Hostname: page-component-cd9895bd7-gbm5v Total loading time: 0 Render date: 2024-12-24T00:38:17.006Z Has data issue: false hasContentIssue false

Blurred Lines: Social Media in Armed Conflict

Winner of the Best in category, Justis International Writing Competition 2019 for the category Social Media, Technology and the Law (in partnership with the Richmond Journal of Law & Technology), by Iphigenia Fisentzou of BPP.

Published online by Cambridge University Press:  24 April 2019

Rights & Permissions [Opens in a new window]

Extract

Technological advancements have revolutionised the social interactions of global society and in turn influenced the means and methods of warfare; increasing the involvement of civilians in hostilities, not only as victims but also as participants. Together with the involvement of multiple state and non-state actors, civilian participation makes these modern conflicts all the more unpredictable, challenging inter alia the traditional notion of direct participation in hostilities established under international law.

Type
Short Articles
Copyright
Copyright © The Author(s) 2019. Published by British and Irish Association of Law Librarians 

Technological advancements have revolutionised the social interactions of global society and in turn influenced the means and methods of warfare; increasing the involvement of civilians in hostilities, not only as victims but also as participants.Footnote 1 Together with the involvement of multiple state and non-state actors, civilian participation makes these modern conflicts all the more unpredictable, challenging inter alia the traditional notion of direct participation in hostilities established under international law.

SOCIAL MEDIA: A MODERN WEAPON

The first ‘internet war’ in Kosovo witnessed the utilisation of the internet for the advancement of military operations.Footnote 2 Non-state actors, specifically terrorist organisations, were the first to harness social media networks for the recruitment of followers, the dissemination of information and the gathering of intelligence.Footnote 3 State and inter-state actors have also gradually embraced social media as platforms suited for military operations,Footnote 4 effectively weaponising them through their adaptation and utilisation to ‘achieve “military” effects’.Footnote 5

Social networking platforms (Facebook) and microblogging websites (Twitter) are examples of ‘social media’ enabling social interaction through the creation, collection, sharing and delivery of user-generated content such as photographs and written posts.Footnote 6 Information from social media sites has been used for cyber operations,Footnote 7 as well as for the singling out and targeting of individuals believed to be linked with the opposing parties to a conflict.Footnote 8 “Open source intelligence” has proven instrumental for parties with no boots on the ground of the conflict,Footnote 9 whilst controlling the narrative through the sharing of information on such networks has also become a vital aspect of psychological warfare.Footnote 10

However, the ‘weaponisation’ of social media can become particularly problematic when undertaken by civilians in a way that it provides military advantages to one of the warring parties.

CVILIANS USING SOCIAL MEDIA: #DIRECTPARTICIPANTS?

With more than half of the world's population using the internet, out of which 71% were active social media users in 2017,Footnote 11 it is evident that social media platforms have infiltrated the everyday lives of people around the globe. The line distinguishing civilians from direct participants however becomes blurred when information collected through, and shared on social media by civilians, has real military effects for the conflicting parties.

This challenges the principle of distinction and inevitably results in legal uncertainty as to the applicability of the general protections from attack afforded to civilians under IHL.Footnote 12 Although military powerful states have not ratified all relevant treaties, they are still considered bound due to the rule's customary status.Footnote 13 As the protection of civilians is not absolute, once civilians are considered direct participants in the hostilities, their protection from attack is forfeited, turning them into lawful targets.Footnote 14

The ICRC and NATO sought to bridge the definitional gaps in the legal provisions by providing guidance for their application in both traditional and cyber conflicts.Footnote 15 The ICRC Interpretive Guidance proposed the division of direct participation into three elements: a) threshold of harm, b) direct causation, and c) belligerent nexus,Footnote 16 a tripartite approach also adopted in the Tallinn Manuals.Footnote 17 Whilst the ICRC maintained a restrictive stance to ensure that the protection of civilians as posited by IHL would be guaranteed, NATO was expansive in its interpretation of certain aspects, so as to safeguard military superiority.

Social media platforms could be ‘weaponised’ by civilians in a number of ways; for example by using Google Maps to identify the coordinates of military objectives and in turn share them on Twitter or Facebook.Footnote 18 Facebook, Twitter and Skype could also be used by civilians for crowdsourcing in order to gather technical knowledge and assist one of the parties to the conflict.Footnote 19 Ultimately, there are certain types of social media activities that can be so harmful to one of the parties to a conflict,Footnote 20 and so direct,Footnote 21 that are capable of triggering the applicability of the direct participation in hostilities principle.

Use of social media networks that can be deemed to satisfy the three-fold test would be sufficient to render a civilian as direct participant in the hostilities, regardless of the temporal and geographical proximity of the act to its eventual effects. Nevertheless, according to the legal provisions, civilians can only be legitimate military targets only ‘for such time’ as they directly participate in the hostilities.Footnote 22

The exact point when a civilian can be deemed as directly participating in the hostilities depends on a case-by-case analysis of the preparatory measures undertaken before the hostile act.Footnote 23 Considering the relatively limited time period required for a social media activity to be executed, it would seem appropriate that civilians remain direct participants for an amount of time after their engagement, providing therefore a more realistic window of opportunity for the victim or intended victim to react. Maintaining the direct participant status for such time as there can be a reliable causal link between the individual and the hostilities is an appropriate way of dealing with direct participation in the social media context.Footnote 24 The problem that follows however is the lack of a universal understanding as to the meaning of ‘reasonable causal link’. Nevertheless, ‘each civilian action must be treated separately’Footnote 25 even if the perpetrator has repeatedly engaged in hostile acts, since in the context of social media activity, that is often undertaken anonymously, intent to re-engage in such actions can never be accurately presumed.

CONCLUSION

The lack of a settled approach in determining the applicability of direct participation in hostilities implies that if actors to an armed conflict are adversely affected by hostile civilian acts, they use their own interpretations when applying the IHL provisions, driven by their own motives. Whilst the novelty of social media warfare requires IHL rules to be applied in a manner flexible enough to meet the complexities of this modern battlefield, the proliferation and widespread use of social media platforms seem to necessitate an adequately reserved interpretation of the rules so as to ensure the protection of civilians. There is a pressing need therefore, for a comprehensive manual to provide guidance to international actors and form the basis for the development of this new controversial area of IHL.

As published in the Richmond Journal of Law & Technology: Iphigenia Fisetzou, Blurred Lines: Social Media in Armed Conflict, 25 Rich. J.L. & Tech. 4 (2019).

References

Footnotes

1 Wenger, Andreas, Mason, Simon J. A., ‘The civilianization of armed conflict: trends and implications’ (2008) 90(872) International Review of the Red Cross 835Google Scholar, 837.

2 Nissen, Thomas Elkjer, #TheWeaponizationofSocialMedia: @Characteristics_of_contemporary_conflict (Royal Danish Defence College, 2015) 8Google Scholar.

3 Ibid. 76.

4 John Pollock, ‘People Power 2.0: How civilians helped win the Libyan information war’ (MIT Technology Review, 20 April 2012) <https://www.technologyreview.com/s/427640/people-power-20/> accessed 4 April 2018.

5 Nissen (n.2), 81–82.

6 Ibid. 40.

7 Nissen (n.2), 30. Josh Constine ‘ISIS “Cyber Caliphate” Hacks U.S. Military Command Accounts’ (TechCrunch.com, 12 January 2015) <https://techcrunch.com/2015/01/12/cyber-caliphate/?guccounter=1> accessed 10 June 2018; Armin Rosen, ‘A self-proclaimed ISIS fan is hacking local news outlets’, (Business Insider, 6 January 2015) <http://www.businessinsider.com/ a-self-proclaimed-isis-fan-is-hacking-local-news-outlets-2015-1> accessed 10 June 2018.

8 Ibid., 82. John Brown, ‘Opinion Arrest of Palestinians for Potential Terror Attacks Brings New Meaning to ‘Minority Report’ (Haaretz.com, 24 April 2017) <https://www.haaretz.com/opinion/.premium-arrest-of-palestinians-brings-new-meaning-to-minority-report-1.5464664> accessed 25 May 2018.

