Drones as a form of security

A critical analysis of targeted killings asa pre-emptive security

https://doi.org/10.53730/ijhs.v6nS5.8915

Authors

  • Arushi Bajpai Lecturer, Jindal Global Law School, O.P. Jindal Global University, Sonipat, India
  • Akash Gupta Assistant Professor, Jindal Global Law School, O.P. Jindal Global University, India

Keywords:

Pre-emptive, drone, Bethlem, consequential

Abstract

This paper has discussed the question of using drone as a form of pre-emptive security. This is a very old discussion and has divided the academic society into two sides. One of them talks in favour of using drone whereas other talks about not using it as a form of pre-emptive measure. The author in the present paper has used Bethlem’s theory, consequential theory and cited a few scholars to submit that in the case of terrorism, drone should be used a pre-emptive measure.

Downloads

Download data is not yet available.

References

Beck, U. (2009)’ World at Risk’ 1stedn Polity Press

Dershowitz, A.M. (2007)’ Preemption; A Knife that Cuts Both Ways’ 1stedn, N Norton Publication.

Doyle, M.W. (2008),’ Striking First; Preemption& Prevention in International Conflict’ Princeton University of Press.

Morgan, M.(ed), (2009)’ The Impact of 9/11 & the New Legal Landscape; The Day That Changed Everything’15

Portmore, Douglas W., (2011)’common sense Consequentialism, Wherein Morality Meets Rationality’ Oxford University Press.

Arendy, A.C. (2003)’ International Law &Pre-emptive Use of Force’, The Washington Quarterly 26(2), pp 89-103

Beck, U., ‘World at Risk; (2008) The New Task of Critical Theory’ Development. & Society 37(1) pp 1-21

Bethlem, D., (2012) ’Self-Défense Against an Imminent or Actual Armed Attack by Nonstate Actors’, American Journal of International Law 104 p773

Burns, J.H (2005) ‘Happiness & utility; Jeremy Bentham’s Equation’ Cambridge University Press 17(1) p 46

Connell, M. (2010) ‘The Choice of Law Against’, Journal of National Security Law & Policy 4 p 350

Goede, M. (2008),’Beyond Risk; Remediation & the Post 9/11 Security Imagination’ Security Dialogue 39(2-3) p163

Hole, V., (2003) Anticipatory Self-Defence under International Law, American University International Law Review. 9(1) p95

Kessler, O.& Werner, W., (2008)’ extrajudicial killing as risk management’, special Dialogue 39 (2-3) p290

Sunstein, C. (2003),’Beyond the Precautionary Principles’University of Pennsylvania Law Review 151 p 1007

Wuschka, S., (2011) ‘The Use of Combat Drones in Current Conflicts; A Legal Issue or a Political Issue’,Goettingen Journal of International Law 3, pp891-905

United Nations Charter (adopted 26 June 1945, entered into force 24 Oct 1945) art 2(4)

International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR)

Authorization for Use of Military Force(AUMF), Pub. L. 107-40

Inskeep, S. (2006)’ Rules that should govern torture’,<https://www.npr.org/templates/story/story.php?storyId=5512634> accessed on 3 December 2017

NSS (2011) ‘national security strategy of United States’ (www.state.gov, 11 septs2001) ¸<https://www.state.gov/documents/organization/63562.pdf> accessed 2 December 2017

Situational Ethics (2015), New World Encyclopaedia, <http://www.newworldencyclopedia.org/entry/Situational_Ethics> accessed on 6 December 2017

Shakil, A.’ Kantian Based Deontological Ethics’ <http://sevenpillarsinstitute.org/morality-101/kantian-duty-based-deontological-ethics> accessed on 6December 2017

Text of Bush’s Speech at West Point’ (2002) The New York Times <http://www.nytimes.com/2002/06/01/international/text-of-bushs-speech-at-west-point.html> accessed on 7 December 2017

Singer.,(2010), ‘The Soldiers Call It War Porn’, Spiegel Online International, <http://www.spiegel.de/international/world/interview-with-defense-expert-p-w-singer-the-soldiers-call-it-war-porn-a-682852.html> accessed on 4 December 2017

Published

13-06-2022

How to Cite

Bajpai, A., & Gupta, A. (2022). Drones as a form of security: A critical analysis of targeted killings asa pre-emptive security. International Journal of Health Sciences, 6(S5), 1561–1569. https://doi.org/10.53730/ijhs.v6nS5.8915

Issue

Section

Peer Review Articles