THE PAPER | Drones, Jus in Bello and War Crimes under International Criminal Law

This paper analyzes how the use of drones could constitute war crimes, which are grave breaches of the Geneva Conventions (Gill & Fleck, 2010) within the context of Article 8 of the Rome Statute.

By Rachel Alberstadt

This paper analyzes how the use of drones could constitute war crimeswhich are grave breaches of the Geneva Conventions (Gill & Fleck, 2010) within the context of Article 8 of the Rome Statute.

THE PAPER | Drones, Jus in Bello, and War Crimes under International Criminal Law

Image Attribute: Boeing X-47B in flight / Source: Wikimedia Commons

Article 8 (1) of the Rome Statute reads “The Court shall have jurisdiction in respect of war crimes in particular when committed as part of a plan or policy or as part of a large-scale commission of such crimes” (Rome Statute, 1998). Thus to trigger prima facie requirements under this opening provision, the alleged crimes in question would require a plan or policy or a large scale commission of the acts, although an individual crime can also constitute a war crime (Cryer, Friman, Robinsin, & Wilmshurst, 2007). However, in its analysis of drones fulfilling war crimes criteria, this paper will restrict its evaluation to war crimes falling under Article 8 (2) (a) and 8 (2) (b). These sections specifically pertain to conflicts of an international character.

According to the Rome Statute, an additional requirement exists for an act to constitute a war crime. For there to be an act qualifying as a war crime under Article 8 there requires a nexus criteria linking the crime with an armed conflict, either an international armed conflict (IAC) or a non-international armed conflict (NIAC) (Cryer, Friman, Robinsin, & Wilmshurst, 2007). More generally, to trigger jurisdiction of the Court itself, this requires three methods outlined in Article 13 as 1) a State party refers a situation to the Court, 2) the UN Security Council refers a situation to the Court, or 3) for the Prosecutor to act propriomotu. These correspond to Articles 13, 14, and 15bis and 15ter which elaborate on these provisions (Rome Statute, 1998).

Under Article 8 (2) (a) the Statue incorporates established International Humanitarian Law (IHL) law taken from the 1949 Geneva Conventions and other relevant established international law (Cryer, Friman, Robinsin, & Wilmshurst, 2007). Core provisions of IHL ban indiscriminate targeting practices, including weaponry which are incapable of distinction (Gill & Fleck, 2010). However, this distinction holds an overall caveat in international conflicts, as in these types of conflicts there are two categories of persons: combatants and civilians. Each category are afforded aspects of protections, but under some acts, such as wilful killing, these are crimes only against non-combatants (Cryer, Friman, Robinsin, & Wilmshurst, 2007).

As IHL argues that whoever does not qualify as a combatant automatically qualifies as a civilian (Gill & Fleck, 2010) customary law and State practice exist in a current State of flux regarding non-State armed groups in international conflicts and also terrorist actors. However, this paper will explain how under existing IHL, for which violations under the Rome Statute can arise, terrorists and non-State actors continue to constitute protected civilians. Exceptions to this rule allow for legitimately targeting civilians should the civilians in question actively and directly participate in combat (Kalshoven & Zegveld, 2011). However, lawfulness of targeting these civilians pertains strictly to the duration of their active involvement.

The factual nature of drones—as an instrument capable of but not restricted to purposes of force—provides imperative evaluation for potential allegations of international core crimes, such as war crimes or crimes against humanity. States deploy drones for three interrelated reasons 1) efficiency, 2) accuracy, and 3) prevention or protection of human risk. As indicated in the previous section, these objectives also potentially implicate mens rea elements for judicial hearings. Because of the precision of drones, both from the accuracy of data procured to inform the pilot and the relative accuracy of the targeting itself, any crimes resulting from drone sorties could demonstrate either an intent to disregard the laws of war by means of recklessness or negligence, or a direct culpability for knowingly firing upon unlawful targets.

