Open Access. Powered by Scholars. Published by Universities.®

Military, War and Peace Commons

Open Access. Powered by Scholars. Published by Universities.®

1,336 Full-Text Articles 1,043 Authors 395,086 Downloads 86 Institutions

All Articles in Military, War and Peace

Faceted Search

1,336 full-text articles. Page 1 of 30.

Trade Regulation - Export Controls - Cocom Agrees On New Multilateral Export Guidelines Allowing Eastern Bloc To Purchase Low Level Technology Legally, Jackie L. Masden 2015 University of Georgia School of Law

Trade Regulation - Export Controls - Cocom Agrees On New Multilateral Export Guidelines Allowing Eastern Bloc To Purchase Low Level Technology Legally, Jackie L. Masden

Georgia Journal of International & Comparative Law

No abstract provided.


The Right Of Counterintervention, John A. Perkins 2015 Palmer & Dodge

The Right Of Counterintervention, John A. Perkins

Georgia Journal of International & Comparative Law

No abstract provided.


"People Power" And Pacific Security: The United States-Philippine Alliance After The 1986 Philippine Constitution, Michael M. Gerardi 2015 University of Georgia School of Law

"People Power" And Pacific Security: The United States-Philippine Alliance After The 1986 Philippine Constitution, Michael M. Gerardi

Georgia Journal of International & Comparative Law

No abstract provided.


Genocide Convention - Intentional Starvation - Ethiopian Famine In The Eritrean War For Independence. The Applicability Of The Genocide Convention To Government Imposed Famine In Eritrea., Jean E. Zeiler 2015 University of Georgia School of Law

Genocide Convention - Intentional Starvation - Ethiopian Famine In The Eritrean War For Independence. The Applicability Of The Genocide Convention To Government Imposed Famine In Eritrea., Jean E. Zeiler

Georgia Journal of International & Comparative Law

No abstract provided.


Further Steps In The Clarification Of The Soviet Position On The Innocent Passage Of Foreign Warships Through Its Territorial Waters, Erick Franckx 2015 Vrije Universiteit Brussel

Further Steps In The Clarification Of The Soviet Position On The Innocent Passage Of Foreign Warships Through Its Territorial Waters, Erick Franckx

Georgia Journal of International & Comparative Law

No abstract provided.


Segmentation Of Environmental Review: Why Defenders Of Wildlife V. U.S. Navy Threatens The Effectiveness Of Nepa And The Esa, Erica Novack 2015 Boston College Law School

Segmentation Of Environmental Review: Why Defenders Of Wildlife V. U.S. Navy Threatens The Effectiveness Of Nepa And The Esa, Erica Novack

Boston College Environmental Affairs Law Review

In Defenders of Wildlife v. United States Department of the Navy, the U.S. Court of Appeals for the Eleventh Circuit held that the environmental review conducted by the Navy and the National Marine and Fishery Service regarding the proposed construction and operation of a warfare training range was in compliance with federal law. In particular, the court found that segmentation of review at its final stages did not violate the National Environmental Policy Act or the Endangered Species Act. This Comment addresses the danger of allowing a technicality to authorize segmentation of environmental review, and its potential negative impacts ...


Command Responsibility: A Small-Unit Leader's Perspective, Jeremy Dunnaback 2015 Northwestern University School of Law

Command Responsibility: A Small-Unit Leader's Perspective, Jeremy Dunnaback

Northwestern University Law Review

No abstract provided.


Managing Cyberthreat, Lawrence J. Trautman 2015 Entrepreneur & Professional Corporate Director

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good.

My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be ...


Lawfare, Charles J. Dunlap Jr. 2015 Duke Law School

Lawfare, Charles J. Dunlap Jr.

Faculty Scholarship

No abstract provided.


Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick 2015 Maurice A. Deane School of Law at Hofstra University

Consequence, Weapons Of Mass Destruction, And The Fourth Amendment's "No-Win" Scenario, Scott J. Glick

Indiana Law Journal

No abstract provided.


Civilian Starvation And Relief During Armed Conflict: The Modern Humanitarian Law, Charles A. Allen 2014 United States Navy Judge Advocate General's Corps

Civilian Starvation And Relief During Armed Conflict: The Modern Humanitarian Law, Charles A. Allen

Georgia Journal of International & Comparative Law

No abstract provided.


The Role Of The Security Council In World Affairs, Crispin Tickell 2014 Mission of the United Kingdom and Northern Ireland to the United Nations

The Role Of The Security Council In World Affairs, Crispin Tickell

Georgia Journal of International & Comparative Law

No abstract provided.


Breaking Encryption And Gathering Data: International Law Applications, Grant Hodgson 2014 SelectedWorks

Breaking Encryption And Gathering Data: International Law Applications, Grant Hodgson

Grant Hodgson

The international legal principle of sovereignty applies to breaking encryption and provides guidance on when a state may break the encryption on data coming from other states. In general, breaking encryption on data that is traveling on the high seas or traveling within a state’s territory does not violate sovereignty. States must be careful, however, of communications that meet diplomacy protection requirements and must leave these communications alone if they are found. There are many methods used to defeat encryption and gather data including brute force attacks, man in the middle attacks, stealing cryptographic keys, taking advantage of predictable ...


