On the Use of Offensive Cyber Capabilities - Belfer Center for ...
On the Use of Offensive Cyber Capabilities - Belfer Center for ...
On the Use of Offensive Cyber Capabilities - Belfer Center for ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Additionally, how might <strong>the</strong> nature <strong>of</strong> cyberspace adapt or change in response to<strong>the</strong> use <strong>of</strong> a particular cyber action?Considering all three sets <strong>of</strong> cyber policy considerations is critical t<strong>of</strong>ormulating sound cyber policy, and we will discuss each consideration in detailin order to better understand <strong>the</strong> challenges <strong>for</strong> external cyber operations.Normative ConsiderationsEthicalIt is not our intention to justify a particular ethical framework by whichwe will gauge <strong>the</strong> morality <strong>of</strong> any external cyber activity. Ra<strong>the</strong>r it is importantto note that <strong>the</strong>re is a moral dimension to external cyber activity that may not becaptured by simply analyzing <strong>the</strong> legal implications <strong>of</strong> said activity. By way <strong>of</strong> ananalogy, <strong>the</strong> U.S. decision to categorize “enhanced interrogation techniques” aslegal 37 reflected a certain regard <strong>for</strong> <strong>the</strong> need <strong>for</strong> legal justification. It did not,however, reflect on <strong>the</strong> moral dimension <strong>of</strong> <strong>the</strong>se techniques. Put ano<strong>the</strong>r way,simply because we determine that an action is legal, it does not make it morallyacceptable.In that regard, we believe that <strong>the</strong>re are certain ethical aspects that areparticularly germane here. First is <strong>the</strong> applicability <strong>of</strong> contractualist thought, 38regardless <strong>of</strong> <strong>the</strong> international characteristic <strong>of</strong> external cyber operations. It is notnecessary to adhere to a more cosmopolitan view <strong>for</strong> this belief to hold. At aminimum, however, cyber policy should recognize <strong>the</strong> potential <strong>for</strong> un<strong>for</strong>eseen37 For a synopsis <strong>of</strong> <strong>the</strong> relevant documents, see (Torture Memos).38 By “contractualist thought” we are referring to John Rawls’s Theory <strong>of</strong> Justice. We are wellaware that Rawls did not believe his <strong>the</strong>ory applied internationally, but it is not <strong>the</strong> complete<strong>the</strong>ory we are advocating ei<strong>the</strong>r. Ra<strong>the</strong>r, we are simply averring that <strong>the</strong>re exists, at a minimum, abasic regard that we extend to human beings that is not particularly captured in consequentialistthought.29