Hostname: page-component-699b5d5946-g2pq9 Total loading time: 0 Render date: 2026-03-07T05:41:10.409Z Has data issue: false hasContentIssue false

Strengthening the protection of civilian infrastructure in armed conflict: Practical measures to operationalize IHL and reduce civilian harm

Published online by Cambridge University Press:  05 March 2026

Bárbara Morais Figueiredo*
Affiliation:
Researcher, United Nations Institute for Disarmament Research, Geneva, Switzerland
Rights & Permissions [Opens in a new window]

Abstract

Strengthening the protection of civilian infrastructure – particularly that which is related to the provision of essential services – is crucial to preventing and mitigating both immediate and long-term human suffering in contemporary armed conflicts. Damage to and destruction of such infrastructure not only inflicts severe and enduring harm on civilian populations, but also significantly undermines recovery efforts and prospects for peace and stability. Despite the extensive and robust evidence of the patterns of civilian harm resulting from damage to and destruction of civilian infrastructure – including the widespread and long-lasting reverberating effects – as well as the increasing availability of tools for anticipating and assessing these impacts, it remains unclear how most militaries incorporate relevant considerations into operational planning and decision-making, especially when implementing the principles of proportionality and precautions in attack.

Following a brief overview of the evolving legal and policy frameworks governing the protection of civilian infrastructure in armed conflict, this article outlines practical measures to facilitate compliance with, and strengthen the implementation of, relevant international humanitarian law rules and policy commitments with the aim of preventing and mitigating both direct and reverberating harm to civilians in the context of contemporary hostilities.

Information

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2026. Published by Cambridge University Press on behalf of International Committee of the Red Cross.

Introduction

Extensive and repeated damage to civilian infrastructure has become a dominant and recurring feature of contemporary armed conflicts, inflicting severe and enduring harm to civilians. Over the past year alone, in contexts such as Colombia, the Democratic Republic of the Congo, Ethiopia, Israel, Lebanon, Mali, Mozambique, Myanmar, Sudan, the Syrian Arab Republic, Ukraine, Yemen and the Occupied Palestinian Territory, widespread damage to or destruction of civilian infrastructure, such as health and educational facilities, energy systems, water sources and religious sites, has significantly disrupted life-saving services, undermined livelihoods, heightened the risk of disease outbreaks, deepened humanitarian needs and eroded community resilience.Footnote 1

Whether civilian infrastructure is deliberately targeted or incidentally damaged during attacks directed against military objectives,Footnote 2 the resulting impacts on civilians are typically severe and multifaceted. This is especially pronounced when hostilities take place in urban areas, where military objectives are often intermingled with civilian infrastructure.Footnote 3 In such settings, the use of explosive weapons with wide area effects, as frequently seen in recent conflicts, further exacerbates the risk of indiscriminate and disproportionate harm.Footnote 4 In particular, the indirect or reverberating effects resulting from damage to or destruction of civilian infrastructure can deprive individuals and communities of access to services essential to their survival and well-being, such as health care, education, water and sanitation, and electricity, causing widespread and long-lasting harm.Footnote 5

Given the complex interdependence of civilian infrastructure and essential services systems and networks, especially in urban areas, these effects are often cumulative and overlapping, manifesting across a wide range of interconnected sectors.Footnote 6 For instance, disruptions to water and sanitation services caused by damage to water infrastructure can expose populations to health hazards and lead to the outbreak of infectious diseases, adding pressure to already overwhelmed medical facilities in conflict-affected areas. Similarly, damage to power plants not only cuts off electricity to households and businesses but can also disrupt the provision of health-care services and affect transportation and communication systems and networks. As such, strikes damaging civilian infrastructure are likely to affect a much larger portion of the civilian population than those present in the immediate impact area and, over time, may result in far more deaths and suffering than the initial attack itself, with impacts often persisting long after hostilities end.Footnote 7

These impacts have been extensively documented across a range of conflicts over the past decade.Footnote 8 A growing and robust body of evidence has shed further light on the distinct patterns and types of harm resulting from attacks affecting civilian infrastructure, including the differentiated impacts on vulnerable groups such as children, women, persons with disabilities, the elderly and displaced populations.Footnote 9 This evidence base has broadened the understanding of civilian harm beyond the immediate loss of life, physical injury and destruction to encompass the reverberating harm reflected in disrupted or impeded access to essential services and the ensuing repercussions for the survival, dignity and well-being of civilians.Footnote 10 In addition, some harms inflicted on individuals and the social fabric of communities by the destruction of civilian infrastructure cannot be as easily measured and are likely to span generations.Footnote 11

Beyond these profound and far-reaching humanitarian consequences, the destruction of civilian infrastructure can also entail significant strategic and operational costs. During active hostilities, particularly in the context of asymmetric urban conflicts, the destruction of civilian infrastructure can compromise the effectiveness of operations for conventional forces, complicating logistics and the mobility of military personnel. It may also enable opponents to exploit damaged environments for tactical advantage, including by using destroyed buildings and rubble for ambushes or the concealment of fighters, weapons and other military equipment.Footnote 12 Even where such attacks may offer short-term gains during a campaign, in the longer term they often reinforce cycles of instability by making rebuilding more complex, costly and time-consuming – and prolonging the deprivation of access to essential services. This can significantly undermine recovery efforts, delay the return of displaced populations and further entrench the conditions conducive to conflict relapse, hindering progress towards peace.Footnote 13

Taken together, these humanitarian and strategic considerations underscore the importance of understanding the multifaceted nature of civilian harm, as well as the implications this has for both normative frameworks and operational responses. In addition to more accurately reflecting the lived experiences of civilians in contemporary conflicts, adopting a broader view of civilian harm carries significant legal and practical implications. It can influence how international humanitarian law (IHL) principles and rules on the conduct of hostilities are both interpreted and applied, and consequently, how civilians are protected from the increasingly foreseeable effects of attacks affecting civilian infrastructure. Yet, despite the extensive documentation of these effects and the increasing availability of tools for anticipating and assessing them, there is limited understanding as to how most militaries integrate relevant considerations into their operational planning and decision-making, particularly when applying the rules of proportionality and precautions in attack. Beyond the deliberate and systematic targeting of civilian infrastructure observed in recent conflicts, existing patterns of harm suggest a growing reliance on expansive or overly permissive interpretations of these rules, as well as lowered standards of care in their application, that risk undermining their protective purpose and exposing civilians and civilian infrastructure to heightened risks of harm.Footnote 14

In light of these trends, this article argues that the protection of civilian infrastructure must be regarded as a central component of efforts to prevent and mitigate civilian harm in armed conflicts. Crucially, this understanding should guide not only the interpretation of relevant IHL rules on the conduct of hostilities, but also the adoption of practical measures to ensure that these rules can be effectively implemented across all stages of military operations in order to meaningfully protect civilians from foreseeable harm.

Following a brief overview of the evolving legal and policy frameworks governing the protection of civilian infrastructure in armed conflicts, and drawing on the existing evidence and knowledge base, this article presents concrete measures to help better operationalize relevant legal obligations and policy commitments, with the aim of preventing and mitigating both direct and reverberating harm to civilians in contemporary hostilities.

Enhancing the implementation of relevant legal and policy frameworks

Safeguarding civilian infrastructure in today’s armed conflicts – which have become increasingly complex, protracted and urbanized – can present a host of challenges to belligerents. Beyond the fundamental obligation under IHL to distinguish at all times between civilian objects and military objectives and to only direct attacks against the latter, the conduct of robust proportionality assessments and the rigorous application of precautionary measures is critical to avoiding or minimizing damage to or destruction of civilian infrastructure and the resulting patterns of reverberating harm to civilians.

The following section provides a brief overview of the IHL rules governing the conduct of hostilities – specifically on proportionality and precautions in attack – as they pertain to the protection of civilian infrastructure. It focuses on how the interpretation and implementation of these rules can be strengthened to afford effective and meaningful protection to civilians from the direct and reverberating effects that often arise when infrastructure on which they rely for their survival and well-being is damaged or destroyed.

IHL principles and rules governing the conduct of hostilities are complemented by several normative and policy frameworks that reinforce the protection of civilian infrastructure in armed conflicts. Among these, the Political Declaration on Strengthening the Protection of Civilians from the Humanitarian Consequences Arising from the Use of Explosive Weapons in Populated Areas (Political Declaration on EWIPA) represents an important tool for promoting standards and norms that advance the protection of civilian infrastructure in contemporary armed conflicts,Footnote 15 including by strengthening compliance with and improving the implementation of relevant IHL principles and rules on the conduct of hostilities.Footnote 16

Strengthening and refining proportionality assessments

While compliance with the principle of distinction is fundamental to strengthening the protection of civilian infrastructure in armed conflicts, this article focuses primarily on measures to avoid and minimize incidental harm resulting from attacks against military objectives. In this context, the principle of proportionality prohibits belligerents from launching attacks that “may be expected to cause incidental loss of civilian life, injury to civilians, damage to civilian objects, or a combination thereof, which would be excessive in relation to the concrete and direct military advantage anticipated”.Footnote 17 In other words, the expected incidental harm resulting from an attack must not outweigh the anticipated military gain.

In practice, proportionality assessments can vary significantly depending on the nature and scope of the incidental harm considered.Footnote 18 For instance, an assessment will likely produce different outcomes depending on whether it accounts only for immediate civilian deaths and injuries or also includes damage to or destruction of civilian objects,Footnote 19 and crucially on how the expected consequences of such damage or destruction – the reverberating effects – are understood and factored into the proportionality calculus. Although interpretations may differ and State practice is not entirely transparent or consistent, there is a growing consensus that not only the direct but also the reasonably foreseeable reverberating effects must be considered during proportionality assessments,Footnote 20 even if their precise scale and scope cannot be fully anticipated or quantified.Footnote 21

Accordingly, when evaluating – or “assigning weight” to – the incidental harm expected to result from attacks likely to affect civilian infrastructure, special consideration must be given to those objects whose damage or destruction will have the most severe effects on civilians.Footnote 22 Crucially, this determination hinges not only on an assessment of the expected direct impacts – which may rely primarily on quantitative factors such as the number objects affected or the extent of physical damage incurred – but also on a qualitative understanding of the attack’s broader consequences for the civilian population.

In particular, when civilian infrastructure and systems enabling the provision of essential services (such as electricity, health care, and water and sanitation) are impacted, the reverberating effects often outweigh the immediate harm in both time and space.Footnote 23 Given the nature of such infrastructure, meaningful assessments of the incidental harm expected to result from an attack may therefore require accounting for the interdependencies between related services and systems – which can influence the extent, severity and duration of the reverberating effects on the civilian population – as well as for the baseline conditions of the targeted infrastructure, especially in the context of protracted urban hostilities.Footnote 24

Although the notion of “foreseeability” can be highly contextual, it evolves with advances in technology and capabilities, as well as with past operational experiences and lessons learned.Footnote 25 In particular, the extensive documentation of the reverberating effects of attacks affecting civilian infrastructure across multiple conflicts over the past decade has significantly improved the understanding of their nature and scale, and should inform both the planning and conduct of military operations.Footnote 26

This obligation is further reinforced by other legal and policy instruments, including the Political Declaration on EWIPA, which commits endorsing States to ensure that, in the planning of military operations and the execution of attacks involving the use of explosive weapons in populated areas, their armed forces take into account not only the direct effects but also the reasonably foreseeable indirect effects on civilians and civilian objects.Footnote 27 As described in the Declaration’s preamble, these effects often stem from damage to or destruction of critical civilian infrastructure and manifest in various forms, including deprivation of, or impeded access to, essential services such as health care, education, and water and electricity supply, as well as environmental damage, large-scale displacement, and psychological and psychosocial harm.Footnote 28 While this description of harms may be broader than what some States traditionally consider in their own proportionality assessments, it reflects well-documented patterns of harm to civilians in contemporary conflicts, as described above.Footnote 29

Enhancing the implementation of precautionary measuresFootnote 30

Under the principle of precautions in attack, belligerents are under an obligation to take constant care to spare civilians and civilian objects from the effects of military operations.Footnote 31 This obligation is central to the protection of civilian infrastructure in armed conflicts, particularly when those conflicts take place in urban areas, where such infrastructure is often exposed to heightened risks of harm.Footnote 32

