We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Chapter 3 reveals how violent individuals and a violent state are structured in the Constitution. Here, violent, White self-determination (the right of White individuals to overthrow government) and liberalism (the systemic differences central to a liberal state) mix with republicanism (a decentralization of authority that privileges violent acts of citizens, a group most often defined as propertied, White men). In Article IV, Section 4, the Second Amendment, and the Fifth Amendment, this chapter reveals the key formulations and tensions of American violence.
Drone programs in the counterterrorism context rest on the use of force in self-defense not against an (imminent) act, but against individuals in the light of their personal or behavioral characteristics. Because drone programs are motivated by the objective of permanently addressing future threats before they materialize, technology and legal rhetoric are used as instruments to authorize action against individuals who are not presently perpetrating terrorist acts, nor even clearly preparing, such acts. Some states active in the transnational war on terror have proposed a legal framework for the continuous anticipation of armed attacks against individuals who show signs of hostile intent. These changes in military strategy and legal discourse are not merely the result of how states decide to use force in the counterterrorism context, but also of what technology allows them to do. As such, drones facilitate and arguably intensify the phenomena of the individualization and dematerialization of the use of force. Although the interpretation of self-defense proposed by some states active in the war on terror is still highly contested on some points, the chapter shows that even if some limitations remain, concessions to the extensive interpretation of some limitations appear to have a direct cascade effect on the remaining checks because these limitations are interconnected.
The belief in witchcraft and sorcery is a significant cause of intentional homicide in Kenya. Moreover, those who kill people suspected of being witches often employ as a defense for their actions the so-called provocation by witchcraft argument: the homicide was purportedly committed under the influence of belief in witchcraft and sorcery. One major legal difficulty that the Kenyan courts have frequently been invited to resolve is thus the question as to whether the belief in witchcraft and sorcery avails to an accused person the defense of grave provocation and, if so, under what circumstances. Drawing largely on pertinent case law, statutes, and academic literature, the author explores the controversy over provocation by witchcraft. The author first offers an exposition of the concept of witchcraft and sorcery in Africa and critically discusses the evolution of the Kenyan courts’ interpretation of the country’s law on provocation in relation to witchcraft beliefs since the 1930s. The author establishes that under the current Kenyan common law, defenses of heat of passion and sudden provocation may apply in instances where there is no real provocation and that the courts have exceeded the boundaries of the provocation defense without well-grounded reasons. The author cautions that giving the doctrine of provocation such a broad construction and application may increase the already rampant killings of suspected witches in Kenya.
Continuing with Lina’s story, this chapter looks into the various ways in which the FARC victimhood frame is contested. Starting with the government, and drawing on interviews with soldiers, psychologists, police officers, and other disarmament, demobilization, and reintegration experts, this chapter outlines the government’s main contestation of the guerrilla victimhood frame: specifically, that they are perpetrators against their own comrades, especially the female ones. But the paramilitaries – illustrated by stories from various former AUC members – also contest the guerrilla victimhood frame with frames of their own, saying that they are the true self-defense forces and that they never would have had to take up guns if not for the guerrillas. This chapter shows the complexity and blurred lines between perpetrators and victims and analyzes the problematic outcomes of such contentious and highly gendered framing contests when ex-combatants demobilize and try to become civilians alongside each other.
Helen Frowe argues against a common view of the standard Trolley Scenario according to which it is permissible but not required to kill the one as a side effect of saving the five. She argues that saving the five and killing the one is morally required in that scenario. I defend the intuitive verdict that it is permitted but not required to turn the trolley in the Trolley Scenario. First, I show that the crucial premise of Frowe’s argument – the premise that one has a duty to prevent harm to others when one can do so without violating anyone’s rights, and without bearing an unreasonable cost – is false. And second, I present an independent argument (one originally offered by Frances Kamm) for the permissibility of not turning the trolley in the Trolley Scenario.
