{"id":19030,"date":"2022-05-12T10:45:14","date_gmt":"2022-05-12T18:45:14","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/12\/news-12763\/"},"modified":"2022-05-12T10:45:14","modified_gmt":"2022-05-12T18:45:14","slug":"news-12763","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/12\/news-12763\/","title":{"rendered":"The Case for War Crimes Charges Against Russia\u2019s Sandworm Hackers"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/627c5334b6cfd378a30c46ca\/master\/pass\/War-Crimes-Russia-Security-GettyImages-1240594842.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Thu, 12 May 2022 11:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/andy-greenberg\">Andy Greenberg<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">For weeks, evidence<\/span> has been piling up of the Russian military&#x27;s apparent war crimes in the midst of its brutal invasion of Ukraine: mass graves, bombed hospitals, even makeshift torture chambers. But amidst those atrocities\u2014and the push to hold the perpetrators accountable\u2014one group is making the counterintuitive case that another arm of the Russian military should be included in any international war crimes charges: the Kremlin&#x27;s most disruptive and dangerous hackers.<\/p>\n<p class=\"paywall\">In late March, a group of human rights lawyers and investigators in the Human Rights Center at UC Berkeley&#x27;s School of Law sent a formal request to the Office of the Prosecutor for the International Criminal Court (ICC) in the Hague. It urges the ICC to consider war crime prosecutions of Russian hackers for their cyberattacks in Ukraine\u2014even as the prosecutors gather evidence of more traditional, ongoing war crimes there. Specifically, the Human Rights Center&#x27;s international criminal investigations team points in its detailed brief to <a href=\"https:\/\/www.wired.com\/story\/sandworm-kremlin-most-dangerous-hackers\/\">Sandworm<\/a>, a notorious group of hackers within Russia&#x27;s GRU military intelligence agency, and to two of Sandworm&#x27;s most egregious acts of cyberwarfare: blackouts that those hackers triggered by targeting electric utilities in Western Ukraine in <a href=\"https:\/\/www.wired.com\/2016\/03\/inside-cunning-unprecedented-hack-ukraines-power-grid\/\">December 2015<\/a> and in <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">the capital, Kyiv, a year later<\/a>, affecting hundreds of thousands of civilians.<\/p>\n<p class=\"paywall\">\u201cAn investigation into Russia\u2019s hostile cyber operations would shine a light on tactics against which few civilians know how to protect themselves.\u201d<\/p>\n<p class=\"paywall\">Berkeley Human Rights Center\u2019s letter to the ICC<\/p>\n<p class=\"paywall\">The Berkeley group&#x27;s document was sent under a provision of the Rome Statute treaty, which gives the ICC its authority, allowing recommendations from nongovernmental organizations. It asks the ICC&#x27;s prosecutor, Karim Khan, \u201cto expand the scope of his investigation to include the cyber domain in addition to traditional domains of warfare\u2013land, air, maritime, and space\u2013given the Russian Federation\u2019s history of hostile cyber activities in Ukraine.\u201d The brief acknowledges that charges against Sandworm would represent the first case of \u201ccyber war crimes\u201d ever brought by the ICC. But it argues that precedent would help not only to seek justice for those harmed by Sandworm&#x27;s cyberattacks, but also to deter future, potentially worse cyberattacks affecting critical civilian infrastructure around the world.<\/p>\n<p class=\"paywall\">\u201cIn fact, in the absence of consequences or any mechanisms for meaningful accountability, State-sponsored cyberattacks have escalated in the shadows,\u201d reads the Human Rights Center&#x27;s Article 15 document sent to the ICC and shared with WIRED. \u201cAn investigation into Russia\u2019s hostile cyber operations would shine a light on tactics against which few civilians know how to protect themselves.\u201d<\/p>\n<p class=\"paywall\">Lindsay Freeman, the director of technology, law, and policy at the Human Rights Center, tells WIRED the ICC prosecutor&#x27;s office responded privately to the group, saying it had received and is considering the group&#x27;s recommendations. The ICC prosecutor&#x27;s office didn&#x27;t respond to WIRED&#x27;s request for comment.<\/p>\n<p class=\"paywall\">Freeman argues that the ICC prosecutor&#x27;s office, which has been investigating ongoing war crimes in Russia&#x27;s Ukraine invasion\u2014along with the governments of Ukraine, Poland, and Lithuania and the European law enforcement agency\u2014needs to demonstrate that its remit includes cyberattacks that violate the international laws of armed conflict. \u201cWe would like to make sure they&#x27;re seeing the cyber domain as an actual domain of warfare, because in this case, it truly is,\u201d says Freeman. She emphasizes that any cyber war crime charges should be in addition to, not instead of, charges for the ongoing massacres, reckless killing of civilians, and mass deportations in Ukraine. But she adds that \u201cthe only way you can properly investigate and understand this conflict is through seeing not just what&#x27;s happening in the physical world, but also what&#x27;s happening in the cyber and information spaces, and this is not something war crimes investigators have ever paid attention to.