utilise events to suit the securitisation narrative at the expense of the articulation of a coherent and collective legal response that is workable in all jurisdictions, across all national systems and that takes account of the different perspectives on the phenomenon of terrorism. The securitisation of terrorism enables the militarisation of the response to terrorism and is at its foundation. If terrorism is not seen through a security, and so military, lens, then the military response cannot be justified. Similarly, the securitisation of terrorism allows politicians and security agencies to paint the criminal justice paradigm as being inadequate to deal with this peculiar threat by itself and so warrants a relaxation of safeguards designed to protect the suspect in a criminal process.97 Law enforcement techniques are used (although modified by security concerns, such as with the use of secret trials), but securitisation creates the expectation that the use of the military, at the discretion of the executive, is both necessary and legitimate. IV.  THE ORIGINS IN ETHICS OF HUMAN RIGHTS

A.  The Repositioning of Human Rights on the Moral Field Post-9/11, governments and commentators began to argue for a re-visiting­of some of the most fundamental principles upon which the international community stands in response to the perceived change in reality and the development of a peculiar threat.98 With the development of international criminal law and the individualisation of the responses to terrorism, through the use of measures such as terrorist proscription lists, international law has been refocused on the individual as a wrongdoer, as well as a holder of rights. The representation of the terrorists as essentially

96  See, eg the Oklahoma bombing in the US in 1995 and the IRA bombings and attempted bombings in the UK and Northern Ireland 1969–2014 where the perpetrators were citizens of the target states. 97  Eg, in the UK, persons believed by the Home Secretary to have engaged in terrorismrelated activity can be made subject to Terrorism Prevention and Investigation Measures (TPIMs). These are imposed upon the individual without a judicial process, without conviction and without the person being able to answer (or even know) the allegations made against them. Terrorism and Preventative Measures Act 2011. 98 C Gearty, ‘The Superpatriotic Fervour of the Moment’ (2008) 28 Oxford Journal of Legal Studies 183; P Sands, Torture Team: Rumsfeld’s Memo and the Betrayal of American ­Values (New York, Palgrave, 2008) detailing how the fundamental concept of the nation as an ‘intrinsically virtuous’ endeavour and the ‘unprecedented challenges’ facing the US led to the displacement of foundational values in favour of security; Greenberg and Dratel (n 5).

224  Lydia Davies-Bright evil99 enables the individuals to be conceptualised as less than human and so not deserving of the same legal safeguards as law abiding citizens.100 Thus, the current practice of certain states in dealing with suspected ­terrorists can be viewed as part of the ongoing debate as to whether consequentialism or deontology is the ‘supreme principle of morality’101 that should guide action. B. Consequentialism Consequentialism posits that only the consequences of an act have intrinsic value. Thus, a moral agent is obliged to choose that act which will result in the best outcome. Utilitarianism,102 as propounded by Jeremy Bentham103 and John Stuart Mill,104 is the most significant consequentialist position as its impact transcends its historical epoch and is evident in modern p ­ ublic policy105 and philosophical thought. The unit of measurement is happiness, only this has intrinsic value. Other acts or things may only have instrumental value insofar as they assist in maximising happiness. For a utilitarian, the best consequences are those maximising happiness (­utility) over pain (disutility). Thus, when faced with a choice of two courses of action, the utilitarian will consider the possible consequences and will choose the act that will either maximise utility or minimise disutility. In its absolute form, utilitarianism holds that the happiness of each and every person is of equal value or worth, which coincides with the philosophical foundation of the modern human rights movement. However, each person also has a ‘social utility’ in terms of their contribution to their family, community and society as a whole. The death of a person with many friends and a large family will cause a significant degree of unhappiness for many people, whereas the death of a hermit or recluse will not be so keenly felt. Thus, the utilitarian measure of a person’s life becomes a form of costbenefit analysis in which the matrix of the individual’s personal relationships and social and economic aspects of being are assigned utility values, which are then aggregated. A person occupying a powerful position, such

99  White House, ‘National Strategy for Combating Terrorism’ (Washington DC, White House, 2003). 100  Sands (n 98). 101  I Kant, The Moral Law; Groundwork for the Metaphysics of Morals (translated by HJ Paton) (London, Routledge, 1991). 102  For ease of discussion, the form of utilitarianism used will be act utilitarianism. 103  Bowring (n 14). 104  JS Mill, Utilitarianism, Liberty, Representative Government (London, JM Dent and Sons Ltd, 1962). 105  As shall be seen below, it is arguably used in assessing the virtue of acts in the context of counter-terrorism.

Terrorism: A Threat to Security? 225 as the US President, could effectively become immune or untouchable as the negative political and economic effects of their death would outweigh any wider positive effects in most imaginable circumstances. C. Deontology For the deontologist the consequences of an act are also relevant, but other things have intrinsic value. In direct contrast to utilitarianism, which views humans as vessels for experiencing happiness,106 in deontology human beings are intrinsically valuable and are to be viewed as ends in themselves, as opposed to mere means to an end.107 In pure deontological terms, acts should be performed from a sense of duty. If there is no moral duty informing the act, then the act is not the correct moral choice. Deontology may be viewed as the secularisation of Judeo-Christian theology for the post-enlightenment era. It is on this ideology that the modern conception of ‘the West’ as an identifiable civilisation and socio-political construct stands. However, the security imperative necessitates the taking of an approach that places less emphasis on the individual. This is perhaps the centre of the conflict between the human rights concept of each person being vested with inviolable dignity and the reality of security and politics. Human rights law is the result of the compromise between the two sides. D.  Consequentialism v Deontology Under utilitarianism, the objective is to maximise utility and so the taking of one (or more) life or the torture of an individual can be morally justified if overall utility is increased. The utility gained by the saving of many (innocent) peoples’ lives overrides the value of the one (guilty) individual. In consistent deontology, human rights are activated by the presence of ‘one’ and thus the numbers count contrariwise. The presence of one human being possessing inviolable human rights bars certain actions. Nonetheless, in pursuing security from terrorism states have violated both the right to life and the right to freedom from torture in order to protect the state and its citizenry from the terrorist threat. This raises the question of whether human rights can ever be deactivated, such as in the case of (suspected) terrorists or other criminals and, if they can, what the consequence would be for individual human rights and international peace and security. 106  107 

MS Moore, ‘Torture and the Balance of Evils’ (1989) 23 Israel Law Review 280. Kant (n 101).

226  Lydia Davies-Bright The debate between consequentialism and deontology is important to an assessment of the effect of the widening of the perceived threat to security posed by terrorism as it informs the perception of the value of an individual human being, which in turn informs the responses to the existential threat. The arguments are muddied as the justifications for responses to terrorism are usually a hybrid of both. However, taken on the basis of either one, the argument does not make sense on its own terms as ­security is still undermined by the actions purporting to increase it due to the threat to and infringement of individual human rights. This is explored further in the following section, which will show that the individual is less safe—human rights are undermined and maximum happiness cannot be achieved. V.  THE CONSEQUENTIALIST WAR AGAINST TERRORISM

The idea that there was a natural state, as outlined above, feeds the concept of a natural law—a pre-existing order, a ‘rightness’ that transcends all epochs, is universally applicable and intellectually comprehensible. It is not, as the Greek Sophists maintained, merely the manifestation of the opinions and desires of the politically dominant class. In natural law, justice, like the state, is natural, is knowable and is an inherent quality of being human. A.  A Just War Against Terrorism Just war theory was developed in order to address the intractable problem of how to take human life in a morally permissible manner. Rooted in Greek, Roman and Catholic philosophy, the theory enables the justification of armed conflict against another.108 The purpose of a just war was to reclaim the res that had been unjustly taken, such as territory, and so the war was over at the point where this aim was achieved.109 The original seventeenth century tripartite conceptions of just war theory involved Vitoria’s jus vitoriae, which directed the victor’s actions and prevented an assumption of unlimited rights over the defeated territory and/or ­people.110 However, the third stage was consumed by the bipartite conception that gained dominance during the nineteenth century. Victorian

108 

M Walzer, Arguing About War (New Haven/London, Yale University Press, 2004) 3. Neff, ‘Conflict Termination and Peace-Making in the Law of Nations: A Historical Perspective’ in C Stahn and JK Kleffner, The Jus Post Bellum: Towards a Law of Transition from Conflict to Peace (The Hague, TMC Asser Press, 2008) 79. 110  Neff (n 109) 79. 109  SC

Terrorism: A Threat to Security? 227 legal positivism preferred to focus on jus ad bellum, jus in bello and then a form of victor’s justice.111 The view that war can be just and necessary, even though the taking of human life is basically wrong, is still prevalent today. Through political rhetoric, the actions of states against (alleged) terrorist actors is placed within a just war framework. The idea that ‘we’ (the good) are protecting ‘our way of life’ and ‘our values’ from ­terrorists (the bad) is used as a self-evident justification, which cannot be ­questioned.112 The modern ‘just war’ against terrorism has been combined with the utilitarian approaches of the security and military paradigms as the ends (preserving the status quo) which justify the means (such as ­killing or torturing suspected terrorists). However, this is arguably a perversion of the utilitarian concept as it is clear from state actions that it is the happiness of a small section of the world’s population that counts. In its pure form, utilitarianism counts human happiness, irrespective of the socio-political status of the human in question. In the attack on the Twin Towers, a relatively small number of people died in comparison to the numbers who have died in military actions since. Additionally, n ­ umerous people have been detained, interred and tortured without access to, or respect for, due process and legal safeguards. Under a utilitarian approach, the individual is sacrificed for the greater good. In the post-9/11 epoch, the greater good appears to mean the good of those who are considered to be with the West, rather than on the side of the terrorists (or somehow associated, by design or by accident, with the terrorists—as in the case of Jean Charles de Menezes). This appears to add weight to arguments that in reality law has no place in war, whether real or rhetorical,113 and that the idea of a just war is fictitious or simply fanciful thinking114 aimed at soothing the restless conscience. B.  The Montreal Convention and Lockerbie Case The origins of the modern ‘war on terror’ and its concomitant threat to the individual can be traced back to the Lockerbie bombing case. In response to the bombings and Libya’s refusal to extradite the two suspects, the UK and US chose to bypass the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation,115 which provided an i­ nternational 111 

Neff (n 109) 81–83. eg UN Global Counter-Terrorism Strategy (n 79); US National Security Strategy (n 30 and 88); UK Security Strategy (n 83). 113  Bush declared ‘war on terror’ in response to the 9/11 attacks, but this war was never officially declared, former US President GW Bush (n 1). 114  Walzer (n 108) 10–13. 115  Signed at Montreal, Canada on 23 September 1971 (Montreal Convention). 112  See,

228  Lydia Davies-Bright mechanism for states to deal with the criminal use of explosives on aircraft, and instead pursue action through the UN ­Security Council (UNSC). This action set the precedent for later responses to t­errorist activity and the post-9/11 era’s War on Terror. The Montreal Convention was the third significant international antiterrorism treaty116 enacted to suppress the increase in terrorist and violent activities by various political groups and non-state actors and is one of the UN Conventions on Terrorism.117 The treaties were enacted in order to tackle specific threats caused by the violent acts of various political groups operating during the latter half of the twentieth century. Civil ­aviation was an area that presented particular vulnerabilities and the treaty regime was implemented in response to actual events. This method of confronting terrorism created a legitimate legal system based on states parties agreeing to the obligations of the various treaties. That the threat was present was demonstrated by the fact that an event of, or similar to, the activities defined within the treaty had actually occurred. However, law is only effective when it is adhered to and utilised. The Montreal ­Convention became the centre of a dispute between the US, UK and Libya and ­demonstrates the ineffectiveness of law in controlling and restricting power when those wielding the power refuse to be so bound. i.  Lockerbie Bombing On 21 December 1988, Pan Am Flight 103, bound for New York, exploded over the southern Scottish town of Lockerbie, killing all 243 passengers and 16 crew members on board, plus 11 people on the ground.118 As the ­majority of passengers on board the aircraft were US citizens, the FBI joined the Scottish police in conducting a three-year investigation. On 13 ­November 1991, the Lord Advocate of Scotland issued ­warrants, on charges of murder, conspiracy to murder and contravention of the ­Aviation Security Act 1982 (UK), for the arrest of Abdelbaset Ali al-Megrahi (a ­ Libyan intelligence officer) and Lamin Khalifa Fhima (­Libyan Arab Airlines station manager to Luqa Airport in Malta). The US also issued charges against the two suspects on the same day. The charges centred on the allegation that the suspects had placed a bomb on board the flight that then exploded and caused the plane to crash. The Libyan

116  The first two being: Convention on Offences and Certain Other Acts Committed on Board Aircraft 1963; Convention for the Suppression of Unlawful Seizure of Aircraft 1970. 117  See n 28. 118  Facts taken from Questions of Interpretation and Application of the 1971 Montreal Convention Arising from the Aerial Incident at Lockerbie (Libyan Arab Jamahiriya v United States of ­America; Libyan Arab Jamahiriya v United Kingdom) (Application Instituting Proceedings) [1992] ICJ Rep.

Terrorism: A Threat to Security? 229 ­ overnment denied any ­involvement in the events leading to the incident G and was not willing to surrender the accused or to admit general involvement in terrorist activities. As the suspects were present on Libyan territory, the Libyan Government sought to rely on the ‘extradite or prosecute’ formula of the Montreal Convention 1971, to which all the states involved were parties. On 30 December 1991, the UK and US issued a joint declaration, circulated to the UN General Assembly (UNGA) and UNSC, stating that ‘Libya must surrender for trial all those charged with the crime’.119 France requested that Libya (inter alia) produce material evidence in the enquiry following the bombing of Union de Transport Aeriens (UTA) flight 772, which had exploded over Niger in September 1989.120 The states also issued a declaration on terrorism and requested that Libya comply with their demands.121 In January 1992, Libya attempted to call a special assembly of the UNGA denying UNSC competence in the matter and invoking the dispute settlement provisions in Article 14 of the Montreal Convention. On 2 January 1992, the UK and US began to seek support for a UNSC resolution calling on Libya to comply with their demands. The UNSC passed Resolution 731 on 21 January 1992, urging Libya to provide a ‘full and effective’ response to the ‘requests’ of the UK and US.122 Together with requests for an indication of provisional measures of protection, Libya filed separate applications against the UK and US at the International Court of Justice (ICJ), invoking Article 14 of the Montreal Convention 1971 as the basis, claiming that the UK and US were attempting to bypass the provisions (and obligations) of the Convention by seeking sanctions. Libya claimed that it had sought the co-operation of the two states in conducting an investigation into the incident and the alleged offences, but had received no response.123 The UK and US resisted ­Libya’s application to the ICJ to resolve jurisdictional issues and claimed that Libya had not tried arbitration. Three days after the completion of oral hearings on Libya’s request for provisional measures, the UNSC adopted UNSC Resolution 748124 under Chapter VII of the UN Charter imposing sanctions on Libya for failing to comply with UNSC Resolution 731 1992, which urged Libya to ‘provide a full and effective response’ to the requests of the UK and US. The UK and US appear to have been determined from the beginning of the process to involve the UNSC should Libya refuse to comply with

119 

A/46/827 S/23308 (1991). A/46/825 S/23306 (1991). 121  A/46/828 S/23309 (1991). 122  UNSC Res 731 (21 January 1992) UN Doc S/RES/731. 123  Libyan Arab Jamahiriya v United States of America (n 118). 124  UNSC Res 748 (31 March 1992) UN Doc S/RES/748. 120 

230  Lydia Davies-Bright their demands made through diplomatic channels. The use of the UNSC’s Chapter VII powers in this context is questionable as the bombing had already occurred and there was no concrete evidence or real suggestion that another was imminent.125 In the ICJ Judgment, Judge Bedjaoui (dissenting) questioned the validity of asserting a threat to international peace and security in 1992 when the Lockerbie bombing had occurred in 1988 and also pointed to the lack of evidence provided to the UNSC.126 The Resolution required Libya to extradite the two suspects, contrary to Article 7 Montreal Convention 1971, which provides that the state where the alleged offenders are found is responsible for prosecuting them127 (the decision is taken in the same way as under national law), and was attempting to coerce Libya into compliance. The UK and US wished to prosecute the suspects. Article 5 Montreal Convention 1971 gave the UK jurisdiction as the event took place on its territory and the US jurisdiction as it involved a US aircraft and US citizens. After lengthy negotiations and a change in the international mood (caused by the perceived intransigence of the UK and US), the states agreed to a trial of the two Libyan suspects by a Scottish court sitting in The Hague. UNSC Resolution 1192128 stated that sanctions would be suspended when the accused were handed over for trial and other ­conditions129 were met.130 Libya formally admitted responsibility for the Lockerbie bombing in a letter to the president of the UNSC in 2003, stating that it ‘accepted responsibility for the actions of its officials’.131 However, it has subsequently been claimed that Libya’s actions were motivated by a desire to see the sanctions removed as they were producing devastating consequences for the Libyan people and economy.132 125  Article 39 UNC provides for an invocation of Chapter VII powers if there is a threat to international peace and security. 126  L Davies-Bright and ND White, Case Concerning Questions of Interpretation and Application of the 1971 Montreal Convention Arising from the Aerial Incident at Lockerbie (Libya Arab Jamahiriya v. United States of America), Request for the Indication of Provisional Measures, Order of 14 April 1992, 1992 ICJ Reports 114 in IF Dekker, C Ryngaert, RA Wessel and J Wouters (eds), Leading Judicial Decisions of the Law of International Organizations (Oxford, Oxford University Press, 2015 (forthcoming)). 127  Article 7 Montreal Convention 1971. 128  UNSC Res 1192 (27 August 1998) UN Doc S/RES/1192. 129  Making evidence and witnesses available to the court upon request for the purposes of the trial (para 4). 130 On the establishment of this court, see A Aust, ‘Lockerbie: The Other Case’ (2000) 49 International and Comparative Law Quarterly 278. On the results of the Hague trial, see SD ­Murphy, ‘Verdict in the Trial of the Lockerbie Bombing Suspects’ (2001) 95 American Journal of International Law 405. 131 ‘Libya Letter: Full Text’ BBC News (16 August 2003) http://news.bbc.co.uk/1/hi/ scotland/3155825.stm. 132  Eg Saif al-Gaddafi said that Libya had admitted responsibility in order to see the trade sanctions removed, ‘The Conspiracy Files: Lockerbie’ BBC Two (31 August 2008). Libyan Prime Minister Shukri Ghanem stated that Libya had paid compensation as the ‘price for peace’ and to secure the end of sanctions, BBC Radio Four (24 February 2004).

Terrorism: A Threat to Security? 231 There are several difficulties with the actions of the UK and US in dealing with the matter of the Lockerbie bombing suspects. Arguably, the two states were able to utilise their P5 UNSC position to further their own political and national agendas. The states made explicit demands from the start of the process and seemed determined to involve the SC if their demands were not met. Under Article 5(2) Montreal Convention 1971, Libya had the legal right, as the two men were on Libyan territory, to try the suspects in a domestic court and under its domestic law. The UK and US relied on Article 103 UNC133 in seeking a SC resolution and thereby circumventing the established treaty regime. However, although Article 103 UNC gives UNSC resolutions primacy over pre-existing international obligations in terms of obligations, it does not provide that such resolutions are supreme and unquestionable. As the UNSC is not subject to effective judicial scrutiny, influential states are able to disregard the provisions of international law to suit their particular and perceived (political) needs. This arguably undermines the process of international law. Additionally, the UNSC arguably breached its own human rights obligations and Articles 1(3) and 24(2) UNC134 by imposing sanctions that resulted in a great deal of suffering for the Libyan people. The case of Lockerbie highlights the weaknesses of the international response to the threat of terrorism and exposes how political constructions of justice are prioritised over the maintenance and application of established legal mechanisms. The assertion by the US and UK that Libya was directly responsible for the bombing became accepted as fact and all actions proceeded from that basis. The Montreal Convention was seen as being an ‘ineffective’ method of confronting state-sponsored terrorism and for extraditing the suspects.135 However, extradition is one of two options available to a state—the Montreal Convention does not compel extradition. In signing the Montreal Convention, the states have accepted the option of prosecution according to each signatory state’s criminal justice system. Thus, providing that the state in question carries out the judicial process in accordance with its own national criminal system, this is sufficient to ­satisfy the requirements of the Convention and international law. The Convention allows for states to prosecute suspects present on their own soil. The assertion that a state prosecuting an individual who was acting

133  Resolutions of the UNSC override pre-existing international legal obligations in terms of UNC obligations. 134  To act in accordance with the purposes and principles of UNC. 135  JA Frank, ‘A Return to Lockerbie and the Montreal Convention in the Wake of the ­September 11th Terrorist Attacks: Ramifications of Past Security Council and International Court of Justice Action’ (2002) 30(4) Denver Journal of International Law and Policy 532, 544.

232  Lydia Davies-Bright as an organ of the state ‘would not be a satisfactory solution’136 seems to confuse what may be felt to be politically ‘right’ with the legal process and arguably involves a value judgment being made in regard to the v ­ alidity of a particular state’s criminal process. It is possible for the judicial process to proceed, notwithstanding political orders behind the individual’s actions. Should it be found that the person was acting on the basis of executive orders, is it fair and just that the individual in question be incarcerated for being the person physically performing the act of the state? Prosecuting individual persons does not confront the underlying issue as those in positions of power remain in situ and capable of similar actions— wherever that prosecution may take place. Of course, this does not take into account that both the US and UK appear to have pre-determined Libya’s culpability in the matter, as indicated through the language of the UNSC resolutions, which raises fair-trial concerns of a different nature. However, a thorough examination of the case lies outside the purview of this chapter. Suffice it to say here, the international community had the opportunity to utilise one of the legal instruments enacted for this very purpose. Instead, the actions of the states involved side-lined the Convention and set a precedent for future responses. ii.  From Specific to General Threat Prior to 9/11, terrorism was dealt with on a more case-by-case basis, as with Lockerbie, and international instruments were enacted to respond to specified threats. The international community dealt with apparent issues and specific problems, rather than abstracts.137 The current approach is far more general and all encompassing—‘terrorism’ and ‘Islamic e­ xtremism’, though widely used terms, are too abstract and ill-defined to have any clear, unambiguous meaning. The Lockerbie case demonstrates that the criminal justice approach of the Montreal Convention is unenforceable in the face of the political power wielded by Western states. The states involved (USA, France and UK) were able to utilise the Chapter VII power of the UNSC in order to bring sufficient pressure to bear on Libya to hand over the two suspects and to bring about a result that suited their political and security agendas. The states made the conscious decision to follow a different path and to not pursue the process laid out by the C ­ onvention. In so doing, they arguably undermined the criminal justice approach, the aut dedere aut judicare provisions of the 1971 Convention, and made it

136  Case Concerning Questions of Interpretation and Application of the 1971 Montreal Convention Arising from the Aerial Incident at Lockerbie (Libya Arab Jamahiriya v United Kingdom) (Request for the Indication of Provisional Measures: Order) [1992] ICJ Rep 3, Dissenting opinion of Judge Bedjaoui, 37. 137  See, eg the treaties on hijacking from the 1970s–80s (n 28).

