Skip to main content

Unprivileged Belligerency in a Deterritorialized Cyber Battlefield? Some Lessons Learned from the Russia-Ukraine Conflict

  • Chapter
  • First Online:
Global Impact of the Ukraine Conflict
  • 429 Accesses

Abstract

Despite the fact that heightened geopolitical tensions brought about by the Russia-Ukraine Conflict may spur a stalemate in the UN’s consensus-based efforts to advance international law and norms in cyberspace, the conflict has given rise to a number of challenging questions of international law applicable to cyberspace in armed conflict, notably regarding the extent to which the existing relevant rules of international law are applicable and at what point we need the development of new rules tailored to the unique features of cyberspace. With that in mind, aiming to offer some key takeaways from the conflict, this chapter attempts to explore: (1) whether and when Ukraine’s cyber volunteers could be deemed as engaging in unprivileged belligerency; (2) what the legal consequences would be in that case; and (3) what kind of responsibilities and obligations Ukraine and the third States would incur from those acts of unprivileged belligerency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    See, eg, Stokel-Walker (2022).

  2. 2.

    See, eg, Landau (2022).

  3. 3.

    Lewis (2022).

  4. 4.

    See, eg, Landau (2022), Lewis (2022).

  5. 5.

    See United States Senate (2022), p. 3.

  6. 6.

    See North Atlantic Treaty Organization (NATO) (2022).

  7. 7.

    See Microsoft (2022) p. 5.

  8. 8.

    See, eg, BBC (2022).

  9. 9.

    See the official website of IT Army of Ukraine: https://itarmy.com.ua/?lang=en.

  10. 10.

    See the dedicated channels of the IT Army of Ukraine: https://t.me/s/itarmyofukraine2022.

  11. 11.

    See Soesanto (2022), p. 4.

  12. 12.

    See also Soesanto (2022), pp. 15–19, Waterman (2023) (“it is not only hacktivists who clutter up cyberspace during time of conflict. Just as looters and marauders take advantage of the chaos of war in real life, so cybercriminals have sought to monetize the online chaos that accompanies digital conflict… Using the fog of war for profit, cyber criminals commit financially motivated crimes and just sign themselves as the IT Army or KillNet.”).

  13. 13.

    Soesanto (2022), p. 4.

  14. 14.

    See United Nations (2021).

  15. 15.

    See, eg, Schmitt (2017), pp. 415–419 (Rule 92).

  16. 16.

    See, eg, Sandoz et al (1987), p. 512, para 1672, Schmitt (2017), p. 389, para 11.

  17. 17.

    See UK Ministry of Defence (2005), para 4.3.3.

  18. 18.

    ICRC (2009), p. 23.

  19. 19.

    Prosecutor v. Tadić, IT-94-1-A, ICTY, Appeals Chamber, Judgment, July 15, 1999, para 145.

  20. 20.

    Soesanto (2022), p. 28.

  21. 21.

    Soesanto (2022), pp. 23–24.

  22. 22.

    See Schmitt (2017), p. 405, para 11.

  23. 23.

    Schmitt (2017), p. 405, para 12. On the other hand, it may be meaningful to keep putting its own uniform on as it allows a combatant to justify the compliance with the prohibition on perfidious acts of feigning civilian or non-combatant status. See, eg, Mačák (2021), p. 420.

    See Schmitt (2017), p. 406, para 14.

  24. 24.

    Ministry of Foreign Affairs of Japan (2021), p. 50.

  25. 25.

    Soesanto (2022), p. 28.

  26. 26.

    See Schmitt (2017), pp. 389, 404–405.

  27. 27.

    See, eg, Soesanto (2022), pp, 7–19.

  28. 28.

    See, eg, Miller (2022) (“Victor Zhora, the deputy chair of Ukraine’s State Service of Special Communications and Information Protection, a key Ukrainian cyber agency, stressed in an interview that the IT Army has no government connection, but also described the group as invaluable. … Ukraine doesn’t perform any offensive operations and does not coordinate the IT Army, but considering the level of destruction, the level of evil that Russia’s doing in Ukraine, we are grateful to all people that contribute to the weakening of our enemy,” Zhora said.”), New York Times (2022) (“We not only defend ourselves, but we are able to counterattack with the help of our cybervolunteers”).

  29. 29.