Regarding liability, actual launching of drones ultimately rests upon a leadership decision. This implicates liability under command responsibility, or liability under Article 28 of the Rome Statute, as it is the commanders who give the final authorization for the order (Air Force Operations, 2009). For example, precautions must be taken when giving orders to exercise drone strikes, thus, if the status of the target is doubted (in terms of being military or combatant), then the assumption is the target is civilian and is protected and must not be attacked (Gill & Fleck, 2010; Kalshoven & Zegveld, 2011; Military Commander, 2012; Cryer, Friman, Robinsin, & Wilmshurst, 2007).

Drones and Proportionality under the Rome Statute

While this paper has extensively analysed the lawfulness of certain targets, a related issue of lawful drone action is the resulting damage from the strikes. While it is clear that prohibitions on directly targeting civilians exists, States are also prohibited from executing strikes which would predictably or knowingly cause excessive or unnecessary civilian harm (Kalshoven & Zegveld, 2011). Thus, war crimes may result from strikes if the results failed proportionality tests.

Generally the proportionality test weighs potential harm against military benefit (Gill & Fleck, 2010). It is a test decided by the commander prior to the launched sorties and must be decided for each and every attack (Matthews & McNab, 2011). Michael Schmitt clarifies that the weapon used proves irrelevant, but rather the issue is whether “expected civilian casualties or damage were excessive relative to the military gain the attacker reasonably anticipated from the strike” (Schmitt, 2011). The evaluation of proportionality by courts results in inconsistent determinations as proportionality is assessed subjectively by the military apparatus (usually a commander giving a final “go” order) and is difficult to objectively quantify or qualify (Air Force Operations, 2009; Cryer, Friman, Robinsin, & Wilmshurst, 2007).

Proportionality is considered prior to launching an attack but is again evaluated after the fact, often by different actors than the ones considering the initial attack. As proportionality must be determined for each individual attack, and as each attack carries different factors to be weighed (such as the nature of the target, circumstances, weaponry available, etcetera), this complicates attempts at legal certainty for subjective or objective determinations of, for instance, what constitutes “excessive” under the framework of proportionality (Matthews & McNab, 2011; Cryer, Friman, Robinsin, & Wilmshurst, 2007). Harm resulting from drones does not negate its lawfulness under principles of proportionality (Matthews & McNab, 2011; Schmitt, 2011), but it is the qualification of the numbers which provides uncomfortable calculations. As such, while there are certainly more clear concepts within IHL, proportionality is not one of them. It remains an evaluation on a case-by-case basis as (Vogel, 2011) “[t]he main problem with the principle of proportionality is not whether or not it exists but what it means and how it is to be applied” (Final Report, 2000).

Strikes may be ordered with legitimacy in mind, but legitimacy does not equate to lawfulness—those in authority for the planning and decision making of the attacks are obligated to uphold preventative and protective measures against needless civilian harm, even if this harm would be caused incidentally (Kalshoven & Zegveld, 2011; Military Commander, 2012). That being said, drones are not flawless mechanisms of war. Humanitarian “[l]aw does not require perfection in the execution of a military attack nor does it prohibit all civilian casualties” (Matthews & McNab, 2011). Armed conflict will inevitably result in loss of life, but the parties to the conflict are under conventional and customary obligations to prevent unnecessary harm. Drones possess improved mechanisms to facilitate discrimination capacities for targeting, but war crimes could result if these capabilities are misused.

Drones, Targeted Killings, and International Criminal Law (ICL)

The use of drones to implement targeted killing policies presents a key area of drone use which affects international and non-international conflicts alike. This paper ventures that this usage of drone technology poses a plausible example of drones constituting war crimes within the meaning of Article 8 of the Rome Statute. It is acknowledged that targeted killing policies are perceived to affect NIACs more commonly than IACs. However, the increasing role of non-State actors in conflicts, in particular complication of non-sanctioned participation of civilians, demonstrates on-going concerns which pertain equally to international as well as non-international conflicts. As such, IHL (particularly Common Article 3 of the Geneva Conventions), customary international law and international human rights continue to apply to all forms of armed conflict, regardless of designation as international or internal. (This author strongly notes that IHL and international human rights law apply lexspecialis in conjunction with human rights.)

