The Laws Of War Must Apply In Cyberspace
A Cyberwarfare Insight
Authors:
• SCARS Editorial Team – Society of Citizens Against Relationship Scams Inc.
• Article by: Johanna Weaver, Director, ANU Tech Policy Design Centre, Australian National University
• Portions by the International Committee of the Red Cross
Article Originally Published: October 25, 2023 – Used With Permission
About This Article
Governments and hackers alike are increasingly acknowledging the necessity of applying the laws of war to cyberspace. Traditionally, international humanitarian law has regulated conduct in armed conflict to safeguard civilians and minimize suffering.
However, with the emergence of cyberattacks and online information operations, a new battleground has evolved, exemplified by Russia’s actions in Ukraine and the Israel–Hamas conflict. Contrary to the misconception of cyberspace being lawless, there is a global consensus that existing laws of war are applicable online.
Recent developments underscore this shift, including proposals for rules governing “civilian hackers” during war, endorsed by key hacktivist groups involved in conflicts. Additionally, the International Committee of the Red Cross has issued a report emphasizing the application of established principles and rules of international humanitarian law to all forms of warfare, digital included.
Also, the International Criminal Court’s prosecutor has signaled intent to collect evidence on cyber warfare, signaling accountability for violations in cyberspace. As these developments unfold, it becomes increasingly evident that whether through bombs or bytes, adherence to international humanitarian law remains imperative in mitigating harm and protecting civilians in the evolving landscape of conflict.

Governments and Hackers Agree: the Laws of War Must Apply in Cyberspace
There are rules in war. International humanitarian law regulates what combatants can and can’t do, with the goal of protecting civilians and limiting suffering.
Most of these laws were developed during the 19th and 20th centuries. But in our own century a new kind of battlefield has emerged: the domain of cyberattacks, digital campaigns and online information operations. All these have played a heightened role in Russia’s war in Ukraine and, increasingly, in the current Israel–Hamas conflict.
There is a persistent myth that cyberspace is a lawless wild west. This could not be further from the truth. There is a clear international consensus that existing laws of war apply online.
In the past month, we have seen three significant developments in this area. Rules for “civilian hackers” have begun to gain traction. A new international humanitarian report has recommended ways forward for governments, tech companies and others. And the International Criminal Court has for the first time signalled that it considers cyber warfare to fall within its jurisdiction.
Rules for hacktivists
On October 4 2023, two advisers to the International Committee of the Red Cross proposed a set of rules for “civilian hackers” during war. The proposals include things like “do not conduct any cyber operation against medical and humanitarian facilities” and “when planning a cyber attack against a military objective, do everything feasible to avoid or minimize the effects your operation may have on civilians”.
The authors were motivated by evidence of online attacks disrupting banks, companies, pharmacies, hospitals, railway networks and civilian government services.
Cyber, digital and information operations – used alongside “real-world” military operations – have risen into the mainstream during Russia’s war in Ukraine. Many operations are carried out by civilian groups not formally connected to the military.
These manoeuvres are not spectacular. However, as Jeremy Fleming (former head of GCHQ, United Kingdom’s electronic spy agency) put it:
it was never our understanding that a catastrophic cyberattack was central to Russia’s use of offensive cyber in their military doctrine. To think otherwise, misjudges how cyber has an effect in military campaigns. That’s not to say that we haven’t seen cyber in this conflict. We have – and lots of it.
After the proposed rules for civilian hackers were published, something extraordinary happened.
Two of the largest hacktivist groups actively engaged on opposite sides of the war in Ukraine are the Russian-affiliated Killnet and the Ukrainian IT Army. Spokespeople for both groups vowed to the BBC they would uphold the rules.
Digital threats during armed conflict
It is not just actors in Ukraine, and not just hacktivist groups, who must comply with the laws of war in cyberspace.
On October 18, the International Committee of the Red Cross published the final report of its global advisory board on digital threats during armed conflicts.
