text
stringlengths 198
621k
| id
stringlengths 47
47
| dump
stringclasses 95
values | url
stringlengths 15
1.73k
| file_path
stringlengths 110
155
| language
stringclasses 1
value | language_score
float64 0.65
1
| token_count
int64 49
160k
| score
float64 2.52
5.03
| int_score
int64 3
5
|
---|---|---|---|---|---|---|---|---|---|
A View from Emerging Technology from the arXiv
The Danger Of Green Laser Pointers
Cheap green laser pointers can emit dangerous levels of infrared radiation, according to an investigation carried out by physicists in the US
Twenty years ago, a green laser would set you back $100,000 and occupy a good-sized dining room table. Today, you can buy a green laser pointer the size of a ball point pen for $15.
These devices create coherent green light in a three step process. A standard laser diode first generates near infrared light with a wavelength of 808nm. This is focused onto a neodymium crystal that converts the light into infrared with a wavelength of 1064nm. In the final step, the light passes into a frequency doubling crystal that emits green light at a wavelength of 532nm.
All this can easily be assembled into a cigar-sized package and powered by a couple of AAA batteries.
The result are devices generally advertised to have a power output of 10mW.
Today, Jemellie Galang and pals from the National Institute of Standards and Technology and the University of Maryland say they’ve found worrying evidence that the output of some green laser pointers is much higher and more insidious. They describe one $15 green laser pointer that actually emits ten times more infrared than green light.
Galang and co are under no illusion as to the potential consequences of this. “This is a serious hazard, since humans or animals may incur significant eye damage by exposure to invisible light before they become aware of it,” they say.
And the problem appears to be widespread. “We have found that this problem is common in low-cost green laser pointers, though its seriousness varies widely,” they say.
That’s not a good state of affairs. Any ordinary user would be entirely unaware of the problem because infrared light is invisible. However, Galang and buddies describe a simple way for anybody to detect these infrared emissions.
The method is to reflect the the beam off a standard CD which acts as a diffraction grating, and so separates light of different wavelengths. The diffracted light is reflected onto a piece of paper which displays the diffraction pattern. Many webcams are sensitive to infrared light or can be easily modified to detect it. So photographing the paper using such a camera shows the diffraction pattern of the green light and any infrared light produced too.
The team hasten to emphasize the safety procedures that must be used during such an experiment.
They also take apart the green laser pointer in question to identify the cause of the problem. The design ought to include an infrared filter that blocks any infrared light that isn’t converted to green light. However, the culprit they bought not only did not have the filter, it did not have a slot for such a filter. “We thus believe that the absence of the filter in this case was due to a design decision,” they say
So somebody somewhere has removed the filter from the design, presumably to reduce costs. If that isn’t a criminal act, it ought to be.
Ref: arxiv.org/abs/1008.1452: A Green Laser Pointer Hazard
Become an MIT Technology Review Insider for in-depth analysis and unparalleled perspective.Subscribe today | <urn:uuid:cacc7754-6f01-43a1-a2d1-0767adcfa246> | CC-MAIN-2017-51 | https://www.technologyreview.com/s/420214/the-danger-of-green-laser-pointers/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948587496.62/warc/CC-MAIN-20171216084601-20171216110601-00582.warc.gz | en | 0.941103 | 683 | 2.90625 | 3 |
Global Migration and the World Economy: Two Centuries of Policy and Performance
World mass migration began in the early nineteenth century, when advances in transportation technology and industrial revolutions at home enabled increasing numbers of people to set off for other parts of the globe in search of a better life. Two centuries later, there is no distant African, Asian, or Latin American village that is not within reach of some high-wage OECD labor market. This book is the first comprehensive economic assessment of world mass migration taking a long-run historical perspective, including north-north, south-south, and south-north migrations. Timothy Hatton and Jeffrey Williamson, both economists and economic historians, consider two centuries of global mobility, assessing its impact on the migrants themselves as well as on the sending and receiving countries. Global Migration and the World Economy covers two great migration waves: the first, from the 1820s to the beginning of World War I, when immigration was largely unrestricted; the second, beginning in 1950, when mass migration continued to grow despite policy restrictions. The book also explores the period between these two global centuries when world migration shrank sharply because of two world wars, immigration quotas, and the Great Depression. The authors assess the economic performance of these world migrations, the policy reactions to deal with them, and the political economy that connected one with the other. The last third of Global Migration and the World Economy focuses on modern experience and shows how contemporary debates about migration performance and policy can be informed by a comprehensive historical perspective.
To our knowledge, this item is not available for
download. To find whether it is available, there are three
1. Check below under "Related research" whether another version of this item is available online.
2. Check on the provider's web page whether it is in fact available.
3. Perform a search for a similarly titled item that would be available.
When requesting a correction, please mention this item's handle: RePEc:mtp:titles:0262582775. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Kristin Waites)
If references are entirely missing, you can add them using this form. | <urn:uuid:d685ea71-4f76-4d57-a593-982aa0feb5ed> | CC-MAIN-2016-36 | https://ideas.repec.org/b/mtp/titles/0262582775.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982976017.72/warc/CC-MAIN-20160823200936-00126-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.911884 | 471 | 3.09375 | 3 |
As a parent, it’s worrying to see your child throw punches and kicks at a sibling, or throw items around the house. Thankfully, there are ways to channel that aggressive energy into something productive, like martial arts training. Believe it or not, such aggressive acts can greatly benefit your child when its tempered through martial arts training and discipline.
Real martial arts training (unlike what’s shown on television or movies) is based on the principle of non-violence. There are a lot of varieties, types and styles, but all of them are based on strict moral teachings.
Read on to learn about more ways how martial arts help the development of your child.
Martial Arts Promote Mental Health
Whether it’s Kung Fu, Karate, Taekwondo, Kickboxing or some other form, improves psychological health by boosting the student’s self-esteem, confidence, self-discipline and concentration.
The training programs are regulated and structured so students develop greater mental and physical stability. Your child will learn how the mind and body work together, thereby giving him/her a better understanding of co-ordination. The child is trained to perform under pressure. It builds self-confidence in your child and prepares him/her to handle any challenging situation that comes their way. Children who are bullied have the most to gain as it grants them a sense of empowerment by teaching them self-defence.
Martial arts can benefit your kid if he/she suffers from Attention Deficit Disorder (ADD) or Attention Deficit Hyperactivity Disorder (ADHD). Children afflicted with these disorders suffer from anxiety, fear and poor memory. The physical activity involved in the training strengthens the neural networks in the brain and enables better self-control in your child.
Martial Arts Fight Obesity
Obesity is currently an epidemic. In recent years, almost 13% of kids in Canada aged between 3-19 years are obese due to lack of physical activity. Obese kids are more likely to grow up into obese adults suffering from various health issues like hypertension, high cholesterol, heart disease, diabetes, stress, anxiety and depression. Many schools now don’t offer physical education programs and even if they do, not all kids are athletic. Martial arts are a great alternative, in fact, a much better alternative to PE programs. Martial arts training will make being active fun, engaging and boost their fitness level.
Martial Arts Improve the Social Skills of Your Child
Social skills are very important part of growing up and succeeding in life. If your child is very shy and quiet, or too talkative and boisterous, he/she can highly benefit from martial arts training. These training programs will teach your child to build healthy relationships with the other kids. He/she will also learn better communication skills, teamwork and conflict resolution while having to communicate with the instructor and other peers.
The lessons your child will learn from attending martial arts training will last for the rest of his/her life. There’s no right age for your kid to be enrolled. It depends on your kid’s interest and if you think that it’s the right time to channel his/her energy into something constructive. Before choosing a martial arts academy for your child, ensure that the location has qualified instructors, good training spaces and safety measures in place. | <urn:uuid:be5fe0c1-8e68-4ced-aad3-d5224c3cb6a9> | CC-MAIN-2021-04 | https://legendsmma.net/kid-learn-martial-arts/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703520883.15/warc/CC-MAIN-20210120120242-20210120150242-00395.warc.gz | en | 0.949181 | 685 | 3.125 | 3 |
Despite the fears of a very vocal minority of parents, who not only refuse to have their children vaccinated, but see a government conspiracy in the requirements, childhood immunizations are on the rise. For the oldest and well-known vaccinations such as the polio vaccination, immunization rates are above 90%. In fact less than 1% of children, only 0.6% of the children in the United States receive no vaccinations. For the United States as a whole, polio vaccination is at 93%; measles, mumps, and rubella (MMR) is at 92%, chicken pox (varicella) is at 91% and the diphtheria, tetanus, and pertussis (whooping cough) is at 96%.
Childhood Vaccination Rates Remain High in the United States
Over 90% of children between the ages of 19 and 35 months receive vaccinations in accordance with CDC guidelines.
MMR Vacination Rates by State
There is a geographic difference in vaccination rates when examined by state. Of the 50 US states plus the District of Columbia, 13 of these had vaccination rates below the stated public health goal of 90%. Nine of these states are in the western half of the country. Montana (85.1%) had the lowest MMR vaccination rate, followed by Utah (85.5%), Nevada (87.0%), Idaho (87.2%), Arizona (87.7%), Alaska (88.4%), New Mexico (88.8%), Colorado (89.3%) and Washington (89.8%). Only two are located in the Northeast - New Jersey (86.1%) and New York (89.3%). In the South, Louisiana (89.5%) has the lowest MMR vaccination rate. In the Southeast, Kentucky (89.5%) is the lowest.
MMR States with under a 90% vaccination rate
13 of the 50 US States have less than 90% of their children vaccinated for measles, mumps and rubella.
Childhood Vaccination Coverage for the Modified Series
While all states had reached at least 85% coverage for the MMR vaccination. The modified vaccine series varies from Nevada (61.3%) to Wisconsin (82.7%). Across the United States, when state residence is not taken into account, 72.7% of children have received the modified vaccine series. The series as defined by the CDC includes ≥4 doses DTP/DT/DTaP vaccine (diphtheria, tetanus toxoids, and pertussis vaccine; diphtheria and tetanus toxoids vaccine; and diphtheria, tetanus toxoids, and acellular pertussis vaccine), ≥3 doses of poliovirus vaccine, ≥1 dose of any measles-containing vaccine, ≥3 doses of HepB, ≥1 dose of varicella vaccine, and ≥4 doses of PCV. Haemophilus influenzae type b vaccine is excluded.
Only 4 states - Florida (81.0%), New Hampshire (81.0%), Michigan (81.3%) and Wisconsin (82.7%) are above 80% childhood vaccination rates for the modified vaccine series.
States Below the Modified Vaccine Series Average of 72.7% Coverage
How does the CDC collect this childhood vaccination data.
The National Immunization Survey (NIS) is based on information collected quarterly through a randomized phone survey. So there could be a bias towards households that have landlines and against those that do not. It is followed by a mail survey to the vaccination providers. For the 2010 NIS, 63.8% of households answered the questions. Vaccination providers returned vaccination records for 71.2% of all children with completed household interviews, for a total of 17,004 children. | <urn:uuid:dc3246fd-e5ff-4089-857b-dc5be7664c3e> | CC-MAIN-2023-06 | https://wizzley.com/childhood-vaccination-rates-remain-high-in-the-united-states/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499758.83/warc/CC-MAIN-20230129180008-20230129210008-00664.warc.gz | en | 0.937843 | 768 | 3.125 | 3 |
Globally, 840 million people are without access to energy. While nine out of ten people have access, it requires extra resources to provide energy for underserved areas. In 2017, only 78% of rural areas had access to electricity compared to 97% of urban areas. Without electricity, one must spend hours fetching water, vaccines cannot be properly stored at clinics, businesses struggle to be competitive, and children cannot do homework at night. Clean energy for cooking is also a safety concern. Since 2012, there have been about four million premature deaths each year due to a lack of access to clean cooking fuels, and three billion people still don’t have access to these fuels. Also, fossil fuel energy accounts for about 60% of total global greenhouse gas emissions. Ensuring universal access to energy is the primary purpose of Sustainable Development Goal 7.
SDG 7 aims to ensure access to affordable, reliable, sustainable, and modern energy for all.
Targets and Indicators
SDG 7 has five specific goals, or targets, measured through various indicators. One of the targets is to ensure universal access to affordable, reliable, and modern energy services by 2030. Another one is to increase the share of renewable energy globally by 2030, measured through the share of renewable energy in the total final energy consumption. Some secondary goals of this SDG include enhancing international teamwork to achieve accessible clean energy research and technology, as well as expanding infrastructure for providing modern and sustainable energy services.
What’s Already Being Done
The global electrification rate increased from 83 percent to 90 percent from 2010 to 2018. While there has been good progress in increasing access to energy worldwide, there is still a great need for accessible energy in rural areas, especially sub-Saharan Africa, where 53 percent of the population lacks access to electricity.
Within the United States, the American Council on Renewable Energy hopes to perform advocacy for the renewable energy sector. They stated renewable energy created 549,911 jobs in 2019, showing that clean energy is economically beneficial, as well as environmentally beneficial. The organization works on publishing research, educating legislators on policies, and doing outreach on renewable energy’s financial benefits.
Applying It: How Everyone Can Help
Large companies and governments bear an essential responsibility in reducing energy use, but you can help too. Add a rug to your bedroom to increase heat, which allows you to turn the thermostat down. Try plugging in appliances and chargers into a power strip. Instead of just hopping in your car to get somewhere, maybe you can ride a bike, walk, take the bus, or even consider carpooling with friends. Reusing products also helps to reduce the industrial use of energy. You can shop for clothes at second-hand stores, drink from a refillable water bottle, and use reusable bags at the grocery store. Though small, these steps can help the world meet SDG 7! | <urn:uuid:8f66383c-0050-48da-b460-a250ebea3f90> | CC-MAIN-2023-40 | https://academy4sc.org/video/sustainable-development-goal-7-affordable-and-clean-energy/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511386.54/warc/CC-MAIN-20231004152134-20231004182134-00479.warc.gz | en | 0.944191 | 596 | 3.609375 | 4 |
Suppose you are Jabir. Once you were going to a nearby shop to pay electricity bill by mobile phone. On the way, you met with a friend named Tanin who, truly speaking, is addicted to mobile phone. Now,
Write a dialogue between you and your friend about the uses and abuses of mobile phone
A dialogue between myself (Jabir) and my friend (Tanin) about the uses and abuses of mobile phone—
Jabir : Hi Tanin, you seem to have got addicted to mobile phone. Raise your head.
Tanin: Oh no, I was enjoying a ghost scene. Yes, Tanin. Really I’m wasting a lot of time on mobile phone nowadays. However, where are you going?
Jabir : To pay electricity bill by mobile phone.
Tanin: Think over, Jabir; how comfortable and easeful mobile phone has made our life.
Jabir : Really it is a miracle. No tension, no wait, no stress, no uncertainty, no misunderstanding. You can do global communication in seconds. Everything is in the grip of your hand.
Tanin: It appears that you are here means you are everywhere.
Jabir : Everything is right, Tanin. But this wonderful machine has also its demerits.
Tanin: Quite right. For example I’m ruining my education by wasting time.
Jabir : You are a simple example, Tanin.
Tanin: What are the other abuses of mobile phone?
Jabir : Criminals run their crime network through mobile; drivers talking over mobile while driving are likely to cause serious accident. Besides, radiation emerged from mobile phone causes serious health hazard.
Tanin: What are health problems mobile phone can create?
Jabir : Excessive use of mobile can cause brain cancer or brain tumor, loss of hearing, heart-risk, genetic damage, increased stress etc.
Tanin: Really a matter of great concern.
Jabir : Yes, Tanin. But there is no unmixed blessing in the world. We have to accept the good side and reject the bad one.
Tanin: Thank you, Jabir. I’ve got very important information from you about mobile phone abuse. It’ll help me get aware.
Jabir : Thank you too. | <urn:uuid:4087f9dc-92d6-40f1-977b-a86cc93a2a9d> | CC-MAIN-2023-40 | https://www.lessonbangla.com/dialogue-between-you-and-your-friend-about-the-uses-and-abuses-of-mobile-phone/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510734.55/warc/CC-MAIN-20231001005750-20231001035750-00330.warc.gz | en | 0.932496 | 496 | 2.515625 | 3 |
Join the Nation's Conversation
To find out more about Facebook commenting please read the Conversation Guidelines and FAQs
Injuries and death from window blind cords send two kids to emergency department each day
Study says childen's injuries and deaths from window blinds have not stalled despite decades of safety concerns. (Dec. 11) AP
While the cords dangling from your window blinds may not seem like a risky item, for small children, they can pose the risk of strangulation or serious injury, according to a new report.
The study published in the journal Pediatrics found that from 1990 through 2015, 17,000 children under six, or almost two children a day, wound up in the emergency department for window blind-related injuries. According to a statement from the Center for Injury Research and Policy at Nationwide Children's Hospital of those injured the majority were released, but the study found that about one child each month died when their neck became entangled in a window blind cord.
Many parents believe that they can keep their children from harm if they watch them carefully, but many blind related injuries happen within minutes, Gary Smith, MD, senior author of the study and director of the Center for Injury Research and Policy at Nationwide Children’s Hospital said in a statement.
“A curious child can quickly get entangled in a window blind cord," Smith said. "This can lead to strangulation within minutes, and the parent may not hear a thing because the child often can’t make a sound while this is happening.”
Data for the study was obtained from National Electronic Injury Surveillance System (NEISS) and In-Depth Investigation (IDI) databases, which are maintained by the U.S. Consumer Product Safety Commission.
According to the study, the dangers of blind cords peak for children ages 1 to 4, when a child's mobility increases. Smith said in a statement that it's "unacceptable that children are still dying from window blind cord strangulation."
He said the current voluntary safety standards surrounding blind cords are not enough, and called on parents to swap out blinds for cordless blinds and shades.
"A mandatory federal safety standard should be adopted prohibiting the sale of products with accessible cords," he said.
The study said parents should replace all blinds with cords, or purchase retrofit kits that can address some of the cord hazards.
Parents can also move furniture away from windows so children cannot climb on them to get to window blind cords. | <urn:uuid:a66b154f-159a-434e-809f-b8ad0f001e22> | CC-MAIN-2018-47 | https://www.usatoday.com/story/news/nation-now/2017/12/11/injuries-and-death-window-blind-cords-send-two-kids-emergency-department-each-day/939705001/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746301.92/warc/CC-MAIN-20181120071442-20181120093442-00147.warc.gz | en | 0.956877 | 503 | 2.640625 | 3 |
Put an end to some students' frustration with homework by giving them a "green light." Assign the first few questions from the homework assignment as a "green light" activity near the end of the class period. When students have completed those questions, look over their responses; give them permission to move on, or help them to get on track with the assignment. You might write "green light" on the page or hand out a green candy or stick a green-dot sticker on the paper. The "green light" gives students a good start on their homework and builds confidence. And it can be fun!
Education World Teacher Feature: Starring Carol Gibson
(Education World, February 28, 2005)
Article by Cara Bafile
Copyright © 2005 Education World | <urn:uuid:abc2183c-e233-4ed9-9c32-2d70fe974f53> | CC-MAIN-2016-26 | http://www.educationworld.com/a_curr/homeworktips/homeworktips002.shtml | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783396106.71/warc/CC-MAIN-20160624154956-00152-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.946244 | 159 | 2.734375 | 3 |
Kline -- 1937 Alfa Romeo 12C-37
Jeff Kline's powerful
and impressive 1937 Alfa Romeo 12C-37 V12 Grand Prix car won the race for
the later, faster Pre- War cars. This car battled the "Silver Arrows"
of Mercedes-Benz and Auto Union in the climactic era of Pre-War Grand
World War II hit automobile
racing like the asteroid impact that ended the age of the dinosaurs.
This mass extinction stopped the development of many complex and interesting
cars. Nothing like them ever appeared again.
Next: Pre-War Cars -- 2
Back to: Pre-War
Cars -- 1 (2)
Back to: Monterey
Historics 2000 -- Homepage | <urn:uuid:45bbf4ac-33e6-4701-a499-c359d1aee1db> | CC-MAIN-2017-04 | http://www.tamsoldracecarsite.net/PreWar2.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280485.79/warc/CC-MAIN-20170116095120-00210-ip-10-171-10-70.ec2.internal.warc.gz | en | 0.842982 | 154 | 2.78125 | 3 |
Landing a spacecraft on the surface of Mars is a Herculean task. Payloads reach hypersonic speeds as they heat up while entering the Martian atmosphere — the reason scientists have referred to it as the “seven minutes of terror.”
Many spacecraft have slowed their descents to Mars using large parachutes. But landing heavier spacecraft on the Red Planet, like those with a human crew, will pose new engineering challenges, according to new research — and a potential solution could involve a harrowing nose dive.
“Unfortunately, parachute systems do not scale well with increasing vehicle mass,” said assistant professor in the Department of Aerospace Engineering at the University of Illinois Zach Putnam in a press release. “The new idea is to eliminate the parachute and use larger rocket engines for descent.”
The paper Putnam co-authored about optimizing the trajectories that Mars landers should take on descent was published in the Journal of Spacecraft and Rockets.
There’s another issue that comes along with larger rockets: more valuable space used up by additional rocket fuel. And that’s space that could be used for scientific instruments or even human passengers.
Luckily, there might be a middle ground: pre-determined trajectories could minimize the need for massive parachutes or giant tanks of additional propellants to fire descent system rockets.
To pull that off, the vehicle would have to dive down, then turn its nose up just at the right time to fly over the Martian surface at a low altitude.
“This enables the vehicle to spend more time flying low where the atmospheric density is higher,” Putnam said. “This increases the drag, reducing the amount of energy that must be removed by the descent engines.”
READ MORE: Developing a Flight Strategy to Land Heavier Vehicles on Mars [University of Illinois]
More on landing on Mars: Breaking: NASA’s InSight Lander Just Landed on Mars | <urn:uuid:e1c3a7a6-79b3-44e1-9a82-cd5765a34d34> | CC-MAIN-2019-30 | https://futurism.com/mars-lander-heavy-payloads | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525414.52/warc/CC-MAIN-20190717221901-20190718003901-00147.warc.gz | en | 0.918664 | 403 | 3.75 | 4 |
Babies tend to move more at certain times of the day as they alternate between alertness and sleep. They are usually most active between 9 p.m. and 1 a.m., right as you’re trying to get to sleep. This surge in activity is due to your changing blood sugar levels.
Are fetuses more active at night?
Now a University of Auckland-led study shows it is entirely normal in late pregnancy for babies to be more active in the evening and bedtime, and that babies’ movements tend to keep getting stronger even as they come to term.
Is it normal for baby to move all day in womb?
However, some babies are more active than others. Ultimately, doctors will look for approximately one active hour a day as the guidelines of a healthy pregnancy. Still, some babies are more active. Activity in the womb is normal, and the overall level will vary even from pregnancy to pregnancy.
Why is my baby more active at night in the womb?
Pregnant women often observe more movements during the night time. One of the common reasons that could explain this pattern is that baby becomes more alert when he/ she is not feeling any activity. While would-be-mothers are more active during the day, baby goes into the sleeping mode.
Do babies move less some days?
“Some days my baby kicks so hard, but then I can go a full day without noticing much movement. … Once your baby’s head is engaged in your pelvis, he or she will be even less mobile. As long as you’re feeling regular movement (don’t forget to count those kicks), it’s less important what type of movement it is.
Who moves early in womb boy or girl?
One study, published in 2001 in the journal Human Fetal and Neonatal Movement Patterns, found that boys may move around more in the womb than girls. The average number of leg movements was much higher in the boys compared to the girls at 20, 34 and 37 weeks, that study found.
What does it look like when a baby kicks inside you?
Others describe first baby kicks to feel like flutters, gas bubbles, tumbling, a light tickle, a painless “zapping” feeling, a light flicking, or a gentle thud or tap. As baby grows, movements will become much more pronounced and you will feel them more frequently.
What does it mean if baby kicks a lot?
Babies who kick a lot in the womb are also more active after birth. Some mothers have more trouble feeling the kicks than others. If the placenta is on the front side of the womb, or if you are overweight, you will feel the kicks less. You can practice feeling for kicks when you check to see if your stomach moves.
Is baby kicking a lot a good sign?
On your end, the kicks and jabs are also good signs that the baby is doing well in there, which is why most prenatal health practitioners recommend tracking your baby’s kicks once a day.
How can you tell if your baby is stressed in the womb?
Heart rate abnormalities that are signs of fetal distress:
Tachycardia (an abnormally fast heart rate) Bradycardia (an abnormally slow heart rate) Variable decelerations (abrupt decreases in heart rate) Late decelerations (late returns to the baseline heart rate after a contraction)
Do babies have quiet days in the womb?
A: It’s normal for babies to have quiet periods in utero, and a temporary dip in activity could just mean that your baby is sleeping or he’s low on energy because you haven’t eaten in a while. However, if you sense an overall slowdown in movement, call your doctor.
Can I sleep on my right side while pregnant?
There’s a lot you may worry about during your pregnancy. Your sleep position doesn’t need to be top of the list. Doctors recommend resting on your side — right or left — to give you and your baby the optimal blood flow.
Who is more active in womb girl or boy?
Conclusion: Despite numerous prior studies derived from small samples failing to reveal significant sex differences in fetal activity, the present study demonstrates that males are about 10% more active than females during the latter two-thirds of pregnancy and are even more so following birth.
What happens if baby movements slow down?
It is not true that babies ‘slow down’ as labor approaches, but they have less space to move in. During your pregnancy you should try to be aware of your baby’s movement patterns. If the movements slow down or change it could be a sign that your baby is unwell and you should contact your midwife immediately.
How long is too long not feeling baby move?
Generally speaking, if you don’t feel at least 10 fetal movements in two hours, call your doctor to make sure that you’re not at risk for stillbirth. If you’re more than 28 weeks pregnant, your doctor may ask you to come in for a non-stress test (NST) to make sure that your baby isn’t in distress.
How can I make my baby move?
8 Tricks for Getting Your Baby to Move in Utero
- Have a snack.
- Do some jumping jacks, then sit down.
- Gently poke or jiggle your baby bump.
- Shine a flashlight on your tummy.
- LEARN MORE: Fetal Movement During Pregnancy and How to Do a Kick Count.
- Lie down.
- Talk to baby.
- Do something that makes you nervous (within reason). | <urn:uuid:3c2500b1-6b12-4605-a16e-96469cedf5ea> | CC-MAIN-2021-31 | https://thenewnormalpodcast.com/kids/what-time-of-day-are-babies-most-active-in-the-womb.html | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153739.28/warc/CC-MAIN-20210728154442-20210728184442-00569.warc.gz | en | 0.944281 | 1,193 | 2.734375 | 3 |
Affordable and automated mobile-based microscopy
An affordable and automated alternative to conventional microscopes, tailored to effectively support microscopy-based diagnosis in areas with limited access to healthcare services.
Neglected tropical diseases (NTDs) affect over 1.5 billion of the world’s poorest population. Microscopic examination is the gold standard for the diagnosis of several NTDs, but reliable diagnosis in rural endemic areas is often limited by lack of trained personnel and adequate equipment. Consequently, NTDs are commonly misdiagnosed and people receive inadequate treatment.
AICOS has been performing research in the field of Mobile Microscopy since 2013, which started with the development a fully automated 3D-printed smartphone microscope, termed μSmartScope. Through the usage of a motorised automated stage fully powered and controlled by a smartphone, the μSmartScope allows autonomous acquisition of microscopic images, with the ultimate goal of decreasing the burden of manual microscopy examination.
The μSmartScope also aims to reduce dependence on experts in microscopy diagnosis available on-site, by allowing straightforward integration with Artificial Intelligence (AI). Particularly, computer vision modules can be easily embedded in the μSmartScope framework to support the diagnosis of target pathologies.
The μSmartScope has already been tested for NTDs like Malaria, Chagas, Cervical Cancer and Microfilaria. It was demonstrated that is possible to distinguish those agents on the acquired images, which clearly illustrates the huge potential of μSmartScope to support microscopy diagnosis in medically-underserved regions.
In addition, an AI-powered version of the μSmartScope is being developed for the automated detection of malaria, with already reported results of 73.9-96.2% sensitivity and 92.6%-99.3% specificity, using a dataset of 566 malaria-infected thin blood smear images. | <urn:uuid:0bdab939-d505-4c73-a036-b993a50ba76f> | CC-MAIN-2019-47 | https://www.aicos.fraunhofer.pt/en/our_work/portfolio/micron.html | s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668539.45/warc/CC-MAIN-20191114205415-20191114233415-00482.warc.gz | en | 0.932221 | 382 | 2.78125 | 3 |
CRISPR – The Game Changer comes to Human
It is exactly an year ago, I came across this term called ‘CRISPR’ and I had no clue that it would be the most vital Game changer then. From then, as every other Life science student, I was really very excited to have an opportunity to work with this technology. Today, though I may not get my hands on to use it, I can witness the magic happening in my lab with this hot player in the town.
Giving hopes to the unimaginable things and to the dream world, finally CRISPR has moved them from mere Science fiction to reality.
The Clustered Regularly Interspaced Short Palindromic Repeats (CRISPR) is an adaptive bacterial immune system that allows them to detect viral DNA and destroy them. Everyday bacteria has to deal with a variety of viral infections, and it has only a few minutes to diffuse them before the viral has its hold upon the bacteria. Part of the system is a protein called Cas9, which seek out, cut and eventually degrade the viral DNA. But this system is modified to use it as an Genetic Engineering tool to cut specific sequences in genome of any other organism and not just the viral DNA.
Way back in 2013, when Jennifer Doudna and Emmanuelle Charpentier worked on a small project studying about bacteria and flu, they did not have believed that it was a project that could be the greatest breakthrough in the scientific world. Their study on how bacteria fight viral infections led them to CRISPR. From then, Jennifer had been making hopes for this technology as it has no bounds. This came true when the Chinese scientists came out with the ‘Designer babies’. They showed it is possible to genome edit the human embryo to our will. The Philadelphians used CRISPR to remove the DNA from an integrated HIV virus from the human cells.
When many companies have started commercialising the technique and venture capitalists started pouring in more money, and with CRISPR in the hotseat, Jennifer along with her colleagues called for a global pause to cease the use of this technology on human embryo and think about the unintended consequences as well as the intended outcomes of this scientific breakthrough.
The Science has already moved faster than we imagined of. Very recently, week ago, the FDA and National Institute of Health with the Recombinant advisory committee has agreed to test CRISPR’s first ever human clinical trial to combat blood cancers like myeloma, melanoma and sarcoma. This is one huge step forward towards the future of Genome Engineering.
“Genome engineered humans are not with us yet, but it is no longer science fiction”
With America waving its flag green, there are still controversies regarding the use of this technology. The advisory committee made sure the therapy is somatic and not germ line, thus leaving the gene pool undisturbed. The therapy aims in modifying the T-lymphocyte cells taken from the cancer patients and deleting a couple genes PD-1 and a TCR to go undetectable by the cancer cells and offer prolonged fight in destroying them. Troubleshooting at the laboratory with mice models, showed a decrease in the number of cancer cells to a greater extent than imagined of.
I am not writing this article to showlight the CRISPR’s human trial but its dynamism. CRSIPR technology can be used to enhance abilities of an organism including our own species. When I talk about enhancement, I am talking of abilities that were once a fiction(stronger muscles, bones, less cardiac diseases). Genome engineered animals and plants are happening right now. A week ago again the world sees the first CRISPR edited crop. I feel this is the time to think Science since finally this technology is moving towards Human genome engineering.http://www.geneticengg.com/2016/06/24/crispr-the-game-changer-comes-to-human/http://www.geneticengg.com/wp-content/uploads/2016/06/JADwithCRISPR750.jpghttp://www.geneticengg.com/wp-content/uploads/2016/06/JADwithCRISPR750-150x150.jpgGenome engineeringCharpentier,CRISPR,Genome enginering,Jennifer doudna,T-cellsIt is exactly an year ago, I came across this term called ‘CRISPR’ and I had no clue that it would be the most vital Game changer then. From then, as every other Life science student, I was really very excited to have an opportunity to work with this...Sudharsan VaratharajanSudharsan Varatharajanv.firstname.lastname@example.orgAdministratorGeneticEngg.com | <urn:uuid:d4ab7f9f-e019-4714-ae86-8a18c11963a4> | CC-MAIN-2018-05 | http://www.geneticengg.com/2016/06/24/crispr-the-game-changer-comes-to-human/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887832.51/warc/CC-MAIN-20180119065719-20180119085719-00176.warc.gz | en | 0.94693 | 1,022 | 2.640625 | 3 |
What Does psychologist Mean?Quite a few therapists settle for overall health insurance. Verify to determine Should your insurance plan is covered. Feel free to debate this when you Call the therapist.
review the psychological development and progress that happen all through daily life. Numerous developmental psychologists focus on small children and adolescents, but they also may well analyze getting old and issues going through more mature Grown ups.
Postsecondary academics instruct students in a wide variety of educational and specialized topics past the highschool amount. They could also perform exploration and publish scholarly papers and books.
Whilst psychologists generally require a doctoral diploma in psychology, a grasp’s degree is adequate for a few positions. Most psychologists also need a license.
This technique might be a very successful way of obtaining very good psychologists within your Neighborhood. A 2nd solution should be to ask trusted friends for members of the family who they would advocate.
Find out more regarding the job outlook for psychologists and find which fields of psychology give the greatest probable for advancement.
Working towards psychologists are also educated to administer and interpret numerous tests and assessments that will help diagnose a issue or notify more about how an individual thinks, feels and behaves.
), or are fully against their Concepts? Are you presently frustrated by your attempts to search out a highly effective treatment method that doesn't demand abstinence or preach the dogma of Nameless Teams/twelve-Move Applications? Have you at any time puzzled if there was a far better technique for dealing with addictions besides regular methods? There exists a way!"
Psychologists should have solid conversation techniques since they expend Substantially in their time Hearing and Talking with people or describing their study.
The things they Do: Psychologists study cognitive, emotional, and social procedures and habits by observing, interpreting, and recording how folks relate to one Psychologue enfant Paris another and to their environments.
A psychologist plus a psychiatrist in many cases are perplexed as possessing the identical indicating. Although the two examine the Mind, thoughts, thoughts and thoughts, There may be a distinct difference between the two fields of review. The first variances amongst the two fields is mainly the instruction necessities, the precise schooling, follow and income. In the event your career is to be a psychologist, you'd get started your instruction having an undergraduate major in psychology. Right after earning either a bachelor of science in psychology or perhaps a bachelor of art in psychology, you would probably then have to go to a graduate plan to generate a masters diploma in addition to a doctorate diploma in psychology.
The popular blog has won many awards, and it’s simple to see why. Brain Blogger is a necessity-stick to resource for anybody planning to sustain with news referring to the review with the Mind and thoughts.
Some psychologists work independently, performing investigation or Operating only with clients or shoppers. Other people operate as part of a Health care group, collaborating with physicians, social workers, and Many others to deal with illness and encourage Over-all wellness.
Ny, Ny 10024 Watch "My non-public observe provides a heat and caring position to build capabilities and enhance individual expansion. Therapy is a guided process of self-discovery, furnishing entry to strengthening techniques making sure that new and more healthy thoughts and behaviors go ahead and take put of outdated harmful types. | <urn:uuid:02222d66-c638-4610-96f2-17beee73a04e> | CC-MAIN-2019-51 | http://codyxruli.mybjjblog.com/what-does-psychologist-mean-9535181 | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540525598.55/warc/CC-MAIN-20191209225803-20191210013803-00176.warc.gz | en | 0.957772 | 672 | 2.65625 | 3 |
Interest rates have a pretty big affect on the housing market. Obviously the higher that an interest rate is, the more difficult it will be to pay a mortgage. There are other factors at play as well such as inflation. The way that the government fights against inflation is to raise interest rates. Affordability can affect the housing market but not as much as one would think. At the end of the day, the housing market is always going to be in high demand as people need places to live.
- Interest rates are very low right now but they are still above the Feds target rate of 2% over inflation.
- The higher an interest rate, the less affordable a mortgage will be for most borrowers.
- When it comes to affordability, it will affect the housing market but not as much as you’d think as there is always demand.
“The government’s primary tool to battle inflation is raised interest rates, which works by reducing the supply of money in the economy. And while this tactic tends to work at managing inflation, rising interest rates can slow or perhaps even reserve gains in property prices.” | <urn:uuid:d8408651-dbcb-41f0-83a3-d371da5131fa> | CC-MAIN-2023-06 | https://40plusfinance.com/how-do-interest-rates-affect-the-housing-market/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00431.warc.gz | en | 0.981113 | 236 | 2.6875 | 3 |
” In research writing, sources are cited for two reasons: to alert readers to the sources of your information and to give credit to the writers from whom you have borrowed words and ideas.”
–Diana Hacker, A Writer’s Reference
UConn students are responsible under the Student Code, Appendix A on Academic Integrity, for acknowledging the research and ideas of others, knowing what plagiarism is, and creating accurate bibliographies or “works cited” lists. Whenever you use the quotes or thoughts of others in your own papers, you must indicate where you found them. Each citation should include enough information so that the reader can easily track down the material.
Where do I begin? For starters, check you syllabus or ask your instructor to see what citation style you may be required to use for your papers. Different disciplines use different styles. For example, APA (American Psychological Association) is typically used in the social sciences, MLA (Modern Language Association) in English and literature, and Turabian in history. The Library has style books and online guides to help.
- Citation Guides & RefWorks
- Publication manual of the American Psychological Association, 6th Ed. Call Number : BF76.7 .P83 2010
- MLA Handbook for Writers of Research Papers, 7th ed. Call Number : LB2369 .G53 2009
- Chicago Manual of Style (Turabian). Call Number : Z253 .U69 2010 )
What is a citation? Citations are what you find in bibliographies. It will provide your reader with the information needed to identify your source. A citation of a book generally includes: author(s), title, publisher, date. A citation of an article generally includes: author(s), article title, magazine title, volume, pages, and date. Citations for web documents and articles from databases also include a URL and the date the information was accessed.
How do I cite? Detailed instructions and examples of how to do citations and bibliographies for papers are found in style manuals. You will also need to learn how to paraphrase and summarize so that you avoid plagiarizing. Often, citing is a two-step process. First you’ll quote, paraphrase, summarize, or refer to information from a particular source and then you’ll direct the reader to the exact title listed in your bibliography.
Example, if you’re writing about bullying and documenting data stated by Whitted and Dupper found on page 167 of an article, your paragraph may read as follows: According to Whitted, thirty percent of students in grades 6 -10 reported bullying.
Whitted, Kathryn S., and David R. Dupper. “Best practices for preventing or reducing bullying in schools.” Children & Schools 27.3 (2005): 167-175.
Whitted, K. S., & Dupper, D. R. (2005). Best practices for preventing or reducing bullying in schools. Children & Schools, 27(3), 167-175.
What do I have to cite? You need to cite anything that you found in outside sources, whether the source is from a printed or online source, or directly from an interview with someone who is providing data for your paper. When in doubt, cite. Cite:
- newspaper articles or magazine articles
- books or book chapters
- web sites and web pages
- statistics and charts
- emails, interviews or speeches
- group projects
What is plagiarism? The most basic definition is copying text and using it without giving credit to the author. Many times, plagiarism issues come up because of lack of experience in researching a topic, writing a paper, and creating bibliographies according to specific styles. The most common cases include:
- copying someone else’s words from print or web sites without citing the sources
- quoting, paraphrasing or summarizing someone incorrectly
- downloading a paper from a “free source”
- cutting and pasting from a variety of sources without citing the sources
- recycling an old paper
Online Citation Tools The following web sites are helpful in creating your citations and formatting your paper. Note that the software behind these interactive tools, do not correct spelling errors or take into account and special circumstances that you may need to cite accurately. Always double check your citations with style books and library handouts.
EasyBib : Creates citations in MLA style.
NoodleBib : Creates citations in MLA, APA, and Chicago styles.
Purdue OWL : Detailed guides to creating citations and formatting papers for MLA and APA formats, among others. | <urn:uuid:0e2c042e-eb25-4fc4-982a-841234c4d7b4> | CC-MAIN-2017-34 | http://lib.dev.uconn.edu/about/get-help/research/citing-sources/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886116921.70/warc/CC-MAIN-20170823000718-20170823020718-00152.warc.gz | en | 0.885326 | 959 | 3.625 | 4 |
Microsoft remote desktop is essentially a tool that is used to access a desktop from a remote location. The application is produced by Microsoft and the client comes pre-installed with most recent versions of windows.
The Microsoft remote desktop host protocol comes with most professional and server based operating systems.
uses of Microsoft remote desktop
The term Microsoft remote desktop is a literal description of the tool. The common use of Microsoft remote desktop is to control computers that are in a remote location. This could include:
- Logging in to your home PC, from your workplace
- Controlling a workplace server from your home
- Controlling a server that is hosted in a data center
- Controlling a dedicated CCTV or similar functional PC system that does not have a physical screen attached to it
The typical setup of a remote desktop scenario would be remote desktop protocol enabled on a host computer. The Microsoft remote desktop client would then be used on the client computer to gain access to the remote computer via the RDP Protocol.
Remote Desktop Protocol
The remote desktop protocol is the actual method of controlling a PC remotely. The protocol outlines the way in which the video image is sent via TCP/IP to the client and how the keystrokes and mouse gestures are sent back to the host.
The Microsoft remote desktop protocol operates over port 3389. There are various versions of the remote desktop protocol. Which version you use will depend on the client and the host operating system. They will both agree on the best protocol that they can both use.
- Efficient Intel Celeron N4020 Processor (4M Cache,...
- 11.6” HD (1366 x 768) Slim Display
Keep in mind that newer operating systems (especially server based) will only accept connections from clients that are on a new remote desktop protocol. This can be changed by editing settings on the host. That is beyond the scope of this article.
How to configure remote desktop on the host
Windows XP, Windows 7 and server operating systems from server 2003 onwards all have very similar configuration procedures for enabling Microsoft remote desktop.
Enable Microsoft remote desktop
Enabling Microsoft remote desktop is just the first step. Microsoft remote desktop can be enabled from Control Panel, System, remote settings.
As well as enabling Microsoft remote desktop, you will also have the option of allowing older versions of teh RDP protocol to connect to this host. Lastly, you will be able to select users that have access via remote desktop. Note that the user you are currently logged in as will have access by default.
Password requirements for Microsoft remote desktop
It is important to note that in order to make a computer accessible via Microsoft remote desktop, it has to have a password set.
The second step in enabling Microsoft remote desktop on the host is adding a firewall exception locally.
This can be done via Control Panel, Windows Firewall. Here you will be able to allow Remote desktop connections through the local windows firewall.
The last step in most cases will be to add a rule to your hardware firewall. Whilst you may not think you ahve a hardware firewall, you probably will. Most home routers serve as hardware firewalls.
For Microsoft remote desktop to get past your firewall/router you will need to open TCP port 3389 and direct it to the local IP of the host computer.
You can find the IP address of your computer AND your firewall by opeing a command prompt in windows and typing the following:
This will report back the IP address (thats your PC IP address) and the Default Gateway, which is your routers IP address.
Take a note of the PC IP address, then browse to the default gateway address via your Internet browser. You will then be prompted to log in to your router after which you can find the port forwarding or firewall section and allow the port to your local IP address.
Its worth noting that you should probably assign your PC with a static IP address via the router, so that it doesn’t change.
There is a great website that goes into much more detail about port forwarding here.
At this stage, Microsoft remote desktop should work. However, going forward you will either need a static public IP address, or a dynamic DNS service such as no-ip so that you can always contact your host computer remotely.
How to access the host via remote desktop client
Once everything is set up on the host comptuer, you are ready to access the device form a remote client. On the remote client it should be as simple as locating Microsoft remote desktop. Normally Microsoft remote desktop is located in Start Menu, All Programs, Accessories, Remote Desktop.
If you have an operating system of Windows Vista or newer, you can simply search for “Remote Desktop”.
You will tehn be prompted to enter the computer/Host. This is simply the public IP address of the network where your host computer resides, or the DNS name if you are using a dynamic DNS service.
Click connect and you will be asked for the credentials to connect to your remote computer.
Microsoft remote desktop for other devices
The fun doesn’t stop there. There are also lots of third party remote desktop apps available as well as some written by Microsoft and available on other platforms.
A great example of this is the Microsoft Remote Desktop App for IOS. This app is written by Microsoft, for Apple devices. It enables you to connect to your Microsoft remote desktop host computer from your iPhone and iPad! | <urn:uuid:f863420e-b7d6-461e-937b-2bb276bd775a> | CC-MAIN-2021-21 | https://bloggtech.com/technology/microsoft-remote-desktop/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989766.27/warc/CC-MAIN-20210512162538-20210512192538-00553.warc.gz | en | 0.918786 | 1,119 | 2.84375 | 3 |
May 11, 1998
Margaret Fuller: Performing Civic Equality
Images courtesy of the Margaret Fuller Society Homepage
RELATED WEB SITES
Fuller as Muse of the Women's Rights Movement
Godey's Lady Book: Letters of the Separate Sphere
Quotes from other Nineteenth Century Freethinking Women
A Brief History of the Women's Rights Movement
The French Connection: Romantics and Jacobins
RELATED ELECTRONIC TEXTS
Declaration of Sentiments and Declarations of the Seneca Falls Convention
JOHNS HOPKINS GUIDE TO LITERARY THEORY & CRITICISM ON...
to Kyle Napoli for the design tutorial
I. Methodological Introduction
Margaret Fuller had in mind that the title of her essay "The Great Lawsuit: MAN versus MEN. WOMAN versus WOMEN" (which she would later expand and re-name "Woman in the Nineteenth Century") should prepare the reader to suspend habitual thinking in order to "meet [her] on [her] own ground." To honor Fuller's desire to be met on her own ground (or perhaps, given the turn this paper has taken, her stage), I have worked to reconstruct what her ground/stage might have been, and to understand her ideas/performance in that light. My approach engages feminist performance theory as articulated by Judith Butler and Marjorie Garber, with historical and intertextual context. Butler's examination of the relationship between phenomenology and performance of gender offers a cogent model of the process by which cultural constructs of gender become naturalized without quashing the agency of the historical actors. Garber's examination of transvestitism in narrative as a signal of a society under conceptual stress also works particularly well with Fuller, since her writing activity was very much part of Transcendentalism and the American Renaissance, and responded to historical changes, sectional crisis, slavery, the decline of women's rights, and especially political reform. Viewing Fuller's "The Great Lawsuit" as a act of textual transvestitism became more persuasive as I grappled with her complex and sometimes opaque arguments, and certainly was supported by Edgar Allen Poe's view of her as a gender maverick (he divided humanity into three classes: "men, women and Margaret Fuller" ).
I began this essay with the intention of using feminist and new historicist literary theory, but found it impossible to reconcile the egalitarian and androgynous philosophy of "The Great Lawsuit" with the essentialism of feminist literary theory. For example, Elaine Showalter's "gynocritics" assumes sexual difference in the psychodynamics of creativity, the "problem of a female language," and the assumption of a distinct and progressive "female tradition" of writing. While Monique Wittig stands against essentialism, she argues that nineteenth century feminists universally viewed woman as "unique," and that they ignored the historicity of the construction of that view, not to be rescued until women social scientists worked to prove the intellectual equality of the sexes at the end of the century. While these descriptions may apply to the majority of women's literary production, I would argue that Fuller's "The Great Lawsuit" worked to stimulate thinking on the possibilities of Woman by demonstrating that a woman could perform key cultural "scripts" such as a lawsuit and a jeremiad, that women had furthered Western civilization and were crucial to the realization of its zenith in American political culture, and that femality was not only an androgynous aspect of humanity but was also in fact the agent of genius. Fuller hardly wanted to bolster "separate spheres" ideology by emphasizing women's differences. She saw in the absence of women from the public sphere not only great inequality, but also an American body politic kept artificially immature by utilizing only one half of the "Great Radical Dualism." Fuller's key assertions-- the centrality of self-reliant spiritual regeneration, the sexlessness of the soul, and an un-gendered "femality" -- thus contradict the categories which Showalter, Wittig and other feminists have ascribed to mid-nineteenth century women's literary production.
Thus, my attempt to "meet her on her own ground" led me to a non-essentialist approach that analyzed the way in which she invoked the jeremiad and Revolutionary referents to legitimize her voice, and then deployed that legitimacy to argue for a new conception of Woman and femality. Accordingly, Butler's theory of gender-as-performance seemed particularly fitting: Fuller learned male cultural scripts by receiving a "male" education (eventually gaining the reputation as the best-read person-- man or woman-- in New England), she rehearsed them with men and women alike as she sought to hone her intellectual skills, and when she turned to a gender critique, her mastery allowed her to perform a powerful revision of these forms. Far from simply "imitating," Fuller was performing traditionally male scripts with mastery and innovation. In Butler's essay, it is unclear what aspect of an individual chooses to repeat or alter the gendered "scripts" as they conduct their performance. Ultimately, Butler hopes that we might achieve a state in which gender scripts have no particular cultural meaning. For Fuller, there was no question of the choice of guidance; femality's self-reliant Minerva aspect must translate the inspiration of its Muse aspect into self-reliant action. And on the question of prescription, where Butler apparently desires either uniformity or an absence of signifying meanings, Fuller affirms that a great variety of male and female expressions will demonstrate the fullness of femality unfolding. Fuller's Transcendentalist critique took "Self Reliance" to its logical -- and for many, seemingly Jacobin -- politically feminist conclusion. The question of how to support a revolution of American political culture that focused on the immorality of falling short of a national covenant suggested a revitalizing jeremiad, while she could translate concerns about Jacobinism into a sense of a revitalizing of American Revolutionary ideals in an era very much concerned with the legacy of that Revolution. In claiming the intellectual realm (and its language) as her own, she does textually what she would later work to do politically and socially: she claims the institutions of America for women as well as men by affirming important national ideals.
My methodology is an attempt to hold in tension concerns of both new historical and cultural studies theories (in this case, performance theory). I wanted to contextualize Fuller's project to demonstate how it varied from (and was more interesting than) what many feminists argue was an imitative and relatively unsophisticated period for women's literary production by engaging new historicism. Yet, Fuller was interested in many of the same issues that concern cultural theorists: the naturalization of cultural constructs, historical change, and the power of language. In combining the two approaches, I hope to give performance theory a historically grounded stage and audience on which to operate. To complicate the analytical, ostensibly objective form of the standard essay, I have provided links to other web sites that give further information about the context in which Fuller wrote and acted.
II. The Performance of Civic Equality: Margaret Fuller's "The Great Lawsuit"
In July 1843, Margaret Fuller's "The Great Lawsuit: Man versus Men; Woman versus Women" appeared in The Dial, the journal of the Transcendentalists. In "The Great Lawsuit," Fuller argued that America had failed its destined mission to elucidate a "great moral law." Once the truth "all men are created equal" was articulated, it became a divine mandate as well as a law, which Americans violated in their oppressive treatment of women as well as slaves. In "The Great Lawsuit," Fuller argued that Woman's redress to natural law must come from education and unobstructed access to the public sphere of employment and politics. Unlike "separate spheres" theorists like Catherine Beecher, Fuller argued that there were no essential differences between men and women, that promoting self-reliance for both sexes would bring about needed change in public ideas and institutions, and that once what she called "femality" -- possessed by both sexes, and varying by individual -- was unleashed into a democratized public sphere, America might finally mature and bring forth an unprecedented fusion of spirit, nature and civic harmony. America was, she argued, immature, not yet the pride of Man. The solution was to refresh American political culture with its own egalitarian and spiritual founding ideals through androgynous self-reliance, thereby simultaneously remedying the violation of natural law and developing the special genius of America, the "great moral law." The "Great Lawsuit," then, sought the redress of injuries done to Man and Woman by social and political institutions which obstructed their liberty and equality as promised by American political culture.
"The Great Lawsuit" allowed Fuller to perform in text what she could not in reality: a sermon and a quasi-legal "case" in which she prophesied an androgynous civic identity of Transcendentalism and enlightened democracy. By textually "performing" traditionally male forms of civic discourse such as a lawsuit and a jeremiad, and by drawing on a plethora of familiar referents (such as Plato and John Winthrop), Fuller demonstrated her fitness for the male public sphere. Her performance of male discursive forms legitimized her authority, while her pantheon of historical women and her analysis of marriage and celibacy worked to subvert the male-dominated traditions from which those forms emerged. Rendering America a "wilderness" of selfishness, its institutions tyrannous and its citizens children, rather than men and women, she made the realization of women's rights vital to the Puritan errand, the legacy of the American Revolution, and crucial to the formation of American cultural identity.
The title "The Great Lawsuit" was important both for its epistemological and its performative qualities. Her argument contrasted the ideal of equality against social reality, leading the reader to act as an impartial judge and to be transformed by the process of considering both sides of the argument. She later wrote about the title:
[I]t requires some thought to see what it means, and might thus prepare the reader to meet me on my own ground. Besides, it offers a larger scope, and is, in that way, more just to my desire. I meant by that title to indicate the fact that, while it is the destiny of Man, in the course of the ages, to ascertain and fulfill the law of his being, so that his life shall be seen, as a whole, to be that of an angel or messenger, the action of prejudices and passions which attend, in the day, the growth of the individual, is continually obstructing the holy work that is to make the earth a part of heaven. By Man I mean both man and woman; these are the two halves of one thought. I lay no especial stress on the welfare of either. I believe that the development of the one cannot be effected without that of the other. My highest wish is that this truth should be distinctly and rationally apprehended, and the conditions of life and freedom recognized as the same for the daughters and the sons of time; twin exponents of a divine thought.
Her argument was so different from her reader's world view that she sought a mechanism to stimulate their thinking beyond the habitual. Like Plato in the Republic, Fuller understood that her reader reasoned from flawed a priori assumptions-- specifically, "separate spheres" ideology and the "scientific" studies that gave credence to theories of sexual inequality. The confident "attempts of physiologists to bind great laws by the forms which flow from them" ignored that these "forms" were a result of human education, laws and cultural imperatives, rather than "nature." (Interestingly, she would engage a kind of historical empiricism to support her view of Woman's role in history.) These forms were neither indicative of innate natural differences, nor predictive of future possibility, for, she argued: "Presently, [Nature] will make a female Newton, and a male syren." Thus, laws upholding sexual inequality in the public sphere were enacted against nature and therefore required revision. First, however, the reader had to be persuaded to weigh the evidence that the "laws of nature" were in fact cultural constructs, or what performance theorist Judith Butler has called "scripts." Such persuasion was (and is) no mean cognitive accomplishment, for as Butler has argued, the repeated "performance" of cultural scripts (for example, "separate spheres") reifies them until a violation of their precepts (in this case, Woman in the public sphere) seems unnatural or impossible.
This idea of the impossibility of Woman in the public sphere illuminates the importance of Fuller's performance of the authoritative civic rhetoric usually used by men. Fuller noted that advocates for Woman were considered modern-day Jacobins, upending institutional structures that enshrined "natural" gender inequality. Invoking powerful male civic traditions, Fuller could gain the legitimacy necessary to assert that Woman is equal to Man, as well as demonstrating it by her performance in the public sphere. She also could promote gender equality as the reconciliation of American ideals and institutions. Fuller distinguished the ideal of American gender equality from the universal enfranchisement of the French Revolution by condemning the violence and upheaval associated with the radically democratic Jacobins. In America, equal citizenship was not "Jacobin" but the natural maturation of American ideals. The means for a peaceful revolution toward equality would be through a spiritually enlightened, androgynous democracy. That this spiritual revolution would lead to the fuller expression of human equality was key to both her affirmation and challenge to existing political culture. She sought to revitalize American culture by illuminating the yawning gap between its mission and its current realization in American life, in the tradition of the New England jeremiad.
Moving deftly between the courtroom and the pulpit, Fuller thus set up the first element of a jeremiad by identifying how Americans had fallen away from their covenant with God. In Fuller's "Great Lawsuit," that covenant (a legal concept in and of itself) was inextricably bound with the natural law sentiments espoused during the Revolution. Once articulated, the truth that all men were created equal became a law, "irrevocable as that of the Medes in their ancient dominion." America was still a cultural wilderness since this law was violated shamelessly, and the "great moral law" had not been elucidated. The lawsuits of the essay's title were therefore between the ideal and reality of Man and men, Woman and women. Man was entitled to equality and freedom, both of which were usurped by men, the "pygmies" who dwell in the wilderness of selfishness and erroneously claim Man's inheritance, but he was "still kept out of his inheritance, still a pleader, still a pilgrim." Despite all manner of self-reliant men and women who sacrificed temporal rewards to purchase "one seed for the future Eden," the errand remained unfulfilled. For America to complete its errand, legal and other institutions needed to be reconciled with the divine law. Fuller quoted St. Martin, whose public philosophy provided the proper ideology:
The ministry of man implies, that he must be filled from the divine fountains which are being engendered through all eternity, so that, at the mere name of his Master, he may be able to cast all his enemies into the abyss; that he may deliver all parts of nature from the barriers that imprison them; that he may purge the terrestrial atmosphere from the poisons that infect it; that he may preserve the bodies of men from the corrupt influences that surround, and the maladies that afflict them; still more, that he may keep their souls pure from the malignant insinuations which pollute, and the gloomy images that obscure them; that we may restore its serenity to the Word, which false words of men fill with mourning and sadness; that he may satisfy the desires of the angels, who await from him the development of the marvels of nature; that, in fine, his world may be filled with God, as eternity is.
Fuller used this quote to link the Chiliastic imperative of the Puritans with Transcendentalist means of anti-institutionalization, and with these to refresh America's experiment of a nation built on divine and natural law. The mistreatment of Indians, Blacks and Woman overshadowed America's especial genius, yet, she argued, "Only seemingly, and whatever seems to the contrary, this country is as surely destined to elucidate a great moral law, as Europe was to promote the mental culture of man." Liberty and equality inhered in the promise of America, yet America failed to produce equality and liberty in its culture, thus obstructing the realization of its own particular genius. Insofar as Americans could negotiate an institutional re-alignment, human souls would be able to express the will of God, making the United States an Eden ruled by natural law. She continued, "though the national independence be blurred by the servility of individuals," though Americans indulged in appetitive and indolent behavior, "still it is not in vain, that the verbal statement has been made, 'All men are born free and equal.'" Here, Fuller refreshed the Puritan and Revolutionary language of her father and grandfathers, fusing Transcendentalism with civic duty.
The combination of an unfulfilled errand with revolutionary rhetoric makes for a powerful jeremiad, and Fuller's was made more powerful by her revisionary gender performance. Fuller was the driving force behind the philosophy of The Dial and its inaugural editor, and it was the policy of the journal to not publish authors' names. This may have been intended to free the contributors of their fame (or lack thereof), making the expression of ideas more central than authorial reputation, but it also had the effect of rendering the authors sexless. In the "Great Lawsuit," this anonymity compounded her performance of male rhetorical forms, rendering her unclassifiable, a recognized crosser of cultural gender boundaries. Insofar as she defined herself by her head rather than her heart, promoted equal education, and was the most active of the Transcendentalists, Fuller's writing can be seen as the intellectual equivalent of transvestitism. As Marjorie Garber argues, transvestitism in narrative signals category crisis, "a failure of definitional distinction, a borderline that becomes permeable, permitting border crossings from one apparently distinct category to another. What seems like a binary opposition, a clear choice between opposites that define cultural boundaries, is revealed not only to be a construct but also-- more disturbingly-- a construct that no longer works to contain and delimit meaning." Garber notes that such narratives are characteristic of worlds under conceptual stress; certainly, this is consistent with most of the nineteenth century, especially from the vantage point of Transcendentalists. Obvious areas of conceptual stress were the ideals of the Revolution versus the emerging morally complaisant reality, the cultural codification of separate domestic and public spheres, issues of industrialization, urbanization and immigration, republican versus democratic politics, and, perhaps most importantly for women, a period of "backlash"-like reversals of legal and political gains made during the Revolutionary War period when the loyalty of women was critical. This was also the era of the "American Rennaissance," of striving for a characteristic national cultural identity, which Fuller sought to further through her editorship of and writing for The Dial.
During this national identity crisis, Fuller took advantage of "male" intellectual abilities to affirm and transform American political cultural ideas such that Woman's equal citizenship became their logical and necessary development. As Judith Butler has argued, gender is an act to be learned, rehearsed, and then performed-- with the performance rendering social laws explicit. Fuller's performance of civic equality was an explicit re-rendering of social laws: Woman was equal, Woman belonged in the public sphere, and those who blocked Woman's ascent blocked the realization of the City on a Hill and the maturation of Revolutionary ideals. Fuller was Euridice calling for a new Orpheus, to re-make laws according to divine commission. She became Moses-like, although she could only reach the housetop and the church spire, not Pisgah. She invoked Platonic notions of the ideal city to bolster her the importance of the androgynous soul to the ideal city, and again to indict contemporary gender roles with allusions to Plato's cave. In Plato's Republic, ascent from the cave was realized by the soul's awakening through the dialectical process and study of the forms. For Fuller, the watchers in the cave of culture were "incarcerated," to be freed only when the religious self-reliance was established in them. These shadowy wrong ideas and dead institutions stunted the maturation of the polity (compared to a tree by Fuller), which could not "come to flower till its root be freed from the cankering worm, and its whole growth open to air and light." Yet, who might be the gardener, if the existing order stunted the development of both sexes? Men could not be expected to assist in reconciling relations between the sexes, since they were intellectually incapable of conceiving of women as anything other than for man (not Man). Boy-like men desired girl-like women they could dominate, or surrogate mothers to take care of them. Women, meanwhile, were also unable to perceive clearly; Fuller herself warned that she spoke as much from "society" as from the soul, and thus she offered only the next step forward, not a universal vision. Since both sexes had come to view gender inequality as "natural," and because men benefited from the arrangement, change would have to come from women's continuing self-reliant maturation. Rather than being contented with the constricted sphere articulated by an immature "model-woman of bridal like beauty," women needed to become like Emerson's "American Scholar," showing truth amidst appearances and cheering others to reach higher intelligence and accomplishment.
To that end, an education about Woman's role in the development of Western civilization would provide a starting point for women's thoughts and actions, and men's cooperation. "The Idea of woman," she noted, "has not failed to be often and forcibly represented." Her examples of the self reliant (or at least, notable) women varied from the Virgin Mary to Mary Wollstonecraft, from Cassandra to Mother Anne Lee, demonstrating that women have performed many roles in the public sphere. While Eve may have tempted Adam, Mary redeemed womanhood for the Biblical tradition. Some women-- Queen Elizabeth, Semiamis, Catharine of Russia, Aspasia, Sappho and Eloisa are historical figures given attention in male histories. The Egyptians, Greeks and Romans all had goddesses, with the "wisest legislator" of the latter referring to Meditation as a nymph. Greek drama was full of female characters (Cassandra, Iphigenia, Antigone, Macaria), when Sybelline priestesses were the conduits of the highest god who ruled with nine muses, and when Victory wore a female form. Of all the antiquities, however, Sparta was special:
In Sparta, though, in this respect as all others, was expressed in the characters of real life, and the women of Sparta were as much Spartans as the men. The Citoyen, Citoyenne, of France, was here actualized. Was not the calm equality they enjoyed well worth the honors of chivalry? They intelligently shared the ideal life of their nation.
Sparta was the example par excellence, where the ideal became flesh.
Fuller's portrayal of historical women was meant to "rouse an infinite expectation" of what Woman might accomplish, which scripts she might perform, were she not held back. Each woman is simply documented, neither sentimentalized nor held up as a model of virtue for emulation by the reader. Rather, they represent empirical proof of the myriad possibilities of Woman's performance of self. When details are given, they demonstrate how each woman further complicates the notion of Woman. For example, both the English Queen Elizabeth and the Castilian Queen Isabella "expressed the beginning of the new state, while they forwarded its progress." Each exercised considerable influence on Western culture, yet each was distinct with respect to her private life: "One showed that this strength did not unfit a woman for the duties of a wife and mother; the other, that it could enable her to live and die alone." In Fuller's retelling, Isabella, and not Columbus, is the agent behind the colonization of America, since she funded the journey. Thus, America "must pay back its debt to women, without whose aid it would not have been brought into alliance with the civilized world." Elizabeth, on the other hand, profoundly influenced the great poets of her age by the very fact that she was a powerful queen, inspiring Spenser's Britomart and Belphoebe, as well as Shakespeare's strong women characters. Thus, women can be at once Queen and Muse, powerful in act and inspiration.
Fuller then turned her attention to her contemporaries, analyzing the private "women's sphere" according to the same standards as she has the public sphere in Man vs. Men-- its merits for the development of the androgynous soul (and hence, its compliance with divine and natural law). As against the Puritan model of the male-dominated marriage and home as the "little commonwealth," Fuller articulated a model of private life as the environment in which the soul flourishes or withers, and thus determines the health, or the disease, or the body politic. For Winthrop, the obedience of the wife to the authoritarian husband, the "head" of the household, was the proper model of obedience between the governed and the governing. Fuller, conversely, argued that there can be no unity without all elements of that unity able to function as independent units; the wife has a head of her own, and she must be allowed to use it. Of four kinds of equality in marriage (household partnership, mutual idolatry, intellectual companionship and the marriage of kindred souls), the first three lack the quality of soul-nurturing. Of these three, the third (the intellectual companionship) is only an antetype, since it lacks spiritual passion. She illustrated the intellectual companionship with the marriages of Mary Wollstonecraft and of Madam Roland, the latter representing a modern incarnation of Spenser's Britomart, an "antetype of a class to which the coming time will afford a field, the Spartan matron, brought by the culture of a book-furnishing age to intellectual consciousness and expansion." Given that these marriages (and the women in them) are antetypes, and that the fourth and most desirable form of marriage (the marriage of kindred souls) is virtually nonexistent, celibacy provides a better option. Celibacy, which she heralds as the "great fact of our time," could provide the much-needed opportunity for women to develop their own gifts and identities through self-reliance, transforming themselves through self-culture into literate and spiritual "Spartan Matrons" capable of taking their rightful place in the public sphere.
Fuller subsumed women's self-education and reforms in the private and civic institutions within the American Revolutionary tradition, noting that tyrannical bonds-- those which obstruct natural law-- were meant to be dissolved. Fuller viewed middle-class women's new leisure time and literacy as a unique opportunity for Woman's self-culture, and she advocated the books of Madame Roland, Mary Wollstonecraft and George Sand to that end. One can imagine, however, what a "true woman" might think of adding such texts to her bookshelves, alongside the Bible, Shakespeare, and perhaps a didactic romance or two. Fuller vindicated the propriety of these books by arguing that they were the product of women whose rich genius, tender sympathies, high virtue and chastened harmony would have been unnaturally obstructed by overly narrow bonds of feminine propriety, had they chosen to observe those bonds: "Were there as much room in the world for such, as in Spenser's poem for Britomart, they would not run their heads so wildly against its laws." Insofar as they sought to change tyrannical laws, advocates for Woman were the rightful inheritors of the Revolutionary spirit. If they "alarmed the country by pulling down old towers to get materials," it was simply because they were obliged to "build their house from the very foundation" since existing institutions were unnaturally constricting. New institutions must be built for the new self-reliant "Spartan Matrons" so that they might not be "obliged to run their heads against any wall." Far from advocating the downfall of American culture, the vindication of women's rights expressed "an onward tendency. . . an aspiration of soul, of energy of man, seeking clearness and freedom," in accordance with the best of American political culture.
This made the vindication of women's rights central to the revitalization of a distinct American culture, rather than "Jacobin" radicalism. The revitalization of American cultural identity would come from the logical extension of two of its most powerful cultural traditions, democracy and the sense of divine mission, with "femality" inspiring and guiding the harmonizing and maturation of the body politic. While Fuller was wary of the tyrannical nature of any authority, male or otherwise, that precluded self-reliance, femality was the necessary harmonizing accompaniment to universal civic equality. Femality was not limited to women, nor was masculinity limited to men, but each was a quality possessed by individuals of both sexes: "Male and female represent the two sides of the great radical dualism. But, in fact, they are perpetually passing into one another. . . There is no wholly masculine man, no purely feminine woman." The quality of masculinity was the useful one of completing and achieving tasks, while femality was the quality shared by "all men of genius." Femality was "electrical in movement, intuitive in function [and] spiritual in tendency." , Femality's dual nature was exemplified in the inspiring Muse and discerning Minerva, the former being lyrical and magnetic, and the latter the intuitive ability to grasp the totality of reality. Its Minerva aspect was akin to Plato's "dialectical personality"-- a man or woman capable of achieving a unified vision by contemplation rather than through their "eyes and senses," thus allowing them to discern the forms rather than just the shadows, making them philosophers capable of good leadership. Femality was from the "soul, and not from society," and was "a harmonizer of the vehement elements." Thus, femality's Muse aspect was similar to the Universal soul which Transcendentalists and Romantics held to be the underlying reality, and self-reliance was its individual Minerva aspect. It was Emerson's self-reliance, the connection of the individual soul to the Transcendentalist Oversoul. As the agent of genius, harmony and the sublime, femality was the answer to fears about the leveling tendencies of universal suffrage.
In fact, since femality represented a transcendent order, removing the barriers to its full expression (through granting civic equality) was necessary to the realization of the City on a Hill. A more open public sphere was necessarily the appropriate response to the divine and natural law that all humans are androgynous souls "appareled in flesh." Fuller engaged spirituality to affirm that "[t]here is but one law for all souls and, if there is to be an interpreter of it, he comes not as man, or son of man, but as Son of God." No human could speak completely and reliably from the soul, so democracy was necessary to prevent tyranny. By combining Transcendentalist self-reliance (the interaction of the Minerva and Muse aspects of Femality) with universal suffrage and civic participation, Americans might democratically clear away the "canker" of oppressive institutions; by aligning human laws with Femality, they would fulfill their the mission of elucidating a great moral law, bringing American culture into bloom. Then, Fuller prophesied, the Divine would "ascend into nature to a height unknown in the history of past ages, and nature, thus instructed, would regulate the spheres not only so as to avoid collision, but to bring forth ravishing harmony."
In presenting femality as the means to enacting the "great moral law" and finally working toward completion of the "errand in the wilderness," Fuller at once performed and advocated for a woman's role in the public sphere that simultaneously affirmed and revitalized American political cultural traditions. Femality was the animating spirit of the Western tradition and once barriers to its expression were removed, it would reach its zenith in reformed American cultural institutions. Since femality had been relegated to the domestic sphere, America was forced to wander without its philosophical half in a public wilderness of selfishness and cultural immaturity. Far from bringing irrationality to the public sphere, femality would invigorate the blood of the body politic with vital change, bringing it into alignment with the Divine and American founding ideals and thereby elucidating the "great moral law." The "Great Lawsuit" would be resolved when those who obstructed the realization of America's destiny (as the tyrannous English had during the Revolution) were defeated by Woman's advocates, the true heirs to the Revolutionary spirit. Yet America need not suffer through another Revolution, if only men would heed the millennialist urgency and moral anxiety stirred by Fuller's jeremiad. By performing her argument for femality and civic androgyny in traditionally male rhetorical roles, Fuller secured legitimacy for her ideas and for herself as an idea-- an intellectually androgynous woman in the public sphere.
Bartlett, Elizabeth. Liberty, Equality, Sorority. New York: Carlson, 1994.
Bercovitch, Sacvan. "Hawthorne's A-Morality of Compromise," in Nathaniel Hawthorne, The Scarlet Letter, Ed. Ross Murfin. Boston: St. Martins Press, 1991, pp. 344-357.
Butler, Judith. "Performative Acts and Gender Constitution: An Essay in Phenomenology and Feminist Theory." Performing Feminisms. Ed. Sue-Ellen Case. Baltimore: Johns Hopkins University Press, 1990: 270-82.
Cooke, George Willis. An Historical and Biographical Introduction to Accompany The Dial. Vol. 1 of 2. New York: Russell & Russell, 1961.
Dickenson, Donna. Margaret Fuller: Writing a Woman's Life. New York: St. Martin's Press, 1993.
Douglas, Ann. "Margaret Fuller and the Disavowal of Fiction." The Feminization of American Culture. New York: Doubleday, 1988: 259-288.
Emerson, Ralph Waldo. "Self-Reliance." The Norton Anthology of American Literature. 4th Ed. Vol. 1. New York: W.W. Norton & Company, 1994: 1045-1062.
---. "The American Scholar." The Norton Anthology of American Literature. 4th Ed. Vol. 1. New York: W.W. Norton & Company, 1994: 1021-1033.
Fuller, Margaret. "Preface," Woman in the Nineteenth Century. Norton Library Edition. New York: W. W. Norton & Company, Inc., 1971.
---. "The Great Lawsuit: Man versus Men; Woman versus Women," The Dial: A Magazine For Literature, Philosophy, and Religion, Vol. IV, No. 1, July 1843. New York: Russell & Russell, 1961, pp. 1-47..
Garber, Marjorie. "Foreword: The Marvel of Peru," Lieutenant Nun: Memoir of a Basque Transvestite in the New World. Trans. Michele Stepto and Gabriel Stepto. Boston: Beacon Press, 1996.
James, Laurie. Men, Women, and Margaret Fuller. New York: Golden Heritage Press, 1990. (Frontispiece)
Murfin, Ross. "What is Feminist Criticism?" in Nathaniel Hawthorne, The Scarlet Letter, Ed. Ross Murfin. Boston: St. Martins Press, 1991, pp. 275-287.
Plato, Republic. Trans. G.M.A. Grube, Rev. C.D.C. Reeve. Indianapolis: Hackett, 1992.
Rose, Anne. Transcendentalism as a Social Movement: 1830-1850. New Haven: Yale University Press, 1981.
Showalter, Elaine. "Toward a Feminist Poetics," The New Feminist Criticism. Elaine Showalter, ed. New York: Pantheon Books, 1985, pp. 125-143.
Spenser, Edmund. "The Faerie Queene." The Norton Anthology of Poetry. 3rd. Ed. (New York: W.W. Norton & Company, 1983), 110-134.
Winthrop, John. "Journal of John Winthrop." The Norton Anthology of American Literature. 4th Ed. Vol. 1. New York: W.W. Norton & Company, 1994: 181-187.
Wittig, Monique. "One Is Not Born a Woman." The Lesbian and Gay Studies Reader. Ed. Henry Abelove, Michele Aina Barale and David M. Halperin. New York: Routledge, 1993: 103-109. | <urn:uuid:be28287d-7134-482d-aa25-38a6dac5c20d> | CC-MAIN-2018-05 | http://www.reed.edu/english/Courses/English341gs/FinalPaper/Rebecca/rar.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886895.18/warc/CC-MAIN-20180117102533-20180117122533-00659.warc.gz | en | 0.962907 | 7,792 | 2.640625 | 3 |
The Tenets of Taekwondo
The tenets of Taekwondo are the core values that are taught with it alongside the physical aspects of self defense. The tenets are what makes our martial artist good people. Over the next few weeks, we will do a deep dive into each individual tenet, but for now here is the basic idea behind the values taught in our school.
Courtesy: the showing of politeness in one's attitude and behavior toward others.
Integrity: the quality of being honest and having strong moral principles; moral uprightness.
Perseverance: persistence in doing something despite difficulty or delay in achieving success.
Self Control: the ability to control oneself, in particular one's emotions and desires or the expression of them in one's behavior, especially in difficult situations.
Indomitable Spirit: The spirit that can’t be broken or conquered, the strength of spirit that comes from the knowing one’s self.
Patience: the capacity to accept or tolerate delay, trouble, or suffering without getting angry or upset.
Check back in next week for a deeper look into courtesy, why we teach it, how we teach it, examples of it in martial arts, and every day examples of courtesy!
Want to see it for yourself? Come to a Seo's Martial Arts. We have locations is Calhoun, Rome, Summerville, and Albany Georgia. | <urn:uuid:b9b1b025-47d6-49ee-82e2-4aa172b1aba5> | CC-MAIN-2020-40 | https://www.seosmartialarts.com/post/the-tenets-of-taekwondo | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402131986.91/warc/CC-MAIN-20201001174918-20201001204918-00670.warc.gz | en | 0.92401 | 288 | 3.171875 | 3 |
"I used to go on long hikes with my husband, but now my legs get tired so quickly, I can't
go any more."
—Susan, 54 years old
"I don't know what's happened to me. I have an awful pain in my right calf after just 10 minutes of walking. It feels like someone put a clamp on my leg."
—Caroline, 60 years old
"When I walk, I get an aching pain—like a charley horse—in my left leg. When I go shopping, the pain gets so bad I can only walk for about five or six minutes before I have to sit down and rest.
I must be getting old."
—Barbara, 65 years old
Do the comments at left sound familiar? How many times have you heard family members or friends complain about leg pain and chalk it off to "old age?"
Peripheral arterial disease, or P.A.D., may be the cause of their leg pain. But, according to a recent survey by the P.A.D. Coalition, an alliance of health organizations, only 28 percent of American women have even heard of this serious condition. This is alarming, since P.A.D. is a common and dangerous disease that affects about nine million Americans, half of whom are women. That's 1 in 20 over age 50 and 1 in 5 over age 70.
To call attention to this little-known threat, the P.A.D. Coalition and WomenHeart, the National Coalition for Women with Heart Disease, developed the educational campaign. The campaign is in support of "Stay in Circulation: Take Steps to Learn About P.A.D.," a nationwide effort sponsored by the NIH's National Heart, Lung, and Blood Institute and more than 80 health organizations, vascular health societies, and government agencies.
P.A.D. occurs when fatty deposits clog arteries in the legs, reducing blood flow and causing leg pain when walking. Left untreated, P.A.D. can lead to disability, amputation (losing a foot or leg), and poor quality of life. Having P.A.D. also means an increased risk of heart attack or stroke. Blocked arteries found in people with P.A.D. can be a red flag that other arteries, including those in the heart and brain, may also be blocked. In the short term, having P.A.D. markedly increases your risk for heart attack, stroke, amputation, and death. In the long term, people with P.A.D. have a two- to six-fold increased risk of a heart attack or a stroke.
"Symptoms of P.A.D. should not be mistaken for inevitable consequences of aging," says NHLBI Director Elizabeth G. Nabel, M.D. "Early detection and treatment of P.A.D. are important for staying in circulation and continuing to enjoy life to the fullest."
Heart disease is the No. 1 killer of American women. While many women now know about the risk factors for heart disease—high blood pressure, not exercising, high cholesterol, high blood fats, and high blood sugar—most women are not aware that if you have P.A.D., you are at increased risk for heart disease and stroke. In fact, P.A.D. is caused by the very same conditions and lifestyle behaviors that cause heart disease and stroke.
- P.A.D. occurs when arteries in the legs become clogged with fatty deposits.
- Signs of P.A.D. include:
- Cramps, tiredness, or pain in your leg muscles that occurs when you walk but goes away with rest.
- Foot or toe pain at rest that often disturbs your sleep.Skin wounds or ulcers on your feet or toes that are slow to heal.
To Find Out More
For more information about P.A.D. and to download free education materials, visit:
Risk Factors for P.A.D.
Some conditions and habits raise your chance of developing P.A.D. Your risk increases if you:
- Are over 50.
- Smoke or used to smoke. Those who smoke or have a history of smoking have up to four times greater risk of developing P.A.D.
- Have diabetes. One in every three people over the age of 50 with diabetes is likely to have P.A.D.
- Have high blood pressure. Also called hypertension, high blood pressure raises the risk of developing plaque in the arteries.
- Have high blood cholesterol. Excess cholesterol and fat in the blood contribute to the formation of plaque in the arteries, reducing or blocking blood flow to the heart, brain, or limbs.
- Have a personal history of vascular disease, heart attack, or stroke. If you have heart disease, you have a one in three chance of also having P.A.D.
- Are African American. African Americans are more than twice as likely to have P.A.D. as their white counterparts. | <urn:uuid:299029c1-2663-4f01-a9c7-781579c8a846> | CC-MAIN-2016-36 | https://medlineplus.gov/magazine/issues/summer09/articles/summer09pg20-21.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982293195.16/warc/CC-MAIN-20160823195813-00124-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.947373 | 1,050 | 2.71875 | 3 |
Originally published March 2019
Advances in technology have led to substantial changes in the prenatal tests physicians can use to screen and diagnose pregnant patients for genetic abnormalities. New tests are being introduced and conventional tests are being improved—and all have unique benefits and limitations. As tests grow more sophisticated, patients need guidance in navigating the complex information so they can make informed choices about the future of their pregnancy.1
For physicians who treat pregnant patients, being aware of the developments in tests and the current standards of practice, communicating effectively with patients and obtaining informed consent, and documenting treatments and discussions can contribute to achieving the best possible outcomes for all involved.
Advances in prenatal tests
The new prenatal tests and the upgraded existing tests come with a variety of advantages and restrictions. For example, some tests are viewed as more accurate than others. Some can be used earlier in the pregnancy than others. Some carry greater risks. Moreover, some are funded by healthcare systems, while others are not.
Non-invasive prenatal testing (NIPT), for instance, is a newer screening tool used to detect Down syndrome and other genetic abnormalities. Its benefits include being non-invasive, highly accurate, and available for use “...at a relatively early point during pregnancy.”2 However, NIPT is regarded as a screening test and not a diagnostic test.3
Meeting the standards of prenatal testing
Whether you are an obstetrician, a family physician with a specialty in obstetrics, or a family physician with an interest in or a need to be involved in obstetrics, the courts expect you to provide prenatal care that meets the current standards of practice. That would typically include being knowledgeable of developments in prenatal tests, both screening and diagnostic, and the nature, uses, advantages, restrictions, accuracy, risks, and availability of the tests.
Communicating with patients, obtaining informed consent
Patients need to be given sufficient and accurate information so they can make informed decisions about the future of their pregnancy.2 The information they need will depend on their individual needs and circumstances. Some may decide to forego prenatal tests altogether, knowing that whatever the findings they would continue with the pregnancy. Others may decide to undergo a limited number of tests, while others may seek out all available tests to decide what course of treatment is appropriate for them.
Patients also need complete information about proposed tests or treatments, so when they provide or refuse consent, it is informed.4 Among the information you should consider providing to patients is the tests that are available, their benefits, limitations, accuracy, risks, possible outcomes, time constraints, and reasonably available alternatives. You should also consider giving information on the options available should test results indicate an abnormality. In addition, patients should be made aware of the availability of genetic counselling services.
Failing to provide patients, in a timely fashion, with information and advice about prenatal tests or a referral to another provider can have a potentially life-long impact. For instance, some patients may decide that they would rather end a pregnancy than give birth to a child with a chromosomal abnormality. If a screening or diagnostic prenatal test that may have predicted such a problem is not offered or not offered within a specific time frame and the result is a baby born with an abnormality, the parents may consider legal action alleging that the physician failed to offer testing within sufficient time to consider aborting the pregnancy. In this situation, the courts will look to several legal principles to guide its examination of the physician’s conduct, including whether the care followed the prenatal testing standard of care at the time of the pregnancy.
Speaking with patients about the intricacies of prenatal tests can be challenging because the language surrounding the tests can be unfamiliar and continually evolving. You should try to provide the information as clearly and simply as possible, and avoid jargon. Ensure patients understand the information and have an opportunity to ask questions. It may be helpful to investigate the material some organizations have written specifically for patients, such as that on the SOGC website, www.pregnancyinfo.ca.5
You may also want to consider organizing the material about the tests using structured communication and documentation tools. Some ministries of health have produced documents that can may be helpful in providing structure. For instance, the Ontario Ministry of Health has produced the document: A User Guide to the Ontario Perinatal Record.6
Further, when a test or treatment is beyond your competence or experience, you have a duty to refer patients to a more appropriate provider, for example to an obstetrician or genetic specialist. You may want to manage these referrals closely as time is an important factor. Some tests must be performed within set time frames to give patients the greatest number of options in deciding the future of their pregnancy.
Documenting in the medical record
The details of the informed consent discussion should be documented in the patient’s medical record including the information you provided, questions asked and the answers provided, and the agreed-on plan for prenatal testing.
As well, documentation in the record may form part of your tracking system for prenatal tests. Given the importance of having some tests performed within specific time limits to allow patients more decision options, you may want to record what tests were performed and when, what results were obtained and when, further test options available, and the agreed-on next steps.
The bottom line
With advances in genetic technology, the options for prenatal tests (both for screening and diagnosing) have grown in number and sophistication. To improve testing outcomes for patients and reduce your medical-legal risk, consider the following:
- Be aware of the current developments in testing and the current standards of practice with respect to tests that should be offered to pregnant patients.
- Give patients the information they need, when they need it, to make informed decisions about the future of their pregnancy.
- Document in the medical record all discussions with patients and the treatments agreed on.
- Van den Veyver IB. Recent advances in prenatal genetic screening and testing. F1000Research 2016;5(F1000 Faculty Rev):2591
- Towes M, Caulfield T. Physician liability and non-invasive prenatal testing. J Obstet Gynaecol Can 2014;36(10):907-914
- Carroll JC, Morrison S. Untangling the Helix 2017: Prenatal genetics for primary care providers [Internet]. Proceedings of the 2017 Family Medicine Forum; 9 Nov 2017 [cited 2018 Dec 3]. Montreal, Canada. Available from: www.geneticseducation.ca
- Canadian Medical Protective Association [Internet]. When consent is informed. Ottawa (CA):CMPA;2016 May [cited 2018 Nov 30]. Available from: https://www.cmpa-acpm.ca/en/advice-publications/cmpa-perspective/2015/when-consent-is-informed
- PregnancyInfo.ca [Internet]. Ottawa (CA):Society of Obstetricians and Gynaecologists of Canada;2018 [cited 2018 Dec. 3]. Available from: https://PregnancyInfo.ca/
- Ontario Provincial Council for Maternal and Child Health (PCMCH) and The Better Outcomes Registry and Network (BORN) Ontario Perinatal Record Working Group [Internet]. A User Guide to the Ontario Perinatal Record. 2018 August [cited 2018 Dec. 3]. Available from: http://www.pcmch.on.ca/wp-content/uploads/2018/08/OPR_UserGuide_2018Update_Final_18-08-22.pdf | <urn:uuid:a74b5e15-af76-428c-bec1-19b47465a0d5> | CC-MAIN-2019-51 | https://www.cmpa-acpm.ca/en/advice-publications/browse-articles/2019/prenatal-tests-for-genetic-screening-and-diagnosing-changes-choices-challenges | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540548537.21/warc/CC-MAIN-20191213020114-20191213044114-00256.warc.gz | en | 0.926789 | 1,554 | 2.828125 | 3 |
It's tempting to attribute the unseasonably warm and dry January completely to the Pacific Ocean temperature pattern dubbed "La Nina," long-associated with reduced precipitation in California.
But wait -- La Nina was also present last winter, when more rainfall than usual drenched the Bay Area and the snowfall in the Sierra Nevada was even higher than normal -- as much as 50 feet in places. Now bare spots are evident even at higher elevations.
"This is truly a tale of two 'Ninas,'" said Bill Patzert, PhD, the world renowned climatologist based at Pasadena's Jet Propulsion Laboratory.
Patzert has focused his research on the weather implications of La Nina and its opposite, El Nino, associated with wetter than usual winters for California.
So how can two Ninas have such different outcomes? Patzert believes the wildcard is to be found to the north in another meteorological phenomenon known as the "arctic oscillation," a variation in the strength of what can be imagined as an atmospheric barrier.
When the arctic oscillation is in a weak phase, as last winter, cold, moist air can escape the arctic region and head south. But when the oscillation is in a strong phase, as this winter, Patzert said it tends to reinforce the dry influence of La Nina at U.S. latitudes.
Patzert likened it to a "fence" that shields us from the arctic air.
The impact is dramatic. So far this season, the LA area has received only 3.76 inches of rain, compared to a normal to-date measurement of 5.24 inches, and 12.28 inches by this time last year, according to the National Weather Service.
In December 2010, we received about 10 inches of rain. Last month, LA received only one inch, and not a trace since Dec. 17.
January warm spells are not all that unusual in Southern California. But we're not alone in the warm and dry weather conditions. Apart from the Sierra, snowfall is far below normal in the Rockies of Colorado and the Wasatch Range of Utah.
Temperatures this past week in the ski resort of Park City, Utah, above 7,000 feet in elevation, have soared well into the 40s. Farther east, parents have been taking their children to outdoor playgrounds in Kansas City, Mo. Tennis players have been bringing out their rackets for outdoor matches as far north as Minneapolis. In the southern tier, the dryness has only intensified the ongoing drought in Texas and New Mexico.
But California faces no imminent drought threat, according to Jeffrey Kightlinger, general manager of the Metropolitan Water District. He credits the storage of water from last winter's bountiful runoff, noting that the MWD's largest Southern California reservoir, Diamond Valley Lake near Hemet, is well over 90 percent of capacity.
The MWD is planning for the possibility that this could be California's driest year on record. But even if that proves to be the case, Kightlinger said there is enough stored water to see us through "three tough years in a row" before cutbacks would be unavoidable.
So how much longer will the warm, dry weather continue?
La Nina might remain in place several more months. What complicates long-range forecasting is the fact that the arctic oscillation has a much shorter period, at times flipping in a matter of weeks or not, Patzert said.
Next month, February, usually is our wettest. Patzert advised it's too early to write off this winter. That said, he's sticking with his forecast that the rest of this season will be drier than usual, but added, "I'm going to keep my fingers crossed that I'm wrong." | <urn:uuid:d7036b4a-de97-4c4c-8bf4-39e7382508e4> | CC-MAIN-2015-35 | http://www.nbcbayarea.com/news/local/La-Nina-Has-Arctic-Ally-in-Prolonging-Warm-Weather-137032978.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440646312602.99/warc/CC-MAIN-20150827033152-00120-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.966154 | 782 | 2.625 | 3 |
Artifact PW2-12: Telecommunications during the Korean War
Submitted by : General Ramsey Withers (Ret’d)
PW2-12 Telecommunications during the Korean War: Good communications are vital to the success of any military mission.
Lieutenant Withers arrived in Korea in late June 1952 and was immediately sent to 1 R 22e R to replace a Signal Officer casualty. This photo, which was taken by a member of the brigade public affairs staff, shows Lt. Withers inspecting the “H-Frame” where the lines to all the forward companies, support platoons, the battalion Command Post, A & B Echelons, flanking battalions and brigade headquarters were terminated before being connected to our battalion headquarters switchboard, on the Yong Don position, in December 1952. The H-Frame was the point at which we started “trouble shooting” outages. | <urn:uuid:288428c2-0879-48da-a400-7e594f5958bc> | CC-MAIN-2023-23 | https://friends-amis.org/projects-programs/personal-treasures/artifact-pw2-12-telecommunications-during-the-korean-war/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649518.12/warc/CC-MAIN-20230604061300-20230604091300-00783.warc.gz | en | 0.970169 | 193 | 2.65625 | 3 |
Dr. Mark Haskins
Professor, University of Pennsylvania School of Medicine
Dr. Mark Haskins is a professor of pathobiology at the University of Pennsylvania School of Medicine. He and his colleagues conduct research on metabolic diseases caused by deficient enzyme activity. Such diseases have similar manifestations in animals and in children. Among the techniques Dr. Haskins and colleagues are exploring are use of recombinant DNA and gene therapy. Dr. Haskins has a BS in pre-veterinary sciences from Penn State University, a VMD from the University of Pennsylvania, an MS in biomedical engineering from Drexel University and a PHD in pathology from the University of Pennsylvania. He lives in Philadelphia.
Lysosomal storage diseases (LSDs) are very rare genetic diseases that children get. Tay-Sachs and Fabry disease are examples of the nearly 50 LSDs that have been identified. When we add all the LSDs together, the incidence is about one in every 7,000 live births. A number of LSDs aggregate in certain populations, such as some Jewish populations or the Amish. We also find them in certain breeds of animals. At the University of Pennsylvania veterinary school, we now have 10 of these diseases in dogs and cats that form the basis of our research.
Here’s how the disease works: The body is constantly making big molecules or substrates that are taken into the cells and chopped into smaller pieces by enzymes to be used to make products the body needs. Lysosomes are small bags of enzymes that enable cells to reduce the substrate into the smaller pieces. They do this in a sequential way — enzyme 1 cuts off one piece, enzyme 2 cuts off another piece, enzyme 3 and so on. If one of these enzymes doesn’t work because there has been a mutation, the process stops. In such cases, the substrates enter the cells and instead of being broken down and used, it is stored and the lysosomes become enlarged.
Having cells that are packed with large lysosomes can be a problem, depending on the type of cell. One example of where it’s a problem is in the cells in the cornea of the eye. The large lysosomes cause cloudiness in the cornea, hindering the way light is refracted. This causes a child with an LSD to see as if he or she were looking through ground glass. Children or animals with LSDs are also growth retarded. For instance, puppies in our lab that have an LSD known as MPS VII weigh half as much as normal puppies. Children with MPS I tend to be short in stature, have coarse features and enlarged livers and are severely mentally retarded. In the case of other LSDs such as MPS VI, children who have it are not severely mentally retarded but have other afflictions such as bone disease.
One approach to correcting the problems caused by LSDs is to introduce normal enzymes with mannose 6-phosphate on it that can help the cell begin to break down the substrate that has accumulated in its lysosomes. If we can get this healthy enzyme to be secreted outside of the cells affected by LSDs, it can attach to most of them and be trafficked into the cells where it can begin to work normally.
Where do you get the normal enzyme? One way is to make it in cell cultures, but it has to be genetically engineered. The cost is prohibitive — $300,000 to treat one child for one year and that’s just the cost of the enzyme. In addition, it has to be administered intravenously once a week. So a child would have to go to the hospital to get the treatment one day a week for the rest of his or her life.
Another approach would be to give the child a new organ that would make the enzymes. Two examples are bone marrow and liver transplants. This has been done but has limited possibilities.
The most promising approach is gene therapy where you take a gene, put it into the animal and the animal makes the new enzyme. We have had considerable success with gene therapy in our lab. For example, we took a retrovirus that causes cancer in mice and removed portions of it. Then we put into this virus a promoter which happens to be from a gene in a human liver and also put in the dog’s missing gene. Then we made a lot if this in culture and injected it in animals with LSDs. The result was that our vector infected the dogs’ liver cells, causing them to become factories for producing normal dog enzyme. When administered to puppies at birth, the manufacturing capacity for healthy enzymes is much greater since the liver grows by a factor of 40 times by the time they reach adulthood. We have one dog that manufactures 60 times the normal amount of healthy enzymes that he needs every day and is now 11 years old.
Many of our animals treated with this therapy have body weights that are almost normal, corneas that are now clear, and much improved skeletal features. However, we haven’t been able to improve the neck with gene therapy and at present we don’t know why.
The advantages of this therapy are that it requires only one injection early in life, it is long-lasting and it can be used for other diseases as long as making too much healthy enzyme is not a problem. Its disadvantage is you need to treat very early. At the moment, every child in the U.S. is tested for 15 genetic diseases. The LSDs have generally not been tested for because it hasn’t been a policy to test for diseases we can’t treat. We are now in a situation where, even though enzyme therapy treatment is available, we don’t test for LSDs. That’s a problem because in many cases, we don’t know a child has an LSD until he or she is older and begins to lose language skills and toilet training. The result is that many don’t get diagnosed until they’re two or three years old when the ideal time for intravenous gene therapy has already passed.
We cannot say at this point that gene therapy for LSDs is a cure. For example, the enzyme made in the liver and going into the bloodstream does not pass to the brain. That is because of the blood/brain barrier that is designed to prohibit a variety of substances passing into the brain. This is a big consideration for treating LSDs that cause neurological impairment. There is also the possibility that the therapy, when introduced to a child’s DNA, will result in a tumor. Another problem may be that the body may recognize the normal enzyme as “new” and mount an immune response. That said, gene therapy remains one of the most promising treatments for these profoundly debilitating diseases.
In an effort to provide wide-ranging views and perspectives regarding the practice of and issues surrounding agriculture, the Philadelphia Society for Promoting Agriculture (PSPA) seeks speakers representing a variety of perspectives. The statements and opinions they present are strictly their own and do not necessarily represent the views of PSPA. | <urn:uuid:a9066133-15ff-4810-b45c-b71cb0120070> | CC-MAIN-2017-34 | http://pspaonline.com/resources/meetings/09-08-11/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109682.23/warc/CC-MAIN-20170821232346-20170822012346-00101.warc.gz | en | 0.96707 | 1,464 | 3.28125 | 3 |
Free Implications of Day Care for Children Essay Sample
|← Children Dealing with Divorce||CSOM →|
Buy Cheap Implications of Day Care for Children Essay
Over the past several decades, the use of non-parental day care has increased which shows social and economic changes in the American society. Of concern are the implications of this day care to the young children which has promoted and supported their development. The effect of out-of-home care for these youngsters has been a subject of discussion on their socialization and the negative or positive aspects of such day care to the children. The paper will discuss the implications of the day care for young children and its aspects. The concerns stem from the fact that separating these infants from their mothers at such an earlier age may cause emotional harm and interrupt the bond with the mother.
Implications of day care for young children
Children's outcomes are influenced by the environment including the family and childcare experiences on their development. The quality of the childcare support environments affects the quality of preschool child care experiences. This is because of the many concerns regarding the attendance of day-care. Questions that arise are whether they have negative or positive effects on the children's development.
The parents opting for child care should go for high quality settings where children are likely to spend less time watching TV but socializing with adults. Here, children are exposed to activities that stimulate and nurture language as a cognitive development promoting social development. Caregivers should examine the care settings they provide for the children. How they interact with these children, the experiences they offer, the activities they involve them and how they talk to the children and how they correct unkind children has a big impact on how children interact in the future (Todd M. C. 2001).
Advantages of home daycare
Home daycares provide these children the opportunity to learn and play with other children unlike with nannies. The centers have mixed group of children and adults and may help the child to feel comfortable with older kids. Daycare centers can be the next best thing after a parent's home. , with their homey environments and if the child care is in the same neighborhood they will make the child feel more at home. With licensed and trained staff, children have the advantage of benefitting from trained teachers who are specialized about them (Fuqua C. 2010).
Disadvantages of daycares
Although an attractive idea of having daycare for children while at work, there are some disadvantages of leaving such infants at daycare centers. They include;
Sickness. The risk of contacting disease is higher at daycare centers as the children are more exposed to germs than usually at home. The diseases they are exposed to range from colds, flu, lice infection to pinkeye. Small staff. This happens if there is a low teacher to student staff which can prove to be very harmful to the child. Infants need to be watched constantly by adults and thus a small staff means less care to the children. Cost. Daycares are usually very expensive as they charge outrageous amount of money. Some charge high fees for late picking of the infants after the designated time. Stress. Worrying about leaving your child with someone else and whether she is okay can stress one out. This is worsened if the daycare centre is not fully trusted. Lastly but not least is missed days. This happens when the daycares are closed for holidays meaning that another alternative has to be sought to care for the child. Also the fact that sick children will not be brought to daycare center (Wright D. 2010).
Child care has now been an ordinary part of life for children especially in the western countries. Infants are placed as much as more than 10 hours in these child care centers and as expected they in a big way mould the behavior of the child. There are different implications for these youngsters while in these daycares. As discussed above, they are associated with both negative and positive aspects and parents are encouraged to look for he best care centers to take there children.
- Strategy and Corporate Responsibility
- Children Dealing with Divorce
- Holocaust Auschwitz State Museum | <urn:uuid:5883b641-c493-4568-83d1-9e5d775fd58a> | CC-MAIN-2018-30 | https://bestwritingservice.com/essays/Analysis/Implications-of-day-care-for-young-children.html | s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589417.43/warc/CC-MAIN-20180716174032-20180716194032-00384.warc.gz | en | 0.966704 | 850 | 2.65625 | 3 |
The mutation that causes congenital stationary night blindness (CSNB) in dogs has been discovered after years of research by an international team including a team of researchers from the University of Pennsylvania.
CSNB is an autosomal recessive disease, meaning that it occurs on one of 38 pairs of non-sex chromosomes, and that symptoms will only occur if a copy of the mutation is inherited from both parents. If a dog inherits the mutation from only one parent, they are a carrier, meaning that they will not display the disease but they can still pass it on to their own offspring if they reproduce with another carrier. Those with the disease have reduced vision in low light but normal vision during the day.
The study, which you can find here, was conducted by a team from the University of Pennsylvania in collaboration with researchers from the University of Bern, Cornell University, Chubu University, and the Mie University Graduate School of Medicine. The study included 23 dogs, 12 of which had CSNB and 11 of which did not. The dogs were all closely related, allowing the researchers to notice more small-scale differences in their DNA due to the dogs' genetic similarity. Using a type of analysis that compares single points (basepairs) along the dog's genome, the researchers were able to narrow down the location of the mutation to within a 4-million basepair range. They then conducted a genome-wide analysis and compared it against an international dataset of over 250 dogs to hone in on any mutation that was present in CSNB-positive dogs and carriers, but not in unaffected dogs.
The results were promising: a single basepair deletion mutation was found in the LRIT3 gene that caused the protein to be misshaped. The LRIT3 protein is responsible for positioning another type of protein within specialized cells called ON bipolar cells which relay signals from photoreceptors to the brain. This particular mutation appears to only affect the ON bipolar cells that are associated with rods- the type of photoreceptor that is responsible for vision in low lighting.
In its normal form, LRIT3 ensures that a molecular channel protein, TRPM1, is properly localized at the tip of a cell type adjacent to the retina’s light-sensing photoreceptor cells. This secondary layer of retinal neurons, called ON bipolar cells, relay signals from the photoreceptors on their path to the brain. The mutation appears to specifically affect those ON bipolar cells that are associated with rod cells–those that allow vision in low light.
This discovery has big implications for canine health. Knowing the mutation that causes a condition means that it can be detected through genetic testing. Breeders can get their dogs checked for the mutation to determine which dogs are clear to breed. Over time, CSNB can be reduced or eliminated from breeding stocks, which in turn will reduce the prevalence of CSNB in the dog population. Genetic testing also allows people to check their dogs for the disease, which otherwise may go unnoticed or misdiagnosed, in order to provide better care.
There is hope for dogs that are already suffering from CSNB as well; the research team is already working to design a gene therapy that could completely cure the disease.
You can read more about their discovery in this article from Scienmag. | <urn:uuid:22ea5388-28a5-4ff5-9ebe-7dafb7fe67b2> | CC-MAIN-2021-31 | https://www.whatsyourmuttdna.com/news/cause-of-night-blindness/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154356.39/warc/CC-MAIN-20210802172339-20210802202339-00102.warc.gz | en | 0.968055 | 671 | 3.390625 | 3 |
The Crimson Rosella is native to eastern and south-eastern Australia and has been introduced to New Zealand and Norfolk Island. It is commonly found in, but not restricted to, mountain forests and gardens. The Yellow and Adelaide Rosellas are now regarded as subspecies. The greenish ones, sometimes with crimson blotches, are juveniles. Crimson Rosellas’ calls are chatters or bell-like “tinks”.
Their nests are deep hollows with no lining except wood pulp from the hollow. They lay 5 to 8 white eggs. The female looks after the young for the first 6 days, then the male joins in. They eat mainly seeds and can be heard in tree-tops cracking open gumnuts, but eat some insects too.
Size: 32 - 37 cm
Photo: Mark Trinham. Illustration: Mark Trinham. | <urn:uuid:709588a3-60a7-42d4-928d-a94e69b1ba1b> | CC-MAIN-2020-05 | https://scnaturesearch.com.au/fauna/Crimson%20Rosella | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594209.12/warc/CC-MAIN-20200119035851-20200119063851-00285.warc.gz | en | 0.961921 | 178 | 2.828125 | 3 |
|Student Learning Outcomes -|
- Upon completion students shouuld be able to utilize a variety of exercise modes and techniques to improve muscular strength, endurance, flexibility, and cardio-respiratory endurance.
- Upon completion students should be able to identify weight management principles, basic physiology of exercise, and benefits of regular exercise.
|Description - |
|This course teaches and provides practice specific techniques and conditioning for the sport of softball. This includes drills, weight and flexibility training, and cardio-respiratory development.|
|Course Objectives - |
|The student will be able to: |
- Assess and improve muscle strength and muscle endurance used for the sport of softball.
- Design and practice a program of effective muscle-training exercises.
- Define and assess flexibility and describe the benefits of increased flexibility for the sport of softball.
- Demonstrate softball specific strength exercises and routines
- Practice specific aerobic and anaerobic training
- Demonstrate and assess sport techniques for softball
|Special Facilities and/or Equipment - |
|softball specific equipment |
|Course Content (Body of knowledge) - |
- Assess and improve muscle strength and endurance
- Practice a program of progressive overloading with an understanding of repetitions and sets.
- Physical testing to determine the measure for repetition maximums.
- Demonstrate the ability to select the weight and exercise for targeting each major muscle group.
- Perform and understand the importance of multiple joint exercise.
- Design a program of effect muscle training exercise for the sport of softball.
- Design a program for circuit training exercises that are sport specific.
- Perform proper free weight lifting techniques
- Explain the advantages and disadvantages of free weights vs. weight machines.
- Define and assess flexibility and describe the benefits of increased flexibility for softball specific training.
- Explain the following factors and their influence on flexibility: muscle temperature, physical activity, age and disease.
- Assess flexibility at four joint sites.
- Demonstrate softball specific flexibility exercises and routines.
- Practice softball specific stretching routines.
- Demonstrate PNF stretching exercises.
- Practice softball specific aerobic and anaerobic training.
- Measure and assess individual cardiorespiratory endurance.
- Practice proper warm-up for aerobic and anaerobic exercise.
- Demonstrate and assess sport technique for competitive softball training.
- Analyze softball tapes for successful techniques.
- Practice sport techniques that develop skills for competitive softball.
|Methods of Evaluation - |
|Softball specific pre and post test for individual strength, flexibility, and endurance. |
|Representative Text(s) - |
|None required |
|Disciplines - |
|Physical Education or Coaching |
|Method of Instruction - |
|Discussion, Cooperative learning exercises, demonstrations. |
|Lab Content - |
|Types and/or Examples of Required Reading, Writing and Outside of Class Assignments - |
|Optional reading and writing assignments as recommended by instructor. | | <urn:uuid:5c18a405-f07e-48cf-bcd1-e0620229e5b3> | CC-MAIN-2016-07 | http://www.foothill.edu/schedule/outlines.php?act=1&rec_id=5964 | s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701161946.96/warc/CC-MAIN-20160205193921-00128-ip-10-236-182-209.ec2.internal.warc.gz | en | 0.869824 | 642 | 3.46875 | 3 |
One of the twenty six most widely translated authors in the world, Robert Louis Stevenson was a Scottish novelist, poet, essayist, but most widely celebrated as an adventure writer. Best known for his novels Treasure Island (1883) and Strange Case of Dr. Jekyll and Mr. Hyde (1886), Stevenson wrote a number of lesser known short stories, inspired by his worldly travels, as well as children's poems in his collection, A Child's Garden of Verses (1905).
Stevenson relocated extensively to climates he hoped would improve his poor health, traveling from Scotland to France, then upstate New York. In 1888, he chartered a yacht in San Francisco and sailed the South Pacific with his family for three years. His health improved considerably during his extensive adventures in the Hawaiian Islands, Tahiti, the Samoan Islands and New Zealand. He sailed on a voyage with a tyrant chief, openly chastised a Hawaiian minister named Dr. Hyde for berating a clergyman who ran a leprosy colony. In short, Stevenson's adventures in the South Pacific offered inspiring characters and settings for his later, best regarded work.
Though Stevenson was popular, he was condemned during the rise of modern literature and World War One by writers like Virginia Woolf. Considered a second class writer, on par with children's literature and horror genres writers, he was excluded from literature taught in schools. Later, he regained respect and literary acclaim by the likes of Joseph Conrad, whom Stevenson influenced with his South Seas fiction.
A little known fact about Stevenson was his accomplishment as a musical composer. He wrote over 123 original musical compositions for the instruments he played: flageolet, flute, clarinet, violin, guitar, mandolin, and piano. His musical scores included his poetry arranged as melodies, and in 1968 his composition for chamber orchestra was arranged by Robert Hughes and toured throughout the Pacific Northwest.
A Lodging for the Night (1877), was Stevenson's first published fiction, when he was 27. Treasure Island (1883), his first major success, was a tale of piracy and buried treasure, set on the seas Stevenson knew and loved. Kidnapped (1886), an historical novel set in 18th century Scotland, depicted the "Appin Murder." Also in 1886, Stevenson published Strange Case of Dr. Jekyll and Mr. Hyde, a dual personality novella that spawned movies and similar themed work exploring the subconscious mind. One of the finest examples of Gothic Literature | <urn:uuid:57d167b4-e557-4a23-a5c8-a6bec6eebdd3> | CC-MAIN-2020-29 | https://americanliterature.com/author/robert-louis-stevenson | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655895944.36/warc/CC-MAIN-20200707204918-20200707234918-00444.warc.gz | en | 0.980201 | 508 | 3.265625 | 3 |
Longer, hotter summers, more heat waves, more floods, water supply stresses, worsening air quality, more crop damage, an uptick in asthma and respiratory ills — this is a taste of what Hampton Roads and the rest of the Southeast can expect as the region bears the brunt of rapid climate change, according to a new report.
And, the report states, all those impacts are in addition to a big hike in sea level and more intense hurricanes that climate scientists have warned for years could devastate the mid-Atlantic.
"I think people should be really concerned, especially in the coastal areas," climate expert Chip Konrad said in a recent phone interview.
Konrad is a principal author of "Climate of the Southeast United States: Variability, Change, Impacts and Vulnerability," a 358-page report that compiles existing research and climate models — a collaboration among three Regional Integrated Sciences and Assessment centers funded by the National Oceanic and Atmospheric Administration. He is also director of the Southeast Regional Climate Center and an associate professor at the University of North Carolina at Chapel Hill.
Among the report's projections:
• A hike in sea level by 1 to 5 feet by the end of the century, with increased coastal flooding and tidal surges;
• Average annual temperatures warming by as much as 9 degrees fahrenheit through the rest of the century;
• Fewer cold days, with the freeze-free season extended by as much as a month by mid-century;
• More days with temperatures exceeding 95 degrees, and a doubling or tripling in the number of heat waves;
• More crop damage from heat stress and drought; and
• Declining air quality, and an increase in pollen counts.
"The basic finding," said climate expert Keith Ingram "is that climate variability is already affecting the Southeastern U.S. and a changing climate is projected to increasingly affect the region in the next 20 years and beyond."
Ingram is director of the Southeast Climate Consortium with the department of agricultural and biological engineering at the University of Florida.
Sign up for a free TidewaterBiz news email here.
Scientists have increasingly sounded alarms over the various impacts of climate change for years. While a changing climate is part of the planet's normal cycle, many scientists today believe the rapid escalation of that change — in particular warmer temperatures and rising seas — is largely due to dumping carbon dioxide into the atmosphere from burning fossil fuels. They are trying to get a handle on what changes to expect from one region to the next.
"When we look at these general circulation models, we see a different range of scenarios," Konrad said.
The interior of the region is expected to warm the most, for instance, while the report says coastal temperatures could be moderated by factors such as sea winds.
And not all changes associated with climate change are necessarily bad, Konrad said. But they could come with trade-offs.
Residents might welcome fewer snow and ice events, for instance, but there are many crops that need a certain amount of chilling hours in winter. And lower heating bills could be offset by an increase in air-conditioning costs.
Areas that get more precipitation can also expect more flooding, which would impact water quality and wetlands.
Konrad said air quality would suffer with higher temperatures and more sunny days, which control the amount of ozone in the atmosphere. General circulation models project more days with a stagnant atmosphere, so pollutants can build up in populated areas with no ventilation to disperse it.
The report didn't specifically address the impact on wildlife, but a report earlier in the year from the National Wildlife Federation noted that climate change is "the single biggest threat to wildlife in this century."
According to "Wildlife in a Warming World: Confronting the Climate Crisis," the biggest economic hit in Virginia could be on its $50 billion agriculture industry, which is not only heavily dependent on weather but on pollinators — e.g., butterflies and bees — that are highly sensitive to changes in climate.
Temperature increases are already having an impact, the NWF report said, from the Shenandoah salamander and brook trout in higher elevations to shellfish in the Chesapeake Bay.
Konrad said their report is geared toward many audiences, from residents to industry to policymakers.
"So they can be more on the radar, and can be adapting and thinking about the future," Konrad said. "I think there's something in there for everybody."
Dietrich can be reached by phone at 757-247-7892. | <urn:uuid:bc959125-03ac-4b08-b6a0-92f1d852f38d> | CC-MAIN-2015-27 | http://articles.dailypress.com/2013-11-25/news/dp-nws-climate-stress-southeast-20131125_1_climate-change-climate-scientists-climate-variability | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375097204.8/warc/CC-MAIN-20150627031817-00157-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.954971 | 936 | 3.171875 | 3 |
Podcast: Play in new window
BOB HIRSHON (host):
Relics from Earth’s birth. I’m Bob Hirshon and this is Science Update.
Scientists have discovered material in rock deposits that’s nearly unchanged since the formation of our planet, four-and-a-half billion years ago. In the journal Science, University of Quebec geochemist Hanika Rizo says that their mere existence is re-writing the book on Earth’s distant past.
HANIKA RIZO (University of Quebec at Montreal, formerly at the Carnegie Institution for Science):
It is difficult to understand knowing that very early we had this giant impact that formed the moon, and this giant impact we thought for a very long time should have erased everything that was formed before in the Earth.
Now they realize that that moon-forming collision must have been with a much smaller object. The chemical composition of the rock also reveals evidence that the early Earth was rocked by between five and fifteen other collisions that helped shape the core we see today. I’m Bob Hirshon, for AAAS, the science society. | <urn:uuid:2f90ed3b-5478-4c6a-b4d8-7bf913f18179> | CC-MAIN-2023-14 | https://www.scienceupdate.com/2016/05/rock/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949958.54/warc/CC-MAIN-20230401094611-20230401124611-00374.warc.gz | en | 0.958323 | 246 | 3.234375 | 3 |
John Henry real?
As a freed slave following the Civil War, Henry became an icon because of his strength and determination. His strong work ethic was not only an example to African-Americans, but also to every workingman.
Henry was among the thousands of "steel-drivin' men" who built the railroads. They used large hammers and steel stakes to pound holes into rock. The holes were filled with explosives that would blast through rough terrain and mountainsides to make way for new railroad tracks. The work was hard and slow.
When the first steam drills were introduced to railroad work, the role of the steel-drivin' men was challenged. "People were fixated with the drill," says Scott Nelson, a history professor at the College of William and Mary in Williamsburg, Va. "In the South, mountains stood in the way of railroads and prevented access to the West. But when the steam drill was introduced, its newness was gripping and interesting."
But the drill would be used to replace the men who had been doing the job. Companies felt that the drill would be faster and cheaper. When the railroad company Henry worked for proposed using the steam drill to replace the steel-drivin' men, Henry challenged the drill. He was sure he could beat it. And he did.
Although Henry has been claimed by several states, some historians think he may have competed against the drill at the Great Bend Tunnel in Talcott, W.Va., in 1872. John "Bill" Dillon, a historian who lives in Talcott, says the purpose of the competition was to see who could get through the mountain the fastest.
"The drill drove one nine-foot hole, but John Henry drove two seven-foot holes," he says. "Well, [compare] 14 feet to nine feet, and you know who was faster."
According to the tale, Henry died with a hammer in his hand moments after winning the contest. It's an image that was turned into a number offolk songs in the years that followed the event.
The popularity of Henry's folklore grew in the 1900s. To date, there are more than 400 recordings of the John Henry story, making it one of the most popular American folk songs. Mr. Nelson has more than 80 versions on his MP3 player. One of his favorite versions is by Leadbelly, an influential blues singer and guitarist during the 1930s and '40s.
But other recording artists - such as Woody Guthrie, Johnny Cash, and Burl Ives - have also recorded a version of the John Henry story.
Nelson says that the popularity of the songs grew at public schools during the 1950s and '60s. "It's easy to sing," he says, "and 'John Henry' was a perfect song for teaching music in the classroom."
The message of the John Henry story is that people can accomplish anything they set their mind to. That's why his story has been retold in dozens of movies and books. There's even a John Henry museum and a July festival, "John Henry Days," in Hinton, W.Va., near Mr. Dillon's hometown.
So, is the story of John Henry true? Nelson and Dillon believe parts of it are.
"Was he born with a hammer in his hand?" Dillon says. "No. But I believe he beat that drill. And I believe he died after he won. I stick with those facts."
Nelson's book, "Steel-Drivin' Man: John Henry and the Untold Story of an American Legend," will be published this fall. He thinks that the John Henry story can continue to inspire people today.
Tall tales are larger than life
Do you think you could rope a tornado or jump over a mountaintop in a single leap? You could if you were a character in a tall tale. Tall tales are stories in which the characters and their actions and adventures are exaggerated and entertaining.
Many American tall tales grew out of specific regions of the country. Pecos Bill and his rattlesnake whip, for example, were to cowboys in the West what Paul Bunyan and his giant blue ox were to lumberjacks in the Midwest. And in the South, John Henry was the quintessential "workingman's man" on the railroad.
"Tall tales make the impossible possible," says Scott Nelson. "They represent the Superman character that defines the best a man can do. They're the Marvel Comics' characters of today - like Captain America or Spiderman."
Indeed, tall tales have been a popular form of entertainment for hundreds of years, and they may change a little each time they're told.
comments powered by Disqus
- Recalling a Film From the Liberation of the Camps
- Skull Fossil Offers New Clues on Human Journey From Africa
- Are crude conspiracies right? Research shows nations really do go to war over oil
- Famed SC civil rights protesters have convictions erased
- A Fight About Taxing The Wealthy, A Century Before President Obama
- Claire Strom to Step Down as Editor of Agricultural History
- Joan Peters’s legacy assessed by one of her fiercest critics, Norman Finkelstein
- West Point historian says if his cadets can understand the history of war, so can Congress
- Australian historian Alan Atkinson wins $100,000 literary prize
- From his perch in Saudi Arabia, Princeton’s Mark Cohen says Jews and Muslims should remember they used to get along | <urn:uuid:70b92ce5-e67a-4b4f-b446-cf198d6da369> | CC-MAIN-2015-06 | http://historynewsnetwork.org/article/22314 | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115927113.72/warc/CC-MAIN-20150124161207-00126-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.982839 | 1,142 | 3.578125 | 4 |
Preeclampsia leads to increased risk of morbidity and mortality for both mother and fetus. Most previous studies have largely neglected mechanical compression of the left renal vein by the gravid uterus as a potential mechanism. In this study, we first used a murine model to investigate the pathophysiology of left renal vein constriction. The results indicate that prolonged renal vein stenosis after 14 days can cause renal necrosis and an increase in blood pressure (BP) of roughly 30 mmHg. The second part of this study aimed to automate a diagnostic tool, known as the supine pressor test (SPT), to enable pregnant women to assess their preeclampsia development risk. A positive SPT has been previously defined as an increase of at least 20 mmHg in diastolic BP when switching between left lateral recumbent and supine positions. The results from this study established a baseline BP increase between the two body positions in nonpregnant women and demonstrated the feasibility of an autonomous SPT in pregnant women. Our results demonstrate that there is a baseline increase in BP of roughly 10–14 mmHg and that pregnant women can autonomously perform the SPT. Overall, this work in both rodents and humans suggests that (1) stenosis of the left renal vein in mice leads to elevation in BP and acute renal failure, (2) nonpregnant women experience a baseline increase in BP when they shift from left lateral recumbent to supine position, and (3) the SPT can be automated and used autonomously.
Preeclampsia, a condition associated with hypertension during pregnancy, affects between 5 and 8% of pregnant women worldwide and leads to upward of 70,000 deaths from related complications [1–3]. This condition typically presents after 20 weeks gestation and can cause multi-organ failure in the expecting mother, leading to premature birth and thereby increasing risk of morbidity and mortality to both the fetus and the expecting mother . Preeclampsia is diagnosed by (1) the presence of a systolic blood pressure (BP) greater than or equal to 140 mmHg or diastolic BP greater than or equal to 90 mmHg and (2) another symptom such as thrombocytopenia, renal insufficiency, or proteinuria . This condition is also more likely to occur in subsequent pregnancies if a woman had preterm preeclampsia in a previous pregnancy [4,5].
Although maternal vascular endothelial factors, proinflammatory cytokines, and abnormal trophoblast invasion in the placenta are all thought to contribute to preeclampsia formation [3,6], another possible mechanism contributing to the development of preeclampsia is the compression of the left renal vein by the gravid uterus . This mechanical compression leads to left renal venous outflow obstruction and acute activation of the renin-angiotensin-aldosterone system followed by chronic ischemia-mediated hypertension . The release of pro-inflammatory cytokines associated with renal ischemia may contribute to the multiorgan system dysfunction . The venous outflow obstruction from compression of the left renal vein can cause increased intraparenchymal renal pressure, which can then cause persistent arterial hypertension as described in the 1930s by Irvine Page in a phenomenon known as Page kidney . The left renal vein is of particular interest because studies have shown that this vessel is dilated in women with preeclampsia and that it is especially vulnerable to compression by the gravid uterus where it crosses the aorta [8,9]. Additionally, this vein is subject to anatomic variability between patients . Connections from the left renal vein to other branches can vary [10,11], and flow through collateral veins can be beneficial under certain hemodynamic circumstances . However, these connections are not adequate in all women , and blood pressure elevation in pregnant patients may be due to the acute renal venous outflow obstruction in women with inadequate ipsilateral collateral veins. This outflow obstruction can cause increased intrarenal pressure that may lead to acute changes in vasoactive compounds. Animal models can be useful to study varying degrees of left renal vein constriction as it is difficult to fully examine the effects of venous constriction in humans. Recent preeclampsia mouse models, however, focus on placental ischemia and neglect renal vein compression issues .
In order to predict preeclampsia before it develops, a method known as the supine pressor test (SPT), or roll-over test, was developed by N.F. Gant in the 1970s. This test was shown to predict a pregnant women's risk of developing preeclampsia with a 93% positive predictive value . A positive SPT is defined as an increase in diastolic BP of at least 20 mmHg when shifting from the left lateral recumbent position to the supine position. However, the specificity of the SPT was variable, possibly due to the inconsistent methodology between clinics. Key variables of the methodology include arm position and duration of time spent in supine position. The SPT also fell out of favor due to its poor sensitivity, likely due to its performance between 28 and 32 weeks gestation, which is a timeframe that does not accommodate the variable venous anatomy that pregnant women exhibit .
In this study, we aimed to begin automating the SPT in order to improve execution with the ultimate goal of optimizing specificity and providing a tool that would allow serial assessments in the second half of pregnancy. This tool could potentially direct pregnant women identified as being at risk for developing preeclampsia to seek further clinical care. Patients could also work to rest in a therapeutic position (i.e., on their side) in order to mitigate some of the effects of renal vein compression and potentially prevent preeclampsia from developing. A fully automated SPT could include a wearable BP cuff with a position sensor that could guide users to position themselves correctly. While physicians promote regular check-ups for pregnant women ranging from monthly to weekly depending on gestational age, medicine in rural areas both domestically and globally is often limited by resources that prevent access to quality care. As such, this type of cost-effective, robust, and straightforward diagnostic tool could be useful for pregnant women to track their risk for developing preeclampsia, both in resource-limited areas and developed regions. The purpose of this study was (1) to further elucidate potential mechanisms of preeclampsia by investigating the effects of renal vein stenosis in a murine model of Page kidney and (2) to determine the feasibility and utility of an automated tool with a simplified procedure that allows pregnant women to accurately conduct a SPT. The results suggest an autonomous SPT may have utility for this population without the need for expensive equipment or frequent clinical visits.
2.1 Animal Study
2.1.1 Surgical Procedure.
Female C57BL/6J mice were used for this 2-week study and were divided between two groups (Jackson Laboratory, Bar Harbor, ME). The first group was subject to a partial left renal vein stenosis to mimic aspects of Page kidney (n = 6), while the second group underwent a sham surgery (n = 7). Briefly, all mice were anesthetized using 3% isoflurane delivered in 0.5 L/min medical grade air before they were switched to 1.5–2% isoflurane throughout the surgery. The abdominal cavity was exposed via laparotomy, and the left kidney and renal vein were isolated. In the stenosed group, a 30-gauge needle was aligned parallel to the left renal vein and a silk 6-0 suture was tied around both the needle and the vein as done previously . The needle was then removed to create a stenosis. In the control group, a sham procedure was performed where the suture was loosely tied around the renal vein without constriction (Fig. 1). Buprenorphine (0.03 mg/mL) was administered before the first incision to minimize pain and discomfort. Antibiotic ointment was applied after the surgery (Neosporin, Johnson & Johnson, Skillman, NJ). All procedures were approved by the Purdue Animal Care and Use Committee.
All mice were imaged using high-frequency ultrasound imaging (Vevo3100 Imaging System, FUJIFILM VisualSonics, Inc., Toronto, ON, Canada) with a 32–55 MHz range 256-element array transducer (MX550D, 40 MHz center-frequency). Imaging was performed the day before their surgeries as well as on postsurgical days 3, 11, and 14. Animals anesthetized with isoflurane were imaged in the supine position on a heated stage after a depilatory cream was applied to remove abdominal hair (Nair, Church & Dwight Co., Inc. Ewing, NJ). Long-axis images of the left renal vein were collected using two-dimensional B-mode as well as color Doppler (Supplementary Fig. 2 which is available in the Supplemental Materials on the ASME Digital Collection) and pulsed wave (PW) Doppler along the vein. PW Doppler images were analyzed for all animals at baseline and postsurgical day 14 to identify changes in flow and velocity. The PW Doppler images were analyzed using both the vevolab software (FUJIFILM VisualSonics) and a custom matlab code for determining blood flow velocity waveforms.
2.1.3 Blood Pressure.
A noninvasive tail cuff system (Supplementary Fig. 1 which is available in the Supplemental Materials on the ASME Digital Collection) was used to acquire blood pressures of conscious mice at baseline and postsurgical days 3, 11, and 14 (2 Channel CODA System, Kent Scientific Corp., Torrington, CT). Between 20 and 40 BP readings per mouse were collected during each time point. Readings were plotted to identify regions of stable measurements after mice became comfortable in the restraining tubes.
2.1.4 Euthanasia and Dissection.
Animals were euthanized via isoflurane overdose inhalation, and the kidneys were removed on day 14 of the study. Isoflurane overdose was followed by cardiac puncture to collect blood. Then both the left and right kidneys were removed and placed in 1× phosphate-buffered saline for up to 72 h before being transferred to 4% paraformaldehyde for all animals.
Tissues were processed for standard histology. Paraffin-embedded coronal sections of each kidney were analyzed using hematoxylin and eosin (H&E) staining, with focus on glomerular structure. Images were acquired at 40× magnification and analyzed by a veterinary pathologist certified by the American College of Veterinary Pathologists.
2.2 Nonpregnant Human Pilot Study
2.2.1 Screening Subjects.
A nonpregnant cohort (n = 50) was recruited to help refine the functionality of the automated SPT in terms of measurement stability and comfort prior to testing in pregnant women. Nonpregnant women were asked to participate in this study to establish a baseline increase in blood pressure when shifting from the left lateral recumbent position to the supine position (Figs. 2(a) and 2(b)) and to determine how long it takes for BP readings to stabilize after a period of light exercise. Subjects were provided a questionnaire to screen for exclusion criteria including previous cardiovascular (CV) conditions such as hypertension or history of sudden cardiac death in immediate family members (Supplementary Table 5 which is available in the Supplemental Materials on the ASME Digital Collection). Total measurement duration per participant was roughly 30–40 min. All study procedures were approved by the Purdue University Institutional Review Board.
Blood pressure measurements were acquired using a noninvasive ambulatory BP cuff (OnTrak 90227 Ambulatory BP Monitor, SpaceLabs, Seattle, WA). Subjects were given a set of one-page instructions, which detailed the study procedure and how to use the automated cuff. The study was divided into two phases. The first phase included 20 subjects and was used to verify the validity of the procedure itself by gathering survey feedback and identifying issues (Supplementary Table 6 which is available in the Supplemental Materials on the ASME Digital Collection). This phase of the study asked subjects to first take three BP measurements while seated with their legs uncrossed and their back supported to establish a baseline BP . Subjects then performed light exercise by walking up and down three flights of stairs before immediately lying down in the left lateral recumbent position (Fig. 2(a)). Five serial BP measurements were taken in this position before the subject rotated to the supine position (Fig. 2(b)) where five more BP measurements were acquired by the cuff. Each measurement was acquired in roughly 90 s, with at least 30 s of reperfusion time between measurements. Once the study procedure was complete, subjects were asked to complete a short, anonymous survey with questions about their experience (Supplementary Table 6, which is available in the Supplemental Materials on the ASME Digital Collection). Based on the data from the first 20 subjects, phase two of the study was slightly modified to control for the effects of arm positioning and to assess body position angle in the left lateral recumbent position. In addition to the steps in the first phase, the participants were asked to take additional serial BP measurements in the left lateral recumbent position with varying arm positions. For the first five measurements, subjects rested their right arm across their chest (Fig. 2(c)). Subjects then placed their right arm on their right side for the last five measurements (Fig. 2(a)). Body angle measurements (Fig. 2(d)) were also acquired five times in the left lateral recumbent position concurrent with BP measurements by placing a smartphone against the subject's abdomen and using a mobile application to acquire position information (SomnoPose, Proximal Box Software, Eagan, MN). Subjects were also asked to complete a survey with Likert scale-type questions and short free response questions evaluating their experience (Supplementary Table 6 which is available in the Supplemental Materials on the ASME Digital Collection).
2.3 Pregnant Women Study
2.3.1 Screening Subjects.
Pregnant volunteers (n = 25) at or past 20 weeks gestation were recruited from the antenatal clinic at Indiana University (IU) Health University Hospital in Indianapolis, IN. Prior to starting study procedures, all subjects were asked to self-report previous history of chronic hypertension and chronic kidney disease as these were exclusion criteria (Supplementary Table 7, which is available in the Supplemental Materials on the ASME Digital Collection). Study procedures were performed after subjects met eligibility criteria and once their verbal consent was obtained. All procedures were approved by the governing Institutional Review Board.
Pregnant women were provided a booklet of printed instructions that was created based on feedback from the initial nonpregnant women study (Supplementary Fig. 3, which is available in the Supplemental Materials on the ASME Digital Collection). These women were also provided with an automated ambulatory BP cuff (OnTrak 90227, SpaceLabs) and were asked to follow the directions to perform the SPT autonomously using the instructions to the best of their abilities. Research team members recorded data and clarified questions about the procedure as needed. The procedure was similar to the one conducted with nonpregnant women but excluded the exercise component. BP measurements were acquired three times in a seated position, five times in a left lateral recumbent position (Fig. 2(a)), and five times in a supine position (Fig. 2(b)). In the left lateral recumbent orientation, women placed their right arms along the side of their bodies as depicted in Fig. 2(a). Body angle measurements were also obtained in the same manner as in the nonpregnant women study (Fig. 2(d)). While the procedure requested that these women lie in the supine position with their legs extended, many of the study participants laid in this position with their knees bent and feet planted as they felt more comfortable this way. After the study, participants were asked to complete a survey about their experience (Supplementary Table 8, which is available in the Supplemental Materials on the ASME Digital Collection).
For the animal study, significant differences among time points and groups were determined using a one-way repeated measure ANOVA with Tukey or Dunnett's post hoc tests (Minitab v18, State College, PA; GraphPad Prism v8, San Diego, CA). For the PW Doppler data, the number of samples in each group varied since it was not always possible to detect flow due to image artifacts. Thus, a mixed-model analysis was used to analyze differences instead of an ANOVA. For both human studies, subjects' BP measurements were averaged for both body positions and compared between positions. A one-way ANOVA with Tukey's post hoc analysis and two-sample t-tests were both used to determine differences between groups. Statistical significance for all comparisons was considered at p < 0.05. For both animal and human data, assumptions of normality and homogeneity of variance were tested using Bartlett's test and Ryan-Joiner test. Groups were homogenous (p > 0.05), and all but one group followed a normal distribution (systolic blood pressures of pregnant women taken in the supine position).
3.1 Animal Study
3.1.1 Blood Pressure Increases After Renal Vein Stenosis.
All female mice in this study were between 8 and 15 weeks of age to ensure sexual maturity and weighed 21.6 ± 2.1 g. An average stenosis of 53 ± 26% was created after the 30-gauge needle was removed as measured from long-axis, B-mode ultrasound images. Day 14 systolic BPs for the stenosed group were significantly different from baseline BP measurements (p < 0.05). At the end of the study, the average BPs of all animals in the stenosed group increased by 33.3 ± 25.0 mmHg for systolic BP and by 32.7 ± 26.9 mmHg for diastolic BP (Fig. 3(b)). For the control group, BPs fluctuated and were within 20 mmHg of the baseline measurements for both day 14 systolic and diastolic BP (Fig. 3(b)).
3.1.2 Peak Renal Vein Blood Velocity Increases After Stenosis.
Both peak and mean velocities of the left renal vein measured near the inferior vena cava were lower at day 14 compared to baseline measurements in mice with the stenosis. These velocities measured at the same region in mice from the sham group showed an increasing trend over two weeks.
3.1.3 Renal Vein Stenosis Leads to Renal Necrosis.
The left kidney of the experimental group was necrotic (Fig. 3(a)) compared to the right kidney in the same group as well as to both kidneys in the sham group. Renal necrosis was characterized by increased cellular eosinophilia as well as pyknotic or absent nuclei of renal tubular epithelial cells, glomeruli, and interstitial vessels. More specifically, capillary lumina of affected glomeruli were obscured by swollen endothelial cells and lacked erythrocytes (Fig. 4). Proteinaceous material was often present in the Bowman's space in affected glomeruli suggesting dysfunctional glomerular filtration. Interstitial hemorrhage and thrombosis of a few medium-sized arteries were also apparent in some specimens. The right kidneys in the experimental group and both kidneys in the sham group had typical healthy glomeruli (Fig. 4).
3.2 Nonpregnant Human Pilot Study
3.2.1 Blood Pressure Increased When Subjects Shifted From Left Lateral to Supine Position.
The mean age of the 50 participants in this study was 22.8 ± 3.8 years. Most participants were in the healthy body mass index (BMI) range of 18.5–24.9 kg/m2 (68%; 22.32 ± 3.41 kg/m2). Blood pressure measurements stabilized after roughly 5 min, which corresponded to two BP readings (Fig. 5(a)). As such, the first two measurements taken in the left lateral recumbent position were excluded from the average measurement (Fig. 6(a)) in order to account for only stable postexercise measurements. In nonpregnant women, BPs increased by an average of 10.6 ± 5.7 mmHg and by 10.4 ± 6.0 mmHg for systolic and diastolic BPs, respectively, when shifting from left lateral recumbent to supine position (Fig. 6(a)). BPs increased significantly when shifting between left lateral recumbent and supine positions (p < 0.001). Nonpregnant women naturally rested at an average angle of 78.5 ± 9.0 deg in the left lateral recumbent position (Fig. 2(d)).
3.2.2 User Feedback Suggests General Ease of Use.
Subjects were asked to complete a survey at the conclusion of the study assessing factors such as their comfort and user-friendliness of the instructions and device. Most of the subjects agreed that the instructions they were given were easy to follow (64%), while 32% disagreed. Regarding comfort during the actual procedure, 66% of subjects indicated that it was comfortable for them to acquire BP measurements on their left side, and 60% of subjects said the same for acquiring BPs on their backs (Supplementary Table 1 which is available in the Supplemental Materials on the ASME Digital Collection).
3.3 Pregnant Women Study
3.3.1 Blood Pressure Increases Between Left Lateral and Supine Positions in Pregnant Women.
The mean age of the women in this portion of the study was 31.5 ± 4.7 years. The mean gestational age was 29.7 ± 6.6 weeks with 2.4 ± 2.3 gravidity and 1.2 ± 2.1 parity. When averaging all five measurements taken in both body positions, pregnant subjects experienced an average increase of 14.0 ± 4.0 mmHg in systolic BP and 12.5 ± 4.8 mmHg in diastolic BP while shifting from left lateral recumbent position to supine position (Fig. 6(b)). In the left lateral recumbent position, women naturally rested at an angle of 72.6 ± 6.3 deg measured from the bed to their back. The change in systolic and diastolic BPs between positions was 3.4 mmHg and 2.1 mmHg greater, respectively, in pregnant women than in nonpregnant women, but only the systolic BP increase between positions was significantly different between pregnant and nonpregnant women (p < 0.05).
3.3.2 Lateral Position Is More Comfortable Than Supine.
Almost all 25 pregnant women (88%) agreed that the instructions were easy to follow. Additionally, most subjects (92%) agreed that the BP device was comfortable for them to wear throughout the procedure. Pregnant women in the study generally agreed that it was comfortable to take BP on their left side (96%), while only 52% of these women agreed that it was comfortable for them to take BP measurements on their back (Supplementary Table 2 which is available in the Supplemental Materials on the ASME Digital Collection). These women were also asked in which position they tended to sleep and rest, and all women responded that they sleep on their side.
4 Discussion and Conclusions
Overall, these data suggest that an autonomous SPT is feasible for pregnant women at risk for preeclampsia. The results of our nonpregnant and pregnant women studies both suggest that the autonomous SPT procedure will be feasible for pregnant women to perform throughout their pregnancy, either autonomously or with minimal assistance. The results also suggest that a baseline increase in BP between positions in nonpregnant women will need to be considered in further development of an automated version of the SPT. From the animal study, severe stenosis of the left renal vein for a period of two weeks led to severe damage to the left kidney as well as to increased BP. Studying the effect of varying degrees of renal vein constriction on intrarenal pressure and vasoactive compounds is warranted.
Blood pressures in animals increased overall in both groups but to varying degrees. Given that Poiseuille's law approximates that pressure difference in flow through a pipe is related to radius to the fourth power, then we can expect that venous outflow obstruction could have a substantial effect on intrarenal pressure. In other words, a small reduction in diameter can have a large effect on pressure as well as on the health and viability of upstream tissue. In a previous rodent study, the left renal vein was ligated leading to increased flow through collateral vessels; mortality, though, increased when important collateral vessels were not preserved . The overall BP change in the stenosed group was about 10 mmHg higher in both systolic and diastolic BP than in sham controls. Hypertension is expected as a result of Page kidney, which previous work has linked to preeclampsia [1,18]. The slight increase in the sham group by day 14 may be due to general stress from the procedure or from typical variation in tail-cuff BP measurements. Although the tail-cuff system used to obtain murine BP measurements can produce noisy data, previous validation studies comparing tail-cuff measurements to radio telemetry suggest that general trends in data are reliable and accurate . Variations in BP among animals in the same procedural group may also have been due to the degree of stenosis they experienced. Even though the same size of needle was used when creating each stenosis, there was variation in baseline vessel diameter among animals, likely due to the differences in ages and body mass. Still, there was no strong correlation found when age was plotted against percent stenosis. While factors such as age and percent stenosis could be considered in future iterations of this model, mice in the stenosed group did indeed experience necrotic tubules. Tubular injuries are in line with results seen in similar renal obstruction procedures [20,21] and in cases of Page kidney . The mice in this study also exhibited other physiologic and histologic changes that result from renal congestion and are also similar to those of Page kidney. Animals in the stenosed group experienced increased eosinophilia, which has also been reported in cases of Page kidney . Additionally, renal obstruction leads to decreased perfusion to blood vessels in the kidney . This decrease may explain the observed necrosis, but clinically, renal injury is more common than renal necrosis. Overall, these murine data suggest that animals with severe renal vein stenosis sustain substantial kidney injury and develop hypertension.
In the human pilot study, subjects shifting from the left lateral recumbent position to the supine position experienced an increase in BP similar to previous studies [23,24], albeit to different degrees likely based on cuff position relative to the heart. We controlled for this factor in the clinical study with pregnant women based on literature and the results from phase two of this pilot study, which demonstrated that, although not statistically significant, arm position can vary the BP in the left lateral recumbent position (Fig. 6(c)). Moreover, the difference in BP taken between the lateral recumbent and supine positions was at least 10 mmHg for both systolic and diastolic BP in both pregnant and nonpregnant women. This change is important because the difference between stages 1 and 2 hypertension is only 10 mmHg . While clinical BP measurements are typically acquired in a seated position, our data suggest that it may be worthwhile to consider body position as a variable when acquiring BP, especially when diagnosing hypertension. American Heart Association (AHA) guidelines indicate that home-based ambulatory BP monitoring can be used to acquire accurate BP measurements outside of the clinic , but our data indicate that it may also be useful to ensure consistent body positioning when acquiring measurements. We also assessed the amount of time it took BP to stabilize after light exercise. BP stabilized after roughly 5 min in most subjects. This is notable because a fully automated SPT will need to incorporate a signal detection feature to ensure that stable BP measurements are being collected in the lateral recumbent position prior to shifting into the supine position in order to optimize test sensitivity.
Another factor to consider with automating the SPT is whether an increase in diastolic BP is still the best metric to use to determine a positive SPT. The initial work that led to the development of the SPT in the 1970s focused on diastolic BP as it was considered the best predictor of CV health , perhaps due to decreased effects of pressure distortion in this phase . However, since the development of the SPT, more recent studies have shown that systolic BP may actually be a better predictor of CV status than diastolic BP . Additionally, because each subject experienced different degrees of change when shifting between positions, the positive SPT criteria could potentially be adjusted based on baseline increase data for better prediction value. Further longitudinal studies will be needed to explore these possibilities and optimize diagnosis criteria.
The pregnant subjects in this study were asked to follow a set of instructions with both text and visual aids provided to them. The research team clarified questions and helped as needed, but for the most part, the pregnant women were able to follow directions autonomously, indicating that they would be able to perform the SPT without the help of a clinician. Differences in BP between positions for pregnant women were increased as compared to differences in nonpregnant women, which could indicate that the gravid uterus does have some effect on BP in supine position as demonstrated in Ref. . In this portion of the study, most women naturally laid their arm across their side when they were in the left lateral recumbent position as depicted in Fig. 2(a). When they did not naturally lie in this position, we asked them to adjust to it in order to keep cuff position consistent. Some women needed assistance sitting up from the supine position after they were done with the procedure, especially if they were past 30 weeks' gestation. As such, pregnant women in their third trimester may need additional assistance in order to perform this procedure. It is also important to note that disturbed venous flow has been implicated with kidney and liver failure in patients with preeclampsia, as well as with dysfunction in venous return when pregnant patients are supine [9,29]. The position in which pregnant women rest has been studied since this can influence venous blood flow. Previous work noted that patients resting in the supine position experienced an elevation of renal pressure in their lower limbs but that this elevation was reduced when the patients were on their side .
Other studies have also asked pregnant women to acquire their own BPs by following a set of instructions. A previous study screened for preeclampsia in the first trimester of pregnancy by having patients record their own BPs at stations (not ambulatory cuffs) and compare these measurements to ones acquired by clinicians . The results helped lead to the current understanding that ambulatory BP monitoring should be considered the reference standard, as per updated 2019 American Heart Association guidelines . These ambulatory BP devices take measurements based on an automated approach that is thought to reduce the white coat effect and human errors associated with the traditional in-office BP acquisition methods requiring sphygmomanometers . This previous work, combined with the results of this study, suggests that home-based BP monitoring for pregnant populations could be beneficial to overall maternal health.
A workflow diagramming how the automated supine pressor test could work is presented in Supplementary Fig. 4, which is available in the Supplemental Materials on the ASME Digital Collection. This tool has the potential to allow pregnant women to conduct the SPT throughout their pregnancies with a home-monitoring strategy that eliminates the need for frequent clinic visits. The automated test will need to integrate an automatic blood pressure cuff and Bluetooth inertial measurement unit (IMU) position sensor through the interface of an application to guide the patient through the supine pressor test. A smartphone app can help guide patients through self-administering the supine pressor test using the wearable sensors, including an automated blood pressure cuff and a nine-axis IMU sensor capable of communicating angular and positional data throughout the duration of the SPT. These data could be transmitted to a secure, cloud-based server from which the app could both upload and retrieve information. The data from the IMU can be processed through an extended Kalman filter in real-time to provide greater accuracy in guiding the patient to a desired orientation . Throughout the duration of the SPT, the app can communicate to the patient whether or not she is in the correct position. If the patient happens to orient herself out of the specified range of acceptable values, the app sends out an alert that will help her return to the desired posture. Through this integrated system, women can guide themselves through the steps of a SPT without having a clinician present. This automated tool can also serve as more than just a diagnostic tool, especially since it has the potential to become a management device that helps ensure that pregnant women are resting in the lateral recumbent position when sleeping. Such a tool could mitigate the effects of left renal vein compression from the gravid uterus and help prevent renal outflow obstruction and resulting renal compartment syndrome.
Additional considerations include the end users of these devices and the locations where it would be most useful. Pregnant women in developed countries as well as in low- and middle- income countries could benefit from an automated SPT. In developed regions, if the SPT is employed early in the pregnancy, a positive test could allow for closer longitudinal surveillance of both mother and fetus. If positive, therapeutic resting positions (i.e., left lateral recumbent) could be recommended before proceeding to more aggressive clinical intervention. In lower resource settings, an automated SPT could serve as monitoring tool between clinical visits, which are not as frequent. This would be particularly beneficial in areas of Africa where up to 10% of pregnancies are affected by preeclampsia, compared to the global average of 2–8% . Sub-Saharan Africa and south Asia have especially high maternal mortality rates, with as many as 90% of global maternal deaths occurring in these areas . In some of these regions, pregnant women are only advised to see their physicians a few times throughout their pregnancies, and transportation expenses are often a barrier to receiving reliable healthcare. An automated SPT tool could be potentially useful in these areas to monitor preeclampsia progression without frequent travel to a clinic. Some regions of Kenya have community health-care workers who can be trained to help administer the automated SPT in rural areas where pregnant women do not have the resources to regularly get their BP checked throughout their pregnancy. There are, however, certain limitations to be considered before implementation. Currently, many automated systems are battery-operated, and these batteries need to be replaced frequently. People in resource-limited areas may not have access to a large supply of batteries or to reliable electrical outlets for charging. It is also important to consider that a positive SPT would indicate that preeclampsia may develop, but effective comprehensive treatments for this condition are still needed. Identifying high-risk pregnant women, though, may lead to increased surveillance and a better opportunity to develop preventative strategies. An educational campaign about safe sleeping practices during pregnancy, for example, may still be beneficial by encouraging pregnant women to sleep on their sides as the best resting position .
These studies are not without their limitations. First, the mouse model does not mimic all of the physiologic changes associated with preeclampsia in humans. Further efforts are needed to create animal models that better reproduce the human condition where renal changes could be investigated. Additionally, neither varying gestational ages nor longitudinal data were included during the pregnant human studies. Future work with a larger human study will be needed to follow subjects throughout pregnancy and to determine the efficacy of an automated SPT.
In conclusion, this study helps to lay the groundwork for an automated SPT that pregnant women could use for monitoring, early detection, and eventually, prediction of preeclampsia. Our studies indicated that women would largely be able to perform this test autonomously given descriptive visual instructions and that there is a significant baseline increase in BP when shifting from the left lateral recumbent position to the supine position of 10–15 mmHg. Additionally, we investigated the pathophysiology of left renal vein stenosis using an animal model, which confirms a relationship between renal vein obstruction and hypertension. The results demonstrated that stenosis in the vein can lead to kidney injury and increased BP. While further work will be needed to evaluate the efficacy of an automated SPT, our hope is to eventually develop and distribute a combined device and data system that can be implemented in a wide range of settings, eventually improving both maternal and fetal health worldwide.
SpaceLabs Healthcare Inc. provided the ambulatory BP cuffs and monitors for this study, but they were not involved in the data analysis or paper preparation. Both Gurneet Sangha and Kirk Foster also provided invaluable insights for this study. This publication was made possible in part, by support from a Bill and Melinda Gates Foundation Global Grand Challenges Grant (OPP1182739; Funder ID: 10.13039/100000865), the Purdue Women's Global Health Institute, and the Indiana Clinical and Translational Sciences Institute (Funder ID: 10.13039/100006975). The Indiana CTSI is funded in part by Award No. UL1TR002529 from the National Institutes of Health, National Center for Advancing Translational Sciences, Clinical and Translational Sciences Award. The content is solely the responsibility of the authors and does not necessarily represent the official views of the National Institutes of Health. | <urn:uuid:723a9c5e-6721-497d-b127-2aa3aa3188dd> | CC-MAIN-2023-06 | https://asmedigitalcollection.asme.org/medicaldiagnostics/article/2/4/041009/1065737/Toward-Automation-of-the-Supine-Pressor-Test-for | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00859.warc.gz | en | 0.956026 | 7,993 | 2.625 | 3 |
Information security practices are influenced by the geography of operations, the culture from that area, and the industry in general. The trust found within a community, as highlighted by Bruce Schneier in Liars & Outliers, allows the wheels of society to move forward. Said wheels also myopically continue as researched by Steven Pinker. To provide a bit of elaboration on these three points, let me elaborate briefly:
- Geography of Operations – This trust though is based on, in part, on proximity. Individuals are more trusting to those within the same community (however you define this works out to the same result).
- Culture from that area – “Trust non-kin is calibrated by the society we live in. If we live in a polite society where trust is generally returned, we’re at ease trusting first. If we live in a violent society…we don’t trust easily and require further evidence…” – Pg 37
- Industry – Familiarity also engenders trust within an industry, i.e, a doctor working with another doctor automatically introduces a level of confidence and trust in the communication and mutual activities.
Ultimately, Culture is King. It is the culture that defines an organization’s DNA and differentiates them in the market space. The experience one encounters with the Culture of a Google vs. Microsoft environment is palatable. One or the other is not right or wrong, but the Culture is different nonetheless. The challenge is that the Culture MUST change in a world where these principles are violated.
History and biology have proven that when an aggressive culture that doesn’t need to trust as it is the aggressor is introduced into a culture that doesn’t share that culture – the Aggressor always wins. This is highlighted across numerous examples of entire societies being destroyed / absorbed in Guns, Germs, and Steel. A biology example would be the Chinese fish that had invaded the ecosystem in the Great Lakes, and is destroying the current biology.
Ultimately, all systems are connected – regardless of the geography, culture, or industry. Therefore the concepts and methodologies of organizing go to market strategies; deployment of new technology, and simply sustaining competitive operations requires a reframing of the trust model. In essence, the culture of the organization where technology is introduced must be adapted to fit the more aggressive, violent, and hostile landscapes in the world.
Strategically speaking enterprises may operate locally, but must be governed with a global perspective. Such can and must include the geopolitical risks globally, the global value of the intellectual property, and be adaptive to the degrees of risk that is introduced at any given time.
Technologically the deployed systems must be considered and ensured that the trust equated into the system controls is configured aggressively. An example – the classic firewall rule strictness and ‘Deny All’ must prevail, yet in some cases I have seen this not to be true. Be mindful of the connectedness of these systems in the global community.
The impact of culture on an organization’s decision to survive competitively starts with trust – in the systems, the people, the process, and the market. | <urn:uuid:1eb2751c-ea4e-48c7-8f05-491b9384141b> | CC-MAIN-2019-35 | https://pcidss.wordpress.com/2012/12/31/cios-must-address-the-culture-of-trust-gap/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314353.10/warc/CC-MAIN-20190818231019-20190819013019-00207.warc.gz | en | 0.94094 | 648 | 2.546875 | 3 |
- Dementia Slideshow Pictures
- Take the ADHD Quiz
- Brain Foods Slideshow
- Patient Comments: Spinal Cord Injury - Causes
- Patient Comments: Spinal Cord Injury - Symptoms
- Find a local Doctor in your town
- Spinal Cord Injury Facts
- What is the spinal cord injury?
- What are the causes of spinal cord injury?
- What are the symptoms of spinal cord injury?
- How is a spinal cord injury diagnosed?
- How is a spinal cord injury treated?
- What is the outlook for patients with spinal cord injury?
- Is there a cure for spinal cord injury?
- Where can I get more information on spinal cord injury?
- NIH spinal cord injury: treatments and rehabilitation
- What Is a Spinal Cord Injury?
- How Does the Spinal Cord Work?
- What Happens When the Spinal Cord Is Injured?
- What Are the Immediate Treatments for Spinal Cord Injury?
- How Does a Spinal Cord Injury Affect the Rest of the Body?
- How Does Rehabilitation Help People Recover From Spinal Cord Injuries?
- How Is Research Helping Spinal Cord Injury Patients?
- The Future of Spinal Cord Research
NIH spinal cord injury: treatments and rehabilitation
A Short History of the Treatment of Spinal Cord Injury
Accounts of spinal cord injuries and their treatment date back to ancient times, even though there was little chance of recovery from such a devastating injury. The earliest is found in an Egyptian papyrus roll manuscript written in approximately 1700 B.C. that describes two spinal cord injuries involving fracture or dislocation of the neck vertebrae accompanied by paralysis.* The description of each was "an ailment not to be treated."
Centuries later in Greece, treatment for spinal cord injuries had changed little. According to the Greek physician Hippocrates (460-377 B.C.) there were no treatment options for spinal cord injuries that resulted in paralysis; unfortunately, those patients were destined to die. But Hippocrates did use rudimentary forms of traction to treat spinal fractures without paralysis. The Hippocratic Ladder was a device that required the patient to be bound, tied to the rungs upside-down, and shaken vigorously to reduce spinal curvature. Another invention, the Hippocratic Board, allowed the doctor to apply traction to the immobilized patient's back using either his hands and feet or a wheel and axle arrangement.
Hindu, Arab, and Chinese physicians also developed basic forms of traction to correct spinal deformities. These same principles of traction are still applied today.
In about 200 A.D., the Roman physician Galen introduced the concept of the central nervous system when he proposed that the spinal cord was an extension of the brain that carried sensation to the limbs and back. By the seventh century A.D., Paulus of Aegina was recommending surgery for spinal column fracture to remove the bone fragments that he was convinced caused paralysis.
In his influential anatomy textbook published in 1543, the Renaissance physician and teacher Vesalius described and illustrated the spinal cord in all its parts. The illustrations in his books, based on direct observation and dissection of the spine, gave physicians a way to understand the basic structure of the spine and spinal cord and what could happen when it was injured. The words we use today to identify segments of the spine - cervical, thoracic, lumbar, sacral, and coccygeal - come directly from Vesalius.
With the widespread use of antiseptics and sterilization in surgical procedures in the late nineteenth century, spinal surgery could finally be done with a much lower risk of infection. The use of X-rays, beginning in the 1920s, gave surgeons a way to precisely locate the injury and also made diagnosis and prediction of outcome more accurate. By the middle of the twentieth century, a standard method of treating spinal cord injuries was established - reposition the spine, fix it in place, and rehabilitate disabilities with exercise. In the 1990s, the discovery that the steroid drug methylprednisolone could reduce damage to nerve cells if given early enough after injury gave doctors an additional treatment option. | <urn:uuid:ca7acbe2-7ca1-402d-9723-75eb0eb022e9> | CC-MAIN-2017-26 | http://www.medicinenet.com/spinal_cord_injury_treatments_and_rehabilitation/page6.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128319575.19/warc/CC-MAIN-20170622135404-20170622155404-00144.warc.gz | en | 0.946188 | 858 | 3.015625 | 3 |
According to quantum mechanics, small magnetic objects called nanomagnets can exist in two distinct states (i.e. north pole up and north pole down). They can switch their state through a phenomenon called quantum tunneling.
When the nanomagnet switches its poles, the abrupt change in its magnetization can be observed with low-temperature magnetometry techniques used in del Barco’s lab. The switch is called quantum tunneling because it looks like a funnel cloud tunneling from one pole to another.
A new paper in Nature shows that two almost independent halves of a new magnetic molecule can tunnel, or switch poles, at once under certain conditions. In the process, they appear to cancel out quantum tunneling.
Research from ancient sediment cores indicates that a warming climate could make the world’s arctic tundra far more susceptible to fires than previously thought. The findings are important given the potential for tundra fires to release organic carbon – which could add significantly to the amount of greenhouse gases already blamed for global warming.
Montana State University post-doctoral researcher Philip Higuera is the lead author on the paper, which summarizes a portion of a four-year study funded by the National Science Foundation.
Butterflies and moths are well known for their striking metamorphosis from crawling caterpillars to winged adults. In light of this radical change, not just in body form, but also in lifestyle, diet and dependence on particular sensory cues, it would seem unlikely that learned associations or memories formed at the larval or caterpillar stage could be accessible to the adult moth or butterfly.
Now, scientists at Georgetown University have discovered that a moth can indeed remember what it learned as a caterpillar.
Just picture the scene: you’re at a cocktail party, talking to someone you would like to get to know better but the background noise is making it hard to concentrate. Luckily, humans are very gifted at listening to someone speaking while many other people are talking loudly at the same time. This so-called cocktail-party-phenomenon is based on the ability of the human auditory system to decompose the acoustic world into discrete objects of perception.
It was originally believed that the major acoustic cue used by the auditory system to solve this task was directional information of the sound source, but even though localisation of different sound sources with two ears improves the performance, it can be achieved monaurally, for example in telephone conversations, where no directional information is available.
Many children with autism have elevated blood levels of serotonin – a chemical with strong links to mood and anxiety. But what relevance this “hyperserotonemia” has for autism has remained a mystery.
New research by Vanderbilt University Medical Center investigators provides a physical basis for this phenomenon, which may have profound implications for the origin of some autism-associated deficits.
In an advance online publication in the Journal of Clinical Investigation, Ana Carneiro, Ph.D., and colleagues report that a well-known protein found in blood platelets, integrin beta3, physically associates with and regulates the serotonin transporter (SERT), a protein that controls serotonin availability.
Are smart people drawn to the arts or does arts training make people smarter? Or neither?
According to research led by Dr. Michael S. Gazzaniga of the University of California at Santa Barbara, children motivated in the arts develop attention skills and strategies for memory retrieval that also apply to other subject areas.
“A life-affirming dimension is opening up in neuroscience,” said Dr. Gazzaniga, “to discover how the performance and appreciation of the arts enlarge cognitive capacities will be a long step forward in learning how better to learn and more enjoyably and productively to live. The consortium’s new findings and conceptual advances have clarified what now needs to be done.” | <urn:uuid:b4c9478b-62a1-418f-8155-daa66f307e2f> | CC-MAIN-2014-23 | http://www.science20.com/news_articles?page=1991 | s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510256757.9/warc/CC-MAIN-20140728011736-00443-ip-10-146-231-18.ec2.internal.warc.gz | en | 0.939464 | 795 | 3.234375 | 3 |
Courtesy: National Conference on Soviet Jewry
Thousands gather on the Mall in 1987 to rally for Soviet Jewry.
“We are not silent today.”
The day we were not silent was 25 years ago: Dec. 6, 1987. The person who told us not to be silent was Elie Wiesel, and the cause to which we gave voice was the cause of a generation: the Soviet Jewry Movement.
During the Washington summit between Soviet leader Mikhail Gorbachev and President Ronald Reagan, 250,000 people came to protest on the Mall.
In showing up, the Jewish community and others for the cause showed what it means to take charge of the fate of people who lived across the globe. It was our way of telling our brothers and sisters, you are never alone.
When you are silenced, we will scream. When you are vulnerable, we will make you strong.
The march was a peak moment in a 40-year struggle to liberate 1.5 million Jews from the clutches of the former Soviet Union. It was a turning point in the movement, but it was much more than that.
Reminiscing about the march helps us reflect on the transformation that happened to us at that time. We tried to liberate Jews across the world and found ourselves in the process. Many young leaders of the movement were inspired to work for non-profits with a human rights orientation or work on behalf of the Jewish community as committed professionals or volunteers.
That was me. It changed my life. For the first time, I understood that my voice counted. It did not count alone, but it counted as part of a community and an extended family that were able to shake the world.
Alan Dershowitz once said that he identified strongly with the Soviet Jewry movement because he felt he could have been a Soviet Jew. Any one of us with Eastern European parents or grandparents knows exactly what Dershowitz meant. We fought to free Soviet Jews from behind the Iron Curtain because it was a humanitarian cause but also because we identified almost too closely with their plight. Their lack of their freedoms reminded us too much of the pain of the Holocaust only a generation earlier. If we were not loud enough then, we were going to overcompensate now.
Looking back a quarter of a century later, the lessons of the movement still stay with me. Every genuine struggle is hard and is only won incrementally. There was nothing inevitable about the success of the movement to free Soviet Jews. It was not a given that we would ever realize the goals of the movement. Washington Jews played a leading role in driving the movement and situating protestors at the seat of political power. We learned to leverage where we live and work to achieve higher ends. Sometimes the movement was waylaid by politics, splinter organizations that fought with each other and an intense battle of the egos but ultimately, we knew that we had to put all of that aside. We had one vision we all had to realize. And we did.
Soviet Jews left the former Soviet Union in droves and now live in Israel, Germany, the United States and everywhere else. They lived to see children and grandchildren born into freedoms they did not have. We succeeded. But we also lost some energy along the way. The movement and the march that were defining moments in the lives of many in the Jewish community life is largely the stuff of nostalgia today. There are still many human rights conflicts to fight, but many seem a little more tired, a little more jaded. The rally on the Mall protesting genocide in Darfur had a tenth of the participants protesting a crime of epic proportions.
During the heyday of the struggle, we co-opted a biblical verse from the Exodus story: “Let My People Go.” It was the banner headline of my generation. One of the leaders of the Soviet Jewry movement understood that to engage Soviet Jews in their own struggle, they had to feel an affiliation with Judaism that had been culturally and spiritually erased by communism. He changed the slogan to “Let My People Know,” which inspired the clandestine study of Hebrew and Jewish values across Russia.
Perhaps it is that slogan which must inform today’s generation. With the creation of a Jewish homeland and a strong network of Jewish organizational life in the Diaspora, we have ensured that Jews will always have a refuge and a place to go. What we have yet to do is fulfill the other slogan, “Let My People Know.”
We have more organizations than we did 25 years ago but perhaps less Jewish education. Jewish life must be more than organizations. It must be about knowledge and meaning and causes. A cause found me and helped make me who I am. And now I – and we – have to seek out new causes because the world is still broken, and because the voice of individuals still matters.
Stuart Kurlander is the president of the Jewish Federation of Greater Washington | <urn:uuid:4bebbf3e-6bc5-48a2-8ff6-2a0fcd96f05f> | CC-MAIN-2015-40 | http://www.faithstreet.com/onfaith/2012/12/06/let-my-people-know/16856?wprss=rss_guest-voices | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736673439.5/warc/CC-MAIN-20151001215753-00111-ip-10-137-6-227.ec2.internal.warc.gz | en | 0.980947 | 1,014 | 2.6875 | 3 |
La administración nacional de la seguridad del tráfico en las carreteras (autopistas)
The National Highway Traffic Safety Administration (NHTSA), Department of Transportation, is the federal agency responsible for establishing and monitoring safety criteria for child safety seats and vehicles. In addition, NHTSA develops educational materials and trainings, provides money for research and safety and enforcement programs, conducts research, and conducts compliance testing on products. The NHTSA website, www.nhtsa.gov, provides a wealth of information on child passenger safety.
Visitors to the website can search for recalls, information on types of child safety seats, best practice recommendations, ease of use findings, and locations of child safety seat inspection stations, just to name a few.
NHTSA has also developed a website for parents that covers a wide range of subjects related to children in and around vehicles. Parents Central: From Car Seats to Car Keys: Keeping Kids Safe can be found by clicking www.safercar.gov/parents/index.htm. | <urn:uuid:aeecae3c-b534-404c-86b5-ef4443ba45ef> | CC-MAIN-2016-50 | http://www.preventinjury.org/En-Espanol-(1)/Seguridad-del-nino-pasajero/Acerca-de-los-asientos-de-seguridad-para-ninos/La-administracion-nacional-de-la-seguridad-del-tra | s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541692.55/warc/CC-MAIN-20161202170901-00276-ip-10-31-129-80.ec2.internal.warc.gz | en | 0.877319 | 222 | 2.53125 | 3 |
Turkish translation of “the pluperfect”
See all translations
the pluperfect noun
/ˌpluːˈpɜːfɪkt/ ( also the past perfect)
› the form of the verb that is used to show that an action had already finished when another action happened. In English, the pluperfect is made with 'had' and a past participle.
had + geçmiş zaman ortacı' ile oluşan fiil kipi; geçmişte bitmiş zaman kipi
Verb forms, tenses and types of verbs | <urn:uuid:c319d8fa-5e40-4c9c-a52c-3711c7191fa4> | CC-MAIN-2015-14 | http://dictionary.cambridge.org/dictionary/turkish/the-pluperfect | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300578.50/warc/CC-MAIN-20150323172140-00220-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.852963 | 139 | 3.078125 | 3 |
It is possible to classify all known matter into natural substances and artificial substances according to its origin. The term “substance” means that they are substances with a fixed and defined chemical composition. Substances are made up of atoms or molecules , and cannot be separated using physical separation methods (they are not mixtures). Natural … Read more20 Examples of Natural and Artificial Substances
Federal student loan consolidation can help you manage multiple monthly payments to multiple servicers. If, like the vast majority of college graduates, you acquired student loan debt through federal student aid, you likely have more than one loan, which means more than one bill. Trying to juggle all of them can quickly get confusing and … Read moreShould I Consolidate My Federal Student Loans?
According to data compiled by the National Center for Education Statistics (NCES), 16.6% of all U.S. higher education students (about 3.3 million) in fall 2018 were enrolled in institutions offering exclusively distance education courses. More than 35% were enrolled in hybrid institutions that combine distance education and in-person instruction, a class that includes some of … Read more16 Online Degree Programs From Top Universities
This theoretical framework offers a more complete historical perspective and a better context for understanding the present. History is a very active social science, in previous articles we have talked about its ability to self-analyze and rewrite itself. Research, perspective, new data and readings are crucial in the construction of historical becoming. Elements such as … Read moreWhat is Critical Race Theory?
What is Social Phenomena? The social phenomena are all behaviors or trends that occur within a society, which can be performed by some or all the members and having a concrete effect or consequence. For example: immigration, art, the devaluation of a currency, fashion. These phenomena occur when a change occurs in some sphere or … Read moreExamples of Social Phenomena
In chemistry, a mixture is a set of two or more substances that come together without changing chemically. For this reason, it is possible to separate the various components of the mixtures by relatively common physical procedures, such as filtration or distillation . For example: sea water, coffee with sugar, beer, milk. In nature there are … Read more20 Examples of Mixtures
When speaking of compounds, allusion is generally made to chemical compounds , that is, to substances that are made up of two or more chemical elements that are combined in a certain way and proportion. For example: methylene blue, ferric chloride, water, methane . The physicochemical properties of the compounds are not the same as … Read more19 Examples of Compound
Objects that occur in this state of matter are known as solids . Together with the other two ( liquid and gaseous ), they make up the three classically recognized possible states. For example: diamond, iron, sand, silicon. Some incorporate a fourth state, the plasmatic state , only feasible under extremely high temperatures and pressures, … Read more19 Examples of Solids
The values are the principles by which a person, a group or society is governed. Values are abstract concepts, but they manifest themselves in qualities and attitudes that people develop. For example: self-control, compassion, openness, integrity. In a society there are differences in values between different groups, according to social classes, ideological orientations, religion and … Read moreCore Personal Values List and Examples
The Connecting Words also known as connectors are words or expressions that would note a relationship between two sentences . For example: but, and, although, also. Depending on the type of connector, a different meaning is given to the connection that is established. It is important to know the function of each connector to use … Read more100 Examples of Connecting Words | <urn:uuid:6b9589dd-5fba-4a81-9d6a-07bb62939661> | CC-MAIN-2022-49 | https://babythesis.com/category/blog/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710712.51/warc/CC-MAIN-20221129232448-20221130022448-00614.warc.gz | en | 0.942696 | 773 | 2.75 | 3 |
The Industrial Age
What: J.P. Was an famous American financier and banker.
Where: he lived in the city of Philadelphia.
When: He lived from 1837- 1913.
Why: He was good at his job and enjoyed it and the profit.
Thomas A. Edison
What: He invented many things, he even improved the lightbulb.
When:He started inventing in 1876.
Where: He worked in an invention factory, or on his couch where he could think.
Why: He invented thing because he had many ideas and things he wanted to try.
What: It was a strike that lead to bombing.
When: Tuesday may 2, 1886
Where: The riot was at the Haymarket square.
Why: The riot was caused by people who wanted change in there job.
What: the expansion was the railroads expanding west.
When: 1869 may they met up in Utah.
Where: they met up at there meeting place in Utah.
Why: The U.S wanted to expand to connect the two sides of the content. | <urn:uuid:0b464bd7-eeed-4a76-9961-1462a34d9609> | CC-MAIN-2018-39 | https://www.smore.com/1rcn | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157574.27/warc/CC-MAIN-20180921225800-20180922010200-00535.warc.gz | en | 0.971315 | 231 | 2.59375 | 3 |
Learn more about how E. coli bacteria translate sensory signals into movement in the iBiology video lecture entitled, "Marvels of Bacterial Behavior - Molecular Machinery."Edit Summary
Membrane-bound receptor proteins detect the presence of nutrients (A), triggering the release of a signal molecule (B), that reacts with proteins associated with the bacterium's flagellum (C), causing a change in its direction of rotation (D), which propels the organism towards increasing concentrations of nutrients. Artist: Emily Harrington. Copyright: All rights reserved. See gallery for details.
"CheY is the chemotactic response regulator, which transduces signals from the receptors to flagellar motors." (Greenfield 2009: 2)
"[R]ecent in vitro data suggest that different densities of receptors have different kinase and methylation rates, suggesting that the chemotaxis network may adjust its kinase activity based on the local concentration of receptors." (Greenfield 2009: 8) | <urn:uuid:b6c17fa4-4356-4d4a-9b1d-2bf59b7cdfca> | CC-MAIN-2019-35 | https://asknature.org/strategy/receptors-guide-bacterial-navigation/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313747.38/warc/CC-MAIN-20190818083417-20190818105417-00347.warc.gz | en | 0.878247 | 204 | 2.828125 | 3 |
AfriGeneas Military Research Forum
Obit: Truman Gibson, Who Fought Army Segregation
Truman Gibson, Who Fought Army Segregation, Is Dead at 93
His death was announced by Unity Funeral Parlors of Chicago.
Mr. Gibson, a Chicago lawyer, worked within the federal government to end segregation in the armed forces. He often operated out of public view at a time when other black figures like A. Philip Randolph, the president of the Brotherhood of Sleeping Car Porters, and Walter White, the N.A.A.C.P. leader, were highly visible in civil rights struggles.
Mr. Gibson was chief adviser on racial affairs to Secretary of War Henry L. Stimson from 1943 to 1945. He sought to persuade the Army to use black troops in combat and investigated complaints from black soldiers facing indignities and sometimes violence during their stateside training.
"It was complete, absolute segregation," Mr. Gibson told The Columbus Dispatch, in Ohio, in 2002. "The training facilities were in the South. The attitude was that Southern officers understood 'those people.' White bus drivers in military towns were deputized and armed. That was their approach to handling Southern black soldiers. I tried to put out fires. We were dealing with the killing of black troops. I visited most of the camps and most of the nations where there were black troops."
Mr. Gibson sought to enhance opportunities for black soldiers to become officers, at one point conferring with Jackie Robinson, already a well-known athlete and soon to break baseball's color barrier, when he was experiencing problems in obtaining a commission while an enlisted man at Fort Riley, Kan.
In December 1946, Mr. Gibson was named to President Harry S. Truman's nine-member civilian commission studying the future of universal military training; he was the panel's only black member. In May 1947, when it issued its report, the commission urged an end to segregation in the military. Fourteen months later, Truman issued an executive order that led to desegregation of the armed forces. | <urn:uuid:da383b0b-94bb-4273-bb8b-873bc7b79e1f> | CC-MAIN-2014-42 | http://www.afrigeneas.com/forum-military/index.cgi/md/read/id/2559/sbj/obit-truman-gibson-who-fought-army-segregation/ | s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414637899702.24/warc/CC-MAIN-20141030025819-00196-ip-10-16-133-185.ec2.internal.warc.gz | en | 0.97486 | 422 | 2.828125 | 3 |
Blue Ridge Geologic Province
Explore This Article
The Union County. The Appalachian Trail has its southern origin in the Blue Ridge Mountains; the trail's official starting point is Springer Mountain, near the southern tip of Fannin County. Some of Georgia's most-visited state parks are found in the Blue Ridge, including Amicalola Falls, Black Rock Mountain, Tallulah Gorge, Unicoi, and Vogel.
The Blue Ridge province is bounded on the northwest by the Great Smoky fault, across which lies the Valley and Ridge province, and on the southeast by the Brevard fault zone, across which lies the inner section of the Piedmont province. The Blue Ridge province is primarily a physiographic designation, and for this reason, many of the rocks making up the western Blue Ridge resemble the oldest rocks of the Valley and Ridge, whereas some rocks of the eastern Blue Ridge resemble those of the Piedmont. Separating the western from the eastern Blue Ridge are the Hayesville and Allatoona faults.
The western Blue Ridge is dominated by low- to high-grade metamorphosed sedimentary rocks of late Precambrian to early Paleozoic eras. These rocks were deposited in troughs and basins that formed Marble Belt, a long, narrow strip of metamorphosed sedimentary rocks flanked by Great Smoky Group rocks and characterized by rich marble deposits. The Murphy Marble Belt is thought to be between 400 and 500 million years old.
The eastern Blue Ridge consists of a variety of igneous and high-grade metamorphic rocks, including numerous granite bodies. The metamorphic rocks were originally part of the Precambrian basement, as were the volcanic and sedimentary rocks laid down as the proto-Atlantic Ocean began to close during the early Paleozoic era. Gold, which formed as the hot rocks interacted
A thick section of quartzite, the metamorphic equivalent of quartz sandstone, partially rings the large Tallulah dome and forms the high, steep bluffs of Tallulah Gorge in northeast Georgia. Migmatites, rocks with both metamorphic and igneous characteristics, make up other eastern Blue Ridge rocks and reveal the very high temperatures reached by these rocks during mountain building.
The Blue Ridge is an assembly of several stacked thrust sheets, each with its distinctive rock types and structural style. A thrust sheet in the continental crust is a large slice of rock that has been pushed up and over other rocks along a break in the crust known as a thrust fault. Thrust faults form in response to compression during mountain building, and once formed, they provide the break along which thrust sheets move. Along with "fold," or the bending of rocks, the movement White County, is made of this granite, which is about 375 million years old.
The major thrust sheets of the Blue Ridge in Georgia are, from southeast to northwest, the Chattahoochee thrust sheet, the Dahlonega gold belt, the Hayesville-Soque River thrust sheet, and the western Blue Ridge. The Chattahoochee thrust sheet, which contains the Tallulah dome, rests against and partially atop the Dahlonega gold belt running along the Chattahoochee fault. The Hayesville-Soque River thrust sheet sits against and partially atop both the Dahlonega gold belt and the western Blue Ridge along both the Hayesville fault and its probable equivalent, the Soque River fault. To the southwest the Dahlonega gold belt rests against the western Blue Ridge along the Allatoona fault.
The proto-Atlantic Ocean finally closed at the end of the Paleozoic era, at which time the southeastern part of what is now North America collided with what is now northwest Africa. This great collision pushed the entire Blue Ridge province farther onto the continent by 150 kilometers or more, bulldozing the Paleozoic sedimentary rocks to the northwest into what is now the Valley and Ridge province.
Erosion of the Blue Ridge for millions of years has exposed rocks that were once buried deep inside the Appalachian Mountains. In some places, erosion has breached the thrust faults and partially exposed the rocks underneath. The most noteworthy example of such a breach is Brasstown Bald, which is made of Great Smoky rocks but is surrounded by rocks of the once-overlying Hayesville-Soque River thrust sheet.
Media Gallery: Blue Ridge Geologic Province | <urn:uuid:dd99be85-4d13-498a-8465-fbd95076d57f> | CC-MAIN-2015-14 | http://www.georgiaencyclopedia.org/articles/science-medicine/blue-ridge-geologic-province | s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131300313.14/warc/CC-MAIN-20150323172140-00144-ip-10-168-14-71.ec2.internal.warc.gz | en | 0.951943 | 887 | 3.71875 | 4 |
April 10, 2013
Shingles Vaccine Is Associated With Reduction In Both Postherpetic Neuralgia And Herpes Zoster
Shingles vaccine is associated with reduction in both postherpetic neuralgia and herpes zoster, but uptake in the US is low
A vaccine to prevent shingles may reduce by half the occurrence of this painful skin and nerve infection in older people (aged over 65 years) and may also reduce the rate of a painful complication of shingles, post-herpetic neuralgia, but has a very low uptake (only 4%) in older adults in the United States, according to a study by UK and US researchers published in this week's PLOS Medicine.The researchers, led by Sinéad Langan from the London School of Hygiene and Tropical Medicine, reached these conclusions by examining the records of 766,330 Medicare beneficiaries* aged 65 years or more between 2007 and 2009.
They found that shingles vaccine uptake was extremely low–only 3.9% of participants were vaccinated–but was particularly low among black people (0.3%) and among people with a low income (0.6%).
Over the study period, almost 13,000 participants developed shingles and the vaccine reduced the rate of shingles by 48% (that is, approximately half as many vaccinated individuals developed shingles as those who were not vaccinated). However, the vaccine was less effective in older adults with impaired immune systems. The authors also found that vaccine effectiveness against post-herpetic neuralgia was 59%.
The authors say: "Herpes zoster vaccination was associated with a significant reduction in incident herpes zoster and [post-herpetic neuralgia] in routine clinical use."
They continue: "Despite strong evidence supporting its effectiveness, clinical use remains disappointingly low with particularly low vaccination rates in particular patient groups."
The authors add: " The findings are relevant beyond US medical practice, being of major importance to the many countries, including the UK, that are actively considering introducing the zoster vaccine into routine practice in the near future."
On the Net: | <urn:uuid:d8663d68-2018-4df2-ad2c-0d69dd011aa0> | CC-MAIN-2016-44 | http://www.redorbit.com/news/health/1112820301/shingles-vaccine-is-associated-with-reduction-in-both-postherpetic-neuralgia-and-herpes-zoster/ | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00015-ip-10-171-6-4.ec2.internal.warc.gz | en | 0.966907 | 441 | 2.640625 | 3 |
The Scottish Colourists were a group of painters from Scotland whose work was not very highly regarded when it was first exhibited in the 1920s and 1930s, but which in the late 20th Century came to have a formative influence on contemporary Scottish art.
The Scottish Colourists combined their training in France and the work of French Impressionists and Fauvists, such as Monet, Matisse and Cezanne, with the painting traditions of Scotland.
The leading figure of this movement was John Duncan Fergusson, who visited Paris regularly from the 1890s on and then lived there from 1907 until 1914. Other Scottish Colourists were Francis Cadell, Samuel Peploe and Leslie Hunter. They "absorbed and reworked the strong and vibrant colours of contemporary French painting into a distinctive Scottish idiom during the 1920s and 1930s".
The Scottish Colourists continued the work of their predecessors, the Glasgow Boys. Although their style was confident and vibrant, their subject matter was rather timid compared to their French counterparts as it merely consisted of island landscapes, Edinburgh interiors and fashionable models. The Scottish colourists were internationally known during their lifetimes but their work fell out of favor by World War II, until they were discovered in the 1980s and subsequently seen to have played an influential role on the development of Scottish art. | <urn:uuid:8596b2da-8898-4a3a-96db-4b67e4594864> | CC-MAIN-2017-17 | http://art.docuwat.ch/videos/art-of-britain/the-colourists | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118831.16/warc/CC-MAIN-20170423031158-00181-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.989753 | 273 | 3.234375 | 3 |
One man’s death is a tragedy, a million deaths is a statistic.
If I look at the masses, I will never act. If I look at the individual, I will.
The phenomenon of people being more inclined to help individuals in need, particularly people with a face we can see and a story to tell, than to help large masses of people is called the identifiable victim effect.
To learn more about this effect, check out Dan Ariely’s course on Behavioural Economics on Coursera for free.
Till next time, dream economics. | <urn:uuid:017a594f-67f8-4376-97bb-7040e04ee73e> | CC-MAIN-2018-17 | http://econoception.org/2013/04/what-does-mother-teresa-and-joseph-stiglitz-have-in-common/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945272.41/warc/CC-MAIN-20180421164646-20180421184646-00302.warc.gz | en | 0.928928 | 121 | 2.8125 | 3 |
The Law of War in Space
Printed in the Air Force Law Review;
Obtained March 13 2001
II THE MILITARY ASCENT TO SPACE
A. Origins and Evolution of Space Militarization
- Missiles and Rockets
- Nuclear Devices
B. Present and Potential Technologies Available for Space Combat
- Electromagnetic and Radiation Weapons
- Kinetic Energy and Hypervelocity Weapons
- Laser Weapons
- Particle Beam Weapons
- Explosive Proximity Weapons
- 'Soft Kill' Weapons
III. THE LAW OF WAR
A. Jus in Bello vs. Jus ad Bellum
B. Customary Principles within the Law of War
- Military Necessity
C. Treaty Law
- Hague Conventions of 1899 (I-IV) and 1907 (I-XIV)
- Geneva Conventions of 1949 (I-IV) and Protocols of 1977 (I-II)
- Additional Conventions Adopted Since 1972 Affecting the Jus in Bello
- Jus Ad Bellum Under the United Nations Charter
IV. Space Warfare Under the Corpus Juris Spatialis
A. Customary Law
B. Treaty Law
- Treaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, Including the Moon and Other Celestial Bodies (Outer Space Treaty)--1967
- Agreement on the Rescue of Astronauts, the Return of Astronauts and the Return of Objects Launched into Outer Space (Rescue and Return Agreement)--1968
- Convention on the International Liability for Damage Caused by Space Objects (Liability Convention)--1972
- Convention on Registration of Objects Launched into Outer Space (Registration Convention)--1975
- Agreement Governing the Activities of States on the Moon and other Celestial Bodies (Moon Agreement)--1979
V. SPACE WARFARE UNDER RELATED TREATIES AND OTHER AUTHORITATIVE SOURCES
VI. THE LAW OF WAR IN OUTER SPACE
- Treaty Banning Nuclear Weapons in the Atmosphere, In Outer Space and Under Water (Limited Test Ban Treaty)--1963
- Anti-Ballistic Missile (ABM) Treaty-1972
- Antarctic Treaty-1959, and the United Nations Convention on the Law of the Sea-1982
B. United Nations General Assembly Resolutions
- Declaration of Legal Principles Governing State Activity in the Exploration and Use of Outer Space-1963
- Principles Relating to Remote Sensing of the Earth from Outer Space-1986
- Principles Relevant to the Use of Nuclear Power Sources in Outer Space--1992
C. International Telecommunication Union
A. Bases on Which the Law of War Applies to Outer Space
a. Parallels to Sea Warfare
b. Previous Application of the Law of War to Aerial Warfare
Outer Space Treaty
B. Problems of Legal Definition and the Use of Force in Space
- Militarization of Space
- Weaponization of Space
- Use of Force in Space
C. National Policy, Military Space Doctrine, and Law of War Manuals
D. Information Warfare
E. Other Selected Issues
- Military Interaction With Intergovernmental Agencies and "Dual Use" Assets
- The Status of Astronauts as Both "Envoys of Mankind" and Combatants
- Return of Astronauts Engaged in Combatant Activities
- Innocent Passage through Airspace for Destinations to and Return from Space
LEVEL 1 - 1 OF 295 ITEMS
Air Force Judge Advocate General School
The Air Force Law Review
48 A.F.L. Rev. 1
LENGTH: 62360 words
ARTICLE: Armed Conflict on the Final Frontier: The Law of War in Space
Major Robert A. Ramey*
* Major Ramey (B.A., Wheaton College; J.D., Seattle University; LL.M., McGill
University) is an instructor, International and Operations Law Division, The Air
Force Judge Advocate General School, Maxwell AFB, Alabama. He is a member of the
Bar in the state of Washington.
... ... Because these customary principles are codified in the Outer Space
Treaty, and the treaty has been ratified by all States currently active in
space, customary international law seems less important in ascertaining
principles applicable to future space warfare. ... For example, should
Colombia, Iran, Indonesia, or Yugoslavia acquire the means of space launch in
the coming years, all four being non-parties to the Outer Space Treaty, any
restrictions on such States' space activity that do not come from obligations
imposed by other space treaties will occur largely by operation of customary
international law. ... Further, as with the Outer Spon
Agreement requires that all activities on the moon be carried out in accord with
"international law," and that States bear "international responsibility for
national activity" on the moon. ...
The lawful bearing of arms-under a strict code of military justice and within
a corpus of humanitarian law-has been accepted as a practical necessity. [n1]
John Keegan (1993)
Some may reasonably wonder, for purposes of analysis under the international
law of war, whether there is any meaningful distinction between warfare
prosecuted within airspace and warfare prosecuted within outer space. In boh
cases, the military assets above the earth's surface may support the combat
occurring below, or may engage targets in the same combat environment. Given
this, some may view armed conflict from and within outer space as simply a
subset of air warfare. Others may see armed conflict in outer space as superior
to air warfare-that is, air warfare as a subset of space warfare. Still others
may view space conflict as a new category of combat that is sui generis. We can
state the question more simply as follows: is the "aerospace" environment
fundamentally one field of combat operations or two?
This article suggests that for purposes of analysis under the law of war,
space combat will be sui generis-fundamentally different from combat in
terrestrial airspace. [n2] This approach raises at least three
implications for the analysis undertaken herein. First, space combat
will not be analyzed as simply an extension of air combat; the two are
fundamentally different types of combat suggesting different doctrinal tenets of
power. While the military use of space has traditionally been viewed as a medium
from which to support terrestrial warfare, including air warfare, space as a
medium of warfare itself raises entirely different legal and operational
issues. [n3] Thus, freed from a strict air warfare paradigm, the effort
to establish limits on space combat in its own right can draw principles of
armed conflict from those applicable to land and sea warfare, as well as from
those governing air warfare.
Second, one of the key differences of space warfare, at least for the near
future, will be the spatial separation of human combatants from their weaponry.
Whether kinetic energy or space-based laser weapons in low-earth orbit, or
jamming satellites used to corrupt telecommunications signals in geosynchronous
orbit, the warrior is distant from his instruments of war by between 100 and
22,500 miles. When seeking to apply the current laws of war, it appears
this phenomenon will require new ways of thinking about a legal regime that has
as its purpose the amelioration of human suffering. Beyond simply targeting
other combatants, terrestrial infrastructure, or weapons systems, space warfare
as it is now most widely conceived contemplates the destruction of unmanned
military assets in the air or space environment. [n4] Given these
factors, it seems that the minimization of human suffering, the chief goal of
the laws of war, is already achieved to some extent for space as compared with
the other combat environments. From this observation follows the conclusion that
with respect to space warfare as it is currently conceived, the law of war will
be more applicable to regulation of means and methods of war, than to the
protection of human life. [n5]
Third, the first implication notwithstanding, the legal analysis of issues
unique to space combat, such as the legality of new means and methods of space
warfare, cannot rely solely on analogy with legal relationships governing other
combat environments. This is due in part to the relative infancy of space
warfare and to the recency of its technology. To a certain extent, the
international regulation of space combat will evolve only subsequent to State
action making such combat an imminent possibility. [n6] Because the law
governs actual social relations and not theoretical abstractions, and because
there have been no reported or anticipated cases of actual space combat,
conclusions about legal restrictions on such combat must begin tentatively. This
is not to abandon hope of outlining contours of the legal regulation of space
combat under existing international norms; certain points do clearly emerge from
the analysis. It is simply to acknowledge realistically the limitations of such
an inquiry at this time. States faced a similar dilemma in the days
leading up to World War I with aerial combat. At that time, one could hardly
establish firm legal principles in the absence of State practice. [n7] As
was the case in the 1910s with respect to air warfare, a great deal of original
reflection on the implications of space combat is needed today.
This article will examine the intersection of two subsets of public
international law as they bear on space warfare: the law of war and the law of
outer space. The analysis will focus on the relevant legal issues from the
perspective of the United States, currently the most active spacefaring nation
on Earth. Because the American vision for space war is the most "developmentally
mature," [n8] it is a virtual certainty that U.S. practice will dominate
the development of international law limiting the means, methods, and extent of
the use of force in space.
Part II presents a historical review of the development of military activity
in space. It discusses reactions by the international community to new weapons
such as V-2 rockets, cruise missiles, intercontinental ballistic missiles, and
nuclear devices. It also examines the history of U.S. military satellite
development. This part also presents aspects of existing and foreseeable
technology for armed conflict within and from outer space.
Parts III-V consider international law applicable to space warfare. Part III
analyzes international law pertaining to armed conflict and distinguishes
between the jus in bello and the jus ad bellum. Further, Part III outlines the
key principles derived from treaties and customary international law and
clarifies that "law of war," "law of armed conflict," and "humanitarian law" are
phrases that have come to be largely synonymous with each other. Part IV
examines the five multilateral space treaties comprising the corpus juris
spatialis, and highlights key passages of relevance to space warfare. Part V
considers related authorities such as the Limited Nuclear Test Ban Treaty,
Anti-Ballistic Missile Treaty, Antarctic Treaty, and the United Nations
Convention on the Law of the Sea, as well as three United Nations General
Assembly (U.N.G.A.) Resolutions. Though not regulating outer space activity per
se, the treaties are relevant either because of inherent parallels they have to
the regulation of outer space, or because they contain specific provisions
limiting space activities.
Part VI applies the legal regime governing international armed conflicts to
space warfare. Here, the article examines the bases on which the law of war
applies to outer space. In doing so, the article suggests that the process by
which the law of war was applied to the last new combat medium, air, serves as a
model for the likely development of the international regulation of space
warfare. Part VI discusses problems of definition within the corpus juris
spatialis that challenge any effort to apply the law of war to space combat. It
further outlines U.S. national and military space policy and highlights the role
that State law of war manuals might play in the future development of
restrictions on space warfare. Part VI then briefly considers information
warfare, a phenomenon heavily reliant on space assets and one of growing concern
to the U.S. military.
Part VI also addresses special problems arising from, among other things, the
prospect of applying the law of war to space warfare. This Part will analyze the
significant problem posed by space assets dedicated to uses of both a civilian
and military nature. It will also examine the status of assets owned both by
belligerent and neutral States, as well as assets owned by opposing
belligerents. It will further consider legal problems raised by the military
status of astronaut combatants in light of the status conferred on all
astronauts under current space law, as well as the question of whether
astronauts found in foreign territory must be returned to opposing belligerents
in time of war. [n9] Part VI concludes by examining whether
proposed rights of innocent passage through foreign airspace for the purpose of
accessing outer space will factor in the future regulation of means and methods
of space warfare.
II. THE MILITARY ASCENT TO SPACE
We will engage terrestrial targets someday-ships, airplanes, land
targets-from space. We will engage targets in space, from space. . . . [The]
missions are already assigned, and we've written the concepts of operations. [n3]
General Joseph W. Ashy, USAF (1996)
In most respects, the history of mankind's ascent to space is a history of
the militarization [n11] of outer space. A review of this history, along
with a basic familiarization of current and potential implements of
space warfare, provides the requisite context from which the analysis herein can
proceed to legal considerations related to the weaponization of space. Among
other things, an understanding of technical space developments provides insight
into the way international legal norms have developed. As discussed more fully
in Part III, while the means by which States may lawfully attack each other's
assets and personnel within space remains partially proscribed, the law has
condoned the non-aggressive military use of space for decades.
A. Origins and Evolution of Space Militarization
1. Missiles and Rockets
Space warfare, as any other use of outer space, requires access to the
space environment. That access requires the use of missiles and rockets, later
termed "boosters" in view of their utility as launch vehicles for spacecraft. As
for most other segments of space technology, rockets [n12] were first
developed for use by military forces. Matte notes the likelihood that "as early
as 3000 B.C. the Chinese had developed rockets for, among other things, use in
warfare." [n13] It would be almost 5000 years however before rockets
became a major instrument of warfare.
It was German ingenuity that first applied rocket technology to
largescale military combat use. [n14] At the Peenemunde experimental
site on the Baltic coast, Germany constructed the famous V-2 ("Vergeltungswaffe
Zwei") rocket. [n15] Making its first flight in October of 1942,
[n16] the rocket stood over 13 1/2 meters high, weighed 15,300 kg, had a
range of 322 km, [n17] and was propelled by an engine producing more
than 800,000 horsepower. [n18] The rocket used a turbo fuel pump
generating pressure at 300 pounds per square inch while pumping 50 gallons
(189.5 liters) of fuel per second. [n19] For guidance and control, the
most difficult technical feat, the rocket relied on gyros that only partially
compensated for wind and other destabilizing factors in flight. Nonetheless, the
V-2 represented a fearsome weapon to which there was no known defense. It also
ushered in one of the most significant revolutions in military weaponry. [n20]
Following the war, under "Operation Paperclip" the leading German rocket
scientists were captured for further work in the U.S. With their expertise, the
U.S. began reconstructing the essence of V-2 technology for the development of
more advanced rockets. This work, together with experience gained from the 1930s
and 1940s studies and experiments at the California Institute of Technology
under Dr. Theodore Von Karman, contributed to Project MX-774-later to become the
Atlas missile, a research and development effort aimed at creating a
5,000 mile range intercontinental ballistic missile. [n21] General Henry
Arnold, chief of the U.S. Army Air Corps just prior to its establishment as the
U.S. Air Force in 1947, predicted that such a weapon "is ideally suited to
deliver atomic explosives, because effective defense against it would prove
extremely difficult." [n22] Little did General Arnold know that such
defenses would continue to prove extremely difficult through 2000 and beyond. [n23]
In the U.S., missile research and development competed directly for precious
funding with long range bombers. "As with satellite proposals, initial postwar
interest in long-range guided missiles soon succumbed to an Air Force policy
that relied on strategic bombers carrying air-breathing missiles." [n24]
Nonetheless, missile advocates kept sufficient interest engaged to fund
development of the Redstone, Jupiter, and Juno missile programs at the U.S.
Army's Redstone Arsenal. [n25] In addition to various sounding rocket
[n26] and cruise missile programs, [n27] and the Thor
Intermediate Range Ballistic Missile (IRBM), improvements to the
original V-2 design soon led to the first operational U.S. Intercontinental
Ballistic Missile (ICBM)-the Atlas. [n28] Within a few years, the U.S.
fielded the even larger and more sophisticated Titan missile, [n29]
evolved versions of which are still widely in use today both as ICBMs and
commercial space boosters. [n30]
Following World War II, the Soviet Union captured its share of German
scientists as well. Using the V-2 as its point of departure, the U.S.S.R. did
more than simply build copies of the weapon, it put the rocket back into
production within the Soviet zone of occupation in Germany. [n31]
Unlike the U.S., the Soviet Union did not have a huge fleet of long-range
bombers, thus the prospect of ICBM development did not have the same
bureaucratic obstacles from a competing weapons platform. What it did have were
relatively primitive atomic weapons that were bulky and required tremendous lift
to propel them across an intercontinental range. They proceeded to create just
such heavy-lift launch vehicles. [n32] The first Soviet ICBM, bearing
the designation "SS-6," was launched in August 1957, a full fifteen months
before the first Atlas launch. It was an SS-6 that carried the world's first
artificial satellite, Sputnik I, into orbit on October 4, 1957. [n33]
2. Nuclear Devices
Following the advent of rocketry, creating a weapon of ultimate destructive
capability was just a matter of time for the leading scientific minds. The
conventional explosives used by the V-2 rockets simply mimicked the effects
attainable by means of air-dropped bombs. These contained the equivalent of one
ton of TNT. By contrast, the earliest nuclear weapons contained the equivalent
of 20,000 tons (20 kilotons). [n34] Later versions would deliver the
equivalent of 15,000,000 tons (15 megatons) of TNT and more. [n35]
Putting the matter plainly, U.S. President Truman would write in his
personal diary, "we 'think' we have found a way to cause a disintegration of the
These early devices weighed five tons and required a rocket of several
hundred tons to carry one weapon to Moscow-too heavy to be practically
effective. [n37] However, with the advance of the ICBM came the advance
of the nuclear device. It soon became small enough to launch inside the
nose-cone of a rocket. [n38] Thus, the lightening speed of the rocket
was mated to the overwhelming power of the nuclear weapon. And given its
desirability for military advantage, it also proliferated.
Between 1945 and 1992, the United States went on to manufacture a total of
70,000 nuclear weapons, some 10,500 of which are still in service. The Soviet
Union produced 55,000, of which 15,000 are currently active. Britain reportedly
made 834 nuclear warheads, France 1,110 and China 600. According to various
reports of unknown reliability, Israel may have made 200, India twenty, Pakistan
between four and seven. South Africa admitted it had produced six devices before
giving up its programme; North Korea may have one or two. [n39]
It was not until 1957 that the first nuclear detonations occurred in space.
[n40] Not only did this development become a catalyst for passage of a
treaty limiting nuclear weapons testing (Limited Nuclear Test Ban
Treaty), [n41] but it brought a plea from the Soviet Union that such
tests not endanger the safety of Soviet cosmonauts. The U.S. responded to the
Soviet concern with the assurance "that no activities were contemplated which
could have harmful effects upon the Soviet spacemen." [n42] Following
passage of the Limited Nuclear Test Ban Treaty in 1963, such detonations in
space were no longer lawful and simple verification measures made them easily
In many ways, the evolution of satellite technology follows the evolution of
missile technology. Without the latter, the former had no way of reaching outer
space. Thus, the early battles for funding of satellite technology in the DOD
and in Congress often pitted satellite and missile research against conventional
weaponry. [n44] Once funding for ICBMs came through however, it was soon
realized that rockets more powerful than an ICBM might succeed in launching
Though early scientists speculated on the possibility of artificial
satellites in earth orbit, Project Rand, under the Douglas aircraft company,
[n46] demonstrated the feasibility of such a feat in its report of May
2, 1946. Report number SM-11827, "Preliminary Design of an Experimental
World-Circling Spaceship," not only provided 236 pages and eight appendices of
detailed technical theory, but it spawned numerous subsequent reports on the
feasibility of satellite design, launch, and reentry. In simple terms, the
report declared that "if a vehicle can be accelerated to a speed of about 17,000
m.p.h. and aimed properly, it will revolve on a great circle path above the
Earth's atmosphere as a new satellite. The centrifugal force will just
balance the pull of gravity." [n47] The report subsequently predicted
that "the achievement of a satellite craft by the United States would inflame
the imagination of mankind, and would probably produce repercussions in the
world comparable to the explosion of the atomic bomb." [n48]
The earliest military satellite program focused on a reconnaissance mission.
In time, the mission for reconnaissance satellites in the U.S. would be shared
between the military and the intelligence establishment. Systems such as the
venerable Corona series were launched in early 1959 amid great secrecy and were
controlled by the U.S. Central Intelligence Agency. [n49] Though the
focus of public U.S. military space activity remained in the Department of
Defense, it was determined that reconnaissance missions from space could not be
Indeed, the Corona program was so sensitive that it was given the code-name
"Discoverer" to establish a cover. The launches were said to contain "a
scientific project that conducted biomedical research and other experiments in
space." [n50] As Corona began collecting Soviet imagery during the
Eisenhower administration, the DOD established the Office of Missile and
Satellite Systems with oversight for all national reconnaissance activities,
later to become the National Reconnaissance Office (NRO). President Eisenhower's
successor, perpetuated these basic organizational changes, including
safeguarding the very existence of the NRO as a State secret. [n51]
Indeed, under the Kennedy administration "the U.S. government no
longer acknowledged that satellites were used for reconnaissance-a policy that
remained in effect until 1978." [n52]
Despite its continuing protection of national security matters, the NRO has
recently revealed some of its methods and assets, including a $ 1.5 billion
state-of-the-art Lacrosse imaging satellite. [n53] The fifteen ton,
school bus-sized satellite was developed in 1986 to track the movement of Warsaw
Pact weaponry. Producing images to resolutions of 1 meter, the system uses radar
technology to obtain images through clouds, foliage, or darkness. [n54]
As of 1997, the NRO maintained two Lacrosse satellites on-orbit with two more
planned. In addition to these, the NRO maintains the HK-11 ("Keyhole")
satellite system which, using optical sensors, is reported to produce
resolutions of six to twelve inches (15 to 30 cm). [n55]
Reconnaissance was not the only military mission for early satellites. Almost
simultaneously with WS-117L, and indeed as an outgrowth of it, the U.S. military
was developing a missile warning system to monitor the launch of Soviet ICBMs.
The first such program, MIDAS ("missile detection and alarm system"), was
troubled with false alarms and overall system unreliability virtually from its
operational beginning in 1960. [n56] Despite some successful test
detections, the system was replaced in the early 1970s by geosynchronous
satellites of the Defense Support Program (DSP) which proved to be
"highly successful," offering the President notice of a missile attack within
moments of launch. [n57] Using an advanced infrared telescope mounted to
the spacecraft's front end, the DSP telescope remained focused on earth ready to
generate an electronic signal upon detection of a missile launch. Its use
continues today. [n58]
Beyond these, other significant satellite systems were developed to carry
military communications, [n59] to provide weather intelligence,
[n60] and to aid navigation. Though assets supporting all
three missions are indispensable to combat operations, the U.S. space-based
navigation system has now become perhaps the best-known of all military space
assets outside military circles. Developed in the 1970s, and declared fully
operational on July 17, 1995, [n61] the Global Positioning System (GPS)
relies on twenty-four operational satellites (with an additional three spares in
orbit) in medium-earth orbits in six orbital planes. [n62] The basic
concept is simple though ingenious:
[The constellation of satellites flies] in twelve-hour orbits at an altitude of
12,543 miles. Each of them carries an atomic clock for precise determination of
time, while ground-based tracking permits each one to know its position with
similar accuracy. A ground receiver then accepts signals from the spacecraft in
view, learning their positions as well as the exact times when the signals were
transmitted. The receiver has its own internal clock, which is not very
accurate, but the data from space allows it to synchronize this clock with those
of the satellites. The receiver then calculates the length of time each signal
has been in transit, traveling at the speed of light. This translates into an
accurate determination of distance to each satellite. Through triangulation, the
receiver then determines its own location. [n63]
The system showed its great value during the 1991 Persian Gulf War by
providing for combatants answers to the age-old questions "where am I" and
"where am I going," to an accuracy of less than thirty feet. [n64] It
was also used to guide munitions launched from air, sea, and
land-based weapons to their targets providing three-dimensional position and
velocity data. This constantly-improving targeting capability will likely be a
significant law of war contribution made by GPS. As discussed more fully in the
next chapter, the ability to target accurately implies the legal duty to do so.
The better GPS accuracy becomes, the higher the burden it will place on its
users to distinguish legitimate from illegitimate targets, and to minimize
collateral damage. Thus, it will no doubt "change the face of future warfare."
[n65] Operating on only sixteen satellites in the 1991 war, [n66]
the system nonetheless proved itself highly useful and will be indispensable
to space missions for future conflicts well into the twenty-first century. [n67]
B. Present and Potential Technologies Available for Space Combat
To date, there has not been a single reported case of force used in outer
space by one nation against another. [n68] Nonetheless, given the
increasing global reliance on space systems, and increasing militarization of
space, its weaponization and evolution into a distinct theater of military
operations seems likely. Though technologies applicable for space combat will
include a wide variety of military instrumentalities, the development
of space weapons is the most obvious choice. Such weapons can be grouped
according to a variety of criteria. [n69] They can be grouped by
missions intended such as "anti-satellite" and "missile defense," or by method
of pursuit such as "boost phase intercept" and "direct ascent." [n70]
Depending on its characteristics, a space weapon could fit within several
different categories at once. One of the most logical means of identification
focuses on the weapon's means of destruction as its distinguishing feature. Most
probable future space weaponry can be described using this method of
identification, including those representative samples discussed in the six
1. Electromagnetic and Radiation Weapons
Perhaps the quintessential electromagnetic and radiation weapon is the
nuclear bomb. Recognizing this, the first anti-satellite (ASAT) weapon system
made operational by the U.S. involved a nuclear detonation in space. [n71]
Though the history and basic functioning of nuclear weapons have been noted
previously, it is appropriate to consider briefly their effect as a weapon when
detonated in outer space. Given the near-vacuum conditions of space, the range
of a nuclear blast in terms of spreading radiation and heat is greatly
diminished. In the absence of atmosphere, radioactive fallout cannot occur.
[n72] Further, the shock waves, violent winds, and intense heat
generated by a nuclear blast within the atmosphere do not occur in
space. [n73] As a result, the collateral damage from the effects of heat
and blast is fairly easy to confine. [n74] Though the local effects in
space from such a detonation can be very destructive, the most significant
military effect of nuclear blasts in space relates to the creation of an
electromagnetic pulse (EMP) in near-earth space where the outer space vacuum
contacts the atmosphere. [n75]
An EMP is created when "a cascade of gamma rays from any nuclear explosion in
space collides with the upper atmosphere." [n76] As these gamma rays
race nearly instantaneously downward toward the top of earth's atmosphere,
resultant charge imbalances create an electrical current that peaks 100 times
faster than lightning, and is largely unrelated to the size of the detonation
for any yield over a few hundred kilotons. [n77] Similar to a lightning
strike, the EMP lasts only for a millionth of a second but holds potential for
devastation of sensitive circuitry. Unshielded electronics within several
hundred miles of the epicenter may be disabled as every unshielded element in
its path acts as a conductor. The higher the burst, the larger the area affected
in the air and land beneath. A burst at a height of 300 miles (483 km) would
affect the entire continental U.S. [n78] "Poorly protected satellites
and solar power systems in orbit are particularly vulnerable, because risk radii
extend hundreds (sometimes thousands) of miles farther in space than in
absorbent air." [n79]
In addition to the effects of an EMP, "beta particles and gamma rays
respectively cause intensive and extensive alterations in the ionosphere."