Nonetheless, international human rights law would be the applicable legal framework for drones used to fulfil targeted killings outside of armed conflicts. (This author strongly notes that IHL and international human rights are not mutually exclusive but rather, IHL applies as lexspecialis in conjunction with human rights.) While this paper will not engage with the latter, it uses this statement to point out that even absent an armed conflict, use of drones as lethal force still falls under a compatible legal framework (O’Connel, 2011). If States employ military force which falls outside the scope of armed conflicts or self-defence, then these operations are governed by the human rights paradigm; where IHL gaps exist—international human rights law fills in (Matthews & McNab, 2011).

Moreover, this paper rejects the category of unlawful combatants as this concept fails to compatibly and consistently apply to established rules of IHL. The (contested) category of unlawful combatants largely relates to counter-terrorism policies by States. These States, particularly, Russia, the US, and Israel, argue that unlawful combatants are individuals who under IHL would generally be deemed civilians, but because of their affiliation with non-State armed groups, are deemed to have active combatant roles (Gill & Fleck, 2010). As combatants are authorized by their respective States, these third category of individuals are combatants who are not sanctioned as members of armed forces, thus their participation in hostilities is rendered unlawful (Gill & Fleck, 2010).

While this category perceptively makes State policies more legitimate, outside of theory they fail to uphold legal standards. This rests upon several inter-related reasons. First, in IHL there are two categories: combatants and civilians. Second, the distinction as a combatant means that the State for which the individual(s) are fighting authorizes them to fight. With the distinction of an unlawful combatant, this is decided by third party States and not by the State of the individual’s origin or nationality.

This proves problematic for several reasons, one main reason being that the third party (for example, Russia, the US, or Israel) labels an individual as an unlawful combatant for the purposes of targeting them—which predicates largely on allegations of, for instance, terrorist membership or association with a particular organization. One example of this in practice is the characterization of an individual as fulfilling “continuous combat function”. This characterization forfeits the individual’s immunity from attack exclusively based upon group membership (Lewis, 2012). Yet without processes of verification, or objective standards, this presents a highly contested practice which, in the author’s opinion, fails to comply with the objective purpose of IHL—which is to protect those engaging and effected by conflict, and to limit the means and methods of warfare. In opposition to this, the unlawful combatant category seeks to broaden methods of warfare and allow for more inclusive methods of targeting.

Third, this author contends that the unlawful combatant category is inherently unnecessary. There already exist compatible designations allowing States to target civilians under certain circumstances without unnecessarily enlarging the scope of lawful targets. While civilians overall are entitled to protective status, they are not absolutely prohibited from being targeting under certain conditions. These conditions include direct and active engagement in combat, for which the person loses their immunity and can be lawfully targeted for the duration of this engagement (Gilll & Fleck, 2010; Lewis, 2012; Vogel, 2011; Kalshoven & Zegveld, 2011). However, this author acknowledges what constitutes “active”, “direct” and “for the duration” can prove problematic in practice, complications arising from this fail to negate the continued status of the civilian (Kalshoven & Zegveld, 2011). In 2009 the ICRC issued Interpretive Guidance on the Notion of Direct Participation in Hostilities; while useful, its authoritative force is questioned.Ultimately, civilians engaging actively and directly lose their protection in that they can be lawfully targeted during their engagement with the conflict, but this does not abolish their overall status as civilians (Gill & Fleck, 2010).

