Skip to main content

Just Information Warfare

  • Chapter
  • First Online:
Ethics and Policies for Cyber Operations

Part of the book series: Philosophical Studies Series ((PSSP,volume 124))

Abstract

In this chapter I propose an ethical analysis of information warfare, the warfare waged in the cyber domain. The goal is twofold, filling the theoretical vacuum surrounding this phenomenon and providing the conceptual grounding for the definition of new ethical regulations for information warfare. I argue that Just War Theory is a necessary but not sufficient instrument for considering the ethical implications of information warfare and that a suitable ethical analysis of this kind of warfare is developed when Just War Theory is merged with Information Ethics. In the initial part of the chapter, I describe information warfare and its main features and highlight the problems that arise when Just War Theory is endorsed as a means of addressing ethical problems engendered by this kind of warfare. In the final part, I introduce the main aspects of Information Ethics and define three principles for a just information warfare resulting from the integration of Just War Theory and Information Ethics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    For an analysis of revolution in military affairs considering both the history of such revolutions and the effects of the development of the most recent technologies on warfare see (Benbow 2004; Blackmore 2011).

  2. 2.

    http://www.bbc.co.uk/news/technology-11693214 http://news.bbc.co.uk/2/hi/europe/6665145.stm

  3. 3.

    http://www.cbsnews.com/stories/2010/11/29/world/main7100197.shtml

  4. 4.

    For an annotated time line of cyber attacks see NATO’s website http://www.nato.int/docu/review/2013/Cyber/timeline/EN/index.htm

  5. 5.

    This is an autonomous weapon system designed to detect and destroy radar emitters http://www.israeli-weapons.com/weapons/aircraft/uav/harpy/harpy.html

  6. 6.

    This is a UK drone which can autonomously search, identify and locate enemies although it should be stressed that it can only engage with a target upon the authorization of mission command http://en.wikipedia.org/wiki/BAE_Systems_Taranis

  7. 7.

    For more in details analysis of LoA see (Floridi 2008).

  8. 8.

    The USA only spent $400 million in developing technologies for cyber conflicts: http://www.wired.com/dangerroom/2010/05/cyberwar-cassandras-get-400-million-in-conflict-cash/

    The UK devoted £650 million to the same purpose: http://www.theinquirer.net/inquirer/news/1896098/british-military-spend-gbp650-million-cyber-warfare

  9. 9.

    Note that MQ-1 Predators and EADS Barracuda, and the Northrop Grumman X-47B are Unmanned Combat Aerial Vehicles used for combat actions and they are different from Unmanned Air Vehicles, like for example Northrop Grumman MQ-8 Fire Scout, which are used for patrolling and recognition purposes only.

  10. 10.

    http://www.nytimes.com/2013/11/15/us/coast-to-coast-simulating-onslaught-against-power-grid.html

  11. 11.

    The need to define concepts such as those of harm, target and violence is stressed both by scholar who argue in favor of the ontological difference of the cyber warfare (Dipert 2013) and exploit this point to claim that JWT is not an adequate framework to address IW and by those who actually maintain that JWT provides sufficient element to address the case of IW LUCAS.

  12. 12.

    See (Withman 2013) for an analysis of validity of JWT with respect to contemporary violent warfare.

  13. 13.

    It is worthwhile noticing that the problem engendered by the application of the principle of last resort to the soft-cases of IW may also be addressed by stressing that these cases do not fall within the scope of JWT as they may be considered cases of espionage rather than cases of war, and as such they do not represent a ‘first strike’ and the principle of last resort should not be applied to them. One consequence of this approach is that JWT would address war scenarios by focusing on traditional cases of warfare, such as physical attacks, and on the deployment of robotic weapons, disregarding the use of cyber attacks. This would be quite a problematic consequence because, despite the academic distinction between IW and traditional warfare, the two phenomena are actually not so distinct in reality. Robotic weapons fight on the battlefield side by side with human soldiers, and military strategies comprise both physical and cyber attacks. By disregarding cyber attacks, JWT would be able to address only partially contemporary warfare, while it should take into consideration the whole range of phenomena related to war waging in order to address the ethical issues posed by it (for a more in depth analysis of this aspect see (reference removed for blind review)).

  14. 14.

    “ICRC Databases on International Humanitarian Law”

  15. 15.

    On this point see also (Dipert 2010, p. 400).

  16. 16.

    The reader may recall the informational LoA mentioned in Sect. 5.2. Information Ethics endorses an informational LoA, as such it focuses on the informational nature as a common ground of all existing things.

  17. 17.

    For more details on the information-based ontology see (Floridi 2002).The reader interested in the debate on the Informational ontology and the principles of Information Ethics may whish to see (Floridi 2007).

References

  • Abiola, A., J. Munoz, and W. Buchanan. 2004. Analysis and detection of cruising computer viruses. In In: Proceedings of 3rd EIWC.

    Google Scholar 

  • Arquilla, J. 1998. Can information warfare ever be just? Ethics and Information Technology 1(3): 203–212.

    Article  Google Scholar 

  • Arquilla, J. 2013. Twenty years of cyberwar. Journal of Military Ethics 12(1): 80–87. doi:10.1080/15027570.2013.782632.

    Article  Google Scholar 

  • Arquilla, J., and D.F. Ronfeldt (eds.). 1997. In Athena’s camp: Preparing for conflict in the information age. Santa Monica: Rand.

    Google Scholar 

  • Asaro, P. 2008. How just could a robot war be? In Current issues in computing and philosophy, ed. P. Brey, A. Briggle, and K. Waelbers, 50–64. Amsterdam: IOS Press.

    Google Scholar 

  • Barrett, E.T. 2013. Warfare in a new domain: The ethics of military cyber-operations. Journal of Military Ethics 12(1): 4–17. doi:10.1080/15027570.2013.782633.

    Article  Google Scholar 

  • Benbow, T. 2004. The magic bullet?: Understanding the “Revolution in Military Affairs”. London: Brassey’s.

    Google Scholar 

  • Blackmore, T. 2011. War X. Toronto: University of Toronto Press.

    Google Scholar 

  • Bok, S. 1999. Lying: Moral choice in public and private life. 2nd Vintage Books ed. New York: Vintage Books.

    Google Scholar 

  • Bowden, M. 2011. Worm: The first digital world war. New York: Atlantic Monthly Press.

    Google Scholar 

  • Brenner, J. 2011. America the vulnerable: New technology and the next threat to national security. New York: Penguin Press.

    Google Scholar 

  • Clarke, R.A. 2012. Cyber war: The next threat to national security and what to do about it. 1st Ecco pbk. edn. New York: Ecco.

    Google Scholar 

  • Denning, D. 2007. The ethics of cyber conflict. In Information and computer ethics. Hoboken: Wiley.

    Google Scholar 

  • Dipert, R. 2010. The ethics of cyberwarfare. Journal of Military Ethics 9(4): 384–410.

    Article  Google Scholar 

  • Dipert, R. 2013. The essential features of an ontology for cyberwarfare. In Conflict and cooperation in cyberspace, ed. Panayotis Yannakogeorgos and Adam Lowther, 35–48. Boca Raton: Taylor & Francis. http://www.crcnetbase.com/doi/abs/10.1201/b15253-7.

  • Floridi, L. 2002. On the intrinsic value of information objects and the infosphere. Ethics and Information Technology 4(4): 287–304.

    Article  Google Scholar 

  • Floridi, L. 2006. Information ethics, its nature and scope. SIGCAS Comput. Soc. 36(3): 21–36. doi:10.1145/1195716.1195719.

  • Floridi, L. 2007. Understanding information ethics. APA Newsletter on Philosophy and Computers 7(1): 3–12.

    Google Scholar 

  • Floridi, L. 2008. The method of levels of abstraction. Minds and Machines 18(3):303–329. doi:10.1007/s11023-008-9113-7.

  • Floridi, L. 2013. Ethics of information. [S.l.]: Oxford University Press.

    Google Scholar 

  • Floridi, L. 2014. The fourth revolution, how the infosphere is reshaping human reality. Oxford: Oxford University Press.

    Google Scholar 

  • Floridi, L., and J. Sanders. 2001. Artificial evil and the foundation of computer ethics. Ethics and Information Technology 3(1): 55–66.

    Google Scholar 

  • Floridi, L., and J.W. Sanders. 2004. On the morality of artificial agents. Minds and Machines 14(3): 349–379. doi:10.1023/B:MIND.0000035461.63578.9d.

    Article  Google Scholar 

  • Gelven, M. 1994. War and existence: A philosophical inquiry. University Park: Pennsylvania State University Press.

    Google Scholar 

  • Hepburn, R.W. 1984. “Wonder” and other essays: Eight studies in aesthetics and neighbouring fields. Edinburgh: University Press.

    Google Scholar 

  • “ICRC Databases on International Humanitarian Law.” 00:00:00.0. http://www.icrc.org/ihl/INTRO/470.

  • Libicki, M. 1996. What is information warfare? Washington, D.C.: National Defense University Press.

    Google Scholar 

  • Perry, D. 2006. ‘Repugnant Philosophy’: Ethics, espionage, and covert action. In Ethics of spying: A reader for the intelligence professional, ed. J Goldman. Lanham: Scarecrow Press.

    Google Scholar 

  • Schmitt, M.N. 1999. The principle of discrimination in 21st century warfare. SSRN Scholarly Paper ID 1600631. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1600631.

  • Schwartau, W. 1994. Information warfare: Chaos on the electronic superhighway. 1st ed. New York/Emeryville: Thunder’s Mouth Press /Distributed by Publishers Group West.

    Google Scholar 

  • Shulman, M. R. 1999. Discrimination in the laws of information warfare. SSRN Scholarly Paper ID 1287181. Rochester: Social Science Research Network. http://papers.ssrn.com/abstract=1287181

  • Taddeo, M., and A. Vaccaro. 2011. Analyzing peer-to-peer technology using information ethics. The Information Society 27(2): 105–112. doi:10.1080/01972243.2011.548698.

    Article  Google Scholar 

  • Toffler, A., and A. Toffler. 1997. Foreword: The new intangibles. In In Athena’s camp preparing for conflict in the information age, ed. Arquilla John and David F. Ronfeld. Santa Monica: Rand.

    Google Scholar 

  • Turilli, M., A. Vaccaro, and M. Taddeo. 2011. Internet neutrality: Ethical issues in the internet environment. Philosophy & Technology 25(2): 133–151. doi:10.1007/s13347-011-0039-2.

    Article  Google Scholar 

  • Waltz, E. 1998. Information warfare: Principles and operations. Boston: Artech House.

    Google Scholar 

  • Walzer, M. 2006. Just and unjust wars: A moral argument with historical illustrations, 4th ed. New York: Basic Books.

    Google Scholar 

  • Withman, J. 2013. Is just war theory obsolete?”. In Routledge handbook of ethics and war: Just war theory in the 21st century, ed. Allhoff Fritz, Nicholas G. Evans, and Henschke Adam, 23–34. New York: Routledge.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariarosaria Taddeo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Taddeo, M. (2017). Just Information Warfare. In: Taddeo, M., Glorioso, L. (eds) Ethics and Policies for Cyber Operations. Philosophical Studies Series, vol 124. Springer, Cham. https://doi.org/10.1007/978-3-319-45300-2_5

Download citation

Publish with us

Policies and ethics