[n80] These weaken both radio and radar waves. This can result in high
frequency blackouts over broad areas, followed by periods of impaired radio and
radar performance. [n81] Thus, the disruptive capabilities of a nuclear
blast in space hold distinct military advantages. [n82] Nonetheless, in
addition to legal hurdles, Peebles notes that when first considered for its
strategic value, the stationing of a nuclear weapon in space "made no
technical or military sense" for at least four reasons, at least some of which
are applicable today:
First, an orbiting weapon required elaborate spacecraft systems, such as
retro-rockets to deorbit it, others to guide it, and still others to arm it.
Second, all of these integrated systems would have to perform reliably while on
orbit for many months if not years, or the bomb became useless. . . . Third, if
used in retaliation, such weapons could not be delivered at a moments [sic]
notice, but would have to wait at least an orbit or two until the Earth turned
beneath it and the intended target [came] into view. Finally, and perhaps most
tellingly, if such a weapon were used for a first strike and a partial
malfunction occurred as the nuclear bomb moved along its orbit, it might just as
easily fall on Buenos Aires as on Washington D.C., or, worse yet, on Moscow. [n83]
For these and other reasons, and despite the unquestioned devastating effects
for any nation relying on sophisticated electronic infrastructure, a
nuclear-triggered EMP attack on the U.S. is deemed unlikely. The Chairman of
President Clinton's recent Commission on Critical Infrastructure labeled it "the
most remote part of the threat spectrum." [n84]
Non-nuclear electromagnetic weapons have also been proposed. A study for the
U.S. Air Force analyzing the future of air and space power recently reported
that "the technology of high RF [radio frequency] power and large antennas is
about to greatly expand." [n85] The report concludes that when combined,
these innovations will allow for the projection of extremely high power
densities, including electromagnetic radiation, over extremely long distances to
land, air, and space-based targets. [n86] As an example, the report
suggests that such a weapon in the geosynchronous orbit could create a six mile
footprint on a battlefield which would "blank out" all radar receivers and would
damage all unprotected communication sets within that area. The tremendous power
envisioned would also allow injection of signals into even heavily shielded
communications networks, allowing for "information warfare to be waged at
2. Kinetic Energy and Hypervelocity Weapons
Kinetic energy weapons, of which hypervelocity weapons are a subtype, are
historically the most common forms of space weaponry. As suggested above, given
the tremendous speeds at which objects travel in orbit, on the order of 4.7
miles per second in low-earth orbit, just about anything properly aimed could
become a weapon even without the use of an explosive warhead. This is true
because such an object's speed, including those of very small masses, gives it
tremendous kinetic energy for impact. [n88] One U.S. kinetic energy
weapon, originally tested as a missile interceptor, could equally serve as an
ASAT. Known as the Homing Overlay Experiment (HOE), the weapon, once boosted
into space, unfurls a 4.5 meter radial "net" that is wrapped tightly behind the
nose sensor. The net increases the lethal radius of the homing and kill vehicle.
Successful testing in 1983 and 1984 showed the weapon capable of homing in and
destroying a dummy warhead in space using a long-wavelength infrared sensor. [n89]
A program currently under development in the U.S. is simply called the "KE
ASAT" (kinetic energy ASAT). The system envisions using a large Mylar "shroud"
to impact the target object. [n90] Though it will disable its target
object by force of impact as will many other kinetic energy ASATs, this system
is unique in that the shroud is intended to minimize the creation of a large
quantity of resulting space debris normally associated with kinetic energy
weapon impacts. [n91]
The railgun is another type of kinetic energy weapon that accelerates a
projectile toward selected targets at hypervelocity speeds. Because the railgun
will use electromagnetic forces to accelerate its projectiles, it is an
"electromagnetic" weapon of sorts. However, it is distinct from the
electromagnetic weaponry discussed above in that the final method of destruction
is a kinetic impact rather than an electromagnetic force itself. Testing in the
U.S. has resulted in the electromagnetic acceleration of tantalum discs to
speeds of eleven kilometers per second. [n92] Though not yet developed
as a weapon, such railguns could be stationed in outer space.
An additional space-based kinetic energy weapon has been proposed but
not yet developed. Though not an ASAT, the weapon has been conceived for use
against terrestrial targets. It would capitalize on the tremendous speed of long
rods made of depleted uranium orbiting in space. Remotely commanded to reenter
the atmosphere at hypersonic speeds, the rods could be precision-guided to
targets in the air or on the surface of the earth. Their special shape and
materials would allow for survival on reentry into the atmosphere with little
prospect for collateral damage on impact. The ability to call down such objects
from space at hypervelocity speeds would allow them to penetrate hundreds of
feet into the earth. Strategically, it would also offer the attacker the
"ultimate stealth" and maximum surprise. [n93]
A final example in the kinetic energy category is the Gun Launch to Space
(GLTS) project. The project envisions a large artillery-type structure capable
of launching projectiles hundreds of miles. The most notable example of
rudimentary technology on which the GLTS might be based is the Iraqi "supergun,"
employing a barrel 172 feet long and capable of propelling 114 pound projectiles
to distances of 465 miles. [n94] Although principally conceived as a
system for boosting operational payloads to orbit, the GLTS project has numerous
potential applications, including service as an ASAT. [n95]
3. Laser Weapons
"Laser" is an acronym for Light Amplification by Stimulated Emission of
Radiation and is a device that produces a narrow beam of radiation by means of a
physical emission. The light constituting the laser beam can be produced by a
variety of chemical means. Key components of such a weapon include both the
laser itself and the beam control subsystems which aim the beam. Once created,
the beam used in the proposed weapon's laser is so concentrated that it can be
projected for extremely long distances with very little loss of energy. Study on
laser weapons, including those capable of disabling satellites, began in the
early 1960s, [n96] and received increased attention as part of the
Strategic Defense Initiative. Despite tremendous technical problems, mostly
still unresolved, lasers could radically change warfare if ever fielded. [n97]
At present, the U.S. is developing space, air, and ground-based
lasers for possible use as weapons against enemy missiles and satellites. One of
the two principal U.S. ground-based lasers is the Mid-Infrared Advanced Chemical
Laser (MIRACL). [n98] As the name suggests, the laser beam is generated
by chemical reactions, produced by deuterium fluoride, resulting in a focused
beam that is fourteen cm square. [n99] It is the largest laser
developed in the U.S., undergoing numerous tests since 1985 when it destroyed a
stationary ICBM on the ground. In the late 1980s, the Congress prohibited DOD
from using the laser against space objects. [n100] The prohibition
expired in 1995, however, and Congress failed to renew the ban. On Oct. 17,
1997, the MIRACL "illuminated" a satellite in orbit constituting the first-ever
U.S. use of a laser against a satellite. [n101] Though it did not
destroy the object, the move was widely seen as a potential first step toward
development of a laser ASAT capability. [n102] No further tests against
space objects are scheduled.
The airborne laser (ABL) program under development calls for a much
smaller laser system housed within a modified 747 aircraft. The weapon was
conceived as a defense against missile threats but if the program continues to
prove as successful as its latest tests (tracking ballistic missiles, overcoming
atmospheric distortion), U.S. Air Force officials are weighing expanding its
role to reconnaissance, cruise missile defense, and suppression of enemy air
defenses. [n103] The laser, still under development, will use an
oxygen-iodine combustion process to produce the intense light. The first
airborne test firing of the laser against a missile is scheduled for 2002. [n104]
Although the ABL has not been envisioned for an ASAT role, its
anticipated 250 mile range would make it capable of reaching missiles and
satellites in low orbits.
Space-based laser systems (SBLs) that target other space objects have the
dual advantage of being less vulnerable to attack and avoiding the distorting
effects of earth's atmosphere. The laser currently envisioned for the SBL system
uses a hydrogen fluoride chemical reaction to create its light beam. Unlike the
MIRACL and ABL systems, it must be developed to operate in the low pressure
environment of space. The prototype Alpha laser was successfully tested in 1991
under conditions simulating the space environment. Results from the test showed
that megawatt power levels similar to the MIRACL but optimized for space can be
built and operated. [n105] However, as with all three laser weapons
programs several technical challenge remain for SBLs, including keeping the
satellites loaded with a sufficient quantity of chemicals necessary to fuel the
laser. [n106] Current estimates call for space-based laser testing to
begin sometime between 2005 and 2008. [n107]
4. Particle Beam Weapons
The first proposed use of particle beam weapons for satellite defense
occurred in 1965. [n108] Even more technically challenging than lasers,
both particle beam and laser weapons constitute "directed energy" weapons-that
is, weapons which destroy their targets by delivering energy at or
near the speed of light (approximately Mach 1,000,000). This would be a
considerable advantage during time-urgent military engagements. [n109]
In theory, a particle beam weapon could mimic the effects achieved by an
electron accelerator by transferring energy to its target at nearly the speed of
light. In so doing, it would transfer thermal energy similar to the action of a
lightning bolt. [n110] Unlike the short attack of a nuclear (or other)
blast-triggered EMP, a particle beam weapon could keep its destructive beam
focused on the target for longer periods of time.
Particle beam weapons differ from lasers in several respects. The former do
not heat the surface of their targets as lasers do. Thus, the particle beam
weapon does not weaken the structure of its target, but eats through the skin
and damages its internal mechanisms. [n111] Because it does not rely on
light energy, the particle beam weapon would not be affected by cloud cover or a
reflective coating as would a laser. However, despite their theoretical
advantages, such weapons are exceedingly difficult to produce because of the
high-energy current and repetition rates required. [n112]
5. Explosive Proximity Weapons
The category of space weapons characterized by an explosion in proximity to
its target is perhaps the most self-evident form of space weaponry. This type of
weapon simply steers close to its target and blows it up by detonation in the
target's vicinity. The best example is the Soviet ASAT system, first tested in
the late 1960s and fielded in the 1970s. [n113] The explosive kill
vehicle is rocket launched to coincide with the period during which the earth's
rotation will put the weapon into the same orbital plane as the target
satellite. Once the ASAT achieves orbit, ground controllers maneuver the object
for one to two revolutions of the earth until it is close enough to the
target for its own guidance system to activate. "When in range an
explosive charge aboard the interceptor is detonated, sending a cloud of
shrapnel at high speed to destroy the target." [n114] Repeated testing
has shown the system to be marginally effective. [n115] Recent reports
of Russian work on an EMP ASAT may prove more effective. [n116]
Though not yet developed, "space mines" are another type of proximity weapon
that tracks down its target and detonates on impact or other trigger event.
Commentators suggest that the detonators for such mines could be activated by
command from earth, which could be triggered by, for example, reaction to heat
or mechanical action. [n117] Although similar to kinetic energy
weapons, the space mine's method of destruction is not the force of impact but
6. 'Soft Kill' Weapons
A final category includes those weapons designed to disable their space-based
targets, usually satellites, rather than destroy them. Though never fielded, at
least three types of systems in this category have been considered, all of which
rely on rendezvous with the target satellite. [n118] First, weapons
that spray paint onto the optics, solar arrays, or radiators of the target would
disrupt power supplies or mission execution. Second, a target satellite could be
nudged or tipped out of its current orbit in order to exhaust its control fuel.
Third, electronic jamming could disrupt a satellite's proper functioning or shut
it down altogether. In each case, unless detected before the "attack," disabling
missions such as these could be undertaken covertly and the true source never be
detected or proven. Because the results of these "soft kills" often mimic
routine failures, detection would prove difficult. [n119]
III. THE LAW OF WAR [n120]
[The law of armed conflict] is no longer a body of law designed to ensure a
fair fight between two opponents; . . . Today, the law of armed conflict is
designed primarily to minimize suffering and prevent unnecessary destruction.
This being so, belligerents are held to the standards to which they are capable
of rising. [n121]
The law of armed conflict has been shaped with a recognition of the concept of
"military necessity." Hence "necessity" cannot be claimed as a defense to
violations of absolute prohibitions included in the law of armed conflict, for
example, killing of prisoners of war. More importantly, various military
doctrines, such as accuracy of targeting, concentration of effort, maximization
of military advantage, conservation of resources, avoidance of excessive
collateral damage, and economy of force are not only fully consistent with
compliance with the law of armed conflict but reinforce its observance. [n149]
Discrimination, [n150] as the term suggests, stresses diligence in
"the selection of methods, of weaponry and of targets . . . it includes the idea
of the immunity of non-combatants and those hors de combat, that is, the sick,
wounded, and shipwrecked, but it is not only about that: it can also refer to
geographical and other limitations." [n151] This description
incorporates several concepts, one of the most significant being the
distinction between combatants and non-combatants. In general, the law of war
prohibits attack of any person deemed a "non-combatant." This means that the
lawfulness of the use of force against individuals under the jus in bello
presupposes attack of those qualifying as combatants. Recognized at least since
the nineteenth century, [n152] the law of war establishes the category
"combatants" in order to specify those who may be attacked, but also to create a
measure of protection for those so categorized. [n153] The 1907
Regulations annexed to the Hague Convention (IV) Respecting the Laws and Customs
of War on Land stated the general criteria for recognizing combatants: (a)
commanded by a person responsible for his subordinates; (b) have a fixed
distinctive emblem recognizable at a distance; (c) carry arms openly; and (d)
conduct operations in accord with the laws and customs of war. [n154]
The care required by the principle of discrimination to distinguish between
combatants and non-combatants rests on an even more fundamental principle:
military objective. [n155] This principle requires that a belligerent's
armed attacks be limited to targets that are military in nature and the
destruction of which advances the attacker's tactical, operational, or strategic
position. Such targets would certainly include combatants in action, as well as
inanimate objects deemed necessary for the opponent's prosecution of the
conflict. Thus, Article 48 of the 1977 Protocol I to the 1949 Geneva Conventions
provides the clearest statement of the customary principle, and assumes in its
"basic rule" concerning the general protection of civilians populations that
belligerents will recognize military objectives. "In order to ensure respect for
and protection of the civilian population and civilian objects, the Parties to
the conflict shall at all times distinguish between the civilian
population and combatants and between civilian objects and military objectives
and accordingly shall direct their operations only against military
objectives." [n156] Subsequently, Protocol I defines "military
objective" (relating to objects versus noncombatants) as being "limited to those
objects which by their nature, location, purpose or use make an effective
contribution to military action and whose total or partial destruction, capture
or neutralization, in the circumstances ruling at the time, offers a definite
military advantage." [n157]
The obligation created by the principle of distinction attends both the
attacker and the defender. [n158] Further, because the principle
requires attackers to exercise due care in the selection, engagement, and
destruction of targets, it imposes a duty commensurate with the belligerent's
ability to discriminate. Given the lack of precision afforded by gravity-driven
projectiles dropped from hot air balloons, the outright prohibitions on such
methods of war in 1899 and 1907 make sense in light of the principle of
discrimination. [n159] However, the increasing capability of modern
weaponry not only provides increased tactical options, but potentially increased
obligation as well. To the extent that a laser-guided bomb can be used to
effectuate an attack that properly distinguishes legitimate from illegitimate
targets, but a conventional gravity bomb cannot, the attacker may be obligated
to either forego the attack or use the less common, more costly precision
munition. [n160] Of course, relevant to this targeting and weaponeering
analysis would be the attacker's overall campaign plan. The possibility
certainly exists that use of precision munitions early in a campaign
might produce less overall value under the proportionality analysis than had the
use been reserved for a later target in the campaign.
The customary rule of proportionality, more difficult to articulate than
necessity or discrimination, requires that the use of military force be
proportional to the legitimate military objective in view. This represents more
than simply the principle of war advocating only such force as is necessary to
attain the objective; it actually requires a balancing of anticipated military
advantage against anticipated damage caused. [n161] It essentially
prohibits the use of military force that creates collateral damage to civilians
or property, not otherwise legitimate targets, that is disproportionate to the
military value of the objective. [n162] As Roberts and Guelff point
out, this doctrine can refer to two different situations: first, the
proportionality of a belligerent response to a grievance (in this sense
proportionality provides a link between the jus ad bellum and jus in bello); and
second, "proportionality in relation to the adversary's military actions or to
the anticipated military value of one's own actions, including proportionality
in reprisals." [n163]
In the former sense of proportionality posed by Roberts and Guelff,
the massive coalition military operation in the 1991 Persian Gulf War would have
been disproportionate to an unlawful border incursion and then an immediate
retreat by the Iraqis. Though unlawful, such incursion could be remedied with
far less force. In the latter sense of proportionality, in response to the
opponent's military actions, the destruction of a hydroelectric dam in order to
eliminate a sniper perched on top would constitute an attack disproportionate to
the legitimate objective of eliminating the threat posed by the sniper. Though
the dam may be its own legitimate objective under certain circumstances, it is
not made legitimate simply as a means of achieving the destruction of a far less
Because of the difficulty of applying the principle of proportionality to
specific contexts in modern warfare, scholars and practitioners have devised
tests to assist those engaging in target selection and military operations
planning. One useful formulation for aerial combat has been advanced by Colonel
Gomez of the Spanish Air Force: "an aerial attack expected to cause civilian
casualties would be acceptable should it have the same degree of approval as a
similar action taking place over a part of the country's own territory under
enemy occupation, in which case the civilian casualties would be compatriots."
[n164] This formulation essentially asks the military planner to put
himself in the position of the enemy. Such an approach could be modified to
apply the principle of proportionality to space warfare. Gomez aptly attributes
the difficulty in applying the principle of proportionality to the subjectivity
involved in the application, and thus terms the principle the "Achilles heel of
the law of war." [n165]
Finally, the concept of humanity incorporates several concepts, including
that which is still called "chivalry." [n166] In practice, this
principle may not pose the urgency it once did in limiting armed
conflict because of the way the other principles have matured taking it into
account. This is particularly true of necessity and proportionality, as Colonel
Schmitt observes: "to the extent suffering is useless it is militarily
unnecessary and, because it offers no direct and concrete military advantage,
Nonetheless, the principle of humanity accounts for several efforts at
outlawing means and methods of warfare deemed to cause unnecessary suffering.
International law does not restrict belligerents from wounding or killing
opposing forces so that they will not fight back. It follows from this that once
a combatant is rendered hors de combat ("out of combat"), he is no longer a
legitimate target for further attack. Thus, while it is legitimate to wound a
combatant so as to render him hors de combat, means and methods of warfare
having the effect of exacerbating wounds that would render a combatant hors de
combat, are deemed "unnecessary." The principle has been applied over the
centuries to weapons from antiquity, and those developed more recently that have
been addressed through treaty instruments. These include poisoned weapons, [n168]
barbed weapons, small-caliber incendiary or explosive bullets, [n169]
expanding bullets, [n170] glass and other nondetectable
fragments, [n171] and most recently, blinding lasers. [n172]
In theory, prohibition of all of these weapons limits space war to the
extent that any of them might be delivered against human beings from or within
As the principle of military necessity must be balanced by humanitarian
concerns, some legal commentators note that humanitarian concerns must be
balanced against legitimate military needs as well. The jus in bello principles
presuppose that their application occurs in the midst of armed conflict-that is
"in bello"-and that in some cases States will accurately assert a legal right to
militarily subdue the other. [n173] This forces the law to assume a
pragmatic posture with respect to the goal that warfare remain humane. Thus,
Professor Green rightly observes,
since the law of armed conflict rests upon a judicious balance between military
operational needs and humanitarianism, and since the purpose of the
Geneva Law is the preservation of humanitarianism accompanied by respect for
civilians and the long-term interests of the parties to the conflict by reducing
the possibility of sentiments of revanchisme, application of humanitarian
principles does not override the needs of practical realism. Idealism and a
belief in humanitarianism must not result in an automatic rejection of military
needs or careless accusations of war crimes or crimes against humanity.
However, the assessment of military needs must always be made in good faith. [n174]
This is not to say that military necessity ever provides an authorization to
act (as the following example might incorrectly suggest: "the employment of
military force was authorized because doing so was militarily necessary"), but
simply to say that each of the customary law of war principles represent an
important limitation on means and methods of warfare while simultaneously
recognizing that warfare nonetheless persists in human experience. This fact
affects the content that the law invests into the term "humanity." This fact
further pragmatically presupposes that unless the law somehow accommodates
itself to such realities as the continued existence of war, States will ignore
it. One can recognize the existence of such accommodation by observing the
simple fact that unfettered humanitarianism does not characterize the law of
war. If it did, then not only would such "law" never have achieved the force of
law in the first place, [n175] but the jus in bello would prohibit all
means and methods of war for the simple reason that any one of them are apt to
produce suffering to some extent. Pure humanitarianism would prohibit all
suffering of any kind, as the law of war plainly does not. [n176] The
principles therefore require constant balancing and readjustment. Each
acts as a limit on permissible military activity so that no one principle
obliterates the other. [n177]
C. TREATY LAW
Without doubt, the easiest means of determining international law is by
reference to the explicit will of States as expressed in treaties. Though of
minimal value for ascertaining specific principles applicable to space warfare,
the relevant treaties do provide the general foundation from which a space law
of war will emerge. And, the four general principles of the law of war outlined
above, reinforced within this treaty law, will apply to armed conflict in any
combat environment. [n178]
A discussion of relevant treaty law restraining armed conflict would not be
complete without reference to several historical antecedents. The diplomatic
conferences producing the Hague and Geneva Conventions, and their progeny,
followed several modest attempts to codify the jus in bello. One such attempt,
reflected in the Lieber Code of 1863, so called for its author, Columbia
University professor Francis Lieber, governed the prosecution of war for the
Union Army during the American Civil War. Promulgated by President Lincoln as
General Order Number 100, the Lieber Code's 157 articles set forth standards for
the prosecution of the war and treatment of Confederate troops. [n179]
Though developed in the United States, the Lieber Code became widely
read as expressing an emerging international law relating to restrictions
imposed on combatants in armed conflict, [n180] and it "strongly
influenced the further codification of the laws of war and the adoption of
similar regulations by other States." [n181] Thus, in addition to
influencing the codification of subsequent treaty law, it became the model for
other countries, including Prussia in 1870, [n182] the Netherlands in
1871, France in 1877, Serbia in 1879, Spain in 1882, Portugal in 1890, and Italy
in 1896. [n183]
Eventually, the Geneva Convention of 1864, [n184] the Petersburg
Declaration of 1868, [n185] Protocol and Declaration of the Brussels
Conference of 1874, [n186] and the 1880 Oxford Manual of the Laws and
Customs of War [n187] took modest steps toward limiting the means and
methods of warfare as well as ameliorating the suffering they cause. In each
case, the restrictions on means and methods of war, as well as on treatment of
combatants and noncombatants, provided the foundation for the international
treaty norms still in force today.
1. Hague Conventions of 1899 (I-IV) and 1907 (I-XIV)
The conventions adopted in 1899 and 1907 at the Hague provide, to this day,
the backbone of international regulation governing the means and methods of
warfare. These eighteen treaties attempted to fulfil four main purposes: first,
they sought to identify those who may lawfully participate in war, and define
the duties and rights of those individuals; second, they sought to regulate
means and methods by which States could lawfully conduct warfare; third, they
sought to describe the conditions and manner under which belligerents could
bombard or besiege; and fourth, they sought to regulate truces,
capitulations and armistices, and the military government of occupied
Because the laws of war were among the earliest parts of international law to
be codified, [n189] it may seem that the original principles would
contribute little to the regulation of space combat. This is true only in part.
Though the Hague Conventions had nothing explicit to say about aerial warfare,
for example, several specific restrictions have been applied by extension. It is
no surprise that the Conventions contemplate the means and methods of warfare
then in existence. However, although nothing in the 1907 texts is directed
toward space operations, articulation of the jus in bello for space warfare will
require examination of the Hague Conventions-an examination analogous to that
undertaken for aerial warfare. Just as principles from the Conventions have been
stretched to limit means and methods of air war, a slightly broader reading of
the primary texts could establish the emergence of a generalized jus in bello
Significant provisions for airpower, and thus possibly for spacepower, are
the restrictions on bombardment contained within the fourth Convention
regulating land warfare, [n190] and the ninth Convention regulating
bombardment by naval forces. [n191] As with most of the documents
adopted by the 1907 conference, the Convention on land warfare was drafted using
terms and concepts from its 1899 predecessor. [n192] Both conferences
sought to limit the permissible scope of artillery fire and the "bombardment"
resulting therefrom. Although the ninth Convention only limited bombardment by
"naval forces," [n193] its second Article provided a list of authorized
targets, including "military works, military or naval establishments, depots of
arms or war materiel, workshops or plant which could be utilized for the needs
of the hostile fleet or army, and the ships of war in the harbor . . . ." [n194]
Because these targets were specifically excluded from the
Convention's prohibitions on bombardment, including its application to
"naval forces," it appears that the Convention recognizes that these targets
could be attacked by any forces-naval, terrestrial, aerial, or even space.
A second feature of significance, from the ninth Convention, relates to its
Article 2 and the concept of unavoidable collateral damage. After requisite
precautions have been taken by the attacker, including ascertaining the status
of the target, issuance of a summons followed by a reasonable time of waiting,
and failure by the local authorities to destroy the targets themselves, the
attacker is absolved of responsibility for "unavoidable damage." [n195]
Significantly, this places a burden to minimize collateral damage not only on
the attacker, but on the defender as well. Although reflected in subsequent
international instruments, this aspect of the law of war is increasingly
forgotten. In 1907 it was simply "realized that collateral civilian casualties
were regarded as the cost of war to a nation rather than the responsibility of
the attacker." [n196] This general principle will apply equally to
space warfare. Thus, belligerents employing military space assets that
constitute legitimate targets will be obliged to separate them from other
space objects not supporting the armed conflict.
In contrast to the ninth Convention on naval forces, the prohibition on
bombardment in the regulations annexed to the fourth Convention did not limit
itself to land forces. Reflecting the principle previously articulated in the
second 1899 convention, the fourth convention's general prohibition reads: "The
attack or bombardment, by whatever means, of towns, villages, dwellings, or
buildings which are undefended is prohibited." [n197] Although the
drafters of the Convention did not likely envision space warfare, this provision
raises three potential issues related to limitations on space warfare. First,
the specified targets require at a minimum that they be "defended" before making
them subject to attack. This was an early way of restating the principle of
military necessity. That is, unless a potential target was considered
significant enough to defend, it was not deemed significant enough to attack as
a legitimate objective.
A second issue raised by the bombardment prohibition relates to its scope.
Applicable to bombardment "by whatever means," the prohibition against attack of
undefended land targets restricts all bombardment of such targets, however or
wherever originated. Unless properly defended, the enumerated targets
were not to be engaged by land or sea forces. Given the expansive terms used by
the drafters, the prohibition could be interpreted to apply by extension to air
and space forces. [n198]
Finally, the prohibition implicitly recognizes that under proper conditions
certain targets are lawful. Thus, under the terms of the convention, one could
not state that towns, villages, dwellings, or buildings may never be lawful
targets. There were cases envisioned in which even towns filled with civilians
could be bombarded. Significantly however, the Convention did not state that a
potential target was legitimate simply because it was defended, only that
undefended targets were off limits. As a result, even a defended target may
still have been protected if it did not otherwise qualify as a legitimate
military objective. Just because a town full of civilians possessed armed
protection, it was not thereby rendered a legitimate target unless it sustained
an industrial or other function contributing to the prosecution of the conflict.
Chapter One of the regulations to the fourth Convention raises further
distinctions that would prove important to all subsequent law of war rules.
[n199] It defined the conditions under which one qualified as a
"belligerent" and thus protection as a "prisoner of war" if taken during the
course of hostilities. As listed previously, the regulations establish four
criteria defining a belligerent [n200] which designation could apply
not only to those in armies, but to militia members and those of volunteer corps
as well. Chapter One further specifies that the category "belligerents" may
include either combatants or non-combatants. [n201] As the term
suggests, combatants refer to those participating directly in the hostilities.
As a rule, members of a State's armed forces are combatants, with the two basic
exceptions being religious and medical personnel. These two categories of
military members, though members of the armed forces and otherwise entitled to
protection as "belligerents" or "prisoners of war," are non-combatants because
they may not participate directly in the use of force.
Even more basic than the distinction between "combatants" and
"non-combatants" was that between "combatants" and "civilians." [n202]
Civilians were viewed as a special class of "non-combatants" (unable to take
part in the hostilities), who were not "belligerents" (susceptible to
capture and incarceration as prisoners of war) either. Neither they nor their
property could be targeted directly as long as they retained their status as
"civilians." However, a final important category, "unlawful combatants" applies
to those non-combatants and civilians who are unauthorized to engage in
hostilities, but do so nonetheless. These individuals lose the protection they
would otherwise enjoy under the laws of war. As the 1977 Protocol (I) to the
Geneva Convention recognizes, unlawful combatants do not lose all humanitarian
protections, [n203] but they are not accorded "prisoner of war" status
if captured, and they face lawful penal consequences by the foreign belligerent
State for their unlawful participation in the conflict. [n204]
One additional category recognized by the Hague regulations merits
attention-spies. This class of participants to the conflict would include one
who, "acting clandestinely or on false pretenses, . . . obtains or endeavors to
obtain information in the zone of operations of a belligerent, with the
intention of communicating it to the hostile party." [n205] This does
not include soldiers who have penetrated the hostile force's zone of operations
for the purpose of obtaining information. [n206] As applied to space
warfare, this might mean that a combatant who enters an opposing spacecraft
cannot be considered a spy as long as his vessel bears its prescribed
distinctive markings, and the astronaut wears his military uniform. Because of
potentially damaging, serious effects that spies can have on a belligerent,
spies enjoy the least protection under international law and are the
most vulnerable if captured. Spies are not deemed prisoners of war and, subject
to various minimal due process protections, may be tried by hostile belligerents
for espionage. [n207] In the near future however, spying is unlikely to
become a significant issue for space warfare unless current trends toward
unmanned missions change course. For ground operations in support of space
warfare however, the traditional norms governing spying will apply. Thus, the
lawful disposition of a spy having infiltrated a satellite control center will
be no different than that for a spy operating elsewhere.
2. Geneva Conventions of 1949 (I-IV) and Protocols of 1977 (I-II)
The 1949 Geneva Conventions serve primarily as protection for individuals
suffering as a result of armed conflict. Those employing the term "humanitarian
law" as the preferred reference for the law of war, often seem to have the
Geneva Conventions principally in view. This follows from the simple observation
that the 1949 Conventions highlight the international interest in ensuring that
warfare respects the human person to the maximum possible extent. [n208]
During World War II, following numerous violations of the laws of war,
[n209] the world expressed great doubt that the laws of war would
ever truly protect either combatants or civilians. [n210] This sense
was expressed by Winston Churchill after the war: "The only direct measure of
defence on a great scale was to possess the power to inflict simultaneously upon
the enemy as much damage as he himself could inflict." [n211] This is
to say that the laws of war were no "defense" against the indiscriminate use of
force. Thus, to the extent that Churchill spoke for the general temper of his
time, compliance with the laws of war was simply viewed as incidental to the
prosecution of the war. If an international rule were adhered to, it was not for
respect of the "law," but because doing so afforded some military advantage.
Out of this pessimistic environment emerged the diplomatic conference in
Geneva, charged with limiting the harsh effects of war. Primarily concerned
as they are with amelioration of the suffering of war victims, the four
Geneva Conventions are only tangentially related to regulating the means and
methods of war. They represent, as has been said, "Geneva Law" related to
victims, and not "Hague Law" related to means and methods of warfare.
Nonetheless, several provisions do limit means and methods, specifically
Article 19 of the Geneva Convention (I) for the Amelioration of the Condition
of the Wounded and Sick in Armed Forces in the Field specifies that "Fixed
establishments and mobile medical units of the Medical Service may in no
circumstances be attacked, but shall at all times be respected and protected by
the Parties to the conflict." [n212] Under Article 22, this protection
for medical facilities applies even if the unit's personnel are armed, the unit
is protected by a fence or armed sentries, small arms and ammunition taken from
the wounded and sick remain in the unit, the unit's services include veterinary
care, or the unit extends care to civilian wounded or sick. [n213]
These provisions clearly remove medical facilities from the list of permissible
targets that belligerents may lawfully destroy. The fact that the prohibition
contemplates "no circumstances" under which such targets may be attacked,
signifies the comprehensive nature of the protection and forbids attack from any
combat environment, including space.
A similar provision can be found in Article 18 of the Geneva Convention (IV)
Relative to the Protection of Civilian Persons in Time of War: "Civilian
hospitals organized to give care to the wounded and sick, the infirm and
maternity cases, may in no circumstances be the object of attack, but shall at
all times be respected and protected by the Parties to the conflict." [n214]
Though this provision would also apply to space attacks, using the same
absolute ("no circumstances") language of convention (I), Article 18 goes a step
further by requiring belligerents to clearly mark civilian hospitals so that
they are "clearly visible to the enemy land, air, and naval forces in order to
obviate the possibility of any hostile action." [n215]
In addition to protection of medical facilities on the ground, Geneva Law
protects medical ships under the Geneva Convention (II) for the Amelioration of
the Condition of Wounded, Sick and Shipwrecked Members of Armed Forces
at Sea. Thus, Article 22 provides that such ships, "built or equipped by the
Powers specially and solely with a view to assisting the wounded, sick and
shipwrecked, to treating them and to transporting them, may in no circumstances
be attacked. . . ." [n216] Article 23 clarifies that such protection
extends to such support establishments ashore that may be protected under
Convention (I), [n217] and Article 28 protects the sick-bays aboard a
warship, even where fighting occurs on board the ship. [n218] These
provisions further restrict the potential methods of space warfare as all
protected facilities could in theory be attacked from space. [n219]
Motivated by continuing international conflicts, and particularly the
revitalized interest in the law of war following the Vietnam War,
nongovernmental organizations began arguing for a diplomatic conference to
update the law of war. This followed moves immediately after WWII by the
International Committee of the Red Cross (ICRC) attempting to restrict aerial
bombardment. This emphasis on the need to update the law of war continued
through the 1950s and 1960s. Following two significant U.N.G.A. Resolutions,
[n220] a diplomatic conference was convened in 1974 to draft new
The first of the two Protocols adopted by the conference pertained to
international armed conflicts and is, to the extent that any law of war treaties
will be relevant, more important for regulation of means and methods of space
warfare. Protocol II limits itself to the regulation of armed force in
"non-international armed conflicts," relates to the protection of victims of
"internal" or "civil" wars, and governs the protection of the victims of such
conflicts. [n221] Substantively, the provisions of Protocol II, which
are significantly fewer and "far less restrictive" [n222] than those of
Protocol I, supplement the provisions of common Article 3 of the Geneva
Conventions-the latter requiring that minimal protections be accorded the
victims of armed conflicts "not of an international character." [n223]
Traditionally, the customary law of war applied to non-international conflicts
only if the government of a country in which the insurrection occurred, or some
third State, chose to recognize the legal status of the insurgent
group. [n224] Because Protocol II, Article 1(2), excludes application
of its terms for "situations of internal disturbances and tensions, such as
riots, isolated and sporadic acts of violence and other acts of a similar
nature. . ." [n225] and such exclusions in the Geneva Conventions have
been the basis for governments routinely denying the application of common
Article 3, [n226] it is doubtful that Protocol II will have much impact
on the amelioration of human suffering caused by non-international armed
Potentially more important for the regulation of means and method of space
warfare are the provisions of Protocol I. Though formally a protocol to the
Geneva Conventions, Protocol I includes regulation of military activity
previously governed by "Hague Law." Despite the innovations worked by Protocol
I's positions on insurgents and reprisals, [n227] the United States
found its greatest difficulty with the general thrust of provisions
relating directly the conduct of military operations--Articles 48 to 58. [n228]
Those articles define, among other things, the basic rule of
distinction, [n229] the meaning of "attack," [n230] the
meaning of "civilians" and "civilian population," [n231] the rule
protecting civilian populations, [n232] the rule protecting civilian
objects, [n233] the rule protecting cultural objects and places of
worship, [n234] the rule protecting objects indispensable to the
survival of the civilian population, [n235] the rule protecting the
natural environment, [n236] the rule protecting works and installations
containing dangerous forces, [n237] the rule establishing necessary
precautions to be taken in the event of attack, [n238] and the rule
establishing precautions to be taken against the effects of attack. [n239]
As may now be obvious, all of these provisions affect the conduct of
space warfare insofar as each limits potential targets and restricts options
otherwise available to military space forces.
Perhaps the biggest concern raised by these provisions was the attempt to
return warfare to restricted means and methods of warfare "that [have] not been
seen in this century." [n240] Specifically, the cumulative effect of
these provisions worked to "shift the responsibility for the protection of the
civilian population away from the host nation (which has custody over its
civilian population, and which traditionally has borne the principal
responsibility for the safety of the civilian population) almost exclusively
onto the attacker." [n241] Two problems with this attempt at
burden-shifting arise. The first concerns the threat to State sovereignty in
cases amounting to self-defense. As the statement of France indicated in the
ICRC commentary to Article 48, had there been a separate vote on Article 48,
"France would have abstained inasmuch as it considered the article to have
'direct implications as regards a State's organization and conduct of defense
against an invader." [n242]
A second concern raised by the formulations of Protocol I is its apparent
failure to acknowledge that attacks are often taken as a reply to previous
aggression. [n243] In this regard, Allied strategic air operations over
Nazi Germany and the multinational march into North Korea in 1950 would have
been rendered militarily impotent had the restrictions of Protocol I applied.
The conduct of military operations against Iraq during the 1991 Gulf War
provides an additional example.
For these and other reasons as well, the Protocol attempts to restrict means
and methods of warfare, including aerial warfare, to an extent not acceptable to
a number of nations, without whose support the law of war can not properly
function. [n244] Given the denunciations by France and the United
States, the Protocol did not serve to limit warfare in either the 1991 Gulf War,
or the 1999 NATO air war against Yugoslavia, except to the extent it was viewed
as declaratory, in part, of customary law. Given the strongly-held conviction of
these two major airpower States, it is difficult to see Protocol I serving as a
meaningful formal limitation on aerial warfare, and thus space warfare, for the
foreseeable future. It will however, continue to raise political issues for the
U.S. as it engages in coalition warfare with allies having ratified the
3. Additional Conventions Adopted Since 1972 Affecting the Jus in Bello
Since the close of the diplomatic conference which adopted the Protocols to
the Geneva Conventions, additional conferences have adopted six principal
treaties (in some cases designated protocols to other treaties) affecting the
jus in bello. These include, in chronological order, treaties on Biological
Weapons, [n245] Environmental Modification, [n246]
Conventional Weapons, [n247] Chemical Weapons, [n248] Blinding
Lasers, [n249] and Anti-Personnel Mines. [n250] Of these, the
most likely to effect potential means and methods of space warfare is the
Environmental Modification Treaty.
This Treaty does not restrict the use of environmental modification
techniques for "peaceful purposes," [n251] but does proscribe the
"military or any other hostile use of environmental modification techniques
having widespread, long-lasting or severe effects as the means of destruction,
damage or injury to any other State Party." [n252] The Treaty is of
particular importance to space warfare in that "environmental modification
techniques" are defined to include "any technique for changing -- through the
deliberate manipulation of natural processes -- the dynamics, composition or
structure of the earth, including its biota, lithosphere, hydrosphere and
atmosphere, or of outer space." [n253]
The Treaty's provisions make clear that its purpose is not so much
environmental protection, as a restriction against States making or attempting
changes to environmental processes as an instrument of warfare. The means of
warfare prohibited by the Treaty need not adversely affect the
environment itself because the prohibitions of Article I apply only to the use
of the environment as a weapon. [n254] Further, though not incorporated
into the convention itself, the Parties attached a series of "Understandings" to
the Treaty, which, as part of the negotiating record, clarify terms used in the
text. The "Understanding Relating to Article II" includes a non-exhaustive list
of illustrative phenomena that could be caused by environmental modification
techniques. In addition to earthquakes, tsunamis, changes in weather patterns,
climate patterns, and ocean currents, these include changes in the state of the
ozone layer and changes in the state of the ionosphere. [n255] Although
all of these effects could be attempted from space, the latter two seem the most
likely possibilities. However, the restrictions established by this Treaty do
not seem applicable to any major weapons programs publicly reported to be now in
development. So long as space weapons do not change the outer space environment
"through the deliberate manipulation of natural processes," the treaty is not
likely to serve as a bar to the deployment or use of space weapons. [n256]
In addition to the Environmental Modification Treaty, the four protocols to
the Conventional Weapons Treaty limit the combat use of non-detectable
fragments; mines, booby-traps, and other devices; incendiary weapons; and
anti-optic lasers. The restriction on "mines, booby-traps, and other devices"
will not apply to space warfare as its terms apply only to those devices "on
land." [n257] Though of possible significance, the protocol restricting
use of incendiary devices seems unlikely to affect the development of means and
methods of space warfare unless States Parties develop such weapons to be
delivered from space. The protocol limiting use of blinding lasers will possibly
become relevant as the U.S. could employ such devices in space. [n258]
There is increasing interest in the use of lasers in combat, even those which
[*59] may cause incidental eye injury. [n259] However, rather than
applying these four rather specific provisions to space warfare, the more likely
course will entail development of further protocols to this Convention effecting
specific limits on conventional space weaponry.
4. Jus Ad Bellum Under the United Nations Charter
The Charter of the United Nations governs the very legitimacy of States' use
of force in the first place. As such, it is not formally part of the law of war
but rather forms part of the jus ad bellum. Nonetheless, because the Charter
governs the lawful use of force, its provisions are necessarily related to
considerations of how that force is used under the jus in bello. [n260]
The Charter is "two-faced," serving both as the constitutional document for
the United Nations organization itself, as well as providing substantive
principles of international law. [n261] The substantive provisions are
intended to advance the goals articulated in the Preamble of the Charter,
including among others, the creation of conditions for the maintenance of
international peace and security. [n262] This objective rests on the
proscription of the aggressive use of force, which finds expression in two
portions of the Charter, paragraph 2(4) and Chapter 7. [n263]
In this respect, the principal contribution of the U.N. Charter to the use of
military force is its authoritative articulation of the jus ad bellum. [n264]
The oft-cited provision of paragraph 2(4) enunciates the well-established
international legal principle [n265] prohibiting the use of force: "All
Members shall refrain in their international relations from the threat or use of
force against the territorial integrity or political independence of any state,
or in any other manner inconsistent with the Purposes of the United Nations."
[n266] Balancing this general proscription is the exception for
"self-defense" found in Article 51: "Nothing in the present Charter shall impair
the inherent right of individual or collective self-defense if an armed attack
occurs against a Member of the United Nations, until the Security Council has
taken measures necessary to maintain international peace and security. . . ."
[n267] Article 51 goes on to require member States to notify the
Security Council of any actions taken pursuant to this right of self-defense.
Of the many legal issues these two provisions raise, two of the most obvious
affect the use of force in outer space. First, what is the meaning of "threat or
use of force" in relation to outer space as contained in Article 2(4)? And
second, what is the meaning of "if an armed attack occurs" in Article 51? These
issues have been widely discussed in the scholarly literature and will be only
briefly addressed here.
Under Article 2(4), States may neither use force in the course of
their international relations, nor threaten it. Though widely ignored in State
practice, the Charter makes no distinction between the illegality of using force
and of threatening it. Ordinarily, the use of force follows a threat of it. In
such cases, the use of force gets all the legal analysis, and the threat, if
noticed at all, does not attract separate consideration as an independent
violation. [n268] In cases where the use of force does not accompany a
threat, the threat is not generally considered sufficient reason to take action.
Indeed, not only has the mere threat of force seldom led a State to protest the
matter under Article 2(4), but "state practice reveals a relatively high degree
of tolerance towards mere threats of force." [n269] Nonetheless, the
Charter's proscription remains. Given the fact that space warfare will require
new application of existing legal regimes, if not new regimes altogether, new
means and methods of using force will also give rise to new means of making
threats, including those from space.
Significantly, the Charter's focus on force rather than war reflects a
contemplated decision to outlaw all manner of armed conflict. Force is a broader
category than war. Thus the Charter prohibits all cases of armed force whether
or not the parties recognize a formal state of war between them. How States make
this formal recognition also varies from situation to situation and can be
difficult to ascertain. It ultimately depends upon either the issuance of a
declaration or ultimatum, or the occurrence of an "act of war." And yet even
what might constitute an act of war does not always initiate war. As professor
Green puts it, "whether the armed conflict amounts to a war in the
international legal sense of the term depends upon the reactions of the victim
of the attack and also, to some extent, upon the attitude of non-parties to the
Even more difficult historically than defining a state of war, has been the
attempt to determine what "force" the Charter prohibits given the many sources
of pressure nations may use in their relations with each other. It is now widely
agreed that such force does not include political or economic force, as well as
most forms of non-military physical force. [n271] Included in the
prohibition however, not only are cases of direct military force but indirect
force as well. Thus, the use of irregular forces, mercenaries, or the arming or
training of indigenous rebel forces against their own government would
constitute cases of indirect aggression prohibited by the Charter. [n272]
Regarding the latter however, the International Court of Justice clarified
in the Nicaragua v. United States judgment that not all forms of aid violate the
rule of Article 2(4), noting for example that the supply of funds to a rebel
force does not constitute "force." [n273] The potential implications of
this distinction for space support are far reaching as it will allow spacefaring
States to argue that the provision of information to insurgents, a principal
benefit of space assets, [n274] is more akin to the provision of money
than of arms.
Perhaps the biggest question with respect to the self-defense principle
embodied in Article 51 relates to the meaning of the phrase "if an armed attack
occurs." This seems to preclude the right to defend with arms, until an actual
armed attack has triggered the right. Thus, the phrase appears to rule out
"anticipatory" self-defense. [n275] As with the application of Article
2(4), nothing in Article 51 restricts the inherent right of self-defense,
[n276] to the use of force within earth's atmosphere. Although the
delegates to the diplomatic conference adopting the Charter in 1945 did not
likely have in mind the application of force from outer space, we have
subsequently learned that its rudimentary possibility was then under review by
the United States and Soviet Union. Nonetheless, as with the application of
numerous international instruments to new situations and technological
realities, there is no reason to exclude the terms of Articles 2(4) and 51 from
application in outer space. As discussed in the next chapter, the most
significant treaty on outer space specifically references the U.N. Charter.
One consequence of the right of self-defense is that the law does not
absolutely prohibit war; defensive wars that are undertaken pursuant to Article
51 are not illegal. [n277] However, recognizing the abstract rule is
relatively simple, applying it to a specific conflict is not.
Nonetheless, international law must assess the relative legal positions of
competing belligerents in order to sort out what relations exists between the
parties to the conflict, and to third party States. For example, although
parties to a conflict increasingly ignore the distinction between "war" and
other forms of armed conflict, [n278] the law does recognize that a
formal state of war [n279] will entail certain consequences that mere
armed conflict will not. [n280]
Lieutenant Colonel Michael N. Schmitt, USAF (1998)
Scholars have advanced numerous reasons for maintaining an international law
of armed conflict. [n122] At first glance, the creation of rules for
war-apparently the ultimate breakdown in order-seems ironic at best. [n123]
And [*29] yet although war is a breakdown with respect to peaceful
dispute resolution, it becomes the ultimate breakdown only if allowed by its
participants. War need not lead to anarchy or violent chaos, even though it
necessarily entails injury, killing, and death. [n124] Numerous
historical examples of military discipline displayed in combat show that the
participants in war can recognize order or, at the very least, a chain of
It is tautological to assert that effective warfare requires application of
efficient, ordered methods. Indeed when that form of order represented by the
law of war breaks down, the military effects can be disastrous. Colonel Charles
Dunlap quotes Richard Overy on the effects of Germany's disregard for the laws
of war in its conflict against the Soviets on the Eastern front.
[Such] criminalization of warfare produced a growing indiscipline and
demoralization among German forces themselves. The German army shot fifteen
thousand of their own number, the equivalence [sic] of a whole division . . . .
Desertion or refusal to obey orders increased as the war went on, and the law of
the jungle seeped into the military structure itself. [n125]
Many factors contributed to the Nazi defeat, but the German way of war
on the Eastern front failed at least in part because it became "disorderly."
Thus, advocacy for an efficient, effective military force can itself become an
argument for the laws of war, which will have the effect of reinforcing military
Whatever the reasons, warfare has attended the human race since the beginning
of recorded history. In reflecting on the phenomenon, theorists and scholars
have described the nature of warfare in a variety of ways. Some see it as the
logical and brutal extension of politics; [n127] others view warfare as
principally about deception and avoidance of the enemy's physical strengths. [n128]
However one conceives warfare, all agree that armed combat is an
event in which the battlefield reality is much worse that its mere description
might suggest. [n129] Because of this, the principled warrior
is the last to desire war; when given the discretion, he reserves it as a last
resort. Nonetheless, warfare has been a permanent fixture of the human race. As
one source puts it, "according to estimates based on the period from 3600 B.C.
until 1960, mankind has known only 292 years of universal peace, and in the
remaining 5268 years has faced 14,513 armed conflicts taking 1240 million human
lives." [n130] These statistics highlight the fact that for the sake of
preserving human life and international public order, one must accept,
however cynically, [n131] both the importance and relevance of the laws
A. Jus in Bello vs. Jus ad Bellum
When speaking of the various international norms limiting the prosecution of
war, scholars have historically distinguished between the jus in bello, or, the
laws regulating the conduct of States once armed conflict between them has
begun, [n132] and the jus ad bellum consisting of the law governing
resort to armed conflict. The former law applies to conflicts that the
belligerents themselves may not regard as "wars." [n133] The latter law
is of relatively recent origin and is expressed most authoritatively
in Article 2(4), and Chapter VII of the United Nations Charter. [n134]
Based on this distinction, Michael Walzer points out that the truly lawful war
must satisfy requirements under both legal regimes: "War is always judged twice,
first with reference to the reasons states have for fighting, secondly with
reference to the means they adopt." [n135] This two-part analysis leads
another publicist to distinguish between a war's "just cause and [its] just
Some authors conceive a conceptual framework in which the law of war concerns
itself principally with the jus in bello. Thus, Kalshoven writes "the laws of
war, or jus in bello, are those rules and principles of international law which
. . . govern the conduct of war." [n137] This is both the majority view
and the better view. By contrast, others prefer to speak of the law of war as
comprising both aspects. "The term 'laws of war' can have different meanings and
refers to both the rules governing resort to armed conflict (ius ad bellum) and
the rules governing the actual conduct of armed conflict (ius in bello)." [n138]
Because the term jus ad bellum more properly coincides with
phrases such as "the right of self-defense" and "resort to the use of force," it
should therefore be distinguished from "laws of war." Equating the jus in bello
with the phrase "laws of war" is not only a matter of historical convention, [n139]
but of logical application of law to war. Simply put, the jus
ad bellum is to be regarded as separate from the law of war because of the
"cardinal principle that jus in bello applies in cases of armed conflict
whether the conflict is lawful or unlawful in its inception under jus ad
B. Customary Principles within the Law of War
Given the misery left by warfare through the centuries, warring nations have
developed customary practices seeking to ameliorate its devastating effects. As
the customs of war have evolved into the customs and laws of war, the dominant
objective underlying the law as it relates to military force has remained
constant and can be summed up in one word: restraint. [n141] This was
perhaps best summarized for the fist time in an international instrument by
Article 22 of the Second Convention adopted by the 1899 Hague Peace Conference:
"The right of belligerents to adopt means of injuring the enemy is not
unlimited." [n142] As discussed below, the dominant concepts distilled
from the vast body of customary international law amount to very few; military
necessity, discrimination, proportionality, and humanity. [n143]
These principles, recognized in subsequent treaty law, limit the means and
methods available to belligerents for conducting armed conflicts, and thus each
demands restraint of the belligerent State. [n144] Because there are no
treaties establishing specific jus in bello principles for space combat, these
customary principles provide the most authoritative source, subject to the
specific principles of space law discussed in Chapters Four and Five, on which
the analysis of a jus in bello for space must proceed.
1. Military Necessity
Military necessity expresses the idea that for an attack to be lawful
belligerents must be able to show the connection between the attack, and the
suppression of the enemy's military capability. De Mulinen points out that
military necessity pertains to those measures: "(a) not forbidden by the law of
war; and (b) required to secure the overpowering of the enemy." [n145]
Implied in the restriction this principle imposes is the requirement that
attackers have identified the prospective target in advance of attack as one
that is militarily legitimate. Put otherwise, the attacker must be convinced
that attacking the target will contribute to the victory of his military
undertaking. As the quote at the head of this chapter suggests, the more capable
a belligerent is in properly identifying these militarily necessary targets, the
more responsibility it has in doing so.
Taken to its logical extreme, the principle of necessity could be used to
justify the very sorts of activity the laws of war prohibit. [n146] Any
argument taking the principle to this extreme commits two legal
errors. First, it fundamentally misinterprets the principle by failing to
recognize the sovereign freedom States have in the absence of legal
prohibition. [n147] Legally speaking, a State does not need concepts
like military necessity to justify its behavior in war provided such behavior is
otherwise compliant with applicable jus in bello restrictions. As Schmitt
emphasizes, "military necessity operates within this paradigm to prohibit acts
that are not militarily necessary; it is a principle of limitation, not
authorization. In its legal sense, military necessity justifies nothing." [n148]
Second, as with all of the customary principles underlying the
law of war, but especially military necessity, the concept must be balanced
against the others. The U.S. Air Force stresses this point in its manual on
the law of war:
IV. Space Warfare Under the Corpus Juris Spatialis
Even in the vast expanse of space it can be expected, further, that the host
of participants who will in the future seek to enjoy the many different
potential uses of this great resource will in countless ways, whether
deliberately or inadvertently, interfere with each other. [n281]
States Parties to the Treaty shall be guided by the principle of co-operation
and mutual assistance and shall conduct all their activities in outer space,
including the moon and other celestial bodies, with due regard to the
corresponding interests of all other States Parties to the Treaty. States
Parties to the Treaty shall pursue studies of outer space, including the moon
and other celestial bodies, and conduct exploration of them so as to avoid their
harmful contamination and also adverse changes in the environment of the Earth
resulting from the introduction of extraterrestrial matter and, where necessary,
shall adopt appropriate measures for this purpose. If a State party to the
Treaty has reason to believe that an activity or experiment planned by it or its
nationals in outer space, including the moon and other celestial bodies, would
cause potentially harmful interference with activities of other States Parties
in the peaceful exploration and use of outer space, including the moon and other
celestial bodies, it shall undertake appropriate international consultations
before proceeding with any such activity or experiment. [n327]
At the outset, one observes that Article IX, like most space law provisions,
makes no distinction between military and civilian activities. Thus, ordinarily
the requirements of Article IX apply fully to military operations in space. [n328]
One possible limitation for space warfare is suggested by the language
prohibiting "harmful contamination" of outer space, the moon, and celestial
bodies. Significantly, the provision applies only to "studies of outer space,
including the moon and other celestial bodies" and to the "exploration of
them." [n329] Thus, while "studies" and "exploration" would likely
apply to the testing and development of space weaponry, the restriction does not
seem logically applicable to the actual conduct of warfare. Unless by some
tenuous definition "warfare" could be brought within the modifying terms
"studies" and "exploration," it appears that State activities in
support of warfare, whether within space or in support of earth-based
hostilities, are not prohibited from causing "harmful contamination" under
Article IX. [n330] It also bears noting that activities triggering the
prohibition on harmful contamination, namely "studies" and "exploration," would
also have to avoid "adverse changes in the environment of the Earth resulting
from the introduction of extraterrestrial matter." [n331]
A potentially more significant point from Article IX relates to a State's
duty to engage in "international consultations" prior to engaging in activities
which the State "has reason to believe . . . would cause potentially harmful
interference with activities of other States Parties in the peaceful exploration
and use of outer space, . . ." It is not difficult to conceive scenarios in
which the use of armed force in space would potentially cause "harmful
interference" with other States Parties in their peaceful exploration and use of
space. Assuming the hostile act were lawfully directed at an asset in conformity
with the jus ad bellum, this requirement would not require consultation with the
opposing belligerent State as it would not be engaged in the "peaceful
exploration and use of outer space." However, it would require consultations
with any third party (neutral) State owning space assets that might foreseeably
be interfered with "harmfully." To the extent that a hostile act in space,
whether lawful or not, could harmfully interfere with a third party State's
asset, Article IX appears to require that the State must be consulted. Further,
unlike other space treaties and U.N. resolutions that leave the timing of such
consultations unclear, Article IX specifies that it must occur "before
proceeding with any such activity or experiment." This could create a
disincentive to carrying out an act of armed conflict as prior consultations
with a third party State could, by public dissemination or otherwise, constitute
a de facto notification to the opposing belligerent State of the anticipated
attack. Nonetheless, the Article IX does not stand in the way of carrying
through with such hostile acts once "consultations" have occurred, even if the
third-party State objects to the anticipated activity or experiment. As a
practical matter, though the Treaty requires it, one wonders whether
the international community even takes this consultation provision seriously
given that so far as is publicly known, no such consultation has ever been
undertaken since the adoption of the Outer Space Treaty in 1967. [n330]
With respect to military forces in space, the most significant provision from
the Outer Space Treaty appears in Article IV, which directly addresses the
militarization of outer space:
States Parties to the Treaty undertake not to place in orbit around the earth
any objects carrying nuclear weapons or any other kinds of weapons of mass
destruction, install such weapons on celestial bodies, or station such weapons
in outer space in any other manner.
The moon and other celestial bodies shall be used by all States Parties to the
Treaty exclusively for peaceful purposes. The establishment of military bases,
installations and fortifications, the testing of any type of weapons and the
conduct of military maneuvers on celestial bodies shall be forbidden. The use of
military personnel for scientific research or for any other peaceful purposes
shall not be prohibited. The use of any equipment or facility necessary for
peaceful exploration of the moon and other celestial bodies shall also not be
Among the myriad issues raised by this section, a perennial debate has
centered on the meaning of "peaceful purposes," the ambiguous term operating as
one of several limitations on State uses of outer space. Because of the
centrality of the phrase to questions of military uses of space, a historical
sense of its use in international parlance is necessary. When first used by the
U.S. in 1957, the "peaceful and scientific purposes" of outer space activities
soon became the official goal of the United Nations. By vote of 56 to 9 (15
abstentions), the U.N. adopted Resolution 1148 (XII) on November 14, 1957, which
advocated an inspection system to ensure the peaceful uses of space. "This was a
landmark document not only because it represented the first General Assembly
resolution on outer space but also because it introduced the phrase 'exclusively
for peaceful purposes' in an authoritative U.N. text." [n334]
Of course, simply using the term without definition does not fix its meaning.
Professor Vlasic reports that although the first wide-ranging debate on the
peaceful uses of outer space at the 13th session of the U.N.G.A. in 1958 saw
virtually all participants using the term "peaceful" as an antonym for
"military," the resolutions this session produced did not attempt "to interpret
or clarify the term 'peaceful' so commonly used in the context of
contemporary space activities." [n335] Significantly, although U.S.
President Eisenhower proposed by letter to Soviet Premier Bulganin in 1958 that
the U.S. and U.S.S.R. use outer space "only for peaceful purposes" and not for
"testing of missiles designed for military purposes," [n336] the
proposal was never consummated by agreement.
As discussed above, while the world community was debating the meaning of
terms such as "peaceful purposes," the U.S. and U.S.S.R. were secretly
developing satellite systems with clear military capabilities. Thus in the
period from late 1958 to 1959, the U.S. adopted the view that "'peaceful' in
relation to outer space activities was interpreted . . . to mean
'non-aggressive' rather than non-military. . . . By contrast, the Soviet Union
publicly took the view, despite its own military uses of space, that 'peaceful'
meant 'non-military' and that in consequence all military activities in outer
space were 'non-peaceful' and possibly illegal." [n337] This background
forms the context for use of the phrase in the Outer Space Treaty. Though the
Soviet Union and a number of other States consistently maintained the view that
"peaceful" means "non-military," the majority of the international community has
failed to agree. Consequently, the view "which today has gained general
acceptance, is that non-aggressive military uses are peaceful. Thus, 'peaceful'
has come to mean general space activity that is beneficial to and in the
interests of all countries." [n338] This is essentially the view
maintained by the U.S., which stresses that all States possess the inherent
right to defend against foreign aggression in outer space, as well as within
earth's atmosphere. [n339] Despite the long debate over the term
"peaceful" as used in the Outer Space Treaty, its meaning has been well-settled
through the practice of States and certainly includes military activities. [n340]
When assessing the meaning of a term in one treaty, it is instructive
to examine its meaning as used in other treaties as well. Other than the
"peaceful purposes" language contained in the Antarctic Treaty, discussed
below, [n341] the phrase appears more recently in the treaty governing
the International Space Station (ISS). Consistent with the Outer Space Treaty,
Article 1(1) of the ISS Agreement requires that uses of the ISS be reserved for
peaceful purposes. [n342] Interestingly, the ISS Agreement
seems to recognize the divergent interpretations of the phrase "peaceful
purposes." Article 9, paragraph 3(b) provides that "the Partner providing an
element shall determine whether a contemplated use of that element is for
peaceful purposes." [n343] In so agreeing, the Partners reasonably
concede that the likelihood of disagreement over the meaning of the term
justifies a provision stipulating who should determine its meaning. In this
case, each Partner decides for itself whether its proposed use constitutes a
This comes as no surprise. Absent cases referred to the International Court
of Justice, international obligations have often been subject to unilateral
interpretation. Using the ISS Agreement as a reference, it appears safe to
assert that unless an interpretation is so tenuous as to amount to bad faith,
the decision regarding a proper interpretation of "peaceful purposes" under the
Outer Space Treaty continues to rest with the party proposing the action.
Legally speaking, because "peaceful purposes" in the Outer Space Treaty is not
specifically defined it therefore may not mean the same thing as the identical
phrase in the ISS Agreement. Further, the self-interpretation provision of the
ISS Agreement applies only to the handful of States Parties to the ISS
Agreement, which are but a fraction of those States who are parties to the Outer
Space Treaty. Nonetheless, the meaning of a phrase in an international
instrument becomes most clear in light of action by its States Parties. With the
exception of China, the States most active in space are all members of the ISS
Agreement. How these States behave under their "peaceful purposes" obligations
in the ISS agreement will continue to illuminate the meaning of the phrase
A further point from Article IV regards the location to which the "peaceful
purposes" restriction applies. The second paragraph limits use of "celestial
bodies," including the moon, to peaceful purposes. This raises the question
whether the "peaceful purposes" limitation, whatever its meaning, applies away
from celestial bodies. Christol points out that though the Treaty uses "outer
space," "moon," and "celestial bodies" at numerous points and in various
combinations throughout the substantive articles, the omission of "outer
space" in Article IV, paragraph 2 was "clearly intentional." [n344]
While the term "outer space" as used in the Outer Space Treaty includes the moon
and "celestial bodies," [n345] the latter terms do not include within
them the meaning conveyed by "outer space." Christol articulates the negotiating
history of the Treaty and points out that though several States within COPUOS
objected to the omission of "outer space" from Article IV, paragraph 2,
given the clear implication that this would permit non-peaceful purposes for
outer space, the view of the U.S. and U.S.S.R. that the term "peaceful purposes"
should apply only to the moon and celestial bodies won the day. [n346]
As such, the restriction does not formally apply to space activities away from
celestial bodies. [n347]
Nonetheless, though Article IV, paragraph 2 does not prohibit the
non-peaceful use of outer space away from celestial bodies, such uses are
nonetheless implicitly prohibited by other provisions. For example, at least to
the extent that "non-peaceful" means the aggressive use of force, such uses are
prohibited by the U.N. Charter's provision to the contrary. [n348]
Because the Outer Space Treaty restricts State activities in space to those "in
accordance with international law, including the Charter of the United
Nations," [n349] an aggressive use of force forbidden on earth is
equally forbidden in space. Further, some States such as the U.S. have made the
"peaceful" uses of outer space a tenet of national policy. Thus, the 1958
National Aeronautics and Space Act maintains that "activities in space should be
devoted to peaceful purposes for the benefit of all mankind." [n350]
This was reiterated recently in the President's National Space Policy wherein
the White House declared "The United States is committed to the exploration and
use of outer space by all nations for peaceful purposes and for the benefit of
all humanity." [n351]
A further point under Article IV relates to the legal permissibility
of satellite interceptors or anti-satellite (ASATs) satellites. ASATs deviate
from the non-aggressive character of virtually all other satellites, and in so
doing may appear to violate the non-aggressive mandate required of all space
activities under the "peaceful purposes" restriction. However, regardless of
their putative "destabilizing" character for international peace and security,
[n352] the Outer Space Treaty does not prohibit the
transiting, or even the orbiting, of conventional weaponry in space, including
ASATs. The prohibition on orbiting of weapons of mass destruction, including
nuclear weapons, [n353] strongly suggests the distinction between those
weapons, and conventional weapons of lesser destructive power, including those
directed at satellites. Though Article IV(1) could easily be modified to effect
the de-weaponization of space, [n354] conventional weapons are not
A final point from the Outer Space Treaty relates to the prohibition on the
establishment of "military bases, installations and fortifications, the testing
of any type of weapons and the conduct of military maneuvers on celestial
bodies." Though this clause does not include the "moon" as does the one
immediately preceding it, it is clear that the Outer Space Treaty uses
"celestial bodies" as a phrase which includes the moon. Thus the first sentence
of Article IV(2) speaks of the moon "and other celestial bodies." (emphasis
added) As a result, Article IV can reasonably be read to prohibit both the
creation of permanent military structures on the moon or other celestial bodies,
as well as the testing of weapons there. Though non-nuclear weapons testing is
not prohibited in outer space, [n356] it cannot occur on celestial
bodies. Such prohibition could well have been in response to published reports
of the U.S. moon base program. In a January 21, 1958 speech about a planned
military outpost on the far side of the moon, Brigadier General Homer A. Boushey
The moon provides a retaliation base of unequaled advantage. If we had a base on
the moon, the Soviets must launch an overwhelming nuclear attack toward the
moon from Russia two to two-and-one-half days prior to attacking the continental
U.S.--and such launchings could not escape detection--or Russia could attack the
continental U.S. first, only and inevitably to receive, from the moon--some 48
hours later--sure and massive destruction. [n357]
Whatever its strategic value, such a proposal today would be clearly prohibited
by the Outer Space Treaty.
2. Agreement on the Rescue of Astronauts, the Return of Astronauts and the
Return of Objects Launched into Outer Space (Rescue and Return Agreement)--1968
Adopted in time for the imminent manned moon launchings of the United States,
the so-called "Rescue and Return Agreement" [n358] sought to clarify
the duties of States relating to astronauts and objects launched into
space. [n359] Though it appears that space warfare in the foreseeable
future will rely primarily on unmanned space activities, the Agreement's
provisions on objects as well as those on astronauts will be relevant as a
limitation on means and methods of space warfare. The Agreement is essentially
an expansion of Article V of the Outer Space Treaty which required States
Parties to regard astronauts as "envoys of mankind" entitled to "all possible
assistance." Divided into provisions dealing with the return of Astronauts
(Articles 1-4) and the return of space objects (Article 5), the treaty had been
adopted by ratification, accession, or succession by eighty-four States as of
1997, including the U.S. and U.S.S.R. [n360]
Regarding astronauts, the Agreement requires a State Party to make two
notifications. It must either notify the launching authority or make a public
announcement, and notify the U.N. Secretary General [n361] under three
conditions: when it receives information or discovers that the personnel of a
spacecraft have (1) suffered accident; (2) experienced conditions of distress;
or (3) made an emergency or intended landing on territory under its
jurisdiction, on the high seas, or on any other place not under any State's
jurisdiction. [n362] Further, the Agreement requires the provision of
"rescue" and "all necessary assistance" by States Parties in cases where
astronauts land in their territory by reason of "accident, distress, emergency,
or unintended landing." [n363] This assistance is equally
mandatory for landings on the high seas or other places not under the
jurisdiction of any States, but only for those Contracting States "in a position
to do so . . . if necessary." [n364]
With respect to "space objects," a term undefined by this or any other
space treaty, [n365] the Agreement requires that notification be made
to the launching authority following discovery of any space object within the
territory of a contracting party, on the high seas, or any other place not under
the jurisdiction of any State. [n366] The treaty further requires that
upon furnishing "identifying data," States Parties "shall" return space objects
found beyond the territorial limits of the launching state. [n367]
However, while this provision would certainly require the return of space
weaponry or satellites having landed back on earth, it does not specify when
such return must take place or in exactly what condition. Presumably, the treaty
requires return within a reasonable time, though that could perhaps occur after
a thorough inspection and analysis of the space object by the State possessing
it. Because the treaty makes no distinction between civil and military
astronauts or launchings, its terms apply equally to astronauts and space
objects used for both purposes.
A significant issue arose in 1978 pertaining to the reentry of a
nuclear-powered ocean reconnaissance satellite owned and operated by the Soviet
Union--Cosmos 954. [n368] On January 24, 1978 the satellite crashed in
Canada's Northwest Territories. According to the diplomatic exchanges following
the incident, the U.S. offered assistance "within 15 minutes." [n369]
After some delay, Canada accepted the U.S. offer of assistance but
declined the Soviet offer. [n370] Instrumental in the exchanges was the
language of Article 5(2). Though it required Canada to "take such steps as it
finds practicable to recover the object or component parts," the treaty allowed
for Soviet assistance only "if requested." [n371] Because Canada never
made the request, the Soviet Union had no right to search for its property on
Canadian soil (and thus protect it from discovery by the West).
Though intended as a clarification of the Outer Space Treaty, the Rescue and
Return Agreement raises as many questions as it answers. One commonly raised
question pertains the possibility that an astronaut landing in the territory of
another State Party may wish to request political asylum. Though Article 4 does
not seem to allow for this possibility, ("shall be safely and promptly
returned"), [n372] other principles of international law contained in
the U.N. Charter and Universal Declaration of Human Rights do. Though a few
States took the position that the treaty did not extinguish the right to request
asylum in connection with an unintended landing from space, [n373] most
States, including the U.S., rejected this position and maintained that the
treaty created a specific exception to the asylum rules. [n374]
Other questions raised by ambiguities in the Agreement include the following:
"How should rescue expenses be treated? Is the launching state obligated to
reimburse the rescuing state? What if a rescue attempt is bungled--will the
rescuing state be liable, or does some sort of Good Samaritan principle apply?
Should there be such a principle, since rescue is mandatory?" [n375]
Though the treaty requires rescues for astronauts, it does not specify who pays
for the rescue operation or in what proportion, unlike the case respecting
searches for space objects under Article 5, and the subsequent Liability
Convention. [n376] The answers to each of these questions could affect
the evolution of space warfare as States make wartime decisions in
light of possible liability. The potentially significant issue of whether the
Rescue and Return Agreement mandates return of astronauts in time of war is
discussed in Part VI. [n377]
3. Convention on the International Liability for Damage Caused by Space
Objects (Liability Convention)--1972
The longest of the space treaties at 28 articles, the Liability Convention
takes as its goal an elaboration of "effective international rules and
procedures concerning liability for damage caused by space objects and to
ensure, in particular, the prompt payment under the terms of this Convention of
a full and equitable measure of compensation to victims of such damage."
[n378] As with the Rescue and Return Agreement, the Liability
Convention undertook an expansion of the Outer Space Treaty, in this case
Article VII, which made a launching State "internationally liable for damage to
another State Party to the Treaty or to its natural or juridical persons" for
damage caused by its space objects. [n379] With a few exceptions, the
Liability Convention is likely to have only a tangential relationship to the
regulation of space warfare.
The Convention sets up a two-tiered structure of liability. For damage caused
by a space object on the surface of the earth or to an aircraft in flight, the
launching State [n380] is "absolutely liable." [n381]
Otherwise, the Convention provides fault-based liability "in the event
of damage being caused elsewhere than on the surface of the earth to a space
object of one launching State or to persons or property on board such a space
object by a space object of another launching State . . ." [n382] As
with all other space treaties, the Liability Convention makes no distinction
between civilian and military space objects which could form the basis of a
claim. Thus, not only military operations short of armed conflict, but space
operations during war itself could form the basis of monetary claims under the
Convention, provided the space object [n383] of the launching State
caused "damage." Because the Convention defines the term broadly, to include
"loss of life, personal injury or other impairment of health; or loss of or
damage to property of States or of persons, natural or juridical, or property of
international intergovernmental organizations," [n384] just about any
damage directly caused by the space object will be compensable.
Other provisions establish the principle of joint and several liability;
[n385] apportionment of liability for joint launchings; [n386]
conditions under which a launching State may be exonerated from absolute
liability; [n387] exclusions of liability; [n388] priority of
presenting claims between a State on behalf of itself or national, territorial
States on behalf of non-nationals, and State of residency of victims; [n389]
a one-year statute of limitations from the date of occurrence,
identification of the launching state, or acquisition of facts by the injured
State putting it on notice of the damage; [n390] and the availability
of domestic remedies. [n391] Following this, the Convention provides
seven articles on the establishment, compositions, and procedure of a "claims
commission" for the adjudication of claims made under the convention. [n392]
Though widely hailed as creating an equitable procedure for the resolution
of liability claims, one of the Convention's "most publicized" defects was the
failure to require that Claims Commission decisions would automatically bind
Whether the Liability Convention has succeeded in achieving its goals remains
to be seen. Though the Convention has specified a liability regime, it has never
been used and thus cannot be judged "effective." The Cosmos 954 incident would
have provided the first case study. However though it paid $ 3,000,000 of the
Canadian $ 6,000,000 claim, the Soviet Union refused to engage in legal
argumentation over the Convention's terms. Though the Convention does establish
the international standard for compensation, and fixes the level of liability
based on the spatial area in which the damage occurred, it is unlikely to affect
a State's decision to use of force in space, or the selection of means and
4. Convention on Registration of Objects Launched into Outer Space
The Registration Convention establishes a mandatory system of registration
for space objects launched into orbit and beyond. [n394] With reference
to the Convention's preamble, one commentator cites two essential functions
served by an international registration requirement: "(1) a well-ordered,
complete and informative register would minimize the likelihood and even the
suspicion of weapons of mass destruction being furtively put into orbit; (2)
it is not possible to identify a spacecraft that has caused damage without an
international system of registration." [n395] Though the conclusion
stated in the first point above seems overly optimistic, especially given the
late reporting allowed under the Registration Convention, the second appears to
be beyond question.
As with the previous two treaties discussed, the Registration Convention also
clarifies a provision from the Outer Space Treaty. When establishing the
principle that a launching State maintains jurisdiction and control in
space over its launched objects, the Outer Space Treaty makes reference to the
"registry" of States Parties. [n396] Only in the 1975 Registration
Convention did space law formally specify the requirement that States maintain a
registry, [n397] and the nature of its contents.
After defining "launching state," "space object," and "State of registry,"
[n398] the Convention provides that each State will maintain an
"appropriate registry" that contains an entry for all space objects "launched
into earth orbit or beyond." [n399] The Convention allows each State to
determine the specific contents of its registry and the conditions under which
it is maintained, [n400] however certain information must be provided
for the registry kept by the United Nations Secretary General. Thus, the "heart"
of the Convention, Article IV, specifies that launching States must provide the
(a) name of launching State or States;
(b) an appropriate designator of the space object or its registration number; [n401]
(c) date and territory or location of launch;
(d) basic orbital parameters, including:
(i) nodal period, [n402]
(ii) inclination, [n403]
(iii) apogee, [n404]
(iv) perigee; [n405]
(e) general function of the space object. [n406]
With respect to military launches, the Convention allows registry
notifications to be sufficiently ambiguous so as to mask the true nature of the
mission. The following two provisions of Article IV make this especially so:
First, the fact that the information need only be provided "as soon as
practicable," which launching States may and do interpret as weeks or months
following the launch; [n407] and second, the fact that only the
"general function" of the space object need be disclosed -- a phrase
interpreted, again, by the launching State. The room for ambiguity afforded by
the Convention allows States to protect the identity of their military
satellites, which perform an entirely legitimate function under the law. [n408]
Writing euphemistically, Professor Diederiks-Verschoor observes
that "the underlying reason for the reluctance [to provide specific information
on reconnaissance satellites] is that States do not trust each
other." [n409] She opines that a State's disclosure of spy satellite
data to "the fullest possible" extent, with due regard to its national security
interests, will perhaps allow registration to "overcome the suspicion barrier."
[n410] The problem with this understandably hopeful analysis, is that
it overlooks the central point of a spy satellite--acquisition of information
without the subject State's knowledge. Once its existence and characteristics
are published, its effectiveness as a instrument for spying diminishes. What
Diederiks-Verschoor and other authors seem to be suggesting with this type of
analysis is that space reconnaissance activities should simply be outlawed.
Though that is a question beyond the scope of this review, it suffices to say
that such activities have been recognized as lawful for decades and likely will
for the foreseeable future. [n411]
5. Agreement Governing the Activities of States on the Moon and other
Celestial Bodies (Moon Agreement)--1979
Of the five multilateral treaties devoted entirely to space, the Moon
Agreement [n412] is the most recent and enjoys the least support.
[n413] Additionally, the Agreement sheds little light on the
international legal regime restricting space warfare beyond that contained in
previous treaties. As a result, the Agreement is marginally relevant for
international space law in general, and the military uses of space in
particular. Nonetheless, the Agreement does contain provisions that could impact
space warfare as persuasive authority for the creation of future international
legal obligations on non-parties.
The Agreement reiterates for the moon many of the principles found in the
Outer Space Treaty including the notions of "province of all mankind," [n414]
exploration and use carried out for the "benefit and interests
of all countries," [n415] the fact that the moon is "not subject to
national appropriation by any claim of sovereignty, by means of use or
occupation, or by any other means," [n416] and retention by
States Parties of "jurisdiction and control" over their personnel and space
vehicles. [n417] Further, as with the Outer Space Treaty, the Moon
Agreement requires that all activities on the moon be carried out in accord with
"international law," [n418] and that States bear "international
responsibility for national activity" on the moon. [n419] Finally, both
treaties specify that all stations, installations, equipment, and space vehicles
"shall be open" to the other States Parties. [n420]
The Agreement applies not only to the moon, but to "other celestial bodies
within the solar system, other than the earth." [n421] Though
"celestial bodies" is nowhere defined in any of the space conventions, it would
presumably include all planets, asteroids, and comets found within earth's solar
system. This is suggested by the Agreement's exclusion from its scope of any
"extraterrestrial materials which reach the surface of the earth by natural
means." [n422] Significantly, the Agreement authorizes removal from the
moon of "samples" of "mineral and other substances." [n423] Though
debate continues on the permissibility and propriety of harvesting lunar
resources, there is no moratorium on doing so given the lack of support for the
Moon Agreement. [n424]
Regarding military activity, the Agreement forbids the placement of
weapons of mass destruction, including nuclear weapons, on the moon itself, in
orbit around the moon, or on trajectories to and around the moon, and on other
celestial bodies. [n425] Further, the Agreement's military provisions
do not prohibit the placement of weapons in outer space in general, only weapons
of mass destruction. The Agreement's language pertaining to military usage does
however largely mirror Article IV of the Outer Space Treaty. Requiring that the
use of the moon be "exclusively for peaceful purposes," the Moon Agreement
continues "any threat or use of force or any other hostile act or threat of
hostile act on the moon is prohibited." [n426] Given the fact that
the Agreement already specified that activity on the moon must occur pursuant to
international law, and the provision on the "threat or use of force" simply
parrots the language of Article 2(4) under the U.N. Charter, one wonders why
this language was necessary. The reference to "any other hostile act or threat
of hostile act" was new in 1979, suggesting that under the Moon Agreement a
"peaceful" use will be a non-hostile use.
Perhaps the most significant feature of the Agreement of an enduring
character is its articulation of the "common heritage of mankind" concept.
Article 11 begins: "The moon and its natural resources are the common heritage
of mankind." [n427] Though articulated within the U.N. in the 1960s,
[n428] the common heritage of mankind (hereinafter CHM) principle found
its first expression of a legally binding character in the Moon Agreement.
Though not equivalent to the "province of mankind" language found in the Outer
Space Treaty, [n429] the CHM principle bears some
similarities. According to Jasentuliyana, the CHM theory has a specific meaning
when applied to the Moon Agreement and identifies five characteristics for
territory designated as such: (1) it is not subject to State appropriation; (2)
it is jointly managed by all States; (3) all States should equitably share in
the benefits reaped from the exploitation of the resources of the areas; (4) the
areas must be dedicated exclusively to peaceful purposes; and (5) the CHM should
be conserved for future generations. [n430]
Throughout its history, the CHM principle in international law has
proven controversial. For the developing States, the concept as applied to
space is an important protection against the "first-come-first-served" approach
taken by the spacefaring States. For those States active in space, particularly
Western States desirous of stimulating private investment, the concept is a
threat to the economical exploitation of space resources. The attempt to
institute a legal regime based on an (undefined) "equitable sharing" of the
moon's natural resources creates uncertainty, which, in turn, stifles commercial
interest. This problem is particularly acute given the Agreement's specification
that the proposed international regime to govern exploitation of the moon's
resources [n431] is to be established "as such exploitation is about to
become feasible." [n432] Uncertainty over the terms of an international
regime was largely responsible for the U.S. decision not to sign the Moon
Agreement. [n433] Ultimately, the conclusion reaches by Reynolds &
Merges appears plausible: "absent adoption by the major space powers,
the Moon treaty is unlikely to play a major role in the future." [n434]
M.S. McDougal, H.D. Laswell & I.A. Vlasic (1963)
With the exception of environmental protection, no major category of
international law is of more recent origin than that devoted to outer space.
[n282] Given its recent origin, and the fact that it is predominantly
driven by technological advances in the exploration and use of space, space law
is a discipline in transition--additional norms continue to emerge as space
technology advances. 'Space law' is defined as that comprising "all
international and national legal rules and principles which govern the
exploration and use of outer space by States, international organizations,
private persons and companies." [n283] Significantly, this broad
definition reflects the rise of national legislation governing outer space
activity, as well as of non-State actors in the increasingly commercialized and
privatized space industry.
Despite its relative recency, literally "thousands of articles, studies, and
books have been published on the subject of space law." [n284] Indeed,
several of these appeared before 1957, the year human activity within outer
space began. [n285] Thus, while it is a recent phenomenon,
space law today is a firmly established discipline resting essentially on five
multilateral treaties. As used here, these five treaties comprise the "corpus
juris spatialis" while "space law" includes prescriptive norms from other
treaties as well, including those discussed in Chapter Five. Before analyzing
the textual bases of space law it is important to note its several distinctive
features. These are important to the application of existing space law to armed
conflict in space.
One notable feature in the continuing development of international space law
is its use, by analogy, of norms drawn from other branches of international law.
Because this feature of space law is explained more fully below, only a brief
reference to it will be made here. [n286] The progressive development
of space law has not emerged in a legal vacuum. "There is, in certain respects,
a catena of notions which justifies a comparison between the concepts applicable
to outer space with those of other environments." [n287] Specifically,
in establishing an early framework for space activities, "lawmakers were able to
borrow from existing principles of international law, including analogies from
international maritime law, the Antarctic Treaty, and the Partial Test Ban
Treaty." [n288] From use of these analogies space law is able to draw
specific conclusions. For example, one commentator cites the legal propriety of
spying from space as having emerged by reference to the law of the sea. "Since
outer space is beyond State sovereignty, as are the high seas, and as espionage
from (or over) the latter is generally accepted as being a legal activity, it
has been concluded that espionage from outer space is also legal." [n289]
Others have accurately speculated on this basis that military spacecraft
will be allowed to enter the territory of other States only upon special
authorization, just as is the case with military aircraft. [n290] As it
has for over forty years, the principle of analogy will continue to play an
important role in the evolution of space law.
Another important feature of space law derives from the permissive nature of
public international law in general. [n291] A specific example
illustrates the point. Because space law prohibits only the stationing of
weapons of mass destruction in orbit around the earth, States may orbit
weapons of lesser destructive capability for the simple reason that no
specific prohibition exists. [n292] In addition, States are free to
make full use of military reconnaissance satellites given the absence of
international prohibitions on such activity.
A third feature of international space law also flows from the general nature
of public international law as well. International space law regulates the
conduct of States. As distinguished from "Astrolaw," [n293] space law
is limited to "the regulation of those activities by States in outer space which
are, by nature, essentially international." [n294] This remains true
despite the rise of both public and private efforts at commercialization of
space. While international agreements will increasingly recognize the presence
of private interests in space, the dominant actors, with respect to
international legal rights and obligations, will continue to be States.
A. Customary Law
To the extent customary law exists for space law at all, it binds all States
whether their consent be express or implied by silence in the face of emerging
legal norms. [n296] Yet what little customary law for space there is
has been derived from the activity of very few States. [n297]
Because of this, and because of the increasing role of treaties both in
international law in general and space law in particular, "customary law is of
far lesser importance and its significance for outer space activities has, in
many respects, not been secured." [n298] This is perhaps yet another
function of the youth of space law relative to more established branches of
international law--there simply has not been sufficient time and widespread
uniformity for customary law to crystallize.
This consideration of customary space law raises two issues regarding the
necessary preconditions for its creation. These merit some discussion here
because the formation of limits to means and methods of space warfare will
likely emerge via customary international law. [n299] First, the time
needed for a custom to evolve into law may be very short, leading some to
minimize the importance of widespread State practice. Although space research
and development had gone on for over a decade, it was not until the launch of
Sputnik I in 1957 that international agreement emerged on basic principles that
should govern outer space activity. With respect to the principle of freedom of
use and exploration of space, that agreement came almost immediately following
the launch of Sputnik I. Because the agreement was largely based on
the practice of only two States, [n300] Professor Cheng went so far as
to suggest the emergence of "instant" customary law. [n301]
However, while it is no longer true that a rule of customary law may be
established only after decades of uniform practice by States, at a minimum
customary law requires the existence of a custom if only to retain a semantic
integrity for the term "customary law." More substantively, international law
still requires that customary law involve the passage of some time. Thus,
writing after the appearance of Professor Cheng's 1965 article, the
International Court of Justice enunciated in a 1969 case that, though the time
element may be short, it is nonetheless "indispensable" to the formation of
customary law. [n302] Later still, in the 1986 Nicaragua (Merits) case,
the Court implicitly rejected the notion of instant customary law by employing
the following reasoning:
The mere fact States declare their recognition of certain rules is not
sufficient for the court to consider these as being part of customary
international law. . . . Bound as it is by Article 38 of the Statute . . . the
Court must satisfy itself that the existence of the rule in the opinio iuris of
States is confirmed by practice. [n303]
By extension, this means there can be no customary law without confirmation of
the rule in State practice. As the Court observed, such confirmation cannot come
simply by means of declaration, devoid of State practice in space and time. The
fact that customary law cannot crystallize without the passage of time
underscores the preeminent place that treaties will play, at least for the
foreseeable future, in the articulation of space law.
A second issue related to customary space law pertains to the status of
States "specially affected" by an emerging norm under consideration.
International law requires that for the norm to crystallize into customary law,
its status as law must enjoy, at minimum, the acquiescence, if not the outright
consent, of States specially affected by the norm in question. Again, the
International Court of Justice addressed this requirement in its North Sea
Continental Shelf judgments,
with respect to the other elements usually regarded as necessary before a
conventional rule can be considered to have become a general rule of
international law, it might be that, even without the passage of any
considerable period of time, a very widespread and representative participation
in the convention might suffice of itself, provided it included that of States
whose interests were specially affected. [n304] (emphasis added)
Although not adopted universally as a condition sine qua non for the
crystallization of customary norms, the idea was emerging even before the 1969
North Sea Continental Shelf judgments that specially affected States
must act consistent with an emerging custom for it to become law. Thus
assuming here that we are confronted with the creation of new international law
by custom, what matters is not so much the number of states participating in its
creation and the length of the period within which that change takes place, as
the relative importance, in any particular sphere, of states inaugurating the
Today, although a mere paper protest would not appear to obstruct the formation
of customary law, an interested State's continuous and resolute actual practice
to the contrary would. In this way, a persistent objector, if "specially
affected" by the norm under development, could frustrate the crystallization of
such norm. [n306] And, difficult as it may be to ascertain State
practice for such analyses, the North Sea cases showed that this process of
discovery requires examination of factual circumstances in great detail.
The number of States actively engaged in space activities is steadily
growing. However, for now the total number likely to be deemed "specially
affected" remains small, perhaps six to ten. [n307] This
interest makes these spacefaring States important bellwethers for the
development of customary law related to space warfare. To the extent these
States persistently object to a would-be space norm, it cannot become
customary law. [n308]
Though custom does not appear to be of great importance presently, the
consensus has developed that a few principles of customary international law
apply to space activities. These include the "essential principles of the Outer
Space Treaty which have been accepted by all States active in outer space by
practice and with opinio juris after ratification, and where no evidence of
dissenting practice on the part of non-ratifying States is available."
[n309] Specifically, these principles include the freedom of
exploration and use of outer space by all States, and the prohibition on
national appropriation of outer space. [n310]
Because these customary principles are codified in the Outer Space Treaty, [n311]
and the treaty has been ratified by all States currently active
in space, customary international law seems less important in ascertaining
principles applicable to future space warfare. Customary law pertaining to outer
space activities is for the most part a subset of treaty law. [n312]
However, the body of customary law pertaining to space will assume
much greater importance as non-parties to the relevant space treaties become
active in space activities. For example, should Colombia, Iran, Indonesia, or
Yugoslavia acquire the means of space launch in the coming years, all four being
non-parties to the Outer Space Treaty, any restrictions on such States' space
activity that do not come from obligations imposed by other space treaties
[n313] will occur largely by operation of customary
international law. Should any of these States later ratify the Treaty, the
binding effect of that customary law reflected in the Treaty would become far
B. Treaty Law
In terms of certainty and specificity, treaties form the core of modern
international law. This is especially true of space law in general and the
corpus juris spatialis in particular, neither of which, as discussed above, has
existed long enough to provide consensus on any but the most basic principles of
customary law. Though in some cases restatements of customary international
law, [n314] outer space treaties have largely created new law. Of the
treaties discussed below, agreement came as a direct result of the United
Nations Committee on the Peaceful Uses of Outer Space (hereinafter COPUOS).
[n315] Comprising the corpus juris spatialis, these treaties deal
specifically and directly with the legal regime governing outer space.
1. Treaty on Principles Governing the Activities of States in the
Exploration and Use of Outer Space, Including the Moon and Other Celestial
Bodies (Outer Space Treaty)--1967
It is difficult to overstate the preeminent place in space law enjoyed by the
first international treaty governing outer space, commonly known as the Outer
Space Treaty. [n316] Drawn principally from three previous United
Nations General Assembly (U.N.G.A.) Resolutions, [n317] the Outer
Space Treaty is termed everything from "an ideological charter for the space
age" [n318] to the "Magna Carta of outer space law." [n319] Of
the five multilateral treaties dealing specifically with outer space activities,
it is the most important "by far." [n320] As a result, it is the legal
source of first resort for the analysis of any space law topic.
Other than establishing what can only be called the "constitution" of outer
space, [n321] the Outer Space Treaty specifies that "Outer space,
including the moon and other celestial bodies, is not subject to national
appropriation by claim of sovereignty, by means of use or occupation, or by any
other means." [n322] Of the many activities this provision clearly
prohibits, it has generated some debate relating to its scope. For example,
commentators are divided over its application to private, non-governmental
claims of ownership over celestial bodies. [n323] Increasing
private investment in space makes this a live issue that military users of
space must understand.
In addition to its "no sovereignty" provision, the Treaty established a few
innovations in international law. One significant innovation pertains to the
provision of Article VI requiring that States bear "international responsibility
for national activities in outer space . . . whether such activities are carried
on by governmental agencies or by non-governmental entities." [n324]
This departure from the general rule of international law, namely, that States
bear responsibility only for State activity, makes the contracting State liable
for the offenses (or any other activity) of its citizens or private
organizations with respect to space activity. [n325] This provision
marks the first time that such an extension of State liability had occurred in a
legally binding document. [n326] Although this provision appears
unlikely to affect significantly the ability of States to wage space warfare
given the State-controlled nature of military forces, it could impact the
research and development of weapons systems. For example, to the extent that a
military space contractor pursues testing of space weaponry in outer space, the
host State will bear "international responsibility" for the activity.
Further, the novel principle of State responsibility for "national
activities in outer space" could render the home State liable for the
unauthorized hostile space activities of its citizens, even if carried out from
a foreign country. Despite the great difficulty in regulating such activity,
this could mean that the U.S., for example, would bear responsibility to the
Chinese, should a U.S. citizen manage to destroy a Chinese satellite in space,
even if construction, launch, and control of the attacking object or method of
destruction occurred entirely outside the U.S., and without its authorization.
An additional provision could be applied to space combat in a variety of
respects. Article IX of the Outer Space Treaty provides in part:
V. SPACE WARFARE UNDER RELATED TREATIES AND OTHER AUTHORITATIVE SOURCES
No one can predict with certainty what the ultimate meaning will be of the
mastery of space. [n435]
each Party shall, in exercising its national sovereignty, have the right to
withdraw from this Treaty if it decides that extraordinary events related to the
subject matter of this Treaty have jeopardized its supreme interests. It shall
give notice of its decision to the other Party six months prior to withdrawal
from the Treaty. Such notice shall include a statement of the extraordinary
events the notifying Party regards as having jeopardized its supreme interests.
Certainly, in case of war with the other Party or any other State, the Parties'
"supreme interests" would be jeopardized, allowing for withdrawal. Whether
the proliferation of ICBMs to States hostile to the U.S. jeopardizes
its supreme interests is now under intense debate. [n461]
Last year, both houses of Congress overwhelmingly passed a bill that
enshrined into U.S. national security policy the fielding of a national missile
defense system. [n462] On July 23, 1999, President Clinton signed the
National Missile Defense Act of 1999 which commits the United States to fielding
a national missile defense system "as soon as is technically feasible."
[n463] The move represents a dramatic move in the U.S. quest for
missile defense - a quest formally begun by President Reagan in 1983 with the
announcement of preliminary research into a "peace shield" to guard against
foreign missile threats. [n464] Despite criticism, after decades of
failures missile defense technology has reached "an historic phase in its
favor." [n465] Pressure to renegotiate or withdraw from the
Treaty will continue to mount, in part because such renegotiation or withdrawal
will be absolutely necessary if the U.S. is to field a national missile defense
system, while remaining compliant with its international legal obligations.
3. Antarctic Treaty-1959, and the United Nations Convention on the Law of the
Those looking for analogous legal regimes to that contemplated for outer
space, often cite the regimes established for the continent of Antarctica and
for the high seas. Of the two, the high seas receive particular attention. Not
too long ago, the high seas seemed as vast to explorers as outer space does
today. But in addition to their vastness, the freedom of movement thereon
mirrors the freedom of movement reserved in law for outer space. Thus, one
commentator notes the "maritime antecedents" of the freedoms of outer space. [n466]
With respect to the status of the high seas, the United Nations Convention on
the Law of the Sea (LOS Convention), the most comprehensive treaty ever created,
largely mirrors customary international law. [n467] Among its other
numerous categories, it establishes the legal status for the high seas-the vast
majority of the world's oceans which are free of any territorial claims or
superior rights or interests by any one State. As with the legal status for
outer space, the LOS Convention articulated the "freedom" of all States to
traverse the high seas unimpeded. [n468] Thus, under international law
the high seas constitute an area that is res communis omnium-territory free for
equal use by all States.
By contrast, Antarctica constitutes territory that could be likened
to terra nullius. [n469] Previous to the 1959 Antarctic Treaty, several
States laid claim to portions of Antarctica. [n470] This meant that for
a period of time, those portions were no longer terra nullius. However, the
Treaty's Parties, including all States that previously made territorial claims,
froze all of those claims. The Parties also contracted that no new claims to
sovereignty over any portion of Antarctica would be permitted-a situation
strikingly similar to that established for the whole of outer space by Article 2
of the Outer Space Treaty.
Especially significant is the dissimilarity between the terms "peaceful
purposes" as used in the Outer Space Treaty and that in the Antarctic Treaty. As
used in the latter treaty, the phrase "peaceful purposes" specifically operates
to create a demilitarized zone. Thus, Article 1 specifies that "Antarctica shall
be used for peaceful purposes. There shall be prohibited, inter alia, any
measures of a military nature, such as the establishment of military bases and
fortifications, the carrying out of military maneuvers as well as the testing of
any type of weapons." [n471] (emphasis added) Not only does this
sweeping language rule out the possibility of "any" activity of a "military
nature," but it clarifies the meaning of peaceful purposes as used in the
Treaty. [n472] For the Antarctic Treaty, peaceful purposes functionally
excludes virtually any military activity. Thus, by law, Antarctica has become
not only demilitarized, but weapons-free. Not so for outer space. Though the
Outer Space Treaty does specifically restrict military activity in Article IV,
it conspicuously omits the broad language modifying the phrase "peaceful
purposes" as contained in the Antarctic Treaty. This use of the phrase in the
Antarctic Treaty was undoubtedly evident to the drafters of the Outer Space
Treaty, and provides further, albeit indirect, evidence that "peaceful purposes"
under the Outer Space Treaty cannot simply mean non-military. [n473]
Whether these two treaty regimes provide helpful analogies to outer space
depends on the space activity contemplated. When applying the issue to military
space combat, the high seas, though perhaps not necessarily the legal
regime governing the high seas, appears a much better analogy than the territory
of Antarctica. For example, while space affords tremendous tactical and
strategic military advantage, Antarctica does not. [n474] Further,
although Article 2 of the Outer Space Treaty prohibits claims of national
appropriation and sovereignty in space, the Outer Space Treaty also implies the
legitimacy of weapons in space, [n475] a possibility the Antarctic
Treaty forecloses [n476] for Antarctica, but the LOS Convention for the
high seas does not. [n477]
B. United Nations General Assembly Resolutions
The U.N. Charter invites the General Assembly to make "recommendations" on
issues within its competence. [n478] Further, the seminal Article 38(1)
of the Statute of the International Court of Justice articulates the three
formal sources of international law, none of which include U.N. resolutions: (1)
treaties; (2) international custom; and (3) general principles of law
recognized by civilized nations. [n479] From this basis, the consensus
has emerged that U.N.G.A. resolutions do not in and of themselves bind States.
[n480] Nonetheless, the space resolutions have proven significant to
the formation of space law. Indeed, as becomes evident below, such resolutions
not only predated the subsequent space treaties, but have for a variety of
reasons become the vehicle of choice for expressing international
opinion on various space-related topics. [n481]
1. Declaration of Legal Principles Governing State Activity in the
Exploration and Use of Outer Space-1963
The space resolution adopted in late 1963 by the United Nations General
Assembly is of interest today largely for tracing the negotiating history of the
Outer Space Treaty. Certainly a diplomatic breakthrough when it emerged from the
bilateral U.S./Soviet negotiations, the "Declaration of Legal Principles"
[n482] found itself incorporated almost entirely into the 1967 Outer
Space Treaty. [n483] In many regards, it was the "first significant
step in the development of space law." [n484]
The importance of the Resolution can be seen by the use of two terms in its
title, "Declaration" and "Legal Principles." Because of the lengthy negotiating
and drafting history predating the resolution, and its unanimous support, it
practically amounted to a treaty when adopted. Though not binding on any State,
[n485] the Resolution does not read like a traditional resolution.
Rather, it declares and announces legal principles instead of merely
recommending a course of action. The considerable authority of its
pronouncements were cemented in law just four years later with adoption of the
Outer Space Treaty.
2. Principles Relating to Remote Sensing of the Earth from Outer Space-1986
In contrast to the "Declaration of Legal Principles" of 1963, the 1986
Resolution on remote sensing activities addresses a specific form of outer
space activity. The Resolution defines remote sensing as follows in Principle I:
"the sensing of the Earth's surface from space by making use of the properties
of electromagnetic waves emitted, reflected or diffracted by the sensed objects,
for the purpose of improving natural resources management, land use and
protection of the environment." [n486] Given the absence of any
governing treaty, [n487] the Remote Sensing Resolution is the most
authoritative international document to provide not only a general
definition, but also the basic parameters of permissible State activity. Passed
unanimously by the General Assembly, the Resolution was the culmination of
previous efforts from 1968 through 1985. [n488] Although related to the
activity of military reconnaissance satellites, the Remote Sensing Resolution
aims rather at formulating norms for civilian and commercial users. [n490]
Nonetheless, the biggest users of civil and commercial remote sensing data
are the military and intelligence agencies. [n490] Thus, the Resolution
could become relevant to space warfare to the extent that a belligerent uses
commercially available data in support of its military operations. [n491]
Of the fifteen principles contained in the Resolution, the most
important include the fourth, twelfth, and thirteenth. Principle IV specifically
links remote sensing activities to Article I of the Outer Space Treaty, and
encourages that remote sensing activities occur "on the basis of respect for the
principle of full and permanent sovereignty of all States and peoples over their
own wealth and natural resources." [n492] Widely viewed as a provision
in favor of developing nations, this Principle further protects the "legitimate
rights and interests of the sensed State." [n493] The practical effect
of these protections are unclear as the Resolution does not define several key
terms, such as "legitimate."
Central to the Resolution's system of principles is the distinction between
"primary data," [n494] "processed data," [n495] and "analysed
[sic] information." [n496] While the first two categories should be
made available to a "sensed State," the latter need not. Thus, Principle XII
specifies that as soon as primary and processed data are produced, the sensed
State will have access to such data on "a non-discriminatory basis and on
reasonable cost terms." [n497] While perhaps appearing to be a victory
for the interests of sensed States, many of which are in the process of
development and have no indigenous remote sensing capability, this "access"
provision amounts to a victory for the liberty of the few States most active in
space. [n498] Principle XII does not call on sensing States to offer
prior notification to sensed States of its activities, and it certainly does not
require prior permission for remote sensing from space-two issues
creating lively debate as the State delegations negotiated the Resolution's
Finally, Principle XIII exhorts sensing States, upon request, to "enter into
consultations with a State whose territory is sensed in order to make available
opportunities for participation and enhance the mutual benefits to be derived
therefrom." [n499] Here the Principle assumes that the sensing is
already occurring ("is sensed") before the consultations are to begin. Further,
consultations is an unspecified term that appears not to bind States to much of
anything in actual practice. [n500] Still, the provision is of some
value as it encourages sensing States to reveal their activity to the sensed
State. In cases where the sensed State would not otherwise know of the remote
sensing activity over its territory, this appears to be a logical prerequisite
for the sensed State to take advantage of access to the data encouraged under
As Professor Christol notes, though unanimity on the resolution was in some
cases grudging, there have been no formal departures from the terms of the
Resolution. [n501] As is generally true for U.N. resolutions, the
longer they are used as the international standard, the stronger their authority
3. Principles Relevant to the Use of Nuclear Power Sources in Outer Space--1992
Beginning around the time of the 1978 crash of the Soviet Cosmos 954
satellite in Canada's Northwest Territories, [n502] COPUOS began
working on an international technical framework for the regulation of nuclear
power sources in space. Despite earlier resolutions touching on nuclear power,
[n503] the project came to full fruition on December 14, 1992 with
adoption by the U.N.G.A. of the "Principles Relating to the Use of Nuclear Power
Sources in Outer Space." [n504] Because the NPS Resolution deals with
the politically sensitive subject of nuclear power, its adoption is significant;
this is particularly so given the specificity of its terms. To the extent that
State practice consistent with the Resolution creates customary international
law, the framework set forth could significantly affect space warfare-at least
as to those nuclear power sources used in space warfare fitting within the scope
of the Resolution. [n505]
The NPS Resolution provides in the Preamble that its terms apply to
"nuclear power sources in outer space devoted to the generation of electric
power on board space objects for non-propulsive purposes." [n506]
Thus, any application to space weaponry that the Resolution may have relates
only to those means of warfare using a nuclear power source to sustain
electrical systems for the object. [n507] Following this initial
qualification, the Resolution's eleven Principles contain guidelines and
criteria for safe use (Principle 3), safety assessments (Principle 4), and
notification of re-entry (Principle 5). The Resolution also makes reference to
the Outer Space Treaty in its assertions regarding State responsibility
(Principle 8), and to the Liability Convention regarding State liability and
compensation (Principle 9).
The heart of the Resolution is to be found in Principle 3. In establishing
conditions for the safe use of nuclear power in space, it exhorts States to use
an NPS only for missions "which cannot be operated by non-nuclear energy sources
in a reasonable way." [n508] Thus, without defining "reasonable," the
Resolution attempts to limit State use of an NPS while recognizing that for
certain missions, such power sources are appropriate. Indeed the Resolution
continues by establishing the three cases in which nuclear reactors may be used:
(1) on interplanetary missions; (2) in "sufficiently high orbits"; [n509]
and (3) in low-earth orbits if they are stored in sufficiently high orbits
after the operational part of their mission. [n510] Further,
Principle 3 specifies that nuclear reactors for space missions must only use
enriched uranium 235 as fuel, [n511] and that design and construction
of the nuclear reactor "shall ensure that it cannot become critical before
reaching the operating orbit during all possible events." [n512]
Significantly, Principle 5 states what may well be a rule of customary
international law: "Any State launching a space object with nuclear power
sources on board shall in a timely fashion inform States concerned in the event
this space object is malfunctioning with a risk of re-entry of radioactive
materials to the earth." [n513] This general statement would certainly
affect space combat as to cases in which malfunctioning weapons, containing
nuclear power sources, appear likely to reenter earth's atmosphere and impact on
foreign soil. The existence of an ongoing state of hostilities would render the
duty to warn less certain as between the belligerents, though it would probably
apply to dangerous, radioactive space objects likely to impact neutral States,
even if pursuant to accidents occurring in military operations.
According to an unofficial report, States appear to be following the
recommendations contained in the NPS Resolution. [n514] As an example,
the Russian report to the U.N. Secretary General of its anticipated
launch of the Mars 96 satellite powered by plutonium-238 is cited. [n515]
When the satellite malfunctioned and reentered the atmosphere, the Russians
made notification of that event as well, in accord with Principle 5. Similarly,
the U.S. notified the Secretary General of its launch of the Cassini space
probe, containing about 35 kg of plutonium-238 dioxide. [n516] These
instances of "compliance" are important. To the extent that spacefaring States
behave in accord with the U.N. Resolution as though doing so represents a legal
norm, the behavior will slowly come to be a legal norm in the form of customary
international law-if it isn't already.
C. International Telecommunication Union
The growth of the telecommunications industry predates the space age.
Nonetheless, since the advent of satellite telecommunications the industry's
rate of growth has increased tremendously. The International Telecommunication
Union (ITU), through its Radio Regulations Board (RRB) coordinates the
international use of the radio spectrum. [n517] As a limited natural
resource, the spectrum will support only a finite number of users among the
radio frequencies before signal interference begins to occur. As a result, a
coordinated global effort to deconflict use of the spectrum becomes the sine qua
non of the world-wide telecommunications capability. The RRB is the forum for
such coordination and its radio regulations specify with great detail the
international standards for coordinating use of radio frequencies.
As suggested above, the U.S. military maintains its own military satellite
telecommunications network. [n518] However, because of the potential
for interference, it must pay careful attention to the regulations issued by the
ITU in order to avoid harmful signal interference. Although not applicable to
the military or other national security functions, [n519] the ITU
regulations govern the majority of telecommunications systems in
space. During military operations, and especially during armed conflict, the
military must operate its telecommunication networks, or lease the capability
from civilian providers, so as to avoid radio interference. This obligation
comes not as the result of legal mandate, but military necessity. Because armed
forces heavily rely on telecommunications for efficient command and control,
[n520] including commercially operated telecommunications systems,
[n521] their use of the radio spectrum must be done taking into account
other users with the potential for harmful interference. Failing to do so risks
losing the critical ability to communicate. Armed conflict creates numerous
unforeseen challenges for military forces; these have been termed the "friction"
of war. [n522] Interference-free communications provides one of the
best lubricants against that friction, and therefore becomes an indispensable
component in the successful prosecution of war.
President John F. Kennedy (1961)
In addition to the treaties and customary law dealing specifically with outer
space, a few other treaties not previously discussed contain provisions relevant
to the prospect of warfare in space. Also, several U.N.G.A. resolutions have, in
some cases quite specifically, revealed the opinion of States on permissible
activities in space. These sources are the focus of this chapter, which, though
not formally part of the corpus juris spatialis, play a significant role in
explicating the full range of international norms relevant to space warfare.
1. Treaty Banning Nuclear Weapons in the Atmosphere, In Outer Space and Under
Water (Limited Test Ban Treaty)--1963
Adopted before any of the "space" treaties, the "Limited Test Ban Treaty"
[n436] nonetheless provided the first treaty provision governing the
use of outer space. Despite being the subject of numerous U.N.G.A. resolutions
renouncing the use or testing of nuclear weapons, until the Treaty entered force
in late 1963 any of the nuclear weapons-capable States were legally free to
detonate their warheads anywhere they wished. [n437] The Treaty forbids
nuclear weapon test explosion[s], or any other nuclear explosion[s] . . .
(a) in the atmosphere; beyond its limits, including outer space; or
underwater, including territorial waters or high seas; or (b) in any other
environment if such explosion causes radioactive debris to be present outside
the territorial limits of the State under whose jurisdiction or control such
explosion is conducted. [n438]
The Treaty went on to express hope that the parties would conclude a
comprehensive treaty permanently banning all nuclear test explosions, "including
all such explosions underground." [n439]
While of great military significance the Treaty was essentially aimed at the
prevention of global nuclear contamination. [n440] Thus, although
having the effect of an arms control agreement, the Limited Test Ban Treaty can
"be viewed primarily as an environmental agreement rather than a military one."
[n441] This primary aim of the drafters comes into perspective when one
considers the scope of nuclear testing that had gone on previously. [n442]
Between them, the United States and Soviet Union conducted 212 nuclear
explosions from 1945 to 1958. With the exception of eighteen detonations, all
occurred in the atmosphere. [n443]
The Treaty establishes three significant implications for space warfare.
First, while the treaty prohibits all nuclear detonations in space, even those
that may have value for peaceful military or scientific purposes, it does not
regulate detonations of a non-nuclear nature such as those pertaining
to conventional, biological, chemical, or high energy laser weapons. [n444]
Second, because the treaty outlaws "any nuclear weapon test explosion, or
any other nuclear explosion" (emphasis added), it may prohibit the use of
nuclear fission as a means of space propulsion. [n445] To the extent
nuclear power sources operate by means other than "explosion," the Treaty does
not prohibit their use. Finally, the Treaty also prohibits the use of nuclear
explosions for non-testing purposes as well. Thus, although, for example, the
creation of an electromagnetic pulse in space by means of a nuclear detonation
may present strategic military advantage, particularly in an anti-satellite
role, such activity is forbidden by the treaty. [n446]
2. Anti-Ballistic Missile (ABM) Treaty-1972
The ABM Treaty severely limits the deployment, testing, and use of missile
systems designed to intercept incoming strategic ballistic missiles. [n447]
At the time of its adoption in 1972, the U.S.S.R. and the U.S. believed
that the best way to avert the possibility of a nuclear exchange, as well as to
curb the urge to continue a nuclear arms buildup, was to render each side
defenseless to a nuclear attack. The two States agreed that just as the actual
ability to defend with an ABM system would create strategic instability, even
the perception that the other has the ability would be destabilizing. [n448]
Thus, with one exception, the two sides agreed to outlaw the testing,
development, deployment, and use of ABM systems. [n449] The exception
allows each side to maintain one ABM system either around its
national capital, or at an ICBM site. [n450] Although the Preamble to
the treaty cites a desire to decrease "the risk of outbreak of war involving
nuclear weapons," [n451] the Treaty applies to defenses guarding
against conventional weaponry carried by ballistic missiles as well.
The two primary provisions impacting space activity come from Articles V and
XII. Article V(1) provides that "each party undertakes not to develop, test, or
deploy ABM systems or components which are sea-based, air-based, space-based, or
mobile land-based." [n452] Though there were no space-based ABM systems
in existence in 1972 when the Treaty was adopted, the space program of each
Party was highly advanced and each could foresee the use of space-based ABM
systems. [n453] Article XII is perhaps even more significant to the
long-term use of space by military systems beyond the more narrow question of
1. For the purpose of providing assurance of compliance with the provisions of
this Treaty, each Party shall use national technical means of verification at
its disposal in a manner consistent with generally recognized principles of
2. Each Party undertakes not to interfere with the national technical means of
verification of the other Party operating in accordance with paragraph 1 of this
3. Each Party undertakes not to use deliberate concealment measures which impede
verification by national technical means of compliance with the provisions of
this Treaty. This obligation shall not require changes in current construction,
assembly, conversion or overhaul practices. [n454]
Paragraph 1 is significant in numerous respects, not least of which is the
codification of the "open skies" principle. With this provision, not only was
the legality of space-based surveillance via satellite formally acknowledged,
but such satellites "became an essential component of the international
arms-control regime." [n455] The legality of military
surveillance activity from space was established in international law previous
to the ABM Treaty, however the Treaty certainly gave formal sanction to the
practice by the two leading spacefaring States.
The requirement under Article XII(2) that the Parties not interfere with the
"national technical means" of the other Party can be viewed in part as a
specification of the "peaceful purposes" limitation of the Outer Space Treaty.
That is, any proposed destruction of a Party's national technical means,
including surveillance satellites, [n456] by the other, except pursuant
to self-defense or U.N. Security Council resolution on the use of force,
[n457] would certainly constitute an "interference" with that system as
well as a violation of the "peaceful purposes" mandate. In this way, the ABM
Treaty acts as a partial limitation on the uses of anti-satellite capability
maintained either by the U.S. or Russia.
Those following debates on missile defense in the United States will
immediately recognize that the ABM Treaty has been widely criticized.
[n458] The Secretary of Defense recently announced that if
Russia [n459] fails to agree to modifications to the Treaty to allow
for a minimal missile defense system, the U.S. reserves the right to withdraw
from the Treaty altogether. Significantly, the treaty provides that
VI. THE LAW OF WAR IN OUTER SPACE
[The humanitarian law of armed conflict] applies to all forms of warfare and
to all kinds of weapons, those of the past, those of the present and those of
the future. [n523]
DOD is moving into the information age and toward a totally integrated
battlespace, where communications and intelligence space systems are no longer
viewed as solely supporting capabilities to the warfighter, but as instruments
of combat. The space force structure represents a major component of the
information infrastructure and will become increasingly important in deterring
conflict and conducting future military operations. Space forces provide the
sole means to access otherwise denied areas of foreign countries without
violating their sovereignty. [n611] (emphasis added)
A second reason for examining information warfare relates to the
scholarly commentary suggesting means of applying established legal categories
to this new way of waging war. As with information warfare, space warfare will
require legal analyses that either convincingly demonstrate how current
international law will regulate anticipated space operations, or conclude that
international law is currently insufficient to the task. The increasing
appearance of innovative analyses applying traditional legal categories to
developing information warfare tactics could contribute greatly to the
clarification of the jus in bello for space. [n612]
E. Other Selected Issues
After considering the general application of the law of war to military
space activities, several problems related to space warfare remain. The
following are simply representative of many others that have been raised (and
will be raised) as the prospect of space warfare moves from theory into the
fielding of forces.
1. Military Interaction With Intergovernmental Agencies and "Dual Use" Assets
Because space warfare will be very hardware-intensive, [n613] the
status of the assets used in combat will become all-important. In isolating the
legal status of a space system to be used in combat, the answers to two
preliminary questions can assist in clarifying an otherwise complicated
analysis. First, who owns the asset? And second, is the asset used solely for
military purposes, or both civilian and military purposes? [n614]
When ownership of a space asset is shared among several States, the
use of the asset becomes subject to the international agreement creating the
joint ownership. The complexity of the analysis increases in part because there
are more decision-makers with a voice in the decision as to how the asset will
be used. When it comes to the use of a space asset in an armed conflict, the
status of the owner largely determines the status of the asset. For example, the
telecommunication network known as INTELSAT [n615] is jointly owned by
over one hundred sovereign States. Each of these States has a weighted vote in
determining the future of the organization and the uses to which its assets are
Similarly, the former International Mobile Satellite Organization (INMARSAT,
previously the International Maritime Satellite Organization) was an
intergovernmental body owning a network of satellites supporting mobile
telecommunications. Now privatized, INMARSAT had been used in support of several
previous armed conflicts though its use among coalition forces during Operation
Desert Storm in 1991 was the most widely publicized. This might not have been
significant but for the "peaceful purposes" objective mandated by the INMARSAT
Convention. [n616] Unlike the term in the Outer Space Treaty, Moon
Agreement, and other selected international instruments, the term in the
INMARSAT convention has been widely interpreted outside the U.S. to mean those
purposes unrelated to armed conflict. [n617] Attempting a position that
was "overly careful and conservative," States making up the former INMARSAT
organization, which included NATO, former Warsaw Pact, and developing nations,
took the view that while "peaceful purposes" as used in the Convention did not
exclude "military uses" per se, it did exclude uses in armed conflict even if
conducted in self-defense. [n618] As reported by INMARSAT's
General Counsel during the 1991 Persian Gulf War, when INMARSAT notified the
U.S. of its concerns related to use of the Organization's assets in furtherance
of armed conflict, the State Department responded by assuring INMARSAT "that
appropriate steps have been taken to avoid recurrence of such publicity."
[n619] Without so stating, the distinct impression left by this and
other commentators [n620] is that uses of the network during armed
conflicts were inconsistent with the Convention's terms.
Because privately-owned global mobile personal telecommunications systems
(such as the former Iridium system, as well as ICO, Teledesic, Odyssey, and
SkyBridge networks) are rapidly proliferating, it is doubtful military forces
will need to rely heavily on intergovernmental organizations such as INTELSAT
for communication support in future conflicts. Despite numerous new legal issues
they are creating, commercial satellite systems are increasingly servicing
military communications needs. [n621] However, to the extent military
forces continue to use intergovernmental assets, an equally difficult question
relates to the status of those owner States that are not party to the armed
conflict. As occurred with "neutral" [n622] INMARSAT States in
Operation Desert Storm, use of the system by belligerent States meant
that neutral (co-owner) States risked loss of their rights as neutral States
under the law of war, at least as to their investment in the INMARSAT system if
it had been lawfully targeted by enemy forces.
Reference to a specific law of war analogy may prove helpful in the analysis
of the use and targeting of assets jointly owned by belligerents and neutrals
alike. Under the law of war, an otherwise inviolable object or person, such as a
church or non-combatant, may become a legitimate target for attack if used for
military ends. Thus, the storage of weapons or the housing of soldiers in a
church, or engagement in active combat by a non-combatant, renders both subject
to attack. Similarly, an object owned by a neutral, which would be otherwise
inviolable as neutral property, becomes properly subject to attack if used by a
co-owner for belligerent purposes. With one exception, this analogy would seem
to apply to the vast majority of space assets co-owned by intergovernmental
organizations, particularly telecommunications satellites.
A possible limitation of this analogy arises with reference to Hague
Conventions V and XIII respecting the rights and duties of neutral powers and
persons in case of war on land and sea, respectively. [n623] Although
the titles suggest that each Treaty's scope is specifically limited to warfare
on land or sea, such apparent limitations have not hindered application of jus
in bello principles from the Hague Conventions to aerial warfare. [n624]
Similarly, the provisions of both Treaties could logically be applied to
space warfare. Article 8 of Convention V allows that neutral States need not
"forbid or restrict the use on behalf of the belligerents of telegraph or
telephone cables or of wireless telegraphy apparatus belonging to it or to
companies or private individuals." [n625] Nonetheless, while the
neutral State need not restrict the use of its assets to only non-belligerent
States for "telegraph or telephone cables," Article 9 requires that any
allowance by the neutral State for belligerent use be "impartially applied by it
to both belligerents." [n626] Thus, in keeping with customary
principles of State neutrality, the Treaty forbids a neutral to give
preferential treatment to one belligerent if it allows access to any. By clear
inference, this means that to the extent the neutral State does give preference,
the preferential access to the asset for one belligerent renders the
"neutral's" property non-neutral, and thus subject to attack.
An additional issue arises under Hague Convention V's "general participation
clause." Article 20 provides that "the provisions of the present Convention do
not apply except between contracting Powers, and then only if all the
belligerents are parties to the Convention." [n627] Because, for
example, the United Kingdom is not a party to the Convention, Article 20
operated to render its specific provisions inapplicable to the Persian Gulf War
conflict. [n628] Nonetheless, when drafted, Hague Convention V, as well
as Hague Convention XIII, were viewed as declaratory of customary international
law. Thus, without asserting that the Hague conventions on neutrality do in fact
amount to restatements of customary law, Roberts and Guelff accurately point out
that "to the extent that [ ] Convention [V] may be considered customary
international law, it would be binding on all States and its 'general
participation clause' . . . would cease to be relevant. In hostilities since
1907, including both world wars, the Convention was frequently referred to by
both neutrals and belligerents." [n629] Among other things, this simply
illustrates that the law is unspecific on this point. How the Hague Conventions
on neutrality or the principles of customary international law would restrict
targeting of jointly-owned satellites in space warfare is as yet unclear. While
this problem of "neutral" ownership of implements of war is not unique to
space assets, it is an issue widely applicable to space assets given widespread
intergovernmental cooperation in space, and is thus likely to become a concern
in space warfare.
A second major problem related to the status of space assets in combat is the
use to which they are put. In many cases, implements of space warfare can be
converted fairly easily to valuable non-military uses. [n630] For
example, remote sensing satellites are functionally equivalent to military
reconnaissance satellites. While the former do not require the same precision,
the process of acquiring earth-based data is roughly the same.
[n631] Even more closely related are the uses put to weather and
telecommunications satellites. The military may use such a satellite to support
the prosecution of its wartime objectives while the same satellite is being used
simultaneously for non-military purposes. [n632] This raises the
question whether such an asset may be lawfully targeted by an opposing
The general rule provided by the law of war allows destruction of targets
that are military objectives when doing so is not disproportionate to the
military objective sought by the destruction. On this basis, major
infrastructure targets were lawfully destroyed during the 1991 Persian Gulf War
that provided, for example, electricity both to the civilian populations and to
the command and control functions of the Iraqi military. [n634] A
similar rationale applies equally to dual-use satellites. To the
extent a satellite is used for the support of a military purpose, be it
communications, weather, early warning of missile launch, or reconnaissance, it
becomes a military objective and is lawfully subject to attack. This of course
assumes that the space asset is actually used for such military purpose and is
not merely targeted for having the potential to be so used. [n635]
2. The Status of Astronauts as Both "Envoys of Mankind" and Combatants
The trend for the past few decades suggests that military manned space
missions will not carry the significance of unmanned missions in the near term.
Nonetheless, there will undoubtedly be some role for military astronauts in
space combat. This raises a few obvious questions in light of language used by
the Outer Space Treaty and the Rescue and Return Agreement. In his account of
the reception he received following the Apollo 11 manned mission to the surface
of the moon, command module pilot Michael Collins made the following
Travelling around the world several months after the flight, I was continually
impressed by the fact that no matter where we were, the reaction was the same
and, to me, unexpected. Never did I hear, 'Well, you Americans finally did it.'
Always it was 'we,' we human beings drawn together for one fleeting moment
watching two of us walk that alien surface. [n636]
This reception correlates with the status astronauts bear under international
law: "envoys of mankind." [n637] The lofty phrase reserved for
astronauts appears to suggest that they are given the legal status of
diplomats. [n638] However, a significant tension will arise as military
astronauts move from activities that are scientific in nature, to those that are
warlike. Interestingly, the language immediately preceding the "envoys" phrase
from the Outer Space Treaty states the permissibility of military personnel in
space for scientific or other peaceful purposes. [n639] This
juxtaposition suggests, along with the fact that the term "astronaut" applies to
all humans in space [n640] and that the term envoy makes no distinction
between military and civilian astronauts, that the term envoy as used in the
Outer Space Treaty certainly applies to military personnel in space. However,
the Outer Space Treaty does not countenance armed conflict in space.
Under the law of war there is no reason the term combatant could not apply to
military personnel in space just as it does to individuals on land, sea, and air
if authorized to engage in armed conflict. [n641] Formally speaking, in
order to be accorded all legal protections under the jus in bello as
belligerents, it seems that such combatant astronauts would be required to
adhere to the requirements set forth under Article 1 of the annexed regulations
to Hague Convention (IV), namely, (a) commanded by a person responsible for his
subordinates; (b) have a fixed distinctive emblem recognizable at a distance;
(c) carry arms openly; and (d) conduct operations in accord with the laws and
customs of war. [n642] Under such conditions, the legal tension between
a person being accorded a quasi-diplomatic status, as well as being
given the right to use force might appear to be acute. Because the term
"combatant" is fairly well established under the law of war, full resolution of
this potential tension requires placement of the term envoy in its proper
context within the Outer Space Treaty.
The term as used requires an interpretation that is consistent with relevant
assumptions made elsewhere in the Treaty and with its object and purpose.
Indeed, this is a requirement imposed on the interpretation of any treaty.
[n643] The same treaty that designates astronauts as envoys also
presupposes that States will abide by their obligation to limit national
activity to peaceful purposes. A necessary precondition for any astronaut
claiming combatant status will be some violation of the "peaceful purposes"
injunction. That being the case, it is implausible to assert that any astronaut
qualifying as a combatant, whether acting in an aggressive, non-peaceful role,
or a defensive, peaceful role, will be accorded the diplomatic status due an
envoy. This conclusion is further supported by the fact that those accorded
diplomatic immunity may not engage in armed hostilities. [n644] From
this, two commentators have helpfully pointed out that "[a] military astronaut
[who] participates in hostile acts does not exercise diplomatic functions."
[n645] It would simply be incongruous for one person to simultaneously
constitute a combatant and an "envoy of mankind." [n646] The practical
interpretation of the Outer Space Treaty then becomes this: States Parties
"shall regard astronauts as envoys of mankind" only when engaged in
"peaceful" activities, as the Outer Space Treaty assumes them to. When such
conditions do not exist, it makes no logical or textual sense for astronauts to
be regarded as "envoys" by opposing belligerent States.
3. Return of Astronauts Engaged in Combatant Activities
At least two treaties within the corpus juris spatialis require the prompt
return of astronauts. In the event of accident, distress, or emergency landing
on the territory of another State Party or on the high seas, the Outer Space
Treaty requires that astronauts be "safely and promptly returned to the State
of registry of their space vehicle." [n647] The Rescue and Return
Agreement makes the duty even more expansive, applying even to cases of
unintended landing. Article 4 uses language suggesting that the duty to return
If, owing to accident, distress, emergency or unintended landing, the personnel
of a spacecraft land in territory under the jurisdiction of a Contracting Party
or have been found on the high seas or in any other place not under the
jurisdiction of any State, they shall be safely and promptly returned to
representatives of the launching authority. [n648]
These provisions precipitate the question: "must combatant astronauts be
returned in time of war?"
The answer is plainly "no" for reasons similar to those justifying the
conclusion that astronauts engaged in armed conflict will not be accorded
diplomatic immunity. In both cases, the terms of the Rescue and Return Agreement
assume that the space activities of astronauts, even if military in nature, will
be scientific and non-aggressive--that is, peaceful. Once the outbreak of armed
hostilities occurs in space, at least one of the States involved will have
violated the peaceful purposes limitation. Whatever else the
astronaut-combatants may be at that point, they most certainly will be prisoners
of war if captured by virtue of accident, distress, emergency or unintended
landing. The opposing belligerent will owe no greater duty to return the
prisoner of war from space than it would the prisoner of war from the land, sea,
4. Innocent Passage through Airspace for Destinations to and Return from
Beyond the question of where airspace ends and outer space begins, lies a
problem many States face related to space access. States such as the U.S.,
with great land masses bounded by vast expanses of the oceans, have a
certain degree of independence in the launch and recovery of their space
objects. Because many States are entirely landlocked, or possess territory too
small to launch objects into space using only their own airspace or that over
the high seas, a question arises as to the possibility of incorporating into
space law another feature from the law of the sea--innocent passage. In this
case, several commentators have been proposing that for some States to truly
enjoy the free exploration and use of outer space guaranteed by the Outer
Space Treaty, they must be accorded a right of innocent passage through the
national airspace of other States. Some have gone even further to suggest that
such a right exists in customary international law. [n649]
As suggested previously, such a right does not exist in the law and is not
likely to emerge in the near future given traditional State interests in
territorial sovereignty. [n650] However, even if it did, it would not
serve the ends of belligerent States in the midst of armed conflict during which
passage would not be innocent. For passage to be "innocent" under the Law of the
Sea Convention, it cannot be "prejudicial to the peace, good order or security
of the coastal State." [n651] It is self-evident that foreign military
activity in support of armed conflict in the territory of the host State
(whether territorial seas or superjacent national airspace), absent explicit
permission, will be prejudicial to the peace of that State. States may always
attempt to secure prior permission before entering the national airspace of
another State. This could certainly occur during an armed conflict. However, as
long as the law of the sea remains the controlling analogy, any future
recognition of rights to innocent passage into foreign national
airspace for space objects, will not apply to belligerents during armed
International Court of Justice (1996)
A review of current scholarship analyzing the application of the law of war
to outer space warfare yields little information. While many authors have
written on space militarization and weaponization, and some on space warfare,
almost none have undertaken an analysis of space warfare in the context of the
law of war. [n524] Indeed, it would seem that popular culture in the
form of science fiction movies has taken a greater interest in the subject than
have legal scholars and practitioners. [n525] For at least two reasons,
this must change. First, use of the space environment in warfare is
not just a matter of speculative planning for future conflicts, it has already
occurred. As the conflicts in the Persian Gulf and Kosovo made clear, space
assets were decisive in battle planning and execution. Second, failure to
analyze one's legal obligations raises the very real specter of violating
obligations that do in fact exist. Given that the U.S. contemplates armed
conflict within the space environment, it must not proceed oblivious to norms
establishing permissible and impermissible means and methods of warfare. For
example, the increasing use of high-technology wargames using space combat
scenarios is uncovering knotty legal issues. [n526] It is also giving
added urgency to questions that become increasingly "real world" such as the
following: "does intentional interference with a U.S.-owned satellite orbiting
600 mi. above the Earth constitute an act of war?" [n527]
Given the numerous previous uses of space assets for combat support,
the evolution from passive, defensive support systems to active, offensive,
weaponized systems seems only a matter of time. Professor Spires provides the
following instructive review of space assets used in combat:
As early as the Vietnam conflict, weather and communications satellites
furnished useful data and imagery to commanders in Southeast Asia and linked
them with Washington, D.C. More recently, satellite communications had proven
important in the British Falkland Islands campaign and in Urgent Fury, the
Grenada invasion of 1983. In 1986, during Operation Eldorado Canyon, space
systems provided a vital communications link and supplied important mission
planning data to aircrews that bombed targets in Libya. In 1988, Operation
Earnest Will witnessed the first use of GPS test satellites to support ships and
helicopters during mine sweeping operations in the Persian Gulf. During
Operation Just Cause in Panama in 1989, DSCS satellites provided long-haul
communications links and DMSP supplied important weather data.
These operations, however, involved only portions of the military space
community for a relatively brief period of time, and the contribution of space
systems was not widely understood or appreciated. Desert Storm, by contrast,
involved the full arsenal of military space systems. Nearly sixty military and
civilian satellites influenced the course of the war. [n528]
To these military uses can be added the extensive use of space assets in the
1999 Operation Allied Force campaign in Yugoslavia. [n529] What this
review demonstrates is that the military use of space for combat
continues toward more robust, integrated systems. The increasing reliance on
space assets strongly suggests that the space environment will eventually become
a distinct theater of military operations. [n530]
A. Bases on Which the Law of War Applies to Outer Space
To those familiar with international law, it may seem strange to undertake a
separate discussion of the bases on which the law of war applies to outer
space conflicts. As a general proposition of international law, a State's legal
obligations are not conditioned geographically unless otherwise specifically
noted or unless the circumstances of the obligation make such conditions
obvious. As a result, it may appear self-evident that the law of war will apply,
to the extent it has relevance, to future space conflicts. [n531] But
this is not necessarily accurate for the simple reason that the
specific legal norms governing space warfare, with very few exceptions,
[n532] have yet to emerge. Thus, to provide the basis for further
development, the conclusion that the principles of the law of war apply to outer
space should prevail only on the basis of reasoned legal argumentation. At least
three methods of argument, discussed below, appear to sustain the conclusion
that the existing law of war does apply to space warfare: argumentation by
analogy, argumentation based on specific reference to the terms of the Outer
Space Treaty, and argumentation based on the Martens' clause.
As discussed earlier, development of the corpus juris spatialis has occurred
in part by use of legal analogies. [n533] Analogy has been used in two
senses. First, the environment to be regulated-outer space-is compared to other
environments, such as the high seas and Antarctica. On this basis, the
international community has developed the legal regime governing outer space
after drawing from legal norms governing these other environments. Second, the
use of analogy occurs after a legal norm within the corpus juris spatialis has
already been established. In this sense a principle of law is interpreted by
means of analogy with a specific principle from another legal regime. This could
be termed argumentation by micro-analogy, while the other constitutes
argumentation by macro-analogy.
Both types of argumentation will be useful with respect to developing a jus
in bello for space. On the macro-level, the jus in bello governing means and
methods of combat on land, sea, or air, provides potential similarities to means
and methods of space combat made possible by the existing and proposed
technologies discussed in Chapter Two. The closer the factual similarity, the
more likely it is that the existing norm will undergird the developing legal
regime for space. Similarly, given the relative youth of space law,
argumentation by micro-analogy is just about the only means of interpreting the
general corpus juris spatialis to fit specific legal issues relating to the
military use of outer space. Though use of analogies in any sense can be
misleading if it amounts to misrepresentation of the existing norm used as the
analogy, it will undoubtedly guide the quest for articulating the current jus in
[*125] bello for space, as well as the development of the many further norms
likely to emerge in the context of State practice. [n534]
a. Parallels to Sea Warfare
Given the general jurisdictional parallels and legal analogies drawn between
outer space and the high seas, [n535] a similar comparative approach is
natural in attempting to establish the status of outer space in conditions of
armed conflict. The sovereign rights of all States on the high seas are equal.
So too in outer space. Once armed conflict has begun however, with the exception
of avoiding the territory and property of neutral States, [n536] the
legal status of the place in which combat occurs becomes less important. Thus,
if State A launches an "armed attack" against State B, the latter may respond in
self-defense either in State A's territory, State B's territory, the high seas,
international airspace, or outer space. As a result, though space law has made
significant use of analogies from the law of the sea, a unique analogy between
warfare in space and warfare on the high seas appears inapposite, at least as
distinguished from analogies with international airspace and the territory of
b. Previous Application of the Law of War to Aerial Warfare
In addition to the use of analogies drawn by the corpus juris spatialis from
the law of the sea, it is likely that the jus in bello for space will draw on
the developmental patterns characterizing evolution of the jus in bello for
aerial warfare. [n537] When the Hague conferences met in 1907, aviation
was a fledgling industry. There were profound uncertainties about how
or even if aviation could be effectively used in war. Thus, the 1907 Conventions
do not specifically address limits on aerial warfare. [n538] As
aeronautical technology developed, the international community never adopted a
binding legal regime restricting means and methods of aerial warfare. Though
the 1923 Hague Rules of Aerial Warfare are thought to reflect customary law in
some respects, not a single nation ever ratified this agreement. What does exist
by way of restriction, exists in piecemeal form through an array of instruments
comprising the laws of war. This evolutionary, piecemeal approach to
restrictions on aerial warfare is likely to characterize the evolutionary growth
of international restrictions on space warfare as well.
Military roles and missions for space assets in the U.S. have developed along
lines similar to those of airpower during the beginning of this century.
[n539] In both cases, intelligence-gathering and support operations
came first, followed by each respective medium used as a means of
transportation. Finally, offensive and defensive combat roles followed. As
USSPACECOM plans for offensive and defensive combat capabilities in space, the
comparison with airpower appears complete. Of course, the possibility always
exists that space combat will be outlawed by international agreement. However,
"the odds are poor. . . . Deep-seated [human] traits create tremendous
temptations for aggressors to take all, unless probable costs of such action
exceed anticipated gains." [n540]
As a result of the parallel development of air and space military missions,
and of the piecemeal recognition of international limits on means and methods
for prosecuting aerial war, it is reasonable to predict that the jus in bello
for outer space will evolve as did the jus in bello for airspace: incrementally,
by analogy to former means and methods of warfare, and in the absence of a
comprehensive treaty-based system of prohibitions.
2. Outer Space Treaty
Article III of the Outer Space Treaty provides perhaps the clearest
indication that the international law of war will apply to space warfare:
States Parties to the Treaty shall carry on activities in the exploration and
use of outer space, including the moon and other celestial bodies, in accordance
with international law, including the Charter of the United Nations, in the
interest of maintaining international peace and security and promoting
international co-operation and understanding. [n541]
Two significant observations arise from this provision. First, Article III
applies the restrictions of all international law to outer space activities ("in
accordance with"). As products of "international law," this surely includes both
the jus ad bellum, made obvious by Article III's specific reference to the U.N.
Charter, and the jus in bello. This observation provides the strongest evidence
that as far as its principles will apply to future technologies, the law of war
has been incorporated into military space operations by virtue of the Outer
A second observation relates to the requirement that a State's exploration
and use of outer space be "in the interest of maintaining international peace
and security." This well-worn phrase in international law comes directly from,
among others, the U.N. Charter. [n542] As historically used, the phrase
assumes that military force will be available to the international community to
ensure international order. [n543] As international law has limited the
means and methods States may use in employing military force in combat, those
limits form a part of the context in which the maintenance of international
peace and security, including the use of force in space, must occur.
3. Martens' Clause
A final observation regarding the application of the laws of war to military
space operations relates to what became known at the Hague diplomatic
conferences as the "Martens' Clause." This clause, so named for the Russian
delegate proposing its inclusion, was inserted into the preamble of the 1899
Second Convention and the 1907 Fourth Convention. The clause was intended to
supplement the prohibitory rules adopted at both conferences. The clause appears
in several law of war documents, and reads as follows in its 1907 iteration:
Until a more complete code of the laws of war has been issued, the high
contracting parties deem it expedient to declare that, in cases not included in
the Regulations adopted by them, the inhabitants and the belligerents remain
under the protection and the rule of the principles of the law of nations, as
they result from the usages established among civilized peoples, from the laws
of humanity, and the dictates of the public conscience. [n544]
The clause reminds States Parties that explicit prohibitions within the
Treaty do not supercede general, implicit prohibitions operating in the
background by way of "principles of the law of nations." [n545] In this
way, the clause covers not only customary international law but also
incorporates all rules and principles of the general law of nations. [n546]
As a result, it does more than simply claim that customary international
law fills in the gaps left by conventional law.
The further influence of the clause can be seen by its inclusion into
successive law of war documents throughout the twentieth century. Thus, versions
of the principle quoted above have appeared in each of the four 1949 Geneva
Conventions, [n547] the 1977 Protocol (I) to the Geneva Conventions
governing international armed conflicts, [n548] and the 1980 Convention
on Conventional Weapons. [n549] This widespread incorporation of the
principle, adopted by the vast majority of States, strongly suggests that the
Martens' Clause itself may have become a principle of customary international
The continuing vitality of the doctrine expressed in the Martens' Clause will
be particularly important for space warfare, often thought to be the most
technologically innovative form of warfare. Because the doctrine is
phrased "dynamically," [n551] implicitly anticipating the need to
regulate means and methods of warfare developed through technological advances,
it will always operate to limit the lawful prosecution of space warfare. No
matter what new means or methods are developed, they will remain subject to "the
principles of international law derived from established custom, from the
principles of humanity and from the dictates of public conscience." [n552]
B. Problems of Legal Definition and the Use of Force in Space
As is the case with domestic law, international law depends for its coherence
and consistency on clear definitions of key terms. The quest to further develop
a jus in bello for space will be plagued with the conspicuous absence of
authoritative definitions of several significant terms and concepts. In addition
to the difficulty of applying existing law, this situation holds important
lessons for the future drafting of space treaties, including the importance of
avoiding terms and phrases open to more than one reasonable interpretation.
[n553] Though the lack of definition or use of ambiguous terms often
reflects the presence of irreconcilable difference among the drafters, such
devices can work to utterly frustrate the aims of the treaties in which they
appear. It certainly will complicate the emergence of a distinct jus in bello
1. Militarization of Space
The militarization of outer space does not necessarily entail its
weaponization. [n554] Many of the legal issues arising from the
militarization of space do so in part because of the absence of clear
definitions for terms used in the relevant space treaties. For example, aside
from peaceful purposes [n555] and outer space, [n556]
the law lacks basic authoritative definitions of other terms including
space object, and space debris. As noted previously, the Liability Convention
defines "space object," but its general circularity leaves the definition
unhelpful. [n557] Functionally, the "space object" as used in
international parlance includes "space debris." As it is generally conceived, a
space object includes any artifact, manned or unmanned, that is launched into
orbit. This includes objects that have ceased to function and have become
debris. The lack of legal definition for these basic terms makes the already
difficult task of applying two distinct branches of international law to space
combat that much more difficult.
2. Weaponization of Space
Beyond terms relevant to the militarization of space are those related to the
more controversial prospect of space weaponization. Not only has the U.S.
historically eschewed the prospect of fielding space weapons, but even as their
use has recently attracted renewed attention, some officers within the military
publicly advocate a space sanctuary policy -- that is, no weapons in space.
[n558] Many others, including the current Chief of Staff of the U.S.
Air Force, view the ultimate weaponization of space as "inevitable."
[n559] Whatever policy the U.S. adopts, one must immediately confront
the question "what constitutes a weapon?" As one example, the meaning of nuclear
weapon as used in the Outer Space Treaty may become less and less evident in
future decades witnessing an evolution of space weaponry. [n560] While
some hearing the term nuclear weapon may immediately equate it with
thermonuclear devices designed for detonation under controlled circumstances, it
is certainly correct to observe that "nuclear energy may be used in different
ways and may be a potential weapon even if not so designed." [n561] As
a result, in the absence of clear definition, one could argue that following its
malfunction, the Chernobyl nuclear reactor, for example, became a "nuclear
Further complicating any legal analysis of the permissible scope of the
weaponization of space one confronts a further definitional vacuum. Despite the
heavy militarization of space, the basic term "space weapon" lacks definition in
international law. As a result, the concept it represents, which broadly
speaking includes any implements of warfare in space, is difficult to isolate
for purposes of analysis. And, without this foundational definition, one cannot
define phrases on which it logically relies, such as nuclear weapon and weapon
of mass destruction. The difficulty arises in that any comprehensive definition
of space weapon will include space systems equally used for non-military,
non-destructive, and non-aggressive purposes. Though space weapons may seem to
include only a discrete class of armaments with easily definable
characteristics, a closer examination "reveals a less obvious and more inclusive
set of systems." [n562]
One proposed definition illustrates this challenge:
A space weapon is a device stationed in outer space (including the moon and
other celestial bodies) or in the earth environment designed to destroy, damage,
or otherwise interfere with the normal functioning of an object or being in
outer space, or a device stationed in outer space designed to destroy, damage,
or otherwise interfere with the normal functioning of an object or
being in the earth environment. Any other device with the inherent capability to
be used as defined above will be considered as a space weapon. [n563]
Of particular interest is the second sentence. While it acknowledges that
space objects not designed as weapons may become weapons if they can "be used"
as such, it arguably leaves the definition so broad as to include just about any
object at all.
Objects in orbit travel at roughly 17,000 miles per hour. This fact alone
gives them the "inherent capability" to destroy or interfere with an object or
being in space or in the earth environment. This is equally true of functioning
satellites, dead satellites, and space debris. Similarly, under this definition
commercial telecommunications satellites are space weapons as they have the
inherent capability to interfere with the normal functioning of other
telecommunications satellites. Indeed a rifle, a hunting knife, or even any
sharp object on earth possesses the capability to destroy and/or interfere with
a ground station, making impossible the normal functioning of the satellite it
supports. These observations are not intended to suggest "space weaponry" should
not be defined. They are simply intended to illustrate the difficulty of
creating a definition that will distinguish space weapons from the larger
categories weapons, space objects, or even objects.
Put another way, should the developing law of war ever proceed to restrict
the use of existing or potential space weapons, the definition of space weapons
will have to confront the difficult problem of what to do about "non-dedicated
systems"--that is, those space systems not designed as weapons. [n564]
It will also have to elucidate whether the restriction applies to the
weapon's subcomponents as well. [n565] A consensus among States on such
a definition will facilitate application of the law of war to armed conflict in
In the meantime, consideration of technologies useful for space combat will
proceed under the principle that State action is permitted in the absence of
clear legal prohibition. [n566] Though regularly denounced by a large
segment of the international community as destabilizing for the use and
exploration of outer space, [n567] in principle none of the potential
means and methods of space warfare discussed previously in Chapter Two, with the
exception of nuclear weapons, violate international law. [n568] Of
course, the use to which these weapons are put could render them
unlawful for a specific objective if, for example, their use rendered them
disproportionate (or indiscriminate or inhumane) under the law of war as judged
against the military objective in view. But this is an inherent possibility for
any weapon, which, by itself, does not render the weapon unlawful.
3. Use of Force in Space
Beyond definitional limitations, a thorough articulation of legal standards
applicable to space warfare should account for the ways most likely to trigger
jus ad bellum restrictions on the resort to the use of armed force. One
commentator has observed that space law, including the Limited Test Ban Treaty,
Outer Space Treaty, Anti-Ballistic Missile Treaty, and the Moon Agreement, was
developed to "permit, indeed to endorse, the arms race, including the
militarization of space." [n569] Though speaking with a sense of irony
and regret, this scholar's comments raise the twin questions of the law's
tolerance of one State's infliction of intentional damage on another's assets,
and of the capture of foreign space assets. Though the U.N. Charter forbids the
"threat or use of force against the territorial integrity or political
independence of any state, or in any other manner inconsistent with the Purposes
of the United Nations," [n570] the meaning of this prohibition remains
hotly contested. The prevailing view is that this provision is an absolute bar
to the use of force with the sole exceptions being self-defense and
authorization by the Security Council. The other view, greatly bolstered by the
recent NATO air war in Kosovo, asserts that the prohibition pertains only to the
use of force for purposes inconsistent with the Charter such as the subjugation
of another State, or annexation of its territory. [n571] A State's
interpretation of the general prohibition on the use of force will obviously
greatly impact its decision whether or not to use it. For example, if
a State finds in the Charter no prohibition on individual or collective
"humanitarian intervention," it will expand to the uses of force it deems lawful
in any of the combat environments, including space. [n572]
Beyond general principles under the jus ad bellum, one can find reference to
the intentional use of force within space law itself. A careful reading of the
Liability Convention discloses that the corpus juris spatialis implicitly
recognizes that under certain circumstances the intentional destruction of
space objects might occur. [n573] As previously discussed, the
Liability Convention subjects States Parties to absolute liability for damage
caused by its space objects on the earth's surface, or to aircraft in flight,
[n574] and to liability based on fault for damage by its space object
to the space object of another State "being caused elsewhere than on the surface
of the earth." [n575] However, Article VI provides exoneration from
absolute liability in cases where either the claimant State, or the natural or
juridical persons it represents, caused the damage wholly or partially by gross
negligence, or an act or omission done with intent to cause damage. [n576]
A proper understanding of the phrase "intent to cause damage" provides
insight into the Convention's foresight as to the possibility of uses of force
against space objects.
Under Article VI, the scope of the exoneration applies only as to "absolute
liability" under Article II, and therefore exoneration from liability for damage
by space objects done on the surface of the earth or to aircraft in flight.
Given the purpose of space objects, that is, launch into space, this provision
for exoneration would certainly include intentional acts taken against space
objects while in space that later cause damage on the earth or in the air.
Obviously, the exoneration for intentional damage caused by a claimant State
presupposes the possibility that such intentional damage will occur. Thus,
despite the provisions of the Outer Space Treaty prescribing the "peaceful" use
and exploration of space, the Liability Convention recognizes the distinct
possibility that States may engage in intentional damage to space objects.
While this does not imply the Convention's sanction for such events, [n577]
it does suggest that the international community realistically
expected that a claimant State might take action amounting to the intentional
damaging of a space object. [n578]
Legally speaking, the capture of a foreign space object is related to the
question of intentional uses of force. Under the Outer Space Treaty a State
Party to the Treaty "on whose registry an object launched into outer space is
carried shall retain jurisdiction and control over such object." [n579]
At face value, this means that a satellite, for example, registered by State X
belongs to State X for purposes of jurisdiction and control. Nonetheless, when
State X uses its satellite to intentionally and wrongfully disable State Y's
satellite, assuming that doing so amounts to an "armed attack" under the U.N.
Charter, State Y may in self defense disable State X's satellite. [n580]
In such circumstances, State X has violated one of the conditions assumed
to exist by the Outer Space Treaty--the peaceful use of outer space. Having
properly acted in self-defense, may State Y capture State X's aggressor
satellite for intelligence or other purposes? It certainly seems that the law of
war authorizes belligerents not only to kill opposing belligerents but to
destroy their weaponry. If State Y can lawfully destroy State X's satellite, it
can certainly capture it, Article VIII of the Outer Space Treaty
notwithstanding. Put otherwise, the only way a State may be assured the
protection of its space assets, is to ensure that its activities remain
compliant with international law, including space law and the jus ad bellum.
C. National Policy, Military Space Doctrine, and Law of War Manuals
A review of the U.S. space policies at the Presidential and DOD levels
reveals that the leadership invariably reserves a place for national security
and military activity within its space policy statements. In fact, current U.S.
national space policy directs the DOD to assume certain space missions that,
when implemented, will have the effect of preparing the U.S. for armed conflict
in space. As a result, U.S. space policy precipitates the need for an
examination of the laws of war. Increasingly, prominent observers are calling
for full implementation of U.S. military space policy which would result in a
robust combat capability. [n581] Taking the argument a step further,
others argue for a fourth military department devoted to space. [n582]
Nonetheless, as one military commentator observes, "although the idea
of space warfare is becoming prominent in Air Force thinking, little effort has
been made to flesh out what it means." [n583] It also appears that
little thought has been given to the question "how will the law of war limit a
State's ability to prosecute warfare in space?"
In establishing the current national space policy in 1996, President Clinton
reiterated the requirement to use space for "peaceful purposes." [n584]
Consistent with the forty-year U.S. interpretation of the term, it does not
exclude military activity such as intelligence-gathering or even armed defense:
"'Peaceful purposes' allow defense and intelligence-related activities in
pursuit of national security and other goals." [n585] More recently,
the President's National Security Strategy states that "our policy is to promote
development of the full range of space-based capabilities in a manner that
protects our vital national security interests." [n586]
The U.S. National Space Policy directs U.S. space activity under several
substantive areas comprising "Civil Space Guidelines," "National Security
Space Guidelines," "Commercial Space Guidelines," and "Intersector Guidelines."
The DOD is directed, inter alia, to "maintain the capability to execute the
mission areas of space support, force enhancement, space control, and force
application." [n587] These four mission areas form the backbone of the
DOD's military space activity, as executed by its unified command for space,
With respect to the law of war, the DOD explicitly states that it is U.S.
defense policy to ensure that "the law of war obligations of the United States
are observed and enforced by the DOD Components." [n588] Further, the
heads of DOD Components are directed to ensure that "the members of their
Components comply with the law of war during all armed conflicts, however such
conflicts are characterized, and with the principles and spirit of the law of
war during all other operations." [n589] At a minimum, these provisions
mean that to the extent the law of war applies to space combat at all, and the
U.S. develops the means for conducting space combat, the law of war
will apply to U.S. forces in such combat.
As the titles to USSPACECOM's four major mission areas suggest, the first
two, "space support" and "force enhancement," ensure that space assets
facilitate the operations of combat forces on land, sea, and air. These missions
are evolving rapidly and are leading to the "operationalization" of U.S. space
forces. [n590] The latter two missions, "space control," and "force
application," are more controversial as they suggest the weaponization of
space, and are most closely related to combat in a future theater of military
The notion of military "space control" strikes many observers as antithetical
to the fundamental tenet of the Outer Space Treaty: that outer space is an
environment free for use and exploration by all States. However, the current
U.S. policy does not purport to establish areas of exclusive control by U.S.
forces, but simply attempts to negate threats to U.S. assets. U.S. Deputy
Secretary of Defense, John J. Hamre, recently explained that the space control
mission is defensive in nature: "We fully believe that 'negation' in
space--preventing the bad guys from using space against us--is fully authorized
under international law, but we do want to take steps and actions that don't
create instability in the world." [n591]
The U.S. space control policy is based on a five-pronged approach which
includes: "(1) assured access to space and operation once there; (2)
surveillance of the space environment and space-based objects; (3) protection of
spacecraft, ground stations and data links; (4) prevention of damage and
interference to U.S. space infrastructure; and (5) negation of hostile space
systems that place U.S. and allied assets at risk." [n592] This
translates to the following definition of space control, as articulated in
USSPACECOM's long-range plan: "Control of Space is the ability to ensure
un-interrupted access to space for U.S. forces and our allies, freedom of
operations within the space medium and an ability to deny others the use of
space, if required." [n593] Translated into legal terms,
attempts to "ensure un-interrupted access to space" and to maintain "an ability
to deny others the use of space," [n594] are simply expressions in the
military space context of the right to self-defense in response to hostile
action. As these policy goals are gradually implemented through practice they
will require clarification as to the means and methods used.
Space force application contemplates the use of armed force originating from
outer space. While the U.S. maintains limited space control options, it has no
acknowledged space force application capabilities--this is to say it has no
operational space-based weaponry. [n595] The USSPACECOM Long Range Plan
does not elaborate on this mission in nearly the detail it does for space
control. According to General Richard B. Meyers, then-Commander, USSPACECOM,
this is due in part to the fact that there is no national policy to weaponize
space. While the President has assigned USSPACECOM the space force application
mission, "there's been no national action on this. . . . Our focus now is
looking at the concepts [of operation] and some of the basic technologies that
would enable us to do that someday--if we're tasked by the national command
authority to go do that. . . . Today there is relative harmony in space."
[n596] If the U.S. ever does proceed to the fielding of space force
application options, it will most likely focus on missile defense.
Given the evolution of its national military doctrine, the U.S. may soon be
positioned to begin a preliminary incorporation of combat space operations into
its law of war manuals. The obvious starting point would be its manual on air
warfare. [n597] Not only would this course of action reflect the
military's institutional acceptance of the law of war for space warfare, but it
would allow the U.S. to encourage the progressive development of that law.
Military manuals serve not only as evidence of State opinio juris, but can also
serve a limited lawmaking role as well.
Because international law notoriously lacks its own enforcement system, national
implementation is often a critical factor in successful international lawmaking.
. . . Certainly, both the absence of a manual or the use of manuals whose
content does not include the relevant norms would strongly suggest that those
norms have not been adopted. [n598]
In addition, given sufficient uniformity, principles of law articulated in
law of war manuals could be viewed as "general principles of law recognized
by civilized nations," and thus a formal source of international law as
articulated by the Statute of the International Court of Justice. [n599]
The role of law of war manuals in making international law could be
especially helpful for space warfare at its advent. A consensus among the
leading States regarding acceptable limits on space warfare, as reflected in
their law of war manuals, could prove as authoritative as a treaty. Meanwhile,
incorporating existing norms for space warfare into a law of war manual, as well
as defining the U.S. understanding of means and methods of space combat that are
compliant with the law, would likely influence other States to adopt and act on
them as well.
D. Information Warfare
As the technological information revolution that has characterized late
twentieth and early twenty-first century life finds increasing military
applications, military strategists are recognizing in new ways the age-old
importance of information as a component of warfare. [n600] Though it
is a subject raising difficult legal questions well beyond the scope of this
article, information warfare merits attention given its natural connection with
space telecommunications systems. Because of heavy U.S. reliance on technology
for its military effectiveness, potential threats to the information
infrastructure will significantly affect combat readiness. [n601] This
fact led a recent Air Force study examining future concepts, capabilities, and
technologies to conclude that "influence increasingly will be exerted by
information more than by bombs." [n602]
In conceptualizing its categories of activity, the U.S. military
distinguishes between information operations, those actions taken to affect an
adversary's information and information systems while defending one's own
information and information systems, [n603] and information warfare,
which are information operations conducted during time of crises or
conflict to achieve or promote specific objectives over a specific adversary or
adversaries. [n604] Because the narrower concept of information warfare
applies during time of armed conflicts, it will be the more relevant of the two
concepts as analyzed in the context of space warfare.
Examination of emerging principles of information warfare will benefit the
analysis of space warfare under the law of war in two respects. First, because
the tactics of information warfare rely heavily on space assets, information
warfare can be loosely conceived as being a component of space warfare.
[n605] Whether classified as an active or passive manipulation of
information, a State's information operations in war certainly qualify as a
"means" or "method" of warfare. In this respect, information warfare is subject
to regulation under the jus in bello. To the extent information operations
involve the use of force in an armed conflict, such operations must be
necessary, [n606] proportional, [n607] discriminate,
[n608] and humane. [n609] They must also comply with
applicable conventional restrictions imposed under the Hague and Geneva
In his 1998 Annual Report to the President and Congress, U.S. Secretary of
Defense William S. Cohen highlighted this relationship between military space
assets, and the acquisition and manipulation of information for strategic
If there was ever a threat to our national security [in space], the best--the
only--way to solve the problem is to take weapons into space. [n652]
Suppose an observer of the Wright brothers' [sic] memorable first flight at
Kitty Hawk had been given the assignment of foretelling what aviation would be
like seventy or so years later. Had he envisaged the wide-bodied jet or the
supersonic transport he would have been absolutely correct. He would also have
been laughed to scorn by his contemporaries at the time. Had he merely enlarged
the Wright brothers' [sic] frail biplane into some bigger, stronger thing with
umpteen engines and several sets of wings, chances are he would have been
considered a true visionary even though his projected creation might be more
akin to a flying bird-cage.
J.W. MACVEY, SPACE WEAPONS SPACE WAR 80 (1979). See also D. LANGFORD, WAR IN
2080: THE FUTURE OF MILITARY TECHNOLOGY (1979) [hereinafter LANGFORD].
n10 W.B. Scott, USSC Prepares for Future Combat Missions in Space, 145:5 AV.
WK. & SPACE TECH., Aug. 5, 1996, at 51. General Ashy served as the Commander,
United States Space Command [hereinafter USSPACECOM], Air Force Space Command,
and the North American Aerospace Defense Command from September 1994 to August
Providing another in a series of observations on the military
"operationalization" of outer space, General Ashy later predicted that "the
relatively high percentage of space force capabilities devoted to a supporting
role will change to a 'supported' role. In other words, future military
operations will be supported not only from space (as in the first stages of
airplane use), but also within and to space." J.W. Ashy, Space Operations and
Organization: Some Thoughts About the Future, 146:16 AV. WK. & SPACE TECH., Apr.
16, 1997, at 56.
n11 The term "militarization," as applied to outer space, should not be
confused with "weaponization." Though there are no authoritative international
definitions of either term, the former refers to "the use of outer space by a
significant number of military spacecraft." I.A. Vlasic, Space Law and the
Military Applications of Space Technology, in PERSPECTIVES ON INTERNATIONAL LAW
386 n.6 (N. Jasentuliyana, ed., 1995) [hereinafter Vlasic, Space Law and
Military Applications]. Such activity may be non-aggressive and scientific in
nature, or aggressive and hostile. It may or may not involve the use of weapons,
though the contrasting term weaponization is meant to suggest that by itself,
the term militarization as applied to space does not necessarily include the
presence of weapons. The term weaponization "refers to the placing in outer
space for any length of time any device designed to attack man-made targets in
outer space and/or in the terrestrial environment." Id. Though not necessarily
so, the term implies the maintenance and use of such weapons by military forces.
Thus, though conceptually distinct, weaponization should generally be conceived
as a form of militarization.
n12 Rockets can be distinguished from missiles essentially in that the latter
possess superior navigational technology, making them more accurate for striking
targets. Otherwise, the following definition of rocket could apply to both: "A
vehicle that can operate outside Earth's atmosphere, because it carries its own
oxidizer, as well as fuel." JOHN M. COLLINS, MILITARY SPACE FORCES: THE NEXT 50
YEARS 159-60 (1989) [hereinafter COLLINS, MILITARY SPACE FORCES].
n13 N.M. MATTE, SPACE ACTIVITIES AND EMERGING INTERNATIONAL LAW 13 (1984)
[hereinafter MATTE, SPACE ACTIVITIES]. Matte further observes that "military use
has given the greatest impetus to modern rocket technology." Id. Durch and
Wilkening trace the rocket's history as follows:
The military rocket is a device whose pedigree is obscure. Though many credit
the Chinese with their first use in the thirteenth century, there is some
indication that the formulae for the propellants used in those rockets may have
come to China from Europe. On the other hand, the Mongol expansion of the middle
thirteenth century may have transported Chinese technology westward. That same
expansion brought rocketry to India, where it was encountered by the British as
early as 1750. Indian war rockets were used primarily to spook cavalry (in
effect, as early jamming devices), and at that they were apparently effective.
W.J. Durch & D.A. Wilkening, Steps Into Space, in NATIONAL INTERESTS AND THE
MILITARY USE OF SPACE 17 (W.J. Durch, ed., 1984) [hereinafter Durch &
n14 David Spires points out that following World War I, Germany was
interested in bombardment rockets for its army that was "sorely constrained by
the Versailles Treaty." SPIRES, supra note 3, at 5. Although the Treaty of
Versailles effectively disarmed Germany by forbidding the development of heavy
artillery and poison gas, it did not constrain all potential weapons such as the
rocket. In 1919, few thought of it as practical weapon of war. Durch &
Wilkening, supra note 13 at 17. Following the Nazi rise to power in the early
1930s the Treaty was repudiated outright. However, the research into military
rocketry continued as the merits of the potential weaponry became clearer.
n15 In popular parlance, the "V" stood for "vengeance" and the "2"
represented the second rocket-type fielded by the German army. The first model,
the much smaller V-1, was produced by the German Luftwaffe as an aerodynamic
pulse-jet "cruise" missile. Although the big rocket was known to technical
specialists as the A-4, V-2 is the more common designation that is familiar to
most observers of the German rocket program (the "Wehrmacht" program). The V-2's
three predecessor models began in 1933 with the A-1 and ended in 1936 with the
A-3. German scientist von Braun would later describe the A-1 as taking 1 1/2
years to build and 1/2 second to blow up. T.A. HEPPENHEIMER, COUNTDOWN: A
HISTORY OF SPACE FLIGHT 15 (1997) [hereinafter HEPPENHEIMER].
n16 Id. at 4
n17 SPIRES, supra note 3, at 5.
n18 HEPPENHEIMER, supra note 15, at 22.
n19 Id. at 23. For this purpose, the German scientists used modified
firefighter's pumps which also required simple construction, fast action, very
high flow rate, and constant delivery pressure.
n20 Indeed, Wernher von Braun termed its capture by the U.S. "one of the
greatest technical prizes in history." W. VON BRAUN & F. ORDWAY III, HISTORY OF
ROCKETRY AND SPACE TRAVEL 117 (3rd ed., 1975) [hereinafter VON BRAUN & ORDWAY].
n21 I M.J. MUOLO, SPACE HANDBOOK: A WAR FIGHTER'S GUIDE TO SPACE 3 (1993) at
3 [hereinafter MUOLO]. Although the U.S. cancelled the project in 1947, it was
reinstated in 1951 and has "changed little in over 40 years. . . . Significant
advances in its capability and adaptability are reasons the Atlas has become the
'DC-3' of space launch vehicles." Id. at 126-27.
n22 Quoted in SPIRES, supra note 3, at 10.
n23 For a discussion of missile defense and the legal regime regulating it,
see infra notes 447-463 and accompanying text.
n24 SPIRES, supra note 3, at 17. Until the early 1950s, the early missile
advocates were forced into a form of circular reasoning:
missiles seemed too challenging technologically, but no funds could be spent on
solving the technological dilemmas; so the problems would go unresolved and the
missile would remain 'impossible.' To questions about the logic of budgeting for
missile programs, the answer always seemed to be the dogmatic response: 'the
time is not right' for an expanded program.
Id. at 21.
n25 At least four factors account for the change in attitude by the U.S.:
first, news that the Soviets had successfully detonated an atomic bomb in August
1949; second, communism's triumph in China; third, reports of Soviet advances in
missile technology; and fourth, the outbreak of the Korean war in June 1950. Id.
at 22, 23.
n26 Examples include the WAC Corporal, Aerobee, and Viking. Of these, the WAC
Corporal became "the first man-made object to enter extra-terrestrial space"
having been launched as a second stage from a V-2 to a height of 250 miles. Id.
(quoting F. Malina's paper "Origins and First Decade of the Jet Propulsion
Laboratory" at 60).
n27 Early cruise missiles included the Snark, the first intercontinental
cruise missile, and the Navaho. The latter traveled to its target under "ramjet"
power, achieving speeds in excess of Mach 3. Ramjet technology utilizes a
process of "ram" compression at supersonic speeds in order to avoid the need for
jet turbines. The U.S. has used ramjet technology since the 1940s for its Navaho
missiles. SPIRES, supra note 3, at 21. In addition, the U.S. has used the
technology since 1959 for its A-11 and A-12 (later SR-71) reconnaissance
aircraft. W.E. Burrows, The Oxcart Cometh, And Goeth at Mach 3.2, 13:6 AIR &
SPACE, Feb./Mar. 1999, at 68.
In the years following WWII, the threat of nuclear exchange made the small,
slow cruise missiles ineffective as an intercontinental delivery system as
compared to ballistic missiles.
The ICBM's can travel thousands of miles along arcs that take them hundreds of
miles out into space; their trajectories, once determined during the interval
that the motors are in operation, are thence affected only by gravitational
forces and by air resistance during their exit from and re-entry into the
VON BRAUN & ORDWAY, supra note 20, at 121. Cruise missiles could not compete
with this capability for intercontinental application.
n28 The Atlas contained significant performance enhancements that allowed for
it to leave earth's atmosphere and then send an independent warhead back to
earth. These included housing its liquid fuel within the rocket's skin, and
making the warhead separable from the rocket so the latter could avoid the
design features requiring survivability upon reentry.
n29 The Titan was originally conceived as a backup program to the Atlas. The
two programs were developed simultaneously in order to save time in countering
the increasing perception of Soviet missile superiority. In 1953, Assistant
Secretary of the Air Force for Research and Development, Trevor Gardner, became
the champion of ICBM development in the U.S. having "made it his mission in
public life to convince the government that the nation must pursue a crash
program to develop an operational Air Force ICBM or face nuclear disaster."
SPIRES, supra note 3, at 31. Gardner's technological evangelism proved so
successful, that by the fall of 1955, President Eisenhower designated the Atlas
ICBM the "highest national priority" weapons system. Id. at 35. Management for
the crash missile program fell to Gardner protege Brigadier General Bernard
Schriever, a man who "used his intelligence, patience, and superb negotiating
skills with military, government and private industry leaders to become an
effective advocate for missile and space systems causes." Id. at 33.
n30 The complete family of Titan missiles includes several versions: I
(1959); II (1962); Gemini (1965); IIIA (1964); IIIB (1966); IIIC (1965); IIID
(1971); IIIE (1974); 34B (1975); 34D (1982); IISLV (1988); III (1989); IV
(1989). P. CLARK, JANE'S SPACE DIRECTORY, 1997-1998 277 (13th ed., 1997)
[hereinafter JANE'S]. In addition to the Atlas and Titan missiles, the
Department of Defense uses a variety of other missile systems, principally as
spacelifters rather than weapons systems, including the SCOUT, Pegasus, Delta,
and Space Transportation System ("Space Shuttle"). MUOLO, supra note 21, at
121-34. Additional missiles developed since World War II for weapons use include
the Polaris and Poseidon (both sea-launched), Pershing, and the Minuteman.
n31 HEPPENHEIMER, supra note 15, at 60. Though the U.S. got to Germany first,
the Soviets were first to Peenemunde. By the time the Soviets got there, most of
the documents and personnel had been removed by the Germans. Nonetheless, there
was enough left for the Soviets to use productively, including middle and
lower-level staffers familiar with the V-2 rocket research and development.
Though the codename "Operation Paperclip" for the U.S. roundup of German
scientists, documents, and hardware was revealed after the war, as was the
British "Operation Backtrack," the Soviet codename was never made public. M.
STOIKO, SOVIET ROCKETRY: PAST, PRESENT, AND FUTURE 71 (Holt, Rinehart & Winston,
n32 The implications from this early Soviet resolve were enormous. As von
Braun later observed, "the decision [to proceed with the ICBM before the U.S.]
not only gave [the Soviets] a significant edge in ballistic missile technology
for years, but was also a great factor in their leadership in space
exploration." VON BRAUN & ORDWAY, supra note 27, at 140.
n33 The first U.S. satellite, Explorer 1, was launched atop a Juno 1 on Jan.
31, 1958. See id. at 160.
n34 LANGFORD, supra note 9, at 45. The first large-production nuclear weapon
utilized a chain-reaction process known as fission, by which the mass of a
uranium or plutonium atom is converted to energy. Langford notes that as between
uranium and plutonium, the latter is easier to use for fission weaponry. Id. at
47. The nuclear weapon dropped on Hiroshima on Aug. 6, 1945 ("Little Boy") was a
uranium bomb that was remotely detonated at a height of 570 meters over the
city. "Detonation height determined how large an area would be damaged. . . . A
bomb detonated too high would expend its energy blasting thin air; a bomb
detonated too low would expend its energy excavating a crater. It was better to
be low than high." R. RHODES, THE MAKING OF THE ATOMIC BOMB 631 (1986)
[hereinafter RHODES]. On Aug. 9, 1945, a plutonium bomb ("Fat Man") was dropped
on Nagasaki with an estimated 22 kiloton yield.
n35 LANGFORD, supra note 34, at 49. It bears noting that nuclear weapons are
those characterized by the unique interaction of particles within an element's
nucleus. Whereas the fission chain-reaction begins with the acquisition of a
stray neutron particle which then spreads from nucleus to nucleus, the fusion
reaction requires the fusing of two nuclei. Because of the natural magnetic
repulsion of hydrogen nuclei, the two must be forcibly fused to begin the fusion
reaction. This is accomplished by heating the nuclei to such a degree that their
resulting speed yields collisions of sufficient force to achieve the fusion.
Thus the term "thermonuclear" weapons. The triggering element used to generate
the tremendous heat needed for fusion is a fission reaction. Once the fusion
begins, it creates its own chain-reaction. By surrounding the entire explosive
core with U-238, scientists discovered that the neutrons lost in the fusion
reaction could be used to fuel a second fission reaction. Thus, the nuclear
weapons most widely stockpiled make use of a fission-fusion-fission process. Id.
at 49. The first thermonuclear device, carrying an explosive force of 10
megatons of TNT was detonated at the Eniwetok atoll in 1952 (also spelled
Enewetak). In 1954, a 15 megaton device was detonated at the Bikini atoll. Id.
n36 RHODES, supra note 34, at 690
n37 HEPPENHEIMER, supra note 15, at 47. By contrast, the V-2 weighed a mere
n38 One Minuteman III ICBM is armed with the equivalent of 84
first-generation nuclear weapons. Rhodes, supra note 36, at photograph 106
n39 D. SHUKMAN, TOMORROW'S WAR: THE THREAT OF HIGH-TECHNOLOGY WEAPONS 25
(1996) [hereinafter SHUKMAN].
n40 A tass news agency announcement of Aug. 27, 1957 which reported the
successful test of the Soviet ICBM also included reference to "a series of
explosions of nuclear and thermonuclear (hydrogen) weapons . . . set off at
great altitudes." M.S. McDOUGAL, ET AL., LAW AND PUBLIC ORDER IN SPACE 389 n.7
(1963) [hereinafter McDOUGAL, ET AL.]. Between Aug. 27, 1957 and Sept. 7, 1958,
the U.S. exploded three atomic bombs over the South Atlantic at a reported
altitude of between 200 and 300 miles. During the summer of 1962 in the Pacific
at similar altitudes, the U.S. exploded weapons "in the hydrogen bomb range."
Id. In a Nov. 3, 1958 report to the U.S. President, three possible military uses
of a high-altitude nuclear detonation were identified: "The high energy
radiation including particles from the explosion produces effects on space; the
whirling high energy electrons generate radio noise; and the delayed radiation
from the fission products can affect radio transmission." P.B. STARES, THE
MILITARIZATION OF SPACE: U.S. POLICY, 1945-1984 108 (1985) [hereinafter STARES,
THE MILITARIZATION OF SPACE].
n41 See infra notes 436-446 and accompanying text.
n42 McDOUGAL, ET AL., supra note 40, at 45. The Soviet note and U.S. reply
are reprinted in N.Y. TIMES, Aug. 12, 1962, at 22.
n43 The U.S. "Vela Hotel" series of satellites were launched in 1963 and 1964
to scan above the horizon and detect nuclear tests in space. They were, in the
view of one military space historian, "one of the most successful Air Force
space projects." CURTIS PEEBLES, HIGH FRONTIER: THE U.S. AIR FORCE AND THE
MILITARY SPACE PROGRAM 41 (1997) [hereinafter PEEBLES, HIGH FRONTIER].
n44 SPIRES, supra note 3, at 35. In time, "the relationship between
satellites and missiles had become better understood as rockets with sufficient
thrust soon would be able to launch the heavier satellites. . . ."
n45 HEPPENHEIMER, supra note 15, at 90.
n46 Project Rand later became the Rand Corporation, a federally funded
research and development corporation serving as the primary technical consultant
to the U.S. Air Force.
n47 RAND CORPORATION, PRELIMINARY DESIGN OF AN EXPERIMENTAL WORLD-CIRCLING
SPACESHIP (1998) (from the abstact; Report Number SM-11827, May 2, 1946).
n48 Id. at 2.
n49 Launched as a stop-gap measure for strategic reconnaissance between the
termination of U-2 high altitude reconnaissance aircraft and the WS-117L system,
the Corona system remained operational from its first flight on Feb. 28, 1959
through June 1972. The Air Force was nominally deemed a joint venture partner of
the Corona program, which required mid-air recovery of film imagery taken by the
orbiting camera. For a thorough account of the recently-declassified Corona
program, see CURTIS PEEBLES, THE CORONA PROJECT: AMERICA'S FIRST SPY
SATELLITES (1997) [hereinafter PEEBLES, THE CORONA PROJECT]. The WS-117L
program, standing for "Weapon System 117L," led to development of the first
military satellite, the Advanced Reconnaissance System. The system used an
electro-optical television-type imaging system for its reconnaissance
capability. The Air Force established the requirement for such a system on Nov.
27, 1954, followed by a formal General Operational Requirement in March 1955
which called for a system providing an image resolution of no larger than 20
feet. SPIRES, supra note 3, at 36-37
n50 PEEBLES, HIGH FRONTIER, supra note 43, at 13.
n51 The National Reconnaissance Office was considered so secret
that even in classified documents outside the special security controls
established for satellite photos and data, the words 'National Reconnaissance
Office' and 'National Reconnaissance Program' were not to be used. Instead, the
phrase 'Matters under the purview of DOD TS 5105.23' would be given. (This was
the directive which established the NRO.) It would be thirty-two years before
the initials 'NRO' were spoken in public by a U.S. government official.
PEEBLES, THE CORONA PROJECT, supra note 49, at 96.
n52 PEEBLES, HIGH FRONTIER, supra note 43, at 14.
n53 Upon release of videotape depicting the satellite, AVIATION WEEK &
SPACE TECHNOLOGY declared that it used "the most advanced technology employed by
any U.S. military or civilian unmanned spacecraft." C. Couvalt, Secret Relay,
Lacrosse NRO Spacecraft Revealed, 148:12 AV. WK. & SPACE TECH., Mar. 23, 1997,
n54 Id. With its solar array and still-secret radar antenna, the satellite is
actually much larger than a bus.
n55 Id. at 28. For obvious reasons, the capability of military technology
exceeds that which is commercially available. This continues to challenge
military research and development however with ever-increasing improvements to
commercial remote sensing capability. In April 1999, the Space Imaging
Corporation aspired to exceed Russia's Spin-2 capability of two meters. The
Ikonos 1 satellite boasted digital black and white images to resolutions of one
meter. M. Mecham, Commercial Imaging to Enter 1-Meter Era, 150:17 AV. WK. &
SPACE TECH., Apr. 26, 1999, at 84. After launch on Apr. 27, 1999, the
satellite was lost when an electrical malfunction prevented the satellite from
separating from its booster. Athena/Ikonos Loss Caused by Open Circuit, 150:24
AV. WK. & SPACE TECH., June 14, 1999, at 82; C. Covault, Reviews Advance As New
Satellite Fails, 150:21 AV. WK. & SPACE TECH., May 24, 1999, at 61. The
subsequent launch of a successor satellite on Sept. 3, 1999 now makes one meter
resolution from space available to any purchaser.
n56 MIDAS was originally designated "Subsystem G" in the WS-117L program
before becoming its own separate system. PEEBLES, HIGH FRONTIER, supra note 43,
at 33. Previously, there were U.S. systems used to track space objects, however
none were focused on the distinctive heat signature left by an ICBM or IRBM.
n57 Id. at 38. In 1991, DSP satellites alerted coalition forces to the launch
of Iraqi Scud missiles-the first use of U.S. missile warning satellites in
combat. Id. at 39.
n58 Currently in development is the Space Based Infrared System (SBIRS) which
will incorporate the current DSP system. The SBIRS will include much more than
an early warning capability. Its operational requirements call for four mission
areas: missile warning, missile defense, technical intelligence, and battlespace
characterization. Federation of American Scientists, Space Based Infrared
System, Federation of American Scientists,
http://www.fas.org/spp/military/program/warning/sbir.htm (last visited June 28,
2000) (on file with the Air Force Law Review). The program originally entailed
development of four satellites in GEO and two more in highly elliptical orbits
(SBIRS-High), and a constellation of 24 additional satellites in low-earth orbit
(SBIRS-Low). The U.S. Air Force recently cancelled a demonstrator project for
the SBIRS-Low program citing costs and delays in the SBIRS-High program, which
is now scheduled for launch in 2004. Launch of the SBIRS-Low system is set for
2006. R. Wall, USAF Cancels SBIRS-Low Satellite Demonstrations, 150:6 AV. WK. &
SPACE TECH., Feb. 8, 1999, at 66; R. Wall, Pentagon Delays SBIRS Launch, 150:3
AV. WK. & SPACE TECH., Jan. 18, 1999, at 26.
n59 Though the early emphasis for military satellites was on scientific
exploration and reconnaissance, interest in a space-based telecommunications
network for the military began at least as early as Arthur C. Clarke's 1945
proposal to position three satellites in equidistant geosynchronous orbit
(22,500 miles) for near-global communications coverage. Because Clarke first
proposed use of the GEO for communications satellites, it is also sometime
referred to as the Clarke orbit. G.H. REYNOLDS & R.P. MERGES, OUTER SPACE:
PROBLEMS OF LAW AND POLICY 15 (2nd ed., 1997) [hereinafter REYNOLDS & MERGES].
The first communications satellite, Project Score, was launched on Dec. 18, 1958
and carried a tape-recorded Christmas message from President Eisenhower.
PEEBLES, HIGH FRONTIER, supra note 43, at 44. A subsequent effort, dubbed
Project West Ford, relied upon the release of 400 million copper dipoles of 0.7
inch length at an altitude of 2000 miles. The "needles" were to form a 25 to 30
mile wide ring around the earth off of which communications signals could be
reflected. After a successful test, the military terminated the program in the
face of vigorous scientific and environmental protests. Id. at 45. See also
DELBERT R. TERRILL, JR., THE AIR FORCE ROLE IN DEVELOPING INTERNATIONAL LAW
63-66 (1999). Other systems were used in the 1960s until the Interim Defense
Communications Satellite Program (IDCSP), later renamed the Defense Satellite
Communications System (DSCS) became operational in 1967. These were followed by
second and third generation satellites (DSCS II and DSCS III) providing
strategic communications from fixed military installations. These systems have
been updated by the MILSTAR system, "a totally secure, jam free system; its
terminals can be carried in a suitcase and set up in two and one-half minutes."
Donald J. Kutyna, Indispensable: Space Systems in the Persian Gulf War, in THE
U.S. AIR FORCE IN SPACE 1945 TO THE TWENTY-FIRST CENTURY 103, 117 (R. Cargill
Hall & Jacob Neufeld, eds., 1995). For mobile (tactical) communications, the DOD
has used systems such as the Lincoln Experimental Satellite (LES), the Tactical
Communications Satellite (TACSAT I), and the Navy's Fleet Satellite
Communications System (FLTSATCOM). PEEBLES, HIGH FRONTIER, supra note 43, at
47-50. For a discussion of the legal issues raised by military use of the former
International Mobile Satellite Organization's INMARSAT system, see infra Part
VI, @ E.1. The growth of military dependence on commercial communications
systems will only increase the legal and operational issues during times of
armed conflict. By 1999, approximately 60% of U.S. military satellite
communications traveled over commercial systems. W.B. Scott, Space Chief Warns
of Threats to U.S. Commercial Satellites, 150:15 AV. WK. & SPACE TECH., Apr. 12,
1999, at 51 [hereinafter Scott, Threats to U.S. Satellites].
n60 NASA's Tiros I satellite, launched on Apr. 1, 1960, created a revolution
in weather forecasting. However, it could not satisfy military needs for
coverage, readout locations, or timeliness. Scott, Threats to U.S. Satellites,
supra note 59 at 52. DOD developed a series of satellites in the 1960s placed in
450 mile polar orbits that became the Defense Meteorological Satellite Program
(DMSP). During the Vietnam war, cloud cover imagery from DMSP satellites became
the basis of target selection and mission planning. Id. at 53. The program's
existence was not publicly revealed until 1973. The DMSP has undergone numerous
upgrades since its inception, to include sensors detecting temperature,
atmospheric moisture, soil moisture, sea state, and ice cover. The DMSP has
supported all major U.S. military operations since the Vietnam War. Id. at 55.
n61 Id. at 59.
n62 Id. at 57. See also Air Force News Service, U.S. Discontinues Selective
Availability of GPS to Public, May 2, 2000 (on file with author).
n63 HEPPENHEIMER, supra note 15, at 348-49.
n64 W.J. BOYNE, BEYOND THE WILD BLUE: A HISTORY OF THE U.S. AIR FORCE 274
(1998). Because the U.S. made use of the system available to commercial and
civil users shortly after the destruction of Korean Airlines Flight 007 by the
Soviet Union in 1983, it opened a possible security risk from a military point
of view. One nightmare scenario for security analysts is the specter of a "poor
man's cruise missile" in the hands of hostile States or terrorists - that is, an
old weapon suddenly made extremely accurate by use of GPS. SHUKMAN, supra note
39, at 166. As a result, the U.S. initially degraded the accuracy of the primary
signal, establishing the difference between a "coarse acquisition code" and the
encrypted "precise code," to protect the military advantage the system offers
its military and that of its allies. Recent developments associated with the
U.S. military's Joint Direct Attack Munition (JDAM) put the required military
position accuracy of the system at 3 meters. With growing reliance on the system
by foreign and domestic non-military users as well, the potential liability to
the U.S. has increased proportionately. B.D. Nordwall, World Pressure Grows for
Regional GPS Augmentations, 147:22 AV. WK. & SPACE TECH., Dec. 1, 1997, at 66.
As of May 1, 2000, President Clinton directed that the DOD provide the
undegraded signal for public use. In discontinuing "selective availability," the
President stated that future threats could be dealt with by applying selective
availability on a regional basis as needed. Air Force News Service, U.S.
Discontinues Selective Availability of GPS to Public, May 2, 2000 (on file with
author). For a thorough analysis of potential U.S. liability both under domestic
and international law, see Jeffrey A. Rockwell, Liability of the United States
Arising Out of the Civilian Use of the Global Positioning System (1996)
(unpublished LL.M. thesis, McGill University) (on file with author, and the
Nahum Gelber Law Library, McGill University).
n65 SHUKMAN, supra note 39, at 163 (from a classified Pentagon assessment of
the performance of GPS in the Gulf War).
n66 Id. at 163.
n67 In Operation Allied Force, the NATO allies made heavy use of GPS for
navigation and precision-guided targeting. C. Covault, Recon, GPS Operations
Critical to NATO Strikes, 150:17 AV. WK. & SPACE TECH., Apr. 26, 1999, at 35.
However, heavy military reliance on GPS is a double-edged sword because the
system is still extremely vulnerable to jamming. Interference by electronic
jamming, or even destruction of part of the system by anti-satellite weaponry,
might cripple a military force having abandoned its skills in other forms of
navigation. SHUKMAN, supra note 39, at 164-65.
n68 Vlasic, Space Law and Military Applications, supra note 11, at 397, 398.
n69 For a discussion of the problem of defining "space weapon," see notes
558-565 and accompanying text.
n70 An example of the latter is the U.S. ASAT Air-Launched Miniature Vehicle
(ALMV). First tested against a functioning satellite on Sept. 13, 1985, the ASAT
"kill vehicle" was launched aboard a missile from an F-15 for ascent to the
target satellite and destruction by impact. "The warhead, or Miniature Vehicle
(MV), is an extremely complex and sophisticated device consisting of eight
cryogenically cooled infrared telescopes, a laser gyro, and sixty-four small
computer-controlled rockets used for final course adjustments before colliding
with the target. All this is packed into a 12-by-13 inch casing. After being
guided to and released near the target, the Miniature Vehicle homes in on the
heat emitted by the satellite and rams into it with sufficient force to destroy
it." PAUL B. STARES, SPACE AND NATIONAL SECURITY 99 (1987) [hereinafter STARES,
SPACE AND NATIONAL SECURITY]. See also C. Covault, Antisatellite Weapon Design
Advances, 112:24 AV. WK. & SPACE TECH., June 16, 1980, at 243. In terms of
destructive classification, the ALMV is a kinetic energy weapon.
n71 Though the previous SAINT ("satellite interceptor") system had been
developed, it was never fielded. The latter system, known simply as Program 437,
utilized a nuclear warhead launched atop a Thor IRBM from Johnson Island in the
South Pacific. With a yield of 1 megaton, the warhead had a kill radius of 5
miles. The U.S. declared the system fully operational on June 10, 1964, and it
remained in service or available for speedy redeployment until it was terminated
on Apr. 1, 1975. See PEEBLES, HIGH FRONTIER, supra note 43, at 62-65.
n72 COLLINS, MILITARY SPACE FORCES, supra note 12, at 28.
n73 In a vacuum, winds do not blow and shock waves cannot develop where no
medium such as air, water, or earth resists compression. As for heat, the
fireballs normally associated with nuclear blasts in the air do not occur above
65 miles (approximately 100 km). Id. at 29.
n74 By contrast, collateral damage from initial nuclear radiation "regardless
of type, is indiscriminate, . . . [and] would be difficult to predict and
expensive to control." Id. at 31.
n75 Such an event was portrayed in the James Bond Hollywood production
n76 COLLINS, MILITARY SPACE FORCES, supra note 12, at 29.
n77 Id. at 31.
n78 Id. at 30.
n80 Id. The ionosphere exists from 30 to 500 miles (approximately 48 to 805
km) above the earth's surface. Id. at 9.
n81 During a detonation at 48 miles (77 km) altitude on Aug. 1, 1958 over
Johnson Island, the U.S. observed the degradation of high frequency radio
traffic throughout a region several thousand miles in diameter for a period of
approximately six hours. Id. at 29.
n82 Indeed the Soviet Union used an array of 64 nuclear tipped anti-ballistic
missiles around Moscow as a small-area missile defense system. Code named
"Galosh," the system undoubtedly could be converted into an ASAT system. STARES,
SPACE AND NATIONAL SECURITY, supra note 70, at 96.
n83 PEEBLES, HIGH FRONTIER, supra note 43, at 59.
n84 J.C. Anselmo, U.S. Seen More Vulnerable to Electromagnetic Attack, 147:4
AV. WK. & SPACE TECH., July 28, 1997, at 67.
n85 Ivan Bekey, Force Projection from Space, in (unnumbered Space
Applications Volume) NEW WORLD VISTAS: AIR AND SPACE POWER FOR THE 21ST CENTURY,
at 83, 84 (1995) [hereinafter Bekey].
n87 Id. at 85. With respect to information warfare, the report gives a number
of examples: network viruses, disinformation, memory erasures, and false
signals. For a brief discussion of information warfare and its relation to
space combat, see infra Part VI, @ D.
n88 For example, a 4,000 pound automobile would have to travel almost 270
miles per hour to equal the kinetic energy of a one-pound projectile traveling
at 4.7 miles per second. DAVID E. LUPTON, ON SPACE WARFARE: A SPACE POWER
DOCTRINE 22 (1988).
n89 B. Jasani, Space Weapons and International Security-An Overview, in
SPACE WEAPONS AND INTERNATIONAL SECURITY 22 (B. Jasani, ed., 1987) [hereinafter
Jasani, Space Weapons].
n90 Federation of American Scientists, Kinetic Energy Anti-Satellite,
Federation of American Scientists,
http://www.fas.org/spp/military/program/asat/keasat.htm (last visited June 29,
2000) (on file with the Air Force Law Review).
n93 Bekey, supra note 86, at 83.
n94 M. Potter, Gun Launch to Space: International Policy and Legal
Considerations, in PROCEEDINGS OF THE THIRTY-FOURTH COLLOQUIUM ON THE LAW OF
OUTER SPACE 305 (1992).
n95 Id. at 306.
n96 STARES, THE MILITARIZATION OF SPACE, supra note 40, at 111.
n97 During the height of research on the Strategic Defense Initiative many
scientists openly questioned that a missile defense project involving
space-based lasers could ever work. The Union of Concerned Scientists declared
that an effective defense of the U.S. against a Soviet missile defense was
unattainable. A report from the Congressional Office of Technology Assessment
claimed the likelihood that such a system could protect the U.S. from Soviet
missile attack "so remote that it should not serve as the basis for public
expectations or national policy." L.B. TAYLOR, JR., SPACE: BATTLEGROUND OF THE
FUTURE? 24 (rev. ed., 1988) (quoting Edward Edelson, Space Weapons: The Science
Behind the Big Debate, POPULAR SCIENCE (July 1994)) [hereinafter TAYLOR]. Partly
because of the tremendous technical difficulties, the program began to refocus
on earth-based lasers.
n98 The other ground-based program is a free-electron laser designed to
reflect its high-energy beam off orbiting space mirrors for redirection back to
n99 Federation of American Scientists, Mid-Infrared Advanced Chemical Laser,
Federation of American Scientists,
http://www.fas.org/spp/military/program/asat/miracl.htm (last visited June 29,
2000) (on file with the Air Force Law Review). The beam is created via chemical
Just downstream from the combustor, deuterium and helium are injected into the
exhaust. Deuterium combines with the excited fluorine to give excited deuterium
fluoride molecules, while the helium stabilizes the reaction and controls the
temperature. The laser's resonator mirrors are wrapped around the excited
exhaust gas and optical energy is extracted. The cavity is actively cooled and
can be run until the fuel supply is exhausted. The laser's output power can be
varied over a wide range by altering the fuel flow rates and mixture.
n100 Sami Fournier, U.S. Text-Fires 'MIRACL' at Satellite Reigniting ASAT
Weapons Debate, (Oct. 1997) Arms Control Association,
http://www.armscontrol.org/ACT/oct97/miracloct.htm (on file with the Air Force
Law Review) [hereinafter Fournier].
n101 M.A. Dornheim, Laser Engages Satellite, With Questionable Results,
147:17 AV. WK. & SPACE TECH., Oct. 27, 1997, at 27. The test was not intended to
destroy the satellite but merely examine what various MIRACL power levels could
do to the target satellite's sensors. An official reported that the anticipated
data gathering from the satellite was unsuccessful.
n102 Following the test, the Russian Foreign Ministry issued a statement
saying that the laser "may become a step toward creating an anti satellite
potential." Fournier, supra note 100. Even before the test, several U.S.
lawmakers sent President Clinton a letter stating "we are deeply troubled that a
test of a ground based laser system with such obvious ASAT warfare capabilities
would proceed ahead of any debate or deliberate policy development." Id.
n103 D.A. Fulghum, Airborne Laser Aimed At New Defense Roles, 149:14 AV. WK.
& SPACE TECH., Oct. 5, 1998, at 111; D.A. Fulghum, Airborne Laser Tested,
Weighed for New Missions, 147:17 AV. WK. & SPACE TECH., Oct. 27, 1997, at 26.
The ABL program manager, Colonel Michael Booen, stated that "this [laser's
success] is going to break the door down for directed energy weapons." Id.
n104 W. Matthews, Laser Faces 'Challenges,' Report Says, A.F. TIMES, Jan. 19,
1998, at 24.
n105 Federation of American Scientists, Space Based Laser, Federation of
American Scientists, http://www.fas.org/spp/starwars/program/sbl.htm (last
visited June 29, 2000) (on file with the Air Force Law Review).
n106 J.R. Asker, Washington Outlook, 150:21 AV. WK. & SPACE TECH., May 24,
1999, at 27.
n107 M.A. Dornheim, Pentagon Mulls Space Laser Test, 148:12 AV. WK. & SPACE
TECH., Mar. 23, 1998, at 32.
n108 STARES, THE MILITARIZATION OF SPACE, supra note 40, at 111.
n109 Another theorized advantage of directed energy (DE) weapons will be the
range of employment options offered. These could fill the gap between diplomacy
and bombs by allowing for an escalating scale of destructive from minor
disruption to the target to total destruction. See W.B. Scott, 'Beam' Weapons
Edging Into Arsenal, 151:1 AV. WK. & SPACE TECH. July 5, 1999, at 53.
n110 TAYLOR, supra note 97, at 33. Because of its great speed and capacity
for repeat firing, Taylor suggests that particle beams "would do to the
ballistic missile virtually what the machine gun did to the infantry charge."
Id. at 34.
n111 Id. at 33.
n112 Id. at 35.
n113 Some conceive this ASAT as a kinetic energy weapon. "The Soviet ASAT
system could be categorized as a rocket-propelled KEW [kinetic energy weapon]."
Jasani, Space Weapons, supra note 89, at 19. However, as its title suggest, a
kinetic energy weapon derives its value as a weapon not from an explosive
capacity, if any, but its kinetic energy. The design of the Soviet System relies
heavily on its explosive charge; the ASAT need not even physically impact its
n114 STARES, SPACE AND NATIONAL SECURITY, supra note 70, at 87. The average
wait before launch can occur in order to attack a specific satellite is six
hours. Id. at 88.
n115 Id. at 86.
n116 Reportedly, the Russians resumed ASAT testing in April of 1999 with a
design that will utilize an EMP. As reported, the Pentagon considers this a
"serious development" given that satellites are the "Achilles' heel of the U.S.
military's high-technology force used for sending orders to forces around the
world as well as communicating with troops and organizing logistics." B. Gertz &
R. Scarborough, Russian ASAT, WASH. TIMES, June 18, 1999, at 9.
n117 A.A. Kokoshin, et al., Measures for Counteracting Space Strike Weapons,
in SPACE WEAPONS AND INTERNATIONAL SECURITY 92 (B. Jasani, ed., 1987).
n118 See Bekey, supra note 86, at 87.
n120 This article uses the phrases "law of war," "law of armed conflict," and
"humanitarian law" as being essentially synonymous. Historically, "law of war"
has been used, although "law of armed conflict" is more accurate given that such
law applies in cases of conflict not amounting to war. "Law of war" will
generally be used in order to highlight the connection between the relevant
treaty regimes, rooted in the first five decades of the twentieth century, and
current State practice. Some scholars articulate distinctions among the three
phrases noting for example that humanitarian law is that subset of the law of
war that concerns itself specifically with the reduction of human suffering.
However, because the reduction of suffering is ultimately the goal of all
restrictions on the means and methods of warfare, such distinctions seem overly
technical. Others, such as the International Court of Justice (ICJ), prefer the
term "international humanitarian law" which it describes as the synthesis of
"Hague Law," governing means and methods of warfare, and "Geneva Law," governing
the protection of the victims of war. See The Legality of the Threat or Use of
Nuclear Weapons, 1996 I.C.J. 1, at 27 [hereinafter ICJ Advisory Opinion on
Nuclear Weapons]. This definitional framework is ultimately helpful as it
attempts to contain the full range of law governing the use of force in combat
to a single category of international law. However, use of terms like
"humanitarian" when applied to limits on war's means and methods risks merely
equating the law of war with human rights law. On the dangers associated with
doing so, see infra notes 176 and 220. On the connection between human rights
law and the law of war, see Howard Levie, Violations of Human Rights in Time of
War As War Crimes, in 70 INTERNATIONAL LAW STUDIES, LEVIE ON THE LAW OF WAR 373
(Michael N. Schmitt & Leslie C. Green, eds., 1998); Rene Provost, Reciprocity in
Human Rights and Humanitarian Law, 1994 BRIT. Y.B. INT'L L. 383 (1995).
n121 Schmitt, Bellum Americanum, supra note 6, at 412.
n122 Reasons commonly include: diminishing suffering, diminishing the moral
depravation of the soldiers, lessening the dangers that threaten the survival of
our civilization, lessening the dangers that threaten the survival of mankind,
favorably impacting the peacetime creation of doctrines and weapons, and
furthering the cause of disarmament to the extent specific weapons are
prohibited. B.V.A. Roling, The Significance of the Laws of War, in CURRENT
PROBLEMS IN INTERNATIONAL LAW: ESSAYS ON U.N. LAW AND ON THE LAW OF ARMED
CONFLICT 133 (A. Cassese, ed., 1975). To these six might be added a seventh and
eighth - increased chances for the restoration of peace following armed
hostilities, and, somewhat paradoxically, increased military efficiency by
requiring the focused application of force.
n123 For some, "ironic" is the gentle way of putting it. Some authors express
outright cynicism that the project of regulating warfare can ever succeed.
Others provide examples leading to a measured skepticism over various aspects of
the law of war. This skepticism can take the form either that military forces
and their civilian leaders cannot be trusted to follow the law when war begins,
or that the law simply does not regulate consistently. An example of the former
relates to action at the First Hague Peace Conference to phrase principles of
warfare restrictively subject to exceptions, rather than permissively subject to
restrictions. As Hays Parks notes, "this is a manifestation of the fundamental
distrust international lawyers have for things military, and a reluctance to
permit battlefield commanders any latitude in situations that require a judgment
call." W. Hays Parks, Air War and the Law of War 32:1 A.F. L. REV. 1, 14 n.54
(1990) [hereinafter Parks]. Regarding the latter form of skepticism,
Doswald-Beck claims that the law's prohibition of certain forms of bullets
without an unambiguous prohibition of nuclear weapons "creates skepticism
regarding the seriousness of any of the law of war." L. Doswald-Beck,
Implementation of International Humanitarian Law in Future Wars, in 71
INTERNATIONAL LAW STUDIES THE LAW OF ARMED CONFLICT: INTO THE NEXT MILLENNIUM,
39 at 43 (Michael N. Schmitt & Leslie C. Green, eds., 1998).
n124 Those viewing war as necessarily barbaric, for reasons of strategy or
otherwise, react coolly to the whole notion of rules, or moderation in war.
Thus, British Vice Admiral Sir John Fisher declared at the 1899 Hague Peace
Conference that humanizing war was tantamount to humanizing hell. His suspicion
at the law of war flowed from his view of the very nature of war:
what you call my truculence is all for peace. If you rub it in, both at home and
abroad, that you are ready for instant war with every unit of your strength in
the first line, and intend to be first in, and hit your enemy in the belly, and
kick him when he is down, and boil your prisoners in oil (if you take any!), and
torture his women and children, then people will keep clear of you.
Parks, supra note 123, at 13 n.50.
n125 Charles Dunlap, A Virtuous Warrior in a Savage World, 8 A.F. ACAD. J.
LEGAL STUD. 71, 89 (1997-1998) (quoting Richard Overy, WHY THE ALLIES WON 302-05
n126 Such an argument assumes a certain form of warfare that values and
benefits from order. Theoretically, guerilla or terrorist tactics could eschew
the type of "order" discussed here. But even these methods of warfare assume a
certain level of coordination, planning, and thus order.
n127 Carl von Clausewitz famously wrote that,
war is not merely an act of policy but a true political instrument, a
continuation of political intercourse, carried on with other means. What remains
peculiar to war is simply the peculiar nature of its means . . . . The political
object is the goal, war is the means of reaching it, and means can never be
considered in isolation from their purpose.
CARL VON CLAUSEWITZ, ON WAR, 87 (M. Howard, & P. Paret, trans. & eds., 1976)
[hereinafter CLAUSEWITZ]. Elsewhere, Clausewitz describes how ugly those "other
means" really are:
If one side uses force without compunction, undeterred by the bloodshed it
involves, while the other side refrains, the first will gain the upper hand.
That side will force the other to follow suit; each will drive its opponent
toward extremes, and the only limiting factors are the counterpoises inherent in
war . . . . It would be futile-even wrong-to try and shut one's eyes to what war
really is from sheer distress at its brutality.
Id. at 75-76.
n128 Thus ancient Chinese strategist Sun Tzu "did not conceive the object of
military action to be the annihilation of the enemy's army, the destruction of
his cities, and the wastage of his countryside. 'Weapons are ominous tools to be
used only when there is no alternative.'" Samuel B. Griffith, Introduction to
SUN TZU, THE ART OF WAR, 1, 40 (S.B. Griffith, trans., 1963). The dichotomy
between the approaches of Clausewitz and of Sun Tzu led B.H. Liddell Hart to
Civilization might have been spared much of the damage suffered in the world
wars of this century if the influence of Clausewitz's monumental tome On War,
which moulded European military thought in the era preceding the First World
War, had been blended with and balanced by a knowledge of Sun Tzu's exposition
on 'The Art of War.'
B.H. Liddell Hart, Forward to SUN TZU, THE ART OF WAR v (S.B. Griffith, trans.,
n129 One need only view two recent Hollywood productions, Saving Private Ryan
and The Thin Red Line, to experience the horrors of war beyond the written word.
In both cases, the films vividly portray the existential horrors of warfare
(violent death, mutilation, betrayal, savagery, terror) through realistic
reenactment. Yet even the film medium, powerful as it is, cannot reproduce the
feelings experienced in war either by the combatant or the noncombatant. Beyond
this, Saving Private Ryan, in particular, included reenactment of several
violations of the law of war. In one case toward the end of the film, a young
American soldier is shown killing a German soldier who had his hands in the air
and had surrendered his weapon and intent to resist, thus entitling himself to
protection as a prisoner of war. Though the 1949 Geneva Convention (III)
Relative to the Treatment of Prisoners of War had not yet come into existence at
the time of this depiction, the 1907 regulations annexed to the Hague Convention
(IV) on land warfare had. These regulations, which governed military conduct
during WWII, unambiguously required humane treatment for prisoners of war. The
young American is portrayed as being the underdog having impotently witnessed
another German lawfully, though agonizingly, killing an American compatriot just
moments before. Perhaps the most troubling aspect of this scene is the
unfortunate effect it likely has on most American audiences. Rather than
producing feelings of distaste at having witnessed a war crime, the screenplay
appears designed to elicit a sense of euphoria that the younger, weaker American
finally got the enemy. To the extent that the popular media manipulates public
opinion in ways such as this, respect for the law of war is not engendered, but
diminished. This is not to disparage this particular movie. The Secretary of
Defense rightly honored director Steven Spielberg on Aug. 11, 1999 at a ceremony
during which the Secretary awarded him the DOD Distinguished Civilian Public
Service Award for successfully honoring the memory of a past generation that
made the ultimate sacrifice in a just cause. The example is simply intended to
highlight dangers that may exist for the law of war in the popular mind coming
out of even magnificent works such as Saving Private Ryan.
n130 E.J. Osmanczyk, War, in THE ENCYCLOPEDIA OF THE UNITED NATIONS AND
INTERNATIONAL RELATIONS, 1018 (2nd ed., 1990). Horrible as it is, Malanczuk
notes that war has not always been perceived as it is today.
It is hard to realize that during the eighteenth and nineteenth centuries most
people (except for a few pacifists) regarded war in much the same way as they
regarded a hard winter - uncomfortable, certainly, but part of the settled order
of things, and providing excellent opportunities for exhilarating sport; even
the wounded soldier did not regard war as wrong, any more than the skier with a
broken leg regards skiing as wrong.
PETER MALANCZUK, AKEHURST'S MODERN INTRODUCTION TO INTERNATIONAL LAW 308 (7th
ed., 1997) [hereinafter MALANCZUK, INTRODUCTION TO INTERNATIONAL LAW].
n131 Despite some vigorous dissent, the law of war has influenced the conduct
of armed forces in many ways. As examples to the contrary, consider Cicero's
oft-quoted maxim inter arma silent leges (lit. "in war the law is silent"), and
professor Fenwick's pessimistic candor, "it is futile to attempt to revive [the
laws of war] . . . . Let's face the facts. War has got beyond the control of law
. . . . The sooner every man, woman and child old enough to think realizes that
he will be a party to the next war, the better." C.G. Fenwick, 43 PROC. AM.
