Dawn Pisturino's Blog

My Writing Journey

Japanese Invasion of China and the Tokyo War Crimes Trial

(Photo from the National WWII Museum)

The Japanese Invasion of China, 1937-1945

       After the First Sino-Japanese War, when Japan gained control of Korea, Japan continued to grow militarily and technologically, eventually embarking on the invasion of China on July 7, 1937 (U.S. Department of State, 1943, pg. 1).  The invasion resulted from a skirmish between Chinese and Japanese soldiers outside Peking (Beijing), North China.  Japan never formally declared war against China, and the invasion forced opposing forces within that country—the Chinese Nationalists and the Communists—to band together against the Japanese (U.S. Department of State, 2021, pg. 1).

       “In 1935, Japan signed the Anti-Comintern Pact with Hitler’s Germany, laying the foundation for the creation of the Axis (Fascist Italy would join the following year)” (Mankoff, 2015, pg. 1).  With the backing of Germany and Italy, Japan sought to conquer China.  Japanese forces had already seized Manchuria in 1931 and Jehol province in 1933.  The Japanese military “adopted a policy of deliberate savagery in the expectation that it would break the will of the Chinese to resist . . . [however], the Chinese Army . . . put up strong resistance to Japan’s armies, . . . [prompting the Japanese to engage in] an orgy of murder, rape, and looting that shocked the civilized world” (Pacific War, 2021, pg. 1).

       After taking Shanghai in late 1937, the Japanese moved on Nanking.  “Chiang Kai-Shek ordered the removal of nearly all official Chinese troops from the city, leaving it defended by untrained auxiliary troops.  Chiang also ordered the city held at any cost, and forbade the official evacuation of its citizens” (History, 2019, pg. 2).

       A neutral zone was established inside the city, managed by the International Committee for the Nanking Safety Zone.  Once the Chinese Army left Nanking, “all remaining citizens were ordered into the safety zone for their protection” (History, 2019, pg. 2).

       Japan’s Central China Front Army entered Nanking on December 13, 1937.  Rumors of their atrocities had already preceded them – including stories about “killing contests and pillaging” (History, 2019, pg. 2).  The Nanking Safety Zone was ignored.  Over six weeks, thousands of Chinese soldiers were murdered and buried in mass graves, families slaughtered—including infants and the elderly— and thousands of women raped.  At least one-third of the city was destroyed (History, 2019, pg. 2).

Tokyo War Crimes Trial

       On April 29, 1946, the International Military Tribunal for the Far East (IMTFE) gathered “to put leaders from the Empire of Japan on trial for joint charges of conspiracy to start and wage war” (Burton, 2020, pg. 6).  The Allies were immediately accused of seeking a “victor’s justice” against Japan, so judges from non-Allied countries were recruited to partake in the trial.  The United States arrested 28 Japanese leaders, who stood trial between May 3, 1946 and December, 1948.  They were charged with “war crimes, crimes committed against prisoners of war, and crimes against humanity” (Burton, 2020, pg. 6).

       As a result of the Potsdam negotiations, Japanese Emperor Hirohito and his son, Prince Asaka, were protected from prosecution; no testimony was allowed that implicated them; and Japanese media censored all information that portrayed the emperor and General Douglas MacArthur in a negative light.  Furthermore, only limited evidence was allowed in court, and media coverage was restricted (Burton, 2020, pg. 6,7). 

       Twenty-five defendants were found guilty. Two had already died.  One was hospitalized for mental illness.  Eighteen were sentenced to prison.  Seven were executed by hanging, including the General of the Imperial Japanese Army, Hideki Tojo.  After the Tokyo trial concluded, 2,200 more trials were held, and approximately 5,600 additional war criminals were tried (Burton, 2020, pg. 8).

       The Nuremberg and Tokyo trials “created a new standard of international justice” (Burton, 2020, pg. 9) that holds political and military leaders accountable for their actions and helps the countries of the world to avoid another World War.

Pufendorf, Vattel, Accountability, and Punishment

       [Philosopher] Samuel Pufendorf believed that humans wanted to live in peaceful, organized societies and “that actors [must] refrain from harming each other while pursuing their own interests and provided a universal right to punish those who violate the law” (Glanville, 2018, pg. 146).  He further emphasized that states bound by treaties and friendly relations are perfectly capable of living together in peace.  In fact, he saw this as a necessity for survival.  Some theorists have extended this idea to mean “that Pufendorf’s law of nations ‘involves an obligation on the part of one social group not merely not to harm, but actively to promote the welfare of all others’” (Glanville, 2018, pg. 147).  Pufendorf, therefore, called for stricter rules when it came to waging war against sovereign states (Glanville, 2018, pg. 146, 147).

       He recognized, however, the three traditional causes for just war: “to preserve ourselves and our possessions against injury; to claim from others the things that are rightfully ours if they refuse to provide them; and to obtain reparations for past injuries and guarantees that they will not be repeated” (Glanville, 2018, pg. 148).  Pufendorf insisted that “lust for fame, domination, and riches ought never to be considered just causes for war” (Glanville, 2018, pg. 148).

       By Pufendorf’s standards, Japan was wrong to invade China because Japan did not have an absolute right “to receive a benefit from others [China] in the form of trade, passage, hospitality, or settlement . . . and should not be considered subject to enforcement [by force]” (Glanville, 2018, pg. 149).  Japan’s motivation for invading China was domination, a reason that does not support Pufendorf’s guidelines for just war.

       At the same time, Pufendorf rejected the idea “of a universal right of punishment” (Glanville, 2018, pg. 150) unless punishment is rendered by the sovereign who has power over the guilty party.  That said, he would have made an exception in the case of the Nuremberg and Tokyo trials because the Nazis and the Japanese committed atrocious acts and “all men had a right to punish those persons who placed themselves beyond the jurisdiction of any courts of justice and [behaved] as if they are the enemies of all others” (Glanville, 2018, pg. 150).

       The Chinese had not done anything to deserve the invasion of their country, and they had a legitimate right to defend themselves against the Japanese invaders.  Pufendorf fully supported the right of a state to defend itself from aggressors as a fundamental cause for just war (Glanville, 2018, pg. 148).  Not only were the Japanese waging an unjust war against China, but their atrocious jus in bello behavior was unjustified and unnecessarily cruel.  Their behavior justified the Tokyo War Crimes Trial conducted by the Allies later on since “belligerents [and] their savagery motivates present or future enemies to act in kind” (Glanville, 2018, pg. 152).  It was absolutely unjust to protect the emperor and his son from punishment since they must have been aware of the tactics used by the Japanese military and its policy of total war.  They were certainly in charge of Japan’s imperialist ambitions in China.  And, even if military leaders ordered the butchery of the Chinese, individual soldiers were responsible for making a game out of it (killing contests) and carrying it out (History, 2019, pg. 2).

       [Philosopher] Emmerich Vattel developed the idea that sovereigns should be treated as “one treats others, whether a person or a state” (Christov, 2018, pg. 157).  He fully recognized that not all nations or people would follow this rule.  “If there were a people who made open profession on trampling justice under foot, — who despised and violated the rights of others whenever they found an opportunity, — the interest of human society would authorize all the other nations to form a confederacy in order to humble and chastise the delinquents . . . the safety of the human race requires that [such a nation] should be repressed” (Christov, 2018, pg. 160).

       The Japanese invasion of China would fall under this category of a rogue nation that has no respect for the rights of other nations and must be neutralized.  Since Japan did not officially declare war on China and refused to engage in peace negotiations with the United States, Japanese leadership violated the rights of China and the Chinese people.  They, therefore, became subject to punishment and international justice at the hands of other nations who wanted to rectify the situation and restore peace (U.S. Department of State, 1943, pg. 1).

       Japan had no claim to China except through the use of military force.  When they invaded China, they were sending a message that “we prosecute our right by force” (Christov, 2018, pg. 160) – which is a corruption of Vattel’s definition of war.  Vattel would have considered the invasion an “illegal war, which would include ‘conquest, or the desire of invading the property of others’” (Christov, 2018, pg. 160).

