![]() ![]() This rule too binds parties to the conflict in both international (IAC) and non-international (NIAC) armed conflicts (Henckaerts, and Doswald-Beck, 2005, pp. The rule envisages attackers using intelligence gathering, surveillance and reconnaissance resources to identify the character of the proposed target in order to ensure that they only attack lawful military targets. It obligates the relevant individuals to do everything "feasible" to verify that the objectives to be attacked are neither civilians nor civilian objects and are not subject to special protection (Additional Protocol I to the Geneva Conventions, article 57 (2)(a)(i)). The rule of target verification is designed to enable those who plan or execute an attack to comply with the principle of distinction. ![]() As was explained in Module 6 on armed conflict/military approaches, a key principle of international humanitarian law (IHL) is distinction ( Additional Protocol to the Geneva Conventions of 12 August 1949 and relating to the Protection of Victims of International Armed Conflicts (Protocol I), 1977, article 48). In this context, a principle role that intelligence gathering can play is regarding the identification of military targets. Issues relating to intelligence gathering methods as well as privacy can also arise in situations of armed conflict. Privacy and intelligence gathering in situations of armed conflict
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |