Noncombatant Immunity
________: A core principle of international humanitarian law that holds that people not bearing arms in a conflict may not be deliberately targeted or systematically harmed; includes unarmed civilians, surrendered soldiers, and soldiers who are too severely injured to defend themselves.
Offensive realists see war as
a way to enhance a state’s reputation by demonstrating its willingness to engage in conflict.
National Security includes
a variety of factors including economic, environmental, and nonphysical threats such as cyberspace.
Violence
________ must be proportionate to the ends to be achieved.
Geneva Protocol
________ outlawed the use of chemical weapons in a war post WWI.
Council of Europe’s Convention
The ________ on Cybercrime and the Shanghai Cooperation Organization have both taken actions pushing states to pass laws criminalizing certain behaviors in cyberspace and providing police with the authority to enforce these laws.
Realists believe that war occurs because
states believe that more power leads to expectations of more influence, wealth, and security.
USA Patriot Act enabled
Investigators to gather information when looking into the full range of terrorism- related crimes, including chemical- weapons offenses, the use of weapons of mass destruction, killing Americans abroad, and terrorism financing.
Commercial Peace Theory
________: States that are more interdependent, particularly through trade and investment, are less likely to go to war.
John Mearsheimer
________ calls the 911 problem "there is no hotline or central authority to which a threatened state can turn to for help ..
Zone of agreement
________: Acceptable outcomes for both states overlap.
The goals of FIRST are to
promote information sharing among its members, assist in rapid reaction to incidents, and foster cooperation and coordination to help prevent incidents in the first place.
Caliphate
________: an area under the leadership of an Islamic steward considered to be a religious successor to the prophet Muhammad and the leader of the entire Muslim community.
Korean
The frequency and intensity of war began a slow decline after the world wars and ________ war.
Cooperative institutions
________ like the EU can create and regulate certain types of interactions that can influence states perceptions of their identities and their understandings of self and others over time.
social media
The IS uses ________ to broadcast its terrorist acts including beheadings, mass executions, rape and sexual enslavement of women, and the destruction of cultural antiquities.
North Korean hackers
________ launched a cyberattack in 2014 against Sony Pictures and in 2017 produced a ransomware attack on 150 countries.
Cyberspace
________: the entire spectrum of networked information and communication systems and devices.
Cyberwarfare
________: state actions taken to penetrate another states computers or networks for the purpose of causing damage or disruption.
UN Security Council
For war to be legitimate, it must be either an act of self- defense or authorized by the ________.
China
________ is thought to operate one of the most extensive cyberattack operations in the world against both government and corporate targets.
Terrorists
________ hope to harness the power of ideas; they invariably justify their violence by using immortality imagery, whether nationalist, Marxist, ethnocentrist, or religious.
Focus on Capability
The actual ability of the state to provide that protection.
Instrument
________ Based Approach: A cyber attack can only count as an armed attack if it uses traditional military weapons.
Al Qaeda is motivated by
the desire to install strict Islamic regimes in the Middle East, support radical Islamic insurgencies in Southeast Asia, and punish the U.S. for its support of Israel.
Constructivists believe that identities can
influence whether a state is likely to be more aggressive or more restrained in how it pursues its foreign policy.
Global Peace Index
________: Ranks countries according to their level of peacefulness using a variety of indicators.
Reservation Point
________: The worst outcome they would be willing to accept.
Disarmament
________: Reducing the amount of arms and the types of weapons employed by a state.
Transition Theory
Power ________: Posits that it is not only mismatched material power that tempts states to war, but also the anticipation of shifts in the relative balance of power.
Jus in Bello
Laws that define what acts are considered legal and illegal when fighting a war.
Self-Determination
________: The right of a people to determine its own future political status.
Asymmetric Conflict
________: a conflict characterized by an inequality in material strength between the two sides, with one side significantly more well- equipped and technologically advanced than the other.
Just War Theory
a western and Christian doctrine dating from medieval times, and it draws on ancient Greek philosophy and precepts found in the Koran.
Guerrilla tactics are designed
to win control of the state, not by defeating enemy forces outright on the battlefield, but by winning control over the civilian population.
Jus Ad Bellum
________: Laws that deal with when it is just /legal to go to war.
ICT
________: Information and communications technology.
Russian Imperial Movement
________ in Russia is the first far- right movement designated as a terrorist organization by the U.S.
Guerrilla Warfare tactics include
hide among civilians and use strategies including hit- and- run tactics, ambushes, sabotages, and raids to attack their stronger military opponents.
Weapons involved in a conventional war include
that are not of mass destruction and combat actions are restricted to military targets.
aim of terrorism
The ________ is to call attention to a cause, while at the same time calling into question the legitimacy of a target government by highlighting its inability to protect its citizens.
Terrorist groups use
the internet and social media as a recruitment tool, and also use soft power to win support through attraction.
Conventional Wars
________: Regular armies openly engaged in combat with the objective to win control of the state by defeating the enemy’s military force on the battlefield.
Realists believe that we can decrease the frequency and intensity of war by
power balancing and deterrence.
Terrorists intend their violent acts to
preserve the nation, working-class people, a particular race, or the faithful, ensuring its immortality.
