Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Military, War, and Peace

Journal

2013

Institution
Keyword
Publication

Articles 1 - 30 of 152

Full-Text Articles in Law

The True Tragedy Of American Power, Isaiah Wilson Iii Dec 2013

The True Tragedy Of American Power, Isaiah Wilson Iii

The US Army War College Quarterly: Parameters

No abstract provided.


Is The Law Of Armed Conflict Outdated?, Sibylle Scheipers Dec 2013

Is The Law Of Armed Conflict Outdated?, Sibylle Scheipers

The US Army War College Quarterly: Parameters

No abstract provided.


Confronting Africa's Sobels, Robert L. Feldman, Michel Ben Arrous Dec 2013

Confronting Africa's Sobels, Robert L. Feldman, Michel Ben Arrous

The US Army War College Quarterly: Parameters

No abstract provided.


The Coming Financial Wars, Juan C. Zarate Dec 2013

The Coming Financial Wars, Juan C. Zarate

The US Army War College Quarterly: Parameters

No abstract provided.


Economic Statecraft: China In Africa, Douglas W. Winton Dec 2013

Economic Statecraft: China In Africa, Douglas W. Winton

The US Army War College Quarterly: Parameters

No abstract provided.


A War Examined: Operation Iraqi Freedom, 2003, Usawc Press Dec 2013

A War Examined: Operation Iraqi Freedom, 2003, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Rebalancing Us Military Power, Anna Simons Dec 2013

Rebalancing Us Military Power, Anna Simons

The US Army War College Quarterly: Parameters

No abstract provided.


Defeating Violent Nonstate Actors, Robert J. Bunker Dec 2013

Defeating Violent Nonstate Actors, Robert J. Bunker

The US Army War College Quarterly: Parameters

No abstract provided.


Commentaries And Replies, Usawc Press Dec 2013

Commentaries And Replies, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


From The Editor, Antulio J. Echevarria Ii Dec 2013

From The Editor, Antulio J. Echevarria Ii

The US Army War College Quarterly: Parameters

No abstract provided.


Redirecting Us Diplomacy, James Goodby, Kenneth Weisbode Dec 2013

Redirecting Us Diplomacy, James Goodby, Kenneth Weisbode

The US Army War College Quarterly: Parameters

No abstract provided.


Waging Financial War, David J. Katz Dec 2013

Waging Financial War, David J. Katz

The US Army War College Quarterly: Parameters

No abstract provided.


Artile Index, Vol. 43, 2013, Usawc Press Dec 2013

Artile Index, Vol. 43, 2013, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Book Reviews, Usawc Press Dec 2013

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Repurposing Cyber Command, Frank J. Cilluffo, Joseph R. Clark Dec 2013

Repurposing Cyber Command, Frank J. Cilluffo, Joseph R. Clark

The US Army War College Quarterly: Parameters

No abstract provided.


What The Qdr Ought To Say About Landpower, Francis G. Hoffman Dec 2013

What The Qdr Ought To Say About Landpower, Francis G. Hoffman

The US Army War College Quarterly: Parameters

No abstract provided.


The Voice Of Reason—Why Recent Judicial Interpretations Of The Antiterrorism And Effective Death Penalty Act’S Restrictions On Habeas Corpus Are Wrong, Judith L. Ritter Nov 2013

The Voice Of Reason—Why Recent Judicial Interpretations Of The Antiterrorism And Effective Death Penalty Act’S Restrictions On Habeas Corpus Are Wrong, Judith L. Ritter

Seattle University Law Review

By filing a petition for a federal writ of habeas corpus, a prisoner initiates a legal proceeding collateral to the direct appeals process. Federal statutes set forth the procedure and parameters of habeas corpus review. The Antiterrorism and Effective Death Penalty Act (AEDPA) first signed into law by President Clinton in 1996, included significant cut-backs in the availability of federal writs of habeas corpus. This was by congressional design. Yet, despite the dire predictions, for most of the first decade of AEDPA’s reign, the door to habeas relief remained open. More recently, however, the Supreme Court reinterpreted a key portion …


A Sinking Ship: Epa Regulation Of The Navy Training Program Sinkex Under The Ocean Dumping Act And The Toxic Substances Control Act, Laura Zippel Nov 2013

A Sinking Ship: Epa Regulation Of The Navy Training Program Sinkex Under The Ocean Dumping Act And The Toxic Substances Control Act, Laura Zippel

Washington Journal of Environmental Law & Policy

The EPA currently regulates the Navy program Sink Exercise (SINKEX) under a permit issued under the Ocean Dumping Act. The Navy regards SINKEX as both a “live fire exercise,” important for the training of sailors in tactics and operations, and as a ship disposal program. Due to the toxic materials used to construct the derelict ships–including PCBs, asbestos, and lead–a case was filed in San Francisco District Court alleging that the EPA is required to regulate and permit SINKEX under the Toxic Substances Control Act (TSCA). This comment addresses the complexities arising from EPA permitting of SINKEX, including a comparison …


