Timely essays from experienced contributors examine the damage recent conflict has caused to cultural heritage, and how it may best be safeguarded in future.
Archaeology and the Military: an Introduction - Laurie W. Rush
The Obligations Contained in International Treaties of Armed Forces to Protect Cultural Heritage in Times of Armed Conflict - Patty Gerstenblith
Rescuing Europe's Cultural Heritage: The Role of the Allied Monuments Officers in World War II - Krysia Spirydowicz
The UK's Training and Awareness Programme - Julian Radcliffe
US Army Civil Affairs: Protecting Cultural Property, Past and Future - Corine Wegener
Cultural Property Protection in the Event of Armed Conflict: Deploying Military Experts or Can White Men Sing the Blues? - Joris Kila
Good Training and Good Practice: Protection of the Cultural Heritage on the UK Defence Training Estate - Martin Brown
In-Theatre Soldier Training through Cultural Heritage Playing Cards: a US Department of Defense Example - James Zeidler
In-Theatre Soldier Training through Cultural Heritage Playing Cards: a US Department of Defense Example - Laurie W. Rush
Dealing the Heritage Hand: Establishing a United States Department of Defense Cultural Property Protection Program for Global Operations - Laurie W. Rush
Teaching Cultural Property Protection in the Middle East: the Central Command Historical Cultural Advisory Group and International Efforts - Laurie W. Rush
Cultural Resources Data for Heritage Protection in Contingency Operations - Paul R Green
Time not on my side: Cultural Resource Management in Kirkuk, Iraq - Darrell C Pinckney
US Military Support of Cultural Heritage Awareness and Preservation in Post-Conflict Iraq - Diane C Siebrandt
Operation Heritage - Hugo Clarke
Cultural Property Protection in the Event of Armed Conflict - Austrian Experiences - Friedrich Schipper
Role of the Swiss Armed Forces in the Protection of Cultural Property - Stephan Zellmeyer
Preserving Global Heritage from Space in Times of War - Sarah Parcak
Appendices: 1954 Hague Convention and its two Protocols