Abstract
Nation-states are struggling to formulate cyberpolicy, especially against foreign-based intrusions and attacks on domestic computer systems. These incidents are often framed in the context of cyberwarfare, which naturally implies that military organizations should respond to these incidents. This chapter will discuss why cyberwarfare is ethically difficult and why, until responsible cyberpolicy is developed, we may plausibly reframe the problem not as warfare but as private defense, i.e., self-defense by private parties, especially commercial companies, as distinct from a nation-state’s right to self-defense. The distinction between private defense and national defense is relevant, since victims of cyberattacks have been primarily industry targets and not so much government targets, at least with respect to measurable harm. And we focus on foreign-based cyberattacks since, unlike domestic-based attacks that are usually considered to be mere crimes and therefore a matter for domestic law enforcement, foreign-based attacks tend to raise special alarms and panic about more sinister motives. More than a mere criminal act, a foreign cyberattack is often perceived as an aggression so serious that it may plausibly count as an act of war, or casus belli, and so we are quick to invoke national security. But insofar as the state is currently not protecting industry from such cyberattacks—in part because it is difficult to arrive at a sound cyberpolicy—we should consider interim solutions outside the military framework.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Allhoff, F. 2012. Terrorism, ticking time-bombs, and torture. Chicago: University of Chicago Press.
Arquilla, J. 2012. Cyberwar is already upon us. Foreign policy (March/April). http://www.foreignpolicy.com/articles/2012/02/27/cyberwar_is_already_upon_us?page=full. Accessed 22 October 2013.
Aquinas, T. 1948. Summa Theologica (Trans. Fathers of the English Dominican Province). New York: Benziger Books.
BBC. 2012. Iran Says Preemptive Strike on ‘Enemies’ Possible. BBC News, February 21. http://www.bbc.co.uk/news/world-middle-east-17116588. Accessed 22 October 2013.
Beard v. United States. 1895. 158 U.S. 550, 563 (1895). http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=us&vol=158&invol=550. Accessed 22 October 2013.
Blitz, J. 2012. MI5 chief sets out price of cyber attack. Financial times. http://www.ft.com/cms/s/0/a970810c-bef2-11e1-8ccd-00144feabdc0.html#axzz1zDB9cncm. Accessed 22 October 2013.
Brown v. United States. 1921. 256 U.S. 335, 343. (1921). http://supreme.justia.com/cases/federal/us/256/335/case.html. Accessed 22 October 2013.
Caplan, A. 2005. The time has come to let terri schiavo die. MSNBC.com, March 18. http://www.msnbc.msn.com/id/7231440/ns/health-health_care/t/time-has-come-let-terri-schiavo-die/#.T-4VArWe4aw. Accessed 22 October 2013.
Clarke, R. 2010. Cyber war: The next threat to national security and what to do about it. New York: Ecco.
Coady, C. A. J. 2004. Terrorism, morality, and supreme emergency. Ethics 114: 772–789.
Cook, J. 2010. ‘Cyberation’ and just war doctrine: A response to randall dipert. Journal of Military Ethics 9 (4): 411–423.
Crisp, R. 2012. Cyberwarfare: No new ethics needed. Practical ethics: Ethics in the news. http://blog.practicalethics.ox.ac.uk/2012/06/cyberwarfare-no-new-ethics-needed/. Accessed 22 October 2013.
Debatepedia. 2011. Debate: Gun control debatepedia index. http://dbp.idebate.org/en/index.php/Debate:_Gun_control. Accessed 22 October 2013.
Dipert, R. 2006. Preventive war and the epistemological dimension of the morality of war. Journal of Military Ethics 5 (1): 32–54.
Dipert, R. 2010. The ethics of cyberwarfare. Journal of Military Ethics 9 (4): 384–410.
Florida Statutes. 2011. Chapter 776: Justifiable use of force. The Florida Senate. http://www.flsenate.gov/Laws/Statutes/2010/Chapter776/All. Accessed 22 October 2013.
Goldman, D. 2011. The cost of cybercrime. CNNMoney, July 22. http://money.cnn.com/galleries/2011/technology/1107/gallery.cyber_security_costs/index.html. Accessed 22 October 2013.
Gorman, S. and J. E. Barnes. 2011. Cyber combat: Act of war. The Wall Street Journal: Technology, May 30. http://online.wsj.com/article/SB10001424052702304563104576355623135782718.html?mod=googlenews_wsj. Accessed 22 October 2013.
Hollis, D. 2008. New tools, new rules: International law and information operations. In The message of war: Information, influence and perception in armed conflict, eds. G. David and T. McKeldin. Temple University Legal studies research paper no. 2007–15. http://ssrn.com/abstract=1009224. Accessed 22 October 2013.
Infosec Island. 2012. Microsoft dismisses zeus botnet takedown criticism. Infosecisland. http://www.infosecisland.com/blogview/21036-Microsoft-Dismisses-Zeus-Botnet-Takedown-Criticism.html. Accessed 22 October 2013.
Jackson, W. 2012. DOD vs. DHS: Who should mind the US’ Cyber Defense? Defense Systems, March 27. http://defensesystems.com/articles/2012/03/27/cyber-defense-hearing-mccain-slams-dhs-favors-dod.aspx. Accessed 22 October 2013.
Jensen, E. 2011. President Obama and the changing cyber paradigm. William Mitchell law review, vol. 37, no. 5049. http://ssrn.com/abstract=1740904. Accessed 22 October 2013.
Leavitt, J. W. 1997. Typhoid mary: Captive to the public’s health. Boston: Beacon Press.
