Application of the Just War Theory in Cyberwarfare and Ethical Solutions to the Use of Cyber Weapons

Document Type : Original Article

Authors

1 Ph.D Student, at IT (Electronic Commerce), University of Qom, Qom, Iran.

2 Assistant Professor, Islamic Sciences and Culture Academy, Qom, Iran.

Abstract

Cyberspace has provided new possibilities for the exchange of information that can be considered a key element for the development of life. On the other hand, it has become a new weapon and a suitable platform for war. Some argue that one of the features of cyberwarfare is that it can be more ethical than traditional warfare because it causes less damage and the resulting damage is easily compensable. In recent years, due to the expansion of the use of cyber weapons, new and serious ethical issues have arisen in this area. The ethics of using cyber weapons and whether the theory of just war also applies to cyberwarfare is a serious question. In this article, in addition to examining the application of the just war theory in cyberwarfare, strategies for the ethical use of cyber weapons are addressed. Such solutions include: using the just war theory in accordance with cyber warfare, designing reversible attacks, designing and using controllable cyber weapons, training cyber army experts, non-arbitrary participation of civilians in cyberwarfare, mobilization of people, teaching ethical issues of cyberwarfare, and moral education from childhood. According to studies, the just war theory is necessary for cyberwarfare, but it is not enough, and governments and the international community should seek to establish ethical and legal principles specific to cyberwarfare.

Keywords


Article Title [Persian]

کاربرد نظریة جنگ عادلانه در جنگ سایبری و راهکارهای اخلاقی استفاده از سلاح‌های سایبری

Authors [Persian]

  • زینب آل بویه 1
  • علیرضا آل بویه 2
1 دانشجوی دکتری فناوری اطلاعات، دانشکده علوم انسانی، دانشگاه قم، قم، ایران.
2 استادیار گروه فلسفه اخلاق، پژوهشگاه علوم و فرهنگ اسلامی.قم، ایران.
Abstract [Persian]

فضای سایبری امکانات جدیدی را برای تبادل اطلاعات فراهم کرده است که می‌تواند به عنوان رکنی اصلی برای توسعة زندگی در نظر گرفته شود. از طرف دیگر، همین فضا به منزلة سلاحی جدید و بستری مناسب برای جنگ تبدیل شده است. برخی معتقدند یکی از ویژگی‌های جنگ سایبری این است که نسبت به جنگ‌های سنتی می‌تواند اخلاقی‌تر باشد؛ زیرا آسیب‌های کمتری ایجاد کرده و خسارت‌های ناشی از آن به راحتی قابل جبران است. در سال‌های اخیر به دلیل گسترش استفاده از سلاح‌های سایبری مسائل اخلاقی جدید و مهمی در این حوزه به وجود آمده است. اخلاقی بودن استفاده از سلاح‌های سایبری و اینکه آیا نظریة جنگ عادلانه در مورد جنگ سایبری نیز کاربرد دارد یا نه، یک  سؤال جدی است. در این مقاله علاوه بر بررسی کاربرد نظریة جنگ عادلانه در جنگ سایبری، به راهکارهای استفاده اخلاقی از سلاح‌های سایبری پرداخته می‌شود. راه‌کارها عبارتند از: استفاده از نظریة جنگ عادلانه متناسب با جنگ سایبری، طراحی حمله‌های برگشت‌پذیر، طراحی و استفاده از سلاح‌های سایبری قابل کنترل، تربیت نیروهای خبره ارتش سایبری، عدم شرکت خودسرانه غیرنظامیان در جنگ سایبری، تشکیل بسیج مردمی، آموزش مسائل اخلاقی جنگ سایبری و تربیت اخلاقی از کودکی. با توجه به بررسی‌های انجام شده، نظریة جنگ عادلانه برای جنگ سایبری لازم است، اما کافی نیست و دولت‌ها و جوامع بین‌المللی باید به دنبال تدوین اصول اخلاقی و قانونی مخصوص جنگ‌های سایبری باشند.

