rules of engagement: the evolution and regulation of...
TRANSCRIPT
Rules of Engagement: The Evolution and Regulation of
Corporate Mercenaries and Private Military Companies
by
Christopher J. Castillo
1
I. INTRODUCTION
The business of blood, mercenarism, has been dated back as early as the twenty third
century B.C.E. when the Egyptian Pharaoh Pepi I recruited Nubians in modern day northern
Sudan to form a standing mercenary force known as the Medjay.1 The use of the Medjay in later
centuries enabled Egypt to become the great empire that it was. Id. Today mercenarism has
evolved into a new form since the days of ancient Egypt. This new form is not too different from
the ancient Medjay; it is still an organized group fighting on behalf of a nation or people in
exchange for profit. This new form of mercenary organization is known as the corporation or
more commonly as the ―private military company.‖
Unlike the times of ancient Egypt, modern day society has also evolved to have human
rights, international law, and advanced technology. However, it is not just mercenarism and
society that has evolved, but corporations have also evolved in their short existence. Unlike the
early days of corporations, when corporations such as the East India Company existed in the
1600‘s, corporations have evolved to have personhood, limited liability for their owners and
stockholders, and can last in perpetuity.2 This combined with recent ―de-regulation‖ of
corporations has led to a ripe moment in history starting in the mid to late 1980‘s through the
early 2000‘s, creating a boom in private military companies (PMCs), or corporate mercenaries.3
Now the United States and the world is struggling to keep up in regulating these corporate
mercenaries after the last decade has seen human rights violations and multiple criminal offenses
committed by corporate mercenaries. Id.
1 See generally, Kate Liszka, dissertation, ―We Have Come to Serve Pharaoh‖: A Study of the Medjay and Pangrave
Culture as an Ethnic Group and as Mercenaries from c. 2300 BCE until c. 1050 BCE PhD Dissertation, University
of Pennsylvania. 2 See generally, Thom Hartman, Unequal Protection: How Corporations Became ―People‖ – And How You Can
Fight Back (2d ed. 2010). 3 Jeremy Scahill, Blackwater: The Rise of the World‘s Most Powerful Mercenary Army (rev. ed. 2008).
2
This article will discuss the history of mercenary organizations and how they have
evolved into the form of corporations. Additionally, this article will give an overview of U.S.
law and U.S. agency law regulating and affecting corporate mercenaries, as well as international
law affecting and regulating mercenaries and corporate mercenaries.
II. A BRIEF HISTORY OF MERCENARY ORGANIZATIONS AND
THEIR TRANSITION TO PRIVATE MILITARY COMPANIES
As aforementioned, the earliest recorded mercenary organizations was the Medjay, but
they were just an early example of numerous mercenary organizations throughout human
history.4 A later example is the Varangians who were mercenaries for the Byzantine Empire
starting as early as 911 CE.5 They quickly developed a reputation as being ―noble savages.‖ Id.
The Varangians later became known as the Varangian Guard as they became the official guard of
the Byzantine Emperor. Id. Empires and nations are not the only historical entities to use
mercenaries, a mercenary force that has been in use since the 15th
Century is the Swiss Guard
who are also notably employed by the Pope in Vatican City for his guard since 1506.6
Corporate mercenaries date back to the first corporations. In fact some wings of the
world‘s first corporations were the world‘s first corporate mercenaries; primarily the companies
known collectively as the East India Companies who were given royal charters under several
different European governments throughout the early half of the 17th
century.7 One prime
example was the Dutch East India Company, established in 1602 by a Royal Charter of the
4 Liszka, supra note 1.
5 See generally, Ian Heath and Angus McBride, Byzantine Armies 886–1118 (1979).
6 David Alvarez, The Pope's Soldiers: A Military History of the Modern Vatican (2011).
7 John I. Israel, The Anglo-Dutch Moment: Essays on the Glorious Revolution and its World Impact (1991).
3
Dutch government, was the world‘s first multi-national corporation and the first company to
issue stock; the company‘s main goal was to monopolize spice trade around the Cape of Good
Hope and to gain Netherlands‘ independence from Spain. Id. The Dutch government granted the
company the rights to build forts and maintain armed forces. Id. By 1619 the company was able
to defeat the British fleet near the Cape preventing them from trading and largely displaced the
Portuguese from trading in the area. Id. They were also able to conquer the island of Java and
other African coastal islands. 8
They played a major role in fighting for independence from
Spain which was finally achieved in 1648, and in 1652 they began colonizing South Africa,
establishing Cape Town. Id. By 1669 the Dutch East India Company was the world‘s richest
corporation with 150 merchant ships, 40 warships, 50,000 employees, and an additional 50,000
soldiers. Id. They later played major roles in fighting in the Third Anglo-Dutch War, the Battle
of Colachel, the Travancore-Dutch War, and the Fourth Anglo-Dutch War before the corporation
was dissolved in 1799. Id.
At the end of the Baroque era and the end of the 18th
century, world governments began
to change policy on corporations; issuances of Royal Charters and other charters began to
decline.9 In the United States the Supreme Court case Dartmouth College v. Woodward, 17 U.S.
518 (1819), gave rise to the today‘s corporation. Woodward settled the nature of public versus
private charters by holding that the charter granted by the British Crown to the trustees of
Dartmouth College in 1769 (before the existence the U.S. government and the State of New
Hampshire) is a contract within the meaning of Art. 1. S. 10. of the U.S. Constitution (The
Contracts Clause) which declares that no State shall make any law impairing the obligation of
8 Id note 7.
9 Hansmann et al., The Anatomy of Corporate Law: A Comparative Functional Approach (2004).
4
contracts, thus preventing the legislature of New Hampshire from forcing Dartmouth into
becoming a public institution. Id. In the United Kingdom the Joint Stock Companies Act was
passed by Parliament in 1844 which allowed companies to form on their own instead of having
to be formed by a Royal Charter.10
This policy change led to the end of official corporate private
militaries. Id. The last of official corporate private military created by a royal charter to form in
Europe was the Atholl Highlanders, established in 1839 as a purely ceremonial private army and
not as part of the British Army; it remains as Europe‘s only remaining private army.11
After this
era only private security companies, who served domestically, tended to exist, and modern
nations did their own fighting with their own armed forces. The Pinkerton National Detective
Agency was an example of such a private security company, they were notably hired by
Abraham Lincoln as his personal bodyguard during the civil war (before the existence of the
Secret Service).12
They were also hired by the newly formed Department of Justice as a
―national police agency‖ in 1871 when their budget was insufficient, and they were employed by
the federal government to break up strikes (acting like a national guard) during the early days of
the industrial revolution before the advent of worker‘s rights. Id.
There was one instance where the United States did officially hire mercenaries, but the
mercenaries used, although not acting as members of the military, were also not employees of a
corporation. In 1941, before the U.S.‘ entrance into World War II, feeling pressure to do
something about Japan‘s treatment of the Chinese, President Franklin D. Roosevelt organized the
10
B.C. Hunt, The Development of the Business Corporation in England, 1800–1867 (2000). 11
See Atholl Highlanders converge on Blair Castle for 2010 Celebrations, available at, http://www.atholl-
estates.co.uk/news-
detail.cfm/news_ID/28/title/Atholl%20Highlanders%20converge%20on%20Blair%20Castle%20for%202010%20C
elebrations. 12
Ward Churchill, From the Pinkertons to the PATRIOT Act: The Trajectory of Political Policing in the United
States, 1870 to the Present (2004).
5
American Volunteers Group to attack the Japanese from the sky; they were known as the Flying
Tigers.13
They were all recruited from the military, but Roosevelt was careful to ensure they
were not official combatants of the United States. Id. They were equipped with U.S. military
fighters and paid $600 - $750 per month with an additional $500 for every Japanese aircraft they
destroyed. Id. The American Volunteers Group was terminated after the U.S.‘ entrance into the
war. Id.
Private security companies were just one leg of what later evolved into the modern
private military company. During World War II the United States saw the largest mobilization
of resources for a war than all of its previous conflicts combined.14
After the war, the United
States never de-mobilized with the advent of the Cold War, this created a U.S. appetite for
military resources and technology, termed by President Eisenhower as the Military-Industrial
Complex. Id. Then in the 1970‘s the government became interested in de-regulation and
privatization of services mainly through the efforts of two Washington ―think tanks;‖ the
Brookings Institution and the American Enterprise Institute.15
After the 1970‘s the stage was
finally set for the first real U.S. corporate mercenaries.
One company worth mentioning did ―bridge the gap‖ so to speak during the decline of
imperialism and the end of the mercenaries of the East India Companies, and the beginning of
our current corporate mercenaries; the British South Africa Company. It was formed in 1889
modeling itself after the British East India Company, which had just been dissolved by the
13
Daniel Ford, Flying Tigers: Claire Chennault and His American Volunteers 1941-1942 (2007). 14
Michael S. Sherry, In the Shadow of War: The United States since the 1930s (1995). 15
Sharon Beder, The Electricity Deregulation Con Game (2003).
6
British Parliament in 1874,16
to facilitate colonialism in central and southern Africa. The
company formed a subsidiary in 1899 called the British South Africa Police.17
It served as a
mounted infantry force that sold protection to British colonial companies in central and southern
Africa including its parent company. Id. The British South Africa Police were ―hired‖ to and
took part in the First Matabele War, the Second Matabele War, the Second Boer War, World
War I, World War II, and the Rhodesian Bush War. Id. After the country of Zimbabwe gained
its independence in 1980, the British South Africa Police were ―de-privatized,‖ and became the
Zimbabwe Republic Police who serve as the country‘s national police force today. Id.
Finally, with the mounting conflicts in the Middle East, the continuing threat of
Communism, the continued mobilization of the military from World War II and Vietnam, along
with corporate de-regulation and government privatization in the U.S., security companies began
to evolve in the 1980‘s from your average guard service for your neighborhood bank or
government building to more quasi-military.18
In addition to security companies evolving,
established military support companies began expanding from just providing supplies and
services like ship building, to armed guard and military training services to collect on newly
emerging government contracts for military training and other quasi-military services. Id. In
1983 after the U.S. Embassy bombing in Beirut, Lebanon, the State Department first resorted to
using contractors to provide perimeter security to diplomatic and consular security posts around
the world. 19
Then in 1994 the State Department‘s Bureau of Diplomatic Security first used a
private military company, MVM, Inc., to help protect Haitian President Jean-Bertrand Aristide as
16
See The East India Stock Dividend Redemption Act (36 & 37 Vict. C. 17). 17
P. Gibbs and H. Phillips, The History of the British South Africa Police (2000). 18
Scahill, supra note 3. 19
Congressional Research Service Report for Congress, Private Security Contractors in Iraq: Background, Legal
Status, and Other Issues (2008), at 6-7.
7
he returned to Haiti from the U.S. after he was exiled from a military coup d‘état. Id. This was
followed with the use of private military companies in Bosnia, Israel, Afghanistan, and most
recently, Iraq.20
After the Bosnian conflict, U.S. security service contracts began to rise and with
them came higher demands for expertise, which security guard companies and converted military
supply companies at that time lacked. Id. This created a foothold for a third type of mercenary
corporation whom some regard as the most dangerous, and that is the mercenary corporation
started by former members of the military.21
The most famous example of course being
Blackwater founded by former Navy Seal Erik Prince.22
Some lesser known companies are
Custer Battles, LLC, founded by a former Army Ranger and an ex-CIA Intelligence Officer,23
and Triple Canopy, Inc. founded by several U.S. Army Special Forces veterans, including former
members of the Delta Force.24
III. INTENRNATIONAL AND UNITED STATES REGULATION
OF MERCENARIES AND PRIVATE MILITARY COMPANIES
A. Brief History of Law
The regulation of mercenaries and corporations are intertwined with the regulation of
corporate mercenaries as they are affected by both types of laws, so both will be discussed. The
first regulations of corporate mercenaries came about before the rise of the first corporations, the
East India Companies, and were in a sense a way of ―incorporating‖ organized mercenaries.
They were in the form of letters of marque and reprisal of which the earliest recorded use was in
1354 under an English statute referring to it as a ―licen[s]e granted by a sovereign to a subject,
20
Id. note 19, at 7. 21
Scahill, supra note 3. 22
Evan Thomas, The Man Behind Blackwater, Newsweek, October 23, 2007. 23
Eddie Curran, U.S.A.: Custer Battles Fights Back, The Mobile Register, April 27, 2005. 24
Triple Canopy Announces Change of Command: Lee Van Arsdale to Head Leading Security Solutions Company,
available at, http://www.triplecanopy.com/news-items/triple-canopy-announces-change-of-command.
8
authorizing him to make reprisals on the subjects of a hostile state for injuries alleged to have
been done to him by the enemy‘s army.‖25
Essentially a letter of marque issued by a sovereign
authorized a group of private individuals to go and capture enemy ships and their contents.26
When a private vessel was not operating under a letter marquee their acts were considered
piracy. Id. These laws even made it into the United States‘ Constitution near a half a millennia
later in Article I Section 8 stating in part that the ―Congress shall have Power to…grant Letters
of Marque and Reprisal…‖
B. Main Corpus of United States Law
The most stifling legislation that corporate mercenaries faced was the Anti-Pinkerton Act,
5 U.S.C. § 3108, which was passed by the United States Congress in 1893.27
The legislation was
in response to the above mentioned Pinkerton National Detective Agency.28
As mentioned
above the Agency contracted with the newly formed Department of Justice as an almost national
police agency. Id. The government also hired the Agency to break up strikes of laborers and
they became known as ―strikebreakers.‖ Id. The Ant-Pinkerton Act was passed in response to
the use of the Pinkertons in the Homestead strike in 1892.29
Ironically, the strike was a wage
strike against Carnegie Steel who at that time made the majority of its money as a defense
contractor providing steel to build U.S. Naval ships. The Pinkertons attempted strike-break at
Homestead ended badly with multiple wounded and several on each side dead.30
It was referred
25
Definition 1, of ―letter of marque,‖ Oxford English Dictionary, 2d ed. (Clarendon Press, 1989). 26
Donald Petrie, The Prize Game: lawful looting on the high seas in the days of fighting sail (1999). 27
The Anit-Pinkerton Act, 5 U.S.C. § 3108. 28
Churchill, supra note 12. 29
The Anit-Pinkerton Act, supra note 27. 30
See generally, Paul Krause, The Battle for Homestead, 190-1892: Politics, Culture, and Steel (1992).
9
to as a full on battle with fire fights and all. Id. The Pinkertons actually had to surrender to the
strikers and the State militia had to be called in. Id. The Ant-Pinkerton Act reads as follows:
―An individual employed by the Pinkerton Detective Agency, or similar organization,
may not be employed by the Government of the United States or the government of the
District of Columbia.‖31
This Act went largely un-interpreted for almost a century until the case of United States ex rel.
Weinberger v. Equifax, Inc., 557 F.2d 456, (5th Cir. 1977), cert. denied, 434 U.S. 1035 (1978).32
In this case a citizen sued Equifax, Inc. on behalf of the government, chiefly for violating the
Anti-Pinkerton Act. Id. Equifax, Inc. being the consumer credit reporting agency that it still is
today was hired by the U.S. to provide it with information on prospective employees. Id.
Equifax would generally accomplish this by the examination of public records and other public
files. Id. Weinberger claimed that Equifax was billing the U.S. for not just that, but for when
they would use investigative techniques ―similar‖ to those employed by a detective, thus they
were in violation of the Anti-Pinkerton Act as a ―similar‖ organization of the Pinkerton National
Detective Agency. Id.
The Fifth Circuit conducted research on the legislative intent behind the Anti-Pinkerton
Act. In the Court‘s opinion it cited the 88th
Congress as follows:
―Does not the gentleman from Indiana (Mr. Holman) well know that nobody objects to
the legitimate use of Pinkerton detectives as such. It is their use as armed guards that is
objected to, and it is the sending of their armed guards from one state into another that is
objected to. . . .‖ Id at 463.
Based on this and the Homestead Strike which promulgated the Ant-Pinkerton Act as discussed
above the court reasoned that:
31
The Anit-Pinkerton Act, supra note 27. 32
United States ex rel. Weinberger v. Equifax, Inc., 557 F.2d 456, (5th Cir. 1977), cert. denied, 434 U.S. 1035
(1978).