Terrorism: A Threat to Security? 233 appear ‘cumbersome’ and ‘ineffective’.138 This then acts as a foundation for a tougher, more universal legislative response in the form of UNSC resolutions that compel all states to act within the preferred framework, by utilising Article 103 UNC, and help to politically justify military responses in the face of non-compliance. Numerous domestic legal instruments exist that provide for the ­outlawing of a range of behaviours that could endanger other citizens. In the UK the behaviour of those wishing to support or promote terrorism has been legislated for since the 1861 Accessories and Abettors Act (as amended).139 This covers behaviour such as supplying the information, equipment or weaponry for the performance of a criminal act140 or the instigation, incitement141 or encouragement142 of an offence. A person is considered an accessory to the offence if they have persuaded the perpetrator to commit the act.143 Thus, it can be seen that, in the UK at least, the criminal law provided for situations such as where A purchases the requisite equipment to enable B to build a bomb and plant it/explode themselves in a public place, or where A encourages B to commit an offence by persuading them of its necessity within a wider campaign. However, despite the existence of a plethora of domestic statutes covering a vast array of offences generally committed by terrorists,144 the War on Terror has allowed the UK Government, and others, to categorise the criminal law as being insufficient to tackle and defeat the emerging threat.145 Politicising offences prosecutable under criminal law and including the ­motivating ideology in the establishment of the requisite mens rea may further exacerbate the sense of disenfranchisement and grievance that

138 ND White, ‘Terrorism, Security and International Law’ in A Hehir, N Kuhrt, and A Mumford, International Law, Security and Ethics (London, Routledge, 2011) 11. 139  Section 8 ‘Whosoever shall aid, abet, counsel or procure the commission of an indictable offence is liable to be tried, indicted and punished as a principle offender.’ 140  Which would come under ‘aiding’, R v Bainbridge [1960] 1 QB 129. 141  Which would fall under ‘abetting’ and may include acts as innocuous as demonstrating support or approval, Wilcox v Jeffrey [1951] 1 All ER 464. 142  Which is covered by ‘counselling’ and need not be significant, R v Giannetto [1997] 1 Cr App R 1. 143  A causal link between the persuasion (in whatever form) and the offence committed is required, Attorney General’s Reference (No. 1 of 1975). 144  Eg hostage-taking, Taking of Hostages Act 1982; various acts relating to the endangerment of aircraft and hijacking, Aviation Security Act 1982; racially-aggravated arson (endangering life), Crime and Disorder Act 1998; aggravated criminal damage, aggravated arson and arson, Criminal Damage Act 1971; hijacking of ships, Aviation and Maritime Security Act 1990; possession of a firearm with intent to endanger life and/or cause fear of violence, Firearms Act 1968; genocide, crimes against humanity, war crimes and related offences, International Criminal Court Act 2001; offences against the international protection of nuclear material, Nuclear Material Offences Act 1983. 145  B Dickson, ‘Law Versus Terrorism: Can Law Win?’ (2005) 1 European Human Rights Law Review 11.

234  Lydia Davies-Bright increases the ­possibility of radicalisation and a move towards violence.146 The ­conviction of Abu Hamza al-Masri in 2006 of offences under the Offences Against the Person Act 1861 and the Public Order Act 1986 demonstrates the effectiveness of pre-existing criminal legislation in effecting prosecution of those encouraging or inciting ideologically motivated acts. The international legal regime contains numerous instruments, of which the Montreal Convention 1971 is one, that could be utilised to greater effect in countering transnational activities and events. However, rather than upholding and utilising the existing criminal justice regime, thereby strengthening it through its use and also paying due regard to the philosophical foundations of human rights, states have chosen to utilise the military paradigm. The war rhetoric and the language of fear have been used to justify the exceptional measures introduced post-9/11 and to press upon the Western public that action is necessary and essential to ensure the safety of civilians and national and international security.147 There is a general consensus that national and international actions are both necessary to contain and eradicate the threat of terrorism148 and 9/11 has come to be defined and seen as a crime against humanity.149 This has led to the acceptance of domestic legislation curtailing individual rights and extraordinary international responses, such as military invasion, targeted killings, drone strikes, arbitrary detention and torture. UNSC Resolution 1373150 legislates for all forms of terrorism and shows a further broadening of the approach from specific threats to a more general, abstract approach—all acts of terrorism are deemed to be threats to international peace. Theoretically, this would absolve states and the UNSC from making judgements that some events are, but others are not, threats to the peace. However, there still needs to be a political determination that an act or event is terrorist in nature. In passing Resolution 1373, the UNSC is here performing a general, legislative function. Although provisions in UNC151 arguably gives the UNSC power to behave in such a way, it bypasses the normal system, function and creation of international law. The broad provisions and lack of definitions essentially allow states to interpret the provisions of Resolution 1373 in ways suited to their own domestic policies and concerns and so raises fundamental human rights

146  HM Government (UK), ‘Countering International Terrorism: The United Kingdom’s Strategy’ (July 2006) 10. 147  Cassese (n 32) 993. 148 J McCulloch and S Pickering, ‘Pre-Crime and Counter-terrorism: Imagining Future Crime in the ‘War on Terror’’ (2009) 49 British Journal of Criminology 628, 629 and 636; Pantazis and Pemberton (n 75) 650–51. 149  Cassese (n 32) 994–95. 150  UNSC Res 1373 (28 September 2001) UN Doc S/RES/1373. 151  Articles 25 and 103.

Terrorism: A Threat to Security? 235 concerns. In combatting terrorism, states should comply with their human rights obligations and with existing international law,152 rather than seeking to pervert the existing legal regime. The international legal framework established after World War II was based on foundations of undefined security, masked by the clear principles of protecting the inviolability of human dignity. Whether or not an individual state accepts the foundational philosophical concepts, it is clear what they are. The post-9/11 counter-terrorism regime has arguably laid the path to the destruction of this foundation. States are, theoretically at least, equal.153 However, some states may be seen as being less equal than others as their political system does not conform to the hegemonic norm perpetuated by Western states.154 Likewise, citizens within these states who do not conform to the prevailing ideology are in danger of being viewed as less than one. C.  The Destruction of One The changes in international law post-9/11 have been driven by ­Western states, in particular the US and UK. That there has not been an international outcry or protest over the broadening and militarisation of the response to the perceived threat of terrorism cannot be said to be evidence of a consensus. Silence is not necessarily agreement and ­acceptance,155 especially when the political rhetoric of the US and UK administrations156 has rendered proper debate over the most ­appropriate and effective response virtually impossible. Disregarding established and accepted legal (and moral) principles in order to pursue a political agenda undermines the concept of law as a standard to which all are held.

152  UNGA Res 60/158 (28 February 2005) UN Doc A/RES/60/158; UN Global CounterTerrorism Strategy (n 79); UNGA Res 62/272 (15 September 2008) UN Doc A/RES/62/272. 153  At the 2005 World Summit, world leaders reaffirmed the principle of sovereign equality. 154  Buzan, Wæver and De Wilde (n 73). 155  White (n 138) 11. 156  See, eg Former US President GW Bush (n 1) stating to the world that ‘Either you are with us, or you are with the terrorists’ and thereby asserting that any opposition to what the US chose to do in response to 9/11 and international terrorism was effectively support for terrorism. This sentiment was repeated by Bush several times, eg ‘nations are either with us or against us in the war on terror’. ‘Full text of George Bush’s Speech: Full Text of George Bush’s speech on Israel and a Palestinian State’ The Guardian (25 June 2002) www. theguardian.com/world/2002/jun/25/israel.usa. More recently, politicians have portrayed the threat as being such that it demands immediate action, or risk ‘a terrorist caliphate on the shores of the Mediterranean’, ‘MPs’ Iraq Vote: Cameron Warns Isis Air Strikes not enough to Defeat “Bunch of Psychopathic Terrorists”’ The Independent (27 September 2014) www. independent.co.uk/news/uk/politics/mps-iraq-vote-cameron-warns-isis-air-strikes-notenough-to-defeat-bunch-of-psychopathic-terrorists-9757715.html; Jackson (n 70) 2, 92.

236  Lydia Davies-Bright Such actions are a­ rguably a regression to a pre-World War II situation. As stated above, human rights are essential foundational principles upon which the international community stands, they serve as a check to state power and are based on the value of one—each individual counts. However, security acts and measures are politically justified because they are purported to save and/or protect the greatest number of individuals (the consequentialist cost/benefit analysis). Nevertheless, it is the assertion of this ­chapter that the prioritising of the many over the one actually jeopardises the safety of all. In both the moral and legal realms a judgement needs to be made as to whether the units being counted are of equal value, or whether some units are worth more than others. This is relevant to the analysis of the security approach taken by individual states and the international community in their attempt to combat terrorism. The war in Iraq is estimated to have caused in excess of 400,000 civilian deaths,157 compared to 2,823 killed in the Twin Towers incident.158 Thus, the crucial question becomes whether or not all human lives are intrinsically equal and, if they are not, what is the basis for the differential and who is it who makes that distinction and on what criteria? Despite no terrorist attack having been perpetrated on US soil since 9/11, the US continues to kill individuals who, it is alleged, pose a direct threat to US security and continues to hold individuals, without charge or trial, in facilities such as Guantánamo. This is arguably a regression to the situation prior to World War II and the creation of the UDHR where human lives were categorised and some were not afforded even the most basic of respect and protection. By labelling those of a different political and theological ideology as the ‘enemies of democracy’ (the automatic implication being that to ­disagree with the implementation and continuation of a particular democratic system is to hold an unacceptable view),159 by describing them as ‘psychopaths’ incapable of reason160 and persons following ‘a perverted form of Islam’,161 as opposed to disaffected members of the middle classes in middle-income states,162 and by using the rhetoric of war to describe confrontations with the holders of such alternative views, governments have ensured that there can be no real and open ideological debate.

157 ‘Iraq Study Estimates War-related Deaths at 461,000’ BBC News (16 October 2013) www.bbc.co.uk/news/world-middle-east-24547256. 158  T Templeton and T Lumley, ‘9/11 in Numbers’ The Observer (18 August 2002) www. theguardian.com/world/2002/aug/18/usa.terrorism. 159  See, eg UK Prime Minister David Cameron’s speech in Munich (n 53). 160  See, eg n 156. 161  MP Hazel Blears speaking on ‘Today Programme’ BBC Radio Four (4 June 2014). 162  R Jackson and N Howe, The Graying of the Great Powers: Demography and Geopolitics in the Twenty-first Century (Washington, Center for Strategic and International Studies, 2008) 117.

Terrorism: A Threat to Security? 237 By combining an ideology with the acts of violence used by the perpetrators as a method of communication, the potential for discourse is lost. The fact that Osama bin Laden and al-Qaeda’s stated aim was to remove the influence of Western states from Muslim countries and to facilitate the implementation of a strict interpretation of Shari’a law, rather than the total destruction of democracy and the West,163 is largely ignored. The language of the War on Terror has now evolved to include anyone considered a ‘subversive’.164 All disaffected and disenfranchised groups of an Islamic, anti-Western, anti-democratic or anti-establishment philosophy have been swept up under the terrorist label. New legislation, enacted in an environment of national panic, remains on the statute books and raises the bar for subsequent responses to unpredicted events.165 The clear d ­ anger is that at each legislative step the rights of the individual are increasingly and irreversibly eroded166—no government would take the political gamble of repealing anti-terrorism legislation as any subsequent terrorist act would be framed by the political opposition and security services as being consequential. In the UK, the Coalition Government replaced the controversial and oppressive control orders with TPIMs.167 However, the idea that it is acceptable for a state to restrict and monitor individuals, who have not been charged with or convicted of an offence, on the basis that they are suspected of posing a threat, has not been challenged—the method has merely been made more politically palatable. The concept that a person is innocent until proven guilty appears to have no application in the face of the threat of terrorism. i.  ‘One’ is no Longer Safe Post-9/11 academics and commentators have sought to justify and explain the actions of politicians and military commanders, which has included a debate on whether or not torture is justifiable in a counter-terrorism situation and a justification of the arbitrary taking of life as being either 163 J Beckman, Comparative Legal Approaches to Homeland Security and Anti-terrorism (­Aldershot, Ashgate, 2007) 10. 164  C Gearty, ‘Terrorism and Morality’ (2003) 4 European Human Rights Law Review 377, 380. 165  See, eg US Patriot Act 2001; UK Terrorism Acts (n 28). 166  It is accepted and acknowledged that the erosion of civil liberties is not linear and there have been efforts to halt it, eg Lord Hoffman as the voice of reason in Belmarsh (n 94) para 96: ‘Terrorist violence, serious as it is, does not threaten our institutions or our existence as a civil community.’ However, as the courts are willing to defer to the political assessment of threat when derogating from IHRL obligations, it is arguable that the political agenda and discourse will ultimately override legal safeguards, eg Lawless v Ireland [1961] ECHR 2; Lord Hope in Belmarsh (n 94) para 116 stated: ‘the questions whether there is an emergency and whether it threatens the life of the nation are pre-eminently for the executive and for Parliament’. 167 The Terrorism and Preventative Measures Act 2011 provides that suspects can be restricted in their movements, location and communications.

238  Lydia Davies-Bright in an armed conflict situation or as a mistake.168 The US and Israel have both used lethal force against suspected terrorist operatives in the form of targeted killings, including the killing of a Hamas leader and his wife, child and 13 others.169 Both US and UK forces have engaged in highly questionable acts, many of which would be defined (by others) as torture and which, in any case, certainly amount to cruel, inhuman or degrading treatment.170 The choice is posited as being between one (allegedly) guilty party and many innocent others. In this way, politicians, military leaders, academics and commentators alike assert that it is better to sacrifice the one for the many. However, if the unit being counted is ‘one human life’ then that category has certain characteristics that are foundational to the social order that is being protected by these security measures—namely human rights, universal in nature and in application. To justify the violation of the rights of one on the premise that it will preserve the rights of many, risks undermining the principles on which the proponents of such actions claim to stand. The claim that the nullification of the rights of a few safeguards the rights of the many does not stand on its own terms and, in fact, threatens the security of each individual. Thus, the examination of this issue is of crucial significance and relevance to the societies that the security actions are purported to protect. The determination of acceptability arrived at in extremis affects and informs actions and activities in other spheres. Qualifications made to the conception of the primary unit being counted (in this case the human person) in order to permit the security measures arguably alter its nature and intrinsic value. It is asserted that as soon as one human life is counted then it must always matter, regardless of any subjective assessment of that human life, and so the foundational human rights principles necessarily prohibit certain actions. This premise not only protects the individual in question, but all individuals. In this way, the security of the state and of society is secured and safeguarded. ii.  ‘One’ no Longer Counts During the Bush administration there was much discussion on the acceptability of torture, normally framed within the ‘Ticking Bomb Scenario’ (TBS). In the TBS the detainee is assumed to be guilty and so the decision to torture them appears to be relatively straightforward. Sussman 168 See, eg references to the killing of Jean Charles de Menezes as a tragedy and mistake, ‘Police Chief “Sorry” Over Death’ BBC News (24 July 2005) news.bbc.co.uk/1/hi/ uk/4712061.stm. 169 D Kretzmer, ‘Targeted Killing of Suspected Terrorists: Extra-judicial Executions or Legitimate Means of Defence?’ (2005) 16(2) European Journal of International Law 171, 172; Greenberg and Dratel (n 5). 170  CAT 1984.

Terrorism: A Threat to Security? 239 suggests that by committing a wrong (planting a bomb) the detainee has forfeited their rights.171 This stance is legally and morally problematic as it undermines the moral values associated with justice and fair trials, which are crucial elements of many justice systems and enshrined in various regional and international human rights instruments.172 To maintain that it is morally permissible to torture a guilty terrorist suspect is to radically alter the conception of human rights—they can no longer be held to be self-evident and universally applicable if there are some to whom they do not apply. Within current law there are permissible limitations, but, as mentioned above, the absolute prohibition on torture is strictly non-derogable.173 Writers such as Sussman and Jones appear to assert that by the presumed committing of a wrong (in the absence of due process and untested in a court of law), the detainee has forfeited their right to not be tortured as they have ‘undermined’ the integrity of the torturer.174 In the same way, a person alleged as being a member of a group proscribed as terrorist and/ or suspected of performing acts of terrorism may be deliberately targeted and killed, with no attempt being made to detain them and commit them to the criminal and judicial process.175 Acceptable rights restrictions and limitations can only legitimately be imposed after the due process of law. A convicted criminal is subject to, for example, restrictions on their liberty: they cannot be sentenced to torture. Therefore, there is no apparent logic in the argument that it is permissible to treat a suspect in a harsher manner than a convict, especially if they have not been granted access to due process protections. The detainee’s guilt is an unproven variable and so should not influence the moral decision to torture or not. In the same way, the presumption of a person’s involvement in terrorist activity, albeit based on intelligence (which is not the same as tested evidence), should have no bearing on the decision whether or not to arbitrarily deprive that person of their right to life—as happened

171 

D Sussman, ‘What’s Wrong with Torture?’ (2005) 33 Philosophy and Public Affairs 1. UDHR, ICCPR, ECHR—none provide that imposing a punishment on a detainee prior to trial is permissible. 173  Article 2 CAT 1984. 174  Sussman (n 171) 18; B Jones, ‘Moral Integrity: A Justification for Torture?’ (2007) Supplement UCL Jurisprudence Review 47, 57. 175  It is recognised that there is an argument that actions, such as drone strikes, are legitimate in an armed conflict situation and are compatible with the Laws of War. However, given that there is no coherent enemy against which the US (and other states) is fighting and that the persons targeted are usually in civilian clothes and in civilian contexts (such as out/ inside their house, as with Osama bin Laden, see below), this justification is rejected here. 172 

240  Lydia Davies-Bright with Jean Charles de Menezes and Osama bin Laden.176 It is both morally and legally problematic to make the correctness of a moral and legal judgement contingent upon an enemy’s behaviour—whether or not they choose to commit a prohibited act. Although there are circumstances in which a course of action becomes legally justifiable in the face of a prohibited act performed by another,177 this needs to be weighed up against the possible consequences. In addition, what may be acceptable on an individual level is not necessarily permissible or desirable at the state level. To believe and to act otherwise is to eschew any claim of moral and legal continuity or consistency and is to prove any claim of a moral and legal foundation, on which the security argument stands, as being false. When choosing a ‘lesser evil’ or the path of ‘maximum utility’ there is inevitably a value judgement involved. Using the various thought experiments that run along the same theme, the decision to kill the one to save the many often hinges upon the guilt or innocence of the one; this assumes not all ‘ones’ are equal. Killing a baby to save an aeroplane full of people is not such a straightforward choice as killing an adult terrorist for the same purpose. The baby is viewed as an innocent, whilst the adult terrorist is not, and so this impacts the decision making process, which includes considerations of the possible justifications. This demonstrates that human beings are ‘irrational’, emotional creatures and that it is more than just utility that is to be taken into account. The same is true when arguing for torture in certain, sanctioned and controlled situations. In the TBS ‘the one’ is the person with vital information regarding an imminent bomb and torture is the most time efficient method to retrieve the information.178 That person is tortured, even to the point of death, to retrieve information in order to save many lives (although it hardly needs to be pointed out that a dead interrogee is of no intelligence value). The absolute prohibition on torture is supported by the deontological principle that people are an end in themselves, not a means to an end. It can also be argued from the modern deontological viewpoint of Rawls that the ‘veil of ignorance’ should prevent any acceptance of torture as it is possible to imagine a counterfactual scenario in which anyone could

176  See below. It is asserted that it is acceptable and coherent to view both killings as contrary to established principles, despite one being viewed as ‘innocent’ and the other ‘guilty’ of terrorism, as neither were subjected to a legal process and facts were assumed as opposed to being established in a court of law. Both were killed as a result of the utilitarian assessment that the killing of one is justified when it may potentially save the lives of many. 177  Eg, an act of self-defence when faced with an imminent threat. This is not without qualification and it is for the individual to demonstrate to a court of law that his/her act was reasonable in the circumstances in which s/he was in at the time. 178  S Miller, ‘Is Torture Ever Morally Justifiable?’ (2005) 19 International Journal of Applied Philosophy 179.

