Professional Documents
Culture Documents
The Impact of Technology On Public International Law
The Impact of Technology On Public International Law
International Law
I. INTRODUCTION
We are now in the 21st century wherein we can see how the world
changes so fast. It has become more linked and people, information, and
resources can cross boundaries like never before. From technological
advances to emerging environmental issues, we are now forced to confront
new scenarios in the international facet. Its like saying that the future is
NOW. We need to go with the flow in order to survive. Innovation is
becoming necessary for survival.
Markets have become more interwoven and the production process has been
made more efficient by the option to create world products, i.e. products
whose components are made in different locations around the world. Also,
the ability to ship information and products easily and cheaply from one
country to the next and to locate the manufacturing process where labour
and work processes are less expensive has changed the pattern of
production and consumption across the world.
Improved technology in transportation and telecommunications the
cost of how people communicate and travel has drastically reduced in the
last few decades, from cheaper air travel and high-speed rail to the rapid
growth of the internet and mobile phones.
II. DISCUSSIONS
2 Henry H. Perritt, J. (n.d.). The Internet is Changing the Public International Legal System.
Retrieved 2016, from http://www.kentlaw.edu/cyberlaw/perrittnetchg.htm
International humanitarian law has developed over the centuries to limit
the adverse effects of armed conflict for humanitarian reasons. A core rule of
international humanitarian law underlying the development, procurement
and use of all weapons is that parties to an armed conflict do not have an
unlimited choice of methods and means of warfare. All weapons must be
used and indeed must be capable of being used in accordance with
international humanitarian laws general limitations on the conduct of
hostilities, notably the rules aimed at protecting civilians from direct or
indiscriminate attacks and otherwise sparing them as far as possible the
effects of the hostilities, and the rules aimed at protecting combatants from
superfluous injury or unnecessary suffering. In fact, all new weapons require
assessment and legal review before they are developed, acquired and
introduced by the military to ensure that they are compatible with these core
rules and thus to prevent the use of weapons that would violate international
law.
After the First World War, with vivid images of the horrors of chemical
warfare fresh in their minds, this was reinforced with a prohibition on the use
of chemical and biological weapons. When agreeing the Geneva Protocol in
1925 countries noted that the use in war of asphyxiating, poisonous or
other gases, and of all analogous liquids materials or devices, has been justly
condemned by the general opinion of the civilized world.
Lets take a closer look to some of the technologies that have only
recently entered the battlefield or could potentially enter it. These are, in
A. Cyber warfare
From certain cyber operations that have occurred, we know that
one party to a conflict can potentially "attack" another party's
computer systems, for instance by infiltrating or manipulating it.
Thus, the cyber infrastructure on which the enemy's military relies
can be damaged, disrupted or destroyed. However, civilian
infrastructure might also be hit either because it is being directly
targeted or because it is incidentally damaged or destroyed when
military infrastructure is targeted.
So far, we do not know precisely what the humanitarian
consequences of cyber warfare could be. It appears that technically,
cyber-attacks against airport control and other transportation
systems, dams or nuclear power plants are possible. Such attacks
would most likely have large-scale humanitarian consequences.
They could result in significant civilian casualties and damages. Of
course, for the time being it is difficult to assess how likely cyber-
attacks of such gravity really are, but we cannot afford to wait until
it is too late to prevent worst-case scenarios.