The Israeli Supreme Court provided insight into targeting restrictions as it decided upon the targeted killing issue in its evaluation of the legality of Israel’s targeted killing policy. In its conclusion the Court confirmed that the status of a target being lawful or unlawful resides on a contextual case by case basis and should be evaluated retroactively by an independent party (Targeted Killings, 2005). Indeed, Judge Rivlin stated one “cannot determine in advance that targeted killing is always illegal” (Targeted Killings, 2005). Overall, while the judgement failed to provide more broadly applicable legal analysis, it did provide clarification that the current State of international law does not recognize the category of unlawful combatants (Targeted Killings, 2005).

As such, States that employ drones to target individuals under the guise of the category of unlawful combatants usually do so under systematic elimination of these targets through the use of drones. Therefore, this systematic elimination, as a State policy, fulfils the criteria of Article 8 of the Rome Statute and results in the commission of war crimes. Under the Geneva Conventions, civilians who engage in armed conflicts are acting unlawfully as by definition they are acting without State authorization. As a result, they can be tried for illegally participating in the conflict.

However, if States target civilians who participate in conflict under the justification of labelling these actors as unlawful combatants, this denies them their civilian status under Article 8 (2) (a) (vi) which affords them the right to a fair trial (ICC Elements, 2002). In addition, these targeting policies demonstrate intentional attacks against civilians within the meaning of Article 8 (2) (b) under the provisions of (i-v) which includes intentionally directed attacks against the civilian populations or civilian objects and otherwise knowingly and intentionally attacking targets where civilian or civilian objects will be foreseeably harmed or damaged (ICC Elements, 2002).

Drones, Precautionary Measures, and ICL

While drones could be used as weaponry of heightened precision, and as such could qualify as taking precautionary measures to prevent excessive harm (Schmitt, 2011), miscalculations or disregard for on-the-ground situations could nonetheless result in war crimes (Cryer, Friman, Robinsin, & Wilmshurst, 2007). For instance, murder (Article 8 (2) (a) (i)) and otherwise causing excessive damage (Article 8 (2) (b) (iv)) constitute war crimes which could result from drone strikes. IHL requires the attacker to implement reasonable verification measures and in circumstances where the legality of the strike’s objective is dubious, requires the cancelation or suspension (as indicated in Additional Protocol I, Article 57 (2)) of the strike (Kalshoven & Zegveld, 2011; Hague Rules, 1923). This balances against the requirement to evaluate proportionality as the strike must have concrete and direct military advantage, not merely speculated or hopeful—civilian harm must be avoided (Gill & Fleck, 2010).

An example of precautionary methods available with drones is target verification using technology such as imagery and loitering capabilities, as was discussed earlier. Visual feedback of the drone’s camera allows for multiple authority figures to evaluate the data. In practice, this means that “[t]he drone’s sensors allow many sets of eyes, including those of [Judge Advocate General] lawyers trained to assess proportionality, to make a proportionality determination at the time of weapons release” (Lewis, 2012).

Civilian harm in itself does not constitute a war crime, but rather, a war crime is committed when the drones were employed with reckless or excessive attacks (Vogel, 2011). Wilful killing and murder results if the missiles are launched from drones when IHL precautions are not taken or are disregarded. Thus, unarmed drones could be used as a precautionary method if used to gather intelligence to verify targeting information, but would be employed illegally if armed drones are used when less harmful methods are available (Schmitt, 2011)—drones may carry smaller missiles, but the results are no less accountable.

An example of aerial bombings and precautionary measures used in practice is the 1999 NATO aerial bombings discussed earlier. These bombings were criticized for executing strikes with higher altitude ceilings which decreased efficiency for targeting, as flying higher complicates visibility (Amnesty International, 2000). In light of this example, evolution of drone technology could prevent this issue in the future as drones can fly at lower altitudes to gather improved targeting data with decreased risk of harm to the pilot. Flying at lower levels with minimized risk to pilot and civilians alike would allow for less risky gathering of substantial information regarding the ground situation (Matthews & McNab, 2011). This could exemplify a precautionary measure as employing drone use in this instance compares to capabilities usually unavailable for ordinary aerial bombings by larger aircraft.