The clash between the First and Second amendments in the US Constitution – the First guaranteeing free speech and the Second guaranteeing the right to bear arms – leads into a discussion of legal interpretations of the Second Amendment from 1791, when the states ratified the Bill of Rights, to the present. Using a corpus linguistic analysis of the Second Amendment, with a focus on "the right to keep and bear arms," and an examination of the US Supreme Court decision in District of Columbia v. Heller (2008), we see that, just like any other text, whether a literary work, a sacred book, or an everyday communication like a memo or shopping list, legal interpretation is always contingent, always subjective, and and always subject to reinterpretation.
This opinion is a crucial part of the problematic foundation of the law concerning for the admissibility of evidence of battered woman’s syndrome in cases of self-defense. The court denied the defendant’s appeal for her manslaughter conviction because she killed her husband while he was sleeping. The reasoning of the court made it difficult, if not impossible, for defendants in the state to argue self-defense based upon long-term physical and emotional abuse resulting in battered woman’s syndrome.
People with dementia at times exhibit threatening and physically aggressive behavior toward care staff in residential aged care facilities (RACFs). Current clinical guidelines recommend judicious use of antipsychotic (AP) medications when there is an immediate risk of harm to care staff in RACFs and non-pharmacological interventions have failed to avert the threats. This article examines an account of how this recommendation can be ethically defensible: caregivers in RACFs may have a prima facie ethical justification, in certain cases, to use APs as an act of self-defense. The author examines whether such uses of APs meet the three commonly invoked conditions of ethically permissible acts of self-defense—namely, the conditions of liability, proportionality, and necessity—and argues that such conditions obtain only in a restricted range of cases. The liability constraint can be satisfied if residents are the only ones who are causally responsible for the threats they pose. Further, the condition of proportionality obtains if there is sufficient objective ground to demonstrate that the harm of using the medications does not outweigh the good to be secured. Lastly, the necessity condition obtains when the medications are used at their lowest effective dosage and caregivers in RACFs can reasonably assume that, for the purpose of averting threats posed by residents, the use of APs is the only available course of action. Not meeting any of these fairly stringent conditions renders uses of APs as acts of self-defense in RACFs morally impermissible actions.
Weaponizing phone lines to enforce white spaces has proven an effective tool for the passively fearful. In most cases, it lends anonymity, allowing a racially fragile citizen to lodge a complaint and recede into the shadows as armed agents of the State assume responsibility. Akin to keyboard warriors and internet trolls, 911 abusers can lob unsubstantiated attacks and escape involvement or scrutiny themselves. But this type of color line enforcement is a step removed from the action. It relies on a 911 dispatcher and a trained law enforcement officer to act on the frivolous, race-baiting tip. Some white space defenders want to be more involved, to take the law into their own hands under the guise of self-defense. Thanks to gun rights lobbies and state legislatures across the country, now they can. No trend better encapsulates the State’s increasing acquiescence to civilian weaponization of racial fear than Stand Your Ground laws. These laws fly in the face of traditional self-defense doctrine, posing a serious threat to public safety “by encouraging armed vigilantism
Although racism has plagued the American justice system since the nation's colonial beginnings, private White Americans are taking matters into their own hands. From racist 911 calls and hoaxes to grassroots voter suppression and vigilante 'self-defense,' concerted efforts are made every day by private citizens to exclude Black Americans from schools, neighborhoods, and positions of power. Neighborhood Watch examines the specific ways people police America's color line to protect 'White spaces.' The book charts how these actions too often result in harassment, arrest, injury, or death, yet typically go unchecked. Instead, these actions are promoted and encouraged by legislatures looking to expand racially discriminatory laws, a police system designed to respond with force to any frivolous report of Black 'mischief,' and a Supreme Court that has abdicated its role in rejecting police abuse. To combat these realities, Neighborhood Watch offers preliminary recommendations for reform, including changes to the 'maximum policing' state, increased accountability for civilians who abuse emergency response systems, and proposals to demilitarize the color line.
