Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace Commons

Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies

PDF

Series

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 32

Full-Text Articles in Military, War, and Peace

She Speaks For Millions: The Emergence Of Female Diplomatic Voices In The Russo-Ukrainian War, Amber Brittain-Hale Jan 2024

She Speaks For Millions: The Emergence Of Female Diplomatic Voices In The Russo-Ukrainian War, Amber Brittain-Hale

Education Division Scholarship

This research critically investigates the public diplomacy strategies deployed by a cohort of influential female European leaders on Twitter during the Russo-Ukrainian War of 2022-2023. The study comprises eight leaders - Kallas (Estonia), Marin (Finland), von der Leyen (President of the European Commission), Metsola (President of the European Parliament), Sandu (Moldova), Simonyte (Lithuania), Zourabichvili (Georgia), and Meloni (Italy) - representing millions of constituents. By mirroring the analytical attention given to Ukraine's President, Volodymyr Zelenskyy, this study scrutinizes the distinct approaches and dif erences in emotional, cognitive, and structural language use between these influential female figures and President Zelenskyy in their …


The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott May 2023

The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott

Baker Scholar Projects

Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …


Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman Dec 2021

Undersea Cables: The Ultimate Geopolitical Chokepoint, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

This work provides historical and contemporary overviews of this critical geopolitical problem, describes the policy actors addressing this in the U.S. and selected other countries, and provides maps and information on many undersea cable work routes. These cables are chokepoints with one dictionary defining chokepoints as “a strategic narrow route providing passage through or to another region."


On Environmental, Climate Change & National Security Law, Mark P. Nevitt Oct 2020

On Environmental, Climate Change & National Security Law, Mark P. Nevitt

All Faculty Scholarship

This Article offers a new way to think about climate change. Two new climate change assessments — the 2018 Fourth National Climate Assessment (NCA) and the United Nations Intergovernmental Panel’s Special Report on Climate Change — prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change a “super wicked” environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement …


Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman Jun 2020

Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..


Australian National Audit Office: Evaluating Australian Army Program Performance, Bert Chapman Apr 2020

Australian National Audit Office: Evaluating Australian Army Program Performance, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

The Australian National Audit Office (ANAO) evaluates the management and financial performance of Australian government programs for the Australian Parliament, Australian government agencies, Australian taxpayers, and individuals interested in the performance of these programs globally. This article examines how ANAO has examined the performance of Australian Army programs and strengths and weaknesses found in these programs while recommending changes to improve program performance. It also examines how government agencies and corporations which have been the subject of ANAO analyses have reacted to ANAO findings. This assessment also examines how Plan B (the possibility that Australia might have to rely less …


On Environmental Law, Climate Change, And National Security Law, Mark P. Nevitt Jan 2020

On Environmental Law, Climate Change, And National Security Law, Mark P. Nevitt

Faculty Articles

This Article offers a new way to think about climate change. Two new climate change assessments—the 2018 Fourth National Climate Assessment (“NCA”) and the United Nations Intergovernmental Panel on Climate Change’s Special Report on Climate Change— prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change an environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement within nations …


The Operational And Administrative Militaries, Mark P. Nevitt Jan 2019

The Operational And Administrative Militaries, Mark P. Nevitt

All Faculty Scholarship

This Article offers a new way of thinking about the military. The U.S. military’s existing legal architecture arose from tragedy: in response to operational military failures in Vietnam, the 1980 failed Iranian hostage rescue attempt and other military misadventures, Congress revamped the Department of Defense (DoD)’s organization. The resulting law, the Goldwater-Nichols Act, formed two militaries within the DoD that endure to this day. These two militaries – the operational military and the administrative military – were once opaque to the outside observer but have emerged from the shadows in light of recent conflicts. The operational military remains the focus …


Unconventional Lawfare: Operational Law In The War On Terror, L. P. Miller May 2017

Unconventional Lawfare: Operational Law In The War On Terror, L. P. Miller

Political Science Student Scholarship

This thesis examines the legal work required to establish a sufficient lawfare defense by focusing on the Department of Defense Judge Advocate Generals’ Corps (JAG Corps). The work will describe the JAG Corps as a well-trenched bureaucracy with a moral mission to uphold the military’s honor through laws, and how this was interpreted by the Bush and Obama administrations.


The Complex Combatant: Constructions Of Victimhood And Perpetrator-Hood In Gulu District, Northern Uganda, Kyra Fox Oct 2016

The Complex Combatant: Constructions Of Victimhood And Perpetrator-Hood In Gulu District, Northern Uganda, Kyra Fox

Independent Study Project (ISP) Collection

In the wake of the Lord’s Resistance Army (LRA) conflict in Northern Uganda, both the local and international community struggle to define the “victims” and “perpetrators” of a conflict that transformed ordinary civilians into combatants. Made up primarily of child soldiers, the LRA forcefully abducted and conscripted children across Northern Uganda to fight in a guerilla war against the Ugandan government. LRA members were forced to murder their own families and terrorize their home villages in an attempt to disorient and desensitize them to lives of violence. Some became willing, even eager fighters; others struggled daily to live with their …


Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith Jan 2016

Presidential War Powers As A Two-Level Dynamic: International Law, Domestic Law, And Practice-Based Legal Change, Curtis A. Bradley, Jean Galbraith

Faculty Scholarship

There is a rich literature on the circumstances under which the United Nations Charter or specific Security Council resolutions authorize nations to use force abroad, and there is a rich literature on the circumstances under which the U.S. Constitution and statutory law allows the President to use force abroad. These are largely separate areas of scholarship, addressing what are generally perceived to be two distinct levels of legal doctrine. This Article, by contrast, considers these two levels of doctrine together as they relate to the United States. In doing so, it makes three main contributions. First, it demonstrates striking parallels …


Ending Security Council Resolutions, Jean Galbraith Oct 2015

Ending Security Council Resolutions, Jean Galbraith

All Faculty Scholarship

The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the …


New Start From Old Beginnings?, Michaela Ruhlmann Apr 2015

New Start From Old Beginnings?, Michaela Ruhlmann

History Capstone Research Papers

This paper examines the extent of which START I and New START achieved effective balance of power between the United States and Russia. It addresses the purpose, agreements and the impact of START I and New Start on the effectiveness in accomplishing global balance of power. This paper argues that while the original START I accomplished a global balance of power by equalizing reduction of nuclear arsenals in both countries, but that New START did not accomplish a long-term global balance of power. To best demonstrate this, “New START from Old Beginnings?” covers START I’s historical context, examine its actual …


Of Drones And Justice: A Just War Theory Analysis Of The United States' Drone Campaigns, Ethan A. Wright Jan 2015

Of Drones And Justice: A Just War Theory Analysis Of The United States' Drone Campaigns, Ethan A. Wright

Richard T. Schellhase Essay Prize in Ethics

No abstract provided.


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


China's Nine-Dashed Map: Maritime Source Of Geopolitical Tension, Bert Chapman Oct 2014

China's Nine-Dashed Map: Maritime Source Of Geopolitical Tension, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

The South China Sea (SCS) is becoming an increasingly contentious source of geopolitical tension due to its significance as an international trade route, possessor of potentially significant oil and natural gas resources, China’s increasing diplomatic and military assertiveness, and the U.S.’ recent and ongoing Pacific Pivot strategy. Countries as varied as China, Taiwan, the Philippines, Indonesia and other adjacent countries have claims on this region’s islands and natural resources. China has been particularly assertive in asserting its SCS claims by creating a nine-dash line map claiming to give it de facto maritime control over this entire region without regard to …


The Effect Of The Syrian Crisis On Jordanian Internal Security, Andrew E. Szparaga Oct 2014

The Effect Of The Syrian Crisis On Jordanian Internal Security, Andrew E. Szparaga

Independent Study Project (ISP) Collection

Jordan has a refugee crisis; between 620,000 and 1.3 million Syrian refugees are seeking refuge in Jordan. This report aims to answer which aspect of Jordanian security the refugees have the biggest effect on. It also aims to answer whether the refugees based in camps, like Za’atari, or those integrated into the Jordanian communities are more threatening to internal security. Because many argue that Syrian refugees have a negative effect on the economic, environmental, military, political, and social securities of Jordan, many believe that they might pose a possible threat to the country’s internal security factors. The Syrian refugees have …


Letter To Editor Indiana Magazine Of History, Bert Chapman Jun 2014

Letter To Editor Indiana Magazine Of History, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Letter responding to comparison of Guantanamo bay terrorist detainees with the noted Indiana Civil War case of Lambdin Milligan, ultimately decided by the U.S. Supreme Court, who was detained by Union military authorities during the Civil War for his pro-confederate activities and tried by a military court.


Addressing Global Threat: Exploring The Relationship Between Common Purpose And Leadership, Charles R.H. Powell Jan 2014

Addressing Global Threat: Exploring The Relationship Between Common Purpose And Leadership, Charles R.H. Powell

Antioch University Full-Text Dissertations & Theses

While the mention of common purpose is prevalent in leadership studies, there are few attempts to explore the relationship between common purpose and leadership. This study delves into the questions of if and how common purpose and leadership inform one another. How leaders adapt purpose and leadership approaches in response to evolving and turbulent conditions may foster the depth and sustainment of immediate and subsequent accomplishments. Through phenomenological research in the venue of nuclear weapons reduction, a common purpose that is both globally pervasive and imbued with a sense of urgency, the lived essence of those engaged in common purpose …


Pandemic Disease, Biological Weapons, And War, Laura K. Donohue Jan 2014

Pandemic Disease, Biological Weapons, And War, Laura K. Donohue

Georgetown Law Faculty Publications and Other Works

Over the past two decades, concern about the threat posed by biological weapons has grown. Biowarfare is not new. But prior to the recent trend, the threat largely centered on state use of such weapons. What changed with the end of the Cold War was the growing apprehension that materials and knowledge would proliferate beyond industrialized states’ control, and that “rogue states” or nonstate actors would acquire and use biological weapons. Accordingly, in 1993 senators Samuel Nunn, Richard Lugar, and Pete Dominici expanded the Cooperative Threat Reduction Program to assist the former Soviet republics in securing biological agents and weapons …


