Skip to main content

Moral Cyber Weapons

  • Chapter
  • First Online:
  • 1862 Accesses

Part of the book series: Law, Governance and Technology Series ((LGTS,volume 14))

Abstract

This paper examines the morality of cyber weapons, offering conditions under which they are not only ethical under just war theory, but morally preferred over their kinetic counterparts. When these conditions are satisfied, states not only have the option of using cyber weapons, but could even acquire a moral duty to do so over other forms of warfare. In particular, we show that states are morally obliged to use cyber weapons instead of kinetic weapons when they can be deployed for a purpose already deemed just under the law of armed conflict and without any significant loss of capability. The reason behind this moral obligation is that cyber weapons can reduce both the risk to one’s own (putatively just) military and the harm to one’s adversary and non-combatants. The paper discusses this obligation, using examples to illustrate cases where it does or does not apply. It also addresses several objections that have been raised about the use of cyber weapons, showing that they fail to fully counter the obligation to use cyber weapons derived from their reduction of risk and harm properties.

Approved for public release; distribution is unlimited. The views expressed in this document are those of the authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    Rid (2011) has recently given a philosophical argument (rather than a legal argument) that the use of cyber weapons cannot and will not constitute war. He makes this case based on an analysis of the definition of war such that any given attack must be a lethal, instrumental, and political act in order to constitute war. And he finds cyber-attacks, in isolation, would not constitute all three criteria. We set Rid’s analysis aside for the purposes of this paper.

  2. 2.

    See Dipert (2010, p. 393) for an argument that the preemptive use of cyber weapons would likely be morally preferable over a similar preemptive kinetic attack, and possibly even morally permissible, precisely for the kinds of advantages cyber weapons have that we rely on in this paper (i.e. their general non-lethality and lesser degree of destruction). On the use of force question, see Rid (2011) noted above.

  3. 3.

    Although we cannot pursue it here, not all have found even this modest principle uncontroversial. Uwe Steinhoff (forthcoming) argues that it is, indeed, controversial and that acceptance of it could involve several normative problems. Steinhoff’s objections to the PUR deserve response, but such a discussion lies outside of the scope of this paper.

  4. 4.

    And, further, presume that they do not have a scarcity of resources problem such that they must reserve some particular weapons for future missions, etc.

  5. 5.

    There are, of course, important parallels here to cases of individual self-defense, where proportionality and necessity rule. In fact, many revisionist accounts of just war theory currently on the rise today contend precisely that the moral rules of warfare should track more closely with the moral reality of individual self-defense and, as such, should impose a much stronger “necessity” clause on any given just military action (see, Rodin 2005, for example). Such a discussion, however, is far outside the scope of this paper.

  6. 6.

    Again, see Steinhoff (2013) for a contrasting view. Presumably Steinhoff’s objections to PUR would carry over to PURH.

  7. 7.

    See Orend (2000) for a comprehensive case for developing principles of jus post bellum.

  8. 8.

    For a good discussion on cyber warfare attacking non-combatants and the resulting problems, see Lucas (2011b). Lucas’ work in that piece is highly compatible with the claims we make in this paper, although we disagree with Lucas over whether some specific instances of cyber-attacks would be permissible. Lucas writes, “… an act of cyber warfare is permissible if it aims primarily at harming military (rather than civilian) infrastructure, degrades an adversary’s ability to undertake highly destructive offensive kinetic operations, harms no civilians and/or destroys little or no civilian infrastructure in the process.” And, of course, we further differ from Lucas in contending that in some such instances cyber-attacks would not be merely permissible, but obligatory to use in place of similar kinetic attacks.

  9. 9.

    Several revisionist just war theorists have recently challenged a blanket principle of non-combatant immunity and have argued that some noncombatants could be liable to harm in war. Jeff McMahan (2009) does this most prominently, but others such as Helen Frowe (2011) have also advanced a rejection of total non-combatant immunity. Note that even on these revisionists accounts, however, an attack against the entire Internet would still fall outside of the bounds of just war practices because there would be very little if any discrimination possible amongst non-combatants. Again see Lucas (2011b) for a discussion on the possibilities for discriminate cyberwarfare.

  10. 10.

    Although in this case much of that infection did little real damage to systems it used on its way to delivering its payload. This is a more complicated question regarding what should constitute damage and how such a calculus should be used in analyzing the moral permissibility of particular attacks. We address this issue separately below in Objection 4.

  11. 11.

    Though this need not always be the case. It is possible for a cyber-weapon to directly attack an adversary system without any mediating system whatsoever. But this will be rare.

  12. 12.

    This is exactly what played out with the Stuxnet attack on Iran.

  13. 13.

    Savulescu and Beauchamp (2013) argue for a similar moral gain that could be possibly had with regard to the increasing use of UAVs.

References

  • Arquilla, J. 1999. Ethics and information warfare. In The changing role of information in warfare, eds. A. Khalilzad, J. White, und A. Marshall, 379–401. Santa Monica: RAND Corporation.

    Google Scholar 

  • Broad, W. J., Markoff, J., and Sanger, D. E. 2011. Israeli test on worm called crucial in Iran nuclear delay. The New York Times, January 15.

    Google Scholar 

  • Clarke, R. A., and Knake, R. K. 2010. Cyber war. New York: Harper Collins.

