Legal qualification of IT specialists from the international humanitarian law perspective

Keywords: IT specialists, malicious use of information and communication technologies, armed conflict, direct participation in hostilities, levée en masse, international humanitarian law

Abstract

Ever-evolving technologies significantly affect modern warfare. The use of information and communication technologies (hereinafter — ICTs) for malicious purposes in armed conflicts is increasing significantly. Moreover, there are new potential armed conflict participants, such as IT specialists. The question arises: how participation of IT specialists in armed conflicts may be qualified in accordance with the existing international humanitarian law (hereinafter — IHL)? Are they still civilians protected from attacks, or do they lose this protection as legitimate combatants? This situation highlights new legal challenges as the main rules of IHL were drafted in a very different technological age. The present research focuses on analysing the adequacy of application of the IHL in assessing the status of IT specialists in modern armed conflicts. National positions of more than 30 States with regard to the relevant problem and academic approaches were examined. The author concludes that the terminological limits of IHL make it very difficult to classify IT specialists as a specific category of persons within armed conflict. The category of direct participation of hostilities sometimes may be the most perspective, however, it has its own ambiguities. IHL norms do not take into account new capacities such as the remote location of IT specialists, the anonymity and secrecy inherent in their activities, etc. In addition, some IHL standards demonstrate their practical inapplicability to real-life situations involving the malicious use of ICTs. Nevertheless, the mix of potential statuses of IT specialists can be very dangerous for the protection of both armed conflict participants and civilians in general. Therefore, in accordance with the operating hypothesis, it is demonstrated that IHL as a regulator is poorly adequate in its application to ICTs due to corresponding restrictions of terms used, which are not adjusted to non-traditional armed conflicts. De lege ferenda, adjusting the interpretation of direct participation in hostilities category as most suitable to IT specialists in a cautious manner might be a possible solution.

Downloads

Download data is not yet available.

Author Biography

Anastasia Santalova, HSE University

Research intern, International Justice Laboratory

References

Русинова, В. Н. (2015) Права человека в вооруженных конфликтах: проблемы соотношения норм международного гуманитарного права и международного права прав человека. Статут. = Rusinova, V. N. (2015). Human rights in armed conflicts: problems of correlation of international humanitarian law and international human rights law. Statut.

Biggio, G. (2024). The legal status and targeting of hacker groups in the Russia-Ukraine cyber conflict. Journal of International Humanitarian Legal Studies, 15(1), 142–182. DOI: https://doi.org/10.1163/18781527-bja10078

Buchan, R. & Tsagourias, N. (2022). Ukranian ‘IT Army’: a cyber levée en masse or civilians directly participating in hostilities? EJIL:Talk!. Available at: https://www.ejiltalk.org/ukranian-it-army-a-cyber-levee-en-masse-or-civilians-directly-participating-in-hostilities/

Buchan, R. (2016). Cyber warfare and the status of anonymous under international humanitarian law. Chinese Journal of International Law, 15(4), 741–772. DOI: https://doi.org/10.1093/chinesejil/jmw041

Cassese, A. (2007). On some merits of the Israeli judgement on targeted Killings. Journal of International Criminal Justice, 5(2), 339–345. DOI: https://doi.org/10.1093/jicj/mqm012

Crawford, E. (2013). Virtual backgrounds: direct participation in cyber warfare. Sydney Law School Research Paper, 10/12. Available at: https://ssrn.com/abstract=2001794.

D’Urso, M. (2015). The cyber combatant: a new status for a new warrior. Philosophy & Technology, 28(3), 475–478. DOI: https://doi.org/10.1007/s13347-015-0196-9

Dinstein, Y. (2013). Cyber war and international law: concluding remarks at the 2012 Naval war college international law conference. International Law Studies, 89(1), 159–169. DOI: https://doi.org/10.1163/9789004242081_008

Dinstein, Y. (2022). The conduct of hostilities under the law of international armed conflict. Cambridge University Press. DOI: https://doi.org/10.1017/9781009106191

Droege, C. (2012). Get off my cloud: cyber warfare, international humanitarian law, and the protection of civilians. International Review of the Red Cross, 94(886), 533–578. DOI: https://doi.org/10.1017/s1816383113000246

Geiß, R. & Lahmann, H. (2012). Cyber warfare: applying the principle of distinction in an interconnected space. Israel Law Review, 45(3), 381–399. DOI: https://doi.org/10.1017/s0021223712000179

Gisel, L., Rodenhäuser, T., & Dörmann, K. (2020). Twenty years on: international humanitarian law and the protection of civilians against the effects of cyber operations during armed conflicts. International Review of the Red Cross, 102(913), 287–334. DOI: https://doi.org/10.1017/s1816383120000387

Henckaerts, J.-M., Doswald-Beck, L., Alvermann, C., Dörmann, K., & Rolle, B. (2005). Customary international humanitarian law. Cambridge University Press. DOI: https://doi.org/10.1017/cbo9780511804700

ICRC. (2021). Commentary on the Third Geneva Convention. Cambridge University Press. DOI: https://doi.org/10.1017/9781108979320

ICRC. (2020). International humanitarian law and cyber operations during armed conflicts: ICRC position paper. International Review of the Red Cross, 102(913), 481–491.