Keywords [Persian]

  • اخلاق فناوری اطلاعات
  • اخلاق جنگ
  • فضای سایبری
  • جنگ سایبری
  • جنگ عادلانه
Quran
2015, “Department of defense law of war manual”, United States. Department of Defense, Available at: https://www.defense.gov/Portals/1/Documents/DoD_Law_of_War_Manual-June_2015_Updated_May_2016.pdf. (Accessed on:, 6 Apr 2017/4/6).
Alebouyeh, Alireza. And Alebouyeh, Zeinab. (1394). Hacking and Intrusion into Computers Systems from an Ethical Perspective. Naqd va Nazar, The Quarterly Jornal of Philosophy & Theology. Vol. 20, No. 2: 104-128.
Australia. Department of the Prime Minister and Cabinet, (2013), “Strong and Secure: A Strategy for Australia’s National Security”. Available at:, yun.ir/sj1gs6, Canberra The Department of the Prime Minister and Cabinet. (Accessed on:, 7 May 2016/5/7).
Boylan, Michael., (2013)., “Can there be a Just Cyber War?”., Journal of applied ethics and philosophy , vol 5:, 10-17.
Clarke, Richard A., and Knake, Robert K.., (2012)., Cyber War The Next Threat to National Security and What to Do About It, New York: HarperCollins, Routledge.
Cohen-Almagor, Raphael., (2011)., “ Internet History”.,  International Journal of Technoethics. , 2(2), 45-64, USA. , IGI Publishing Hershey:. 2(2): 45-64.
Denning, Dorothy E.. and , Strawser, Bradley J..,  (2014)., “Moral Cyber Weapons.”, The Ethics of Information Warfare., Volume 14 of the series Law, Governance and Technology Series., springer: 85-103, springer.
Denning, Dorothy E.., (2008)., “The Ethics of Cyber Conflict. ”, in The Handbook of Information and Computer Ethics (eds K. E. Himma and H. T. Tavani)., John Wiley & Sons, Inc., Hoboken, NJ, USA.
Dipert, Randall., (2010)., “The Ethics of Cyberwarfare.”, Journal of Military Ethics., London, Routledge: Vol. 9, , 4, 384-410., London, Routledge.
Dorf, J.., and Johnson, M.. (2007). "Restoration Component of Business Continuity Planning.", in Tipton, H.., and Krause, M. (Eds.)., Information Security Management Handbook., Sixth Edition., CRC Press:, pp. 645-654.
Dower, Nigel.,( 2009)., The ethics of war and peace, Polity Press.
Estrella, Iceal Averroes E.., (2012).,  “On the Ethics of War.”, KRITIKE: An Online Journal of Philosophy., Vol. 6 Issue 1:, 67-84.
Evans, Nicholas. and, Ford, Shannon B.. and, Gastineau, Adam. and, Henschke, Adam. and, West, Levi., (2014), “Cybersecurity: Mapping the Ethical Terrain.”, National Security College Occasional Paper, Available at:  yun.ir/nndbz, (Accessed on:  4 May 2017/5/.4).
Fred Schreier., (2015).,  “On Cyberwarfare”.,  DCAF HORIZON 2015 WORKING PAPER No. 7, Available at:  http://docplayer.net/4159538-Dcaf-horizon-2015-working-paper-no-7-on-cyberwarfare-fred-schreier.html. , (Accessed on: 2 Aug 2017/8/2).
Green, Leslie C.., (1993)., The Contemporary Law of Armed Conflict, Canada, Manchester University Press.
 Hubert, Don. and Weiss, Thomas G. et al.., (2001)., The Responsibility to Protect: Supplementary Volume to the Report of the International Commission on Intervention and State Sovereignty, Canada, International Development Research Centre.
Imam Khomeini, Seyyed Ruhollah. (1390 ). Tahrir al-Wasilah. Vol. 1. Second edition, Al-Najaf Al-Ashraf: Matbaato Aladab.
Johnson, James Turner., (1981)., Just War Tradition and the Restraint of War: A Moral and Historical Inquiry., New Jersey., Princeton University Press.
Just war theory, routledge, cw.routledge.com/textbooks/alevelphilosophy/data/A2/Politcal/JustWarTheory.pdf
Knopová,  Martina.; and Knopová, Eva., (2014)., “The Third World War? In The Cyberspace. Cyber Warfare in the Middle East.”, Acta Informatica Pragensia. 3(1)., 2014, 23–32.
Lazar, Seth. (2020)., "War.", The Stanford Encyclopedia of Philosophy (Spring 2020 Edition), Edward N,. Zalta. (ed.), URL = <https://plato.stanford.edu/archives/spr2020/entries/war/>.
Lin, Patrick. and, Rowe,  Neil., aAnd Allhoff, Fritz., (2012).,  “Is It Possible to Wage a Just Cyberwar?”,. Available at: https://www.theatlantic.com/technology/archive/2012/06/is-it-possible-to-wage-a-just-cyberwar/258106/. (Accessed on: 7 Jun, 2017)./6/7.
 Lin, Patrick. and;  Allho, Fritz. and Rowe, Neil C.., (2012)., “War 2.0: Cyberweapons and Ethics.”, Communications of the ACM., New York, ACM: vol. 55, no. 3, 24-26, New York, ACM.
Lorents, Peeter. and, Ottis, Rain., (2010), “Knowledge Based Framework For Cyber Weapons And Conflict.”, Conference On Cyber Conflict., Available at: https://ccdcoe.org/uploads/2018/10/Lorents-et-al-Knowledge-Based-Framework-for-Cyber-Weapons-and-Conflict.pdf. (Accessed on: 23 Mar, 2017)/3/23.
Lucas, George., (2014).,  “Permissible Preventive Cyberwar: Restricting Cyber Conflict to Justified Military Targets.”, The Ethics of Information Warfare,  Law, Governance and Technology Series, vol 14. Springer, Cham:, 73-83.
Majlesi, Mohammad Baqer. (1403). Bihar al-Anwar. Vol. 67. Beirut: Dar Al-Ahya Al-Torath Al-Arabi.
Mele, Stefano., (2013)., “Cyber-weapons: legal and strategic aspects (version 2).” Available at: http://www.strategicstudies.it/wp-content/uploads/2013/07/Machiavelli-Editions-Cyber-Weapons-Legal-and-Strategic-Aspects-V2.0.pdf. (Accessed on: 3 Jun, 2017)/6/3.
Michael, Lacewing., (2010)., “Just war theory.”, New York: Routledge,  Available at: http://documents.routledge-interactive.s3.amazonaws.com/9781138793934/A2/Political/JustWarTheory.pdf. (Accessed on:, 10 Apr 2017/4/10).
Nasir Mohd, Zin, Ahmad and Yunos, Zahri., (2003)., “Computer Virus: Future Cyber Weapons.”, National ICT Security And Emergency Response Centre (NISER)., Available at: http://www.cybersecurity.my/data/content_files/13/73.pdf. (Accessed on:, 9 Jul 2016/7/9).
Ohlin, Jens David. and, Finkelstein, Claire Oakes. and, Govern, Kevin., (2015)., Cyberwar: Law and Ethics for Virtual Conflicts, Oxford University Press.
Park, Ji Min., (2015)., Finding effective responses against cyber attacks for divided nations., unpublished master’s thesis, Naval Postgraduate School.
Rid ,Thomas. and; McBurney, Peter., (2012)., “Cyber-Weapons.”, The RUSI Journal, vol.157., NO.1:, 6-13.
Rid, Thomas., (2013)., Cyber War Will Not Take Place, Oxford University Press.
Rowe, Neil C.., (2010a)., “The Ethics of Cyberweapons in Warfare.”, International Journal of Cyberethics. USA, IGI Publishing Hershey:, Vol. 1, No. 1:, 20‐31, USA, IGI Publishing Hershey.
Rowe, Neil C.., (2010b)., "Towards Reversible Cyberattacks.," Proc. 9th European Conference on Information Warfare and Security., Thessaloniki , Greece [ECIW].
Shulman, M.., (1999)., "Discrimination in the Laws of Information Warfare.", Columbia Journal of Transnational Law., Vol. 37., 939-968.
Singer, P.W..,( 2015)., “Stuxnet And Its Hidden Lessons On the Ethics Of Cyberweapons.”, Case Western Reserve Journal of International Law.,  47, 79-86.
      Slayton, Rebecca. (2017). “Why Cyber Operations Do Not Always Favor the Offense.” Policy File.,1–7. yun.ir/64n61e.
Taddeo, Mariarosaria. (2012b)., “Information Warfare: a Philosophical Perspective.”  Philosophy and Technology., 25(1): 105-120.
Taddeo, Mariarosaria., (2012a)., “An Analysis For A Just Cyber Warfare”., 4th International Conference on Cyber Conflict (CYCON 2012)., NATO CCD COE Publications, Tallinn.
Tzu, Sun.,( 2005)., The art of war., Thomas Cleary, Shambhala.
US Department of Defense U.S. Cyber Command Fact Sheet, May 25., (2010)., Available at:  http://nsarchive2.gwu.edu/NSAEBB/NSAEBB424/docs/Cyber-038.pdf. (Accessed on: 26 Jun, 2017)/06/24.