SOC'Y INT'L L. 110 (1949) (transcript of oral response to W. Downey, Jr.,
Revision of the Rules of Warfare). Roberts and Guelff cite several international
norms that have been observed principally because of the law of war including,
humane treatment of prisoners, a state's entitlement to neutral status,
illegitimacy of certain targets, and that persons not active in the conflict
should be spared from the consequences of the fighting to the extent possible.
Adam Roberts & Richard Guelff, Introduction to DOCUMENTS ON THE LAWS OF WAR, 1,
14 (Adam Roberts & Richard Guelff, eds., 1989) [hereinafter Roberts & Guelff].
n132 Because the law of war is a matter of public international law, and
regulates the conduct of States relative to each other, it does not ordinarily
regulate purely internal, civil wars. Nonetheless, certain regional agreements
relate to internal conflicts. Further, Roberts and Guelff note that,
customary international law provided that the laws of war might become
applicable to a non-international conflict through the doctrine of 'recognition
of belligerency' . . . [by which] the government of a state in which an
insurrection existed could recognize the belligerency of the insurgent faction,
and the laws of war would thereby become applicable.
Roberts & Guelff, supra note 131, at 12. The authors further note that the
doctrine of recognition of belligerency has fallen into decline, and that the
surer basis for application of certain fundamental humanitarian provisions in
non-international conflicts is Common Article 3 of the four 1949 Geneva
Conventions. Id. at 13. Finally, while the 1977 Geneva Protocol II is intended
to expand the provisions of Common Article 3, it too applies only during the
existence of an "armed conflict."
n133 "Today humanitarian law is applicable in any international armed
conflict, even if the parties to that conflict have not declared war and do not
recognize that they are in a formal state of war." Christopher Greenwood,
Historical Development and Legal Basis, in THE HANDBOOK OF HUMANITARIAN LAW IN
ARMED CONFLICT 1, 10 (Dieter Fleck, ed., 1995). As Greenwood uses the term,
"international humanitarian law" is synonymous with the older phrase "law of
war" (with the exception of the law of neutrality), the former including all
rules designed to regulate the treatment of the individual-civilian or military,
wounded or active-as well as rules governing the means and methods of warfare.
Id. at 9.
n134 See infra, Part III, @ C.4.
n135 MICHAEL WALZER, JUST AND UNJUST WARS: A MORAL ARGUMENT WITH HISTORICAL
ILLUSTRATIONS 21 (2d. ed., 1977).
n136 THOMAS FRANCK, FAIRNESS IN INTERNATIONAL LAW AND INSTITUTIONS 246
(1995). Though Franck frames the distinction in moral categories (i.e. "just"),
the context makes clear he is asserting that the early development of
international legal norms mirrored those of the "just war" tradition-an ethical
as well as a legal theory of warfare. Franck claims that this tradition held
sway in Western societies as both a legal and ethical theory until the 1648
Peace of Westphalia ushered in an international order based on "a balance of
power among sovereign nations [rather than] the ideal of a unified empire under
God and right reason. This Westphalian system remained in place until the
outbreak of war in 1914. Positivism largely banished notions of just war from
the realm of law to the outer marches of moral philosophy." Id. at 252.
n137 Fritz Kalshoven, Laws of War, in 4 ENCYCLOPEDIA OF PUBLIC INTERNATIONAL
LAW 316 (Bernhardt, ed., 1982).
n138 MALANCZUK, INTRODUCTION TO INTERNATIONAL LAW, supra note 130, at 306.
n139 Arguably, prior to 1928 and execution of the Treaty of Paris
(Kellogg-Briand Pact) which purported to outlaw warfare as a legitimate means of
dispute resolution, there was no such thing as a jus ad bellum. While there were
ethical principles relating to conditions for a "just war" and for self-defense,
nothing approached the level of international law. Even the Treaty of
Versailles, which took initial steps toward conditioning the use of force (e.g.
Article 16 which made acts of war against any member of the League of Nations
acts of war against all members), did not explicitly ban war itself. Treaty of
Versailles, art. 16, (1919 Supp.) 13 AM. J. INT'L L. 2.
n140 Roberts & Guelff, supra note 131, at 1.
n141 This is subject to the clarification that while the law of war as a body
of legal principles does work to limit the means and methods of warfare, those
principles recognize that in the world of fact (versus legal principle) acts of
combat exist and may even appear to be allowed by reference to the relevant
legal principle. Some may view this reference to legal principles as
authorization, as for example in this reference to the principle of military
necessity: "I did X, an otherwise prohibited act, because it was militarily
necessary." For a discussion of military necessity, see infra, Part III, @ B.1.
But to view the law of war as authorizing or enabling behavior, misses a
fundamental principle of international law. Professor Schmitt, author of the
foregoing military necessity example, puts it best: "To exist as a principle of
law, military necessity must have independent legal valence. That can, by
definition, only occur when it is characterized as a limitation, for, as a
general rule, all that is not prohibited in international law is permitted."
Michael N. Schmitt, Book Review: Law on the Battlefield 8 A.F. ACAD. J. L. STUD.
255, 257 (1997-1998) (reviewing A.P.V. ROGERS, LAW ON THE BATTLEFIELD (1996))
[hereinafter Schmitt, Book Review]. This analysis applies to all principles and
tenets of the law of war-thus all are restrictions on behavior. As for the
general proposition in international law that all that is not forbidden is
permitted, the International Court of Justice recently quoted from two previous
cases, as it recounted the position of several States leading up to its advisory
opinion on the threat or use of Nuclear Weapons. See ICJ Advisory Opinion on
Nuclear Weapons, supra note 120 (referencing the Steamship Lotus and Nicaragua
cases). In the Steamship Lotus case, the Permanent Court of International
Justice (P.C.I.J.) stated that "restrictions upon the independence of States
cannot . . . be presumed" and that international law leaves to States "a wide
measure of discretion which is only limited in certain cases by prohibitive
rules." P.C.I.J. (ser. A) No. 10, at 18-19. Then more recently, the
International Court of Justice stated that "in international law there are no
rules, other than such rules as may be accepted by the State concerned, by
treaty or otherwise, whereby the level of armaments of a sovereign state can be
limited." Military and Paramilitary Activities (Nicar. v. U.S.) 1986 I.C.J. 4,
135. Though the latter language specifically addressed armaments, it rests on
the rationale from the Steamship Lotus case-unless prohibited, an action is
n142 Convention (II) with Respect to the Laws and Customs of War on Land,
July 29, 1899, (1907 Supp.) 1 AM. J. INT'L L. 129.
n143 These four principles are generally viewed as summarizing the customary
law of war, though this enumeration is not accepted universally. Thus, Hays
Parks describes the concept of proportionality as subordinate to, and an
expression of, discrimination. He argues that discrimination is attended today
with some confusion "because of the attempted injection of the concept of
proportionality into the law of war." Parks, supra note 123, at 5 n.18. By
contrast, Professor Schmitt subordinates distinction to proportionality, and
recognizes chivalry as a forth distinct customary principle. See Michael N.
Schmitt, Green War: An Assessment of the Environmental Law of International
Armed Conflict 22:1 YALE J. INT'L L. 1, 52 (1997) [hereinafter Schmitt, Green
War]. Whatever the formulation however, each approach includes the relevant
prescriptive norms as developed in customary law, while giving special emphasis
to some but not others.
n144 As the subsequent analysis shows, the law demands such restraint whether
the operation in question is offensive or defensive in nature.
n145 FREDERIC DE MULINEN, HANDBOOK ON THE LAW OF WAR FOR ARMED FORCES 82-83
(Int'l Committee of the Red Cross 1987) [hereinafter DE MULINEN]. Perhaps
subpart (b) of this formulation is the more important as subpart (a), simply
invoking that which is not forbidden by the law of war, could apply to any
principle of the law of war and says nothing unique about the restrictions
imposed by military necessity.
n146 Such was the case in nineteenth century Germany as expressed through the
doctrine of Kriegsraison. This concept, an interpretation of the traditional
notion of military necessity, asserted that military necessity "could justify
any measures - even in violation of the laws of war - when the necessities of
the situation purportedly justified it." Air Force Pamphlet 110-31, The Conduct
of Armed Conflict and Air Operations P1-3(a)(1) (Nov. 19, 1976) (reissue
pending as AFPAM 51-710) [hereinafter AFP 110-31]. Abuse of the principle
continued into the twentieth century as Carnahan notes: "The modern denigration
of military necessity goes back at least to the Nuremberg trials after World War
II, where some defendants argued that military necessity justified their
atrocities against civilian populations." He continues that "military necessity
is widely regarded today as an insidious doctrine invoked to justify almost any
outrage. As a result, the principle has not been allowed to play the creative
role that it is capable of playing." Bruce M. Carnahan, Lincoln, Lieber and the
Laws of War: The Origins and Limits of the Principle of Military Necessity 92
AM. J. INT'L L. 213, 230 (1998) [hereinafter Carnahan, Lincoln, Lieber and the
Laws of War].
n147 For a discussion addressing this error, see supra note 141.
n148 Schmitt, Green War, supra note 143, at 54.
n149 AFP 110-31, supra note 146, at P1-6(b).
n150 Also termed "distinction."
n151 Roberts & Guelff, supra note 131, at 5.
n152 Professor Green, quoting from a treatise dating to 1802, states that "it
is only with the writers of the nineteenth century that either a clear
definition or the rights of soldiers or the first usage of the term 'combatants'
is found." LESLIE C. GREEN, THE CONTEMPORARY LAW OF ARMED CONFLICT 101 (1993)
n153 Thus, the law protects those combatants who are captured, wounded, sick,
or shipwrecked. The combatant category also does not include every member of the
military force, for example chaplains and medical personnel.
n154 Annex to the Convention, Regulations Respecting the Laws and Customs of
War on Land, Oct. 18, 1907, art. 1, (1908 Supp.) 2 AM. J. INT'L L. 90 (entered
into force Jan. 26, 1910) [hereinafter Hague Convention (IV) Annex]. Those
military members who should ordinarily fit this category but do not for failure
to comply with one of its terms, such as soldiers not wearing a uniform or
concealing their weapons, become "unlawful combatants" and risk loss of
protections afforded to lawful combatants.
n155 Admiral Robertson notes the fundamental character of the principle of
discrimination, and thus of military objective, by reference to the
International Court of Justice Advisory Opinion on Nuclear Weapons. There the
court opined that military objective is one of the two "cardinal principles" of
the law of armed conflict (the other being the prohibition on the use of weapons
causing unnecessary suffering to combatants). H.B. Robertson, The Principle of
the Military Objective in the Law of Armed Conflict, 8 A.F. ACAD. J. LEGAL STUD.
35 (1997-1998) (citing ICJ Advisory Opinion on Nuclear Weapons, supra note 120,
at 28) [hereinafter Robertson].
n156 Protocol Additional to the Geneva Conventions of Aug. 12, 1949, and
Relating to the Protection of Victims of International Armed Conflicts (Protocol
I), Dec. 12, 1977, art. 48, 1125 U.N.T.S. 3. (entered into force Dec. 7, 1978)
[hereinafter Protocol I].
n157 Id., art. 52(2). Though not adopted universally as a treaty rule,
Admiral Robertson notes that Protocol I's provisions on military objective from
Articles 48 and 52 are widely incorporated into military manuals and are
"recognized as a norm of customary international law." Robertson, supra note
155, at 44.
n158 For further discussion of this point, see infra note 196.
n159 See Declaration (XIV) Prohibiting the Discharge of Projectiles and
Explosives from Balloons, Oct. 18, 1907, 36 Stat. 2439; Declaration (IV, 1) To
Prohibit for the Term of Five Years the Launching of Projectiles and Explosives
from Balloons, and Other Methods of a Similar Nature, July 29, 1899, 32 Stat.
n160 Schmitt's observation bears repeating.
[The law of armed conflict] is no longer a body of law designed to ensure a fair
fight between two opponents . . . . Today, the law of armed conflict is designed
primarily to minimize suffering and prevent unnecessary destruction. This being
so, belligerents are held to the standards to which they are capable of rising.
Schmitt, Bellum Americanum, supra note 6, at 412. Schmitt's implication is that
technological advancement comes at some cost with respect to the law of war; the
more effectively weapons can avoid unnecessary destruction, the less ability
belligerents legally have in allowing for the possibility of such destruction.
n161 In this way, proportionality differs from the principle "economy of
force." Schmitt, Green War, supra note 143, at 55 n.267.
n162 This principle not only governs the use of force during the ongoing
operations of armed conflict, but during an act of self-defense under Article 51
of the Charter of the United Nations as well. See infra note 262. Thus, it is a
"rule well established in customary international law" that in exercising its
right to self-defense, a State may only use "measures which are proportional to
the armed attack and necessary to respond to it." Military and Paramilitary
Activities (Nicar. v. U.S.), 1986 I.C.J. 4, 94. The U.S. took the position that
the lawfulness of an act of self-defense depends in part on the necessity and
the proportionality of the measures taken. Id. at 103.
n163 Roberts & Guelff, supra note 131, at 5. The concept of reprisals has
proven controversial in international law. In 1977, Protocol I to the Geneva
Conventions sought to eliminate a form of reprisal taken against civilians or
the civilian population. Professor Green explains that reprisals are "otherwise
illegal measures taken in response to prior illegal measures of the adverse
party and which are intended to cause the adverse party to cease its illegal
activities and comply with the law. They are not measures taken simply by way of
retaliation." GREEN, supra note 152, at 331, 332. Abraham Sofaer points out that
the U.S. decision not to ratify the Geneva Protocol I came, in part, because it
narrowed the right of reprisal. He further states that this factor was of
concern to the U.S. Joint Chiefs of Staff, and that it "would hamper the ability
of the United States to respond to an enemy's intentional disregard of the
limitations established in the Geneva Conventions of 1949 or Protocol I."
Abraham Sofaer, Agora: The U.S. Decision Not to Ratify Protocol I to the Geneva
Conventions on the Protection of War Victims, 82 AM. J. INT'L L. 784, 785
(1988). Interestingly, Parks attributes the failure of the diplomatic
conference to produce fundamental agreement among the delegations to the
"cultural and philosophical differences that were substantially greater than
they had been [at the Hague in 1907 and Geneva in 1949]." He further points out
that many delegations were led by international lawyers lacking subject-matter
expertise; "no delegation had a military officer of the stature of a Mahan,
Fisher, or Rodgers." Parks, supra note 123, at 76.
n164 F.J.S. Gomez, The Law of Air Warfare 323 INT. REV. RED CROSS 347, 354
(1998) [hereinafter Gomez].
n166 In some formulations, chivalry receives attention as a separate
customary principle. As it has developed in the law of war, chivalry
distinguishes between acts of deception that undermine the goodwill of the
enemy, and those that do not. Thus, acts of perfidy are always prohibited. As
enumerated in Article 37 of Protocol I to the Geneva Conventions, these
prohibited acts include feigning an intent to negotiate under a flag of truce or
of a surrender, feigning an incapacitation by wounds or sickness, feigning
civilian or non-combatant status (such as marking of combat aircraft with the
international symbols affording protection as medical aircraft), and feigning
protected status by the use of signs, emblems, or uniforms of the United Nations
or of neutral States. By contrast, the law does not prohibit "ruses," such as
the use of camouflage, decoys, mock operations, and misinformation, which
deceive the opponent yet do not betray his confidence in measures requiring his
goodwill and which are intended to ameliorate the effects of war. Protocol I,
supra note 156, art. 37.
n167 Schmitt, Bellum Americanum, supra note 6, at 409.
n168 As Carnahan notes, "the ban on poisoned weapons is one of the oldest
continuing prohibitions in the law of war." Burrus M. Carnahan, Unnecessary
Suffering, The Red Cross and Tactical Laser Weapons 18 LOY. L.A. INT'L & COMP.
L.J. 705, 714 (1996) [hereinafter Carnahan, Unnecessary Suffering]. It predates
any attempts at codification by centuries.
n169 Declaration Renouncing the Use, in Time of War, of Explosive Projectiles
Under 400 Grams Weight, Dec. 11, 1868, (1907 Supplement) 1 AM. J. INT'L L. 95.
n170 These munitions have soft or hollow points so as to flatten on impact.
Also called "dum-dum" bullets after the munitions factory near Calcutta India
where first developed, they are outlawed for over 30 States Parties to a Hague
Declaration of 1899. Hague Declaration (IV, 3) Concerning Expanding Bullets,
July 29, 1899, (1907 supp.) 1 AM. J. INT'L L. 155. The declaration explicitly
applied to bullets "which expand or flatten easily in the human body, such as
bullets with a hard envelope which does not entirely cover the core or is
pierced with incisions." Id. Though not a party to the Declaration, the United
States has acknowledged that it will abide by the terms of the agreement.
Carnahan, Unnecessary Suffering, supra note 168, at 720.
n171 Protocol [to the Convention on Conventional Weapons] on Non-Detectable
Fragments (Protocol I), Apr. 10, 1981, 1342 U.N.T.S. 7 (entered into force Dec.
2, 1983). This Protocol to the 1980 Convention on Conventional Weapons prohibits
the use of "any weapon the primary effect of which is to injure by fragments
which in the human body escape detection by X-rays." Id.
n172 Protocol [to the Convention on Conventional Weapons] on Blinding Laser
Weapons (Protocol IV), Oct. 13, 1995, 35 I.L.M. 1218 (1996) (entered into force
July 30, 1998) [hereinafter Protocol on Blinding Lasers]. The International
Committee of the Red Cross (ICRC) takes the prohibition of Protocol IV a step
further in its 1995 pamphlet Blinding Weapons, and declares all "blinding as a
method of warfare" to be a violation of international humanitarian law.
Carnahan, distinguishing the ICRC's denunciation of poison gas in 1925, notes
that this "striking policy departure" marks the first time in history that the
ICRC has "publicly denounced a specific method of warfare as a violation of
international law." Carnahan, Unnecessary Suffering, supra note 168, at 705.
Carnahan concludes that by declaring the
undefined concept of 'blinding as a method of warfare' unlawful and making
exaggerated claims for the destructiveness of lasers, the ICRC has helped to lay
the basis for false war crime charges against any soldier captured with a
portable laser. The ICRC may have compromised its own ability to prevent abuse
of prisoners of war subjected to such charges.
Id. at 731. Although itself bordering on exaggeration, at least one important
reminder can be taken from this conclusion-a very possible consequence of
crusading against a means of warfare in the interest of soldiers may make the
very soldiers in view more vulnerable. A final observation regarding this
protocol lasers relates to its prospective nature vis-a-vis the weapons at
issue. This is one of the only attempts in the law of war to prohibit the use of
a weapons system before it has been deployed in combat, or even fielded for
training purposes prior to combat.
n173 For example, under Article 51 of the United Nations Charter, States have
the "inherent right" to use armed force in self-defense. See discussion infra
notes 262 and 267. This raises two fundamental issues. First, because the right
is inherent, and has been recognized by customary international law long prior
to the appearance of the United Nations Charter, the right existed before the
law prohibited warfare as an instrument of national policy. This right has been
widely recognized at least since the Caroline incident of 1837. See D.J. HARRIS,
CASES AND MATERIALS ON INTERNATIONAL LAW 894 (5th ed., 1998) [hereinafter
HARRIS]. Second, because the United Nations Charter speaks of this prerogative
toward self defense as a "right," it appears to be an explicit authorization to
act in certain circumstances. Taken as an authorization, and coupled with the
jus in bello, the reasonable implication of this understanding of Article 51 is
that States not only have the right to self defense, but have the right to use
armed force in self defense, and have the right to attack militarily necessary
targets in proportionate, "humane" ways as long as such attacks are otherwise
predicated on compliance with the jus ad bellum. Though this understanding
borders on repudiation of the principle articulated in the Steamship Lotus case,
that is, States may act as they please unless prohibited by law, by suggesting
that with respect to self defense the law plays an authorizing rather than
merely prohibitive role, it is better seen as merely a limited exception to the
Lotus rule rather than a direct challenge to it. For a discussion of the
Steamship Lotus case, see supra note 141.
n174 GREEN, supra note 152, at 333.
n175 Given the development of international law in this century, it is highly
doubtful States would ever completely restrict themselves from resort to the use
of force under any circumstances - the ultimate extension of pure humanity.
n176 It is for this reason that there is some danger of confusion in
referring to the law of armed conflict as humanitarian law. To the extent that
the latter title evokes images of human rights law, the term humanitarian, and
the legal content it suggests, could be transposed improperly from the one
subset of public international law to the other. This would fail to accord the
term its rightful and more limited place as it functions within the law of armed
conflict. Put simply, humanitarian as used in human rights law does not
necessarily mean "humanitarian" as used in the law of armed conflict. This does
not mean the two bodies of law are strictly distinct. See, e.g., Levie and
Provost cites at supra note 120. It also does not at all mean that humanity in
the law of war is a narrow principle of customary international law. As Schmitt
observes, as applied to protection of the environment in armed conflict,
humanity assumes an extra-anthropocentric quality. In this way it can be seen as
a broader concept than "humanitarian" as used in human rights law, and includes
prohibition of "activities that are not so much inhumane as inhuman. They are
acts we intuitively recognize as inherently wrongful regardless of the context
in which they occur. In a sense, they are violative of the 'dictates of public
conscience.'" Schmitt, Green War, supra note 143, at 61.
n177 Schmitt articulates a sequential analysis in determining whether a
military course of conduct comports with the law.
1. Means: Do the methods or means selected to execute the attack violate the
principles of distinction, humanity, or any specific prohibition of the law of
armed conflict? 2. Target: Is the target a military objective? If so, is attack
on this type of target specifically forbidden? If not, is the destruction of the
target militarily necessary? 3. Result: Does the concrete and direct military
advantage anticipated outweigh the collateral damage and incidental injury
likely to result?
Schmitt, Book Review, supra note 141, at 276 n.24. This approach helpfully
clarifies that each principle acts as a filter to weed out impermissible
military acts while at the same time recognizing that these principles are not
authorizations to act, but limitations on acts which might otherwise be lawful.
n178 It should be remembered that the two basic treaty regimes represented by
the Hague Conventions and the Geneva Conventions, do not purport to be the
exhaustive sources for law of war restrictions. Though they are, to a large
extent, codifications of customary law, customary international law remains as a
viable source not only for circumstances unaddressed in the treaty law, but to
govern the conduct of non-parties to the treaties.
n179 Instructions for the Government of Armies of the United States in the
Field, General Order No. 100, Apr. 23, 1863, THE LAWS OF ARMED CONFLICTS: A
COLLECTION OF CONVENTIONS, RESOLUTIONS AND OTHER DOCUMENTS 3 (Dietrich Schindler
& Jiri Toman, eds., 1988) [hereinafter Schindler & Toman].
n180 Fritz Munch, War, Laws of, History, in 4 ENCYCLOPEDIA OF PUBLIC
INTERNATIONAL LAW 327 (Bernhardt, ed., 1982).
n181 Schindler & Toman, supra note 179, at 3 (introductory note).
n182 Carnahan, Lincoln, Lieber and the Laws of War, supra note 146, at 215.
n183 Roberts & Guelff, supra note 131, at 7.
n184 Conditions for the Amelioration of the Condition of the Wounded in
Armies in the Field, Aug. 22, 1864, Schindler & Toman, supra note 179, at 279.
This convention has been superceded by the 1949 Geneva Conventions.
n185 Declaration Renouncing the Use, in Time of War, of Explosive Projectiles
Under 400 Grammes Weight, Dec. 11, 1868, (1907 Supp.) 1 AM. J. INT'L L. 95. This
declaration is the first agreement among States prohibiting the use of specific
weaponry in time of war. The provisions of the declaration were later
incorporated into the 1899 and 1907 Hague Regulations.
n186 Final Protocol and Project of an International Declaration Concerning
the Laws and Customs of War, Aug. 27, 1874, Schindler & Toman, supra note 179,
at 25. The provisions of the protocol, and the international declaration have
been incorporated into the 1899 and 1907 Hague Conventions and Regulations.
n187 The Laws of War on Land, Sept. 9, 1880, Schindler & Toman, supra note
179, at 35 (originally published by the Institute of International Law). Again,
the influences of the Oxford Manual on the 1899 and 1907 Hague Conventions and
Regulations are clear.
n188 P.J. Cameron, The Limitations on Methods and Means of Warfare, 1984
AUSTRALIAN Y.B. INT'L L. 252 (1985).
n189 Schindler & Toman, supra note 179, at vii (from the Introduction).
n190 Convention (IV) Respecting the Laws and Customs of War on Land, Oct. 18,
1907, (1908 Supp.) 2 AM. J. INT'L L. 90 (entered into force Jan. 26, 1910)
[hereinafter Hague Convention (IV)].
n191 Convention (IX) Concerning Bombardment by Naval Forces in Time of War,
Oct. 18, 1907, (1908 Supp.) 2 AM. J. INT'L L. 146 (entered into force Jan. 26,
1910) [hereinafter Hague Convention (IX)].
n192 Though still in force today, the fourth convention of 1907 lost the
support of eighteen States which were parties to the 1899 second convention.
These eighteen States or their successors (e.g. Yugoslavia) remain formally
bound by the 1899 convention.
n193 Id. at art. 1.
n194 Id. Perhaps the most significant aspect of this list is its inclusion of
industrial targets with military value. For the first time, this was explicitly
recognized by an international instrument. Nonetheless, the entire list was
regarded by the head of the U.S. delegation as simply declaratory of customary
international law. Parks, supra note 123, at 18.
n195 Hague Convention (IX) Annex, supra note 154, at art. 2.
n196 Parks, supra note 123, at 18. Parks further concludes that the rule of
Article 2, was declaratory of customary law. Thus, however provocative such a
claim may sound today, its roots go back to the codified foundations of the law
of war, and beyond. This point about the legal obligations of the defender is a
theme Parks sustains throughout his monumental, book-length article. The piece
provides an excellent scholarly argument, citing to the provisions of both Hague
and Geneva law, for the proposition that defenders bear as heavy an obligation
to ameliorate the possibility and effects of collateral damage from air warfare
as do attackers.
n197 Hague Convention (IV), supra note 154, at art. 25.
n198 Though the drafters of the convention could not have specifically
foreseen the technological revolution in military affairs that would come later
in this century, the absolute terms "whatever means" would seem to include means
of bombardment from unanticipated new combat environments such as outer space.
As for targeting from the air, the Greco-German Mixed Arbitral Tribunal held
that the Convention IV rules relating to bombardment specifically applied to air
warfare. GREEN, supra note 152, at 173 (citing Coenca Bros. v. Germany, 7 M.A.T.
n199 As with most provisions of the fourth 1907 convention, this one came
substantially from the second 1899 convention. See Schindler & Toman, supra note
179, at 75.
n200 See Hague Convention (IV) Annex, supra note 154 and accompanying text.
n201 Id. at art. 3.
n202 Knut Ipsen, Combatants and Non-Combatants, in THE HANDBOOK OF
HUMANITARIAN LAW IN ARMED CONFLICT 65, 66 (Dieter Fleck, ed., 1995).
n203 Article 75(1) of Protocol (I) specifies that
persons who are in the power of a Party to the conflict and who do not benefit
from more favorable treatment under the Conventions or under this Protocol [i.e.
prisoners of war; refugees and stateless persons] shall be treated humanely in
all circumstances and shall enjoy, as a minimum, the protection provided by this
Article without any adverse distinction based upon race, color, sex, language,
religion or belief, political or other opinion, national or social origin,
wealth, birth or other status, or on any other similar criteria.
Protocol I, supra note 156, at art. 75(1).
n204 The category "unlawful combatants" does not include those combatants who
use means and methods of armed conflict that are violative of the jus in bello.
These offenders may be war criminals, and they may be prosecuted under
international law or the domestic law of the opposing belligerent, but they are
not what has traditionally been known as unlawful combatants. Further, contrary
to the impression left by some in the television and print media following the
abduction of three U.S. soldiers in Macedonia during Operation Allied Force,
prisoners of war may be tried under certain conditions. However, as Article 99
of the third 1949 Geneva Convention specifies, this cannot be for any "act which
is not forbidden by the law of the Detaining Power or by international law, in
force at the time the said act was committed." Geneva Convention Relative to the
Treatment of Prisoners of War, Aug. 12, 1949, 6 U.S.T. 3316 (entered into force
Oct. 21, 1950) [hereinafter Geneva Convention III].
n205 Hague Convention (IV), supra note 154, at art. 29.
n206 Id. at 54.
n207 For a relatively recently formulation of the principle, see Protocol I,
supra note 156, at art. 46.
n208 Of course, the rules embodied in Hague Law are equally humanitarian and
equally concerned with protection of the person. However, because Geneva Law
explicitly provides for the sick, wounded, shipwrecked, and prisoners it is more
often thought of as the fullest expression of humanitarian law.
n209 Two examples include the saturation bombing of civilian populations
centers, and certain indiscriminate naval bombardments. Roberts & Guelff, supra
note 131, at 93.
n210 Hays Parks suggests that international lawyers of that era even doubted
the applicability of the law of war to modern warfare, and particularly to
aerial bombardment. Parks, supra note 123, at 50.
n211 Id. (quoting M. GILBERT, WINSTON S. CHURCHILL: THE PROPHET OF TRUTH,
1922-1939 573 (1976)).
n212 Geneva Convention for the Amelioration of the Condition of Wounded and
Sick in Armed Forces in the Field, Aug. 12, 1949, art. 19, 6 U.S.T. 3114
(entered into force Oct. 21, 1950) [hereinafter Geneva Convention I].
n213 Id. at art. 22. Because the convention by its title purports to protect
"armed forces in the field," the inclusion of the last circumstance seems
particularly odd. Not only are civilians non-combatants, they are
non-belligerents. Positing that a protected facility does not lose its
protection merely by virtue of the presence of a wounded civilian, seems to
state the obvious.
n214 Geneva Convention Relative to the Protection of Civilian Persons in Time
of War, Aug. 12, 1949, art. 18, 6 U.S.T. 3516 (entered into force Oct. 21, 1950)
[hereinafter Geneva Convention IV].
n215 Id. The reference to "land, air, and naval forces" appears intended to
highlight that the prohibition applies to all combat environments.
n216 Geneva Convention for the Amelioration of the Condition of Wounded, Sick
and Shipwrecked Members of Armed Forces at Sea, Aug. 12, 1949, art. 22, 6 U.S.T.
3316, (entered into force Oct. 21, 1950) [hereinafter Geneva Convention II].
n217 Id. at art. 23.
n218 Id. at art. 28.
n219 Indeed, protected persons are also potentially subject to attacks from
space. Thus, to the extent that the Geneva Conventions protect individuals from
attack, they restrict space warfare. One example pertains to the prohibitions on
taking reprisals against prisoners of war. See Geneva Convention III, supra note
204, at art. 13. Similarly, belligerents may not take reprisals against
civilians. See Geneva Convention IV, supra note 214, at art. 33.
n220 These Resolutions not only further empowered the ICRC to justify the
need for a diplomatic conference, but represented the early disposition of the
majority of States to the conference on several subjects that would later become
controversial. The first resolution, Respect for Human Rights in Armed
Conflicts, invited the U.N. Secretary-General, in conjunction with the ICRC, to
study steps for better application of existing humanitarian conventions and to
study the need for additional conventions. See Respect for Human Rights in Armed
Conflicts, Dec. 19, 1968, G.A. Res. 2444, U.N. GAOR, 23rd Sess., Supp. No. 18,
at 50, U.N. Doc. A/7218 (1969). The General Assembly adopted the Resolution by a
unanimous vote of 111 to none. More importantly, this Resolution affirmed three
principles, stated in a prior ICRC Resolution
(a) That the right of the parties to a conflict to adopt means of injuring the
enemy is not unlimited; (b) That it is prohibited to launch attacks against the
civilian population as such; (c) That distinction must be made at all times
between persons taking part in the hostilities and members of the civilian
population to the effect that the latter be spared as much as possible.
Id. As displayed by the vote, these principles were not controversial and indeed
were taken as a restatement of customary international law. The larger issue
raised by the Resolution was the use of human rights language to describe what
were historically law of war restrictions. Although the identification of human
rights with humanitarian law has become increasingly prevalent in the scholarly
literature following publication of documents such as Resolution 2444, it
remains to be seen whether this is good for the law of war. While human rights
law has traditionally been rooted in philosophy and politics, the law of war is
rooted in military exigency. As a consensus grows for centralized punishment of
violations within both bodies of law, as envisaged by the International Criminal
Court, one sincerely hopes that the unseemly politicization often characterizing
State rhetoric regarding human rights concerns does not infect the quest for a
robust, enforced law of war. If the latter succumbs to petty world politics, it
may be largely due to the blurring of the humanitarian law of war, aimed at the
focused restricting of suffering during armed conflict, with human rights law,
aimed at far broader issues and concerns.
Following Resolution 2444 by two years, the U.N.G.A. adopted Resolution 2675
by a vote of 109 votes to none, with 18 States abstaining or absent. Basic
Principles for the Protection of Civilian Populations in Armed Conflicts, Dec.
9, 1970, G.A. Res. 2675, U.N. GAOR, 25th Sess., Supp. No. 28, at 76, U.N. Doc.
A/8028 (1971) [hereinafter Resolution 2675]. In two cases, the eight provisions
of Resolution 2675 restated the substance of provisions already stated in
Resolution 2444. Otherwise, Resolution 2675 exhorted States to respect civilian
populations and property by exempting them from attack, and reemphasizes the
human rights rationale for such protections. In some cases the provisions
restated concepts existing in the Geneva Conventions, and in all cases, the
Resolution "restates rules of international law." Schindler & Toman, supra note
179, at 267. Interestingly, regarding civilian property, the Resolution states
that "dwellings and other installations that are used only by civilian
populations should not be the object of military operations." Resolution 2675,
U.N. GAOR, 25th Sess., Supp. No. 28, at 77. Implicitly, this affirms that unless
such property is used exclusively by civilians ("only by"), it may be subject to
attack if not otherwise protected on some other ground.
n221 Protocol Additional to the Geneva Conventions of Aug. 12, 1949, and
Relating to the Protection of Victims of Non-International Armed Conflicts
(Protocol II), Dec. 12, 1977, art. 48, 1125 U.N.T.S. 609 (entered into force
Dec. 7, 1978) [hereinafter Protocol II].
n222 Roberts & Guelff, supra note 131, at 448.
n223 Geneva Convention I, supra note 212, at art. 3; Geneva Convention II,
supra note 216, at art. 3; Geneva Convention III, supra note 204, at art. 3;
Geneva Convention IV, supra note 214, at art. 3.
n224 Robert & Guelff, supra note 131, at 447.
n225 Protocol II, supra note 221, at art. 1(2).
n226 Robert & Guelff, supra note 131, at 448.
n227 Protocol I, supra note 156, at art. 1(4). Addressing the "General
Principles and Scope of Application" of the entire Protocol, Article 1(4)
the situations referred to in the preceding paragraph include armed conflicts in
which peoples are fighting against colonial domination and alien occupation and
against racist regimes in the exercise of their right of self-determination, as
enshrined in the Charter of the United Nations and the [United Nations General
Assembly] Declaration on Principles of International Law concerning Friendly
Relations and Co-operation among States in accordance with the Charter of the
Id. This means that insurgents opposing "colonial domination and alien
occupation and . . . racist regimes in the exercise of their right of
self-determination" were to be accorded the full protections of the jus in
bello, including limits on the state's means and methods of subduing the
insurgents militarily. Id. (emphasis added) This provision alone proved too
difficult politically for some States to accept. (States not having ratified the
Protocol as of 1999 include: Afghanistan, Andorra, Azerbaijan, Bhutan, Fiji,
France, Haiti, India, Indonesia, Iran, Iraq, Ireland, Israel, Japan, Kiribati,
Lithuania, Malaysia, Monaco, Morocco, Myanmar, Nepal, Nicaragua, Pakistan, Papua
New Guinea, Philippines, Singapore, Somalia, Sri Lanka, Sudan, Thailand, Tonga,
Trinidad and Tobago, Turkey, Tuvalu, and the U.S.)
Another provision difficult to accept for some States, including the U.S.,
related to the concept of reprisals. Articles 51(6), 52(1), and 54(4), prohibit
reprisals under any circumstances against the civilian population, against
civilian objects, and against objects indispensable to the survival of the
civilian population, respectively. Id. at art. 51(6), 52(1), 54(4). Parks claims
that the first two provisions were not a codification of customary law, but a
reversal of it. See Parks, supra note 123, at 94. He further states that flawed
legal analysis of the doctrine of reprisals often results from confusion of the
concept with others such as retaliation, revenge, or legitimate acts of
self-defense. Id. Customarily, civilian individuals and property could be
threatened and attacked as a lesser evil in order to avoid a greater evil, and
to promote respect for the law of war. Though reprisals are politically
sensitive because they entail commission of an otherwise illegal act in order to
suppress other illegal acts, they have proven effective historically in
deterring violations of the jus in bello. Id. at 95. Parks cites as an example
the threat by President Franklin Roosevelt to use chemical weapons as
sufficient warning to deter German use of such weapons. Id.
n228 Parks, supra note 123, at 112.
n229 Protocol I, supra note 156, at art. 48.
n230 Id. at art. 49.
n231 Id. at art. 50.
n232 Id. at art. 51.
n233 Id. at art. 52.
n234 Id. at art. 53.
n235 Id. at art. 54.
n236 Id. at art. 55.
n237 Id. at art. 56.
n238 Id. at art. 57.
n239 Id. at art. 58.
n240 Parks, supra note 123, at 112.
n241 Id. Just as significant an issue as is the burden shifting, is the legal
effect of violations by the defender vis-a-vis the attacker. A common view of
Protocol I, Article 58, which requires that "the parties" (including both
attacker and defender) take precautions against the effects of attacks "to the
maximum extent feasible," is that violation by the defender in its obligations
toward its own civilians does not absolve the attacker of its obligations when
considering attacks that put such civilians at risk. Protocol I, supra note 156,
at art. 58. This appears to conflict with the position taken by the U.S. Air
Force law of war manual: "[a] party to a conflict which places its own citizens
in positions of danger by failing to carry out the separation of military
activities from civilian activities necessarily accepts, under international
law, the results of otherwise lawful attacks upon the valid military objectives
in their territory." AFP 110-31, supra note 146, at P5-4b. For an interesting
resolution of this apparent conflict, see Schmitt, Book Review, supra note 141,
at 267. Key to the resolution is the clause "otherwise lawful attacks."
Ultimately, the best view conceives violations by the defender to take
precautions as "merely a factor in mitigation should the attacker violate its
own." Id. It should also be noted that although AFP 110-31 presents a view from
the United States Air Force, the document's preamble specifies that it "does not
promulgate official U.S. Government policy."
n242 Parks, supra note 123, at 112 n.351. Parks notes further that the French
position was not isolated, but representative. Id.
n244 For additional perspectives, see G.H. Aldrich, Prospects for United
States Ratification of Additional Protocol I to the 1949 Geneva Convention, 85
AM. J. INT'L L. 1 (1991); Burrus M. Carnahan, Protecting Civilians Under the
Draft Geneva Protocol: A Preliminary Inquiry, 18 A.F. L. REV. 32 (Winter 1976).
n245 Convention on the Prohibition of the Development, Production and
Stockpiling of Bacteriological (Biological) and Toxin Weapons and on Their
Destruction, Apr. 10, 1972, 26 U.S.T. 583 (entered into force 26 March 1975).
n246 Convention on the Prohibition of Military or Any Other Hostile Use of
Environmental Modification Techniques, May 18, 1977, 31 U.S.T. 333 (entered into
force 5 October 1978) [hereinafter Environmental Modification Treaty].
n247 Convention on Prohibitions or Restrictions on the Use of Certain
Conventional Weapons which May be Deemed to be Excessively Injurious or to Have
Indiscriminate Effects, Oct. 10, 1980, 1342 U.N.T.S. 7 (entered into force Dec.
2, 1983) [hereinafter Conventional Weapons Treaty]. The treaty contained
protocols on (1) fragments not detectable by X-rays; (2) mines, booby traps, and
other devices; and (3) incendiary weapons. All three protocols went into force
with the treaty in 1983. A fourth Protocol on Blinding Laser Weapons went into
force on July 30, 1998. See Protocol on Blinding Lasers, supra note 172.
n248 Convention on the Prohibition of the Development, Production,
Stockpiling and Use of Chemical Weapons and on Their Destruction, Jan. 13, 1993,
S. TREATY DOC. NO. 21, 103d Cong. (1993), reprinted in 32 I.L.M. 800 (1993)
(entered into force Apr. 29, 1997).
n249 Protocol on Blinding Lasers, supra note 172.
n250 Convention on the Prohibition of the Use, Stockpiling, Production and
Transfer of Anti-Personnel Mines and on their Destruction, Sept. 18, 1997, 36
I.L.M. 1507 (1997) (entered into force Mar. 1, 1999).
n251 Environmental Modification Treaty, supra note 246, at art. III(1).
n252 Id. at art. I(1).
n253 Id. at art. II (emphasis added).
n254 Schmitt, Green War, supra note 143, at 82.
n255 Report of the Conference of the Committee on Disarmament, U.N. GAOR,
31st Sess., Supp. No. 27, at 91, 92, U.N. Doc. A/31/27 (1976).
n256 Given its narrow scope, the Treaty "affects only a very narrow band of
possible operations." Schmitt, Green War, supra note 143, at 85.
n257 Protocol II (as amended), Environmental Modification Treaty, supra note
246, at art. 1, 35 I.L.M. 1206 (1996) (amended May 3, 1996) (entered into force
Dec. 3, 1998).
n258 A recent controversy raises the question whether such weapons have ever
been used against U.S. military personnel. An Apr. 4, 1997 incident suggested
the possible Russian use of such a weapon against a Naval aviator. The aviator
reported severe eye pain and headaches after seeing a distinct dot of red
light emanating from the Russian ship Kapitan Man in U.S. waters. Despite
Russian denials, and a subsequent search of the ship by U.S. authorities which
discovered no laser, suspicions have continued given the several day delay in
executing the search and medical reports showing the aviator's injury consistent
with a laser attack. Associated Press, Navy Officer Blames Russian Laser, N.Y.
TIMES, Feb. 11, 1999, at 1; B. Gertz, Clinton Won't Back Navy Officer After
Laser Attack, WASH. TIMES, May 17, 1999, at 1.
n259 Interestingly, the Protocol on Blinding Lasers implicitly recognizes
that lasers are not prohibited as a weapon system so long as they are not
"specifically designed" to cause blindness. Protocol on Blinding Lasers, supra
note 172, at art. 1. Article 2 states: "In the employment of laser systems, the
High Contracting Parties shall take all feasible precautions to avoid the
incidence of permanent blindness to unenhanced vision. Such precautions shall
include training of their armed forces and other practical measures." Id. at
art. 2. This restriction presupposes that laser systems might in fact be used
("in the employment"), and that they might be used by military forces whose use
will necessitate training for proper use so as to avoid functioning as a
blinding weapon. Among others, the U.S. military is studying the use of an
"Anti-Personnel Beam Weapon" that would likely cause slight skin or eye
irritation by carrying an electrical charge through a lazed stream of ionized
air. D. Mulholland, Laser Device May Provide U.S. Military NonLethal Option,
DEFENSE NEWS, June 14, 1999, at 6.
n260 But note that the law of war applies whether a use of force is lawful or
not. See supra note 140, and accompanying text.
n261 A third function of the Charter is to provide the constitutive features
of the International Court of Justice, established under Article 92 of the
Charter, by means of the Statute of the International Court of Justice appended
to the Charter and consisting of seventy separate articles. STAT. OF THE INT'L
CT. OF J., June 26, 1945, 59 Stat. 1031 (entered into force Oct. 24, 1945)
[hereinafter STAT. OF THE ICJ].
n262 U.N. CHARTER (entered into force Oct. 24, 1945) [hereinafter U.N.
CHARTER]. Article 1, paragraph 1, states the first purpose of the United
Nations: "To maintain international peace and security, and to that end: to take
effective collective measures for the prevention and removal of threats to the
peace, and for the suppression of acts of aggression or other breaches of the
peace . . ." The Charter states this principle against the backdrop of its
preamble which decries the "untold sorrow" of the world wars of the twentieth
century and calls war a "scourge." Id.
n263 Chapter 7, containing articles 39 through 51, applies to "Action with
Respect to Threats to the Peace, Breaches of the Peace, and Acts of Aggression."
n264 While a thorough exposition of the jus ad bellum is beyond the scope of
this article, some understanding of the field, and of its principal source,
could work to eliminate confusion in legal analysis. For example, one might
misidentify an issue as requiring analysis under the jus in bello which actually
requires analysis under the jus ad bellum. Such confusion could lead to errant
legal conclusions under the law of war.
n265 Malanczuk goes even further: "The prevailing view is that the Charter
has enacted a comprehensive rule on the prohibition of the use of force, which
has become recognized as jus cogens . . ." MALANCZUK, INTRODUCTION TO
INTERNATIONAL LAW, supra note 130, at 311. The International Law Commission
agrees: "the law of the Charter concerning the prohibition of the use of force
in itself constitutes a conspicuous example of a rule in international law
having the character of ius cogens." HARRIS, supra note 173, at 835 (quoting
International Law Commission, Commentary on the Vienna Convention on the Law of
Treaties, 1966 Y.B. INT'L L. COMMISSION 247-48). This is the view of the United
States as well, as quoted from its pleadings at the International Court of
Justice in the Nicaragua case. Military and Paramilitary Activities (Nicar. v.
U.S.), 1986 I.C.J. 4. Taken from Article 53 of the 1969 Vienna Convention on the
Law of Treaties, the concept of jus cogens constitutes "peremptory norm[s] of
general international law," which become the most basic ordering concepts in
international law. They are principles from which no treaty may derogate. Vienna
Convention on the Law of Treaties, May 23, 1969, art. 53, 1155 U.N.T.S. 331
(entered into force Jan. 27, 1980) [hereinafter Vienna Convention]. In this way,
jus cogens is the international legal norm that norms all other norms. Examples
that are widely acknowledged by scholars include the rules against genocide and
n266 U.N. CHARTER, supra note 262, at art. 2(4).
n267 Id. at art. 51.
n268 Several reasons may account for this. Chiefly, the negative effects of a
threat are thought to pale in comparison to the effects of actual force. And, as
Sadurska notes, there may actually be occasions in which the threat of force
"far from precipitating fighting, may be an effective mechanism for dissuading
international actors from using violence." R. Sadurska, Threats of Force, 82 AM.
J. INT'L L. 239, 247 (1988). In this way, the threat may actually work as a
substitute for the use of force.
n269 A. Randelzhofer, Article 2(4), in THE CHARTER OF THE UNITED NATIONS: A
COMMENTARY 118 (B. Simma, et al., eds., 1994) [hereinafter Randelzhofer].
n270 GREEN, supra note 152, at 70.
n271 Randelzhofer, supra note 269, at 112, 113. The author points out that
while these forms of coercion may not constitute "force" under Article 2(4),
their use may violate the general principle of non-intervention.
n272 Id. at 113, 114.
n273 Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 4,
n274 See discussion of information warfare, infra Part VI, @ D.
n275 Such forms of self-defense occur when a State uses armed force to repel
an "imminent" attack before it actually occurs.
n276 In its lengthy review of customary international law related to the use
of force in the Nicaragua case, the International Court of Justice stated that
the right of self-defense referenced in the Charter at Article 51, as an
"inherent right," is firmly rooted in customary international law. This explicit
provision in the Charter therefore provides parallel authority for the
assertion of the right.
n277 In addition to wars of a defensive character, the U.N. Charter also
authorizes armed force pursuant to authority by the Security Council. "Should
the Security Council consider that measures provided for in Article 41 would be
inadequate or have proved inadequate, it may take such action by air, sea or
land forces as may be necessary to maintain or restore international peace and
security." U.N. CHARTER, supra note 262, at art. 42. Presumably, the enumeration
of "air, sea or land forces" is meant to suggest that the Security Council may
use any form of force it deems necessary, these three being the exhaustive means
then in existence in 1945. On this interpretation, the list is not exclusive,
but indicative of the scope of Security Council authority. Though not
specifically mentioned, the use of space forces would be a legitimate exercise
of authority as well.
n278 In addition to the fact that Article 2(4) applies to conflicts not
formally constituting wars, Professor Harris points out an additional reason for
this--the terms of the 1949 Geneva Conventions and the 1977 Protocols apply to
"all cases of declared war or of any other armed conflict." Harris, supra note
173, at 860 n.3.
n279 The laws of war have evolved with State practice regarding initiation of
hostilities. De Mulinen points out that historically an armed conflict commenced
with a previous warning either in the form of a declaration of war or an
ultimatum containing a conditional state of war. See DE MULINEN, supra note 145,
at 30. Subsequently, as such declarations and warnings fell out of use, the laws
of war continued to apply to conflicts short of war. Thus, the common Article 2
to each of the four Geneva Conventions of 1949 applies the provisions of each
convention to "all cases of declared war or of any other armed conflict which
may arise between two or more of the High Contracting Parties. . . ." Geneva
Convention I, supra note 212, at art. 2; Geneva Convention II, supra note 216,
at art. 2; Geneva Convention III, supra note 204, at art. 2; Geneva Convention
IV, supra note 214, at art. 2. The Conventions do not specify what constitutes
an armed conflict, thus De Mulinen appears correct in asserting that "no minimum
of intensity of violence or fighting, no minimum of military organization and no
minimum of control of territory is required." DE MULINEN, supra note 145, at 31.
Any armed violence between the representatives of one State and those of another
will trigger application of the laws of war, whether the conflict amounts to
"war" or not.
n280 Of the legal effects created by a formal state of war, perhaps the most
interesting for purposes of the law of war is the termination of certain
categories of treaties between the belligerent States. See J. Delbruck, War,
Effect on Treaties, in 4 ENCYCLOPEDIA OF PUBLIC INTERNATIONAL LAW 310
(Bernhardt, ed., 1982). Delbruck notes that the effect of war on treaty
obligation is nowhere specifically enumerated. The older consensus was that war
terminated all treaty relations and obligations as between the belligerents. The
newer approach in international law takes a more flexible approach, preferring
to preserve international order and to see war as simply suspending the
execution of certain treaties. Thus Justice Benjamin Cardozo, writing as a judge
on the Court of Appeals of New York anticipated the current trend,
"international law today does not [in cases of war] preserve treaties or annul
them regardless of the effects produced. It deals with such problems
pragmatically, preserving or annulling as the necessities of war exact. It
establishes standards, but it does not fetter itself with rules." Id. (quoting
from Techt v. Hughes, 229 N.Y. 222, 241 (1920)). Delbruck continues, "war may
now be illegal, but it has not thereby become a phenomenon outside the realm of
law." Id. at 311. In this way, the law prefers to give effect to treaties to the
maximum extent possible. Those treaties that must be suspended during war
include multilateral treaties with which the belligerents are unable to comply
due to the impact of the war. Those that will be terminated include political
treaties that depend for their existence and proper functioning on normal
political and social relations between the belligerents -- relations that are
terminated by war. Significantly, though the Vienna Convention on the Law of
Treaties provides that the severance of diplomatic relations between the parties
to a treaty does not normally affect the legal relations between them as
established by the treaty, the Convention does not specify how war effects the
operation of treaties. Vienna Convention, supra note 265, at art. 63.
n281 McDOUGAL, ET AL., supra note 40, at 514.
n282 Space law is "a newcomer to the family of legal disciplines." I UNITED
STATES SPACE LAW: NATIONAL & INTERNATIONAL REGULATION 17, Release 98-2 (1998).
That space law rightfully takes its place as a major branch of international law
is now beyond question. Jennings notes seventeen categories of international
law: (1) the position of States in international law, (2) the law relating to
international peace and security, (3) the law relating to economic development,
(4) State responsibility, (5) succession of States and governments, (6)
diplomatic and consular law, (7) the law of treaties, (8) unilateral acts, (9)
the law relating to international watercourses, (10) the law of the sea, (11)
the law of the air, (12) the law of outer space, (13) the law relating to the
environment, (14) the law relating to international organizations, (15)
international law relating to individuals (including nationality, extradition,
right of asylum and human rights), (16) the law relating to armed conflicts, and
(17) international criminal law. See R.Y. Jennings, International Law, in 11
ENCYCLOPEDIA OF PUBLIC INTERNATIONAL LAW 278 (Bernhardt, ed., 1982).
n283 P. Malanczuk, Space Law as a Branch of International Law, 1994 NETH.
Y.B. INT'L L. 143, 147 (1995) [hereinafter Malanczuk, Space Law].
n284 V. Kopal, Evolution of the Doctrine of Space Law, in SPACE LAW:
DEVELOPMENT AND SCOPE 17 (N. Jasentuliyana, ed., 1992).
n285 Although the U.S. had placed a man-made object in outer space prior to
this, 1957 is considered the watershed year in which the "Space Age" is most
often said to have begun. On October 4 of that year, the Soviet Union launched
Sputnik I, the world's first man-made satellite. See HEPPENHEIMER, supra note
15, at 122.
n286 See infra, Part VI, @ A.1.
n287 MATTE, SPACE ACTIVITIES, supra note 13, at 175, 176.
n288 N. Jasentuliyana, The Lawmaking Process in the United Nations, in
SPACE LAW: DEVELOPMENT AND SCOPE 41 (N. Jasentuliyana, ed., 1992).
n289 B.M. HURWITZ, THE LEGALITY OF SPACE MILITARIZATION 29, 30 (1986)
n290 See McDOUGAL, ET AL., supra note 40, at 729.
n291 See supra note 141.
n292 Of course, prohibitions could come from a variety of sources other than
space treaties. Customary international law could also supply the requisite
prohibition on State action. In the case cited however, as will be argued
further below, no such prohibitions exist.
n293 As one source puts it, "Astrolaw contemplates the practice of law in
outer space. . . . The direct subjects of Space Law are sovereign nations; the
direct subjects of Astrolaw are natural and legal persons in space. . . .
Astrolaw focuses not upon space as a legal regime, but upon space as a place."
G.S. ROBINSON & H.M. WHITE, JR., ENVOYS OF MANKIND: A DECLARATION OF FIRST
PRINCIPLES FOR THE GOVERNANCE OF SPACE SOCIETIES 147 (1986) [hereinafter
ROBINSON & WHITE]. Others refer to Astrolaw as a necessary supplement to the
space law treaty system, and as a "common law of outer space." D. O'Donnell &
N.C. Goldman, Astro Law as Lex Communis Spatialis, in PROCEEDINGS OF THE
FORTIETH COLLOQUIUM ON THE LAW OF OUTER SPACE 322 (1998).
n294 C.J. Cheng, New Sources of International Space Law, in THE USE OF AIR
AND OUTER SPACE COOPERATION AND COMPETITION 209 (C.J. Cheng, ed., 1998). Cheng
further notes that although different titles for this body of law such as
"Aerospace Law," "International Law of Outer Space," "International Space Law,"
"Space Law," and "The Law of Outer Space," "provide notional concepts about the
scope of international space law . . . in its inception, this new branch of law
was defined as a corpus of rules which govern the space activity of States."
Id. at 208 n.1, 209 (emphasis added).
n295 Though this is true generally as a basic tenet of international law, it
is especially true of space law which makes States internationally responsible
for all national activity, whether public or private. See infra note 324 and
n296 In classical international legal theory, customary international law
serves as a formal source of law. Thus, Article 38 of the Statute of the
International Court of Justice charges the Court with resolving disputes in
accord with international law by applying, inter alia, "international custom, as
evidence of a general practice accepted as law." STAT. OF THE ICJ, supra note
261, at art. 38.
n297 The two factors generally regarded as necessary for the crystallization
of an emerging norm into customary law are the practice of States and general
opinion that the norm under consideration bears the force of law. Thus Malanczuk
when inferring rules of customary law from the conduct of States, it is
necessary to examine not only what States do, but also why they do it. . . .
State practice alone does not suffice; it must be shown that it is accompanied
by the conviction that it reflects a legal obligation. . . . The technical name
given to this psychological element is opinio iuris sive necessitatis (opinio
iuris for short). It is usually defined as a conviction felt by States that a
certain form of conduct is required by international law.
MALANCZUK, INTRODUCTION TO INTERNATIONAL LAW, supra note 130, at 44. The
author continues by pointing out the difficulty of ascertaining a state's opinio
juris and the modern tendency to "infer opinio iuris indirectly from the actual
behavior of States." Id.
n298 Malanczuk, Space Law, supra note 283, at 159. But see opinion of
Professor Diederiks-Verschoor, "customary law is already playing a significant
role in space law, and . . . States have evidently found it necessary, if not
expedient, to abide by its rules." I.H.PH. DIEDERIKS-VERSCHOOR, AN INTRODUCTION
TO SPACE LAW 12 (1993) [hereinafter DIEDERIKS-VERSCHOOR].
n299 As suggested in Part VI, @ A.1.b., infra, the development of a jus in
bello for space will likely track the method by which the jus in bello for
aerial combat evolved. In the latter case, after over seventy years of aerial
combat, the international community has yet to witness a treaty dedicated to
means and methods of aerial warfare. The incremental, customary development of
an aerial jus in bello will likely be the pattern for space warfare.
n300 Although a minority view, some scholars denied the existence of any
customary law for outer space in the early days of space flight. Thus, as late
as 1961, Professor Cooper wrote
it is quite impossible to apply international legal principles in a satisfactory
manner in any geographic area whose legal status is unknown. Today the legal
status of outer space is as vague and uncertain as was the legal status of the
high seas in the centuries before Grotius, in the Mare Liberum, focused
attention on the need of the world to accept the doctrine of the freedom of the
seas. . . . No general customary international law exists covering the legal
status of outer space.
J.C. Cooper, The Rule of Law in Outer Space, 47 AM. BAR ASS'N J. 23 (1961)
(quoted in MATTE, SPACE ACTIVITIES, supra note 13, at 83).
n301 B. Cheng, United Nations Resolutions on Outer Space: 'Instant'
International Customary Law?, 5 INDIAN J. INT'L L. 23 (1965) [hereinafter Cheng,
'Instant' Customary Law]. In his fascinating article, Professor Cheng challenged
the orthodox view of customary law. Placing greater stress on the requirement
that States express acceptance of a general practice (opinio juris), Cheng
continued by noting that
it may be permissible to go further and say that the role of usage in the
establishment of rules of international customary law is purely evidentiary: it
provides evidence on the one hand of the contents of the rule in question and on
the other hand of the opinio juris of the States concerned. Not only is it
unnecessary that the usage should be prolonged, but there need also be no usage
at all in the sense of repeated practice, provided that the opinio juris of the
States concerned can be clearly established. Consequently, international
customary law has in reality only one constitutive element, the opinio juris.
Where there is opinio juris, there is a rule of international customary law.
Id. at 36. Though this attenuated view of customary law is widely disputed,
Cheng's watershed 1965 article largely framed the debate. Indeed, no less a
distinguished scholar than R. Bernhardt regards the notion of instant custom a
distinct possibility under exceptional cases (though not under "traditional
concepts") in which such instant law is useful or necessary "at least if a new
rule is accepted without exception and the conduct of States conforms to it
and no measures contrary to the rule are taken." Malanczuk, Space Law, supra
note 283, at 160-61. See R. Bernhardt, Customary Law, in 7 ENCYCLOPEDIA OF
PUBLIC INTERNATIONAL LAW 61, 64-65 (Bernhardt, ed., 1982). Perceptively,
Malanczuk notes that the exceptional cases about which Bernhardt allows under
the rubric "customary law" are nothing of the sort. "There may indeed be a need
for this, but then it is not custom but some other (new) source of international
law." MALANCZUK, INTRODUCTION TO INTERNATIONAL LAW, supra note 130, at 46.
n302 North Sea Continental Shelf Cases (F.R.G. v. Den.; F.R.G. v. Neth.),
1969 I.C.J. Rep. 4, 43 [hereinafter North Sea Continental Shelf Cases].
Specifically, the Court stated that "an indispensable requirement would be that
within the period in question, short though it might be, State practice,
including that of States whose interests are specially affected, should have
been both extensive and virtually uniform in the sense of the provision
invoked." Id. This cautionary approach requires that to the extent the time
element is shortened, State agreement on the emerging norm must increase. Yet,
nowhere does the Court allow that the requirement for the passage of time may be
dispensed with, even in cases of perfect unanimity.
n303 Military and Paramilitary Activities (Nicar. v. U.S.), 1986 I.C.J. 4,
n304 North Sea Continental Shelf Cases, supra note 302, at 42.
n305 H. Lauterpacht, Sovereignty Over Submarine Areas, 1950 BRIT. Y.B. INT'L
L. 376, 394. The author went on to point out, by way of example, the special
importance of maritime powers such as the U.S. and U.K. for matters pertaining
to the seas. To this perspective can be added the view of Virally, writing on
the eve of the North Sea decisions: "firm opposition of a number of states,
especially if they constitute an appreciable section of the international
community or comprehend one or more of the great powers, may no doubt obstruct
the formation of a general customary rule." M. Virally, The Sources of
International Law, in MANUAL OF PUBLIC INTERNATIONAL LAW 137 (M. Sorensen, ed.,
1986) (emphasis added).
n306 J.I. Charney, The Persistent Objector Rule and The Development of
Customary International Law, 1985 BRIT. Y.B. INT'L L. 1 (1986) [hereinafter
Charney]. In those cases involving persistent objectors not "specially
affected," international law allows that although the customary norm under
development may fully ripen into customary international law, the objecting
State is not bound. Thus held the International Court of Justice in both the
Anglo-Norwegian Fisheries and Asylum cases. In the former, the Court stated "in
any event the ten-mile rule would appear to be inapplicable as against Norway
inasmuch as she has always opposed any attempt to apply it to the Norwegian
coast." Fisheries Case (U.K. v. Nor.) 1951 I.C.J. 116, 131. In the Asylum case,
the Court stated that "even if it could be supposed that such a custom existed
between certain Latin-American States only, it could not be invoked against Peru
which, far from having by its attitude adhered to it, has, on the contrary,
repudiated it." Asylum Case (Colom. v. Peru) I.C.J. 266, 277-78. "In both
[cases], the Court had previously found that the substantive rule of law did not
exist in the first place. The Court then went on to allow that even if the rule
were international law, the objecting States in these cases would not legally be
obligated to abide by the rule." Charney, id. at 9. Accord I RESTATEMENT (THIRD)
OF FOREIGN RELATIONS LAW OF THE UNITED STATES, @ 102 cmt. d (1987) (stating, "in
principle a dissenting state which indicates its dissent from a practice while
the law is still in the process of development is not bound by that rule of law
even after it matures.") This is not to say that a State must express its
affirmative consent in order to be bound by customary law, just that its
objection can work to remove its obligation to comply with the subsequent
customary norm that crystallized over its objection.
n307 Among this number would certainly include the United States, Russia, the
United Kingdom, France, China, India, and Japan.
n308 This examination of interested State practice appears to be the method
employed consistently by the International Court of Justice in its examination
of customary law, and comports with the opinion expressed by numerous scholars
today. Thus, in the Nicaragua case, the Court undertook to establish the
customary legal basis for the principle of nonintervention as it analyzed the
dispute between the United States and Nicaragua. In so doing, the Court pointed
out that although the U.S. expressed its opinion that U.N. General Assembly
Resolution 2131 was not a formulation of law but only a statement of political
intention, the U.S. later accepted resolution 2625 which purported to declare
law on the same point as resolution 2131. Military and Paramilitary Activities
(Nicar. v. U.S.), 1986 I.C.J. 4, 107. The Court's exercise in resolving the
apparent U.S. reservation to the principle of nonintervention is instructive,
and makes the most sense when viewed as an attempt to show that the U.S. was not
a persistent objector to the principle. In this light, the Court has employed a
method logically flowing from its prior assertion as to the required acceptance
of "specially affected" States in the formation of customary international law.
Given this disposition of the court, and apparently of international law in
general, the emerging practice of the United States with respect to the
recognition (or nonrecognition) of restrictions on space warfare, becomes most
n309 Malanczuk, Space Law, supra note 283, at 159.
n310 See id.
n311 See infra, Part IV, @ B.1.
n312 This is subject to the observation that debate now exists as the to
status of potential customary norms not otherwise addressed by treaty law. These
include the notion that international law recognizes a right of space objects,
headed either to or from outer space, to freely transit the sovereign airspace
of other States. Although some have pointed to the lack of objection by certain
States in the case of occasional violations of its airspace by space objects as
evidence that the "norm" has crystallized, this view is highly suspect. At a
minimum these anecdotal occasions assume that the violated state was aware of
the intrusion--unlikely in most cases usually cited. Thus Malanczuk observes
the contention can hardly be sustained that the practice of space powers to
launch their space objects into outer space after 1957 by crossing the air
space under the sovereignty of other countries developed into custom by the
acquiescence of those States. The countries affected simply often lacked the
technological capacities to find out.
MALANCZUK, INTRODUCTION TO INTERNATIONAL LAW, supra note 130, at 43. Beyond
this, even if a State knew about the violation, isolated instances of an
intrusion followed by a mere failure to protest is hardly sufficient to
establish a customary norm binding the entire international community. More than
this would be necessary to evince the requisite opinio juris. Thus Professor
There is no a [sic] right of (instant?) customary international law that space
objects can 'freely' transit through foreign airspace. The fact that in practice
so far no objections have been raised against transit through a State's airspace
by a foreign space object, is not an argument to refer to a customary right of
transit, as too few States have considered to be confronted with such transit
(and none have been), and no opinio juris with respect to such practice has been
pronounced as yet.
H.A. WASSENBERGH, PRINCIPLES OF OUTER SPACE LAW IN HINDSIGHT 36 (1991). By
contrast, the widespread recognition of the principle of freedom of space,
though it came rather quickly following the Soviet launch of Sputnik I, was
accompanied not only by the lack of objection in the face of orbital
overflights, but affirmative acquiescence by most States in the form of United
Nations resolutions. An additional customary norm pertains to the right of
space surveillance. In this instance a much stronger case can be made that
international law contains a customary norm to freely observe other States. As
Professor Diederiks-Verschoor notes "it is important to bear in mind that there
is as yet no statutory obligation on States, in U.N. Resolutions or elsewhere,
to ask for prior consent . . ." DIEDERIKS-VERSCHOOR, supra note 298, at 11.
Given this, and given the general international legal principle that in the
absence of prohibition States are free to act as they please, it is perhaps
better to see the right of space surveillance not so much as requiring specific
authorization by an explicit customary norm but as the natural prerogative of a
State flowing from its sovereignty and from the principle that space is free.
n313 For example, as of 1993, Colombia and Indonesia had not ratified any of
the multilateral space treaties; Iran had ratified the Rescue & Return
Agreement, and Liability Convention; and Yugoslavia had ratified the Rescue &
Return Agreement, Liability Convention, and Registration Convention. Resolution
of the difficult question of the Federal Republic of Yugoslavia's uncertain
status within international law and its succession to treaties ratified by the
Socialist Federal Republic of Yugoslavia is to some extent ongoing as of this
writing (July 2000). For discussion of the international legal implication of
the dissolution of the former Yugoslavia, see HARRIS, supra note 173, at 120-31.
n314 For example, in addition to the two principles cited above, namely, the
freedom of space for use and exploration, and the prohibition on national
appropriation of space or celestial bodies, a third customary principle provides
for the rescue of astronauts in distress. Regarding the first two cited
principles, see supra note 310 and accompanying text.
n315 Established by resolution of the U.N.G.A. in 1958, COPUOS has served as
a central forum for international negotiations toward the development of space
law. Although made up of only 61 members, less than one-third of the United
Nations membership, and unable to adopt rules and regulations binding on State
parties (unlike the International Civil Aviation Organization for example),
COPUOS has nonetheless played a remarkably effective role in the early
development of space law. Of the five treaties now in force under the corpus
juris spatialis, all five originated within COPUOS. With only one exception in
1982, COPUOS has acted on the basis of consensus. "In other words, every
member of the Committee . . . was given a veto." Cheng, 'Instant' Customary Law,
supra note 301, at 27. As might be expected, this makes the negotiation and
drafting process "detailed, laborious, and time-consuming." N. Jasentuliyana,
The Lawmaking Process in the United Nations, in SPACE LAW: DEVELOPMENT AND SCOPE
34 (N. Jasentuliyana, ed., 1992). This principle of action-by-consensus also
increases the commitment to the legal regimes created as well.
This is not to suggest that COPUOS is the only international body concerned
with space law. The scope of COPUOS' mandate in the progressive development of
space law excludes consideration of military uses, which the major space powers
relegate to "fora dealing with disarmament and arms control issues." Malanczuk,
Space Law, supra note 283, at 150. The most notable such forum is the U.N.
Conference on Disarmament. As of 2000, there were sixty-one member States of
COPUOS (unchanged from 1995): Albania, Argentina, Australia, Austria, Belgium,
Benin, Brazil, Bulgaria, Burkina Faso, Cameroon, Canada, Chad, Chile, China,
Colombia, Cuba, Czech Republic, Ecuador, Egypt, France, Germany, Greece,
Hungary, India, Indonesia, the Islamic Republic of Iran, Iraq, Italy, Japan,
Kazakhstan, Kenya, Lebanon, Mexico, Mongolia, Morocco, Netherlands, Nicaragua,
Niger, Nigeria, Pakistan, Philippines, Poland, Portugal, Republic of Korea,
Romania, Russian Federation, Senegal, Sierra Leone, South Africa, Spain, Sudan,
Sweden, Syrian Arab Republic, Turkey, Ukraine, the United Kingdom, the United
States, Uruguay, Venezuela, Viet Nam, and Yugoslavia. COPUOS, Membership of the
Committee on the Peaceful Uses of Outer Space, U.N. Doc. A/AC.105/602 1 (1995).
n316 Treaty on Principles Governing the Activities of States in the
Exploration and Use of Outer Space in the Exploration and Use of Outer Space,
Including the Moon and Other Celestial Bodies, Jan. 27, 1967, 18 U.S.T. 2410,
610 U.N.T.S. 205 (entered into force Oct. 10, 1967) [hereinafter Outer Space
n317 Namely, Resolution 1772, Jan. 3, 1962, International Co-operation in the
Peaceful Uses of Outer Space; Resolution 1962 (XVIII), Dec. 13, 1963,
Declaration of Legal Principles Governing Activities of States in the
Exploration and Use of Outer Space, and Resolution 1963 (XVIII), Dec. 13, 1963,
International Co-operation in the Peaceful Uses of Outer Space. For a discussion
of the second, and most important of these resolutions, see infra notes 482-485
and accompanying text.
n318 ROBINSON & WHITE, supra note 293, at 181.
n319 N. Jasentuliyana, The Role of Developing Countries in the Formation of
Space Law, XX:II ANNALS AIR & SPACE L. 95, 97 (1995) [hereinafter Jasentuliyana,
n320 I.A. Vlasic, A Survey of the Space Law Treaties and Principles Developed
Through the United Nations, in PROCEEDINGS OF THE THIRTY-EIGHTH COLLOQUIUM ON
THE LAW OF OUTER SPACE 324 (1996).
n321 "[The Outer Space Treaty] represents de facto and de jure the
constitution of outer space." I.A. Vlasic, Some Thoughts on Negotiating and
Drafting Arms Control and Disarmament Agreements Relating to Outer Space, in IV
ARMS CONTROL AND DISARMAMENT IN OUTER SPACE: TOWARDS A NEW ORDER OF SURVIVAL
203, 212 (M.N. Matte, ed., 1991) [hereinafter Vlasic, Negotiating and Drafting
Agreements Relating to Outer Space]. Subsequent multilateral space law treaties
serve primarily as commentaries and clarifications of the Outer Space Treaty.
n322 Outer Space Treaty, supra note 316, at art. II.
n323 Private entrepreneurs are now declaring their intent to make claims of
ownership over asteroids. See, e.g., P. Landesman, Starship Private Enterprise,
THE NEW YORKER, Oct. 26, 1998, at 178. As a matter of law, the possibility of
private appropriation has been widely rejected as an implicit violation of the
Outer Space Treaty's "no-sovereignty-in-outer-space" provision. However, growing
privatization of space activities, recognition of the economic benefits of
commercialization, differentiation of space resources from ocean resources, and
hesitation among venture capitalists to invest short of security interests
backed by ownership may lead to a gradual change in practice and law. The
positions of Wassenberg and Gorove that private appropriation does not violate
the Outer Space Treaty, while a minority view today, may became the majority
view in the twenty-first century. See H. Wassenbergh, Responsibility and
Liability for Non-Governmental Activities in Outer Space, in ECSL SUMMER COURSE
ON SPACE LAW AND POLICY: BASIC MATERIALS 197 (1994); S. Gorove, Interpreting
Article II of the Outer Space Treaty, 37 FORDHAM L. REV. 349, 351 (1969).
Indeed, "some scholars writing in the wake of the Outer Space Treaty's
ratification took the position that Article 2's no-sovereignty provisions bar
any property rights in outer space resources. That position has lost its
popularity over time, however, and is no longer held by many scholars." REYNOLDS
& MERGES, supra note 59, at 82. As an example, some business interests have
begun planning to construct space resorts. "The Space Transportation
Association, an industry lobbying group, recently created a division devoted to
promoting space tourism, which it sees as a viable way to spur economic
development beyond earth." T. Beardsley, The Way to Go in Space, 280:2
SCIENTIFIC AMERICAN, Feb. 1999, at 81. See also W.B. Scott, Studies Claim
Space Tourism Feasible, 146:14 AV. WK. & SPACE TECH., Apr. 7, 1997, at 58.
n324 Outer Space Treaty, supra note 316, at art. VI.
n325 As State responsibility for national space activity has been a
cornerstone of the corpus juris spatialis since 1967, it may well be a principle
of customary international law binding non-contracting States as well.
n326 The idea appeared previously in Principle 5 of U.N.G.A. Resolution 1962
(XVIII). However, this Resolution did not legally bind any State. See discussion
infra note 482.
n327 Outer Space Treaty, supra note 316, at art. IX.
n328 The entire body of international space law as it applies to space
warfare is subject to the limitations effected by a state of war between
belligerents. The difficult question of how an armed conflict terminates or
modifies obligations otherwise binding on belligerents in peacetime cannot be
avoided with respect to space warfare. For an example, see supra note 280 and
n329 Outer Space Treaty, supra note 316, at art. IX.
n330 Though Article IX also requires States to "conduct all their activities
in outer space . . . with due regard to the corresponding interests of all other
States Parties to the Treaty," this vague exhortation could just as likely apply
to the activities of States on earth as well. Outer Space Treaty, supra note
316, at art. IX. Certainly as a general proposition the intentional creation
of harmful contamination would run counter to various principles of
international law. However, as is often the case with armed conflict, the law
recognizes that as a matter of brute reality, certain activities illegitimate in
peace will be tolerated in war. Thus, in analyzing space warfare, the corpus
juris spatialis cannot be read in isolation from the law of war. In the context
of armed conflict, Article IX seems to create no greater duty for States with
respect to the space environment than that which exists for the terrestrial
environment. But see Professor Vlasic, "although these provisions apparently are
not aimed at hostile uses of outer space, they could nonetheless be invoked
against military activities not otherwise banned by the Treaty." Vlasic, Space
Law and Military Applications, supra note 11, at 397.
n331 Outer Space Treaty, supra note 316, at art. IX.
n332 B. REIJNEN, THE UNITED NATIONS SPACE TREATIES ANALYSED 130-31 (1992)
n333 Outer Space Treaty, supra note 316, at art. IV.
n334 I.A. Vlasic, The Legal Aspects of Peaceful and Non-Peaceful Uses of
Outer Space, in PEACEFUL AND NON-PEACEFUL USES OF SPACE: PROBLEMS OF DEFINITION
FOR THE PREVENTION OF AN ARMS RACE 37, 39 (B. Jasani, ed., 1991) [hereinafter
Vlasic, Peaceful and Non-Peaceful Uses of Outer Space].
n336 Id. (quoting text of letter as contained in McDOUGAL, ET AL., supra note
40, at 395).
n337 Id. at 40.
n338 C.Q. CHRISTOL, THE MODERN INTERNATIONAL LAW OF OUTER SPACE 22 (1982)
[hereinafter CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER SPACE]. In addition to
the textual problems associated with equating the terms peaceful and
non-military, (indeed Article IV itself contemplates the military use of space
for scientific research) the interpretation suffers from a practical difficulty.
Just about any use of space can support a military purpose. Thus, even if a
satellite were developed, tested, launched, and controlled by a "civilian" organ
of State government, the information it provided could be useful for military
purposes. Weather, navigation, communications, and remote sensing are just a few
applications of space capabilities of great use to military forces. To say that
the Outer Space Treaty forbids this activity seems highly dubious. Yet this is
the logical extension of the claim that all uses of space must scrupulously
avoid any military uses and thereby remain peaceful.
n339 See id. at 29.
n340 Indeed the term includes the prospect of space weapons as well.
If one chooses to ignore the controversy concerning the 'true' meaning of
'peaceful' in the Outer Space Treaty, it is safe to conclude that the Treaty
permits the deployment in outer space of anti-satellite weapons, directed energy
weapons, or any other kind of weapon, as long as these weapons are not in
conflict with the prohibitions of Article IV [such as weapons of mass
destruction in orbit] of the Outer Space Treaty, or some other international
Vlasic, Space Law and Military Applications, supra note 11, at 397. As a
linguistic matter, though the true meaning of peaceful can just as accurately
mean "non-aggressive," (in part evidenced by the fact that Article IV forbids
military bases, installations, fortifications, and maneuvers--a meaningless
partial demilitarization if "peaceful" simply means "non-military") the relevant
issue is this: what does the term allow and what does it prohibit under the law?
On this, the corpus juris spatialis is clear.
n341 See infra notes 469, 471 and accompanying text. Though none go so far as
the Antarctic Treaty in divorcing "military" activities from "peaceful
purposes," other treaties specifically suggest that "peaceful," as used therein,
means non-military. Thus,
an examination of agreements which use the term 'peaceful'--namely, the Statute
of the International Atomic Energy Agency; the Antarctic Treaty; the Treaty for
the Prohibition of Nuclear Weapons in Latin America; the Convention on the
Prohibition of the Development, production and Stockpiling of Bacteriological
(Biological) and Toxic Weapons and Their Destruction; and the Convention on the
Prohibition of Military or Any Other Hostile Use of the Environmental
Modification Techniques--shows that in all these treaties the term 'peaceful' is
used in contradistinction to 'military.'
Vlasic, Negotiating and Drafting Agreements Relating to Outer Space, supra note
321, at 215. Assuming for the sake of argument that this interpretation is
accepted for each treaty cited, the exercise simply demonstrates that when the
drafters of a treaty intend for "peaceful" to mean non-military, they so state.
In the absence of doing so, one cannot simply assume it. For example, Article 88
of the United Nations Convention on the Law of the Sea specifies that "the high
seas shall be reserved for peaceful purposes." United Nations Convention on the
Law of the Sea, Dec. 10, 1982, 1833 U.N.T.S. 397, reprinted in 21 I.L.M. 1261
(entered into force Nov. 16, 1994). Given the history of State practice on the
high seas, no one assumed that this article turned the high seas into a
demilitarized zone. This provision "most certainly cannot be interpreted to mean
that military uses of the high seas are prohibited. Both customary law and the
uniform practice of States, before 1982 and after, are crystal clear on this
point." Vlasic, Negotiating and Drafting Agreements Relating to Outer Space,
supra note 321, at 215. Unless the treaty specifies that "peaceful" means
non-military, or its negotiating history makes it obvious, it cannot be assumed.
n342 Agreement Among the Government of Canada, Governments of Member States
of the European Space Agency, The Government of Japan, The Government of the
Russian Federation, and The Government of the United States of America
Concerning Cooperation on the Civil International Space Station, Jan. 29, 1998,
art. 1(1), IV UNITED STATES SPACE LAW: NATIONAL & INTERNATIONAL REGULATION 98-1
(S. Gorove, ed., 1998) [hereinafter ISS Agreement].
n343 Id. at art. 9 P3(b).
n344 CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER SPACE, supra note 338, at
n345 Christol quotes the principal U.S. negotiator of the treaty, Ambassador
Arthur Goldberg, for this proposition: "'obviously whatever the definition of
outer space, the Moon and other celestial bodies are in outer space.'" Id. at
n346 Id. at 24.
n347 Professor Vlasic provides one insight as to why the U.S. preferred to
restrict the application of "peaceful purposes" to the moon and celestial
bodies: "According to [a] former Legal Advisor in the U.S. Department of State,
the "language of Article IV was carefully chosen to ensure that general
principle of 'peaceful uses' would not interfere with the testing" of weapons
such as nuclear ballistic missiles." Vlasic, Peaceful and Non-Peaceful Uses of
Outer Space, supra note 334, at 42. Of course, on the widely-accepted view that
peaceful means non-aggressive, such testing would not have been a problem.
Indeed, on this understanding, the actual use of weapons in space can be
peaceful if compliant with the jus ad bellum. Thus, Professor Christol's
pragmatic recognition that
it is a fact that [Article 4(2)] says that the moon and celestial bodies full
stop shall be used exclusively for peaceful purposes; and by that I take it to
mean that this inhibition or restriction does not apply to outer space today.
Though I do realize that there are many who make arguments which sometimes are a
little overreaching, and whereas my sympathies go with them, my legal training
tells me that we had better not read it that way . . .
C. Christol, Discussion, in M. COHEN & M.E. GOUIN, LAWYERS AND THE NUCLEAR
DEBATE 233 (1988).
n348 See supra notes 266-274 and accompanying text.
n349 Outer Space Treaty, supra note 316, at art. III.
n350 National Aeronautics and Space Act of 1958, 42 U.S.C. @ 2451(a) (1994).
n351 The White House, National Science and Technology Council, National
Space Policy, Sept. 19, 1996 (from the Introduction). The policy statement
articulates the long-held U.S. position on the meaning of peaceful purposes by
stating that "'Peaceful purposes' allow defense and intelligence-related
activities in pursuit of national security and other goals." Id. P3.
n352 "In the case of weapons systems, there is a much broader feeling [beyond
that for military support systems] that they are destabilizing and should be
banned." P. Jankowitsch, Legal Aspects of Military Space Activities, in SPACE
LAW: DEVELOPMENT AND SCOPE 143, 150 (N. Jasentuliyana, ed., 1992). Further, in a
fascinating recent article, Lieutenant Colonel Bruce DeBlois argued that for
reasons of national policy, the U.S. should resist the urge to weaponize space
with ASATs. He boldly proclaims the U.S. National Space Policy "weak and
ambiguous" with "no clear vision" and no one "in charge," and that for space
matters "few people would argue" that the U.S. is "fumbling around in an ad hoc
manner." DeBlois, supra note 3, at 52. Yet even this advocate of the "space
sanctuary" school recognizes that "except for [weapons of mass destruction] and
[anti-ballistic missile systems for the U.S. and Russia], no international
prohibition on space weapons exists." Id. at 46.
It is beyond the scope of this article to fully consider the policy merits of
weaponizing space. However, the debate that Lieutenant Colonel DeBlois invites
is sure to yield a flood of comment, much of which will no doubt take issue with
his central premise that space weapons are ultimately destabilizing. With
respect to ASATs in the context of the cold war, Stares helpfully summarizes the
opposing positions, portions of which still carry some currency in the post-cold
[The pro-ASAT school] starts from the belief that space is just another military
arena where satellites will have to adapt to new threats with new
countermeasures in the same way that their counterparts on earth have adapted. .
. . [Proponents believe the U.S. can] deny the Soviets the use of their space
assets in wartime while simultaneously preserving the security of U.S. space
systems. Moreover, they argue that any attempt to constrain the development of
antisatellite systems is illogical and unfeasible; illogical because there are
no such limitations on weapons capable of attacking, say, high-flying
reconnaissance aircraft or early warning radars, and unfeasible because of the
unavoidable presence of the residual antisatellite systems . . . . The second
school . . . starts from the belief that the United States is more dependent on
the service of military satellites than the Soviet Union is and therefore has
more to lose in the event of hostilities in space. The proponents of this view
remain highly skeptical of the United States' ability to defend its vital
space assets in the face of unconstrained antisatellite development by the
Soviet Union. In addition to stimulating an expensive and in the end fruitless
competition, they believe an ASAT arms race could seriously erode superpower
stability during a severe crisis. Specifically, the knowledge that the other
side had a highly effective ASAT weapon system capable of crippling one's own
vital early warning and strategic communication satellites could become an
overwhelming incentive to strike first in a major superpower crisis.
STARES, SPACE AND NATIONAL SECURITY, supra note 70, at 5.
n353 Because the Outer Space Treaty does not define nuclear weapon its
prohibition has stimulated debate over newer technologies such as the X-ray
laser which is powered by a nuclear explosion. Whether a nuclear-powered laser
is a nuclear weapon will mean the difference between its lawful orbiting of
earth or not. P. Jankowitsch, Legal Aspects of Military Space Activities, in
SPACE LAW: DEVELOPMENT AND SCOPE 147 (N. Jasentuliyana, ed., 1992). Given its
destructive power, the military significance of such a laser will be tremendous.
For example, the intense X-rays emitted as a result of the initial nuclear blast
lead some to speculate that one X-ray laser no larger than a packing crate would
be able to destroy the entire Russian ICBM arsenal if they were launched at one
time in a massive attack. TAYLOR, supra note 97, at 36. In addition to the
possibility that such weapons may be nuclear weapons under the Outer Space
Treaty, their immense destructive capability may otherwise render them weapons
of mass destruction.
n354 Professor Stojak points out that though it is unlikely to happen, the
change could occur without a new treaty were Article IV(1) modified to read:
States Parties to the Treaty undertake not to place in outer space [instead of
"in orbit around the earth"] any objects carrying nuclear weapons or any other
kinds of weapons of mass destruction, install such weapons on the moon or on
celestial bodies, or station weapons [instead of "such weapons"] in outer
space in any other manner.
M.L. Stojak, Recent Developments in Space Law, in ARMS CONTROL AND THE RULE OF
LAW: A FRAMEWORK FOR PEACE AND SECURITY IN OUTER SPACE 62 (J.M. Beier & S.
Mataija, eds., 1998) [hereinafter Stojak].
n355 The exception to this applies only to the U.S. and Russia under the
Anti-Ballistic Missile Treaty, which prohibits interference with "national
technical means" of arms control verification. See infra Part V, @ A.2. With
respect to the ban on orbiting of nuclear or other weapons of mass destruction,
it has been widely observed that the proscription does not extend to partial
To be 'in orbit,' an object must circumnavigate the planet at least one full
time. When, on Nov. 3, 1967, U.S. Secretary of Defense McNamara announced that
the U.S.S.R. had been testing a Fractional Orbiting Bombing System (FOBS), that
could become operational in 1968, he hastened to add that as such an object,
while entering outer space, does not completely circle the globe, it, like an
intercontinental ballistic missile, was not in violation of the 1967 treaty.
HURWITZ, supra note 289, at 111.
n356 For discussion of the prohibition on nuclear weapons tests in space, see
infra notes 436-438 and accompanying text.
n357 W.E. Burrows, The Military in Space: Securing the High Ground, in
SPACE: DISCOVERY AND EXPLORATION 142 (M.J. Collins & S.K. Kraemer, eds., 1993)
(quoting speech by Brigadier General Homer A. Boushey).
n358 Agreement on the Rescue of Astronauts, the Return of Astronauts, and the
Return of Objects Launched into Outer Space, Apr. 22, 1968, 672 U.N.T.S. 119, 19
U.S.T. 7570, T.I.A.S. No. 6599, (entered into force Dec. 3, 1968) [hereinafter
Rescue & Return Agreement]. Although widely used, the shorthand "astronaut
agreement" is unfortunate because it masks the treaty's application to return of
objects as well as astronauts. A better shorthand reference would be the "rescue
and return agreement." CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER SPACE, supra
note 338, at 152.
n359 Though never defined, it seems best to think of a space object as
something distinct from astronauts. However, when international law finally
settles on a definition of space object it may include astronauts. See infra
n360 Other than the Moon Agreement, the U.S. and Russia are parties to four
of the five multilateral treaties under the corpus juris spatialis. For
discussion of the Moon Agreement, see infra, Part IV, @ B.5.
n361 Though the treaty does not specify whether the notifications to the
launching authority and the U.N. Secretary General are conjunctive or
disjunctive, the language of Article 2 requiring similar notifications is
n362 Rescue & Return Agreement, supra note 358, at art. 1.
n363 Id. at art. 2. Article 2 further specifies that if assistance by the
launching authority would "effect a prompt rescue or would contribute
substantially to the effectiveness of search and rescue operations" it shall
cooperate with the State Party in whose territory the astronaut has landed.
Id. This raises two observations. First, if the conditions for cooperation are
satisfied, the launching authority must assist. Second, because Article 6
defines launch authority, in part, as "the State responsible for launching," it
could constitute a State other than the astronaut's home state. For example,
when the U.S. launches Canadian, French, or Spanish astronauts on its Space
Shuttle, if the occupants were to land in the territory of another contracting
party by reason of "accident, distress, emergency, or unintended landing," the
U.S. as "launching authority" could be required under Article 2 to assist in any
recovery efforts. Id. Such efforts would then be "subject to the direction and
control of the Contracting Party, which shall act in close and continuing
consultation with the launching authority." Id. With respect to the treaty, its
provisions, including the duty to rescue and assist, formally apply only to
States Parties. However, by analogy with Maritime Law, it seems likely that this
duty to assist astronauts in distress is rooted in customary international law.
The duty to assist mariners on the sea has long been established both by treaty
(e.g. 1910 Brussels Treaty) and custom, and likely applies equally to
n364 Id. at art. 3.
n365 The Liability Convention, does define space object as including the
"component parts of a space object as well as its launch vehicle and parts
thereof." Convention on International Liability for Damage Caused by Space
Objects, Mar. 29, 1972, art. 1(d), 24 U.S.T. 2389, 961 U.N.T.S. 187 (entered
into force Sept. 1, 1972) [hereinafter Liability Convention]. However in using
the very term to be defined within the definition itself, the definition is so
hopelessly circular that it amounts to no definition at all.
n366 Rescue & Return Agreement, supra note 358, at art. 5(1).
n367 Id. at art. 5(3).
n368 The satellite was designed for ocean reconnaissance and was powered by a
"nuclear reactor working on uranium enriched with isotope of uranium-235."
SPACE LAW AND INSTITUTIONS: DOCUMENTS AND MATERIALS 295 (I. Vlasic, ed., 1997)
(containing Statement of Claim by Canada, Jan. 23, 1979). The Cosmos 954 crash
was the first instance "in the history of space exploration where a claim was
made by one sovereign state against another on account of damage caused by a
falling space object." B. Schwartz & M.L. Berlin, After the Fall: An Analysis of
Canadian Legal Claims for Damage Caused by Cosmos 954, 27 McGILL L.J. 676
(1982). The satellite contained over 50 kg of enriched uranium, suggesting it
was not designed for reentry in 1978 but only after a long orbital lifetime.
n369 President Carter notified Canadian Prime Minister Trudeau and actually
repeated an offer made prior to the satellite's reentry. A.F. Cohen, Cosmos 954
and the International Law of Satellite Accidents, 10:1 YALE J. INT'L L. 78, 80
(1984). Not only does this suggest that the U.S. had tracked the satellite to
its reentry point, but that the U.S. earnestly wanted an analysis of the Soviet
spy satellite. Cohen reports that prior to the reentry, the Soviet Union
secretly provided the U.S. with information about the satellite's reactor,
though this information was only formally provided to Canada months after the
crash. See id. at 179.
n370 Indeed, though the Soviet Union expressed no interest in the return of
the object and therefore claimed it had no obligation to provide identifying
data under Article 5(3) (required prior to return of the object), it expressed
regret that its specialists did not participate in the search and removal of the
object. CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER SPACE, supra note 338, at
179. Because no State has ever requested return of a space object from another,
Article 5 has never been tested in practice.
n371 Rescue & Return Agreement, supra note 358, at art. 5(2).
n372 Id. at art. 4.
n373 Austria, supported by France, wished to continue to offer asylum in
keeping with its "traditional policies toward aliens." CHRISTOL, MODERN
INTERNATIONAL LAW OF OUTER SPACE, supra note 338, at 175.
n374 REYNOLDS & MERGES, supra note 59, at 204. These States plausibly
asserted that requests for asylum under conditions of the unintended landings
specified in the treaty could be coerced, "particularly when the requestor is
the victim of a recent space accident and may not be in full possession of his
or her faculties." Id.
n375 Id. Also, though its terms suggest application to living astronauts, the
treaty does not answer whether a duty exists to return the remains of expired
n376 Liability Convention, supra note 365.
n377 See infra, Part VI, @ E.3.
n378 Liability Convention, supra note 365 (from the Preamble).
n379 Outer Space Treaty, supra note 316, at art. VII. Article VI of the Outer
Space Treaty also provided the drafters of the Liability Convention some
guidance in its assertion that States Parties "shall bear international
responsibility for national activities in outer space . . . ." Id. at art. VI.
Foster notes that the Outer Space Treaty left several left several questions
(a) what flight instrumentalities are covered by the term 'object?';
(b) what is meant by the phrase 'internationally liable?';
(c) what regime will govern the liability of States engaged in a joint venture-
-will they be jointly and severally liable or only severally liable?;
(d) what is encompassed by the term 'damage?';
(e) how is an international organization to be responsible under the Treaty when
it cannot become a party to, or even accept the obligations contained in the
(f) what mechanisms will be used to settle disputes arising when damage is caused?
W.F. Foster, The Convention on International Liability for Damage Caused by
Space Objects, 1972 CAN. Y.B. INT'L L. 137, 143 n.3 [hereinafter Foster]. Of
these, with the exception of the first, all have been clarified to some
meaningful degree by the Liability Convention.
n380 Defined more expansively than "launching authority" under the Rescue &
Return Agreement, "launching state" under the Liability Convention includes (1)
the State who launches a space object; (2) the State who procures the launch of
a space object; and (3) the State from whose territory or facility a space
object is launched. Liability Convention, supra note 365, at art. I(c).
n381 Liability Convention, supra note 365, at art. 2. This significant
provision was the first time that an international agreement provided for
attaching absolute liability to State actors.
n382 Id. at art. 3.
n383 As stated previously, the Liability Convention's definition of "objects"
attempts, but fails to define the term. Though it would appear to include
non-operational space debris, it leaves several unresolved issues. For example,
it is unclear whether a space object is simply an object designed for travel in
outer space. Foster notes that all of the draft definitions of "space object" in
the COPUOS Legal Subcommittee "contained the criterion of being designed for
movement in outer space." Foster, supra note 379, at 145. On this approach,
sounding rockets that fail to leave earth's atmosphere and scientific equipment
permanently left on the moon are not space objects. By contrast, a satellite in
transit by rail that rolls off its platform causing damage would logically
subject the State of origin to absolute liability. Though the Liability
Convention attaches liability to "launching States" it does not specify that to
be compensable the damage must occur during or after a launch. Further, because
the Liability Convention definition of "space object" includes "component parts
of a space object," it is unclear whether, for example, cargo and crew of a
space object also qualify themselves as "space objects." They might if Christol
is correct that "component parts' is to be construed in a broad sense to include
such property on board as would be conducive to the successful operation of the
space object." CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER SPACE, supra note
338, at 109. Because the Convention does not explicitly define the term "space
object," these hypothetical scenarios raise potential future disputes over what
types of objects can create liability.
n384 Liability Convention, supra note 365, at art. I(a).
n385 Id. at art. IV.
n386 Id. at art. V.
n387 Id. at art. VI.
n388 Id. at art. VII.
n389 Id. at art. VIII.
n390 Id. at art. X.
n391 Id. at art. XI.
n392 Id. at art. XIV--art. XX.
n393 CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER SPACE, supra note 338, at
n394 Convention on the Registration of Objects Launched into Outer Space,
Jan. 14, 1975, 28 U.S.T. 695, 1023 U.N.T.S. 15 (entered into force Sept. 15,
1979) [hereinafter Registration Convention].
n395 DIEDERIKS-VERSCHOOR, supra note 298, at 41.
n396 Outer Space Treaty, supra note 316, at art. VIII.
n397 Arguably, the Outer Space Treaty implicitly required the maintenance of
a registry simply because use of the term in the Treaty assumes that States
maintain them. Yet, the matter was not stated as a requirement until 1975.
n398 Registration Convention, supra note 394, at art. I. The first two
phrases are given definitions identical to those found in the Liability
n399 Id. at art. II(1). This suggests that space objects, or other objects,
launched into sub-orbital trajectories need not be registered. Technically, this
would include objects failing to complete a single circumnavigation of the
globe, as for example objects following a 180 or 270 degree arc, short of the
complete 360 degree path required of orbital flights.
n400 Id. at art. II(3).
n401 Essentially, this information has been made optional in view of Article
V which suggests that space objects may or may not carry identifying markings:
"Whenever a space object launched into earth orbit or beyond is marked with the
designator or registration number referred to in Article IV, paragraph 1(b), . .
." The obvious but unstated assumption flowing from "whenever" is that in some
cases the object might be marked, in some cases it might not, at the option of
the launching state.
n402 Also termed "orbital period." "The time it takes a spacecraft or other
object to circumnavigate Earth, . . . High altitude circuits take longer to
complete than low ones. Elliptical and circular orbits have equal periods, if
the average of apogee and perigee altitudes is the same." COLLINS, MILITARY
SPACE FORCES, supra note 12, at 156.
n403 Also termed "orbital inclination."
The angle of a flight path in space relative to the equator of Earth, . . .
Equatorial paths are 0 [degree] for flights headed east, 180 [degrees] for those
headed west. Polar paths are 90 [degrees]. All other paths overfly equal parts
of the northern and southern hemispheres (from 50 [degrees] N latitude to 50
[degrees] S, for example).
n404 "The maximum altitude attained by a spacecraft in elliptical orbit
around Earth, its moon, or another planet." Id. at 146.
n405 "The minimum altitude attained by a spacecraft in elliptical orbit
around Earth, its moon, or another planet. Spacecraft in [low-earth orbit]
attain maximum velocity at that point where Earth's gravitational pull is
strongest." Id. at 157.
n406 Registration Convention, supra note 394, at art. IV(1).
n407 In some cases, what is practicable may require delay for up to a year or
more. During the prosecution of an international armed conflict, it would hardly
be practicable for a belligerent to transmit the launch of its space objects to
an opposing belligerent through the United Nations. Notification to the opposing
belligerent is the practical result of such notifications made during the armed
conflict, given the fact that "there shall be full and open access to the
information in this [United Nations] Register." Id. at art. III(2). On this
interpretation of Article IV(1), a belligerent could avoid the difficult
conclusion that the Registration Convention does not apply during armed
conflicts--the belligerent could simply and reasonably apply the Convention's
own terms in the context of armed conflict. This interpretative approach to the
Registration Convention is available to belligerents in any conflict, not merely
those involving space combat. Thus, during Vietnam, the 1991 Persian Gulf War,
and the 1999 war in the former Yugoslavia, belligerents could legitimately delay
notification to the U.N. Secretary General under Article IV until doing so
provided no tactical advantage to the enemy. Once the military threat posed by
earlier notification is passed, the notification became practicable for the
State of registry.
n408 Indeed, protection of the "national technical means" (including space
reconnaissance capabilities) under the Anti-Ballistic Missile (ABM) treaty
between the U.S. and U.S.S.R., is the sine qua non of an effective verification
structure. To the extent the ABM Treaty should survive in its current form, the
U.S. and Russia must protect the secrecy of their space reconnaissance assets.
The Registration Convention allows them to do this. For a discussion of the ABM
Treaty, see infra, Part V, @ A.2.
n409 DIEDERIKS-VERSCHOOR, supra note 298, at 42.
n411 In addition to reconnaissance satellites, the vague reporting
requirements could easily obscure the true nature of attack satellites as well.
n412 Agreement on the Activities of States on the Moon and Other Celestial
Bodies, Dec. 5, 1979, G.A. Res. 34/68, U.N. GAOR, 34th Sess., Supp. No. 46, U.N.
Doc. A/34/664 (1979) (entered into force July 11, 1984) [hereinafter Moon
n413 As of 2000, nine States had ratified the treaty, few of which are active
in space and none of which are major space actors. Among others, these include
Australia, Mexico, and Pakistan. Multilateral Treaties Deposited with the
Secretary-General (July 21, 2000), available at
(copy on file with the Air Force Law Review). France signed but has
not ratified the treaty. Id.
n414 Moon Agreement, supra note 412, at art. 4(1); accord Outer Space Treaty,
supra note 316, at art. I.
n415 Moon Agreement, supra note 412, at art. 4(1); accord Outer Space Treaty,
supra note 316, at art. I.
n416 Moon Agreement, supra note 412, at art. 11(2); accord Outer Space
Treaty, supra note 316, at art. II.
n417 Moon Agreement, supra note 412, at art. 12(1); accord Outer Space
Treaty, supra note 316, at art. VIII (using term "object" versus "vehicles,
equipment, facilities, stations, and installations").
n418 Moon Agreement, supra note 412, at art. 2; accord Outer Space Treaty,
supra note 316, at art. III.
n419 Moon Agreement, supra note 412, at art. 14(1); accord Outer Space
Treaty, supra note 316, at art. VI.
n420 Moon Agreement, supra note 412, at art. 15(1); accord Outer Space
Treaty, supra note 316, at art. XII. The Moon Agreement adds a fifth category,
facilities, to the list of items open to States Parties.
n421 Moon Agreement, supra note 412, at art. 1(1).
n422 Id. at art. 1(3).
n423 Id. at art. 6(2). Unfortunately, the treaty does not define "sample."
Thus it is not clear from the treaty's terms either what sized object
constitutes a sample (1 cm? .5 m? 10 m? 100 m?) or how many samples may be
removed. Article 6(2) goes on to state that "States Parties may in the course of
scientific investigations also use mineral and other substances of the moon in
quantities appropriate for the support of their missions." Id. While this comes
close to providing guidance on a permissible amount, the fact that minerals and
substances may "also" be used in this way suggests that it is in addition to the
taking and retaining of samples. Thus, there is no clear answer.
n424 The Apollo 11 moon landing in 1969 is regarded as providing the first
major impetus toward negotiating a specific treaty governing moon activities.
