Powers and Principalities

This WordPress.com site is the cat’s pajamas

False flag

False flag

From Wikipedia, the free encyclopedia
Jump to: navigation, search

False flag operations are covert operations designed to deceive the public in such a way that the operations appear as though they are being carried out by other entities. The name is derived from the military concept of flying false colors; that is, flying the flag of a country other than one’s own. False flag operations are not limited to war and counter-insurgency operations, and can be used in peace-time.

Contents

[show]

[edit] Naval warfare

This practice was considered acceptable in naval warfare, provided the false flag was lowered and the national flag raised before engaging in battle. Auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection. One of the most notable examples was in World War II when the German commerce raider Kormoran, disguised as a Dutch merchant ship, surprised and sank the Australian light cruiser HMAS Sydney in 1941, causing the greatest recorded loss of life on an Australian warship. The Kormoran was also fatally crippled in that encounter and its crew was captured, but it was a considerable psychological victory for the Germans.[1]
The British used a Kriegsmarine Ensign in the St Nazaire Raid and captured a German Morse code book. The old destroyer Campbeltown, which the British planned to sacrifice in the operation, was provided with cosmetic modifications, cutting the ship’s funnels and chamfering the edges to resemble a German Möwe-class destroyer. The British were able to get within two miles of the harbour before the defences responded, where the explosive-rigged Campbeltown and commandos successfully disabled or destroyed the key dock structures of the port.[2][3]

[edit] Air warfare

It was obvious that if the case were to be kept going a faked act of sabotage would have to be committed
— MI5 file on Mutt and Jeff[4]

In December 1922-February 1923, Rules concerning the Control of Wireless Telegraphy in Time of War and Air Warfare, drafted by a commission of jurists at the Hague regulates:
Art. 3. A military aircraft must carry an exterior mark indicating its nationality and its military character.
Art. 19. The use of false exterior marks is forbidden.
British intelligence officials in World War II allowed double agents to fire-bomb a power station and a food dump in the UK to protect their cover, according to declassified documents. The documents stated the agents took precautions to ensure they did not cause serious damage. One of the documents released also stated: “It should be recognised that friends as well as enemies must be completely deceived.”[4]

[edit] Land warfare

In land warfare, the use of a false flag is similar to that of naval warfare. The most widespread assumption is that this practice was first established under international humanitarian law at the trial in 1947 of the planner and commander of Operation Greif, Otto Skorzeny, by the military court at the Dachau Trials. In this trial, the court did not find Skorzeny guilty of a crime by ordering his men into action in American uniforms. He had passed on to his men the warning of German legal experts, that if they fought in American uniforms, they would be breaking the laws of war, but they probably were not doing so just by wearing the uniform. During the trial, a number of arguments were advanced to substantiate this position and the German and U.S. military seem to have been in agreement on it. In the transcript of the trial[5] it is mentioned that Paragraph 43 of the Field Manual published by the War Department, United States Army, on October 1, 1940, under the title “Rules of Land Warfare”, says:

“National flags, insignias and uniforms as a ruse – in practice it has been authorized to make use of these as a ruse. The foregoing rule (Article 23 of the Annex of the IVth Hague Convention), does not prohibit such use, but does prohibit their improper use. It is certainly forbidden to make use of them during a combat. Before opening fire upon the enemy, they must be discarded”.
Also The American Soldiers’ Handbook, was quoted by Defense Counsel and says:

“The use of the enemy flag, insignia, and uniform is permitted under some circumstances. They are not to be used during actual fighting, and if used in order to approach the enemy without drawing fire, should be thrown away or removed as soon as fighting begins”.