The report is the culmination of two years of work. The board comprises a diverse group of experts spanning the geopolitical spectrum, including the United States, Russia, China, South Africa, Mexico, India and Australia (including me).
We worked on “the international consensus that the established principles and rules of [international humanitarian law] apply to all forms of warfare and to all kinds of weapons, be they new or old, digital or physical”.
To safeguard civilians against digital threats, the report includes 25 action-oriented recommendations for belligerents, states, tech companies and humanitarian organisations.
Since 2013, negotiated agreements at the United Nations have recognised that existing international law applies to what states do in cyberspace.
In 2021, Russia, China, the US, Australia and every country in the United Nations went one step further, explicitly recognising the application of the laws of war to cyber operations.
The International Committee of the Red Cross – its mission being “to prevent suffering by promoting and strengthening humanitarian law and universal humanitarian principles” – has also affirmed this many times, including via the reports above.
The International Criminal Court weighs in
Of course, agreeing to the rules doesn’t prevent irresponsible actors from breaking them. And this is where the third significant development comes in.
In September 2023, Karim A.A. Khan, the prosecutor of the International Criminal Court, signalled the court would begin “collecting and reviewing” evidence of cyber warfare. It will also examine “misuse of the internet to amplify hate speech and disinformation, which may facilitate or even directly lead to the occurrence of atrocities”.
This is the first time the International Criminal Court has expressly indicated cyber warfare and misuse of the internet fall within its jurisdiction. This puts governments, militaries, tech companies and hacktivists on notice that they do not act with impunity in cyberspace.
As the war drags on in Ukraine and conflict escalates between Israel and Hamas (including increasing reports of hacktivism), all parties would do well to reflect that the rules of cyber warfare are clear.
Bombs or bytes, missiles or malware, international humanitarian law applies.
Published under Creative Commons license
The 8 Rules for Cyberwarfare
8 Rules for “Civilian Hackers” during War, and 4 Obligations for States to Restrain Them – By the International Committee of the Red Cross
October 4, 2023 Analysis Law and Conflict New Technologies
As digital technology is changing how militaries conduct war, a worrying trend has emerged in which a growing number of civilians become involved in armed conflicts through digital means. Sitting at some distance from physical hostilities, including outside the countries at war, civilians – including hacktivists, to cyber security professionals, ‘white hat’, ‘black hat’ and ‘patriotic’ hackers – are conducting a range of cyber operations against their ‘enemy’. Some have described civilians as ‘first choice cyberwarriors’ because the ‘vast majority of expertise in cyber(defence) lies with the private (or civilian) sector’.
Examples of civilian hackers operating into the context of armed conflicts are diverse and many (see here, here, here). In particular in the international armed conflict between Russia and Ukraine, some groups present themselves as a ‘worldwide IT community’ with the mission to, in their words, ‘help Ukraine win by crippling aggressor economies, blocking vital financial, infrastructural and government services, and tiring major taxpayers’. Others have reportedly ‘called for and carried out disruptive – albeit temporary – attacks on hospital websites in both Ukraine and allied countries’, among many other operations. With many groups active in this field, and some of them having thousands of hackers in their coordination channels and providing automated tools to their members, the civilian involvement in digital operations during armed conflict has reached unprecedented proportions.
This is not the first time that civilian hackers operate in to the context of an armed conflict, and likely not the last. In this post, we explain why this trend must be of concern to States and societies. Subsequently, we present 8 international humanitarian law-based rules that all hackers who carry out operations in the context of an armed conflict must comply with, and recall States’ responsibility to restrain them.
Civilians engaging in digital warfare – a worrying trend
The phenomenon of civilian hackers conducting cyber operations in the context of an armed conflicts is worrying for at least three reasons.
One, they cause harm to civilian populations, either by targeting civilian objects directly or damaging them incidentally. Some experts have considered civilian hackers and groups primarily as ‘cyber vigilantism’ and stress that their operations are technically not sophisticated and unlikely to cause significant effects. However, it is also true that civilian hackers and ‘armies’ have disrupted various civilian objects – including banks, companies, pharmacies, hospitals, railway networks and civilian government services.
Two, civilian hackers risk exposing themselves, and people close to them, to military operations. Depending on the type of operation they conduct, a party to an armed conflict may consider them as directly participating in hostilities (see cyber-specific analyses here and here). This means that the computers and digital infrastructure they use risk becoming military objectives, meaning that they are at risk of being attacked. Likewise, in the adversary’s eyes, and depending where the hacker sits, they may be attacked – by bullet, missile, or cyber operation.
Three, the more civilians take an active part in warfare, the more the line blurs between who is a civilian and who a combatant. As a result, the risk of harm to civilians grows; and legal experts have asked whether the principle of distinction, the centre-piece of international humanitarian law, will withhold this pressure.
8 rules for civilian hackers operating in the context of an armed conflict
Cyberspace is not a lawless space – even wars have limits.
It goes without saying that civilian hackers must respect the law of the countries they operate in. Where these national laws are lenient, not enforced, or if a civilian hacker decides to disregard them, in times of armed conflict international humanitarian law (IHL) provides a universally agreed set of rules that aim to safeguard civilians, and soldiers who are no longer able to fight, from some of the horrors of war. The most egregious violations of these rules constitute war crimes, which may be prosecuted nationally or internationally.
In the context of an armed conflict, IHL does not prohibit ‘hacking’ as such, and it does not prohibit civilians from conducting cyber operations against military assets. But it sets out elementary considerations of humanity on the protection of civilians, meaning obligations that everybody must respect when conducting operations in the context of an armed conflict, irrespective of the reasons for the conflict, whose goals are deemed legitimate, or whether an operation is conducted in offence or defense.
IHL consists of hundreds of rules – here is one word of caution and 8 rules that anyone who conducts a cyber operation in the context of an armed conflict (including non-States armed groups and civilian hackers) must be aware of and respect as a minimum. Groups or collectives should ensure that their members respect these limits.
Caution: Civilian hackers risk losing protection against cyber or physical attack and may be criminally prosecuted if they directly participate in hostilities through cyber means
Under IHL, civilians must not be attacked unless and for such time as they directly participate in hostilities. Conducting cyber attacks against military or civilian targets can amount to such direct ‘participation in hostilities’ and risks making civilian hackers liable to attacks. In addition, while members of a State’s armed forces (including cyber operators) enjoy impunity for lawful acts of war (such as attacking a military installation) and become ‘prisoners of war’ when captured, civilian hackers do not (here, para. 3634 on article 85 GCIII). If captured, they risk being considered criminals or ‘terrorists’ and prosecuted as such.
1. Do not direct cyber attacks* against civilian objects.
Civilian objects are all objects that are not military objectives. This includes civilian infrastructure, public services, companies, private property, and arguably civilian data. Military objectives do not enjoy the same protection. ‘Military objectives’ comprise primarily the physical and digital infrastructure of the military of a warring party. It may also include civilian objects, depending on whether and how they are being used by the military.
2. Do not use malware or other tools or techniques that spread automatically and damage military objectives and civilian objects indiscriminately.
For example, malware that spreads automatically, spills-over, and damages military objectives and civilian objects without distinction must not be used.
3. When planning a cyber attack against a military objective, do everything feasible to avoid or minimize the effects your operation may have on civilians.
For example, if you aim to disrupt electricity or railway services used by military forces, you must avoid or minimize the effects your operation may have on civilians. It is essential to research and understand the effects of an operation – including unintended ones – before conducting it. When planning a cyber attack against a military objective, do everything feasible to avoid or minimize the effects your operation may have on civilians, and stop the attack if the harm to civilians risks being excessive. If you have gained access to an operating system but you do not understand the possible consequences of your operation, or realize that the harm to civilians risks being excessive, stop the attack.
4. Do not conduct any cyber operation against medical and humanitarian facilities.
Hospitals or humanitarian relief organizations must never be targeted.
5. Do not conduct any cyber attack against objects indispensable to the survival of the population or that can release dangerous forces.
In international humanitarian law, objects containing dangerous forces are defined as ‘dams, dykes and nuclear electrical generating stations’; in reality, however, chemical and similar plants also contain dangerous forces. Objects indispensable for the survival of the civilian population include, among others, drinking water installations or irrigation systems.
6. Do not make threats of violence to spread terror among the civilian population.
For example, hacking into communication systems to publish information designed primarily to spread terror among civilian populations is prohibited. Likewise, designing and spreading graphic content to spread terror among civilians in order to make them flee is unlawful.
7. Do not incite violations of international humanitarian law.
Do not encourage or enable others to conduct cyber or other operations against civilians or civilian objects. For example, do not share technical details in communication channels to facilitate attacks against civilian institutions.
8. Comply with these rules even if the enemy does not.
Revenge or reciprocity are no excuses for violations of international humanitarian law.
* Under IHL, and in the context of cyber operations, the notion of attack refers to cyber operations that can be reasonably expected to result – directly or indirectly – in damage, disabling, or destruction of objects (such as infrastructure and, arguably, data) or injury or death of people. It does not, for instance, include cyber operations aimed at obtaining unauthorized access to information.
For more detailed positions of the International Committee of the Red Cross on IHL and cyber operations, see here and here. To learn more about how international law applies in cyberspace, consult the ‘Cyberlaw Toolkit’.
Hackers do not live in cyberspace – States must impose limits
States should not encourage or tolerate civilian hackers conducting cyber operations in to the context of an armed conflict.
The more civilian hackers engage in cyber operations, the greater the risk of operations that violate applicable law and blur the line between combatants and civilians. Therefore, the ICRC has called on States to ‘give due consideration to the risk of exposing civilians to harm if encouraging or requiring them to be involved in military cyber operations’.
From a legal point of view, all States have pledged to not ‘knowingly allow their territory to be used for internationally wrongful acts using ICTs’ (here, para. 13(c)). While formulated as a political commitment, this norm reflects States’ ‘due diligence’ obligation under international law, including in respect of civilian hackers operating from their territory (see here). Any State that is committed to the rule of law or a ‘rules-based international order’ must not close its eyes when people on its territory conduct cyber operations in disregard of national or international law, even if directed against an adversary.
This means, first and foremost, to adopt and enforce national laws that regulate civilian hacking.
In addition, and specifically with regard to the conduct of private individuals in times of armed conflict, States have undertaken to respect and to ensure respect for IHL. This legal commitment means at least four things:
First, if civilian hackers act under the instruction, direction or control of a State, that State is internationally legally responsible for any conduct of those individuals that is inconsistent with the State’s international legal obligations, including international humanitarian law (see here, article 8, and here). For instance, if a State uses private individuals or groups as “volunteers” and instructs them to carry out particular cyber operations in disregard of international law, the state is legally responsible for such violations (see here, para. 2 on article 8). (This responsibility comes in addition to possible criminal responsibility of the private hacker).
Second, States must not encourage civilians or groups to act in violation of international humanitarian law (see here, para. 220). Concretely, this means that State agents – be they military, intelligence, or any other government actor – are prohibited from encouraging civilians or groups to, for example, direct cyber attacks against civilian objects, irrespective of which channel or app is used to do so.
Third, States have a due diligence obligation to prevent international humanitarian law violations by civilian hackers on their territory (see here, para. 183). Of course, a State cannot prevent all violations of the law. However, it must take feasible measures, such as taking public positions requiring civilian hackers not to conduct cyber operations in relation to armed conflicts, to respect IHL if they do, and suppress violations under national law (see next).