\u201d<\/p>\n<p class=\"paywall\">Since Russia&#x27;s last major invasion of Ukraine began in 2014, Russia has targeted the country with a <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">years-long bombardment of cyberattacks<\/a> of a kind never before seen in history. The GRU&#x27;s Sandworm hackers alone have attempted <a href=\"https:\/\/www.wired.com\/story\/sandworm-russia-ukraine-blackout-gru\/\">three blackouts in the country<\/a>\u2014at least two of which succeeded; destroyed the networks of media outlets, private companies, and government agencies in targeted attacks; and in 2017 released the <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">destructive, self-spreading NotPetya malware<\/a> that infected hundreds of organizations across Ukraine and eventually many more around the world, causing a record-breaking $10 billion in damage.<\/p>\n<p class=\"paywall\">With the current, larger-scale invasion Russia launched on February 24, the Kremlin&#x27;s state-sponsored hackers have unleashed a <a data-offer-url=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4Vwwd\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4Vwwd&quot;}\" href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE4Vwwd\" rel=\"nofollow noopener\" target=\"_blank\">broad new campaign of destructive hacking against hundreds of Ukrainian targets<\/a>, often carefully coordinated with physical military tactics. That new barrage included one cyberattack in which <a data-offer-url=\"https:\/\/www.washingtonpost.com\/national-security\/2022\/03\/24\/russian-military-behind-hack-satellite-communication-devices-ukraine-wars-outset-us-officials-say\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.washingtonpost.com\/national-security\/2022\/03\/24\/russian-military-behind-hack-satellite-communication-devices-ukraine-wars-outset-us-officials-say\/&quot;}\" href=\"https:\/\/www.washingtonpost.com\/national-security\/2022\/03\/24\/russian-military-behind-hack-satellite-communication-devices-ukraine-wars-outset-us-officials-say\/\" rel=\"nofollow noopener\" target=\"_blank\">GRU hackers targeted Viasat satellite systems<\/a>, <a href=\"https:\/\/www.wired.com\/story\/viasat-internet-hack-ukraine-russia\/\">knocking out broadband connections across Ukraine and Europe<\/a>, including those of thousands of wind turbines in Germany.<\/p>\n<p class=\"paywall\">Freeman says that the UC Berkeley Human Rights Center&#x27;s recommendations for war crime charges, which was sent to the ICC before some of the most recent cyberattacks fully came to light, single out Sandworm&#x27;s two blackout attacks in 2015 and 2016 for legal and practical reasons: They&#x27;ve already been thoroughly investigated and pinned on Sandworm&#x27;s hackers through both private sector and government detective work. Six of the group&#x27;s hackers were <a href=\"https:\/\/www.wired.com\/story\/us-indicts-sandworm-hackers-russia-cyberwar-unit\/\">indicted by the US Department of Justice in October 2020<\/a> with a long rap sheet that includes those blackouts. The cyberattacks occurred in the early years of Russia&#x27;s war in Ukraine, during active fighting in the eastern region of the country, which makes it easier to argue they occurred in the context of a military conflict and thus constitute a war crime. They have a clear civilian target, given that no military operations were occurring in Western Ukraine or Kyiv at the times of the blackouts there. And perhaps most importantly, they had a clear and direct physical result, which makes for a simpler case that they were equivalent to the sort of physical attacks that war crimes tribunals have charged in the past.<\/p>\n<p class=\"paywall\">\u201cIf you&#x27;re going to do this, now is the time.\u201d<\/p>\n<p class=\"paywall\">John Hultquist, VP of intelligence analysis at Mandiant\u00a0<\/p>\n<p class=\"paywall\">On top of all of that, Freeman points to the seriousness of Sandworm&#x27;s attacks on civilian power grids. In the 2016 incident in Kyiv in particular, the hackers used a piece of malware known as Industroyer or Crash Override to automatically trigger that power outage. Although that blackout in Ukraine&#x27;s capital lasted only about an hour, a <a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-cyberattack-power-grid-blackout-destruction\/\">2019 analysis of the attack<\/a> found that a component of the malware intended to disable safety systems was designed to cause physical destruction of electrical equipment, and only failed due to a misconfiguration in the malware. \u201cA cyber weapon that is able to interact with an actual electrical system or an industrial control system and result in kinetic harm is extremely dangerous,\u201d says Freeman. \u201cThe power grid attacks are the ones that really cross the line where it&#x27;s clear we should just say, \u2018No state should be attacking critical infrastructure for civilians.\u2019\u201d<\/p>\n<p class=\"paywall\">If war crimes charges could serve as a punitive measure capable of deterring that sort of critical infrastructure cyberattack, it makes sense to bring them against a group like Sandworm now, says John Hultquist, who leads threat intelligence at cybersecurity firm Mandiant and has tracked Sandworm for the better part of a decade, even naming the group in 2014. The Biden administration has repeatedly warned that Western sanctions against Russia may lead the country to <a href=\"https:\/\/www.wired.com\/story\/russia-ukraine-cyberattacks-spillover\/\">lash out with cyberattacks against targets in the United States or Europe<\/a>. \u201cWe need to be doing everything we can right now to prepare for Sandworm or deter them,\u201d says Hultquist. \u201cIf you&#x27;re going to do this, now is the time.