Ch. 6 Chapter Notes

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/136

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

137 Terms

1
New cards
Noncombatant Immunity
________: A core principle of international humanitarian law that holds that people not bearing arms in a conflict may not be deliberately targeted or systematically harmed; includes unarmed civilians, surrendered soldiers, and soldiers who are too severely injured to defend themselves.
2
New cards
Offensive realists see war as
a way to enhance a state’s reputation by demonstrating its willingness to engage in conflict.
3
New cards
National Security includes
a variety of factors including economic, environmental, and nonphysical threats such as cyberspace.
4
New cards
Violence
________ must be proportionate to the ends to be achieved.
5
New cards
Geneva Protocol
________ outlawed the use of chemical weapons in a war post WWI.
6
New cards
Council of Europe’s Convention
The ________ on Cybercrime and the Shanghai Cooperation Organization have both taken actions pushing states to pass laws criminalizing certain behaviors in cyberspace and providing police with the authority to enforce these laws.
7
New cards
Realists believe that war occurs because
states believe that more power leads to expectations of more influence, wealth, and security.
8
New cards
USA Patriot Act enabled
Investigators to gather information when looking into the full range of terrorism- related crimes, including chemical- weapons offenses, the use of weapons of mass destruction, killing Americans abroad, and terrorism financing.
9
New cards
Commercial Peace Theory
________: States that are more interdependent, particularly through trade and investment, are less likely to go to war.
10
New cards
John Mearsheimer
________ calls the 911 problem "there is no hotline or central authority to which a threatened state can turn to for help ..
11
New cards
Zone of agreement
________: Acceptable outcomes for both states overlap.
12
New cards
The goals of FIRST are to
promote information sharing among its members, assist in rapid reaction to incidents, and foster cooperation and coordination to help prevent incidents in the first place.
13
New cards
Caliphate
________: an area under the leadership of an Islamic steward considered to be a religious successor to the prophet Muhammad and the leader of the entire Muslim community.
14
New cards
Korean
The frequency and intensity of war began a slow decline after the world wars and ________ war.
15
New cards
Cooperative institutions
________ like the EU can create and regulate certain types of interactions that can influence states perceptions of their identities and their understandings of self and others over time.
16
New cards
social media
The IS uses ________ to broadcast its terrorist acts including beheadings, mass executions, rape and sexual enslavement of women, and the destruction of cultural antiquities.
17
New cards
North Korean hackers
________ launched a cyberattack in 2014 against Sony Pictures and in 2017 produced a ransomware attack on 150 countries.
18
New cards
Cyberspace
________: the entire spectrum of networked information and communication systems and devices.
19
New cards
Cyberwarfare
________: state actions taken to penetrate another states computers or networks for the purpose of causing damage or disruption.
20
New cards
UN Security Council
For war to be legitimate, it must be either an act of self- defense or authorized by the ________.
21
New cards
China
________ is thought to operate one of the most extensive cyberattack operations in the world against both government and corporate targets.
22
New cards
Terrorists
________ hope to harness the power of ideas; they invariably justify their violence by using immortality imagery, whether nationalist, Marxist, ethnocentrist, or religious.
23
New cards
Focus on Capability
The actual ability of the state to provide that protection.
24
New cards
Instrument
________ Based Approach: A cyber attack can only count as an armed attack if it uses traditional military weapons.
25
New cards
Al Qaeda is motivated by
the desire to install strict Islamic regimes in the Middle East, support radical Islamic insurgencies in Southeast Asia, and punish the U.S. for its support of Israel.
26
New cards
Constructivists believe that identities can
influence whether a state is likely to be more aggressive or more restrained in how it pursues its foreign policy.
27
New cards
Global Peace Index
________: Ranks countries according to their level of peacefulness using a variety of indicators.
28
New cards
Reservation Point
________: The worst outcome they would be willing to accept.
29
New cards
Disarmament
________: Reducing the amount of arms and the types of weapons employed by a state.
30
New cards
Transition Theory
Power ________: Posits that it is not only mismatched material power that tempts states to war, but also the anticipation of shifts in the relative balance of power.
31
New cards
Jus in Bello
Laws that define what acts are considered legal and illegal when fighting a war.
32
New cards
Self-Determination
________: The right of a people to determine its own future political status.
33
