Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Military, War, and Peace

On Environmental, Climate Change & National Security Law, Mark P. Nevitt Oct 2020

On Environmental, Climate Change & National Security Law, Mark P. Nevitt

All Faculty Scholarship

This Article offers a new way to think about climate change. Two new climate change assessments — the 2018 Fourth National Climate Assessment (NCA) and the United Nations Intergovernmental Panel’s Special Report on Climate Change — prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change a “super wicked” environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement …


Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt Jan 2018

Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt

All Faculty Scholarship

What best explains how “Everything Became War and the Military Became Everything?”— the provocative title of a recent book by Professor Rosa Brooks of Georgetown Law. In this Essay, I turn to the Department of Defense’s (DoD) unique agency design as the vehicle to address this question. Specifically, I first describe and analyze the role that the 1947 National Security Act and 1986 Goldwater-Nichols Act play in incentivizing organizational behavior within the DoD. These two Acts have broad implications for national security governance. Relatedly, I address the consequences of these two core national security laws, focusing on the …


Ending Security Council Resolutions, Jean Galbraith Oct 2015

Ending Security Council Resolutions, Jean Galbraith

All Faculty Scholarship

The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …