How and Why We Must Care About Regulation?
Chapter
First Online:
Abstract
This chapter offers a brief historical preview of the regulation of the contracted violence through history, demonstrating that it is not a new phenomenon. It covers US regulatory evolution and use of private violence both domestically and internationally. Then it presents an international normative framework, completing it with a network of recent national and international initiatives. Finally, it looks at how the USA currently regulates private security contractors, by addressing Congressional, Defense Department, and State Department structures and regulations.
References
- Abrahamsen, Rita, and Michael C. Williams. 2010. Security Beyond the State: Private Security in International Politics. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
- Avant, Deborah. 2000. “From Mercenary to Citizen Armies: Explaining Change in the Practice of War.” International Organization 54 (1): 41–72.CrossRefGoogle Scholar
- Avant, Deborah. 2005. The Market for Force: The Consequences of Privatizing Security. Cambridge: Cambridge University Press.Google Scholar
- Avant, Deborah. 2016. “Pragmatic Networks and Transnational Governance of Private Military and Security Services.” International Studies Quarterly 60 (2): 330–42.CrossRefGoogle Scholar
- Axelrod, Alan. 2014. Mercenaries: A Guide to Private Armies and Private Military Companies. Thousand Oaks, CA: CQ Press.Google Scholar
- Backman, Clifford. 2003. The Worlds of Medieval Europe. New York and Oxford: Oxford University Press.Google Scholar
- Bakker, Christine. 2009. Obligations of States to Prosecute Employees of Private Military and Security Companies for Serious Human Rights Violations. EUI Working papers. Florence: European University Institute.Google Scholar
- Börzel, Tanja, and Jana Hoenke. 2010. “From Compliance to Practice: Mining Companies and the Voluntary Principles on Security and Human Rights in the Democratic Republic of Congo.” In APSA 2010 Annual Meeting Paper. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1642073.
- Botha, Christo. 1999. “From Mercenaries to ‘Private Military Companies’: The Collapse of the African State and the Outsourcing of State Security.” South African Yearbook of International Law 24: 133–48.Google Scholar
- Breuer, Lanny. 2011. “Statment of Lanny A. Breuer, Assistant Attorney General Criminal Division Department of Justice, Before the Committee on the Judiciary United States Senate for a Hearing Entitled ‘Holding Criminals Accountable: Extending Criminal Jurisdiction for Government Contractors and Employees Abroad.’” Department of Justice. https://www.justice.gov/sites/default/files/testimonies/witnesses/attachments/05/25/11/05-25-11-crm-breuer-testimony-re-holding-criminals-accountable---extending-criminal-jurisdiction-for-government-contractors-and-employees-abroad.pdf.
- Brickell, Myssie. 2010. “Obligations of States to Prosecute Employees of Private Military and Security Companies for Serious Human Rights Violations.” Legislation and Policy Brief 2 (2), Article 3.Google Scholar
- Brown, Kimberly N. 2013. “We the People, Constitutional Accountability, and Outsourcing Government.” Indiana Law Journal 88 (4): 1347–403.Google Scholar
- Bruneau, Thomas. 2011. Patriots for Profit: Contractors and the Military in the US National Security. Stanford, CA: Stanford University Press.Google Scholar
- Buel Jr., Richard. 1984. “Samson Shorn: The Impact of The Revoluntionary War on the Estimates of the Republic’s Strength.” In Arms and Independence: The Military Character of the American Revolution, edited by Ronald Hoffman and Peter J. Albert, 141–65. Charlottesville: University of Virginia Press.Google Scholar
- Churchill, Ward. 2004. “From the Pinkertons to the PATRIOT Act: The Trajectory of Political Policing in the United States, 1870 to the Present.” The New Centennial Review 4 (1): 1–72.CrossRefGoogle Scholar
- Cilliers, Jakkie, and Ian Douglas. 1999. “The Military as Business–Military Professional Resources, Incorporated.” In Peace, Profit or Plunder?: The Privatisation of Security in War-Torn African Societies, edited by Peggy Masson and Jakkie Cilliers, 111–22. Pretoria: Institute for Security Studies.Google Scholar
- Collins, John P. 1997. “Speaking in Code: Bernstein v. United States Department of State, 922 F. Supp. 1426 (N. D. Cal. 1996); Bernstein v. United States Department of State, 945 F. Supp. 1279 (N. D. Cal. 1996).” The Yale Law Journal 106 (8): 2691–96.CrossRefGoogle Scholar
- Committee on Armed Services United States Senate. 2010. Inquiry into the Role and Oversight of Private Security Contractors in Afghanistan. Washington, DC: United States Senate. http://publicintelligence.net/senate-report-on-private-security-contractor-oversight-in-afghanistan/.
- CWC. 2011. Final Report to Congress: Transforming Wartime Contracting: Controlling Costs Reducing Risks. Washington, DC: Commission on Wartime Contracting in Iraq and Afghanistan.Google Scholar
- Deàk, Francis, and Philip Jessup. 1939. A Collection of Neutrality Laws, Regulation and Treaties of Various Countries. Washington, DC: Carnegie Endowment for International Peace.Google Scholar
- DeWinter-Schmitt, Rebecca. 2016. “Congress Needs to Pass CEJA.” Human Analytics (Blog), February 5, 2016. http://human-analytics.net/congress-needs-to-pass-ceja/.
- ———. 2017. “The Value-Add of the ICoCA: A ‘Strong Sword.’” Human Analytics (Blog), November 13, 2017. http://human-analytics.net/the-value-add-of-the-icoca-a-strong-sword/.
- Dinstein, Yoram. 2010. The Conduct of Hostilities Under the Law of International Armed Conflict. Cambridge: Cambridge University Press.CrossRefGoogle Scholar
- Diodorus. 1983. Diodorus of Sicily. Cambridge, MA: Harvard University Press.Google Scholar
- DOD. 1999. Army Regulation 715–9: Contractors Accompanying the Force. Washington, DC: Department of Defense. http://www.aschq.army.mil/supportingdocs/AR715_9.pdf.
- ———. 2003. Field Manual 3-100.21 Contractors on the Battlefield. Washington, DC: Department of Defense.Google Scholar
- ———. 2005. “DODI 3020.41: Contractor Personnel Authorized to Accompany the U.S. Armed Forces.” Department of Defense. http://fas.org/irp/doddir/dod/i3020_41.pdf.
- ———. 2009. “DoDI 3020.50: Private Security Contractors (PSCs) Operating in Contingency Operations, Humanitarian or Peace Operations, or Other Military Operations or Exercises.” Department of Defense. http://www.acq.osd.mil/log/PS/.psc.html/6_DODI_3020.50.pdf.
- ———. 2010. “DODI 5128.34: Defense Materiel Readiness Board (DMRB).” Department of Defense. http://www.dtic.mil/whs/directives/corres/pdf/512834p.pdf.
- ———. 2011. “DoDI 3020.41: Operational Contract Support (OCS).” Department of Defense. http://www.dtic.mil/whs/directives/corres/pdf/302041p.pdf.
- ———. 2012. COR Handbook. Washington, DC: Department of Defense.Google Scholar
- ———. 2016. “Defense Contracting Management Agency.” http://www.acq.osd.mil/asda/dcma/.
- DOD and DoS. 2007. “Memorandum of Agreement (MOA) Between the Department of Defense and the Department of State on USG Private Security Contractors.” http://archive.defense.gov/pubs/pdfs/Signed%20MOA%20Dec%205%202007.pdf.
- DoS. 2013. “State Department to Incorporate International Code of Conduct into Worldwide Protective Services Contracts.” Press Release|Media Note. U.S. Department of State. August 16, 2013. http://www.state.gov/r/pa/prs/ps/2013/08/213212.htm.
- DoS, DoD, and USAID. 2008. “Memorandum of Understanding Between the US Department of State and the US Department of Defense and the US Agency for International Development Relating to Contracting in Iraq and Afghanistan.” http://www.acq.osd.mil/log/PS/.policies.html/MOU_Signed_July2008.pdf.
- Elsea, J.K. 2010. Private Security Contractors in Iraq and Afghanistan: Legal Issues. Darby: DIANE Publishing.Google Scholar
- Enion, M. Rhead. 2009. “Constitutional Limits on Private Policing and the State’s Allocation of Force.” Duke Law Journal 59 (3): 519–53.Google Scholar
- Fainaru, Steve. 2008. Big Boy Rules: America’s Mercenaries Fighting in Iraq. Cambridge, MA and Philadelphia: Da Capo Press.Google Scholar
- Falk, Stanley L. 1964. “The National Security Council Under Truman, Eisenhower, and Kennedy.” Political Science Quarterly 79 (3): 403–34.CrossRefGoogle Scholar
- FAR. 2015. Ending Trafficking in Persons. Washington, DC: Department of Defense. https://www.federalregister.gov/articles/2015/01/29/2015-01524/federal-acquisition-regulation-ending-trafficking-in-persons.
- Fenwick, Charles G. 1913. The Neutrality Laws of the United States. Washington, DC: Carnegie Endowment for International Peace.Google Scholar
- Fidell, Eugene R. 2008. “Criminal Prosecution of Civilian Contractors by Military Courts.” South Texas Law Review 50: 845.Google Scholar
- Freeman, Bennett, Maria B. Pica, and Christopher N. Camponovo. 2000. “New Approach to Corporate Responsibility: The Voluntary Principles on Security and Human Rights, A.” Hastings International and Comparative Law Review 24: 423.Google Scholar
- Frisk, Daniel. 2009. Contractors¿ Support of U.S. Operations in Iraq. Collingdale, PA: Diane Publishing.Google Scholar
- GAO. 2012. Management and Oversight Improvements Needed in Afghanistan. GAO-12-290. Washington, DC: United States Government Accountability Office. http://www.gao.gov/assets/590/589710.pdf.
- Garin, Eugenio, ed. 1997. Renaissance Characters. Translated by Lydia G. Cochrane. 1st ed. Chicago: University of Chicago Press.Google Scholar
- Gaston, E. L. 2008. “Mercenarism 2.0—The Rise of the Modern Private Security Industry and Its Implications for International Humanitarian Law Enforcement.” Harvard International Law Journal 49: 221.Google Scholar
- Gathii, James Thuo. 2009. “Commercializing War: Private Military and Security Companies, Mercenaries and International Law.” Legal Studies Research Papers Series. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1356887.
- Gill, Martin, and Kateri Caramola, eds. 2014. “Private Military and Security Companies: Armed, Global, Regulated and Professional?” In The Handbook of Security, 747–66. London: Palgrave Macmillan.Google Scholar
- Globe News Wire. 2015. “ISO Publishes Security Operations Management System Standard Based on ANSI/ASIS.PSC.1:2012.” GlobeNewswire News Room, September 24, 2015. http://globenewswire.com/news-release/2015/09/24/770841/10150527/en/ISO-Publishes-Security-Operations-Management-System-Standard-based-on-ANSI-ASIS-PSC-1-2012.html.
- Gomez del Prado, José. 2011. “A United Nations Instrument to Regulate and Monitor Private Military and Security Contractors.” Notre Dame Journal of International, Comparative, & Human Rights Law 1 (1): 1–79.Google Scholar
- Government and Contract Bid. 2015. “Procurement Task Order Fr Department of Satte WPS 2015 Contract.” http://www.govcb.com/The-Worldwide-Protective-Services-ADP14363630860000927.htm.
- Hackman, Gable F. 2007. “Slipping Through the Cracks: Can We Hold Private Security Contractors Accountable for Their Actions Abroad.” Loyola Journal of Public Interest Law 9: 251.Google Scholar
- Hall, William. 1874. The Rights and Duties of Neutrals. London: Longmans Green & Co.Google Scholar
- Hedahl, Marcus. 2009. “Blood and Blackwaters: A Call to Arms for the Profession of Arms.” Journal of Military Ethics 8 (1): 19–33.CrossRefGoogle Scholar
- Heddell, Gordon. 2011. “DoDig Prepared Statement on ‘Mechanisms Currently in Place to Oversee the Billions of Taxpayer Dollars Spent in Afghanistan and Iraq.’” Presented at the House Committee on Oversight and Government Reform Subcommittee on National Security, Homeland Defense, and Foreign Operations, Washington, DC, December 7. http://www.dodig.mil/IGInformation/IGInformationReleases/DoDIG_PreparedStatement_Dec72011Hearing.pdf.
- Herbst, Jefferey. 1997. “The Regulation of Private Security Forces.” In The Privatisation of Security in Africa, edited by Mills and John Stremlau. Pretoria: South African Institute of International Affairs.Google Scholar
- Holmqvist, Caroline. 2005. “Engaging Armed Non-State Actors in Post-Conflict Settings.” In Security Governance in Post-Conflict Peacebuilding, edited by Alan Bryden and Heiner Hänggi, 45–68. Munster: Lit Verlag.Google Scholar
- House of Representatives. 2007. “National Defense Authorization Act for Fiscal Year 2008.” US Congress. http://www.gsa.gov/portal/mediaId/184487/fileName/National_Defense_Authorization_Act_2008.action.