    It is generally understood that a territory is considered occupied when it is under the effective control of the hostile armed forces, in view of Article 42 of the Hague Convention on the Laws and Customs of War on Land of 1907 which sets out the following: “Territory is considered occupied when it is actually placed under the authority of the hostile army. The occupation extends only to the territory where such authority has been established and can be exercised.” See, eg, International Committee of the Red Cross (2012), p. 7, Ferraro (2012), pp. 136–139.

  30. 30.

    See also Buchan and Nicholas (2022).

  31. 31.

    See generally Olson (2015), pp. 911–938. Some countries like the United States, as a non-contracting party to the API, have underlined that unprivileged belligerents should be classified as the persons distinct from combatants and civilians for their treatments as a matter of customary international law applicable to armed conflict. See, eg, United States Department of Defense (2016), para 4.3.1 (“Although seldom explicitly recognized as a class in law of war treaties, the category of unprivileged belligerent may be understood as an implicit consequence of creating the classes of lawful combatants and peaceful civilians. The concept of unprivileged belligerency, i.e., the set of legal liabilities associated with unprivileged belligerents, may be understood in opposition to the rights, duties, and liabilities of lawful combatants and peaceful civilians. Unprivileged belligerents include lawful combatants who have forfeited the privileges of combatant status by engaging in spying or sabotage, and private persons who have forfeited one or more of the protections of civilian status by engaging in hostilities.”). See also Anderson (2007). On the flip side, a number of experts emphasize that there is no intermediate status under the law of armed conflict, which is also adopted by the ICTY which opined that “there is no gap between the Third and the Fourth Geneva Conventions. If an individual is not entitled to the protections of the Third Convention as a prisoner of war, (or of the First or Second Conventions) he or she necessarily falls within the ambit of Convention IV, provided article 4 requirements are satisfied.” Prosecutor v. Delalic, Case No. IT-96-21-T, Judgment, November 16, 1998, para 271. This is also the view shared by the ICRC. International Committee of the Red Cross (2007), p. 727.

  32. 32.

    Corn (2011), p. 289.

  33. 33.

    See, eg, Olson (2015), pp. 915–917.

  34. 34.

    See, eg, International Committee of the Red Cross (2009), pp. 83–85.

  35. 35.

    As for the temporal issue of the notion of “unless and for such time as,” see, eg, Boothby (2010), p. 742.

  36. 36.

    See International Committee of the Red Cross (2009), p. 16.

  37. 37.

    United States Department of Defense (2016), para 5.8.1.2.

  38. 38.

    See Schmitt (2017), pp. 428–432 (Rule 97).

  39. 39.

    See International Committee of the Red Cross (2009), pp. 41–64.

  40. 40.

    For instance, the hacktivist group, “disBalancer” (https://disbalancer.com/) has been engaged in cyberattacks to help Ukraine liberate from Russia, using the DDoS tool called “Liberator,” and professes its relationship with the Ukrainian government, advertising that “We’re acting in coordination with the Ministry of Digital Transformation of Ukraine.” See, eg, Soesanto (2022), pp. 15–19.

  41. 41.

    See, eg, Jin (2022).

  42. 42.

    See, eg, Duguin and CyberPeace Institute (2022) (“The publication of large volumes of sensitive data has become part and parcel of the cyberthreat landscape during the conflict. Acting in the name of anti-war activism, collectives have conducted a significant number of hack-and-leak attacks which lead to sensitive customer and corporate data, including personal data, being made publicly available. These attacks raise significant questions relating to the protection of individuals, data protection, and the potential for malicious use of this data in the future.”). As for impacts of malicious cyber operations on humanitarian sectors, see also Marelli (2023).

  43. 43.

    Soesanto (2022), p. 16.

  44. 44.

    See Waterman (2023).

  45. 45.

    See Conger and Satariano (2022).

  46. 46.

    International Committee of the Red Cross (2009), pp. 38–39.

  47. 47.

    See Mačák (2021), p. 420.

  48. 48.

    See, eg, Radauskas (2023).

  49. 49.

    Healey and Grinberg rightly observe this point: “Since Russia’s invasion of Ukraine, these cyber norms are being actively undermined—and not just by Russia. These “like-minded” states—many of them Western nations—that have mobilized to provide support to Ukraine in its plight against Russia should continue to do so and loudly call out Russian atrocities. But to ensure that these norms are globally respected, these States must not facilitate selective enforcement and ignore Ukrainian violations of this hard-negotiated diplomatic consensus.” See Healey and Grinberg (2022).

  50. 50.

    Prosecutor General’s Office of Ukraine, Crimes Committed During Full-Scale Invasion of the RF, https://www.gp.gov.ua/.