Beyond The Battlefield, Beyond Al Qaeda: The Destabilizing Legal Architecture Of Counterterrorism, Robert M. Chesney Nov 2013

Beyond The Battlefield, Beyond Al Qaeda: The Destabilizing Legal Architecture Of Counterterrorism, Robert M. Chesney

Michigan Law Review

By the end of the first post-9/11 decade, the legal architecture associated with the U.S. government’s use of military detention and lethal force in the counterterrorism setting had come to seem relatively stable, supported by a remarkable degree of cross-branch and cross-party consensus (manifested by legislation, judicial decisions, and consistency of policy across two very different presidential administrations). That stability is certain to collapse during the second post-9/11 decade, however, thanks to the rapid erosion of two factors that have played a critical role in generating the recent appearance of consensus: the existence of an undisputed armed conflict in Afghanistan, …


The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl Oct 2013

The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl

Georgia Journal of International & Comparative Law

No abstract provided.


Symposium: Fallout: The Future Of Nuclear Security And Non-Proliferation. Significant Ambiguity In The Npt: A Continuing Issue, David S. Jonas Oct 2013

Symposium: Fallout: The Future Of Nuclear Security And Non-Proliferation. Significant Ambiguity In The Npt: A Continuing Issue, David S. Jonas

Georgia Journal of International & Comparative Law

No abstract provided.


Symposium: Fallout: The Future Of Nuclear Security And Non-Proliferation. Countering Proliferation: Wmd On The Move, Charles Allen Oct 2013

Symposium: Fallout: The Future Of Nuclear Security And Non-Proliferation. Countering Proliferation: Wmd On The Move, Charles Allen

Georgia Journal of International & Comparative Law

No abstract provided.


Symposium: Fallout: The Future Of Nuclear Security And Non-Proliferation. Keynote Address, Larry D. Johnson Oct 2013

Symposium: Fallout: The Future Of Nuclear Security And Non-Proliferation. Keynote Address, Larry D. Johnson

Georgia Journal of International & Comparative Law

No abstract provided.


Re-Examining The Falkland Islands War: The Necessity For Multi-Level Deterrence In Preventing Wars Of Aggression, Steven G. Stransky Oct 2013

Re-Examining The Falkland Islands War: The Necessity For Multi-Level Deterrence In Preventing Wars Of Aggression, Steven G. Stransky

Georgia Journal of International & Comparative Law

No abstract provided.


Masthead Oct 2013

Masthead

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Front Matter And Table Of Contents Oct 2013

Front Matter And Table Of Contents

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Cyber Utilities Infrastructure And Government Contracting, Corey P. Gray Oct 2013

Cyber Utilities Infrastructure And Government Contracting, Corey P. Gray

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


Sun Tzu’S Battle For Your Footnotes: The Emergent Role Of Libraries In Judicial Warfare, Mark Mccary Oct 2013

Sun Tzu’S Battle For Your Footnotes: The Emergent Role Of Libraries In Judicial Warfare, Mark Mccary

University of Miami National Security & Armed Conflict Law Review

No abstract provided.


The Eyes Of The World: Charges, Challenges, And Guantánamo Military Commissions After Hamdan Ii, Christina M. Frohock Oct 2013

The Eyes Of The World: Charges, Challenges, And Guantánamo Military Commissions After Hamdan Ii, Christina M. Frohock

University of Miami National Security & Armed Conflict Law Review

Guantánamo military commissions are under a spotlight, scrutinized by the judiciary and the public. Just the word “Guantánamo” can trigger impassioned reactions from both advocates and detractors. This article takes a measured view, examining a recent opinion from the U.S. Court of Appeals for the D.C. Circuit, Hamdan v. United States (“Hamdan II”), that speaks to the legitimacy of military commissions convened in Guantánamo to try the September 11th defendants and others. While several media commentators seized on the opinion as striking a blow to Guantánamo proceedings, in fact the opinion approves military commissions and offers a roadmap for prosecutors. …


Non-State Armed Groups And Technology: The Humanitarian Tragedy At Our Doorstep?, Colonel Dave Wallace, Major Shane Reeves Oct 2013

Non-State Armed Groups And Technology: The Humanitarian Tragedy At Our Doorstep?, Colonel Dave Wallace, Major Shane Reeves

University of Miami National Security & Armed Conflict Law Review

Technological advances are altering the contemporary asymmetric conflicts between non-­‐state armed groups and state actors. This article discusses the humanitarian consequences of these changing conflicts by first illustrating the dangers posed by non-­‐state armed groups gaining access to advanced technologies. A subsequent examination of the increasing ability of non-­‐state armed groups to use new technologies, such as cyber operations, to mitigate state actor advantages and the resultant risks to civilian populations follows. The article concludes that the humanitarian challenges presented by this growing intimacy between non-­‐state armed groups and technology, whether through a potentially devastating attack or by the dramatic …