23 June 2022, 17:30-18:30
Register start 30 May 2022
Register end 22 June 2022
y Florian Olivo, Unsplash
Cyberspace has dramatically transformed human existence. The ability to digitize, store, analyse and transport data around the globe has had profound effects in every sector of society and has changed the way we conduct personal, business, and political affairs. The COVID-19 pandemic has accelerated this revolution in our societies and amplified the ubiquity of information and communication technologies (ICTs).
Yet, cyberspace also offers new means and methods for different actors to conduct malicious activities. Cyber operations conducted by both state and non-state actors are perceived as potential challenges for international peace and security as well as for the international legal order. Cyber operations have become an integral part of international relations. States and non-state actors are conducting cyber operations against other States and actors, notably during armed conflicts.
In this talk, as part of our research on disruptive military technologies, we will analyse different examples of cyber operations (eg. Stuxnet, NotPetya and SolarWinds) allegedly conducted or sponsored by states, and discuss their effects on the geopolitical contexts as well as the different challenges they raise for international law, notably jus ad bellum and jus in bello.
In this talk, the panelists analysed different examples of cyber operations allegedly conducted or sponsored by states, and discussed their effects on the geopolitical contexts as well as the different challenges they raised for international law.
Durkhanay Ijaz is a Legal Advisor at the International Committee of the Red Cross in Pakistan and is following our Executive Master in International Law in Armed Conflict online.
During one week, Francesca Gortan, Sarah Surget and Sophie Timmermans represented the Geneva Academy at the 38th Edition of the Jean-Pictet Competition that took place in Durrës, Albania, from 19 to 26 March.
This online short course will examine the sources of international humanitarian law (IHL), as well as the threshold criteria for its applicability in an armed conflict
After having followed this online short course, participants will know who the protected persons and goods are and what rules of IHL can be used for their protection in an international armed conflict. An overview of the rules applicable in non-international armed conflicts will also be given.
Dave Klassen/The EITI
This project aims to further identify and clarify policies and practices for States and business, including public and private investors, across the full ‘conflict cycle’ and the ‘Protect, Respect and Remedy’ pillars of the UN Guiding Principles on Business and Human Rights.
This project aims at staying abreast of the various military technology trends; promoting legal and policy debate on new military technologies; and furthering the understanding of the convergent effects of different technological trends shaping the digital battlefield of the future.