Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- International law (2)
- Air gaps (1)
- Attribution (1)
- CIA (1)
- Central Intelligence Agency (1)
-
- Conditions to terminate a UN resolution (1)
- Covert action (1)
- Crimes against humanity (1)
- Critical infrastructure (1)
- Cyberattack (1)
- Cybersecurity (1)
- Cyberwar (1)
- Desert (1)
- Digital warfare (1)
- Geneva Convention (1)
- How Everything Became War and the Military Became Everything (1)
- Human rights (1)
- Humanitarian intervention (1)
- ICISS Report (1)
- Independent Group of Experts (IGE) (1)
- International humanitarian law (1)
- Iran (1)
- Jus ad bellum (1)
- Jus in bello (1)
- Kill switches (1)
- Law of armed conflict (1)
- Law of war (1)
- Legal norms (1)
- Mass atrocity (1)
- Military law & governance (1)
Articles 1 - 5 of 5
Full-Text Articles in Military, War, and Peace
Defense And Desert: When Reasons Don’T Share, Kimberly Kessler Ferzan
Defense And Desert: When Reasons Don’T Share, Kimberly Kessler Ferzan
All Faculty Scholarship
Many retributivists maintain that when a defendant commits an offense, (1) the defendant forfeits rights against punishment and (2) it is intrinsically good for the defendant to get the punishment he deserves. Self-defense theorists often maintain that when certain conditions are met, (1) an aggressor forfeits his rights against defensive force and (2) the aggressor may be harmed instrumentally to prevent his attack. In the context of a symposium on Uwe Steinhoff’s "Just War Theory," this paper examines the intersection of defense and desert. First, may desert and defense be aggregated when, for instance, the amount of harm that is …
Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt
Reforming The Pentagon: Reflections On How Everything Became War And The Military Became Everything, Mark P. Nevitt
All Faculty Scholarship
What best explains how “Everything Became War and the Military Became Everything?”— the provocative title of a recent book by Professor Rosa Brooks of Georgetown Law. In this Essay, I turn to the Department of Defense’s (DoD) unique agency design as the vehicle to address this question. Specifically, I first describe and analyze the role that the 1947 National Security Act and 1986 Goldwater-Nichols Act play in incentivizing organizational behavior within the DoD. These two Acts have broad implications for national security governance. Relatedly, I address the consequences of these two core national security laws, focusing on the …
Ending Security Council Resolutions, Jean Galbraith
Ending Security Council Resolutions, Jean Galbraith
All Faculty Scholarship
The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the …
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo
All Faculty Scholarship
Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …
Adoption Of The Responsibility To Protect, William W. Burke-White
Adoption Of The Responsibility To Protect, William W. Burke-White
All Faculty Scholarship
This book chapter traces the legal and political origins of the Responsibility to Protect doctrine from its early origins in the International Commission on Intervention and State Sovereignty through the 2005 World Summit Outcome Document and up to January 2011. The chapter examines the legal meaning of the Responsibility to Protect, the obligations the Responsibility imposes on states and international institutions, and its implications in for the international legal and political systems. The chapter argues that while the Responsibility to Protect has developed with extraordinary speed, it is still a norm in development rather than a binding legal rule. Its …