       The invasion of China also led ultimately to the bombing of Pearl Harbor, dragged the United States into World War II, and may have influenced President Truman to order the use of the atomic bomb on Hiroshima and Nagasaki in the final stage of the war (U.S. Department of State, 2021, pg. 2; Compton, 1946, pg. 1-3).  This chain of events illustrates the importance of addressing conflicts early in order “to provide for our future safety by punishing the aggressor or offender” (Christov, 2018, pg. 160).

       Vattel also insisted that “there are limits on what states can do in war” (Christov, 2018, pg. 162).  He rejected unnecessary brutality against people and destruction of property, calling these tactics of warfare “of an odious kind . . . unjustifiable in themselves . . . [and] prohibited by natural law” (Christov, 2018, pg. 163).  He regarded the individuals who engage in this kind of behavior “as savage barbarians” (Christov, 2018, pg. 163).

       Since the Japanese behaved like “savage barbarians,” they deserved to be prosecuted and punished during the Tokyo War Crimes Trial.  Vattel explained this in his book, Law of Nations, when he wrote, “when we are at war with a savage nation, who observe no rules, and never give quarter, we may punish them in the persons of any of their people whom we take . . . and endeavor . . . to force them to respect the laws of humanity” (Christov, 2018, pg. 164).

       Therefore, Emperor Hirohito and his son, Prince Asaka, and all of the military leaders and soldiers involved, should have been punished – even executed – to the full extent of the law, as determined by the Tokyo War Crimes Trial.

References

Burton, K.D. (2020). War crimes on trial: The nuremberg and tokyo trials. National

       WWII Museum. Retrieved from

       http://www.nationalww2museum.org/war/articles/nuremberg-and-tokyo-war-crimes-trials

Christov, T. (2018). Emer de vattel (1714-1767). In D.R. Brunstetter & C. O’Driscoll (Eds.),

       Just war thinkers: From cicero to the 21st century (156-167). Abingdon, Oxon: Routledge

Compton, K. (1946). If the atomic bomb had not been used. Manchuria Document Set. Truman

       Library. Retrieved from http://www.trumanlibrary.gov/public/Manchuria_DocumentSet.pdf

Glanville, L. (2018). Samuel pufendorf (1632-1694). In D.R. Brunstetter & C. O’Driscoll (Eds.),

       Just war thinkers: From cicero to the 21st century (145-155). Abingdon, Oxon: Routledge

History, The Editors. (2019). Nanking massacre. History. Retrieved from

       http://www.history.com/topics/japan/nanjing-massacre

Mankoff, J. (2015). The legacy of the soviet offensives of august 1945. Manchuria Document Set.

       Truman Library. Retrieved from     

       http://www.trumanlibrary.gov/public/Manchuria_DocumentSet.pdf

—-. (2021). The rape of nanking or nanjing massacre (1937). Pacific War. Retrieved

       from http://www.pacificwar.org.au/JapWarCrimes/TenWarCrimes/Rape_Nanking.html

U.S. Department of State. (1943). Peace and war: United states foreign policy, 1931-1941.

       (DOS Publication No. 1983). Retrieved from

       http://www.mtholyoke.edu/acad/intrel/WorldWar2/china.htm

U.S. Department of State. Office of the Historian. (2021). Japan, china, the united states and the

       road to pearl harbor, 1937-41. Retrieved from

       http://history.state.gov/milestones/1937-1945/pearl-harbor

~

Dawn Pisturino

Thomas Edison State University

November 20, 2021; August 31, 2022

Copyright 2021-2022 Dawn Pisturino. All Rights Reserved.

24 Comments »

Health Information Technology Security

Abstract       

Due to threats of cybercrime and malware infestations, healthcare organizations all across the world are now forced to upgrade and monitor their cybersecurity systems on a constant basis for the sake of protected patient health information, financial stability, and uninterrupted operations.  Money that would normally be spent on patient care is being diverted to IT professionals, who are hired to keep cybersecurity systems intact.

Health Information Technology Security       

Protecting patient health information, as mandated by law, has become a priority for healthcare facilities all around the world.  From doctors’ offices to medical devices to ransomware, the healthcare industry is under attack by cyber threats that compromise the health, safety, and privacy of patients everywhere.       

Nurses are at the forefront in efforts to secure patient and employee information, promote responsible use of computer technology, and report possible threats and violations in a timely manner.

Cybersecurity is Crucial       

Almost every day, a news story comes out that a corporation, nonprofit organization, or government agency has been hacked.  The healthcare industry is no different, and the attacks are becoming more frequent and more serious.  This is such an important issue at the hospital where I work, it seemed pertinent to write a paper on it.  Our IT department frequently makes us aware of e-mail threats, blocks blog sites, mandates automatic logoffs and timed reboots, requires frequent password changes, and regularly reminds us to turn off our computers, log off when finished, and to not share passwords.  Cybersecurity is crucial to protecting patient health information and network systems.

All Healthcare Organizations are at Risk       

Smaller healthcare clinics and doctors’ offices must follow the same mandates as larger organizations when it comes to protecting patient health information.  Healthcare personnel divulging protected information to unauthorized people and hackers using stolen information in identity theft scams are huge concerns that must be addressed (Taitsman, Grimm, & Agrawal, 2013).  Not only must these smaller organizations take appropriate measures to secure patient health information, but personnel must strictly follow policies and protocols.  Simple safeguards, such as screening phone calls, logging off computers, shredding documents, background checks for employees, automatic logouts, and activity audits, protect and safeguard patients and organizations alike (Taitsman, Grimm, & Agrawal, 2013).  Insurance companies, too, must safeguard patients against fraudulent claims.  Consumers must be educated in ways to protect their own healthcare information (Taitsman, Grimm, & Agrawal, 2013).       

Nurses all across the healthcare spectrum are increasingly required to use computer technology, and they must honor patient privacy, confidentiality, and consent while doing so.  Use of the Internet opens the doorway to viruses, worms, adware, spyware, and other forms of malware (Damrongsak & Brown, 2008).  Something as simple as using a shared address book can infect an entire system.  Logging off the computer when the nurse has finished and frequently backing up data can prevent unauthorized intrusions and corrupted data (Damrongsak & Brown, 2008).  Most medical facilities use an intranet, or closed system, in addition to the Internet, that restricts data to a smaller group of people.  Firewalls, encryption, and the use of virtual private networks provide additional security (Damrongsak & Brown, 2008).       

Large government agencies, such as the Veterans Administration, have increased efforts to stave off cyber-attacks, which compromise patient health information and medical devices.  IT specialists have removed medical devices from the VA hospital’s main network systems and connected them to virtual-local area networks (VLANs) (Rhea, 2010).  Without access to the Internet, these devices can be used without fear of attack.  In the past, the main focus has been on identity theft.  But with the rise of international terrorism, there is a growing fear that medical devices may be hacked and used to intentionally harm patients (Rhea, 2010).  Healthcare IT systems have already been crippled by hackers looking to profit from cybercrime.  In 2009, healthcare facilities around the world found medical devices infected with the Conficker virus (Rhea, 2010).  Downtime caused by malware is expensive and inconvenient.  Hospitals are forced to spend money on security that normally would have gone to patient care (Rhea, 2010).  FDA regulations are also a hindrance to quick development of security patches (Rhea, 2010).       

According to author W.S. Chee (2007), a member of the Department of Diagnostic Imaging at K.K. Women’s and Children’s Hospital in Singapore, medical devices connected to a hospital’s network system can lead to critical threats and infestations of malware in these devices.  Hospitals need to act proactively to prevent intrusions and respond immediately if a system becomes infected (Chee, 2007).  Equipment vendors play a huge role because they supply the security measures which protect medical devices (Chee, 2007).  But they can be slow in providing updates and patches.  The FDA, furthermore, determines when and how changes can be made to biomedical equipment systems.  This places the burden on hospitals to protect themselves (Chee, 2007).       