  51. 51.

    See, eg, Bothe et al (2013), pp. 620–621.

  52. 52.

    See, eg, Sandoz et al (1987), para 3651.

  53. 53.

    International Committee of the Red Cross (2016), p. 36, para 118.

  54. 54.

    International Committee of the Red Cross (2016), p. 46, para 151.

  55. 55.

    On the flip side, some experts argue that the obligation applies to the parties to an armed conflict alone. See, eg, Schmitt and Watts (2020).

  56. 56.

    See, eg, Schmitt (2023), Heintschel von Heinegg (2007), United States Department of Defense (2016), para 15.2.2 (“The United States has taken the position that certain duties of neutral States may be inapplicable under the doctrine of qualified neutrality.”).

  57. 57.

    As recent research that demonstrates the difficulty in applying the law as it is to cyberspace, see Neuman (2021).

  58. 58.

    Tallinn Manual 2.0 derives Rule 152 on neutral obligations from Article 5, para 1 of HCV. See Schmitt (2017), pp. 558–560.

  59. 59.

    Schmitt (2017), p. 559, para 5.

  60. 60.

    See footnote 59.

  61. 61.

    Tsagourias poses similar questions, stating as follows: “more critical issue is whether online recruitment on neutral servers but from sites controlled by Ukraine (for example by functionally controlling or exclusively managing the site) breaches Article 4 Hague Convention V. … Would Article 4 Hague Convention V apply if those recruited online remain physically within the neutral State? … If, however, one wants to look beyond the physical boundaries of the law and look at their digital version in the form of digital persona and digital territory as determined for example by IP addresses, it is possible to argue that Article 4 Hague Convention V does not apply because those recruited are digitally operating outside neutral territory.” See Tsagourias (2022).

  62. 62.

    This controversial issue remains highly debated and entangled with other related issues, such as the definition of cyberspace and loss of data location in cybercrime investigation. Highlighting the virtual character, the UK government defines cyberspace as “the interdependent network of information technology infrastructures that includes the Internet, telecommunications networks, computer systems, internet connected devices and embedded processors and controllers. It may also refer to the virtual world or domain as an experienced phenomenon, or abstract concept.” See United Nations (2021), p. 115 n. 272. In a similar vein, as a view that underlines the de-territorial character of cyberspace, see Council of Europe (2013), p. 9, para 298 (“While the principle of territoriality will remain predominant, in particular with respect to jurisdiction to enforce, the applicability of this principle in “cyberspace”—where data are moving between, are fragmented over, are dynamically composed from, or are mirrored on servers in multiple jurisdictions—is in doubt. It is not possible to apply the principle of territoriality if the location of data is uncertain.”). By contrast, see Akande et al. (2021) (“what we often call ‘cyberspace’ is nothing more than a set of information and communications technologies that enable individuals to exchange and process information more efficiently, such as the Internet and other networks. As much as software, code and data play a significant role in how these technologies operate, they are necessarily made up of physical components or hardware, such as cables, satellites, radio waves, computers and their millions of silicon circuits, as well as the individuals who build, control and use software, hardware and data. Likewise, even if these multifaceted physical components cross national borders to create an imaginary ‘global information space’, as encapsulated in terms such as ‘The Cloud’, ‘World Wide Web’, or ‘Virtual Reality’, these remain very much grounded in tangible physical infrastructure as well as human beings of flesh and bone that are located somewhere in the world.”).

  63. 63.

    To take a prominent example, UK has showed its hesitancy to recognize the principle as applicable to cyberspace as a legally-binding rule since a 2018 speech by then-Attorney General, Jeremy Wright. See UK Attorney General’s Office and The Rt Hon Sir Jeremy Wright KC MP (2018) (“Sovereignty is of course fundamental to the international rules-based system. But I am not persuaded that we can currently extrapolate from that general principle a specific rule or additional prohibition for cyber activity beyond that of a prohibited intervention. The UK Government’s position is therefore that there is no such rule as a matter of current international law.”).

References

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kurosaki, M. (2023). Unprivileged Belligerency in a Deterritorialized Cyber Battlefield? Some Lessons Learned from the Russia-Ukraine Conflict. In: Furuya, S., Takemura, H., Ozaki, K. (eds) Global Impact of the Ukraine Conflict. Springer, Singapore. https://doi.org/10.1007/978-981-99-4374-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-4374-6_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-4373-9

  • Online ISBN: 978-981-99-4374-6

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics