Abstract
The emergence of a new type of mercenary, represented by cyber mercenaries, especially with the subject's lack of international regulation, has led many States to use and purchase their services for the range of advantages offered by such use, since attacks by cyber mercenaries pose a challenge to the concept of direct participation in hostilities provided for in the article. (47) of Additional Protocol I to the Geneva Conventions, since the port of the cyberattack may be far from confrontational, yet it does harm directly and significantly to the other party. The use of cybercrime mercenaries is a real challenge to accountability and punishment, for the difficulty of identifying the mercenary and establishing the link between him and the user.
We have adopted the analytical curriculum in our study of the research topic and have concluded a number of results, the most important of which is, International conventions dealing with mercenaries, such as Additional Protocol I to the 1977 Geneva Conventions, The 1977 OAU Convention on the Elimination of Mercenarism in Africa, The 1989 International Convention against the Recruitment, Use, Financing and Training of Mercenaries was all incomplete and inadequate in defining the concept of mercenary because it did not cover all forms of mercenarism, especially modern ones, and because it took the traditional approach established under the article.
Keywords
Main Subjects