Accordingly, the laws and guidelines that govern war, cyber-war, as well as government contracts state journalists, websites, news-sites, civilians, and social groups in social media are protected. Any person that is injured by spies for hire HAVE legal recourse under the civil and criminal law.
Because it can be a war crime, it falls under International law. The rules for cyberwar go as far as describing the use of conventional force as a means of stopping unlawful attacks or retribution for attacks on protected groups and individuals as legal. It describes anyone that attacks civilians, journalists, and civilian groups as unlawful combatants if they are not in a standing army. It is a terrorist act. Attacks on civilians or protected groups from military personnel can and should be considered a war crime.
This includes targeting the protected groups listed above by naming them or misidentifying them as operatives or agents in the war. The use of the Kremlin Troll label falls directly under this in section 30. See the Tallinn Manual for details. It looks like the spies for hire have collectively bit off more than they can chew. Think about the size of the lawsuit groups and individuals on public lists could mount against some of these companies, NGO's, and individual superstars of the Intel industry that have popped up since 2001.
Ukrainian Intel Comes Clean
Bellingcat's principals Eliot Higgins and Aric Toler have a lot to own up to for the JIT, NATO, US Congress & Senate, and possibly their paying customers. If you want to play super-star in the Intel field, don't fib, ever.
The following is from Ukraine's cyber terrorists that comprise the state's Intel.
"Since March 2014, in the wake of the rise of the volunteer movement, several activist groups and individuals assumed the state security functions in the media- and cyber-space.
InformNapalm, Myrotvorets, Ukrainian Cyberarmy, and other volunteer communities organized a series of effective campaigns in data collection, data analysis, identification of hostile activities and retaliation against them. The volunteers took on the roles of intelligence and counterintelligence agents.
They collected the information on locations and movements of enemy weapons and equipment, blocked servers and websites engaged in Russian terrorist propaganda, and blocked bank accounts of the militants. And they still continue carrying out the important volunteer work in cyberspace. 2016 became the year of escalation of cyber-warfare...
...It also became the year when Ukrainian IT-activists joined their forces. The groups of computer engineers FalconsFlame, Trinity, Ruh8, individuals from the CyberHunta group, and other volunteers joined together in a powerful Ukrainian Cyber Alliance (UCA), which brought Ukrainian hacktivism to the world scene. 90% of UCA operations have operational importance. The ability to have a holistic view of multiple separate discoveries of enemy plans elevates its work to the new level and helps expose previously hidden connections between individual enemy agents. This is why only 10 percent of hacktivists' actions become publicized."
In the next article, we'll go behind the hackers and show the people that know them. As you can see from the following, they took on the state Intel functions through the Information Ministry. So, once again, we have the Ukrainian Intel guys. This time they are saying they are the guys we wanted to find.
Under "Our Main Achievements" InformNapalm lists the following:
- identification of persons who could be involved in the shootdown of Flight MH17 over the occupied Donbas (this information was used in the reports by our colleagues from Bellingcat team)
- exclusive analysis of SurkovLeaks -- the email dump belonging to Surkov's reception office obtained by Ukrainian Cyber Alliance (the authenticity of the emails was reconfirmed by several reputable organizations, including Atlantic Council's DFR Lab)
- InformNapalm's Findings were presented by official Ukrainian delegations during Parliamentary Assembly of the Councils of Europe and NATO Parliamentary Assembly in 2016.
(Note: You can view every article as one long page if you sign up as an Advocate Member, or higher).