Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Military, War, and Peace

On Environmental, Climate Change & National Security Law, Mark P. Nevitt Oct 2020

On Environmental, Climate Change & National Security Law, Mark P. Nevitt

All Faculty Scholarship

This Article offers a new way to think about climate change. Two new climate change assessments — the 2018 Fourth National Climate Assessment (NCA) and the United Nations Intergovernmental Panel’s Special Report on Climate Change — prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change a “super wicked” environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement …


Polar Opposites: Assessing The State Of Environmental Law In The World’S Polar Regions, Mark Nevitt, Robert V. Percival Jan 2018

Polar Opposites: Assessing The State Of Environmental Law In The World’S Polar Regions, Mark Nevitt, Robert V. Percival

All Faculty Scholarship

Climate change is fundamentally transforming both the Arctic and Antarctic polar regions. Yet they differ dramatically in their governing legal regimes. For the past sixty years the Antarctic Treaty System (ATS), a traditional “hard law” international law treaty system, effectively de-militarized the Antarctic region and halted competing sovereignty claims. In contrast, the Arctic region lacks a unifying Arctic treaty and is governed by the newer “soft law” global environmental law model embodied in the Arctic Council’s collaborative work. Now climate change is challenging this model. It is transforming the geography of both polar regions, breaking away massive ice sheets in …


Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt Jan 2018

Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt

All Faculty Scholarship

What best explains how “Everything Became War and the Military Became Everything?”— the provocative title of a recent book by Professor Rosa Brooks of Georgetown Law. In this Essay, I turn to the Department of Defense’s (DoD) unique agency design as the vehicle to address this question. Specifically, I first describe and analyze the role that the 1947 National Security Act and 1986 Goldwater-Nichols Act play in incentivizing organizational behavior within the DoD. These two Acts have broad implications for national security governance. Relatedly, I address the consequences of these two core national security laws, focusing on the …


Ending Security Council Resolutions, Jean Galbraith Oct 2015

Ending Security Council Resolutions, Jean Galbraith

All Faculty Scholarship

The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the …


Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern Apr 2015

Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern

All Faculty Scholarship

Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret Jan 2013

Roundtable Discussion Transcript: The Legal And Ethical Limits Of Technological Warfare Symposium, February 1, 2013, University Of Utah, S.J. Quinney College Of Law, Amos N. Guiora, Harry Soyster, David R. Irvine, Geoffrey S. Corn, James Jay Carafano, Claire O. Finkelstein, Laurie R. Blank, Monica Hakimi, George R. Lucas, Trevor W. Morrison, Frederic Megret

All Faculty Scholarship

The Utah Law Review brought in a panel of experts for a symposium on the legal and ethical limits of technological warfare. This roundtable discussion crystalized the issues discussed throughout the symposium. The collective experience and diversity of viewpoints of the panelists produced an unparalleled discussion of the complex and poignant issues involved in drone warfare. The open dialogue in the roundtable discussion created moments of tension where the panelists openly challenged each other’s viewpoints on the ethics and legality of drone warfare. The discussion captured in this transcript uniquely conveys the diversity of perspectives and inherently challenging legal and …


Advantaging Aggressors: Justice & Deterrence In International Law, Paul H. Robinson, Adil Ahmad Haque Jan 2011

Advantaging Aggressors: Justice & Deterrence In International Law, Paul H. Robinson, Adil Ahmad Haque

All Faculty Scholarship

Current international law imposes limitations on the use of force to defend against unlawful aggression that improperly advantage unlawful aggressors and disadvantage their victims. The Article gives examples of such rules, governing a variety of situations, showing how clearly unjust they can be. No domestic criminal law system would tolerate their use.


There are good practical reasons why international law should care that its rules are perceived as unjust. Given the lack of an effective international law enforcement mechanism, compliance depends to a large degree upon the moral authority with which international law speaks. Compliance is less likely when its …


Adoption Of The Responsibility To Protect, William W. Burke-White Jan 2011

Adoption Of The Responsibility To Protect, William W. Burke-White

All Faculty Scholarship

This book chapter traces the legal and political origins of the Responsibility to Protect doctrine from its early origins in the International Commission on Intervention and State Sovereignty through the 2005 World Summit Outcome Document and up to January 2011. The chapter examines the legal meaning of the Responsibility to Protect, the obligations the Responsibility imposes on states and international institutions, and its implications in for the international legal and political systems. The chapter argues that while the Responsibility to Protect has developed with extraordinary speed, it is still a norm in development rather than a binding legal rule. Its …


Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman Sep 2007

Bribes V. Bombs: A Study In Coasean Warfare, Gideon Parchomovsky, Peter Siegelman

All Faculty Scholarship

The use of bribes to co-opt an enemy’s forces can be a more effective way to wage war than the conventional use of force: Relative to bombs, bribes can save lives and resources, and preserve civic institutions. This essay evaluates the efficacy and normative desirability of selectively substituting bribes for bombs as a means of warfare. We show how inter-country disparities in wealth, differences in military strength, the organization of the bribing and recipient forces, uncertainty about the outcome of the conflict, and communications technology can contribute to the efficacy of bribes. We discuss methods for enforcing bargains struck between …


Human Rights And National Security: The Strategic Correlation, William W. Burke-White Jan 2004

Human Rights And National Security: The Strategic Correlation, William W. Burke-White

All Faculty Scholarship

No abstract provided.