The negotiators were motivated in part by "an awareness that tangible Moon rocks
were being returned to Earth, the possibility that mineral and other substances,
as well as intangible resources, might be exploited, and speculation that it
might be possible to establish human habitations on the Moon." CHRISTOL, MODERN
INTERNATIONAL LAW OF OUTER SPACE, supra note 338, at 246. The provision allowing
for limited exploitation of the moon's resources came at the expense of
proposals by some developing countries to outlaw the exploitation of natural
resources in space except under the auspices of an international regime.
n425 Moon Agreement, supra note 412, at art. 3(3). The prohibition on
orbiting weapons of mass destruction around the moon was thought to close a gap
left by Article IV of the Outer Space Treaty. The latter outlawed the orbiting
of weapons of mass destruction around the earth, and the installation or
stationing of such weapons on celestial bodies or in outer space. Though the
prohibition on stationing weapons of mass destruction in outer space could be
read to foreclose the lawfulness of orbiting, for example, a nuclear weapon
around the moon, the Outer Space Treaty did not specifically forbid orbiting of
the moon by nuclear or other weapons of mass destruction. The Moon Agreement
n426 Id. at art. 3(2).
n427 Id. at art. 11.
n428 As applied to outer space, the concept first arose in July 1967 at the
behest of the Ambassador of Argentina, Aldo Armando Cocca, in discussions held
with the COPUOS Legal Subcommittee.
A few months later, the Maltese Ambassador to the United Nations, Arvid Pardo,
applied the principle to the law of the sea when he stated that the seabed was
the 'common heritage of mankind.' The concept was formalized first in the 1979
Moon Agreement, and subsequently in the 1982 Law of the Sea Convention.
Jasentuliyana, Developing Countries, supra note 319, at 106. Prior to this, the
CHM concept appeared in a 1970 U.N.G.A. resolution declaring principles
governing the seabed and subsoil beneath it.
n429 During negotiations over the Moon Agreement, the Argentinean delegation
submitted a working paper in which it proposed that the merit in "replacing the
vague expression 'province of mankind' by the more meaningful expression 'common
heritage of mankind' is that in doing so one has specified the commencement of
an action, replacing an abstract statement by a means of operating, within a
specified legal framework." Jasentuliyana, Developing Countries, supra note 319,
at 107-08. Perhaps Diederiks-Verschoor puts the distinction best:
The 'province of mankind' must be identified as a general political principle
with certain moral overtones, meant to govern rights and duties in outer
space. Its legal substance, according to Article I [of the Outer Space Treaty]
is international cooperation and use of outer space without discrimination of
any States, and the duty to take into account the interests of other States. The
scope of the term 'common heritage' is much more restricted in legal terms,
covering only the exploitation of the moon's natural resources.
DIEDERIKS-VERSCHOOR, supra note 298, at 45. As usual, Professor Christol gets to
the heart of the matter:
[despite commonalities] it is evident that the two principles carry separate and
distinct characteristics. The province of mankind principle is linked to the res
communis principle which allows for the exploration, use, exploitation, and
voluntary sharing of common resources. On the other hand, the Common Heritage of
Mankind principle, as contained in the Moon Agreement, may be characterized as a
"res communis plus" principle in the sense that successful explorers, users, and
exploiters of the moon and its natural resources will be obligated to conform to
the decisions of the international legal regime identified in Article 11 of that
agreement . . . . The province of mankind principle does not contemplate the
formation of an international inter-governmental body or that there be an
obligatory sharing of the tangible acquisitions of Moon and celestial body
C.Q. Christol, Important Concepts for the International Law of Outer Space, in
PROCEEDINGS OF THE FORTIETH COLLOQUIUM ON THE LAW OF OUTER SPACE 73, 80 (1998).
n430 Jasentuliyana, Developing Countries, supra note 319, at 106-07. For more
detailed analyses, see G.M. Danilenko, The Concept of the Common Heritage of
Mankind in International Law, XIII ANNALS AIR & SPACE L. 247 (1988); N.
Jasentuliyana, The U.N. Space Treaties and the Common Heritage Principle, 2
SPACE POL'Y 296 (1986); A. Cocca, The Common Heritage of Mankind: Doctrine and
Principle of Space Law--An Overview, in PROCEEDINGS OF THE TWENTY-NINTH
COLLOQUIUM OF THE LAW OF OUTER SPACE 17 (1986); N.M. Matte, Limited Aerospace
Natural Resources and their Regulation, VII ANNALS AIR & SPACE L. 379 (1982);
K.B. Walsh, Controversial Issues Under Article XI of the Moon Treaty, VI ANNALS
AIR & SPACE L. 489 (1981); and S.M. Williams, The Common Heritage of Mankind and
the Moon Agreement--Economic Implications and Institutional Arrangements, in
PROCEEDINGS OF THE TWENTY-FOURTH COLLOQUIUM ON THE LAW OF OUTER SPACE 87 (1981).
n431 The Agreement calls for an international regime that contains four
(a) The orderly and safe development of the natural resources of the moon;
(b) The rational management of those resources; (c) The expansion of
opportunities in the use of those resources; and (d) an equitable sharing by all
States Parties in the benefits derived from those resources, whereby the
interests and needs of the developing countries, as well as the efforts of those
countries which have contributed either directly or indirectly to the
exploration of the moon, shall be given special consideration.
Moon Agreement, supra note 412, at art. 11(7).
n432 Id. at art. 11(5).
n433 Indeed, friction between the U.S. and U.S.S.R. did not help the
prospects for ratification. Although the other leading global space power, and
presumably capable of developing the means to exploit the moon's natural
resources, the U.S.S.R. generally sided with the interests of the developing
States. Both were against incorporation of the CHM principal, however, the U.S.
and U.S.S.R. could not agree on whether exploitation could begin before
establishment of the international regime called for in Article 11--the U.S.
position--or not, the Soviet position. See DIEDERIKS-VERSCHOOR, supra note 298,
at 46. For further information on the debates within the U.S. Senate and State
Department, see M.L. Nash, Contemporary Practice of the United States Relating
to International Law: Moon Treaty, 74 AM. J. INT'L L. 418, 421-26 (1980). Though
the State Department supported the Agreement, a large number of space interest
groups mounted a tremendous protest to the implications of the CHM principle.
What is most surprising is that despite the strong objection to the CHM
principle coming from the U.S., "the U.S. delegation in COPUOS was the main
architect [of the concept]." D. Goedhuis, Some Recent Trends in the
Interpretation and the Implementation of the Rules of International Space Law,
19 COL. J. TRANSNAT'L L. 213, 231 (1981). See also C. Christol, Current
Developments: The Moon Treaty Enters Into Force, 79 AM. J. INT'L L. 163 (1985).
n434 REYNOLDS & MERGES, supra note 59, at 116.
n435 J.F. Kennedy, PUBLIC PAPERS OF THE PRESIDENTS OF THE UNITED STATES: JOHN
F. KENNEDY, 1961, 405 (1962).
n436 Treaty Banning Nuclear Weapon Tests in the Atmosphere, in Outer Space
and Underwater, Aug. 5, 1963, 14 U.S.T. 1313, 480 U.N.T.S. 43 (entered into
Force Oct. 10, 1963) [hereinafter Limited Test Ban Treaty]. As the title
suggests, the Treaty effected a "limited" ban on nuclear testing that did not
restrict detonations under ground. Important as its restrictions on space
activities are, some scholars refer to it as a sixth space treaty. See, e.g.,
REIJNEN, supra note 332, at ix.
n437 The only limitation of course being those locations where the detonation
would constitute an illegal use of force under the jus ad bellum, or means and
method of warfare against foreign property or persons in violation of the jus in
bello. Because France and China never signed the treaty, they would in theory
still be free to initiate detonations in the atmosphere, under water, or in
outer space. Such activity would have to overcome the strong argument that doing
so violates customary international law, including that related to environmental
protection. France continued to test on the high seas until 1973. Though
Australia sought a declaration from the International Court of Justice that such
testing violated international law, the Court determined the issue moot when
France declared it would carry out no further such testing in the South Pacific.
See Nuclear Test Cases (Australia v. France; New Zealand v. France), 1974 I.C.J.
n438 Limited Test Ban Treaty, supra note 436, at art. I(1) (emphasis added).
Interestingly, the drafters sidestepped the issue of where space begins by
simply forbidding detonations within the atmosphere and "beyond its limits,
including outer space." Id.
n439 Id. The U.S. signed the Comprehensive Test Ban Treaty, which was
rejected by the Senate in October of 1999.
n440 Of course, negotiators were not oblivious to the clear military
implications as well. Jankowitsch writes, "In 1962, the international community
was jolted and the situation changed dramatically when the first nuclear weapon
was tested in outer space. Suddenly, the extension of the arms race into outer
space posed a real and present threat to international peace and security, . .
." Jankowitsch, Legal Aspects of Military Space Activities, in SPACE LAW:
DEVELOPMENT AND SCOPE 143 (N. Jasentuliyana, ed., 1992).
n441 REYNOLDS & MERGES, supra note 59, at 54.
n442 Although one of his highest priorities as President, Dwight D.
Eisenhower declared the failure of his administration to secure a nuclear test
ban "the greatest disappointment of any administration--of any decade--of any
time and of any party." P.H. Nitze & S.D. Drell, This Treaty Must Be Ratified,
WASH. POST, June 21, 1999, at 19.
n443 See N.M. Matte, The Treaty Banning Nuclear Weapons Tests in the
Atmosphere, in Outer Space and Under Water (10 October 1963) and the Peaceful
Uses of Outer Space IX ANNALS AIR & SPACE L. 391, 397(1984). The Soviets did not
begin their testing until Aug. 29, 1949.
n444 REYNOLDS & MERGES, supra note 59, at 59.
n445 Id. at 61. The authors note that the United States abandoned its
experimentation on the ORION nuclear propulsion system after ratification of the
treaty. Such system used small atomic bombs as fuel. A similar process is
thought to fuel the X-ray laser developed as part of the Strategic Defense
Initiative. See supra note 353. The U.S. Congressional Office of Technology
Assessment opined in 1985 that existing international law prohibits "the testing
or deployment in space of nuclear space mines or ASATs that would require a
nuclear detonation as a power source." U.S. Congress, Office of Technology
Assessment, Anti-Satellite Weapons, Countermeasures, and Arms Control, 1985, at
21. The basis of this conclusion is likely not the Outer Space Treaty's ban on
the orbiting or stationing of nuclear weapons in space, the definition of which
is reasonably open to interpretation, but the Limited Test Ban Treaty's ban on
nuclear detonations in space.
n446 Because electromagnetic pulses are not dissipated in space, a single
two-megaton bomb exploded at 50 km or higher above the earth could affect the
circuits of nearly all satellites up to the geostationary orbit. REYNOLDS &
MERGES, supra note 59, at 59. While military satellites are shielded against
such threats, commercial satellites usually are not. Of course, the treaty does
not prohibit all explosions in space, only those generated by a nuclear blase.
n447 Treaty on the Limitation of Anti-Ballistic Missile Systems, May 26,
1972, U.S.-U.S.S.R., 23 U.S.T. 3435 (entered into force Oct. 3, 1972)
[hereinafter ABM Treaty].
n448 REYNOLDS & MERGES, supra note 59, at 96.
n449 ABM Treaty, supra note 447, at art. I, II. As would become significant
in 1983, the ABM Treaty did not prohibit research into ABM systems.
n450 Id. at art. III, as amended. The treaty originally allowed two ABM
systems having a radius of 150 km or less. This was reduced to one, by Protocol
of 1974. See Limitation of Anti-Ballistic Missile Systems, July 3, 1974,
U.S.-U.S.S.R., 27 U.S.T. 1645 (entered into force May 24, 1976). The Protocol
specified that the U.S. would not deploy an ABM system in the area centered on
its capital, while the Soviet Union would not deploy a system in the deployment
area of its ICBM silo launchers. Id. at art. I. While the U.S. explored the
development of a system as authorized by the Treaty, it never fielded one. By
contrast, the Soviet Union did field one around Moscow. In addition, the U.S.
suspected at least one other site maintained by the Soviets that was not
authorized under the Treaty. As Shukman notes, "Mikhail Gorbachev was forced to
admit, after years of denials, that one large radar, built near Krasnoyarsk in
Siberia, was in breach of the agreement." SHUKMAN, supra note 39, at 57.
n451 ABM Treaty, supra note 447 (from the Preamble).
n452 Id. at art. V(1).
n453 REYNOLDS & MERGES, supra note 59, at 97.
n454 ABM Treaty, supra note 447, at art. XII.
n455 REYNOLDS & MERGES, supra note 59, at 97.
n456 The term 'national technical means' (NTM) includes
a variety of technical information-gathering methods for monitoring both
military activities and armaments subject to verification. NTM consists, most
importantly, of satellites, ships, aircraft and ground-based radar stations, as
well as other technical devices. . . . Of course, neither side entirely relies
only on its technical means of verification; many additional methods for
collecting intelligence are also used to complement the information obtained by
I.A. Vlasic, Verifying Compliance With Arms Control Agreements: Whatever
Happened to 'ISMA'?, in ARMS CONTROL AND DISARMAMENT IN OUTER SPACE 191 (N.M.
Matte, ed., 1985).
n457 The possibility of a Security Council use of force authorization is
practically zero as both Parties to the Treaty maintain a veto over any such
Security Council resolutions.
n458 Recently published criticisms are numerous: C. Krauthammer, The ABM
Trap, WASH. POST, July 2, 1999, at 27 [hereinafter Krauthammer]; R.K. Bennett,
Needed: Missile Defense, READER'S DIGEST, July 1999, at 117; J. Hackett, Urgent
Need to Exit ABM Treaty, WASH. TIMES, June 11, 1999, at 19; Editorial, Where's
the Treaty?, WALL ST. J., May 10, 1999, at 22; J. Skrlec, ABM Pact Outdated,
Kissinger Tells Panel: Rogue States Pose Threat, WASH. TIMES, May 27, 1999, at
These sources show that in addition to the growing chorus of criticism from
the U.S. public and Congress, critics include those having negotiated the treaty
itself, including Henry Kissinger and John Rhinelander. Critics point to the
threat to U.S. cities of missile attacks by nations such as North Korea, Iran,
and Pakistan. Even those skeptical of the technical feasibility of ABM systems
are witnessing some recent system successes, after numerous failures. A
successful June 10, 1999 test firing of the Army's Theater High-Altitude Area
Defense system (THAAD), showed, according to program manager Brigadier General
Richard Davis, that the U.S. now has "the guidance control, accuracy and the
processing that allows us to hit a bullet with a bullet." P. Shenon, After Six
Failures, Test Of Antimissile System Succeeds, N.Y. TIMES, June 11, 1999, at 1;
See also THAAD Seeker Views Hera Target Before Hit-to-Kill Intercept, 150:26 AV.
WK. & SPACE TECH., June 28, 1999, at 42; World News Roundup, 150:24 AV. WK. &
SPACE TECH, June 14, 1999, at 56. The system scored a second successful test on
Aug. 2, 1999. M.A. Dornheim, Tough Tests for THAAD Are Several Years Off, 151:7
AV. WK. & SPACE TECH, Aug. 16, 1999, at 70. The second success prompted the DOD
to consider an expedited fielding of the theater system; moving it from 2007 to
2006. R. Wall, Missile Defense Changes Emerge, 151:9 AV. WK. & SPACE TECH, Aug.
20, 1999, at 30; See also R. Wall, THAAD At Crossroads After Intercept, 151:6
AV. WK. & SPACE TECH, Aug. 9, 1999, at 29. The technical implications of these
theater ABM successes are still unclear. This uncertainty is especially acute
given a recent national missile defense test failure off the coast of
California. See Elaine Sciolino, Antimissile System Fails Over Pacific, Pentagon
Reports, N.Y. TIMES, July 8, 2000, at 1. However, as with early critics of ICBM
or satellite technology who predicted such innovations were not feasible, the
drive to accomplish each was simply a matter of scientific and fiscal willpower.
It is likely that the quest for a technically feasible national missile defense
system will follow a similar course. The strategic implications are more
apparent. Among other benefits, a single THAAD missile battery could defend
Taiwan while three batteries could defend the entire island of Japan. J.
Hackett, What the THAAD Hit Means, WASH. TIMES, June 15, 1999, at 18. As
currently proposed, a national missile system could protect most of the U.S.
against a limited missile strike.
n459 Following the dissolution of the U.S.S.R. in 1991, Russia became the
successor State to the former U.S.S.R.'s rights and obligations under the
n460 ABM Treaty, supra note 447, at art. XV(2). Recent signs show that
withdrawal by the U.S. may not be necessary. After repeatedly objecting to
U.S. requests for a renegotiation of the Treaty so as to allow for a national
missile defense, Russia decided to discuss the matter under President Yeltsin.
J. Gerstenzang, Clinton, Yeltsin OK New Look at Arms Treaties, L.A. TIMES, June
21, 1999, at 1. Whether the process begun by these negotiations will result in
meaningful progress remains to be seen. As of this writing, the U.S. had
proposed a draft treaty that would allow a defensive system consisting of, in
part, 100 missiles and launchers, as well as sophisticated new radars. Steven
Lee Myers & Jane Perlez, Documents Detail U.S. Plan to Alter '72 Missile Treaty,
N.Y. TIMES, Apr. 28, 2000, at 1. However, not only has the proposal met with
great sceptism by the Russians, but several key national security experts have
begun questioning the entire renegotiating strategy. Paul Mann, Tide Surges
Against Clinton's NMD Plan, 152:25 AV. WK. & SPACE TECH., June 26, 2000, at 31.
n461 For example, the U.S. recently discovered that the North Korean ICBM
program maintains a 3-stage rocket capability. Its Taepo-Dong missile travels at
7 to 8 km per second, faster than the Army's Theater High Altitude Area Defense
ABM system could counter. Krauthammer, supra note 458.
n462 E. Becker, House Approves Star Wars Defense System, N.Y. TIMES, May 21,
1999, at 1.
n463 M.A. Dornheim, National Missile Defense Focused on June Review, 151:7
AV. WK. & SPACE TECH, Aug. 16, 1999, at 66.
n464 Characteristically, Reagan communicated his disagreement with the
assumptions made by the ABM Treaty in simple, populist terms. His views,
articulated almost seventeen years ago, typify the current widespread
disaffection with the treaty:
I've become more and more deeply convinced that the human spirit must be capable
of rising above dealing with other nations and human being by threatening their
existence. . . . If the Soviet Union will join with us in our effort to achieve
major arms reductions, we will have succeeded in stabilizing the nuclear
balance. Nevertheless, it will still be necessary to rely on the specter of
retaliation, on mutual threat. And that's a sad commentary on the human
condition. Wouldn't it be better to save lives than to avenge them? . . . I
clearly recognize that defensive systems have limitations and raise certain
problems and ambiguities. If paired with offensive systems, they can be viewed
as fostering an aggressive policy, and no one wants that. But with these
considerations firmly in mind, I call upon the scientific community in our
country, those who gave us nuclear weapons, to turn their great talents now to
the cause of mankind and world peace, to give us the means of rendering these
nuclear weapons impotent and obsolete. . . . My fellow Americans, tonight we're
launching an effort which holds the promise of changing the course of human
history. There will be risks, and results take time. But I believe we can do it.
As we cross this threshold, I ask for your prayers and your support.
R. Reagan, Peace and National Security, Address to the Nation (Mar. 23, 1983),
in WEAPONS IN SPACE 351-53 (A. Long, et al., eds., 1986). Well before the
President's "Strategic Defense Initiative" speech, derisively termed "star wars"
by members of the news media, ABM research had been underway. "As early as the
1950s, Pentagon planners first suggested fielding anti-missile missiles."
SHUKMAN, supra note 39, at 55.
n465 P. Mann, Historic Turn Eyed in Missile Defense, 151:1 AV. WK. & SPACE
TECH, July 5, 1999, at 30. Specific improvements noted include radar capability
and data processing, optical systems, lasers and sensors, and miniaturization of
crucial missile defense components such as rocket thrusters. Id.
n466 H. DeSaussure, The Freedoms of Outer Space and Their Maritime
Antecedents, in SPACE LAW: DEVELOPMENT AND SCOPE 1 (N. Jasentuliyana, ed.,
n467 United Nations Convention on the Law of the Sea, Dec. 10, 1982, 1833
U.N.T.S. 3 (entered into force Nov. 16, 1994; U.S. has signed but not ratified)
[hereinafter LOS Convention].
n468 Article 87 states that "the high seas are open to all States, whether
coastal or land-locked. Freedom of the high seas is exercised under the
conditions laid down by this Convention and by other rules of international law.
It comprises, inter alia, . . . (a) freedom of navigation; (b) freedom of
overflight." Id. at art. 87. Indeed the principal Outer Space Treaty negotiator
for the U.S. stated that the analogy of the high seas was a guiding theme during
the drafting of Article 1 of the Outer Space Treaty establishing the freedom of
outer space. CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER SPACE, supra note 338,
at 41. From this, Christol concludes that the negotiators of the Outer Space
Treaty were "aware of the res communis concepts applying to the ocean and were
employing this analogy as they contemplated the legal rules to be applied in the
exploration and use, including exploitation, of the space environment." Id. at
n469 That is, territory belonging to none. Regarding the principle of terra
nullius and the example of Antarctica, see MALANCZUK, INTRODUCTION TO
INTERNATIONAL LAW, supra note 130, at 149.
n471 The Antarctic Treaty, Dec. 1, 1959, 402 U.N.T.S. 71 (entered into force
June 23, 1961) [hereinafter Antarctic Treaty].
n472 Though the Treaty does permit the presence of military personnel,
Article 1 ensures that the activity of such personnel will not be "of a military
nature." Id. at art. 1.
n473 Although the Antarctic Treaty "has often been invoked as the most
authoritative aid for the interpretation of the term 'peaceful' found in various
outer space official texts," the phrase cannot be divorced from the immediate
context in which it is subsequently used. Vlasic, Peaceful and Non-Peaceful Uses
of Outer Space, supra note 334, at 41. As noted previously, understanding of the
term evolved from its early use in 1957 as applied to space activity through its
final expression in the Outer Space Treaty. See supra, notes 334-343 and
though it is sometimes offered as a model for space, Antarctica has never
offered military advantages that exceed the costs it imposes. . . . The
arguments for many military uses of space, however, are cast in just such
cost-effectiveness terms, making Antarctica, in that sense, not the analog but
the inverse of space.
W. Durch, Introduction to Durch & Wilkening, supra note 13, at 7.
n475 By explicitly prohibiting the orbiting of nuclear weapons and other
weapons of mass destruction in Article 4, the Outer Space Treaty implies that
States remain free to orbit non-nuclear weapons that are not weapons of mass
n476 Antarctic Treaty, supra note 471, at art. 1. The military inefficiency
of Antarctica likely accounts for the wide adherence to this provision of the
n477 Interestingly, the LOS Convention claims at Article 88 that the "high
seas shall be reserved for peaceful purposes." LOS Convention, supra note 467,
at art. 88. As Professor Vlasic notes however, this
most certainly does not mean 'non-military,' given the well-known fact that the
high seas are navigated by naval vessels of many nations and used for tests of
nuclear missiles as well as for naval maneuvers. Hence, it is difficult to find
the rationale for the inclusion of the reference to 'peaceful purposes' under
the heading 'high seas.'
Vlasic, Peaceful and Non-Peaceful Uses of Outer Space, supra note 334, at 41. If
the term "peaceful" as used in the LOS Convention were given the meaning
ascribed to the similar term in the Outer Space Treaty by the majority of
States, that is non-aggressive, the comparison of outer space with the high seas
for purpose of military use becomes all the more apt. While the high seas have
been the location of military activity for centuries, outer space is becoming
increasingly so. That both environments must be used for non-aggressive
(peaceful) purposes does not impugn the current military uses, so long as they
remain compliant with the jus ad bellum.
n478 U.N. CHARTER, supra note 262, at art. 10.
n479 STAT. OF THE ICJ, supra note 261, at art. 38.
n480 A standard text on international law includes helpful commentary on
General Assembly resolutions are not as such legally binding upon member or
non-member States in the manner of legislation enacted by national parliaments.
In terms of the sources listed in Article 38(1) [of the Statute of the
International Court of Justice], although some writers have argued that General
Assembly resolutions might be seen as informal treaties or as indicating general
principles of law, the most common view . . . is that they contribute in some
way to the formation of custom. It is generally agreed by writers that General
Assembly resolutions may serve as a convenient statement of a custom already
established by state practice of the accepted kind (diplomatic notes, etc.), or
may at once or gradually cause States to march in step in their practice so as
to create one . . . General Assembly resolutions may also contribute to custom
more directly as a form of 'collective' State practice. They are the collective
equivalent of unilateral general statements or, in the context of a particular
dispute, '150 diplomatic protests.'
Harris, supra note 173, at 61. Following the adoption of Resolution 1721, the
U.S. delegate stated that "when a General Assembly resolution proclaimed
principles of international law - as resolution 1721 (XVI) had done - and was
adopted unanimously, it represented the law as generally accepted in the
international community." Cheng, 'Instant' Customary Law, supra note 301, at 35.
Key to this broad assertion is the word "represented." That is, the Resolution
did not become customary law, it simply served as the vehicle by which the
international community expressed unanimous agreement that the resolution's
substance was reflective of the law. The U.S. delegate's statement is broad in
that it purported to give the U.N. principles the status of customary
international law before any custom had developed. For the criticism of this
assumption, see supra notes 301-303 and accompanying text. The assumption aside
however, the statement recognizes that formally speaking, the U.N. Resolution
does not bind any State, whether expressing legal principles and adopted
unanimously or not. As a 1975 U.S. Department of State pronouncement asserted:
as a broad statement of U.S. policy in this regard, I think it is fair to state
that General Assembly resolutions are regarded as recommendations to Member
States of the United Nations. To the extent, which is exceptional, that such
resolutions are meant to be declaratory of international law, are adopted with
the support of all members, and are observed by the practice of states, such
resolutions are evidence of customary international law on a particular subject
Harris, supra note 173, at 62 (emphasis added). For further discussion of the
legal significance of U.N.G.A. resolutions, see infra note 485.
n481 This is likely a result of the increasingly fractious nature of
international negotiation over space issues since the 1979 Moon Agreement. The
international governing organization called for by the Moon Agreement enshrined
the interests of developing States not seen before in treaty law. To many of the
more developed States, this progress came at the expense of their own economic
and security interests. Thus, the absence of any new space treaties since 1979
is likely the result of failures in negotiation, as well as a genuine reticence
by the more developed States against undertaking treaty obligations with which
the State has little intention of complying or even incentive for entering.
n482 Declaration of Legal Principles Governing the Activities of States in
the Exploration and Use of Outer Space, Dec. 13, 1963, G.A. Res. 1962 (XVIII),
U.N. GAOR, 18th Sess., Supp. No. 15, at 15, U.N. Doc. A/5515 (1964). It should
be noted that though several of the U.N. Resolutions addressing outer space
issues use the term "principles" in the title, these are not used in the same
sense as the term appears in Article 38 of the Statute of the International
Court of Justice. As articulated by the U.N.G.A., "principles" related to the
use of outer space, remote sensing, or nuclear power sources in space are worthy
precepts toward which States should aim in their use of outer space, but they
are not "general principles of law recognized by civilized nations." STAT. OF
THE ICJ, supra note 261, at art. 38 P1.c.
n483 In lockstep fashion, the Outer Space Treaty adopted the Resolution's
nine provisions practically word for word. Thus, Principle 1 became Article I,
sentence 1 of the Outer Space Treaty. Principle 2 calling for the free
exploration and use of space in accord with international law became Article I,
sentence 2. Principle 3 became Article II. Principle 4 on the applicability of
international law to outer space became Article III. Principle 5, setting
forth the novel requirement that States bear international responsibility for
national activities in space became Article VI. Principle 6 became Article IX.
Principle 7 became Article VIII. Principle 8 became Article VII. Principle 9
became Article V.
n484 Jasentuliyana, Developing Countries, supra note 319, at 97.
n485 Though the Soviet Union wanted the substance of the Resolution
incorporated into a legally binding instrument, it did not claim that the
vehicle used, the U.N. resolution, achieved that end. The fact that a General
Assembly Resolution assumes for itself the term "Declaration" does highlight the
importance of the document. It does not however render the resolution "legally
more binding than any other recommendation." Cheng, 'Instant' Customary Law,
supra note 301, at 31. As the United Nations Office of Legal Affairs has noted
in a Memorandum on "Use of the Terms 'Declaration and Recommendation'"
3. In United Nations practice, a 'declaration' is a formal and solemn
instrument, suitable for rare occasions when principles of great and lasting
importance are being enunciated, such as the Declaration on Human Rights. A
recommendation is less formal. 4. Apart from the distinction just indicated,
there is probably no difference between a 'recommendation' or a 'declaration' in
United Nations practice as far as strict legal principle is concerned. . . .
However, in view of the greater solemnity and significance of a 'declaration,'
it may be considered to impart, on behalf of the organ adopting it, a strong
expectation that Members of the international community will abide by it.
Consequently, in so far as the expectation is gradually justified by State
practice, a declaration may be custom become recognized as laying down rules
binding upon States.
Id. Use of the word "may" in the last quoted sentence, means that the
'declaration,' by itself, cannot bind States. Nonetheless, some scholars speak
in terms suggesting that Resolution 1962 is itself law. Thus, Judge Lachs,
former Chairman of COPUOS concluded that "it is difficult to regard the 1963
Declaration as a mere recommendation: it was an instrument which has been
accepted as law." M. LACHS, THE LAW OF OUTER SPACE: AN EXPERIENCE IN
CONTEMPORARY LAW-MAKING 138 (1972).
n486 Principles Relating to Remote Sensing of the Earth from Space, Dec. 3,
1986, GA Res. 41/65 (XLII), U.N. GAOR, 29th Sess., 95th Plen. Mtg., U.N. Doc.
A/Res/41/65 (1987) [hereinafter Remote Sensing Resolution].
n487 Though not specifically geared toward remote sensing, several provisions
of the Outer Space Treaty could apply to remote sensing. These include Article I
(equal use of space by all States), Article III (activities conducted in accord
with international law in the interest of maintaining international peace and
security), Article VI (States bear international responsibility for national
activities), and Article XI (duty to inform U.N. Secretary General of space
activities of member States to the greatest extent feasible).
n488 C.Q. CHRISTOL, SPACE LAW: PAST, PRESENT AND FUTURE 73 (1991)
[hereinafter CHRISTOL, SPACE LAW]. After outlining the five general categories
of compromise leading to agreement, Christol points out that the principle of
"open skies" won the day. Id. at 76. He notes that in the end, even States
initially hesitant to agree on freedom of surveillance from space "consulted
self interest" and developed an expectation that the benefits to be gained by
access to sensed data would outweigh any lost sovereignty to be suffered. Id. at
n489 Although the Resolution made no exception for military activities, this
civil/commercial orientation can be seen from the Resolution's specific
definition of "remote sensing" which aims at "improving natural resources
management, land use and protection of the environment." Remote Sensing
Resolution, supra note 486, at Principle (princ.) I(a). Major civil and
commercial applications for remote sensing data include: water resource
management (surface water inventory, flood control mapping, irrigation demand
estimation, water circulation, lake eutrophication survey, ground water
location); forestry and rangeland management (forest inventory, clearcut
assessment, habitat assessment, fire fuel potential); fish and wildlife
management (habitat inventory, wetlands location, vegetation classification,
snow pack mapping, salt exposure); land resource management (corridor analysis,
facility siting, land cover inventory, flood plain delineation, solid waste
management, lake shore management); environmental management (water quality
assessment, coastal zone management, wetlands mapping, resource inventory,
dredge and fill permits); agriculture (crop inventory, crop yield prediction,
assessment of flood damage, disease monitoring); and geological mapping
(lineament mapping, mineral surveys, powerplant siting, radioactive waste
storage). U.S. Congress, Office of Technology Assessment, Remote Sensing and the
Private Sector, Mar. 1984, at 57. Some of these could easily be converted to
military reconnaissance and surveillance purposes for locating targets, tracking
fleet movements, identifying supply and transport facilities, monitoring air
activities, and warning of enemy preparation or attack.
n490 A number of civil satellite systems produce data that is
commercially-available to both private and public entities: KFA-1000 (Russia, 6
m resolution, 120 km swath); Radarsat (Canada, 8-30 m resolution, 55-550 km
swath); ADEOS (Japan, 8-16 m resolution, 80 km swath); SPOT (France, 10-27 m
resolution, 60-81 km swath); Landsat 6 (U.S., 15-120 m resolution, 185 km
swath); JERS-1 (Japan, 18 m resolution, 100 km swath); CBERS (Brazil, 20 m
resolution, 120 km swath); ERS-1 (European Space Agency, 15-30 m resolution, 80
km swath); RS-1 (India, 36-72 m resolution); MOS-1 (Japan, 50 m resolution). B.
PRESTON, PLOUGHSHARES AND POWER: THE MILITARY USE OF CIVIL SPACE 29 (1994)
[hereinafter PRESTON]. An update to include improvements since 1994 would swell
this list as to the total number of systems, as well as technical capabilities.
Today, imagery at 5 m resolution is widely available.
n491 Preston makes clear the military connection to remote sensing:
From a traditional military view of national security, the obvious reason to
worry about sensing from space is the ability of adversaries to exploit
intelligence from remote-sensing information to achieve military advantage on
the battlefield. A broader perspective on national security would include
economic benefit and foreign policy advantage. For example, the Joint Chiefs of
Staff basic national defense doctrine includes psychological or informational
powers in its list of elements of national strategy. Remote sensing from space
affects all of these: battlefield intelligence, economic strength, and
Id. at 25.
n492 Remote Sensing Resolution, supra note 486, at princ. IV.
n494 Id. at princ. I(b). Primary data are defined as "the raw data that are
acquired by remote sensors borne by a space object and that are transmitted or
delivered to the ground from space by telemetry in the form of electromagnetic
signals, by photographic film, magnetic tape or any other means."
n495 Id. at princ. I(c). "The products resulting from the processing of the
primary data, needed to make such data usable."
n496 Id. at princ. I(d). "The information resulting from the interpretation
of processed data, inputs of data and knowledge from other sources."
n497 Id. at princ. XII.
n498 Arguably it is a victory for Article I of the Outer Space Treaty as well
which requires that the use and exploration of outer space remain "free."
n499 Id. at princ. XIII.
n500 Again, as with all U.N. resolutions, language suggesting that States
"shall" take action or "will" refrain therefrom does not require such action or
bind such States. The mandatory, directive language used in the Remote Sensing
Resolution, as with other U.N. resolutions, is always subject to this
clarification. See, e.g., the following phrases from the principles indicated,
Principle II-"shall be carried out;" Principles III and IV-"shall be conducted;"
Principle V and VIII-"shall promote international co-operation;" Principle
VII-"shall make available technical assistance;" Principle IX-"shall inform the
Secretary-General of the United Nations;" Principle X-"shall promote the
protection of the Earth's natural environment;" Principle XI-"shall promote the
protection of mankind from natural disasters;" Principle XII-"shall have
access;" Principle XIII-"shall . . . enter into consultations;" Principle
XIV-"shall bear international responsibility;" and Principle XV-"disputes . . .
shall be resolved through . . ." To the extent that these provisions draw from
the authority of international law, they simply reiterate a State's preexisting
n501 CHRISTOL, SPACE LAW, supra note 488, at 94. The author goes so far as to
suggest that the Resolution's principles are representative of customary
international law. After considering the fact that, despite the lack of thorough
agreement, there is no overwhelming demand to overturn the principles or even
reduce them to a treaty, Christol concluded in 1988 that
for the moment the debate has been somewhat stilled. Even the best of agreements
can become controversial or even unstuck. Perhaps the best long-term approach is
to retain remote sensing on the agenda of COPUOS so that efforts can be made to
transmit the terms of the Principles into a treaty. In this manner those who
wish to dissent from the Principles can opt out. In considering this approach
they may find that they may have no where to go. As has been abundantly
indicated, they will not find it easy to escape the norms of customary
Id. at 95 (emphasis added).
Other commentators writing more recently have agreed. Thus, "this resolution
has come to represent a codification of customary legal principles that are
binding on nations." J.I. Gabrynowicz, Defining Data Availability for Commercial
Remote Sensing Systems: Under United States Federal Law, XXIII ANNALS AIR &
SPACE L. 93, 95 (1998).
n502 See supra notes 368-370 and accompanying text for a discussion of the
n503 Paragraph 9 of General Assembly resolution 33/16, dated Nov. 10, 1978,
requested that launching States "inform States concerned in the event that a
space object with nuclear power sources on board is malfunctioning with a risk
of re-entry of radio-active materials to earth." This subsequently became
Principle 5 of the NPS Resolution. Further, paragraph 11 of General Assembly
resolution 42/68, dated Dec. 2, 1987, endorsed "the agreements reached in the
Scientific and Technical Sub-Committee [of COPUOS] with respect to the use of
nuclear power sources in outer space." As Terekhov notes, "those agreements were
the recommendations formulated by the technical experts with the view to
ensuring safe use of NPS in outer space, which recommendations had been
subsequently reflected in the NPS [Resolution]." A.D. Terekhov, U.N.G.A.
Resolutions and Outer Space Law, in PROCEEDINGS OF THE FORTIETH COLLOQUIUM ON
THE LAW OF OUTER SPACE 97, 101 (1998) [hereinafter Terekhov].
n504 Principles Relating to the Use of Nuclear Power Sources in Outer Space,
Dec. 14, 1992, U.N. Doc. A/Res/47/68 [hereinafter NPS Resolution].
n505 Because the Outer Space Treaty forbids the orbiting of "objects carrying
nuclear weapons," the Resolution did not address the question of nuclear power
sources in space used for weaponry. Outer Space Treaty, supra note 316, at art.
IV. Although a strict exegesis of Article IV of the Outer Space Treaty reveals
that what is prohibited by this clause is the orbiting of "objects carrying
nuclear weapons" not "nuclear weapons" themselves, the subsequent clause-"or
station such weapons in outer space in any other manner" - appears to foreclose
the possibility of nuclear warheads in space. Id. The obvious exception,
undoubtedly heavy on the minds of Outer Space Treaty drafters during the course
of negotiations, were the case of ICBMs capable of delivering nuclear warheads
to terrestrial targets after transiting outer space for several minutes.
Although such objects would put nuclear weapons or conceivably other weapons of
mass destruction into space, such delivery systems would not constitute a
placement "in orbit" or a "stationing" of such weapons in space, and would not
therefore violate the Outer Space Treaty. For a discussion of the meaning of
placing an object in orbit, see supra note 355. As used in the NPS Resolution,
nuclear reactors in space apply neither to nuclear weapons (except those which
might conceivably use nuclear power for "generation of electric power"), nor to
nuclear power sources used for propulsion. NPS Resolution, supra note 504 (from
the Preamble). Thus, it appears the law would allow the orbiting of nuclear
power sources used for space weaponry. Such is not likely covered by the phrase
"nuclear weapon" as used in the 1967 Outer Space Treaty, which more properly
refers not to the weapon's method of propulsion, but to the nuclear source of
its destructive power.
n506 NPS Resolution, supra note 504 (from the Preamble).
n507 Though the Resolution does not cover nuclear propulsion, and is not
legally binding in any event, there are other reasons it may not find
widespread use as a prescriptive guide for military spacecraft. Collins notes
that even though nuclear space propulsion has many proponents, it "attracts
little official support and few funds, because it is costly compared with
chemical systems, and powerful opponents (rightly or wrongly) fear it is unsafe.
International political pressure to ban such engines is great." COLLINS,
MILITARY SPACE FORCES, supra note 12, at 103.
n508 NPS Resolution, supra note 504, at princ. 3.
n509 "Sufficiently high orbits" are those
in which the orbital lifetime is long enough to allow for a sufficient decay of
the fission products to approximate the activity of the actinides. The
sufficiently high orbit must be such that the risks to existing and future outer
space missions and of collision with other space objects are kept to a minimum.
Id. at princ. 3(2)(b).
n510 Id. at princ. 3(2)(a).
n511 Id. at princ. 3(2)(c).
n512 Id. at princ. 3(2)(e).
n513 Id. at princ. 5(1). In the aftermath of the Cosmos 954 incident, the
former Soviet Union disclaimed a duty to warn Canada of the impending crash,
though it did in general recognize a duty to warn. Supra notes 368-370 and
accompanying text, Because its errant calculations revealed the satellite's
debris would either be incinerated on reentry, or land over the Aleutian
Islands, the Soviet Union did notify the U.S. prior to impact. In one of the
diplomatic exchanges, the Soviets maintained that
calculations made on the basis of [Cosmos 954's] last orbits within the
visibility range of our tracking facilities showed that if, because of the
satellite's emergency condition, individual parts of the satellite were not
fully consumed in the atmosphere and reached the earth's surface, they might
fall into the open sea in the region of the Aleutian Islands. In this
connection, the appropriate information was given to the U.S. government.
REYNOLDS & MERGES, supra note 59, at 181. Because Canada agreed that the Soviets
had a duty to warn, this agreement on the basic norm-that the Soviet Union had a
duty to warn-represents significant State opinio juris on one of the few cases
involving the reentry of a space object carrying radioactive materials. Indeed,
whether customary law or not, the Convention on Early Notification of a Nuclear
Accident requires such notifications as contemplated in Principle 5 of the NPS
Resolution. Convention on Early Notification of a Nuclear Accident, Sept. 26,
1986, 1439 U.N.T.S. 275 (entered into force Oct. 27, 1986; signed but not
ratified by the U.S.). This treaty, adopted soon after failure of the Soviet
Chernobyl nuclear reactor, applies to "any nuclear reactor wherever located."
Id. at art. 1(2) (emphasis added). Thus, even for reactors located in space, the
treaty mandates notification to other States Parties of accidents "from which a
release of radioactive material occurs or is likely to occur and which has
resulted or may result in an international transboundary release that could be
of radiological safety significance for another State." Id. at art. (1)
n514 Terekhov, supra note 503, at 101. Again, these U.N. principles are
recommendations even though the NPS Resolution, as with the previous Remote
Sensing Resolution, makes frequent use of "shall" in its attempt to encourage
State behavior. The distinction between a resolution's use of "shall" and its
use of "should" matters little and does not affect the document's non-binding
character. "The fact that, for example, the [Remote Sensing Resolution]
contain[s] 'shall' and the [Benefits Resolution] uses mostly "should" is not
perceived as an indication that the former makes stronger recommendations than
the latter. In view of the foregoing, it appears that the "shall/should"
controversy has basically lost its relevance at least as far as outer space
declarations are concerned." Id. at 102.
n515 Id. at 101.
n516 See, e.g., Is Cassini Risky? Look to Facts, Not Emotion, 147:13 AV. WK.
& SPACE TECH., Sept. 29, 1997, at 66.
n517 J. Wilson, The International Telecommunication Union and the
Geostationary Satellite Orbit: An Overview, XXIII ANNALS AIR & SPACE L. 249
n518 Supra note 59.
n519 "Members retain their entire freedom with regard to military radio
installations." Constitution and Convention of the International
Telecommunication Union, Dec. 22, 1992, art. 48(1), S. Treaty Doc. No. 104-34
(1996) (as amended through 1994), available at
http://www.itu.int/publications/cchtm/cnv.htm. Because the RRB regulations do
not regulate military activity either in peacetime or war, they cannot be
classified as part of the jus in bello. Nonetheless, because they govern the
civil and commercial use of radio spectrum, they become a critical factor in
establishing a military telecommunications capacity in support of armed
conflict. Beyond this, however, Article 48(2) requires "so far as possible" that
military radio installations
observe statutory provisions relative to giving assistance in case of distress
and to the measures to be taken to prevent harmful interference, and the
provisions of the Administrative Regulations concerning the types of emission
and the frequencies to be used, according to the nature of the service performed
by such installations.
Id. at art. 48(2).
n520 Toward the end of the 1991 Persian Gulf War, the DSCS system was
providing 75 percent of all inter and intratheater multichannel trunking. Leased
commercial satellites provided 20 to 25 percent of all satellite communications
used by U.S. forces. See PRESTON, supra note 490, at 131, 132. For a discussion
of the DSCS system, see supra note 59. The Commander in Chief of USSPACECOM
later testified before the U.S. Congress that, "effective command and control of
U.S. and coalition forces simply would have been impossible without military
satellite communication systems. Over ninety percent of the communications to
and from the area of operations were carried over satellite systems." PRESTON,
supra note 490, at 133.
n521 The effects of losing commercial telecommunications services were
dramatically illustrated for participants of the 1999 U.S. "Army-After-Next
Space and Missile Defense" wargame. When the "Blue" forces lost information
superiority as a result of degraded commercial space services, participants
witnessed a "drastic impact on combat capabilities. . . . Regional commanders
found they had to compete with other paying customers for commercial space
services, such as communications. Ideal time slots and capacities were not
always available." P. Proctor, ed., Wargame Wake-Up Call, 150:14 AV. WK. &
SPACE TECH., Apr. 5, 1999, at 17.
n522 CLAUSEWITZ, supra note 127, at 119.
n523 ICJ Advisory Opinion on Nuclear Weapons, supra note 120, P86. In this
important opinion, the Court cites several of the numerous statements advanced
by States for the conclusion that the law of armed conflict applies to nuclear
weapons whether nuclear weapons were in existence at the time the law developed
or not. Two relevant points arise from this discussion. First, as the Court
quotes from the representative statements of States, the following phrases are
used and are assumed by the court to be synonymous: "international humanitarian
law" (New Zealand), "rules applicable to armed conflict" (Russian Federation),
"jus in bello" (United Kingdom), and "law of armed conflict" (United States).
Second, as the noted quotation above makes clear, the court's conclusion that
humanitarian law applies to nuclear weapons is equally applicable to any "past .
. . present and . . . future" forms of warfare and kinds of weapons. This
statement certainly provides the ICJ's answer to the question of whether the law
of war will apply to space warfare.
n524 While the author is aware of one paper presented at a Princeton
symposium in May 1999 by Professor M. Bourbonniere, with one exception he is
aware of no other authors in print on the specific topic under review. That
exception, dating to 1959, presciently outlined several themes related to the
regulation of space warfare from the relative infancy of military space
development in the 1950s. J.G. Verplaetse, The Law of War and Neutrality in
Outer Space, 29 NORDISK TIDSSKRIFT FOR INT'L RET 49 (1959). Verplaetse pointed
out that "the unknown cannot be regulated, even less juridically organized." Id.
Somewhat surprisingly, 41 years after the appearance of this article, the
regulation of means and methods of space warfare still appears to be largely
unknown. Verplaetse's prediction about the possibility of armed conflict in
space remains as true today as ever: "Human forecast cannot but accept the
likelihood that outer space will soon be part of the theater of war of
terrestrial belligerents." Id. at 51.
n525 In the 1999 production Star Trek Insurrection, one scene has Chief
Engineer Lieutenant Geordi LaForge commenting on a weapon's explosive impact
with his spaceship: "I thought subspace weapons were outlawed by the Khitomer
Accords?" "They were," comes his crewmate's ominous reply thereby identifying a
violation of the 24th Century law of war. Beyond this specific reference, a
review of the following recent cinematic releases shows the general popularity
of space and science-fiction themes at the box office: Apollo 13, Independence
Day, 2001: A Space Odyssey, Armageddon, Deep Impact, Contact, Lost in Space, My
Favorite Martian, Wing Commander, Battlefield Earth, Titan A.E., Galaxy Quest,
the Star Wars remake, and a total of eight Star Trek movies. The increasing
popularity of these movies may account for the lack of scholarly legal analysis
as commentators find it difficult to take seriously what the popular mind
relegates to the category "science fiction."
n526 Just this year, the Air Force established the first annual wargame
devoted entirely to space. The Air Force hopes the game will, entitled "The Air
Force Space Game," will eventually "become a Title-10 game on a par with annual
events such as Navy 'Global,' 'Army After Next' and Air Force 'Global
Engagement." William B. Scott, Innovation Is Currency of USAF Space Battlelab,
152:14 AV. WK. & SPACE TECH., Apr. 3, 2000, at 52.
n527 Indeed, even beyond wargame scenarios, events prompting such questions
have already occurred. One author has reported electronic interference by a
hostile Middle East power against a U.S. military satellite.
In one recent case the interference continued for weeks. When the U.S.
satellite changed to a different channel, the interference also changed
channels, suggesting a deliberate attempt by a Third World country to jam a U.S.
military communications satellite. The potential of radio interference is
especially significant considering that the United States is dependent on
satellites for 75 percent of its long-distance military communications.
Hackett & Ranger, Proliferating Satellites Drive U.S. ASAT Need, SIGNAL, May
1990, at 156. While cases such as this arguably do not rise to the level of an
"armed attack" justifying the use of armed force in self defense under the U.N.
Charter, they do raise questions about the legitimacy of coercive responses
short of armed conflict, and whether non-aggressive military action could or
should be interpreted as a threat or use of force under Article 2(4). See supra
notes 262, 267, and accompanying text. For an insightful analysis of the
analogous problem of computer network attacks under the jus ad bellum, see M.N.
Schmitt, Computer Network Attack and the Use of Force in International Law:
Thoughts on a Normative Framework, 37:3 COL. J. TRANSNAT'L L. 885 (1999)
[hereinafter Schmitt]. Beyond this, the 1997 "Army After Next" wargame "jolted
military and civilian leaders by showing that if U.S. satellites are quickly
destroyed in the early stages of a conflict, ground forces can rapidly grind to
a halt." W.B. Scott, Wargames Revival Breaks New Ground, 149:18 AV. WK. &
SPACE TECH., Nov. 2, 1998, at 56, 58. To be effective, wargames require clear
rules specifying what players can and cannot do. To the extent space wargaming
continues raising questions to which there are no clear answers, such as
application of the law of war and the jus ad bellum, these scenarios have served
a useful purpose in prompting the development of national policy. However, with
respect to law of war principles, the games often reveal a shortcoming beyond
the control of the U.S. military or government: an inability to ensure that the
development of international law will account for anticipated military
capabilities. On the possible role law of war manuals might play in remedying
this shortcoming, see infra note 598 and accompanying text.
n528 SPIRES, supra note 3, at 244-45.
n529 The North Atlantic Treaty Organization (NATO) air strikes against
Yugoslavia in 1999 (Allied Force) were even more heavily supported by space
assets than the 1991 Persian Gulf War. In the Yugoslavian conflict, although the
United States Space Command (USSPACECOM) classified all orbital data on U.S.
military spacecraft during the conflict stating that even the reason for the
classification remained classified (suggesting the critical role space systems
played), several facts were apparent. NATO made heavy use of two National
Reconnaissance Office (NRO) Lacrosse imaging radar satellites for pre-strike
intelligence and post-strike bomb damage assessment with resolutions of one to
three meters. Offering more precise resolutions, NATO used NRO's three KH-11
satellites for more sensitive optical and infrared imagery. It was also thought
that NATO was using as many as three other of NRO's highly secret smaller
imaging spacecraft. For weather data, NATO used ten spacecraft, including four
USAF DMSP spacecraft flying in 500-mile polar orbits and two European Meteosat
spacecraft in geosynchronous orbits. As in Desert Storm, Allied Force made heavy
use of the twenty-four medium-earth orbit satellites comprising the Global
Positioning System (GPS). These were used for precision strikes guiding both
munitions and aircraft. See C. Covault, Military Space Dominates Air Strikes,
150:13 AV. WK. & SPACE TECH., Mar. 29, 1999, at 31. In addition to the Meteosat
assets, several other non-U.S. space systems also contributed to NATO's effort
including France's Helios 1 military imaging satellite, which provided images of
one to five meter resolutions. See P. Sparaco, French Satellite Details Air
Strike Damages, 150:15 AV. WK. & SPACE TECH., Apr. 12, 1999, at 26.
n530 While recognizing the tremendous qualitative difference between the use
of space in support of combat operations, and the weaponization of space itself,
the author believes it virtually assured that within the near future space will
be widely viewed as its own military theater of operations and thereafter
weaponized. Increasing awareness in the U.S. of the need to protect national
space assets continues to drive the debate closer toward weaponization. Though
space weapons will likely be developed with the principal purpose to defend
satellites, some will undoubtedly be fielded to provide for an offensive
counter-attack. In both cases, the strategic and political implications appear
to be the same. As Colin Gray points out, it "is a distinction without a
difference." C.S. GRAY, AMERICAN MILITARY SPACE POLICY: INFORMATION SYSTEMS,
WEAPON SYSTEMS AND ARMS CONTROL 49 (1982) [hereinafter GRAY]. Gray proceeds to
articulate four strategic reasons why the U.S. should weaponize space. Though
written before the breakup of the Soviet Union, and largely directed toward a
Soviet adversary, the continuing Russian threat coupled with the evolution of
new space powers, could make Gray's points equally compelling today: first, both
the U.S. and Soviet Union (now Russia) use space for military purposes that
would be critically important during war; second, passive defensive techniques,
or survival aids short of weaponization, are not certain to succeed; third, the
Soviet Union likely already has deployed ASATs; and fourth, it is unlikely that
U.S. spacecraft can be protected through deterrence given that the Soviets have
too much to gain by attacking them in war. Id. at 49-51.
Overall, these arguments amount to the following policy judgment: U.S.
self-denial of ASAT capability will not contribute to the survival prospects of
U.S. C3I assets in space-indeed, quite the opposite is true. Such self-denial
could, and most probably would, permit the Soviet Union [or other potential
future space adversary] to gather and relay strategic intelligence fatal to the
validity of the U.S. policy of continuing deterrence.
Id. at 51.
n531 Professor Cheng hints that such is the case in his syllogistic argument
for the proposition that the legal regime for outer space is analogous to the
basis status of the high sees. His major premise, "that international law is
inherently applicable to outer space," would certainly include the law of war.
B. Cheng, Astronauts, in 11 ENCYCLOPEDIA OF PUBLIC INTERNATIONAL LAW 40
(Bernhardt, ed., 1982).
n532 These include restrictions on the orbiting of nuclear weapons or other
weapons of mass destruction under Article IV of the Outer Space Treaty, as
well as the detonation of nuclear weapons in outer space under the Limited Test
n533 See supra notes 466-477 and accompanying text.
n534 As implied throughout this article the jus in bello for space
demonstrates an "already/not yet" character. Legal commentators understandably
seem reluctant to speak of an existing and distinct jus in bello spatialis ("not
yet"), though as has been shown in Parts III-V above, numerous specific
customary and conventional norms operate to limit means and methods of space
warfare that States may lawfully employ ("already").
n535 For example, the U.N. Convention on the Law of the Sea distinguishes
between territorial sea (complete State sovereignty and jurisdiction) and high
seas (no State sovereignty or jurisdiction, except jurisdiction over its
registered vessels). LOS Convention, supra note 467, at art. 2(1), 87(1).
Similarly, in the space above the earth, States recognize the distinction
between national airspace (complete State sovereignty and jurisdiction) and
outer space (no State sovereignty or jurisdiction, except jurisdiction over its
registered objects). Compare Convention on International Civil Aviation, Dec. 7,
1944, art. 1, 61 Stat. 1180, 15 U.N.T.S. 295, with Outer Space Treaty, supra
note 316, at art. II.
n536 "As a general rule, neutral territory is treated as sacred space; it is
inviolable." J. Astley & M.N. Schmitt, The Law of the Sea and Naval Operations,
42 A.F. L. REV. 119, 140 (1997). The law of neutrality is a part of the law of
war but not of the jus in bello and is largely consistent with the law of the
sea. Thus, the maritime rights and duties of States in peacetime continue to
exist for the most part during armed conflict. See id. at 138.
n537 At the risk of descending into logical abstraction, a further
clarification is necessary. With reference to the macro/micro categories
established above, the form of argumentation here amounts to a
meta-macro-analogy. That is, not only are we in this case comparing one combat
environment to another to conceive a suitable legal framework for war, we are
examining the development of that comparison as it has been used to establish
the newer framework for aerial combat. Thus, the suggestion made here as to the
evolution of norms limiting aerial warfare depends not only on the comparison of
entire legal systems (macro-analogy between aerial combat and land/sea combat)
within international law, but on an analysis of the larger (meta) process by
which the comparison led to the newer legal regime in the first place.
n538 The possible exception being the proscription on discharging projectiles
from balloons. See Declaration (XIV) Prohibiting the Discharge of Projectiles
and Explosives from Balloons, Oct. 18, 1907, 36 Stat. 2439.
n539 COLLINS, MILITARY SPACE FORCES, supra note 12, at 1 n.2.
n540 Id. at 2.
n541 Outer Space Treaty, supra note 316, at art. III. In addition, the Outer
Space Treaty references international law as well at Article I. "Outer space,
including the moon and other celestial bodies, shall be free for exploration and
use by all States without discrimination of any kind, on a basis of equality and
in accordance with international law." Id.
n542 U.N. CHARTER, supra note 262, at art. 1(1). The phrase appeared
previously in the Covenant of the League of Nations. Covenant of the League of
Nations, June 28, 1919, 225 Consol. T.S. 188.
n543 That is, it requires the "activity which is necessary for maintaining
the conditions of peace." R. Wolfrum, Article 1, in THE CHARTER OF THE UNITED
NATIONS: A COMMENTARY 50 (B. Simma, et al., eds., 1994).
n544 Hague Convention (IV), supra note 190 (from the Preamble).
n546 The distinction between customary law and other general principles of
law was later announced as comprising two separate sources of international law.
See STAT. OF THE ICJ, supra note 261, at art. 38.
n547 Geneva Convention I, supra note 212, at art. 63 P4; Geneva Convention
II, supra note 216, at art. 62 P4; Geneva Convention III, supra note 204, at
art. 142 P4; Geneva Convention IV, supra note 214, at art. 158 P4.
n548 Protocol I, supra note 156, at art. 1(2).
n549 Conventional Weapons Treaty, supra note 247 (from the Preamble).
n550 This possibility is strengthened by the claim of the International
Military Tribunal at Nuremburg in 1946 that convention IV is declaratory of
customary international law. Roberts & Guelff, supra note 131, at 44.
n551 H. Strebel, Martens' Clause, in 3 ENCYCLOPEDIA OF PUBLIC INTERNATIONAL
LAW 252 (Bernhardt, ed., 1982).
n552 Protocol I, supra note 156, at art. 1(2).
n553 Vlasic, Negotiating and Drafting Agreements Relating to Outer Space,
supra note 321, at 209.
n554 See definitions of "militarization" and "weaponization," supra note 11.
n555 As suggested above, the common view today regards peaceful purposes as
synonymous with non-aggressive. Such operations would include not only peacetime
military activity, but also activity involving the use of force during armed
conflict. What makes an activity aggressive and thus non-peaceful is not the use
or absence of armed force, but the larger purpose to which it is put. An
aggressive act unlawfully initiated by one belligerent, may trigger a lawful,
though overwhelming armed response from another in individual or collective
self-defense. The latter response is not rendered aggressive even though it may
involve a ferocious degree of force, or even what constitutes an act of war. In
this way, even an act of war may have a larger peaceful purpose. To the extent a
use of force is taken in self-defensive, or pursuant to a U.N. Security Council
authorization, and is proportional to the initial aggressive act (that is, to
the initial violation of the jus ad bellum), it complies with international law
and may occur in space just as elsewhere. For a discussion of the requirement
that the jus in bello principle of proportionality applies to acts of
self-defense, see Military and Paramilitary Activities (Nicar. v. U.S.), 1986
I.C.J. 4, 103 ("The Parties also agree in holding that whether the response to
the attack is lawful depends on observance of the criteria of the necessity and
the proportionality of the measures taken in self-defense.").
n556 Perhaps the most difficult of all space law issues relates to the
delimitation, or boundary, separating a State's territorial airspace and outer
There is no clear answer to the question of where space begins. But equally
clearly, at some point above the earth, there exists an environment completely
different from the one we have here. A sort of customary law has developed . . .
to the effect than any object in orbit is in space, and that seems enough to
satisfy everyone for the time being.
REYNOLDS & MERGES, supra note 59, at 12. For an excellent, recent legal analysis
of the air and space boundary question, see Elizabeth Kelly, The Spaceplane: The
Catalyst for Resolution of the Boundary and 'Space Object' Issues in the Law of
Outer Space? (1998) (unpublished LL.M. thesis, McGill University) (on file with
author, and the Nahum Gelber Law Library, McGill University).
n557 Liability Convention, supra note 365, at art. 1(d).
n558 See DeBlois, supra note 3; ZIEGLER, supra note 3. Joseph Justin points
out that the "space sanctuary" school "is fundamentally opposed to any military
weapons in space." Justin, supra note 3, at 104. Justin goes on to claim that
the space sanctuary perspective "believes space should not be used as a military
instrument of policy" and that the military role in space is to work for
demilitarization. Id. Although this may represent the classic sanctuary
position, DeBlois and Ziegler do not advocate space as a sanctuary free from any
military presence, just free from weapons.
n559 David A. Fulghum, USAF Chief Signals Key Funding Priorities, 153:1 AV.
WK. & SPACE TECH., July 3, 2000, at 56. Expanding the point, General Michael
Ryan asserted that while the weaponization of space is still decades off, "there
is some inevitability that it will occur if just to protect extensive
communications and navigation systems already there. . . . I think there will be
attacks-challenges to our space capability. We will have to protect our assets
in space because we're becoming much more dependent on them. So I see defense as
a primary emphasis." Id.
n560 See supra, note 353 for further discussion of the definition of "nuclear
weapons" as applied to X-ray lasers.
n561 S. Gorove, Space Without Weapons: International Legal Aspects of Weapons
and Harms, in SPACE WITHOUT WEAPONS 29 (N.M. Matte, ed., 1989) [hereinafter
Gorove, Space Without Weapons].
n562 Paul B. Stares, The Problem of Non-Dedicated Space Weapon Systems, in
PEACEFUL AND NON-PEACEFUL USES OF SPACE: PROBLEMS OF DEFINITION FOR THE
PREVENTION OF AN ARMS RACE (B. Jasani, ed., 1991) 147 [hereinafter Stares,
Non-Dedicated Space Weapon Systems].
n563 B. Jasani, Introduction to PEACEFUL AND NON-PEACEFUL USES OF SPACE:
PROBLEMS OF DEFINITION FOR THE PREVENTION OF AN ARMS RACE 13 (B. Jasani, ed.,
n564 Stares, Non-Dedicated Space Weapon Systems, supra note 562, at 147.
Stares goes on to suggest 5 criteria that assist in determining the military
capability of non-dedicated systems:
1. Operational readiness. How soon could the non-dedicated system be readied for
use as a space weapon? What does it entail to make it ready? Are trained
personnel available to convert it and use it for this purpose? Are the necessary
support systems, such as target detection and tracking sensors also available?
2. Target coverage. What targets does the non-dedicated system realistically
threaten? How many such attacks can it carry out? 3. Speed of attack. How
quickly can single or multiple attacks using non-dedicated systems be carried
out? Is there any warning associated with their use that might allow defensive
countermeasures to be implemented? 4. Operational confidence. What is the
probability that single and multiple attacks using non-dedicated systems will
succeed in their intended mission? 5. Operational costs. What, if any, are the
military or political costs associated with the use of non-dedicated systems as
Id. at 151. With reference to ASATs, non-dedicated systems are also termed
"residual" ASATs. See STARES, SPACE AND NATIONAL SECURITY, supra note 70, at 3.
n565 Professor Gorove, referring to nuclear and other weapons of mass
destruction, maintains that "unless specifically covered, subcomponents which in
themselves do not qualify as a weapon, should not be taken to be included in a
ban relating to the weapon." Gorove, Space Without Weapons, supra note 561, at
n566 For a discussion of this general international legal principle, see
supra note 141.
n567 Indeed, the Soviet Union went so far as to present a "Draft Treaty on
the Prohibition of the Stationing of Weapons of Any Kind in Outer Space" to the
36th Session of the U.N. General Assembly on Aug. 20, 1981. In pertinent part,
the draft treaty would have required
States Parties . . . not to place in orbit around the earth objects carrying
weapons of any kind, install such weapons on celestial bodies, or station such
weapons in outer space in any other manner, including on reusable manned space
vehicles of an existing type or of other types which States Parties may develop
in the future.
(Article 1(1)). It would have equally required States Parties "not to destroy,
damage, disturb the normal functioning or change the flight trajectory of
space objects of other States Parties, if such objects were placed in orbit in
strict accordance with Article 1, paragraph 1, of this treaty." (Article 3).
GRAY, supra note 530, at 115.
While the treaty would not have prohibited land-based ASATs, it would have
significantly expanded the scope of the partial deweaponization provision of
Article IV, Outer Space Treaty. Outer Space Treaty, supra note 316, at art. IV.
The U.S. dismissed the Soviet draft treaty as a "hypocritical propaganda ploy."
STARES, THE MILITARIZATION OF SPACE, supra note 40, at 230. Following
announcement that the U.S.S.R. would unilaterally refrain from deploying ASATs
"for the entire period during which other countries, including the U.S.A., will
refrain from stationing in outer space antisatellite weapons of any type," the
Soviets presented a second draft treaty that would have prohibited the testing
and deployment of "any space based weapons intended to hit targets on the Earth,
in the atmosphere, or in space." Id. at 231. Over great scientific and
congressional pressure, the Reagan administration rejected this proposal as well
citing the extreme difficulty, if not "impossibility," in verifying an ASAT
treaty. Id. at 233.
n568 After a discussion of the relevant provisions of the Outer Space Treaty
and the Moon Agreement, Professor Christol observed in 1988 that
in the years since 1967 [Outer Space Treaty] and 1979 [Moon Agreement] science
and technology have perfected new generations and families of weapons, including
those employing highly focused energy, such as laser weapons, and those based on
sub-atomic particles, such as particle beam weapons. Pursuant to the general
legal principle that which is not prohibited is permitted, it may be concluded
that the more recent exotic weapons do not fall within the constraints of the
foregoing treaty provisions.
C.Q. Christol, Outer Space: Battle-Ground of the Future?, in SPACE LAW: PAST
PRESENT AND FUTURE 59 (C.Q. Christol, ed., 1991). The Russians have objected to
the orbiting of particle beam weaponry claiming that it constitutes a "weapon of
mass destruction." TAYLOR, supra note 97, at 34. However, given its likely
capacity for great precision, the weapon need not generate "mass" destruction,
though it may be lethal for its intended target. Some authors suggest,
inexplicably, that just about all space weapons constitute weapons of mass
destruction. See, e.g., M.N. Andem, Implementation of Article IV of the Outer
Space Treaty of 1967 During the 21st Century, in PROCEEDINGS OF THE FORTIETH
COLLOQUIUM ON THE LAW OF OUTER SPACE 338, 344 (1998).
n569 M.M. Matte, A Treaty for 'Star Peace,' in 2 ARMS CONTROL AND DISARMAMENT
IN OUTER SPACE 190 (N.M. Matte, ed., 1987).
n570 U.N. CHARTER, supra note 262, at art. 2(4).
n571 Vlasic, Negotiating and Drafting Agreements Relating to Outer Space,
supra note 321, at 211.
n572 The more restrictive view of Article 2(4) is admittedly difficult to
square with the U.N. Charter's plain language and the historic reticence in the
U.N.G.A. against foreign interventions. Nonetheless, "examination of the
language and the negotiating background of Article 2(4) provides no unequivocal
indication of its intended meaning." Vlasic, Negotiating and Drafting Agreements
Relating to Outer Space, supra note 321, at 211.
n573 HURWITZ, supra note 289, at 148-50.
n574 Liability Convention, supra note 365, at art. II.
n575 Id. at art. III.
n576 Id. at art. VI.
n577 In fact, the exoneration from liability shows the very opposite. The
Convention purports to punish States engaging in intentional destructive acts by
eliminating their remedy against the launching State. As Article VI(2)
establishes however, if the damage is caused by activities of the launching
State that are inconsistent with the international law, including the U.N.
Charter and the Outer Space Treaty, there will be no exoneration from absolute
liability "whatever." Id. at art. VI(2). This would mean that an aggressive
military operation by launching State A that causes damage on the earth or in
the air to claimant State B, will result in no exoneration of absolute liability
for State A, even if State B contributed to the damage by acts done with an
intent to cause damage.
n578 After observing that the U.S. ratified the Liability Convention only
"after being advised by the Department of State that the Convention did not
apply to international damage," Hurwitz concludes from this that "the U.S. has
recognized the right to intentionally damage another State's space objects with
impunity (as least as far as the 1972 Convention is concerned)." HURWITZ, supra
note 289, at 149. Whether this overstates the U.S. position or not, it does seem
clear that the Convention exonerates one State from liability only as against
intentional damage caused by the claimant State or the natural or juridical
persons it represents. Liability Convention, supra note 365, at art. VI(1).
Thus, the U.S. Department of State was certainly correct that the Convention
does not "apply" (that is, create liability), as against one State in cases
where the claimant State has at least "partially" caused intentional damage.
n579 Outer Space Treaty, supra note 316, at art. VIII.
n580 U.N. Charter, supra note 262, at art. 51. Given the fact that Article 51
presupposes a previous customary right to self defense ("inherent right"), the
right to respond by State Y may not even require the occurrence of an armed
attack, depending on the nature of the customary right. For further discussion
of article 51, see supra note 173. State Y's act of self defense must also be
proportionate to State X's provocation.
n581 For example, in arguing for an approach to space power that rests in
part on the assertion that "America's future security and prosperity depend on
our constant supremacy in space," United States Senator Smith advocated a shift
of "substantial" national military resources into space. Sen. Bob Smith, The
Challenge of Space Power, 13:1 AIRPOWER J. 32, 33 (1999) [hereinafter Smith]. He
opined that "if we do, we will buy generations of security that all the ships,
tanks, and airplanes in the world will not provide. This would be a real
'peace-dividend' -- it would actually help keep the peace." Id. Subsequently, he
specified that the use of space to secure information superiority does not
constitute space warfare stating that "if we limit our approach to space just to
information superiority, we will not have fully utilized space power." Id. at
34. Calling for a "space-power culture" within the U.S. military, Senator Smith
warned against allowing a "blanket of political correctness and bureaucratic
inertia" from smothering revolutionary ideas. Id. at 35, 36.
n582 Commentators, politicians, academics, and military members have been
calling for such a move for years. For example, in 1970 Robert Salkeld
provocatively claimed that space warfare was a virtual inevitability. "The
concept which naturally suggests itself is the eventual creation and growth of a
fourth major service, a United States Space Force, which might function at
budgetary parity with the Army, Navy and Air Force." R. SALKELD, WAR AND SPACE
189 (1970). Later, another commentator observed that roles and missions debates
for space between the existing services would reach a fevered pitch leading to
an inevitable evolution toward a separate space service.
Military space operations, much like U.S. tactical air combat power, probably
will remain a specialty within several military services that squabble over
respective budgets/prerogatives, until important space missions involve more
than support for armed forces on Earth and powerful spokesmen present
decisionmakers a persuasive case. A Solomon-style decision eventually will be
unavoidable: senior officials must determine whether to deliver the military
space 'baby' intact or divide it. . . . A separate armed service with
centralized control over all military space activities, for example, might avoid
most doctrinal disputes.
COLLINS, MILITARY SPACE FORCES, supra note 12, at 82, 83. In 1999, Senator Smith
suggested the propriety of such a move: "The notion that the Air Force should
have primary responsibility for space is not sacred. . . . If the Air Force
cannot or will not embrace space power . . . we in Congress will have to
establish an entirely new service." Smith, supra note 581, at 37-38.
n583 NEWBERRY, supra note 3, at 6. Major Newberry's point could be applied
equally to the U.S. Army and Navy, and likely to the national security
establishments of all other spacefaring States as well.
n584 National Science and Technology Council, National Space Policy P3 (Sept.
19, 1996) http://ast.faa.gov/licensing/regulations/nsp-pdd8.htm (on file with
the Air Force Law Review) [hereinafter National Space Policy].
n586 A National Security Strategy for a New Century (The White House, Office
of the President 1998) at 25.
n587 National Space Policy, supra note 584, at "National Security Space
n588 Department of Defense Directive 5100.77, DOD Law of War Program P4.1
(Dec. 9, 1998)
n589 Id. P5.3.1.
n590 W.B. Scott, 'Milspace' Maturing Into Warfighter Roles, 147:9 AV. WK. &
SPACE TECH., Sept. 1, 1997, at 46.
n591 W.B. Scott, U.S. Adopts 'Tactical' Space Control Policy, 150:13 AV. WK.
& SPACE TECH., Mar. 29, 1999, at 35.
n592 United States Space Command, Long Range Plan: Implementing USSPACECOM
Vision for 2020 (March 1998) 21 [hereinafter Long Range Plan]. Following release
of the Long Range Plan, DOD issued a space policy which expanded upon themes
raised by USSPACECOM. For example, the DOD policy states: "Purposeful
interference with U.S. space systems will be viewed as an infringement on our
sovereign rights. The U.S. may take all appropriate self-defense measures,
including, if directed by the National Command Authorities (NCA), the use of
force, to respond to such an infringement on U.S. rights." Department of Defense
Directive 3100.10, Space Policy P4.2.1 (July 9, 1999) [hereinafter DODD
n593 Long Rang Plan, supra note 592, at 11. The DOD definition of "space
control" mirrors the USSPACECOM definition: "Combat and combat support
operations to ensure freedom of action in space for the United States and its
allies and, when directed, deny an adversary freedom of action in space. . . ."
DODD 3100.10, supra note 592 PE2.1.3.
n595 W.B. Scott, Space Ops Threatened By Launch Failures, 150:20 Av. Wk. &
Space Tech., May 17, 1999, at 25, 26.
n596 Id. at 26.
n597 AFP 110-31, supra note 146.
n598 W.M. Reisman & W.K. Leitzau, Moving International Law from Theory to
Practice: the Role of Military Manuals in Effectuating the Law of Armed
Conflict, in 64 INTERNATIONAL LAW STUDIES, THE LAW OF NAVAL OPERATIONS 8 (H.B.
Robertson, ed., 1991).
n599 STAT. OF THE ICJ, supra note 261, at art. 38(1)c.
n600 General Fogleman, former Air Force Chief of Staff, asserted that
"dominating the information spectrum is as critical to conflict now as occupying
the land or controlling the air has been in the past." Air Force Doctrine
Document 2-5, Information Operations, 1 (Aug. 5, 1998) [hereinafter AFDD 2-5].
n601 Such potential threats have not escaped notice by the Department of
Defense. For example, fears about potential unauthorized access have prompted
serious debate over whether the military should withdraw from the Internet
altogether. DOD May Unplug from Internet Due to Security Worries at Century's
End, INSIDE THE ARMY, June 21, 1999, at 1.
n602 AIR FORCE 2025, supra note 7, at 4. The study went on to assert that
"the key to achieving and maintaining lasting superiority that cannot easily be
duplicated by others lies in the integration of information, air, and space."
Id. at 9.
n603 Department of Defense Directive S-3600.1, Information Operations (Dec.
9, 1996) [hereinafter DODD S-3600.1]. The Air Force broadens this definition for
its forces, including space forces, as follows: "Those actions taken to gain,
exploit, defend or attack information and information systems and include both
information-in-warfare and information warfare." AFDD 2-5, supra note 600, at
41. Information-in-warfare is defined as "the Air Force's extensive capabilities
to provide global awareness throughout the range of military operations based on
integrated intelligence, surveillance and reconnaissance (ISR) assets; its
information collection/dissemination activities; and its global navigation and
positioning, weather, and communications capabilities." Id.
n604 DODD S-3600.1, supra note 603. As with "information operations," the Air
Force expands this definition as it recognizes the continuing engagement of
defensive information warfare systems even absent crises or armed conflict:
"Information operations conducted to defend one's own information and
information systems, or to attack and affect an adversary's information and
information systems." AFDD 2-5, supra note 600, at 42. Thus, on either
definition, information warfare is a specialized kind of information operations.
Unlike previous definitions, it includes more than just attack of command and
control systems. Id. at vii.
n605 Of course, information warfare and the multi-faceted operations it
entails is not limited to the space environment. However, with the increasing
reliance on space for telecommunications applications, the means of
transmitting, intercepting, and corrupting information will entail use of
n606 For a discussion of the customary principle of military necessity, see
supra notes 145-149 and accompanying text.
n607 For a discussion of the customary principle of proportionality, see
supra notes 150-160 and accompanying text.
n608 For a discussion of the customary principle of discrimination, see supra
notes 161-165 and accompanying text.
n609 For a discussion of the customary principle of humanity, see supra notes
166-177 and accompanying text.
n610 For a discussion of the Hague system, see supra Part III, @ C.1. For a
discussion of the Geneva system, see supra Part III, @ C.2.
n611 Department of Defense, Annual Report to the President and the Congress,
1998, Chapter 7, p.1. The most recent Annual Report continues this theme,
"military operations rely heavily upon information lines of communication to,
in, through, and from space." Department of Defense, Annual Report to the
President and the Congress, 2000, Chapter 8, p.2. The observation from the 1998
Annual Report that space operations provide access to foreign countries "without
violating their sovereignty," requires some clarification as it might apply to
space warfare. It is certainly true that space surveillance and reconnaissance
activities, even if conducted by foreign militaries, do not violate a
sensed-State's sovereignty. This includes all manner of remote sensing and
electronic interception. Yet as space operations evolve into instruments of
combat, actual destruction of an adversary's space assets is likely to be
accompanied by claims that its sovereignty has been violated. The implications
under the jus ad bellum are obvious and the question will increasingly merit
attention, particularly because a State's sovereignty is generally tied to its
territory. The Outer Space Treaty outlaws national appropriation by claim of
sovereignty of outer space, including the moon and other celestial bodies. Outer
Space Treaty, supra note 316, at art. II. By itself, this does not mean that
States will not have sovereign rights in space. Article II was tested in 1976
when eight equatorial States attempted to claim sovereignty in portions of the
geosynchronous orbit by means of the dubious "Bogota Declaration." Predictably,
such claims were roundly rejected by the international community which, on the
authority of the Outer Space Treaty and common sense, refused to recognize
sovereign rights in portions of outer space itself. The claims of these States
(Colombia, Brazil, Ecuador, Congo, Kenya, Uganda, Zaire, Indonesia), four of
whom had previously ratified the Outer Space Treaty, "has met with technically
constructive as well as legally well-reasoned refutations by a majority of
member states of the U.N. in those international fora where it has been
reiterated." M.N. ANDEM, INTERNATIONAL LEGAL PROBLEMS IN THE PEACEFUL
EXPLORATION AND USE OF OUTER SPACE 160 (1992).
Beyond assertions of sovereignty over natural resources from space, or
portions of space itself, lies the question of whether the Outer Space Treaty
allows for sovereignty in a space asset itself beyond an assertion of
sovereignty as a property right. The Outer Space Treaty provides that States
retain jurisdiction and control as well as "ownership" over the space objects on
its registry. Outer Space Treaty, supra note 316, at art. VIII. The ISS
Agreement uses similar language ("ownership," "jurisdiction and control")
without vesting national sovereignty in the asset. ISS Agreement, supra note
342, at art. 5, 6. However, because Article II of the Outer Space Treaty focuses
on national appropriation, only secondarily mentioning sovereignty as one of
several means of effectuating an illegal claim of national appropriation, it
appears that a limitation on State sovereignty over its space assets, if any,
will not come by operation of Article II.
Certainly States have already appropriated objects that they own and control.
In effect, States already maintain a national appropriation over their assets in
space. A possible source limiting a State's sovereignty rights in its space
assets comes from Article XII of the Outer Space Treaty which requires that all
"stations, installations, equipment and space vehicles on the moon and other
celestial bodies shall be open to representatives of other States Parties to the
Treaty on a basis of reciprocity." Outer Space Treaty, supra note 316, at art.
XII. Typically, spaces over which a State exercises its sovereignty may be
closed to foreign entrance. However, although with this provision States Parties
give up a measure of exclusive occupation and privacy in their space objects on
the moon and other celestial bodies, such does not necessarily imply a loss of
sovereignty. As a practical matter, the question of State sovereignty in its
space objects is relatively unimportant for civil and commercial activities
given the "jurisdiction and control" and "ownership" provisions of Article VIII,
Outer Space Treaty. However, the question may become acute as the prospect of
military confrontation in space increases and States engage in hostilities that
may constitute an act of war. For an interesting recent discussion of State
jurisdiction in outer space, see W.P. Heere, Problems of Jurisdiction in Air and
Outer Space XXIV:2 AIR & SPACE L. 70 (April 1999).
n612 See, e.g., R.G. Hanseman, The Realities and Legalities of Information
Warfare 45 A.F. L. REV. 173 (1997); S.P. Kanuck, Information Warfare: New
Challenges for Public International Law (1996) 37 Harv. INT'L L. J. 272; and
Schmitt, supra note 527.
n613 As the practice of space warfare is currently evolving, for the near
future it will likely entail principally the targeting and destruction of
unmanned assets both within airspace and outer space.
n614 Phrasing the issues in this way is intended to illustrate that the
problem of "dual use" assets can be understood in two different ways. The use of
the asset can be "dual," as for example a remote sensing satellite used both for
agricultural research as well as for evidence of war crimes. In this regard the
NATO use of satellite imagery to establish the creation of mass graves could
have come from civilian, commercially available remote sensing systems. Further
the ownership of the satellite can be dual as between several States directly,
or through participation in intergovernmental organizations such as the
International Telecommunications Satellite Organization (INTELSAT) and the
former International Mobile Satellite Organization (INMARSAT).
n615 See Agreement Relating to the International Telecommunications
Satellite Organization "INTELSAT," Aug. 20, 1971, 23 U.S.T. 3813 (entered into
force Feb. 12, 1973).
n616 Article 3 of the INMARSAT treaty requires that the uses of its assets be
reserved for "peaceful purposes." Convention on the International Maritime
Satellite Organization, Sept. 3, 1976, art. 3, 31 U.S.T. 1, 1143 U.N.T.S. 105
(entered into force July 16, 1979).
n617 W.D. von Noorden, INMARSAT Use By Armed Forces: A Question of Treaty
Interpretation, 23:1 J. SPACE L. 1, 2 (1995) [hereinafter von Noorden].
n618 Id. As for military uses authorized by the treaty, the member nations of
INMARSAT, as well the INMARSAT staff itself, have concluded that the treaty's
language "permits the use of INMARSAT assets by UN peacekeeping or peacemaking
forces acting under the auspices of the UN Security Council, even if they are
engaged in armed conflict to accomplish their missions." Department of Defense,
Office of General Counsel, An Assessment of International Legal Issues in
Information Operations (May 1999) at 15.
n619 von Noorden, supra note 617, at 2. The author strongly implies that the
U.S. simply avoided the "peaceful purposes" issue by focusing instead on
n620 See, e.g., R.A. Morgan, Military Use of Commercial Communication
Satellites: A New Look at the Outer Space Treaty and 'Peaceful Purposes' 60 J.
AIR L. & COM. 237 (1994).
n621 Once again, military wargames are precipitating discussion of potential
legal issues. In the Army's 1998 "Space Game 2" an issue arose as to the use of
commercial satellites and whether the U.S. could or should attack either the
space or ground segment. The now-familiar question "which of these options
constitute an act of war?" also was raised. W.B. Scott, Wargame Raises New
Space Policy Dilemmas, 148:8 AV. WK. & SPACE TECH., Feb. 23, 1998, at 98.
n622 The following discussion describes neutrality as a specific legal
category within the law of war:
The term 'neutrality' designates the legal status of a State which does not
participate in a war being waged by other States. A precondition, therefore, is
the existence of a war between sovereign States or a civil war in which the
rebels have been recognized as belligerents. . . . In the case of a use of force
which falls short of actual war, the laws of neutrality do not apply. . . .
Neutrality ends when the neutral State enters the war, but not if it uses force
to counter a violation of its neutrality. . . . A neutral State has the right to
demand respect for its independence and above all for its territorial
sovereignty, including its air space. . . . The supreme precept is that the
neutral State may not, by governmental measures, intervene in the conflict to
the advantage of one of the belligerents. Measures that would assist a
belligerent and those that would harm it are alike forbidden. This prohibition
applies even if equal treatment for both parties is contemplated. Equality of
treatment and impartiality are in this respect irrelevant. It is an obligation
imposed on the government of the neutral State, but not on its nationals. . . .
Basically, neutral obligations are only of a political or a military nature.
R.L. Bindschedler, Neutrality, Concept and General Rules, in 4 ENCYCLOPEDIA OF
PUBLIC INTERNATIONAL LAW 9-13 (Bernhardt, ed., 1982).
n623 See Hague Convention (V) Respecting the Rights and Duties of Neutral
Powers and Persons in Case of War on Land, Oct. 18, 1907 (1908 Supp.) 2 AM. J.
INT'L L. 117 [hereinafter Hague Convention (V)]; See Hague Convention (XIII)
Concerning the Rights and Duties of Neutral Powers in Naval War, Oct. 18, 1907
(1908 Supp.) 2 AM. J. INT'L L. 202.
n624 As previously suggested, references to "bombardment" where used in the
conventions governing land (IV) and sea (IX) warfare have been widely read to
effect limits on means and methods of prosecuting air war. See, e.g., Parks,
supra note 123.
n625 Hague Convention (V), supra note 623, at art. 8. The specific reference
to early instruments of telecommunications is particularly apt as applied to
space warfare. The principal assets in which the "dual use" problem for neutral
and belligerent co-ownership arises in space warfare will be for
n626 Id. at art. 9.
n627 Id. at art. 20.
n628 Other non-parties to the Convention that were active to some degree in
the 1991 Persian Gulf War include Canada, Italy and Turkey.
n629 Roberts & Guelff, supra note 131, at 61.
n630 In addition to those cited below, perhaps the most obvious example of
dual-use technology pertains to launch vehicles. In the civilian context, launch
vehicles are also termed boosters or simply transportation systems. In the
military context, virtually the same launch vehicles become missiles and
rockets. This dual use potential for the same launch vehicle creates tension
given the rise of commercial use of space. For example, the joint venture
between U.S., Russian, Norwegian, and Ukrainian corporations to launch
commercial satellites from an ocean-going oil rig was suspended in 1998 over
missile technology concerns. The effort, popularly known as Sea Launch, uses a
Russian Zenit rocket to boost the commercial payloads to orbit. The U.S. State
Department, fearful that Boeing was educating Russia on improvements to its
missile design, halted work on the project. The Zenit rocket is a modified
version of the Russian SS-18 ICBM. See J. Mintz, U.S. Suspends Boeing-Ukraine
Rocket Launch, WASH. POST, Aug. 8, 1998, at A14. The U.S. has subsequently
allowed work to resume.
n631 The dual-use character of remote sensing satellites benefits military
and civilian organizations in both directions. Thus, military imagery finds
useful civilian application as well. For example, declassification of
photoreconnaisance from the early U.S. Corona satellites has allowed for surface
water studies. Recently-released imagery showed the size of the Soviet Aral Sea
in 1962. By comparison with 1990s imagery, the considerable extent to which the
sea has shrunk due to the diversion of water for irrigation becomes clear.
PEEBLES, THE CORONA PROJECT, supra note 49, at 266. Peebles also notes that
the first NASA Landsat earth resources satellite was launched in 1972 -- a
month after the end of Corona. With the Corona photos, environmental studies
could be extended back another twelve years, helping to separate long-term
changes from normal variations in such areas as movement of sand dunes, loss of
forest areas, and shifts in the courses of tropical rivers.
n632 Christol argues that this dual-use aspect of most space assets
contributed "to the demise of the position that military activities in the
space environment were inherently aggressive. . . . Space objects engaged in
communications, observations of earth from space, weather observation, and
geodesy could be engaged in either a military, a non-military, or both military
and non-military activities." CHRISTOL, MODERN INTERNATIONAL LAW OF OUTER
SPACE, supra note 338, at 28.
n633 A further permutation of the issue arises when several opposing
belligerents simultaneously use the same asset. During Operation Desert Storm,
both the coalition and Iraq were using transponders off the ARABSAT
telecommunication system. F.R. Cleminson, Banning the Stationing of Weapons in
Space Through Arms Control: A Major Step in the Promotion of Strategic Stability
in the 21st Century, in ARMS CONTROL AND THE RULE OF LAW: A FRAMEWORK FOR PEACE
AND SECURITY IN OUTER SPACE 39 (J.M Beier & S. Mataija, eds., 1998). Aside from
the issue of neutral State partial ownership of the system, there appears to be
no jus in bello reason why either side could not have attacked the satellite.
Though each side would have had to calculate whether it stood to gain more than
it lost by the attack, this amounts to a question of military tactics and
strategy rather than permissible conduct under the law.
n634 Thus, in its Report to Congress on the conduct of the Gulf War, the
Department of Defense discussed the coalition attacks on major utilities, the
Iraqi communications system, and bridges. The Report affirms that
when objects are used concurrently for civilian and military purposes, they are
liable to attack if there is a military advantage to be gained in their attack.
('Military advantage' is not restricted to tactical gains, but is linked to the
full context of a war strategy, in this instance, the execution of the Coalition
war plan for liberation of Kuwait.)
Department of Defense Report to Congress on the Conduct of the Persian Gulf War:
Appendix O on the Role of the Law of War, 31 I.L.M. 612, 623 (1992).
n635 If all that were required were a potential military use, any asset could
be targeted. The homes of civilians far from the battlespace could potentially
be used by military forces, but such are not lawful targets unless so used.
Similarly, any satellite with a system of on-orbit propulsion is a potential
kinetic ASAT for another satellite. This, by itself, does not make the
satellite a military objective.
n636 M. COLLINS, LIFTOFF: THE STORY OF AMERICA'S ADVENTURE IN SPACE 161
n637 Outer Space Treaty, supra note 316, at art. V. Though "astronaut" was
originally a U.S. term referring to human beings in space, it can apply equally
to humans in space from other countries, including those that may prefer the
term "cosmonaut." As used here, the two terms are synonymous and use of the
one constitutes reference to both. The phrase "envoys of mankind" comes from the
Outer Space Treaty which declares "States Parties to the Treaty shall regard
astronauts as envoys of mankind in outer space and shall render them all
possible assistance in the event of accident, distress, or emergency landing on
the territory of another State Party or on the high seas." Id.
n638 Commenting on this term, Cocca writes
The term 'envoy' has a precedent in diplomatic law, that of an envoy
extraordinary. An envoy ranks just below an ambassador and always is an agent, a
messenger. The reason for this unique concept lies in the fact that astronauts
have been vested with the legal representation of all mankind in outer space and
celestial bodies. No former representation has ever been as wide and
politically, it goes beyond the most audacious ambition. On the other hand, this
investment was recognized in the General Assembly by unanimity and acclamation.
A.A. Cocca, Prospective Space Law, 26:1 J. OF SPACE L. 51, 54 (1998).
n639 Outer Space Treaty, supra note 316, at art. IV ("The use of military
personnel for scientific research or for any other peaceful purposes shall not
n640 At the time of the adoption of the Outer Space Treaty, virtually all
U.S. astronauts in space from the Mercury and Gemini projects had all been
members of the U.S. military.
n641 It appears to be of little significance that the Outer Space Treaty
requires that astronauts be regarded as envoys of mankind "in outer space." When
read in context, this is not a geographic limitation for the exclusive area in
which astronauts are to be regarded as envoys, but rather a claim that when away
from earth, that is, in outer space, astronauts represent the human race.
n642 Hague Convention (IV) Annex, supra note 154, at art. 1. Although the
requirements to have a distinctive emblem "recognizable at a distance" and to
"carry arms openly" certainly assume new meaning as applied to outer space, such
requirements could be complied with in space just as they are on land, sea, or
in the air. The central point of these requirements is to allow clear
distinction between combatants and civilians, legitimate and illegitimate
military targets. Failure to so identify oneself if done to take advantage of
the enemy's goodwill, amounts to an act of perfidy, one of the most serious law
of war violations as it undermines the entire system and the mutual "confidence"
on which it is based. For a discussion of perfidy under Protocol I to the Geneva
Conventions, see supra note 166.
n643 Article 31 of the Vienna Convention requires that a treaty be
interpreted "in good faith in accordance with the ordinary meaning to be given
to the terms of the treaty in their context and in light of its object and
purpose." Vienna Convention, supra note 265, at art. 31 (emphasis added). Though
the Vienna Convention came into force well after adoption of the Outer Space
Treaty, the U.S. views its provisions as simply codifying preexisting customary
n644 It is for this reason that diplomats stationed in foreign countries are
accorded such wide protections under international law. Not only are their
personal and professional premises, archives and documents, and persons deemed
"inviolable," but they are free from the criminal jurisdiction of the receiving
State. Vienna Convention On Diplomatic Relations, Apr. 18, 1961, 500 U.N.T.S. 95
(entered into force June 24, 1964).
n645 M. Bourbonniere, & L. Haeck, Jus in Bello Spatialis, 1999 PROCEEDINGS OF
THE SPACE STUDIES INSTITUTE 8 (1999) (conference on space manufacturing). Once a
diplomat takes up arms, he arguably loses his diplomatic protections. See J.S.
Beaumont, Self-Defense as a Justification for Disregarding Diplomatic Immunity,
1991 CAN. Y.B. INT'L L. 391 (1992).
n646 The Outer Space Treaty itself hints at this by requiring that States
Parties regard astronauts as envoys. This raises the subtle distinction between
an astronaut actually being an envoy, and simply being regarded as one.
n647 Outer Space Treaty, supra note 316, at art. V.
n648 Rescue and Return Agreement, supra note 358, at art. IV.
n649 See S. Gorove, Legal and Policy Issues Raised by the Proposed Notion of
'Aerospace Object,' in PROCEEDINGS OF THE FORTIETH COLLOQUIUM ON THE LAW OF
OUTER SPACE 411 (1998); C.Q. CHRISTOL, SPACE LAW: PAST, PRESENT, AND FUTURE 339
(1991); M. LACHS, THE LAW OF OUTER SPACE: AN EXPERIENCE IN CONTEMPORARY
LAW-MAKING 59, 60 (1972). Generally, the arguments rests on anecdotal evidence
of spacecraft entering the national airspace of a foreign State without incident
n650 For additional discussion of the question of innocent passage as a
customary norm of international law, see supra note 312. In addition to the
arguments of Malanczuk and Wassenberg, additional space law commentators have
made the argument cogently, including A.D. Terekhov, Passage of Space Objects
Through Foreign Airspace: International Custom?, 25:1 J. SPACE L. 1 (1997); P.
Haanappel, The Aerospace Plane: Analogies with Other Modes of Transportation, in
PROCEEDINGS OF THE THIRTY-SECOND COLLOQUIUM ON THE LAW OF OUTER SPACE 341, 342
(1990); B. Cheng, The Legal Regime of Airspace and Outer Space: The Boundary
Problem Functionalism Versus Spatialism: The Major Premises, V ANNALS AIR &
SPACE L. 323, 357 (1980). Indeed, while backing away from its earlier
unequivocal assertions that such a right exists, Russia more recently stated
that "provisions of international customary law with respect to the passage of
aerospace objects after re-entry into Earth's atmosphere are currently in the
process of being elaborated." Questionnaire On Possible Legal Issues with Regard
to Aerospace Objects: Replies from Member States, U.N. Doc. A/AC.105/635 (1996).
n651 LOS Convention, supra note 467, at art. 19.
n652 Scott, Space As New Area of Responsibility, supra note 2, at 55. While
General Estes' point appears self-evident, the U.S. is not likely to deploy
weapons for some time. "We don't foresee weaponization in space between now and
the 2020 timeframe." Robert Wall, Space Weapons Fall from USAF Vision, 153:2 AV.
WK. & SPACE TECH., July 20, 2000, at 86 (quoting Secretary of the Air Force, F.
n653 This prospect appears unlikely. Following his discussion of events at
the U.N. Conference on Disarmament, Professor Vlasic plausibly asserts:
It may not be too far-fetched to conclude that the position of certain States
on the issue of space weapons reflects their desire not to be subject to
restrictions, at least not yet, by an international legal instrument, even if
only a U.N.G.A. resolution, condemning in unambiguous terms the development,
testing and deployment of devices, wherever based, designed to attack or
interfere with space assets.
Vlasic, Space Law and Military Technology, supra note 11, at 407.
n654 As stated previously, given the continuing implications of State
sovereignty in international relations, it is important to conceive State
behavior not as authorized by international law, but rather inherently lawful
unless proscribed by international law. See supra note 141. Accordingly, it is
appropriate to speak of activity that is "not prohibited" or "consistent with
n655 Several of the items on these prohibited and not prohibited lists were
taken from a July 1985 working paper entitled "Survey of International Law
Relevant to Arms Control and Outer Space" submitted by the government of Canada
to the U.N. Conference on Disarmament. Stojak, supra note 354, at 45, 46.
n656 The two publicly-acknowledged exceptions include the U.S. and Russian
ASAT systems. States have historically been reluctant to agree to restrictions
on their use of potential weaponry before it has been developed and fielded. The
notable exception is the recent restriction on blinding lasers. See supra note
General Howell M. Estes, III USAF (1997)
Before examining how the law of war will restrict means and methods of
space warfare, it is necessary to determine whether it applies to military
space operations in the first place. Given the evolution of aerial
warfare--gradual restrictions on means and methods applied from the existing law
of war--and the apparent similarity of certain aspects of the maritime
environment to that of outer space, one can apply the traditional set of norms
known as the law of war to space warfare by employing a process of analogical
reasoning. The conclusion that the existing law of war will apply to space
warfare is further supported by treaty bases in the Outer Space Treaty and the
law of war's Martens' clause.
That said, when it comes to outlining permissible military activity during
the course of space combat, it appears equally clear that the near-total
atmospheric vacuum characterizing outer space is matched by a similar legal
vacuum with respect to the jus in bello for space warfare. Academicians and
practitioners are left to making educated but uncertain guesses based on
analogies with other legal regimes. As with any attempt to predict the
application of current (though insufficient) legal regimes to future phenomena,
it is extremely difficult to articulate with any precision how this application
should occur. The difficulty is largely a function of developing warfare
technologies that continue to outpace the progressive development of
international law. Ideally however, the task should fall to diplomats and
international legislators having the authority to negotiate clarifications to
international law before the relevant issues are unilaterally decided by States
in the context of actual combat. [n653]
The prospect of space warfare requires the formulation of a new
perspective on the law of war. The law of war contains prescriptive norms
derived from a wide variety of sources. With respect to space warfare, the
corpus juris spatialis, in addition to a variety of arms control treaties,
contributes additional restrictions to the existing law of war. Having concluded
that the traditional law of war will apply to space warfare, and employing the
most widely accepted understandings of the terms "peaceful" and "space weapon,"
an examination of relevant legal sources demonstrates that the following
military activities are prohibited at this time:
* Interference with space-based "national technical means" (space based sensors)
for arms control verification as between the U.S. and Russian Federation;
* Placement of nuclear weapons and other weapons of mass destruction in orbit
around the earth and on celestial bodies or in orbit around them;
* Testing or other detonation of nuclear weapons in outer space;
* Placement of military bases and conduct of military tests or maneuvers on
celestial bodies and in orbits around them;
* Destruction of targets that are not military objects or militarily necessary,
and are specifically prohibited such as hospitals, churches, and non-combatants;
* Use of space weapons or tactics that are "inhumane," "disproportionate" to the
militarily necessary objective sought, or are incapable of use so as to
"distinguish" between legitimate and illegitimate targets (as the terms are used
under the traditional jus in bello);
* Development, testing, and deployment of space-based or other anti-ballistic
missile systems and components (with a single limited exception);
* Military or hostile use of environmental modification techniques in outer
By contrast, an examination of the same sources discloses that, at a
minimum, the following military activities in outer space are not prohibited:
* The use of military personnel;
* The use of space-based remote sensors in support of combat or other military
* The use of space-based communication, navigation, and meteorological systems
for combat or other military purposes;
* The deployment and non-aggressive use of conventional space weapons; and
* The transiting of nuclear and other weapons of mass destruction in non-orbital
Despite nearly forty years of research into space weaponry there is no
binding international instrument limiting the use of such weapons. With two
isolated examples, such weapons have not been fielded, contributing to State
reluctance to foreclose further study into effective deterrents. [n656]
However there will come a day when a treaty governing means and methods of
space warfare will be desirable. In addition to the certainty written law brings
to the legal structures governing human conduct, formal agreements most clearly
evince the consent of the governed. Of course, any treaty developments for
space warfare must strike a pragmatic balance between national security,
international legal order, and human rights--a balance for which the jus in
bello has striven for at least 100 years.
To a certain degree, this review of the law of war and its application to
space warfare serves as a call for further analysis of the topic. Though armed
conflicts apparently have not occurred in space to date, the rudimentary means
for engaging in such conflicts now exist. As each armed conflict since Vietnam
makes greater use of space assets, it is undoubtedly only a matter of time
before a future conflict witnesses the application of force both from and within
the space environment. When it does, and in the absence of specific
international norms restricting the use of means of methods of war in space,
State practice will provide the first insights into how the law will be applied.
As this article has argued, the lawful scope of such warfare will be limited
by the customary principles of proportionality, necessity, discrimination,
humanity, and an array of treaty-based norms affecting the targeting of
individuals and objects. To this extent, the existing law of war restricts the
scope of space warfare today. How the law will evolve into the future law of war
will largely depend upon the nature and scope of such warfare, and upon the new
customary principles that may emerge thereby. However, it is doubtful that the
international community will have any greater success in codifying the law
governing space warfare than it has had with respect to aerial warfare.
n1 JOHN KEEGAN, A HISTORY OF WARFARE 5 (1993).
n2 Professor Matte argues that "airspace" is a misnomer, and that the proper
term is "air medium." He makes this distinction in arguing against "any kind of
arbitrary demarcation between 'air space' and 'outer space.'" N.M. MATTE,
AEROSPACE LAW: TELECOMMUNICATIONS SATELLITES 11 n.31 (1982). Professor Matte
further observed that the two environments are "at present governed by two
different legal regimes," id. (emphasis added), but that the more logical
approach is to speak of an aerospace continuum. On this approach, "the rules and
norms of aeronautical law, on the one hand, and of aerospace law, on the other
hand, should be applied according to functional criteria, i.e., the type of
activity being carried out." Id. This contrasts with the "traditional view" of
crafting and applying law to the medium in which the activity is carried out,
either air or space. Though insightfully recognizing the great difficulty of
establishing a non-arbitrary boundary between air space and outer space, this
view, if applied to armed conflict, would identify applicable norms limiting
weaponry and methods of warfare based on a functional approach, rather than on
where the combat occurs. The difficulty with this from a military point of view
lies in the conceptual challenge of creating warfare policy, doctrine, and
operating plans without a clear demarcation of the theater of operations. See,
e.g., W.B. Scott, Pentagon Considers Space As New Area of Responsibility, 146:12
AV. WK. & SPACE TECH., Mar. 24, 1997, at 54 [hereinafter Scott, Space as New
Area of Responsibility].
n3 One author aptly terms the difference "significant." R.D. NEWBERRY,
SPACE DOCTRINE FOR THE TWENTY-FIRST CENTURY 10 (1998) [hereinafter NEWBERRY].
The difference is helpfully illustrated by three representative schools of
thought on the relationship between military activity and outer space: (1)
space as a demilitarized sanctuary; (2) space as the high ground; and (3)
space as a theater of operations. J.E. Justin, Space: A Sanctuary, the High
Ground, or a Military Theater?, in INTERNATIONAL SECURITY DIMENSIONS OF SPACE
(U. Ra'anan & R.L. Pfaltzgraff, Jr., eds., 1984) 102-09 [hereinafter Justin].