The outcome of the trial has been codified in the 1977 Protocol Additional to the Geneva Conventions of 12 August 1949 (Protocol I):
Article 37.-Prohibition of perfidy

1. It is prohibited to kill, injure, or capture an adversary by resort to perfidy. Acts inviting the confidence of an adversary to lead him to believe that he is entitled to, or is obliged to accord, protection under the rules of international law applicable in armed conflict, with intent to betray that confidence, shall constitute perfidy. The following acts are examples of perfidy:
(a) The feigning of an intent to negotiate under a flag of truce or of a surrender;
(b) The feigning of an incapacitation by wounds or sickness;
(c) The feigning of civilian, non-combatant status; and
(d) The feigning of protected status by the use of signs, emblems or uniforms of the United Nations or of neutral or other States not Parties to the conflict.
2. Ruses of war are not prohibited. Such ruses are acts which are intended to mislead an adversary or to induce him to act recklessly but which infringe no rule of international law applicable in armed conflict and which are not perfidious because they do not invite the confidence of an adversary with respect to protection under that law. The following are examples of such ruses: the use of camouflage, decoys, mock operations and misinformation.

Article 38.-Recognized emblems

1. It is prohibited to make improper use of the distinctive emblem of the red cross, red crescent or red lion and sun or of other emblems, signs or signals provided for by the Conventions or by this Protocol. It is also prohibited to misuse deliberately in an armed conflict other internationally recognized protective emblems, signs or signals, including the flag of truce, and the protective emblem of cultural property.
2. It is prohibited to make use of the distinctive emblem of the United Nations, except as authorized by that Organization.

Article 39.-Emblems of nationality

1. It is prohibited to make use in an armed conflict of the flags or military emblems, insignia or uniforms of neutral or other States not Parties to the conflict.
2. It is prohibited to make use of the flags or military emblems, insignia or uniforms of adverse Parties while engaging in attacks or in order to shield, favour, protect or impede military operations.
3. Nothing in this Article or in Article 37, paragraph 1 ( d ), shall affect the existing generally recognized rules of international law applicable to espionage or to the use of flags in the conduct of armed conflict at sea.

[edit] As pretexts for war

In the 1931 Mukden incident
, Japanese officers fabricated a pretext for annexing Manchuria by blowing up a section of railway. Six years later they falsely claimed the kidnapping of one of their soldiers in the Marco Polo Bridge Incident as an excuse to invade China proper.
In the Gleiwitz incident in August 1939, Reinhard Heydrich made use of fabricated evidence of a Polish attack against Germany to mobilize German public opinion and to fabricate a false justification for a war with Poland. This, along with other false flag operations in Operation Himmler, would be used to mobilize support from the German population for the start of World War II in Europe.
On November 26, 1939, the Soviet Union shelled the Russian village of Mainila near the Finnish border. The Soviet Union attacked Finland four days afterwards, claiming the shelling to have been a Finnish military action. Russia subsequently agreed that the attack was initiated by the Soviets.[6] Also, the nearest Finnish artillery pieces were well out of range of Mainila.[7]
In 1953, the U.S. and British-orchestrated Operation Ajax used “false-flag” and propaganda operations against the formerly democratically elected leader of Iran, Mohammed Mosaddeq. Information regarding the CIA-sponsored coup d’etat has been largely declassified and is available in the CIA archives.[8]
In 1954, the Military Intelligence Directorate of Israel launched a series of bombings against targets in Cairo which had British and American financial interests, in the hopes of alienating the U.S. and Britain from Egypt.[9] Codenamed Operation Suzannah, it was later dubbed the Lavon Affair, after Israeli Defense Minister Pinchas Lavon. Lavon and Israeli Military Intelligence head Binyamin Gibli had planned and carried out the operation in secret, and without telling Prime Minister Moshe Sharett in advance. Lavon and Gibli both lost their jobs as a result. Israel (where it is known as “The Unfortunate Affair”) finally admitted responsibility in 2005.[10]
The planned, but never executed, 1962 Operation Northwoods plot by the U.S. Department of Defense for a war with Cuba involved scenarios such as hijacking or shooting down passenger and military planes, sinking a U.S. ship in the vicinity of Cuba, burning crops, sinking a boat filled with Cuban refugees, attacks by alleged Cuban infiltrators inside the United States, and harassment of U.S. aircraft and shipping and the destruction of aerial drones by aircraft disguised as Cuban MiGs. These actions would be blamed on Cuba, and would be a pretext for an invasion of Cuba and the overthrow of Fidel Castro‘s communist government. It was authored by the Joint Chiefs of Staff, nixed by John F. Kennedy, came to light through the Freedom of Information Act and was publicized by James Bamford.
Former GRU officer Aleksey Galkin,[11] former FSB officer Alexander Litvinenko[12] and others have stated that the 1999 Russian apartment bombings that precipitated the Second Chechen War were false flag operations perpetrated by the FSB. Galkin has since recanted his accusation, which was made while prisoner of Chechen rebels.[citation needed]

[edit] Pseudo-operations

Pseudo-operations are those in which forces of one power disguise themselves as enemy forces. For example, a state power may disguise teams of operatives as insurgents and, with the aid of defectors, infiltrate insurgent areas.[13] The aim of such pseudo-operations may be to gather short or long-term intelligence or to engage in active operations, in particular assassinations of important enemies. However, they usually involve both, as the risks of exposure rapidly increase with time and intelligence gathering eventually leads to violent confrontation. Pseudo-operations may be directed by military or police forces, or both. Police forces are usually best suited to intelligence tasks; however, military provide the structure needed to back up such pseudo-ops with military response forces. According to US military expert Lawrence Cline (2005), “the teams typically have been controlled by police services, but this largely was due to the weaknesses in the respective military intelligence systems.”
The State Political Directorate (OGPU) of the Soviet Union set up such an operation from 1921 to 1926. During Operation Trust, they used loose networks of White Army supporters and extended them, creating the pseudo-“Monarchist Union of Central Russia” (MUCR) in order to help the OGPU identify real monarchists and anti-Bolsheviks. An example of a successful assassination was United States Marine Sergeant Herman H. Hanneken leading a patrol of his Haitian Gendarmerie disguised as enemy guerrillas in 1919. The Patrol successfully passed several enemy checkpoints in order to assassinate the guerilla leader Charlemagne Péralte near Grand-Rivière du Nord. Hanneken was awarded the Medal of Honor and was commissioned a Second Lieutenant for his deed.
During the Mau Mau uprising in the 1950s, captured Mau Mau members who switched sides and specially trained British troops initiated the pseudo-gang concept to successfully counter Mau Mau terrorists. In 1960 Frank Kitson, (who was later involved in the Northern Irish conflict and is now a retired British General), published Gangs and Counter-gangs, an account of his experiences with the technique in Kenya; information included how to counter gangs and measures of deception, including the use of defectors, which brought the issue a wider audience.
Another example of combined police and military oversight of pseudo-operations include the Selous Scouts in former country Rhodesia (current Zimbabwe), governed by white minority rule until 1980. The Selous Scouts were formed at the beginning of Operation Hurricane, in November 1973, by Major (later Lieutenant Colonel) Ronald Reid-Daly. As all Special Forces in Rhodesia, by 1977 they were controlled by COMOPS (Commander, Combined Operations) Commander Lieutenant General Peter Walls. The Selous Scouts were originally composed of 120 members, with all officers being white and the highest rank initially available for Africans being colour sergeant. They succeeded in turning approximately 800 insurgents who were then paid by Special Branch, ultimately reaching the number of 1,500 members. Engaging mainly in long-range reconnaissance and surveillance missions, they increasingly turned to offensive actions, including the attempted assassination of ZIPRA leader Joshua Nkomo in Zambia. This mission was finally aborted by the Selous Scouts, and attempted again, unsuccessfully, by the Rhodesian Special Air Service.[14]
Some offensive operations attracted international condemnation, in particular the Selous Scouts’ raid on a ZANLA (Zimbabwe African National Liberation Army) camp at Nyadzonya Pungwe, Mozambique in August 1976. ZANLA was then led by Josiah Tongogara. Using Rhodesian trucks and armored cars disguised as Mozambique military vehicles, 84 scouts killed 1,284 terrorists in the camp, the camp was registered as a refugee camp by the United Nations (UN). Even according to Reid-Daly, most of those killed were unarmed guerrillas standing in formation for a parade. The camp hospital was also set ablaze by the rounds fired by the Scouts, killing all patients.[15] According to David Martin and Phyllis Johnson, who visited the camp shortly before the raid, it was only a refugee camp which did not host any guerrillas. Which was staged for UN approval.[16]
According to a 1978 study by the Directorate of Military Intelligence, 68% of all insurgent deaths inside Rhodesia could be attributed to the Selous Scouts, who were disbanded in 1980.[17]
If the action is a police action, then these tactics would fall within the laws of the state initiating the pseudo, but if such actions are taken in a civil war or during a belligerent military occupation then those who participate in such actions would not be privileged belligerents. The principle of plausible deniability is usually applied for pseudo-teams. (See the above section Laws of war). Some false flag operations have been described by Lawrence E. Cline, a retired US Army intelligence officer, as pseudo-operations, or “the use of organized teams which are disguised as guerrilla groups for long- or short-term penetration of insurgent-controlled areas.”
Pseudo Operations should be distinguished, notes Cline, from the more common police or intelligence infiltration of guerrilla or criminal organizations. In the latter case, infiltration is normally done by individuals. Pseudo teams, on the other hand, are formed as needed from organized units, usually military or paramilitary. The use of pseudo teams has been a hallmark of a number of foreign counterinsurgency campaigns.”[13]