Lieberthal, K., and P. W. Singer. 2012. Cybersecurity and US-China Relations. The brookings institution, 21st century defense initiative. http://www.brookings.edu/~/media/research/files/papers/2012/2/23%20cybersecurity%20china%20us%20singer%20lieberthal/0223_cybersecurity_china_us_lieberthal_singer_pdf_english. Accessed 22 October 2013.
Libicki, M. 2009. Cyberdeterrence and cyberwar. The RAND corporation. http://www.rand.org/pubs/monographs/MG877.html. Accessed 22 October 2013.
Lin, H. 2012. Arms control in cyberspace: Challenges and opportunities. World Politics Review, March 2012.
Lin, P. 2012. ‘Stand your cyberground’ law: A novel proposal for digital security. The Atlantic, April 30. http://www.theatlantic.com/technology/archive/2012/04/stand-your-cyberground-law-a-novel-proposal-for-digital-security/256532/. Accessed 22 October 2013.
Lin, P., F. Allhoff, and N. C. Rowe. 2012. War 2.0: Cyberweapons and ethics. Communications of the ACM 55 (3): 24–26.
Markoff, J. 2008. Before the Gunfire, Cyberattacks. The New York Times: Technology, August 12. http://www.nytimes.com/2008/08/13/technology/13cyber.html. Accessed 22 October 2013.
McMahan, J. 2009. Killing in war. Oxford: Oxford University Press.
Menn, J. 2012. Hacked firms fight back with vigilante justice. The Globe and Mail, June 18. http://www.theglobeandmail.com/technology/tech-news/hacked-firms-fight-back-with-vigilante-justice/article4321501/. Accessed 22 October 2013.
New York Penal Law. 2012. Article 35: Defense of justification. New York Laws. http://ypdcrime.com/penal.law/article35.htm. Accessed 22 October 2013.
Orend, B. 2005. War. The stanford encyclopedia of philosophy. Stanford University. http://plato.stanford.edu/entries/war/. Accessed 22 October 2013.
Owens, W., K. Dam, and H. Lin, eds. 2009. Technology, policy, law, and ethics regarding U.S. Acquisition and use of cyberattack capabilities. The National Academies Press. http://www.nap.edu/catalog.php?record_id=12651#orgs. Accessed 22 October 2013.
Reichberg, G. M., H. Syse, and E. Begby, eds. 2006. The ethics of war: Classic and contemporary readings. Malden: Blackwell Publishing.
Rid, T. 2012. Think again: Cyberwar. Foreign policy. http://www.foreignpolicy.com/articles/2012/02/27/cyberwar?page=full. Accessed 22 October 2013.
Riley, M., and J. Walcott. 2011. China-based hacking of 760 companies shows cyber cold war. Bloomberg, December 14. http://www.bloomberg.com/news/2011-12-13/china-based-hacking-of-760-companies-reflects-undeclared-global-cyber-war.html. Accessed 22 October 2013.
Rowe, N. 2009. The ethics of cyberweapons in warfare. International Journal of Cyberethics. 1:20–31.
Rowe, N., E. J. Custy, and B. T. Duong. 2007. Defending cyberspace with fake honeypots. Journal of Computers 2:25–36.
Sanger, D. 2012. Obama order sped up wave of cyberattacks on Iran. New York Times, June 1. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?pagewanted=all. Accessed 22 October 2013.
Schmitt, M. 2010. Cyber operations in international law: The use of force, collective security, self-defense, and armed conflicts. The National Academies Press. http://www.nap.edu/openbook.php?record_id=12997&page=151. Accessed 22 October 2013.
Schneier, B. 2010. The story behind the stuxnet virus. Forbes, October 7. http://www.forbes.com/2010/10/06/iran-nuclear-computer-technology-security-stuxnet-worm.html. Accessed 22 October 2013.
Taddeo, M. 2012. Information warfare: A philosophical perspective. Philosophy and Technology 25:105–120.
Tierney, D. 2011. We don’t need an Obama doctrine. The Atlantic, October 23. http://www.theatlantic.com/international/archive/2011/10/we-dont-need-an-obama-doctrine/247207/#. Accessed 22 October 2013.
United Nations. 1982. United nations convention on the law of the seas, especially Part VII. http://www.un.org/Depts/los/convention_agreements/texts/unclos/closindx.htm. Accessed 22 October 2013.
Walzer, M. 2006. Just and unjust wars. New York: Basic Books.
Watts, S. 2011. Low-intensity computer network attack and self-defense. International Law Studies. 87:59–87. http://www.law.berkeley.edu/files/watts–low_intensity_computer_network_attack.pdf. Accessed 22 October 2013.
White Wolf Security. 2007. Offensive operations in cyberspace. White Wolf Security Publications. http://www.whitewolfsecurity.com/publications/offensive_ops.php. Accessed 22 October 2013.
Willson, D. L. 2010. When does electronic espionage or a cyber attack become an ‘Act of War’?. Information Systems Security Association (ISSA) Journal 8:20–24.
Willson, D. L. 2012. Hacking back in self-defense: Is it legal? Should it be?. Information Systems Security Association (ISSA) Journal. 10: 7–10.
Wright, R. 2012. President Obama’s hypocrisy on cyberattacks. The Atlantic, June 3. http://www.theatlantic.com/international/archive/2012/06/president-obamas-hypocrisy-on-cyberattacks/258016/. Accessed 22 October 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lin, P., Allhoff, F., Abney, K. (2014). Is Warfare the Right Frame for the Cyber Debate?. In: Floridi, L., Taddeo, M. (eds) The Ethics of Information Warfare. Law, Governance and Technology Series, vol 14. Springer, Cham. https://doi.org/10.1007/978-3-319-04135-3_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-04135-3_3
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-04134-6
Online ISBN: 978-3-319-04135-3
eBook Packages: Humanities, Social Sciences and LawPhilosophy and Religion (R0)