The first view recognizes a minimal role for the military use of space but not
its weaponization. Two thoughtful, moderated accounts representing this view
were recently provided by two USAF officers. One aims at "opening the debate" on
the space sanctuary view. B.M. DeBlois, Space Sanctuary: A Viable National
Strategy 12:4 AIRPOWER J. 41 (Winter 1998) [hereinafter DeBlois]. The other
claims to present the "strongest possible argument for a space sanctuary today."
D.W. ZIEGLER, SAFE HEAVENS: MILITARY STRATEGY AND SPACE SANCTUARY THOUGHT (1998)
[hereinafter ZIEGLER]. The second of the three schools of thought, sees the role
of military activity in space as principally supportive of terrestrial combat
and could include the use of weapons from space. This view stresses the
inseparability of the air and space media, and makes heavy use of the term
"aerospace," a term coined in 1958 by USAF Chief of Staff General Thomas White.
Justin at 107; see also D.N. SPIRES, BEYOND HORIZONS: A HALF CENTURY OF AIR
FORCE SPACE LEADERSHIP 54 (rev'd ed., 1998) [hereinafter SPIRES]. The third view
represents the most complete use of space for military purposes. This view sees
space not merely as another medium in which to augment existing military roles,
but as an emerging combat environment, or military mission, in its own right.
The present author's analysis rests on the conclusion that international law
does not prohibit the use of outer space as a complete military theater of
operations per se. This assumes that any force used as part of military
operations in space is compliant under the jus ad bellum. For a discussion of
the jus ad bellum, see infra notes 132 through 140 and accompanying text.
n4 The unmanned assets used in outer space are obvious-satellites and
missiles. Unmanned assets used within airspace include unmanned aerial vehicles
(UAVs), currently used for surveillance, as well as missiles either headed for
or from space or used entirely within airspace. See generally JEFFREY N.
RENEHAN, UNMANNED AERIAL VEHICLES AND WEAPONS OF MASS DESTRUCTION: A LETHAL
COMBINATION? 5-13 (1997) (provides helpful discussion of UAVs and remotely
piloted vehicle technologies).
n5 This is to say that as long as space warfare is prosecuted through
unmanned missions against assets wholly within the space environment, that
portion of the law of war traditionally known as "Hague Law" will govern space
warfare more readily than that portion known as "Geneva Law." For a discussion
of "Hague Law," see infra notes 188 through 207 and accompanying text. For a
discussion of "Geneva Law," see infra notes 208 through 219 and accompanying
n6 Professor Schmitt has pointed out that on rare occasions, international
law has sought to outlaw the deleterious effects of certain anticipated
technologies. In this regard he cites the ban on blinding laser weapons, adopted
before such weapons had ever been used in military operations. "Much more
frequently, however, law has proven reactive. Indeed, in the twentieth century,
codification efforts have followed major wars in almost lock-step fashion."
Michael N. Schmitt, Bellum Americanum: The U.S. View of Twenty-First-Century War
and Its Possible Implications for the Law of Armed Conflict, in 71 INTERNATIONAL
LAW STUDIES, THE LAW OF ARMED CONFLICT: INTO THE NEXT MILLENIUM 389 (Michael N.
Schmitt & Leslie C. Green, eds., 1998), reprinted in 19 MICH. J. INT'L L. 1051
(1998) [hereinafter Schmitt, Bellum Americanum].
n7 As Geoffrey Best puts it, "there was no international law on aerial
warfare before the turn of our century. The Hague Conferences [1899 and 1907]
gingerly laid a few foundations. . . . but the terms used were soon discovered
to be archaic, and vital questions had been begged." G. BEST, WAR AND LAW SINCE
1945 199 (1994). It will be difficult to avoid similar mistakes as States
contemplate moving into uncharted legal territory once again. Any attempt to
depict the future in plausible terms is fraught with many challenges. The
following three challenges, taken from a fascinating Air Force study on future
concepts, capabilities, and technologies in the year 2025, certainly apply to
any attempt to envision a future law of war and the conditions necessitating it:
First, one runs the risk of assuming that because we can do something, we will.
In this case technology drives planning, not the reverse. Second, we
straight-jacket the future with today's assumptions. That is, we focus on an
array of problems and possibilities that are too narrow compared to the array we
actually will encounter. A third problem is the reverse of the previous one.
Here, we are too expansive and imagine far more than we or the world are in fact
capable of accomplishing in the time frame under review.
J.W. Kelly, Executive Summary, in AIR FORCE 2025 6 (1996) [hereinafter AIR FORCE
n8 Schmitt, Bellum Americanum, supra note 6, at 390. Numerous commentators,
including senior military officers, have widely termed Operation Desert Storm
the first space war. See, e.g., R. Saltus, Air Force says it Might Have Won the
War in 2 More Weeks, BOSTON GLOBE, Apr. 5, 1991, at 10; C. Covoult, DESERT STORM
Reinforces Military Space Directions, 134:14 AV. WK. & SPACE TECH., Apr. 8,
1991, at 42.
n9 Though several interesting studies consider the possibility of warfare
with extra-terrestrial forms of intelligent life, such consideration is far
beyond the scope of this article. Such analyses also exceed the scope of
international law proper. Nonetheless, these works often make useful
observations about future space weaponry and the difficulty of scientific
prediction. For example, one sober, scientifically-respectable work, considering
the technological preconditions for successfully defending against alien attack,
distinguishes this project from that of mere science fiction, and points out the
importance of allowing authors free rein in speculating about future | <urn:uuid:a488d871-5262-4904-abc6-2f9314f5e9c5> | CC-MAIN-2015-22 | http://www.space4peace.org/slaw/lawofwar.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207930995.36/warc/CC-MAIN-20150521113210-00065-ip-10-180-206-219.ec2.internal.warc.gz | en | 0.911974 | 121,755 | 2.9375 | 3 |
The purpose of this glossary is to provide an accessible dictionary of assessment-related terms for use by a non-technical, lay audience. This audience includes various consumers of assessments and assessment information who have had limited or no formal training regarding measurement and assessment. Examples of such individuals include: K-12 educators, parents of students, media writers, adult test takers, researchers who use assessment instruments or existing assessment results in their work, policy makers at the state and national levels, and higher education administrators in areas such as admissions or institutional research.
The intention of the glossary is to offer definitions for “technical terms” or “specialized jargon” in a way that might be readily understood by those who have not studied in the field or have not developed expertise through work experience in the field. Ease of interpretation and technical correctness were both goals in the development of glossary definitions. Some specialists or experts might provide more complex or “inclusive” definitions for some terms in order to be more exact. However, the approach used in developing this glossary was to err on the side of communicating simply with a lay audience rather than to ensure precision in expression that would be acceptable to specialists in the field when both criteria could not be met.
The terms included in the glossary cover a broad range of concepts and labels used in educational testing in the realms of achievement, aptitude, and psychological assessment. For achievement testing, this includes language associated with programs like NCLB (No Child Left Behind), RTTT (Race To The Top), APP (Advanced Placement Program), and NAEP (National Assessment of Educational Progress), in addition to K-12 standardized achievement batteries and tests used in various subject-matter areas, like reading comprehension, for example. In the area of aptitude testing, programs like ACT, SAT, PSAT (Preliminary SAT) and other admissions tests would be included, as well as K-12 tests of cognitive abilities. For psychological assessments, instruments and score reports most commonly used in special education are included. | <urn:uuid:3c36a057-ca46-4455-8617-3e9121eadba7> | CC-MAIN-2018-22 | http://www.ncme.org/ncme/NCME/NCME/Resource_Center/Glossary_Folder/Purpose.aspx | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864725.4/warc/CC-MAIN-20180522112148-20180522132148-00433.warc.gz | en | 0.951141 | 417 | 3.703125 | 4 |
According to Norse* mythology, the world will end at Ragnarok, a time of great destruction when the gods will wage a final battle with the giants and other evil forces. Ragnarok has not yet arrived, but the events leading to it have already been set in motion.
Before Ragnarok begins, the world will suffer a terrible winter lasting three years. During this period the sun will grow dim, evil forces will be released, and wars will rage among humans. The trickster Loki will gather the frost giants and sail to Asgard, the home of gods. The wolf Fenrir, the serpent Jormungand, and Hel, the goddess of the dead, will break free and join Loki and other evil characters in a battle against the gods.
On the morning of Ragnarok, the god Heimdall will sound his mighty horn, summoning the gods to battle. During the terrible struggle that follows, all the great gods—including Odin* and
trickster mischievous figure appearing in various forms in the folktales and mythology of many different peoples
* See Names and Places at the end of this volume for further information.
Thor*—will be killed. Loki and the monsters, giants, and other evil beings will also perish. The earth will be set on fire, the sun and moon will be destroyed, the sky will fall, and the world will finally sink beneath the sea and vanish.
Ragnarok will not be the end of everything, however. The World Tree Yggdrasill will survive, and two humans—Lif and Lifthrasir—and some animals will be sheltered among its branches. New land will rise from the oceans, and a fresh green earth will emerge. Lif and Lifthrasir will repopulate the world. Some of the gods—including Balder*—will also return and rebuild Asgard, ushering in a new golden age. Giants and other evil beings will not reappear but will fade as a distant memory. | <urn:uuid:7f856d82-d1e9-4896-a883-141a89d88d5e> | CC-MAIN-2015-27 | http://www.mythencyclopedia.com/Pr-Sa/Ragnarok.html | s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375098924.1/warc/CC-MAIN-20150627031818-00286-ip-10-179-60-89.ec2.internal.warc.gz | en | 0.908754 | 401 | 2.859375 | 3 |
Skip to comments.SETI and Intelligent Design
Posted on 12/02/2005 8:35:59 AM PST by ckilmer
|SETI and Intelligent Design
By Seth Shostak
posted: 01 December 2005
06:37 am ET
If youre an inveterate tube-o-phile, you may remember the episode of "Cheers" in which Cliff, the postman whos stayed by neither snow, nor rain, nor gloom of night from his appointed rounds of beer, exclaims to Norm that hes found a potato that looks like Richard Nixons head.
This could be an astonishing attempt by taters to express their political views, but Norm is unimpressed. Finding evidence of complexity (the Nixon physiognomy) in a natural setting (the spud), and inferring some deliberate, magical mechanism behind it all, would be a leap from the doubtful to the divine, and in this case, Norm feels, unwarranted.
Cliff, however, would have some sympathizers among the proponents of Intelligent Design (ID), whose efforts to influence school science curricula continue to swill large quantities of newspaper ink. As just about everyone is aware, these folks use similar logic to infer a "designer" behind such biological constructions as DNA or the human eye. The apparent complexity of the product is offered as proof of deliberate blueprinting by an unknown creatorconscious action, presumably from outside the universe itself.
What many readers will not know is that SETI research has been offered up in support of Intelligent Design.
The way this happens is as follows. When ID advocates posit that DNAwhich is a complicated, molecular blueprintis solid evidence for a designer, most scientists are unconvinced. They counter that the structure of this biological building block is the result of self-organization via evolution, and not a proof of deliberate engineering. DNA, the researchers will protest, is no more a consciously constructed system than Jupiters Great Red Spot. Organized complexity, in other words, is not enough to infer design.
But the adherents of Intelligent Design protest the protest. They point to SETI and say, "upon receiving a complex radio signal from space, SETI researchers will claim it as proof that intelligent life resides in the neighborhood of a distant star. Thus, isnt their search completely analogous to our own line of reasoninga clear case of complexity implying intelligence and deliberate design?" And SETI, they would note, enjoys widespread scientific acceptance.
If we as SETI researchers admit this is so, it sounds as if were guilty of promoting a logical double standard. If the ID folks arent allowed to claim intelligent design when pointing to DNA, how can we hope to claim intelligent design on the basis of a complex radio signal? Its true that SETI is well regarded by the scientific community, but is that simply because we dont suggest that the voice behind the microphone could be God?
In fact, the signals actually sought by todays SETI searches are not complex, as the ID advocates assume. Were not looking for intricately coded messages, mathematical series, or even the aliens version of "I Love Lucy." Our instruments are largely insensitive to the modulationor messagethat might be conveyed by an extraterrestrial broadcast. A SETI radio signal of the type we could actually find would be a persistent, narrow-band whistle. Such a simple phenomenon appears to lack just about any degree of structure, although if it originates on a planet, we should see periodic Doppler effects as the world bearing the transmitter rotates and orbits.
And yet we still advertise that, were we to find such a signal, we could reasonably conclude that there was intelligence behind it. It sounds as if this strengthens the argument made by the ID proponents. Our sought-after signal is hardly complex, and yet were still going to say that weve found extraterrestrials. If we can get away with that, why cant they?
Well, its because the credibility of the evidence is not predicated on its complexity. If SETI were to announce that were not alone because it had detected a signal, it would be on the basis of artificiality. An endless, sinusoidal signal a dead simple tone is not complex; its artificial. Such a tone just doesnt seem to be generated by natural astrophysical processes. In addition, and unlike other radio emissions produced by the cosmos, such a signal is devoid of the appendages and inefficiencies nature always seems to add for example, DNAs junk and redundancy.
Consider pulsars stellar objects that flash light and radio waves into space with impressive regularity. Pulsars were briefly tagged with the moniker LGM (Little Green Men) upon their discovery in 1967. Of course, these little men didnt have much to say. Regular pulses dont convey any informationno more than the ticking of a clock. But the real kicker is something else: inefficiency. Pulsars flash over the entire spectrum. No matter where you tune your radio telescope, the pulsar can be heard. Thats bad design, because if the pulses were intended to convey some sort of message, it would be enormously more efficient (in terms of energy costs) to confine the signal to a very narrow band. Even the most efficient natural radio emitters, interstellar clouds of gas known as masers, are profligate. Their steady signals splash over hundreds of times more radio band than the type of transmissions sought by SETI.
Imagine bright reflections of the Sun flashing off Lake Victoria, and seen from great distance. These would be similar to pulsar signals: highly regular (once ever 24 hours), and visible in preferred directions, but occupying a wide chunk of the optical spectrum. Its not a very good hailing-signal or communications device. Lightning bolts are another example. They produce pulses of both light and radio, but the broadcast extends over just about the whole electromagnetic spectrum. That sort of bad engineering is easily recognized and laid at natures door. Nature, for its part, seems unoffended.
Junk, redundancy, and inefficiency characterize astrophysical signals. It seems they characterize cells and sea lions, too. These biological constructions have lots of superfluous and redundant parts, and are a long way from being optimally built or operated. They also resemble lots of other things that may be either contemporaries or historical precedents.
So thats one point: the signals SETI seeks are really not like other examples drawn from the bestiary of complex astrophysical phenomena. That speaks to their artificiality.
The Importance of Setting
Theres another hallmark of artificiality we consider in SETI, and its context. Where is the signal found? Our searches often concentrate on nearby Sun-like star systems the very type of astronomical locale we believe most likely to harbor Earth-size planets awash in liquid water. Thats where we hope to find a signal. The physics of solar systems is that of hot plasmas (stars), cool hydrocarbon gasses (big planets), and cold rock (small planets). These do not produce, so far as we can either theorize or observe, monochromatic radio signals belched into space with powers of ten billion watts or morethe type of signal we look for in SETI experiments. Its hard to imagine how they would do this, and observations confirm that it just doesnt seem to be their thing.
Context is important, crucially important. Imagine that we should espy a giant, green square in one of these neighboring solar systems. That would surely meet our criteria for artificiality. But a square is not overly complex. Only in the context of finding it in someones solar system does its minimum complexity become indicative of intelligence.
In archaeology, context is the basis of many discoveries that are imputed to the deliberate workings of intelligence. If I find a rock chipped in such a way as to give it a sharp edge, and the discovery is made in a cave, I am seduced into ascribing this to tool use by distant, fetid and furry ancestors. It is the context of the cave that makes this assumption far more likely then an alternative scenario in which I assume that the random grinding and splitting of rock has resulted in this useful geometry.
In short, the champions of Intelligent Design make two mistakes when they claim that the SETI enterprise is logically similar to their own: First, they assume that we are looking for messages, and judging our discovery on the basis of message content, whether understood or not. In fact, were on the lookout for very simple signals. Thats mostly a technical misunderstanding. But their second assumption, derived from the first, that complexity would imply intelligence, is also wrong. We seek artificiality, which is an organized and optimized signal coming from an astronomical environment from which neither it nor anything like it is either expected or observed: Very modest complexity, found out of context. This is clearly nothing like looking at DNAs chemical makeup and deducing the work of a supernatural biochemist.
Straw man, anyone?.
Do you know Seth? If you do, tell him thanks for the great article :-)
The difference is that we can find concrete evidence through SETI, but not through ID.
Morning ping. Even if this isn't worthy of cranking up the ping machine, this should be archived as a means of comparing good vs. bad/bogus science in the context of the ID debate.
"Well you see, Norm, it's like this... A herd of buffalo can only move as fast as
the slowest buffalo and when the herd is hunted, it is the slowest and weakest ones
at the back that are killed first. This natural selection is good for the herd as a
whole, because the general speed and health of the whole group keeps improving by
the regular killing of the weakest members. In much the same way, the human brain
can only operate as fast as the slowest brain cells. Now, as we know, excessive
drinking of alcohol kills brain cells. But naturally, it attacks the slowest and
weakest brain cells first. In this way, regular consumption of beer eliminates
the weaker brain cells, making the brain a faster and more efficient machine. And
that, Norm, is why you always feel smarter after a few beers."
Does anyone know what the radio frequencies from Earth would "look like" if someone was in another star system doing the same, SETI-like experiment?
"All your intelligent design are belong to me"
Sounds like this might be Cliff the Postman pretending to be an actual scientist. By the way SETI did have one important function. It has thoroughly debunked the concept of a big bang beginning by acknowledging that there are many blue shift situations whereas a big bang would require an expanding universe with only red shifts!
ID is just as valid as any conceptual theory and probably fits the current, factual information better than other more traditionally held theories. SETI is probably worried that their funding might be cut if they do not support the politically correct version of reporting.
SETI must be going reeeeeal slow these days. Shostak has a lot of time on his hands to weave strawmans to peddle.
That's before actually tackling questions of ID's validity. He's just a sloppy debater who skates by on an inflated impression of his reputation.
Well, its because the credibility of the evidence is not predicated on its complexity. If SETI were to announce that were not alone because it had detected a signal, it would be on the basis of artificiality.
this is a gob smaker. so the signature of intelligence is its artificiality.
What is truly amazing here is that this guy makes the case for ID!!
He claims that SETI is seeking narrow, organized signals, much in the same way we can discern if an object if fabricated by the unnatural appearance and shape.
Well, life is an organization of chemicals and elements that exist everywhere, but when assembled properly----life.
ID purports that such organization is evidence of design at work rather than random chance.
The radio signals sought by SETI are those organized and not those emanating from random chance.
Well, he is the senior astronomer at SETI, and his cv says his Ph.D is in astronomy from Caltech, so mabe we can give him the benefit of the doubt.
...a big bang would require an expanding universe with only red shifts!
Uhhh, no, it wouldn't require that.
Our of curiousity, what is the "concrete evidence" that points to extraterrestrial intelligence?
This, plus your claim to be An Actual Scientist, is making my B.S. meter twitch. Explain how the Big Bang cancels all proper motion, and renders orbital mechanics invalid.
That's because "intelligent design" has absolutely no scientific basis but SETI does...as the article explains quite well.
It has thoroughly debunked the concept of a big bang beginning by acknowledging that there are many blue shift situations whereas a big bang would require an expanding universe with only red shifts!
The universe is a swirling mixture of multiple vectors thus some objects will move towards each other while others move away in an expanding framework. Thus, red and blue shifts would be observed.
ID is just as valid as any conceptual theory and probably fits the current, factual information better than other more traditionally held theories
Completely wrong. ID can not be supported by experimentation and observation nor can it predict phenomenon. Thus, it utterly fails to be a valid scientific theory.
The difference is that we can find concrete evidence through SETI, but not through ID.
Our of curiousity, what is the "concrete evidence" that points to extraterrestrial intelligence?
there is the kicker.
there is no "concrete evidence"
similiarly atheists will say : show me your concrete evidence for God. (But exclude everything in the natural universe as evidence of a creator.)
While the Big Bang is still an hypothesis, SETI has done nothing to bunk or debunk it. M31 is blue-shifted, but it is relatively nearby and is allowed to blue-shift.
It's like saying, "Show me the forest, but don't use the trees as evidence."
Please reread the article - especially the conclusion. ID claims that naturally occurring complexity must be artificial since it is complex - a circular logic fallacy. SETI is looking for a signal that has a simplicity and efficiency that can not be observed being produced by any natural source. This indicates a possible artificial source. The evidence builds if it can be reproduced or a mechanism could be constructed for reproduction.
I gather that one argument for ID is that the odds of random events leading to the creation of life are so long as to be unsupportable. However, the odds of any series of events leading to any situation are equally long.
Close except that the formation of DNA, cellular systems, or even orbital mechanics and quantum events are not "random."
They follow very detailed, exact laws of the chemical and physical interactions that determine chemical reactions, protein structures, and physical events.
Simple example: salt is not formed and its structure determined by sodium and chloride atoms just randomly bumping into each other and sticking together in a random fashion. The many laws that describe ion dissociation, electron valencies, bond mechanics, etc. determine that one sodium and one chloride bond at a specific angle.
They would see our narrowband carriers. :-)
You should consider brushing up on your Astronomy 101.
On the contrary, apparent complexity leads to the reasonable inference that a designer may be involved in its production.
ID = Agnostic Creativism..
SETI = Gnostic Fantasy..
Evolution = Dialectic Material Psuedo-Science..
I was thinking something similar, but we use so much of the broadcast spectrum and, since the Earth would appear to be a point source, I imagine there would be all kinds of overlap of the different bands and frequencies from all the radio sources, as well as possible attenuation from interstellar media. So my first thought is the spectrum would look fairly broad and incoherent in the radio region and then taper off where the spectrum goes to shorter wavelengths. Would there be specific, narrow band emissions that would not overlap?
While you've pointed out some circumstances that must exist to permit the occurance of certain constructs, I don't believe you have made clear that the existence of those circumstances did not occur through random and unplanned events.
It's good enough. ID and SETI too. Great way to slide into the weekend. I'm hauling out the ping machine ...
Quite so. Well stated :)
I'm not sure I understand your statement. Are you bringing to question that the laws themselves of chemical and physical determinants for reaction and molecular structure occurred through random events? Or, perhaps, that the earliest protein precedents of RNA/DNA resulted from random organic compounds coming together in an "planned" event?
I suppose so -- and I suppose also that they'd be narrowly focused S-band type signals sent from blowtorches like Goldstone, Madrid, and Canberra.
The question is: how likely is it that one could pick up such signals, even from big, powerful sites like those, at a distances on the order of light years?
I'd think it would be hard enough to detect extremely weak signals sent to us on purpose, much less incidental signals directed to (say) some alien version of Pioneer 10.
Leaving aside questions being batted about in this thread, what's your personal opinion of the likelihood of ever seeing such signals, assuming they were sent?
And that, not complexity or a lack of complexity, is the core claim of ID -- that one can distinguish the natural from the artificial or intelligently made. If SETI claims that such a distinction can be made scientifically, then the idea that one could distinguish the natural from the artificial in biology is not unreasonable. Despite what this article claims, both SETI and ID are doing the same thing.
SETI assumes, without any existing evidence, that extraterrestrial intillgence may exist. In order to find evidence of such ET intelligence, they look for evidence of signals which have characteristics that would distinguish the artificial from the natural. ID assumes, without any existing evidence, that a creator of some sort may exist. In order to find evidence of such a creator, they look for evidence of pheonemna or features of life or the universe that would distinguish the created phoneomna from the natural. Both start with no evidence and propose finding the evidence by looking for created features among natural features. So without the whole complexity red herring, the difference is? Either you can differentiate the natural from the intelligently created or you can't. Either both are science or neither is.
Thank you. It's a matter of perspective and a perspective of matter. ;-)
As others have pointed out, there is no possible set of evidence or data which ID cannot fit.
In the spectrum of ID advocates you find people like Michael Denton, who assert that evolution is 100 percent naturalistic and has no deviations from the description given by mainstream biology. You have Behe, who accepts common descent, but believes God has intervened at some points. You have young earth creationists who believe that all variation is simply a matter of juggling existing alleles.
In short, there is no theory or hypothesis behind ID which limits the range of expected phenomena. There is nothing that is even potentially unexpected.
It would be difficult to detect such signals hence the size of the radio telescopes and networks combined with the large amounts of computing assets marshaled by the SETI project.
However, the last article I read stated that close to 1200 signals had been detected that can not be attributed to any known natural source. Which could mean that there are natural sources yet to be discovered or understood to account for these signals....or that there may be a few of those 'alien Pioneer' craft being noisy.
SETI has made a number of advance predictions about the sort of as-yet-undetected signal that would reflect intelligent creation rather than natural origin (e.g. the distinction between a broad-spectrum and a narrow-band signal described in the above article). ID has made a number of after-the-fact assertions about already-known natural phenomena (e.g. the claim that the probability of existing macromolecules forming is unreasonably low, even over an entire planet and billions of years).
The difference is equivalent to that between painting a target on a wall and shooting a bullet through the bulls-eye and shooting a bullet through a wall and painting a bulls-eye around the hole.
I am in the middle of a software test. Sigh. Will answer all posts this evening. :-)
That's a bullseye
That's no fun! You should've done your impression first and then let us guess. Still, I'd say you nailed it.
Also known as the "Texas Sharpshooter Fallacy"....
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works. | <urn:uuid:96ea076e-4d87-46a3-bd66-f98957f903a1> | CC-MAIN-2015-35 | http://freerepublic.com/focus/f-news/1532744/posts?page=26 | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645298065.68/warc/CC-MAIN-20150827031458-00311-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.955867 | 4,384 | 2.734375 | 3 |
Southern Montessori School provides a safe and happy learning environment in which children are able to flourish and build positive, caring and respectful relationships with their friends and teachers. Pastoral care is managed in the classroom as teachers take a holistic approach to education and are interested in the social and emotional wellbeing of all the children in their care, as well as their academic development.
Our positive guidance approach to behaviour fosters well-adjusted and considerate children who are self-disciplined and able to self-regulate. Children learn and build social and emotional skills through modelling and explicit teaching, with group work and class discussions proving opportunities for further development. Children are also taught strategies to help them learn to positively manage any social difficulties they encounter.
Multi-age classrooms allow classmates to know one another well, moving from being supported by peers as a younger child in the class to having increased responsibilities and leadership opportunities when they are older. In our three year Cycles, children also build close and supportive relationships with their teachers. And by involving children in decision making, a sense of ownership and responsibility for the learning environment is fostered. This generates a strong sense of community.
The Keeping Safe: Child Protection Curriculum is taught at all year levels. This program has two main themes:
- we all have the right to be safe
- we can help ourselves to be safe by talking to people we trust
The Australian Curriculum Personal and Social Capabilities, encompassing Self Awareness, Self Management, Social Awareness and Social Management guide our approach to enhancing student wellbeing. The Better Buddies Program leads to the development of strong, supportive relationships between our Reception and Cycle 3 children, and our Year 6 Leadership Program encourages our Primary School leaders to see themselves as valued role models for the younger students. In addition, the What’s the Buzz program offers greater support to students in social and emotional learning. | <urn:uuid:9613c82d-6ea4-4a7f-9472-ce8ebc78bc00> | CC-MAIN-2019-26 | https://www.southernmontessori.sa.edu.au/education/wellbeing/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998100.52/warc/CC-MAIN-20190616102719-20190616124719-00514.warc.gz | en | 0.964036 | 384 | 3.125 | 3 |
Preparation Lab Policies
The Field Museum's preparation labs are home to many fossil specimens in various states of condition. These are important research materials, and knowledge of these fossils and how they are to be handled and prepared is crucial. The labs are staffed by very experienced preparators, well-versed in all aspects of preparation, molding and casting. There are also students and volunteers who work in the labs, but they must demonstrate hand-eye coordination, manual dexterity, consistency and commitment.
The labs use chemicals, materials and equipment that may be hazardous if used improperly. Each lab has a folder which contains the MSDS (Materials Safety Data Sheet) for each chemical and compound used in the lab. Flammable items are stored in a vented Flammables Cabinet. All chemicals are clearly labeled. In addition, all personnel are properly trained in the use of power tools and appropriate safety gear (goggles, gloves, hearing protection, respirator masks with particulate and organic cartridges). Discarded chemical waste is disposed of properly, in accordance with OSHA standards.
All prep lab personnel are assigned their own specific projects. They must follow staff instructions and guidance; and they are responsible for the careful preparation, handling, record-keeping and proper storage and labeling of the specimens. Proper tool maintenance, cleaning of work stations and general lab cleanliness are also undertaken by all lab personnel.
People who want to become prep volunteers should first contact the chief preparator. An interview and a fossil prep test will then be scheduled. If an applicant has passed the prep test, an application will be processed by Human Resources and a background check is run. Once a week for one year is the minimal required commitment to fulfill.
- Science Newsflash
- Follow Our Research
- Conservation Efforts
- Explore Our Collections
- Research Resources
- Science Podcasts | <urn:uuid:f7147399-b5de-4ba2-b36a-822ca35a7e01> | CC-MAIN-2014-15 | http://fieldmuseum.org/explore/department/geology/fossil-prep/policies | s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532573.41/warc/CC-MAIN-20140416005212-00309-ip-10-147-4-33.ec2.internal.warc.gz | en | 0.93417 | 376 | 2.53125 | 3 |
I won’t ever forget watching one of my most struggling students light up when he showed me that he had written a simple story in cuneiform, using the few glyphs that were included in the social studies book. “It's like I’m a time traveler!” he’d said.
And of course, he was right.
One of the most vivid yet everyday ways we can help our students transcend time is to consistently use primary sources as the centerpiece of our social studies curriculum.
Far too many stories and perspectives are whitewashed in an effort to streamline, simplify, or dominate. It is the teacher’s daily challenge to teach students to learn to ask the tough questions, and in doing so, bring light to more truth.
Here are some fun, practical ideas for using primary sources in your social studies classroom:
- Teach it first, Teach it Specifically, and Teach it Often. Learning to analyze primary sources is a tough skill. It requires higher-order thinking. Sometimes it involves reading, sometimes looking at art or an artifact, sometimes listening to music or looking at a photograph or map. Begin the year practicing this skill with various resources and circle back to it frequently. I kept Primary Source Analysis worksheets on-the-ready, printed out in an accessible location all year long. Access them here.
- Use Music. With online music databases and the Library of Congress National Jukebox website, teachers today can access music from a vast swath of human history. You can search by genre, time period, and much more. There is nothing like music to truly immerse your students and engage their brains.
- Don’t worry about what you don’t know. I’ve had 5th graders reading Colombus’ journals. Were they edited? Of Course. I gave students manageable paragraphs that painted a picture. Did they understand every word? Of course not. And that’s okay. I had them draw pictures, after several supported, close readings, of what they DID understand, even if it was just an image or two. Then, discuss as a class or conference in small groups to fill in gaps of understanding.
- Act it Out. I used this strategy often. Break the students into groups and have them study different primary sources from the same event or time period. For instance, concerning the American Revolution- one group could read a snippet of the Declaration of Independencec, one group could look at Emanuel Luetze’s classic “Washington Crossing the Delaware” (and here would be a good opportunity to discuss the difference between when Washington actually crossed the Delaware and when Leutze painted it in 1851!), and another group could read something from the British and/or French at the time. As students act out their understanding of their source, they begin to see the larger picture emerge- that multiple perspectives and agendas exist and must be examined.
So, have at it & have fun!
Write in cuneiform!
Sketch like DaVinci!
Listen to Rhapsody in Blue!
Whatever you do, don’t let your students leave your classroom thinking that history is something they find in a textbook, or that there is only one story to an event. This lesson must be repeated and practiced over and over and over.
What are your favorite ways to enliven social studies instruction? How do you like to make sure your history class is centered on primary sources?
Next Week: Using Primary Sources to Teach Social Justice | <urn:uuid:96e79788-d8bf-42a9-a4f4-5b634aa07b2c> | CC-MAIN-2017-17 | http://blog.biguniverse.com/teach-your-students-cuneiform-and-other-ideas-primary-sources-across-the-curriculum-pt.-3 | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123632.58/warc/CC-MAIN-20170423031203-00029-ip-10-145-167-34.ec2.internal.warc.gz | en | 0.951199 | 734 | 3.703125 | 4 |
A Tale of Two Cities
A Tale of Two Cities (1859) is a novel by Charles Dickens, set in London and Paris before and during the French Revolution. With well over 200 million copies sold, it ranks among the most famous works in the history of fictional literature.
The novel depicts the plight of the French peasantry demoralized by the French aristocracy in the years leading up to the revolution, the corresponding brutality demonstrated by the revolutionaries toward the former aristocrats in the early years of the revolution, and many unflattering social parallels with life in London during the same time period. It follows the lives of several protagonists through these events. The most notable are Charles Darnay and Sydney Carton. Darnay is a French once-aristocrat who falls victim to the indiscriminate wrath of the revolution despite his virtuous nature, and Carton is a dissipated British barrister who endeavours to redeem his ill-spent life out of his unrequited love for Darnay's wife.
The 45-chapter novel was published in 31 weekly installments in Dickens' new literary periodical titled All the Year Round. From April 1859 to November 1859, Dickens also republished the chapters as eight monthly sections in green covers. Dickens' previous novels had appeared only as monthly installments. The first weekly installment of A Tale of Two Cities ran in the first issue of All the Year Round on 30 April 1859. The last ran thirty weeks later, on 26 November.
- Cricket House Books, December 2012
- Download options:
- EPUB 2 (Adobe DRM)
You can read this item using any of the following Kobo apps and devices: | <urn:uuid:760fb455-b4dc-42ba-82d6-3603876909a7> | CC-MAIN-2016-36 | https://store.kobobooks.com/en-us/book/A-Tale-of-Two-Cities/9fW9Vsk0AkG_r4r4WfDkZQ?MixID=9fW9Vsk0AkG_r4r4WfDkZQ&PageNumber=1 | s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292697.31/warc/CC-MAIN-20160823195812-00190-ip-10-153-172-175.ec2.internal.warc.gz | en | 0.940788 | 340 | 2.890625 | 3 |
"Kung fu" is one of the best forms of physical exercise. It combines development of muscles with self-defensive movements. It gives equal work to the foot, hand, and the whole body. Advantages are that this gymnastics is so amusing besides instructive that persons once having taken a lesson seldom give it up. In other words, persons stick to it without being compelled to do so and what this means is understood by all engaged in the phyical culture work.
There is a new meaning in "Kung fu" which is found in the work of the Chin Woo Athletic Association. It is mental development and moral uplift, based upon the old principle of "Sound Mind in a Sound Body."
~ S.S. Chow, 1919
Jingwu: The school that transformed kung fu
by Brian Kennedy and Elizabeth Guo. | <urn:uuid:31b0cac9-ed8b-4c05-8082-310350482eea> | CC-MAIN-2018-17 | http://daoji.blogspot.com/2010/10/ | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948285.62/warc/CC-MAIN-20180426144615-20180426164615-00296.warc.gz | en | 0.953955 | 177 | 2.5625 | 3 |
Ancient Religion Islam
Islam is the religion founded by Muhammad and articulated in the Qur’an, a book considered by its adherents to be the verbatim word of the single incomparable God, and the Islamic prophet Muhammad's demonstrations and examples (called the Sunnah, collected through narration of his companions in the volumes of Hadith) for implementing it. The word Islam is a homograph, having multiple meanings, and a triliteral of the word salam, which directly translates as peace. Other meanings include submission, or the total surrender of oneself to God. An adherent of Islam is a Muslim, meaning "one who submits". The word Muslim is the participle of the same verb of which Islam is the infinitive. Muslims regard their religion as the completed and universal version of an original monotheistic faith that was revealed to many peoples before, including to Adam, Abraham, Moses, Jesus, and other prophets. Islamic tradition holds that previous messages have changed and the revelations were distorted over time.
The first sura in a Qur'anic manuscript by Hattat Aziz EfendiMuslims consider the Qur'an to be the literal word of God; it is the central religious text of Islam. Muslims believe that the verses of the Qur'an were revealed to Muhammad by God through the angel Gabriel on many occasions between 610 and his death on June 8, 632. The Qur'an was reportedly written down by Muhammad's companions (sahabah) while he was alive, although the prime method of transmission was orally. It was compiled in the time of Abu Bakr, the first caliph, and was standardized under the administration of Uthman, the third caliph. From textual evidence Islamic studies scholars find that the Qur'an of today has not changed significantly over the years.
The Qur'an is divided into 114 suras, or chapters, which combined, contain 6,236 ayat, or verses. The chronologically earlier suras, revealed at Mecca, are primarily concerned with ethical and spiritual topics. The later Medinan suras mostly discuss social and moral issues relevant to the Muslim community. The Qur'an is more concerned with moral guidance than legal instruction, and is considered the "sourcebook of Islamic principles and values". Muslim jurists consult the hadith, or the written record of Muhammad's life, to both supplement the Qur'an and assist with its interpretation. The science of Qur'anic commentary and exegesis is known as tafsir.
The Qur'an states that all Muslims must believe in God, his revelations, his angels, his messengers, and in the "Day of Judgment". Also, there are other beliefs that differ between particular sects. The Sunni concept of predestination is called divine decree, while the Shi'a version is called divine justice. Unique to the Shi'a is the doctrine of Imamah, or the political and spiritual leadership of the Imams.
Muslims believe that God revealed his final message to humanity through the Islamic prophet Muhammad via the archangel Gabriel (Jibril). For them, Muhammad was God's final prophet and the Qur'an is the holy book of revelations he received over more than two decades. In Islam, prophets are men selected by God to be his messengers. Muslims believe that prophets are human and not divine, though some are able to perform miracles to prove their claim. Islamic prophets are considered to be the closest to perfection of all humans, and are uniquely the recipients of divine revelation-either directly from God or through angels. The Qur'an mentions the names of numerous figures considered prophets in Islam, including Adam, Noah, Abraham, Moses and Jesus, among others. Islamic theology says that all of God's messengers since Adam preached the message of Islam-submission to the will of God. Islam is described in the Qur'an as "the primordial nature upon which God created mankind", and the Qur'an states that the proper name Muslim was given by Abraham.
Religious practices include the Five Pillars of Islam, which are five duties that unite Muslims into a community. The Five Pillars of Islam are five practices essential to Sunni Islam. Shi'a Muslims subscribe to different sets of pillars which substantially overlap with the Five Pillars. They are:
The shahadah, which is the basic creed or tenet of Islam: "'ashadu 'al-la ilaha illa-llahu wa 'ashadu 'anna muhammadan rasulu-llah", or "I testify that there is none worthy of worship except God and I testify that Muhammad is the Messenger of God." This testament is a foundation for all other beliefs and practices in Islam. Muslims must repeat the shahadah in prayer, and non-Muslims wishing to convert to Islam are required to recite the creed.
Salah, or ritual prayer, which must be performed five times a day. Each salah is done facing towards the Kaaba in Mecca. Salah is intended to focus the mind on God, and is seen as a personal communication with him that expresses gratitude and worship. Salah is compulsory but flexibility in the specifics is allowed depending on circumstances. In many Muslim countries, reminders called Adhan (call to prayer) are broadcast publicly from local mosques at the appropriate times. The prayers are recited in the Arabic language, and consist of verses from the Qur'an.
Zakat, or alms-giving. This is the practice of giving based on accumulated wealth, and is obligatory for all Muslims who can afford it. A fixed portion is spent to help the poor or needy, and also to assist the spread of Islam. The zakat is considered a religious obligation (as opposed to voluntary charity) that the well-off owe to the needy because their wealth is seen as a "trust from God's bounty". The Qur'an and the hadith also suggest a Muslim give even more as an act of voluntary alms-giving (sadaqah).
Sawm, or fasting during the month of Ramadan. Muslims must not eat or drink (among other things) from dawn to dusk during this month, and must be mindful of other sins. The fast is to encourage a feeling of nearness to God, and during it Muslims should express their gratitude for and dependence on him, atone for their past sins, and think of the needy. Sawm is not obligatory for several groups for whom it would constitute an undue burden. For others, flexibility is allowed depending on circumstances, but missed fasts usually must be made up quickly. Some Muslim groups do not fast during Ramadan, and instead have fasts different times of the year.
The Hajj, which is the pilgrimage during the Islamic month of Dhu al-Hijjah in the city of Mecca. Every able-bodied Muslim who can afford it must make the pilgrimage to Mecca at least once in his or her lifetime. When the pilgrim is about ten kilometers from Mecca, he must dress in Ihram clothing, which consists of two white seamless sheets. Rituals of the Hajj include walking seven times around the Kaaba, touching the Black Stone, running seven times between Mount Safa and Mount Marwah, and symbolically stoning the Devil in Mina. The pilgrim, or the hajji, is honored in his or her community, although Islamic teachers say that the Hajj should be an expression of devotion to God instead of a means to gain social standing.
The word Islam is a verbal noun originating from the triliteral root s-l-m, and is derived from the Arabic verb Aslama, which means "to accept, surrender or submit." Thus, Islam means acceptance of and submission to God, and believers must demonstrate this by worshipping him, following his commands, and avoiding polytheism. The word is given a number of meanings in the Qur'an. In some verses (ayat), the quality of Islam as an internal conviction is stressed: "Whomsoever God desires to guide, He expands his breast to Islam." Other verses connect islam and din (usually translated as "religion"): "Today, I have perfected your religion (din) for you; I have completed My blessing upon you; I have approved Islam for your religion." Still others describe Islam as an action of returning to God-more than just a verbal affirmation of faith. Another technical meaning in Islamic thought is as one part of a triad of islam, iman (faith), and ihsan (excellence); where it represents acts of worship (`ibadah) and Islamic law (sharia).
Commonly cited estimates of the Muslim population in 2007 range from 1.3 billion to 1.8 billion. Approximately 85% are Sunni and 15% are Shi'a, with a small minority belonging to other sects. Some 30-40 countries are Muslim-majority, and Arabs account for around 20% of all Muslims worldwide. South Asia and Southeast Asia contain the most populous Muslim countries, with Indonesia, India, Pakistan, and Bangladesh having more than 100 million adherents each. According to U.S. government figures, in 2006 there were 20 million Muslims in China. In the Middle East, the non-Arab countries of Turkey and Iran are the largest Muslim-majority countries; in Africa, Egypt and Nigeria have the most populous Muslim communities. Islam is the second largest religion after Christianity in many European countries
Ramadan and Fasting Tradition:
Fasting during Ramadan, the Muslims holy month, was ordained during the second year of Hijrah. Why not earlier? In Makkah the economic conditions of the Muslims were bad. They were being persecuted. Often days would go by before they had anything to eat. It is easy to skip meals if you don’t have any. Obviously fasting would have been easier under the circumstances. So why not then?
The answer may be that Ramadan is not only about skipping meals. While fasting is an integral and paramount part of it, Ramadan offers a comprehensive program for our spiritual overhaul. The entire program required the peace and security that was offered by Madinah.
Yes, Ramadan is the most important month of the year. It is the month that the believers await with eagerness. At the beginning of Rajab --- two full months before Ramadan --- the Prophet Muhammad, Sall-Allahu alayhi wa sallam, used to supplicate thus: "O Allah! Bless us during Rajab and Sha’ban, and let us reach Ramadan (in good health)."
During Ramadan the believers get busy seeking Allah’s mercy, forgiveness, and protection from Hellfire. This is the month for renewing our commitment and re-establishing our relationship with our Creator. It is the spring season for goodness and virtues when righteousness blossoms throughout the Muslim communities. "If we combine all the blessings of the other eleven months, they would not add up to the blessings of Ramadan," said the great scholar and reformer Shaikh Ahmed Farooqi (Mujaddad Alif Thani). It offers every Muslim an opportunity to strengthen his Iman, purify his heart and soul, and to remove the evil effects of the sins committed by him.
"Anyone who fasts during this month with purity of belief and with expectation of a good reward (from his Creator), will have his previous sins forgiven," said Prophet Muhammad, Sall-Allahu alayhi wa sallam. "Anyone who stands in prayers during its nights with purity of belief and expectation of a reward, will have his previous sins forgiven." As other ahadith tell us, the rewards for good deeds are multiplied manifold during Ramadan.
Islam on Terrorism:
One of the distinctive characteristics of the times we live in is the overwhelming presence of violence in our societies. Whether it is a bomb going off in a market place, or the hijacking of an aircraft where innocent people are held at ransom to achieve political ends, we live in an age, where the manipulation and loss of innocent lives has become commonplace.
Such is the all-pervasive nature of indiscriminate violence, that "terrorism" is considered as one of the prime threats to peace and security in our societies.
The word terrorism came into wide usage only a few decades ago. One of the unfortunate results of this new terminology is that it limits the definition of terrorism to that perpetrated by small groups or individuals. Terrorism, in fact, spans the entire world, and manifests itself in various forms. Its perpetrators do not fit any stereotype. Those who hold human lives cheap, and have the power to expend human lives, appear at different levels in our societies. The frustrated employee who kills his colleagues in cold-blood or the oppressed citizen of an occupied land who vents his anger by blowing up a school bus are terrorists who provoke our anger and revulsion. Ironically however, the politician who uses age-old ethnic animosities between peoples to consolidate his position, the head of state who orders "carpet bombing" of entire cities, the exalted councils that choke millions of civilians to death by wielding the insidious weapon of sanctions, are rarely punished for their crimes against humanity.
It is this narrow definition of terrorism that implicates only individuals and groups, that has caused Muslims to be associated with acts of destruction and terror, and as a result, to become victims of hate violence and terror themselves. Sometimes the religion of Islam is held responsible for the acts of a handful of Muslims, and often for the acts of non-Muslims!
Could it be possible that Islam, whose light ended the Dark Ages in Europe, now propound the advent of an age of terror? Could a faith that has over 1.2 billion followers the world over, and over 7 million in America, actually advocate the killing and maiming of innocent people? Could Islam, whose name itself stands for "peace" and "submission to God", encourage its adherents to work for death and destruction?
For too long, have we relied on popular images in the media and in Hollywood films, for answers to these pertinent questions. It is now time to look at the sources of Islam, and its history to determine whether Islam does indeed advocate violence.
Islam - The Great Unifier:
Far from being a militant dogma, Islam is a way of life that transcends race and ethnicity. The Glorious Qur’an repeatedly reminds us of our common origin:
"O mankind! We created you from a single (pair) of a male and a female, and made you into nations and tribes, that ye may know each other (not that ye may despise (each other). Verily the most honored of you in the sight of God is (he who is) the most righteous of you. And God has full knowledge and is well acquainted (with all things)."
Thus, it is the universality of its teachings that makes Islam the fastest growing religion in the world. In a world full of conflicts and deep schisms between human beings, a world that is threatened with terrorism, perpetrated by individuals and states, Islam is a beacon of light that offers hope for the future.
References : wikipedia.org, whyislam.org, denvermosque.org
* Eminent Cartoonist RK Laxman
* Why Are Indian Kids So Good at Spelling?
* SP Balasubrahmanyam - Legendary Indian Film Singer
* The Guru for today's world
* Growing Social Networking
* Diwali Celebrations at The White House
* Ancient Religion Islam
* Indian Classical Dance - Our rich heritage
* Incredible India for ancient wonders
* 15th Indian Parliament
* Mother's Day Special
* Bura Na Mano! Holi Hai!!
* Living Positive
* India at a glance in the year 2008
* 75 years of Rich Indian Cricket
* Recession - What is all about it?
* Terrorism in India
* Beautiful Colorado for the Fall Colors
* Homoeopathy - Alternate popular medicine
* Increasing medical tourism industry in India
* Visiting parents from India
* Keeping the Indian Dance Tradition
* Indian kids excelling in prestigious contests
* India's remakable multi-satellite launch
* Outsourcing to India Trends
* Expanding World Cricket with IPL Franchises
* Reducing demand for Gold in India
* Historic Hindu prayer opened Colorado State Senate
* Right time to return to India?
* The Importance of Yoga for Kids
* India Real Estate Investments
* Amazing New Golden Temple in Vellore, Tamilnadu, India
* Response to Welcome by Swami Vivekananda
* The power of Vishnu Shahasra Namam
* How do we align outselves with God in our day to day life? | <urn:uuid:d3883318-bd44-4da8-9358-b3edcda2d998> | CC-MAIN-2017-26 | http://desishades.com/features.php?tab=329 | s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323807.79/warc/CC-MAIN-20170628222452-20170629002452-00280.warc.gz | en | 0.957904 | 3,439 | 3.953125 | 4 |
When one hears the term power supply, he will just conclude that it must be an electric power source. With the aid of certain forms of equipment, electrical energy along with other types of energy is successfully transferred into an output. The definition and function of this product makes it more closely linked to supplies or gadgets that need electricity.
Electrical power is among the terms essential to power supply. It is the 8DG60349AA that converts electrical power in one form to another. This could include a summary of sources including batteries, chemical fuel cells, solar energy, alternators and generators and other sorts of energy storage systems. Below is actually a detailed description of each of these power supplies.
Linear power supplies – Probably the most popular kinds of linear power supplies is definitely the AC linear power. When transforming the present that comes from an AC to your lower voltage, a transformer is used. For production of direct current or DC from your AC, one utilizes the rectifier. The second produces pulsating current through the existence of a capacitor. The particular voltages produced may depend upon the load contained in the AC supply. This sort of linear power is classified under such category since it functions by using a linear regulator that stabilizes and adjusts the equipment voltage.
Aside from AC linear power, battery power is in fact among the linear types of power supply and is also highly favored as it makes traditional power supplies be a little more portable and reliable. It is comprised of a wide array of cells which are electromechanically connected to one another. Such connection results to the preferred voltage needed by a certain gadget to reach its optimum functions. Lead-acid, nickel-cadmium, and dry cell batteries are popular subcategories of batteries.
Switched-mode power supplies – This really is entirely distinct from the linear form. Additionally, it produces AC or DC power but uses a varied principle. There is absolutely no need to make use of a transformer so that you can rectify the transformation of AC to DC voltages. The voltage which is produced by this method is broken down further into small bits of electronic switches. The switches are enlarged once it comes with an increasing power requirement for a certain system or industry.
Aside from those two main categories to get a power supply, there are other forms utilized in many industries. There are programmable in addition to uninterruptible power supplies. High voltage power supplies will also be portion of the list. These UN375 may be applied in computer systems and welding industries.
An isolation transformer is an electronic device that prevents the appliances from short-circuit and fire hazards. It is really an industrial device, meaning it really is commonly used inside the industrial sector. The main feature of this device is that it supplies the voltage current for the devices. Besides industrial uses, it is also found in a number of other sectors like Hospitals, Telecom, plus it etc. This product is highly in demand as it lowers down the high voltage and mainly preferred to use for sensitive devices. An isolation transformer is generally placed in hospitals since it helps their sensitive devices to have the accurate rate of the power source. Here pubuid some terrific benefits of having this device.
It Gives You Safety Towards The Devices – The key reason for its too much use is it provides safety for the devices. It lowers down the power source and supplies the accurate level of current for the sensitive devices. Additionally, it prevents the unit from electric shocks and short circuits; this will make it the most preferred device among industrial sector.
Minimises The Surges – The primary benefit of alcatel 7750 is it decreases the power surges. It will help within the smooth working from the devices and provides them a long life. You can even install this gadget to perform your electrical cycle smoothly.
It Reduces The Noise – An isolation transformer is usually recognized for its noise reduction policy. This product helps to cut down the noise that develops due to vibration and grounding. It will be the best device that must be installed in the industrial sector because it has many great benefits and will not create noise; hence, fails to disturb your working premises. | <urn:uuid:41500627-bc29-4a0f-9ede-0bf815c719a1> | CC-MAIN-2019-30 | http://bada-world.info/2019/04/18/lucent-5ess-find-answers/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195528869.90/warc/CC-MAIN-20190723043719-20190723065719-00220.warc.gz | en | 0.944591 | 839 | 3.3125 | 3 |
Blockchain is often referred to as a harbinger of transparency, but what does that really mean? Transparency is not defined as eliminating privacy and sharing every aspect and minutia of our daily lives, contrary to what entities like Facebook and Instagram would prefer. Rather it’s about making key bits of information public in order to prevent deleterious backroom deals and behind-the-curtain agreements that benefit a few to the detriment of many. The financial crisis of 2008 and the Facebook-Cambridge analytica scandal can both be traced to a lack of transparency. Blockchain technology is heralded for increasing transparency by rendering all transactions occurring on the Blockchain a matter of public record, but transactions are also known as being anonymous. How can the ledger that is the Blockchain be transparent and anonymous at the same time?
The first Blockchain application, Bitcoin, was introduced by Satoshi Nakamoto as a way to increase transparency in financial transactions, but not to render privacy obsolete. The Bitcoin Blockchain is transparent in the sense that all transactions are public record, so the amount being exchanged between entities is available for anyone to witness, but the entities involved in the transactions are pseudonymous (not anonymous, as many people assume). The distinction between pseudonymous and anonymous is an important one. True anonymity would connote no way to tie the actual identity of the individual in question to his/her actions. Pseudonymity means that the identity of the transactor is concealed, but not impossible to reveal.
One of the biggest criticisms of Bitcoin as well as other cryptocurrencies has been that by enabling pseudonymity, the technology sets up a magical tech playground for criminals. This notion has been debunked by investigators who have been able to use processes of triangulation to piece together the identity of those conducting illegal activities using cryptocurrency. Even if a criminal were careful to never reveal his or her identity or use any centralized platforms, those he has transacted with may not be so circumspect. The chances are high that one of the individuals or entities with whom the criminal has transacted will use a centralized service in which he/she must provide identification. Coinbase, for example, is a centralized platform in which users must provide ID to link their bank accounts and begin exchanging fiat currency to cryptocurrency. If an investigator subpoenas Coinbase for information on a particular user who is suspected of conducting illegal transactions, Coinbase must comply with the request. As government agencies get more savvy tracking down individuals illegally using cryptocurrencies, the current negative association of cryptocurrency as “dark money” will fade fast from the cultural repertoire.
Though the need for increased transparency in financial transactions may be seemingly obvious post 2008, transparency is still lacking in many other facets of society as well. Take today’s social media environment as an example. The current digital landscape is fraught with data silos and controlled by large, centralized platforms, like Facebook, YouTube, and Twitter, that hold the keys to the proverbial digital kingdom. In this case, “kingdom” means sovereignty over troves of data, and these centralized entities make billions by offering access to this data for a price. Advertisers will pay handsomely for any information that will enable better targeting to consumers, selling more product, and, ultimately, generating greater ROI. A few vital players miss out on this access and subsequent economic rewards: content creators and users. The solution that my team at Contentos and others are interested in exploring, is using Blockchain technology to endow these participants with more control over the ways their data is exploited.To put it simply, instead of personal data being collected by tech giants and sold to the highest bidders, users could have autonomy to determine whether to make their data available and at what price.
Another aspect of the current media ecosystem suffering a scarcity of transparency is the pricing structures that formulate the relationship between advertisers and content creators. It’s not easy for YouTubers to decipher the percentage of income earned by hosting ads on their channels. Such payouts are determined by algorithms whose inner machinations are hidden from the average user’s eye.
One blogger breaks down YouTube’s ad rate calculations as follows:
“YouTube counts impressions (when a viewer clicks on or watches your ads) and for every 1,000 impression, you’ll get roughly $7.50. The problem is how the impression are counted, as it is really dependent on how engaged your audiences are. If a viewer decides to skip through the ads or use an ad-blocker, then you won’t get paid for the view. Because of that, high views doesn’t necessarily translate to a well-earning video. A video with 10,000 views might only have 3,000 thousand impressions, which roughly translates to only $22.50.”
A given YouTuber’s revenue is incredibly troublesome to calculate because the content creator lacks access to the information held by the platform. This dynamic disempowers the creator while endowing YouTube with all the power (in the form of data). We haven’t seen the equivalent of labor unions fighting YouTube for more fair algorithms, in part because the factors determining income are so ambiguous that it would be difficult to challenge. Our goal in building the Contentos protocol is to ensure more information is available to creators, allowing them to make their own financial and creative decisions in the media ecosystem.
By increasing transparency, whether in the realms of finance or media, we empower people with the information they need to make decisions that benefit themselves and that of the greater community, as opposed to closed-door systems that are constructed to benefit those with access to data, information, and value at the expense of everyone else. Blockchain is the ideal technology to use in injecting greater transparency into systems because of its capabilities for recording every transaction on an immutable ledger while allowing users to retain a level of pseudonymity that does not infringe upon their rights to privacy. | <urn:uuid:b216c135-94dd-45db-81bb-2b1b1a51bec5> | CC-MAIN-2020-24 | https://www.blockchainbeach.com/what-does-transparency-really-mean/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348496026.74/warc/CC-MAIN-20200605080742-20200605110742-00062.warc.gz | en | 0.947895 | 1,205 | 3.1875 | 3 |
Separate names with a comma.
Discussion in 'Ducks' started by animalpro24, Jan 2, 2012.
How long do runners lay for until they are done. My girl is a year and a half old and isn't laying.
Healthy runners will lay for years, I have read. They slow down a bit after three or four years, but keep laying.
My duck Neun developed egg yolk peritonitis, and that kept her from laying. Sadlly, it was fatal.
Hmmm. She hasn't lain in about a couple months. Is there something I need to check for, if any thing is wrong with her?
The things that cause birds to lay eggs are called Ova (translated: egg). All females hatch with ova inside them. Chickens have about 1000 ova, and Ducks about 1500. Ova are the most important element of her body's egg-making function, yet, there is no function to make more Ova, so when they've laid 1500 eggs, they will never lay aggain. This is why Red Sexlinks and Khaki campbell 'burn out'; they've been breed to use up most of the Ova in a very short time, and that is why a Runner will lay consistently for 2 yrs, and then lay lower numbers every year, and a Rouen can lay 25 eggs a year consistently for 10 yrs. And that's why egg ducks will lay for a longer time than egg chickens; they can make more eggs.
Is she molting or has the weather changed where you are? My runner girls stopped laying a couple of months ago when the weather was getting cooler. It would be cold one day and then hot again the next and threw them off. I am asuming that once the weather warms back up my girls will pick up again so I would go with weather. | <urn:uuid:52a2edc9-6237-4bab-850b-fafb544c70cd> | CC-MAIN-2017-39 | https://www.backyardchickens.com/threads/how-long-do.615737/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818692236.58/warc/CC-MAIN-20170925164022-20170925184022-00627.warc.gz | en | 0.970014 | 388 | 2.53125 | 3 |
Health care workers were placed at risk with scarce mask use or insufficient supply of respirators during H1N1 pandemic during the earliest stages of 2009,claims a study published in the December issue of Infection Control and Hospital Epidemiology, the journal of the Society of Healthcare Epidemiology of America.
The study, led by the Centers for Disease Control and Prevention (CDC), tracked 63 Southern California health care workers who had contact with six of the first eight laboratory-confirmed 2009 H1N1 cases in the U.S. Because these contacts happened before the 2009 H1N1 outbreak had been widely reported, the cases shed light on how well health care workers protect themselves before a direct epidemiological threat becomes evident.
The investigation found that 9 of the health care workers tracked became infected with the 2009 H1N1 virus, likely from contact with infected patients. Twenty of the 63 health care workers reported that they had worn a mask or respirator at least once when in contact with patients, and no one from that group became infected with 2009 H1N1. Meanwhile, 43 workers reported never using a mask around patients, and all 9 infections occurred in workers from this group.
Overall, mask and respirator use was disappointingly low, the researchers report. Only 19 percent reported using a mask during every patient encounter. Use was especially low among outpatient workers, who also made up the majority of those who became infected with 2009 H1N1.
"The findings highlight the challenge of getting health care personnel to routinely wear Personal Protective Equipment," Jenifer Jaeger, MD, MPH, Associate Pediatrician, Massachusetts General Hospital, said. "The study also suggests that greater attention to infection control and preparedness, particularly among outpatient workers, is needed." | <urn:uuid:f54c57d8-0f4e-43b6-bee7-cf663a562953> | CC-MAIN-2017-47 | http://www.medindia.net/news/Health-Care-Workers-Scarce-Mask-Use-During-2009-H1N1-Outbreak-Revealed-94211-1.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934805265.10/warc/CC-MAIN-20171119023719-20171119043719-00593.warc.gz | en | 0.968693 | 357 | 2.53125 | 3 |
If the antecedent of a relative clause is the personal pronoun "you", say, for example, second person singular, should the verb in the relative clause be singular or plural? For example:
Jason, this award is presented to you, who loves debate. (or "... love debate"?)
'You' is a pronoun that is always preceded by a verb conjugated in its plural form, whether singular or plural. Note that in your example, 'Jason' is the antecedent to the pronoun 'you' and not otherwise. An antecedent is a word or phrase which a pronoun refers back to. Keeping aside the above correction, 'loves' is the right conjugation that matches 'you'. We can't say, for instance 'you is'.
|link comment||answered Mar 29 '12 at 21:01 Perpetua New member|
Hero of the day
Person voted on the most questions. | <urn:uuid:16b28ee0-979b-489e-8863-fd4d9638530d> | CC-MAIN-2017-13 | https://www.grammarly.com/answers/questions/4372-relative-clause/ | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188924.7/warc/CC-MAIN-20170322212948-00346-ip-10-233-31-227.ec2.internal.warc.gz | en | 0.891414 | 193 | 2.609375 | 3 |
Something unusual is written in Chapter 8 of the ancient prophetic text of Joshua. As the leader of Israel, Joshua orders an altar of uncut stones be built to worship Yahweh after the great victories at Jericho and Ai. He then proceeded to copy the Torah given by Yahweh to Moses on stones. Why did he do this? What is the significance of the stones?
Throughout the Old Testament this particular Hebrew word for stone spelled Aleph, Beyt, Noon is used as a picture of Messiah to come. In the writings of the prophet Isaiah Chapter 28 verse 16, Adonai Yahweh says:
Behold I lay in Zion for a foundation a stone, a tried stone, a precious corner stone, a sure foundation: he that believeth shall not make haste.
Shall not make haste means will not be disturbed. The implication is clear; Messiah is the bulwark of our faith and can be completely trusted. What can we discover in the Hebrew letters that might give us more understanding?
Aleph is the picture of the strong leader, and is also the number 1 which points to God the Father.
Beyt is the house, the tent, the family dwelling place; and is also the number 2 which identifies God the Son.
Noon is the picture of life or activity and is also the number 50 which points to the Holy Spirit.
Here we see Aleph, a picture of the strong leader providing a family dwelling place where we will enjoy life. Wonderfully, Yahweh has locked for all time in His letters the concept that He has made us family and provided life for us in His son Yeshua, the “rock” of our salvation.
The numbers these letters represent add even more understanding to the mystery.
Here we discover Aleph, or 1, is followed by Beyt, or 2, followed by Noon, or 50. Our “stone” is the work of the Father in the person of the Son by the power of the Holy Spirit!
In Psalm 118:22 we see something very revealing about this precious stone:
"The stone which the builders refused is become the head stone of the corner."
Not only will Messiah be rejected, but He is the head or chief stone. The word head here has to do with the top of a wall. Again, the picture is clear: Messiah is not only the starting place for building our faith, He is the one who caps it or completes it.
The rabbi Paul, writing to the church at Ephesus in Chapter 2 verses 21 and 22, reminds us Yeshua is the chief cornerstone:
"In whom all the building fitly framed together groweth unto an holy temple in the Lord: in whom ye also are builded together for an habitation of God through the Spirit."
When Joshua wrote the words of the Torah on the stones by the altar he was giving us a picture of the Living Word, Yeshua, the rock of our salvation.
But all is not good news; the disciple of Yeshua, named Peter, warns us in his second letter Chapter 2 verse 7 and 8 that:
"Unto you therefore which believe he is precious: but unto them which be disobedient, the stone which the builders disallowed, the same is made the head of the corner, And a stone of stumbling, and a rock of offense, even to them which stumble at the word, being disobedient: whereunto also they were appointed."
The first place this word for stone is found is in the first book of the ancient text in Genesis Chapter 2 verse 12 where the onyx stone is found just outside of the Garden of Eden. The word onyx is not actually found in the Hebrew, but instead, the word “pale” stone is used. Onyx is used here in a descriptive way because it is a translucent stone or a “pale” stone and allows light to pass through it. It is important to note this stone was found outside the garden and was still available to Adam after the fall when he was denied access to Elohim and the tree of life. From the beginning, Elohim has intended to provide Yeshua Ha-Mashiach, who is called the “light of the world” in the Gospel of John Chapter 8 verse 12, as a precious foundation for those who would trust in Him.
In Revelation 2:17 Yeshua Ha-Mashiach gives His beloved disciple John a very interesting promise:
"To him who overcomes, to him will I give some of the hidden manna and I will give him a white stone, and a new name written on the stone which no one knows but he who receives it.”
The one who overcomes is a reference to all those who have put their faith and trust in the saving work of Messiah. But what is the white stone this believer will be given?
The white stone of John’s revelation is the final place where the word stone is found in relation to the Church, those who have placed their trust in Messiah. Here’s the picture. To start with, the stone is not white. The word translated “white” is from the Greek leukos and its root means “light.” The word “stone” used here refers to a pebble that is well-worn from handling and is used as a ballot or a ticket of admission. The “new” in the new name does not mean new in the sense of having never been seen before, but new in the sense of “fresh.” The preposition “on” used when the new name is “written on the stone” means superimposed. No matter how you look at this stone that is filled with light you can always see the name written on it.
And what is the name written there? The best possibility is the name for LORD in the Old Testament, YHWH, pronounced Yahweh or Yehova. In the pictograph, it reads Yood the hand, Hey behold, Vav the nail, and Hey behold: hand behold nail behold. Whenever that name is found, it is a picture of the finished work of Messiah on the cross. Behold the hand, behold the nail. This is the name that is always fresh and never old. Just as the doubts of Thomas, one of the disciples of Yeshua, were dispelled in the Gospel of John Chapter 20 verse 28 when he saw the nail-scarred hands, we also recognize Yeshua for who He truly is when we understand the work He has done for us.
So the final mystery is this. The one who overcomes, the believer in Yeshua, receives a small polished stone filled with the light of Yahweh and having on it His name testifying to His finished work on the cross. Possession of it guarantees access or admission into the presence of our Heavenly Father from whom we have been separated since the fall of Adam in the garden. Only those who have received Yeshua will understand the name. If you have received Yeshua, the letters on your stone will likely appear scarlet as a further reminder of the bloodshed on your behalf.
|Like this article? Share it using the social sharing links. Subscribe to The Living Word Discovery and get amazing Hebrew Word Studies delivered to you every week!||Get the book and start your own journey into the Hebrew Language!|
|Subscribe!||Get it Now!| | <urn:uuid:8fc0faf4-f267-4b5c-a05f-a1f2077c184b> | CC-MAIN-2020-16 | http://livingwordin3d.com/discovery/2018/02/01/the-mystery-hidden-in-eben-the-overcomers-white-stone/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371880945.85/warc/CC-MAIN-20200409220932-20200410011432-00520.warc.gz | en | 0.960634 | 1,545 | 2.6875 | 3 |
Mascenic School District is committed to providing school environments that promote and protect children’s health, wellness and ability to learn by supporting behaviors that include healthy eating and physical activity. “Health” is a state of complete physical, mental and social well-being and not merely the absence of disease or infirmity.
Students must stay home if they are sick, someone in their household tested positive for COVID-19, or are awaiting test results. Please call your school's nurse if you are unsure before sending your student to school. Click the "Stay Home When Sick" document for more information.
Close contacts no longer need to quarantine unless they live in the same household as a COVID positive person and./or can not avoid contact to a COVID positive person. The "Self-Observation Guide" will help you understand what to do if you have been identified as a close contact but do not need to quarantine.
Those that are required to quarantine can find more information in the "Self-Quarantine Guide".
Those who are positive for COVID 19 are required to isolate. More information on isolation can be found in the "Self Isolation Guide".
If you have any questions relating to COVID-19 mitigation or protocols, please reach out to your school's nurse to ask questions.
The Mascenic Regional School District COVID Response Protocol link will provide the districts up to date methods for managing COVID-19 for our schools.
On September 7th the Mascenic School Board adopted a definition of suspected case as follows:
A suspected case is defined as a person who meets the clinical AND epidemiological criteria as outlined below:
Acute onset of fever AND cough; or
Acute onset of ANY THREE OR MORE of the following signs or symptoms: fever, cough, general weakness/fatigue, headache, muscle pain/weakness, sore throat, inflammation of the mucus membranes in the nose, difficult or labored breathing, lack or loss of appetite/nausea/vomiting, lack or loss of smell/taste, diarrhea, altered mental status with no other documented source of symptoms (ie. allergies).
Residing or working in a setting with high risk of transmission of the virus: for example, closed residential settings and humanitarian settings, such as camp and camp-like settings for displaced persons, any time within the 14 days before symptom onset; or
Residing in or travel to an area with community transmission anytime within the 14 days before symptom onset. | <urn:uuid:5a2cc12f-09ec-4813-b374-692e555aa208> | CC-MAIN-2022-27 | https://www.mascenic.org/page/resources | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103669266.42/warc/CC-MAIN-20220630062154-20220630092154-00528.warc.gz | en | 0.92837 | 527 | 2.515625 | 3 |
Dr. Elena Bodnar was born in Ukraine, so it should come as no surprise that the Chernobyl nuclear accident and images of 9/11 moved her to brainstorm diligently for ways to make events like these more survivable for the human beings unfortunate enough to be involved in them. Yet, many people were still quite surprised when Bodnar presented a hot-pink prototype of a practical gas mask at Harvard University. Nevertheless, Bodnar won an Ig Nobel prize for doing outstanding and seemingly ridiculous research that is in reality extremely useful.
See video below:
More specifically, Bodnar has created something called an emergency bra: a bra that doubles as a face mask to guard against chemical explosions, biological hazards, and other unforeseen deadly situations. The EBra is pretty much like any other bra until the need arises for it to become something more; the cups can be separated, and then all a user needs to do is put their mouth and nose into a cup, extend the bra strap over their head, and then breathe naturally.
What’s more, the bra can also act as two protective face masks, which could not only save the life of the wearer but also the life of a wearer’s loved one. As mentioned, Bodnar won the 2009 Ig Nobel Public Health Prize as a result of her ingenuity: “It takes only 25 seconds for average woman to use this personal protective device. Five seconds to remove, convert and apply your own mask, and 20 seconds to wonder who the lucky man is she is going to save.”
As discussed, Bodnar began her quest with the 1986 Chernobyl nuclear disaster in mind:
“If people had had cheap, readily available gas masks in the first hours after the disaster they may have avoided breathing in Iodine-131, which causes radiation sickness. You have to be prepared all the time, at any place, at any moment, and practically every woman wears a bra.”
CNET has reported that a counterpart device for men is also being designed, but it could prove to be more challenging than Bodnar’s product—due to certain required differences in shape and size, of course.
It’s important to note that Bodnar has no issues with acknowledging the humorous aspects of her ideas, her designs, and her products:
“I have no doubt my demonstrations will generate some laughs. However, I also look forward to addressing some serious questions from the British public. I hope audiences at Oxford University, Imperial College and elsewhere will leave thinking about the potential risks they face. I will consider my goals to be accomplished if I make people remember the importance of being prepared for the unexpected.”
Indeed, if a cause is worthwhile and beneficial for all of human kind, why not embrace all aspects of it? Bodnar realizes that her products have the abilities to save unnumbered lives both now and in the future. Whatever puts more of them into the hands of people who might need them is both positive and productive.
Dr. Elena Bodnar, currently the founder and President of the Trauma Risk Management Research Institute in Chicago, is an internationally recognized scientist with over 20 years of experience in clinical research and development of novel diagnostic and therapeutic modalities. She managed the Electrical Trauma Research Program at the University of Chicago, and collaborated with the World Health Organization and the International Atomic Energy Agency on projects related to the Chernobyl nuclear accident. Her areas of scientific expertise are trauma risk management strategies and long term health consequences of radiation exposure and electrical trauma. She has authored numerous scientific publications and book chapters. – https://www.ebbra.com/our-story | <urn:uuid:ab7bf833-4bf2-4b3d-9278-224cd1cb5b5b> | CC-MAIN-2023-06 | https://www.cookiesandcowpies.com/remove-your-bra-its-science/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499891.42/warc/CC-MAIN-20230131222253-20230201012253-00838.warc.gz | en | 0.962888 | 743 | 2.625 | 3 |
Santee Indians. A tribe, probably Siouan, formerly residing on middle Santee River, South Carolina, where Lawson in 1700 found their plantations extending for many miles. One of their villages was called Hickerau. While friendly to the white people, they were at war with the coast tribes. According to Rivers 1Rivers, Hist. S. C., 94, 1874 , they had two villages with 43 warriors in 1715, and were then settled 70 miles north of Charleston. Bartram (Tray., 54, 1791) tells us that in 1715 they sided with the Yamasee against the British, and that they were attacked and reduced by the Creeks, who were allies of the British. It appears from South Carolina colonial documents that the Santee and Congaree were cut off by the “Itwans and Cossabos,” coast tribes in the English interest,’ and the prisoners sold as slaves in the West Indies in 1716. Those that escaped were probably incorporated with the Catawba. Lawson states that their chief was an absolute ruler with power of life and death over his tribe, an instance of despotism very rare among Indians. Their distinguished dead were buried on the tops of mounds, built low or high according to the rank of the deceased, with ridge roofs supported by poles over the graves to shelter them from the weather. On these poles were hung rattles, feathers, and other offerings from the relatives of the deceased. The corpse of an ordinary person was carefully dressed, wrapped in bark, and exposed on a platform for several days, during which time one of his nearest kinsmen, with face blackened in token of grief, stood guard near the spot and, chanted a mournful eulogy of the dead. The ground around the platform was kept carefully swept, and all the dead man’s belongings gun, bow, and feather robes-were placed near by. As soon as the flesh had softened it was stripped from the bones and burned, and the bones themselves were cleaned, the skull being wrapped separately in a cloth woven of opossum hair.
Enter a grandparent's name to get started.
The bones were then put into a box, from which they were taken out annually to be again cleaned and oiled. In this way some families had in their possession the bones of their ancestors for several generations. Places where warriors had been killed were sometimes distinguished by piles of stones or sticks, to which every passing Indian added another.
After the manner of the Cherokee and other Southern tribes the Santee kept corn in storehouses raised on posts and plastered with clay. They made beautiful feather robes and wove cloth and sashes of hair.
For Further Study
The following articles and manuscripts will shed additional light on the Santee as both an ethnological study, and as a people.
- Mooney, Siouan Tribes of the East, 80, 1894.
- Lawson (1700), Hist. Carolina, 34, 1860.
Footnotes: [ + ]
|1.||↩||Rivers, Hist. S. C., 94, 1874| | <urn:uuid:728b451e-3856-496a-b716-13cb5f604c86> | CC-MAIN-2017-22 | https://www.accessgenealogy.com/native/santee-tribe.htm | s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463608058.57/warc/CC-MAIN-20170525102240-20170525122240-00146.warc.gz | en | 0.986713 | 650 | 4 | 4 |
FALLOWIn Constantine, MI, the Seed Corn Capital of the World, it is the fallow season.
The fields are fallow. Snow drifts and dusts and melts in the fields, and then drifts and dusts some more. Some fields are seeded with winter wheat, resting. Some are soil bound snug by peas, green nitrogen, sprouted and decomposing into humus. Some are stubble. Stubble.
Barns lie quiet. Storage barns at Pioneer hold 950,000 bushels of seed corn, remaining from the three million bushels processed, waiting to be ordered, bagged, shipped and planted.
Villa-Miller’s machinery is stored, dry, enclosed for this season while this seed corn farmer spends the fallow season visiting with in-laws in Costa Rica and checking commodities.
But the other barns sleep. They have been sleeping for decades. They sleep the sleep of death.How long can a field lie fallow yet remain waiting, fertile? It can take five hundred to one thousand years for an inch of soil to form.
Yet in one generation, just since the 1980’s, a family seed corn farm's barn can die. They fall along the roads each season, some caught by wind, by fire, by water. First the roof caves, then the beams lean, and finally the gaping doors close on themselves. A final breath and they are gone.
Seeds die to live. They enter the soil’s darkness, and moist, only there can they be born again.
Is it so with barns, with farming? | <urn:uuid:dff0cda3-9082-4a79-86d3-1c692af5641d> | CC-MAIN-2016-18 | http://storybarn.blogspot.com/2012/01/fallow.html | s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860118321.95/warc/CC-MAIN-20160428161518-00063-ip-10-239-7-51.ec2.internal.warc.gz | en | 0.934046 | 335 | 2.859375 | 3 |
The savagery of the French Revolution, which declared the Rights of Man but turned to bloody-handed tyranny and repressive terrorism, has long puzzled historians. Among the list of causes, and one rarely remembered, Elizabeth Wilson writes, was the painter Jacques-Louis David. Today, he is best known as one of the great masters of French painting a defining master of an austere neoclassical style that dominated European art for almost a half-century and one of the precursors of modern painting. But for a few terrifying years David was also "the propaganda minister of the French Revolutio a man who could turn an unruly mob, ready to kill for a loaf of bread, into tearful patriots willing to die for the cause."
Wilson's story traces David's life and work, his great ambition and success. That success was mostly nonpolitical until 1785, when one of his monumental and posterish neoclassical paintings, The Oath of the Horatii, in which three brothers swear to fight to the death for their homeland, became linked to patriotic fervor as the Revolution was about to get under way. David went on not only to document the Tennis Court Oath, when the Revolution more or less officially began, but to produce on demand "state funerals and martyr portraits, multimedia pageants with a cast of thousands all designed to keep the revolutionary faith alive, even when bodies were piling up ten deep beside "la guillotine." His most startling picture, and one that links him most clearly to modern painting, is the martyr portrait of Jacobin leader Jean-Paul Marat, dead in his bath after being stabbed by Charlotte Corday.
The guillotine devoured many revolutionary leaders, and, indeed, David had declared he wanted to die with Robespierre, the principal architect of the Terror. But he survived, instead, and soon began fawning upon the young Napoleon. David was a turncoat and a sycophant, but a great painter. "He was born into a world in which painting was for the privileged few," Wilson writes. "His images showed the power of art to electrify even the commonest citizen." | <urn:uuid:9c7b15f4-7402-41c1-a6ff-251969ee8ab3> | CC-MAIN-2022-49 | https://www.smithsonianmag.com/history/jacques-louis-david-60191520/ | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710218.49/warc/CC-MAIN-20221127073607-20221127103607-00222.warc.gz | en | 0.974003 | 442 | 2.890625 | 3 |
‘Technology has made life different, but not necessarily more stressful’, says a recent article in the New York Times, summarising the findings of a study by researchers at the Pew Research Center and Rutgers University. It is often thought that frequent internet and social media use increases stress. Digital unplugging, along with losing weight and quitting smoking, is seen as a healthy thing to do. But, said the article, we needn’t worry so much. Frequent internet and social media users don’t have higher stress levels than less frequent users, and indeed women who frequently use Twitter, email and photo-sharing apps (and who use these media for life-event sharing more than men – who tend to be less self-disclosing online) scored 21% lower on the stress scale than women who did not.
I suggest that, far from being reassuring, these results are very sinister indeed. They indicate that internet technology (or at least something that has happened to humans at the same time as internet technology has been happening to them) has effected a tectonic transformation in the human constitution. The outsourcing, digitalization and trivializing of our relationships should make us stressed. If it doesn’t, something seriously bad has happened. The stress response enables us to react appropriately to threats. Switch it off, and we’re in danger. Only a damaged immune response fails to kick off when there are bacteria around. A tiger confined in a tiny concrete pen has lost a lot of its tigerishness if it doesn’t pace frustratedly up and down, its cortisol levels through the roof.
The views, opinions and positions expressed by these authors and blogs are theirs and do not necessarily represent that of the Bioethics Research Library and Kennedy Institute of Ethics or Georgetown University. | <urn:uuid:96a9b2e1-b713-44b6-b149-e86a5c1232e2> | CC-MAIN-2021-43 | https://bioethics.georgetown.edu/2015/02/humans-are-un-made-by-social-media/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00297.warc.gz | en | 0.95779 | 369 | 2.5625 | 3 |
A similar process was under way in the Nile valley. Ever since the voyages of the Portuguese explorers at the close of the fifteenth century, European trade with the East had been carried on almost exclusively by the route around the Cape of Good Hope. But from the outset, there was some interest in shortening the route by digging a canal east of Cairo, where only a low, swampy isthmus separated the Mediterranean from the Red Sea. The Ottoman Turks, who controlled the area, had considered constructing a canal in the sixteenth century, but nothing was accomplished until 1854, when the French entrepreneur Ferdinand de Lesseps signed a contract to begin construction of the canal. The project brought little immediate benefit to Egypt, however, which under the vigorous rule of the Ottoman official Muhammad Ali was attempting to adopt reforms on the European model. The costs of construction imposed a major debt on the Egyptian government and forced a growing level of dependence on foreign financial support. When an army revolt against growing foreign influence broke out in 1881, the British stepped in to protect their investment (they had bought Egypt’s canal company shares in 1875) and set up an informal protectorate that would last untilWorldWar I. The weakening of Turkish rule in the Nile valley had a parallel farther to the west, where autonomous regions had begun to emerge under local viceroys in Tripoli, Tunis, and Algiers. In 1830, the French, on the pretext of reducing the threat of piracy to European shipping in the Mediterranean, seized the area surrounding Algiers and annexed it into the kingdom of France. By the mid- 1850s, more than 150,000 Europeans had settled in the fertile region adjacent to the coast, while Berber resistance continued in the desert to the south. In 1881, the French imposed a protectorate on neighboring Tunisia. Only Tripoli and Cyrenaica (Ottoman provinces that make up modern-day Libya) remained under Turkish rule until the Italians took them in 1911–1912. | <urn:uuid:af40ff94-28f3-4c32-b0e7-0bf02f891968> | CC-MAIN-2023-14 | https://www.worldhistory.biz/contemporary-history/twentieth-century-world-history/94751-imperialist-shadow-over-the-nile.html | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00078.warc.gz | en | 0.964339 | 406 | 3.8125 | 4 |
To Chi or not to Chi?
Monday 21 September 2015
When and how can students consider using the Chi squared test of independence?
This blog post is a result of having received lots of related questions on this topic either online or at workshops. I thought I might just write some thoughts down ina blog post before perhaps making a more formal entry about this on the website. So, the following is just a list of key points for students and teachers to consider about this test.....
It is probably worth noting here that students will need to know how to conclude these tests using both of the following methods.
Using the p-number - as a measure of the probability of independence. If it is lower than significance level (eg 10%, 0.1) then that means that there is a less than 10% chance that the variables are independent so you can conclude that they are not.
Using the calculated chi squared statistic - as a measure of the error between the observed and expected values. If the error is bigger than the critical value (which is related to both the significance level and the degrees of freedom) then we reject the hypothesis that the variables are independent. In exams, the critical value will be given
I have heard some brilliant acronyms for helping students to remember this and I am sure they work well. My preference though is to help students really understand what these statitsics mean. P is a measure of probabilityb of independence, the calculated statistic is a measure of error.
Students may also be expected to demonstrate that they know how to calculate an expected frequency.
Students are expected to conclude their tests using the calculated statistic and comparing it to the critical value. (The second of the methods used above). This is presumably because this method allows students to demonstrate the stages of the calculation where the p-number would not.
When is a test appropriate?
Although not an official rule, it is good guidance for our students that .....
- IF they are looking for a relationship between two numerical data fields they should use a scattergraph.
- IF one or both of the data fields are categorical, they should use a Chi squared test of independence..
What if one of the data fields is numerical?
In this case, students need to put this data in to categories. For example, a student might test to see if GDP is dependent on the hemisphere in which the country is in. In this case students would need to decide on categories for GDP. These might be Low, medium and high. In many cases, this is an arbitrary decision and students should try to justify it. One approach in this case might be to use the first quartile of the results as the 'low' category, the interquartile range as the 'medium' and the upper quartile as the 'high'.
Students should then tally all of their data in to one of these tables. For the example gievn below, the table might look like this.....
This would be a 2 x 3 table ans students would take each country in the survey and put a tally in the appropriate cell. Perhpas the country is in the Northern hemisphere but has a low GDP and so you would put a tally in the top left column. At this stage, it is good to have data on lots of countries so there is a decent total. Otherwise there is a risk that the low frequencies will undrmine the test (see below).
Once students have put the observed frequencies in their contingency table, then they should do a quick test - probably with the GDC - to check the expected frequencies. They must stick to the following rule.
NO EXPECTED FREQUENCIES MUST BE LESS THAN 5
This is said to undermione the test since at some point in the calculation we divide by the expected frequency. If that number is too small then the effect of small variations is disproportionately large.
There after, students are expected to show how they calculate the error for each of the six (in this example) cases. See the example below. It is not a complete example, but just shows the highlights. This test was done to test for a relationship between the gender of a youtuber and the number of subscriptions to their channel.
Yates's Continuity Correction
If students end up with a 2 x 2 contingency table then they are required to use this correction approach. Again, this is related to disproportionate effe t of small variations on smaler numbers (degree freedom just 1).
This is easily done - When we do Observed frequency subtract expected frequency, we then subtract a further 0.5 before squaring. Students are only required to recognise the need and use the correction rather than explain why it is needed. | <urn:uuid:1b07a9f3-fd06-4c25-b50c-b678dcb4efbf> | CC-MAIN-2019-18 | https://www.thinkib.net/mathstudies/blog/19648/to-chi-or-not-to-chi | s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578529898.48/warc/CC-MAIN-20190420160858-20190420181952-00025.warc.gz | en | 0.947986 | 965 | 3.53125 | 4 |
1802 Directive from James Monroe
An April 16, 1802, directive from James Monroe, then governor of Virginia, reminds Loudoun County court officials to forward to the executive office a copy of the entire court proceedings, including all testimony, concerning any slave "tried and convicted of a crime which affects his life" (i.e., carries the death penalty). In response to the planned 1800 slave uprising known as Gabriel's Conspiracy, the General Assembly passed a series of measures to prevent future rebellions. Among them was the 1801 "Act to empower the Governor to transport slaves condemned when it shall be deemed expedient." Monroe sent this broadside to the county courts to remind court officials to keep him apprised of trials in which slaves were condemned to die. The governor could then choose between having the convicted slaves executed or transported out of the state. | <urn:uuid:47e68dc8-4b3b-40d9-b35b-5346cf113675> | CC-MAIN-2018-39 | https://www.encyclopediavirginia.org/media_player?mets_filename=evr6460mets.xml | s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155924.5/warc/CC-MAIN-20180919043926-20180919063926-00261.warc.gz | en | 0.965219 | 173 | 2.875 | 3 |
The Energy Department's INCITE program, which stands for the “Innovative and Novel Computational Impact on Theory and Experiment,” recently put out a report highlighting the ways our supercomputers are catalyzing discoveries and innovations. Above, computing provides an unparalleled ability to model and simulate Type Ia (thermonuclear-powered) supernovas. The ability to do 3D, large-scale simulations of these explosions led to the discovery of an entirely new and unexpected explosion mechanism, termed the gravitationally confined detonation (GCD) model.
Image: courtesy Flash Center for Computational Science, University of Chicago
2 of 7
A supernova explosion from the core collapse of a super-giant star reveals a shock-wave like behavior. This discovery provides a more detailed understanding of how a collapsing star can eject most of its layers and spread elements like iron and oxygen into the surrounding universe.
Image: courtesy Oak Ridge National Laboratoy | David Pugmire
3 of 7
Transportation is 28 percent of US energy consumption. This visualization of the formation and velocity of turbulence at the boundary layer between a vehicle and the medium through which it moves could provide dramatic fuel savings when applied to material design.
Image: courtesy Universidad Politécnica de Madrid | Juan Sillero
4 of 7
This rendering illustrates fields of temperature and pressure in a helicopter combustion chamber. The simulation contained 330 million variable elements and allowed engineers to test the efficiency and stability of different fuels and material combinations.
Image: courtesy Turbomeca and CERFACS | Pierre Wolf
5 of 7
Supercomputers have only recently paved the way for tiny proteins like this ALG3 to be rendered in enough detail to understand their dynamics. A discovery in this area could lead to major advances in creating biofuels, cleaning up waste, and sequestering carbon.
Image: courtesy Oliver Lange
6 of 7
A global particle-in-cell simulation shows core turbulence in a fusion reaction. Sustaining effective fusion reactions, in which the fusion energy produced exceeds the input energy, could pave the way to a clean, safe, and limitless source of energy.
Image: courtesy OakRidge National Laboratory | Scott Klasky
7 of 7
The M8 simulation revealed regions at risk during a magnitude-8 quake by charting peak horizontal ground velocities.
Image: courtesy University of Southern California | Geoffrey Ely | <urn:uuid:2ebe95d8-9f38-45f0-99b6-c1ceed7cbace> | CC-MAIN-2015-48 | http://energy.gov/photos/supercomputers-pictorial-superpowers?page=0%2C6 | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398464253.80/warc/CC-MAIN-20151124205424-00215-ip-10-71-132-137.ec2.internal.warc.gz | en | 0.869734 | 499 | 3.84375 | 4 |
About KTEI's First Nation Student Success Program (FNSSP)
“The First Nation Student Success Program (FNSSP) is a proposal-driven program designed to support First Nation educators on reserve (Kindergarten to Grade 12) in their ongoing efforts to meet their students' needs and improve student and school results. The Program's overall objective is to improve the achievement of First Nation students on reserve by focusing on the priority areas of literacy, numeracy and student retention."
There are three program components that work together to achieve this overall objective. The results of the student learning assessments and other information will help schools identify needs, targets and activities to improve results in the areas of literacy, numeracy and retention. Student learning assessments will also provide data for performance measurement, which will in turn generate reports on results for students, families, communities and INAC. The FNSSP focuses on three components - school success plans, student learning assessments and performance measurement.
If you are a KTEI FNSSP member school or would like to know more about what KTEI's FNSSP current work is about: CLICK HERE
KTEI FNSSP Member Schools
Kenjgewin Teg Educational Institute (KTEI) is the aggregate organization that oversees the project management
and works in collaboration with the following 11 FNSSP participating schools:
1. Constance Lake First Nation – Mamawmatawa Holistic Education Centre
2. Dokis First Nation – Kikendawt Kinomaadii Gamig
3. M’Chigeeng First Nation – Lakeview School
4. Nipissing First Nation – Nbisiing Secondary School
5. Sagamok Anishnawbek – Biidaaban Kinomaagegamik
6. Shawanaga First Nation – Kinomaugewgamik Elementary School
7. Sheshegwaning First Nation – St. Joseph’s Anishnabek School
8. Temagami First Nation – Laura McKenzie Learning Centre
9. United Chiefs and Councils of Mnidoo Mnisiing, Kenjgewin Teg Secondary School
10. Wasauksing First Nation – Wasauksing Kinomaugewgamik
11. Whitefish River First Nation – Shawanosowe School
About Structural Readiness - An Initiative & Component INAC Program of FNSSP
What is structural readiness?
Structural readiness activities focus on increasing and supporting the capacity of First Nation regional management organizations (RMO), like KTEI, to deliver school education services. Structural readiness is entirely optional which means additional funding will be made available to the RMO.
Indigenous and Northern Affairs Canada is expected to do education reform to the outdated funding formula that current community schools on reserve currently receive. The formula is expected to be updated in 2017 with an overall roll up per student that will include all grants and proposals. This roll up per-student-amount will include the New Paths Funding, FNSSP, Tribal Council Second Level Services and Early Learning proposals that First Nations apply to annually. This will cease to exist and be rolled into one amount per student. This will ensure stable, predictable and equitable funding that will be less onerous then the current process. In addition to the above designated organizations can act to coordinate, deliver and oversee the responsibility for the education systems in the First Nations with schools. Click on the INFOGRAPHIC at the right for more insight into the national, regional and local context of First Nation education - and insight into the types of discussions and planning that First Nation communities will need to consider as part of 'structural readiness' and their First Nation education community choices.
CLICK HERE to print a special issue answering commonly asked questions on Structural Readiness. | <urn:uuid:53f5929a-5b0a-4f64-a5bf-f446bb555ef4> | CC-MAIN-2017-34 | http://www.ktei.net/first-nations-student-success-program.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886133449.19/warc/CC-MAIN-20170824101532-20170824121532-00026.warc.gz | en | 0.908537 | 779 | 2.703125 | 3 |
Although the Lakeshore’s name comes from an Indian legend about a mother black bear and her cubs, black bears are rarely seen within the park, though they are becoming more common in Michigan. There are over 50 other species of mammals that can be seen depending on the time of year and watchfulness of the visitor. The lakes and streams have beaver, otter, muskrat, and mink. Many of the small mammals in the park are inconspicuous such as meadow voles, deer mice, weasels, and shrews, but eastern chipmunks are numerous and are not inconspicuous. They frequent the campgrounds, especially on South Manitou Island and can be a nuisance for campers. Fox squirrels and gray squirrels, including the black phase of the gray squirrel, are common. A sighting of a northern flying squirrel should be treasured since they are primarily a nocturnal (active at night) species. Meadow vole runways are exposed as the snow melts and let you know how busy they were during the winter. Long lines of protruded soil tell of an eastern mole who is feeding on earthworms under the ground. Bats are busy little insectivores that are seen flying overhead at dusk while they feed on moths and mosquitos. Among the bats found in the park are the big brown bat, hoary bat, red bat, and silver-haired bat.
Some mammals, such as coyotes and opossums, are fairly recent arrivals to the area. The white-tailed deer were not present in significant numbers until the forests were cleared. Raccoons continue to benefit from man’s activities and are common. If you do not see these animals during your hikes, then watch for their tracks which are commonly seen in sandy or muddy areas. Be sure to enjoy the occasional serenade of a coyote family as you are settling into bed at your campsite. Bobcats are elusive and live in some of the more wild parts of the park and neighboring swamps. Sightings of cougars continue to be reported each year and research efforts are underway to verify that this species has returned to Michigan and the Lakeshore area. | <urn:uuid:6bfb01b4-bd71-4a40-ac56-241b6adb3d04> | CC-MAIN-2015-18 | http://www.nps.gov/slbe/learn/nature/mammals.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1430454443858.51/warc/CC-MAIN-20150501042723-00071-ip-10-235-10-82.ec2.internal.warc.gz | en | 0.973409 | 450 | 2.84375 | 3 |
If you or someone you know are experiencing unwanted, distressing or obsessive thoughts surrounding eating habits and/or body image perception, it may be more serious than you think.
It is somewhat normal to have occasional thoughts or feelings about your diet and appearance, however, it is important to take notice of the frequency and severity of these thoughts as it may begin to affect your mental wellbeing and daily life.
If not treated, other illnesses may begin to develop such as depression and anxiety affecting you personally and others around you. Eating disorders can affect anyone of any age, gender or background so if you feel as though these thoughts and feelings are becoming obsessive, it’s important to speak to someone straight away.
Understanding the symptoms, causes and signs of the 5 major disorders may help you to identify whether your experience is a problem. Here’s everything you need to know:
Overview: An extreme, calorie-restricted diet due to a fear of gaining weight. Sufferers view their physical appearance to be significantly different to how they really look; overweight or larger in perspective leading to an underweight BMI. People with this illness are often moderately – extremely malnourished, fatigued and trapped in negative thought patterns affecting their life due to constant, obsessive worries surrounding food intake and body image. However, keep in mind that you do not have to appear with protruding bones to have Anorexia Nervosa as severity can fluctuate. Anorexia Nervosa can affect both men and women of any age or background.
Causes: People with extremely low self-esteem who may idolise or feel pressured to match their appearance to other body images. This may be brought on by a constant association with media channels or pressure from outside environments such as people they know and compare with, occupation (e.g. fashion industry).
Sufferers from depression, anxiety and/or stressful situations in their life are also at high risk in developing the illness. Other psychological factors that trigger may include obsessive-compulsive disorder (OCD) or other traits of extreme perfectionism, as well as Body Dysmorphia. An imbalance of hormones due to extreme dieting plays a vital part in the brain’s ability to think and function properly. Those with family history of the illness may also be at a greater risk as it often runs down the family line whether genetically or through modeling other’s behaviours such as having a mother who is obsessed about their weight or appearance.
Signs & Symptoms: If you believe yourself or someone you know may be developing Anorexia Nervosa, it is important to get a professional diagnosis to confirm the illness. You can also look for symptoms such as: significant weight loss in a short period of time, excessive exercise, calorie counting, avoiding carbohydrates and fats in diet, evidence of laxative intake, low energy levels, facial differences; skin colour changes & sunken eyes, behavioural changes and talk of low self-esteem/self-worth, a distorted view of body physique. Other personal symptoms that you may feel are changes in libido, hormonal imbalances causing mood swings and menstrual cycle disruptions including cessation of having a menstrual period.
Overview: An inability to control eating habits and low body image perception. Bulimia Nervosa is the medical diagnosis of someone who experiences repetitive binge eating episodes followed by purging their food shortly after in order to avoid further calorie intake by vomiting or consuming laxatives. Purging is caused by a strong obsession of body image satisfaction and feelings of shame and guilt surrounding binge eating episodes. Unlike Anorexia Nervosa, it is uncommon to lose a large amount of weight because your body absorbs calories as soon as it enters your mouth. Around less than 50% of calories are eliminated through vomiting and around 10% from using laxatives therefore it is more likely that a person will either gain weight or maintain weight due to water loss. Similar however, people will also often stick to a strict diet or fast and involve excessive exercise as a part of their routine. People often become secretive and lie about what they have ate. Bulimia can become more severe if not treated and can last up to a lifetime as it is usually unnoticed by others.
Causes: Psychological factors in which affect a person’s ability to control their eating habits may be caused by stressful life situations, low self-esteem, abuse and/or trauma. People may turn to food as a source of comfort in their life however if negative body image is seen to be a major issue, this leads to repetitive purging. It is an unbreakable cycle of feeling unsatisfied or unhappy without food followed by feelings of disgust and shame. Genetics can play a role in the likelihood of developing this illness if is known to be present in family history. Other environmental or cultural influences can also play a part especially seen among women. This may be due to the fact that more women are likely to obsess over weight or body image than men due to pressures from media sources or experiencing constant comparisons to other women. Being bullied by family members or peers for weight as a child can also be a contributing developmental factor.
Signs & Symptoms: Certain behavioural patterns to look out for may include someone being constantly worried or obsessed with their body shape or weight and holding a fear of weight gain. If you are personally affected, you may notice yourself unable to control the amount of bingeing you are doing in one sitting and feeling as if you can’t control what you eat. If you are forcing yourself to purge (forced vomiting, excessive exercising or using laxatives) after bingeing episodes, this is a strong indicator that you should speak with a professional to avoid further damage to you physical and mental health. You may find your diet is unbalanced day to day, some days might entail fasting or restricting calories whilst others involve binging episodes. Hiding evidence of food that has been consumed and being secretive about what you have eaten is also another sign that can impact greatly as this is what causes the illness to often go unnoticed by others and therefore difficult to seek help independently. Other physical signs may start to appear after excessive vomiting including; calluses or red sores on knuckles and hands, damaged teeth/gums caused by stomach acid and swelling in the cheeks due to enlarged glands.
Binge Eating Disorder
Overview: A person suffering with Being Eating Disorder will experience uncontrollable urges to eat large portions of food every couple of hours or less even if they don’t feel hungry, forcing their bodies to feel uncomfortable and fatigued. Food is not purged, ultimately people result with a large amount of weight gain and will develop feelings of emotional shame and guilt around their habits. Although these feelings develop, the illness causes an emotional cycle leading to eating more food in order to cope mentally with their unhappiness. Stress and boredom may also play a vital part in the continuity of these habits. Often these habits are kept a secret from others as they are ashamed and embarrassed, people may also lie about the meals they’ve consumed throughout the day in order to feel as if they can continue eating when around other people; although eating in front of other people can be difficult.
Causes: The exact causes of the illness may differ for each person depending on certain biological, psychological and environmental factors in their life or struggles they may be dealing with. Biological factors may be due to an imbalance of hormones which regulate sugar and hunger cravings. Many factors can contribute to these hormones becoming imbalanced including stress, sleep deprivation, toxins, and other medical conditions. Other chemical imbalances in the brain which regulate addictions may come into play, causing an urge to compulsively eat. Psychological challenges such as depression is an extremely common link with binge eating due to the chemical Dopamine in our brain that is released when we do things that make us feel good; eating. It is a temporary alleviation for depression, however when a person has strong self-loathing feelings of body dissatisfaction and self-esteem they may feel as if there is no end, leading to a vicious cycle. Environmental factors may involve challenges in which a person has previously faced or is currently facing in their life. Traumatic experiences can trigger a person to begin binge eating which may last for long periods of time and may worsen if not treated with professional help. People can also resolve to binge eating to help themselves deal with emotional difficulties caused by social pressure and criticism about their body image or weight.
Signs & Symptoms: You may notice yourself or someone around you developing signs of binge eating. The most common symptoms you may find yourself feeling/doing include: being secretive about food portions/number of meals/types of food, hiding food wrappings or evidence from other people, choosing to eat alone as opposed with other people, eating whilst you are already satisfied or full, experiencing an uncontrollable urge or craving, thinking about food for the majority of your day, feelings of shamefulness and guilt after eating, having a low self esteem and perception of your body image. Signs you may notice from other people around you whom you suspect to be binge eating may include: lazy and fatigued the majority of the time, unhappy or depressed, feeling anxious about their body image, spending large amounts of money on food, rapid weight gain.
Overview: The inability to eat anything that may be considered ‘unhealthy’ or lacking nutritional value. This illness is most commonly adopted by people who are likely to suffer from other syndromes such as obsessive-compulsive disorder (OCD). People suffering from Orthorexia have obsessive worries about the ingredients within a meal and will likely remove themselves from situations that involve eating food they have not prepared themselves such as events that serve lunch, dinner at a friend’s house, etc. This starts to affect their state of happiness due to the extent of the concerns. Unlike other eating disorders, the focus of Orthorexia is not generally based around how a person perceives their weight or body image, instead they develop a focus around a healthy diet and become heavily concentrated and obsessed with the quality of food and the health benefits they will gain.
Causes: When significant lifestyle changes are made to better improve a diet due to health concerns, Orthorexia can be developed by taking these concerns to an unhealthy or extreme level. People with obsessive tendencies such as perfectionism or control are at a greater risk of developing symptoms when it comes to any changes in their life or goals they largely focus on. When there is pressure from outsiders such as a career or goal, it can be easier to switch your mentality from a normal to a competitive, obsessive way of thinking about food. It can affect anyone of any age, gender or background who may feel a certain pressure towards a healthy lifestyle or have existing tenancies to avoid failure.