[edit] Espionage

See false flag penetrator.

In espionage the term “false flag” describes the recruiting of agents by operatives posing as representatives of a cause the prospective agents are sympathetic to, or even the agents’ own government. For example, during the Cold War, several female West German civil servants were tricked into stealing classified documents by agents of the East German Stasi intelligence service, pretending to be members of West German peace advocacy groups (the Stasi agents were also described as “Romeos,” indicating that they also used their sex appeal to manipulate their targets, making this operation a combination of the false flag and “honey trap” techniques).[18]
The technique can also be used to expose enemy agents in one’s own service, by having someone approach the suspect and pose as an agent of the enemy. Earl Edwin Pitts, a 13-year veteran of the FBI and an attorney, was caught when he was approached by FBI agents posing as Russian agents.
Frederick Forsyth described the technique in his novel The Fourth Protocol, in which a fiercely anti-communist British civil servant passes military secrets to a South African diplomat who is in fact a Russian agent.
“False Flag” is also the title of a first season episode of the TV series Burn Notice. In that episode, a female assassin (Lucy Lawless) tricks Michael Westen (Jeffrey Donovan) into leading her to her target, by posing as the man’s innocent and abused ex-wife, trying to reclaim her kidnapped son.

[edit] Civilian usage

While false flag operations originate in warfare and government, they also can occur in civilian settings among certain factions, such as businesses, special interest groups, religions, political ideologies and campaigns for office.

[edit] Businesses

In business and marketing, similar operations are being employed in some public relations campaigns (see Astroturfing). Telemarketing firms practice false flag type behavior when they pretend to be a market research firm (referr
ed to as “sugging“). In some rare cases, members of an unsuccessful business will destroy some of their own property to conceal an unrelated crime (e.g. safety violations, embezzlement, etc.) but make it appear as though the destruction was done by a rival company.