Thomas Klein (2014), managing editor of Electronic Medical Device Technology, asserts that intentional sabotage of medical devices is only a matter of time.  According to researchers, vulnerabilities have been found in infusion pumps, x-ray machines, cardiac defibrillators, and other devices (Klein, 2014).  Since these devices are frequently connected to the Internet, they are vulnerable to malware.  If the network systems are not fully protected, the devices are subject to malicious attack.  The use of USB ports opens a doorway to security breaches and malware (Klein, 2014).  The risk is so great the FDA became involved and now requires that manufacturers consider cybersecurity risks when developing new products (Klein, 2014).       

The expansion of healthcare information technology improves profitability while exposing healthcare facilities to greater risks (Elliot, 2005).  Facilities must create and enforce policies that secure patient health information across all forms of networks and technology.  One solution for managing remote devices is the use of on-demand security services that cease to work once the remote device is no longer in use (Elliot, 2005).  The problem, then, is security on the other end, where patient health information can be leaked or accessed by the user.  This is called post-delivery security (Elliot, 2005).  Solutions include user malware protection, restrictions on use of data, and audits on computer use.  Developing and enforcing security policies that protect patient health information, especially information transmitted to remote devices, is tantamount to avoiding security breaches and corrupted data (Elliot, 2005).       

The latest, and most serious, threat comes in the form of professional IT criminals who use ransomware to extort money from hospitals (Conn, 2016).  One such threat, Locky, acts through ordinary-looking e-mail (Conn, 2016).  When opened, a virus activates software that encrypts the hospital’s IT system.  Then, a window pops up with a ransom demand.  Samas, another threat, uploads encryption ransomware through a hospital’s Web server (Conn, 2016).  A more sophisticated ransomware, CryptoLocker, demands bitcoin as payment because it is nearly impossible to trace (Conn, 2016).  Once paid, the criminals unlock the data in an infected system.  But, should hospitals pay in the first place?  Cybersecurity has become a booming business, with medical facilities now being forced to employ their services.  There is a major concern that medical devices will be the next systems to be hit by cybercriminals (Conn, 2016).

Topic Availability

This topic, as it relates to Nursing Informatics, is too important to ignore.  I used seven resources from scholarly and peer-reviewed publications for this paper.  I pulled my resources primarily from CINAHL and ProQuest.  I found enough materials to give me a broad overview of the topic, but I was disappointed that more current articles could not be found.  Technology changes so rapidly that even a few months can make a difference in security innovations.  I used both the basic and advanced search features and the key words “medical device malware security.”

Information Availability 

This information is available in scholarly and peer-reviewed journals and other publications.  Although the information was geared toward professionals, some publications include short articles that educate the general public about cybersecurity and protecting patient health information.  Nurses benefit from all of these resources because many do not understand the extent of the threat.

Personal Views 

The information I read shocked me (cyberterrorism), confirmed what I see our IT specialists changing at my hospital, and disturbed me (ransomware cybercrime.)  The general public does not seem to be aware of these threats.  As a nurse who uses computer technology every day, I was not aware of the seriousness of this problem.  It never occurred to me that a glucometer or infusion pump could be infected with a virus or that an unscrupulous person would deliberately sabotage somebody’s pacemaker.  When I mention this to other nurses, they are equally dismayed by the possibilities.  They always ask, “Why would somebody maliciously hack into a medical device?”  For people who devote their lives to saving people, the idea is unthinkable.       

The changing landscape in healthcare makes it crucial that ALL medical personnel understand the seriousness of the threats.  As technology becomes more sophisticated, so do the means by which cybercriminals hack into and infect network systems.  Information is compromised, and patient health and well-being are put at risk.

Conclusion

In conclusion, whether it’s a small private practice or a large healthcare system, the increased use of technology poses significant threats to protected patient health information, medical devices, and cybersecurity systems.  Users all across the healthcare spectrum have a duty to behave responsibly when accessing patient records, divulging information, searching the Internet, managing e-mail and faxes, and interacting with colleagues.  Nurses should provide feedback and input about vulnerabilities in security policies and protocols for the protection of themselves and their patients.  They must educate themselves about current threats so they can adapt their practice to avoid unintentional security breaches.  Nurses can also educate their patients in the use of computer technology, accessing patient portals, and protecting patient health information.        

Technology will continue to be a driving force in healthcare.  Along with the downside comes the possibility of lower costs to facilities and patients, improved outcomes, more accurate measurements, increased research, and greater opportunities for nurses to expand their involvement and role in improving healthcare and healthcare informatics.  Requiring nursing students to study nursing informatics increases their awareness of the problems and benefits of  technology.  Hopefully, our physicians and administrators are being trained in this area, as well.  Health information technology specialists are enjoying a surge in employment opportunities as healthcare systems realize the importance of their specialty.  Technology is expensive, but the threats of cybercrime and cyber-attacks are more damaging.  

References

Chee, W.S. A. (2007). IT security in biomedical imaging informatics: The hidden vulnerability. Journal of Mechanics in Medicine and Biology, 7(1), 101-106.

Conn, J. (2016, April). Ransomware scare: Will hospitals pay for protection. Modern Healthcare, 46(15), 8-8.

Damrongsak, M., & Brown, K.C. (2008). Data security in occupational health. AAOHN

 Journal, 56(10), 417-421. Retrieved from 

http://search.proquest.com.resources.njstatelib.org/docview/219399232?accountid=63787.

Elliot, M. (2005, September). Securing the healthcare border. Health Management Technology,

 26(9), 32-35.

Klein, T. (2014, September). How to protect medical devices against malware. Operating Theatre Journal, 14-14.

Rhea, S. (2010, December). Cyberbattle: Providers work to protect devices, patients. Modern

 Healthcare, 40(50), 33-34.

Taitsman, J. K., Grimm, C. M., Agrawal, S. (2013, March). Protecting Patient privacy and data security. The New England Journal of Medicine, 368, 977-979. doi: 10.1056/NEJMp1215258. Retrieved from http://www.NEJM.org.

~

PowerPoint presentation shared at Flagstaff Medical Center in 2016. See it here on Dropbox:

https://www.dropbox.com/s/4o62z11sbzmg5tz/NUR-340%20Power%20Point%20Presentation%20Pisturino%20%281%29.pptx?dl=0

~

Dawn Pisturino
Thomas Edison State University

August 31, 2016; June 10, 2022
Copyright 2016-2022 Dawn Pisturino. All Rights Reserved.

(The references would not format properly.)

8 Comments »

Allied Bombing of Dresden, 1945

(Destruction of Dresden, 1945)

[NOTE: A week ago, my father’s ashes were interred with full military honors in a military cemetery in California. The ceremony included a three gun salute, a bugler playing “Taps,” and the flag-folding ritual. Although my father served during the Korean War, he never saw live action. Instead, he was sent to Cuba on a reconnaissance mission. My brother is also buried in a military cemetery and died of cancer at the age of forty. He was an Army medic and became a paramedic and German teacher after leaving the military. Memorial Day weekend marks the unofficial start of summer here in the United States. We honor all of our dead this weekend, but especially, those who have served, fought, and died protecting our country. War is hell, as any soldier will tell you, but sometimes, it is a necessary evil. Just ask the people of Ukraine, who are fighting for their lives, their country, their freedom, and their sovereignty as a nation. Please take a moment to remember all the soldiers who have given their lives to protect YOUR country.]

Allied Bombing of Dresden

The British RAF began dropping bombs on Dresden, Germany on February 13, 1945. Over the next few days, British and American Allies dropped approximately 4,000 tons of bombs onto the city, killing 25,000 people, and destroying the center of the city (Luckhurst, 2020, pg. 2).

Prime Minister Winston Churchill questioned the attack, saying, “The destruction of Dresden remains a serious query against the conduct of Allied bombing” (Luckhurst, 2020, pg. 2).

But, was the bombing justified?

Summary of Theories and Concepts of Pufendorf and Vattel

Pufendorf claimed that the enemy’s aggression “allows me to use force against him to any degree, or so far as I may think desirable” (Glanville, 2018, pg. 152). He explained that the people fighting a defensive war may use any force to put an end to the threat against them, receive reparations, or “secure guarantees for [their] future security” (Glanville, 2018, pg. 152). It was not, he explained, a priority to gauge proportionality but to ensure “the defense and assertion of [their] safety, [their] property, and [their] rights” (Glanville, 2018, pg. 152). The people on the defensive, therefore, may use whatever means necessary to defeat the enemy.

