Listing 1 - 10 of 10 |
Sort by
|
Choose an application
In 2011, Nasser al-Awlaki, a terrorist on the U.S. 'kill list' in Yemen, was targeted by the CIA. One week later, a military strike killed his son. The following year, the U.S. Ambassador to Pakistan resigned, concluding he was undermined by CIA-conducted drone strikes of which he had no knowledge or control. The demands of the new, borderless 'gray area' conflict have cast civilians and military into unaccustomed roles with inadequate legal underpinning. As the civilian Department of Homeland Security defends the United States against increasing cyber threats and armies of civilian contractors work in paramilitary roles in conflict areas, appropriate roles in wartime and legal boundaries of war demand clarification. In this book, the author examines gray areas in counterinsurgency, counterterrorism, and cyber warfare. Her innovative solutions for role definition and transparency offer new approaches to a rapidly evolving civil-military-legal environment.
Military law --- Terrorism --- Civil-military relations --- Asymmetric warfar --- Civil war --- Cyberspace operations (Military science) --- Prevention --- Law and legislation --- Cyberspace operations (Military science)Prevention
Choose an application
In 2011, Nasser Al-Awlaki, a terrorist on the US 'kill list' in Yemen, was targeted by the CIA. A week later, a military strike killed his son. The following year, the US Ambassador to Pakistan resigned, undermined by CIA-conducted drone strikes of which he had no knowledge or control. The demands of the new, borderless 'gray area' conflict have cast civilians and military into unaccustomed roles with inadequate legal underpinning. As the Department of Homeland Security defends against cyber threats and civilian contractors work in paramilitary roles abroad, the legal boundaries of war demand to be outlined. In this book, former Under Secretary of the Air Force Antonia Chayes examines these new 'gray areas' in counterinsurgency, counter-terrorism and cyber warfare. Her innovative solutions for role definition and transparency will establish new guidelines in a rapidly evolving military-legal environment.
Military law --- Terrorism --- Civil-military relations --- Asymmetric warfare --- Civil war --- Cyberspace operations (Military science) --- Military Law - U.S. --- Law - U.S. --- Law, Politics & Government --- Armed Forces --- Law, Military --- Military administration --- National security --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science --- Civil wars --- Intra-state war --- Rebellions --- Government, Resistance to --- International law --- Revolutions --- War --- Law and legislation --- Prevention --- Asymmetric warfare. --- Civil war. --- Military law - United States --- Terrorism - Prevention - Law and legislation - United States --- Civil-military relations - United States --- Asymmetric warfar
Choose an application
International movements --- Peaceful settlement of international disputes --- Internal politics --- Aide internationale --- Aide à l'étranger --- Burgeroorlog --- Civil war --- Collaboration internationale --- Cooperation [international ] --- Coopération bilatérale --- Coopération internationale --- Coopération interrégionale --- Coopération multilatérale --- Coopération régionale --- Global governance --- Guerre civile --- Institutions [international ] --- Institutions internationales --- Interdependence of nations --- International cooperation --- International institutions --- Internationale samenwerking --- Interventie (Internationaal recht) --- Interventie [Militaire ] --- Intervention (Droit international) --- Intervention (International law) --- Intervention [Military ] --- Intervention militaire --- Militaire interventie --- Military intervention --- Rebellions --- World government --- World order --- Cooperation, International --- Institutions, International --- Cooperation --- International relations --- International organization --- Civil wars --- Intra-state war --- Government, Resistance to --- International law --- Revolutions --- War --- Diplomacy --- Neutrality
Choose an application
Ethnic conflict. --- Political violence. --- Conflict management. --- Conflits ethniques --- Violence politique --- Gestion des conflits --- Ethnic conflict --- Political violence --- Conflict management
Choose an application
In an increasingly interdependent world, states resort to an array of regulatory agreements to deal with global problems, using military or economic sanctions to achieve compliance. This book argues against such a model of treaty compliance.
Treaties. --- Compliance. --- Sovereignty. --- Sovereignty --- State sovereignty (International relations) --- International law --- Political science --- Common heritage of mankind (International law) --- International relations --- Self-determination, National --- Compliant behavior --- Conformity --- Cooperativeness --- Psychology --- Agreements, International --- Conventions (Treaties) --- International agreements --- Treaties --- International obligations --- Law and legislation
Choose an application
Treaties --- Compliance --- Sovereignty --- #SBIB:014.IO --- #SBIB:340H80 --- State sovereignty (International relations) --- International law --- Political science --- Common heritage of mankind (International law) --- International relations --- Self-determination, National --- Compliant behavior --- Conformity --- Cooperativeness --- Psychology --- Agreements, International --- Conventions (Treaties) --- International agreements --- International obligations --- Internationaal recht, algemeen --- Law and legislation
Choose an application
Choose an application
Choose an application
Choose an application
NUCLEAR ARMS CONTROL AND DISARMAMENT --- ANTIMISSILE MISSILES --- ABM TREATY (1972)
Listing 1 - 10 of 10 |
Sort by
|