...Spiritual warfare is much overlooked topic. It is general not discussed. The bible clearly tells what spiritual warfare in Ephesians 6:12 "For our struggle is not against flesh and blood, but against the rulers, against the authorities, against the powers of this dark world and against the spiritual forces of evil in the heavenly realms." Romans 7:23 explains that spiritual warfare is in the battlefield of our minds: "But I see another law at work in the members of my body, waging war against the law of my mind and making me a prisoner of the law of sin at work within my members." Our battle is against Satan, and he will try his best to stop us from bringing the lost to God. He knows Gods only weakness, which is the love God, has for us. The more effective we are being in our evangelism the more evident it becomes what Satan is trying to do. He will always try to bring you down, by making you doubt yourself and even sometimes he will try to make you doubt God. We must be aware of this all the time and always be ready. This is my favorite bible verse Eph 6:10-11, finally be strong in the Lord and in his mighty power. 11 Put on the full armor of God, so that you can take your stand against the devil’s schemes. Faith and trust is God is the only way that we are able to fight against spiritual warfare. Faith is the essential in spiritual warfare. We must have complete faith in God that he will be our provider and deliverer. God is so much greater and stronger than Satan; In Christ...
Words: 309 - Pages: 2
...Advances in technology and weaponry have revolutionised warfare since time immemorial, where inventions such as the chariot, canon powder and the airplane effectively changed the landscape of warfare.1 The law of armed conflict (LOAC) that exists today has developed as a reaction to the atrocities committed in the past; the four Geneva Conventions and the Additional Protocols of 1977 originated as responses to the increased suffering of civilians in armed conflict due in part to developments of weapon technology.2 The legal instruments to regulate the application of these advances in technology can barely keep up with challenges resulting from the rapidness of the advancement of contemporary military technologies. Moreover, recent technological advances raise the prospect of upheavals in practice so fundamental that they challenge assumptions underlying long-established international laws of war.3 This is because advances in technology have dramatically affected the weapons and tactics of future armed conflict, the “places” where conflicts are fought, the “actors” by whom they are fought, and the “means and methods” by which they are fought.4 These changes stress the fundamental principles of the LOAC, thus undermining its ability to regulate the conduct of hostilities; namely, by posing challenges to the principles of distinction, proportionality, military necessity and unnecessary suffering. This essay aims to assess the impact technology has had upon the LOACs...
Words: 3294 - Pages: 14
...20 July 2014 The Morality of Warfare: Case Study; Drone Warfare Advancements in warfare technology and weaponry have been the defining factors in battle since the dawn of civilization. The one with the bigger gun usually wins. This is a fact that hasn’t changed much since the beginnings of warfare and holds true today and in today’s world Drones have become the next warfare advantage. Along with any advancement in warfare weaponry comes a very heated and controversial discussion about its actual real-world utilization. Many argue that the use of Drones in war is unmoral and unethical. This paper aims to take a closer look at both sides of this argument. First, I will establish and explain the moral arguments against the use of drone warfare, then the second half of the article will be in response to such claims and give the moral reasons behind the pro-drone argument. First and foremost of the anti-drone discussion is the fact that Drones are seen to be fundamentally in contradiction of international law: Amnesty International stated that that “deliberate killings by drones […] very likely violate the prohibition of arbitrary deprivation of life and may constitute extrajudicial executions.” The UN suggested focused effort to maintain and preserve the security of international laws in its entirety, in response to the use of drones. This incorporates, obviously, international human rights and humanitarian standards that seem to be thrown out the window when dealing with...