10
―The nature of the Anti-Pinkerton Act, 5 U.S.C.S. § 3108, directs the court, not to the
present-day Pinkerton Agency for comparison, but to the agency as it existed in 1892.
Congress enacted a broad proscription against government employment of a class.
Rather than specifically defining the class, it used one example by which others falling in
the class could be identified. Courts cannot change that definition by looking to the
example organization as it presently exists. Courts must look to the Pinkerton Detective
Agency as it existed when Congress used it as a definitional example in 1892 to decide
which organizations are "similar" to the kind proscribed for employment.
…Congress wished to ban the employment of Pinkertons as a private mercenary force…
The purpose of the Anti-Pinkerton Act, 5 U.S.C.S. § 3108, and the legislative history
reveal that an organization is "similar" to the Pinkerton Detective Agency only if it offers
for hire mercenary, quasi-military forces as strike-breakers and armed guards.‖ Id at 462-
463.
Thus the decision of the lower court was affirmed and Weinberger tried to appeal to the U.S.
Supreme Court, but certiorari was denied. 33
This decision did not sit well with the United States Comptroller General.34
35
The
Comptroller General had actually been in the midst of deciding the same issue at the same time
and had come to a different conclusion of the Court more similar to that of Weinberger‘s
interpretation.36
In 1975 the Navy placed out a contract for a private guard service at its Naval
Underwater Systems Center in Newport, Massachusetts. Id. They did this in part because of its
reduction in force and had removed a number of civil service guards from their positions. Id. A
company called Progressive Security Agency was awarded the $314,453.04 contract. Id. When
the disgruntled civil service guards learned of this they filed an administrative appeal to Civil
33
See United States ex rel. Weinberger v. Equifax, Inc. 434 U.S. 1035 (1978). 34
See 31 U.S.C. § 703. The United States Comptroller General is the director of the Government Accountability
Office under the legislative branch whose job it is to ―investigate, at the seat of government or elsewhere, all matters
relating to the receipt, disbursement, and application of public funds, and shall make to the President when requested
by him, and to Congress...recommendations looking to greater economy or efficiency in public expenditures.‖ The
Comptroller General is appointed to 15 year terms by the President with the advice and consent of the Senate. 35
The Comptroller General during this time period was Elmer Boyd Staats who was appointed by Lyndon Johnson
in 1966 and served his full 15 year term ending in 1981. See Bart Barnes, Elmer B. Staats, GAO chief under 5
presidents, dies at 97, The Washington Post, July 27, 2011. 36
In the matter of the Progressive Security Agency, Inc, 55 Comp. Gen. 1472 (1976).
11
Service Commission. Id. One of the components of the appeal was that the contract violated the
Anti-Pinkerton Act. Id. This issue was sent to Comptroller General‘s Office for a decision. Id.
The Comptroller General read the Ant-Pinkerton Act quite literally as only prohibiting the hire of
detective agencies in conformance with an earlier Comptroller General Decision stating that a
detective agency was not the same as a guard service.37
The Comptroller General held in his
1976 opinion that:
―[A] [c]ompany whose corporate charter specifically authorizes investigative as well as
protective functions, and which is licensed as detective agency under Massachusetts
statute prescribing separate licenses for detective and protective agencies, is a detective
agency for purposes of 5 U.S.C. 3108 [Anti-Pinkerton Act] and may not be employed by
Federal agency, even though employment is solely to perform guard services.‖38
The Comptroller General Affirmed this decision in January of 1977 before the Equifax decision
was published by the 5th
Circuit in August of the same year.39
Then in 1978 there was another
bid protest based on the Anti-Pinkerton Act and its new interpretation in Equifax, which gave the
Comptroller General a chance to interpret Equifax.40
The Private Security Officers Co. (PSO)
were protesting a contract to guard an Army Support Facility in New Jersey because they
originally had the contract and were passed up for renewal by the Army who instead elected to
put it out for bid. Id. When PSO turned out to be not the lowest bidder (who was Lance
Security) and the contract was about to be awarded to another company they filed a bid protest
on the grounds it violated the Anti-Pinkerton Act via its new 5th
Circuit interpretation in Equifax.
Id. The Comptroller General took a narrow view of the Court‘s decision in Equifax applying
what he believed to be a similar standard carving out one line in Equifax on which to base his
decision:
37
Comptroller General Warren to the Administrator, War Assets Administration, 26 Comp. Gen. 303 (1946). 38
In the matter of the Progressive Security Agency, Inc, supra note 36. 39
In the matter of the Progressive Security Agency, Inc., reconsideration, 56 Comp. Gen. 225 (1977). 40
In the matter of Professional Security Officers Company, 57 Comp. Gen. 480 (1978).
12
―In light of the purpose of the Act and its legislative history, we conclude that an
organization is not "similar" to the (quondam) Pinkerton Detective Agency unless it
offers quasi-military armed forces for hire. Because Weinberger fails to allege that
Equifax provides so much as an armed guard, much less an armed quasi-military unit,
Equifax's employment is not illegal under the Anti-Pinkerton Act.‖ Id, Equifax at 463.
Based on this the comptroller held the following:
―Applying the above-quoted standard promulgated by the court, we are unable to
conclude on the basis of the record that Lance Security offers "quasi-military armed
forces for hire" and, therefore, cannot agree with the protester's assertion that an award to
Lance Security would be in violation of the act and the implementing procurement
regulation.‖ Id.
This decision by the Comptroller General has not been overruled by any Comptroller General
since then nor has any Federal Court overruled or held differently than the 5th
Circuit‘s
interpretation in Equifax.
Now because of the Ant-Pinkerton Act, the Equifax case interpreting it, and the
Comptroller General‘s 1978 opinion applying Equifax there is an exception carved out for the
U.S. to employ private protective armed and un-armed guard services, despite it being contrary
to the 88th
Congress‘ intent. Through this exception corporate mercenaries have prospered with
both the U.S. government and corporations categorizing their services as ―protective guard
services.‖41
This exception was challenged in 2006 during the war in Iraq. 42
An Army veteran,
Brian Scott, challenged a contract bid issued in March of 2006 soliciting services for security
escorts for cargo convoys, including a ―minimum of three vehicle escorts with radios and
weapons for every ten transportation trucks [and] for all sensitive cargo the contractor will
include a minimum of two Ex-Pat security escort vehicles.‖ Id. Scott claimed that this violated
the Anti-Pinkerton Act within the interpretation of Equifax because it contracted for a quasi-
41
Private Security Contractors in Iraq, supra note 19, at 3. 42
Matter of: Brian X. Scott, 2006 Comp. Gen. Proc. Dec. P125 (2006).
13
military service. Id. The Comptroller General again was faced with making a decision. In
relevant part the decision stated as follows:
―The protester argues that ‗[t]he purpose of guard or protective services is to provide
active surveillance, documentation, reporting and physical presence in order to deter
harm to persons or property and safeguard military assets,‘ whereas ‗quasi-military armed
force refers to private contractors that are hired by the US government to engage in or be
prepared to engage in offensive or defensive combat.‘‖
―The agency [Department of Defense] responds that the protester's definitions of
offensive or defensive combat and guard or protective services are not based on statutory
or regulatory definitions, and thus are not relevant for establishing whether the activities
contemplated by the solicitation are activities that cannot be performed by a government
contractor under the Act. We agree with the agency.‖ Id.43
Interestingly enough, there are no established definitions of what quasi-military services are.
Equifax did not define them, and the Comptroller General decided in the 1978 decision above
that armed guard services were not quasi-military services, an interpretation that was affirmed in
this 2006 decision; so what definition for quasi-military services would be relevant to the
Department of Defense or the Comptroller General? The Comptroller General also noted that,
"it has become apparent in recent years that the act has outlived the circumstances which
produced it, and whether the act continues to serve a useful purpose has been frequently
questioned.‖44
This final blow by the Comptroller General saw the end of the Anti-Pinkerton
Act‘s ability to trifle or inhibit the United States Government from procuring the services of
corporate mercenaries.