Terrorism: A Threat to Security? 241 be cast in the role of ‘terrorists’ if confronted with a despotic regime.179 The various cases for torture appear to be hybrids of utilitarian and ­deontological ideas with the proponents trying to satiate their intuition to sacrifice a guilty one to save innocent others, whilst also attempting to maintain deontological principles.180 To this author, this is not a satisfactory or consistent moral proposal. It cannot be correct on the one hand to say that all humans have inviolable human rights and then on the other to assert that they are lost should a (suspected) wrong of sufficient magnitude be committed. What would be sufficiently wrong is not an objective assessment. Or if the guilt is not the crucial aspect, but rather the number of lives lost and sacrificing one is a lesser evil, then this should be extended into other aspects of life and matters of public policy.181 Gray exposes the argument used by torture apologists that since the use of torture is a reality and as the rule of law is ‘a core liberal value [that] cannot be compromised in the fight against terrorism’,182 torture must be brought within the legal sphere. Dershowitz argues for the introduction of torture warrants to regulate what he views as a necessary evil. P ­ utting aside the arguments relating to the feasibility of there being enough time to comply with a judicial procedure for obtaining a warrant in a ­genuine TBS, actual cases illustrate that any legitimisation of a practice, even within strict parameters, is subject to expansion. The Israeli Supreme Court’s (­sitting as the High Court of Justice) statement that ‘the imminence criteria is satisfied even if the bomb is set to explode in a few days, or perhaps even after a few weeks, provided the danger is certain to materialise’ and torture is necessary183 demonstrates this risk. Dershowitz himself cites a Filipino case where the suspect was beaten for sixty-seven days in order to gain information that may (or may not) have assisted in the foiling of a terrorist plot. Israel also demonstrates that limitations will invariably be exceeded as, even after torture was sanctioned by the L ­ andau Commission, Israeli General Security Service agents allegedly often exceeded the limits set in the Commission’s directives and then covered it up.184 Additionally, ­making torture permissible risks it becoming the first, as

179 

J Rawls, A Theory of Justice (Oxford, Oxford University Press, 1999). F Allhoff, ‘A Defense of Torture: Separation of Cases, Ticking Time-Bombs and Moral Justification’ (2005) 19 International Journal of Applied Philosophy 243; A Harel and A Sharon, ‘What is Really Wrong with Torture?’ (2008) 6(2) Journal of International Criminal Justice 241. 181  Such as choices regarding whether to spend tax payers’ money on medicine for a few or on something that will be of benefit to more. These choices often cause great upset. 182  J Gray, ‘A Modest Proposal’ The New Statesman (17 February 2003). 183  The Public Committee Against Torture in Israel v The Government of Israel et al (­Judgment) [1999] HCJ 5100/94, para 34; Y Ginbar, Why Not Torture Terrorists? (Oxford, Oxford ­University Press, 2008) 205. 184  B Brecher, Torture and the Ticking Bomb (Oxford, Blackwell, 2007) 53. 180  Eg,

242  Lydia Davies-Bright opposed to the last, resort.185 In cases where torture has been permitted it has quickly become routine and systematic186 as ‘no government in the world can be trusted not to abuse the power’.187 In Israel, harsh techniques were not reserved solely for those extreme cases in which necessity was deemed to legitimise violence; and ‘moderate’ interrogations resulted in approximately ten detainees dying from their mistreatment.188 The difficulty is not with Israel, nor any other country, but with intemperate human beings. Once an enemy is viewed as inhuman or unequal, then anything is permissible.189 Human rights norms are supposed to stand as a protection for all individuals against the use and abuse of such power. iii.  Jean Charles de Menezes as One On 22 July 2005 armed officers from the Metropolitan Police Service (MPS) shot and killed Jean Charles de Menezes, a Brazilian national, at Stockwell London Underground station.190 He had been followed from his home by surveillance officers who were looking for Hussein Osman, one of the four persons suspected of planting four bombs on the London transport system the previous day. Although there subsequently followed various misleading accounts in the press by high-ranking MPS officers,191 it became clear that Mr de Menezes ‘had nothing to do with terrorism’ and had actually been travelling to work.192 Press releases given throughout 22 July 2005 linked de Menezes to the bombs found the previous day and stated that de Menezes’ ‘clothing and behaviour at the station’ had contributed to the suspicions of the surveillance officers.193 The following day, the police issued statements that acknowledged that de Menezes was not connected

185 

Brecher (n 184) 57. A Solomon, ‘A New US Threat to Human Rights: The Case Against Torture’ The Village Voice (27 November 2001). 187  WL Twining and PE Twining, ‘Bentham on Torture’ (1973) 24 Northern Ireland Legal Quarterly 305. 188  S Chapman, ‘Should We Use Torture to Stop Terrorism?’ Chicago Tribune (1 November 2001). 189  Chapman (n 188); Ginbar (n 183) 132ff. 190  Independent Police Complaints Commission (IPCC), ‘Stockwell One: An Investigation into the Shooting of Jean Charles de Menezes at Stockwell Underground Station on 22 July 2005’ (19 January 2006) webarchive.nationalarchives.gov.uk/20100908152737/http://www. ipcc.gov.uk/stockwell_one.pdf. 191 See, eg Metropolitan Police Commissioner Sir Ian Blair stating at a press conference that de Menezes had been ‘challenged and refused to obey police instructions’; ‘Man Shot Dead by Police on Tube’ BBC News (22 July 2005) http://news.bbc.co.uk/1/hi/uk/ 4706787.stm. 192  IPCC (n 190) para 1.2. 193 IPCC, ‘Stockwell Two: An Investigation into Complaints about the Metropolitan Police Service’s Handling of Public Statements Following the Shooting of Jean Charles de Menezes on 22 July 2005’ (2 August 2007) 7–9 webarchive.nationalarchives.gov. uk/20100908152737/http://www.ipcc.gov.uk/ipcc_stockwell_2.pdf. 186 

Terrorism: A Threat to Security? 243 to the bombs found on 21 July 2005, but continued to state that ‘his clothing and behaviour added to [the surveillance officers’] ­suspicions’.194 It later emerged from CCTV footage that de Menezes had in fact walked ‘calmly’ into the station, pausing to pick up a newspaper, before using his travel card to pass through the barriers195 and that his clothing was appropriate for the weather.196 The IPCC investigation report indicates that crucial information was withheld from the press and perhaps also from senior MPS officers and Home Office representatives as to the identity and suspect status of the person shot.197 In the inquest into the shooting, the jury rejected the armed officers’ account of events and returned an open verdict.198 Although Jean Charles de Menezes was later shown to be innocent of any connection to terrorism, the IPCC does not describe him as innocent199 and also alludes to potential immigration issues200 and that he was a cocaine user.201 This unnecessary information arguably reinforces notions that those who are truly innocent have nothing to fear from the activities of the security forces and that the infringement of human rights only impacts the guilty.202 The killing of Jean Charles de Menezes can be explained as ‘a tragic mistake’203 and the understandable consequence of a zealous police unit determined to protect the public and themselves from one of ‘four very dangerous individuals who had attempted to commit mass murder’ the previous day.204 Indeed, the IPCC investigation report of the shooting 194 

IPCC (n 193) 9–10. IPCC (n 190) para 8.16. 196  IPCC (n 190) paras 8.16 and 20.62. 197  IPCC (n 193). 198 R Edwards, ‘Jean Charles de Menezes Shooting: No Officers Face Charges’ The ­Telegraph (13 February 2009) www.telegraph.co.uk/news/uknews/law-and-order/4611838/ Jean-Charles-de-Menezes-shooting-no-officers-face-charges.html. 199  IPCC (n 190) para 4.1 describes the 52 persons who died in the London bombings on 7 July 2005 as ‘innocent’; The IPCC summary chronology of the events also describes the 52 as ‘innocent’, in direct contrast to the 22 July entry of ‘Jean Charles de Menezes shot and killed by officers from the Metropolitan Police Service’ IPCC Archived Webpage webarchive.nationalarchives.gov.uk/20100908152737/http://www.ipcc.gov.uk/index/ resources/evidence_reports/investigation_reports/the_stockwell_investigation/ summary_chronology.htm. 200  IPCC (n 190) para 5.5 states that the Home Office Immigration files have no record of him after 20 June 2003, although a footnote does acknowledge that the Health and Safety trial revealed that he was lawfully in the country on the date of his death. 201  IPCC (n 190) para 14.22 states that there was cocaine in de Menezes’ blood and that he may have been under the influence of the drug at the time of the incident. 202 See, eg British Foreign Secretary William Hague asserting that those who are ‘­lawabiding’ have nothing to fear from the security services, R Watts and R Winnett, ‘William Hague: British Public have “Nothing to Fear” from US Spies’ The Telegraph (9 June 2013) www. telegraph.co.uk/news/politics/10108564/William-Hague-British-public-have-nothing-tofear-from-US-spies.html. 203  ‘Open Verdict at Menezes Inquest’ BBC News (12 December 2008) news.bbc.co.uk/1/ hi/uk/7764882.stm. 204  IPCC (n 190) para 4.17. 195 

244  Lydia Davies-Bright places significant emphasis on the ‘atmosphere of fear’ in London following the 7/7 bombings.205 However, it is asserted that dismissing the event simply as an understandable mistake, and one that may well be repeated as the security forces struggle to keep the country safe,206 ignores the wider context of the securitisation of terrorism and the destruction of the individual as a unit that counts. In the context of increased police activity and the raising of the terrorist threat to ‘critical’ (meaning an attack was imminently expected), four bombs were found in London on 21 July 2005.207 In the command meeting held on 21 July 2005, the fear was expressed ‘that the individuals would re-gather the next morning and attempt to cause explosions and achieve their objectives’.208 This fear appears to be exactly that, a fear. Bombs had been found in London, but they had been abandoned. Assertions that the makers of the bombs were suicide bombers were not based on facts—a suicide bomber is, by definition, a person who intends to be/is killed by their bomb. These bombs were not attached to any person. In describing the planters of the bombs as ‘suicide bombers’209 the police officers in charge of the briefing arguably reinforced the idea that these persons were not persons who could be reasoned with—they were ‘deadly and determined’ killers.210 As such, the suspects were delegitimised as people and as individuals who deserve to be counted. Consequently, it is unsurprising that the individual officers involved, as in a classic utilitarian thought experiment scenario, felt that their only option was to kill the guilty individual in order to save the innocent many.211 The fact that de Menezes was being held by a fellow officer and pinned to his seat212 did not seem to be taken into consideration. The events took place in a climate of fear created by the political rhetoric surrounding terrorism that had been shaping reality since 9/11. The 7/7 London bombings then enabled world leaders to reinforce the narrative of fear, threat and danger from those wishing to destroy cherished values.213

205 

IPCC (n 190) para 4.6. Hughes, ‘Seven Mistakes that Cost De Menezes his Life’ The Independent (13 ­ December 2008) www.independent.co.uk/news/uk/crime/seven-mistakes-that-costde-menezes-his-life-1064466.html. 207  IPCC (n 190) paras 4.7–4.12. 208  IPCC (n 190) para 4.17. 209  IPCC (n 190) paras 11.2, 11.5 and 11.9. 210  IPCC (n 190) para 11.13. 211  IPCC (n 190) paras 13.7 and 13.12. 212  IPCC (n 190) para 13.4. 213  See, eg Tony Blair stating that ‘We will not allow violence to change our societies or our values.’ ‘Full Text G8 Leaders’ Statement’ The Guardian (7 July 2005) www.theguardian.com/ world/2005/jul/07/g8.july7. 206 M

Terrorism: A Threat to Security? 245 iv.  Osama bin Laden as One On 2 May 2011, US Navy Seals entered a compound in Abbottabad, ­Pakistan with the aim of neutralising Osama bin Laden (erstwhile head of al-Qaeda and suspected mastermind behind the events of 9/11).214 In the hours of darkness, a team of armed Seals entered the compound by helicopter and proceeded to raid the house. Several shots were fired and more than one person was killed. Osama bin Laden himself was shot in the head and chest, despite apparently not firing at the Seals or being given the opportunity to surrender.215 As with the killing of de Menezes, the initial briefings from officials contained inaccuracies and indicated aggression on the part of bin Laden towards the Seals.216 More than one option was considered in the period before the operation, including the use of a missile strike that would have obliterated the compound and neighbouring residences and a drone strike on the individual that they suspected was bin Laden. Apart from the unjustifiable civilian casualties, it seems that an important factor in deciding to conduct a raid was the possibility to confirm the kill and to gather other intelligence.217 In killing Osama bin Laden it appears that the US administration took a utilitarian approach, insofar as a judgement was made that the immediate benefits of removing the head of al-Qaeda outweighed the costs, including the net impact on future terrorist activity, the radicalisation of ­Muslims and a redrawing of the concept of ‘justice’.218 It may be contended that this form of cost-benefit calculation is more properly regarded as a form of political or public policy judgement as opposed to moral reasoning. However, it could be argued that the decision to base such a crucial decision on political considerations was in itself a moral decision219

214 Although not explicitly stated at the time, the operation was viewed by many as being a de facto kill mission. M Hosenball, ‘US Commandos Knew bin Laden Likely Would Die’ Reuters (2 May 2011) www.reuters.com/article/2011/05/02/us-binladen-killidUSTRE74151S20110502; M Allen, ‘Osama bin Laden Raid Yields Trove of Computer Data’ Politico (2 May 2011) www.politico.com/news/stories/0511/54151.html. 215  M Bowden, ‘The Death of Osama bin Laden: How the US Finally Got its Man’ The Guardian (12 October 2012) www.theguardian.com/world/2012/oct/12/death-osama-bin-laden-us. 216  D Walsh, ‘Osama bin Laden’s Last Hours Come into Focus as White House Revises its Story’ The Guardian (4 May 2011) www.theguardian.com/world/2011/may/03/ osama-bin-laden-death-raid. 217  Bowden (n 215). 218  US President Obama claimed that ‘justice has been done’ through the killing of bin Laden, even though bin Laden did not stand trial for terrorist crimes or his suspected involvement in 9/11. D Walsh, E MacAskill, and J Burke, ‘Osama bin Laden Killed in US raid on Pakistan Hideout’ The Guardian (2 May 2011) www.guardian.co.uk/world/2011/ may/02/osama-bin-laden-dead-pakistan. 219  In the sense that the moral implications of taking a human life were not brought into the discussion as Osama bin Laden was not considered to be deserving of the human rights and due process provisions in US, Pakistani and international law.

246  Lydia Davies-Bright and one that had not been properly thought through with regard to the wider implications of such a choice. The situation becomes more confused when it is asserted that ‘­justice’ has been done, which is in itself a moral assertion, in line with US ­values.220 Whilst it is not clear what notion of justice is being used to justify this assertion, it is not justice as it is usually understood, which encompasses due process, standards of fairness and transparency, innocence until proven guilty and no arbitrary taking of life.221 Such a moral assertion indicates that, at the highest level, the basic premise of human rights, that of equal and universal application and inviolability, is not taken to be ‘self-evident’.222 It was deemed appropriate to kill an unarmed man and to deny him his human rights because he was considered (although not proved) guilty of heinous acts.223 Such thinking about ‘known’ terrorists arguably leads to decisions being made on similar utilitarian grounds regarding ‘unknown’ terrorists, as seen above in the case of Jean Charles de Menezes. This may confirm in the minds of some that Muslims, or those with (or suspected of having) opposing political views, are considered the ‘other’ and are in possession of the ‘lower tier’ of human rights. VI. CONCLUSION

Today, terrorism is seen as constituting ‘one of the most serious threats to international peace and security’,224 aimed at destroying human rights, fundamental freedoms and democracy.225 Putting aside the fact that those concepts themselves lack a universally applicable definition,226 ‘terrorism cannot and should not be associated with any religion, nationality, civilization or ethnic group’227 and so cannot be credited with having a

220  ‘Today Programme’ BBC Radio Four (12 May 2011) reporting US Attorney General Eric Holder’s comments. 221  F Francioni, ‘The Rights of Access to Justice Under Customary International Law’ in F Francioni (ed), Access to Justice as a Human Right (Oxford, Oxford University Press, 2007); Articles 6, 7, 9, 10, 14, 16 ICCPR 222  UDHR Preamble. 223  The US has recently argued that the targeting of bin Laden was legitimate as he was a military target. The question as to whether or not the US is at war following 9/11 centres on the classification of the event as an armed attack and is a moot point and not within the purview of this chapter. See, SD Murphy, ‘Terrorism and the Concept of “Armed Attack” in Article 51 of the UN Charter’ (2002) 43 Harvard International Law Journal 41; Cf Cassese (n 32). However, persons in the theatre of war still have human rights and the killing of a person posing no immediate threat and when capture is possible is also problematic under IHL principles. 224  UN Global Counter-Terrorism Strategy (n 79). 225  UN Global Counter-Terrorism Strategy (n 79). 226  Buzan, Wæver and De Wilde (n 73). 227  UN Global Counter-Terrorism Strategy (n 79).

Terrorism: A Threat to Security? 247 single, unifying aim, especially as acts labelled as being terrorist are conducted by disparate, unassociated groups. Such a broad definition of ­terrorism ­arguably undermines human rights, fundamental freedoms and ­democracy228 as it excludes states and places political opposition outside of the legitimate sphere by allowing governments to legitimately label opposition groups as terrorist. The enshrining in law of the concept that each individual human being is possessed of dignity was a response to the atrocities of World War II—a bloody example of what can happen when people are no longer seen as people and when a political agenda is prioritised over respecting individual human rights. By denying political alternatives to Western style democracy and by delegitimising any debate on the issue, states and international organisations create and exacerbate the situation of insecurity that they are reacting to. This definition blurs the line between the motivation and the act. A group may carry out a criminal act (such as setting off a bomb) in pursuit of a legitimate aim (such as the human rights of a particular group), but under this definition, the legitimate ideological pursuit is ignored as the act has already been assigned with a motivation. This chapter has demonstrated how the promise of the inviolability of the innate human dignity of each human person, of human rights as a universal principle, made in 1948 has been subverted in favour of a more utilitarian approach, albeit mixed (inconsistently) with deontological elements. The UNC, with its discretionary security order, preceded the human rights instruments and allows for the individual to be subordinated to state security concerns. As demonstrated through the example of Lockerbie, international political power and influence enables certain actors to circumvent previously agreed legal mechanisms in pursuit of their own ends. The killings of Jean Charles de Menezes and Osama bin Laden illustrate how concepts of the rule of law and due process are indeed seen to be ideals, indulgences for a more utopian time, rather than concrete principles to govern the behaviour and reach of executive power. The security imperative of the state and those who wield its power subordinates all other principles and values, including the inherent dignity of each human being that each person has simply by virtue of being human. The imagined community of the state has become more powerful than the reality of the individual. This asymmetry is a result of the questionable idea that an individual is capable of posing an existential threat to a state. However, as the extra-judicial killings of de Menezes and bin Laden illustrate, the state poses a far greater existential threat to the individual.

228  Democracy defined in the broadest sense of being a political system chosen by the people of a particular state or territory.

248

10 Abusive Governments as a Threat JURE VIDMAR*

I. INTRODUCTION

T

RADITIONALLY, THE REPRESENTATIVE legitimacy of a ­government in international law was a matter of effective control over a certain territory.1 This doctrine seems to be changing. In the post-Cold War period, some writers have argued that governmental legitimacy in contemporary international law originates in democratic elections.2 While the pro-democratic bias in international law is not universally endorsed, a practice of collective responses has developed that denies legitimacy to governments that are seen as being abusive of their people. Most recently, the shifting doctrine on governmental legitimacy came to the forefront in Security Council resolutions 1970 and 1973 on Libya.3 However, was Libya really a turning-point or rather a continuation of an already-developing doctrine? Although the legal consequences of ­governmental abusiveness have varied, the concept seems to have been the motivation behind international responses to the situations of ­Afghanistan,4 East Timor,5 Haiti,6 Kosovo7 and Sierra Leone.8 In these

* This chapter was completed in November 2013 and does not include events after that date. 1  J Crawford, The Creation of States in International Law, 2nd edn (Oxford, Oxford University Press, 2006) 56. 2  See, eg, T Franck, ‘The Emerging Right to Democratic Governance’ (1992) 86 American Journal of International Law 46; AM Slaughter, ‘International Law in a World of Liberal States’ (1995) 6 European Journal of International Law 503; F Teson, ‘The Kantian Theory of International Law’ (1992) 92 Columbia Law Review 53. 3 See UNSC Res 1970 (26 February 2011) UN Doc S/RES/1970 and UNSC Res 1973 (17 March 2011) UN Doc S/RES/1973. 4 UNSC Res 1363 (15 October 1999) UN Doc S/RES/1363 and UNSC Res 1378 (14 ­November 2001) UN Doc S/RES/1378. 5 UNSC Res 1264 (15 September 1999) UN Doc S/RES/1264 and UNSC Res 1272 (25 ­October 1999) UN Doc S/RES/1272. 6  UNSC Res 940 (31 July 1994) UN Doc S/RES/940. 7  UNSC Res 1244 (10 June 1999) UN Doc S/RES/1244. 8  UNSC Res 1132 (8 October 1997) UN Doc S/RES/1132.

250  Jure Vidmar s­ituations, the Security Council, acting under Chapter VII of the UN ­Charter, established the existence of a threat to international peace and security, despite the situations often seeming to be of a domestic, rather than international, nature. The Security Council has thus called for a change of governing authority and has even used its binding powers in two cases to create legal regimes of international territorial administration on the basis of governments being abusive towards their own people.9 This clearly indicates that governmental abusiveness is considered to be a threat to international peace and security, even in the absence of the threat or use of force in international relations. This contribution considers the collective practice of denying international legitimacy to governments that are abusing their governing powers. In so doing, the contribution questions which factors underlie governmental abusiveness and analyses how internal situations of governmental abusiveness started to constitute threats to international peace and security. However, the chapter also affirms that governments do not lose their legitimacy simply by not adopting a certain political system. The practice may rather suggest that coup governments will be seen as being illegitimate where they overthrow democratically-elected ones. Moreover, by abusing their people, governments do not automatically lose their representative authority. Rather, collective action is needed, either through the Security Council or, as recent developments demonstrate, through the ‘old fashioned’ instrument of recognition of governments. II.  COLLECTIVE RESPONSES TO GOVERNMENTAL ABUSIVENESS

Governments speak and act on behalf of states and therefore it needs to be clear which authority has the right to do so. The representative legitimacy in principle stems from effective control over the territory. However, there are some limitations to this doctrine. This chapter analyses the collective practice of denying legitimacy to governments and demonstrates that abuses of sovereign power can strip a government of its legitimacy to represent the people and the state it claims to represent. This does not ­happen automatically, but through collective action. Moreover, even ­abusive governments tend to lose representative legitimacy only in combination with at least partial loss of effective control. A.  Governments, Legitimacy and Effective Control The significance of the effective control test was demonstrated by the ­General Assembly when dealing with the competing claims of the People’s 9 

See (n 5) and (n 7).

Abusive Governments as a Threat 251 Republic of China and of the Taiwan-based Republic of China to speak on behalf of China.10 The Taiwan-based authority initially represented China in the UN.11 In 1971, however, the General Assembly adopted Resolution 275812 which recognised: ‘[T]he representatives of [the Government of the People’s Republic of China] as the only legitimate representatives of China.’13 Upon this proclamation, the General Assembly expelled ‘the representatives of [Taiwan] from the place which they unlawfully [occupied] at the United Nations and in all the organizations related to it.’14 The Taiwan-based Government of the Republic of China could not be the legitimate government of China as it was in effective control of only a fraction of the Chinese territory. In establishing governmental legitimacy, no regard was paid to the type or nature of the Chinese government. The fact that governmental legitimacy does not depend on a particular political system or governing method was later confirmed by the International Court of Justice (ICJ) in the Nicaragua case: [A]dherence by a State to any particular doctrine does not constitute a violation of customary international law; to hold otherwise would make nonsense of the fundamental principle of State sovereignty, on which the whole of international law rests, and the freedom of choice of the political, social, economic and cultural system of a State … The Court cannot contemplate the creation of a new rule opening up a right of intervention by one State against another on the ground that the latter has opted for some particular ideology or political system.15

Despite this general position, a collective practice started to develop of denying legitimacy to some effective governments that abuse their ­people. Such practice may be seen as a deviation from the rule of effectiveness, but its implications should not be overstretched. In the process of decolonisation, the standard developed that a government needs to enjoy the support of the will of the people in order to act on behalf of the territory that is being decolonised. In 1965, the racist white minority government of Southern Rhodesia issued a declaration of independence.16 Prior to that, both the General Assembly and the Security Council adopted a set of resolutions in which the white minority government was declared to lack the representative authority to act on behalf of

10 

Crawford (n 1) 200.