In practice, the application of this rule means that the greater the risks to the civilian population posed by an attack, the higher the standard of care required from those planning and executing it. Applying stringent precautionary measures is particularly important when conducting operations that are likely to incidentally damage or destroy civilian infrastructure enabling the provision of essential services. In this context, the rigorous implementation of such measures should involve not only avoiding direct damage to such infrastructure but also actively seeking to minimize incidental harm – including reasonably foreseeable reverberating effects. In addition to doing everything feasible to verify that intended targets are lawful military objectives in accordance with the principle of distinction,Footnote 33 the principle of precaution requires belligerents to select appropriate means and methods of attack in order to avoid or minimize incidental harm.Footnote 34

Moreover, belligerents must take all feasible precautions to ensure that an attack does not violate the principle of proportionality.Footnote 35 Doing so entails an obligation to obtain sufficient information for a robust assessment of the expected incidental damage to civilian objects, including the ensuing repercussions of such damage for the civilian population, which are often manifested through reverberating effects.Footnote 36 While these determinations are inherently contextual (as are proportionality assessments themselves), they should be informed not only by the specific circumstances of an attack but also by past operational experiences and lessons learned, along with the expanding body of evidence documenting the reverberating effects of attacks affecting civilian infrastructure.Footnote 37 In a similar vein, the concept of “feasibility” in taking such precautions is not static; rather, it evolves with the development and increasing accessibility of tools and capabilities that can be deployed to increase understanding of the risks posed by military operations to civilians and civilian infrastructure. It also evolves with the growing awareness and dissemination of knowledge on effective measures and practices for avoiding or minimizing the resulting harm.Footnote 38

In line with these obligations, belligerents must cancel or suspend an attack if it becomes apparent that the target is not a military objective or is entitled to special protection, or if the attack is expected to have disproportionate effects.Footnote 39

Practical measures to facilitate and enhance the implementation of relevant IHL rules and strengthen the protection of civilian infrastructure

Good-faith interpretation and implementation of IHL principles and rules on the conduct of hostilities, particularly the rules on proportionality and precautions in attack, are essential to strengthening the protection of civilian infrastructure in contemporary armed conflicts. Having presented a purposive interpretation of these rules, this article will now outline practical measures that States and their armed forces can adopt at the political-strategic, operational and tactical levels to help operationalize them throughout the targeting process and better safeguard civilian infrastructure during hostilities. These measures include elevating the protection of civilian infrastructure to a clear policy and strategic priority, enhancing intelligence-gathering and analysis systems to account for civilian infrastructure, adopting robust target development and engagement processes, and establishing mechanisms and procedures to enable the tracking and analysis of damage to civilian infrastructure and the resulting patterns of harm to civilians, including through operational reviews and institutional lessons learned processes.

Making the protection of civilian infrastructure from the effects of hostilities a clear policy and strategic priority

Safeguarding civilian infrastructure and preserving essential services from the direct and reverberating effects of hostilities should be clearly articulated in policy guidance and explicitly reflected in military doctrine, particularly in relation to air and land warfare and urban operations.Footnote 40

Such guidance should recognize the potential strategic and operational implications of damage to and destruction of civilian infrastructure, as well as its multifaceted impacts on civilians, including likely cumulative and long-term consequences such as disruption to essential services, increased reconstruction costs, and impediments to post-conflict recovery and peacebuilding, as outlined above.Footnote 41

Overall guidance and strategic direction to avoid or minimize damage to civilian infrastructure should be reflected in the commander’s intent – which typically provides the vision for the desired end-state and post-conflict conditions – and reinforced through mission-specific rules of engagement (ROE), tactical directives and standard operating procedures, to ensure that it is regarded as a critical component of operational planning and decision-making across all stages of military operations.Footnote 42 This would enable the allocation of relevant resources, including for the development of tools and capabilities, the provision of adequate training to military personnel, and the establishment of coordination mechanisms with external actors, such as humanitarian organizations.Footnote 43

Enhancing intelligence-gathering and analysis systems to account for the civilian environment, including civilian infrastructure

States and their armed forces should develop or enhance intelligence-gathering and analysis processes to ensure that those planning and deciding upon attacks have all necessary information to be able to anticipate, assess and mitigate the potential effects of military operations on civilian objects, including the foreseeable reverberating effects resulting from damage to or destruction of civilian infrastructure.Footnote 44

While the intelligence collection and analysis systems and tools used by most militaries have traditionally focused on enemy capabilities and positions, it is equally critical that they support a robust understanding of the civilian environment,Footnote 45 especially in urban settings, where military objectives are often intermingled with civilian infrastructure. In particular, the greater the likelihood of incidental damage to civilian infrastructure that may be expected from an attack, the greater the requirements should be in terms of the capabilities, expertise and resources allocated to the intelligence-gathering and analysis process.Footnote 46 Although these requirements may vary depending on the specific operational context (including between dynamic and deliberate targeting scenarios), the following measures could be adopted to help develop or strengthen existing systems with a view to better protecting civilian infrastructure:

  • “All-source” intelligence collection: Information should be gathered from a diverse range of sources – such as signals, imagery and human intelligence – and should be recent and corroborated.Footnote 47 Moreover, integrating non-traditional sources, including open-source information, can enhance understanding of the civilian environment and help mitigate the risks of misidentification or mischaracterization of civilian objects. This should include the gathering of specific information on the nature, location, condition and interconnectedness of critical civilian infrastructure and essential services,Footnote 48 as well as on the value and significance of such infrastructure and associated services and systems for the civilian population.Footnote 49

  • Multidisciplinary expertise: In addition to legal advisers and weapons experts, robust intelligence assessments may require input from engineers, cultural advisers, public health specialists and other technical experts, particularly when hostilities take place in urban areas. Participation of relevant technical experts in the targeting process can help in mapping critical interdependencies between infrastructure and systems, as well as in evaluating structural and systemic vulnerabilities which may influence the likelihood and magnitude of reverberating effects resulting from damage to or destruction of civilian infrastructure.Footnote 50 Civil–military coordination officers and liaison systems with international and non-governmental organizations should also be established to facilitate input from other actors with relevant expertise.Footnote 51

  • Tools and capability development: Investments in advanced intelligence, surveillance and reconnaissance (ISR) capabilities, as well as in analytical and predictive tools that can improve the understanding of the civilian environment, should be made. These may include systems that support the identification and characterization of civilian objects and infrastructure, as well as modelling and simulation tools that help anticipate and map the potential impacts of an attack on both individual infrastructure nodes and the wider systems and networks they support.Footnote 52

Comprehensive and robust intelligence collection and analysis that integrates information on the civilian environment is crucial across all stages of military operations.Footnote 53 Over time, an improved understanding of the civilian environment should also enable more accurate assessments of potential reverberating effects both prior to and after military operations.Footnote 54

Moreover, integrating such intelligence into operational planning and decision-making processes can help refine proportionality assessments and the implementation of precautionary measures, particularly by strengthening target verification and validation processes and informing the selection of appropriate means and methods of attack and other measures to mitigate the risks of incidental damage to civilian infrastructure during target engagement, as discussed in more detail below.

Adopting robust target development and engagement procedures

Implementing robust practices throughout the target development and engagement processes – particularly procedures for the identification, validation and approval of targets – is essential to avoiding or minimizing unforeseen and incidental damage to civilian infrastructure and reducing the likelihood and/or magnitude of reverberating effects on the civilian population. In doing so, belligerents can adopt a range of practical measures to reinforce the protection of civilian infrastructure, including specially protected objects.

Target development and validation

Developing and maintaining no-strike and restricted target lists

The adoption of clear policies and procedures for the identification and designation of objects and facilities that should be subject to heightened or special protection, such as no-strike and restricted target entities,Footnote 55 is an important step to strengthen the protection of civilian infrastructure during military operations. These designations serve as essential safeguards to prevent the inadvertent targeting of civilian objects and can help mitigate the risk of incidental harm.Footnote 56

To support this, armed forces should develop and maintain no-strike lists (NSLs) and restricted target lists (RTLs), informed by comprehensive intelligence that accurately reflects the civilian environment. In addition to considering the civilian nature and protected status of objects, assessments of the likelihood and magnitude of potential reverberating effects should be key factors in determining whether to place specific objects or facilities on these lists.Footnote 57

These lists must be continuously updated on the basis of current intelligence, and may be complemented with input provided by humanitarian organizations operating on the ground through structured civil–military coordination channels.Footnote 58 The criteria and procedures for amending such lists, particularly the removal of entities, should be clearly articulated in operational guidance documents/ROE, such as tactical directives and standard operating procedures.Footnote 59 In addition, stricter requirements could be established for dual-use facilities.Footnote 60 These processes should be reinforced by strict data management systems to maintain the currency and verification of objects placed on such lists, as well as to ensure traceability and accountability.Footnote 61

Establishing stringent positive identification requirements and criteria

Clearly specifying and implementing criteria for the positive identification (PID) of targets – i.e., the establishment with reasonable certainty that an object of attack is a lawful military objective based on its function and location and in accordance with IHL and applicable ROE – is a critical component of efforts to enhance the protection of civilian infrastructure during military operations.Footnote 62 PID is usually obtained through observation and analysis of target characteristics, including visual recognition and functional characterization, and should be supported by multi-source and up-to-date intelligence.Footnote 63

Establishing stringent PID requirements for dual-use entities or targets situated near critical infrastructure can help reduce risks of misidentification or incorrect classification of objects, which may lead to erroneous estimates of incidental harm during proportionality assessments and heighten risks to civilian infrastructure during hostilities.Footnote 64 Efforts to improve PID requirements could include measures such as:

  • Defining differentiated “levels of confidence” for engaging targets based on the degree of incidental harm expected from the object’s damage or destruction, taking into account factors such as the object’s nature, function and location. For instance, a higher threshold of certainty could be required prior to engaging objects whose destruction is likely to have particularly adverse effects on civilians, such as dual-use objects or other critical infrastructure on which civilians depend for their survival and well-being, including objects indispensable to the survival of the civilian population. This could include requirements relating to the number and type of intelligence sources needed to substantiate the target identification, as well as to the corresponding accuracy and reliability of these sources.Footnote 65

  • Instituting processes for the periodic review of previously approved targets. These reviews would help to ensure that a potential target continues to effectively contribute to military action and that its destruction or neutralization would yield a definite military advantage “in the circumstances ruling at the time”, minimizing risks of unforeseen harm prior to engagement.Footnote 66 This is especially important when the accuracy and reliability of the intelligence supporting the engagement is not assessed as high.

Implementing rigorous target validation and approval processes

As part of target validation and approval processes, and in line with their obligations flowing from the rules on proportionality and precautions in attack, belligerents must adopt rigorous processes to support estimations of the expected incidental effects of attacks that are particularly likely to harm civilian infrastructure enabling the provision of essential services. Such processes can also contribute to the identification of measures to mitigate the risk of unforeseen or incidental damage to such objects and the resulting reverberating effects on civilians.