This chapter introduces the jus ad bellum: the rules of law determining when states may resort to war or, more broadly, the use of armed force. These rules must be distinguished from the jus in bello: these are the rules of law that apply in armed conflict (known as international humanitarian law). In order to put the current jus ad bellum rules into perspective, the chapter begins by introducing the concept of collective security and demonstrating how this was applied during the League of Nations era. The following sections set out the relevant rules of the UN Charter on the prevention and regulation of recourse to the use of force, with a particular focus on the prohibition on the threat or use of force. The chapter also discusses the collective use of force, meaning the use of force authorized by the Security Council, and the unilateral use of force in self-defense. Finally, the chapter examines whether new exceptions to the prohibition of the use of force are emerging -- in particular, humanitarian intervention and the responsibility to protect.
This chapter introduces the jus ad bellum: the rules of law determining when states may resort to war or, more broadly, the use of armed force. These rules must be distinguished from the jus in bello: these are the rules of law that apply in armed conflict (known as international humanitarian law). In order to put the current jus ad bellum rules into perspective, the chapter begins by introducing the concept of collective security and demonstrating how this was applied during the League of Nations era. The following sections set out the relevant rules of the UN Charter on the prevention and regulation of recourse to the use of force, with a particular focus on the prohibition on the threat or use of force. The chapter also discusses the collective use of force, meaning the use of force authorized by the Security Council, and the unilateral use of force in self-defense. Finally, the chapter examines whether new exceptions to the prohibition of the use of force are emerging -- in particular, humanitarian intervention and the responsibility to protect.
Chapter 17 attempts to pin down a moving target, cyber and its use and utility in armed conflict. The cyber targets chosen by China, Russia, Iran, and North Korea are detailed. The chapter defines cyber “attacks,” differentiating them from cyber “operations” – akin to a felony-misdemeanor distinction. Cyberattacks are found to be a use of armed force, in the sense of UN Charter Article 2(4), raising the right of victim states to respond with armed force in self-defense. Potential cyber conflicts are classified as international or non-international based upon their perpetrators. The difficulties of attribution of cyberattacks are detailed, including sovereignty and military necessity. A counter to cyberattack is belligerent reprisal, which is explored. Cyberattacks on critical national infrastructure (CNI) are a major problem. After defining CNI, the US position on responses is discussed. Recent changes in US cyber policy authorize far greater cyber retaliation and reprisal, as well as providing federal funding to carry them out. Finally, CNI’s weak link, the unwillingness of civilian corporations to fund their own cyber protection, is noted.
David Little presents Roger Williams as a seventeenth-century champion of conscience. Williams was expelled from Massachusetts Bay that ostensibly prized free exercise, but in fact recognized it only within narrow bands of orthodoxy. Williams thereafter prized freedom of conscience in the charter for the Providence Plantations and Rhode Island. A central principle for Williams is the distinction between the “inward” and “external” fora. The “inward forum” is the conscience, a “spiritual power” changeable by reason and persuasion. The “external forum” is “outward behavior,” meaning actions that can be coerced by the governing authority through force, in order to protect life, property, and other interests. Williams provocatively labeled coercive acts against conscience as “soul rape” and “piracy,” indicating how deeply and intimately these violated the person. Williams maintained a fruitful relationship with the Narangansett Indians, having shown them great respect, as the people who provided him refuge when he was expelled from Massachusetts Bay. He didn’t co-opt their government, and fully respected their ability to choose religion (or not), in the quiet of their own internal fora.