Fourth, States have an obligation to prosecute war crimes and take measures necessary to suppress other IHL violations (article 49/50/129/146 GCI-IV; article 85 Additional Protocol I). First, this requires the adoption and enforcement of the necessary laws that criminalize cyber operations amounting to war crimes, and second, to take effective measures to stop all other violations of IHL, which may include legal, disciplinary, or administrative measures. Clearly, adopting laws or policies that turn a blind eye on civilian hackers conducting cyber operations as long as these operations are committed against ‘the enemy’ does not comply with this obligation.
IHL sets out essential rules to limit the effects of armed conflicts on civilians. No one that participates in war is beyond these rules. In particular, every hacker that conducts operations in the context of an armed conflict must respect them, and States must ensure this is the case to protect civilian populations against harm.
Editor’s note: This article was originally published in EJIL:Talk! and is available here.
Please Rate This Article
Please Leave Us Your Comment
Also, tell us of any topics we might have missed.
Thank you for your comment. You may receive an email to follow up. We never share your data with marketers.
More Related Information:
- Volt Typhoon – Chinese State-Sponsored Cybercriminals Targeting The United States And The World In Cyberwar – 2024 (romancescamsnow.com)
- A Brief History of Malware, Malicious Code, And Computer Viruses – 2024 (romancescamsnow.com)
- North Korea Attacking The Crypto Ecosystem (romancescamsnow.com)
- Ransomware – Ukraine Gets Serious About Combatting Homegrown Cybercrime 2023
- 7 Chinese Hackers Indicted In U.S. Court For Cybercrime – 2024
- The Global Fraud Summit In The UK – 2024
-/ 30 /-
What do you think about this?
Please share your thoughts in a comment above!
SCARS LINKS: AgainstScams.org RomanceScamsNOW.com ContraEstafas.org ScammerPhotos.com Anyscam.com ScamsNOW.com
reporting.AgainstScams.org support.AgainstScams.org membership.AgainstScams.org donate.AgainstScams.org shop.AgainstScams.org
youtube.AgainstScams.org linkedin.AgainstScams.org facebook.AgainstScams.org
TABLE OF CONTENTS
- A Cyberwarfare Insight
- About This Article
- Governments and Hackers Agree: the Laws of War Must Apply in Cyberspace
- The 8 Rules for Cyberwarfare
- 8 Rules for “Civilian Hackers” during War, and 4 Obligations for States to Restrain Them – By the International Committee of the Red Cross
- Civilians engaging in digital warfare – a worrying trend
- 8 rules for civilian hackers operating in the context of an armed conflict
- Caution: Civilian hackers risk losing protection against cyber or physical attack and may be criminally prosecuted if they directly participate in hostilities through cyber means
- More Related Information:
- Important Information for New Scam Victims
- Statement About Victim Blaming
- SCARS INSTITUTE RESOURCES:
- Psychology Disclaimer:
- More ScamsNOW.com Articles
- A Question of Trust
- SCARS Institute™ ScamsNOW Magazine
Society of Citizens Against Relationship Scams Inc. [SCARS]
META
MOST POPULAR COMMENTED ARTICLES
POPULAR ARTICLES
WHAT PEOPLE ARE TALKING ABOUT
LATEST SITE COMMENTS
See Comments for this Article at the Bottom of the Page
on Cruel Or Indifferent To Suffering – What Scammers Do And Why It Is So Important For Scam Victims To Understand – 2024: “We are truly sorry that you encounters hateful people, but WE are very proud to know you!” Apr 24, 21:07
on Helping Scam Victims To See Through Authority Bias To Expose The Scammers And Fraudsters For What They Are – 2024: “I love this in-the-moment thinking. The above questions could help in so many situations, bank-related and not. The pause needed…” Apr 24, 18:40
on Scam Victims Compliance With Scammer Authority Figures – 2024: “Understanding the various biases targeted by anyone portraying a police officer, government official or really any authority figure is helpful.…” Apr 24, 18:26
on Sleep Deprivation As A Scammer’s Control Technique And Its Effect On Scam Victims – 2024: “This time, one year ago, I was being kept awake about 20 hours a day. Being woken up at all…” Apr 24, 18:09