Several armed forces already employ sophisticated tools – such as collateral damage estimation methodologies (CDEMs) – to ensure that relevant information is available for both assessing and mitigating the incidental harm expected to result from attacks. The use of these methodologies can help in assigning appropriate weight to expected harm during proportionality assessments, including by supporting determinations of whether such harm would be “excessive” in relation to the anticipated military advantage.Footnote 67 The accuracy and reliability of these assessments depend on the robust target verification practices outlined previously. For instance, if civilian objects located near intended targets are not properly identified or characterized, or are misidentified as military objectives, they will not be adequately factored into the proportionality analysis, which may lead to erroneous or inaccurate assessments.Footnote 68

Although CDEMs are typically classified, they are generally understood to focus primarily on the direct incidental effects of attacks, and there is limited understanding as to how and to what extent indirect or reverberating incidental effects are incorporated into existing methodologies.Footnote 69 Yet, in order to effectively avoid or minimize incidental harm likely to result from attacks, especially those likely to affect civilian infrastructure, CDEMs should be designed to account for the reasonably foreseeable reverberating incidental effects.Footnote 70 To address existing limitations, it has been suggested that more technically advanced States and their militaries could lead the development of tools for anticipating and assessing indirect incidental harm, as well as for supporting the integration of relevant considerations into subsequent determinations of the lawfulness of an attack.Footnote 71

Following – or in addition to – CDE processes, further measures can be adopted to strengthen target validation and approval processes and contribute to both preventing and mitigating the risk of incidental damage to civilian infrastructure:

  • Implementing graduated levels of target engagement authority (TEA) – the authority responsible for approving engagements against lawful targets – based on the outcomes of CDE assessments. For example, if a strike is expected to exceed a certain threshold of harm, the approval for target engagement would need to be sought from higher command or even political levels.Footnote 72

  • Instituting mechanisms and safeguards to mitigate the risk of target misidentification or mischaracterization, including by helping to identify and reduce potential cognitive biases or other negligent practices throughout the targeting process.Footnote 73

  • Designating national “red card holders” in coalition or partnered military operations to ensure that engagements involving a State’s national capabilities comply with relevant national policies, including limitations on acceptable levels of incidental harm.Footnote 74

In light of ongoing technological developments, a growing number of tools, such as computational and predictive models, are becoming available to support efforts to both estimate and mitigate incidental harm during operations, including potential reverberating effects.Footnote 75 Simulation and modelling techniques can enhance militaries’ ability to anticipate these effects by integrating data from a range of internal and external sources, including information from past operations and the expanding evidence base, as well as by enabling comparisons of different courses of action and their potential consequences for civilians. If properly deployed to assist human decision-makers, such tools can improve the accuracy of incidental harm assessments and help inform the identification of relevant mitigation measures.Footnote 76

Target engagement

During the execution phase of military operations, belligerents must implement a range of measures in order to avoid or in any event minimize the likelihood and/or magnitude of incidental harm to civilian infrastructure and comply with their obligations stemming from the principles of distinction, proportionality and precautions in attack. This is particularly important when engaging targets located near such infrastructure, or when striking objects that serve both military and civilian functions.

Selecting appropriate means and methods of warfare to avoid or minimize incidental harmFootnote 77

The selection of appropriate means and methods of warfare, as required by the principle of precautions in attack, is central to preventing and mitigating both the direct and reverberating effects of attacks that may harm civilian infrastructure.Footnote 78

When preparing to engage targets, especially those that serve both military and civilian purposes, due consideration must be given not only to the choice of munitions and delivery systems but also to the specific component or part of the infrastructure or system to be targeted, with a view to preserving the target’s civilian function and minimizing the potential impacts of an attack on civilians. In particular, the position of a component or node within a supply system (i.e., upstream or downstream) often determines the extent and duration of the related service disruption – for instance, damage to upstream components of an infrastructure system can have a far greater impact on service functioning and delivery than damage to downstream components.Footnote 79 Therefore, in line with their precautionary obligation, belligerents must carefully assess which part or component to strike and adjust weaponeering practices accordingly in order to mitigate the risk of harm to civilians, including the reasonably foreseeable reverberating effects. For example, by adjusting the fuse type or warhead size to limit or delay the weapon’s effects, or by modifying the angle or timing of an attack, belligerents can reduce the likelihood or magnitude of the potential impacts of the attack on civilians.Footnote 80

While specific weaponeering procedures may not be feasible in all contexts, their implementation is especially important when operating in populated areas or considering strikes against dual-use objects or other critical civilian infrastructure.Footnote 81 In such cases, it is essential to take into account the likely duration and severity of the damage or functional impairment and its corresponding impacts on civilians, including challenges related to the reconstruction of damaged infrastructure and the rehabilitation of essential services, particularly in the context of protracted or high-intensity hostilities.Footnote 82 Recognizing that belligerents’ capabilities and resources vary and may influence what may be considered as “feasible” in the circumstances, should the absence of specific capabilities or resources mean that the attack would result in indiscriminate or disproportionate harm, then the duty to take precautions in attack would require the attack to be suspended or cancelled.Footnote 83

Adopting “minimum safe distances” to designate no-fire zones

Belligerents could also adopt a concept analogous to “minimum safety distances” or risk estimates – commonly employed to protect one’s own or friendly forces – when conducting military operations in proximity to civilian infrastructure, particularly in the context of hostilities in urban areas. Based on an assessment of a weapon’s accuracy and blast and fragmentation radius, such a measure would establish the minimum distance required to safeguard civilian infrastructure from foreseeable harm. These distances should be adapted to the specific weapon system and munition used, as well as to the characteristics of the surrounding environment, including factors such as population density and infrastructure vulnerability. This concept can also help to inform the designation of “no-fire areas” and other protected zones.Footnote 84

Assessing civilian harm from damage to civilian infrastructure and strengthening lessons learned processes

Conducting assessments of the impact of military operations on civilian objects is essential for understanding the nature and extent of the resulting civilian harm, as well as for identifying lessons learned that can inform future operational planning and decision-making with a view to preventing, mitigating and responding to such harm. While various mechanisms and processes exist to support these assessments, they must be consistently implemented and adapted in order to effectively track damage to civilian infrastructure and enable analysis of the potential reverberating effects on civilians.

For instance, States that have endorsed the Political Declaration on EWIPA commit to collecting, sharing and making publicly available data on direct and indirect effects on civilians and civilian objects of military operations involving the use of explosive weapons in populated areas, as well as to facilitating data collection by international organizations, the International Committee of the Red Cross (ICRC) and civil society organizations.Footnote 85 Implementing these commitments requires States to develop or adapt tools and processes to enable the collection and sharing of such data,Footnote 86 and can be further supported by exchanges of good polices and operational practices within and between States and their armed forces, as foreseen under the Declaration.Footnote 87

Establishing and adapting mechanisms to enable assessments of damage to civilian infrastructure and the resulting reverberating effects on civilians

Civilian harm tracking denotes a “specific military function referring to armed actors’ ability to systematically gather data, assess, and analyse a range of negative effects on civilians caused directly or indirectly by [their] operations”.Footnote 88 This function can encompass a wide range of tools and processes that allow armed forces to better monitor and assess the impacts of their own operations on civilians and civilian objects, including those resulting from damage to or destruction of civilian infrastructure.Footnote 89 Although not a legal obligation per se, the establishment of dedicated capabilities within armed forces to track, analyze, respond to and learn from civilian harm has increasingly been recognized as an effective practice that can facilitate compliance with, and strengthen the implementation of, IHL rules on the conduct of hostilities.Footnote 90

While most mechanisms established to date have focused primarily on tracking immediate civilian casualties and injuries,Footnote 91 there is growing recognition of the need to systematically monitor and assess damage to and destruction of civilian infrastructure in order to develop a more accurate understanding of the full range of impacts that military operations may have on civilians, including by enabling assessments of the reverberating effects arising from such damage or destruction.Footnote 92 This includes both incidental damage and damage caused by direct attacks (such as in the case of dual-use objects).

In addition to leveraging military operational records and intelligence, such mechanisms should integrate information from credible external sources to allow for more comprehensive and accurate assessments of both the direct and potential reverberating effects of infrastructure damage or destruction.Footnote 93 To enable this, it is important to establish clear protocols for the verification and integration of external information, as well as to create reporting channels that allow both civilians and third-party actors to submit relevant data in a structured and reliable manner.Footnote 94 Relevant informational elements may include:

  • type of infrastructure affected (hospitals, water and sanitation systems, transportation networks, electricity grids, food distribution lines etc.);

  • location (e.g., above-ground, ground-level or underground) and infrastructural set-up;

  • associated systems and networks, including interdependencies between related infrastructural elements (including people and consumables).

Further analysis of the damage incurred, including preliminary assessments of its nature and extent, can be classified according to several criteria, such as physical, functional or systemic impacts, or degree of severity (e.g., partial or complete destruction).Footnote 95 A range of tools and methodologies can support both the detection and assessment of such damage and the ensuing consequences for civilians. In addition to advanced ISR capabilities and sophisticated data processing and management systems, satellite imagery and other remote-sensing data can enable granular assessments of damage to various types of civilian infrastructure, including the impacts on specific sectors or activities (environment, cultural heritage, agriculture, economic activities etc.).Footnote 96 When combined with pre- and post-strike intelligence on the civilian environment, including data gathered from external reporting,Footnote 97 this information can help estimate the number of people likely to be affected in both the short and long term and contribute to identifying specific trends and patterns of harm.

Ideally, these assessments should be conducted in real time in order to enable timely feedback loops and inform operational planning and adjustments to targeting practices during the course of a campaign. Procedures should be put in place to ensure that targeting staff receive information on the outcomes of such assessments. Robust assessments can provide valuable insights to support the classification and categorization of objects in future operations, including determinations regarding their civilian nature and function or protected status.Footnote 98 If preliminary assessments reveal possible IHL violations, there should be systems in place to enable subsequent investigations, including through referral to appropriate accountability mechanisms.Footnote 99

Moreover, such assessments can contribute to effective responses to civilian harm, such as by supporting the rehabilitation of infrastructure or the restoration of essential services. These measures are increasingly recognized as important components of comprehensive civilian harm response frameworks, especially in the context of large-scale hostilities – even if, unlike reparations, they may not constitute a legal obligation for the attacker.Footnote 100 In addition, robust assessments can also facilitate communication and coordination on the specific needs and priorities of affected individuals and communities, with relevant organizations providing assistance during and in the aftermath of hostilities.Footnote 101

Enhancing post-strike assessments and broader lessons learned processes to integrate considerations on civilian infrastructure damage and destruction

Information gathered through post-strike assessments and broader lessons learned exercises can play a critical role in helping armed forces to understand the nature and extent of the damage caused to civilian infrastructure by their own operations, and to adjust future practices with a view to avoiding or minimizing such damage and its reverberating effects on the civilian population. When undertaking battle damage assessments, after-action reviews or other relevant operational review processes, especially in the absence of a dedicated civilian harm tracking mechanism, belligerents should ensure that these processes consider not only the effects of attacks on the intended target but also their potential direct and reverberating effects on civilians, including those resulting from damage to or destruction of civilian infrastructure.Footnote 102

In addition to informing tactical adjustments in the course of an operation, the outcomes from such assessments – whether conducted after a specific attack or as part of broader operational reviews – should feed into lessons learned processes in order to help identify systemic issues that may increase risks to civilians and civilian objects during the planning and conduct of operations.Footnote 103 If complemented by further analysis, these processes can help uncover underlying causes of misidentification or misclassification of civilian objects, as well as of inaccurate estimations of incidental harm, contributing to the further refinement of targeting procedures. Ideally, this process should also support institutional reforms aimed at addressing systemic issues that have caused or contributed to erroneous or inaccurate decisions.Footnote 104 States should review and update relevant policies to ensure that these assessments are conducted systematically and that adequate resources are allocated to them, including by ensuring adequate technical, analytical and contextual expertise as well as access to relevant data from both internal and credible external sources.

As part of broader lessons learned processes, States could consider the following measures to identify steps to strengthen the protection of civilian infrastructure in armed conflicts:

  • Systematically reviewing the relationship between expected and actual damage: Post-strike assessments should include comparisons between pre-strike proportionality analyses and the actual incidental damage incurred. This can help in identifying potential gaps in targeting procedures and opportunities to refine proportionality assessments or introduce additional precautionary measures to mitigate even further risks of unforeseen or excessive harm to civilian infrastructure.Footnote 105 Where significant discrepancies are identified, further analysis or investigations should be undertaken to determine whether mistakes have been made, including in the identification or classification of targeted objects or in the assessment of their civilian nature.Footnote 106

  • Conducting comprehensive incident reporting and operational reviews: Operational reviews and broader lessons learned exercises should include detailed examinations of specific incidents that resulted in damage to or destruction of civilian infrastructure. Such reviews can help in identifying measures to avoid or mitigate harm in future operations and can contribute to institutional learning. They may also improve the understanding of the full scope of civilian harm caused by military operations, informing the adjustment of targeting practices accordingly.Footnote 107 While these reviews should be undertaken as part of internal military processes and made publicly available whenever possible,Footnote 108 they can be complemented by commissioned or independent studies, including those conducted by international and non-governmental organizations.Footnote 109 Importantly, reviews should extend beyond immediate physical damage to encompass the reverberating effects of strikes impacting civilian infrastructure, feeding into the broader knowledge base and informing future operational planning and decision-making to prevent and mitigate these effects.