Vattel, on the other hand, believed that “now the laws of nature being no less obligatory on nations than on individuals, whatever duties each man owes to other men, the same does each nation, in its way, owe to other nations. Such is the foundation of those common duties – of those offices of humanity – to which nations are reciprocally bound towards each other” (Christov, 2018, pg. 159). But he also allowed for the possibility of nations that would violate the law of nations and violate all the civilized rules of warfare: “If there were a people who made open profession of trampling justice under foot, — who despised and violated the rights of others whenever they found an opportunity, — the interest of human society would authorize all the other nations to form a confederacy in order to humble and chastise the delinquents . . .the safety of the human race requires that [such a nation] should be repressed” (Christov, 2018, pg. 160).

Was the Allied Bombing of Dresden Justified?

At the time of the bombing, the Eastern Front – “where Nazi Germany was defending [itself] against the advancing armies of the Soviet Union” – was only 155 miles from Dresden. According to Luckhurst (2020), Dresden “factories provided munitions, aircraft parts and other supplies for the Nazi war effort” (Luckhurst, 2020, pg. 3). It was a major city through which German “troops, tanks and artillery traveled through . . . by train and by road” (Luckhurst, 2020, pg. 3). The attack was intended to bolster Soviet efforts on the Eastern Front (Luckhurst, 2020, pg. 3).

RAF planes were equipped with both “high explosive and incendiary bombs: the explosives would blast buildings apart, while the incendiaries would set the remains on fire, causing further destruction” (Luckhurst, 2020, pg. 4). The United States Air Force completed the attack with daylight bombings which were directed at the city’s railway yards” (Luckhurst, 2020, pg. 4).

The Nazis denied that Dresden had any military function and exaggerated the death toll at 200,000 civilians. They claimed that Dresden “was only a city of culture” (Luckhurst, 2020, pg. 7).

Worldwide, Dresden was considered a tourist attraction. British Members of Parliament questioned the attack, and the Associated Press accused the Allies of using terrorism against the people of Dresden (Luckhurst, 2020, pg. 7).

Allied military leaders defended the attack as necessary to further cripple Nazi Germany and end the war. A 1953 report done in the U.S. determined that “Dresden was a legitimate military target” (Luckhurst, 2020, pg. 9), and the attack was no different from previous attacks on other German cities.

The debate continues, with some people viewing the bombing as immoral – possibly a war crime – and others defending it as necessary to help end the war with Germany (Luckhurst, 2020, pg. 9).

My own view is that Pufendorf’s and Vattel’s theories both justify the bombing of Dresden. Pufendorf is correct when he says that the side waging a just war (in this case, the Allies) may use any means necessary to secure the peace and “secure guarantees for . . . future security” (Glanville, 2018, pg. 152). Nazi Germany was a rogue nation that had invaded other countries, murdered millions of people, and imposed authoritarian rule against the will of the people. They were guilty of “trampling justice under foot . . . [and] despised and violated the rights of others” (Christov, 2018, pg. 160), in Vattel’s own words. So, Vattel is also correct when he says that “the interest of human society [should] authorize all the other nations to form a confederacy [in this case, the Allies] in order to humble and chastise the delinquents . . . the safety of the human race requires that [such a nation – the Germans] should be repressed” (Christov, 2018, pg. 160).

Is Preservation of Cultural or Artistic Enemy Cities Relevant in War – Or are they Secondary?

My personal view is that preserving cultural and artistic enemy cities is secondary because defending the safety of Allied nations, property, and human rights takes precedence and aligns with both Pufendorf’s and Vattel’s theories of just war and the right of self-defense. Germany was the aggressor. It was not the duty or priority of Allied forces to save their cultural and artistic centers (Christov, 2018, pg. 160; Glanville, 2018, pg. 152).

Is it Justifiable to Bomb a City to Weaken the Enemy Civilian Morale – Even if the City has Marginal Industrial Significance?

Although the Nazis claimed that Dresden was only a cultural center, the Allies considered it an important transportation center for the Nazis and sought to help Soviet forces on the Eastern Front by destroying it (Luckhurst, 2020, pg. 3). The bombing weakened civilian morale but also undermined the Nazi’s efforts on the Eastern Front. Since civilians in Dresden supported the Nazi cause, they were also enemies of the Allied forces and subject to punishment by Allied war efforts. In my opinion, Vattel would have seen the bombing of Dresden as necessary “in order to humble and chastise the delinquents” (Christov, 2018, pg. 160).

Works Cited

Christov, T. (2018). Emer de vattel (1714-1767). In D.R. Brunstetter & C. O’Driscoll (Eds.),

       Just war thinkers: From cicero to the 21st century (156-167). Abingdon, Oxon: Routledge

Glanville, L. (2018). Samuel pufendorf (1632-1694). In D.R. Brunstetter & C. O’Driscoll (Eds.),

       Just war thinkers: From cicero to the 21st century (144-155). Abingdon, Oxon: Routledge

Luckhurst, T. (2020, February). Dresden: The world war two bombing 75 years on. BBC.com.

       Retrieved from http://www.bbc.com/news/world-europe-51448486

Dawn Pisturino

Thomas Edison State University

November 10, 2021; May 27, 2022

Copyright 2021-2022 Dawn Pisturino. All Rights Reserved.

29 Comments »

Afghanistan and the War on Terrorism

(Photo from The Guardian)

Afghanistan and the War on Terrorism

       Fighting terrorism is a different situation than fighting a conventional war because it is not about one nation in conflict with another nation.  Terrorists embody an ideology which conflicts with established culture and values.  In the case of Afghanistan and Al Qaeda, radical interpretations of Islam were used to recruit jihadists to wage guerilla warfare against all people in the West and even other Muslims who did not agree with their interpretation (9-11 Commission, 2004, pg. 55-68).   This defies both the jus ad bellum and jus in bellum traditional requirements for just war.

Jean Bethke Elshtain and the War on Terrorism

       Osama bin Laden fought as a freedom fighter (mujahideen) in Afghanistan against the Soviet Union.  After the Russians were driven out of the country, he organized the terrorist group, Al Qaeda.  The CIA did not become aware of Al Qaeda and its leader until 1996-1997 (9-11 Commission, 2004, pg. 55-68).  After the August 7, 1998 bombings of U.S. embassies in Kenya and Tanzania, Osama bin Laden became one of the FBI’s “most wanted fugitives” (Haddow, Bullock, & Coppola, 2017, pg. 390).  After the attacks on the World Trade Center on September 11, 2001, President George W. Bush ordered the creation of the Department of Homeland Security with Executive Order No. 13228 on October 8, 2001 (Exec. Order No. 13,228, 2001, pg. 51812). 

       Although Osama bin Laden and the majority of 9/11 hijackers were from Saudi Arabia, the Al Qaeda training camps were located in Afghanistan.  In fact, forces within Afghanistan and Pakistan were collaborating with the terrorists.  Al Qaeda also had the support of regular citizens in both Afghanistan and Pakistan who felt a strong hatred for the United States.  The Taliban, a fundamentalist Islamic group, had taken over large parts of Afghanistan and supported the use of terror against the West (9/11 Commission, 2004, pg. 47-68).

       Invading Afghanistan was a natural response to the terrorist attacks on the World Trade Center.  But the U.S. military should have stayed focused on destroying the Taliban and Al Qaeda in Afghanistan before embarking on a war in Iraq, especially since the 9/11 Commission found no involvement by Iraq with the attacks on the World Trade Center (9-11 Commission, 2004, pg. 47-80).  Imposing economic sanctions on Pakistan instead of giving them economic aid, in my opinion, might have yielded results sooner.

       The invasion of Afghanistan was justified, from the point of view of Jean Bethke Elshtain, because “those who launched the 9/11 attacks cannot be reasoned with, in the manner the ‘humanists’ would like – and that no change in U.S. policy would have that effect – for the simple reason that: they loathe us because of who we are and what our society represents” (Rengger, 2018, pg. 220-221).

What Role did the U.S. have in Afghanistan Beyond Military Action?

       “In October 2001, the United States of America initiated air strikes on Afghanistan, followed by a ground offensive called Operation Enduring Freedom, to topple the Taliban government and drive out Al Qaeda forces hosted in Afghanistan following the 11 September 2001 terrorist attacks on the United States” (Bella, Giacca, & Casey-Maslen, 2011, pg. 47, 48).  A new government was installed, and with a new regime in control, U.S. troops became peacekeepers, which undermined the original military offensive.  Al Qaeda and the Taliban continued to push back at the expense of American troops.  Although bin Laden was finally killed in 2011, this did not extinguish Al Qaeda or the Taliban.  The U.S. concentrated on re-building Afghanistan, and a new terrorist threat emerged under President Obama: ISIS.

       Elshtain believed that the United States’ War on Terrorism was just because “the United States must take the lead – not alone, to be sure – but it must take the lead in defending human dignity. ‘As the world’s superpower’”” (Rengger, 2018, pg. 221).  If the United States failed in Afghanistan, in my opinion, it is because we lost sight of our goal to destroy the terrorist camps and the power of the terrorists in Afghanistan and Pakistan.  By not going in and finishing the job, the United States left itself open for more terrorist attacks on American soil, especially since the Taliban now control Afghanistan.

Given the Larger Human Rights Implication that Elshtain Addresses, what Role did the World at Large have in Combating Terrorism?

       Few countries in the world have been left untouched by terrorism, whether it is direct terrorist attacks or taking in refugees from war-torn countries.  For security reasons alone, the United Nations and all countries in the world should be working together to address the issue – which certainly will not go away anytime soon.

       Ultimately, it is the non-combatant citizens who suffer the most when terrorists are wreaking havoc in a country.  According to Amnesty International (2011): “The Taliban and related insurgent groups in Afghanistan show little regard for human rights and the laws of war and systematically and deliberately target civilians, aid workers, and civilian facilities like schools (particularly girls’ schools)” (Bella, Giacca, & Casey-Maslen, 2011, pg. 51).

       The larger humanitarian issues of violence, refugees, homelessness, poverty, and starvation affect all nations in one way or another, and all nations have a moral obligation to address it.  Elshtain called it the “principle of equal regard, faced with a terrible situation, an enormity, one is obliged to think about what is happening, and to conclude that the people dying are human beings and as such equal in moral regard to us” (Dissent, 2005, pg. 60).                                                                                                                                         

References

9-11 Commission. (2004). 9-11 Commission report. Retrieved from

https://www.9-11Commission.gov/report

Bellal, A., Giacca, G., Casey-Maslen, C. (2011, March). International law and armed non-state 

       actors in afghanistan. International Review of the Red Cross 93(881), 47-79.

       Retrieved from https://www.corteidh.or.cr/tablas/r27089.pdf

Dissent, The Editors. (2005, Summer). Interview with jean bethke elshtain. Dissent. Retrieved

       from http://www.dissentmagazine.org/wp-content/files_mf/1390329368d1Interview.pdf

Exec. Order No. 13228, 66 Fed. Reg. 196 (October 10, 2001)

Haddow, G.D., Bullock, J.A., & Coppola, D.P. (2017). Introduction to emergency management.

       (6th ed.). Cambridge, MA: Elsevier

Rengger, N. (2018). Jean bethke elshtain (1941-2013). In D.R. Brunstetter & C. O’Driscoll

       (Eds.), Just war thinkers: From cicero to the 21st century (216-226). Abingdon, Oxon: 

       Routledge

Dawn Pisturino

Thomas Edison State University

December 23, 2021; April 1, 2022

Copyright 2021-2022 Dawn Pisturino. All Rights Reserved.

5 Comments »

Humanitarian Aid and Peacekeeping in Somalia, 1992-1994

(Famine in Somalia, December 13, 1992. Photo by Yannis Behrakis, REUTERS.)

Jean Bethke Elshtain’s book, Women and War, insisted that “the roles men and women play in war are represented and narrated in the stories we tell about ourselves” (Rengger, 2018, pg. 218). Women are represented as “beautiful souls” and men as “just warriors,” but ethicist Elshtain felt that this was too simplistic and that the roles were “more ambiguous and complex” (Rengger, 2018, pg. 218) in reality. She believed that St. Augustine had the best understanding of humans and their relationship to war and peace because he saw that humans are fragile and limited in their ability to control the world and human impulses. She further elaborates on this theme in Augustine and the Limits of Politics. (Rengger, 2018, pg. 218-220) By the time she wrote Just War Against Terror, she was convinced that the United States had to embrace its role of most powerful nation and step up to the plate to address terrorism (Rengger, 2018, pg. 220,221).

Based on her beliefs, I believe she would have encouraged the United States’ involvement in Somalia. In an interview with Dissent magazine (2005), she said:

“Beginning with that principle of equal regard, faced with a terrible situation, an enormity, one is obliged to think about what is happening, and to conclude that the people dying are human beings and as such equal in moral regard to us. So we are then obliged to consider this horrible situation and think about whether there is something we can do to stop it. Would the use of force make a difference in this situation? Minimally you are obliged to do that. Perhaps the use of force would not. But one must not just evade the question. Another minimal requirement is that if you have decided that you can’t intervene you are obliged to explain why that is, in light of the principle of equal moral regard.”

However, she would have recognized our limitations and possibilities for human inadequacy when dealing with the situation in Somalia.

The Role of the United Nations and the United States in Somalia

In 1969, Mohamed Siad Barre came to power in Somalia through a military coup. The regime became more and more repressive, and opposition forces removed him from office in January 1991. “The country descended into chaos, and a humanitarian crisis of staggering proportions began to unfold” (Department of State, 2021, pg. 1). The Somali people faced “the combination of civil war, a famine after a poor harvest, and a prolonged drought” (Mugabi, 2018, pg. 2).

The United Nations and the United States attempted to aid the Somali people in 1992, but “intense fighting between the warlords impeded the delivery of aid to those who needed it most, and so the United Nations contemplated stronger action” (Department of State, 2021, pg. 2).

“There was a fairly lengthy period in which preventative diplomacy and the focused attention of the international community could have headed off the catastrophe in Somalia” (United States Institute of Peace, 1994, pg. 5). The United Nations and the international community could have engaged in diplomatic negotiations when: 1) the Somali National Movement (SNM) was repressed by Barre in 1988 and the situation exposed by Amnesty International and Africa Watch; 2) the Manifesto Group arose in 1990 and suggestions by the Inter-African Group “that the UN appoint a special envoy to conduct ‘shutter diplomacy’ in the Horn” (United States Institute of Peace, 1994, pg. 6) were squashed; 3) Barre left office in January 1991 with no replacement government in place and the UN declined to get involved until a year later, when it passed its first resolution on Somalia (United States Institute of Peace, 1994, pg. 6).

From January to March 1992, UN resolutions “called for an arms embargo and increased humanitarian aid, and urged the parties to agree to a cease-fire, which they did through an UN-sponsored meeting in New York in February” (United States Institute of Peace, 1994, pg. 6). In April, the Security Council approved UNOSOM, which “was intended to provide humanitarian help and facilitate the end of hostilities in Somalia” (United States Institute of Peace, 1994, pg. 6). However, these efforts met with resistance from warlord militia leaders Aideed and Ali Mahdi. In August, Operation Provide Relief was implemented which authorized the United States to deliver humanitarian aid and bring in five hundred peacekeepers (United States Institute of Peace, 1994, pg. 7). Later, a Hundred Day Plan was devised to bring together UN agencies and NGOs to deliver aid, but continued violence interfered with the plan (United States Institute of Peace, 1994, pg. 7).