    Google Scholar 

  • Denning, D. E. 2008. The ethics of cyber conflict. In The handbook of information and computer ethics, eds. K. E. Himma and H. T. Tavani, 407–428. Hoboken: Wiley.

    Chapter  Google Scholar 

  • Dipert, R. 2010. The ethics of cyberwarfare. Journal of Military Ethics 9 (4): 384–410.

    Article  Google Scholar 

  • Dipert, R. 2012. Ethical aspects of cyberwar. Paper presented at the meeting on ethical and societal issues in National Security Applications of Emerging Technologies for the National Academy of Sciences Division on Engineering and Physical Sciences, Computer Science and Telecommunications Board, Washington D.C.

    Google Scholar 

  • DoD. 1999. An assessment of international legal issues in information operations. 2nd ed. (November). Arlington: Department of Defense, Office of General Counsel.

    Google Scholar 

  • Falliere, N., Murchu, L.O., and Chien, E. 2011. W.32 Stuxnet Dossier, V. 1.4, Symantec Security Response. February.

    Google Scholar 

  • Frowe, H. 2011. Self-Defence and the principle of non-combatant immunity. Journal of Moral Philosophy 8:530–546.

    Article  Google Scholar 

  • Lucas, G. R. 2011a. Industrial challenges of military robots. Journal of Military Ethics 10 (4): 274–295.

    Article  Google Scholar 

  • Lucas, G. R. 2011b. Permissible preventive cyberwar: Restricting cyber conflict to justified military targets. Oxford: Oxford Institute for Ethics, Law, and Armed Conflict.

    Google Scholar 

  • McMahan, J. 2009. Killing in war. Oxford: Oxford University Press.

    Book  Google Scholar 

  • Orend, B. 2000. Jus Post Bellum. The Journal of Social Philosophy 31 (1): 117–137.

    Article  Google Scholar 

  • Owens, W. A., Dam, K. W., and Lin, H. S., eds. 2009. Technology, policy, law, and ethics regarding US acquisition and use of cyberattack capabilities. Washington, DC: The National Academies Press.

    Google Scholar 

  • Rattray, G., and Healey, J. 2010. Categorizing and understanding offensive cyber capabilities and their use. In Proceedings of a workshop on deterring cyberattacks, eds. K. W. Dam and W. A. Owens, 77–97. Washington, DC: The National Academies Press.

    Google Scholar 

  • Rid, T. 2011. Cyber war will not take place. Journal of Strategic Studies V 35, no 1, 5–32, February, DOI:10.1080/01402390.2011.608939.

    Google Scholar 

  • Rodin, D. 2005. War and self-defence. Oxford: Oxford University Press.

    Google Scholar 

  • Rowe, N. C. 2010a. The ethics of cyberweapons in warfare. Internationl Journal of Technoethics 1 (1): 20–31.

    Article  Google Scholar 

  • Rowe, N. 2010b. Towards reversible cyberattacks. In Proceedings of the 9th European Conference on Information Warfare and Security, ed. J. Demergis, 261–267. Reading: Academic Publishing Ltd.

    Google Scholar 

  • Savulescu, J., and Z. Beauchamp. 2013. Robot angels: The use of UAVs in humanitarian military intervention. In Killing by remote control: The ethics of an unmanned military, ed. B. J. Strawser, 106–125. New York: Oxford University Press.

    Google Scholar 

  • Schmitt, M. N. 1999. Computer network attack and the use of force in international law: Thoughts on a normative framework. Columbia Journal of Transnational Law 7:885–937.

    Google Scholar 

  • Schmitt, M. N. 2010. Cyber operations in international law: The use of force, collective security, self-defense, and armed conflicts. In Proceedings of a workshop on deterring cyberattacks, eds. K. W. Dam and W. A. Owens, 151–178. Washington, DC: The National Academies Press.

    Google Scholar 

  • Steinhoff, U. 2013. Extreme asymmetry and its discontents. In Killing by remote control: The ethics of an unmanned military, ed. B. J. Strawser, 179–207. New York: Oxford University Press.

    Chapter  Google Scholar 

  • Strawser, B. J. 2010. Moral predators: The duty to employ uninhabited aerial vehicles. Journal of Military Ethics 9 (4): 342–368.

    Article  Google Scholar 

  • Symantec. 2011. Internet security threat report. Trends for 2010, Vol. 16, April.

    Google Scholar 

  • Tikk, E., Kaska, K., and Vihul, L. 2010. International cyber incidents: Legal considerations. Estonia: NATO Cooperative Cyber Defence Centre of Excellence.

    Google Scholar 

  • Wingfield, T. 2000. The law of information conflict. Falls Church: Aegis Research Corporation.

    Google Scholar 

  • Wingfield, T. 2009. International law and information operations. In Cyberpower and national security, eds. F. D. Kramer, S. H. Starr, and L. K. Wentz, 525–542. Washington, DC: NDU Press.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dorothy E. Denning .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Denning, D., Strawser, B. (2014). Moral Cyber Weapons. In: Floridi, L., Taddeo, M. (eds) The Ethics of Information Warfare. Law, Governance and Technology Series, vol 14. Springer, Cham. https://doi.org/10.1007/978-3-319-04135-3_6

Download citation

Publish with us

Policies and ethics