43
Scott v. United States, 78 Fed. Cl. 151 (2007). Scott appealed the Comptroller General‘s decision to the United
States Court of Federal Claims. His appeal was dismissed by the Federal Claims Court for having a lack of standing
to bring the case. The Federal Court of Claims has jurisdiction over challenges to government procurement pursuant
to the Tucker Act, 28 U.S.C.S. § 1491. According to the Tucker Act an ―interested party‖ has standing to challenge
government procurement. An ―interested party‖ is defined under 28 U.S.C.S. § 1491(b)(1) as the same definition as
that under the Competition in Contracting Act, 31 U.S.C. § 3351, which defines ―interested party‖ under 31 U.S.C. §
3351(2) as ―an actual or prospective bidder or offeror whose direct economic interest would be affected by the
award of the contract or by failure to award the contract.‖ Scott was not a bidder or offeror and he was unable to
prove to the Court‘s satisfaction that he had a direct economic interest affected by the award of the contract. 44
Matter of: Brian X. Scott, supra note 42.
14
C. International Law
In 1977 the first international laws pertaining to mercenaries were passed by the Geneva
Convention‘s Protocol I which served to re-affirm the Third Geneva Convention of 1949 and to
amend it in response to some of the tactics used in the Vietnam conflict as well as in response to
the travesties taking place in Africa throughout the 60‘s and 70‘s in their struggle for
independence from France, the United Kingdom, the Netherlands and other European
countries.45
Article 47 of Protocol I specifically addressed mercenaries in response to their
heavy usage on the African continent and the havoc that they reaped there.46
47
The full contents
of Article 47 are as follows:
―Art 47. Mercenaries
1. A mercenary shall not have the right to be a combatant or a prisoner of war.
2. A mercenary is any person who:
(a) is specially recruited locally or abroad in order to fight in an armed conflict;
(b) does, in fact, take a direct part in the hostilities;
(c) is motivated to take part in the hostilities essentially by the desire for private
gain and, in fact, is promised, by or on behalf of a Party to the conflict, material
compensation substantially in excess of that promised or paid to combatants of
similar ranks and functions in the armed forces of that Party;
(d) is neither a national of a Party to the conflict nor a resident of territory
controlled by a Party to the conflict;
(e) is not a member of the armed forces of a Party to the conflict; and
(f) has not been sent by a State which is not a Party to the conflict on official duty
as a member of its armed forces.‖ Id.
45
Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of
International Armed Conflicts (Protocol I), June 8, 1977. 46
See generally the Congo Crisis, the Nigerian Civil War, the Angola Civil War, the National Front of the
Liberation of Angola, and Muammar Gaddafi‘s use of mercenaries known as Tauregs in the years after his Libyan
revolution. 47
Supra note 45, at 572, Commentary and General Remarks on Article 47.
15
The Article accomplishes two things; for the first time, it gives a definition as to what a
mercenary actually is, as well as addressing their rights, or lack thereof, for being a mercenary.
Of primary importance is the definition of a mercenary that the Geneva Convention resolved on.
The Convention notes that they drew a narrow definition because of the wide misuse of the word
mercenary; the Convention also required that all of the requirements in subsection 2 be met in
order to be considered a mercenary within the Article.48
They included requirement 2(a) because
they wanted to avoid labeling foreign members of a sovereign‘s military, belligerents,
international volunteers, and other organizations like the Papal Swiss Guard and the French
Foreign Legion as mercenaries. Id. Requirement 2(d) was meant to protect political parties and
revolutionaries. Id.
The definition has been criticized for being overly narrow because it does not to include
groups such as corporate mercenaries.49
For instance requirement 2(b) requires the person to ―in
fact, take a direct part in the hostilities,‖ where, as above, most U.S. corporate mercenaries
classify themselves as armed guard protective services and can claim that their actions hostilities
are only defensive in nature. Id. In fact contractors are exactly whom the Convention had in
mind of protecting when drafting that requirement as they use the example of ―military
technicians‖ in their remarks on the sub-paragraph. Id. The Article itself has been criticized for
not being palpable or able to hold up if ever tried in a courtroom as well as only pertaining to the
mercenaries of post-colonial Africa and not adequately addressing corporate mercenaries.
On its face subsection 1 of Article 47 appears not to carry much consequence for
individual mercenaries by not affording them the right to have the status of a combatant or
48
Id. note 47, at 573. 49
Todd S. Milliard, article, Overcoming post-colonial myopia: A call to recognize and regulate private military
companies, Military Law Review Vol 173, (2003), at 54-58.
16
prisoner of war, but this is not so. Enemy combatant and prisoner of war rights are actually
incorporating by reference to the 1949 Third Geneva Convention pertaining to the relative
treatment of Prisoners of War (POW).50
That convention requires POWs to be treated humanely,
given secure quarters, food, clothing, canteens, medical attention, chaplains, exercise, only
certain types of work, have the ability to make complaints, have certain correspondence, and are
only required to state their name and rank. Id. POWs are also not allowed to be tortured. Id. The
rights of enemy combatants are in sum; the right to have medical attention, the right not to be
tortured, the right to be treated humanely, the right to a fair trial if they have committed war
crimes,51
and the right to be repatriated if possible.52
Mercenaries who fall under the above definition, however, do not necessarily fear being
treated inhumanely or being tortured because of Article 5 of the 1949 Fourth Geneva Convention
which they also fall under as it provides that all captured non-combatants still have the right to
be, "treated with humanity and, in case of trial, shall not be deprived of the rights of fair and
regular trial."53
They can be prosecuted, however, for any regular crime that they commit, while
combatants are only liable for crimes of war. Id. For instance if a mercenary kills an enemy
combatant he can face trial for murder whereas a combatant may not. The United States was not
an original signatory to Protocol I, but they later signed it that same, but never ratified Protocol I
into law. 54
Corporate employees are also technically covered under Convention 1 Article 3,
persons taking no part in the hostilities, which prevents them, from among other things, killing,
50
See generally, Geneva Conventions of 12 August 1949, Convention (III) relative to the Treatment of Prisoners of
War. Geneva, August 12, 1949. 51
See generally The Hague Conventions (1864 and 1909). 52
Geneva Convention (III), supra note 50. 53
See generally, Convention (IV) relative to the Protection of Civilian Persons in Time of War. Geneva, August 12,
1949. 54
Protocol I, supra note 45, at Article 47.
17
torturing, or taking hostages.55
A final criticism of Article 47 is that when it refers to persons, it
means human beings and not the West‘s amended definition of person‘s to include incorporated
beings such as churches and corporations.56
The United Nations (UN) General Assembly took a swing at mercenaries in 1989 when
they passed resolution 44/34 or the International Convention against the Recruitment, Use,
Financing and Training of Mercenaries, more commonly referred to as the UN Mercenary
Convention. 57
This resolution came in response to the concerns about the limited scope and
applicability of Protocol I as well as the fact that it seemed to have a limited effect on the
mercenarism still occurring. Id. Article 1 of the resolution, defining a mercenary, states as
follows:
―1. A mercenary is any person who:
(a) Is specially recruited locally or abroad in order to fight in an armed conflict;
(b) Is motivated to take part in the hostilities essentially by the desire for private
gain and, in fact, is promised, by or on behalf of a party to the conflict, material
compensation substantially in excess of that promised or paid to combatants of
similar rank and functions in the armed forces of that party;
(c) Is neither a national of a party to the conflict nor a resident of territory
controlled by a party to the conflict;
(d) Is not a member of the armed forces of a party to the conflict; and
(e) Has not been sent by a State which is not a party to the conflict on official duty
as a member of its armed forces.
2. A mercenary is also any person who, in any other situation:
(a) Is specially recruited locally or abroad for the purpose of participating in a
concerted act of violence aimed at:
(i) Overthrowing a Government or otherwise undermining the constitutional order
of a State; or
(ii) Undermining the territorial integrity of a State;
55
See generally, Convention (I) for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in
the Field. Geneva, August 12, 1949. 56
Milliard, supra note 49, at 58-59. 57
United Nations General Assembly resolution 44/34, International Convention against the Recruitment, Use,
Financing and Training of Mercenaries (1989).
