Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Loyola Marymount University and Loyola Law School

National Security Law

Armed conflict

Articles 1 - 2 of 2

Full-Text Articles in Law

The Boundless War: Challenging The Notion Of A Global Armed Conflict Against Al-Qaeda And Its Affiliates, Andrew Beshai Apr 2015

The Boundless War: Challenging The Notion Of A Global Armed Conflict Against Al-Qaeda And Its Affiliates, Andrew Beshai

Loyola of Los Angeles Law Review

The U.S. military response to the 9/11 attacks has expanded into a “global war” without a definite geographic scope. Both the Bush and Obama administrations have executed attacks in several countries including Somalia, Afghanistan, Pakistan, and Yemen under the “global war” paradigm. This Article challenges the concept of a global armed conflict, instead favoring the “epicenter-of-hostilities” framework for determining the legality of military action against Al-Qaeda, the Taliban, and other terrorist groups. This approach, rooted in established international law, measures the existence of specific criteria in each nation where hostile forces are present to determine if an armed conflict in …


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson Apr 2015

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …