Legal qualification of IT specialists from the international humanitarian law perspective
Abstract
Ever-evolving technologies significantly affect modern warfare. The use of information and communication technologies (hereinafter — ICTs) for malicious purposes in armed conflicts is increasing significantly. Moreover, there are new potential armed conflict participants, such as IT specialists. The question arises: how participation of IT specialists in armed conflicts may be qualified in accordance with the existing international humanitarian law (hereinafter — IHL)? Are they still civilians protected from attacks, or do they lose this protection as legitimate combatants? This situation highlights new legal challenges as the main rules of IHL were drafted in a very different technological age. The present research focuses on analysing the adequacy of application of the IHL in assessing the status of IT specialists in modern armed conflicts. National positions of more than 30 States with regard to the relevant problem and academic approaches were examined. The author concludes that the terminological limits of IHL make it very difficult to classify IT specialists as a specific category of persons within armed conflict. The category of direct participation of hostilities sometimes may be the most perspective, however, it has its own ambiguities. IHL norms do not take into account new capacities such as the remote location of IT specialists, the anonymity and secrecy inherent in their activities, etc. In addition, some IHL standards demonstrate their practical inapplicability to real-life situations involving the malicious use of ICTs. Nevertheless, the mix of potential statuses of IT specialists can be very dangerous for the protection of both armed conflict participants and civilians in general. Therefore, in accordance with the operating hypothesis, it is demonstrated that IHL as a regulator is poorly adequate in its application to ICTs due to corresponding restrictions of terms used, which are not adjusted to non-traditional armed conflicts. De lege ferenda, adjusting the interpretation of direct participation in hostilities category as most suitable to IT specialists in a cautious manner might be a possible solution.
Downloads
References
Русинова, В. Н. (2015) Права человека в вооруженных конфликтах: проблемы соотношения норм международного гуманитарного права и международного права прав человека. Статут. = Rusinova, V. N. (2015). Human rights in armed conflicts: problems of correlation of international humanitarian law and international human rights law. Statut.
Biggio, G. (2024). The legal status and targeting of hacker groups in the Russia-Ukraine cyber conflict. Journal of International Humanitarian Legal Studies, 15(1), 142–182. DOI: https://doi.org/10.1163/18781527-bja10078
Buchan, R. & Tsagourias, N. (2022). Ukranian ‘IT Army’: a cyber levée en masse or civilians directly participating in hostilities? EJIL:Talk!. Available at: https://www.ejiltalk.org/ukranian-it-army-a-cyber-levee-en-masse-or-civilians-directly-participating-in-hostilities/
Buchan, R. (2016). Cyber warfare and the status of anonymous under international humanitarian law. Chinese Journal of International Law, 15(4), 741–772. DOI: https://doi.org/10.1093/chinesejil/jmw041
Cassese, A. (2007). On some merits of the Israeli judgement on targeted Killings. Journal of International Criminal Justice, 5(2), 339–345. DOI: https://doi.org/10.1093/jicj/mqm012
Crawford, E. (2013). Virtual backgrounds: direct participation in cyber warfare. Sydney Law School Research Paper, 10/12. Available at: https://ssrn.com/abstract=2001794.
D’Urso, M. (2015). The cyber combatant: a new status for a new warrior. Philosophy & Technology, 28(3), 475–478. DOI: https://doi.org/10.1007/s13347-015-0196-9
Dinstein, Y. (2013). Cyber war and international law: concluding remarks at the 2012 Naval war college international law conference. International Law Studies, 89(1), 159–169. DOI: https://doi.org/10.1163/9789004242081_008
Dinstein, Y. (2022). The conduct of hostilities under the law of international armed conflict. Cambridge University Press. DOI: https://doi.org/10.1017/9781009106191
Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross, 94(886), 533–578. DOI: https://doi.org/10.1017/s1816383113000246
Geiß, R. & Lahmann, H. (2012). Cyber warfare: applying the principle of distinction in an interconnected space. Israel Law Review, 45(3), 381–399. DOI: https://doi.org/10.1017/s0021223712000179
Gisel, L., Rodenhäuser, T., & Dörmann, K. (2020). Twenty years on: international humanitarian law and the protection of civilians against the effects of cyber operations during armed conflicts. International Review of the Red Cross, 102(913), 287–334. DOI: https://doi.org/10.1017/s1816383120000387
Henckaerts, J.-M., Doswald-Beck, L., Alvermann, C., Dörmann, K., & Rolle, B. (2005). Customary international humanitarian law. Cambridge University Press. DOI: https://doi.org/10.1017/cbo9780511804700
ICRC. (2021). Commentary on the Third Geneva Convention. Cambridge University Press. DOI: https://doi.org/10.1017/9781108979320
ICRC. (2020). International humanitarian law and cyber operations during armed conflicts: ICRC position paper. International Review of the Red Cross, 102(913), 481–491.
