[图书][B] The use of force and international law
C Henderson - 2018 - books.google.com
The Use of Force and International Law offers an authoritative overview of international law
governing the resort to force. Looking through the prism of the contemporary challenges that …
governing the resort to force. Looking through the prism of the contemporary challenges that …
[图书][B] In the shadow of international law: Secrecy and regime change in the postwar world
M Poznansky - 2020 - books.google.com
Secrecy is a staple of world politics and a pervasive feature of political life. Leaders keep
secrets as they conduct sensitive diplomatic missions, convince reluctant publics to throw …
secrets as they conduct sensitive diplomatic missions, convince reluctant publics to throw …
Feigning compliance: covert action and international law
M Poznansky - International Studies Quarterly, 2019 - academic.oup.com
Why do leaders sometimes turn to covert action when overthrowing foreign regimes? Many
scholars locate secrecy's appeal in its capacity to help control escalation dynamics or shield …
scholars locate secrecy's appeal in its capacity to help control escalation dynamics or shield …
[图书][B] The use of force in international law: a case-based approach
The international law on the use of force is one of the oldest branches of international law. It
is an area twinned with the emergence of international law as a concept in itself, and which …
is an area twinned with the emergence of international law as a concept in itself, and which …
Black holes and open secrets: the impact of covert action on international law
AH Perina - Colum. J. Transnat'l L., 2014 - HeinOnline
Consider the following scenario: An individual with ties to a terrorist group is killed in a
targeted strike in East Africa. Media reporting of the incident trickles out gradually; some …
targeted strike in East Africa. Media reporting of the incident trickles out gradually; some …
[图书][B] Cyber-" War"-Testfall der Staatenverantwortlichkeit
SH Schulze - 2015 - books.google.com
English summary: Cyber attacks are not only a relatively new phenomenon, but also raise
serious technical and legal concerns. Usually the victim does not possess any information …
serious technical and legal concerns. Usually the victim does not possess any information …
Presidential War Powers as an Interactive Dynamic: International Law, Domestic Law, and Practice-Based Legal Change
CA Bradley, J Galbraith - NYUL Rev., 2016 - HeinOnline
Complaints about the rise of the" imperial Presidency" often emphasize in particular the
growth in the President's control over the use of military force. 1 Even though the …
growth in the President's control over the use of military force. 1 Even though the …
Sow what you reap: using predator and reaper drones to carry out assassinations or targeted killings of suspected islamic terrorists
TM McDonnell - Geo. Wash. Int'l L. Rev., 2012 - HeinOnline
From the crossbow to the rifle, the biplane to the jet fighter, the mortar to the atomic bomb,
advances in technology have often been adapted for military ends.'Because of their novel …
advances in technology have often been adapted for military ends.'Because of their novel …
Evolving norms of protection: China, Libya and the problem of intervention in armed conflict
A Shesterinina - Cambridge Review of International Affairs, 2016 - Taylor & Francis
This article examines the influence of civilian protection norms on China's response to the
2011 crisis in Libya. It argues that Responsibility to Protect—an emerging norm commonly …
2011 crisis in Libya. It argues that Responsibility to Protect—an emerging norm commonly …
An equitable framework for humanitarian intervention
C Burke - 2013 - torrossa.com
THIS BOOK BRINGS together two rather unlikely legal bed fellows. On the one hand is
equity, a series of general principles and doctrines devised to infuse the domestic legal …
equity, a series of general principles and doctrines devised to infuse the domestic legal …