105,466 research outputs found

    Matthew, matriculation, and ministry

    Get PDF
    Proverbs 8:22-96, 2 Corinthians 5:14-6:2, Matthew 9:9-13

    Ecclesial Darwinism and the collapse of koinonia

    Get PDF

    International humanitarian law and the targeting of non-state intelligence personnel and objects

    Get PDF
    This Article examines the targetability of individuals and organizations performing intelligence functions for a non-State group involved in an armed conflict. Specifically, it considers the circumstances under which they lose the international humanitarian law (IHL) protections from, and during, attacks that they would otherwise enjoy as civilians. To do so, the piece deconstructs IHL’s “organized armed group” construct to determine when an intelligence organization can be characterized as a component thereof. Noting that some non-State groups consist of both entities involved in the hostilities and organizations having no relationship to them, the Article introduces the concept of a non-State group’s “overall OAG,” a notion that parallel’s the characterization of a State’s various military units as its “armed forces.” Additionally, the Article assesses the circumstances under which individuals engaged in activities intelligence who are not members of an OAG may be targeted on the basis of their “direct participation in the hostilities.

    Liberation Theology

    Get PDF
    Canadian Lutheran viewpoint

    The hygienics of the soul: health and wholeness in the church\u27s life and practice

    Get PDF
    Manifested in Christian tradition

    With One\u27s Own Arms: Condottieri, Machiavelli, and the Rise of the Florentine Militia

    Full text link
    This paper examines the use of mercenary warfare on the Italian peninsula during the late 15th and early 16th centuries. It later focuses on the unique political and economic environment in Florence that led to Niccolo Machiavelli orchestrating the creation of the Florentine militia

    The law of cyber targeting

    Get PDF
    Cyber technology on the battlefield has outpaced the law, or at least full understanding of how extant law governs emerging capabilities—a strategically perilous state of affairs
    • …
    corecore