18
(b) Is motivated to take part therein essentially by the desire for significant private
gain and is prompted by the promise or payment of material compensation;
(c) Is neither a national nor a resident of the State against which such an act is
directed;
(d) Has not been sent by a State on official duty; and
(e) Is not a member of the armed forces of the State on whose territory the act is
undertaken.‖ Id.
From reading the above definition it is immediately apparent that it has a much broader scope
than the definition in Protocol I and almost appears to be specifically referring to corporate or
other organized mercenaries as opposed to individuals. Notice also how this second definition
includes all armed conflicts instead of just international conflicts. The convention goes much
further than simply broadening the definition of a mercenary, but as well as to what acts are
prohibited in connection with mercenaries, where Protocol I simply stripped the mercenaries
themselves of certain rights. Article 2 states that, ―Any person who recruits, uses, finances or
trains mercenaries, as defined in article 1 of the present Convention, commits an offence for the
purposes of the Convention,‖ thus making it offensable for any person to simply hire a
mercenary. Id. This should give corporate mercenaries pause as the people within the
corporation are technically is hiring and training its mercenary employees. Article 3 of the
convention goes on to make it offensable to be a mercenary. Id. Article 5 prohibits State Parties
from using, financing, or training mercenaries, and provides that if they do so the State Parties
―shall make the offences set forth in the present Convention punishable by appropriate penalties
which take into account the grave nature of those offences.‖ Id. The Resolution also makes
provisions for State Parties to enforce the Resolution on one another, to take actions from
preventing other State Parties from violating the Articles of the Resolution. Id. The Resolution
finally came into force on October 20th
2001 when Costa Rica became the 22nd
State to ratify the
resolution. Id. Since then four more countries have become parties bringing the total to 26. Id.
19
The United States is not a party to this resolution. Since its signing and enforcement, two
nations who ratified the treaty went on to violate it by hiring and using mercenaries; Angola and
the Democratic Republic of Congo.58
D. Further United States Regulations on Corporate Mercenaries
Since September 11th
2001, the United States found itself in two armed conflicts
simultaneously and continuously since March of 2003 when it invaded Iraq (2003) and
Afghanistan (2001). These two conflicts have stretched the U.S. military and have seen the
expansion of the use of private contractors being used abroad in and around the area of conflict.59
In 2006, near the height of the Iraq war, the United States Census counted roughly 100,000
general contractors operating in Iraq alone, a number that does not include the number of
subcontractors. Id. This number is over 10 times higher than the estimated 9,200 contractors
hired in the Gulf War. Id. At the outset of these wars the U.S. seemed to be distinctly aware of
the potential disastrous outcomes of the use of corporate mercenaries as the United States
Congress passed the Military Extraterritorial Jurisdiction Act (MEJA).60
This act came into
effect November 22, 2000. Id.
1. The Military Extraterritorial Jurisdiction Act (MEJA)
Under MEJA, any person who is employed or accompanying armed forces overseas can
be prosecuted for an offense that would constitute a felony, meaning a crime that is punishable
by imprisonment of more than one year, if committed within the United States. Id. An employee
of the armed forces does include private military contractors and subcontractors but does not
58
Private Security Contractors in Iraq, supra note 19, at 18. 59
Renae Merle, Census Counts 100,000 Contractors in Iraq, The Washington Post, December 5, 2006. 60
The Military Extraterritorial Jurisdiction Act of 2000, 18 U.S.C. § 326-67 (2000).
20
include employees of agencies other than the Department of Defense (DoD), who are on a their
own mission overseas. Id. It further provides that ―The Secretary of Defense may designate and
authorize any person serving in a law enforcement position in the Department of Defense to
arrest, in accordance with applicable international agreements, outside the United States any
person described in section 3261(a) [of the Act] if there is probable cause to believe that such
person violated section 3261(a). Id. The MEJA merely granted U.S. Courts jurisdiction for
crimes committed overseas by civilians, but a Court cannot sentence a civilian without a
prosecutor first filing a complaint. Since there isn‘t a U.S. Attorney‘s Office in major combat
areas nor any FBI office, virtually none of the civilian crimes were being investigated, let alone
prosecuted. 61
According to the DoD, as of July 2009, almost nine years after MEJA came into
effect, only 40 cases involving U.S. contractors had arisen under MEJA and of those 33 were
from Iraq. Id. Of the 40 cases arising under MEJA only 8 had actually been charged and
prosecuted, and of the 8, only 4 were from Iraq. Id.
Aside from the lack of infrastructure and incentive for the DoD to prosecute civilian
contractors under MEJA, there were other problems with MEJA as well. For one, it did not
create any new internal agency within the DoD specifically dedicated to investigating civilian
contractors and then forwarding their investigations to a U.S. Attorney for prosecution. Id.
More importantly it only covered civilians employed by the DoD or through a DoD contract. Id.
It did not cover any contractors or civilian employees of the U.S. Department of State.62
61
Robert E. Reed, Associate Deputy General Counsel, Congressional March to Accountability For Civilians
Overseas, (aka: Filling the Gaps and Crevices), Department of Defense, (2009), at 8. 62
Department of Defense Instruction 5525.1, Criminal Jurisdiction Over Civilians Employed By or Accompanying
the Armed Forces Outside the United States, Certain Service Members, and Former Service Members, March 3,
2005, Instruction Enclosure 3.
21
These MEJA loopholes were developing into major problems for the Government in the
press in 2007 when incidents involving corporate mercenaries in Iraq began to heat up.63
Employees of Blackwater USA, a private security firm under contract to the State Department,
opened fire on the streets of Baghdad twice in two days, and one of the incidents provoked a
standoff between the security contractors and Iraqi forces. Id. These and other incidents were
able to finally get the attention of U.S. law and policy makers.
On June 15, 2007 Representative David Price [D-N.C.] introduced H.R. 2740, known as
the MEJA Expansion and Enforcement Act.64
H.R. 2740 proposed to create a FBI Theater
Investigative Unit which would be responsible for looking into every single criminal complaint,
including those made which to date had not been resolved, and to refer their investigations to
U.S. Attorney General for Prosecution if they confirmed criminal conduct. Id. It also directed all
contractors and agencies operating within contingency areas to give their full support to this new
FBI unit. Id. Lastly, the bill made it so that the MEJA would be expanded to all contractors
operating in contingency areas overseas without regard to which agency they were contracted
under as opposed to just the DoD. Id. The Bill made it past the House with 389 Ayes, 30 Nayes,
with 13 Representative not present, it never made it to a vote in the Senate, however, and to this
date has not become law. Id.
2. The Coalition Provisional Authority
The Coalition Provisional Authority (CPA) was the transitional government for Iraq
which was set up by the U.S. and its allies in April of 2003 pursuant to the authority granted to
63
Steve Fainaru and Saad al-Izzi, U.S. Security Contractors Open Fire in Baghdad, Washington Post Foreign
Service, May 27, 2007. 64
MEJA Expansion and Enforcement Act of 2007, H.R. 2740, 110th
Congress, (2007).
22
the under the United Nations Security Council Resolution 1483.65
The Administrator of the CPA
for the majority of its existence was Lewis Paul Bremer, III of the United States.66
Within a
month of Bremer taking office as the Administrator he issued Coalition Provisional Authority
Order Number 17, entitled, Status of the Coalition, Foreign Liaison Missions, Their Personnel
and Contractors.67
Just before leaving office on June 27th
, 2004 Bremer revised Order 17. Id.
The revision of Section 3 of Order 17, entitled, Contractors, stated in relevant part as follows:
―1) Coalition contractors and their sub-contractors as well as their employees not
normally resident in Iraq, shall not be subject to Iraqi laws or regulations in
matters relating to the terms and conditions of their contracts in relation to the
Coalition Forces or the CPA. Coalition contractors and sub-contractors other
than contractors and sub-contractors normally resident in Iraq shall not be
subject to Iraqi laws or regulations with respect to licensing and registration of
employees, businesses and corporations in relation to such contracts.
2) Coalition contractors and their sub-contractors as well as their employees not normally
resident in Iraq, shall be immune from Iraqi Legal Process with respect to acts performed
by them within their official activities pursuant to the terms and conditions of a contract
between a contractor and Coalition Forces or the CPA and any sub-contract thereto.