11 ibid. 12 

UNGA Res 2758 (XXVI) (25 October 1971) UN Doc A/RES/2758. ibid para 4. 14 ibid. 15  Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v United States) (Merits) (Judgment) [1986] ICJ Rep 14, 132 para 263 [hereinafter the Nicaragua case]. 16  J Dugard, Recognition and the United Nations (Cambridge, Grotius Publications, 1987) 90. 13 

252  Jure Vidmar the population of Southern Rhodesia.17 The Security Council called on the United Kingdom not to decolonise Southern Rhodesia and on other states to withhold recognition.18 After the declaration of independence, UN organs continued the ­initiative for collective non-recognition19 and all states, including apartheid South Africa, complied with the resolutions.20 Subsequently, in 1970, Southern Rhodesia declared itself a republic, to which the Security ­Council responded by Resolution 277, adopted under Chapter VII of the UN ­Charter, in which it called ‘that Member States shall refrain from recognizing this illegal regime or from rendering assistance to it’.21 The international legal response to Southern Rhodesia invokes several complex issues of international law.22 For the purposes of this contribution it is important to recall that although in effective control of the territory, the legitimacy of the white minority government to act on behalf of Southern Rhodesia was denied internationally. Effectiveness was therefore limited by human rights considerations, in particular, the right of selfdetermination and the prohibition of racial discrimination. It is also significant that in 1970 the Security Council acted under ­Chapter VII of the UN Charter which is concerned with measures ‘to maintain or restore international peace and security.’23 The Security Council’s response proves that no classical trans-boundary element is necessary to trigger the phrase ‘international peace and security’ and the resulting consequences under Chapter VII. A breach of international peace and security can follow from the actions of a government against its own people and within the territory under its effective control. Southern Rhodesia was a complex situation because it was also an entity that was trying to emerge as a state and the international responses to it were influenced by the law of statehood.24 Apartheid South Africa, however, doubtlessly existed as a state, but UN organs challenged the legitimacy of its government, which was otherwise in effective control of the state. Security Council Resolution 417 expressed grave concern ‘over reports of torture of political prisoners and the deaths of a number of detainees, as well as the mounting wave of repression against

17 See UNGA Res 1747 (XVI) (27 June 1962); UNSC Res 202 (6 May 1965) UN Doc S/RES/202; UNGA Res 2022 (XX) (5 November 1965). 18  See UNSC Res 202 (n 17) paras 3, 4 and 5. 19  See UNGA Res 2024 (XX) (11 November 1965); UNSC Res 216 (12 November 1965) UN Doc S/RES/216; UNSC Res 217 (20 November 1965) UN Doc S/RES/217. 20  Dugard (n 16) 91. 21  UNSC Res 277 (18 March 1970) UN Doc S/RES/277 para 2. 22  For more see Dugard (n 16) 90. 23  UN Charter (1945) Art 39. 24  See Dugard (n 16) 90.

Abusive Governments as a Threat 253 i­ndividuals, organizations and the news media’,25 reaffirmed ‘its recognition of the legitimacy of the struggle of the South African people for the elimination of apartheid and racial discrimination’,26 and affirmed ‘the right to the exercise of self-determination by all the people of South Africa as a whole, irrespective of race, creed or colour’.27 The Resolution further condemned ‘the South African racist regime for its resort to massive violence and repression against the black people, who constitute the great majority of the country, as well as all other opponents of apartheid’,28 and expressed ‘its support for, and solidarity with, all those struggling for the elimination of apartheid and racial discrimination and all victims of violence and repression by the South African racist regime.’29 Thus, the Security Council clearly confirmed the view that effectiveness is not the only criterion that legitimises a government. Certain abuses of human rights can strip a government of its representative legitimacy and can constitute threats to international peace and security in the sense of Chapter VII of the UN Charter. The 1986 proclamation of the ICJ in the Nicaragua case, therefore, needs to be qualified along the following lines: governmental legitimacy does not depend on a particular political system or electoral method, but it does prohibit apartheid. In subsequent practice, the notion of abusive governments has been extended further and governments may, under some circumstances, also lose their legitimacy for violations of some other human rights. Furthermore, to some extent the political organisation of the state has started to matter. B.  International Response to Coup Governments In 1994, acting under Chapter VII of the UN Charter, the Security Council adopted Resolution 940, which authorised the use of force for the return of the overthrown democratically-elected government of President JeanBertrande Aristide.30 The Resolution reaffirmed [T]hat the goal of the international community remains the restoration of ­democracy in Haiti and the prompt return of the legitimately elected President, Jean-Bertrande Aristide … [and] authorize[d] Member States to form a multinational force … to use all necessary means to facilitate the departure from Haiti of

25 

UNSC Res 417 (31 October 1977) UN Doc S/RES/417 preamble para 3. ibid preamble para 5 (italics in original). 27  ibid preamble para 6. 28  ibid para 1 (italics in original). 29  ibid para 2 (italics in original). 30  See generally R Falk, ‘The Haiti Intervention: A Dangerous World Order Precedent for the United Nations’ (1995) 36 Harvard International Law Journal 341. 26 

254  Jure Vidmar the military leadership … the prompt return of the legitimately elected President and the restoration of the legitimate authorities of the Government of Haiti.31

The Security Council thus acted under Chapter VII of the UN Charter, although it is generally perceived that, strictly speaking, no breach of, or threat to, international peace existed as the coup was evidently an outcome of domestic political developments.32 However, in the UN ­Charter era human rights are protected internationally and are no longer a mere domestic issue of every state. Gross and systematic human rights violations within one state’s confines may also be seen as breaches of, or threats to, international peace. It needs to be noted, though, that this pro-democratic­intervention was not authorised by the Security Council against a firmly-established (effective) non-democratic government, but rather against a coup government that had overthrown the government elected in the process running under UN auspices. The standard of denial of legitimacy to coup governments where they overthrow democratically elected ones was confirmed in the subsequent practice of the Security Council. In response to the coup in Sierra Leone, the Security Council, acting under Chapter VII, demanded that ‘the military junta take immediate steps to relinquish power in Sierra Leone and make way for the restoration of the democratically-elected Government and a return to constitutional order.’33 The collective responses to coups against democratic governments are another step away from the doctrine of effectiveness. An authority ­cannot usurp power by extra-constitutional means against a democraticallyelected government. However, this does not mean that a non-elected effective government is automatically deemed to be illegitimate or that the Security Council would, in such situations, always identify a threat to international peace and security. Notably, however, the Security ­Council has also used its Chapter VII powers to deny legitimacy to governments even where they did not come to power in a (recent) coup. In such circumstances, international legitimacy is denied on the basis of human rights abuses rather than a general lack of democratic (electoral) practices. ­Furthermore, it appears that denial of governmental legitimacy in such situations still cannot be entirely divorced from the test of effectiveness.

31 

UNSC Res 940 (n 6). See Falk (n 30) 342. 33  UNSC Res 1132 (n 8) para 1. 32 

Abusive Governments as a Threat 255 C.  Collective Denial of Legitimacy to an Incumbent Government Addressing the situation in Afghanistan, the Security Council adopted Resolution 1267 under Chapter VII of the UN Charter, in which it declared [T]hat the Afghan faction known as the Taliban, which also calls itself the Islamic Emirate of Afghanistan, comply promptly with its previous resolutions and in particular cease the provision of sanctuary and training for international terrorists and their organizations, take appropriate effective measures to ensure that the territory under its control is not used for terrorist installations and camps, or for the preparation or organization of terrorist acts against other States or their citizens, and cooperate with efforts to bring indicted terrorists to justice.34

The Security Council carefully avoided the use of the term ‘the government of Afghanistan’ and thereby implied that it did not see the Taliban government as the legitimate authority of Afghanistan. The Security Council also invoked obligations of ‘the Taliban, as well as other Afghan factions’,35 which implies that the Taliban government did not exercise an effective control over the territory of Afghanistan. This also follows in subsequent resolutions where the Security Council stated that the Taliban were obliged to comply with duties imposed by international law, whilst still avoiding using the term ‘the government of Afghanistan’. Instead, terms such as ‘the Afghan faction known as the Taliban’,36 ‘the Taliban authorities’37 and ‘the territory of Afghanistan under Taliban control’38 were used, or it was demanded that ‘the Taliban [rather than ‘the government of Afghanistan’] comply’39 with previous resolutions. These pronouncements of the Security Council indicate that the denied legitimacy of the Taliban government was partly rooted in the lack of ­effective control over the entire territory of Afghanistan. However, this was not the main circumstance that triggered the Security Council’s action. Indeed, Resolution 1378 condemned ‘the Taliban for allowing Afghanistan to be used as a base for the export of terrorism by the Al-Qaida network and other terrorist groups’;40 expressed concern about ‘serious violations by the Taliban of human rights and international humanitarian law’;41 and further gave its strong support for the efforts of the Afghan people to establish a new and transitional administration leading to the formation of a government, both of

34 

UNSC Res 1267 (15 October 1999) UN Doc S/RES/1267 para 1. See UNSC Res 1214 (8 December 1998) UN Doc S/RES/1214 para 1. 36  See UNSC Res 1267 (15 October 1999) UN Doc S/RES/1267 para 1. 37  See UNSC Res 1333 (19 December 2000) UN Doc S/RES/1333 preamble. 38  See UNSC Res 1363 (30 July 2001) UN Doc S/RES/1363 para 3(b). 39  See UNSC Res 1333 (n 37) paras 1 and 2. 40  UNSC Res 1378 (n 4) preamble. 41 ibid. 35 

256  Jure Vidmar which: should be broad-based, multi-ethnic and fully representative of all the Afghan people and committed to peace with Afghanistan’s neighbours; should respect the human rights of all Afghan people, regardless of gender, ethnicity or religion; [and] should respect Afghanistan’s international obligations.42

The Security Council thus denied the legitimacy of the Taliban government in Afghanistan, based on its grave human rights violations and threats to international peace, and expressed its support for a change of government. The Security Council’s measures against the Taliban authorities in Afghanistan should not be understood as pro-democratic activism. Chapter VII of the UN Charter was used to address serious breaches of internationally protected human rights and involvement in international terrorism. The Security Council’s response to the Taliban government of ­Afghanistan was a combination of international threats to peace and security (international terrorism), domestic factors (gross and systematic human rights abuses) and a lack of effectiveness in the entire territory. It is notable, however, that the Security Council openly supported the change of the government and did so, inter alia, on the basis of its past abusive internal behaviour. In the situation of Libya, the Security Council also acted under ­Chapter VII, although the situation lacked a traditional trans-boundary element. Resolutions 1970 and 1973 identified the existence of a threat to international peace and, in order to protect civilians, authorised the use of all necessary means. This can be interpreted as a deliberate ambiguity that authorises the use of force.43 At the same time, the Security Council excluded ‘a foreign occupation force of any form on any part of Libyan territory’.44 The Resolutions are not concerned with the choice of a particular political system or electoral method. Resolution 1970 urged the Libyan authorities to ‘Act with the utmost restraint, respect human rights and international humanitarian law, and allow immediate access for international human rights monitors.’45 Resolution 1973 condemned ‘the gross and systematic violation of human rights, including arbitrary detentions, enforced disappearances, torture and summary executions’.46 Unlike the relevant resolutions on Afghanistan, the resolutions on Libya did not explicitly deny legitimacy of the sitting government or called for a regime change, not even when the National Transitional Council

42 

ibid para 1. C Henderson, ‘International Measures for the Protection of Civilians in Libya and Cote D’Ivoire’ (2011) 60 International & Comparative Law Quarterly 767, 770–71. 44  UNSC Res 1973 (n 3) para 4. 45  UNSC Res 1970 (n 3) para 2(a). 46  UNSC Res 1973 (n 3) preamble para 4. 43  See

Abusive Governments as a Threat 257 (NTC) was already in control of large parts of Libyan territory. While the ­language used in the resolutions on Afghanistan clearly denied legitimacy of the Taliban government, the resolutions on Libya referred to the Gaddafi government as ‘the Libyan authorities’.47 The authorisation of the use of force was limited to the protection of the civilian population.48 Nevertheless, the change of government in Libya was not only a domestic but an internationalised effort.49 It is debatable whether the international support for the NTC overstepped the Security Council’s mandate.50 It is notable, however, that the Security Council once again interpreted an internal situation as a threat to international peace and security. Such a threat was determined by a grave humanitarian situation and gross and systematic abuse of human rights. Apart from the collective action taken through the Security Council, international action against Libya also saw the return of the obsolete concept of the recognition of governments. While international practice has virtually universally shifted to the so-called Estrada Doctrine of no explicit recognitions,51 in the example of Libya a number of states—including the United Kingdom—departed from this practice and explicitly granted recognition to the NTC.52 The recognising states clearly expressed preferences to one of the competing authorities and their decisions were rooted in human rights considerations and in the grave humanitarian situation. Indeed, for many states the Gaddafi government lost its legitimacy by escalating the abuse against its own people. Nevertheless, it needs to be noted that recognition of the competing authority did not come before the NTC managed to establish a degree of control over parts of the Libyan territory. In other words, governmental

47 ibid. 48 

See Henderson (n 43) 772. generally M Payandeh, ‘The United Nations, Military Intervention, and Regime Change in Libya’ (2012) 55 Virginia Journal of International Law 355. 50 ibid. 51  This doctrine is named after the Mexican minister of foreign affairs Genaro Estrada who, in 1930, made a proclamation on behalf of Mexico that its government in the future shall issue ‘no declaration in the sense of grants of recognition, since [Mexico] considers that such a course is an insulting practice and one which, in addition to the facts that it offends sovereignty of other nations, implies that judgment of some sort may be passed upon the internal affairs of those nations by other governments, inasmuch as the latter assume, in effect, an attitude of criticism when they decide, favourably or unfavourably, as to the legal qualifications of foreign regimes’. Estrada Doctrine (1930) reprinted in B Roth, Governmental Illegitimacy in International Law (Oxford, Oxford University Press, 1999) 137–38. 52  See D Akande, ‘Recognition of Libyan National Transitional Council as Government of Libya’, EJIL Talk! (23 July 2011) www.ejiltalk.org/recognition-of-libyan-national-transitionalcouncil-as-government-of-libya. See also S Talmon, ‘Recognition of the Libyan National Transitional Council’, ASIL Insights (16 June 2011) www.asil.org/insights/volume/15/ issue/16/recognition-libyan-national-transitional-council. 49  See

258  Jure Vidmar legitimacy was not denied to a firmly established and entirely effective government. It was rather that the international community progressively shifted towards one of the competing authorities, neither of whom was in effective control over the entire territory of Libya. Attempts were also made to link Gaddafi’s governmental illegitimacy with democracy. When the United Kingdom recognised the NTC as the only legitimate government of Libya, UK Foreign Secretary William Hague stated that this recognition would contribute towards a ‘more open and democratic Libya … in stark contrast to Gaddafi whose brutality against the Libyan people has stripped him of all legitimacy’.53 This reference to democracy should not be interpreted too broadly; it is merely political and does not legally oblige Libya to enact a particular political system. When the legitimacy of the Gaddafi government was first challenged by the Security Council, the challenge did not come on the basis of nondemocratic­procedures, but rather on the basis of gross and systematic human rights abuses and a grave humanitarian situation.54 Furthermore, even in this case, the international support for the NTC did not come before this authority established effective control over a part of the territory of Libya. In regards to Syria, the human rights abuses and grave humanitarian situation led to a draft Security Council resolution.55 The draft went much further than the resolution on Libya and explicitly called for a change of government. The draft calls for a transition ‘to a democratic, plural political system’56 and for the formation of a national unity government.57 The draft did not define the meaning of a democratic, plural political system and neither did it challenge the legitimacy of the government of Syria on the basis of democracy. For this purpose, it rather invoked human rights and humanitarian grounds, but it nevertheless reflects the view that respect for human rights can only be achieved upon a change of government and in a democratic setting. If it had been adopted, the resolution would have been rather farreaching­. Yet it was subject to a double veto (China and Russia).58 This indicates that the universal perception of governmental legitimacy has

53  See ‘UK Expels Gaddafi Diplomats and Recognises Libya Rebels’, BBC News (27 July 2011) www.bbc.co.uk/news/uk-politics-14306544. 54  cf (n 46). 55  See Draft of Security Council Resolution on Syria, New York Times (31 January 2012) www.nytimes.com/2012/02/01/world/middleeast/draft-of-security-council-resolutionon-syria.html?_r=0. 56  ibid para 7. 57 ibid. 58  See ‘Russia and China Veto Resolution on Syria at UN’, BBC News (4 February 2012) www.bbc.co.uk/news/world-16890107.

Abusive Governments as a Threat 259 not entirely shifted away from the requirement of effective control over a ­territory. As Stefan Talmon argued in the context of the Gaddafi regime in Libya, ‘Even gross and systematic violations of human rights by a government … do not automatically lead to its loss of status as a government in international law or make it any less a government than it would otherwise be.’59 With regard to Syria, this means that in the absence of Security Council action or collective de-recognition of the Syrian government, and despite gross and systematic human rights violations, the Assad government remains the government of Syria. Subsequently, the Security Council adopted a set of legally non-binding resolutions on the situation in the Middle East, in which Syria featured prominently.60 The resolutions called for reaching and implementation of a political solution to the conflict.61 Specific references are made to the ­Syrian government and the opposition,62 thus leaving no doubt that, despite the grave humanitarian situation and gross violations of human rights, the incumbent government still enjoys international legitimacy to speak on behalf of Syria. In the preamble, Resolution 2042 also reaffirms ‘its strong commitment to the sovereignty, independence, unity and territorial integrity of Syria, and to the purposes and principles of the ­Charter’.63 This is a clear indication that the outcome of the internal struggle in Syria needs to be determined in a domestic process. These otherwise non-legally-binding resolutions do not make any provisions for a change of the governing authority and continue to regard the Assad government as the legitimate government of Syria. However, nothing in the resolutions implies that overthrowing the government by extra-constitutional means would not be allowed, they only determine that such an outcome would need to result from domestic processes. This is different from the above-discussed resolutions on Sierra Leone and Haiti, in which the extra-constitutional changes of the governments were internationally condemned. However, in these two situations democratically elected governments were overthrown, whereas the current government in Syria lacks democratic legitimacy. Another aspect of the international responses to the situation in Syria is the ‘recognition’ of some states, including the United Kingdom, of

59  S Talmon, ‘De-Recognition of Colonel Qaddafi as Head of State of Libya?’ 60 (2011) International & Comparative Law Quarterly 759, 765 (italics added). 60  UNSC Res 2042 (14 April 2012) UN Doc S/RES/2042; UNSC Res 2043 (21 April 2012) UN Doc S/RES/2043; UNSC Res 2051 (12 June 2012) UN Doc S/RES/2051. 61  UNSC Res 2042 (n 60) para 1; UNSC Res 2043 (n 60) para 1; UNSC Res 2051 (n 60) para 1. 62  UNSC Res 2042 (n 60) para 1; UNSC Res 2043 (n 60) para 1; UNSC Res 2052 para 1 (27 June 2012) UN Doc S/RES/2052. 63  UNSC Res 2042 (n 60) para 2 and 4; UNSC Res 2043 (n 60) paras 2, 3 and 4.

260  Jure Vidmar the ­Syrian opposition as the legitimate representatives of the people of Syria.64 However, this ‘recognition’ is not recognition of a government and is not comparable to recognition of the NTC as the Government of Libya.65 The somewhat unusual ‘recognition’ of the Syrian opposition as the legitimate representative of the people of Syria may be seen as a legitimisation of its struggle against the incumbent government. However, the fact that the ‘recognising’ states did not also recognise the opposition as the legitimate government of Syria affirms the continued importance of effective territorial control. Indeed, if foreign states otherwise recognise the representative legitimacy of a competing authority but do not recognise this authority as the government of Syria, this indicates that they would prefer to recognise the competing authority as the government, but cannot do so because the incumbent government can still demonstrate a sufficient degree of effective control over the territory. Contemporary practice therefore demonstrates that effective control remains an important consideration, even where the government is abusing its sovereign powers. Such a government may lose its representative legitimacy, but the international community will continue to recognise it as a government as long as it can still demonstrate a sufficient degree of effective control over the territory. However, once the competing authority is able to demonstrate a degree of effectiveness, foreign states and UN organs have demonstrated a willingness to support a regime change. III.  INTERNATIONAL PEACE AND SECURITY AND TERRITORIAL ADMINISTRATION

The previous section dealt with situations where an authority tries to ­overthrow an incumbent government but the identity of the state remains the same. This section turns to the examples of East Timor and Kosovo where the Security Council used its binding powers to address governmental abuse by the creation of international territorial administrations. Identifying a threat to international peace and security, the Security ­Council thus severed the territories from their parent states. This legal arrangement ultimately led to declarations of independence.

64 See ‘Syria Conflict: UK Recognises Opposition, says William Hague’, BBC News (20 November 2012) www.bbc.co.uk/news/uk-politics-20406562. 65 See D Akande, ‘Self Determination and the Syrian Conflict—Recognition of Syrian Opposition as Sole Legitimate Representative of the Syrian People: What Does this Mean and What Implications Does it Have?’, EJIL Talk! (6 December 2012) www.ejiltalk.org/selfdetermination-and-the-syrian-conflict-recognition-of-syrian-opposition-as-sole-legitimaterepresentative-of-the-syrian-people-what-does-this-mean-and-what-implications-does-ithave/.

Abusive Governments as a Threat 261 A.  East Timor East Timor was a Portuguese colony which was unlawfully taken over by Indonesia.66 Although it formally remained on the list of nonself-governing­territories, it was effectively governed by Indonesia. The real issue was independence from Indonesia, not Portugal, and therefore, its independence was not a matter of decolonisation. In 1999, Indonesia agreed to a referendum on the future status of the territory. At the referendum, which was supervised by the UN mission,67 the people of East Timor rejected an autonomy arrangement within Indonesia and set the course towards independence. The result led to an outbreak of violence.68 In response, the Security Council adopted the Chapter VII Resolution 1264, in which it expressed ‘its concern at reports indicating that systematic, widespread and flagrant violations of international humanitarian and human rights law have been committed in East Timor’.69 In the absence of a classical trans-boundary element, the Security Council thus associated a threat to international peace and security with violations of internationally guaranteed human rights and humanitarian law, albeit that these violations took place in a domestic setting. The Resolution then established a separate legal regime for East Timor and severed it from Indonesia. This was not yet independence, but international territorial administration. In creating this legal arrangement, the Security Council also enacted a number of institutional arrangements in order to prevent further abuses of human rights. Resolution 1264 thus established ‘a multinational force under a unified command structure’.70 In the subsequent, also Chapter VII, Resolution 1272, the Security Council established ‘a United Nations Transitional Administration in East Timor (UNTAET) … endowed [it] with overall responsibility for the administration of East Timor and … empowered [it] to exercise all legislative and executive authority, including the administration of justice.’71 Resolution 1272 in its preamble also reaffirmed ‘respect for the sovereignty and territorial integrity of Indonesia’.72

66 See generally B Singh, East Timor, Indonesia and the World: Myths and Realities (­Singapore Institute of International Affairs, 1995); H Krieger and D Rauschning, East Timor and the International Community: Basic Documents (Cambridge, Cambridge University Press, 1997); J Taylor, East Timor: The Price of Freedom (London, Zed Books, 1999); P Hainsworth and S McCloskey (eds), The East Timor Question: The Struggle for Independence from Indonesia (­London, IB Tauris, 2000); I Martin, Self-determination in East Timor: The United Nations, the Ballot, and International Intervention (Boulder, Lynne Rienner Publishers, 2001). 67  See UNSC Res 1236 (7 May 1999) UN Doc S/RES/1236 especially paras 4, 8, 9. 68 ibid. 69  UNSC Res 1264 (n 5) preamble. 70  UNSC Res 1264 (n 5) para 3. 71  UNSC Res 1272 (n 5) para 1. 72  UNSC Res 1272 (n 5) para 12.

