Protection of Civilians Military Reference Guide, Second Edition Second Edition | Page 32

Protection of Civilians Military Reference Guide
additional information regarding the acquisition and processing of such information is discussed later in the chapter .
b . Particularly with respect to the protection of civilians , modern military operations are increasingly transparent . Information technology facilitates the instantaneous global impact of the professional media and individual commentators . In most countries information technology also has profound local impact via social media . Messages can be widely and rapidly distributed , whether or not they are accurate . A limited and local act can have far-reaching strategic consequences .
c . Military leaders must be aware of the importance of information and should consider audiences , messages , and methods of delivery . Potential audiences include the local population , host-state leaders , adversaries , international audiences , and the leaders and populations of the countries contributing troops to the operation . Messages might include that the military force is committed to the protection of civilians , has adopted stringent measures to protect civilians , and sincerely regrets any civilian harm caused by its actions . If appropriate , other messages may emphasize civilian harm caused by adversaries or the role of enablers who provide support to adversaries .
d . Delivery methods may include a range of audio , visual , and audio-visual methods , websites , television broadcasts , radio broadcasts , leaflets , posters , signs social media , and key leader engagement . Military units should maintain a consistent pattern of truthfulness and timeliness in their information activities .
e . Adversaries will use information as a weapon to advance their narratives to justify violence against civilians . They may also attempt to discredit the military force ’ s ability to protect civilians while praising their own . They will not necessarily be truthful in these efforts to exploit PoC as a theme . Additionally , rumors about misconduct by military forces or their partners could undermine the effectiveness of the mission .
f . In addition to providing timely and truthful messages , commanders will immediately be required to manage local and international expectations regarding the provision of security and protection of civilians . The legitimacy of and commitment to the operation may suffer if expectations are not properly managed . Information activities are crucial to ensure that the local population has a realistic understanding of the mission , actions , and capabilities of military forces .
INFRASTRUCTURE FACTORS
a . Key infrastructure , such as bridges and power plants , is often targeted during conflict , which places civilians in close proximity to these targets at risk . Additionally , damaged infrastructure can disrupt the provision of essential services necessary for civilian well-being . If contemplating combat operations , the military benefit of doing so should be balanced against the possibility that the targets are close to civilians , the potential that destroying such targets will unduly harm civilians , or that their destruction will have undesired long-term effects after the operation . Conversely , enemies may attack key infrastructure in areas controlled by the military force , and the protection of civilians in these areas should be considered in security plans .
19