{"id":443,"date":"2025-08-08T02:42:31","date_gmt":"2025-08-08T02:42:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/damianrichardson\/?p=443"},"modified":"2025-08-08T02:42:31","modified_gmt":"2025-08-08T02:42:31","slug":"cyberconflict","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/damianrichardson\/2025\/08\/08\/cyberconflict\/","title":{"rendered":"Cyberconflict"},"content":{"rendered":"\n<p><strong>Introduction<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The cyberwar between Israel and Iran has turned into a persistent, covert conflict marked by the rising digital strikes on critical civilian infrastructure. Events include the October 2021 attack that turned off Iran\u2019s subsidized fuel distribution system, forcing motorists to wait in hours-long lines at gas stations. Messages referencing Supreme Leader Ayatollah Khamenei\u2019s office were left on hacked terminals, suggesting deliberate symbolic targeting. Iran\u2019s swift response, which included attacks on Israeli hospitals, railways, and financial institutions, further made the lines unclear between military and civilian domains. These attacks on both ends have raised global alarm over the potential for cyberwarfare to inflict widespread harm without traditional kinetic violence.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; While neither country has formally claimed responsibility for many of these attacks, the sophistication and impact imply state-level orchestration. With the lack of international consensus on the rules of cyber engagement, ethical analysis becomes very important to understanding whether these actions meet the criteria of justified warfare or violate emerging norms of digital conduct. This paper evaluates the legitimacy of this cyberwar using Michael Boylan\u2019s theory of just war and Mariarosaria Taddeo\u2019s integration of Just War Theory with Information Ethics. In this Case Analysis, I will argue that Taddeo\u2019s framework shows us that the cyberwar between Israel and Iran is not just, because both nations fail to preserve the well-being of the Infosphere and violate ethical constraints on proportionality, discrimination, and moral authority.<\/p>\n\n\n\n<p><strong>Boylan\u2019s Ethical Framework and Application to the Case<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Michael Boylan, in <em>Can There Be a Just Cyber War?<\/em>, raises deep concerns about applying Just War Theory (JWT) to cyberspace, where conventional ethical boundaries collapse. He critiques the applicability of traditional jus ad bellum and jus in bello principles to cyberwarfare, mainly because of the ambiguous nature of attribution, authority, proportionality, and combatant distinction in the digital realm. Boylan questions whether cyberwar can ever be \u201cjust\u201d in the conventional sense, given how cyberattacks often do not have the physical violence, yet they can mess up economies, endanger lives, and undermine democratic institutions.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; At the heart of Boylan\u2019s argument is the difficulty in assigning ethical responsibility when the origin and intent of a cyberattack remain unclear. The principle of legitimate authority, for instance, is strained when attacks are carried out covertly, often through third parties or state-sponsored hackers without formal declarations of war. Moreover, discrimination, a cornerstone of jus in bello, becomes almost impossible to uphold. Cyberattacks typically target systems used by both civilians and military actors, such as hospitals, railways, or fuel stations\u2014making it extremely difficult to avoid harming non-combatants.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Applying Boylan\u2019s critique to the Israel-Iran cyberwar, both sides appear to fall short of conduct. Israel\u2019s alleged cyberattacks on Iran\u2019s fuel infrastructure and railway systems resulted in societal disruption. Although these were not physically violent, they inflicted economic harm and created panic. Iran\u2019s attacks on Israeli hospitals like Hillel Yaffe endangered lives directly by impairing emergency services, a clear violation of non-combatant immunity. Boylan would more than likely see both sides as engaging in ethically unjustifiable behavior due to the indiscriminate nature of these attacks.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Another central concept from Boylan is proportionality. In kinetic warfare, this principle requires that the harm caused by military action not exceed the anticipated military advantage. In cyberwar, however, the balance is skewed, effects are hard to predict, and collateral damage can be significant, especially when critical infrastructure is involved. The Iranian attack on a civilian hospital likely outweighed any strategic advantage, particularly given its potential to result in loss of life. Likewise Israels interference with fuel systems, especially near the anniversary of past protests, could be seen as an attempt to destabilize civil order, possibly triggering wider unrest.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Boylan also warns that the psychological and social effects of cyberwarfare, including disorientation, fear, and distrust in institutions, may render it more dangerous than traditional combat in some contexts. The compromised street signs in Tehran reading \u201cKhamenei, where is our gasoline?\u201d illustrate how cyberwar can be used to undermine political legitimacy and create a sense of pervasive vulnerability. These symbolic acts can destabilize governments without firing a shot, but their ethical cost, particularly when they inflame civil tensions, must not be overlooked.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; From Boylan\u2019s perspective, neither Israel nor Iran adheres to the ethical norms of JWT in their cyber conduct. The absence of clear attribution, the likelihood of disproportionate harm, and the routine violation of civilian immunity suggest that the digital conflict between the two nations cannot be ethically justified under traditional frameworks. For Boylan, unless states find ways to ensure responsible authority, minimize collateral harm, and maintain transparency and accountability, cyberwarfare cannot be deemed morally legitimate.<\/p>\n\n\n\n<p><strong>Taddeo\u2019s Ethical Framework and Application to the Case<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Mariarosaria Taddeo, in <em>An Analysis for a Just Cyber Warfare<\/em>, builds a more nuanced ethical framework by integrating Just War Theory with Information Ethics, a macro-ethical theory developed by Luciano Floridi. Taddeo argues that traditional JWT alone is insufficient to evaluate cyberwar due to the unique nature of digital conflict. She proposes a new triad of principles for Just Cyber Warfare (JCW), rooted in the preservation of the Infosphere, the integrated realm of digital and physical informational systems. The principles are: CW ought to be waged only against those entities that endanger or disrupt the well-being of the Infosphere, CW ought to be waged only to preserve the Infosphere, and CW must not be waged to promote the Infosphere\u2019s well-being.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Taddeo\u2019s concept of transversality, the way cyberwar blurs conventional categories such as violent\/non-violent, civil\/military, physical\/digital, and human\/artificial, is relevant to the Israel-Iran conflict. For example, Iran\u2019s alleged attack on Hillel Yaffe Hospital involved non-physical, artificial agents (malware) targeting a civilian infrastructur yet the consequences were tangible and life-threatening. Similarly, Israel\u2019s attack on Iran\u2019s fuel system used software to disrupt access to a critical physical commodity, fuel, which had direct implications for public safety and order.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Using Taddeo\u2019s ethical lens, both sides once again appear to violate the moral criteria for Just Cyber Warfare. Iran\u2019s attacks on civilian infrastructure like hospitals and the banking sector increase informational entropy, a degradation of the Infosphere\u2019s integrity. By compromising systems critical to health, safety, and economic stability, these actions diminish the flourishing of informational entities (both people and systems) and thus violate the principle of preserving the Infosphere.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Israel\u2019s actions also raise ethical red flags. Targeting Irans fuel subsidy system and railways, particularly around politically sensitive anniversaries, can be seen not as preserving the Infosphere, but as destabilizing it for political leverage. Taddeo\u2019s third principle explicitly prohibits such use of CW to promote geopolitical agendas. Additionally, by disrupting everyday services used by civilians, Israel\u2019s attacks contribute to the degradation of trust in public systems and increase entropy.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Taddeo\u2019s framework helps evaluate cyberwar\u2019s non-kinetic but deeply disruptive nature. Unlike Boylan, who stressed classical ethical structures, Taddeo offers a constructive alternative: ethical cyberwarfare is possible, but it requires a shift in our moral ontology from prioritizing territorial integrity and human lives alone to safeguarding informational integrity across domains. Their ontocentric and patient focused ethics recognize not just humans but all informational entities as moral patients, broadening the ethical scope to include databases, networks, and social systems.<\/p>\n\n\n\n<p><strong>Integrating Confucianism<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; A Confucian ethical lens deepens Taddeo\u2019s analysis by emphasizing role-based morality. In Confucian thought, ethical action arises not from strict rules but from properly filling one\u2019s role in society, based on relational responsibilities. States, like individuals, have roles to fulfill\u2014leaders must act as responsible stewards, protectors of peace, and nurturers of harmony. By compromising critical civilian infrastructure and inflaming tensions, both Israel and Iran abandon these moral roles. Confucianism teaches that fulfilling a role includes not only acting appropriately but also helping others fulfill their roles. As such, Israel and Iran should seek mutual de-escalation and reflection, not reciprocal harm. Their actions contradict the <em>dao<\/em>, or proper path, of statehood. Had they respected these relational ethics, both nations would have protected civilians and prioritized peace over political point-scoring.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; When applied rigorously, Taddeos framework would likely deem both Israeli and Iranian cyber actions unjust. The reciprocal nature of their attacks, intended not to restore the Infosphere but to inflict disruption, violates all three principles of Just Cyber Warfare. Moreover, neither state appears to differentiate between licit and non-licit targets, as required by her reinterpretation of the JWT principle of discrimination. Civilian systems are at stake in state-level feuds, further corrupting the Infosphere and eroding ethical responsibility.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Taddeo\u2019s model does more than highlight failures; it provides a roadmap for ethical conduct in cyber conflict. Both nations\u2019 actions fail her standards, not simply because they cause harm, but because they fail to target only malicious agents, to act defensively, and to minimize informational damage. Rather than enhancing the digital environment, their warfare diminishes it, rendering their actions ethically indefensible.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The Israel-Iran cyberwar shows one of the most high profile cases of cyber conflict, showing the complexity and destructiveness of digital hostilities. Through the eyes of Michael Boylan\u2019s ethical theory, we see that both nations fail to uphold the principles of legitimate authority, proportionality, and discrimination, making their cyberwarfare ethically unjustifiable. Boylans framework highlights the practical and epistemic limits of traditional JWT in cyberspace, particularly regarding attribution and the targeting of civilians.