This chapter studies the idea that Americans and Europeans hold different views on global security. Generally, it is considered that the EU side demonstrates a stronger adherence to positivism in international law, while the US adopts policy-oriented methodologies. This translates into different views of the actual content of the UN Charter rules on the use of force, for example of the permissibility of self-defense against attacks by non-State actors, calls for new exceptions to the prohibition of the use of force and in relation to controversial issues, such as the legality of the anticipatory self-defense. The chapter offers a critical look at the alleged difference by studying the US-led military coalition fighting against the so-called Islamic State (IS) in Iraq and Syria. This reveals a gradual acceptance of the more expansionist interpretation put forward by the US. Indeed, the case of the US-led military coalition against IS is one where European States - and several other western States - originally steered clear from murky legal grounds only to find themselves ultimately embracing an extensive reading of the right of self-defense, and relying for the first time, whether explicitly or implicitly, on the controversial “unable and unwilling” doctrine to justify military operations abroad.
This chapter explains the cosmopolitan nature of the law of peacebuilding per se and, second, identifies laws and international developments that have indirect effects on peacebuilding and peace law by creating a process of building peace. The practices of states and other actors and their expectations of appropriate conduct create a dialectic that makes legal obligations a cost that states must calculate in their decisions to comply with hard and soft law requirements, obligations, and contested or denied responsibilities. We compare international lawas cosmopolitanism to the other major paradigms used to explain peacebuilding success and failures -- realism, liberalism, constructivism -- demonstrating the ways in which our approach complements and diverges from these approaches. We next discuss the concept of a human right to peace and then address peace as an outcome of international law. We conclude this chapter with some thoughts about the importance of the development of peace law.
Armed reprisals are the limited use of military force in response to unlawful actions perpetrated against states. Historically, reprisals provided a military remedy for states that had been wronged (often violently) by another state without having to resort to all-out war in order to counter or deter such wrongful actions. While reprisals are broadly believed to have been outlawed by the UN Charter, states continue to routinely undertake such self-help measures. As part of the roundtable, “The Ethics of Limited Strikes,” this essay examines the doctrine of armed reprisals in light of recent instances of states using force “short of war” in this manner. We argue that the ban on reprisals has been largely ignored by states, and that recent attempts to apply the laws of armed conflict to the cyber domain (such as the Tallinn Manual) are further weakening this prohibition. We conclude that this is a potentially dangerous development that lowers the bar for resorting to military force, risking escalation and thereby further destabilizing the international system.
Violence emerges many times in medieval literature, either in the form of war or of personal violence. This paper examines a selection of narratives where various types of domestic violence and criminal activities leading to or based on violence are presented. Against the backdrop of an intensive theological and philosophical discourse on violence from St. Augustine to Thomas Aquinas, this chapter investigates violence in the private spheres of married couples (Marie de France), in the public sphere of the court to eliminate a threatening outsider (Nibelungenlied), within the family, pitting a mother-in-law against her daughter in law (Mai und Beaflor), which ultimately leads to matricide, then among friends and relatives (Boccaccio’s Decameron), and finally violence in the name of personal self-defence (Heinrich Kaufringer). As the analysis demonstrates, violence was ubiquitous in medieval society, but the poets always reflect also on legal conditions, the threat to society at large resulting from violence, and on the position of the individual when confronted with violence.
This chapter and the two that follow cover the period from 1838 to enactment of the Fugitive Slave Act in October 1850. The chapter begins with an examination of the covert networks that helped fugitives from enslavement traverse the Borderland in at least a dozen places between Quincy, IL, and Chester, PA. It then discusses the cultural roots of the violence of mastery, and dozens of incidents in which slaveholders and slave catchers brought the violence of mastery into the Borderland, rampaging through entire communities, breaking into homes, and on a few occasions killing and dismembering escapees who resisted. The chapter explores the impact of this violence on the lives of abolitionists, free blacks, and Underground activists in the Borderland and the manner in which the Underground Railroad adapted its operations to meet the challenge by embracing speed and stealth. Finally, the chapter discusses the dynamics of fugitive rescues in the Borderland, noting particularly the different dynamics of urban and rural rescues and the rarity of interracial cooperation in these efforts.