References
- Ancell, N. (2024), ‘Everything We Know About the Kyivstar Cyberattack,’ Cybernews, January 5. Retrieved from https://cybernews.com/cyber-war/kyivstar-cyberattack/ [accessed Aug 2024]
- Antoniuk, D. (2024), ‘Ukraine Gathers Evidence to Prosecute Hackers behind Kyivstar Attack in Hague,’ The Record, April 4. Retrieved from https://therecord.media/kyivstar-cyberattack-war-crimes-prosecution-ukraine [accessed Aug 2024]
- Applegate, S. (2011), ‘Cybermilitias and Political Hackers: Use of Irregular Forces in Cyberwarfare,’ IEEE Security & Privacy, vol. 9, no. 5, pp. 16–22. https://doi.org/10.1109/MSP.2011.46
- ARSIWA (2001), Draft Articles on Responsibility of States for Internationally Wrongful Acts, International Law Commission, United Nations.
- Bingham, C. M. (2018), Russia’s Continued Cyber Operations Targeting its Adversaries’ Energy Sectors, MA thesis, Utica College.
- Bitar, M. & Chakka, B. (2023), ‘Responsibility for Violation of Rights of Migrants in Libyan Detention Centre,’ Mizan Law Review, vol. 17, no. 2, pp. 315–342. https://doi.org/10.4314/mlr.v17i2.4
- Bitar, M. & Chakka, B. (2024), ‘Enforced Disappearances in Iraq: Attribution of Accountability to Government Under International and Domestic Legal Framework,’ LUMS Law Journal, vol. 10, no. 1.
- Bosnia-Herzegovina v. Yugoslavia [1996], ICJ, Judgment of 11 July 1996 in the Case Concerning Application of the Convention on the Prevention and Punishment of the Crime of Genocide, 11.7.1996.
- Broekstra, A. (2024), Digital Battlegrounds: Evaluating the Impact of Cyber Warfare on International Humanitarian Law in the Russian-Ukraine War [Independent thesis], Malmö University.
- Brown, G. D. & Metcalf, A. O. (2014), ‘Easier Said Than Done: Legal Reviews of Cyber Weapons,’ Journal of National Security Law & Policy, vol. 7, pp. 115–139. https://doi.org/10.2139/ssrn.2643688
- Browne, E. (2022), ‘Elon Musk Says Starlink Has Resisted Hacking Attempts from Russia “So Far,”’ Newsweek, May 11. Retrieved from https://www.newsweek.com/elon-musk-starlink-resisted-hacking-attempts-russia-1705495 [accessed Aug 2024]
- Choo, K. K. R. (2008), ‘Organised Crime Groups in Cyberspace: A Typology,’ Trends in Organized Crime, vol. 11, pp. 270–295. https://doi.org/10.1007/s12117-008-9038-9
- Collins, B. (2024), ‘The Aftermath of the Kyivstar Cyber Attack Is a Warning for Us All,’ Techradar, January 5. Retrieved from https://www.techradar.com/pro/the-aftermath-of-the-kyivstar-cyber-attack-is-a-warning-for-us-all [accessed Aug 2024]
- Czosseck, C. & Ziolkowski, K. (2013), ‘State Actors and Their Proxies in Cyberspace,’ Peacetime Regime for State Activities in Cyberspace, pp. 7–9.
- Dhelie, M. S.; Flåte, C. D.; Lie, L. M. & Sulg, E. (2023), Methods Used in Cyberattacks in the War Between Russia & Ukraine [BA thesis], NTNU.
- Geneva Convention (III) Relative to the Treatment of Prisoners of War Adopted on 12 August 1949 by the Diplomatic Conference for the Establishment of International Conventions for the Protection of Victims of War, held in Geneva from 21 April to 12 August, 1949, entry into force 21 October 1950.
- Giles, K. (2023), Russian Cyber and Information Warfare in Practice: Lessons Observed from the War on Ukraine, Chatham House, London: Royal Institute of International Affairs. https://doi.org/10.55317/9781784135898
- Gisel, L.; Rodenhäuser, T. & Dörmann, K. (2020), ‘Twenty Years On: International Humanitarian Law and the Protection of Civilians Against the Effects of Cyber Operations During Armed Conflicts,’ International Review of the Red Cross, vol. 102, no. 913, pp. 287–334. https://doi.org/10.1017/S1816383120000387
- Gorman, S. (2009), ‘Hackers Stole IDs for Attacks,’ The Wall Street Journal, August 17. Retrieved from https://www.wsj.com/articles/SB125046431841935299#articleTabs%3Darticle [accessed Aug 2024]
- Hart, K. (2008), ‘Longtime Battle Lines Are Recast in Russia and Georgia’s Cyberwar,’ The Washington Post, August 14. Retrieved from https://www.washingtonpost.com/wp-dyn/content/article/2008/08/13/AR2008081303623.html [accessed Aug 2024]
- Henckaerts, J. M. (2007), ‘Customary International Humanitarian Law: A Response to US Comments,’ International Review of the Red Cross, vol. 89, no. 866, pp. 473–488. https://doi.org/10.1017/S1816383107001129
- Henckaerts, J. M. (2009), ‘Customary International Humanitarian Law: Taking Stock of the ICRC Study,’ Nordic Journal of International Law, vol. 78, no. 4, pp. 435–468. https://doi.org/10.1163/090273509X12506922106795
- Hollis, D. B. (2007), ‘Why States Need an International Law for Information Operations,’ Lewis & Clark Law Review, vol. 11, no. 4, pp. 1023–1068.