\u201d<\/p>\n<p class=\"paywall\">On the other hand, Hultquist, a combat veteran who served in Afghanistan and Iraq, also wonders whether cyber war crimes should be a priority given Russia&#x27;s ongoing physical war crimes in Ukraine. \u201cThere&#x27;s a stark difference between cyberattacks and attacks on the physical ground right now,\u201d he says. \u201cYou simply cannot achieve the same effects with cyberattacks that you can when you&#x27;re bombing things and tanks are rolling down streets.\u201d<\/p>\n<p class=\"paywall\">Berkeley&#x27;s Freeman agrees that any ICC charges against Sandworm for cyber war crimes shouldn&#x27;t detract or distract from its investigation of traditional war crimes in Ukraine. But those ongoing, on-the-ground war crime investigations are likely to take years to bear fruit, she says; the investigation and prosecution of war crimes in Yugoslavia&#x27;s 1990s conflict, for instance, took decades. Freeman argues that prosecuting Sandworm for Russia&#x27;s 2015 and 2016 cyberattacks, by contrast, would be \u201clow-hanging fruit,\u201d given the evidence already assembled by security researchers and Western governments of the group&#x27;s culpability. That means it could offer immediate results while other Russian war crimes investigations continue. \u201cA lot of what you need to try this case is there,\u201d says Freeman. \u201cYou could bring this case to get <em>some<\/em> justice, as a first step, while other investigations are ongoing.\u201d<\/p>\n<p class=\"paywall\">Sandworm&#x27;s hackers already face criminal charges in the US. And last month, the State Department went so far as to issue a <a data-offer-url=\"https:\/\/rewardsforjustice.net\/rewards\/foreign-malicious-cyber-activity-against-u-s-critical-infrastructure\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/rewardsforjustice.net\/rewards\/foreign-malicious-cyber-activity-against-u-s-critical-infrastructure\/&quot;}\" href=\"https:\/\/rewardsforjustice.net\/rewards\/foreign-malicious-cyber-activity-against-u-s-critical-infrastructure\/\" rel=\"nofollow noopener\" target=\"_blank\">bounty of up to $10 million<\/a> for information that could lead to the capture of the six hackers. But Freeman argues that the gravity of convicting the hackers as war criminals would have a larger deterrent effect, and might help actually lead to their arrest, as well. She points out that 123 countries are parties to the Rome Statute and obliged to help capture convicted war criminals\u2014including some countries that don&#x27;t have extradition treaties with the United States, such as Switzerland, Ecuador, and Cuba, which might otherwise serve as safe havens for the hackers.<\/p>\n<p class=\"paywall\">\u201cSandworm is continually active, and continually executing serious attacks with impunity.\u201d<\/p>\n<p class=\"paywall\">Lindsay Freeman, director of technology, law, and policy at the Human Rights Center, UC Berkeley School of Law<\/p>\n<p class=\"paywall\">If ICC prosecutors did bring war crimes charges against Sandworm for its blackout attacks, the case would have to clear certain legal hurdles, says Bobby Chesney, director of the Strauss Center for International Security and Law at the University of Texas Law School. They&#x27;d have to convince the court that the attacks occurred in the context of war, for instance, and that the power grid wasn&#x27;t a military target, or that the attacks disproportionately affected civilians, he says.<\/p>\n<p class=\"paywall\">But the more fundamental idea of extending the international laws of war to cover cyberattacks with physical effects\u2014while unprecedented in ICC cases\u2014is an easy argument to make, he says.<\/p>\n<p class=\"paywall\">\u201cAll you have to do is ask, \u2018What if the Russians had set up bombs at the relevant electrical substations to achieve the same effect? Is that a war crime?\u2019 That&#x27;s the exact same sort of question,\u201d says Chesney. He compares the new \u201ccyber domain\u201d of warfare to other kinds of warfare like aerial and submarine warfare, which were once new modes of war but no less subject to international law. \u201cFor all these new operational domains, extending the existing law-of-war concepts of proportionality and distinctions to them is a no-brainer.\u201d<\/p>\n<p class=\"paywall\">But the cyber domain <em>is<\/em> nonetheless different, says Freeman: It has no borders, and it allows attackers to instantly reach across the world, regardless of distance. And that makes holding Russia&#x27;s most dangerous hackers accountable all the more urgent. \u201cSandworm is continually active, and continually executing serious attacks with impunity,\u201d she says. \u201cThe risk it presents is incredibly serious, and it puts the entire world at the front lines of this conflict.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/cyber-war-crimes-sandworm-russia-ukraine\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/627c5334b6cfd378a30c46ca\/master\/pass\/War-Crimes-Russia-Security-GettyImages-1240594842.jpg\"\/><\/p>\n<p><strong>Credit to Author: Andy Greenberg| Date: Thu, 12 May 2022 11:00:00 +0000<\/strong><\/p>\n<p>A group of human rights lawyers and investigators has called on the Hague to bring the first-ever \u201ccyber war crimes\u201d charges against Russia\u2019s most dangerous hackers.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-19030","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19030"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19030\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19030"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}