<\/p>\n\n\n\n<p>Mariarosaria Taddeo\u2019s approach offers a more flexible yet demanding ethical tool by merging Just War Theory with Information Ethics. Her emphasis on preserving the Infosphere, minimizing entropy, and restricting warfare to defensive actions provides a forward-thinking framework suitable for evaluating cyber conflict. Under her criteria, neither Israel nor Iran behaves ethically, as both disrupt civilian systems, escalate tensions, and fail to respect the rights of informational entities.<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; One might argue that cyberwarfare, unlike kinetic war, often avoids direct fatalities and could be considered a more humane alternative. However, as shown, the long-term reprocussions of economic destabilization, loss of public trust, and compromised healthcare can be just as devastating. Others might argue that retaliation is necessary to uphold deterrence. However, ethical warfare must go beyond strategy and consider justice and the flourishing of global informational ecosystems.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <\/strong>From a Confucian standpoint, ethical leadership requires fulfilling the roles we inhabit, whether as individuals or nations. That includes acting with moral clarity, helping others do the same, and sustaining relationships that prioritize collective well-being. Israel and Iran, by targeting civilians and escalating digital hostilities, violate their roles as responsible regional actors. Confucianism would call not for domination, but for virtuous conduct\u2014helping one\u2019s adversary return to the path (<em>dao<\/em>) rather than pushing them further off course. The Israel-Iran cyber conflict shows the urgent need for new ethical frameworks and international norms to govern digital hostilities. Taddeo\u2019s model provides a compelling foundation, and Confucianism complements it by reminding us that the just path is not walked alone but together, in relationship and reflection.<\/p>\n<a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-facebook nolightbox\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Facebook\" href=\"https:\/\/www.facebook.com\/facebook\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Follow us on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-twitter nolightbox\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Follow us on Twitter\" href=\"https:\/\/twitter.com\/twitter\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Follow us on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-linkedin nolightbox\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Find us on Linkedin\" href=\"https:\/\/www.linkedin.com\/in\/yourid\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Find us on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/linkedin.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-instagram nolightbox\" data-provider=\"instagram\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our instagram feed\" href=\"https:\/\/instagram.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"instagram\" title=\"Check out our instagram feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/instagram.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-flickr nolightbox\" data-provider=\"flickr\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our flickr feed\" href=\"https:\/\/www.flickr.com\/photos\/myusername\/\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"flickr\" title=\"Check out our flickr feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/flickr.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-foursquare nolightbox\" data-provider=\"foursquare\" target=\"_blank\" rel=\"nofollow\" title=\"Check out our foursquare feed\" href=\"https:\/\/foursquare.com\/myusername\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"foursquare\" title=\"Check out our foursquare feed\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/foursquare.png\" \/><\/a><a class=\"synved-social-button synved-social-button-follow synved-social-size-48 synved-social-resolution-single synved-social-provider-mail nolightbox\" data-provider=\"mail\" rel=\"nofollow\" title=\"Contact Us\" href=\"mailto:mail@example.com?subject=Contact%20Request\" style=\"font-size: 0px;width:48px;height:48px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"mail\" title=\"Contact Us\" class=\"synved-share-image synved-social-image synved-social-image-follow\" width=\"48\" height=\"48\" style=\"display: inline;width:48px;height:48px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/96x96\/mail.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Introduction &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The cyberwar between Israel and Iran has turned into a persistent, covert conflict marked by the rising digital strikes on critical civilian infrastructure. Events include the October 2021 attack that turned off Iran\u2019s subsidized fuel distribution system, forcing&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/damianrichardson\/2025\/08\/08\/cyberconflict\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26274,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/posts\/443"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/users\/26274"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/comments?post=443"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/posts\/443\/revisions"}],"predecessor-version":[{"id":444,"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/posts\/443\/revisions\/444"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/media?parent=443"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/categories?post=443"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/damianrichardson\/wp-json\/wp\/v2\/tags?post=443"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}