Brother
Professional
- Messages
- 2,590
- Reaction score
- 539
- Points
- 113
What are the consequences of performing custom hacks that clearly violate human rights?
The Observer Research Foundation (ORF), an Indian think tank based in Delhi, recently put forward a thesis about the need for an international response to the actions of so-called "cyber hires". Examples of such mercenaries include the well-known North Korean group Lazarus and the Israeli company NSO Group, which sells spyware.
The author of the report, a girl named Fitri Bintang Timur, argues that such groups should be considered as mercenaries in the field of cybersecurity. It refers to the definition of mercenaries under the Geneva Convention as "entities motivated by financial or material gain, ready to fight for the country of the customer." In the modern world, this means using information technologies and networks to conduct cyber operations.
As examples of such actions, Timur cited the development and distribution of malware by the Lazarus group commissioned by the North Korean government, as well as the sale by the Israeli company NSO Group of its Pegasus spyware software to governments of many countries, despite its illegitimacy and controversial status.
The report highlights that the market for cyber hires is growing as they allow states to enhance their offensive capabilities while maintaining a "plausible deniability of engagement at the expense of unrecognizability."
It is also noted that the use of cyber hires is cost-effective: they do not require a human resources department, training and other personnel costs. Countries that do not have the capacity to maintain their own units of national hackers can hire cyber hires to achieve their goals.
Timur calls for the development of legislation that would combine the use of intelligence and digital tools with human rights obligations. It also emphasizes the need to establish standards according to which anyone's actions in the interests of national security must necessarily respect these rights.
As an example, the situation with the NSO Group is mentioned, when the European Commission decided not to interfere in the use by EU member states of their Pegasus spyware, classified as a "national security"tool. However, this software was used to spy on politicians, journalists, businessmen, activists, scientists, and others who pose little threat to security, but are more likely to cause unnecessary trouble for politicians.
Timur's report concludes with a call for citizens to hold governments and businesses accountable for hiring cyber hires. The girl also mentioned that civil society groups have long been taking active actions through lawsuits, demanding more transparency from any similar associations.
The Observer Research Foundation (ORF), an Indian think tank based in Delhi, recently put forward a thesis about the need for an international response to the actions of so-called "cyber hires". Examples of such mercenaries include the well-known North Korean group Lazarus and the Israeli company NSO Group, which sells spyware.
The author of the report, a girl named Fitri Bintang Timur, argues that such groups should be considered as mercenaries in the field of cybersecurity. It refers to the definition of mercenaries under the Geneva Convention as "entities motivated by financial or material gain, ready to fight for the country of the customer." In the modern world, this means using information technologies and networks to conduct cyber operations.
As examples of such actions, Timur cited the development and distribution of malware by the Lazarus group commissioned by the North Korean government, as well as the sale by the Israeli company NSO Group of its Pegasus spyware software to governments of many countries, despite its illegitimacy and controversial status.
The report highlights that the market for cyber hires is growing as they allow states to enhance their offensive capabilities while maintaining a "plausible deniability of engagement at the expense of unrecognizability."
It is also noted that the use of cyber hires is cost-effective: they do not require a human resources department, training and other personnel costs. Countries that do not have the capacity to maintain their own units of national hackers can hire cyber hires to achieve their goals.
Timur calls for the development of legislation that would combine the use of intelligence and digital tools with human rights obligations. It also emphasizes the need to establish standards according to which anyone's actions in the interests of national security must necessarily respect these rights.
As an example, the situation with the NSO Group is mentioned, when the European Commission decided not to interfere in the use by EU member states of their Pegasus spyware, classified as a "national security"tool. However, this software was used to spy on politicians, journalists, businessmen, activists, scientists, and others who pose little threat to security, but are more likely to cause unnecessary trouble for politicians.
Timur's report concludes with a call for citizens to hold governments and businesses accountable for hiring cyber hires. The girl also mentioned that civil society groups have long been taking active actions through lawsuits, demanding more transparency from any similar associations.