Just War Theory was developed by
Saint Augustine, Saint Thomas Aquinas, and Hugo Grotius.
National Security
The ability of a state to protect its interests, secrets, and citizens from both external and internal threats
Focus on Threat
The fact that there is some actor, object, or potential action that can endanger a nations interests, secrets, or citizens
Focus on Protection
The need of the nation to ensure the safety of the states interests, secrets, and citizens from harm by those threats
Focus on Capability
The ability of the state to provide protection
Physical Security
Security from violence, starvation, and the elements
Global Peace Index
Ranks countries according to their level of peacefulness using a variety of indicators
War
An organized and deliberate political act by an established political authority that causes 1,000 or more deaths in a 12-month period and involves at least two actors capable of harming each other
Interstate Wars
Wars between states
Intrastate War
(Civil wars) wars that take place within a state
Conventional Wars
Regular armies openly engaged in combat with the objective to win control of the state by defeating the enemy’s military force on the battlefield
Guerrilla Warfare
guerrilla groups hide among civilians and use strategies including hit-and-run tactics, ambushes, sabotages, and raids to attack their stronger military opponents
Asymmetric Conflict
a conflict characterized by an inequality in material strength between the two sides, with one side significantly more well-equipped and technologically advanced than the other
Nonviolent Resistance
Resistance to established authority that systematically prevents the use of violence as a tactic
PLO
Palestine Liberation Organization
Terrorist groups with roots in the Middle East are
Hamas, Hezbollah, and Palestine Islamic Jihad, and Al Qaeda
Caliphate
an Islamic steward considered to be a religious successor to the prophet Muhammad and the leader of the entire Muslim community
The USA Patriot Act enabled
Investigators to gather information when looking into the full range of terrorism-related crimes, including chemical-weapons offenses, the use of weapons of mass destruction, killing Americans abroad, and terrorism financing
Cyberspace
the entire spectrum of networked information and communication systems and devices
Cyberwarfare
state actions taken to penetrate another states computers or networks for the purpose of causing damage or disruption
ICT
Information and communications technology
CERTs
Computer emergency response teams
FIRST
Forum of Incident Response and Security Teams
Power Transition Theory
Posits that it is not only mismatched material power that tempts states to war, but also the anticipation of shifts in the relative balance of power
Two patterns to Power Transition Theory are
a rising power might launch a war to solidify its position 2. The currently most powerful state(s) might launch a preventative war to keep a rising challenger down.
Perpetual Peace states that three factors help to foster peace
democracy, economic interdependence, and international institutions
Democractic Peace Theory
Theory supported by empirical evidence that democratic states do not fight wars against each other, but do fight wars against authoritarian states
The 1/3 theorys why liberals don’t go to war
Democracies offer citizens a chance to deal with complaints/grievances by nonviolent means
Commerical Peace Theory
States that are more interdependent, particularly through trade and investment, are less likely to go to war
International Institutions may influence the outbreak of conflict by (1/2)
they help build positive connections between states, and economic institutions to foster interdependence
Reservation Point
The worst outcome they would be willing to accept
Zone of agreement
Acceptable outcomes for both states overlap
Self-Determination
The right of a people to determine its own future political status
The 3 causes of war for a Constructivist include
Aggressive state identities, divergent identities, and possession of belligerent ideas
"Good" States
Democratic and economically open
"Bad" States
Authoritarian and economically closed
The two Liberal strategies to prevent war are
collective security and arms control agreements
Collective Security (one for all and all for one)
In an effort to stop the aggressive and unlawful use of force by one state against another, unlawful aggression will be met by united action
Moral Clarity
The aggressor is morally wrong because all aggressors are morally wrong, and all those who are right must act in unison to meet the aggression
Arms Control
Regulating arms research, manufacturing, deployment, and rapid increase of weapons systems
Disarmament
Reducing the amount of arms and the types of weapons employed by a state
BWC
Biological Weapons Convention
JCPOA
Joint Comprehensive Plan of Action (Iran denuclearization)
START
Strategic Arms Reduction Treaty
Nuclear Proliferation
The spread of nuclear weapons, fissionable material, and technology related to nuclear weapons
Jus Ad Bellum
Laws that deal with when it is just/legal to go to war
Jus In Bello
Laws that define what acts are considered legal and illegal when fighting a war
Just War Tradition
The idea that wars must be judged according to two categories of justice
Noncombatant Immunity
A core principle of international humanitarian law that holds that people not bearing arms in a conflict may not be deliberately targeted or systematically harmed; includes unarmed civilians, surrendered soldiers, and soldiers who are too severely injured to defend themselves
ICBL
International Campaign to Ban Landmines
Instrument Based Approach
A cyber attack can only count as an armed attack if it uses traditional military weapons
Effects Based Approach
A cyber attack as an armed attack based on the gravity of its effects
The 2/3 theorys why liberals don’t go to war
Theorists argue that institutional constraints exist in democracies that help to prevent them from going to war.
The 3/3 theorys why liberals don’t go to war
Commercial Peace Theory
International Institutions may influence the outbreak of conflict by (2/2)
States that are left out of institutions might feel threatened by the connections forged between states, potentially adding to the possibility of conflict.