Words: 3714 - Pages: 15
...2 Delivery systems * 3 Biological weapons * 4 Chemical weapons * 5 Nuclear weapons * 5.1 Non-proliferation * 5.1.1 By region * 5.2 Weapons limitation * 5.3 Cooperation (4) Nuclear (or) Atomic (4.1) Nuclear warfare * 1 Types of nuclear warfare * 2 History a. 2.1 1940s i. 2.1.1 Atomic bombings of Hiroshima and Nagasaki ii. 2.1.2 Immediately after the Japan bombings b. 2.2 1950s c. 2.3 1960s d. 2.4 1970s e. 2.5 1980s f. 2.6 Post–Cold War g. 2.7 Sub-strategic use * 3 Nuclear terrorism * 4 Survival (4.2) Nuclear Weapons * 1 Types * 1.1 Fission weapons * 1.2 Fusion weapons * 1.3 Other types * 2 Weapons delivery * 3 Nuclear strategy * 4 Governance, control, and law * 4.1 Disarmament * 4.2 United Nations * 5 Controversy * 5.1 Ethics * 5.2 Notable nuclear weapons accidents * 5.3 Nuclear testing and fallout * 5.4 Public opposition * 6 Costs and technology spin-offs * 7 Non-weapons uses * 7.1 Civil engineering and energy production * 7.2 Physics * 7.3 Propulsion use * 7.4 Asteroid impact avoidance (5) Chemical (5.1) Chemical warfare * 1 Definition * 2 History * 2.1 Ancient times * 2.2 Early modern era * 2.3 Industrial era * 2.3.1 World War I * 2.3.2 Interwar years...
Words: 790 - Pages: 4
...ways, in their way of warfare, how Genghis Khan controlled his army, and how they governed their empire. One way the Mongols were barbaric was the way in which they fought in warfare. When Genghis Khan first started conquering Asia, he was as brutal as ever. According to the article, The Mongols: How Barbaric Were the “Barbarians”?, some of the cities in China even said that the slaughter was so great that they saw “the streets of the Chinese capital were greasy with human fat and flesh.” This must mean that this specific battle brought death upon many of the people in China. Also, if the Mongols are in a battle in hopes of conquering the city and they end up failing, they use another method where they throw Greek fire (napalm) and use the...
Words: 661 - Pages: 3
...The controversy surrounding drone practice for targeted killing is questionable ethically, legally, and strategically. The U.S. policy of drone warfare is directly correlated with the war on terrorism. The aftermath of 9/11 convinced the U.S. military and intelligence community to target Taliban and al-Qaeda militants by utilizing drone technology. The Authorization for Use of Military Force permits the use of all necessary and appropriate force against terrorism. The U.S government to justify drone strikes without restrictions has used this settlement as a defense mechanism. Drone technology promotes secrecy, governmental power, and a foreign policy that operates without limitations. The issue of drone technology is analyzed using the ethical...
Words: 2160 - Pages: 9
...The years 1788-1850 saw the much debated Aboriginal resistance to white settlement most commonly known as the ‘Australian Frontier Warfare’. It is important not to imply the traditional definitions of warfare in the western world to that of the Aboriginal warfare. Aborigines were not resisting white settlement for economic or political reasons and their non-hierarchical society meant it impossible to unite against the British invasion. It has been documented that initial encounters between these two groups were relatively peaceful. The Aborigines viewed the British as enemies with whom accommodation was possible. It is clearly apparent now to understand the inevitability of these two vastly different cultures trying to live together as one ending in violence. With such different beliefs as to the use of land, water, animals and women and the declaration of terra nullis we can start to explore the events that led up to and continuing through the Aboriginal resistance. The more significant events that occurred were that of The Hawkesbury-Nepean River 1795-1816, The Cape Grim Massacre, Van Diemen’s Land and the Hornet Creek Massacre in 1857. The declaration of Terra Nullis being ordered in Australia caused a rippling affect although not felt straight away. ” A land that until its settlement in 1788 lacked human habitation, law, government or history.” The British saw the land as theirs for the taking as it had not been subject to houses, villages, crops, domesticated animals...