Conclusion

Strengthening the protection of civilian infrastructure is essential to prevent and mitigate civilian harm both during and after armed conflicts, especially as today’s hostilities become increasingly complex, protracted and urbanized. This article has argued that meaningfully protecting civilians from the full range of harms resulting from attacks affecting civilian infrastructure requires good-faith interpretation and implementation of relevant IHL principles and rules on the conduct of hostilities; in particular, the conducting of robust proportionality assessments and the adoption and rigorous application of precautionary measures are essential to avoiding or minimizing incidental civilian harm, including the increasingly foreseeable reverberating effects.

Crucially, effective responses to the multiple challenges of safeguarding civilian infrastructure in contemporary conflicts require States and their armed forces to adopt practical measures to facilitate compliance with, and strengthen the implementation of, IHL rules across all stages of military operations. Such measures can include making the protection of civilian infrastructure and the preservation of essential services an explicit policy and strategic priority, enhancing intelligence-gathering and analysis systems in order to better understand and account for risks to civilian infrastructure, adopting robust target development and engagement procedures, and establishing mechanisms to track, assess and analyze damage to civilian infrastructure and the resulting patterns of harm to civilians, including through post-strike operational reviews and other lessons learned processes.

Beyond legal and humanitarian considerations, enhancing the protection of civilian infrastructure during hostilities – including efforts to prevent and mitigate the reverberating effects that often result from its damage or destruction – is essential for long-term stability and the resumption of civilian life once hostilities cease, helping to create conditions that are more conducive to sustainable transitions to peace.

Footnotes

*

The author is writing in her personal capacity, and the thoughts and opinions expressed in this article do not necessarily reflect the views or opinions of the United Nations or of UNIDIR, its staff members or its sponsors. References to military doctrine and policy in this article rely exclusively on publicly available materials; while some of these documents may have since been updated, or their continued application may be uncertain in light of shifts in policy priorities, they are cited here for their enduring analytical relevance.

The advice, opinions and statements contained in this article are those of the author/s and do not necessarily reflect the views of the ICRC. The ICRC does not necessarily represent or endorse the accuracy or reliability of any advice, opinion, statement or other information provided in this article.

References

1 Report of the Secretary-General on the Protection of Civilians in Armed Conflict, UN Doc. S/2025/271, 15 May 2025 (UN PoC Report 2025), para. 9.

2 Under international humanitarian law (IHL), military objectives are defined as “those objects which by their nature, location, purpose or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage”: Protocol Additional (I) to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts, 1125 UNTS 3, 8 June 1977 (entered into force 7 December 1978) (AP I), Art. 52(2). See also Jean-Marie Henckaerts and Louise Doswald-Beck (eds), Customary International Humanitarian Law, Vol. 1: Rules, Cambridge University Press, Cambridge, 2005 (ICRC Customary Law Study), Rules 7–10, available at: https://ihl-databases.icrc.org/en/customary-ihl/rules (all internet references were accessed in February 2026).

3 ICRC, War in Cities: Preventing and Addressing the Humanitarian Consequences for Civilians, Geneva, 2023, p. 8, available at: www.icrc.org/en/publication/4701-war-cities-preventing-and-addressing-humanitarian-consequences-civilians.

4 ICRC, Explosive Weapons with Wide Area Effects: A Deadly Choice in Populated Areas, Geneva, January 2022 (ICRC EWIPA Report), available at: www.icrc.org/en/document/civilians-protected-against-explosive-weapons.

5 While not a legal term, the notion of reverberating effects – sometimes referred to as “indirect”, “cascading”, “knock-on” or “secondary or tertiary” effects – has become increasingly established as a factual concept to describe those effects that are not a direct result of an attack but are nevertheless a product thereof. In this article, the terms “reverberating” and “indirect” effects are used synonymously. See Michael N. Schmitt, “Wired Warfare: Computer Network Attack and Jus in Bello”, International Review of the Red Cross, Vol. 84, No. 846, 2002, p. 392. For an initial conceptualization of the notion of “reverberating effects” in relation to the use of explosive weapons in populated areas, see Christine Wille and John Borrie, Understanding the Reverberating Effects of Explosive Weapons: A Way Forward, United Nations Institute for Disarmament Research (UNIDIR), Geneva, 2016, available at: https://unidir.org/publication/understanding-the-reverberating-effects-of-explosive-weapons-a-way-forward.

6 Christina Wille and Alfredo Malaret Baldo, Reference Framework: Menu of Indicators to Measure the Reverberating Effects on Civilians of the Use of Explosive Weapons in Populated Areas, UNIDIR, Geneva, 2021, available at: https://unidir.org/publication/menu-of-indicators-to-measure-the-reverberating-effects-on-civilians-from-the-use-of-explosive-weapons-in-populated-areas; Alfredo Malaret Baldo and Francesca Batault, Second Menu of Indicators to Measure the Reverberating Effects on Civilians from the Use of Explosive Weapons in Populated Areas, UNIDIR, 2022, available at: https://unidir.org/publication/second-menu-of-indicators-to-measure-the-reverberating-effects-on-civilians-from-the-use-of-explosive-weapons-in-populated-areas; InterAction and Stanford Health Policy, Building the Evidence Base: Addressing the Reverberating Effects of Military Operations on Civilian Life, November 2020, available at: www.interaction.org/blog/building-the-evidence-base/.

7 See ICRC EWIPA Report, above note 4, p. 126.

8 See, for instance, Geneva Water Hub, Fully Foreseeable: The Reverberating Effects of Water and Health in Gaza, Geneva, April 2024, available at: www.genevawaterhub.org/resources/fully-foreseeable-reverberating-effects-water-and-health-gaza; Humanity and Inclusion, Death Sentence to Civilians: The Long-Term Impact of Explosive Weapons in Populated Areas in Yemen, May 2020, available at: www.humanity-inclusion.org.uk/en/news/new-report-on-yemen-and-explosive-weapons-a-death-sentence-for-civilians; Humanity and Inclusion, No Safe Recovery: The Impact of Explosive Ordnance Contamination on Affected Populations in Iraq, October 2021, available at: www.hi-us.org/en/news/no-safe-recovery-new-report-on-iraq-and-explosive-weapons; Humanity and Inclusion, Out of Reach: The Impact of Explosive Weapons in Ukraine – Focus on Hard-to-Reach Areas, 2024, available at: www.hi.org/sn_uploads/document/HI-Case-Study_Out-of-Reach-Ukraine_FINAL_Fev2024-V2_1.pdf; PAX, Uninhabitable? The Reverberating Public Health and Environmental Risks from the War in Gaza, Utrecht, December 2023, available at: https://paxforpeace.nl/publications/uninhabitable; United Nations Human Rights Monitoring Mission in Ukraine, Attacks on Ukraine’s Energy Infrastructure: Harm to the Civilian Population, September 2024, available at: https://ukraine.ohchr.org/en/Attacks-on-Ukraines-Energy-Infrastructure-Harm-to-the-Civilian-Population.

9 See the references cited in above note 8. Under IHL, “civilian objects” are defined in Article 52(1) of AP I as all those objects which are not military objectives, in accordance with the criteria set out in Article 52(2) of AP I. Civilian objects, including critical civilian infrastructure, may therefore lose their protection and become lawful military objectives if they fulfil the cumulative criteria specified in the provision (e.g. an attack on them must make “an effective contribution to military action” and their destruction or neutralization must offer a “definite military advantage” under the circumstances ruling at the time). In addition, some objects are afforded heightened or special protection, such as medical facilities, objects indispensable for the survival of the civilian population, works and installations containing dangerous forces, cultural property, and the natural environment. Even if these objects become military objectives, there are stringent limitations and restrictions on attacking them. See ICRC, International Humanitarian Law and the Challenges of Contemporary Armed Conflicts: Building a Culture of Compliance for IHL to Protect Humanity in Today’s and Future Conflicts, Geneva, September 2024 (ICRC Challenges Report 2024), pp. 41–42, available at: www.icrc.org/en/report/2024-icrc-report-ihl-challenges.

10 On the evolving understanding and multifaceted nature of civilian harm, see Erin Bijl, Welmoet Wels and Wilbert van der Zeijden (eds), On Civilian Harm: Examining the Complex Negative Effects of Violent Conflict on the Lives of Civilians, PAX, Utrecht, 2021, p. 33, available at: https://protectionofcivilians.org/on-civilian-harm: Erin Bijl and Katherine Kramer, “Toward a Shared Understanding of Civilian Harm”, InterAction Blog, 10 June 2021, available at: www.interaction.org/blog/toward-a-shared-understanding-of-civilian-harm; Loren Voss, “Why Can’t We Get Civilian Harm Right?” Stimson Center, 13 March 2024, available at: www.stimson.org/2024/why-cant-we-get-civilian-harm-right/; Joshua Joseph Niyo, “Beyond Compliance Symposium – Systemic Impacts of War in Protracted Conflicts”, Articles of War, 22 October 2024, available at: https://lieber.westpoint.edu/systemic-impacts-war-protracted-conflicts; Fionnuala Ní Aoláin, “Cumulative Civilian Harm in Gaza: A Gendered View”, Just Security, 25 June 2025, available at: www.justsecurity.org/115407/cumulative-civilian-harm-gaza-gendered-view.

11 Bárbara Morais Figueiredo, “Explosive Weapons and the 2030 Agenda: How the Use of Explosive Weapons in Populated Areas Undermines Sustainable Development”, Fragments: Explosive Weapons Monitor, Vol. 1, No. 2, 2023, available at: https://explosiveweaponsmonitor.org/fragments/vol/1/issue/2/article/explosive-weapons-and-the-2030-agenda.

12 Sahr Muhammedally, “Understanding Risks and Mitigating Civilian Harm in Urban Operations”, Canadian Army Journal, Vol. 21, No. 2, 2024, available at: www.canada.ca/en/army/services/canadian-army-journal/articles/2024/21-1-muhammedally-mitigating-civilian-harm.html.

13 ICRC Challenges Report 2024, above note 9, p. 83. See also Michael J. McNerney et al., Understanding Civilian Harm in Raqqa and Its Implications for Future Conflicts, RAND Corporation, Santa Monica, CA, March 2022, available at: www.rand.org/pubs/research_reports/RRA753-1.html; Benjamin Krick, Jonathan Petkun and Mara R. Revkin, “Civilian Harm and Military Legitimacy in War: Evidence from the Battle of Mosul”, International Organization, Vol. 79, No. 2, 2025, available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4633249.

14 See Geneva Academy of International Humanitarian Law and Human Rights (Geneva Academy), IHL in Focus: Annual Report – Assessing Compliance in Contemporary Armed Conflicts (July 2024–December 2025), January 2026, available at: https://geneva-academy.ch/wp-content/uploads/2026/01/WarWATCH-IHL-in-Focus-Report-2024-25.pdf; Geneva Academy, IHL in Focus: Annual Report – Assessing Compliance in Contemporary Armed Conflicts (July 2023–June 2024), February 2025, available at: https://resourcecentre.savethechildren.net/pdf/ihl-in-focus-annual-report-23-24.pdf; ICRC Challenges Report 2024, above note 9, pp. 7–8; Cordula Droege, “War and What We Make of the Law”, Just Security, 10 July 2024, available at: www.justsecurity.org/97582/war-law.

15 Political Declaration on Strengthening the Protection of Civilians from the Humanitarian Consequences Arising from the Use of Explosive Weapons in Populated Areas, 8 November 2022 (Political Declaration on EWIPA), available at: https://ewipa.org/the-political-declaration. For a list of States that have endorsed the Declaration, see: https://ewipa.org/endorsement.