[edit] Political campaigning

Political campaigning has a long history of this tactic in various forms, including in person, print media and electronically in recent years. This can involve when supporters of one candidate pose as supporters of another, or act as “straw men” for their preferred candidate to debate against. This can happen with or without the candidate’s knowledge. The Canuck letter is an example of one candidate creating a false document and attributing it as coming from another candidate in order to discredit that candidate.
In 2006, individuals practicing false flag behavior were discovered and “outed” in New Hampshire[19][20] and New Jersey[21] after blog comments claiming to be from supporters of a political candidate were traced to the IP address of paid staffers for that candidate’s opponent.

[edit] Ideological

Political or religious ideologies will sometimes use false flag tactics. This can be done to discredit or implicate rival groups, create the appearance of enemies when none exist, or create the illusion of organized and directed opposition when in truth, the ideology is simply unpopular with society.

A bomb threat forged by Scientology operatives

In retaliation for writing The Scandal of Scientology, the Church of Scientology stole stationery from author Paulette Cooper‘s home and then used that stationery to forge bomb threats and have them mailed to a Scientology office. The Guardian’s Office also had a plan for further operations to discredit Cooper known as Operation Freakout, but several Scientology operatives were arrested in a separate investigation and the plan failed.[22]

[edit] Terrorism

False flag tactics were also employed during the Algerian civil war, starting in the mid-1994. Death squads composed of DRS (Département du Renseignement et de la Sécurité) security forces disguised themselves as Islamist terrorists and committed false flag terror attacks. Such groups included the OJAL (Organisation of Young Free Algerians) or the OSSRA (Secret Organisation for the safeguard of the Algerian Republic)[23] According to Roger Faligot and Pascal Kropp (1999), the OJAL reminded of “the Organization of the French Algerian Resistance (ORAF), a group of counter-terrorists created in December 1956 by the Direction de la surveillance du territoire (Territorial Surveillance Directorate) whose mission was to carry out terrorist attacks with the aim of quashing any hopes of political compromise.” [24]
On the night of February 27, 1933, the Reichstag building was set on fire. At the urging of Hitler, Hindenburg responded the next day by issuing an emergency decree “for the Protection of the people and the State,” which stated: “Restrictions on personal liberty, on the right of free expression of opinion, including freedom of the press; on the rights of assembly and association; and violations of the privacy of postal, telegraphic and telephonic communications and warrants for house searches, orders for confiscations as well as restrictions on property, are also permissible beyond the legal limits otherwise prescribed.” The question of who actually started the Reichstag fire is still unknown and occasionally debated.
The Russian apartment bombings in the Russian cities of Buynaksk, Moscow and Volgodonsk in September 1999 which killed nearly 300 people, is described by Yury Felshtinsky, Alexander Litvinenko, David Satter, Boris Kagarlitsky, Vladimir Pribylovsky, Anna Politkovskaya, filmmaker Andrei Nekrasov, investigator Mikhail Trepashkin, as well as the secessionist Chechen authorities and former popular Russian politician Alexander Lebed as a false flag attack coordinated by the Federal Security Service, the main domestic security agency of the Russian Federation.[25][26][27][28][29][30][31][32][33][34][35]

[edit] Dirty War

During a 1981 interview whose contents were revealed by documents declassified by the CIA in 2000, former CIA and DINA agent Michael Townley explained that Ignacio Novo Sampol, member of CORU, an anti-Castro organization, had agreed to commit the Cuban Nationalist Movement in the kidnapping, in Buenos Aires, of a president of a Dutch bank. The abduction, organized by civilian SIDE agents, the Argentine intelligence agency, was to obtain a ransom. Townley said that Novo Sampol had provided six thousand dollars from the Cuban Nationalist Movement, forwarded to the civilian SIDE agents to pay for the preparation expenses of the kidnapping. After returning to the US, Novo Sampol sent Townley a stock of paper, used to print pamphlets in the name of “Grupo Rojo” (Red Group), an imaginary Argentine Marxist terrorist organization, which was to claim credit for the kidnapping of the Dutch banker. Townley declared that the pamphlets were distributed in Mendoza and Córdoba in relation with false flag bombings perpetrated by SIDE agents, which had as their aim to accredit the existence of the fake Grupo Rojo. However, the SIDE agents procrastinated too much, and the kidnapping ultimately was not carried out.[36