Words: 1466 - Pages: 6
...PRESIDENTIAL POWER/LEADERSHIP AND RULES OF WARFARE Student’s Name International Relations Date Presidential Power and Leadership US president has a lot of power, but constrained by many checks and balances imposed by the constitution. The president will have to be put into a bill which must be passed by Congress. One of the bills in the Congress debate timeline is Cyber security bill. In my opinion, the Congress should pass the President's Cyber security proposal. The bill protects American citizens in various ways. It proposes to centralize reporting of breach data nationally (Burns 2012). This is a win-win game between clients and investors. This is because the proposal compels entities to show information to consumers incase their personal information is accessed illegally. Thus, businesses are incentives to incorporate better cyber security. Also, it helps consumers to be vigilant on their identity theft. The proposal also puts cyber crime in the realm of other types of crimes and spell penalties to the culprits. This will help law enforcers in fighting organized cyber crime which is prevalent in the current computer world (Thomas 2013). Thus, the American people are protected from cyber fraudsters who siphon their huge possessions. The...
Words: 979 - Pages: 4
...Living in the Age of Cyber Attacks and Cyber Warfare UMUC If you asked the average person on the street about cybersecurity and cyber warfare, they would probably say they don’t know much about it other than the fact that it involves computers. In fact, for anyone outside of the cybersecurity industry, the closest thing to cyber warfare that they may have experienced was their viewing of the movie War Games, or the fourth installment of the Die Hard series, Live Free or Die Hard. While those movies had a profound impact on the lives of the characters in the script, the audience probably thought it was merely fiction, not fully based on fact. In Live Free or Die Hard, John McClain (played by the indefatigable Bruce Willis) is attempting to stop a domestic cyber-terrorist who is acting out on a vendetta against the United States. The cyber-terrorist is successful in launching an online attack to overload and destroy a power grid that left much of America’s East Coast in darkness. When I first saw this movie, I was curious if an attack like that was really possible; however, most people around me just labeled the movie as “Hollywood’s overactive imagination”. With cyber attacks literally having the ability to affect lives in a nanosecond, it is vital that everyone understand what cyber attacks entail, the impact of these cyber attacks on a domestic and international scale, and knowing what to expect in the future while living in a world dominated by virtual experiences...
Words: 2352 - Pages: 10
...Bill O'Reilly once said "the more laws the government passes, the less individual freedom there is". This is suggesting a very good representation of a totalitarian government, where the more laws passed the more power the government possesses. Although the laws and government actions may seem beneficial to the citizens, the party manipulates the citizens with these enforcements and actions to maintain power in 1984 by George Orwell. The party uses technology to make people stay in order and not rebel against the laws of the society. The way that the party uses public confinement allows the government to control society. The government constantly makes the citizens afraid of the party and each other so that the citizens will not rebel if they do not like something. The party stays in control because of the technology they use to manipulate the citizens. Continuous warfare is a mechanism that the party uses to dominate. By being in continuous warfare, the party needs technology built so they can participate in the war. The party needed a way to keep the people hard at work without increasing the wealth in the world. Bombs and other material “must be produced, but they need not be distributed. And in practice the only way of achieving this was by continuous warfare” (Orwell 190-191). The party makes the citizens create bombs and other warfare equipment constantly because the war never ends. This is an illusion to make it seem like the party and the people are on the...
Words: 1398 - Pages: 6
...research paper has been compiled to provide an insight into Chemical Weapons (CW). It deals with the description and the usage of various chemical reagents used by various countries and their negative effects. The following also shows the policies of countries towards chemical weapons, their stockpiles and their lethality and disposal. The following report also shows the history of chemical warfare, their demilitarisation, proliferation and the various councils set up to reduce their use. It also includes a news release by the sunshine project on the use of chemical weapons by the US military. All in all it tells you everything about chemical weapons and explosives. Chemical Warfare Chemical warfare (CW) involves using the toxic properties of chemical substances as weapons. This type of warfare is distinct from Nuclear warfare and Biological warfare, which together make up NBC, the military acronym for Nuclear, Biological, and Chemical (warfare or weapons). None of these fall under the term conventional weapons which are primarily effective due to their destructive potential. Chemical warfare does not depend upon explosive force to achieve an objective. Rather it depends upon the unique properties of the chemical agent weaponized. A lethal agent is designed to injure or incapacitate the enemy, or deny unhindered use of a particular area of terrain. Defoliants are used to quickly kill vegetation and deny its use for cover and concealment. It can also be used against agriculture...