16 Political Declaration on EWIPA, above note 15, chapeau to the operative section.

17 AP I, Art. 51(5)(b); ICRC Customary Law Study, above note 2, Rule 14.

18 On the different facets of the notion of “incidentality” and the importance of “incidental harm assessments” for strengthening the protection of civilians from the effects of hostilities, see Emanuela-Chiara Gillard, Proportionality in the Conduct of Hostilities: The Incidental Harm Side of Proportionality Assessments, Chatham House, London, 2018, p. 26, available at: www.chathamhouse.org/2018/12/proportionality-conduct-hostilities-incidental-harm-side-assessment. For debates regarding the value and meaning of the notion of “incidentality” of harm in the context of proportionality assessments, see Luigi Daniele, “Incidentality of the Civilian Harm in International Humanitarian Law and its Contra Legem Antonyms in Recent Discourses on the Laws of War”, Journal of Conflict and Security Law, Vol. 29, No. 1, 2024, available at: https://doi.org/10.1093/jcsl/krae004; Aurel Sari, “Indiscriminate Attacks and the Proportionality Rule: What Is Incidental Civilian Harm?”, Journal of Conflict and Security Law, Vol. 30, No. 2, 2025, available at: https://doi.org/10.1093/jcsl/kraf010.

19 In this context, the notion of “damage to civilian objects” should be understood to encompass the impacts on civilians of impairing the civilian function of objects that serve both military and civilian purposes – often referred to as “dual-use” objects – as well as loss of functionality and environmental damage. See ICRC EWIPA Report, above note 4, p. 100; UN PoC Report 2025, above note 1, para. 59.

20 Isabel Robinson and Ellen Nohle, “Proportionality and Precautions in Attack: The Reverberating Effects of Using Explosive Weapons in Populated Areas”, International Review of the Red Cross, Vol. 98, No. 901, 2016, p. 114. See also ICRC and Université Laval, The Principle of Proportionality in the Rules Governing the Conduct of Hostilities under International Humanitarian Law: Report of the International Expert Meeting, Quebec, 22–23 June 2016, 2018, pp. 43–45, available at: www.icrc.org/en/document/international-expert-meeting-report-principle-proportionality; International Law Association Study Group on the Conduct of Hostilities in the 21st Century (ILA Study Group), “The Conduct of Hostilities and International Humanitarian Law: Challenges of 21st Century Warfare”, International Law Studies, Vol. 93, 2017, pp. 352–353, available at: https://digital-commons.usnwc.edu/ils/vol93/iss1/12 (“The [Study Group] agreed that foreseeability is the relevant criterion and that accordingly there is an obligation to take into account all indirect harm that can reasonably be foreseen by a reasonably well informed person”); Ian Henderson and Kate Reece, “Proportionality under International Humanitarian Law: The ‘Reasonable Military Commander’ Standard and Reverberating Effects”, Vanderbilt Journal of Transnational Law, Vol. 51, No. 3, 2018, pp. 851–856, available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3108324. The importance of considering the reverberating effects of an attack during proportionality assessments has also been increasingly discussed in the context of operations in the cyber and outer space domains given the predominantly dual-use nature of infrastructure in these domains. See Michael N. Schmitt (ed.), Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations, 2nd ed., Cambridge University Press, Cambridge, 2017, Rule 113 commentary, p. 472; Cordula Droege, “Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians”, International Review of the Red Cross, Vol. 94, No. 886, 2012, pp. 572–573; Dale Stephens and Cassandra Steer, “Conflicts in Space: International Humanitarian Law and Its Application to Space Warfare”, McGill Annals of Air and Space Law, Vol. 40, 2016, p. 19, available at: https://researchportalplus.anu.edu.au/en/publications/conflicts-in-space-international-humanitarian-law-and-its-applica; Wen Zhou, “War, Law and Outer Space: Pathways to Reduce the Human Cost of Military Operations Space Operations”, Humanitarian Law and Policy Blog, 13 August 2023, available at: https://blogs.icrc.org/law-and-policy/2023/08/15/war-law-outer-space-reduce-human-cost-of-military-space-operations/.

21 “Foreseeability” and causality are typically considered the determinative criteria in informing which effects must be taken into account during proportionality assessments. While time and space considerations may affect the likelihood of the harm occurring and hence the weight to be assigned to it, they are not typically seen as determinative for the purposes of proportionality analyses. See E.-C. Gillard, above note 18, pp. 18–19, paras 61–64; ICRC and Université Laval, above note 20, p. 46; ICRC EWIPA Report, above note 4, p. 128.

22 E.-C. Gillard, above note 18, p. 26.

23 On contextual factors which may influence what can be deemed reasonably foreseeable in the context of proportionality assessments, see I. Robinson and E. Nohle, above note 20, p. 25. See also ICRC, Preventing and Mitigating the Indirect Effects on Essential Services from the Use of Explosive Weapons in Populated Areas: ICRC Recommendations, Geneva, June 2024, p. 16, para. 2.3, available at: www.icrc.org/en/publication/preventing-and-mitigating-indirect-effects-essential-services-use-explosive-weapons.

24 Mark Zeitoun and Michael Talhami, “The Impact of Explosive Weapons on Urban Services: Direct and Reverberating Effects across Space and Time”, International Review of the Red Cross, Vol. 98, No. 901, 2016, p. 58, available at: https://international-review.icrc.org/articles/impact-explosive-weapons-urban-services-direct-and-reverberating-effects-across-space-and; Mark Zeitoun and Michael Talhami, “The Impact of Attacks on Urban Services II: Reverberating Effects of Damage to Water and Wastewater Systems on Infectious Disease”, International Review of the Red Cross, Vol. 102, No. 915, 2022, available at: https://international-review.icrc.org/articles/impact-of-attacks-on-urban-services-ii-damage-to-wastewater-systems-infectious-disease-915.

25 ICRC, International Humanitarian Law and the Challenges of Contemporary Armed Conflicts: Recommitting to Protection in Armed Conflict on the 70th Anniversary of the Geneva Conventions, 2019 (ICRC Challenges Report 2019), p. 18. See also Machiko Kanetake, “The Hawija Airstrike: Reverberating Effects on Civilians under International Humanitarian Law”, Leiden Journal of International Law, Vol. 35, No. 4, 2022, p. 742, available at: https://tinyurl.com/mr2zr3sr.

26 A prominent example is the targeting of electricity-generating facilities during the 1990–91 Gulf War and its severe and long-lasting effects on the civilian population. The lessons from that campaign are likely to have influenced targeting and weaponeering practices adopted by the US-led coalition during the 2003 Gulf War, including the choice to target switching stations instead of power stations in order to mitigate the impacts of such attacks on civilians. See ICRC and Université Laval, above note 20, p. 48. See also Robert Kolb, “Indirect or Reverberating Excessive Collateral Damage in Modern IHL”, Articles of War, 13 August 2025, available at: https://lieber.westpoint.edu/indirect-reverberating-excessive-collateral-damage-modern-ihl/.

27 Political Declaration on EWIPA, above note 15, para. 3.4.

28 Ibid., paras 1.3–1.6.

29 See also Report of the Secretary-General on the Protection of Civilians in Armed Conflict, UN Doc. S/2024/395, 14 May 2024 (UN PoC Report 2024), para. 64.

30 While precautions against the effects of attacks – such as those outlined in Article 58 of AP I and Rule 22 of the ICRC Customary Law Study, above note 2 – are essential to the protection of civilian infrastructure during hostilities, this article focuses on precautions from the point of view of the attacking party (i.e., precautions in attack), with a particular focus on active rather than passive measures.

31 AP I, Art. 57; ICRC Customary Law Study, above note 2, Rule 15.

32 Yves Sandoz, Christophe Swinarski and Bruno Zimmerman (eds), Commentary on the Additional Protocols, ICRC, Geneva, 1987 (ICRC Commentary on the APs), para. 2190, available at: https://ihl-databases.icrc.org/en/ihl-treaties/api-1977/article-57/commentary/1987 (“It is clear that the precautions prescribed here will be of greatest importance in urban areas because such areas are most densely populated”).

33 AP I, Art. 57(2)(a)(i); ICRC Customary Law Study, above note 2, Rule 16; ICRC Commentary on the APs, above note 32, paras 2194–2195. See also ILA Study Group, above note 20, pp. 382–383.

34 AP I, Art. 57(2)(a)(ii); ICRC Customary Law Study, above note 2, Rule 17.

35 AP I, Art. 57(2)(a)(iii); ICRC Customary Law Study, above note 2, Rule 18. See also Harvard Program on Humanitarian Policy and Conflict Research (HPCR) Group of Experts, Drafting Committee, Commentary to the HPCR Manual on International Law Applicable to Air and Missile Warfare, Cambridge University Press, Cambridge, 2013 (HPCR Manual Commentary), Rule 32(c), pp. 143–145. On the importance of this precautionary measure in operationalizing proportionality and providing a “reliable measure of good-faith decision-making in warfare”, see Geoffrey S. Corn, “Proportionality: Can’t Live With It But Can’t Live Without It”, International Law Studies, Vol. 106, 2025, pp. 523–524, available at: https://digital-commons.usnwc.edu/ils/vol106/iss1/16. See also John Cherry, Kieran Tinkler and Michael N. Schmitt, “Avoiding Collateral Damage on the Battlefield”, Just Security, 11 February 2021, available at: www.justsecurity.org/74619/avoiding-collateral-damage-on-the-battlefield/.

36 On the various factors that must be taken into consideration whenever an attack may have incidental effects on persons and objects, see ICRC Commentary on the APs, above note 32, paras 2212–2213. For specific considerations on information collection requirements in the context of urban warfare, see also Jonathan Horowitz, “Joint Blog Series: Precautionary Measures in Urban Warfare: A Commander’s Obligation to Obtain Information”, Humanitarian Law and Policy Blog, 10 January 2019, available at: https://blogs.icrc.org/law-and-policy/2019/01/10/joint-blog-series-precautionary-measures-urban-warfare-commander-s-obligation-obtain-information; ICRC EWIPA Report, above note 4, p. 98; ICRC, International Humanitarian Law and the Challenges of Contemporary Armed Conflicts, Geneva, 2015, p. 52.

37 ICRC EWIPA Report, above note 4; ICRC Challenges Report 2024, above note 9.

38 ICRC Challenges Report 2019, above note 25, p. 17; I. Robinson and E. Nohle, above note 20, p. 134. On the notion of feasibility as a qualifier to the obligation to implement precautions in the attack, see also ILA Study Group, above note 20, pp. 373–374. On the importance of tailoring precautionary measures to specific operational contexts and the risks of relying on a “cut-and-paste” approach to their implementation, see Larry Lewis, “Israeli Civilian Harm Mitigation in Gaza: Gold Standard or Fool’s Gold?”, Just Security, 12 March 2024, available at: www.justsecurity.org/93105/israeli-civilian-harm-mitigation-in-gaza-gold-standard-or-fools-gold/.

39 AP I, Art. 57(2)(b); ICRC Customary Law Study, above note 2, Rule 19.

40 Center for Civilians in Conflict (CIVIC), Protection of Civilian Objects Including Critical Infrastructure in U.S. Military Operations: NGO Recommendations for DoD Policy on Civilian Harm, November 2019, p. 3, available at: www.interaction.org/wp-content/uploads/2020/03/1-Final-2020-02-03-NGO-recommendations-on-Civilian-Objects-for-DoD-Policy-Nov-2019-1.pdf

41 See also ICRC, Reducing Civilian Harm in Urban Warfare: A Commander’s Handbook, Geneva, 2021, pp. 35–36, available at: www.icrc.org/en/document/reducing-civilian-harm-urban-warfare-commanders-handbook.

42 CIVIC, above note 40, p. 3. See also M. J. McNerney et al., above note 13, p. 95 (“if military commanders express preservation of infrastructure in their intent, then staffs and targeting planners will execute that intent”); Michael J. McNerney and Matthew Isler, “Operational Effectiveness and Civilian Harm Mitigation by Design”, Military Review, Online Exclusive Article, January 2025, available at: www.armyupress.army.mil/journals/military-review/online-exclusive/2025-ole/operational-effectiveness.

