Featured IT News

OnLoop out of beta, now launched

17 September 2021 in Market

Singaore-based AI and behavioural science powered platform OnLoop has announced that the product is now available to all users, after…

Australians ‘struggle’ up against network security breaches

17 September 2021 in Security

Australian organisations are struggling with network breaches, ransomware attacks, remote work, and more, according to the latest network security report…

Rod Sims appointed to International Competition Network role

17 September 2021 in Technology Regulation

The chief of Australia’s competition watchdog, Rod Sims, has been confirmed as the new vice chair digital co-ordination and Asia-Pacific…

Kiwi software to help ease in big change in Australian energy market

17 September 2021 in Energy

Australian energy operators will use a solution from a New Zealand company to handle the biggest change in regulations in…

Space Machines, Fleet Space partner on nanosatellites launches

16 September 2021 in Space

In-space logistics provider Space Machines Company (SMC) has inked a memorandum of understanding (MoU) to test the deployment of nanosatellites…

Reuters scribes claim exclusive three years after it came to light

16 September 2021 in Security

A story about US mercenaries going to work for the UAE Government, without obtaining the necessary American clearances, was claimed…

Lenexa Medical, DB Results ink MOU on services for Aged Care

16 September 2021 in Deals

Medical device company, Lenexa Medical and global digital business DB Results have signed a Memorandum of Understanding (MOU) to further…

AGL expands electric vehicle subscription service to Adelaide

16 September 2021 in Automotive

Energy and telecommunications customer services provider AGL is expanding its Electric Vehicle (EV) subscription service to Adelaide.

Software agent used by Microsoft Azure exposes Linux VMs to numerous flaws

16 September 2021 in Security

A software management agent silently installed by Microsoft's cloud platform Azure on Linux VMs has a number of remote code…

Security tops technical skills priorities for career advancement for tech pros

15 September 2021 in Security

Tech pros say security, troubleshooting and network management are the top technical skills needed to progress in their careers and,…

Microsoft issues patches for two zero-day flaws, 84 others

15 September 2021 in Security

Microsoft has released patches for two zero-day vulnerabilities, along with patches for 84 other flaws in its products, including Microsoft…

ACSC reports fall in cyber-security incidents in 2020-21

15 September 2021 in Security

Cyber-security incidents reported by victims fell during the 2020-21 financial year, the Australian Cyber Security Centre says in its annual…

Canva hits US$40B valuation

15 September 2021 in Deals

Australian-founded visual communications and collaboration SaaS vendor Canva's latest US$200 million funding round values the company at US$40 billion.

Ransomware gang warns of data destruction if ransom negotiators called in

15 September 2021 in Security

A ransomware gang has warned victims that any data that has been exfiltrated from their networks during attacks would be…

Three Americans fined for providing hacking services to UAE Govt

15 September 2021 in Security

Three former American intelligence operatives have agreed to pay a fine of US$1.685 million (A$2.3 million) as part of a…

Breaking IT News

auDA Foundation offers grants totalling $200,000

17 September 2021 in Telecoms & NBN

The auDA Foundation, supported by .au domain authority auDA, is offering five $40,000 competitive grants for new education or research…

Zuora integrates Microsoft products to deliver agile solutions to customers

17 September 2021 in Accounting Software

Cloud-based subscription management Zuora will integrate Microsoft products to its platform as part of a multi-tiered agreement with the tech…

Microsoft offers passwordless feature to users

17 September 2021 in Business Software

Passwords are inconvenient, and they’re prime target for attacks. For years, they’ve been the most important layer of security in…

Bitdefender releases free REvil/Sodinokibi decryptor

17 September 2021 in Security

Security vendor Bitdefender has released a universal decryptor for files encrypted by the REvil ransomware before 13 July 2021.

iseek and Vault Cloud deliver Queensland’s first locally hosted Protected Cloud service

17 September 2021 in Cloud

Data centre and connectivity group iseek has partnered with cloud specialist Vault Cloud to deliver Queensland’s first locally hosted Protected…

Hospitals need more IT: report

17 September 2021 in Business IT

Zebra Technologies' Smarter, More Connected Hospitals report suggests the sector needs to pay more attention to IT.

Samsung launches 12.4-inch Galaxy Tab S7 Fan Edition from $799 in Australia

16 September 2021 in Home Tech

Offering one of the bigger tablets out there at sub-$1000 pricing for all but the 5G model with 128GB which…

Appian launches new version 21.3 of its Appian Low-Code Automation Platform

16 September 2021 in Business IT

Low-code pioneer Appian has not only just concluded its Appian Europe Digital Experience, which you can still attend virtual replays…

The new 8.3-inch iPad mini - it's practically an iPhone Mega!