Bureaucracy at the United Nations also held up operations. “Food and medicine could not be distributed because of looting . . . [and] famine intensified as the civil war continued” (United States Institute of Peace, 1994, pg. 7). People around the world reacted emotionally to the famine in Somalia, and “President George [H.W.] Bush announced the initiation of Operation Restore Hope” (United States Institute of Peace, 1994, pg. 7) on December 4, 1992. The United Task Force (UNITAF) was “a multinational coalition of military units under the command and control of the American military” (United States Institute of Peace, 1994, pg. 8) authorized by a United Nations resolution (United States Institute of Peace, 1994, pg. 8). UNITAF’s goal was to provide “security in the service of humanitarian ends for a brief period” (United States Institute of Peace. 1994, pg. 8) in compliance with Chapter VII of the United Nations charter and allowed the use of force (United States Institute of Peace, 1994, pg. 8-11).

Unfortunately, conflicts arose between the United Nations and UNITAF which impeded the efficiency of these efforts. Secretary General Boutros Ghali insisted on nationwide disarmament in Somalia with the United States in charge of implementation, but UNITAF refused. The task force was more interested in a cease-fire.  The UN also insisted on top-down reconstruction of the country, whereas the United States believed that reconstruction should begin at the local level. The UN refused to take long-term responsibility in the operation, insisting that UNITAF held that responsibility. The United States countered “that the project was limited not only in scope but in time, and that when certain humanitarian and security goals had been met, responsibility for Somalia would be turned back over to a ‘regular UN peacekeeping force’” (United States Institute of Peace, 1994, pg. 10). When Ghali created the peacekeeping force, UNOSOM II, the United States agreed to participate (United States Institute of Peace, 1994, pg. 9,10).

On May 4, 1993, UNOSOM II assumed all military responsibilities in Somalia and became “the first UN peacekeeping force authorized under the provisions of Chapter VII of the UN charter” (United States Institute of Peace, 1994, pg. 11). The new goal for the force was rebuilding Somalia and safeguarding the peace.

After Aideed and his soldiers killed twenty-four Pakistani and three American peacekeepers, the United Nations and United States agreed to go after Aideed. The effort resulted in the raid of Mogadishu on October 3, 1993, which killed eighteen American soldiers. By the end of March 1994, all U.S. troops had been withdrawn from Somalia (United States Institute of Peace, 1994, pg. 12).

Responsibility of the International Community

The United Nations had a definite responsibility to address the humanitarian crisis in Somalia and to make an attempt to end the violence. This is the designated function of the United Nations. People around the world, shocked by the starvation in Somalia, were demanding action. The United States, as the most powerful country with the most resources, was obligated to get involved. Politically and morally, it was the right thing to do.

Jean Bethke Elshtain, as a proponent of St. Augustine and his writings, would have supported it because Augustine stressed love of neighbor and extending charity to others. To ignore the situation would have been immoral and inhuman.

The problem with Somalia isn’t that nations got involved. The problem is that the fierceness and tenacity of the warlord militias was underestimated, and bureaucracy and internal disagreements were allowed to undermine the operation, as outlined by the United States Institute of Peace. But both St. Augustine and Elshtain would have recognized that humans are imperfect creatures living in an imperfect world, and as such, there is only so much we can do to contain and control chaos.

Dawn Pisturino

Thomas Edison State University

December 15, 2021; March 11, 2022

Copyright 2021-2022 Dawn Pisturino. All Rights Reserved.

Works Cited

Department of State. Office of the Historian. (2021). Milestones: 1993-2000: Somalia,

       1992-1993. Department of State. Retrieved from

       http://www.history.state.gov/milestones/1993-2000/somalia

Dissent, The Editors. (2005, Summer). Interview with jean bethke elshtain. Dissent. Retrieved

       from http://www.dissentmagazine.org/wp-content/files_mf/1390329368d1Interview.pdf

Mugabi, I. (2018, December). Opinion: How George h.w. bush’s failed somalia intervention

       shaped us-africa ties. DW. Retrieved from

       http://www.dw.com/en/opinion-how-george-hwbushs-failed-somalia-intervention-shaped-

       us-africa-ties/a-46598215

Rengger, N. (2018). Jean bethke elshtain (1941-2013). In D.R. Brunstetter & C. O’Driscoll

       (Eds.), Just war thinkers: From cicero to the 21st century (216-226). Abingdon, Oxon:  

       Routledge

Special Report. (1994). Restoring hope: The real lessons of Somalia for the future of                                                                                                                                       

       intervention. United states institute of peace. Retrieved from

       http://www.usip.org/sites/default/files/sr950000.pdf

5 Comments »

I. A World in Anguish – a Poem

(Photo from Pixabay)

A World in Anguish

by Dawn Pisturino

A world in anguish

Is a world at war,

Suffering the throes of poverty,

Living in fear,

Desperate for freedom

From unfeeling despots;

One man kills another

And crowds cheer for more:

A bloody holocaust screams

The victory cry.

Women weep for children

Dying in the womb,

And fathers beat

Their screaming brats in rage,

Placating the demon-gods.

The dark-faced villain

In the streets

Pushes his deadly wares

To the wayward and unsuspecting,

Supplies the knowing,

And murders the human spirit.

The Godly are intimidated

By the unholy-ungodly

And cry out in vain for vengeance.

God does not hear

Or does not want to.

“Let them fight their own battles,”

He must say; and looks down

In amusement at the skirmish of ants

Crawling in the streets.

It is not a funny sight, no,

But a sorry commentary

On the uselessness of the human species.

God Himself must weep

At the awful destruction wrought

By pitiful creatures.

It is not worth His powerful strength

To save them or His loving heart

To love them or His abounding mercy

To forgive them.

Let those who will survive, survive.

Death to the others.

The battle is just begun.

Dawn Pisturino

September 20, 1985; March 7, 2022

Copyright 1985-2022 Dawn Pisturino. All Rights Reserved.

21 Comments »

Foreign Non-Intervention: Soviet Invasion of Hungary, 1956

In light of Putin’s invasion of Ukraine, it seems appropriate to remind people that Russian Premier Nikita Krushchev invaded Hungary in 1956 in a similar way when the Imre Nagy regime began to institute democratic reforms and pull away from the Soviet Union.

On October 22, 1956, student protests began in Budapest, and a list of sixteen demands were adopted which included the complete withdrawal of Soviet troops from Hungary, free elections, free speech, workers’ rights, and a multi-party political system. By 6:00 pm, 200,000 to 300,000 people had joined the protest. At 9:30 pm, the statue of Stalin was overturned.

The next night, around 9:00 pm, tear gas bombs were thrown into the crowd of protestors, and State Security Police (AVH) began firing into the crowd. A number of people were killed and wounded. The infuriated crowd attacked other AVH police who arrived wearing white doctors’ coats. At first, Hungarian forces came to the aid of the AVH and then sided with the protestors.

In other parts of Budapest, workers drove through the city, snatching up weapons and firearms wherever they could find them. Many soldiers voluntarily gave over their firearms to the protestors.

In the early hours of October 24th, protestors seized and occupied the Radio Building and then were driven out. Again, AVH police fired into a crowd of unarmed protestors, further infuriating the people. Armed protestors fought back against the AVH and seized the newspaper building. At 2:00 am, Soviet tanks rolled into Budapest.

The important thing to understand is that the Soviet Union had already been planning to invade Hungary before the protests began. The invasion was intended to overthrow Premier Imre Nagy’s government and to install a more cooperative Soviet puppet in his place.

Neither the United Nations nor the United States intervened to help the people of Hungary, before, during, or after the invasion. And, so far, this is holding true for the people of Ukraine.

~

Immanuel Kant, the United Nations, and International Law

Philosopher Immanuel Kant, who despaired in his lifetime that “there [was] no reliable or effective international authority” to prevent war, could not foresee that in the future there would exist the League of Nations and then the United Nations. These organizations arose in the aftermath of World War I and World War II to provide a forum for nations to come together and discuss their differences in order to prevent world war.  The United Nations, in my opinion, has not been very effective in dealing with international conflicts. It does, however, have a good track record of attempting to provide humanitarian aid to countries wracked by internal conflict and natural disasters.

“The UN Charter recognizes self-defense as the only legitimate use of force (although only until the Security Council has taken the measures necessary to ensure international peace and security, Article 51)” (Brown, 2018, pg. 209). And since the time of Kant, we have established “the Law of Armed Conflict (also known as International Humanitarian Law), that is, the Geneva and Hague Treaties and the accompanying Protocols” (Brown, 2018, pg. 209). The international community has come together to set rules to limit and prevent war. But, the United Nations and other organizations seem very ineffective. Conflicts never seem to get resolved, and human rights abuses continue without redress. Situations drag on for years with no resolution, leading to a different kind of war – prolonged conflict.

Michael Walzer’s Arguments against Foreign Intervention

Just war theorist Michael Walzer believes that nations have autonomy to decide for themselves, regardless of the form of government they have embraced. “Outsiders are obliged to assume that whatever form of government exists reflects the wishes of the people concerned; even if pro-democracy movements are suppressed, as long as the society has not collapsed into civil war and insurrection, it has to be presumed that there is a ‘fit’ between government and people . . . the only real circumstances in which outsiders would be entitled (although not obliged) to intervene would be in the case of genocide or mass enslavement” (Brown, 2018, pg.211).

Clearly, the Hungarian people wanted their freedom and were prepared to fight and die to get it. Clearly, Premier Imre Nagy tried to institute reforms, limit the Soviet Union’s influence in Hungary, and create a free Hungarian State. Clearly, there was no “fit” between the Hungarian people and their Soviet oppressors. From Walzer’s point of view, then, the Hungarian people were exercising their right to autonomy, and the United States should have offered assistance if our leaders were sincere about fighting totalitarianism and helping oppressed people to gain their freedom. Since the Voice of America had been broadcasting this message to the Hungarian people and “approximately 30,000 Hungarian refugees were allowed to enter the United States” (History, 2021, pg. 3), President Dwight D. Eisenhower should have offered some sort of assistance. To just stand by and offer sympathy was hypocritical.

And where was the United Nations in all of this? I have found no indication that the United Nations tried to intervene. Indeed, it wasn’t until 1957 that the UN compiled a report on the Soviet invasion of Hungary and its causes. According to the report, “Consideration of the Hungarian question by the United Nations was legally proper and paragraph 7 of Article 2 of the Charter does not justify objections to such consideration. A massive armed intervention by one Power on the territory of another with the avowed intention of interfering in its internal affairs must, by the Soviet Union’s own definition of aggression, be a matter of international concern” (United Nations, 1957, pg. 31).

The United Nations Special Committee determined, after the fact, that the Hungarian national uprising was spontaneous in nature, with Hungarians wanting to be free of Soviet oppression and rule; the protestors demanded an independent, democratic socialist government; the protest occurred in reaction to Poland’s efforts to gain independence from the Soviet Union; the Soviets were already making plans for an armed invasion as early as October 20, 1956; the initial protests of October 23, 1956 were peaceful until the AVH (State Security Police) opened fire onto the crowds; rumors circulated that Nagy had requested help from the Soviets, which turned out to be false; rumors also circulated that Kadar had requested Soviet troop intervention during the second round of protests, which turned out to be false; the real power was in the hands of the Revolutionary and Workers’ Councils – not Nagy; after the first few days of freedom, freedom of speech was established, with the support of the people; reported lynchings and beatings were carried out by members of the AVH (State Security Police); negotiations were conducted between the Nagy government and the Soviet Union for full withdrawal; the Workers’ Councils began initiating the reforms demanded by the people and life was returning to normal; the Hungarian people’s human rights “were violated by the Hungarian Governments before 23 October, especially up to the autumn of 1955, and such violations have been resumed since 4 November” (United Nations, 1957, pg. 31); Hungarian citizens were deported to the U.S.S.R. in order to suppress the uprising; Hungarians showed no support for the Kadar government, which reinstated Soviet-style repression and totalitarianism and put elections on hold; negotiations on Soviet troop withdrawals were suspended; and 190,000 Hungarians sought asylum in other countries, with most refusing to return (United Nations, 1957, pg. 31).

The Hungarian people had chosen freedom and the kind of government they wanted, and their newly-won liberation was subverted by outsiders who would not intervene after “Budapest Radio broadcast its last message before going off the air . . . an appeal to the writers and scientists of the world to help the people of Hungary” (United Nations, 1957, pg. 26). But this aligns with Walzer’s philosophy of limitations on foreign intervention, to the detriment of the Hungarian people.  And that means that I cannot agree with him.

What Role could the U.S. have Played in Hungary

It is clear from the United Nations report that the Soviet Union was preparing for the invasion as early as October 20, 1956. And it is possible, although not proven, that the Soviets had planned for Kadar to replace Nagy from the beginning. I believe Nagy and the members of the Revolutionary and Workers’ Councils were naive in thinking that the Soviets would give up Hungary without a fight. As soon as the Hungarians achieved their liberation, they should have consulted the United Nations, and the leaders of the United States and Europe, for help in keeping it. Instead, Nagy waited until November 1, 1956, when Soviet troops had already crossed the border into Hungary, to withdraw from the Warsaw Pact and to notify embassies located in Budapest and the United Nations of the situation. He specifically requested “the aid of the four Great Powers in defense of Hungary’s Neutrality . . . [and appealed] to our neighbors, countries near and far, to respect the unalterable decision of our people” (United Nations, 1957, pg. 25). By this time, there was no time for either the United Nations or the United States to stop the Soviet invasion (United Nations, 1957, pg. 18-31).

The Risks of War with the Soviet Union

If the United Nations and the United States (and the “four Great Powers”) had been involved in the negotiations with the Soviet Union, urging a complete troop withdrawal from Hungary, the Soviet Union might have backed down or delayed taking any action against Hungary. But this also risked getting the “four Great Powers” involved in another major conflict, one few could afford after World War II.

What Measures, if any, could have been Aimed at the Soviet Union?

Economic sanctions and isolation are about the only measures the United Nations could have taken to pressure the Soviet Union into leaving Hungary. Under pressure from the United States, the United Nations General Assembly passed several resolutions early in 1957, demanding the Soviets avoid all military offensives against the Hungarian people; withdrawal of  all troops from Hungarian soil; restoration of the legitimate government chosen by the Hungarian people; establishment of free elections; the end of deportations to the U.S.S.R.; and permission for UN officials to go into Hungary to assess and observe the situation (Harrison, 2012, pg. 3).

Unfortunately, the resolutions could not be enforced, but Soviet expansion was stalled by public pressure, Kadar’s government was not given official recognition, and Hungary lost its membership in the United Nations. Ultimately, the non-compliance of the Soviet Union with these UN resolutions led to the creation of the United Nations Special Committee that compiled the report. This Special Committee submitted public protests against the execution of Nagy in 1958 and kept the Hungary issue on the UN agenda because of its continued maltreatment and human rights abuses of the Hungarian people (Harrison, 2012, pg. 3).

At the same time, the United States and the Soviet Union were attempting to improve relations, and the Hungarian situation became less important as the Soviets convinced other countries to look the other way. On December 20, 1962, the UN General Assembly passed a resolution to drop the Hungary situation altogether (Harrison, 2012, pg. 4).

Dawn Pisturino

Thomas Edison State University

November 29, 2021; updated February 24, 2022

Copyright 2021-2022 Dawn Pisturino. All Rights Reserved.

Works Cited

Brown, C. (2018). Michael walzer (1935-present). In D.R. Brunstetter & C. O’Driscoll (Eds.),

       Just war thinkers: From cicero to the 21st century (205-215). Abingdon, Oxon: Routledge

Harrison. (2012). United nations report on the hungarian uprising 1956. Libcom. Retrieved from

       http://www.libcom.org/history/united-nations-report-hungarian-uprising-1956

History, The Editors. (2019). This day in history: Soviets put a brutal end to hungarian

       revolution. History. Retrieved from

       http://www.history.com/this-day-in-history/soviets-put-brutal-end-to-hungarian-revolution

United Nations Special Committee. (1957). Report of the un special committee on the

       problem of hungary (compiled 1957). Libcom. Retrieved from http://www.libcom.org

23 Comments »

My Letter to the National School Boards Association (NSBA)

AP Photo, August 25, 2021.