- Hurst, Stephanie. 2011. “‘Trade in Force’: The Need for Effective Regulation of Private Military and Security Companies.” Southern California Review 84: 447–86.Google Scholar
- Hughes, Geraint. 2014. “Soldiers of Misfortune: The Angolan Civil War, the British Mercenary Intervention, and UK Policy Towards Southern Africa, 1975–6.” The International History Review 36 (3): 493–512.CrossRefGoogle Scholar
- Isaac, Larry W., and Daniel M. Harrison. 2006. “Corporate Warriors: The State and Changing Forms of Private Armed Force in America.” In Globalization Between the Cold War and Neo-Imperialism, 153–88. Bingley: Emerald Group Publishing Limited.Google Scholar
- Isenberg, David. 2008. Shadow Force: Private Security Contractors in Iraq. New York: Praeger.Google Scholar
- ———. 2012. “Servicing the State Department.” The Huffington Post, February 8, 2012. http://www.huffingtonpost.com/david-isenberg/servicing-the-state-dept_b_1729577.html.
- Jackson, Katherine. 2007. “Not Quite a Civilian, Not Quite a Soldier: How Five Words Could Subject Civilian Contractors in Iraq and Afghanistan to Military Jurisdiction.” Journal of the National Association of Administrative Law Judiciary 27: 255.Google Scholar
- Joh, Elizabeth E. 2006. “The Forgotten Threat: Private Policing and the State.” Global Legal Studies 13 (2): 357–89.CrossRefGoogle Scholar
- Jones, Oliver. 2009. “Implausible Deniability: State Responsibility for the Actions of Private Military Firms.” Connecticut Journal of International Law 34: 239.Google Scholar
- Juma, Laurence. 2011. “Privatisation, Human Rights and Security: Reflections on the Draft International Convention on Regulation, Oversight and Monitoring of Private Military and Security Companies.” Law, Democracy & Development 15 (1).Google Scholar
- Kees, Alexander. 2011. “Regulation of Private Military Companies.” Goettingen Journal of International Law 3 (1): 199–216.Google Scholar
- Keohane, Robert, and Joseph Nye. 1977. “Realism and Complex Interdependence.” In Power and Interdependence: World Politics in Transition. Boston: Little, Brown.Google Scholar
- Kidwell, Deborah C. 2005. Public War, Private Fight? The United States and Private Military Companies: The United States and Private Military Companies. Fort Leavenworth: Combat Studies Institute Press.Google Scholar
- Kinsey, Christopher. 2005. “Challenging International Law: A Dilemma of Private Security Companies.” Conflict, Security & Development 5 (3): 269–93. https://doi.org/10.1080/14678800500344515.CrossRefGoogle Scholar
- ———. 2008. “International Law and the Control of Mercenaries and Private Military Companies.” Cultures & Conflicts, http://conflits.revues.org/index11502.html.
- Krause, Keith. 2011. “Leashing the Dogs of War: Arms Control from Sovereignty to Governmentality.” Contemporary Security Policy 32 (1): 20–39.CrossRefGoogle Scholar
- Kritsiotis, Dino. 1998. “Mercenaries and the 1 Privatization of Warfare.” The Fletcher Forum of World Affairs 22: 11.Google Scholar
- Langley, Lester D., and Thomas David Schoonover. 1995. The Banana Men: American Mercenaries and Entrepreneurs in Central America, 1880–1930. Kentucky: University Press of Kentucky.Google Scholar
- Lanning, Michael. 2007. Mercenaries: Soldiers of Fortune, from Ancient Greece to Today’s Private Military Companies. New York: Random House Publishing.Google Scholar
- Leahy, Patrick. 2010. Civilian Extraterritorial Jurisdiction Act (CEJA) of 2010 (2010–S. 2979). https://www.govtrack.us/congress/bills/111/s2979.
- ———. 2015. Leahy Introduces Legislation To Hold American Contractors Overseas Accountable Under U.S. Law | U.S. Senator Patrick Leahy of Vermont. Washington, DC: US Senate. https://www.leahy.senate.gov/press/leahy-introduces-legislation-to-hold-american-contractors-overseas_accountable-under-us-law.
- ———. 2014. “Leahy, Price Introduce Legislation to Hold American Contractors Overseas Accountable Under U.S. Law | U.S. Senator Patrick Leahy of Vermont.” https://www.leahy.senate.gov/press/leahy-price-introduce-legislation-to-hold-american-contractors-overseas-accountable-under-us-law.