October 24, 2010 Posted by | F, Schemes | , , , | Leave a comment

Judge Advocate General’s Corps

Judge Advocate General’s Corps

From Wikipedia, the free encyclopedia
Jump to: navigation, search

Judge Advocate General’s Corps, also known as JAG or JAG Corps, refers to the legal branch or specialty of any of the United States Armed Forces including the Air Force, Army, Coast Guard, Marine Corps, and Navy. Officers serving in the JAG Corps are typically called Judge Advocates. The Marine Corps, Coast Guard and Air Force do not maintain separate JAG Corps per se and judge advocates in those services maintain their line officer-status. In the Army and Navy, JAG officers only serve in legal positions.
Judge Advocates serve primarily as legal advisors to the command to which they are assigned. In this function, they can also serve as the personal legal advisor to their commander. Their advice may cover a wide range of issues dealing with administrative law, government contracting, civilian and military personnel law, law of war and international relations, environmental law, etc. They also serve as prosecutors for the military when conducting courts-martial. They are charged with both the defense and prosecution of military law as provided in the Uniform Code of Military Justice. Highly experienced officers of the JAG Corps often serve as military judges in courts-martial and courts of inquiry.

Contents

[hide]

[edit] Military law

The Uniform Code of Military Justice, also known as UCMJ, is the primary legal code through which all internal military justice matters of the United States are governed. The UCMJ applies to all members of the Military of the United States, as well as members of other federal services (such as NOAA Corps and the Public Health Service Commissioned Corps) when attached to the military. The UCMJ was created by an act of the United States Congress in 1951 in order to establish relatively consistent systems of military justice in all branches of the nation’s armed forces. However, in cases involving very minor disciplinary infractions, each service has somewhat differing procedures. (Such cases are governed by UCMJ Article 15 and are called non-judicial punishment, Captain’s Mast (Navy), or Office Hours (Marines).)
In addition to the Uniform Code of Military Justice, personnel are subject to the terms of the Constitution, other federal laws, and individual state laws where applicable (e.g., whenever the service member is in the United States, unless on a military base with exclusive federal jurisdiction). When a violation of the UCMJ occurs, the matter is handled by the command of the servicemember. When a violation of a federal or state law occurs, the matter may be handled by local st

ate or federal authorities.

[edit] Court-Martial

The forum through which criminal cases are tried in the nation’s armed forces is the court-martial. This term also applies to the panel of military officers selected to serve as the finders of fact or “jury”. (In other words, they fulfil the role of a civilian jury in trying criminal cases.) The Uniform Code of Military Justice outlines three distinct types of courts martial.

[edit] General Court-Martial

  • jurisdiction over crimes committed by any person, including civilians, covered by military law at the time the crime was committed
  • forum for most serious charges such as homicide, sexual assault, drug distribution, or desertion
  • officers detailed to the court are defense counsel, trial counsel (prosecutor) and military judge
  • a court martial panel (or “jury”) comprises five or more service members, at least one third of whom are enlisted if requested by an enlisted accused
  • accused service member may request trial by judge alone in lieu of trial by a panel of members, except where the death penalty may be adjudged
  • maximum sentence that a General Court-Martial can impose is the maximum specified in the specific UCMJ Article (crime) the accused is convicted of, including death

[edit] Special Court-Martial

  • jurisdiction over crimes committed by any person, including civilians, covered by military law at the time the crime was committed
  • forum for intermediate offenses such as battery, assault, larceny (theft), minor drug-related offenses, unauthorized absence, disrespect, disobedience, and similar crimes
  • officers detailed to the court are defense counsel, trial counsel (prosecutor) and military judge
  • Special Court-Martial panel comprises three or more members, at least one third of whom are enlisted if requested by an enlisted accused
  • accused service member may request trial by judge alone in lieu of trial by a panel of members
  • regardless of what crime is charged at a Special Court-Martial, the maximum sentence that can be adjudged is 12 months confinement, forfeiture of two-thirds pay for 12 months, reduction in rank, bad conduct discharge, and a fine
  • a Special Court-Martial cannot confine or dismiss an officer