43 For instance, intelligence collection resources are typically allocated based on the commander’s priorities, which may be defined through the commander’s critical information requirements, or CCIRs. However, civilian objects and other elements of the civilian environment are rarely incorporated into these requirements. See Loren Voss, “The Overlooked Importance of Intelligence Analysis in IHL”, International Review of the Red Cross, Vol. 107, No. 928, 2025, p. 289, available at: https://international-review.icrc.org/articles/the-overlooked-importance-of-intelligence-analysis-in-ihl-928.

44 CIVIC, above note 40, pp. 3–4. See also E.-C. Gillard, above note 18, pp. 46–50.

45 The “civilian environment” can be defined as “[t]he component of the operational environment encompassing the civilian population and the components, conditions, and factors that sustain it”. Enhancing understanding of the civilian environment – moving beyond a two-dimensional approach to constructing the operational environment focused solely on threats and friendly forces – is key to anticipating and mitigating risks to civilians and civilian objects during military operations. See Larry Lewis, Sabrina Verleysen, Samuel Plapinger and Marla Keenan, Preparing for Civilian Harm Mitigation and Response in Large-Scale Combat Operations, Center for Naval Analyses, Arlington, VA, August 2024, pp. 31–33, available at: www.cna.org/analyses/2024/08/preparing-for-civilian-harm-mitigation-and-response-in-large-scale-combat-operations.

46 This is reflected in the Joint Targeting Doctrine of the North Atlantic Treaty Organization (NATO), which explicitly requires that “[t]he greater the complexity of a target, its elements or proximity to civilian structures and critical infrastructure, the greater the requirement for time and intelligence collection resources”. See NATO, Allied Joint Doctrine for Joint Targeting, AJP-3.9, Edition B, Version 1, November 2021 (NATO Joint Targeting Doctrine), § 2.3.1., available at: https://assets.publishing.service.gov.uk/media/618e7da28fa8f5037ffaa03f/AJP-3.9_EDB_V1_E.pdf. Recognizing the challenges involved in assessing second- and third-order effects of attacks, the US Air Force Doctrine on Targeting emphasizes that collection requirements are essential for accurately assessing intended effects. See US Air Force, Targeting, AFDP 3-60, 12 November 2021 (US Air Force Doctrine on Targeting), pp. 46–47.

47 L. Voss, above note 43, pp. 292–294; Nathalie Durhin, “Protecting Civilians in Urban Areas: A Military Perspective on the Application of International Humanitarian Law”, International Review of the Red Cross, Vol. 98, No. 901, 2016, pp. 189–190, available at: https://tinyurl.com/ykz9dcvb.

48 ICRC EWIPA Report, above note 4, p. 147.

49 E.-C. Gillard, above note 18, p. 74; CIVIC, above note 40, pp. 3–4.

50 For instance, NATO’s Protection of Civilians Handbook emphasizes that the targeting process “should include legal and engineering considerations and take into account second and third order effects that can negatively affect the civilian population for a longer time, such as impacts to the natural environment as well as to … civilian services and infrastructure”. NATO, Protection of Civilians: Allied Command Operation Handbook, March 2021, p. 25, available at: https://shape.nato.int/news-archive/2021/the-protection-of-civilians-allied-command-operations-handbook. See also ICRC, Preventing and Mitigating the Indirect Effects on Essential Services from the Use of Explosive Weapons in Populated Area: Report of the Expert Meeting, 3, 5 and 9 October 2023, Geneva, April 2024, p. 18, available at: www.icrc.org/en/publication/icrc-expert-meeting-preventing-and-mitigating-indirect-effects-essential-services-use.

51 For instance, NATO’s civil–military cooperation (CIMIC) doctrine, as updated in 2025, describes CIMIC’s staff role in assisting with the identification of key civilian infrastructure within the area of operations, including in the development of no-strike lists. See NATO, Allied Joint Doctrine for Civil-Military Cooperation, AJP-3.19, Edition B, Version 1, June 2025, p. 28, available at: https://assets.publishing.service.gov.uk/media/685a8bdce9509f1a908eb108/AJP_3_19_EdB_CIMIC.pdf.

52 See, for instance, Bárbara Morais Figueiredo and Larry Lewis, Leveraging Data to Reduce Civilian Harm during Military Operations in Populated Areas: Practical, Data-Driven Steps to Implement the Political Declaration on EWIPA, UNIDIR, Geneva, November 2025, pp. 36–37, available at: https://unidir.org/publication/leveraging-data-to-reduce-civilian-harm-during-military-operations-in-populated-areas-practical-data-driven-steps-to-implement-the-political-declaration-on-explosive-weapons-in-populated-areas. See also CIVIC, above note 40, p. 3.

53 On the importance of intelligence collection and analysis throughout the targeting cycle, particularly on requirements to ensure compliance with IHL rules on the conduct of hostilities, see L. Voss, above note 43.

54 L. Lewis et al., above note 45, p. 39.

55 For instance, under the US Air Force Doctrine on Targeting, above note 46, “no-strike” entities or objects are those characterized as protected from the effects of military operations under international law or the applicable ROE, while “restricted” entities or objects are defined as valid targets that have specific restrictions placed on the actions authorized against them due to operational considerations.

56 As recognized in French military doctrine, “[t]he risk of attacks directed at protected objects can be significantly lowered by establishing, prior to the targeting process, a No-Strike List (NSL) which contains civilian entities (with their location and function) protected under IHL or representing prohibited targets under applicable ROE or policy reasons.” See French Ministry of the Armed Forces, Manuel de droit des opérations militaires, 2022 (French Military Manual), p. 211, available at: www.defense.gouv.fr/sga/au-service-armees/droit-defense/droit-conflits-armes.

57 On the importance of ensuring that methodologies for developing these lists adequately consider the potential reverberating effects of damage to or destruction of civilian infrastructure in order to afford more meaningful protection to civilians from the effects of hostilities, see InterAction and Stanford Health Policy, above note 6, p. 10.

58 For instance, humanitarian notification systems are complementary mechanisms that allow humanitarian organizations to inform parties to a conflict of the location of civilian objects serving a humanitarian function, helping to enhance the safety of notified objects. In addition, civil–military coordination mechanisms can facilitate input from external organizations regarding specially protected objects. See United Nations Office for the Coordination of Humanitarian Affairs (OCHA), UN-CMCoord Handbook, Version 2.1, July 2025, pp. 147–158, available at: www.unocha.org/publications/report/world/un-cmcoord-handbook-version-21-2025. See also Larry Lewis, Improving Protection of Humanitarian Organizations in Armed Conflict, Center for Naval Analyses, Arlington, VA, March 2022, available at: www.cna.org/reports/2022/03/Improving-Protection-of-Humanitarian-Organizations-in-Armed-Conflict.pdf.

59 ICRC, above note 23, p. 16, para. 2.3. For instance, the NATO Joint Doctrine for Targeting, above note 46, outlines specific procedures for managing RTLs and NSLs. According to these procedures, when the Commander Joint Task Force requests to engage targets on the RTL, remove an entity from the NSL or engage a target outside the approved target sets, Supreme Headquarters Allied Powers Europe (SHAPE) will convene a meeting of the Strategic Targeting Board, which is responsible for approving all target nominations for a Target Clearance Board (pp. 3.1–3.2). The lists and criteria for amendments are developed by SHAPE (p. 4-1), while the Joint Targeting Coordination Board is responsible for maintaining them (p. 4-8).

60 According to French military doctrine, the removal of certain entities from RTLs may be determined by their pre-assigned CDE level. For instance, dual-use entities, typically classified as “CDE5” due to their civilian functions, require approval from the strategic level of command before being removed from the NSL. This reflects a heightened level of scrutiny for engaging objects whose damage or destruction is expected to have significant impacts on civilians. See French Military Manual, above note 56, p. 211 fn. 722.

61 Roger Lane, Larry Lewis and Himayu Shiotani, Opportunities to Improve Military Policies and Practices to Reduce Civilian Harm from Explosive Weapons in Urban Conflict, UNIDIR Options Paper, Geneva, 2019, p. 16, available at: https://unidir.org/publication/opportunities-to-improve-military-policies-and-practices-to-reduce-civilian-harm-from-explosive-weapons-in-urban-conflict. See also Sahr Muhammedally, A Primer on Civilian Harm Mitigation in Urban Operations, CIVIC, Washington, DC, November 2022, pp. 30–31, available at: https://civiliansinconflict.org/wp-content/uploads/dlm_uploads/2022/11/CIVIC_UrbanWar_FINAL-2022_Web-1.pdf

62 See HPCR Manual Commentary, above note 35, Rule 32(a), pp. 143–145; Roger Lane and Himayu Shiotani, Opportunities to Strengthen Military Policies and Practices to Reduce Civilian Harm from Explosive Weapons, UNIDIR Food-for-Thought Paper, Geneva, September 2019, p. 22, available at: https://unidir.org/publication/opportunities-to-strengthen-military-policies-and-practices-to-reduce-civilian-harm-from-explosive-weapons.

63 ICRC, above note 41, p. 20.

64 See Gregory S. McNeal, “Targeted Killing and Accountability”, Georgetown Law Journal, Vol. 102, 2014, p. 738, available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=1819583 (“‘failed positive identification’” is the leading cause of harm to civilians in U.S. military operations that employed the Collateral Damage Methodology”). See also Oona A. Hathaway and Azmat Khan, “Mistakes in War”, University of Pennsylvania Law Review, Vol. 173, No. 1, 2024, pp. 39–41, available at: https://scholarship.law.upenn.edu/penn_law_review/vol173/iss1/1.

65 On the importance of assessing the accuracy and reliability of intelligence in managing risks to civilians and civilian objects during hostilities, see R. Lane and H. Shiotani, above note 62, p. 23. For instance, the US Air Force Doctrine on Targeting, above note 46, highlights the importance of target vetting processes that assess the accuracy of the intelligence used to develop the target (p. 44).

66 L. Voss, above note 43, pp. 303–304. This practice is also put forward in the US Department of Defense (DoD) Law of War Manual, which requires belligerents to review “previously approved targets at reasonable intervals as well as when warranted in light of fresh information and changing circumstances, e.g. to ascertain whether enemy forces continue to use the object for military purposes or whether the object’s destruction or neutralization continues to offer a definite military advantage”. DoD, Department of Defense Law of War Manual, Office of General Counsel, June 2015 (updated July 2023), § 5.5.3.

67 Proportionality assessments – which require balancing dissimilar values of “expected incidental harm” and “definite military advantage” – remain essentially qualitative and contextual value-based judgements that should be made in good faith by a “reasonable commander”. Therefore, while CDEM tools can support them, they should not displace human judgement. See ICRC EWIPA Report, above note 4, pp. 128–130; E.-C. Gillard, above note 18, p. 25. The Danish military manual considers that objects can be weighed differently during CDE processes, depending on their importance for the civilian population. See Danish Ministry of Defence, Military Manual on International Law Relevant to Danish Armed Forces in International Operations, 2016, p. 314 (“An overriding presumption is that, protected human lives will be accorded greater importance than protected objects in the CDE. It cannot be ruled out that, in some situations, certain protected objects or an accumulation of protected objects should be accorded the same weight as or even greater weight than a protected human life. Objects can be weighted differently, depending on their importance”).

68 L. Voss, above note 43, p. 305. These concerns may be exacerbated with the increasing integration of artificial intelligence (AI) decision support systems in targeting processes, as well as in the context of large-scale combat operations. See Jessica Dorsey and Marta Bo, “AI-Enabled Decision-Support Systems in the Joint Targeting Cycle: Legal Challenges, Risks, and the Human(e) Dimension”, International Law Studies, Vol. 106, 2025, available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5327115; Abby Zeith and Lakmini Leneviratne, “Reducing the Human Cost of Large-Scale Military Operations”, 10 February 2025, available at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=5172527.

69 ICRC EWIPA Report, above note 4, p. 130; J. Dorsey and M. Bo, above note 68, p. 10.

70 See ICRC EWIPA Report, above note 4, p. 130; see also J. Dorsey and M. Bo, above note 68, p. 10. On the additional limitations of CDEMs in accurately anticipating incidental harm to civilians and civilian objects, particularly during military operations in urban areas, see S. Muhammedally, above note 61, pp. 29–30; R. Lane and H. Shiotani, above note 62, p. 26.

