1,378 research outputs found

    Taking care to protect the environment against damage: A meaningless obligation?

    Get PDF
    Little attention is paid to the obligation of 'care' in Article 55(1) of Additional Protocol I. Beyond a general principle of upholding environmental value in times of armed conflict, what is the scope and content of the obligation? If it is worthless, what makes it so? Since the care provision includes the same high threshold of harm found elsewhere in the environmental provisions, has this stumbling block now been removed by state practice? Rule 44 of the Customary Law Study might appear to suggest that this is so, or does it? Ultimately then, is the care obligation worth caring about? © Copyright International Committee of the Red Cross 2010

    The practices of apartheid as a war crime: a critical analysis

    Get PDF
    The human suffering caused by the political ideology of apartheid in South Africa during the Apartheid era (1948-1994) prompted worldwide condemnation and a variety of diplomatic and legal responses. Amongst these responses was the attempt to have apartheid recognised both as a crime against humanity in the 1973 Apartheid Convention as well as a war crime in Article 85(4)(c) of Additional Protocol I. This article examines the origins, nature and current status of the practices of apartheid as a war crime and its possible application to the Israeli-Palestinian conflict

    Military objectives in cyber warfare

    Get PDF
    This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks. It first identifies when cyber attacks qualify as ‘attacks’ under the law of armed conflict and then examines the two elements of the definition of ‘military objective’ contained in Article 52(2) of the 1977 Protocol I additional to the 1949 Geneva Conventions on the Protection of Victims of War. The Chapter concludes that this definition is flexible enough to apply in the cyber context without significant problems and that none of the challenges that characterize cyber attacks hinders the application of the principle of distinction

    Computer Network Attacks and Self-Defense

    Get PDF

    XVIII Concluding Remarks: LOAC and Attempts to Abuse or Subvert it

    Get PDF

    Distinction and Loss of Civilian Protection in International Armed Conflicts

    Get PDF

    Concluding Remarks on Non-International Armed Conflicts

    Get PDF

    Terrorism and Afghanistan

    Get PDF

    The Universality Principle and War Crimes

    Get PDF

    Legitmate Military Objective Under The Current Jus in Bello

    Get PDF
    corecore