Words: 8182 - Pages: 33
...Introduction The use of Irregular Warfare has been ongoing for years around the world. Irregular warfare is described as a violent struggle among state and non-state actors for legitimacy and influence over the relevant populations. I will discuss where the U.S. may apply military force in conjunction with other means of national power to stabilize the nation of Somalia. I will also discuss why it would be considered as an Irregular Warfare environment. Body Somalia gained its independence from British control in 1960, where the British relinquished control and gave Somalia to the United Nations. Somalia was governed by civilians until 1969; after which the military rebellion by General Muhammed Siad Barre took place. General Muhammed Siad Barre was a military tyranny that was in command of Somalia and it’s military. His tyranny lasted over 2 decades. During the 1970s the United States government communicated with General Barre and donated over 100 million dollars to help stabilize the Somali economy. The United States knew it was within there best interest to keep General Barre in power of Somalia for a while. The United States also knew that by the late 1980s the Somali economy would be unable to sustain itself and foreign aid would be withdrawn. After the collapse of Somalia’s economy, the United States revolted against General Barre’s oppressive regime. Different warlords of Somalia fought together against General Barre, ending his power and forcing him to flee the country...
Words: 681 - Pages: 3
...Throughout history, every nation has established rules that protect every individual involved in warfare. These rules set in place procedures that preserve the basic treatment of prisoners, soldiers, and citizens that are affected. The rules we follow today follow under the Geneva Conventions. They have paved the way for how we interact with other countries in a time of war. It also has changed the way wars are fought, by incorporating ground rules, and saying what can and can not happen. For example, you cannot use chemical warfare, landmines, or other devices designed to maim. But in recent history, especially conflicts in the Middle East, the Geneva Conventions have been violated. To understand why this matters, we need to better understand how the conventions were started in the first place and why....
Words: 1233 - Pages: 5
...information environment, just as they would use more traditional military technologies to gain advantages in other operational environments. As the strategic environment continues to change, so does Information Operations (IO). Based on these changes, the present world now characterizes IO as the integrated employment, during military operations, of IRCs in concert with other lines of operation to influence, disrupt, corrupt, or take over the decision making of adversaries and potential adversaries while protecting our own. 0702. Background Information Operations are an evolving construct with roots back to olden times, thus it is both an old and a new concept. The late 1970 world saw the materialization of Information Warfare (IW) and Command and Control Warfare (C2W) as war-fighting constructs integrating several diverse capabilities. These further evolved into Information Operations, recognizing the role of information as an element of power across the spectrum of peace, conflict, and war. 0703. IO Definitions a. Information: Facts, data or instructions in any medium or form is known as information. b. Information Operations (IO):...
Words: 2128 - Pages: 9
...(1) In addition, a new National Defense University and Defense Intelligence Agency (DIA) have been established (Pg. #8) (2) IT dependence in the United States is evolving into a strategic center of gravity. (Pg. #9) (3) Seasoned observers, such as military analyst Anthony H. Cordesman writing on cyber warfare and related matters, point out the need for calm reflection and accurate calibration of the problem before allocating scarce tax dollars to critical infrastructure protection. (Pg. #11) (4) Cyber attacks occur on a frequent basis and in a near-instantaneous manner; as the world becomes more connected, more machines and more people will be affected by an attack (Pg. #14) (5) Trillions of dollars in financial transactions and commerce move over a medium with minimal protection and only sporadic law enforcement—a structure the most complex the world has ever known. (Pg. #19) (6) Those who take part in information war are not all soldiers. Anybody who understands computers may become a ‘fighter’ in the network. (Pg. #29) (7) PLA senior Colonel Wang Baocun, a Chinese cyber warfare strategy expert, states that cyber warfare strategy reinforces the notion of Sun Tzu's “subduing the enemy without battle. (Pg. #30) (8) Hacker organizations may also have received help from the Chinese government in developing software, viruses, and methods to attack various computer networks. A number of recent Internet worms including Lion, Adore, and Code...
Words: 408 - Pages: 2