71 For instance, the CDEM developed by the United States has been adopted by many NATO States and is used in NATO-led combat operations. See Oona A. Hathaway, Azmat Khan and Mara Revkin, “The Dangerous Rise of Dual-Use Objects in War”, Yale Law Journal, Vol. 134, July 2025, p. 95, available at: https://yalelawjournal.org/article/the-dangerous-rise-of-dual-use-objects-in-war.

72 French military doctrine links each CDE level to a specific TEA, with higher levels of expected collateral damage typically requiring higher approval authorities. See French Military Manual, above note 56, p. 211.

73 For instance, US DoD Instruction 3000.17 on civilian harm mitigation and response foresees the incorporation of “red teaming” techniques into targeting processes in order to reduce potential cognitive bias. Red teaming typically involves using an independent group (or “red team”) to challenge assumptions, plans and decisions from the perspective of an adversary or from alternative viewpoints. It is often used by armed forces to support both operational planning – including through training and wargaming – and decision-making. While red teaming is traditionally seen as a tool for enhancing operational effectiveness, it also holds significant potential for identifying measures to prevent and reduce risks to civilians and civilian objects during hostilities. See DoD, Civilian Harm Mitigation and Response, Instruction 3000.17, December 2023, p. 26, available at: www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/300017p.pdf. See also Marc Garlasco, “Defense Department Finally Prioritizes Civilians in Conflict”, Lawfare, 29 August 2022, available at: www.lawfaremedia.org/article/defense-department-finally-prioritizes-civilians-conflict.

74 ICRC, Preventing Civilian Harm in Partnered Military Operations: A Commander’s Handbook, Geneva, 2022, p. 25, available at: www.icrc.org/en/document/preventing-civilian-harm-partnered-military-operations-commanders-handbook. See also French Military Manual, above note 56, p. 214; New Zealand Defence Force (NZDF), New Zealand Defence Force Response to Civilian Harm, Defence Force Order 35, Version 1.01, Chief of Defence Force, Headquarters New Zealand Defence Force, 21 January 2021, available at: www.nzdf.mil.nz/assets/Uploads/DocumentLibrary/dfo_35.pdf.

75 For an overview of several tools, methods and approaches used by different international and non-governmental organizations as well as examples of studies documenting the reverberating effects of attacks against different types of civilian infrastructure, see Bárbara Morais Figueiredo and Katherine Young, Understanding Civilian Harm from the Indirect or Reverberating Effects of the Use of Explosive Weapons in Populated Areas: Strengthening Data Collection to Implement the Political Declaration, UNIDIR and Explosive Weapons Monitor, Geneva, October 2024, available at: https://unidir.org/publication/understanding-civilian-harm-from-the-indirect-or-reverberating-effects-of-the-use-of-explosive-weapons-in-populated-areas-strengthening-data-collection-to-implement-the-political-declaration. See also InterAction and Stanford Health Policy, above note 6.

76 Many tools currently being developed rely on AI-based decision support systems, which are increasingly used to support human decision-makers in CDE processes. Although CDEMs are largely classified, they are known to incorporate computer-assisted modelling and may already benefit from machine learning techniques. However, if the machine learning models used in CDEMs fail to address biases in training data, for instance, they could misidentify civilians as combatants or civilian objects as military objectives. This could lead to erroneous targeting as well as to underestimations of incidental harm, increasing the risks to civilians and civilian infrastructure. See Nema Milaninia, “Biases in Machine Learning Models and Big Data Analytics: The International Criminal and Humanitarian Law Implications”, International Review of the Red Cross, Vol. 102, No. 913, 2021, pp. 219–220, available at: https://international-review.icrc.org/articles/biases-machine-learning-big-data-analytics-ihl-implications-913. For an overview of how AI decision support systems may support various military tasks, see Arthur Holland Michel, Decisions, Decisions, Decisions: Computation and Artificial Intelligence in Military Decision-Making, ICRC, Geneva, May 2024, pp. 55–59, available at: www.icrc.org/en/publication/decisions-decisions-decisions-computation-and-artificial-intelligence-military-decision; Sarah Grand-Clément. Artificial Intelligence Beyond Weapons: Application and Impact of AI in the Military Domain, UNIDIR, Geneva, October 2023, p. 13, available at: https://unidir.org/publication/artificial-intelligence-beyond-weapons-application-and-impact-of-ai-in-the-military-domain

77 Means and methods of warfare include weapons, weapons systems and munitions, as well as tactics (such as timing, angle and altitude of attack). See HCPR Manual Commentary, above note 35, Rule 32(c)(2), p. 145.

78 This requires a detailed understanding of the technical characteristics of weapon systems, munitions and the planned circumstances of their use, including the nature of the intended target and its surrounding environment. I. Robinson and E. Nohle, above note 20, p. 140; N. Durhin, above note 47, p. 187.

79 ICRC, above note 50, p. 34. See also ICRC Challenges Report 2019, above note 25, p. 18.

80 On the use and technical characteristics of explosive weapons in populated areas, see Armament Research Services and ICRC, Explosive Weapons in Populated Areas: Technical Considerations Relevant to their Use and Effects, Geneva, May 2016, available at: www.icrc.org/en/document/explosive-weapons-populated-areas-use-effects.

81 HPCR Manual Commentary, above note 35, Rule 32(b)(4), pp. 145–146, para. 6.

82 For instance, the US Air Force Doctrine on Targeting, above note 46, emphasizes the importance of taking into account the civilian function of dual-use objects as well as reconstruction and stabilization implications when considering strikes against such objects, as well as of adjusting weaponeering procedures accordingly: “If an attack is directed against [a] dual-use object, [which] might be a legitimate military objective (in the legal sense), but also serve a legitimate civilian need (e.g., electrical power or telecommunications), then this factor should be carefully balanced against the concrete and direct military advantage when making a weapons selection, as must reconstruction and stabilization considerations following the end of hostilities” (p. 52).

83 ILA Study Group, above note 20, pp. 383–384.

84 For example, the African Union Mission in Somalia adopted a specific policy restricting the use of indirect fire in order to minimize civilian harm during its operations in Somalia. The policy included the creation of “no-fire zones” around hospitals, schools, residential areas, markets, places of religious worship and internally displaced persons’ camps. The policy also established different TEA levels for the authorization of the use of specific weapons in urban areas, based on assessed risks to civilians and civilian objects. See OCHA, Compilation of Military Policy and Practice: Reducing the Humanitarian Impact of the Use of Explosive Weapons in Populated Areas, New York, October 2017, pp. 25–31, available at: www.unocha.org/publications/report/world/compilation-military-policy-and-practice-reducing-humanitarian-impact-use-explosive.

85 Political Declaration on EWIPA, above note 15, preambular para. 1.8 and op. paras 4.2–4.3. See also B. Morais Figueiredo and L. Lewis, above note 52, pp. 9–12.

86 On recommendations for implementing commitments of the Political Declaration on EWIPA, particularly regarding data collection, consideration of direct and indirect effects, and the development of relevant tools and processes, see Simon Bagshaw, Implementing the Political Declaration on the Use of Explosive Weapons in Populated Areas: Key Areas and Implementing Actions, Article 36 Policy Briefing, Exeter, November 2022, pp. 5–8, available at: https://article36.org/updates/publication/implementing-the-political-declaration-on-the-use-of-explosive-weapons-in-populated-areas-key-areas-and-implementing-actions; Human Rights Watch, Safeguarding Civilians: A Humanitarian Interpretation of the Political Declaration on the Use of Explosive Weapons in Populated Areas, Background Briefing, London, October 2022, pp. 13–17, available at: www.hrw.org/news/2022/10/26/safeguarding-civilians; CIVIC, Limiting the Humanitarian Consequences from the Use of Explosive Weapons in Populated Areas: Next Steps in Implementation of the Political Declaration, CIVIC Implementation Brief, Washington, DC, November 2022, pp. 5–7, available at: https://civiliansinconflict.org/implementation-brief-political-declaration-on-the-use-of-explosive-weapons-in-populated-areas.

87 The Declaration foresees a both substantive and procedural framework to advance action at the international and national levels and promote exchanges of good policies and practices. In line with paragraph 4.7, the collaborative follow-up implementation process should consist of regular meetings among endorser States to review implementation and identify any additional measures that may need to be taken, including exchanges and compilation of good policies and practices, as well as structured intergovernmental and military-to-military exchanges. See Political Declaration on EWIPA, above note 15, para. 4.7.

88 Megan Karlshoej-Pedersen, Tracking Civilian Harm from the Use of Explosive Weapons in Populated Areas, Article 36 Policy Briefing, May 2025, p. 2 (emphasis added), available at: https://article36.org/wp-content/uploads/2025/07/Tracking-civilian-harm-from-use-of-EWIPA.pdf.

89 Ibid., p. 2. See also Every Casualty Counts et al., “Definition of Terms: Casualty Recording, Casualty Tracking, Casualty Estimation”, August 2024, available at: https://everycasualty.org/casualty-recording-casualty-tracking-whats-the-difference; Erin Bijl, Literature Review: Civilian Harm Tracking Tools and Investigation Mechanisms, PAX, Utrecht, April 2020, available at: https://protectionofcivilians.org/report/literature-review-civilian-harm-tracking-tools-investigation-mechanisms; Erin Bijl, Civilian Harm Tracking and Investigation, PAX Discussion Paper, Utrecht, July 2020, available at: https://protectionofcivilians.org/report/civilian-harm-tracking-and-investigation.

90 A few States and multinational forces have implemented such mechanisms. Their establishment has also been consistently recommended by several international and non-governmental organizations, including by the UN Secretary-General in his annual reports on the protection of civilians in armed conflict. See UN PoC Report 2024, above note 29, para. 64(e); Report of the Secretary-General on the Protection of Civilians in Armed Conflict, UN Doc. S/2022/381, 10 May 2022, para. 88(b); Report of the Secretary-General on the Protection of Civilians in Armed Conflict, UN Doc. S/2020/366, 6 May 2020, para. 62(d). See also Sahr Muhammedally, “Minimizing Civilian Harm in Populated Areas: Lessons from Examining ISAF and AMISOM Policies”, International Review of the Red Cross, Vol. 98, No. 901, 2016, available at: https://international-review.icrc.org/articles/minimizing-civilian-harm-populated-areas-lessons-examining-isaf-and-amisom-policies.

91 For instance, reports of damage to civilian objects have been notably absent from monthly and quarterly civilian casualty reports issued by US Central Command (CENTCOM) and US Africa Command (AFRICOM). Typically, allegations of damage to civilian infrastructure are not included in these reports unless they are accompanied by confirmed or alleged civilian casualties; such gaps in reporting may limit transparency and accountability and hinder a more accurate understanding of the full range of impacts from these operations on civilians. For AFRICOM, see the Civilian Casualty Assessment Reports found on the AFRICOM web page “What We Do: Civilian Harm Report”, available at: www.africom.mil/what-we-do/airstrikes/civilian-harm-report. For AFRICOM and CENTCOM, see DoD, Annual Report on Civilian Casualties in Connection with United States Military Operations in 2024, Washington, DC, July 2025 (DoD Report 2024), available at: https://tinyurl.com/mrhv588e; DoD, Annual Report on Civilian Casualties in Connection with United States Military Operations in 2023, Washington, DC, December 2024, available at: https://tinyurl.com/3uryhhy3. See also Steven Katz, “Toward a True Account of Collateral Damage in U.S. Military Operations”, Just Security, 23 June 2021, available at: www.justsecurity.org/77043/toward-a-true-account-of-collateral-damage-in-u-s-military-operations.

