Hacking Humanitarians? IHL and the protection of humanitarian organizations against cyber operations – EJIL: Talk!
![Hacking Humanitarians? IHL and the protection of humanitarian organizations against cyber operations – EJIL: Talk!](https://www.ejiltalk.org/wp-content/uploads/2020/03/HackerImage-scaled.jpg)
For some years, experts have cautioned that the more humanitarian organizations collect data, the more they ‘are exposed to a growing wave of digital attacks and cyber espionage, and have become highly prized targets’. In late January 2020, the issue made headlines: The New Humanitarian reported a ‘sophisticated’ cyber operation against the UN, including the […]
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2021/03/dreamstime_s_167375167-380x200.jpg)
Massimo Marelli - Humanitarian Law & Policy Blog
![](https://pbs.twimg.com/media/FBq7xcEXIAM8hON.jpg)
Vincent Cassard (@VCassardICRC) / X
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2019/11/bandwidth-close-up-connection-1148820-edit.jpg)
Cyber operations and international humanitarian law: five key points - Humanitarian Law & Policy Blog
![](https://0.academia-photos.com/attachment_thumbnails/103635021/mini_magick20230622-1-u3eht1.png?1687409187)
Applying International Humanitarian Law to Cyber Warfare, in Law and National Security: Selected Issues, INSS Memo
Full article: Digitisation and Sovereignty in Humanitarian Space: Technologies, Territories and Tensions
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2019/01/ICRC-Confidential-Information-photo-1180x620.jpg)
5 things that make ICRC confidential information unsuitable for legal proceedings - Humanitarian Law & Policy Blog
![](https://i0.wp.com/www.ejiltalk.org/wp-content/uploads/2021/01/Cyberspace3.jpg?resize=350%2C200&ssl=1)
Hacking Humanitarians? IHL and the protection of humanitarian organizations against cyber operations – EJIL: Talk!
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2022/04/icon-128.png)
Hacking humanitarians: moving towards a humanitarian cybersecurity strategy - Humanitarian Law & Policy Blog
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2024/01/Yemen-distribution-380x200.jpg)
Foghorns of war: IHL and information operations during armed conflict
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2020/06/Hacking-4-image-2.jpg)
Hacking humanitarians: operational dialogue and cyberspace - Humanitarian Law & Policy Blog
![](https://0.academia-photos.com/attachment_thumbnails/98551736/mini_magick20230212-1-zl102j.png?1676162405)
PDF) CYBERSPACE AND INTERNATIONAL LAW
![](https://static.miraheze.org/cyberlawwiki/4/49/NWC_Wordmark_PMSBlue%26colorcrest_Horz-01.png)
Scenario 25: Cyber disruption of humanitarian assistance - International cyber law: interactive toolkit
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2020/05/hacking2.jpg)
Hacking humanitarians: mapping the cyber environment and threat landscape - Humanitarian Law & Policy Blog
Tilman Rodenhäuser auf LinkedIn: Great to see our blog on 'Safeguarding Humanitarian Organizations from…
![](https://blogs.icrc.org/law-and-policy/wp-content/uploads/sites/102/2023/07/DRFinal-1152x620.png)
Understanding digital risks in armed conflict