Drones as a form of security
A critical analysis of targeted killings asa pre-emptive security
Keywords:
Pre-emptive, drone, Bethlem, consequentialAbstract
This paper has discussed the question of using drone as a form of pre-emptive security. This is a very old discussion and has divided the academic society into two sides. One of them talks in favour of using drone whereas other talks about not using it as a form of pre-emptive measure. The author in the present paper has used Bethlem’s theory, consequential theory and cited a few scholars to submit that in the case of terrorism, drone should be used a pre-emptive measure.
Downloads
References
Beck, U. (2009)’ World at Risk’ 1stedn Polity Press
Dershowitz, A.M. (2007)’ Preemption; A Knife that Cuts Both Ways’ 1stedn, N Norton Publication.
Doyle, M.W. (2008),’ Striking First; Preemption& Prevention in International Conflict’ Princeton University of Press.
Morgan, M.(ed), (2009)’ The Impact of 9/11 & the New Legal Landscape; The Day That Changed Everything’15
Portmore, Douglas W., (2011)’common sense Consequentialism, Wherein Morality Meets Rationality’ Oxford University Press.
Arendy, A.C. (2003)’ International Law &Pre-emptive Use of Force’, The Washington Quarterly 26(2), pp 89-103
Beck, U., ‘World at Risk; (2008) The New Task of Critical Theory’ Development. & Society 37(1) pp 1-21
Bethlem, D., (2012) ’Self-Défense Against an Imminent or Actual Armed Attack by Nonstate Actors’, American Journal of International Law 104 p773
Burns, J.H (2005) ‘Happiness & utility; Jeremy Bentham’s Equation’ Cambridge University Press 17(1) p 46
Connell, M. (2010) ‘The Choice of Law Against’, Journal of National Security Law & Policy 4 p 350
Goede, M. (2008),’Beyond Risk; Remediation & the Post 9/11 Security Imagination’ Security Dialogue 39(2-3) p163
Hole, V., (2003) Anticipatory Self-Defence under International Law, American University International Law Review. 9(1) p95
Kessler, O.& Werner, W., (2008)’ extrajudicial killing as risk management’, special Dialogue 39 (2-3) p290
Sunstein, C. (2003),’Beyond the Precautionary Principles’University of Pennsylvania Law Review 151 p 1007
Wuschka, S., (2011) ‘The Use of Combat Drones in Current Conflicts; A Legal Issue or a Political Issue’,Goettingen Journal of International Law 3, pp891-905
United Nations Charter (adopted 26 June 1945, entered into force 24 Oct 1945) art 2(4)
International Covenant on Civil and Political Rights (adopted 16 December 1966, entered into force 23 March 1976) 999 UNTS 171 (ICCPR)
Authorization for Use of Military Force(AUMF), Pub. L. 107-40
Inskeep, S. (2006)’ Rules that should govern torture’,<https://www.npr.org/templates/story/story.php?storyId=5512634> accessed on 3 December 2017
NSS (2011) ‘national security strategy of United States’ (www.state.gov, 11 septs2001) ¸<https://www.state.gov/documents/organization/63562.pdf> accessed 2 December 2017
Situational Ethics (2015), New World Encyclopaedia, <http://www.newworldencyclopedia.org/entry/Situational_Ethics> accessed on 6 December 2017
Shakil, A.’ Kantian Based Deontological Ethics’ <http://sevenpillarsinstitute.org/morality-101/kantian-duty-based-deontological-ethics> accessed on 6December 2017
Text of Bush’s Speech at West Point’ (2002) The New York Times <http://www.nytimes.com/2002/06/01/international/text-of-bushs-speech-at-west-point.html> accessed on 7 December 2017
Singer.,(2010), ‘The Soldiers Call It War Porn’, Spiegel Online International, <http://www.spiegel.de/international/world/interview-with-defense-expert-p-w-singer-the-soldiers-call-it-war-porn-a-682852.html> accessed on 4 December 2017
Published
How to Cite
Issue
Section
Copyright (c) 2022 International journal of health sciences

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Articles published in the International Journal of Health Sciences (IJHS) are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJHS right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.
Articles published in IJHS can be copied, communicated and shared in their published form for non-commercial purposes provided full attribution is given to the author and the journal. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
This copyright notice applies to articles published in IJHS volumes 4 onwards. Please read about the copyright notices for previous volumes under Journal History.