Abstract
In this chapter I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold, filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War Theory is merged with Information Ethics. In the initial part of the chapter, I describe information warfare and its main features and highlight the problems that arise when Just War Theory is endorsed as a means of addressing ethical problems engendered by this kind of warfare. In the final part, I introduce the main aspects of Information Ethics and define three principles for a just information warfare resulting from the integration of Just War Theory and Information Ethics.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
- 3.
- 4.
For an annotated time line of cyber attacks see NATO’s website http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm
- 5.
This is an autonomous weapon system designed to detect and destroy radar emitters http://www.israeli-weapons.com/weapons/aircraft/uav/harpy/harpy.html
- 6.
This is a UK drone which can autonomously search, identify and locate enemies although it should be stressed that it can only engage with a target upon the authorization of mission command http://en.wikipedia.org/wiki/BAE_Systems_Taranis
- 7.
For more in details analysis of LoA see (Floridi 2008).
- 8.
The USA only spent $400 million in developing technologies for cyber conflicts: http://www.wired.com/dangerroom/2010/05/cyberwar-cassandras-get-400-million-in-conflict-cash/
The UK devoted £650 million to the same purpose: http://www.theinquirer.net/inquirer/news/1896098/british-military-spend-gbp650-million-cyber-warfare
- 9.
Note that MQ-1 Predators and EADS Barracuda, and the Northrop Grumman X-47B are Unmanned Combat Aerial Vehicles used for combat actions and they are different from Unmanned Air Vehicles, like for example Northrop Grumman MQ-8 Fire Scout, which are used for patrolling and recognition purposes only.
- 10.
- 11.
The need to define concepts such as those of harm, target and violence is stressed both by scholar who argue in favor of the ontological difference of the cyber warfare (Dipert 2013) and exploit this point to claim that JWT is not an adequate framework to address IW and by those who actually maintain that JWT provides sufficient element to address the case of IW LUCAS.
- 12.
See (Withman 2013) for an analysis of validity of JWT with respect to contemporary violent warfare.
- 13.
It is worthwhile noticing that the problem engendered by the application of the principle of last resort to the soft-cases of IW may also be addressed by stressing that these cases do not fall within the scope of JWT as they may be considered cases of espionage rather than cases of war, and as such they do not represent a ‘first strike’ and the principle of last resort should not be applied to them. One consequence of this approach is that JWT would address war scenarios by focusing on traditional cases of warfare, such as physical attacks, and on the deployment of robotic weapons, disregarding the use of cyber attacks. This would be quite a problematic consequence because, despite the academic distinction between IW and traditional warfare, the two phenomena are actually not so distinct in reality. Robotic weapons fight on the battlefield side by side with human soldiers, and military strategies comprise both physical and cyber attacks. By disregarding cyber attacks, JWT would be able to address only partially contemporary warfare, while it should take into consideration the whole range of phenomena related to war waging in order to address the ethical issues posed by it (for a more in depth analysis of this aspect see (reference removed for blind review)).
- 14.
“ICRC Databases on International Humanitarian Law”
- 15.
On this point see also (Dipert 2010, p. 400).
- 16.
The reader may recall the informational LoA mentioned in Sect. 5.2. Information Ethics endorses an informational LoA, as such it focuses on the informational nature as a common ground of all existing things.
- 17.
References
Abiola, A., J. Munoz, and W. Buchanan. 2004. Analysis and detection of cruising computer viruses. In In: Proceedings of 3rd EIWC.
Arquilla, J. 1998. Can information warfare ever be just? Ethics and Information Technology 1(3): 203–212.
Arquilla, J. 2013. Twenty years of cyberwar. Journal of Military Ethics 12(1): 80–87. doi:10.1080/15027570.2013.782632.
Arquilla, J., and D.F. Ronfeldt (eds.). 1997. In Athena’s camp: Preparing for conflict in the information age. Santa Monica: Rand.
Asaro, P. 2008. How just could a robot war be? In Current issues in computing and philosophy, ed. P. Brey, A. Briggle, and K. Waelbers, 50–64. Amsterdam: IOS Press.
Barrett, E.T. 2013. Warfare in a new domain: The ethics of military cyber-operations. Journal of Military Ethics 12(1): 4–17. doi:10.1080/15027570.2013.782633.
Benbow, T. 2004. The magic bullet?: Understanding the “Revolution in Military Affairs”. London: Brassey’s.
Blackmore, T. 2011. War X. Toronto: University of Toronto Press.
Bok, S. 1999. Lying: Moral choice in public and private life. 2nd Vintage Books ed. New York: Vintage Books.
Bowden, M. 2011. Worm: The first digital world war. New York: Atlantic Monthly Press.
Brenner, J. 2011. America the vulnerable: New technology and the next threat to national security. New York: Penguin Press.
Clarke, R.A. 2012. Cyber war: The next threat to national security and what to do about it. 1st Ecco pbk. edn. New York: Ecco.
Denning, D. 2007. The ethics of cyber conflict. In Information and computer ethics. Hoboken: Wiley.
Dipert, R. 2010. The ethics of cyberwarfare. Journal of Military Ethics 9(4): 384–410.
Dipert, R. 2013. The essential features of an ontology for cyberwarfare. In Conflict and cooperation in cyberspace, ed. Panayotis Yannakogeorgos and Adam Lowther, 35–48. Boca Raton: Taylor & Francis. http://www.crcnetbase.com/doi/abs/10.1201/b15253-7.
Floridi, L. 2002. On the intrinsic value of information objects and the infosphere. Ethics and Information Technology 4(4): 287–304.
Floridi, L. 2006. Information ethics, its nature and scope. SIGCAS Comput. Soc. 36(3): 21–36. doi:10.1145/1195716.1195719.
Floridi, L. 2007. Understanding information ethics. APA Newsletter on Philosophy and Computers 7(1): 3–12.
Floridi, L. 2008. The method of levels of abstraction. Minds and Machines 18(3):303–329. doi:10.1007/s11023-008-9113-7.
Floridi, L. 2013. Ethics of information. [S.l.]: Oxford University Press.
Floridi, L. 2014. The fourth revolution, how the infosphere is reshaping human reality. Oxford: Oxford University Press.
Floridi, L., and J. Sanders. 2001. Artificial evil and the foundation of computer ethics. Ethics and Information Technology 3(1): 55–66.
Floridi, L., and J.W. Sanders. 2004. On the morality of artificial agents. Minds and Machines 14(3): 349–379. doi:10.1023/B:MIND.0000035461.63578.9d.
Gelven, M. 1994. War and existence: A philosophical inquiry. University Park: Pennsylvania State University Press.
Hepburn, R.W. 1984. “Wonder” and other essays: Eight studies in aesthetics and neighbouring fields. Edinburgh: University Press.
“ICRC Databases on International Humanitarian Law.” 00:00:00.0. http://www.icrc.org/ihl/INTRO/470.
Libicki, M. 1996. What is information warfare? Washington, D.C.: National Defense University Press.
Perry, D. 2006. ‘Repugnant Philosophy’: Ethics, espionage, and covert action. In Ethics of spying: A reader for the intelligence professional, ed. J Goldman. Lanham: Scarecrow Press.
Schmitt, M.N. 1999. The principle of discrimination in 21st century warfare. SSRN Scholarly Paper ID 1600631. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1600631.
Schwartau, W. 1994. Information warfare: Chaos on the electronic superhighway. 1st ed. New York/Emeryville: Thunder’s Mouth Press /Distributed by Publishers Group West.
Shulman, M. R. 1999. Discrimination in the laws of information warfare. SSRN Scholarly Paper ID 1287181. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1287181
Taddeo, M., and A. Vaccaro. 2011. Analyzing peer-to-peer technology using information ethics. The Information Society 27(2): 105–112. doi:10.1080/01972243.2011.548698.
Toffler, A., and A. Toffler. 1997. Foreword: The new intangibles. In In Athena’s camp preparing for conflict in the information age, ed. Arquilla John and David F. Ronfeld. Santa Monica: Rand.
Turilli, M., A. Vaccaro, and M. Taddeo. 2011. Internet neutrality: Ethical issues in the internet environment. Philosophy & Technology 25(2): 133–151. doi:10.1007/s13347-011-0039-2.
Waltz, E. 1998. Information warfare: Principles and operations. Boston: Artech House.
Walzer, M. 2006. Just and unjust wars: A moral argument with historical illustrations, 4th ed. New York: Basic Books.
Withman, J. 2013. Is just war theory obsolete?”. In Routledge handbook of ethics and war: Just war theory in the 21st century, ed. Allhoff Fritz, Nicholas G. Evans, and Henschke Adam, 23–34. New York: Routledge.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Taddeo, M. (2017). Just Information Warfare. In: Taddeo, M., Glorioso, L. (eds) Ethics and Policies for Cyber Operations. Philosophical Studies Series, vol 124. Springer, Cham. https://doi.org/10.1007/978-3-319-45300-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-45300-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45299-9
Online ISBN: 978-3-319-45300-2
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)