3) In respect of acts or omissions of Coalition contractors and sub-contractors as
well as their employees not normally resident in Iraq, which are not performed by
them in the course of their official activities pursuant to the terms and conditions
of a contract between them and the Coalition or the CPA, no Iraqi or CPA Legal
Process shall be commenced without the written permission of the Administrator
of the CPA.‖ Id.
Essentially the effect of Section 3 of Order 17 was to give all contractors, including corporate
mercenaries, virtually full immunity from Iraqi law. Specifically section 2 states that all the
contractors are completely immune from any of their official activities pursuant to their contract.
65
See AFTEREFFECTS; Passages From Security Council Resolution Ending U.N. Sanctions on Iraq, The New
York Times, May 23, 2003. The Resolution was drafted by the U.S., it also transferred the authority to authorize
expenditures from Iraq's oil revenue from the United Nations to a Development Fund for Iraq, controlled by
the Coalition Provisional Authority, and the Coalition was only authorized to expend those funds for the benefit of
the Iraqi people. 66
See Jillian Schwedler and Deborah Gerner, Understanding the Contemporary: Middle East (2008). L. Paul
Bremer, III served as Administrator if the CPA from May 11, 2003, when he replaced Gerald Jay Garner, until June
28, 2004 when power was transferred to the Iraq Interim Government. Garner was removed for ignoring pressure
from the U.S. Government to remove members of the Ba‘ath Party from the Iraqi government and military. 67
See Coalition Provisional Authority Order Number 17, entitled, Status of the Coalition, Foreign Liaison Missions,
Their Personnel and Contractors, June 27, 2004.
23
Id. Section 3 goes on to cover activities by the contractors that are not official, in which case the
Iraqi government cannot commence any legal process against them without express written
permission of the Administrator of the CPA himself. Id. This Order equated to a license to kill,
rape, pillage, torture, and the like for any foreign contractor of the coalition. Although the CPA
handed over power to the Iraqi Interim Government in June 2004, the Orders of the CPA
remained in place. The Order actually remained in place through the Iraqi Interim Government,
through the Iraqi Transitional Government established in May of 2005, and into the first
permanent Iraqi government which finally took power in May of 2006.68
Finally in October of
2007, after the incidents with corporate mercenaries that summer,69
and after the September 6,
2007 shooting by Blackwater employees that left 17 dead and 24 wounded,70
the Iraqi Cabinet
decided to end contractors‘ immunity from Iraqi law by voting to overturn Order 17. 71
The
Cabinet made the overturning of Order 17 as a provision of the U.S.-Iraq Statute of Forces
Agreement (SOFA).72
The Parliament ratified SOFA in November of 2008, and the Iraqi
Presidency Council passed it into law on December 4, 2008. President George W. Bush signed
SOFA on December 14, 2008 making binding on the United States.73
SOFA required that all
foreign contractors, their vehicles, and their weapons, had to be licensed with the Iraqi Foreign
68
Schwedler et. al, supra note 66. 69
Fainaru et. al, supra note 63. 70
Alissa J. Rubin, Iraqi Government Votes to End Security Firms‘ Immunity, The New York Times, October 31,
2007. 71
Strategic Framework Agreement and Security Agreement Between the United States of America and the
Republic of Iraq, (2008). 72
U.S. Citizens are most familiar with the main provisions of SOFA, that U.S. combat forces withdraw from Iraqi
cities by June of 2009 and that they completely withdraw by the end of 2011. Id. at Article 24. 73
Timothy Williams and Abeer Mohammed, In Iraqi‘s Shoe-Hurling Protest, Arabs Find a Hero. (It‘s Not Bush.),
The New York Times, December 16, 2008. Most U.S. Citizens recall that at the joint press conference between
President Bush and Prime Minister Nuri al-Maliki, after President Bush had signed SOFA, was when an upset Iraqi,
Muntadhar al-Zaidi, took off his shoes and threw them at President Bush while screaming in Arabic, ―This is for the
widows and orphans and all those killed in Iraq!‖ Most also remember President Bush‘s quick reflexes as he was
able to duck and avoid being struck by both shoes.
24
Ministry as well.74
SOFA was not an end all to contractors‘ immunity under Order 17 however,
immunity was only withdrawn for contractors working for the State Department allowing other
U.S. agencies and their contractors to retain their immunity from Iraqi law until the complete
troop withdrawal date of December 31, 2011. Id. Further, according to the agreement, if a
member of the State Department, or one of its contractors, commits a crime off of an installation
area where Iraq has jurisdiction, and they are arrested, then the Iraqi government will notify the
U.S. government within 24 hours of the arrest. Id. The U.S. then has 21 days to retrieve the
contractor or agent from Iraqi jail and then and only then can Iraq begin prosecuting that
contractor under Iraqi law. Id. To date there has been no prosecutions of corporate mercenaries
under Iraqi law due to the protections of CPA Order 17 and SOFA.75
3. Department of Defense Instructions
The Coalition Provisional Authority was not the only agency who was sympathetic to
corporate mercenaries‘ ―plight‖ in being regulated to be held accountable for their actions. The
CPA‘s ―parent agency,‖ the DoD felt the same way.76
In October of 2005 the Department of
Defense had already began to be frustrated with the behavior of corporate mercenaries in Iraq,
and under the authority of MEJA introduced DoD Instruction 3020.41, entitled, Contractor
Personnel Authorized to Accompany the U.S. Armed Forces.77
The instruction set out clear
responsibilities and procedures for corporate mercenaries. Id. This came somewhat too little too
late having been already in the Iraq war for 2 ½ years. This was the third MEJA instruction
74
Strategic Framework Agreement, supra note 71, at Article 12, Jurisdiction. 75
Private Security Contractors in Iraq, supra note 19, at 19. 76
The Coalition Provisional Authority was led primarily by L. Paul Bremer, supra note 59, who primarily answered
to the Secretary of Defense, at that time Donald Rumsfeld, who acts as the chief executive officer of the Department
of Defense. See L. Paul Bremer, III, How I Didn‘t Dismantle Iraq‘s Army, The New York Times, September 6,
2007. 77
Department of Defense Instruction 3020.41, Contractor Personnel Authorized to Accompany the U.S Armed
Forces, (2005).
25
issued by the DoD in order to shape up its private military contractors. The other two being DoD
Instruction 1300.23, Isolated Personnel Training for DoD Civilian Contractors, issued in August
2003, and DoD Instruction 4145.26, DoD Contractor‘s Safety Requirements for Ammunition and
Explosives, issued April of 2005. Instruction 1300.23 was issued 6 months into the Iraq war and
almost 2 years into the war in Afghanistan finally mandated a minimum level of training for
DoD contract employees other than that covered in the individual contracts.78
Instruction
4145.26 finally set minimum safety requirements for DoD contractor‘s use of weapons.79
DoD
Instruction 3020.41 also set out which contractors were actually allowed to accompany U.S.
armed forces and which were not, in effect further defining MEJA as technically civilians not
accompanying armed force were outside the jurisdiction of MEJA.80
It also re-affirmed that
private military contractors could use deadly force in self defense, defense of others, and in
defense of property they were contracted to defend. Id.
Then the DoD introduced made federal regulation Defense Federal Acquisition
Regulation Supplement; Contractor Personnel Authorized to Accompany U.S. Armed Forces, in
June of 2006, placing it into the Federal Register, which amended DoD Instruction 3020.41.81
It
relaxed rules regarding the necessity of security contractors‘ combatant commanders to develop
security plans in locations where he decides to it is in the interests to provide security. Id. This
essentially allowed corporate mercenaries to roam free without filing any paperwork as long as
they felt it was in the best interest of the United States to provide security in those locations. It
78
Department of Defense Instruction 1300.23, Isolated Personnel Training for DoD Civilian Contractors, (2003). 79
Department of Defense Instruction 4145.26, DoD Contractor‘s Safety Requirements for Ammunition and
Explosives, (2005). 80
Department of Defense Instruction 3020.41, supra note 77. 81
71 Fed. Reg. 34825 (2006), Defense Federal Acquisition Regulation Supplement; Contractor Personnel
Authorized to Accompany U.S. Armed Forces.