New cards
Asymmetric Conflict
________: a conflict characterized by an inequality in material strength between the two sides, with one side significantly more well- equipped and technologically advanced than the other.
34
New cards
Just War Theory
a western and Christian doctrine dating from medieval times, and it draws on ancient Greek philosophy and precepts found in the Koran.
35
New cards
Guerrilla tactics are designed
to win control of the state, not by defeating enemy forces outright on the battlefield, but by winning control over the civilian population.
36
New cards
Jus Ad Bellum
________: Laws that deal with when it is just /legal to go to war.
37
New cards
ICT
________: Information and communications technology.
38
New cards
Russian Imperial Movement
________ in Russia is the first far- right movement designated as a terrorist organization by the U.S.
39
New cards
Guerrilla Warfare tactics include
hide among civilians and use strategies including hit- and- run tactics, ambushes, sabotages, and raids to attack their stronger military opponents.
40
New cards
Weapons involved in a conventional war include
that are not of mass destruction and combat actions are restricted to military targets.
41
New cards
aim of terrorism
The ________ is to call attention to a cause, while at the same time calling into question the legitimacy of a target government by highlighting its inability to protect its citizens.
42
New cards
Terrorist groups use
the internet and social media as a recruitment tool, and also use soft power to win support through attraction.
43
New cards
Conventional Wars
________: Regular armies openly engaged in combat with the objective to win control of the state by defeating the enemy’s military force on the battlefield.
44
New cards
Realists believe that we can decrease the frequency and intensity of war by
power balancing and deterrence.
45
New cards
Terrorists intend their violent acts to
preserve the nation, working-class people, a particular race, or the faithful, ensuring its immortality.
46
New cards
Just War Theory was developed by
Saint Augustine, Saint Thomas Aquinas, and Hugo Grotius.
47
New cards
National Security
The ability of a state to protect its interests, secrets, and citizens from both external and internal threats
48
New cards
Focus on Threat
The fact that there is some actor, object, or potential action that can endanger a nations interests, secrets, or citizens
49
New cards
Focus on Protection
The need of the nation to ensure the safety of the states interests, secrets, and citizens from harm by those threats
50
New cards
Focus on Capability
The ability of the state to provide protection
51
New cards
Physical Security
Security from violence, starvation, and the elements
52
New cards
Global Peace Index
Ranks countries according to their level of peacefulness using a variety of indicators
53
New cards
War
An organized and deliberate political act by an established political authority that causes 1,000 or more deaths in a 12-month period and involves at least two actors capable of harming each other
54
New cards
Interstate Wars
Wars between states
55
New cards
Intrastate War
(Civil wars) wars that take place within a state
56
New cards
Conventional Wars
Regular armies openly engaged in combat with the objective to win control of the state by defeating the enemy’s military force on the battlefield
57
New cards
Guerrilla Warfare
guerrilla groups hide among civilians and use strategies including hit-and-run tactics, ambushes, sabotages, and raids to attack their stronger military opponents
58
New cards
Asymmetric Conflict
a conflict characterized by an inequality in material strength between the two sides, with one side significantly more well-equipped and technologically advanced than the other
59
New cards
Nonviolent Resistance
Resistance to established authority that systematically prevents the use of violence as a tactic
60
New cards
PLO
Palestine Liberation Organization
61
New cards
Terrorist groups with roots in the Middle East are
Hamas, Hezbollah, and Palestine Islamic Jihad, and Al Qaeda
62
New cards
Caliphate
an Islamic steward considered to be a religious successor to the prophet Muhammad and the leader of the entire Muslim community
63
New cards
The USA Patriot Act enabled
Investigators to gather information when looking into the full range of terrorism-related crimes, including chemical-weapons offenses, the use of weapons of mass destruction, killing Americans abroad, and terrorism financing
64
New cards
Cyberspace
the entire spectrum of networked information and communication systems and devices
65
New cards
Cyberwarfare
state actions taken to penetrate another states computers or networks for the purpose of causing damage or disruption
66
New cards
ICT
Information and communications technology
67
New cards
CERTs
Computer emergency response teams
68
New cards
FIRST
Forum of Incident Response and Security Teams
69
New cards
Power Transition Theory
Posits that it is not only mismatched material power that tempts states to war, but also the anticipation of shifts in the relative balance of power
70
New cards
Two patterns to Power Transition Theory are