on Indoctrination Of Scam Victims By Their Scammers? Yes! – 2024: “Many of these examples were used on me and they certainly kept me coming back to them. As I read…” Apr 24, 16:35
on Glimmers of Light – the Positive Side of Experience for Scam Victims – 2025: “Glimmers – each of us can and should find such things in our lives that give us some joy, help…” Apr 24, 14:29
on Cruel Or Indifferent To Suffering – What Scammers Do And Why It Is So Important For Scam Victims To Understand – 2024: “I am Asian American. I suffered discrimination since emigrated to the USA in the late ‘70s. I’ve had human fecal…” Apr 24, 12:38
on The Scout Mindset And Scam Victims: “Very informative article that helps me to see how my thinking is a bit more Scout versus Soldier. But there…” Apr 24, 10:12
on Contractualism and Supporting the Victims of Online Crime: “So often in our lives we do not apply the concept of contractualism. We do not specifically “see” that each…” Apr 23, 14:46
on Scam Victims: Applying Boundaries When Compassion Is Required Instead – 2023: “If there is one thing my crime has taught me is that I had a very limited toolbox for dealing…” Apr 23, 13:34
on Understanding the Right Priorities – Another View of New Scam Victims’ Challenges – 2024: “In my case, not knowing about scams, the kind of people and manipulation that I dealed with, not knowing how…” Apr 22, 20:43
on The Courage it Takes to Recover from a Scam – For Scam Victims in Recovery – 2025: “After the scam I thought that almost everything was about what I lost and just a bit about what took…” Apr 22, 20:24
on Thoughts About Boundaries: “I have had trouble with setting boundaries in my life because it got mixed with the message about being selfish.…” Apr 22, 14:41
on The Science Of Victimology – What Is It? – 2023: “Thank you for this definition and for explaining what to look for to segregate experienced, real victimologists from amateurs. I…” Apr 22, 14:00
on Love Bombing & Amygdala Hijacked Scam Victims – Love Is Chemical After All – 2024: “Better understanding how emotions are coerced and forced instead being real helps to accept that this all truly was not…” Apr 22, 13:42
on A Reflection on Christ’s Suffering and Radical Acceptance of the Worst Possible Outcome – 2025: “A strong message, especially at this time of Easter!” Apr 19, 23:16
on A Small Drop Of Insight About Victims’ Trauma: “This lesson was very impactful for me. I have experiences these short-circuit flashbacks and it does bring back the trauma.…” Apr 19, 16:05
on What is Karma – Not From an Eastern Perspective But From a Psychological Point of View – 2025: “This is so informative! It is absolutely what I see daily and it is a trap anyone can fall into…” Apr 19, 15:43
on The Little Mermaid – A Tale of Self-Deception – A Cautionary Story for Scam Victims – 2025: “This is an appeal not only to parents, grandparents but also teachers. Let’s teach the young to distinguish good from…” Apr 19, 10:46
on What is Karma – Not From an Eastern Perspective But From a Psychological Point of View – 2025: “This is a completely different perspective of karma, that I wasn’t familiar with. I always thought of it as: you…” Apr 18, 20:11
Important Information for New Scam Victims
Please visit www.ScamVictimsSupport.org – a SCARS Website for New Scam Victims & Sextortion Victims
SCARS Institute now offers a free recovery program at www.SCARSeducation.org
Please visit www.ScamPsychology.org – to more fully understand the psychological concepts involved in scams and scam victim recovery
If you are looking for local trauma counselors, please visit counseling.AgainstScams.org
If you need to speak with someone now, you can dial 988 or find phone numbers for crisis hotlines all around the world here: www.opencounseling.com/suicide-hotlines
Statement About Victim Blaming
Some of our articles discuss various aspects of victims. This is both about better understanding victims (the science of victimology) and their behaviors and psychology. This helps us to educate victims/survivors about why these crimes happened and not to blame themselves, better develop recovery programs, and help victims avoid scams in the future. At times, this may sound like blaming the victim, but it does not blame scam victims; we are simply explaining the hows and whys of the experience victims have.
