4 resultados para Armed conflict

em WestminsterResearch - UK


Relevância:

60.00% 60.00%

Publicador:

Resumo:

While there is no lack of studies on the use of armed force by states in self-defence, its qualification as an ‘inherent right’ in article 51 of the Charter of the United Nations has received little scholarly attention and has been too quickly dismissed as having no significance. The present article fills this gap in the literature. Its purpose is not to discuss the limits to which article 51 or customary international law submit the exercise of the right of self-defence by states, but to examine what its 'inherent’ character means and what legal consequences it entails. The article advances two main arguments. The first is that self-defence is a corollary of statehood as presently understood because it is essential to preserving its constitutive elements. The second argument is that the exercise of the right of self-defence must be distinguished from the right itself: it is only the former that may be delegated to other states or submitted to limitations under customary international law and treaty law. The right of self-defence, however, cannot be alienated and it takes precedence over other international obligations, although not over those specifically intended to limit the conduct of states in armed conflict or over non-derogable human rights provisions.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks. It first identifies when cyber attacks qualify as ‘attacks’ under the law of armed conflict and then examines the two elements of the definition of ‘military objective’ contained in Article 52(2) of the 1977 Protocol I additional to the 1949 Geneva Conventions on the Protection of Victims of War. The Chapter concludes that this definition is flexible enough to apply in the cyber context without significant problems and that none of the challenges that characterize cyber attacks hinders the application of the principle of distinction.