Mačak, K. & Schmitt, M. N. (2018). Enemy-controlled battlespace: the contemporary meaning and purpose of Additional Protocol I's Article 44 (3) Exception. Vanderbilt Journal of Transnational Law, 51(5), 1353–1380.
Melzer, N. (2009). Interpretive guidance on the notion of direct participation in hostilities under international humanitarian law. ICRC.
Melzer, N. (2011). Cyberwarfare and international law. UNIDIR.
Pfanner, T. (2004). Military uniforms and the law of war. International Review of the Red Cross, 86(853), 93–130. DOI: https://doi.org/10.1017/s1560775500180113
Pictet, J. S. (1960). Commentary on the Geneva Conventions of 12 August 1949. ICRC.
Pilloud, C., Sandoz, Y., Swinarski, C., & Zimmermann, B. (Eds.). (1987). Commentary on the additional protocols: of 8 June 1977 to the Geneva Conventions of 12 August 1949. Martinus Nijhoff Publishers.
Preston, S. E., & Taylor, R. S. (2016). Department of defense law of war manual. General Counsel of the Department of Defense Washington United States. DOI: https://doi.org/10.1017/9781108659727.
Rodenhäuser, T. & Vignati, M. (4 October 2023). 8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them. EJIL:Talk!. Available at: https://www.ejiltalk.org/8-rules-for-civilian-hackers-during-war-and-4-obligations-for-states-to-restrain-them/
Roscini, M. (2014). Cyber operations and the use of force in international law. Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780199655014.001.0001
Rusinova, V. N. (2022). Qualification of harmful use of information and communications technologies under international law: in search of a consensus. Moscow Journal of International Law, 1, 38–51. DOI: https://doi.org/10.24833/0869-0049-2022-1-38-51
Rusinova, V. & Martynova, E. (2023). Fighting cyber attacks with sanctions: digital threats, economic responses. Israel Law Review, 57(1), 135–174. DOI: https://doi.org/10.1017/s0021223722000255
Sassoli, M. & Bouvier, A. (2008). Legal protection in time of war. ICRC.
Schmitt, M. N. (2004). Humanitarian law and direct participation in hostilities by private contractors or civilian employees. Chicago Journal of International Law, 5(2), 511–546.
Schmitt, M. N. (2011). Cyber operations and the jus in bello: key issues. In Israel Yearbook on Human Rights. Vol. 41 (pp. 113–135). Brill Nijhoff. DOI: https://doi.org/10.1163/9789004226449_006
Schmitt, M. N. (2012). Classification in future conflict. In E. Wilmshurst (Ed)., International law and the classification of conflicts (pp. 455–477). Oxford Academic. DOI: https://doi.org/10.1093/law/9780199657759.003.0014
Schmitt, M. N. (Ed.). (2013). Tallinn Manual on the international law applicable to cyber warfare. Cambridge University Press. DOI: https://doi.org/10.1017/cbo9781139169288
Schmitt, M. N. (2015). The use of cyber force and international law. In M. Weller (Ed.), The Oxford handbook of the use of force in international law. Oxford Academic. DOI: https://doi.org/10.1093/law/9780199673049.003.0053
Schmitt, M. N. (2017). Tallinn Manual 2.0 on the international law applicable to cyber operations. Cambridge University Press. DOI: https://doi.org/10.1017/9781316822524
Turns, D. (2012). Cyber warfare and the notion of direct participation in hostilities. Journal of conflict and security law, 17(2), 279–297. DOI: https://doi.org/10.1093/jcsl/krs021
Wallace, D. A. & Reeves, S. (2013). The law of armed conflict's' wicked' problem: levée en masse in cyber warfare. International Law Studies, 89, 646–668.
Wallace, D., Reeves, S., & Powell, T. (2021). Direct participation in hostilities in the age of cyber: exploring the fault lines. Harvard National Security Journal, 12, 164–197.
Waters, C. (2014). New hacktivists and the old concept of levée en masse. The Dalhousie Law Journal, 37(2), 772–786.
Watkin, K. (2005). Humans in the cross-hairs: targeting and assassination in contemporary armed conflict. In D. Wippman & M. Evangelista (Eds.), New wars, new laws? Applying laws of war in 21st century conflicts (pp. 137–179). Brill Nijhoff. DOI: https://doi.org/10.1163/9789004479692_008
This work is licensed under CC BY-NC-ND 4.0