Digital Emblems in Armed Conflicts: Technical and Legal Solution for Protecting Humanitarian Entities
Main Article Content
Abstract
Introduction: in an increasingly digitalized world, armed conflicts have extended into cyberspace, where cyber operations threaten entities protected by International Humanitarian Law (IHL), such as hospitals and humanitarian organizations. This study proposes a digital emblem as a technical and legal solution to identify and protect these entities in the digital environment, analyzing the technical, legal, and operational challenges of its implementation. Objective: the aim is to evaluate the feasibility of the digital emblem as a protection tool in armed conflicts, analyzing the IHL legal framework, the benefits and risks of its implementation, and proposing recommendations for its international adoption. Methodology: an analytical-descriptive approach was used, based on a document review of international treaties, ICRC documents, and manuals such as the Tallinn Manual 2.0, complemented by theoretical analysis of concepts like the Cyber Kill Chain and evaluation of practical cases of cyberattacks. Conclusions: the study concludes that the digital emblem is an innovative solution to protect humanitarian entities, although it faces challenges such as asset exposure and misuse. A specific international legal framework, advanced authentication technologies, and cooperation among states, humanitarian organizations, and technological actors are recommended to ensure its effectiveness.
Downloads
Article Details

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Urvio, Revista Latinoamericana de Estudios de Seguridad, operates under Creative Commons Attribution-No Derivative Work 3.0 unported (CC BY-ND 3.0).
The authors who publish in Urvio accept these terms:
You are free to share / copy and redistribute the material in any medium or format for any purpose, including commercial. Therefore, authors retain the copyright and cede to the journal the right of the first publication (CC by-ND 3.0), which allows third parties the redistribution, commercial or noncommercial, of what is published as long as the article circulates without changes.
The following conditions exist for the authors:
Recognition - you must recognize the authorship, provide a link to the license and indicate whether changes have been made. You can do this in any way reasonable, but not in a way that suggest that has the support of the licensor or receives it by the use he makes.
Without Derivative Work – If you remixed, transform or create a work from the original material, you cannot broadcast the modified material.
For more details, visit the page of Creative Commons (CC).
References
Abrams, Lawrence. 2020. ‘‘Ransomware Gangs to Stop Attacking Health Orgs During Pandemic’’. Bleeping Computer, 18 de marzo. https://bit.ly/4cjZsNs
Beard, Jack, y Dale Stephens. 2024. The Woomera Manual on the International Law of Military Space Activities and Operations. Reino Unido: Oxford University Press.
Bodeau, Deborah, y Richard Graubart. 2013. Characterizing effects on the cyber adversary: A vocabulary for analysis and assessment. Bedford: The MITRE Corporation.
Chen, Christopher. 2022. "Cybersecurity in the humanitarian sector: new challenges and solutions". RSIS Commentaries (118): 1-3.
CICR. 2020. "International Humanitarian Law and Cyber Operations During Armed Conflicts: ICRC Position Paper Submitted to the Open-Ended Working Group on Developments in the Field of Information and Telecommunications in the Context of International Security and the Group of Governmental Experts on Advancing Responsible State Behaviour in Cyberspace in the Context of International Security." International Review of the Red Cross 102, no. 913: 481-492. https://doi.org/10.1017/S1816383120000478
CICR. 2022. “Digitalizing the Red Cross, Red Crescent and Red Crystal Emblems: Benefits, Risks, and Possible Solutions”, https://bit.ly/3AdwstG
Estatuto de Roma de la Corte Penal Internacional. 1998. Adoptado el 17 de julio de 1998 por la Conferencia Diplomática de plenipotenciarios de las Naciones Unidas sobre el establecimiento de una Corte Penal Internacional. https://bit.ly/3WSDTzi
Forsythe, David P. 2024. The Contemporary International Committee of the Red Cross: Challenges, Changes, Controversies. Reino Unido: Cambridge University Press.
Goodrich, Peter. 2014. Legal Emblems and the Art of Law. Nueva York: Cambridge University Press.
GREAT y Kaspersky ICS CERT. 2022. “Replanteo sobre la guerra informática. Lo que aprendimos en 2022”, https://bit.ly/3WAxcjX
Hutchins, Eric, Michael J. Cloppert, y Rohan M. Amin.2011. “Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains”. https://lmt.co/3WBTmlL
IGF. 2023. “IGF 2023 – Day 2 – Open Forum #16 Promoting the Digital Emblem”, https://bit.ly/4fBxEHh
Linker, Felix, y David Basin. 2023. “ADEM: An authentic digital emblem”. Ponencia presentada en Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Dinamarca, 21 de noviembre.
Lyons, Jessica. 2023. ‘‘LockBit: Sorry about the SickKids ransomware, not sorry about the rest’’. The Register, 04 de enero. https://bit.ly/3SGMQJw
Manor, Ilan, y James Pamment. 2024. “From Micro to Macro Digital Disruptions: A New Prism for Investigating Digital Diplomacy”. En The Oxford Handbook of Digital Diplomacy, editado por Corneliu Bjola, e Ilan Manor, 45-62. Reino Unido: Oxford University Press.
Meier, Silas. 2024. “An Authentic Digital Emblem: Empirical Analysis of Covert Inspection”, https://doi.org/10.3929/ethz-b-000685945
Meinen, Lasse. 2024. “Verification2 of the Authentic Digital EMblem". Tesis de maestría, Escuela Politécnica Federal de Zúrich.
Morello, Romina. 2024. “Aplicación del DIH en ciberoperaciones”. Ponencia presentada en el Cybersecurity Summer Bootcamp 2024, Universidad de León, España, 18 de julio.
Morello, Romina, y Mauro Vignati. 2024. “Digitalizando los Emblemas Cruz Roja / Media Luna Roja / Cristal Rojo”. Ponencia presentada en el Cybersecurity Summer Bootcamp 2024, Universidad de León, España, 18 de julio.
Rowe, Neil C. 2017. “Chapter 3 Challenges of Civilian Distinction in Cyberwarfare”. En The Oxford Handbook of Digital Diplomacy, editado por Mariarosaria Taddeo, y Ludovica Glorioso, 33-48. Suiza: Springer.
Sanz, Álvaro. 2011. "Shifting our vision: reading early modern emblems in the 21st century". eHumanista: Journal of Iberian Studies (18): 385-391.
Sassòli, Marco. 2024. International humanitarian law: Rules, controversies, and solutions to problems arising in warfare, 2da ed. Reino Unido: Edward Elgar Publishing.
Schmitt, Michael N. 2017. Tallinn Manual 2.0 on the international law applicable to cyber operations. Reino Unido: Cambridge University Press.
Tranter, Kieran. 2017. "Law, the digital and time: The legal emblems of Doctor Who". International Journal for the Semiotics of Law-Revue internationale de Sémiotique juridique (30): 515-532.
Weber, Valentin. 2022. “6. Cybersecurity and the Protection of Critical Infraestructura: What is at Stake?”. En Digitalisation for Sustainable Infrastructure: The Road Ahead, editado por Carlo Secchi, y Alessandro Gili, 105-118. Italia: Ledizioni.
Whyte, Christopher, y Brian Mazanec. 2019. Understanding Cyber Warfare Politics, Policy and Strategy. Nueva York: Routledge.