New York Times V. U.S.: Implications And Relevance In The 21st Century, Maria E. Lombardi Oct 2013

New York Times V. U.S.: Implications And Relevance In The 21st Century, Maria E. Lombardi

Student Publications

In 1971, the New York Times released the first installment in a series later referred to as the Pentagon Papers that would eventually have significant political, social, and historical impacts that are felt even in the 21st Century. Following the first release, President Nixon’s administration sought an injunction against the publication of the remaining contents of the classified study, ultimately becoming an extensive legal process that culminated in the Supreme Court. In a per curiam opinion, the Court ruled that in accordance with Organization for a Better Austin v. Keefe and Near v. Minnesota that the federal government did not …


Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa Apr 2013

Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa

Independent Study Project (ISP) Collection

The first use of the modern day attack drone by the United States was in Afghanistan in mid 2002, and for the past 11 years attack drones have been used by the United States in as many countries as Pakistan, Yemen and Somalia. When considering the alternatives to using drones, such as sending marines on the ground to complete a mission or flying a piloted jet over enemy territory to gather intelligence, as well as the military power that the use of these vehicles projects, the attack drone has become the weapon of choice in the war on terror for …


Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret Jan 2013

Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret

All Faculty Scholarship

The Utah Law Review brought in a panel of experts for a symposium on the legal and ethical limits of technological warfare. This roundtable discussion crystalized the issues discussed throughout the symposium. The collective experience and diversity of viewpoints of the panelists produced an unparalleled discussion of the complex and poignant issues involved in drone warfare. The open dialogue in the roundtable discussion created moments of tension where the panelists openly challenged each other’s viewpoints on the ethics and legality of drone warfare. The discussion captured in this transcript uniquely conveys the diversity of perspectives and inherently challenging legal and …


Obama's Failed Attempt To Close Gitmo: Why Executive Orders Can't Bring About Systemic Change, Erin B. Corcoran May 2011

Obama's Failed Attempt To Close Gitmo: Why Executive Orders Can't Bring About Systemic Change, Erin B. Corcoran

Law Faculty Scholarship

No abstract provided.


Risk Taking And Force Protection, David Luban Jan 2011

Risk Taking And Force Protection, David Luban

Georgetown Law Faculty Publications and Other Works

This paper addresses two questions about the morality of warfare: (1) how much risk must soldiers take to minimize unintended civilian casualties caused by their own actions (“collateral damage”), and (2) whether it is the same for the enemy's civilians as for one's own.

The questions take on special importance in warfare where one side is able to attack the other side from a safe distance, but at the cost of civilian lives, while safeguarding civilians may require soldiers to take precautions that expose them to greater risk. In a well-known article, Asa Kasher and Amos Yadlin argue that while …


The Air Force And Twenty-First-Century Conflicts: Dysfunctional Or Dynamic?, Charles J. Dunlap Jr. Jan 2010

The Air Force And Twenty-First-Century Conflicts: Dysfunctional Or Dynamic?, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


The Civilised Self And The Barbaric Other: Imperial Delusions Of Order And The Challenges Of Human Security, Ikechi Mgbeoji Jan 2006

The Civilised Self And The Barbaric Other: Imperial Delusions Of Order And The Challenges Of Human Security, Ikechi Mgbeoji

Articles & Book Chapters

In the aftermath of the military conflicts of 1936 - 45, there seemed to be a global renunciation of war as an instrument of state policy. Shortly thereafter, however, decades of ideological attrition between the major powers and the inherent perversion of postcolonial states reduced the solemn declarations of 1945 to ineffectual rhetoric. Underpinning the decline and demise of a human-centred approach to global peace and security is the enduring notion of the civilised self and the barbaric other. The polarisation of humanity between camps of the savage and the civilised has continued to animate international policy making despite denials. …


Who Has The Body? The Paths To Habeas Corpus Reform, Cary H. Federman Sep 2004

Who Has The Body? The Paths To Habeas Corpus Reform, Cary H. Federman

Department of Justice Studies Faculty Scholarship and Creative Works

The purpose of this article is to place the Antiterrorism and Effective Death Penalty Act (AEDPA) of 1996 within a political and historical framework that describes the effort by the Supreme Court and various interested parties to restrict prisoners’ access to the federal courts by way of habeas corpus. Of principal concern here is how an act of terrorism against the United States provides an opportunity for Congress to restrict death row prisoners from obtaining habeas corpus review. Along with an analysis of Supreme Court decisions, three attempts to limit federal habeas corpus review for state prisoners from the late …


Human Rights And National Security: The Strategic Correlation, William W. Burke-White Jan 2004

Human Rights And National Security: The Strategic Correlation, William W. Burke-White

All Faculty Scholarship

No abstract provided.


Putting Naval Before History, Mark R. Shulman Jan 1995

Putting Naval Before History, Mark R. Shulman

Elisabeth Haub School of Law Faculty Publications

No abstract provided.