- ICRC (2011), International Humanitarian Law and the Challenges of Contemporary Armed Conflicts, 31IC/11/5.1.2, Geneva: International Committee of the Red Cross.
- ICRC (2019), International Humanitarian Law and the Challenges of Contemporary Armed Conflicts: Recommitting to Protection in Armed Conflict on the 70th Anniversary of the Geneva Conventions, Geneva: International Committee of the Red Cross.
- ICRC (2024), Rule 6. Civilians’ Loss of Protection from Attack, Geneva: International Committee of the Red Cross. Retrieved from https://ihl-databases.icrc.org/en/customary-ihl/v1/rule6 [accessed Aug 2024]
- International Court of Justice Advisory Opinion Legality of the Threat or the Use of Nuclear Weapons, 8.7.1996.
- Ipsen, K. (2008), ‘Combatants and Non-Combatants,’ in D. Fleck (ed.) The Handbook of International Humanitarian Law, Oxford: Oxford University Press.
- Khalil, A.; Bitar, M. & Raj, S. A. K. (2024), ‘Navigating Legal Frontiers in Cyber Warfare: Insights from the Russia-Ukraine Conflict,’ The Lawyer Quarterly, vol. 14, no. 2, pp. 252–267.
- Khalil, A. & Raj, S. A. K. (2023), ‘Assessing the Legality of Autonomous Weapon Systems: An In-depth Examination of International Humanitarian Law Principles,’ Law Reform, vol. 19, no. 2, pp. 372–392. https://doi.org/10.14710/lr.v19i2.58497
- Khalil, A. & Raj, S. A. K. (2024), ‘Deployment of Autonomous Weapon Systems in the Warfare: Addressing Accountability Gaps and Reformulating International Criminal Law,’ Balkan Social Science Review, vol. 23, no. 23, pp. 261–285. https://doi.org/10.46763/BSSR242323261kr
- Kilovaty, I. (2016), ‘ICRC, NATO and the US—Direct Participation in Hacktivities— Targeting Private Contractors and Civilians in Cyberspace Under International Humanitarian Law,’ Duke Law & Technology Review, vol. 15, pp. 1–38.
- Lawand, K. (2006), ‘A Guide to the Legal Review of New Weapons, Means and Methods of Warfare: Measures to Implement Article 36 of Additional Protocol I of 1977,’ Geneva: International Committee of the Red Cross.
- Loshin, P. (2013), Practical Anonymity: Hiding in Plain Sight Online, Oxford: Newnes.
- Luban, D.; O’Sullivan, J. R. & Stewart, D. P. (2018), International and Transnational Criminal Law, New York: Aspen Publishing.
- McGinn, R. E. (1991), Science, Technology, and Society, Englewood Cliffs, NJ: Prentice Hall.
- Melzer, N. (2009), Interpretive Guidance on the Notion of Direct Participation in Hostilities Under International Humanitarian Law, Geneva: ICRC. https://doi.org/10.1017/S0272503700034388
- Muncaster, P. (2024), ‘Ukrainian “Blackjack” Hackers Take Out Russian ISP,’ Infosecurity Magazine. Retrieved from https://www.infosecurity-magazine.com/news/ukrainian-blackjack-hackers/ [accessed Aug 2024]
- O’Neill, P. H. (2022), ‘Russia Hacked an American Satellite Company One Hour Before the Ukraine Invasion,’ MIT Technology Review, May 10. Retrieved from https://www.technologyreview.com/2022/05/10/1051973/russia-hack-viasat-satellite-ukraine-invasion/ [accessed Aug 2024]
- Pearson, J. & Balmforth, T. (2024), ‘Hackers Hit Moscow Internet Provider in Response to Kyivstar Cyber Attack—Source,’ Reuters, January 9. Retrieved from https://www.reuters.com/technology/cybersecurity/hackers-hit-moscow-internet-provider-response-kyivstar-cyber-attack-source-2024-01-09/ [accessed Aug 2024]
- Prescott, J. M. (2012), ‘Direct Participation in Cyber Hostilities: Terms of Reference for Like-Minded States?’ in C. Czosseck, R. Ottis & K. Ziolkowsky (eds.) 2012 4th International Conference on Cyber Conflict (CYCON 2012), pp. 1–16. Tallinn: NATO CCDCOE Publications. https://doi.org/10.2139/ssrn.2283741
- Prosecutor v. Boskoski and Tarculovski [2008], ICTY Trial Chamber, IT-04-82-T, 10.7.2008.
