1,378 research outputs found
Taking care to protect the environment against damage: A meaningless obligation?
Little attention is paid to the obligation of 'care' in Article 55(1) of Additional Protocol I. Beyond a general principle of upholding environmental value in times of armed conflict, what is the scope and content of the obligation? If it is worthless, what makes it so? Since the care provision includes the same high threshold of harm found elsewhere in the environmental provisions, has this stumbling block now been removed by state practice? Rule 44 of the Customary Law Study might appear to suggest that this is so, or does it? Ultimately then, is the care obligation worth caring about? © Copyright International Committee of the Red Cross 2010
The practices of apartheid as a war crime: a critical analysis
The human suffering caused by the political ideology of apartheid in South Africa during the Apartheid era (1948-1994) prompted worldwide condemnation and a variety of diplomatic and legal responses. Amongst these responses was the attempt to have apartheid recognised both as a crime against humanity in the 1973 Apartheid Convention as well as a war crime in Article 85(4)(c) of Additional Protocol I. This article examines the origins, nature and current status of the practices of apartheid as a war crime and its possible application to the Israeli-Palestinian conflict
Military objectives in cyber warfare
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks. It first identifies when cyber attacks qualify as ‘attacks’ under the law of armed conflict and then examines the two elements of the definition of ‘military objective’ contained in Article 52(2) of the 1977 Protocol I additional to the 1949 Geneva Conventions on the Protection of Victims of War. The Chapter concludes that this definition is flexible enough to apply in the cyber context without significant problems and that none of the challenges that characterize cyber attacks hinders the application of the principle of distinction
- …