[edit] Summary Court-Martial

  • jurisdiction over crimes committed by enlisted personnel only
  • forum for minor offenses such as petty theft
  • Special Court-Martial comprises a single officer whose pay grade should not be below O-3
  • maximum sentence is one month confinement, forfeiture of two-thirds pay, reduction in rank to E-1
  • Summary Courts-Martial may not adjudge punishments of confinement with out hard labor or reduction except the next inferior pay grade for accused who are in the pay grade of E-5 or greater
  • can be refused by the accused, in which case the matter is normally referred to a Special Court-Martial

[edit] Appeals process

The Uniform Code of Military Justice provides for several tiers of appeal. All cases are reviewed by the commander convening the court (the convening authority) who, as a matter of command prerogative, may approve, disapprove, or modify the findings and/or sentence. The commander may not approve a finding of guilty for an offense of which the accused was acquitted nor increase the sentence adjudged. A convicted service member may submit a request for leniency to the convening authority prior to the convening authority’s approval of the court-martial sentence.
Each military service and the Coast Guard has a Court of Criminal Appeals, which is composed of panels of three appellate military judges:

These courts review all cases in which the approved sentence includes death, a punitive discharge, or confinement for at least a year, and all cases referred to it by the service Judge Advocate General. The court of criminal appeals “may affirm only such findings of guilty and the sentence or such part of the sentence, as it finds correct in law and fact and determines, on the basis of the entire record, should be approved. In considering the record, it may weigh the evidence, judge the credibility of witnesses, and determine controverted questions of fact, recognizing that the trial court saw and heard the witnesses.” Article 66(c), UCMJ.
The Court of Appeals for the Armed Forces (CAAF) consists of five civilian judges appointed by the President of the United States, with the advice and consent of the U.S. Senate, to 15-year terms. The CAAF must review cases from all of the military services in which the court of criminal appeals has affirmed a death sentence, cases the Judge Advocates General order sent to the court, and cases appealed from the court of criminal appeals by

the accused in which the CAAF finds good cause to grant the petition for review. Unlike the service courts of criminal appeals, the CAAF “shall take action only with respect to matters of law.” Article 67(c), UCMJ. Decisions of the CAAF are “subject to review by the Supreme Court by writ of certiorari.” Article 67a, UCMJ; this merely confirms Article III, Section 2 of the United States Constitution, granting the Supreme Court appellate jurisdiction in all US cases where it does not have original jurisdiction.
Cases not meeting the criteria for review by the service courts of criminal appeals are reviewed in the office of the service Judge Advocate General. Article 69, UCMJ. A death sentence “may not be executed until approved by the President. In such a case, the President may commute, remit, or suspend the sentence, or any part thereof, as he sees fit. That part of the sentence providing for death may not be suspended.” Article 71(a), UCMJ.

[edit] Other practice areas

Besides prosecuting, defending, and presiding over courts-martial, military attorneys advise commanders on issues involving a number of areas of law. Depending on the service, these areas may include the law of war, the rules of engagement and their interpretation, and other operational law issues, government contract law, administrative law, labor law, environmental law, international law, claims against the government (such as under the Federal Tort Claims Act), and information law (such as requests for information in the possession of the military under the Freedom of Information Act). Military attorneys also advise individual servicemembers, military retirees, and their families regarding personal civil legal problems they may have, including drafting wills, fending off creditors, and reviewing leases.

September 29, 2010 Posted by | J, Uncategorized | , , , , | Leave a comment