{"id":496,"date":"2025-04-18T11:59:21","date_gmt":"2025-04-18T11:59:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/dacyber\/?page_id=496"},"modified":"2025-05-01T15:18:31","modified_gmt":"2025-05-01T15:18:31","slug":"page-11","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/dacyber\/law-ethics\/phil-355e\/page-11\/","title":{"rendered":"Case Analysis 6"},"content":{"rendered":"\n<p class=\"has-text-align-center\"><strong>Cyberwar &#8211; Fair Fight or Digital Fallout?<\/strong><\/p>\n\n\n\n<p>The rules of war have fundamentally changed with cyber warfare. It is no longer just about tanks, soldiers, or bombs. It can begin with just a few lines of code. Paul Veeneman\u2019s article Digital Battlegrounds: Evolving Hybrid Kinetic Warfare is a great example of how cyber operations can be used alongside traditional military operations. Rather than one form of action replacing another, we are seeing a hybrid form of actions directly blended with traditional military operations. While the method of cyberattacks may not leave physical buildings in ruins or take human life directly, they can disrupt a power grid, affect lines of communication, and even intrude or influence the decision-making of a nation-state. The civilian-military line is blurred when it comes to cyberattacks, and this is where ethical issues arose. Michael Boylan introduces Just war Theory and questions whether cyber actions, even the \u201cclean\u201d or bloodless forms can be truly just. Mariarosario Taddeo elaborates even further with her thoughts that we cannot adhere strictly to traditional rules of war any longer. She introduces the idea of thinking about the entire digital place known as the \u201cinfosphere\u201d and considering harm differently\u2013not only from a perspective of physical destruction. This is where contractarianism fits in. It relates to fairness and whether people would agree to certain actions if they did not know what side they would be on. In this analysis, I will argue that contractarianism illustrates that these cyber actions could not be part of a just war, because they break the kind of fair rules no one would honestly agree to if they were thinking about everyone\u2013not just their own side.<\/p>\n\n\n\n<p><strong>Analyzing Using Boylan\u2019s Perspective.<\/strong><\/p>\n\n\n\n<p>Michael Boylan addresses significant concerns related to cyberwar and justice. He bases his argument on Just War Theory, which states that war is only just if there are conditions that are met such as: there must be a real reason to fight, it must be of last resort, and it must avoid harming civilians. It becomes extremely complicated to determine these criteria when it comes to cyberwar. There may not be bombs or blood, but the rationale for violence and harm may remain similar, if not more excessive.<br>Central to Boylan\u2019s argument is the idea of \u201cpositive good.\u201d Moral action is not simply to not do harm, rather, one must demonstrate that the act they are taking is morally meaningful and beneficial. So, if a state decides to launch a cyberattack, the best scenario would be that the objective of the state is not to win, but rather to stop real harm, and restore some positive good. The problem lies in the reality that much of what we consider cyberattacks do not fit that mold.<br>The accounts taken from Veeneman\u2019s article, for example, clearly illustrate cyberattacks being used to weaken enemy systems, jam communication networks, or to facilitate a physical attack. There are usually no public notices to those who may be affected at the point of impact, which in many cases raises the general level of insecurity and uncertainty. In fact, the lines between military and civilian targets are not clearly defined. Power grids, banks, and hospitals are all at risk of these cyberattacks and are considered collateral damage. From Boylan\u2019s viewpoint, cyberattacks do not fit the criteria of \u201cpositive good\u201d because they are not defensive actions to prevent harm to individuals, rather power is simply leveraged to create an offensive weapon to use over enemy interests.<br>Now let\u2019s think about this through the lens of contractarianism. This approach says that we should only accept rules that everyone would agree to\u2013especially if they did not know their role ahead of time. Picture yourself behind a \u201cveil of ignorance,\u201d with no clue if you will end up a soldier, a civilian, or someone caught in the middle. Would you agree that someone can deactivate your energy, or wipe your data in an instant without notice? Most people would not, as that would be too risky and unfair.<br>This definitely relates to another of Boylan\u2019s concerns: proportionality. According to him, any military action must be proportionate. One cannot use excessive force simply because they possess the means. For example, a cyberattack that results in a city-wide blackout, or knocks out emergency systems, does not necessarily kill anyone outright, but it is still a threat to life. Disrupting a city can happen quickly with cyberwar. If one is following the tenets of fairness\u2013as contractarianism asks\u2013then the chances are that they are not going to accept that level of threat or injustice, unless they absolutely have to.<br>Accountability is another concern. In a traditional conflict, the blame for an attack can be assigned to a direct individual or group. However, cyberwar is typically anonymous. This makes it almost impossible to hold someone to account and seek justice afterward. Contractarianism requires a fair social contract, but this does not work under bad faith when breaches such cyber occurrences have no repercussions for bad actors. If no one can be held responsible, then in essence the agreement falls apart, which leads to disastrous consequences.<br>Boylan also addresses the concern of noncombatant immunity. Just war theory states that civilians should be excluded from direct military engagement. However, cyberwar makes this distinction blurrier. Civilians may use the same digital infrastructure as the military, which places them in a deadly choke point. Thus, deactivating a communication system, for example, means that civilians and military personnel are both subject to the fallout. This breaches both Boylan\u2019s ethical consideration and the fairness idea in contractarianism, since no one would agree to be part of a system where they could become a casualty without even being involved.<br>Ultimately, both Boylan\u2019s viewpoint and the contractarianism ethics converge on the same conclusion. These cyber actions\u2013no matter how strategic they might be\u2013fail the fairness test; they risk harm to people who did not choose to be involved, and they do not provide moral good in return. Therefore, while the broader war might be just, this does not make cyber actions just.<\/p>\n\n\n\n<p><strong>Analyzing Using Taddeo\u2019s Perspective.<\/strong><\/p>\n\n\n\n<p>Mariarosario Taddeo takes a different route than Boylan and agrees that Just War Theory still applies; however, she says that it is not enough for cyberwar. The reason is that the rules involved in traditional war are typically based on notions of violence, bloodshed, and physical destruction. In contrast, cyberwar may not appear to be that way. It is quieter, sneakier, and often goes unnoticed. So, continuing to use old rules does not capture what is actually happening. Taddeo introduces the ethical approach termed Information Ethics, that is concerned with how a cyber action would affect the entire digital environment\u2013which she calls the \u201cInfosphere.\u201d The infosphere includes people, data, networks, and everything digital. The idea is that harm does not need to be physical to be serious. Therefore, harming a hospital\u2019s computer system or tampering with emergency response networks causes serious harm even if no one sees it happen.<br>One distinguishing feature Taddeo talks about is \u201ctransversality.\u201d The actions involved in cyberwar span a multitude of lines at once. They can be violent or non-violent, involve soldiers or civilians, and take place in both physical and non-physical spaces. That makes it hard to define what counts as a legitimate target or who is even participating. Someone may commit a cyberattack while sitting at home and never make physical contact with a weapon; that blurs the line between combatants and non-combatants. In her view, as a result, we need a new way to judge cyber actions. She elaborates three core ethical principles for a just cyberwar. First, cyberwar should only target entities that cause real harm to the infosphere. Second, the goal should be to stop that harm, not to gain power or control. Third, cyberwar should never be used just to make the system better.<br>When those principles are examined and compared to the actions discussed in Veeneman\u2019s article, it becomes obvious that there is an issue. They are used to gaining an advantage before a physical conflict begins. However, they often do not fulfill the requirement of stopping a harmful threat. Sometimes, they create harm themselves; they can shut down communications, confuse civilians, or target digital resources, for example. All of which may achieve a military objective but create turmoil for the civilian population.<br>Taddeo\u2019s second principle states that a war should only be reactive\u2013not a way to improve or reshape things. Rather, many cyber actions are specifically designed to do exactly the opposite: they are intended to change the battlefield or weaken a system before it becomes a significant threat. This is not defending oneself against threat\u2013it is manipulating tactics that violate the rule.<br>Putting this into contractarian terms helps clear things up. Behind the \u201cveil of ignorance,\u201d you would never consent to a rule that allows people to interfere with your digital life with no notice or without any means to defend yourself. You might be a civilian relying on electricity, medical records, or access to emergency alerts; if those systems get hit in a cyberattack, you are in danger. A fair contract would account for a person in your situation\u2013not leave them exposed.<br>Contractarianism also says that any rule should be the one that one would accept even if they ended up being the worst off. In cyberwar, the worst off are often civilian populations who have absolutely no clue or say in what is going on. Even if they are not directly part of the combat, their lives are affected, and no one would agree to rules that allow that kind of risk, especially when there is no way to fight back or prepare for it. Taddeo\u2019s ethics match this idea. Her focus on the infosphere includes everyone, not just military targets, which aligns with the contractarianism view that posits that everyone\u2019s interest should count equally.<br>So, even though cyberwar might look less violent, it still causes serious harm\u2013not only that, it also often creates harm in an unfair, and unpredictable way. Taddeo\u2019s analysis, supported by contractarianism, shows that many of cyber actions are not just; they do not meet fair standards, and they risk hurting people who never chose to be involved.<\/p>\n\n\n\n<p><strong>Conclusion.<\/strong><\/p>\n\n\n\n<p>After considering everything, it is evident that the cyber actions detailed in Veeneman\u2019s article just do not pass the ethical test. Both Boylan and Taddeo illustrate how cyberwar poses severe challenges for traditional notions of justice. Boylan leans into Just War Theory and points out how these actions fail to protect civilians, achieve genuine goodness, or keep things proportional. Taddeo digs into how cyberwar messes with the boundaries of war altogether and raises the fact that we need a better way to measure harm, from the perspective of Information Ethics. Combining those ideas with contractarianism, it becomes even more obvious\u2013these actions are not something anyone would agree to if they did not know their role in the conflict. Some people may argue that cyberwar is better than conventional war because it can minimize bloodshed and destruction to physical systems. That is a valid point. But ultimately, harm is more than broken bones or demolished buildings. Disrupting someone\u2019s life digitally can be just as damaging. Plus, it is much easier to cause collateral damage when civilians are connected to the same system as the military. There is no perfect solution here. Cyberwars just complicate everything. Still, if we are aiming for decisions that feel fair to everyone\u2013regardless of which side they are on\u2013we have got to stick to rules that protect people from harm they never signed up for. It is not easy, but that is something worth careful consideration.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyberwar &#8211; Fair Fight or Digital Fallout? The rules of war have fundamentally changed with cyber warfare. It is no longer just about tanks, soldiers, or bombs. It can begin with just a few lines of code. Paul Veeneman\u2019s article Digital Battlegrounds: Evolving Hybrid Kinetic Warfare is a great example of how cyber operations can&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/dacyber\/law-ethics\/phil-355e\/page-11\/\">Read More<\/a><\/div>\n","protected":false},"author":28267,"featured_media":0,"parent":207,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/pages\/496"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/users\/28267"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/comments?post=496"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/pages\/496\/revisions"}],"predecessor-version":[{"id":508,"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/pages\/496\/revisions\/508"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/pages\/207"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/dacyber\/wp-json\/wp\/v2\/media?parent=496"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}