1. a rising power might launch a war to solidify its position 2. The currently most powerful state(s) might launch a preventative war to keep a rising challenger down.
71
New cards
Perpetual Peace states that three factors help to foster peace
democracy, economic interdependence, and international institutions
72
New cards
Democractic Peace Theory
Theory supported by empirical evidence that democratic states do not fight wars against each other, but do fight wars against authoritarian states
73
New cards
The 1/3 theorys why liberals don’t go to war
Democracies offer citizens a chance to deal with complaints/grievances by nonviolent means
74
New cards
Commerical Peace Theory
States that are more interdependent, particularly through trade and investment, are less likely to go to war
75
New cards
International Institutions may influence the outbreak of conflict by (1/2)
they help build positive connections between states, and economic institutions to foster interdependence
76
New cards
Reservation Point
The worst outcome they would be willing to accept
77
New cards
Zone of agreement
Acceptable outcomes for both states overlap
78
New cards
Self-Determination
The right of a people to determine its own future political status
79
New cards
The 3 causes of war for a Constructivist include
Aggressive state identities, divergent identities, and possession of belligerent ideas
80
New cards
"Good" States
Democratic and economically open
81
New cards
"Bad" States
Authoritarian and economically closed
82
New cards
The two Liberal strategies to prevent war are
collective security and arms control agreements
83
New cards
Collective Security (one for all and all for one)
In an effort to stop the aggressive and unlawful use of force by one state against another, unlawful aggression will be met by united action
84
New cards
Moral Clarity
The aggressor is morally wrong because all aggressors are morally wrong, and all those who are right must act in unison to meet the aggression
85
New cards
Arms Control
Regulating arms research, manufacturing, deployment, and rapid increase of weapons systems
86
New cards
Disarmament
Reducing the amount of arms and the types of weapons employed by a state
87
New cards
BWC
Biological Weapons Convention
88
New cards
JCPOA
Joint Comprehensive Plan of Action (Iran denuclearization)
89
New cards
START
Strategic Arms Reduction Treaty
90
New cards
Nuclear Proliferation
The spread of nuclear weapons, fissionable material, and technology related to nuclear weapons
91
New cards
Jus Ad Bellum
Laws that deal with when it is just/legal to go to war
92
New cards
Jus In Bello
Laws that define what acts are considered legal and illegal when fighting a war
93
New cards
Just War Tradition
The idea that wars must be judged according to two categories of justice
94
New cards
Noncombatant Immunity
A core principle of international humanitarian law that holds that people not bearing arms in a conflict may not be deliberately targeted or systematically harmed; includes unarmed civilians, surrendered soldiers, and soldiers who are too severely injured to defend themselves
95
New cards
ICBL
International Campaign to Ban Landmines
96
New cards
Instrument Based Approach
A cyber attack can only count as an armed attack if it uses traditional military weapons
97
New cards
Effects Based Approach
A cyber attack as an armed attack based on the gravity of its effects
98
New cards
The 2/3 theorys why liberals don’t go to war
Theorists argue that institutional constraints exist in democracies that help to prevent them from going to war.
99
New cards
The 3/3 theorys why liberals don’t go to war
Commercial Peace Theory
100
New cards
International Institutions may influence the outbreak of conflict by (2/2)
States that are left out of institutions might feel threatened by the connections forged between states, potentially adding to the possibility of conflict.