9 Pollock (n.4), 68.

10 Nissen (n.2) at 84. Farwell, James P., ‘The Media Strategy of ISIS’ (2014) 56(6) Survival 49, 52Google Scholar. Zambelis, Chris, ‘Information Wars: Assessing the Social Media Battlefield in Syria’ (2012) 5(7) CTS Sentinel 19Google Scholar. J.M. Berger, ‘How ISIS Games Twitter’ (The Atlantic.com, 16 June 2014) <https://www.theatlantic.com/international/archive/2014/06/isis-iraq-twitter-social-media-strategy/372856/> accessed 30 May 2018.

11 ‘Global digital population as of April 2018 (in millions)’ (Statista.com, 2018) <https://www.statista.com/statistics/617136/digital-population-worldwide/> accessed 10 June 2018; ‘Number of social media users worldwide from 2010 to 2021 (in billions)’ (Statista.com, 2018) <https://www.statista.com/statistics/278414/number-of-worldwide-social-network-users/> accessed 10 June 2018.

12 Geneva Convention for the amelioration of the condition of the wounded and sick in armed forces in the field (adopted 12 August 1949, entered into force 21 October 1950) 75 UNTS 31; Geneva Convention for the amelioration of the condition of the wounded, sick and shipwrecked members of the armed forces at sea (adopted 12 August 1949, entered into force 21 October 1950) 75 UNTS 85; Geneva Convention relative to the treatment of prisoners of war (adopted 12 August 1949, entered into force 21 October 1950) 75 UNTS 135; Geneva Convention relative to the protection of civilian persons in time of war (adopted 12 August 1949, entered into force 21 October 1950) 75 UNTS 287. Protocol Additional to the Geneva Conventions of 12 August 1949, and relating to the Protection of Victims of International Armed Conflicts (adopted 8 June 1977, entered into force 7 December 1978) 1125 UNTS 3 (Additional Protocol I); Protocol Additional to the Geneva Conventions of 12 August 1949 and relating to the protection of victims of non-international armed conflicts (adopted 8 June 1977, entered into force 7 December 1978) 1125 UNTS 609 (Additional Protocol II); Protocol additional to the Geneva Conventions of 12 August 1949, and relating to the adoption of an additional distinctive emblem (adopted 8 December 2005, entered into force 15 January 2007) 2404 UNTS 261 (Additional Protocol III).

13 Legality of the Threat or Use of Nuclear Weapons, Advisory Opinion (Advisory Opinion) [1996] ICJ Rep 226, 257.

14 Schmitt, Michael N., ‘Deconstructing Direct Participation in Hostilities: The Constitutive Elements’ (2010) 42 N.Y.U. Journal of International Law and Politics 697Google Scholar, 698 footnote 2.

15 Melzer, Nils, Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law (ICRC 2009) 44Google Scholar. Schmitt, Michael N. ed., Tallinn Manual on the International Law Applicable to Cyber Warfare (Cambridge University Press 2013)Google Scholar. Schmitt, Michael N. ed., Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (Cambridge University Press 2017)Google Scholar.

16 ICRC Interpretive Guidance (n.15), 46.

17 Allan, Collin, ‘Direct Participation in Hostilities from Cyberspace’ (2013) 54 Virginia Journal of International Law 173Google Scholar, 176.

18 Although not a traditional social media site, the author contents that for the context of this paper and in light of the recent ‘share’ options added to the website, Google Maps falls under the social media category.

19 Pollock (n.4), 63.

20 ICRC Interpretive Guidance (n.15), 48.

21 ICRC Interpretive Guidance (n.15), 51–53.

22 Additional Protocol I (n.12), art. 51(3); Additional Protocol II (n.11) art. 13(3).

23 ICRC Interpretive Guidance (n.15), 65–70.

24 Tallinn Manual (n.15), 121.

25 Allan (n.17), 192.