Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

Breach
2023
8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them

8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them

Table of Contents

Incident Details

The advancement of digital technology is transforming the landscape of warfare, leading to a concerning rise in civilian participation in armed conflicts through digital methods. Situated remotely from the physical battlegrounds, these civilians, which include hacktivists, cyber security professionals, and various types of hackers such as 'white hat,' 'black hat,' and 'patriotic,' are engaging in a range of cyber activities against perceived adversaries. Some individuals have been labeled as 'primary cyber warriors' due to the notion that the majority of cyber expertise resides within the private or civilian sector. Various examples exist of civilian hackers engaging in activities during armed conflicts, such as in the case of the conflict between Russia and Ukraine, where certain groups position themselves as a global IT community striving to support Ukraine by disrupting enemy economies, impeding crucial financial, infrastructural, and governmental services, and targeting significant entities. Reports also indicate instances where disruptions, albeit temporary, have been inflicted on hospital websites in Ukraine and allied nations, among other activities. The scale of civilian involvement in digital operations during armed conflicts has reached unprecedented levels, with multiple groups actively participating and some boasting thousands of hackers in their networks, offering automated tools to members. This phenomenon is not novel and is expected to persist. We underscore the significance of this trend for States and societies, presenting eight international humanitarian law principles that all hackers engaged in armed conflict activity must adhere to, emphasizing States' responsibility in supervising these actors.

Incident

How Did the Breach Happen?

The breach occurred due to the increasing participation of non-military individuals in military conflicts using digital methods. These individuals, such as hacktivists, cybersecurity experts, and various hackers, are engaged in a variety of digital activities against their perceived adversaries.

What Data has been Compromised?

The data breach details do not specifically identify any compromised information.

Why Did the company's Security Measures Fail?

The information concerning the inadequacy of security measures is not included in the reference page.

What Immediate Impact Did the Breach Have on the company?

The information found on the reference page does not include details about how the breach directly affected a particular company.

How could this have been prevented?

The reference page lacks any details regarding potential prevention methods for the breach.

What have we learned from this data breach?

The details provided do not directly specify any insights gained from this specific security breach.

Summary of Coverage

The breach addresses the concerning rise of civilian participation in armed conflicts using digital methods. It stresses the importance of hackers following the rules based on international humanitarian law when involved in armed conflicts and underscores the duty of states to control civilian hackers.

Is your System Free of Underlying Vulnerabilities?
Find Out Now