26
went even further to make it the responsibility of the combatant commanders to ensure that their
mission did not authorize performance of inherently governmental functions like preemptive
attacks, assaults, or raids. Id. This in effect removed the remaining on scene government
regulation of corporate mercenaries‘ day to day activity leaving it up to the mercenaries
themselves to make sure that they only engaged the enemy defensively. It also amended the
DoD Instruction to allow for all contractors to use deadly force in self-defense and defense of
others and property, meaning that non-militarized contractors, such as truck drivers and
suppliers, could engage with any combatant or civilian with deadly force. Id. Given the
reactionary nature of the DoD‘s instructions and the DoD‘s later ―watering down‖ of their effect
speaks to the DoD‘s feelings towards their corporate mercenaries contract employees.
4. The Uniform Code of Military Justice
The Uniform Code of Military Justice (UCMJ)82
83
as many people know it was
originally established by Congress in May of 1951, replacing the Articles of War,84
to serve as
the judicial code for all branches of the military, providing in part for apprehension and restraint,
court-martial, trial, and punishment.85
According to the original text the UCMJ, it not only had
jurisdiction of members of the military, but ―persons accompanying the armed forces,‖ only in
―time of war.‖86
One would think that from this language that civilians are subject to the UCMJ
82
The Uniform Code of Military Justice, 10 U.S.C.§ Chapter 47. 83
Congress created the UCMJ pursuant to their power under Article I, Section 8 of the United States Constitution,
providing in relevant part that ―The Congress shall have Power…To make Rules for the Government and Regulation
of the land and naval forces.‖ Id. note 82. 84
The original Articles of War actually pre-dated the U.S Government, and were established by the Second
Continental Congress to govern the Continental Army in 1775. Congress adopted those Articles into its first
Articles of War in 1806, but they only applied to the Army and the Navy. The UMCJ went into effect in 1951 to
govern the U.S.‘ then 5 branches of military uniformly under one code. See The Uniform Code of Military Justice,
History, available at, http://www.ucmj.us/about-ucmj.shtml. 85
The Uniform Code of Military Justice, supra note 82. 86
See 50 U. S. C. § 552 (11) (1951).
27
if they meet the two qualifications. This is not the case, as the military tried this during the
Korean War where there were two separate incidents of wives accompanying their husbands
onto foreign military bases and subsequently murdering them.87
Counsels for both women filed
in U.S. District Court, asking the Court to overturn their guilty rulings by the military courts,
claiming that the rulings were unconstitutional in that Congress did not have the constitutional
authority to apply the UCMJ to civilians.88
The cases were combined by the Supreme Court and
decided on as Reid v. Covert, 354 U.S. 1 (1957). The Supreme Court decided in its plurality
decision that the respondents did not lose their civilian status and their right to a civilian trial
because the government helped them live as members of a soldier's family. Id. The Court stated
that it should not break faith with the nation's tradition of keeping military power subservient to
civilian authority, a tradition which was firmly embodied in the Constitution. Id at 40. The
Supreme Court limited its ruling to only capital cases. Id at 48. This ruling in Covert was later
expanded in a series of cases following to include other civilian cases asides from capital cases.
In Kinsella v. Singleton, 361 U.S. 234 (1960), the Supreme Court applied Covert to prohibit the
UCMJ from applying to non-capital criminal cases involving a civilian dependent. Then in
Grisham v. Hagan, 361 U.S. 278 (1960), the Supreme Court again extended Covert to prevent
the UCMJ from applying to civilian employees of the Army in capital cases. Finally in McElroy
v. Guagliardo, 361 U.S. 281 (1960), the Supreme Court expanded Covert to extend to non-
capital criminal cases of civilian employees of all of the armed forces. This line of cases did not
prevent the UCMJ from applying to civilians in non-criminal ―military only‖ violations, such as
direct violations of orders given by a military.89
90
In Covert, however, the Supreme Court never
87
See Air Force Board of Review, 16 C.M.R. 465, and Army Board of Review, 10 CMR 350, 13 CMR 307. 88
Reid v. Covert, 354 U.S. 1 (1957). 89
See Noyd v. Bond, 395 U.S. 683 (1969). The Court also held that all military remedies be exhausted before
seeking appeal in U.S. civilian court. Id at 698.
28
expressly held that the Constitution protects civilians who may be considered in or part of the
Armed Forces during war from being court-martialed, leaving open an opportunity.91
Out of the Vietnam ―conflict‖ arose the case of Robb v. United States, where the phrase
―time of war‖ was challenged as to whether it included ―conflicts‖ such as that as Vietnam. Id.
Where the Supreme Court held that ―time of war‖ only included wars declared by Congress. Id at
539. Thus after Robb, civilians accompanying the armed forces could only be court-martialed
under the UCMJ if they committed a non-criminal offense (i.e. disobeying orders) during a
declared war by Congress, effectively giving civilians immunity from the UCMJ. Id.
Neither of the conflicts in Iraq or Afghanistan is a declared war by Congress within the
definition of the UCMJ as interpreted by Robb. The last time Congress declared a war was
World War II.92
The authority for the conflict in Afghanistan came from The Authorization for
Use of Military Force Against Terrorists enacted on September 18, 2001.93
The authority for
Iraq came from the Joint Resolution to Authorize the Use of the United States Armed Forces
Against Iraq, enacted October 2, 2002.94
Thus no civilian in any circumstance could come under
the jurisdiction of the UCMJ.
90
Toth v. Quarels, U.S. 350 U.S. 11 (1955). The Supreme Court also held that former members of the military
cannot be court-martialed for crimes they committed while in active duty if they have since severed all ties with the
military. Id at 43. 91
Reid v. Covert, supra note 88, at 23, ―there might be circumstances where a person could be ‗in‘ the armed
services for purposes of [the UCMJ to control] even though he had not formally been inducted into the military.‖ 92
World War II was made up of six declarations of war by Congress. The Declaration of War on; Japan, December
8, 1941, Germany and Italy, December 11, 1941, and Bulgaria, Hungary, and Romania, June 5, 1942. Respectively;
55 Stat. 795, ch. 561, 55 Stat. 796, ch. 564, 55 Stat. 797, ch. 565, 56 Stat. 307, ch. 323, 56 Stat. 307, ch. 324, 56
Stat. 307, ch. 325. 93
Sense of Congress Regarding Terrorist Attacks, Pub.L. 107-40, 115 Stat. 224, September 18, 2001. 94
Authorization for use of Military Force Against Iraq Resolution of 2002, Pub.L. 107-243, 116 Stat. 1498,
October 16, 2002.
29
In October 2006, Congress passed the John Warner National Defense Authorization
Act.95
This Act mainly served as an authorization of appropriations96
for the Department of
Defense for the year 2007. Id. Also in the legislation was the addition of five words to Article
2(a)(10) of the UCMJ relating to its jurisdiction:
―In time of declared war or a contingency operation, persons serving with or
accompanying97
an armed force in the field.‖98 99
Congress added the word ―declared‖ for feasibility purposes to comport with the decision in
Robb. Id. More importantly, Congress included contingency operations in addition to declared
wars. Id. A contingency operation is defined in 10 U.S.C. § 101(a)(13) as:
―(13) The term ‗contingency operation‘ means a military operation that—
(A) is designated by the Secretary of Defense as an operation in which members of
the armed forces are or may become involved in military actions, operations, or hostilities
against an enemy of the United States or against an opposing military force; or
(B) results in the call or order to, or retention on, active duty of members of the
uniformed services under section 688, 12301(a), 12302, 12304, 12305, or 12406 of this
title [10 USCS § 688, 12301(a), 12302, 12304, 12305, or 12406], chapter 15 of this title
[10 USCS §§ 331 et seq.], or any other provision of law during a war or during a national
emergency declared by the President or Congress.‖100
Operation Enduring Freedom [Afghanistan] and Operation Iraqi Freedom [Iraq] are both
contingency operations because they call to order the Ready Reserve as defined in 10 U.S.C. §
12302.101
Thus with the addition of the new language civilians accompanying the armed forces
in the field were once again subject to the UCMJ. In specific, contractors, had been found to be
95
John Warner National Defense Authorization Act for Fiscal Year 2007, H.R. 5122, 109th
Congress, (2006). 96
Id. note 95. In specific over $500 billion was allocated to military and defense related activates. 97
United States v. Burney, 6 U.S.C.M.A. 776, 788 (1956). ―Serving with or accompanying‖ has been interpreted to
mean that the civilian‘s ―presence [is] not merely incidental to, but directly connected with or dependent upon, the
activities of the armed forces or their personnel.‖ 98
Reid v. Covert, 354 U.S. 1, 35 (1957). ―In the field,‖ has been interpreted to mean at or near the battlefront or
where actual hostilities are underway. 99
10 U.S.C. § 802(a)(10), ―Persons subject to this chapter.‖ 100
10 U.S.C. § 101(a)(13). 101
Reed, supra note 61, at 15.