92 For instance, UNIDIR has developed tools to support the documentation and assessment of the reverberating effects of the use of explosive weapons in populated areas on civilians, particularly those resulting from damage to or destruction of civilian infrastructure. The tools present a standardized set of indicators to help measure these impacts across a range of areas, such as the infrastructure of cities and communities, health, education, water, sanitation and hygiene, food security, environmental degradation, and economic opportunity. Each focus area includes specific quantitative indicators, which are organized into first-, second- and third-level impacts. This three-tiered “impact chain” is designed to illustrate the sequence of how damage to or destruction of civilian infrastructure (first-level impacts) can cause disruptions to key services (second-level impacts), which in turn have implications for civilian survival and well-being (third-level impacts) across time and space. Within this framework, the second- and third-level impacts are considered as “reverberating effects” – those that result from the direct effects, e.g. infrastructure damage or destruction. Each indicator is also accompanied by a corresponding computation method. See C. Wille and A. Malaret Baldo, above note 6; A. Malaret Baldo and F. Batault, above note 6. See also CIVIC, above note 40, p. 6; O. A. Hathaway, A. Khan and M. Revkin, above note 71, p. 81.

93 See ICRC EWIPA Report, above note 4, Recommendations 11, 17, pp. 146, 148. For instance, the US DoD methodology for civilian harm assessment and investigations, as established through DoD Instruction 3000.17, acknowledges the value of information obtained from credible external sources and third-party organizations in strengthening civilian harm assessments: see DoD, above note 73, p. 32. Similarly, New Zealand’s Defence Order 35 recognizes that international and non-governmental organizations hold valuable information regarding civilian harm, which may also help mitigate risks of target misidentification. On this basis, following operations, it requires the NZDF to “actively source and routinely evaluate external reports of civilian harm arising in its area of operation(s) to ensure NZDF is not unknowingly undercounting and failing to respond to reports of civilian harm”. NZDF, above note 74, Chap. 3, § 1(a), para. (2)(c).

94 For instance, the Ministry of Defence (MoD) of the Netherlands launched a civilian harm reporting mechanism in December 2024 that allows civilians and non-governmental organizations to report allegations of civilian harm resulting from military operations involving the Dutch armed forces. The mechanism is intended to identify lessons learned to help prevent and mitigate the risk of civilian harm in the future, as well as to strengthen transparency and accountability processes. The process leading to the establishment of the mechanism benefited from constructive and sustained engagement between the Dutch MoD and civil society organizations. See Dutch MoD, “Meldpunt voor vermoedens burgerslachtoffers geopend” [“Hotline Opened for Suspected Civilian Casualties”], 31 December 2024, available at: www.defensie.nl/actueel/nieuws/2024/12/31/meldpunt-voor-vermoedens-burgerslachtoffers-geopend; PAX, CIVIC, Airwars, Utrecht University and Intimacies of Remote Warfare, Looking Back to Look Forward: Recommendations to Improve the Protection of Civilians in Dutch Military Operations, PAX, Utrecht, May 2024; Jessica Dorsey, “From Hawija to Whitehall: Dutch Lessons for Strengthening the UK’s Civilian Harm Mitigation Policy”, in Mae Thompson (ed.), Civilian Harm Mitigation in Large-scale Combat Operations: Lessons for UK Defence, Ceasefire Centre for Civilian Rights, November 2025, available at: www.ceasefire.org/uk-defence-ill-prepared-to-protect-civilians-from-harm-from-uk-military-operations.

95 For instance, an approach similar to that used in the conduct of battle damage assessments (BDAs) could be adapted to support assessments of damage to civilian infrastructure, including dual-use facilities, and the potential impacts on the civilian population. BDAs are processes used by militaries, albeit not consistently, to estimate the damage or impact of specific operations on their intended targets. They typically follow a tiered approach: Level 1 focuses on physical damage, Level 2 assesses functional damage, and Level 3 evaluates the broader impact on the target system. While Level 1 assessments may be completed shortly after a strike is carried out, Levels 2 and 3 normally require several days or even longer to be finalized or may not even be completed. See R. Lane and H. Shiotani, above note 62, p. 35.

96 Many of these tools have also been extensively used by international and non-governmental organizations for various purposes, based on the organizations’ respective mandates, objectives, technical expertise and operational capacities. See B. Morais Figueiredo and K. Young, above note 75, pp. 29–30. For examples of recent empirical studies employing open-source tools and satellite imagery data to assess the impacts of armed conflict on civilian infrastructure, see Olivier Dietrich et al., “An Open-Source Tool for Mapping War Destruction at Scale in Ukraine Using Sentinel-1 Time Series”, Communications Earth and Environment, Vol. 6, No. 215, 2025, available at: https://doi.org/10.1038/s43247-025-02183-7; Yara Asi et al., “‘Nowhere and No One Is Safe’: Spatial Analysis of Damage to Critical Civilian Infrastructure in the Gaza Strip during the First Phase of the Israeli Military Campaign, 7 October to 22 November 2023”, Conflict and Health, Vol. 18, No. 24, 2024, available at: https://doi.org/10.1186/s13031-024-00580-x.

97 On relevant internal and external sources, see, for instance, Harvard Law School Human Rights Program and Action on Armed Violence, Acknowledge, Amend, Assist: Addressing Civilian Harm Caused by Armed Conflict and Armed Violence, Cambridge, MA, April 2015, available at: https://hrp.law.harvard.edu/wp-content/uploads/2015/04/AcknowledgeAmendAssist.pdf.

98 CIVIC, above note 40, p. 6.

99 Geneva Academy and ICRC, Guidelines on Investigating Violations of IHL: Law, Policy, and Good Practice, September 2019, available at: www.icrc.org/en/document/guidelines-investigating-violations-ihl-law-policy-and-good-practice; CIVIC, Military Assessments, Investigations and Tracking of Civilian Harm: NGO Recommendations for DoD Policy on Civilian Harm, Washington, DC, February 2020, p. 2, available at: https://civiliansinconflict.org/blog/civil-society-guidance-for-a-model-dod-policy-on-civilian-harm/attachment/6-final-2020-02-18-ngo-white-paper-dod-assessments-and-investigations/.

100 For instance, through Defence Order 35 of 2021, the NZDF adopted a comprehensive framework for responding to incidents of civilian harm caused directly or indirectly by NZDF military operations. The framework stipulates the types of amends that may be offered in response to acknowledged harm, which include not only monetary payments and other types of livelihood assistance, but also contributions to local infrastructure in the affected areas. See NZDF, above note 74, Chap. 3, pp. 3-4–3-10 (esp. § 3.10 on amends). Similarly, DoD Instruction 3000.17 on civilian harm mitigation and response establishes an overarching institutional framework to guide responses to incidents of civilian harm, noting that these may include “[r]epairs to damaged structures and infrastructure”: DoD, above note 73, § 5.2(c)(4), pp. 41–42. See also CIVIC, Applying the DoD Policy on Civilian Harm to Protection of Civilians in Large-Scale Combat Operations (LSCO): NGO Recommendations for DoD Policy on Civilian Harm, Washington, DC, December 2020, p. 8, available at: https://civiliansinconflict.org/wp-content/uploads/2020/12/NGO-recommendations-on-LSCO-for-DoD-Policy.pdf.

101 For instance, in Ukraine, an ongoing initiative led by the International Centre for the Study of the Preservation and Restoration of Cultural Property (ICCROM), in cooperation with the Ministry of Culture and Strategic Communications of Ukraine and other partners, seeks to develop a comprehensive risk map for Ukraine’s heritage sites affected in the context of the Russia–Ukraine conflict. The tool has been developed primarily using geospatial and open-source data, complemented by on-the-ground assessments. It is intended to provide an overview of endangered sites, identify priorities for intervention and support recovery efforts. See ICCROM, “Risk Map for Cultural Heritage in Ukraine”, available at: https://gis-based-risk-map-website-iccrom.hub.arcgis.com; L. Lewis et al., above note 45, p. 39.

102 OCHA, above note 84.

103 Systemic issues arise when the underlying causes of an incident are likely to have led to or could lead to further incidents, and can surface at any level within the military. See Geneva Academy and ICRC, above note 99, p. 12, para. 62. See also O. A. Hathaway and A. Khan, above note 64, pp. 76–79. On the importance of lessons learned processes in informing institutional changes with a view to mitigating risk of harm to civilians and civilian objects during military operations, see Larry Lewis, “Hidden Negligence: Aug. 29 Drone Strike Is Just the Tip of the Iceberg”, Just Security, 9 November 2021, available at: www.justsecurity.org/78937/hidden-negligence-aug-29-drone-strike-is-just-the-tip-of-the-iceberg/.

104 O. A. Hathaway and A. Khan, above note 64, pp. 76–79.

105 For instance, US military doctrine underscores the importance of comparing the outcomes from combat damage assessments (CDAs) conducted following an attack with the CDEs made prior to the attack. This comparison is intended to help identify “any deficiencies requiring correction” and to ensure that CDAs routinely inform and refine future CDEs in order to avoid or minimize incidental harm. See US Chairman of the Joint Chief of Staff, Methodology for Combat Assessment, Instruction CJCSI 3162.02, 8 May 2019, Enclosure D, available at: www.jcs.mil/Portals/36/Documents/Doctrine/training/jts/cjcsi_3162_02.pdf. See also O. A. Hathaway and A. Khan, above note 64, p. 85.

106 CIVIC, above note 40, p. 6; E.-C. Gillard, above note 18, p. 48, para. 171.

107 E.-C. Gillard, above note 18, pp. 49–50, para. 175.

108 For instance, since 2017, the US DoD has issued an annual report on civilian casualties in connection with US military operations, as mandated by Section 1057 of the National Defense Authorization Act and subsequent amendments. The report lists each civilian casualty by date, location, operation type (air or ground) and the number of civilians injured or killed. The report also outlines the process utilized by the DoD to assess reports of civilian casualties, as well as to consider ex gratia payments or other forms of response to civilian harm. While recognized as an important transparency measure, these reports have also been criticized for underestimating the overall number of civilian casualties from US military operations worldwide. In addition, incidents resulting in damage to or destruction of civilian objects, although understood as a source of civilian harm by the DoD, are not included in these reports. See DoD Report 2024, above note 91. See also CIVIC, “CIVIC Welcomes Annual DoD Report on Civilian Casualties”, 6 May 2020, available at: https://civiliansinconflict.org/publications/testimony/civic-welcomes-annual-dod-report-on-civilian-casualties; Daphne Eviatar, “New Pentagon Report Significantly Undercounts Civilian Casualties”, Just Security, 2 May 2019, available at: www.justsecurity.org/63896/new-pentagon-report-significantly-undercounts-civilian-casualties. For examples of operational review processes, see also Larry Lewis, Reducing and Mitigating Civilian Casualties: Afghanistan and Beyond, Joint and Coalition Operational Analysis, Joint Staff J7, Washington, DC, April 2013, available at: https://info.publicintelligence.net/JCOA-ReducingCIVCAS.pdf; Mosul Study Group, What the Battle of Mosul Teaches the Force, No. 17-24 U, US Army University Press, September 2017, available at: www.armyupress.army.mil/Portals/7/Primer-on-Urban-Operation/Documents/Mosul-Public-Release1.pdf.

109 For an example of a study commissioned by the US DoD, see M. J. McNerney et al., above note 13; Michael J. McNerney et al., U.S. Department of Defense Civilian Casualty Policies and Procedures: An Independent Assessment, RAND Corporation, Santa Monica, CA, January 2022, available at: https://apps.dtic.mil/sti/trecms/pdf/AD1158179.pdf. For examples of studies undertaken by international and non-governmental organizations, see, for instance, CIVIC, Policies and Practices to Protect Civilians: Lessons from ISF Operations Against ISIS in Urban Areas, Washington, DC, October 2019, available at: https://civiliansinconflict.org/publications/research/policies-practices-to-protect-civilians/; Human Rights Watch, All Feasible Precautions? Civilian Casualties in Anti-ISIS Coalition Airstrikes in Syria, London, September 2017, available at: www.hrw.org/report/2017/09/25/all-feasible-precautions/civilian-casualties-anti-isis-coalition-airstrikes-syria; Saba Azeem, Lauren Gould, Erin Bijl and Jolle Demmers, After the Strike: Exposing the Civilian Harm Effects of the 2015 Dutch Airstrike on Hawija, PAX, Utrecht, April 2022, available at: https://paxforpeace.nl/wp-content/uploads/sites/2/import/2022-04/PAX_REPORT_HAWIJA_04.pdf.