Mačak, K. & Schmitt, M. N. (2018). Enemy-controlled battlespace: the contemporary meaning and purpose of Additional Protocol I's Article 44 (3) Exception. Vanderbilt Journal of Transnational Law, 51(5), 1353–1380.

Melzer, N. (2009). Interpretive guidance on the notion of direct participation in hostilities under international humanitarian law. ICRC.

Melzer, N. (2011). Cyberwarfare and international law. UNIDIR.

Pfanner, T. (2004). Military uniforms and the law of war. International Review of the Red Cross, 86(853), 93–130. DOI: https://doi.org/10.1017/s1560775500180113

Pictet, J. S. (1960). Commentary on the Geneva Conventions of 12 August 1949. ICRC.

Pilloud, C., Sandoz, Y., Swinarski, C., & Zimmermann, B. (Eds.). (1987). Commentary on the additional protocols: of 8 June 1977 to the Geneva Conventions of 12 August 1949. Martinus Nijhoff Publishers.

Preston, S. E., & Taylor, R. S. (2016). Department of defense law of war manual. General Counsel of the Department of Defense Washington United States. DOI: https://doi.org/10.1017/9781108659727.

Rodenhäuser, T. & Vignati, M. (4 October 2023). 8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them. EJIL:Talk!. Available at: https://www.ejiltalk.org/8-rules-for-civilian-hackers-during-war-and-4-obligations-for-states-to-restrain-them/

Roscini, M. (2014). Cyber operations and the use of force in international law. Oxford University Press. DOI: https://doi.org/10.1093/acprof:oso/9780199655014.001.0001

Rusinova, V. N. (2022). Qualification of harmful use of information and communications technologies under international law: in search of a consensus. Moscow Journal of International Law, 1, 38–51. DOI: https://doi.org/10.24833/0869-0049-2022-1-38-51

Rusinova, V. & Martynova, E. (2023). Fighting cyber attacks with sanctions: digital threats, economic responses. Israel Law Review, 57(1), 135–174. DOI: https://doi.org/10.1017/s0021223722000255

Sassoli, M. & Bouvier, A. (2008). Legal protection in time of war. ICRC.

Schmitt, M. N. (2004). Humanitarian law and direct participation in hostilities by private contractors or civilian employees. Chicago Journal of International Law, 5(2), 511–546.

Schmitt, M. N. (2011). Cyber operations and the jus in bello: key issues. In Israel Yearbook on Human Rights. Vol. 41 (pp. 113–135). Brill Nijhoff. DOI: https://doi.org/10.1163/9789004226449_006

Schmitt, M. N. (2012). Classification in future conflict. In E. Wilmshurst (Ed)., International law and the classification of conflicts (pp. 455–477). Oxford Academic. DOI: https://doi.org/10.1093/law/9780199657759.003.0014

Schmitt, M. N. (Ed.). (2013). Tallinn Manual on the international law applicable to cyber warfare. Cambridge University Press. DOI: https://doi.org/10.1017/cbo9781139169288

Schmitt, M. N. (2015). The use of cyber force and international law. In M. Weller (Ed.), The Oxford handbook of the use of force in international law. Oxford Academic. DOI: https://doi.org/10.1093/law/9780199673049.003.0053

Schmitt, M. N. (2017). Tallinn Manual 2.0 on the international law applicable to cyber operations. Cambridge University Press. DOI: https://doi.org/10.1017/9781316822524

Turns, D. (2012). Cyber warfare and the notion of direct participation in hostilities. Journal of conflict and security law, 17(2), 279–297. DOI: https://doi.org/10.1093/jcsl/krs021

Wallace, D. A. & Reeves, S. (2013). The law of armed conflict's' wicked' problem: levée en masse in cyber warfare. International Law Studies, 89, 646–668.

Wallace, D., Reeves, S., & Powell, T. (2021). Direct participation in hostilities in the age of cyber: exploring the fault lines. Harvard National Security Journal, 12, 164–197.

Waters, C. (2014). New hacktivists and the old concept of levée en masse. The Dalhousie Law Journal, 37(2), 772–786.

Watkin, K. (2005). Humans in the cross-hairs: targeting and assassination in contemporary armed conflict. In D. Wippman & M. Evangelista (Eds.), New wars, new laws? Applying laws of war in 21st century conflicts (pp. 137–179). Brill Nijhoff. DOI: https://doi.org/10.1163/9789004479692_008

Published
2025-05-16
How to Cite
Santalova A. (2025). Legal qualification of IT specialists from the international humanitarian law perspective. HSE University Journal of International Law, 3(1), 46–68. https://doi.org/10.17323/jil.2025.27025
Section
Theoretical Inquiries