30
―serving with or accompanying‖ armed forces in the past.102
The Act became effective on
January 1, 2007.103
The Act was somewhat troublesome for the DoD because now along with
the MEJA, the DoD had concurrent jurisdiction for crimes that were covered under the UCMJ
and constituted a felony within the United States and exclusive jurisdiction for offenses under the
UCMJ that were either purely military offenses or below felony level. To clear up the confusion
in deciding what jurisdiction to prosecute civilians under, on March 10, 2008 the Secretary of
Defense, Robert Gates, issued a memorandum to begin instituting the new law (over a year after
it went into effect) stating in part that:
―It is important that the exercise of this jurisdiction [referring to the expansion of UCMJ
to contingency operations] be based on military necessity to support an effective fighting
force and be called for by circumstances that meet the interests of justice, such as: [w]hen
U.S. federal criminal jurisdiction otherwise does not apply or federal prosecution is not
pursued, and/or, [w]hen the person‘s conduct is adverse to a significant military interest
of the U.S. (e.g., may jeopardize good order and discipline or discredit the armed forces
and thereby have a potential adverse effect on military operations).‖104
Thus the DoD set the policy that they will only court-martial civilians under the UCMJ if the
offense is not a concurrent jurisdiction offense (non-felony or military only offense) and/or when
it‘s in their interest to do so. Id. The Secretary of Defense went on to lay out procedures for
alerting the Department of Justice as to the offense within their jurisdiction for them to
prosecute.105
The military has thus not used its new powers under the UCMJ for the most
heinous of offenses which all arise to at least a felony level (murder, rape, torture, etc.).106
The
end result of the Act expanding the jurisdiction of the UCMJ virtually left military procedure un-
102
United States v. Burney, 21 C.M.R. 98 (1956). The court found a military contractor to be within the definition
because of his sufficient connection to the military, in that he answered to them, he was quartered by them, he had
military personnel privileges, and the military directly relied on his specialized services as a technician. 103
John Warner National Defense Authorization Act, supra note 95. 104
Memorandum for Secretaries of the Military Departments, Chairman of the Joint Chiefs of Staff, Under
Secretaries of Defense, Commanders of the Combatant Commands; UCMJ Jurisdiction Over DoD Civilian
Employees, DoD Contractor Personnel, and Other Persons Serving With or Accompanying the Armed Forces
Overseas During Declared War and in Contingency Operations; Secretary of Defense, March 10 2008. 105
Id. note 104. 106
Private Security Contractors in Iraq, supra note 19, at 29-30.
31
changed as the DoD already had reporting procedures for civilian crimes under MEJA in place
under DoD Instruction 5525.11, Enclosure 3.107
Not to worry, the military can still court-martial
corporate mercenary employees for disrespecting a superior officer, drunkenness, cowardly
conduct, and sodomy.108
IV. CONCLUSION
In conclusion there is much that needs to be done in the way of regulating corporate
mercenaries. Most of the legislation outlined above, both internationally and in the U.S., is ―all
bark and no bite.‖ International law that deals with issue by the roots, as the U.N. Mercenary
Convention did,109
doesn‘t attract any major war powers to sign on, and then those that do sign
on violate it without consequence.110
U.S. law that deals with the issue seems to be watered
down by the executive agencies that are charged with carrying out the law,111
112
or have their
force withdrawn by legislative agencies.113
114
In some cases the U.S. even actively protects
corporate mercenaries from the laws of other countries.115
All of the laws seem to share the
same common flaws, they all hold the individual employees of these corporations responsible for
their actions, none of them hold the corporation that employs, tolerates, and sometimes orders,
such behavior and conduct responsible. So in the off chance that several employees are
eventually prosecuted with the relatively weak legislation in place the corporation is not held
liable and it can simply replace its employees and factor it into the cost of doing business. It is
107
Department of Defense Instruction 5525.1, supra note 62. 108
Respectively; 10 U.S.C. §§ 889, 912, 899, 925. 109
U.N. Mercenary Convention, supra note 57. 110
Private Security Contractors in Iraq, supra note 19, at 18. 111
The Military Extraterritorial Jurisdiction Act, supra note 60. 112
The MEJA Expansion and Enforcement Act, supra note 64. 113
In the matter of Professional Security Officers Company, supra note 40. 114
Matter of: Brian X. Scott, supra note 42. 115
Coalition Provisional Authority Order Number 17, supra note 67.
32
indicative of the overall problem of regulating not just corporate mercenaries, but all
corporations. Now with corporate personhood on the rise in the United States,116
and their
almost international limited liability status,117
they appear to be virtually above the law.
Further, unlike people who must undergo immigration and naturalization processes in
order to become a citizen of another country, corporations only need to simply incorporate
themselves in the foreign country, which in some instances can be done in a few hours over the
internet or by mail. Take for instance Reflex Responses Management Consultancy, LLC, a
corporation based in Abu Dhabi, United Arab Emirates, a corporation created by Eric Prince,
founder of Blackwater, which will be serving as the United Arab Emirates‘ national private
military.118
Currently Prince is recruiting ex-military personnel from Columbia to the United
States to come serve in the U.A.E. Id. This being of no consequence after Blackwater became
the (self-admitted) ―poster child‖ for corporate mercenaries and the havoc they reap here in the
U.S.119
Now with the complete troop and contractor withdrawal deadline from Iraq of midnight
on December 31st, 2011,
120 and the majority of the dust spurred by corporate mercenary violence
settled, the United States needs to approach the problem of seriously regulating corporate
mercenaries. Not only does an infrastructure need to be created to deal with the employees of
116
Bradley Smith, Corporations are People, Too, National Public Radio, September 10, 2009. 117
Lawrence E. Mitchell, Article, Corporate Irresponsibility-America‘s Newest Export, Yale University Press,
(2001). 118
Mark Mazzetti and Emily B. Hager, Secret Desert Force Set Up by Blackwater‘s Founder, The New York Times,
May 14, 2011. 119
Blackwater Plans Shift from Security Business, Associated Press, July 21, 2008. 120
Strategic Framework Agreement, supra note 71.
33
these corporations, as proposed by the MEJA Expansion and Enforcement Act proposed,121
but
also legislation needs to be set in place that specifically regulates the corporations themselves.
Most effective would be an entire federal agency dedicated to the complete investigation of not
only incidents of human rights violations, criminal offenses, and the like, but the authority to fine
and sanction the corporations who are responsible for letting such acts occur. Ideally, the U.S
should lead the way after establishing such a model and institute it worldwide through a U.N.
Resolution so that international mercenaries and their corporate employers can finally be held
fully accountable for their crimes before the International Criminal Court (ICC). Given the state
of our current legislature and their priorities,122
as well as the fact the United States is
constitutionally incompatible with the ICC123
and that the U.S. will not subject U.S. citizens to
the ICC,124
there is likely no legislation in near sight that will effectively regulate corporate
mercenaries.
121
The MEJA Expansion and Enforcement Act, supra note 64. 122
Catherine Rampell, On Debt Talks, a Lose-Lose-Lose-Lose Situation, The New York Times July 25, 2011. 123
Lee Casey and David Rivkin, The International Criminal Court vs. the American People, The Heritage
Foundation , February 5, 1999. 124
Edith M. Lederer, US Supports War Crimes Tribunal for First Time, Associated Press, March 2, 2011.