The Veterans Clinic And Legal Education: A Conversation With Professor Steven Berenson, Steven Berenson, Paul Lee 2014 University of Massachusetts School of Law

The Veterans Clinic And Legal Education: A Conversation With Professor Steven Berenson, Steven Berenson, Paul Lee

University of Massachusetts Law Review

This Article is a conversation between Professor Berenson and the UMass Law Review, discussing both his experience setting up the Clinic and the Clinic’s achievements. Part II provides a brief introduction to Professor Berenson’s work and how he started the TJSL Veterans Clinic. Part III considers veterans particular legal needs and how the Clinic addresses these issues. The Article concludes with some remarks from Professor Berenson regarding the future of the Clinic, and the overall movement of law schools toward greater practical education.


Self-Inflicted Wounds: How Military Regulations Prejudice Service Members, Kyndra Miller Rotunda, Ari Freilich 2014 University of Massachusetts School of Law

Self-Inflicted Wounds: How Military Regulations Prejudice Service Members, Kyndra Miller Rotunda, Ari Freilich

University of Massachusetts Law Review

This Article discusses two important facets of Military Regulation and veterans law. First, this Article explores how the Uniform Code of Military Justice treats veterans accused of committing self-injury. Thus, there is a prohibition on , including criminal prosecution of, attempted suicide, which this Article argues exacerbates the issues which many of our brave servicemen and women face upon returning home from combat, often carrying the burden of mental disorders such as post-traumatic stress disorder. Second, this Article delves into Air Force Regulations, which prohibits termination, without cause, once an officer reaches the rank of Major and has served at least ...


Toward A Less Adversarial Relationship Between Chevron And Gardner, James D. Ridgway 2014 University of Massachusetts School of Law

Toward A Less Adversarial Relationship Between Chevron And Gardner, James D. Ridgway

University of Massachusetts Law Review

Veterans benefits are a creature of statute. As such, nearly every veterans benefits issue presented to the courts for resolution involves the interpretation of a statute, regulation, or sub-regulatory authority. Although veterans law has been subject to judicial review for over twenty-five years, the courts still have yet to develop a coherent doctrine regarding when to resolve ambiguity in favor of the veteran versus when to defer to the interpretations of the Department of Veterans Affairs. This Article explores three possible approaches to developing a coherent vision of how veteran friendliness and agency deference can coexist and provide more predictability ...


The Role Of The Courts In Time Of War, William C. Banks 2014 Syracuse University College of Law

The Role Of The Courts In Time Of War, William C. Banks

Washington and Lee Law Review Online

The role of the courts in judging the actions of government in wartime has ranged from extreme deference to careful probing of alleged government excesses over more than two centuries. The courts’ record has reflected the nature of the armed conflicts the United States has engaged in and the legal bases for the actions at issue. In the aggregate, the courts have served as a necessary counterweight to government overreaching in times of national security crisis. It is easy to underestimate the institutional problems confronting judges who are asked to make momentous decisions in times of national crisis—difficulties of ...


Unmanned Aerial Vehicles: Legitimate Weapon Systems Or Unlawful Angels Of Death?, Michael J. Deegan 2014 U.S. Army Reserve

Unmanned Aerial Vehicles: Legitimate Weapon Systems Or Unlawful Angels Of Death?, Michael J. Deegan

Pace International Law Review

Since the invasion of Afghanistan, the United States has utilized Unmanned Aerial Vehicles (UAVs) to locate, surveil and kill members of the Taliban, Al-Qaeda and its associated forces. Such killings have decimated the leadership of these groups and disrupted their operations. However, there are collateral effects from UAV killings including civilian deaths. These deaths increase resentment and hatred toward the US, which is channeled by terrorist groups to recruit new members and for local support. Moreover, targeted killings outside a combat zone have political and diplomatic consequences. This paper argues that the current uses of UAV are legal under international ...


Protecting Government Defense Contracting With A Purpose: Interpreting Civil Liability Under The Anti-Kickback Act, Bryan C. Curran 2014 Boston College Law School

Protecting Government Defense Contracting With A Purpose: Interpreting Civil Liability Under The Anti-Kickback Act, Bryan C. Curran

Boston College Law Review

The Department of Defense awards over $600 billion in government defense contracts to private contractors every year. The magnitude of these awards and the structure of defense contracts place the government at serious risk if fraud and misrepresentation are not adequately regulated and prosecuted. The Anti-Kickback Act of 1986 seeks to protect the government from fraud by imposing damages on prime contractors that either accept kickbacks or include the cost of kickbacks in their contract prices. The Act’s civil liability provision provides for direct and vicarious liability against prime contractor corporations whose employees or subcontractors engage in kickback activity ...


Austria - Neutrality - European Economic Community - Austrian Neutrality And Ec Membership: Are They Compatible?, Mark Bergethon 2014 University of Georgia School of Law

Austria - Neutrality - European Economic Community - Austrian Neutrality And Ec Membership: Are They Compatible?, Mark Bergethon

Georgia Journal of International & Comparative Law

No abstract provided.


Digital Commons powered by bepress