Cyber War Crimes Will Be Prosecuted

The International Criminal Court (ICC) will begin to investigate and prosecute cyber war crimes in the way it investigates kinetic and physical war crimes.  Writing in the online journal Digital Frontlines, the ICC prosecutor Karim Khan focused on criminal cyber acts. 

In his essay, asserts that the types of aggression being carried out in cyberspace could “potentially fulfill” the conditions already laid out in current international crime criteria, thereby warranting ICC scrutiny and potential prosecution.

“As states and other actors increasingly resort to operations in cyberspace, this new and rapidly developing means of statecraft and warfare can be misused to carry out or facilitate war crimes, crimes against humanity, genocide, and even the aggression of one state against another." 

Cyberwarfare does not play out in the abstract. Rather, it can have a profound impact on people’s lives,” Khan writes. 

“Attempts to impact critical infrastructure such as medical facilities or control systems for power generation may result in immediate consequences for many, particularly the most vulnerable. Consequently, as part of its investigations, my Office will collect and review evidence of such conduct.” In his analysis, Khan includes includes the softer areas of cyber operations for ICC review. These would include, such as disinformation that seek to “exploit ambiguity” and operate in the gray area between conflict and peace, legal and illegal, where proxies and nonstate elements are utilised.  

Under the Geneva Convention, attacks against civilians can constitute war crimes under international humanitarian law, and for some time, researchers have pushed for cyber crimes to be recognized in this category.

Russia is not discussed in the article, although it is clear that the types of activities Khan is describing is what has  been seen taking place during the Ukraine conflict since the 2014 occupation of Crimea. Russia-inspired cyber activity has targeted Ukrainian critical infrastructure, notably its power grids, causing temporary blackouts across Ukraine. These events notably included the deployment of NotPetya malware, initially used to infect Ukraine but quickly spreading around the world.  Instead of stealing data, NotPetya destroyed it, elevating a disruptive attack into a highly destructive one.  

With respect to the softer side of cyber operations, Russia has been connected to global fake information and propaganda attempting to influence national elections. On this basis, is quite likely that  Russia’s cyber attacks against civilian infrastructure in Ukraine may be the first case to be brought by the ICC.

Karim Khan:     Oodaloop:      Wired:     CybersecurityConnect:    Ars Technica:   DigWatch:

You Might Also Read:

How To Counter Covert Action In The Digital Age:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« Update: The 2023 Malware League Table
Neuromorphic Computing Changes Machine Learning »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DLA Piper

DLA Piper

DLA Piper is a global law firm with offices throughout the Americas, Asia Pacific, Europe and the Middle East. Practice areas include Cybersecurity.

Aves Netsec

Aves Netsec

Aves is a deceptive security system for enterprises who want to capture, observe and mitigate bad actors in their internal network.

SWAT Systems

SWAT Systems

SWAT Systems is an IT support and cyber security managed service provider.

PeckShield

PeckShield

PeckShield is a blockchain security company which aims to elevate the security, privacy, and usability of entire blockchain ecosystem by offering top-notch, industry-leading services and products.

Expel

Expel

Expel provide transparent managed security services, 24x7 detection, response and resilience.

Sygnia

Sygnia

Sygnia is a cyber technology and services company, providing high-end consulting and incident response support for organizations worldwide.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

ATHENE National Research Center For Applied Cybersecurity

ATHENE National Research Center For Applied Cybersecurity

ATHENE is the largest research center for cybersecurity and privacy in Europe, conducting application-oriented top-level research for the benefit of the economy, society and the state.

Comcast Technology Solutions (CTS)

Comcast Technology Solutions (CTS)

Comcast Technology Solutions delivers proven technologies for global video, media, communications, data applications, and cybersecurity & compliance.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

EkoCyber

EkoCyber

EkoCyber partner with businesses as a value-added MSSP to provide top-tier, trusted and transparent cyber security services at an affordable price point.

NOYB

NOYB

NOYB is a non-profit organization aiming to close the gap between privacy laws and the reality of corporate practice.

Boo Consulting

Boo Consulting

Boo Consulting is a trusted privacy and risk consultancy firm. We are driven to help you find an appropriate solution that will suit your budget and requirements.

Cyber Dexterity

Cyber Dexterity

Cyber Dexterity deliver tailored advisory and learning solutions that empower your people, customers and key stakeholders with lasting skills and capabilities.