These articles, about the Psychology of Scams or Victim Psychology – meaning that all humans have psychological or cognitive characteristics in common that can either be exploited or work against us – help us all to understand the unique challenges victims face before, during, and after scams, fraud, or cybercrimes. These sometimes talk about some of the vulnerabilities the scammers exploit. Victims rarely have control of them or are even aware of them, until something like a scam happens, and then they can learn how their mind works and how to overcome these mechanisms.
Articles like these help victims and others understand these processes and how to help prevent them from being exploited again or to help them recover more easily by understanding their post-scam behaviors. Learn more about the Psychology of Scams at www.ScamPsychology.org
SCARS INSTITUTE RESOURCES:
IF YOU HAVE BEEN VICTIMIZED BY A SCAM OR CYBERCRIME
♦ If you are a victim of scams, go to www.ScamVictimsSupport.org for real knowledge and help
♦ Enroll in SCARS Scam Survivor’s School now at www.SCARSeducation.org
♦ To report criminals, visit https://reporting.AgainstScams.org – we will NEVER give your data to money recovery companies like some do!
♦ Sign up for our free support & recovery help by https://support.AgainstScams.org
♦ Join our WhatsApp Chat Group at: https://chat.whatsapp.com/BPDSYlkdHBbDBg8gfTGb02
♦ Follow us on X: https://x.com/RomanceScamsNow
♦ Follow us and find our podcasts, webinars, and helpful videos on YouTube: https://www.youtube.com/@RomancescamsNowcom
♦ SCARS Institute Songs for Victim-Survivors: https://www.youtube.com/playlist…
♦ See SCARS Institute Scam Victim Self-Help Books at https://shop.AgainstScams.org
♦ Learn about the Psychology of Scams at www.ScamPsychology.org
♦ Dig deeper into the reality of scams, fraud, and cybercrime at www.ScamsNOW.com and www.RomanceScamsNOW.com
♦ Scam Survivor’s Stories: www.ScamSurvivorStories.org
♦ For Scam Victim Advocates visit www.ScamVictimsAdvocates.org
♦ See more scammer photos on www.ScammerPhotos.com
You can also find the SCARS Institute on Facebook, Instagram, X, LinkedIn, and TruthSocial
Psychology Disclaimer:
All articles about psychology and the human brain on this website are for information & education only
The information provided in this and other SCARS articles are intended for educational and self-help purposes only and should not be construed as a substitute for professional therapy or counseling.
Note about Mindfulness: Mindfulness practices have the potential to create psychological distress for some individuals. Please consult a mental health professional or experienced meditation instructor for guidance should you encounter difficulties.
While any self-help techniques outlined herein may be beneficial for scam victims seeking to recover from their experience and move towards recovery, it is important to consult with a qualified mental health professional before initiating any course of action. Each individual’s experience and needs are unique, and what works for one person may not be suitable for another.
Additionally, any approach may not be appropriate for individuals with certain pre-existing mental health conditions or trauma histories. It is advisable to seek guidance from a licensed therapist or counselor who can provide personalized support, guidance, and treatment tailored to your specific needs.
If you are experiencing significant distress or emotional difficulties related to a scam or other traumatic event, please consult your doctor or mental health provider for appropriate care and support.
Also read our SCARS Institute Statement about Professional Care for Scam Victims – click here
If you are in crisis, feeling desperate, or in despair, please call 988 or your local crisis hotline.
More ScamsNOW.com Articles
A Question of Trust
At the SCARS Institute, we invite you to do your own research on the topics we speak about and publish. Our team investigates the subject being discussed, especially when it comes to understanding the scam victims-survivors’ experience. You can do Google searches, but in many cases, you will have to wade through scientific papers and studies. However, remember that biases and perspectives matter and influence the outcome. Regardless, we encourage you to explore these topics as thoroughly as you can for your own awareness.
Leave a Reply