Signs & Symptoms: Some body image worries may be of concern however the most common signs include: avoiding food that someone else has prepared, avoiding substances such as sugar, dairy or carbohydrates, obsessing over ingredients in every meal/packet/etc., high concern with nutritional value, high concerns with the food others are eating, anxious about the food that may be present at an event, etc., idolising others as role models via social media or other platforms. Where healthy eating turns into an Eating Disorder such as Orthorexia is where this healthy eating starts to cause significant psychological distress and impact on the person’s daily functioning.
Overview: The polar opposite to Anorexia Nervosa; sufferers from Muscle Dysmorphia view their physiques to be significantly smaller to how they really look. Worrying thoughts and obsessions surrounding muscle mass percentage and appearance begin to actively take over a person’s mental health as diet and everyday routines are drastically changed. Sufferers will hold fear that if they are not exercising enough or doing the right type of exercise, they will lose muscle mass. Similar with their diet, if they are not consuming enough of the right foods, they worry it may interfere with their ability to gain muscle. There is an extremely low self-esteem factor involved, leading to the mentality that muscle gain will be the only way they will be satisfied with their body image. Muscle Dysmorphia greatly impacts a majority of men in comparison to women due to large amounts of pressure put on from the people around them and stereotypical media platforms.
Causes: Similar to other eating disorders, causes are greatly influenced by a number of biological, psychological and environmental factors. If someone has quite a significant history of dealing with abuse, bullying or other sorts of trauma it can create an obsessive need for approval and satisfaction within themselves, primarily from other people. Underlying issues of low self-esteem can also impact as a means to resolve the issue by ‘improving’ their self appearance rather than dealing with their concerns in a healthier, more long-term sustainable manner. Relationships can also be a major factor; especially men in particular may see themselves as unworthy of love in comparison to other men who appear much ‘larger’ than them. Fearing isolation and being alone will then in turn motivate them to undergo excessive exercise and highly concerned eating habits. Similar to some other eating disorders, symptoms of depression, anxiety or obsessive-compulsive disorder/other perfectionism-type tendencies that pre-exist in a person may place them at a higher risk of developing this illness.
Signs & Symptoms: The main warning signs to look out for include: obsessive worrying about appearance, weight and muscular percentage, constant fear of losing muscle due to lack of exercise or diet, fear of weight loss, excessive exercise needed to maintain or build extra muscle, worrying that other lifestyle commitments may interfere with gym sessions or meals, creating unhealthy routines in order to achieve unrealistic goals, a fear against unhealthy food that doesn’t provide enough quality.
If you feel as though you’d like to get in touch with us or speak about any current concerns involving you or someone you know, we are here to listen.
Ashley Gilmour, our Clinical Psychologist holds extensive experience in dealing with a range of eating disorders with people of all ages and backgrounds. Ashley offers a tailor-made treatment plan suited to your particular needs, concerns and lifestyle to help you achieve your goals.
By visiting your local GP, you can receive an Eating Disorder Management Plan which allows you to claim the Medicare rebate of 40 sessions at Vitality Unleashed Psychology as well as 20 dietician sessions per year.
If you have any questions or need professional help for dealing with eating disorders, contact us at our clinic today on 07 5574 3888 or email us. | <urn:uuid:b2c03c12-035b-4aa5-9778-269fa8274149> | CC-MAIN-2021-31 | https://www.vitalityunleashed.com.au/eating-disorders-the-signs-to-look-out-for/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154408.7/warc/CC-MAIN-20210802234539-20210803024539-00247.warc.gz | en | 0.962654 | 2,968 | 2.890625 | 3 |
If you had asked someone about blockchain a few decades ago, you would have been derided and dismissed as trivial. Blockchains have grown into various varieties depending on their architecture and setup over the last several years.
The material stored on the blockchain's blocks and the activities conducted by the many participants on the blockchain networks can be controlled based on how the blockchain is built and how it is anticipated to execute the desired business function.
Public and private blockchains are the two most prevalent types. Numerous cryptocurrency networks and individual businesses heavily utilize them.
Enterprises are perpetually unsure about public and private blockchain technologies. Here, we'll delve deeper into the features of public and private blockchains and compare them. Once you understand the similarities and differences between them, you can easily choose the one that is most suited to your needs.
As a blockchain solution provider, it is essential to offer both private and public blockchain options to cater to the diverse needs of you. We can recommend the best blockchain solution to ensure the success of your platform launch.
A public blockchain network is one that anyone, at any moment, can join. Public blockchains give all nodes equal access to the blockchain, the ability to create new data blocks, and the ability to validate existing data blocks. In general, there are no limits on participation. Additionally, anyone can access the ledger and participate in the consensus process.
Currently, public blockchains are largely used for bitcoin exchange and mining. On these public blockchains, nodes "mine" for cryptocurrency by solving cryptographic equations to create blocks for the transactions requested on the network. In exchange for their efforts, miner nodes receive a small quantity of bitcoin. The miners essentially operate as new-era bank tellers, facilitating transactions in exchange for a fee (or "mine").
For instance, Ethereum is a public blockchain platform.
Public blockchain firms consistently construct each platform with the utmost security in mind. In reality, businesses and organizations are subjected to cyber hacks daily. It's becoming a significant impediment as time passes.
Additionally, it results in billions of dollars in annual losses.
However, companies can easily avoid hacking difficulties with all the security procedures inherent in a public blockchain. Additionally, they can ensure actual value or improved data quality for every project.
As you may already know, the public blockchain is open to everybody, as its name implies. As a result, you can access these platforms regardless of your location. All you'd need is a computer and a reliable internet connection. As a result, you will always benefit from blockchain technology. Additionally, you can utilize it to do business in a secure atmosphere. Additionally, mining can earn you money.
Everyone is anonymous on a public blockchain. There is no reason to use your true name or identity; everything will remain concealed, and no one will be able to follow you based on that.
Because it is a public domain, this provision is primarily for protecting one's personal property. Many criminals prefer to pay for unlawful acts on the dark web with bitcoin. This is also one of the public blockchain's downsides.
Nodes on a public blockchain are not required to follow any regulations. Thus, there is no end to how one might utilize this platform for their advancement.
Nothing, however, comes close to a completely transparent platform. Essentially, public blockchain companies construct their platforms to be completely transparent to anyone on the ledger.
This means that you can access the ledger at any time. As a result, there is no room for corruption or inconsistency. In any case, everyone is responsible for maintaining the ledger and participating in consensus.
True decentralization is achieved with a public blockchain. This is something that private blockchain networks completely lack. Because everyone has a copy of the ledger, it also has a distributed nature.
Essentially, this sort of blockchain does not have a centralized entity. As a result, nodes are completely responsible for network maintenance. They are updating the ledger using a consensus algorithm to improve fairness.
Additionally, these aspects ensure that the system maintains a decentralized environment.
Typically, any network requires the user to adhere to many rules and regulations. However, this is not the case with public blockchain networks. Because there is no central authority monitoring their every step, all users are empowered.
Additionally, these platforms are accessible to the public, so no corporation can prevent you from downloading the nodes and participating in the consensus.
This is something that private blockchain platforms do not offer. Additionally, if you examine private blockchains, you'll notice that users do not have complete freedom. Our ICO experts can help you enter the crypto space.
When data is stored on the blockchain, it cannot be altered.
As opposed to a client-server model, the database is not centralized, and all nodes in the blockchain participate in transaction validation.
As a blockchain development service provider, we empower businesses to explore the digital world by harnessing the potential of public and private blockchain technology.
A network administrator administers a private blockchain, and participants must obtain permission to join the network, making it a permissioned blockchain. A central authority selects who is eligible to be a node in a private blockchain. The central authority does not always grant each node equal rights to execute functions.
The network is controlled by one or more entities, which results in a dependency on third parties for transactions. Only the parties to the transaction will know about it, while others will be unable to access it, i.e., private transactions.
Private blockchains are only partially decentralized due to their restricted public access. Ripple, a business-to-business virtual cryptocurrency exchange network, and Hyperledger, an umbrella project for open-source blockchain applications, are two instances of private blockchains.
Private blockchain solutions are typically more concerned about privacy than public blockchain systems. If you're seeking a solution that can provide your organization with the highest level of anonymity, this is it.
While this may appear a bit extreme, it is the reality. Enterprises are constantly confronted with security and privacy concerns. Additionally, they deal with such sensitive data daily. If even one of them is disclosed, it might suffer a catastrophic loss.
That is why a business must utilize a network capable of securing sensitive information. This is where private blockchains enter the picture.
While public blockchains were the first, they are notorious for their inefficiencies. Why? That is because they are the ones who introduce everyone to the network. As a result, as more individuals attempt to use the features, the platforms cannot support them.
As a result, it accelerates swiftly. On the other hand, private blockchain networks are restricted to few participants. They frequently have specific responsibilities to accomplish. As a result, they have no method of using additional resources and slowing down the platform.
Private blockchains utilize environmentally friendly consensus algorithms to reach an agreement.
Private blockchain solutions are reliable, and they will provide you with the peace of mind you desire. Essentially, each blockchain platform requires you to pay a charge to conduct a transaction. However, the cost might significantly increase on public platforms due to the pressure from nodes seeking transactions.
When there are too many transaction requests, completing them takes time. Additionally, as time passes, the charge climbs significantly. However, this is not the case with private blockchain platforms. Because only a small number of people can request transactions, there are no delays.
Whether you require a private or public blockchain, our team has the expertise to develop a secure, scalable, and efficient blockchain platform. We also provide ongoing support and maintenance to ensure your blockchain remains up-to-date and optimized for your business requirements. Trust us to deliver a reliable blockchain solution that transforms your business idea into a reality.
Whether public or private, both types of blockchains are permissioned. They frequently limit a user's access to a network to a small number of nodes. Additionally, it limits a user's rights on the network's nodes. Other users on the same blockchain are aware of the permissioned blockchain user's identity. Several popular frameworks adhere to the permissioned blockchain development protocol, including Corda, R3, Quorum, B3i, and Hyperledger.
These blockchains have gained popularity as a result of their well-designed governance structures. They are well-organized and assist administrators in maintaining data or updating the network quickly. They are significantly quicker than public blockchain networks.
Consortium/federated blockchains fall within this group when it comes to implementation. External parties are not permitted to participate in these networks. It provides customers with increased scalability, making it an ideal alternative for organizations needing command and control. A public blockchain is completely free, whereas a permissioned blockchain is not.
However, the expense is justified due to the transaction's rapidity and efficiency. Additionally, permissioned blockchains consume little energy, which results in cost savings and benefits the environment.
Due to scalability, computation and energy power, transaction validation speeds, and security, private blockchains look more viable and promising for business adoption than public blockchains. However, a closer examination of private blockchains reveals that they fundamentally contradict the feature that makes blockchain solutions attractive and promising — decentralization.
Each business organization must decide which blockchain type to adopt, public or private, considering their respective company strengths and limitations, aims, and objectives.
Want to find out more about how to proceed with your idea? Contact with our highly experienced hybrid blockchain developer!
Keep CALM & Get In Touch With Our Experts | <urn:uuid:4a4aed72-2224-4a7a-a77c-ae42474d333f> | CC-MAIN-2023-23 | https://www.suffescom.com/blog/public-vs-private-blockchain | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649302.35/warc/CC-MAIN-20230603165228-20230603195228-00709.warc.gz | en | 0.941745 | 1,928 | 2.796875 | 3 |
Creating a clutch out of a book is a fun way to upcycle a damaged book. You will need:
- A book cover
- Spray adhesive
- Glue gun
- Fat quarter of fabric
- A bead
- Ribbon or elastic
Teachers! Did you use this instructable in your classroom?
Add a Teacher Note to share how you incorporated it into your lesson.
Step 1: Creating the Lining
Open the book cover and lay it down flat. Measure the book. Add an inch to each side of the book. Cut the fabric to the appropriate size.
Pin under 1/2" of fabric on each side and iron flat.
Step 2: Creating the Sides
Stand the book on its side with the cover open to about a 45 degree angle.
Trace around the cover then add about a half inch.
Fold a piece of fabric in half. Line the top of the template with the fabric fold and cut. (cut two)
Fold the fabric in half lengthwise and iron down
Step 3: Reinforcing the Spine
Measure the size of the book’s spine. Cut two strips of cardboard the same size.
Glue fabric to one of the strips.
Set both pieces aside to use later.
Step 4: Creating the Catch
Lay the book flat and measure the length. Find and mark the center.
Using a nail, poke through the cover.
Thread a bead with ribbon. Pull the ribbon through the hole. Use hot glue to keep it in place.
On the opposite cover, use another piece of ribbon. Form a loop and glue it to the top center of the cover (interior).
Step 5: Attaching the Sides
Fold the extra half inch of fabric under and iron down.
Using a hot glue gun, glue the tip of the side pieces to the spine of the book.
Next, take the cardboard reinforcement (the one not covered with fabric) and glue it to the spine over the fabric.
Apply hot glue to the 1/2" of fabric you folded and ironed down. Press the fabric along the covers' interior edges.
Step 6: Attaching the Lining
Spray one interior cover with adhesive. Attach the lining.
Spray the interior spine and opposite book cover with adhesive and attach the lining.
Allow the lining to dry.
Using the glue gun, apply hot glue to the underside of the cardboard reinforcement covered with fabric. Place inside the purse on the book’s spine. | <urn:uuid:6c01f3b0-5b54-49b1-a65a-f92e45d82108> | CC-MAIN-2019-39 | https://www.instructables.com/id/Book-Clutch/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514576345.90/warc/CC-MAIN-20190923084859-20190923110859-00254.warc.gz | en | 0.886351 | 526 | 2.984375 | 3 |
For about six to 12 hours as the sun dips low on the horizon in the late spring and early summer, an Antarctic ice shelf comes alive. Tiny quakes rattle the ice by the hundreds of thousands—and their existence could help scientists track how glaciers are melting across the frozen continent.
These quakes, documented in a recent study in the Annals of Glaciology, were discovered somewhat by happenstance by a team of researchers working on Antarctica’s McMurdo Ice Shelf in late 2016 and early 2017. As lead study author Douglas MacAyeal of the University of Chicago explained to Earther, the group had traveled to the area to study how meltwater on the surface of ice shelves—the floating fringes of glaciers that have spilled into the sea—can cause the ice to flex and crack, hastening its demise.
“We put out seismometers on the fly even though we hadn’t originally planned to do anything with seismology,” MacAyeal said. “To see if we could hear the ice shelf crack open if a lake we were studying suddenly drained. The answer was, no, we can’t determine when the ice shelf cracked because the ice shelf is cracking all the time.”
The ice, as MacAyeal put it, was “alive with this buzz, or static surge” that cranked up during the coldest part of each day.
To learn more about the weird static feedback, the researchers placed seismometers out in two different spots on the shelf: One in a cold, dry area featuring a thick layer of firn, or compacted snow, and one in a wetter area to the west where all that surface insulation had been stripped away. The firn-free area, MacAyeal explained, was frozen at the surface, but the ice just below was slushy because as sunlight filters in, its heat becomes trapped as it would in a greenhouse.
“We were a little skeptical that we’d see anything,” MacAyeal said.
But instead, the instrument sitting on the slushy side of the ice shelf recorded intense seismic activity, every day from mid-November to early December as the sun dipped low in the sky and temperatures fell. At the drier site, the researchers didn’t see any of this daily quaking.
What the researchers think is happening is that the frozen cap atop the slushy ice is contracting as the temperatures drop, before snapping back under the force of gravity. Whenever this happens, it creates a small icequake. This explanation was supported both by the overlap between the seismicity and temperature, and by models the researchers constructed.
Although they only looked at two spots on a single ice shelf, the scientists speculate that “thermally regulated seismicity may exist on all ice shelves that undergo surface melting and freezing, especially those that have lost their protective, insulating firn layer.” Such icequakes could, they suggest, offer a practical tool for remotely monitoring how melted ice shelves or glaciers have become, an especially relevant topic in a warming world.
Julien Chaput, a new faculty member at University of Texas, El Paso who wasn’t involved with the paper, told Earther that icequakes have been documented in “a variety of different settings” where some sort of environmental trigger exists, whether that’s the daily motion of the tides, ocean swells, or stress due to the flow of glaciers. (“Frost quakes” were even heard in Chicago during the recent polar vortex-induced cold snap.)
“What’s novel about this study is not so much the fact that the icequakes exist... but rather why they exist,” Chaput wrote Earther in an email. He called the paper a “really lovely bit of investigative reporting” for convincingly tying the quakes to daily temperature swings.
“This observation, and in particular the interpretation of it related to thermal bending of a frozen lid over a partially melted slushy layer, is rather novel, and fits in well with other very recent works... in the sense that the very near surface of shelves can be viewed as a coal mine canary, but that unlike the canary, it makes quite a bit of noise before going silent,” Chaput continued.
MacAyeal said his group is now hoping to set up similar seismic monitoring on the Antarctic Peninsula, a region that has experienced some dramatic warming and that has seen several spectacular ice shelf breakups in recent years. He’s excited to see seismology find practical applications in something as relevant as the melting and demise of Antarctic ice.
“It’s very exciting because seismology would be otherwise dotting the i’s and crossing the t’s of plate tectonics,” MacAyeal said. “Cryoseismology is breaking into a new realm of where we can be useful.” | <urn:uuid:aab80239-ef1d-4648-9c0a-93b492a83380> | CC-MAIN-2020-05 | https://earther.gizmodo.com/researchers-discover-antarctic-ice-shelf-alive-with-tin-1833322877 | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251681625.83/warc/CC-MAIN-20200125222506-20200126012506-00212.warc.gz | en | 0.962885 | 1,039 | 3.796875 | 4 |
ARCHBISHOP OF CANTERBURY: The Primate of All England, Metropolitan of the Province of Canterbury, "first among equals" of all Anglican bishops, and the spiritual leader of the Anglican Communion. The See of Canterbury was founded in 597 with the arrival of St. Augustine, who established his first church in the town. The present Archbishop of Canterbury is the Most Rev. and Right Hon. Justin Welby.
ASSISTING BISHOP: A previously consecrated bishop who is appointed by a diocesan bishop with the consent of the standing committee and diocesan council to provide additional episcopal services in the diocese for a specific term.
This is full initiation by water and the Holy Spirit into Christ's Body, the church. God establishes an indissoluble bond with each person in baptism
. God adopts us, making us members of the church and inheritors of the Kingdom of God (BCP, pp. 298, 858). In baptism we are made sharers in the new life of the Holy Spirit and the forgiveness of sins. Baptism is the foundation for all future church participation and ministry.
BISHOP: The third of the three orders of ordained ministry (deacon, priest, bishop). The major functions are to preside over a diocese, consecrate to the episcopate, ordain to the ministry, administer confirmation, and administer ecclesiastical discipline.
BISHOP COADJUTOR: A bishop who is elected to assist the bishop of a diocese and upon the latter's death, retirement, or resignation, succeed the diocesan bishop in office.
BISHOP SUFFRAGAN: A bishop elected to assist the bishop of a diocese but without the right of succession to the office.
BOOK OF COMMON PRAYER: The title of the book of worship of the Episcopal Church. The Book of Common Prayer contains doctrine that the church requires to be taught and believed, and a collection of historical documents. It sets forth the standard authorized liturgical texts used in the Episcopal Church. The most recent revision of the Book of Common Prayer was adopted in 1979.
CANON: A law of the church set forth by an ecclesiastical council or convention. This term also refers to a person who is connected to a cathedral, usually a staff priest, or a priest of some other high standing.
DEACON: The first of the three orders of ordained ministry (deacon, priest, bishop). Deacons function in most liturgical and pastoral ministries – not in consecrating the elements – and often assist priests in some way. Its institution is found in Acts 6:1-7.
DIOCESE: The territorial limits of jurisdiction of a diocesan bishop.
EUCHARIST: From the Greek word for "giving of thanks," this refers to the service of Holy Communion or the Lord's Supper as a sacrifice of praise or thanksgiving. The sacrament of the Lord's Supper was ordained by Jesus Christ for the continued remembrance of the sacrifice of his death. It may also be called the Mass, Divine Liturgy, Blessed Sacrament, or Holy Sacrifice.
This governing body carries out the programs and policies of General Convention
between sessions of the General Convention. It may initiate and develop such new works as it deems necessary. It is composed of 38 members: 20 members elected by General Convention (four bishops, four priests or deacons, 12 lay persons), and two members elected by each of the nine provinces.
PRESIDING BISHOP: The chief executive, primate, and spiritual leader of the church and the president of the Executive Council and House of Bishops. He or she is elected by the House of Bishops with confirmation by the House of Deputies for a term of 9 years, and when elected, he/she must resign his/her jurisdiction.
PRIEST: The second of the three orders of ordained ministry (deacon, priest, bishop). The word is a shortened form of “presbyter,” or elder. Priests officiate at any of the sacraments and services of worship other than confirmation, ordination, and consecration.
PROVINCE: A group of dioceses, usually in the same region, whose bishops and delegates meet in synod annually or in those years when the General Convention does not meet. A province is also a term used for a self-governing church body that belongs to the Anglican Communion, such as the Episcopal Church or the Church of England. | <urn:uuid:882f416d-9608-4489-b25d-37a247ff5b7b> | CC-MAIN-2020-05 | https://episcopalchurch.org/posts/publicaffairs/brief-dictionary-terms | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251801423.98/warc/CC-MAIN-20200129164403-20200129193403-00485.warc.gz | en | 0.954794 | 936 | 3.1875 | 3 |
“Our worst crime is abandoning the children, neglecting the foundation of life. Many of the things we need can wait. The child cannot. To him we cannot answer ‘Tomorrow’. His name is ‘Today’.”
– Gabriela Mistral
Nothing describes the sorry state of healthcare for newborns in India as succinctly as this quote. It is true that as a developing country we face multiple severe problems but the lack of attention to a problem like this is a grave mistake. While efforts to reduce maternal and child mortality rates over the past 20 years have had a striking impact, stillbirths and newborn deaths have over the same period missed out on the attention they need.
India was home to 700,000 of the one million babies who died within 28 days of birth in South Asia in 2015, according to a Unicef report. It consistently ranked a low sixth in newborn-care services among the eight countries in the south asian region. It lags behind small states like Nepal, Bhutan, Bangladesh, Sri Lanka and Maldives.
India has lived through with a 24% share in newborn deaths in the world in 2016, a United Nations report said. The total number of deaths per day is nearly 15,000.
A vast majority of newborn deaths in the world are the direct result of severe infections at birth, which occurs due to the lack of institutional deliveries. Low birth weight, which is caused by preterm birth, is an underlying factor in 60–80% of neonatal deaths. Most of these deaths occur at home, are unrecorded, and remain invisible to all but affected families.
Neonatal mortality is among the most neglected public health issues. A major barrier in reducing the number of neonatal deaths is the fact that only high-level technology and institutional health facility-based care can reduce neonatal mortality, which is forbiddingly expensive.
The average cost of Neonatal Intensive Care Unit facilities per day is Rs 4000. A ventilator, which is mandatory for baby’s survival, costs as high as Rs. 7000 to 10000, per day. Apart from this, there are expenses like medication and drugs, doctor’s fees, hospital admission charges., They add up..
The Indian government is taking laudable action to provide affordable neonatal care with the ‘Newborn Action Plan – 2014’ through government hospitals. However, the effective implementation of these schemes depends on ground level conditions prevalent at these health care centres. The rampant corruption in government hospitals, and a decided lack of trained staff is causing disasters like Gorakhpur tragedy.
Newborn babies have a right to survive and grow into childhood,and to experience life to their full potential. What can ensure that their right is protected? The answer is Baby crowdfunding.
Baby crowdfunding is a way of raising funds for your baby’s neonatal care. Crowdfunding lets you raise the funds by leveraging the strength of your social network. As the entire process is conducted over the internet it offers you the great comfort. Unlike other traditional methods of fundraising like loans and medical insurances, which consume most of your time in tedious paperwork and bureaucratic processes, crowdfunding leaves you with the maximum time. You can spend all of your precious time with your baby who needs it the most.
If you wish to know more about how crowdfunding works, spend a few minutes researching it online.
If you know someone who is in dire need of funds for his baby, suggest baby crowdfunding to them. If you are the one in need, start a fundraiser today! | <urn:uuid:d806b9a0-9b6c-4c2b-b257-6607c4faf8bb> | CC-MAIN-2019-26 | http://zecmastudio.com/baby-crowdfunding-is-the-answer-to-the-plight-of-neonatal-healthcare-in-india/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999066.12/warc/CC-MAIN-20190619224436-20190620010436-00477.warc.gz | en | 0.95991 | 732 | 2.59375 | 3 |
SHIP CLASS: Florida-class
SHIPS-IN-CLASS (2): USS Florida (BB-30); USS Utah (BB-31)
LENGTH: 521.7 feet (159.01 meters)
BEAM: 88.2 feet (26.88 meters)
DRAUGHT: 28.2 feet (8.60 meters)
DISPLACEMENT (SURFACE): 25,400 tons
PROPULSION: 12 x Boilers with 4 x Parsons steam turbines developing 28,000 horsepower to 4 x Shafts.
SPEED (SURFACE): 21 knots (24 miles-per-hour)
RANGE: 5,779 nautical miles (6,650 miles; 10,702 kilometers)
Detailing the development and operational history of the USS Utah (BB-31) Dreadnought Battleship / Training Vessel.
Entry last updated on 9/16/2017.
Authored by Staff Writer. Content ©www.MilitaryFactory.com.
USS Utah (BB-31) was a Dreadnought battleship belonging to the Florida-class revealed in the period prior to World War 1 (1914-1918). The class numbered just two warships - Utah and the lead ship, USS Florida (BB-30) (detailed elsewhere on this site) - but both managed careers serving through World War 1 and into the inter-war years. While USS Florida was given up in the early 1930s to conform with naval treaties of the day, USS Utah continued on in service into World War 2 (1939-1945) where she was ultimately damaged beyond repair during the Japanese attack on Pearl Harbor (December 1941).
Dreadnoughts were a new class of fighting ship named after the Royal Navy's HMS Dreadnought. HMS Dreadnought rewrote the book on battleship design when she was introduced in 1906 as she held a uniform, big-gunned primary battery with an impressive secondary battery, was powered by steam propulsion, and proved the perfect blend of speed and armor protection. From her introduction on, any previously-designed warship was therefore recognized as "pre-Dreadnought" while HMS Dreadnought went on to signify a whole new class of warship - known simply as "Dreadnought".
USS Utah was ordered on May 13th, 1908 and laid down by the New York Shipbuilding Corporation on March 9th, 1909. She was commissioned for service on August 31st, 1911.
As built, USS Utah followed the standard laid down by USS Florida (and HMS Dreadnought to some extent). She displaced at 25,400 tons (short) and featured a length of 521.7 feet, a beam of 88.2 feet, and a draught of 28.3 feet. Power came from 12 x boilers feeding 4 x Parsons steam turbines driving 4 x shafts at 28,000 horsepower. Maximum speeds could reach 21 knots in ideal conditions. Armor protection ranged from 11 inches at the belt and 12 inches at each turret face to 11.5" at the conning tower and 1.5" along the decks. Her standard crew numbered 1,001 personnel. A twin mast approach (cage masts) was used and two smoke funnels completed her profile.
The armament suite was led by 10 x 12" (300mm) /45 caliber main guns set in five twin-gunned turrets. Two were located forward with the remaining three aft of the superstructure. The secondary battery was made up of 16 x 5" guns located about the sides of the vessel. 2 x 21" torpedo tubes rounded out her armament fit which was largely consistent for warships of the period.
As with most other USN warships originating from East Coast shipyards, USS Utah completed her shakedown cruise and trials between East Coast and Caribbean waters. She joined the Atlantic Fleet in March of 1912 and undertook gunnery exercises as well as training and a European cruise. She then joined sister USS Florida during the American occupation of Veracruz during the Mexican Revolution which marked her first participation in war.
The United States declared war on the German Empire in April of 1917 and thrust America into the European conflict which would last until late 1918. USS Utah was sent to Irish waters where she was used as convoy force protection against German submarines but saw little action beyond this. The war ended with the Armistice of November 1918.
After a 1921 stop at France, she served as the flagship of the American fleet in Europe until relieved in October of 1922. A goodwill tour of South America followed to which then she was decommissioned in 1925 and modernized through improved armor and anti-torpedo protection, a pole mast replacing one of her original cage masts, and a new propulsion scheme which reduced her twin smoke funnel profile to one funnel. Oil-fired boilers replaced her original coal-fired fit and new engines were added.
With the work completed, she undertook another goodwill tour of South but, because of ongoing naval treaties, she was then forced into conversion as a target ship under the designation of USS Utah (AG-16). She survived this role and took part in various fleet exercises during the latter half of the 1930s while undergoing conversion into a n Anti-Aircraft (AA) training platform. From there she transited into Pacific waters and landed at Pearl for August of 1940. More AA training occurred and the vessel made her way to the California coast just before Christmas. Another period of serving as a target ship befell her until relocation to Pearl once more - she arrived there in early April 1941. Another phase of gunnery training followed as did another West Coast visit and she ultimately settled back in Hawaiian waters before the end.
Pearl Harbor Attack and Fate
USS Utah was present on the morning of the Japanese attack on the Harbor (December 7th, 1941). Her mooring at Ford Island made her a tempting target and she took two Japanese torpedoes as a result. Major flooding took her partially under and a portside list complicated rescues. When she eventually rolled onto her side, dozens were trapped. Subsequent attempts to cut into her hull yielded just four trapped crewmen, the rest perishing in the ship. In all, Utah lost 64 of her crew that day. An attempt to raise and right her was made but the initiative proved fruitless. She was instead decommissioned on September 5th, 1944 and removed from the Naval Register on November 13th of that year. Her hull was left where it laid in harbor waters to act as a tomb and memorial for those lives lost.
USS Utah earned one Battle Star for her service in World War 2.
Where applicable, the appearance of U.S. Department of Defense (DoD), Russian Ministry of Defense, Chinese Ministry of Defense or British Ministry of Defence visual information does not imply or constitute endorsement of this website (www.MilitaryFactory.com). Images marked with "www.MilitaryFactory.com" or featuring the Military Factory logo are copyrighted works exclusive to this site and not for reuse in any form. | <urn:uuid:fd093f0c-c5f7-4d69-9dd5-2f66c9aa4f2d> | CC-MAIN-2019-09 | https://www.militaryfactory.com/ships/detail.asp?ship_id=uss-utah-bb31-dreadnought-battleship | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484020.33/warc/CC-MAIN-20190218013525-20190218035525-00455.warc.gz | en | 0.969968 | 1,449 | 2.796875 | 3 |
How Does Secondary Hyperparathyroidism (SHPT) Affect My Kidney Disease Diet?
First, let me explain what SHPT is. Your parathyroid glands are responsible for keeping your bones and calcium levels in your blood at a healthy range. They are located in your neck on the back of your thyroid gland. Most of the time, you don’t even know they are there. They are near your thyroid gland, but work separately and produce PTH (Parathyroid hormone). PTH is responsible for maintaining the correct amount of calcium in the blood and bones, as well as ensuring calcium is absorbed from the digestive system, and finally controlling how much is excreted in the urine. (That is the connection to kidney disease). The amounts of other minerals that are part of bone growth – phosphorus and Vitamin D – are also critically important to the parathyroid. Doctors measure the amount of PTH as an indicator of bone disease.
Secondary Hyperparathyroidism (SHPT) as related to kidney disease is an overproduction of PTH. This is caused by the changes in the kidneys affecting other mineral levels in the blood and causing the body to overproduce PTH. In persons with CKD starting in stage 3, damage to the kidney affects the functioning amount of kidney and cause these changes to possibly occur.
What Causes The Body To Produce More PTH?
While that is a complicated question, I would like to answer it in a way that is easier to understand. Please remember – I am not your doctor!
Initially, your functioning kidney mass is decreased. This happens because of the damage over time to the nephrons in your kidneys. Your doctor may have told you a percentage of your kidneys that are still functioning. Once the amount of your kidneys that are working is decreased beyond a certain level (not exactly clear how much and it varies by individual), 2 things happen.
1. Kidneys are responsible to activate the Vitamin D in our body so it works. With less functional kidney, lower amounts of vitamin D3 are available in the blood stream.
2. Kidneys also excrete the phosphorus in our bodies, and with a lower capacity to produce urine, phosphorus builds up in the blood stream.
Those two events that happen together bring about a decrease in serum (blood level) calcium. A decrease in the amount of calcium, plus a decrease in the amount of Vitamin D3 and an increase in the amount of phosphorus in the blood cause your body to think you need more PTH (because it needs to increase the amount of calcium in your blood stream to a normal level).
What Does Vitamin D Do In Our Body?
PTH works to “normalize” the amount of calcium available in your bloodstream. Calcium is used for many things in your body, and it needs to be available to your cells. So, an increased amount of PTH will cause your bones to be broken down more quickly so that the calcium is available in your bloodstream.
Vitamin D3 happens to be very important in the actions and levels of PTH in our body. You may be aware that our bodies can “make” vitamin D by exposing our skin to sunlight for 10-20 minutes every day. That vitamin D our skin makes has to be transported to the kidney to be changed into the “active” form our body uses. It keeps us from overdosing on Vitamin D with too much sunlight.
Once vitamin D becomes activated, it can work in our bodies. It stimulates some other hormones that tell the parathyroid we have enough PTH. It also decreases PTH indirectly by increasing the amount of calcium we absorb in our “gut” through our intestines. This increases the amount of calcium in our blood stream, and keeps the amount of PTH at a normal level. But once you have a decreased level of vitamin D in your body, it does not work to increase the level of calcium in your blood stream as efficiently (you don’t absorb as much) so your body starts increasing the amount of PTH to accommodate your calcium needs.
How Do Our Bodies Handle Phosphorus?
When the eGFR decreases to less than 60 ml/min, your ability to remove phosphorus from your blood via your kidneys becomes altered. The part of your nephrons that are still working compensate by increasing the removal of phosphorus because your blood levels are increased. This helps to maintain normal phosphorus levels in your blood stream.
Once you progress further in kidney disease, your nephrons eventually become unable to excrete enough phosphorus to compensate, and that is when you start to notice hyperphosphatemia. (elevated blood phosphorus). So, as the amount of phosphorus increases in your blood, PTH is secreted to compensate. Calcium can bind with phosphorus (if they are out of balance) in the blood stream and form particles that then are deposited in organs and blood vessels. As phosphorus levels increase, this risk is higher, so your body reacts by breaking down bones and increasing the calcium levels in the blood stream to even out the levels. This causes the bones to be weakened over time, and calcium particles (those bound with phosphorus) to deposit in areas of the body such as the heart.
What Are The Goals Of Treating A Patient With SHPT?
Overall, the goal is to normalize the levels of the hormones and vitamin D so that the body is not breaking down bone to compensate for increased phosphorus levels. Preventing bone disease, called renal osteodystrophy, is key to the management of the disease. Patients with kidney disease are at a higher risk of cardiovascular disease, and calcium deposited in the heart can cause further problems.
In stage 3, it is very possible that the levels will be normal, but your body is working overtime to compensate and ensure that you are kept in that normal range. National KDOQI guidelines recommend that all patients with a eGFR < 60 ml/min/1.73m2 undergo an evaluation of serum calcium, phosphorus and PTH levels. KDOQI guidelines recommend testing once per year starting with the onset of Stage 3 CKD. PTH should be the key test for patients because of the way the body adjusts to keep calcium, Vitamin D, and phosphorus levels in the normal range by increasing the levels of PTH.
Management And Treatment of PTH and SHPT
KDOQI guidelines have recommended target ranges for PTH and calcium levels in patients with Stage 3 – 5 kidney disease. Based on those target ranges, the first course of action to improve the health of a patient with SHPT and suppress the levels of PTH is thought to be Vitamin D therapy. As vitamin D plays such a role in our absorption of calcium, if a person can take in and absorb appropriate amounts of “active” vitamin D (doesn’t have to be processed by the kidneys), their calcium absorption rate should also improve.
In addition to Vitamin D, dietary therapy includes reduction of high phosphate foods. Foods that are high in phosphate content include dairy products, meats, beans, dark sodas, beer and nuts. Many of these foods are great sources of protein, so it is important to be cautious when eliminating foods. You should focus on removing foods that are high in phosphate yet lower in protein, such as dark colas, cheese, milk, ice cream and beer.
You have to be careful about sources of protein because that can lead to malnutrition which affects outcomes once people start on dialysis. Also, dietary phosphate restriction may not be adequate since most of our food contains phosphates. Many doctors also recommend the use of phosphate binders as well.
Phosphate binding agents are taken with foods, up to 3-4 times per day, and attach to phosphate in the foods we eat causing it to remain in the digestive system and be excreted through stool. They have to be taken with food or they don’t work effectively, yet it is difficult for people to be consistent and remember to take the medications. Sometimes doctors use several different types of binders to achieve success. Some phosphate binders can be found over the counter such as calcium carbonate and aluminum hydroxide. But, you should talk to your doctor about it prior to initiating any additional intake.
What Should I Do About My SHPT?
First of all, discuss what it means with your doctor. Develop that relationship so you can ask. If you cannot, consider finding another doctor who will work with you. If you need to make a longer appointment, you should tell the person booking the appointment that you have a lot of questions and request a longer appointment time. That will keep your physician from feeling rushed.
At this point – if you have CKD Stage 3, it is recommended that you work with a nephrologist. They are experts and will manage your kidney disease very well. You may also want to find a local dietitian or check into a meal plan that meets your nutritional needs. Decreasing the amount of phosphate in your diet, in addition to treatment with an active vitamin D medication can provide a great deal of improvement and reduce your risk of bone and cardiac complications.
Thanks for sticking with me through this entire article. I enjoyed finding out what would help you and steering you in the right direction. If you enjoyed this article, you might enjoy one of my meal plans – Click here now to read more about Stage 3 or Stage 4 kidney meal plans. | <urn:uuid:78740fd6-a566-4a50-8ded-0dbe3fa865e7> | CC-MAIN-2015-11 | http://www.renaldiethq.com/secondary-hyperparathyroidism-shpt-affect-kidney-disease-diet/ | s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462762.87/warc/CC-MAIN-20150226074102-00036-ip-10-28-5-156.ec2.internal.warc.gz | en | 0.950301 | 1,948 | 3.109375 | 3 |
X86-64 (AMD64) Application Binary Interface
Every processor's instruction set has an application binary interface or ABI.
- The x86-64 ABI document can be found at x86-64.org's website.
- The x86 and generic ABI documents can be found at SCO's developer page.
- The C++ ABI can be found at Code Sourcery's website.
Linux and many other flavors of Unix use the Executable and Linking Format (ELF) for executables and shared libraries. The current draft is available at SCO's website. | <urn:uuid:5b5686e1-f397-4a9d-971f-6a9dccaadc81> | CC-MAIN-2015-35 | http://www.vikaskumar.org/amd64/abi.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644064865.49/warc/CC-MAIN-20150827025424-00066-ip-10-171-96-226.ec2.internal.warc.gz | en | 0.82756 | 123 | 2.890625 | 3 |
Murano, the Glass Island
A Travel Guide to Murano, Italy
In English-speaking countries, glass artisans are often performer-pitchmen at craft shows and festivals, where they blow glass baubles for a few dollars or pounds each. But there was a time when the trade of glassblowing--indeed, glassmaking in general--was an elite pursuit dominated by craftsmen in the Venetian Republic, most notably on the island of Murano in the Venetian Lagoon.
"Supplying quality glass products since 1291"
Murano was a commercial port as far back as the 7th Century, and by the 10th Century it had grown into a prosperous trading center with its own coins, police force, and commercial aristocracy. Then, in 1291, the Venetian Republic ordered glassmakers to move their foundries to Murano because the glassworks represented a fire danger in Venice, whose buildings were mostly wooden at the time.
It wasn't long until Murano's glassmakers were the leading citizens on the island. Artisans were granted the right to wear swords and enjoyed immunity from prosecution by the notoriously high-handed Venetian state. By the late 14th Century, the daughters of glassmakers were allowed to marry into Venice's blue-blooded families. (This was roughly equivalent to Archie Bunker's daughter being invited to wed a Cabot or a Peabody.)
Such pampered treatment had one catch: Glassmakers weren't allowed to leave the Republic. If a craftsman got a hankering to set up shop beyond the Lagoon, he risked being assassinated or having his hands cut off by the secret police--although, in practice, most defectors weren't treated so harshly.
What made Murano's glassmakers so special? For one thing, they were the only people in Europe who knew how to make glass mirrors. They also developed or refined technologies such as crystalline glass, enameled glass (smalto), glass with threads of gold (aventurine), multicolored glass (millefiori), milk glass (lattimo), and imitation gemstones made of glass. Their virtual monopoly on quality glass lasted for centuries, until glassmakers in Northern and Central Europe introduced new techniques and fashions around the same time that colonists were emigrating to the New World.
Commerce, art, and kitsch
Murano is still an exporter of traditional products like mirrors and glassware, and its factories produce modern items such as faucet handles, glass lampshades, and electric chandeliers.
At the retail level, there's a growing emphasis on art glass and--most important of all--the souvenir trade.
Visit the ubiquitous glass shops on Murano or in Venice, and you'll find countless paperweights, glass beads and necklaces, knickknacks, and items of glass jewelry. Some are amusing: e.g., colored fish in transparent glass aquariums, or wrapped hard candies of multicolored glass. Others are pretty--glass necklaces and beads, for example. Still others are "hideous," in the words of Jan Morris, who adds:
To be fair, Murano's artisans do produce beautiful works of contemporary art from glass, although some of the designs are by foreign artists. Visit the better galleries and showrooms on Murano, and you'll find works that are technically and aesthetically stunning. Also, don't miss the island's glass museums and leading churches.
To plan your trip to Murano (which is only a few minutes from central Venice by public waterbus), use the navigation table or the "Next page" links at the bottom of each page.
Next page: Murano glass museums
Inset photos copyright © Michel Velders (1),
George Green (2), | <urn:uuid:48a3cd12-b78a-4824-b060-2888f259ae5d> | CC-MAIN-2015-06 | http://europeforvisitors.com/venice/mobile/articles/murano_the_glass_island.htm | s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422118108509.48/warc/CC-MAIN-20150124164828-00117-ip-10-180-212-252.ec2.internal.warc.gz | en | 0.959001 | 794 | 2.90625 | 3 |
Imagine travelling to the wilderness of Siberia to see a woolly mammoth walking calmly through its natural habitat. Or getting up close to a living, breathing sabre-tooth – crouching behind the bushes as it gets ready to attack its prey. Thanks to developments in cloning and gene-editing technology, the prospect of bringing back extinct animals is looking more likely than ever.
The notion of bringing vanished species back to life is called de-extinction. It is the process of generating an organism that is either an extinct species or resembles an extinct species. But it’s not just about bringing back the dead. De-extinction is about creating populations of healthy, genetically vibrant animals that can be released into the wild where they’ll be able to breed naturally and contribute positively to the environment.
The notion of bringing vanished species back to life has hovered at the boundary between reality and science fiction for decades. It has become even more popular after novelist Michael Crichton unleashed the dinosaurs of Jurassic Park unto the world.
But how does de-extinction work, what are its limits, and should we really bring back long-dead animals? Let’s answer all these questions in this article.
Let’s bring back the mammoth!
Covering a 50 square mile area in Siberia in the Arctic Circle, you’ll find a place called Pleistocene Park. It’s a human-made park where the forests have been replaced with grasslands. It has been done in order to restore the landscape to what it looked like 2 million years ago. It’s currently populated by large mammals like horses and bison to give it that “last Ice Age” feel, But to make it REALLY authentic, they just need one more thing: The Wooly Mammoth!
Around 4,500 years ago, on an island in the Arctic Ocean, the world’s last mammoth died a lonely death. And now they only live on in our imagination. But do they really have to be gone forever?
Humans are not completely responsible for killing off mammoths, but we are responsible for plenty of other extinctions, and that list is quickly growing. These species are extinct, but in many cases, their DNA is still around in places like museum drawers, labs and buried deep in the ground.
Today, scientists think de-extinction might be the answer to saving our planet’s lost biodiversity.
How do you ‘de-extinct’ something?
De-extinction is more complicated than it looks like in movies. For bringing back any dead species, we need its DNA. What’s DNA? DNA is the blueprint of all living beings. DNA holds the instructions for an organism’s assembly, life and reproduction. So if we have some of the DNA of extinct animals, bringing them back is just easy, right? Of course, it’s not that easy. To make an exact copy of anything, you need a complete set of genetic instructions or DNA. Not 50% or 95% of the DNA — a complete 100%.
Imagine a genome as a huge book. If you lose every tenth word, would you still be able to read the whole story? Unfortunately, as soon as something dies, its DNA starts to fall apart. On average, it takes just 521 years for half an animal’s DNA to degrade. Deep freezing has improved DNA preservation of mammoths, but those genetic instructions are still too incomplete.
To re-create anything remotely ancient, scientists are going to have to get crafty. We’ve got to get a little bit of DNA from several well-preserved mammoths. Then let us assemble a whole mammoth genome inside a computer. We can’t just print out a big fuzzy elephant from scratch. But we might be able to edit one! Just like you “cut and paste” on your computer, scientists could snip out certain genes of a closer relative like the Asian elephant — and replace them with whatever genetic material makes a woolly mammoth special. Like resistance to cold, bigger tusks, and the famous fur. Then, this hybrid embryo of an Asian animal and mammoth DNA would be placed inside a living Asian elephant until it is born. Simple, right? Well, it’s a lot harder than it sounds.
For starters, elephant pregnancy lasts more than a year and a half and maybe we shouldn’t gamble with a species that is already endangered. Even if we figure all that out, one mammoth doesn’t bring back a species. Populations with just a few members have low diversity. This makes them easy prey for diseases. Hundreds or thousands of “sort of” mammoths will need to be created to maintain a diverse and healthy population.
Could scientists bring dinosaurs back to life?
Many of us were introduced to the concept of “de-extinction” by the movie “Jurassic Park,” which resurrected the dinosaurs to horrific ends. But people tend to forget that Jurassic Park was pure fantasy.
In reality the only species we can hope to revive now are those that died within the past few tens of thousands of years. Because we can hope to retrieve DNA from intact cells or, at the very least, enough ancient DNA to reconstruct the creature’s genome.
DNA breaks down over time, as explained earlier. The dinosaurs went extinct around 66 million years ago and with so much time having passed it is very unlikely that any dinosaur DNA would remain today. While dinosaur bones can survive for millions of years, dinosaur DNA almost certainly does not.
So, we can never hope to retrieve the full DNA of Tyrannosaurus rex and that leaves creating a dinosaur off the table!
Should we bring extinct species back from the dead?
Jurassic Park may not have got the science of resurrecting extinct species quite right, but nevertheless, it did make one particularly worthy point: As Dr Malcolm says in Jurassic Park, “just because you can, doesn’t mean that you should.”
Sometimes people think about de-extinction like, ‘oh wouldn’t it be cool to have a Dodo or a mammoth back?’. But it’s not just about that species and it being cool to look at. It’s about those species having a role in the ecosystem, which now is not there anymore. Since these animals were around, a lot has changed.
Places like Siberia’s Pleistocene Park are trying to recreate ancient habitats. But when these old species like mammoths arrive at their new home, will the food they once ate even be around? What about the microbes that helped keep them alive? And if mammoths ate up all the grasses, what would happen to other herbivores that now live in the Tundra?
De-extinction will be difficult and expensive. So why do it?
Maybe instead of paying back the planet by bringing back animals that we caused to extinct or just trying to reinvent our favourite ancient animal, we should worry about saving the already existing endangered species. These new genetic tools of creating DNA can help save animals in imminent danger of extinction today.
Species like the one-horned rhino, the snow leopard found in the mountain ranges in Central and South Asia, and the adorable Red Panda are all on the verge of disappearing forever. The same technology that makes de-extinction possible could let us add variety to these species’ DNA. This will create genetic diversity to make their populations bigger and stronger. That way, we won’t be having the same problem 4,000 years from now.
What do you think? Should we bring back the extinct species or let them rest in peace and concentrate on species that are endangered today? Tell us in the comment section below.
As a true introvert, Raza Mehdi shudders at the thought of having to expose very much of himself willingly and with malice-aforethought. Writing online since 2008; fiction, poetry, and articles on science, politics, humour and history. When he is not working, he is either trekking in mountains or sleeping. In his own words, the most apt description of him would be: Biryani on social media, daal chawal in person.
My mentor Raksha Chettri has been my pillar of strength from day one. It is her constant guidance and encouraging words that have helped me become a lifelong learner. A big thanks to her and BYJU'S - The Learning App.
BYJU'S app has helped me understand Maths and Science in a fun way. Now, I study from the app, understand concepts, and then go through my textbooks.
BYJU'S is the bridge that connects my imagination to my reality. The engaging study videos with real-life examples help me understand concepts not only from an exam point of view but as a lesson for life. | <urn:uuid:0d16bbe4-ebae-435a-8306-3708559099b9> | CC-MAIN-2021-04 | https://blog.byjus.com/the-learning-tree/knowledge-vine/bring-back-animals-that-went-extinct/ | s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703517559.41/warc/CC-MAIN-20210119011203-20210119041203-00315.warc.gz | en | 0.95053 | 1,858 | 3.890625 | 4 |
Andean textile art is part of a continuing tradition at least 10,000 years old. Fine textiles 8,000 years old are in existance in museums. Weaving is very fundamental to Andean culture People begin weaving and training while still young children. Skills are passed from generation to generation. Each community has distinctive designs and colours.
During the period of the Inca Empire textiles were used like a currency. Taxes were paid with cloth. And it was used to cement treaties and alliances. There were different classes of cloth. The highest class was reserved for royalty and ceremonial use, and had threadcounts above 600 per inch. Quilted armour was lighter, more comfortable, and almost as protective as European armour of the time.
Today, Inca familes in mountain villages raise alpacas, card and hand spin the wool on drop spindles, and dye it with local plants. Using hand looms, the women hand design and weave detailed traditional shawls, ponchos and blankets. Larger items take several months of steady work to complete. | <urn:uuid:e26cba0d-7dd3-4112-a7bf-bb763cf7ab0b> | CC-MAIN-2019-04 | https://www.cherylstradingpost.com/service/inca-traditional-textiles/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583657907.79/warc/CC-MAIN-20190116215800-20190117001800-00509.warc.gz | en | 0.973409 | 219 | 3.8125 | 4 |
How Will Someone with Dementia Change?
In the mid to late stages of Dementia, a person’s behaviour and needs may change considerably. This can be distressing both for them and their loved ones, but knowing what to expect can help you prepare you for this moment.
All behaviour is a reaction to something, so try to view any changes in behaviour as a response to a need, rather than being completely random. You may notice the following in your loved one:
- Lack of interest in activities they used to enjoy
- Withdrawal from the world around them
- Social anxiety
- Screaming and shouting
- Repetitive behaviour, or saying the same thing over and over
- Losing or hoarding objects
- Loss of inhibitions
There are a number of explanations for these behaviours. An individual who struggles to recognise familiar people and places may feel withdrawn from their society, or become anxious and worried they are in the wrong place. They may become increasingly nervous about trying new things or leaving the home, as they know they may feel disoriented in a new space.
If they are in pain, they may become restless or frustrated as a result. Shouting or wandering about can also be a response to a basic need, such as wanting to use the toilet or being thirsty. Monitoring when different behaviours occur, and keeping track of possible triggers, can help you get a sense of how best to help your loved one.
What You Can Do
In the instance of a recurring behaviour change, it’s important to rule out underlying health conditions that may be part of the cause, so schedule an appointment with your GP.
As carer, you can build your loved one’s self-esteem and feelings of security by planning a structured day with stimulating activities, including something to occupy their mind and physical exercise.
Making sure your loved one is comfortable can help prevent unexpected behaviour. Try to reduce background noise and clutter than may be confusing, and ensure they have a comfortable, familiar place to sit and sleep.
A sudden outburst in behaviour is a result of genuine pain or distress, so needs to be treated as such. Try asking your loved one how you can help them in a calm, low, voice. Being there to reassure them may be enough to soothe them. It can help to hold their hand or place a hand on their arm to act as a calming presence.
Sometimes, giving yourself space and stepping away from the problem is all that can be done. Giving you and your loved one a breather, and coming back to activities later on, can be enough to reset the behaviour.
Help when you need it
24/7 Live-in care
Our carers have experience with a number of conditions
Reablement / post-surgery
Dementia and Alzheimers
Physical and Disability
Book your care assessment
We will agree a time to come and visit you in your own home. We will take the time to fully understand your care needs, and provide recommendations as to what type of care is required.
Once agreed, we will begin to deliver the care. Whether hourly, live-in, or night care, we will endeavour to deliver the best possible care. | <urn:uuid:b45ff060-cbfa-46ba-a758-a5684a74caa8> | CC-MAIN-2023-50 | https://greenwoodhomecare.co.uk/dementia-and-alzheimers/change/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00705.warc.gz | en | 0.951695 | 663 | 2.640625 | 3 |
A growing number of Americans consider global warming an important threat that calls for drastic action, and 40% say that a presidential candidate’s position on the issue will strongly influence how they vote, according to a national survey conducted by Yale University, Gallup and the ClearVision Institute.
New Haven, Conn. — A growing number of Americans consider global warming an important threat that calls for drastic action, and 40% say that a presidential candidate’s position on the issue will strongly influence how they vote, according to a national survey conducted by Yale University, Gallup and the ClearVision Institute.
“One of the most surprising findings was the growing sense of urgency,” said Anthony Leiserowitz, director of the Yale Project on Climate Change and the study’s principal investigator. “Nearly half of Americans now believe that global warming is either already having dangerous impacts on people around the world or will in the next 10 years—a 20-percentage-point increase since 2004. These results indicate a sea change in public opinion.”
The survey’s findings include:
- Sixty-two percent of respondents believe that life on earth will continue without major disruptions only if society takes immediate and drastic action to reduce global warming.
- Sixty-eight percent of Americans support a new international treaty requiring the United States to cut its emissions of carbon dioxide 90 percent by the year 2050. Yet, Leiserowitz notes, the United States has yet to sign the Kyoto Protocol, an international treaty that would require the United States to cut its emissions 7 percent by the year 2012.
- A surprising 40 percent of respondents say a presidential candidate’s position on global warming will be either extremely important (16 percent) or very important (24 percent) when casting their ballots. “With the presidential primaries and general election near,” Leiserowitz said, “candidates should recognize that global warming has become an important issue for the electorate.”
- Eight-five percent of those polled support requiring automakers to increase the fuel efficiency of cars, trucks and SUVs to 35 miles per gallon, even if it meant a new car would cost up to $500 more; and 82 percent support requiring electric utilities to produce at least 20 percent of their electricity from renewable energy sources, even if it cost the average household an extra $100 a year.
- Majorities of Americans, however, continue to oppose carbon taxes as a way to address global warming — either in the form of gasoline (67 percent against) or electricity taxes (71 percent against). —.
- Finally, 50 percent of respondents say they are personally worried —15 percent say a “great deal”— about global warming. “Many Americans, however, believe that global warming is a very serious threat to other species, people and places far away,” said Leiserowitz, “but not so serious of a threat to themselves, their own families or local communities. Nonetheless, they do strongly support a number of national and international policies to address this problem.”
The survey was conducted July 23-26, 2007, using telephone interviews with 1,011 adults, aged 18-plus. Respondents came from Gallup’s household panel, which was originally recruited through random selection methods. The final sample is consideredto be representative of U.S. adults nationwide, with a margin of error of ±4 percentage points. Survey results are available online: http://environment.yale.edu/news/5305-american-opinions-on-global-warming/.
The Yale Project on Climate Change at the Yale School of Forestry & Environmental Studies supports public discourse and engagement with climate-change solutions.
Gallup, Inc., headquartered in Washington, D.C., is one of the world’s leading research companies focusing on studying human nature and behavior. The Gallup Poll has been monitoring U.S. public opinion since 1935, and Gallup now tracks public opinion in over 100 countries worldwide on an ongoing basis.
The ClearVision Institute is a nonprofit organization dedicated to applying entertainment education as a social-change strategy to address climate change through U.S. commercial television. | <urn:uuid:9f3ad216-5834-4d0c-a2a7-06f38cdbaff1> | CC-MAIN-2018-17 | https://www.enn.com/articles/23536 | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937074.8/warc/CC-MAIN-20180419223925-20180420003925-00035.warc.gz | en | 0.929203 | 855 | 2.703125 | 3 |
Pregnant and Parenting Teens
Pregnant and parenting teens face enormous challenges in accomplishing their educational goals. Approximately 70 percent of teenage girls who give birth leave school, and, evidence suggests that illegal discrimination is a major contributing factor to this high dropout rate.
Since 1972, when Title IX was enacted, it has been illegal for schools to exclude pregnant and parenting students from school. Despite this fact, many schools fail to help pregnant and parenting teens stay in school, and some actually exclude or punish them.
Girls from around the country tell the same stories: When they got pregnant or had a child, a principal, counselor, or teacher told them they'd have to leave school. In many cases, pregnant and parenting students are told outright that they can't stay in school or must go to an alternative school, which all too often offer substandard educations. Sometimes the discrimination is more subtle. Schools refuse to give excused absences for doctor's appointments, teachers refuse to allow make-up work, or staff members exclude them from school activities based on "morality" codes or make disparaging, discouraging and disapproving comments.
Young people have a right to complete their education regardless of their sex or whether they become pregnant. Teens should not have to choose between completing their education and taking care of themselves and their children.
The ACLU’s Women’s Rights Project works to ensure the rights of pregnant and parenting teens through advocacy, education, and litigation to investigate and end the push-out of pregnant and parenting teens from school.
Know Your Rights Materials:
While the following materials were made by some of our affiliates for state-specific outreach purposes, teens in other states can use these to get a general idea of what their rights are, and can reach out to us for assistance if they need to know more specifically what their rights are in their state.
Palm Card: Your Rights as a Pregnant or Parenting Teen (New York Civil Liberties Union)
Palm Card: The Rights of Pregnant and Parenting Teens in School (ACLU of Minnesota)
Cases and Settlements
The ACLU of Southern California filed and settled a lawsuit on behalf of pregnant and parenting teenagers who were funneled into sub-standard education programs rather than given the opportunity to continue their education at their local high schools. | <urn:uuid:d47bae41-b62a-4e05-b6f0-a289655e8d68> | CC-MAIN-2020-50 | https://www.aclu.org/pregnant-and-parenting-teens | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141176256.21/warc/CC-MAIN-20201124111924-20201124141924-00021.warc.gz | en | 0.96916 | 480 | 2.515625 | 3 |
Pulborough shown within West Sussex
|Area||20.98 km2 (8.10 sq mi) |
|Population||4,685 2001 Census|
|- Density||223 /km2 (580 /sq mi)|
|OS grid reference|
|- London||41 miles (66 km) NNE|
|Shire county||West Sussex|
|Sovereign state||United Kingdom|
|Ambulance||South East Coast|
|EU Parliament||South East England|
|UK Parliament||Arundel and South Downs|
Pulborough is a large village and civil parish in the Horsham district of West Sussex, England, with some 5,000 inhabitants. It is located almost centrally within West Sussex and is 50 miles (80 km) south west of London. It is at the junction of the north-south A29 and the east-west (A283) roads.
The village is near the confluence of the River Arun and the River Rother. It looks southwards over the broad flood plain of the tidal Arun to a backdrop of the South Downs. It is on the northern boundary of the newly established South Downs National Park.
The parish covers an area of 2,098 hectares (5,183 acres). In the 2001 census there were 4,685 people living in 1,976 households of whom 2,333 were economically active.
Historically, it was a fording place over the River Arun used by the Romans, who had a mansio across the river at Hardham, one day's march from Chichester on the London road, Stane Street. The Saxons bridged the River Arun here and at nearby Stopham, north of its confluence with the River Rother. It became an important watering and overnight halt for cattle drovers providing easy access to water.
A mile to the north-west in woodland are the earthwork remains of a motte and bailey castle known as Park Mound, dating from the eleventh century.
Transport connections afforded by the River Arun, its navigation, and later by the LBSCR Arun Valley Line brought Pulborough into the industrial age. Good road connections permitted, in the 20th century, the development of manufacturing industry, notably heavy engineering in London Road. This has long since closed down and the site now supports, among other things, a supermarket and a health centre.
Each year, Pulborough hosts the 12 hour Lawn Mower race which runs continuously for 12 hours.
On August Bank Holiday, the Pulborough duck race society hosts its annual duck race, a charity event.
Pulborough is also home to the South Downs Light Railway with its steam and diesel trains running regularly throughout the summer, and a more limited service through the colder months.
Pulborough also boasts one of the fastest growing and most popular Angling Clubs in the South of England which has a number of initiatives to support local youngsters, including angling training as well as offering talks to local clubs, youth and conservation groups on the merits of angling and what anglers do to support, maintain and improve the habitat in conjunction with government departments and other groups.
Earliest records suggest cricket has been played in Pulborough since 1799. Now based at the Recreation Ground, Pulborough Cricket Club boasts numerous Senior and Junior (Colts) teams. Previously a member club of the Sussex Invitation League, Pulborough's 1st and 2nd Elevens were invited to join the Sussex Cricket League ("the county league") from the 2004 season. A 3rd League XI plays in the West Sussex League, home matches being played nearby at Watersfield. Pulborough was a founder member of the North West Sussex Colts Cricket League (now known as the iDentilam League) in 1987, when it became apparent that schools were not providing adequate cricketing opportunities to local youth. Various age-groups (Under 9s, 10s, 12s, 14s and 16s) now provide ample opportunity to develop cricket skills, played in a competitive environment and ultimately secure the long term future of the club. The club also provides a mechanism for younger players to progress into senior cricket, with two non-league senior teams playing matches on Sunday afternoons. In 2006, the Sussex Cricket Board recognised the club's efforts towards youth sport, and awarded it ECB 'Focus Club' status. In 2008, the Club launches a junior girls team, thereby continuing the club's ongoing progressive and ambitious plans.
Other notable events
On 17 July 2000, Pulborough made the headlines when the body of missing girl Sarah Payne was found in a field off the A29 near the village. She had been reporting missing some 15 miles (24 km) away in Littlehampton 16 days earlier. Roy Whiting, a 42-year-old convicted paedophile, was found guilty of her murder on 12 December 2001 and sentenced to life imprisonment.
On 19 April 2003, the body of 31-year-old Brighton music teacher Jane Longhurst, who had been strangled some weeks earlier, was found at Wiggonholt Common. Her best friend's partner Graham Coutts was found guilty of her murder on 4 February 2004 and sentenced to life imprisonment. The murder verdict was reduced to manslaughter on 19 July 2006.
|Wikimedia Commons has media related to Pulborough.| | <urn:uuid:f5eadb56-0696-4b28-9d5c-28e03d94cfc5> | CC-MAIN-2013-48 | http://en.wikipedia.org/wiki/Pulborough | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163066095/warc/CC-MAIN-20131204131746-00038-ip-10-33-133-15.ec2.internal.warc.gz | en | 0.958298 | 1,107 | 2.734375 | 3 |
An interactive demonstration of how friction is created, and its effects.
- Friction is the resistive force between two surfaces rubbing against each other.
- Heat and sound can be created by friction.
- Friction is responsible for stopping moving objects.
- Friction plays a part in many daily activities, such as carrying, driving and walking.
Try these tests to experience friction
Rub your hands together fast
Feel the heat?
That's created by friction
Click your fingers
Hear the sound?
It's made because of friction
Gently slide a book along your desk
Why does it stop?
Because of friction
Friction: resistive force between two surfaces rubbing ...
Please log in to view and download the complete transcript. | <urn:uuid:d8439f40-7bde-4e75-86a7-9a7a538785e4> | CC-MAIN-2019-51 | https://www.twig-world.com/film/factpack-experience-friction-1539/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540486979.4/warc/CC-MAIN-20191206073120-20191206101120-00329.warc.gz | en | 0.936679 | 156 | 3.78125 | 4 |
No Products in the Cart
This DIGITAL Social Awareness SEL curriculum for 3-5 includes 5 detailed lessons filled with digital, interactive activities that teach older kids about social expectations and social cues, empathy, peer pressure, conflict resolution, and anti-bullying.
Kids will have opportunities to learn, practice, and develop social-emotional skills through a variety of engaging lessons and digital activities.
The program provides teachers and parents with lesson plans, instructions, videos, and activities to support social-emotional learning in digital format. Lessons are one-on-one, small group, or large group compatible.
The DIGITAL social awareness unit has been formatted and modified to be taught digitally in conjunction with the printable version or independent of it. The lessons and activities have been adapted to be used online in digital teaching platforms (Google Slides and PowerPoint) and on devices.
What does this DIGITAL Social Awareness Unit cover?
Lesson 1: Social Expectations & Cues
★Kids will learn to understand what social expectations are and attempt to follow them. They will learn and understand what social cues are and how they are used to communicate messages differently.
Lesson 2: Empathy
★Kids will learn to understand what empathy is and why it is important. They will describe ways of being empathetic (looks, sounds, feels) and ways that are not. They will be encouraged to act in empathetic ways.
Lesson 3: Peer Pressure
★Kids will learn to understand what peer pressure is and share good and bad examples from their knowledge and experience. They will learn strategies of how to avoid and respond to negative peer pressure.
Lesson 4: Conflict Resolution
★Kids will learn to identify ways to solve conflict and demonstrate effort in solving them peacefully. They will describe conflicts they have encountered and what they learned.
Lesson 5: Anti-Bullying
★Kids will learn to understand what bullying is and what it is not. They will learn to describe and demonstrate ways to stand up to and stop bullying behavior. They will be encouraged to actively attempt to stop bullying when they encounter it.
Activities included in the Social Awareness unit:
Look at the PREVIEW and VIDEO for a look at this SEL unit up close and the variety of lessons and activities included!
How to Use DIGITAL SEL:
Comes with READY-FOR-YOU Google Slides & Interactive PowerPoint Lessons:
It can be used with other similar platforms to support 1:1 classrooms in delivering a meaningful social-emotional learning program.
Benefits of using DIGITAL Social-Emotional Resources:
mind+heart digital aligns with the CASEL framework of the 5 core competencies for SEL. It provides educators with an affordable and accessible option that is structured and highly effective in 3-5 classrooms.
♥♥Teach the digital version of this unit with the printable version of the unit. Buy them together in a money-saving bundle (option available in cart).♥♥
Check out the other SEL units for 3-5:
Self-Management & Mindfulness
Growth Mindset & SMART Goal Setting
Friendship & Relationships
Social Awareness: Empathy, Peer Pressure, Conflict Resolution, Bullying
Kindness, Gratitude, & Bucket Filling
Respect, Honesty & Integrity, & Stereotyping
Responsibility, Leadership, & Decision Making
Stay connected with Proud to be Primary
♥Join our email list and get weekly teacher tip emails and access to our FREE resource library.
♥Visit our website at Proud to be Primary for tons of engaging ideas for teaching kids in the classroom!
♥Join our Facebook group and connect with thousands of PROUD primary teachers like yourself.
Please read the description, review the preview file, and read the FAQ in our Help Center carefully before purchasing.
Question not answered? Reach out to support at support@proudtobeprimary.
All digital sales on Proud to be Primary of resources are considered final and non-refundable.
© Copyright Proud to be Primary, Elyse Rycroft. All rights reserved. Permission is granted to copy pages specifically designed for student or teacher use by the original purchaser or licensee. This product is licensed for personal classroom use ONLY unless multiple licenses are purchased. The reproduction, alteration, adaptation, copying, or sale of any part of this product is strictly prohibited. Read the full Terms and Conditions HERE. | <urn:uuid:1fcb92ef-2595-4c61-8bd0-8441a7c3cbcc> | CC-MAIN-2021-31 | https://shop.proudtobeprimary.com/products/social-awareness-digital-grades-3-5 | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153899.14/warc/CC-MAIN-20210729234313-20210730024313-00408.warc.gz | en | 0.91128 | 924 | 3.921875 | 4 |
Importance of education in economic development
Education, a strong correlation with economic development
Islamabad, Oct 12: Education is considered to have a strong correlation with social and
economic development. In contemporary times when the focus is on the
'knowledge economy' the role of education becomes all the more
important in the development of human capital.
After all, a society
of literate and skilled citizens has more chances of development at the economic and social levels.
Education can reduce poverty and social injustice by providing the
underprivileged resources and opportunities for upward social mobility
and social inclusion. Yet, until the National Education Policy (NEP)
2009 was unveiled, the budgetary allocation for education in Pakistan
was on the decline.
The lack of political commitment of the
state has resulted in multiple educational systems which are inherently
discriminatory and biased in nature. A large number of students are
unable to attend schools. According to the Education For All Global
Monitoring Report (2007), almost 6.5 million children in Pakistan do
not go to school. Countries like India, Ethiopia, Mozambique, Ghana,
Niger, Kenya and Mali are placed in relatively better positions. The
only country that has a worse situation than Pakistan's is Nigeria,
with more than eight million children out of school.
number of students who make it to schools, however, drop out by class
five. According to NEP, about 72 per cent make it to grade five which
means a dropout rate of 28 per cent. This significant figure further
brings down the chunk of the population that makes it to school.
Such a large number of students outside school means that they are
deprived of the opportunity to learn and acquire skills for playing a
meaningful role in society. Social exclusion is a great loss at the
individual and societal levels. Most of these out-of-school children
experience poverty and unemployment and some get involved in criminal
activities as well. Constitutionally, the provision of basic education
to citizens is the state's responsibility. Is the state carrying out
its responsibility? The state needs to analyse the reasons be hind
the number of out-of-school children. They come from poor families and
cannot afford the luxury of education despite their desire for it.
The real issue of educational apartheid comes to the surface only after
joining a school. Enrolling in a school does not ensure the provision
of quality education. There is one question which is central to
quality: what kind of school is it? The answer to this question may
include the state of the building, faculty, management, curriculum,
textbooks, examination system and medium of instruction as well as the
socio-economic background of the children.
The reference to
socio-economic background is crucial as schools - like social classes -
are stratified in terms of social status. So social exclusion is not
only at the access level but also at the quality level. The widening
difference between private and public schools is responsible for the
gaping chasm between resources and opportunities given to the poor and
the rich. Children from elite schools have enhanced chances of
employment and social integration whereas children from public schools,
no matter how bright they are, are disadvantaged in terms of getting
exposure to quality education.
The famous slogan 'education
for all' needs to be revisited. Is it sufficient to enrol every child
in school? The continuance of disparity and exclusion goes on depending
on the quality of the school. Thus the slogan needs to focus on
'quality education for all'. It is the quality aspect which is missing
in disadvantaged schools. Instead of taking some constructive measures
to improve the conditions the state is taking the easy route of
offering private schools as an alternative.
officials publicly give statements that public schools have failed and
the only alternative left is private schools. I do not intend to
underplay the significant role private schools can play in the uplift
of the educational system in Pakistan. My only contention is that they
are there to complement the system and should not be presented as an
alternative to public education.
Education has failed
miserably to reduce poverty gaps, social injustice and oppression. The
education policy suggests that "the educational system of Pakistan is
accused of strengthening the existing inequitable social structure as
very few people from public-sector educational institutions could move
up the ladder of social mobility".
What action plan has been
given in the new education policy to ensure that this won't happen in
the future? Simply referring to a problem does not mean that it has
been taken care of. The education policy should have given a clear and
concrete blueprint to combat social exclusion, inequality and social
injustice. The existing discriminatory educational systems are not only
perpetuating the socio-economic gaps between the haves and have-nots,
they are also responsible for further widening these gaps.
writer is director of the Centre for Humanities and Social Sciences at
the Lahore School of Economics and author of Rethinking Education in
Pakistan. -Shahid Siddiqui
"I AM IRFAN KHAN BELONG TO RAWALAKOT AZAD KASHMIR TODAY I DTUDY YOUR COMMENTS ON EDUCATION ROLE IN ECONOMIC DEVELOPMENT I AM APPRECIATE YOUR COMMENTS A LOT"
Name: MUHAMMAD IRFAN KAHN
City, Country: RAWALPINDI
"your performance is nice keep it up"
City, Country: adis abab,ethiopia
"its a well conducted research.the situation in kenya is not much different although the government has really tried.congratulations!"
Name: kinya zipporah james
City, Country: thika-Kenya
"i liked this article very much and its very interesting too."
Name: rohan chandra
City, Country: delhi,india
"its a very nice article"
City, Country: jorhat,india
"very informative piece, hope to see more mork"
"I really enjoy your research and im saying more grease to your elbow."
Name: Dogara Harris Maude
City, Country:Pambegua Nigeria
"I am success from your written. thank you very much"
Name: Puna Das
City, Country:chabua and india
"i heartedly appreciat your measures in awareness in bringing the attention of all the concerned authorities towards the worst condition of education sector in pakistan.sir i am also angaged scince 15 years to the field of education as teacher from primary level to university level.the thing i have found responsible to the criticle conditions of education in pakistan is the exterime ignorance and deprivation of education sector are the policymakers of our beloved country who conciousely bussy in damaging education and the poor masses of pakistan."
Name: muhammad ismail
"I really need it for my assignment,great and informative piece of work,carry on."
Name: Hurmat Malik
"soooooo goooooooo dear"
City, Country: lahore
"i just enjoy using this wep it helps me to finish my work in no time"
City, Country:south africa
"I am surprised upon reading your essay.We have so much similarities here in the Phils. We encounter the same scenario and problems. I am glad that you post this in the net. I hope many people will read this specially our policy makers. You are extremely correct. It should NOT be EFA(Education For All) It should be QUALITY EDUCATION FOR ALL. Indeed only true education will help us elevate the quality of life."
Name: cynthia p. rivera
City, Country:Quezon City, Philippines
"The education is increasing and when it is increasing it will decrease"
City, Country:brits,south africa
"Thnk you sooooooooo much sir"
Name: Sohail sameer
City, Country:Islamabad pakistan
"I like your article-It is interesting,but you have not really shown the relationship btn education and economy"
"Child is meant to Learn, Not Earn."
Name: Arslan Hassan
City, Country:Lahore, Pakistan
"Asalam o alaikum, Thanks for this piece of imformation. Iused it in my assignment."
Name: Muhammad Mohsan
City, Country: lahore,pakistan
Post your comments
Playgrounds shortage perturbs students, kids
Islamabad: Shortage of playgrounds in the twin cities of
Rawalpindi and Islamabad irked kids and students in different
The situation forced them to use green areas
and residential streets as playgrounds, creating problems for the residents.
of the students, aged 12-17, can be seen on green belt in different
areas. The civic body has constructed a few parks in different sectors,
but these didn't not fulfil the requirements of all the sectors.
parents of the kids have expressed concern over the lack of playgrounds
and urged concerned authorities concerned to construct more grounds in
the areas especially for kids.
A physical education instructor told
the agency that a child's playground is a place they can retreat to
when they want to relax after a busy day at school and their other
obligations. He said that it gave them a chance to release some energy
and have fun.
"As an adult, you surely know all about the need
to escape from the stresses of everyday life," he added .
that learning through play was an important process and
a fundamental part of a child's development.
that promote different types of play are vital for a child's cognitive,
emotional, physical, and social development, " he
He said playgrounds provide crucial and vital opportunities for children to play.
of CDA when contacted said that the civic body had constructed many
playgrounds in the federal capital for the residents.
healthy activities like different types of games. He assured that the
CDA would construct more playgrounds for students including kids in the
city to provide them safe places for exercise and entertainment. The nation
Post your comments
IBSA awards prizes to outstanding scouts
Islamabad: Participants of a prize distribution ceremony of `Scouts Week' called
for reviving the spirit of scouting among students in federal colleges
to make them useful and active citizens of the country.
colourful function was arranged at Islamabad Model College for Boys
(IMCB), F-8/4 to award prizes to outstanding scouts of Islamabad Boy
Scouts Association (IBSA).
Director General Federal
Directorate of Education (FDE) Shaista Pirzada, who was the chief guest
on the occasion, said the new generation is well informed about
physics, chemistry and other subjects but is drifting away from social
and moral values.
"We have neglected the importance of social
service and confined the students to just their studies. It is the sole
responsibility of the teachers to educate the students about values of
sacrifice, caring and sharing," she said adding that teachers must play
their role in inculcating real human values of love and brotherhood,
and nurture an urge among the students for serving humanity.
said students are the future of a nation and they must be educated
about the historical facts and sacrifices rendered by our forefathers
in achieving an independent country.
Shaista Pirzada directed
all principals of the federal institutes to conduct scouting activities
in their respective institutions. Scouts are well prepared to cope with
any natural calamity and disaster but they lack training of swimming,
she said and announced that these scouts would be given training of
swimming at Sports Complex.
Provincial Secretary IBSA Zahoor
Hussain said the Association is playing a dynamic role in training the
boy scouts and enabling them to cope with any emergency situation
effectively. He thanked different organisations including Anjuman
Hilal-e-Ahmar and Islamabad Traffic Police (ITP) for their support in
training the scouts.
One of the scouts, Ishaque, exhibited his
oratory skills in a speech on `Scouting is Service' and stressed on the
role of scouting in the character building of the students through
inculcating the spirit of patriotism. The collective activities of
scouts of different provinces promote a sense of togetherness and
kinship, and it is time to renew the scouting movement, he said.
Mohammad Ali Jinnah was the first Chief Scout, who believed in the
positive role of scouting for physical and mental growth and
development of a student's personality.
Post your comments
Headstart students planted 200 saplings
Islamabad: Almost 30 students from Headstart A-level Branch Sunday
started their campaign to plant around 200 trees along the
Margalla Road in Islamabad.
According to a press release
issued here the students belonged to the 'Planting A Better Future' society.
worked along with Capital Authority Development (Environmental
Department), and were graciously welcomed by Mr Altaf a Forest Officer
and Dr Suleman DG Environment.
The club is organised by Maham
Faisal Khan also in her first year of A-level's and Mohammad Ibrahim
Khan. Although, their aim was to plant fruit trees in villages this
project was greatly appreciated, as the club had no funds to put its
intentions into action. They plan to spread awareness of environment
related issues and create recycling revolution.
The need for
such spirit is greatly needed in Pakistan as only 4.8 per cent
approximately of its landmass is forested with 1 per cent of this
depleting every year. The news
Post your comments | <urn:uuid:641f380e-0bfb-4adc-a06b-a0ead479d136> | CC-MAIN-2018-17 | https://www.interface.edu.pk/students/Oct-09/Importance-of-education.asp | s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125944851.23/warc/CC-MAIN-20180421012725-20180421032725-00217.warc.gz | en | 0.929335 | 2,918 | 3.21875 | 3 |
Religious scholars in Rome are arguing over a tiny scrap of papyrus that may indicate some early Christians thought Jesus Christ had a wife.
Speaking this week at a religious studies conference, U.S. professor Karen King of Harvard Divinity School announced that scholars are studying a piece of papyrus that quotes Jesus as saying the words "my wife." King says the papyrus dates from the 4th century, but the age of the ink needs more testing.
The words are written in Coptic, a language of ancient Egyptian Christians, and the context of the words is unclear, as they appear on a scrap only a little larger than a business card.
King says the words do not prove Jesus was married, only that some early Christians may have thought so. Christian tradition has long held that Jesus remained unmarried.
Any new finding about his relationships with women, whether as partners or as disciples, could affect debates about the role of women in the Christian faith.
The artifact is owned by a private collector, leading some skeptics to speculate the owner is courting publicity to increase the value of the object.
Some information for this report was provided by AP, AFP and Reuters. | <urn:uuid:f7151620-d2ba-4c4e-a890-1af4ad98ef72> | CC-MAIN-2017-09 | http://www.voanews.com/a/papyrus_scrap_ignites_jesus_marriage_debate/1511138.html | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171807.25/warc/CC-MAIN-20170219104611-00553-ip-10-171-10-108.ec2.internal.warc.gz | en | 0.97456 | 237 | 2.875 | 3 |
Did you know most food waste happens at home? Here are dozens of ways to repurpose food plus save time and money.
What is food waste?
We buy food with the best of intentions, don’t we?
We don’t mean to be wasteful, do we?
But have you thrown out food this week?
Perhaps you bought vegetables because you thought you should be eating more of them. But then didn’t cook them or know how to make them taste good.
Or you bought food intending to eat at home but then ended up going out. Or the ingredients meant for a specific occasion went unused because it never happened.
So the banana ripens before you peel it. The lettuce turns brown before the salad is made. The fish turns before you get to it.
You’re not alone. It’s estimated that we toss about 20 percent of the food we buy.
Food is the largest stream of materials in American trash. Forty four percent of food waste occurs at home.
A food waste challenge at home
Ready to see how much food and money you are throwing away? You can do your own wasted food challenge. For one week, measure how much food your family wastes in a week and record the volume. Track how much you throw away and the reason you didn’t eat it. It could be that you ate out, didn’t know how to cook the food, didn’t feel like cooking, bought too much, didn’t store it properly. Also note the approximate value. If you paid $3.00 for a container of strawberries and threw away a third, you lost a dollar to wasted food.
Let me know your results! 😉
Tips for reducing food waste
- Label items in the fridge, freezer, and pantry. A name and date go a long way to help keep track of food and reduce waste. No need to make your freezer a cold tray bin!
- Store leftovers in clear glass containers so you can see them.
3. When reheating leftovers, be sure they reach 165° F. Reheat sauces, soups and gravies by bringing them to a rolling boil. Cover leftovers to reheat. This retains moisture and ensures that food will heat all the way through
4. The Sell-by date is a suggestion for display in store. There is still reasonable time to use the food so no need to throw out milk on this date!
5. Best-by and Use-by dates are recommendations for best flavor/quality. Beyond this date is rarely a safety concern (see #6). An exception is infant formula and baby food. These dates should be followed.
6. Use Best-by date on foods with a higher Listeriosis risk: deli meats, hot dogs, smoked seafood, raw sprouts, raw milk and soft cheese made with unpasteurized milk.
7. FIFO: first in, first out. Bring older food to front of fridge and cupboards to avoid castaways.
8. Post an “Eat First” sign in your fridge to let everyone know what foods need to go. Use these foods for lunches, snacks, or to repurpose into another meal. Or make Sunday a clean-out-the-fridge meal.
9. Shop your own kitchen first. Ask: “What do I have?” rather than “What do I want?”
10. Cook perishable foods first. The sooner you get to them, the easier it is to serve as snacks and meals through the week, saving time, effort, and money.
11. Check out: Is My Food Safe? and FoodKeeper Free on Itunes.
12. Right size your portions so you’re not cooking too much
13. Purchase with a purpose. Planning a weekly menu makes better use of your groceries.
How to reduce food waste, repurpose dairy
- Keep your milk fresh and cold by storing it in the coldest part of the fridge—the back bottom shelf. Not the door.
- Clean the cheese drawer. Shred or chop a variety of cheeses to use in grilled cheese sandwich. Add jam for a flavor boost. This is not your mother’s grilled cheese!
- Have extra milk on hand? Make Masala Chai to sip hot or cold.
- How long does yogurt last? Kept cold it can last a month. See mold? Toss.
- Plain yogurt can be mixed in dips, dressings, pancakes, muffins, overnight oats, smoothies, soups or sauces.
- Have extra milk you need to use? Make Panna Cotta or yogurt or bake Apricot Pecan Crisps.
- Spread ricotta cheese on toast. Top with sliced kiwifruit or tomato.
- Use cottage cheese in place of cream cheese or ricotta in dips, casseroles, pancakes and desserts. Process in a blender if you want a smoother texture.
How to reduce food waste, repurpose vegetables
- Mix leftover corn with chopped peaches, avocado and feta or black beans and peppers with a squeeze of lime juice.
- Freeze chipotle peppers and dollops of tomato paste on waxed paper, then store airtight.
- Potatoes are best stored in a cool, dark, ventilated place, such as an unheated pantry or closet. Refrigerator is too cold for spuds. Take advantage of the bags many potatoes are sold in. Those dark-colored, perforated plastic bags with small holes cut in the sides allow air movement and are ideal for taters.
- Onions, like potatoes, prefer a cool, dry, ventilated area.
- Leftover avocado? Rub the cut surface with lemon or lime juice; store in airtight container. Smash onto toast with sprinkle of chile flakes and salt.
- Blend fresh herbs with oil; freeze in ice cube trays. Or make pesto.
- Marinate older mushrooms in oil, vinegar and herbs
- Add chopped vegetables to hummus, quesadillas, pizza, tacos, frittatas, and omelets.
- Grate butternut squash, carrot or parsnips in hash browns, breads and muffins.
- Add puréed cooked carrots or squash to mac n cheese or serve over ravioli.
- Collect vegetable odds and ends such as carrot peels, asparagus ends, broccoli stalks, onions, celery roots and leftover green beans in a freezer bag to use for soup. Use the whole cauliflower in Roasted Cauliflower Fettuccine.
- Add limp carrots, peppers or celery or soft fruits such as plums, pears, apples to your slow cooker meals for more flavorful soups, stews and braised meats.
- Pickle juice can be used to pickle onions, cucumbers or zucchini.
- Use the levers on your crisper drawers. An open lever allows moisture and gases to escape for apples, pears, peppers, mushrooms, and ripe mangoes and avocados. Closed lever keeps moisture in for lettuce, spinach, broccoli and strawberries. Compost what you don’t use.
15. Use a salad spinner to keep lettuce, herbs and other greens dry. A rubber ring on the bottom keeps it from scooting across the counter like this Oxo spinner.
How to reduce food waste, repurpose fruit
- Ripe bananas are super sweet additions to smoothies. Peel ripe bananas; freeze in airtight container. Break into chunks before tossing in blender or use ripe bananas to sweeten cooked oatmeal. Add toward the end of cooking.
- Look for a produce sale bin next time you shop. Give a bruised apple a home and save money.
- Use leftover fruit or vegetables to infuse water.
4. Extra fruit on hand? Repurpose it into a sorbet.
5. If you consistently throw away fresh fruits and vegetables, buy frozen or canned. They result in less food waste overall.
6. Salsa is the Little Black Dress for a chicken breast. Use fruits, vegetables, herbs, spices.
7. Freeze juice, chicken broth, coconut milk, and wine in ice cube trays for flavor boosts
8. Extra fruit that’s past its prime? Freeze it for smoothies. Make a sauce to spoon over oatmeal or yogurt. Blend with olive oil and vinegar to make a salad dressing or glaze
9. Store bananas, pineapple, ginger, winter squash, eggplant, and basil at room temperature.
10. Ripen at room temp in a paper bag, then refrigerate avocado, kiwifruit, melon, peach, pear, plum, and mango.
11. Repurpose a less-than-perfect mango into Mango Jalapeno Dressing.
12. Will you use the BOGO special? If not, best to leave it at the store.
How to reduce food waste at home, repurpose grains
- Repurpose leftover pasta into a peanut noodle bowl or scramble with eggs. Float ravioli in chicken broth with spinach and mushrooms.
- Use dry bread (not moldy) to make croutons, breadcrumbs or crostini. Slice into ¼-inch, spray with cooking spray, bake 5 minutes at 350°F. Mix ricotta with peas and mint to spread on those toasted slices.
- Consider the bulk bins when shopping for grains, cereal, nuts, dried fruit. Buy the amount you need to avoid storing foods you may use once in a blue moon. Also reduces packaging.
- Repurpose dry bread into a strata. Plus a good way to use those veggies and cheese.
- Slice olive bread or cranberry walnut bread into thin slices, bake at 350℉ to make crackers.
- Dried tortillas? Make chips. Cut into wedges, sprinkle with salt and chile powder or lime zest. Bake 400℉.
- Cooked rice and grains can be frozen in airtight containers for several months. Don’t forget to label and date.
How to reduce food waste, repurpose protein
- Vacuum-packed ground meat is only packaged once so it uses half the amount of plastic. Vacuum packing makes it last longer.
- Ideal storage for eggs is in the original carton in the center of the fridge. They may be refrigerated 4 to 5 weeks. Once cooked (such as a pie or casserole) or out of their shell, eat within 3-4 days.
- Repurpose leftover meatloaf into paninis or add to egg muffin cups or cornbread.
- Packaged raw meat: should be stored on a tray on the bottom shelf up to 2 days before cooking or freeze for 3-4 months.
- Store packaged raw meat on a tray on bottom shelf. Plan to use refrigerated roasts and steaks within 3 to 4 days and ground beef within 1 to 2 days of purchase.
The number one way to reduce food waste at home?
Shop with a grocery list. You’ll spend less and save time and you’ll never find brown, mushy lettuce in your fridge again. My LiveBest shopping list can help.
My website contains some affiliate links. That means if you click through on a link I may earn income from the seller, not the buyer, you. My intent is to be a resource for you. | <urn:uuid:b80e6ee8-4055-459c-9754-58e920a04a66> | CC-MAIN-2020-29 | https://livebest.info/recipes/reduce-wasted-food/ | s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655886095.7/warc/CC-MAIN-20200704073244-20200704103244-00352.warc.gz | en | 0.896716 | 2,424 | 2.890625 | 3 |
what type of intermolecular forces must be overcome in converting each of the following from a liquid to a gas?...isaacpelayo
what type of intermolecular forces must be overcome in converting each of the following from a liquid to a gas? a) CO2 b) NH3 C)CHCl3 d) CCl4
- 10 years ago
- Your boss has todl you to evaluate two ovesns for tink-the tinkers, a gourment sanwhich shop. After some questionin of...
- what is the first ten amendements called?
- What's the difference between today's military and knights?
- 7+3x =-5
- Graph and establish orientation for the curve determined by the equations: x = cos(t 2 ) + 1 and y...
- How does the fear of the messenger illustrate the narrator's idea that it is impossible to know another person?
- which is more healthy sweeteners or sugar and why
- What is Pete's monthly take home pay and indicate the amount his check was under or overstated. What is his weekly traveling expenses? | <urn:uuid:375d9003-3659-4f1d-a041-42162632b88d> | CC-MAIN-2021-43 | https://www.sweetstudy.com/content/what-type-intermolecular-forces-must-be-overcome-converting-each-following-liquid-gas | s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585322.63/warc/CC-MAIN-20211020152307-20211020182307-00569.warc.gz | en | 0.930808 | 236 | 3.046875 | 3 |
As of September 2017, there were approximately 19 million women veterans in the United States, Puerto Rico, and foreign U.S territories. Is the women’s long-term mental health impact of service the same as their male counterparts? Overwhelming studies have shown that it is not and despite the research VA mental health care providers are lagging behind in serving the women veteran population.
Servicewomen continue to deal with a culture of bias, harassment and sometimes assault while serving their country. In addition, active duty women must endure and figure out a way to manage long family separations and combat deployments. These issues are hardly addressed while on active duty. Some women are concerned about seeking care because of a perceived potential impact on their security clearance. After the transition from active duty to veterans, women veterans are significantly more likely to face mental health challenges than veteran men. Veteran Affairs data shows that women veterans are 250% more likely than civilian women to commit suicide.
There is also the issue of women being categorized as “housing insecure” instead of homeless. Housing insecurity is defined as high housing costs in proportion to income, poor housing quality, unstable neighborhoods, overcrowding, or homelessness. The number of women among homeless veterans increased from 7.5% in 2009 to 10% in 2011, while they were just 7% of the total veteran population.
Why does this happen? Many young people join the military before ever having stable permanent housing. The military takes care of all housing needs but it is transitional. After discharge, many of move home, to their parents’ house, or to “couch surfing.” They return oftentimes with no credit, no rental history, and find themselves in increasingly unstable and unsafe places. If they find themselves without a place to live, they use the GI Bill to pay rent and bills rather than to graduate. They become conditioned to housing instability.
This situation is further compounded by the statistic that Iraq and Afghanistan Veterans are more likely to have experienced than other cohorts multiple deployments, have service-related disabilities, higher rates of PTSD, and military sexual trauma. In addition, studies have shown that women service members experience isolation, alienation and sometimes threat in larger scales than their male cohorts.
The VA is undergoing a major reorganization to transform the way it provides services for its veterans nationally. This includes addressing chronic homelessness for returning veterans, but there is still a lot of room for improvement. Veterans have expressed the need to improve transition services for men as well as women whether it be reintegration when they are leaving military service or demobilization after a combat tour. Recommendations for gender-specific transition and demobilization assessments and services have been made by many groups. Although some effort has been made by the Department of Defense (DOD) to address this gap it appears to be inadequate because mental wellness is not improving. Servicewomen have a very different experience of deployment and transition and programs must be tailored to meet women’s specific needs. The VA and DOD must come together and jointly reach a solution that provides a continuum of care that is gender specific with proven lasting improvement in the mental wellness of the women who serve this nation.
If you find yourself struggling with housing insecurity or would like more information about VA services for the homeless, call to 1-877-4AID-VET to connect with VA. | <urn:uuid:ca7cb511-3f0f-44ed-bf56-27bd549ce23b> | CC-MAIN-2019-09 | https://www.hillandponton.com/servicewomen-mental-health-long-term/ | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247511573.67/warc/CC-MAIN-20190221233437-20190222015437-00218.warc.gz | en | 0.970906 | 684 | 3.0625 | 3 |
As probably all ESL teachers are aware of, many, if not most of their students have difficulties with pronunciation. Here are fun sentence dictation activities to improve ESL pronunciation.
Students may have a great understanding of grammar and a wide-ranging vocabulary, but if they can’t be understood when speaking, those are moot points.
But it is somewhat difficult for teachers to address every single pronunciation issue that pops up in class.
Add to that, having a strictly pronunciation-oriented class can be seriously boring for the students and you.
Plus, it can be downright embarrassing if teachers single out one student’s pronunciation issues.
Typically, the problem is not so much the pronunciation of words, but how students make the sounds that are combined for pronunciation.
That’s why it’s necessary at times to break words into constituent sounds. We can call these sounds speech sounds or phonetics.
It is of course difficult for teachers to address every single pronunciation issue that pops up in class. With the right TESOL certification, teachers can learn how to offer a creative, insightful, and engaging pronunciation class such as the fun sentence dictation activities.
Beware not to embarrass students by singling out their pronunciation issues.
Today we have a game that can make honing speech sounds more fun, and at the same time target weak areas. It’s called, Fun Sentence Dictation Activity. It’s something I designed many years ago when I realized, as mentioned, much of the underlying problem in pronunciation is not words but individual speech sounds.
But how do you teach sounds to a mixed class of elementary students, university students, or adults? Well, you don’t have to teach it as much as create an awareness of it in your learners’ minds then capitalize on it. And it can be done in a fun way. Read on for instructions on how to take your pronunciation classes to the next level.
Instructions-Fun Sentence Dictation Activities
It is important to be able to represent sounds for students in an unambiguous way; standard English spelling doesn’t usually do the job, so some different representations of sounds may be needed like fun sentence dictation activities. The most common method is the IPA (International Phonetic Alphabet). There are other methods, many of which will be incorporated into the textbooks your students are using. Whatever one you choose, be certain that students understand it, and be certain that you are consistent with the way you apply it. Students will depend on it.
1. Identify Problematic Phonetic Sounds
If you’re teaching pronunciation within a specific culture, you’re likely aware of specific speech sounds that are problematic to the culture. Therefore, you know which sounds to focus on. However, if you have a mixed class, you’ll need to spend a little time interacting with them to be able to identify weak areas.
For example, a diverse group of learners may need some polish in the following contrasting (“vs.”) speech sounds:
- /ae/ vs. /eh/, /uh/, and /ah/
- /ee/ vs. /ih/
- /p/ vs. /f/
- /b/ vs. /v/
- /th/ vs. /t/ and /s/
- /TH/ vs. /d/
These are now your target sounds (TS) and the sounds you incorporate into the activity. Again, the point here is to playfully create an awareness of speech sound shortcomings in the students that will provide an opportunity for you to correct and teach.
2. Create Fun Sentences
They’re called fun sentences because they sound somewhat silly but could be real. Check out a few examples here:
- Have an apple after stamping the sample.
- A fashionably tan man.
- My cousin Sunny is Fanny’s friend.
- Matt’s math class.
- We expect wetter weather.
- Six beef sandwiches.
- Is Kim with Jim?
- This list or these?
- Three trees filled with bees.
- Six sick pigs sitting.
- Fly Friday after five.
- Pick up your pace.
- Perfectly proper photos.
- French fries please.
- Fifteen photos of the finishers.
- A ban on vans.
- The velvet vest is best.
- They’ve left Dave.
- We’ve been breathing better.
Notice how each sentence has captured either one speech sound or a pair of speech sounds. For example: “Have an apple after stamping the sample” emphasizes the /ae/ sound. And, “We expect wetter weather” incorporates “tt” which comes out as /d/ (when located in the middle of a word) vs. /TH/ (weather).
Write or type one sentence on one strip of paper. Depending on your class size, you’ll want to have enough for at least 1, 2, or 3 rounds.
3. Prepare the Class
Have a shoebox with the individual fun sentence strips and pass the box around. Each student will grab 1, 2, or 3 or three strips depending on your plan. Students shouldn’t show each other what their strips say. They’re secrets only to be revealed later in the class. Each student should also have a pen and paper to write on.
4. Let the Dictations Begin
Starting with the first learner, he/she will speak the sentence as clearly as he/she can but in a natural way— natural but clear. That’s the challenge. It shouldn’t be elongated or halting. You can permit one or two repeats, but no more than that. The idea is to challenge both speakers and listeners.
The listeners write what they hear on a note pad. Continue going around the room until you’ve completed the round or rounds. You should be taking note of issues with specific speech sounds and or words to be addressed during the feedback portion. But remember, during feedback time, no names; just address the issues—we don’t want to shame anyone.
5. Wrap Up and Feedback
When everyone finishes speaking their sentences, it’s time for the revelations. Beginning with the first sentence, you will either write on a board or show the strip to the class. Class members then check what they heard.
As they see where they may have gone wrong, they become aware of their need for developing their skills in discerning contrasting speech sounds. In that sense, “Fun Sentences” is also a listening activity. On the other hand, if most of the class wrote the wrong sentence, the speaker can see where he/she needs polish in sound production.
No worries though, there are no grades for this, so they don’t need to worry about showing each other or the teacher what they wrote/heard.
What happens if the person saying the sentence missed the accurate sound but someone else hears/writes the correct sentence?
Spoken: “Set these papers there.”
Written: “Sit this papers there.”
That tells you there’s an issue with the student’s perception of the /eh/ vs. /ih/, and /ee/ vs. /ih/ sounds. This isn’t an uncommon occurrence.
Or, what if the speaker said, “Pickled Pfeffer,” clearly, but the listener writes, “Pickled pepper.” That tells you the listener has an issue with /p/ vs. /f/ sounds.
As the teacher, you’ll have to be alert and judge what passes for clear speech and what passes for weak listening.
You can also turn this into a game as follows:
- Divide the class into two teams: A and B.
- One speaker from team A will say the words clearly to another team A member who will write the sentence down.
- If the sentence is correct, then team A receives points. If incorrect, team B may attempt to steal the points by producing the exact sentence spoken by the team A speaker.
- Alternatively: Create a time limit of say 15-20 seconds to accomplish the sentence.
- Select the game-ending point goal and continue the game until finished.
The fun sentence dictation activity is a fun way to address pronunciation issues from the bottom up. If students can learn to produce clearer speech sounds, their pronunciation will improve significantly. Having this type of activity can help them realize that they need some polish and be more welcoming to phonetic instruction and training from you. And, because it’s a pronunciation activity, it can be used with all levels and ages.
It’s just fun and gets a lot of laughs (depending on the chemistry in your class)!
Give it a shot and tell us how it went. | <urn:uuid:3c37afb0-6a6b-47ca-b139-d51f262dcae4> | CC-MAIN-2023-40 | https://ontesol.com/blog/how-to-teach-english/teaching-pronunciation/esl-pronunciation-101-fun-sentence-dictation-activity/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510983.45/warc/CC-MAIN-20231002064957-20231002094957-00095.warc.gz | en | 0.93455 | 1,889 | 3.765625 | 4 |
Land of opportunity
We honor them now, decades after their selfless acts, the Schindlers, Wallenbergs and Wintons of this world. They were heroes in a dangerous time, risking all to save the lives of others.
Oskar Schindler, a member of the Nazi party, saved 1,200 Jewish employees and family members from Hitler. A flawed man, he was first drawn to them as cheap labor in his Krakow factory. He found his conscience but lost his fortune, protecting them from certain death.
Raoul Wallenberg, a Swedish diplomat during World War II, might have saved as many as 100,000 from the death camps. Based in Hungary, he provided passports and sanctuary in Swedish properties around Budapest. He disappeared just after the war.
British stockbroker Nicholas Winton abandoned a ski trip to help a friend in Prague in 1938. Stunned by Kristallnacht, Winton started the Czech Kindertransport. He found foster homes abroad for 669 children but remained haunted by the 225 he lost, on the last train out, seized by the Nazis.
The world was blessed then with individuals who selflessly battled evil. But then as now, nations also had to rise to the challenge. And where other nations saw darkness without hope, America saw opportunity to protect the oppressed.
Now, thousands of refugee children have gathered inside our borders, fleeing from unspeakable treatment and ominous death in their lawless hometowns in Central America. And opportunity knocks again, albeit on a smaller scale. As before, there are individual heroes who will fight for them. But that is rarely enough.
As before, this is a national opportunity to honor our Founders and keep faith with American principles. Those are not empty words on the Statue of Liberty. Emma Lazarus defined our national character when she wrote:
Give me your tired, your poor,
Your huddled masses yearning to breathe free,
The wretched refuse of your teeming shore.
Send these, the homeless, tempest-tost to me,
I lift my lamp beside the golden door!
In spite of this American prayer, there will always be fear-mongers among us. There is even a special breed of ignoramus this time, brandishing weapons at protests, demanding that the children be deported. It makes you wonder what kind of men take up arms against helpless children. But this nation has never bowed to their ilk.
Forget everything else. Forget politics and immigration policy. Forget about red states and blue states and legislative impasse. And forget the next election. On the last great day, who will want to answer for bureaucratic dawdling when these children cried out for our help?
These are children who have escaped certain danger, begging for our sword and shield. They properly believe in America as savior and we must protect and nurture them or put our national soul at risk.
Jesus chastised his disciples when they chased away the children who sought his blessing, saying, “Allow little children to come unto me, and forbid them not, for of such is the kingdom of God.”
Joseph Sabino Mistick, a lawyer, law professor and political analyst, lives in Squirrel Hill (joemistick.com). | <urn:uuid:b7459fa7-9170-43ca-9670-5c8cd09d8200> | CC-MAIN-2016-26 | http://triblive.com/opinion/josephmistick/6455213-74/opportunity-forget-america | s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783399117.38/warc/CC-MAIN-20160624154959-00174-ip-10-164-35-72.ec2.internal.warc.gz | en | 0.958431 | 670 | 2.65625 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.