Furthermore, an important precautionary measure to implement is the obligation to issue, where permissible, warnings of impending strikes as elucidated under Article 26 of the (Hague Convention II, 1899). As seen with the NATO bombings discussed above and in prior sections, a consistent criticism of the legality of drone use predicates on the failure to give prior warnings to civilian populations. Prior warning of impending attacks is a requirement under Article 57 (2) (c) of Additional Protocol I and Article 26 of the II Hague Convention. In practice, the use of drones for surprise attacks has meant that strikes are often done with no forewarning (Vogel, 2011), yet the lawfulness of these strikes would then rest upon whether effective forewarnings were available and viable options to the attacker.

Nonetheless, it is imperative to remember that any perceived precautionary measures available with drone usage or any perceived benefits to prevent collateral damage and other harm rests entirely on the quality and accuracy of intelligence received (Alston, 2010; Knoops, 2012). While drones possess camera technology to send information to the pilots itself as raw data, all too often intelligence relied upon derives from secondary sources (Knoops, 2012). Intelligence collected from the drone are not flawless either. One practical example raised is the issue of surrender and mistakenly targeting those of hors de combat status, where it would be difficult for a drone operator to alter the drone’s actions to facilitate a declaration of surrender (Vogel, 2011).

While it has been argued that drones do present mechanisms which facilitate greater discrimination features for warfare, it remains “incumbent upon a drone operator and commander to exercise judgment in determining when to conduct an attack where there are co-located civilians or where the targets themselves are difficult to identify” (Vogel, 2011; Air Force Operations, 2009). The collateral damage is lawful if proportionate, but prior to the results, it is required upon the commander and the operator to minimize, wherever possible, foreseeable harm to civilians and civilian objects (Kalshoven & Zegveld, 2011; Military Commander, 2012; Air Force Operations, 2009; Hague Rules, 1923). Targeting is inherently a responsibility of command function requiring “commander oversight and involvement to ensure proper execution” (Air Force Operations, 2009). As such, this expresses the commanders’ responsibility under Article 28 of the Rome Statute for war crimes committed using drones.

Drones and Terror under ICL

As a final example of how drones could embody violations of Article 8 war crimes, the causing of terror towards civilian populations will be briefly explored. Additional Protocol I, Article 51 (2) prohibits terrorizing civilian populations. Deficient definitions of terrorism aside, the author finds that it is understandable that the buzzing heard from drones can cause fear or terror, particularly as those who hear the drones will be unaware as to know whether the drones are armed or not. Factual uses of drones discussed earlier also could be seen to induce terror or fear into civilian populations as drones are used for reconnaissance, meaning they follow, hover over, and maintain visual connections with their targets. For family members, neighbours, and ordinary civilians, this could result in violations of personal dignity and general concern for safety and welfare. In addition, as Article XXII of The Hague Rules of Aerial Warfare expressed “Aerial bombardment for the purpose of terrorizing the civilian population, of destroying or damaging private property not of a military character, or of injuring non- combatants is prohibited” (Hague Rules, 1923). This demonstrates that use of aerial warfare to terrorize civilian populations continues to present an issue—and a war crime—in international conflicts.

However, violations of Article 51 (2) and Article XXII of the Hague Rules do not expressly compliment provisions under the Rome Statute as such, unless interpreted broadly under provisions of outrages upon personal dignity or inhumane treatment (Rome Statute, 1998). First, this author contends that drones could result in the effect of terrorizing civilian populations, but this would require unnecessarily broad interpretations of the Rome Statute and would perhaps more appropriately fall under crimes against humanity rather than war crimes. However, this author does acknowledge that the ICTY, particularly the Galić cases, have dealt with inducing terror amongst civilians as a war crime (Cryer, Friman, Robinsin, & Wilmshurst, 2007). Second, the prohibition of terrorizing civilian populations does not encompass incidental terrorization, meaning that to violate prohibitions the attacks would require the terrorization of civilians as a purported objective (Gill & Fleck, 2010; Cryer, Friman, Robinsin, & Wilmshurst, 2007).

However, it is briefly noted that incidental harm could relate to indiscriminate usage as non-State actors can prove difficult to distinguish by blending in with larger civilian populations. On a peripheral note, drones do not have defensive mechanisms per se, thus they are vulnerable to potential jamming frequencies which cause interference with their remote piloting feed (Lewis, 2012). In practice this means that those on the ground possess abilities to destroy drones in progress, ultimately meaning that locals are not without hypothetical defences.


This paper has argued that while drones are not without issues, and indeed their use could result in commission of international criminal offenses; they fit within compatible existing legal frameworks such as IHL and customary law. Essentially, it is not whether or not there are laws sufficient to govern the facilitation of drone use but whether these existing laws are compliantly followed (Vogel, 2011). While acknowledging flaws with drone use, this paper has in part sought to illuminate common areas of misconception with academics and legal scholars on the legality of drone use. While this paper has argued that drones do not represent an ungoverned phenomenon of weaponry, it will contend that use of drones by non-State actors, such as armed groups, does continue to pose a present concern. Ultimately, if the target is lawful, the weaponry platform used to deliver the attack is irrelevant (that is, unless the weapon itself is not prohibited under IHL). Just as an outbreak of war fails to result in a legal vacuum, so too does the development of new weaponry fail to result in a legal void.

About The Author:

Rachel Alberstadt, University of Leiden (Advanced MA/LLM Public International Law (Peace, Justice, and Development)), Leiden, The Netherlands

Publication Details:

Copyright © 2014 by author and Scientific Research Publishing Inc. This work is licensed under the Creative Commons Attribution International License (CC BY).

Cite This Article:

Alberstadt, R. (2014) Drones under International Law. Open Journal of Political Science, 4, 221-232. doi: 10.4236/ojps.2014.44023.


1. Alston, P. (2010). Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions. Philip Alston: United Nations General Assembly, Human Rights Council, A/HRC/14/24/Add.6.

2. Amnesty International (2000). NATO/Federal Republic of Yugoslavia “Collateral Damage” or Unlawful Killings? Violations of the Laws of War by NATO during Operation Allied Force. AI Index: EUR 70/18/00. (Cited as: Amnesty International)

3. Convention (I) for the Amelioration of the Condition of the Wounded and Sick in Armed Forces in the Field. Geneva, 12 August 1949; Convention (II) for the Amelioration of the Condition of Wounded, Sick and Shipwrecked Members of Armed Forces at Sea. Geneva, 12 August 1949; Convention (III) relative to the Treatment of Prisoners of War. Geneva, 12 August 1949; Convention (IV) relative to the Protection of Civilian Persons in Time of War. Geneva, 12 August 1949. (Cited as Geneva Conventions I-IV)

4. Cryer, R., Friman, H., Robinsin, D., & Wilmshurst, E. (2007). An Introduction to International Criminal Law and Procedure (2nd ed.). Cambridge: CUP.

5. Final Report to the Prosecutor by the Committee Established to Review the NATO Bombing Campaign Against the Federal Republic of Yugoslavia (2000). (Cited as: Final Report)

6. Gill, T. D., & Fleck, D. (2010). The Handbook of The International Law of Military Operations. Oxford: OUP.

7. Hague Convention (II) with Respect to the Laws and Customs of War on Land and Its Annex: Regulations Concerning the Laws and Customs of War on Land. The Hague, 29 July 1899. (Cited as: Hague Convention II )

9. ICC (2002). Elements of Crimes of the International Criminal Court, UN Doc. PCNICC/2000/1/Add.2. (Cited as: ICC Elements)

10. ICC (1998). Rome Statute of the International Criminal Court, UN Doc. 2187 UNTS 3. (Cited as: Rome Statute)

11. ICRC (1977). Protocol Additional to the Geneva Conventions of 12 August 1949 and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), 8 June 1977, 1125 U.N.T.S. 3.

12. International Court of Justice (1996). Legality of the Threat or Use of Nuclear Weapons. Advisory Opinion, ICJ Report 679, 226. (Cited as: Nuclear WeaponsAdvisory Opinion)

13. Jones, O. B. (2014). Drones or UAVs? The Search for a More Positive Name.

14. Judge Advocate General’s School (2009). Air Force Operations and the Law: A Guide for Air, Space and Cyber Forces. US Air Force. (Cited as: Air Force Operations)

15. Judge Rosalyn Higgins (1996). Legality of the Threat or Use of Nuclear Weapons: Dissenting Opinion of Judge Higgins. Advisory Opinion, ICJ Report 679, 583. (Cited as: Higgins Dissent)
Kalshoven, F., & Zegveld, L. (2011). Constraints on the Waging of War: An Introduction to International Humanitarian Law. Cambridge: Cambridge University Press.

16. Knoops, G. J. A. (2012). Legal, Political and Ethical Dimensions of Drone Warfare under International Law: A Preliminary Survey. International Criminal Law Review, 12, 697-720.

17. Leander, A. (2013). Technological Agency in the Co-Constitution of Legal Expertise and the US Drone Program. Leiden Journal of International Law, 26, 811-831.

18. Lewis, M. W. (2012). Drones and the Boundaries of the Battlefield. Texas International Law Journal, 47, 299-300.

19. Matthews, M., & McNab, M. (2011). Clarifying the Law Relating to Unmanned Drones and the Use of Force: The Relationships between Human Rights, Self-Defence, Armed Conflict and International Humanitarian Law. Denver Journal of International Law and Policy, 39, 661.

20. O’Connell, M. E. (2011). Remarks: The Resort to Drones under International Law. Denver Journal of International Law and Policy, 39, 585.

21. Schmitt, M. N. (2011). Drone Attacks under the Jus ad Bellum and Jus in Bello: Clearing the “Fog of Law”. Yearbook of International Humanitarian Law, 13, 311-326.

22. The Israeli Supreme Court, Sitting as the High Court of Justice (2005). “Targeted Killings”, Petition for an Order Nisi and an Interlocutory Order, HCJ 679/02, 11 December 2005. (Cited as: “Targeted Killings”)

23. US Air Force (2012). The Military Commander and the Law. (Cited as: Military Commander)
United Nations (2014). UN Launches Unmanned Surveillance Aircraft to Better Protect Civilians in Vast DRCongo.

25. Vogel, R. J. (2011). Drone Warfare and the Law of Armed Conflict. Denver Journal of International Law and Policy, 39, 101.

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,10,Accidents,22,Activism,1,Adani Group,5,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,113,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,83,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,57,Austria,1,Automation,13,Automotive,131,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,105,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1215,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,56,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,582,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,25,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,17,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,116,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,2,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,4,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,109,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,55,Education,67,EFTA,1,Egypt,27,Election Disinformation,1,Elections,44,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,14,European Union,234,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1383,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,59,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,8,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,9,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,71,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,96,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,177,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,665,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,7,Indonesia,20,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,206,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,92,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,82,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,11,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1277,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,54,North Korea,59,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,383,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,696,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,13,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,50,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,318,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,396,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,20,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,48,South Asia,474,South China Sea,36,South East Asia,77,South Korea,63,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,33,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,655,Think Tank,317,Tibet,3,TikTok,2,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,20,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,26,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,83,United Nations,28,United States,765,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
IndraStra Global: THE PAPER | Drones, Jus in Bello and War Crimes under International Criminal Law
THE PAPER | Drones, Jus in Bello and War Crimes under International Criminal Law
This paper analyzes how the use of drones could constitute war crimes, which are grave breaches of the Geneva Conventions (Gill & Fleck, 2010) within the context of Article 8 of the Rome Statute.
IndraStra Global
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content