16 September 2021 in Home Tech

The only thing the iPad mini doesn't have is a traditional phone dialler, but with FaceTime support and the ability…

Globalization Partners opens nominations for PANGEO awards, recognising visionary companies and individuals in their pursuit of global expansion

16 September 2021 in Recruitment

Major International Awards to be Presented during the Globalization Partners PANGEO Virtual Conference - October 20th-22nd, 2021 COMPANY NEWS: Globalization…

:'-) A COVID luddite's crazy reasons to not 'trust' the new iPhone 13

16 September 2021 in Fuzzy Logic

Are you as excited about the new iPhone 13 models as I am, but are wary that the 5G it…

Australian Cyber Week returns for 2021

16 September 2021 in Security

AustCyber's 2021 Australian Cyber Week is scheduled for 25-29 October 2021.

 

Reviews

 

Opinion

 

Telecommunications

 

Popular News

Subscribe to Newsletter

*  Enter the security code shown:

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments

Saturday, 15 December 2012 22:41

Tweeters are legitimate military targets?

By

Just what constitutes a legitimate military target? Does a tweeter qualify?

In a rather interesting reinterpretation of the 'rules of war,' a blog entry by Chloe Diggins, a research & analysis officer at the Australian Army's Land Warfare Studies Centre asks the question, "Are social media users now legitimate targets?"

Natalie Sambhi, in a related blog posting, said (in relation to a recent Social Media in Defence Forum) "This doesn't mean there aren't answers for some of the questions raised by the Israel Defence Force-Hamas case. It means we're still working out how social media fits into warfare and what the legalities are." Sambhi added, "At the conference, one audience member suggested during question time that the Geneva Convention might even apply."

Diggins takes up this theme, "one of the more pertinent ethical questions arising from this case is whether engaging with or contributing to a militarised social media space constitutes an act of war. If that's the case, this might mean that those using social media in support of military operations are now legitimate targets."

free web stats
According to the Geneva Convention, Article 53, clause 2, "Attacks shall be limited strictly to military objectives. In so far as objects are concerned, military objectives are limited to those objects which by their nature, location, purpose or use make an effective contribution to military action and whose total or partial destruction, capture or neutralization, in the circumstances ruling at the time, offers a definite military advantage."

This, clearly, is focussed upon 'objects' of military interest; however aside from a brief definition of "Armed Forces" in Article 43 and a matching outline of the rights of civilians in Article 50, the entire Convention is silent on the status of actors who are not aligned with either party to a conflict yet will appear to step into and out of the field of battle with the publication of Tweets, Blogs, Facebook posts etc.

The only possible link is via Article 79 which affords journalists the status of 'civilians,' but only if they have the status of accredited war correspondent. One would doubt that Tweeters, Bloggers and Posters have this status. Perhaps they might be better described as "spies" or "mercenaries" (which also have their own definitions in the Convention).

Diggins agrees with the difficulties here, noting "We're now entering the murky waters of the civilian/combatant divide. And the complex way in which war is waged today means we find militants hiding in plain sight disguised as innocent civilians. The use of technology in warfare is further shifting the civilian/combatant divide online. My colleague Clint Arizmendi and I have recently discussed the issue of unsanctioned non-state cyber actors (UNCAs) and the role they might play in future conflict. Social media users should consider the same. If a country can declare war over Twitter, who's to say that Twitter users can't fight in the information space of that war? Moreover, who's to say they shouldn't reasonably expect to become legitimate targets themselves?"

Of course the Geneva Convention is still predicated upon the broad concept of war between gentlemen; one might be forced to suggest that modern conflicts no longer fit this description, and thus the Geneva Convention is becoming more and more sidelined.

And the Convention had never heard of the Internet, either!


Subscribe to ITWIRE UPDATE Newsletter here

GRAND OPENING OF THE ITWIRE SHOP

The much awaited iTWire Shop is now open to our readers.

Visit the iTWire Shop, a leading destination for stylish accessories, gear & gadgets, lifestyle products and everyday portable office essentials, drones, zoom lenses for smartphones, software and online training.

PLUS Big Brands include: Apple, Lenovo, LG, Samsung, Sennheiser and many more.

Products available for any country.

We hope you enjoy and find value in the much anticipated iTWire Shop.

ENTER THE SHOP NOW!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
David Heath

David Heath has had a long and varied career in the IT industry having worked as a Pre-sales Network Engineer (remember Novell NetWare?), General Manager of IT&T for the TV Shopping Network, as a Technical manager in the Biometrics industry, and as a Technical Trainer and Instructional Designer in the industrial control sector. In all aspects, security has been a driving focus. Throughout his career, David has sought to inform and educate people and has done that through his writings and in more formal educational environments.

Share News tips for the iTWire Journalists? Your tip will be anonymous