We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
Online ordering will be unavailable from 17:00 GMT on Friday, April 25 until 17:00 GMT on Sunday, April 27 due to maintenance. We apologise for the inconvenience.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This article outlines and evaluates the US perspective on how treaty and customary international law protect the natural environment during international armed conflict. It surveys the relevant treaties to which the United States is a party and examines US views on their pertinent provisions. It then assesses claims that the environmental obligations residing in the 1977 Additional Protocol I to the 1949 Geneva Conventions have attained customary status, outlines the United States’ rejection of those claims, and evaluates the reasonableness thereof. Finally, it highlights ambiguities in certain US environmental positions, the resolution of which would bring much-needed clarity to the law.
Military strategists have begun pivoting from a focus on counterterrorism, counter-insurgency and stability operations to potential peer and near-peer conflict. This shift has profound operational and tactical implications for how future wars will be fought, but equally, it will have a significant impact on how international humanitarian law (IHL) is understood and applied. This article considers the process by which the normative evolution of IHL will occur in response to a battlespace that looks different than it has for decades. To do so, the article introduces two concepts: “normative architecture” and “applied IHL”. It argues that only by understanding the difference between these two concepts, and their relationship to each other, can States and others concerned with how IHL is developing in the face of future conflict positively affect that process.
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that their effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies that parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict.
Globalization has not conquered sovereignty. Instead, the notion of sovereignty occupies center stage in discussions concerning the normative architecture of cyberspace. On the diplomatic level, the term is generally employed in its broadest sense, one that signifies freedom from external control and influence. For instance, when Western states raise the issue of human rights in cyberspace, those on the opposite side of the negotiating table fall back on sovereignty-based arguments. Mention of sovereignty in consensus documents is consequently often the price that liberal democracies pay to advance their policy priorities, such as individual freedoms and the availability of self-help measures in response to hostile cyber operations.
Tallinn Manual 2.0 expands on the highly influential first edition by extending its coverage of the international law governing cyber operations to peacetime legal regimes. The product of a three-year follow-on project by a new group of twenty renowned international law experts, it addresses such topics as sovereignty, state responsibility, human rights, and the law of air, space, and the sea. Tallinn Manual 2.0 identifies 154 'black letter' rules governing cyber operations and provides extensive commentary on each rule. Although Tallinn Manual 2.0 represents the views of the experts in their personal capacity, the project benefitted from the unofficial input of many states and over fifty peer reviewers.