- Prosecutor v. Dusko Tadic [1999], ICTY Appeal Chamber, Appeal Judgement, IT-94-1-A, 15.7.1999.
- Protocol Additional to the Geneva Conventions of August 12, 1949, and Relating to the Protection of Victims of International Armed Conflicts (Protocol I), June 8, 1977
- Rege-Patwardhan, A. (2009), ‘Cybercrimes Against Critical Infrastructures: A Study of Online Criminal Organization and Techniques,’ Criminal Justice Studies, vol. 22, no. 3, pp. 261–271. https://doi.org/10.1080/14786010903166965
- Rommen, R. (2024), ‘Ukraine’s “Blackjack” Hackers Breached 500 Russian Military Sites and Caused Chaos, Says Military Intelligence,’ Business Insider, January 21. Retrieved from https://www.businessinsider.in/international/news/ukraines-blackjack-hackers-breached-500-russian-military-sites-and-caused-chaos-says-military-intelligence/articleshow/107015698.cms [accessed Aug 2024]
- Schmitt, M. N., ed. (2013), Tallinn Manual on the International Law Applicable to Cyber Warfare, Cambridge: Cambridge University Press. https://doi.org/10.1017/CBO9781139169288
- Shakarian, P. (2011), ‘The 2008 Russian Cyber Campaign Against Georgia,’ Military Review, vol. 91, no. 6, pp. 63–70.
- Sheraz, M. M. (2021), ‘The State Responsibility for the Actions of Non-State Actors in Cyber Space Based Operations,’ PalArch’s Journal of Archaeology of Egypt/Egyptology, vol. 18, no. 10, pp. 1229–1238.
- Sigholm, J. (2013), ‘Non-State Actors in Cyberspace Operations,’ Journal of Military Studies, vol. 4, no. 1, pp. 1–37. https://doi.org/10.1515/jms-2016-0184
- Sohail, H. (2022), ‘Fault Lines in the Application of International Humanitarian Law to Cyberwarfare,’ Journal of Digital Forensics, Security and Law, vol. 17, no. 1, art. 8. https://doi.org/10.15394/jdfsl.2022.1761
- The Economist (2010), ‘War in the Fifth Domain,’ July 1. Retrieved from https://www.economist.com/briefing/2010/07/01/war-in-the-fifth-domain [accessed Aug 2024]
- The Prosecutor v. Fatmir Limaj, Haradin Bala and Isak Musliu [2005], ICTY Trial Chamber, Judgment IT-03-66-T, 30.11.2005.
- Traynor, I. (2007), ‘Russia Accused of Unleashing Cyberwar to Disable Estonia,’ The Guardian, May 17. Retrieved from https://www.theguardian.com/world/2007/may/17/topstories3.russia [accessed Aug 2024]
- Tsybulenko, E. & Francis, J. A. (2018), ‘Separatists or Russian Troops and Local Collaborators? Russian Aggression in Ukraine: The Problem of Definitions,’ in S. Sayapin & E. Tsybulenko (eds.) The Use of Force Against Ukraine and International Law, The Hague: T.M.C. Asser Press/Springer, pp. 123–144. https://doi.org/10.1007/978-94-6265-222-4_6
- Tsybulenko, E. & Kajander, A. (2022), ‘Customary International Humanitarian Law and Article 36 of Additional Protocol I to the Geneva Conventions: A Stopgap Regulator of Autonomous Weapons Systems?’ TalTech Journal of European Studies, vol. 12, no. 2, pp. 87–112. https://doi.org/10.2478/bjes-2022-0013
- Tsybulenko, E. & Kelichavyi, B. (2018), ‘International Legal Dimensions of the Russian Occupation of Crimea,’ in S. Sayapin & E. Tsybulenko (eds.) The Use of Force Against Ukraine and International Law, The Hague: T.M.C. Asser Press/Springer, pp. 277–296. https://doi.org/10.1007/978-94-6265-222-4_13
- Tsybulenko, E. & Platonova, A. (2019), ‘Violations of Freedom of Expression and Freedom of Religion by the Russian Federation as the Occupying Power in Crimea,’ Baltic Journal of European Studies, vol. 9, no. 3(28), pp. 134–147. https://doi.org/10.1515/bjes-2019-0026
- Van Creveld, M. (2009), Transformation of War, New York: Simon and Schuster.
- Wallace, D. (2018), ‘Cyber Weapon Reviews under International Humanitarian Law: A Critical Analysis,’ Tallinn Paper, no. 11, pp. 22–45.