262  Jure Vidmar Prior to the internationalised transition of East Timor toward independence and transfer of power from international territorial administration to organs of the East Timorese state, the international administrative authority supervised the creation of democratic institutions.73 Under UN auspices, elections were held on 30 August 2001 and 91.3 per cent of all persons eligible to vote did so.74 On 15 September 2001, the Special Representative of the United Nations Secretary General ‘swore in the 88 members of the Constituent Assembly’.75 On 20 September 2001, the Special Representative appointed a second transitional government, the members of which were all East Timorese and the composition of the government reflected the outcome of the elections to the assembly.76 The UN SecretaryGeneral noted that this was ‘the first time that the executive government [was] controlled by East Timorese, albeit under the overall authority of [the UN Secretary-General’s] Special Representative’.77 On 28 November 2001, the Constituent Assembly adopted a resolution in which it expressed support for direct presidential elections.78 The Special Representative of the UN Secretary General79 determined that the presidential elections would take place on 14 April 2002.80 On 22 March 2002, the text of the new Constitution was signed by members of the East Timorese political elite, religious leaders and representatives of the civil society.81 It was determined that the Constitution would enter into force on 20 May 2002, which was the day foreseen for the proclamation of independence.82 East Timor’s course to independence was confirmed in Security ­Council Resolution 1338, adopted on 31 January 2001.83 This Resolution was not adopted under Chapter VII of the UN Charter, but it was nevertheless an affirmation of the completion of the i­nternationalised

73  ‘United Nations Transitional Administration in East Timor (interim report)’ UN Doc S/2001/436 (2 May 2001) paras 2–7; ‘United Nations Transitional Administration in East Timor’ UN Doc S/2001/983 (18 October 2001) paras 4–8. 74  UN Doc S/2001/983 (n 73) para 5. 75  UN Doc S/2001/983 (n 73). 76  UN Doc S/2001/983 (n 73) para 7. 77  UN Doc S/2001/983 (n 73). 78  ‘United Nations Transitional Administration in East Timor’ (from 16 October 2001 to 18 January 2002) UN Doc S/2002/80 (17 January 2002) para 7. 79  The position of the Special Representative drew its legitimacy from UNSC Res 1272 (n 5) in which the Security Council ‘Welcome[d] the intention of the Secretary-General to appoint a Special Representative who, as the Transitional Administrator, will be responsible for all aspects of the United Nations work in East Timor and will have the power to enact new laws and regulations and to amend, suspend or repeal existing ones.’ para 6. 80 UNSC Res 1272 (n 5). See also ‘United Nations Transitional Administration in East Timor’ UN Doc S/2002/432 (17 April 2002) para 7. 81  UN Doc S/2002/432 para 4. 82  ibid paras 2 and 4. 83  UNSC Res 1338 (31 January 2001) UN Doc S/RES/1338.

Abusive Governments as a Threat 263 process that resulted in the emergence of a new state. East Timor declared independence on 20 May 200284 and was admitted to the UN on 27 September 2002.85 The Constitution of East Timor makes a number of specific references to a democratic political order. Section 1 of the Constitution provides that ‘The Democratic Republic of East Timor is a democratic, sovereign, independent and unitary State based on the rule of law, the will of the people and the respect for the dignity of the human person.’86 Section 6(c) ­provides that one of the fundamental objectives is ‘To defend and guarantee political democracy and participation of the people in the resolution of national problems.’87 Besides these general references to democracy, a number of other operative articles enact specific provisions that leave no doubt that the electoral process in East Timor is organised along ­democratic lines and in a multiparty setting. Section 7 expressly enacts universal suffrage and a multiparty political system,88 sections 46 and 47, respectively, deal with the right to political participation and with the right to vote, within the elaboration of which a multiparty political system is expressly demanded,89 and section 70 deals specifically with political parties and the ‘right of opposition’.90 The Constitution specifically regulates elections to Parliament91 and of the President.92 The political system, which was designed in East Timor under UN auspices, is organised along democratic lines. The international territorial administration thus not only guided East Timor towards ­independence, but also through the process of democratic transition and the building of democratic institutions.93 In order to address abuses of Indonesia’s sovereign power in East Timor, the Security Council used its Chapter VII powers to create a regime

84  See ‘East Timor: Birth of a Nation’, BBC News (19 May 2002) news.bbc.co.uk/2/hi/asiapacific/1996673.stm. 85  UNGA Res 57/3 (27 September 2002) UN Doc A/RES/57/3. 86  Constitution of the Democratic Republic of East Timor (2002) Section 1(1). 87  ibid Section 6(c). 88  ibid Section 7. 89  ibid Sections 46 and 47. 90  ibid Section 70. 91  ibid Section 93(1). 92  ibid Section 76(1). 93  cf J d’Aspremont, ‘Post-Conflict Administrations as Democracy-Building Instruments’ (2008) 9 Chicago Journal of International Law 1. Scepticism towards such an imposition was, however, expressed by East Timor’s first President, Xanana Gusmao, in the following words: ‘We are witnessing … an obsessive acculturation to standards that hundreds of international experts try to convey … we absorb [these] standards just to pretend we look like a democratic society and please our masters of independence. What concerns me is the noncritical absorption of [such] standards given the current stage of the historic process we are building.’ Quoted in C Foley, The Thin Blue Line: How Humanitarianism Went to War (London, Verso, 2008) 141.

264  Jure Vidmar of international territorial administration and severed East Timor from Indonesia. Notably, under UN auspices, East Timor adopted a democratic institutional design. This reflects the view that democratic institutions legitimise a governing authority.94 However, this conclusion should not be overstretched. The limits on democratic legitimacy will be considered in the final section. Furthermore, the Security Council responded with a Chapter VII resolution because of gross and systematic human rights abuses and not because of a general lack of democratic practices. B. Kosovo Kosovo was a part of Serbia, predominantly settled by ethnic Albanians.95 In the second part of the 1980s, Serbia extra-constitutionally suspended Kosovo’s autonomy within Yugoslavia.96 This led to more than a decade of oppression and hostilities. In 1999, a group of NATO Member States intervened using the language of humanitarian intervention. The intervention did not have Security Council authorisation and the use of force was thus illegal.97 After the intervention, the Security Council used its binding powers and adopted Resolution 1244, which established the regime of international territorial administration over Kosovo.98 In the preamble, the Security Council expressed its determination ‘to resolve the grave ­humanitarian situation in Kosovo, Federal Republic of Yugoslavia, and to provide for the safe and free return of all refugees and displaced persons to their homes’ and further established ‘that the situation in the region continues to constitute a threat to international peace and security’.99 Again, a threat to international peace and security was established on the basis of a grave humanitarian situation created by domestic abuses of sovereign powers. Notably, the Resolution avoided any pronouncement on the (il)legality or effects of the NATO intervention. Therefore, it cannot

94 

cf (n 2). the Constitution of the Socialist Federal Republic of Yugoslavia (1974) Art 2. See also the Constitution of the Socialist Autonomous Province of Kosovo (1974), translated in Helsinki Committee for Human Rights in Serbia (1998), Kosovo: Law and Politics, Kosovo in Normative Acts Before and After 1974, especially 41 and 45. For a historical overview see N Malcolm, Kosovo: A Short History (London, Macmillan, 1998) 245–66. 96  See Malcolm (n 95) 344. 97  See B Simma, ‘NATO, the UN and the Use of Force: Legal Aspects’ (1999) 10 European Journal of International Law 1, 10; A Cassese, ‘Ex iniuria ius oritur: Are We Moving Towards International Legitimation of Forcible Humanitarian Countermeasures in the World Community?’ (1999) 10 European Journal of International Law 23, 24; C Chinkin, ‘Kosovo: A “Good” or “Bad” War?’ (1999) 93 American Journal of International Law 841, 844. 98  UNSC Res 1244 (n 7). 99  UNSC Res 1244 (n 7) preamble. 95  See

Abusive Governments as a Threat 265 be concluded that a threat to international peace and security was established on this ground. Resolution 1244 did not grant Kosovo the status of an independent state but rather vested all legislative, executive and judicial powers in the selfgoverning organs and subordinated them to international administration. Kosovo was thus effectively severed from Serbia’s jurisdiction, although its formal legal status was not altered and, under Resolution 1244, Kosovo remained an integral part of Serbia. Kosovo declared independence in 2008 and its legal status remains controversial.100 A debate on Kosovo’s legal status falls outside the scope of this chapter. It rather needs to be recalled that the Resolution created an international territorial administration that led to the implementation of democratic institutions. Drawing authority from Resolution 1244, the Special Representative of the UN Secretary General101 promulgated the document entitled ‘Constitutional Framework for Provisional SelfGovernment­.’102 The chapter on basic provisions of the Constitutional Framework provides for the institutional setting for the exercise of ­Kosovo’s self-government­,103 enacts an electoral system based on democratic principles104 and also mechanisms for the protection of human rights.105 The Constitutional Framework also expresses the commitment of ­Kosovo’s self-governing institutions ‘through parliamentary democracy [to] enhance democratic governance and respect for the rule of law in Kosovo’.106 It further provides that ‘Kosovo shall be governed democratically through legislative, executive, and judicial bodies and institutions’107 and enumerates the promotion and respect of the democratic principles among those principles that shall be observed by the self-governing

100 For more on Kosovo’s declaration of independence and legal status, see generally M Weller, Contested Statehood: Kosovo’s Struggle for Independence (Oxford, Oxford University Press, 2009); J Summers (ed), Kosovo: A Precedent? The Declaration of Independence, the Advisory Opinion and Implications for Statehood, Self-Determination and Minority Rights (Leiden, M Nijhoff, 2011); J Vidmar, ‘International Legal Responses to Kosovo’s Declaration of Independence’ (2009) 42 Vanderbilt Journal of Transnational Law 779. 101  The position of the Special Representative was created by UNSC Res 1244 (n 7). The Resolution ‘[r]equests the Secretary-General to appoint, in consultation with the Security Council, a Special Representative to control the implementation of the international civil presence, and further requests the Secretary-General to instruct his Special Representative to coordinate closely with the international security presence to ensure that both presences operate towards the same goals and in a mutually supportive manner’ para 6. 102  UNMIK/REG/2001/9 (15 May 2001) [hereinafter the Constitutional Framework]. 103  ibid Chapter 1. 104  ibid Chapter 9.1.3. 105  ibid Chapter 3. 106  ibid preamble para 7. 107  ibid Chapter 1.1.4.

266  Jure Vidmar ­institutions.108 The Special Representative of the UN Secretary-General thus promulgated a legal instrument which implemented democratic institutions. The process of democratic transition in Kosovo was thus carried out under UN auspices. While the institutions of self-government were vested with powers in the exercise of effective control over the territory of Kosovo, which can be compared to those of authorities of independent states, the Constitutional Framework foresaw an appointed supervisor of the democratic process, ie the Special Representative of the UN Secretary General, to whom the self-governing organs remained subordinated.109 The Constitutional Framework did not foresee the organs of the F ­ ederal Republic of Yugoslavia (FRY) or Serbia having any authority over the decision-making of Kosovo’s self-governing institutions. Although ­ Resolution 1244 states that the aim of the interim administration is that ‘the people of Kosovo can enjoy substantial autonomy within the Federal Republic of Yugoslavia,’110 the effective situation in fact established ­Kosovo’s autonomy within the interim administration. As one author noted, ‘UNMIK has assumed what is effectively (though not in name) the federal-type role of the Serb and FRY authorities, because these authorities failed to perform that role in the past.’111 Kosovo thus became an internationally administered territory without being put under the international trusteeship system of Chapter XII of the UN Charter.112 On 9 April 2008, after the declaration of independence, Kosovo’s ­Parliament adopted the Constitution of the Republic of Kosovo.113 The Constitution affirms Kosovo’s commitment to democracy in both the preamble114 and in the operative articles115 and proclaims that Kosovo ‘is a democratic Republic based on the principle of separation of p ­ owers and the checks and balances among them’.116 Apart from these g ­ enerally

108 

ibid Chapter 2.b. ibid Chapter 12. 110 UNSC Res 1244 (n 7) para 10. But see also W O’Neill, Kosovo: An Unfinished Peace (­Boulder, Lynne Rienner, 2002) 30, especially the following observation: ‘No one knew what the terms “substantial autonomy” and “meaningful self-administration” really meant. What united all Kosovo Albanians, regardless of their political party loyalties, was full independence from Serbia and what was left of the FRY. They did not want to hear about autonomy, however defined.’ 111  R Wilde, International Territorial Administration: How Trusteeship and the Civilizing Mission Never Went Away (Oxford, Oxford University Press, 2008) 595. 112  See M Bothe and T Marauhn, ‘UN Administration of Kosovo and East Timor: Concept, Legality and Limitations of Security Council-Mandated Trusteeship Administration’ in C Tomuschat (ed), Kosovo and the International Community: A Legal Assessment (The Hague, Kluwer, 2001) 230–35. 113  The Constitution of the Republic of Kosovo (2008). 114  ibid preamble para 1. 115  ibid Arts 1(1), 4, 7, 55(2), 125. 116  ibid Art 4(1). 109 

Abusive Governments as a Threat 267 expressed commitments, the Constitution establishes the institutions of a democratic political system. It provides for periodic elections to ­parliament117 and of the president,118 as well as elections based on secret ballot and on the proportionality electoral system.119 Although there is no explicit reference to multiparty elections, such a setting is implied in some of the provisions, particularly in those regulating the composition of the parliament,120 competencies of the president121 and formation of the government.122 The competencies of Kosovo’s constitutional organs, however, remain subordinated to the international territorial administration as Article 147 of the Constitution still grants the final legislative, judicial and executive authority to the International Civilian Representative.123 Thus, the Constitution not only accepts limits on Kosovo’s sovereignty and on competencies of its constitutional organs, but also unequivocally subscribes Kosovo to continued internationalised supervision. Kosovo is another example of international territorial administration being set in place to remedy governmental abusiveness. The abusive governmental practices were not underpinned directly by the lack of democracy, but rather by gross human rights violations and a grave humanitarian situation. Indeed, the non-democratic regime of Slobodan Milošević in Serbia did not receive an international denial of its legitimacy in the entire territory of Serbia but only in Kosovo, where the oppression had an ethnic basis. Under the regime of Security Council Resolution 1244, the international community implemented democratic institutions, but the power of the self-governing (democratic) institutions is limited. Any decision of these institutions can be overruled by the International Civilian Representative who can, thereby, act in the manner of an absolute ruler. IV.  GOVERNMENTAL ABUSIVENESS AND THE (IR)RELEVANCE OF DEMOCRATIC LEGITIMACY

It has been established through collective practice that representative legitimacy may be denied to governments that are abusive of their peoples. Governmental abusiveness in this context is defined as a gross and systematic violation of human rights coupled with a grave humanitarian situation. When new governments are internationally enacted there seems 117 

ibid Art 66. ibid Art 86. 119  ibid Art 64. 120 ibid. 121  ibid Art 84 (14). 122  ibid Arts 95(1) and 95(5). 123  ibid Art 147. 118 

268  Jure Vidmar to be an expectation that they will adhere to democratic practices and be subject to democratic legitimisation. Furthermore, where a democratically elected government is overthrown in a coup, some collective practice indicates that such an extra-constitutional change will not be internationally accepted. However, is the democratic legitimacy of government required by international law? No universal legal instrument binds states to a particular political ­system. This was confirmed by the ICJ in the Nicaragua case.124 Some human rights instruments refer to ‘democratic society’,125 but merely as a limitation clause to certain human rights elaborations and its meaning was never specified. However, in the Cold War environment, when these provisions were drafted, they could not be interpreted as a call for a particular political system. In the post-Cold War period, however, some scholars have argued that a requirement for a democratic political system derives from the provisions of civil and political rights: ‘[B]y becoming a party to an international human rights instrument, a state agrees to organize itself along democratic lines by establishing independent tribunals, allowing freedom of expression, and conducting free elections.’126 In particular, such an obligation may follow from the elaboration of the right to political participation. A.  The Scope of the Right to Political Participation The right to political participation is elaborated in Article 21 of the ­Universal Declaration of Human Rights (UDHR) and in Article 25 ICCPR. In the Cold War environment, the scope of the right was not to be read

124 See

Nicaragua case (n 15). International Covenant on Economic, Social and Cultural Rights (ICESCR) comprehends a general limitation clause in Article 4: ‘The States Parties to the present Covenant recognize that, in the enjoyment of those rights provided by the State in conformity with the present Covenant, the State may subject such rights only to such limitations as are determined by law only in so far as this may be compatible with the nature of these rights and solely for the purpose of promoting the general welfare in a democratic society.’ The ICESCR also refers to ‘democratic society’ as part of the limitation clause in the elaboration subparagraphs (a) and (c) of Article 8 (the right to form trade unions). The International C ­ ovenant on Civil and Political Rights (ICCPR) attaches the interest of ‘democratic society’ as one of the limitation clauses to Articles 14 (right to a fair trial), 21 (freedom of assembly) and 22 (­freedom of association). The Convention on the Rights of the Child (CRC) invokes, inter alia, the interest of democratic society as a limitation clause to Article 15 (rights of a child to freedom of association and assembly). The International Convention on the Protection of the Rights of All Migrant Workers and Members of Their Families attaches the interest of ‘democratic society’ within the limitation clause to Articles 26 (the right of migrant workers to take part in the trade unions) and 40 (the freedom of assembly of migrant workers). 126  C Cerna, ‘Universal Democracy: An International Legal Right or the Pipe Dream of the West?’ (1995) 27 New York University Journal of International Law & Politics 289, 295. 125  The

Abusive Governments as a Threat 269 too broadly. While the interpretation of the Western world referred to the model of ‘liberal democracy’, which presupposes elections in a multiparty setting,127 the interpretation of the Soviet bloc adhered to the model of the ‘people’s democracy’.128 Arguably, the right to political participation in the universal elaborations can be reconciled with both Western and Soviet concepts of democracy; as neither Article 21 of the UDHR nor Article 25 of the ICCPR specifically requires multiparty elections.129 The drafting history indeed shows that many—perhaps most—signatory states would have refused to ratify the ICCPR were it to bind them to democratic institutions and multiparty elections.130 Thus, the language of the UDHR and the ICCPR is to be understood as a codification of the lowest common denominator of the right to political participation and not as a call for a particular political system. B.  A Switch to Democracy? At the end of the Cold War and inspired by the proclamation of the ‘end of history’,131 an attempt was made to proclaim democracy itself a human right. In his ground-breaking article entitled ‘The Emerging Right to D ­ emocratic Governance’,132 Thomas Franck derived this right from the rights of self-determination, freedom of expression and political participation.133 Although the three underpinnings of the right to democratic governance had already been international legal norms binding under treaty (ie ICCPR) and custom, the proponents of the theory of normative democratic entitlement argued that it was the international circumstances at the end of the Cold War which allowed the reinterpretation of their normative scope with a pro-democratic bias.134 Especially relevant in this regard

127 

See Roth (n 51) 325–32. Consider especially the following argument: ‘In the Marxist-Leninist view, multi-party competition [otherwise a crucial postulate of the Western concept of liberal democracy] masks the inalterable structure of power rooted in the concentrated ownership and control of the major means of production, distribution and exchange.’ Roth (n 51) 331. 129  The amendment to Article 21 of the UDHR, which would call for multiparty elections, was withdrawn upon protest by the Soviet Government. See Roth (n 51) 326–27. 130  Roth (n 51) 332. 131  For more on the critique of ‘democratic ideology’, see S Marks, The Riddle of All Constitutions (Oxford, Oxford University Press, 2000) 8–49. 132  Franck (n 2). 133  Franck (n 2) 52. 134 Consider the following counterargument: ‘Democracy, or the right to live under a democratic form of government, became an international legal right in 1948 [by the UDHR], although for decades it was honored more in breach than in observance.’ Cerna (n 126) 290. 128 

270  Jure Vidmar were democratisations in East-Central Europe and the collective response to the coup in Haiti.135 However, such arguments were both Euro-centric and tried to overstretch the Security Council’s response to the situation in Haiti. As demonstrated above, this was not an intervention against a firmly-established non-democratic government, but rather a response to a coup against an elected government. After the end of the Cold War, references to democracy and free and fair elections were made in a number of General Assembly resolutions. In all of them the understanding of democracy was expressed very cautiously, without reference to elections in a multiparty setting. The most instructive in this context are Resolutions 45/150 and 45/151. Resolution 45/150, inter alia, provides that the efforts of the international community to enhance the effectiveness of the principle of periodic and genuine elections should not call into question each State’s sovereign right freely to choose and develop its political, social, economic, and cultural systems, whether or not they conform to the preferences of other States.136

Resolution 45/151 states that Recognizing that the principles of national sovereignty and non-interference­ in the internal affairs of any State should be respected in the holding of ­elections … there is no single political system or single model for electoral process equally suited to all nations and their peoples.137

These resolutions not only fail to specify that elections need to take place in a multiparty setting, but also affirm that the choice of a political system is a domestic matter for each state. References to democracy and to the will of the people also appear in the set of General Assembly resolutions entitled ‘Support of the United Nations System of the Efforts of Governments to Promote and Consolidate New or Restored Democracies’. However, when referring to elections, these resolutions subscribe themselves to the text of international human rights instruments and do not mention a particular electoral method.138 135 

Franck (n 2) 47. Res 45/150 (18 December 1990) UN Doc A/RES/45/150. The Resolution was adopted with a vote of 129 in favour and eight against, with nine abstentions. 137  UNGA Res 45/151 (18 December 1990) UN Doc A/RES/45/151. The Resolution was adopted with a vote of 111 in favour, and 29 against, with 11 abstentions. 138  UNGA Res 50/133 (20 December 1995) UN Doc A/RES/50/133; UNGA Res 51/31 (13 December 1996) UN Doc A/RES/51/31; UNGA Res 52/18 (21 November 1997) UN Doc A/RES/52/18; UNGA Res 53/31 (23 November 1998) UN Doc A/RES/53/31; UNGA Res 54/36 (29 November 1999) UN Doc A/RES/54/36; UNGA Res 55/43 (27 November 2000) UN Doc A/RES/55/43; UNGA Res 58/13 (17 November 2003) A/RES/58/13; UNGA Res 58/281 (9 February 2004) A/RES/58/281; UNGA Res 60/253 (2 May 2006) UN Doc A/RES/60/253; UNGA Res 61/226 (22 December 2006) UN Doc A/RES/61/226; UNGA Res 56/2 (8 September 2000) A/RES/56/2. 136  UNGA

Abusive Governments as a Threat 271 The resolutions indeed specifically affirm that ‘while democracies share common features, there is no single model of democracy and that [­democracy] does not belong to any country or region’.139 References to democracy are also made in some other documents adopted in the UN-framework, such as the Vienna Declaration and Programme of Action140 and the Millennium Declaration,141 but these documents do not go beyond the general mentioning of democracy, no definition is attempted and no link between democracy and multiparty elections is established. Arguably, these General Assembly resolutions may be considered to reflect customary international law regarding the relationship between obligations imposed by the right to political participation and the principle of non-interference into matters essentially in domestic jurisdiction, such as the adoption of a particular political system and/or electoral method. Even in the post-Cold War period, the right to political participation is not to be read too broadly. In principle, international law still does not require a particular political system or electoral method. International law does not prescribe a particular political system or electoral method. Governments therefore do not lose their legitimacy simply by not adhering to democratic (electoral) practice and neither has the ­Security Council ever invoked the concern for international peace and security in order to challenge a firmly established non-democratic government. V. CONCLUSION

Effectiveness remains an important consideration for governmental ­legitimacy. Indeed, the Gaddafi government did not lose its right to represent Libya before it lost control over a significant part of the territory of that state. While some states see the Syrian opposition as the legitimate representative of the people of Syria, they have failed to follow the Libyan precedent and have not explicitly recognised the present opposition to the government of Syria. This is obviously due to the fact that the incumbent government can still demonstrate a sufficient degree of control over the territory. Moreover, when the Security Council resolutions challenged the legitimacy of the Taliban government in Afghanistan, they also indicated that the Taliban were not in full effective control of that state. Even in that

139  UNGA Res 60/253 (2 May 2006) A/RES/60/253 preamble para 11; UNGA Res 61/226 (n 138) preamble para 7; UNGA Res 62/7 (8 November 2007) A/RES/62/7 preamble para 7. 140 ‘Vienna Declaration and Programme of Action’ UN Doc A/CONF.157/23 (12 July 1993). 141  UNGA Res 55/2 (8 September 2000) A/RES/55/2 paras 24 and 25.

272  Jure Vidmar case, the legitimacy of the government was thus, at least partly, challenged on the question of effective control. Collective practice demonstrates that the representative legitimacy of firmly established effective governments will not be challenged, regardless of their behaviour. Such a challenge can follow in the rather limited circumstances where abusive governments at least partly lose control over the territory of the states they claim to represent, or in the event of a coup against a democratically elected government. The collective response is usually formalised through action of the Security Council under ­Chapter VII of the UN Charter. Such an action requires a threat to international peace and security. This concept is interpreted broadly and does not require a classical trans-boundary element. The threshold of a threat can be met domestically, by gross and systematic human rights violations and a grave humanitarian situation. In the earlier period of the UN Charter, the international standard emerged of denying legitimacy to apartheid governments, regardless of their degree of effectiveness. Subsequently, governments were also denied international legitimacy in other instances of abusive behaviour. However, this pattern should not be interpreted too broadly and it should not be concluded that human rights violations, or even a lack of democratic practices, automatically leads to a loss of governmental legitimacy. The doctrine is established on collective responses to the situations in Afghanistan, East Timor, Haiti, Kosovo, Libya and Syria. This demonstrates that the international community will strip the government of its legitimacy only where its policies culminate in a grave humanitarian situation and mass atrocities. The analysis of collective practice therefore demonstrates that international peace and security can be breached by a government’s domestic abuse of sovereign powers. In other words, no traditional trans-boundary­ element is needed as a trigger for the Security Council’s Chapter VII powers. Abusive governmental behaviour should not be interpreted too broadly; it is not defined by an absence of democratic elections or violations of human rights in general. International practice rather shows that abusive governmental behaviour may be defined by war crimes and crimes against humanity. Even then the loss of governmental legitimacy is not automatic and depends on collective action by foreign states, primarily through the UN Security Council. A collective action outside of this institutional framework remains controversial under present international law. However, the revived concept of the (de-) recognition of governments shows that the international community can respond to governmental abusiveness even outside of the Security Council’s Chapter VII powers. It remains to be seen whether de-recognition of abusive governments will be more prominently used as a tool in the future.

11 Protecting Security Interests in International Investment Law PRABHASH RANJAN

I. INTRODUCTION

D

UE TO A variety of factors, in the late 1990s and early 2000, Argentina suffered a severe economic and financial crisis.1 ­ This crisis resulted in a major economic breakdown, very high unemployment, the outbreak of riots and social disorder and politi­ cal instability, all of which led to an extremely dire situation.2 In order to effectively respond to this severe economic crisis, Argentina adopted many regulatory measures, such as blocking bank deposits, prohibiting the transfer of funds abroad and so-called ‘pesification’ (ie the forced conversion of outstanding dollar-denominated contracts and debts into Argentinian Pesos).3 However, these regulatory measures severely impacted the investment of many foreign investors and several challenged these measures using the investment treaty arbitration4 mechanism provided for in the bilateral 1 For a detailed description of the Argentine economic crisis, see J Saxton, Argentina’s ­ conomic Crisis: Causes and Cures (Washington DC, Joint Economic Committee, United States E Congress, 2003) www.hacer.org/pdf/Schuler.pdf; International Monetary Fund, Evaluation Report, The IMF and Argentina: 1991–2001 (Washington DC, IMF, 2004) www.imf.org/­ external/np/ieo/2004/arg/eng/pdf/report.pdf; ‘A Decline without Parallel—Argentina’s Collapse’ (Special Report) The Economist (2 March 2002); P Blustein, And the Money Kept ­Rolling In (and Out): Wall Street, The IMF and the Bankrupting of Argentina (New York, Public Affairs, 2005) 23–24. 2  Saxton (n 1). 3  Continental Casualty Company v Argentina, ICSID Case No ARB/03/9, Award (5 ­September 2008) para 137. 4  The provision on Investment Treaty Arbitration is a salient feature of a large majority of BITs. Under this provision, foreign investors can directly bring claims against the host state for alleged BIT breaches. Host states, as part of this provision, offer unequivocal consent to arbitration. For more on this see C Schreuer, ‘Consent to Arbitrate’ in P Muchlinski et al (eds), The Oxford Handbook of International Investment Law (Oxford, Oxford University Press, 2008) 835–36; R Dolzer and C Schreuer, Principles of International Investment Law (Oxford, Oxford University Press, 2012) 235–310; J Salacuse, The Law of Investment Treaties (Oxford, Oxford University Press, 2010) 353–92.

274  Prabhash Ranjan investment treaties (BITs)5 signed by Argentina.6 These foreign investors alleged that Argentina’s regulatory measures violated Argentina’s BIT obligations containing, inter alia, provisions on expropriation, fair and equitable treatment and transfer of funds. In all these cases, Argentina invoked the defence that such measures were necessary to safeguard its essential security interests. Thus, these disputes provide an opportunity to understand the issue of protecting security interests in international investment law, which is underpinned by a network of more than 3000 different BITs constituting a regime for international investment.7 In this chapter, the endeavour is to understand this issue by critically examining a number of key investment arbitration cases where host states defended the charge of violating their obligations under BITs by invoking the defence of safeguarding ‘essential security interests’. The chapter also assesses the lessons that can be learnt from Argentina’s experience when it comes to protecting security interests in international investment law. The chapter comprehends the issue of protecting security interests in international investment law by dividing the discussion into two parts. First, it examines the issue of protecting security interests in those BITs that specifically allow the host state to deviate from its treaty obligations in order to protect security interests. In other words, arbitral cases involving BITs that contain an ‘essential security interests’ exception are discussed. Second, the chapter examines those BITs that do not contain any provision, allowing host states to deviate from their treaty obligations in order to protect their security interests. In other words, those arbitral cases involving BITs that do not contain an ‘essential security interests’ exception are discussed. Finally, the chapter concludes by drawing lessons that other states can learn from the foregoing analysis of this rich jurisprudence.

5  BITs are treaties signed at the bilateral level by two countries to protect investments made by investors of both the countries—for more on BITs see Dolzer and Schreuer (n 4); Salacuse (n 4); A Newcombe and L Paradell, The Law and Practice of Investment Treaties: Standards of Treatment (The Hague, Kluwer Law International, 2009). 6  For an overview on such claims against Argentina, see LE Peterson, ‘Argentina by the Numbers: Where Things Stand With Investment Treaty Claims Arising out of the ­Argentine Financial Crisis’ I A Reporter (2011) www.iareporter.com/articles/20110201_9. On BIT claims against Argentina due to the financial crisis, see also JE Alvarez and K Khamsi, ‘The ­Argentine Crisis and Foreign Investors’ (2008–09) 1 Oxford Yearbook of Investment Law and Policy 379; MH Mourra (ed), Latin American Investment Treaty Arbitration: The Controversies and Conflicts (The Hague, Kluwer Law International, 2008). 7  Salacuse (n 4) 5–17.

Security in International Investment Law 275 II.  PROTECTING SECURITY INTERESTS IN THOSE BITs THAT CONTAIN A ‘SECURITY INTEREST’ EXCEPTION

The issues of protecting security interests in those BITs that contain the ‘security interests’ exception pose two fundamental questions. First, what is the meaning of ‘essential security interests’ in BITs—is this limited to strict security-related interests or does it have a broader meaning that includes non-security-related interests? Second, when can a regulatory measure adopted by a host state be deemed to be ‘necessary’ to safeguard a host state’s essential security interests? In order to answer these two questions, the discussion on protecting security interests in BITs that contain a ‘security interests’ exception will proceed as follows. We divide all such BITs into two types. Type I BITs are those where the ‘security interests’ exception is not self-judging and does not have a list of activities related to ‘security interests’. A good example of this is Article XI of the US-Argentina BIT, which provides that This Treaty shall not preclude the application by either Party of measures necessary for the maintenance of public order, the fulfillment of its obligations with respect to the maintenance or restoration of international peace or security, or the Protection of its own essential security interests.

Exceptions of the kind contained in Article XI of the US-Argentina BIT are also known as Non Precluded Measures (NPM) provisions. NPM provisions in a BIT (starting with words like ‘nothing in this agreement precludes’) provide the regulatory latitude to host countries to deal with threats to important national interests.8 Type II BITs are those where this exception is self-judging and contain a list of activities related to ‘security interests’. Self-judging, for the purposes of this chapter, means that the clause in the BIT grants discretion to states to unilaterally deviate from their BIT obligations to protect what they assess as their ‘security interests’.9 An example of such a self-judging clause, containing a list of activities related to ‘security interest’, is given in Article 2102(1) of the North American Free Trade Agreement (NAFTA), which states: nothing in this Agreement shall be construed: (b) to prevent any Party from taking any actions that it considers necessary for the protection of its essential security interests: (i) relating to the traffic in arms, ammunition and implements of war and to such traffic and transactions in other goods, materials, ­services 8  J Kurtz, ‘Adjudging the Exceptional at International Investment Law: Security, Public Order and Financial Crisis’ (2010) 59(2) International and Comparative Law Quarterly 325, 343. 9  For more on this, see SW Schill and R Briese, ‘“If the State Considers”: Self-Judging Clauses in International Dispute Settlement’ in A von Bogdandy and R Wolfrum (eds) (2009) 13 Max Planck Yearbook of United Nations Law 61.

276  Prabhash Ranjan and technology undertaken directly or indirectly for the purpose of supplying a military or other security establishment, (ii) taken in time of war or other emergency in international relations, or (iii) relating to the implementation of national policies or international agreements respecting the non-proliferation of nuclear weapons or other nuclear explosive devices.

In this provision, the words ‘that it considers necessary’ gives the discretion to the host state to take any action, which, in the assessment of the state, is necessary for the protection of its essential security interests related to the list of activities identified above. A self-judging exception will imply that the adjudicator shall have to show significant deference to the state invoking the exception.10 A. Type I BITs—BITs Containing ‘Essential Security Interest’ Exception Without Self-Judging Language In order to understand ‘essential security interests’ in such BITs, let us take Article XI of the US-Argentina BIT, mentioned before, as an example. The reason for taking this provision as an example is obvious—it has been heavily litigated in the following investment arbitration decisions, namely CMS v Argentina,11 Enron v Argentina,12 Sempra v Argentina,13 LG&E v Argentina;14 Continental Casualty v Argentina15 and El Paso v Argentina.16 All these cases have thrown up important issues, such as the breadth and scope of ‘security interests’ in international investment law. Despite Article XI of the US-Argentina BIT not employing self-judging language, Argentina argued that this provision is self-judging. For instance, in CMS v Argentina, Argentina argued that it was free to determine the need for the adoption of extraordinary measures based on its assessment of an emergency situation or threat to its security interests.17 However, the tribunal disagreed with Argentina and held that there is not sufficient textual basis to conclude that Article XI is self-judging.18

10 

Kurtz (n 8) 348. CMS Gas Transmission Co v Argentina, ICISD Case No ARB/01/8, Award (12 May 2005). 12  Enron Corporation v Argentina, ICSID Case No ARB/01/3, Award (22 May 2007). 13  Sempra Energy International v Argentina, ICSID Case No ARB/02/16, Award (28 ­September 2007). 14  LG&E Energy Corporation v Argentina, ICISD Case No ARB/02/1, Decision on Liability (26 September 2006). 15  Continental Casualty Company v Argentina (n 3). 16  El Paso Energy International Company v Argentina, ICSID Case No. ARB/03/15, Award (31 October 2011). 17  CMS v Argentina (n 11) para 367. 18  ibid, paras 371–73. 11 

Security in International Investment Law 277 Similarly, the tribunals in LG&E v Argentina,19 Sempra v Argentina,20 Enron v Argentina,21 Continental Casualty v Argentina22 and El Paso v ­Argentina23 rightly held that, in the absence of clear textual support in Article XI of the US-Argentina BIT, it cannot be concluded that the ‘essential security interests’ exception is self-judging. In other words, Article XI of the US-Argentina BIT does not allow for a unilateral assessment of security interests by host states. Arbitral tribunals can exercise substantive judicial control, not mere ‘good faith’ review, on the question of a state’s assessment of ‘essential security interest’.24 After having discussed this preliminary issue, attention now turns to the two fundamental questions posed before—what is the meaning of ‘essential security interests’ in a non-self-judging clause, like Article XI of the US-Argentina BIT? When can a regulatory measure adopted by the host state be deemed to be ‘necessary’ to protect a host state’s essential security interest? i.  Meaning of ‘Essential Security Interests’ The meaning of ‘essential security interests’ has two elements. First, what is the scope of ‘essential security interests’ (ie whether it refers to purely security-related threats or whether it also includes non-security-related threats within its ambit). Second, whether the phrase ‘essential security interests’ means those circumstances where the very existence and independence of the state is compromised, or whether it covers those situations that are severe but below this highest threshold. In other words, what is the threshold for the state to invoke the ‘essential security interests’ exception? We discuss each of these elements below. ii.  Scope of ‘Essential Security Interests’ An important issue in BITs that contain an ‘essential security interests’ exception, is whether the term ‘security’ is confined to purely securityrelated threats, like war, external aggression, armed conflict or such military related threats, or whether it also includes other threats, like ­economic, health or environmental emergencies. This question arose in all the Argentine cases where Argentina argued that the ‘essential security interests’ exception in Article XI of the US-Argentina BIT covers economic

19 

LG&E v Argentina (n 14) paras 212–13. Sempra v Argentina (n 13) para 374. 21  Enron v Argentina (n 12) para 339. 22  Continental Casualty v Argentina (n 3) paras 187–88. 23  El Paso v Argentina (n 16) paras 588–610. 24  Enron v Argentina (n 12) para 339. 20 

278  Prabhash Ranjan and financial crises as well. As per this argument, a country can have recourse to the ‘essential security interest’ exception, not just in pure security related threats, but also in situations of economic and financial crises. Opinion on this question is divided, with some arguing for a narrow interpretation of the ‘essential security interests’ exception. Authors like Reinisch argue that, from a plain meaning of ‘essential security i­nterests’, one cannot conclude that it includes economic emergencies because ‘essential security interests’ primarily relate to military and ­ strategic ­considerations.25 This is supported by Alvarez and Khamsi who argue that, in the context of Article XI of the US-Argentina BIT, ‘­essential security interests’ is not a particularly open-ended term26 and that an e­ conomic ­crisis, as such, cannot be included within the meaning of ‘essential security interests’.27 The authors argue that ‘security’ normally refers to defence and military matters and ‘essential’ means only those matters that are most important or serious.28 However, the tribunals that have interpreted Article XI of the USArgentina BIT have rejected this narrow interpretation of ‘essential security interests’. In CMS v Argentina, the tribunal said that major economic crises are not excluded from the purview of Article XI of the US-Argentina BIT.29 The tribunal said: If the concept of essential security interests were to be limited to immediate political and national security concerns, particularly of an international character, and were to exclude other interests, for example, major economic emergencies, it could well result in an unbalanced understanding of Article XI. Such an approach would not be entirely consistent with the rules governing the interpretation of treaties.30

Similarly, in LG&E v Argentina, the tribunal rejected the argument that Article XI of the US-Argentina BIT is applicable only in circumstances amounting to military action and war and held that ‘essential security interests’ also include an economic crisis.31 Again, both the Sempra v ­Argentina and Enron v Argentina tribunals held that ‘essential security interests’ can encompass situations other than traditional military threats, such as economic emergencies and crises.32 The tribunal in Continental

25  A Reinisch, ‘Necessity in International Investment Arbitration—an Unnecessary Split of Opinions in Recent ICSID Cases?’ (2007) 7 Journal of World Investment and Trade 191, 209. 26  Alvarez and Khamsi (n 6) 65. See also WJ Moon, ‘Essential Security Interests in International Investment Agreements’ (2012) 15(2) Journal of International Economic Law 481. 27  Alvarez and Khamsi (n 6). 28 ibid. 29  CMS v Argentina (n 11) para 359. 30 ibid. 31  LG&E v Argentina (n 14) para 238. 32 See Enron v Argentina (n 12) para 332 and Sempra v Argentina (n 13) para 374.

Security in International Investment Law 279 Casualty v Argentina was also of the same view. The tribunal found support in the rulings of the previous tribunals and held that a severe economic crisis qualifies as affecting an ‘essential security interest’.33 The tribunal in El Paso v Argentina also reached the same conclusion that an economic emergency could fall under Article XI of the US-Argentina BIT.34 Thus, all investment arbitration tribunals, entrusted with the responsibility of interpreting Article XI of the US-Argentina BIT, have given a broad meaning to ‘security interests’ and held that it is not confined or limited to only purely security-related threats, but may also include other crises like economic crises.35 Support for the broad interpretation of ‘security interests’ also comes from the International Court of Justice (ICJ), which, while interpreting ‘essential security interests’ occurring in the Friendship Commerce and Navigation (FCN) treaties between US and Nicaragua, said that ‘the concept of essential security interests certainly extends beyond the concept of an armed attack, and has been subject to very broad interpretations in the past’.36 The argument for a limited or narrow interpretation of ‘security interests’ in BITs, such as the one between the US and Argentina, ignores the fact that most investment treaties do not contain separate provisions for exceptions of a ‘general’ nature and exceptions related to ‘security interests’. Separate provisions for exceptions of a ‘general’ nature and exceptions related to ‘security interests’ are present in GATT 1994.37 In GATT, Article XX contains the ‘General Exceptions’ or non-security related exceptions, whereas Article XXI contains the ‘Security Exceptions’. Thus, there are different provisions covering both security and non-security related exceptions, making it redundant whether security exceptions should be broadly construed. However, in BITs that do not contain separate provisions for ‘security’ and ‘non-security’ related exceptions, construing ‘security interests’

33 

Continental Casualty v Argentina (n 3) paras 178, 180–81. El Paso v Argentina (n 16) para 611. 35  Also see AK Bjorklund, ‘Emergency Exceptions: State of Necessity and Force Majeure’ in P Muchlinski et al (n 4) 481. In this regard, see the criticism of Kurtz (n 8) 362–64, who argues that although the tribunals reach the correct conclusion, they do not provide a sound theoretical analysis as to why ‘essential security interests’ should not be limited to strict security related concerns. He argues that Article 31(3)(c) of the Vienna Convention on the Law of Treaties (VCLT) should be used to interpret ‘essential security interests’. 36  Case Concerning Military and Paramilitary Activities in and Against Nicaragua (Nicaragua v United States of America) (Merits) [1986] ICJ Rep 1. For a different understanding of these judgments, see Alvarez and Khamsi (n 6) 65–66. For scholarly support for a broader interpretation of ‘essential security interest’ see Newcombe and Paradell (n 5) 497. See also T Gazzini, ‘Foreign Investment and Measures Adopted on Grounds of Necessity: Towards a Common Understanding’ (2009) Transnational Dispute Management 1, 17–18. 37  General Agreement on Tariffs and Trade 1994, 15 April 1994, Marrakesh Agreement Establishing the World Trade Organization, Annex 1A, 1867 UNTS 187; 33 ILM 1153 (1994) [hereinafter GATT 1994]. 34 

280  Prabhash Ranjan ­ arrowly will mean that the regulatory ability of states to adopt sovereign n measures in response to severe economic, health or other kinds of crisis will be severely curtailed.38 A limited or narrow interpretation of ‘security interests’ is only appropriate in those circumstances where the BIT contains a separate general exception clause covering a range of objectives, such as health and the environment. Some recent BITs do contain separate provisions for exceptions of a ‘­general’ nature and exceptions of a ‘security’ nature as in the GATT. For example, the Association of Southeast Asian Nations (ASEAN) Comprehensive Investment Agreement contains both ‘General Exceptions’ in ­Article 17 and ‘Security Exceptions’ in Article 18.39 Article 17 of the ASEAN Comprehensive Investment Agreement allows countries to deviate from their treaty obligations when it is necessary to protect public order or necessary to protect human health, etc.40 Article 18 of said treaty allows ­member countries to deviate from their treaty obligations for ‘security-related’ interests. Such BITs are different from those that do not contain a separate ‘general’ exception clause and thus, in these kinds of BITs, ‘­security interests’ are to be narrowly understood. B.  The Question of Threshold Although tribunals have shown unanimity in interpreting ‘security ­interests’ in Article XI of the US-Argentina BIT provision as broad enough to include not just strict security-type threats but also economic and financial interests, there is disagreement on the question of threshold. In other words, tribunals have diverged on the question of how high the threshold should be for a state to successfully make a case under the ‘essential security interests’ exception. In the phrase, ‘essential security interests’, ‘security interests’ are qualified by the word ‘essential’. The ordinary meaning of the word ‘­essential’ is ‘vitally important’. Thus, to invoke ‘essential security interests’ as grounds to deviate from BIT obligations, it will have to be shown that the ‘security interests’ are vitally important and not just ordinary.

38  While BITs do not prohibit states from adopting regulatory measures of any kind, states will have to pay damages to foreign investors if these regulatory measures are found to be inconsistent with their BIT obligations. This dissuades states from adopting such regulatory measures. 39 ASEAN Comprehensive Investment Agreement (signed on 26 February 2009) www. aseansec.org/asean-anthem/. See also the US Model Bilateral Investment Treaty (2012) www.state.gov/documents/organization/188371.pdf and B Legum and I Petculescu, ‘GATT Article XX and International Investment Law’ in R Echandi and P Sauvé (eds), Prospects in International Investment Law and Policy (Cambridge, Cambridge University Press, 2013). 40  See the ASEAN Comprehensive Investment Agreement (n 39) Article 17(1).

Security in International Investment Law 281 So, for an economic or financial crisis to fall under ‘essential security interests’ it will have to reach the threshold of ‘vitally important’. Those economic and financial situations, or, for that matter, health and environmental situations, that do not meet this high threshold, may qualify as a ‘security interest’ but not as an ‘essential security interest’. Thus, the tribunal in CMS v Argentina, after ruling that an economic crisis is a ‘security interest’, said that the real question is ‘how grave an economic crisis must be so as to qualify as an essential security interest’.41 The CMS tribunal described this threshold in terms of ‘total ­collapse’.42 Thus, the tribunal held that, although the economic crisis faced by ­Argentina was severe, it ‘did not result in total economic and social ­collapse’.43 ­ Likewise, the Enron v Argentina tribunal held that the ­threshold for successful invocation of ‘essential security interests’ is very high—the crisis should compromise the very existence of the state and its independence.44 The chief reason for such a high threshold is the reliance of these tribunals on the customary international law defence of necessity45 to interpret Article XI of the US-Argentina BIT (the use of the customary international law defence of necessity to interpret ‘necessary’ in Article XI is discussed later in detail). For example, the tribunal in Sempra v Argentina held that since the BIT does not define the meaning of ‘essential security interests’, the requirements of state of necessity under customary international law become relevant.46 The customary international law defence of necessity is given in ­Article 25 of the Draft Articles on Responsibility of States for Internationally Wrongful Acts.47 Article 25 states that ‘this defence can be invoked if the adopted measure is the “only way” for the state to safeguard an essential interest against a “grave and imminent peril”’.48 Furthermore, this defence is ­subject to three more stringent conditions. First, the adopted measure should not impair the essential interest of the other state or of the international

41 

CMS v Argentina (n 11) para 361. ibid, paras 354, 355. 43  ibid, para 355. 44  Enron v Argentina (n 12) para 306. See also Sempra v Argentina (n 13) para 348. 45 This customary defence of necessity is given in Article 25 of the International Law ­Commission’s (ILC) Draft Articles on Responsibility of States for Internationally ­Wrongful Acts (2001) legal.un.org/ilc/texts/instruments/english/draft%20articles/9_6_2001.pdf [hereinafter ILC Draft Articles on State Responsibility]. See also the arguments of Gazzini (n 36) 18 in the context of the NPM provision of US-Argentina BIT (Article XI), that the gap created in Article XI of the US-Argentina BIT, by not defining essential security interests, can be filled by the notion of ‘grave and imminent peril’ given in Article 25 ILC Draft Articles on State Responsibility. 46  Sempra v Argentina (n 13) para 375. 47  ILC Draft Articles on State Responsibility (n 45) Article 25. 48  ibid, Article 25(1)(a). 42 

282  Prabhash Ranjan community as a whole.49 Second, the international o ­ bligation in q ­ uestion should not exclude the possibility of invoking necessity.50 Third, the invoking state should not have contributed to the situation of ­necessity.51 These conditions make the customary international law defence of necessity a very stringent exception to preclude w ­ rongfulness.52 Indeed, this was recognised by the tribunal in CMS v Argentina when it said: While the existence of necessity as a ground for precluding wrongfulness under international law is no longer disputed, there is also consensus to the effect that this ground is an exceptional one and has to be addressed in a prudent manner to avoid abuse. The very opening of the Article to the effect that necessity ‘may not be invoked’ unless strict conditions are met, is indicative of this restrictive approach of international law… The reason is not difficult to understand. If strict and demanding conditions are not required or are loosely applied, any State could invoke necessity to elude its international obligations. This would certainly be contrary to the stability and predictability of the law.53

The high threshold of ‘total collapse’ provided by the CMS, Sempra and Enron tribunals begs the following observations. First, such a high ­threshold to invoke the ‘essential security interests’ exception means that this exception will not be available to host states in situations short of ‘total collapse’ or ‘total breakdown’. However, the threshold of ‘total collapse’ is extremely high and will leave host states without any effective remedy in situations short of ‘total collapse’ that require an immediate response. This was recognised by the LG&E tribunal, which held that what qualifies as an ‘essential’ interest is not limited to those interests referring to the state’s existence alone.54 Any danger seriously compromising the internal and external situation of the state could also be an ‘essential’ interest.55 Second, the requirement that host states should act only when there is a ‘total collapse’ or a ‘total breakdown’ means that a catastrophic ­situation has already occurred before the state has recourse to the ‘essential security interests’ exception.56 However, when a catastrophic situation has already occurred, then nothing will be left for the host state to protect.57 Such an interpretation defeats the very purpose of having an ‘essential security interests’ exception in the first place. States would not have ­

49 

ibid, Article 25(1)(b). ibid, Article 25(2)(a). 51  ibid, Article 25(2)(b). 52  J Crawford, The International Law Commission’s Articles on State Responsibility: Introduction, Text and Commentaries (Cambridge, Cambridge University Press, 2002) 160–86. 53  CMS v Argentina (n 11) para 317. 54  LG&E v Argentina (n 14) para 251 55 ibid. 56  Continental Casualty v Argentina (n 3) para 180. 57 ibid. 50 

Security in International Investment Law 283 agreed on an ‘essential security interest’ exception that would be practically unworkable. Third, the requirement that host states can use the ‘essential security interests’ exception only when there is ‘total collapse’ does not give any deference to the host state to decide as to what constitutes a risk to its national security.58 The LG&E tribunal rightly held that what is ‘essential’ has to be determined in the specific circumstances in which the state finds itself and cannot be predefined in an abstract manner.59 It has also been argued that since investment treaty arbitration operates in a public law context,60 tribunals cannot employ strict private law standards of review to adjudicate sovereign state action.61 Thus, it is imperative that tribunals grant a due margin of appreciation62 to states to decide when a ‘security interest’ reaches the threshold to qualify as ‘essential security interest’. C.  Measures Should be ‘Necessary’ to Protect Security Interests An important issue in the debate on protecting security interests in international investment law is related to the meaning of ‘necessary’. As discussed previously, Article XI of the US-Argentina BIT precludes the application of measures ‘necessary’ for the protection of ‘essential security interests’. In other words, measures that are not ‘necessary’ to protect ‘essential security interests’ are not precluded from the US-Argentina BIT. Thus, it is important to determine the meaning of the word ‘necessary’. In this regard, there is a great degree of divergence amongst the arbitral tribunals. The majority of tribunals have relied on the customary international law defence of necessity, in one form or the other, to interpret ‘necessary’ in the ‘essential security interests’ exception given in Article XI of the US Argentina BIT. On the one hand, the tribunals in CMS v Argentina, Enron v Argentina and Sempra v Argentina relied entirely on the customary international law defence of necessity in a conceptually obfuscated manner

58 WW Burke-White and A von Staden, ‘Private Litigation in Public Law Sphere: The Standard of Review in Investor State Arbitrations’ (2010) 35 Yale Journal of International Law 283. 59  LG&E v Argentina (n 14) para 252. 60  On public law conceptualisation of investment treaty arbitration, see G Van Harten, Investment Treaty Arbitration and Public Law (Oxford, Oxford University Press, 2007). 61  Burke-White and von Staden (n 58). See also A Stone Sweet, ‘Investor-State Arbitration: Proportionality’s New Frontier’ (2010) 4 Law and Ethics of Human Rights 47. 62  On the margin of appreciation in international investment law, see J Arato, ‘The Margin of Appreciation in International Investment Law’ (2014) 54 Virginia Journal of International Law 545.

284  Prabhash Ranjan to interpret ‘necessary’ in the treaty. The LG&E v Argentina tribunal used it to confirm its interpretation of the treaty defence of ‘necessary’. The El Paso v Argentina tribunal used one component of the customary international law defence of necessity to interpret ‘necessary’ in the BIT. On the other hand, the tribunal in Continental Casualty v Argentina relied on World Trade Organisation (WTO) jurisprudence concerning Article XX of GATT 1994 to interpret ‘necessary’ in the BIT.63 These cases are critically examined below, starting with CMS. The CMS tribunal reviewed Argentina’s measure on the basis of necessity under Article 25 of the ILC Draft Articles on State ­Responsibility64 and subsequently looked at the measure under Article XI of the ­US-Argentina BIT, or the so-called ‘NPM’ (the provision aimed at providing regulatory latitude to the host country in a BIT).65 However, the tribunal’s analysis under Article XI is inseparable from the analysis undertaken under ­Article 25 ILC Draft Articles because the tribunal drew heavily on ­Article 25, even while interpreting Article XI of the US-Argentina BIT.66 For example, while interpreting Article XI, the tribunal, drawing on ­Article 25 ILC Draft Articles, asked whether ‘the act in question does not seriously impair an essential interest of the State or States towards which the obligation exists’, although Article XI does not contain such a condition.67 As a result, the tribunal reached the same conclusion. The Enron tribunal, likewise, held that since the Argentinean measures do not meet the requirements of the customary international law defence of necessity, they cannot be held to preclude Argentina’s wrongfulness.68 The tribunal further held that since these measures do not meet the customary international law defence, there is no need to review these measures under Article XI of the treaty because that provision does not set out conditions that are different from customary international law in this regard.69 The Sempra tribunal recognised that a treaty regime, specifically dealing with a given matter, would prevail over the general rules of customary international law.70 However, the tribunal held that since, in the present case, the treaty itself does not provide the legal elements required for the invocation of state of necessity, recourse must be made to customary international law to address the question of necessity.71 63  On the relationship between international investment law and trade law, see ME Footer, ‘On the Laws of Attraction: Examining the Relationship between Foreign Investment and International Trade’ in Echandi and Sauvé (n 39). 64  CMS v Argentina (n 11) para 304 onwards. 65  ibid, paras 353–78. 66 ibid. 67  ibid, para 357. 68  Enron v Argentina (n 12) paras 333–34. 69  ibid, para 339. See also the discussion in Newcombe and Paradell (n 5) 494–95 70  ibid, para 378. 71 ibid.

Security in International Investment Law 285 The interpretative methodology followed by these tribunals has been described as the method of confluence72 and has been subjected to ­criticism.73 It has been forcefully argued that if host states merely intended the NPM provision to refer to the necessity defence in customary international law, then there was no need to have such a provision in the first place because the customary international law defence of necessity is available to host states anyway.74 Even if the two norms (treaty-based and customary international law) appear indistinguishable in content, they retain an autonomous life of their own.75 Further criticism of this approach has come from the CMS annulment committee. The annulment committee pointed to the main conceptual difference between the treaty-based and customary international law norms. This difference is related to Article XI being an exception to the treaty, whereas necessity under customary international law precludes the wrongfulness of the state.76 The CMS annulment committee stated that Article XI is a threshold requirement in the sense that, if it applies, then the substantive obligations given in the BIT are inapplicable.77 On the other hand, the state of necessity under Article 25 ILC Draft Articles is grounds for precluding wrongfulness of an act not in conformity with international obligations and thus is different from an NPM provision in a BIT, which is specific to the investment treaty.78 The CMS annulment committee also pointed out that the necessity condition in Article 25 ILC Draft Articles is subordinated to four conditions, which are not present in the NPM provision in US-Argentina BIT.79 The LG&E tribunal differed from the three tribunals in its interpretative methodology when analysing the Argentinean measure.80 It first 72 

Kurtz (n 8) 341. Burke-White and A von Staden, ‘Investment Protection in Extraordinary Times: The Interpretation and Application of Non-Precluded Measures Provisions in Bilateral Investment Treaties’ (2008) 48 Virginia Journal of International Law 307; Kurtz (n 8); G ­Bottini, ‘Protection of Essential Interests in the BIT era’ in T Weiler et al (eds), Investment Treaty ­Arbitration and International Law (New York, Juris Publishing, 2008). For a detailed discussion of these cases, see Bjorklund (n 35); for support for these three tribunals, see Alvarez and Khamsi (n 6). 74  Burke-White and von Staden (n 73) 344. 75  ibid, 323. 76  Newcombe and Paradell (n 5) 495. 77 ibid. CMS Gas Transmission Co v Argentina, ICISD Case No ARB/01/8, Annulment ­Proceeding (25 September 2007) para 129. 78  CMS v Argentina (n 77). Dolzer and Schreuer (n 4) 189 point out that this interpretation provides less protection to the foreign investor than under customary international law. 79  Dolzer and Schreuer (n 4) 189 criticise the CMS annulment committee for going beyond its proper role by laying down the proper understanding of Article XI of the US-Argentina BIT. 80  For differences between the LG&E and CMS tribunals, mainly on the issues of the burden of proof and compensation, see SW Schill, ‘International Investment Law and the Host State’s Power to Handle Economic Crises—Comment on the ICSID Decision in LG&E v Argentina’ (2007) 24(3) Journal of International Arbitration 265. 73  WW

286  Prabhash Ranjan used the NPM provision and subsequently used Article 25 ILC Draft Articles to confirm its conclusion reached under the NPM measure.81 The tribunal held that conditions in Argentina were such that the economic response adopted by Argentina was in accordance with Article XI of the ­US-Argentina­BIT and thus excused Argentina from alleged treaty violations for a period from 1 December 2001 to 26 April 2003.82 The tribunal then referred to Article 25 ILC Draft Articles to support its c­ onclusions.83 This ­methodology of the LG&E tribunal is puzzling. If a measure is found to be in accordance with the NPM provision, then there is no need to find support for it from Article 25 ILC Draft Articles because, as m ­ entioned above, these two defences are separate.84 The tribunal in El Paso v Argentina also relied on the customary international law defence of necessity to interpret ‘necessary’ in Article XI. However, it did not follow the method of confluence to interpret ‘necessary’ in the BIT, though it reached the same conclusion as the CMS, Enron and Sempra tribunals. The El Paso tribunal relied on ‘concepts used in Article 25 of the Draft Articles’ to interpret Article XI of the US-Argentina BIT.85 The tribunal held that the requirement of ‘necessity’ under Article XI of the US-Argentina BIT ‘presupposes that the State has not contributed, by acts or omissions, to creating the situation which it relies on when claiming the lawfulness of its measures’.86 The tribunal supported this conclusion by using Article 31(3)(c) of the Vienna Convention on the Law of Treaties (VCLT) to borrow from Article 25(2)(b) ILC Draft Articles (a state cannot use the ground of necessity if it has contributed to the situation) and to read it into Article XI of the US-Argentina BIT.87 It should be recalled that Article 31(3)(c) VCLT provides for ‘any relevant rules of international law applicable in the relations between the parties’ in the interpretation of a treaty provision. The El Paso tribunal concluded that Article 25(2)(b) is a general rule of international law and hence a ‘relevant rule’ under Article 31(3)(c) VCLT.88 81 

Reinisch (n 25) 208. LG&E v Argentina (n 14) para 245. 83  ibid and paras 257–59. 84  See also Kurtz’s criticism of the LG&E tribunal on this point (n 8) 355–56. 85  El Paso v Argentina (n 16) para 613. 86 ibid. On using Article 25 of the ILC Draft Articles on State Responsibility to interpret ‘necessary’ in the NPM provision occurring in the US-Argentina BIT, see R Dolzer, ‘­Emergency Clauses in Investment Treaties: Four Versions’ in MH Arsanjani et al (eds), Looking to the Future: Essays on International Law in Honour of WM Reisman (Leiden, Martinus Nijhoff, 2011) 715–16; F Orrego Vicuña, ‘Softening Necessity’ in Arsanjani et al, ibid, 741–50. 87  El Paso v Argentina (n 16) paras 613–26. 88  ibid, paras 613–21. The tribunal in El Paso v Argentina (n 16) also went on to show, very summarily, that Article 25(2)(b) ILC Draft Articles on State Responsibility is a ‘general principle of law recognised by civilized nations’ by citing the UNIDROIT Principles on International Commercial Contracts in support of its conclusion (n 16) para 623. The Continental Casualty tribunal had said that this particular provision of the customary international law 82 

Security in International Investment Law 287 On this basis, it concluded that a state cannot invoke the treaty defence of ‘necessity’ if it has itself created such necessity or has substantially contributed to it.89 Thus, the majority of the tribunal, in a severe indictment of the sovereign ability of Argentina to adopt economic policies that it preferred, concluded that since Argentina had contributed to the economic crisis by adopting faulty economic policies, it could not invoke the ‘necessary’ defence given in the BIT. This was notwithstanding the existence of an extremely severe political, economic and social situation.90 This conclusion is the same as the one reached by other investment arbitration tribunals in relying on the necessity defence in customary international law. The tribunal’s cursory analysis of a suitable treaty interpretation methodology raises a number of conceptual questions. First, does Article 31(3) (c) VCLT, which has been widely hailed as an instrument to bring about systemic integration of international law,91 allow for the importation and application of a customary international law ‘norm’ into the treaty ‘norm’ in a manner that blurs the distinction between the two norms? The c­ hapeau of Article 31(3), which states that while interpreting a treaty, interpretative materials shall be ‘taken into account’ ‘together with the context’, is important in this regard. In other words, even if customary international law is the ‘relevant rule of international law applicable in relation between the parties’, its weight in the interpretative process will be decided using the chapeau.92 The interpretative materials introduced by Article 31(3)(c) VCLT ‘carry (only) the same interpretative weight as the context’.93 The El Paso v Argentina tribunal did not discuss the interpretative weight to be given to this ‘relevant rule’, keeping the context of the BIT in mind. Instead, it ‘applied’ the customary norm, completely ignoring the fact that, in the application of Article 31(3)(c) VCLT, the treaty being interpreted retains a primary role, whereas the customary international law norm has a secondary role in the sense that the customary norm

defence of necessity ‘cannot be the yardstick as to the application of Art. XI of the BIT’ (n 3) para 234. See also A Martinez, ‘Invoking State Defences in Investment Treaty Arbitration’ in M Waibel et al (eds), The Backlash Against Investment Treaty Arbitration (The Hague, Kluwer Law International, 2010) 323. 89 

El Paso v Argentina (n 16) para 624. ibid, para 656. 91  C McLachlan, ‘The Principle of Systemic Integration and Article 31(3)(c) of the Vienna Convention’ (2005) 54(2) International and Comparative Law Quarterly 279. 92 M Paparinskis, ‘Investment Treaty Interpretation and Customary Law: Preliminary Remarks’ in C Brown and K Miles (eds), Evolution in Investment Treaty Law and Arbitration (Cambridge, Cambridge University Press, 2011) 73. 93 ibid. 90 

288  Prabhash Ranjan can neither wholly nor partially displace the treaty norm.94 The El Paso ­tribunal’s analysis partially displaces the treaty norm of ‘necessity’ with the customary ‘norm’ of necessity, thereby disregarding the differences in the ‘­context’ between the two.95 Second, the El Paso tribunal’s reasoning leaves one wondering why only Article 25(2)(b) ILC Draft Articles was discussed as a ‘relevant rule’ under Article 31(3)(c) VCLT to interpret ‘necessary’ in the NPM provision. Article 25 ILC Draft Articles, as mentioned above, provides four conditions, related to the invocation of ‘necessity’, including the fact that a state cannot invoke necessity if it has contributed to the situation of necessity. Thus, why are other conditions, like the one given in Article 25(1)(a) that requires that the invoked measure must be ‘the only way’ for the state to safeguard its essential interests, not relevant under Article 31(3)(c) in interpreting Article XI of the US-Argentina BIT?96 Third, while the tribunal used all the treaty interpretation rules given in Article 31 VCLT in deciding whether Article XI of the US-Argentina BIT is self-judging in character,97 it primarily relied only on Article 31(3)(c) VCLT to interpret ‘necessary’ under Article XI. It did not elaborate on the other tools of treaty interpretation given in Article 31 VCLT, such as the ‘context’ to interpret the treaty defence of ‘necessity’. Fourth, the El Paso tribunal’s reliance on the LG&E tribunal, to support its conclusion that necessity under the US-Argentina BIT pre-supposes that the state has not contributed to the situation of necessity, is misplaced. The LG&E tribunal did not use Article 25 ILC Draft Articles to interpret ‘necessity’ in Article XI of the US-Argentina BIT. It interpreted Article XI and reached the conclusion that the ‘protections afforded by Article XI have been triggered in this case, and are sufficient to excuse Argentina’s liability’.98 After reaching this conclusion, as mentioned above, the t­ ribunal used Article 25 to show that Argentina’s necessity defence also met the customary international law standard. The approach of the LG&E tribunal

94 P Sands, ‘Treaty Custom and Cross-Fertilization of International Law’ (1998) 1 Yale Human Rights and Development Law Journal 85, 103. See also M Samson, ‘High Hopes, Scant Resources: A Word of Scepticism about the Anti-Fragmentation Function of Article 31(3)(c) of the Vienna Convention on the Law of Treaties’ (2011) 24(3) Leiden Journal of International Law 701. 95  See Burke-White and von Staden (n 58) 296; see also C Binder, ‘Changed Circumstances in Investment Law: Interfaces between the Law of Treaties and the Law of State Responsibility with a Special Focus on the Argentine Crisis’ in C Binder et al (eds), International Investment Law for the 21st Century: Essays in Honour of Christoph Schreuer (Oxford, Oxford University Press, 2009) 617–20 for the argument that the potential of Article 31(3)(c) of the VCLT to reconcile treaty and customary law standards, in the case of necessity, is limited. 96  See Gazzini (n 36). 97  El Paso v Argentina (n 16) paras 588–610. 98  LG&E v Argentina (n 14) para 245.

Security in International Investment Law 289 is quite different from applying Article 25(2)(b) ILC Draft Articles to interpret Article XI of the US-Argentina BIT,99 as the El Paso tribunal did.100 The Continental Casualty v Argentina tribunal, like the CMS annulment committee, distinguished between the treaty defence and the customary international law defence. It also made it clear that the situations regulated by Article 25 ILC Draft Articles are different from those regulated by the NPM provision in the US-Argentina BIT.101 The tribunal viewed the strict conditions given in Article 25 ILC Draft Articles as exceptional in nature because they can be invoked in any context against any international ­obligation.102 Thus, the tribunal held that invocation of the NPM provision (in the US-Argentina BIT), limiting the general investment protection obligations, is not necessarily subject to the same conditions of application as the customary international law defence of necessity.103 The tribunal also said that in such situations of grave crisis, a state must be accorded a significant margin of appreciation.104 The Continental Casualty tribunal embraced the WTO jurisprudence on ‘necessary’ in Article XX of GATT 1994105 to find the meaning of ‘necessary’ in Article XI of the US-Argentina BIT.106 Before discussing how the Continental Casualty tribunal applied WTO jurisprudence, the WTO jurisprudence on ‘necessary’ in Article XX of

99 

El Paso v Argentina (n 16) para 619. It will be recalled that the Continental Casualty tribunal had said this particular provision of the customary international law defence of necessity ‘cannot be the yardstick as to the application of Art. XI of the BIT’ (n 3) para 234 and Martinez (n 88) 323. 101  Continental Casualty v Argentina (n 3) para 167. See also Sempra Energy International v Argentina, ICSID Case No ARB/02/16, Annulment Proceeding (29 June 2010) paras 198–200 and Dolzer (n 86) 705. 102  Sempra v Argentina (n 101) paras 198–200. 103  Sempra v Argentina (n 101) paras 198–200. For arguments in support of the approach adopted by the Continental Casualty tribunal to discover the legal nature of the NPM in ­US-Argentina BIT, see Gazzini (n 36) 7. 104  Continental Casualty v Argentina (n 3) para 181. For views supporting the margin of appreciation as the appropriate standard of review in the context of BIT disputes, see BurkeWhite and von Staden (n 58). 105  On WTO’s jurisprudence on ‘necessary’, see Appellate Body Report, Korea—Measures Affecting Imports of Fresh, Chilled and Frozen Beef WT/DS 161 and WT/DS169/AB/R (adopted 10 January 2001); Appellate Body Report, Dominican Republic—Measures Affecting the Importation and Internal Sale of Cigarettes WT/DS320/AB/R (adopted 19 May 2005); Appellate Body Report, US—Measures Affecting the Cross-Border Supply of Gambling and Betting WT/DS/285/ AB/R (adopted 20 April 2005); Appellate Body Report, Brazil—Measures Affecting Imports of Retreaded Tyres WT/DS332/AB/R (17 December 2007) [hereinafter Brazil-Tyres]. 106  Continental Casualty v Argentina (n 3) paras 192–95. The use of WTO jurisprudence to interpret ‘necessary’ in Article XI of the US-Argentina BIT has been criticised, see JE Alvarez and T Brink, ‘Revisiting the Necessity Defence: Continental Casualty v Argentina’ (2010–11) 2 Oxford Yearbook of International Investment Law and Policy 319. The use of WTO rules to interpret Article XI of the US-Argentina BIT was one of the grounds on which annulment of the award was sought, although the annulment committee in Continental Casualty did not annul the award on this ground; see Continental Casualty Company v Argentina, ICSID Case No ARB/03/9, Annulment Proceeding (16 September 2011) para 132. 100 

290  Prabhash Ranjan GATT 1994, which in essence involves a three-step test, will be briefly examined. First, the measures must have an objective, which is recognised under the list of exceptions given in Article XX of GATT 1994. Second, the panel should weigh and balance the degree to which the measure in question achieves its objective, with the extent to which the measure restricts international trade in the context of the overall significance of the regulatory objective sought to be achieved. Third, if this yields a preliminary conclusion of the measure being ‘necessary’, then the panel should compare this measure with other least trade restrictive measures that are reasonably available to the importing Member.107 The WTO’s necessity test represents a variant of the three-step proportionality analysis.108 These steps are as follows. First, whether the measure is suitable for the legitimate public purpose—this will require a causal link between the measure and its object.109 Second, whether the measure is necessary (ie whether there is a less investment-restrictive alternative measure reasonably available that will achieve the same objective). The third step will involve proportionality stricto sensu (ie weighing and balancing the importance of the permissible objective sought to be achieved with the restriction on trade).110 Although weighing and balancing in the WTO’s necessity test is not the same as proportionality stricto sensu,111 it has been criticised by many because it allows the WTO adjudicator to replace the importing country’s assessment with their own assessment.112 The Continental Casualty tribunal applied the WTO jurisprudence to determine whether Argentina’s measures satisfied the test of ‘necessity’ by asking the following questions: whether the measures contributed 107 AD Mitchell and C Henckels, ‘Variations on a Theme: Comparing the Concept of Necessity in International Investment Law and WTO Law’ (2013) 14(1) Chicago Journal of International Law 93; MM Du, ‘Autonomy in Setting Appropriate Level of Protection under the WTO Law: Rhetoric or Reality?’ (2010) 13(4) Journal of International Economic Law 1077, 1093. 108  B Kingsbury and SW Schill, ‘Public Law Concepts to Balance Investors’ Rights with State Regulatory Actions in the Public Interest—the Concept of Proportionality’ in SW Schill (ed), International Investment Law and Comparative Public Law (Oxford, Oxford University Press, 2010) 85–88. 109  ibid. Also see JH Jans, ‘Proportionality Revisited’ (2000) 27(30) Legal Issues of Economic Integration 239, 240. 110  Kingsbury and Schill (n 108) 85–88. 111  For views supporting the use of the proportionality analysis framework in context of BIT disputes to review state action, see Stone Sweet (n 61) 48. 112 See J Neumann and E Türk, ‘Necessity Revisited: Proportionality in World Trade Organization Law After Korea—Beef, EC—Asbestos and EC—Sardines’ (2003) 37(1) Journal of World Trade 199, 232–33; P Van den Bossche, ‘Looking for Proportionality in WTO Law’ (2008) 35(3) Legal Issues of Economic Integration 283, 284; C Bown and J Trachtman, ‘Brazil— Measures Affecting Imports of Retreaded Tyres: A Balancing Act’ (2009) 8(1) World Trade Review 85; DH Regan, ‘The Meaning of ‘Necessary’ in GATT Article XX and GATS Article XIV: The Myth of Cost-Benefit Balancing’ (2007) 6(3) World Trade Review 347, 348; Du (n 107) 1093. For a different view, see M Trebilcock, R Howse and A Eliason, The Regulation of International Trade, 4th edn (London, Routledge, 2013) 683–84.

Security in International Investment Law 291 materially to the realisation of essential security interests (the legitimate aim under Article XI)113 and whether there existed alternative measures reasonably available to Argentina, ‘which were less in conflict or more compliant with its international obligations, while providing an equivalent contribution to the achievement of the objective pursued’.114 The tribunal answered the first question in the affirmative, by stating that there is a genuine means-end relationship between the measures and the objective,115 and the second question negatively116 and thus came to the conclusion that measures adopted by Argentina were ‘necessary’ to protect its essential security interests.117 It is important to note the fact that the tribunal only undertook a ‘means-end relationship’ analysis but did not weigh and balance the significance of the objective with the restrictive impact on investment.118 This could be explained by the reliance of the Continental Casualty tribunal on the ‘margin of appreciation’ standard to review Argentina’s measure.119 The Continental Casualty tribunal provided a robust interpretative framework to interpret ‘necessary’ in the ‘essential security interest’ exception of the kind found in Article XI of the US-Argentina BIT. It was of the view that an investment arbitration tribunal, while deciding on whether measures adopted are ‘necessary’ to achieve ‘essential security interests’, should not engage in finding out how the benefit of the goal would balance against the restrictive effect on the investment.120 Accordingly, an investment arbitration tribunal lacks the institutional competence to undertake such balancing, which is akin to a fully-fledged proportionality analysis.121 Investment arbitration tribunals are not embedded in the political and social system of the communities about whose disputes they are called upon to decide122 and they have no, or only inadequate, knowledge of

113 

Continental Casualty v Argentina (n 3) para 196. ibid, para 198; see also Brazil-Tyres (n 105) para 156. 115  Continental Casualty v Argentina (n 3) para 197. 116  ibid, paras 200–19. 117  The only measure of Argentina that the Continental Casualty tribunal found that did not satisfy the requirements of ‘necessity’ was related to the restructuring of the Treasury bills (n 3) para 221. 118  Stone Sweet (n 61) 73 describes this as a mature form of proportionality analysis. 119  Continental Casualty v Argentina (n 3) paras 181 and 187. See Burke-White and von Staden (n 58) 326–27. 120  Kurtz (n 8) 369. 121 ibid. 122  Burke-White and von Staden (n 58) 323; Vaughan Lowe, ‘Regulation or Expropriation’ (2002) 55 Current Legal Problems 447, 464–65. Even those who advocate the use of the proportionality test in investment treaty arbitration accept this criticism of the proportionality test; see Kingsbury and Schill (n 108) 104. The response to overcoming these problems is not very satisfactory as they mostly relate to adopting the proportionality test and using it because other alternatives are not useful. 114 

292  Prabhash Ranjan the overall legal, political and social context related to the dispute.123 This position makes them less suitable to adopt an intrusive review of the kind contained in a fully-fledged proportionality analysis.124 D. Essential Security Interests in BITs Containing Self-Judging Language The issue of protecting security interests in those BITs that not only contain a ‘security interests’ exception, which is self-judging but also contain a list of activities related to ‘essential security interests’, is now examined.125 In order to understand this issue, an example from the investment chapter in the India-Korea Free Trade Agreement,126 which contains such a provision, is taken. Article 10.18(2) of India-Korea BIT provides that Nothing in this Chapter shall be construed (a) to require a Party to furnish any information, the disclosure of which it considers contrary to its essential security interests; (b) to prevent a Party from taking any actions which it considers necessary for the protection of its essential security interests; (i) relating to the traffic in arms, ammunition and implements of war and to such traffic in other goods and materials or relating to the ­supply of services as carried on, directly or indirectly, for the purpose of supplying or provisioning a military establishment; (ii) taken in time of war or other emergency in international relations; (iii) relating to fissionable and fissionable materials or the materials from which they are derived; or (iv) to protect critical public infrastructures for communications, power and water supply from deliberate attempts intended to disable or degrade such infrastructures.

123  It is also argued that investment treaty arbitration is heavily influenced by the style and culture of international commercial arbitration and the arbitrators are not grounded in public international law, nor are they trained to settle public law questions; see T Wälde, ‘Interpreting Investment Treaties: Experiences and Examples’ in C Binder et al (n 95) 725–26. 124  Burke-White and von Staden (n 58) 323. 125  This discussion draws on the author’s previous work, see P Ranjan, ‘Non Precluded Measures in India’s International Investment Agreements and India’s Regulatory Power as a Host Nation’ (2012) 2(1) Asian Journal of International Law 29. 126 Comprehensive Economic Partnership Agreement between Republic of India and Korea (signed 7 August 2009) [hereinafter India-Korea BIT] http://commerce.nic.in/trade/ INDIA%20KOREA%20CEPA%202009.pdf.

Security in International Investment Law 293 Similar provision exists in the investment chapters of the China-ASEAN FTA127 (Article 17); the China-New Zealand FTA128 (Article 201); the JapanSingapore New Age Economic Partnership Agreement129 (­ Article 4); the Canada-Peru BIT130 (Article 10.4); the Australia Singapore FTA131 (­Article 22 of the investment chapter). Article 23.2 of the US-Chile FTA132 only contains the equivalent of Article 10.18(2)(a) but not Article 10.18(2) (b) of the India-Korea BIT.133 Article 10.18(2)(b) of the India-Korea BIT is almost a mirror image of Article XXI(b) GATT 1994. Article XXI(b) GATT provides Nothing in this Agreement shall be construed (b) to prevent any contracting party from taking any action which it considers necessary for the protection of its essential security interests (i) relating to fissionable materials or the materials from which they are derived; (ii) relating to the traffic in arms, ammunition and implements of war and to such traffic in other goods and materials as is carried on directly or indirectly for the purpose of supplying a military establishment; (iii) taken in time of war or other emergency in international relations;

Article 10.18(2)(b) of the India-Korea BIT provides that nothing in the investment chapter shall be construed to prevent a party from taking any actions ‘which it considers’ necessary for the protection of its ‘essential security interests’. This chapeau is then followed by a list of activities related to ‘essential security interests’. The presence of the phrase, ‘which it considers’ before ‘necessary’ in this particular BIT means that the host state can self-judge or unilaterally determine whether the measures are

127  Agreement on Investment of the Framework Agreement on Comprehensive ­Economic Cooperation between the Association of South East Asian Nations and the ­ People’s Republic of China (signed 15 August 2009) http://fta.mofcom.gov.cn/inforimages/ 200908/20090817113007764.pdf. 128 Free Trade Agreement between the Government of New Zealand and the Government of the People’s Republic of China (signed in 2008) www.chinafta.govt.nz/1-Theagreement/2-Text-of-the-agreement/0-downloads/NZ-ChinaFTA-Agreement-text.pdf. 129 Agreement Between Japan and the Republic of Singapore for a New Age Economic Partnership (signed 13 January 2002) www.mofa.go.jp/region/asia-paci/singapore/jsepa-1. pdf. 130 Agreement Between Canada and the Republic of Peru for the Promotion and ­Protection of Investment (signed 14 November 2006) www.treaty-accord.gc.ca/text-texte. aspx?id=105078. 131  Singapore-Australia Free Trade Agreement (enforced 28 July 2003) www.fta.gov.sg/ fta_safta.asp?hl=4. 132  United States-Chile Free Trade Agreement (enforced 1 January 2004) www.ustr.gov/ trade-agreements/free-trade-agreements/chile-fta/final-text. 133 For more on the presence of such clauses in International Investment Agreements, see A Newcombe, ‘General Exceptions in International Investment Agreements’ in M-C ­Cordonier Segger et al (eds), Sustainable Development in World Investment Law (The Hague, Kluwer Law International, 2011) 351.

294  Prabhash Ranjan ‘necessary’ to protect ‘essential security interests’. This confers significant deference on the host state.134 An interesting question that may arise in this regard is whether the selfjudging language also applies when identifying what is an ‘essential security interest’. In other words, is the right of the host state to undertake an unilateral assessment limited to determining the actions necessary for the protection of ‘essential security interests’ or does it also extend to determining what is an ‘essential security interest’ in the first place? This question can be answered by carefully examining the language of Article 10.18(2)(a) of the India-Korea BIT, which states that the host state is not required to furnish any information, the disclosure of ‘which it ­considers’ contrary to its ‘essential security interest’. In other words, as per this provision, the host state has the right to self-judge or unilaterally assess whether the disclosure of information is contrary to its ‘essential security interest’. However, the host state can self-judge this question only if it is also allowed to self-judge what is an ‘essential security interest’ in the first place. Without having the right to self-judge what is an ‘essential security interest’, the host state’s right to self-judge the question of whether to disclose a particular piece of information to protect an ‘essential security interest’ would be meaningless. Hence, if the host state can determine ‘essential security interests’ under sub-paragraph (a), unilaterally, then it should also be allowed to selfjudge what constitutes an ‘essential security interest’ under sub clause (b). It would be unusual if the host state is allowed to determine ‘essential security interest’ under paragraph (a) but not under paragraph (b).135 Notwithstanding the above argument, there is a fundamental difference in sub-paragraph (a) and sub-paragraph (b) of the India-Korea BIT. Sub-paragraph (a) does not provide a list of activities related to ‘essential security interests’, whereas in sub-paragraph (b), ‘essential security interests’ is related to a list of activities and situations. This list contains all military-type threats or situations where the security of the state is endangered due to a war and also other things related to nuclear materials and protection of critical public infrastructure. Thus, arguably, in sub-paragraph (a) ‘essential security interests’ has a broader scope when compared to sub-paragraph (b). This means that the argument of the selfjudging ‘essential security interests’ in sub-paragraph (a) does not apply to sub-paragraph (b). Furthermore, ‘which it considers’ (the self-judging phrase) is placed between ‘taking any actions’ and ‘necessary’. Thus, India can only decide 134 

Burke-White and von Staden (n 73) 369. this regard, see also the arguments on Article XXI of GATT 1994 in D Akande and S Williams, ‘International Adjudication on National Security Issues: What Role for the WTO?’ (2003) 43(2) Virginia Journal of International Law 365, 397. 135  In

Security in International Investment Law 295 the necessary measures to be adopted for the protection of its essential security interests. There is nothing in the provision to show that the host state also has to decide, on its own, what constitutes an essential security interest for the purpose of sub-paragraph (b). Thus, arguably an ‘essential security interest’ can be self-determined by the host state in sub-paragraph (a) but not in sub-paragraph (b), which contains a list of activities related to ‘essential security interests’. Even in sub-paragraph (a), where the host state can unilaterally determine what an ‘essential security interest’ is, this unilateral determination should be restricted to strict security-related activities of the kind given in sub-paragraph (b). The reason for this is that the India-Korea BIT contains a separate general exception clause that allows the host state to deviate from its BIT obligations for situations such as public health and the conservation of exhaustible natural resources.136 In other words, in the case of a public health emergency, the host state does not need the ‘essential security interests’ exception and can rely on the ‘public health’ permissible objective occurring in the ‘non security’ part of the non-precluding measures provision in the BIT. Thus, the clear intention of the states is to restrict the ‘essential security interest’ exception in the BIT strictly to security-related ‘essential interests’ only. III.  PROTECTING SECURITY INTERESTS IN THOSE BITs THAT DO NOT CONTAIN AN ‘ESSENTIAL SECURITY INTERESTS’ EXCEPTION

So far this chapter has discussed the issue of protecting security interests in international investment law in situations where the BIT contains an exception in the form of an ‘essential security interests’ clause. It now focuses on situations where the BIT does not contain a ‘security interests’ exception. How states can protect their security interests in disputes arising under such BITs will now be examined. In order to understand this issue, the focus is again on BIT disputes against Argentina where foreign investors challenged Argentina’s regulatory measures to tackle the severe economic crisis that engulfed the entire country in early 2000. Apart from US investors, investors from other states, such as the UK, Italy and France, also brought claims against Argentina. While US investors relied on the US-Argentina BIT, other investors relied on other similar treaties, like the UK-Argentina BIT, the Italy-Argentina BIT and the France-Argentina BIT. A critical distinction between the US-Argentina BIT and other BITs signed by Argentina is the presence of a ‘security interests’ exception in the ­former and an absence in the latter set of treaties. BIT disputes involving such treaties are the focus of this section. 136 

See India-Korea BIT (n 126) Article 10.18 (1).

296  Prabhash Ranjan In BG Group Plc v Argentina,137 a UK company brought a case against Argentina under the UK-Argentina BIT alleging that a series of Argentinean regulatory measures to address serious macroeconomic ­ concerns severely impacted its investment. Thus, BG Group argued that Argentina violated many provisions of the UK-Argentina BIT, such as the fair and equitable treatment provision. Argentina, on the other hand, defended its measures by arguing that such measures were necessary to protect ­Argentina from a severe economic, social and political ­crisis.138 Argentina relied on Article 4 of the UK-Argentina BIT to make this defence. Article 4 of UK-Argentina provides: Investors of one Contracting Party whose investments in the territory of the other Contracting Party suffer losses owing to war or other armed conflict, revolution, a state of national emergency, revolt, insurrection or riot or resulting from arbitrary action by the authorities in the territory of the latter Contracting Party shall be accorded by the latter Contracting Party treatment, as regards restitution, indemnification, compensation or other settlement, no less favourable than that which the latter Contracting Party accords to its own investors or to investors of any third State. Resulting payments shall be freely transferable.

However, the tribunal held that Article 4 of the UK-Argentina BIT does not give any ‘state of emergency’ defence to Argentina.139 Instead, it is merely concerned with offering treatment no less favourable to a foreign investor in the situation where nationals of the host state or investors of any other state are indemnified, compensated, or benefit from a ­settlement.140 Thus, according to the tribunal, the BIT expressly mandates for liability and compensation and does not excuse it.141 Argentina also argued that the principle reflected in Article XI of the USArgentina BIT ‘exists regardless of its inclusion in the BIT’.142 ­Argentina argued that a BIT cannot prohibit a state from adopting such measures as it deems necessary to maintain public order and guarantee the protection of its ‘essential security interests’.143 However, the tribunal did not agree with Argentina. It held that there is no support for the argument that, in the absence of an express provision (the UK-Argentina BIT does not contain a provision analogous to Article XI of the US-Argentina BIT), Article XI of the US-Argentina BIT should be automatically read into the

137  BG Group Plc v Argentina, UNCITRAL Arbitration Rules, Final Award (24 December 2007). 138  ibid, para 367. 139 ibid, para 381–84; see also CMS v Argentina (n 11) para 375 and Enron v Argentina (n 12) para 320. 140  BG Group Plc v Argentina (n 137) para 381. 141 ibid. 142  ibid, para 373. 143 ibid.

Security in International Investment Law 297 UK-Argentina BIT.144 In other words, there is no automatic reading of the ‘essential security interests’ exception into a BIT that specifically does not include such an exception. The tribunal then examined Argentina’s defence under the customary international law of necessity and came to the conclusion that Argentina’s measures aimed at addressing a severe economic crisis cannot be excused under Article 25 ILC Draft Articles.145 This issue also arose in another case called AWG v Argentina,146 which saw investors from three different states bringing claims against ­Argentina under three different BITs—Suez and Vivendi, both incorporated in France, claimed rights under the Argentina-France BIT, AGBAR, incorporated in Spain, invoked its rights under the Argentina-Spain BIT, and AWG, incorporated in the United Kingdom, invoked the ­Argentina-UK BIT. These companies, incorporated in different states, were shareholders in a company incorporated in Argentina, whose investment in water distribution and wastewater treatment services was impacted due to ­Argentina’s regulatory measures.147 In this case, once the tribunal found that Argentina had violated the substantive BIT obligations, Argentina argued that its regulatory ­measures were necessary to deal with the severe economic crisis.148 While the tribunal recognised the severity of the crisis, it held that this alone was not sufficient to excuse Argentina of its international obligations.149 The tribunal examined Argentina’s defence under Article 25 ILC Draft Articles and came to the conclusion that, since the regulatory measures adopted by Argentina were not the only means available to Argentina to tackle the financial crisis and since Argentina itself contributed to the crisis, the ­Article 25 defence was not an available defence.150 The tribunal also held that since the applicable BITs do not contain a ‘security interests’ exception of the kind present in the US-Argentina BIT, Argentina could not claim any defence under those BITs.151 Likewise, in Impregilo v Argentina,152 which involved the ArgentinaItaly BIT, after it was determined that Argentina had violated substantive BIT obligations like the fair and equitable treatment, the tribunal

144 

ibid, paras 385–86. ibid, paras 407–12. 146  AWG Group v Argentina, ICSID Case No ARB/03/19, Decision on Liability (30 July 2012); see also Suez, Sociedad General de Aguas de Barcelona SA, and Vivendi Universal SA v The Argentine Republic, ICSID Case No ARB/03/19, Decision on Liability (30 July 2012). 147  AWG v Argentina (n 146) para 1. 148  ibid, para 250. 149  ibid, para 258. 150  ibid, paras 259–65. 151  ibid, paras 270–71. 152  Impregilo SpA v The Argentine Republic, ICSID Case No ARB/07/17, Award (21 June 2011). 145 

298  Prabhash Ranjan examined Argentina’s argument that such breaches should be excused because they were necessary to address a severe economic crisis. The tribunal recognised that the economic and financial crisis affecting Argentina was extremely severe.153 However, in the absence of any ‘security exceptions’ clause in the relevant BIT, the tribunal examined Argentina’s defence under the customary international law of necessity and found that ­Argentina did not meet the stringent conditions of Article 25 ILC Draft Articles.154 Similarly in EDF v Argentina,155 the tribunal examined ­Argentina’s necessity defence under Article 25 ILC Draft Articles and rejected it.156 The tribunal noted that the Argentina-France BIT does not contain a ‘security interests’ exception of the Article XI-type present in the US-Argentina BIT.157 The discussion of these cases amply demonstrates that the tribunals have been reluctant to read an Article XI-type ‘security interests’ exception into a BIT when none exists in the first place. In the absence of a ‘security interests’ exception, a regulatory measure adopted to address a security interest, broadly defined, that violates any substantive BIT provision, shall be excused if it falls under Article 25 ILC Draft Articles. It cannot be excused under the BIT. IV. CONCLUSION

On the basis of the discussion above, it can be concluded that in BITs that contain a ‘security interests’ exception but do not define it, ‘security interests’ can be interpreted broadly to include not just strict security-related interests but also other interests, such as economic, health and environmental. However, these interests should be ‘essential’ for them to be described as an ‘essential security interest’ under provisions of the kind in Article XI of US-Argentina BIT. In other words, these interests should meet a high threshold although, as has been seen, there is divergence among the arbitral tribunals that have rendered decisions on Article XI of the US-Argentina BIT concerning this issue. It can also be concluded that

153 

ibid, para 336. paras 344–59. The tribunal also examined Argentina’s defence under Article 4 of the Argentina-Italy BIT, which provides for equality of treatment between foreign and national investment in situations of national emergency. However, like other tribunals, it decided that Argentina cannot make use of such a provision to excuse regulatory measures that violate other substantive BIT obligations. 155  EDF International SA, SAUR International SA and León Participaciones Argentinas SA v The Argentine Republic, ICSID Case No ARB/03/23, Award (11 June