- Leander, Anna. 2010. “The Paradoxical Impunity of Private Military Companies: Authority and the Limits to Legal Accountability.” Security Dialogue 41 (5): 467–90.CrossRefGoogle Scholar
- Mallet, Michael. 2009. Mercenaries and their Masters: Warfare in Renaissance Italy. Barnsley: Pen and Sword.Google Scholar
- Mayer, Christopher. 2015. “The U.S. Government’s Support and Involvement in the Development of Auditable Standards for Security Operations and Their Incorporation into DoD Operations and Procurement Policies.” Presented at the ISO 18788: The New Standard for Responsible Security Operations Seminar, American University Washington College of Law, Washington, DC, November 20. https://www.wcl.american.edu/humright/center/projects/projects/ISO18788TheNewStandardforResponsibleSecurityOperationsSeminar.cfm.
- McFate, Sean. 2015. The Modern Mercenary: Private Armies and What They Mean for World Order. Oxford: Oxford University Press.Google Scholar
- McMahon, Lucas. 2014. The Foederati, the Phoideratoi, and the Symmachoi of the Late Antique East (ca. A.D. 400–650). Ottawa: University of Ottawa.Google Scholar
- Mehra, Amol. 2009. “Bridging Accountability Gaps—The Proliferation of Private Military and Security Companies and Ensuring Accountability for Human Rights Violations.” Pacific McGeorge Global Business & Development Law Journal 22 (2): 323–32.Google Scholar
- Michaels, Jon D. 2004. “Beyond Accountability: The Constitutional, Democratic, and Strategic Problems with Privatizing War.” Washington University Law Review 82 (3): 1001–127.Google Scholar
- Middlekauff, Robert. 1982. The Glorious Cause: The American Revolution, 1763–1789. New York and Oxford: Oxford University Press.Google Scholar
- Mockler, Anthony. 1969. The Mercenaries. London: Macmillan.Google Scholar
- NDAA. 2011. “National Defense Authorization Act Fiscal Year 2011.” US Congress.Google Scholar
- Obama, Barak. 2007. Security Contractor Accountability Act of 2007 (2007–S. 2147). https://www.govtrack.us/congress/bills/110/s2147.
- Oppenheim, Lassa. 1957. International Law. Edited by Hersch Lauterpacht. 7th ed. London: Longmans Green & Co.Google Scholar
- Østensen, Åse Gilje. 2011. “UN Use of Private Military and Security Companies: Practices and Policies.” The Geneva Centre for the Democratic Control of Armed Forces. http://www.dcaf.ch/content/download/45662/678940/file/ssr_paper_3_binder.pdf.
- Percy, Sarah. 2007. “Mercenaries: Strong Norm, Weak Law.” International Organization 61 (2): 367–97.Google Scholar
- ———. 2013. Regulating The Private Security Industry. London: International Institute for Strategic Studies.Google Scholar
- Pope, Amy. 2015. Combating Human Trafficking in Supply Chains. Washington, DC: The White House. https://www.whitehouse.gov/blog/2015/01/29/combating-human-trafficking-supply-chains.
- Price, David. 2007. MEJA Expansion and Enforcement Act of 2007 (2007–H.R. 2740). https://www.govtrack.us/congress/bills/110/hr2740.
- ———. 2010. Civilian Extraterritorial Jurisdiction Act (CEJA) of 2010 (2010–H.R. 4567). https://www.govtrack.us/congress/bills/111/hr4567.
- Rarick, Carissa A. 2015. “Fighting War and Furthering Slavery: The Alarming Truth About Private Military Firms and the Solutions to End Their Involvement in Human Sex Trafficking.” Journal of Global Justice and Public Policy 2: 65.Google Scholar
- Scahill, Jeremy. 2008. Blackwater: The Rise of the World’s Most Powerful Mercenary Army: Revised and Updated. New York, NY: MJF.Google Scholar
- Schwartz, Moche. 2010. “The Department of Defense’s Use of Private Security Contractors in Iraq and Afghanistan: Background, Analysis, and Options for Congress.” CRS Report for Congress R40835. Washington, DC: Congressional Research Service. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA523568&Location=U2&doc=GetTRDoc.pdf.
- Seavey, James. 1939. Neutrality Legislation in the United States. Washington, DC: Georgetown University.Google Scholar
- Simmons, Ric. 2007. “Private Criminal Justice.” Wake Forest Law Review 42: 911.Google Scholar
- Singer, Peter Warren. 2010. “The Regulation of New Warfare.” The Politic, February 2010. http://www.brookings.edu/research/opinions/2010/02/27-defense-regulations-singer.
- Singer, Peter Warren. 2003. Corporate Warriors: The Rise of the Privatized Military Industry. New York: Cornell University Press.Google Scholar
- Smith, Thomas. 2008. “Protecting Civilians…or Soldiers? Humanitarian Law and the Economy of Risk in Iraq.” International Studies Perspectives 9: 144–64.CrossRefGoogle Scholar
- Snell, Angela. 2011. “The Absence of Justice: Private Military Contractors, Sexual Assault, and the US Government’s Policy of Indifference.” University of Illinois Law Review 3: 1125–64.Google Scholar
- Solis, William L. 2009. Rebuilding Iraq: DoD and State Department Have Improved Oversight and Coordination of Private Security Contractors in Iraq, But Further Actions are Needed. Washington, DC: GAO.Google Scholar
- Stein, Mark S. 2005. “Security Council, the International Criminal Court, and the Crime of Aggression: How Exclusive Is the Security Council’s Power to Determine Aggression.” The Indiana International & Comparative Law Review 16: 1.Google Scholar
- Swiss Government. 2010. International Code of Conduct for Private Security Service Providers. Geneve: Swiss Government.Google Scholar
- Teichert, Erica. 2014. “Blackwater Case Tests DOJ Authority Over Contractors Abroad.” Crime Prevention & Community Safety (Blog). http://www.palgrave-journals.com/cpcs/journal/v1/n3/abs/8140022a.html.
- Thompson, Janice. 1994. Mercenaries, Pirates and Sovereigns. New Jersey: Princeton University Press.Google Scholar
- Tiefer, Charles. 2009. “No More Nisour Squares: Legal Control of Private Security Contractors in Iraq and After.” Oregon Law Review 88 (3): 745–75.Google Scholar
- Trim, D.J.B. 2002. The Chivalric Ethos and the Development of Military Professionalism. Leiden and Boston: Brill.Google Scholar
- Trundle, Matthew. 1996. The Classical Greek Mercenary and His Relationship to the Polis. Hamilton, ON: McMaster University.Google Scholar
- ———. 2008. Greek Mercenaries: From the Late Archaic Period to Alexander. London and New York: Routledge.Google Scholar
- UN. 1989. “International Convention Against the Recruitment, Use, Financing and Training of Mercenaries.” United Nations. http://www.un.org/documents/ga/res/44/a44r034.htm.
- Underwood, Matthew. 2012. “Jealousies of a Standing Army: The Use of Mercenaries in the American Revolution and Its Implications for Congress’s Role in Regulating Private Military Firms.” Northwestern University Law Review 102: 317–49.Google Scholar
- United Nations. 2010. Draft International Convention on the Regulation, Oversight and Monitoring Of Private Military and Security Companies. New York: UN Human Rights Council.Google Scholar
- USC. 1996. “War Crimes Act.” http://psm.du.edu/media/documents/us_regulations/federal_law/us_law_war_crimes_act.pdf.
- ———. 2000. “Military Extraterritorial Jurisdiction Act (MEJA).” https://www.gpo.gov/fdsys/pkg/PLAW-106publ523/html/PLAW-106publ523.htm.
- Van De Mieroop, Marc. 2011. A History of Ancient Egypt. Hoboken, NJ: Wiley.Google Scholar
- Waley, Daniel. 1976. Condotte and ‘Condottieri’ in the Thirteenth Century. London: British Academy. http://www.britac.ac.uk/pubs/proc/files/61p337.pdf.
- Washington, George. 1776. “The George Washington Papers.” https://memory.loc.gov/ammem/gwhtml/1776.html.
- Waxman, Henry. 2007. Private Military Contractors in Iraq: An Examination of Blackwater’s Actions in Fallujah. Washington, DC: Committee on Oversight and Governmental Affairs.Google Scholar
- Weiss, Robert. 1978. “The Emergence and Transformation of Private Detective Industrial Policing in the United States, 1850–1940.” Crime and Social Justice 9: 35–48.Google Scholar
- White, Nigel D. 2014. “Peacekeeping, Private Security and International Human Rights Law.” International Community Law Review 16 (4): 443–60.CrossRefGoogle Scholar
- Xenophon. 1998. Anabasis. Cambridge, MA: Harvard University Press.Google Scholar
- Zenko, Mikah. 2015. “The New Unknown Soldiers of Afghanistan and Iraq.” Foreign Policy, May 29, 2015. https://foreignpolicy.com/2015/05/29/the-new-unknown-soldiers-of-afghanistan-and-iraq/.
Copyright information
© The Author(s) 2019