Legal adviser: Drone position will be explained

The Obama administration has asserted a legal position on the use of drone aircraft to kill suspected terrorists and militants, and officials plan to share the details "at an appropriate moment," according to Harold Koh, the State Department's legal adviser.

National Journal asked Koh, the senior official responsible for international legal issues, to share his views after his public remarks at an American Bar Association speech on Wednesday. "I have studied this question," Koh said. "I think that the legal objections that are being put on the table are ones that we are taking into account. I am comfortable with the legal position of the administration, and at an appropriate moment we will set for that in some detail."

The administration has made drone strikes the centerpiece of its fight against terrorists, but officials have never said why they believe the program complies with international law. A number of legal scholars and international officials have said the killings could violate certain laws of armed conflict, particularly when they're carried out in countries where the United States is not at war, such as Pakistan and Yemen.

Koh gave no indication of when the administration might unveil its legal rationale or what it might entail. But he added, "You can expect a more detailed discussion of this to come." Koh was reluctant to reveal specifics, and he said that the informal venue of a speech was not the appropriate setting to discuss the "complicated" issue.

Some scholars have argued that the United States can justify drone killings of terrorists and militants who would attack Americans on the grounds of self-defense. But, as National Journal reported in January, a growing chorus of experts believes the drone strikes could be deemed extrajudicial killings. The American Civil Liberties Union has filed a Freedom of Information Act request to see all documents that might illuminate the administration's legal thinking on the matter.

Given the political consensus in Washington that drone attacks are effective, safe and palatable tools for killing foreign terrorists, the Obama administration presumably would refute any suggestion the strikes were illegal.

Koh is a prolific writer and authority on human rights, civil liberties and the application of international law, and in his former position as the dean of Yale Law School, he was a vocal critic of the Bush administration's counterterrorism policies. Koh declined an earlier request on the subject of drone strikes, but an extensive survey of his writings suggested that he might take issue with the drone program, at least as it is currently designed.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.