Reliable Old Wineskins: The Applicability of the Just War Tradition to Military Cyber Operations
Philosophy and Technology 28 (3):387-405 (2015)
Abstract
This article argues that the traditional jus ad bellum and jus in bello criteria are fully capable of providing the ethical guidance needed to legitimately conduct military cyber operations. The first part examines the criteria’s foundations by focusing on the notion of liability to defensive harm worked out by revisionist just war thinkers. The second part critiques the necessity of alternative frameworks, which its proponents assert are required to at least supplement the traditional just war criteria. Using the latter, the third part evaluates ethical issues germane to responding to cyber force, including casus belli, moral aspects of “the attribution problem,” and respective rights and duties when attacks involve innocent third-party states. The fourth part addresses in bello issues, including compliance with discrimination, necessity, and civilian due care imperatives; whether civilians may be targeted with sub-“use of force” cyber-attacks and the permissibility of using civilian contractors to conduct cyber-attacks. Throughout these analyses, conclusions are brought into conversation with those of The Tallinn Manual on the International Law Applicable to Cyber WarfareMy notes
Similar books and articles
Violence, Just Cyber War and Information.Massimo Durante - 2015 - Philosophy and Technology 28 (3):369-385.
The Cyber Combatant: a New Status for a New Warrior.Maurizio D’Urso - 2015 - Philosophy and Technology 28 (3):475-478.
Confronting Cyber Warfare: Rethinking the Ethics of Cyber War.Bassam Romaya & Lisa Portmess - 2013 - Journal for Peace and Justice Studies 23 (1):44-60.
How to Think About Cyber Conflicts Involving Non-state Actors.Phillip McReynolds - 2015 - Philosophy and Technology 28 (3):427-448.
Cyber Force and the Role of Sovereign States in Informational Warfare.Ugo Pagallo - 2015 - Philosophy and Technology 28 (3):407-425.
Warfare in a new domain: The ethics of military cyber-operations.Edward T. Barrett - 2013 - Journal of Military Ethics 12 (1):4-17.
Cyber Conflicts: Addressing the Regulatory Gap.Ludovica Glorioso - 2015 - Philosophy and Technology 28 (3):333-338.
The moral dimension of asymmetrical warfare: counter-terrorism, democratic values and military ethics.Ted van Baarda & Désirée Verweij (eds.) - 2009 - Boston: Martinus Nijhoff.
Justice in Cyberwar.Klaus-Gerd Giesen - 2014 - [email protected] - An International Journal for Moral Philosophy 13 (1):27–49.
Ethics and Cyber Conflict: A Response to JME 12:1 (2013).George R. Lucas Jr - 2014 - Journal of Military Ethics 13 (1):20-31.
An Analysis For A Just Cyber Warfare.Mariarosaria Taddeo - forthcoming - In Warfare. Fourth International Conference of Cyber Conflict. NATO CCD COE and IEEE Publication.
Cyber Security and Individual Rights, Striking the Right Balance.Mariarosaria Taddeo - 2013 - Philosophy and Technology 26 (4):353-356.
Analytics
Added to PP
2015-04-21
Downloads
45 (#261,698)
6 months
3 (#225,062)
2015-04-21
Downloads
45 (#261,698)
6 months
3 (#225,062)
Historical graph of downloads
References found in this work
Can we harm and benefit in creating?Elizabeth Harman - 2004 - Philosophical Perspectives 18 (1):89–113.
Proportionality in the Morality of War.Thomas Hurka - 2005 - Philosophy and Public Affairs 33 (1):34-66.
Information ethics: on the philosophical foundation of computer ethics.Luciano Floridi - 1999 - Ethics and Information Technology 1 (1):33–52.
A Defense of the Counterfactual Comparative Account of Harm.Justin Klocksiem - 2012 - American Philosophical Quarterly 49 (4):285 – 300.