To the National School Boards Association:

Since NSBA has taken the stance that parents who care about their children should be dubbed “domestic terrorists,” I am calling for a NATIONAL BOYCOTT against the Public School System in EVERY STATE.

NOBODY tells me and my family what to do.

The Federal government is out of line and out of control, and so are the liberal organizations supporting it.

WE WILL NOT BOW DOWN TO TYRANNY, BULLYING, HARASSMENT, AND DICTATORSHIP.

Thank you.

Dawn Pisturino

October 5, 2021

Copyright 2021 Dawn Pisturino. All Rights Reserved.

23 Comments »

Community Engagement: The Boston Marathon Bombing

Photo Credit: Britannica

The Boston Marathon bombings on April 15, 2013 changed how police departments communicate with the public during important emergency events. For the first time, social media played a critical role in communicating information about the bombings and capturing the culprits (Haddow, 2017).

On the day of the bombings, Commissioner of Police Ed Davis held a press conference. He calmly explained what happened and reassured the public that Boston had a comprehensive emergency response plan in place. The FBI, State Police, National Guard, and ATF were already in the city, offering their services. The Commissioner exuded confidence, control, and common sense. He asked for the public’s help in capturing the perpetrators (Global Breaking News, 2013).

Commissioner of Police Ed Davis and the Boston Police Department were committed to providing accurate, timely information to the public and keeping the lines of two-way communication open. He asked people to stay home and away from crowds for their own safety. He asked people to call the Mayor’s hotline and the Boston PD TIPS line with information (Global Breaking News, 2013).

The Boston Police Department was a leader in using social media to communicate with the public. Photos, videos, and information were shared through Twitter, Facebook, and websites. Inaccurate information was quickly corrected. It was noted by Bar-Tur that “BPD’s presence online helps reinvent the whole notion of community policing for the 21st century” (Haddow, p. 185, 2017). When the Tsarnaev brothers were finally caught, Boston Police Department tweeted a resounding “CAPTURED!!!” (Haddow, p. 185, 2017).

Instead of cowering in fear and feeling powerless, the Boston community was kept involved. This community empowerment contributed to situational awareness and the recovery of Boston after the event.

Global Breaking News. (Presenter). (2013, April 15). First press conference boston marathon

       bomb attack [Video file].Retrieved from (link not working):

Haddow, G.D., Bullock, J.A., & Coppola, D.P. (2017). Introduction to emergency

       management. (6th ed.). Cambridge, MA: Elsevier.

Dawn Pisturino

Thomas Edison State University

October 7, 2019

Copyright 2019-2021 Dawn Pisturino. All Rights Reserved.

4 Comments »

Radical Islamic Bullies

While discussing the liberation of Afghanistan from the Soviet Union, many people fail to understand that Osama bin Laden was one of the freedom fighters (mujahideen) who helped to defeat the Soviets. The United States backed these freedom fighters economically and militarily.

Afghanistan is where bin Laden and his followers learned to use weapons, engage in guerilla warfare, and the art of making bombs. Bin Laden — a Saudi Islamic fundamentalist — objected to the presence of U.S. military bases on “holy soil” in Saudi Arabia. He organized the terrorist group Al-Qaeda to fight westernization in Muslim countries and the U.S. itself. It was Saudis linked to Al-Qaeda who slammed into the World Trade Center on 9/11.

President Bill Clinton and the CIA warned the American people about Al-Qaeda, but people did not know enough about radical Islam to understand. Nor could they imagine such a terrible thing happening.

Instead of addressing the problem head on, President Bush invaded Iraq and avoided any major military action against Al-Qaeda in Pakistan and Afghanistan, where their camps were actually located. This was incomprehensible to many people. (If he was going to break international law and invade a country, it should have been Afghanistan.)

Under President Obama’s watch, bin Laden was finally killed and Al-Qaeda temporarily dispersed. But another threat emerged: ISIS. They announced their presence to the world through video-taped beheadings of Western journalists and other unlucky victims. Instead of taking these horrific actions seriously, Europe failed to act, and President Obama laughed and called them “J.V.” Realistically, the western world should have acted after the first beheading.

NO RADICAL ISLAMIC GROUP CAN BE WRITTEN OFF AS NOTHING BECAUSE ALL OF THESE GROUPS ARE WILLING TO USE VIOLENCE AND A CALL TO ISLAMIC UNITY AND PURITY TO PROMOTE THEIR AGENDAS. The media either downplays these groups or portrays them as “victims” of colonialism, even though European colonialism ended a long time ago. In point of fact, the Islamic governments which arose after colonialism puppet governments failed, are the real culprits.

The Muslim world has been uniquely divided against itself since the time of the the Prophet Muhammad. Westernization, which brought many countries into the 20th century, has been rejected over and over again when fundamentalist regimes have taken power. In Afghanistan, the Taliban were allowed to take over, resulting in an extreme form of Islamic oppression. The media – and the current Biden administration – does a poor job of reporting on situations like this. The realities of these events are so far removed from American life that people cannot comprehend the horrors of daily life for people in Afghanistan. Before the fall of Kabul, a poll revealed that 75% of the Afghanistan population hated the Taliban. People who were desperate to leave the country died, trying to get on airplanes leaving the airport.

Terrorism on U.S. soil was not as active under President Trump because he was proactive in preventing it. But in Europe, the media still tends to downplay any connection to radical Islamic terrorism when something happens because of the large numbers of Muslim refugees who have been allowed into European countries.

When an act of radical Islamic terrorism occurs — wherever it occurs — people need to know who did it and why. Trying to sweep it under the rug is just ignoring the problem. For example, the goal of ISIS (and Al-Qaeda and the Taliban and other, lesser-known groups) is to re-establish the caliphate in the Middle East. Although this sounds unrealistic to most people, it is a rallying point for ISIS and these other groups in recruiting new members. Referring back to the glory days of Islamic civilization gives down-trodden, oppressed people pride and hope for the future. ISIS – and these other groups – employs technology experts and does much of its recruiting on the Dark Web. The media does not report on this enough.

In reality, some Muslims DO become radicalized. Some of them DO become involved in violent terrorism. Some Americans have been seduced into joining radical Islamic terrorist groups. The media – and our government – has a responsibility to report fully and truthfully on this. Instead, President Biden plans to send $65 million to the Taliban in Afghanistan under the guise of helping the women and children of this war-torn country. The people will never see a dime of that money. Just like the U.S. military left behind $85 billion of weapons and other military equipment for the Taliban to use, the money will be spent on a terrorist government and terrorist activities. Biden has already allowed unvetted Afghanistanis to leave the country as refugees. Nobody knows how many are actual terrorists in disguise.

When we have politicians like Senator Krysten Sinema encouraging Americans to fight with the Taliban; government officials like John Kerry weaponizing terrorist countries like Iran (the leading country when it comes to financing terrorism); and presidents like Obama and Biden kissing terrorists’ asses, the American people are sitting ducks for violence, torture, and death.

Islamic fundamentalists are bullies. And they don’t care what you and I think about it. They are hate-filled, ideology-driven idealists determined to fulfill a goal – the Islamization of the whole world. Groups in America that became influential under the Obama-Biden regime are the Muslim Brotherhood (a well-known terrorist organization that was given access to the White House on numerous occasions under Obama), CAIR (The Council on American-Islamic Relations), and the Islamic Society of North America (ISNA). These three groups are all connected.

Are all Muslims terrorists? Of course not, and the good ones should not be confused with the bad ones. But we know who the bad ones are, and it is unacceptable and completely unthinkable that our political leaders are negotiating and doing business with these guys. Even worse, it is total incompetence when the CIA and the FBI become aware of active groups and fail to act. The heads of these organizations should be immediately fired when something happens.

Finally, it is up to the American people to educate themselves and demand change from our own government.

Dawn Pisturino

Thomas Edison State University

February 5, 2019; updated September 13, 2021

Copyright 2019-2021 Dawn Pisturino. All Rights Reserved.

5 Comments »

%d bloggers like this: