10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Additionally, how might <strong>the</strong> nature <strong>of</strong> cyberspace adapt or change in response to<strong>the</strong> use <strong>of</strong> a particular cyber action?Considering all three sets <strong>of</strong> cyber policy considerations is critical t<strong>of</strong>ormulating sound cyber policy, and we will discuss each consideration in detailin order to better understand <strong>the</strong> challenges <strong>for</strong> external cyber operations.Normative ConsiderationsEthicalIt is not our intention to justify a particular ethical framework by whichwe will gauge <strong>the</strong> morality <strong>of</strong> any external cyber activity. Ra<strong>the</strong>r it is importantto note that <strong>the</strong>re is a moral dimension to external cyber activity that may not becaptured by simply analyzing <strong>the</strong> legal implications <strong>of</strong> said activity. By way <strong>of</strong> ananalogy, <strong>the</strong> U.S. decision to categorize “enhanced interrogation techniques” aslegal 37 reflected a certain regard <strong>for</strong> <strong>the</strong> need <strong>for</strong> legal justification. It did not,however, reflect on <strong>the</strong> moral dimension <strong>of</strong> <strong>the</strong>se techniques. Put ano<strong>the</strong>r way,simply because we determine that an action is legal, it does not make it morallyacceptable.In that regard, we believe that <strong>the</strong>re are certain ethical aspects that areparticularly germane here. First is <strong>the</strong> applicability <strong>of</strong> contractualist thought, 38regardless <strong>of</strong> <strong>the</strong> international characteristic <strong>of</strong> external cyber operations. It is notnecessary to adhere to a more cosmopolitan view <strong>for</strong> this belief to hold. At aminimum, however, cyber policy should recognize <strong>the</strong> potential <strong>for</strong> un<strong>for</strong>eseen37 For a synopsis <strong>of</strong> <strong>the</strong> relevant documents, see (Torture Memos).38 By “contractualist thought” we are referring to John Rawls’s Theory <strong>of</strong> Justice. We are wellaware that Rawls did not believe his <strong>the</strong>ory applied internationally, but it is not <strong>the</strong> complete<strong>the</strong>ory we are advocating ei<strong>the</strong>r. Ra<strong>the</strong>r, we are simply averring that <strong>the</strong>re exists, at a minimum, abasic regard that we extend to human beings that is not particularly captured in consequentialistthought.29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!