Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- International law (4)
- Environmental law (2)
- Law of war (2)
- National security (2)
- Use of force (2)
-
- AUMF (1)
- Afghanistan (1)
- Air gaps (1)
- American (1)
- Antarctic Treaty System (1)
- Arctic Council (1)
- Arctic indigenous peoples (1)
- Attribution (1)
- Bargaining (1)
- Battle (1)
- Bribery (1)
- CIA (1)
- Causation (1)
- Central Intelligence Agency (1)
- Citizens (1)
- Climate change (1)
- Climate-security nexus (1)
- Commission on the Limits of the Continental Shelf (1)
- Conditions to terminate a UN resolution (1)
- Conflict (1)
- Congress (1)
- Contracts (1)
- Convention on the Regulation of Antarctic Mineral Resource Activities (1)
- Counter-Terrorism (1)
- Court (1)
Articles 1 - 11 of 11
Full-Text Articles in Military, War, and Peace
On Environmental, Climate Change & National Security Law, Mark P. Nevitt
On Environmental, Climate Change & National Security Law, Mark P. Nevitt
All Faculty Scholarship
This Article offers a new way to think about climate change. Two new climate change assessments — the 2018 Fourth National Climate Assessment (NCA) and the United Nations Intergovernmental Panel’s Special Report on Climate Change — prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change a “super wicked” environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement …
Polar Opposites: Assessing The State Of Environmental Law In The World’S Polar Regions, Mark Nevitt, Robert V. Percival
Polar Opposites: Assessing The State Of Environmental Law In The World’S Polar Regions, Mark Nevitt, Robert V. Percival
All Faculty Scholarship
Climate change is fundamentally transforming both the Arctic and Antarctic polar regions. Yet they differ dramatically in their governing legal regimes. For the past sixty years the Antarctic Treaty System (ATS), a traditional “hard law” international law treaty system, effectively de-militarized the Antarctic region and halted competing sovereignty claims. In contrast, the Arctic region lacks a unifying Arctic treaty and is governed by the newer “soft law” global environmental law model embodied in the Arctic Council’s collaborative work. Now climate change is challenging this model. It is transforming the geography of both polar regions, breaking away massive ice sheets in …
Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt
Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt
All Faculty Scholarship
What best explains how “Everything Became War and the Military Became Everything?”— the provocative title of a recent book by Professor Rosa Brooks of Georgetown Law. In this Essay, I turn to the Department of Defense’s (DoD) unique agency design as the vehicle to address this question. Specifically, I first describe and analyze the role that the 1947 National Security Act and 1986 Goldwater-Nichols Act play in incentivizing organizational behavior within the DoD. These two Acts have broad implications for national security governance. Relatedly, I address the consequences of these two core national security laws, focusing on the …
Ending Security Council Resolutions, Jean Galbraith
Ending Security Council Resolutions, Jean Galbraith
All Faculty Scholarship
The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the …
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern
All Faculty Scholarship
Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret
Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret
All Faculty Scholarship
The Utah Law Review brought in a panel of experts for a symposium on the legal and ethical limits of technological warfare. This roundtable discussion crystalized the issues discussed throughout the symposium. The collective experience and diversity of viewpoints of the panelists produced an unparalleled discussion of the complex and poignant issues involved in drone warfare. The open dialogue in the roundtable discussion created moments of tension where the panelists openly challenged each other’s viewpoints on the ethics and legality of drone warfare. The discussion captured in this transcript uniquely conveys the diversity of perspectives and inherently challenging legal and …
Advantaging Aggressors: Justice & Deterrence In International Law, Paul H. Robinson, Adil Ahmad Haque
Advantaging Aggressors: Justice & Deterrence In International Law, Paul H. Robinson, Adil Ahmad Haque
All Faculty Scholarship
Current international law imposes limitations on the use of force to defend against unlawful aggression that improperly advantage unlawful aggressors and disadvantage their victims. The Article gives examples of such rules, governing a variety of situations, showing how clearly unjust they can be. No domestic criminal law system would tolerate their use.
There are good practical reasons why international law should care that its rules are perceived as unjust. Given the lack of an effective international law enforcement mechanism, compliance depends to a large degree upon the moral authority with which international law speaks. Compliance is less likely when its …
Adoption Of The Responsibility To Protect, William W. Burke-White
Adoption Of The Responsibility To Protect, William W. Burke-White
All Faculty Scholarship
This book chapter traces the legal and political origins of the Responsibility to Protect doctrine from its early origins in the International Commission on Intervention and State Sovereignty through the 2005 World Summit Outcome Document and up to January 2011. The chapter examines the legal meaning of the Responsibility to Protect, the obligations the Responsibility imposes on states and international institutions, and its implications in for the international legal and political systems. The chapter argues that while the Responsibility to Protect has developed with extraordinary speed, it is still a norm in development rather than a binding legal rule. Its …
Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman
Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman
All Faculty Scholarship
The use of bribes to co-opt an enemy’s forces can be a more effective way to wage war than the conventional use of force: Relative to bombs, bribes can save lives and resources, and preserve civic institutions. This essay evaluates the efficacy and normative desirability of selectively substituting bribes for bombs as a means of warfare. We show how inter-country disparities in wealth, differences in military strength, the organization of the bribing and recipient forces, uncertainty about the outcome of the conflict, and communications technology can contribute to the efficacy of bribes. We discuss methods for enforcing bargains struck between …
Human Rights And National Security: The Strategic Correlation, William W. Burke-White
Human Rights And National Security: The Strategic Correlation, William W. Burke-White
All Faculty Scholarship
No abstract provided.