Michael Schmitt and Christopher Ford unpack the Trump Administration’s legal justifications for the April 2017 United States attack on a Syrian airfield in response to its use of chemical weapons against civilians. Schmitt and Ford discuss three possible legal bases for the use of force: self-defense, response to an internationally wrongful act, and humanitarian intervention. The authors conclude that the US’s actions run afoul of limitations in each relevant body of law, and of note, they discuss how this attack is consequential for the validity of humanitarian intervention on another state’s territory without approval from the UN Security Council. They conclude by suggesting that the international community is likely to consider the nature of suffering, in addition to the quantum of suffering, as bearing on the right of States to mount future humanitarian operations.
MAJ Peter Combe argues that the covert action statute prohibits the Central Intelligence Agency from violating self-executing treaties to which the United States is party, as well as non-self-executing treaties and customary international law implemented by statute, but it provides domestic legal authority to violate non-self-executing treaties and customary international law that have not been implemented through legislation by Congress. This application of the covert action statute in practice is illuminated through a case study of the legal issues surrounding the Osama bin Laden raid.
Schmitt and Widmar explore the law of targeting within international humanitarian law (IHL) and its application to international and non-international armed conflict. The article examines the “five elements” of a target operation, including the target, the weapon used, the execution of the attack, possible collateral damage and incidental injury, and location of the strike. The authors suggest that a better understanding of these norms can help international lawyers, policymakers, and operators avoid violations of international law by creating appropriate and well-known boundaries for targeting operations.