Essay On Ethics In Irregular War And Cyber Warfare

Superior Essays
This paper seeks to better understand ethics in irregular war and cyber warfare. Notably the relationship between US and China. Both actors are two major developed economies, which highly depend on the Internet. Therefore they are both remarkably exposed to cyber war. In addition, we will see how both actors use cyber warfare to towards each other. Cyber warfare is defined as “actions by nation-state used to invade another nation´s networks or computer to cause damage and disruption.” Today we can also see that cyber warfare is being used by terrorist organizations, companies, political or ideological extremist groups as well. From a rational perspective, ethical decision-making involves balancing risk between mission, soldiers and civilians. …show more content…
The first pillar recognizes that there is a new area of warfare is the cyberspace. The second pillar is a proactive defense as opposed to passive defense, so that US is preparing of the threats and will act before the attacks. The third pillar is critical infrastructure protection, also known as CIP. It is a concept that relates to how prepared and the response to the attacks that will hurt our critical infrastructure of a region or nation. The fourth pillar is the use of collective defense, which provides the capability of early detection and to incorporate them in the defense strategy against cyber warfare. Lastly the fifth pillar is to maintain and build up the advantage of technological change. Examples would be to improve computer literacy and increase the artificial intelligence capabilities. These Five Pillars were published in 2011. Which tells us that cyber warfare is a relatively new warfare.
In a recent article from US News; Russia, China, Iran and North Korea all have tactical advantages against the US. These nations have already launched cyber attacks towards civilian areas. The Chinese military stole US plan for the technically sophisticated F-35 Joint Strike Fighter, they created a copycat named J-31. Hackers with strong connections in the Iranian government were earlier this year charged for attacks on US banks. This shows us that cyber war might be the next step in

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Joint Force 2020

    • 1383 Words
    • 6 Pages

    Issues that pose risk to missions are: “providing sufficient enabling capabilities, building partnership capacity, and securing DoD systems in cyberspace.” In example, an ally or partner’s lack of ability or willingness to support common goals may present an operational risk. When it comes to cyberspace, a failure to secure systems would pose a major risk to operations, personnel, and mission accomplishment. In such cases operational risk may be mitigated through the development of bilateral and multilateral capacity to improve interoperability to protect common interests through security cooperation, agreements, and…

    • 1383 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    (MEU Coursebook p. 12). However, just as cyber threats are expected to increase, so too must the MEU’s ability to combat them. The MEU must create a more robust cyber capability within the CEWCC, including subject matter experts in fields of fires, information operations, intelligence, and cyber law. While the nature of war remains the same, the conduct of war will – and should – change.…

    • 912 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Alex K. Rich and Gerson Moreno-Riano are the authors of the article War on Terror. Gerson Moreno-Riano earned a doctorate in Philosophy and a Master of Arts degree in political science from the University of Cincinnati (Rich, 2016, p.7). The purpose of this article is to explain the overview and understanding on how the war on terrorism is fought. Although the authors mention several effect that war has throughout the world, the authors argue that the war on terror causes the largest impact because it includes military operations. In paragraph one, the author establishes a setting by providing significant terrorist groups, locations and time.…

    • 991 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Carl Von Clausewitz describes in his book On War, that war will always have some level of savage passion, and thus if we strive to maintain a level of civility in war, we must teach ourselves intelligent ways to manage force. We must maintain an ethical nature. This poses the question, with the ever-present savage passion in war, how do we maintain an ethical way of war? This is by no means easy to answer.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ethical Problem Solving I chose Ethical Problem Solving as my topic because it represents a difficult and important training area, not just for the military but for any organization. From my experience in the Army, I have noticed that the Army is always seeking to develop ethical problem solving from officers and soldiers who come from many different religious, personal, and philosophical backgrounds, who may view some problems and solutions within the ethical field in different ways. All soldiers and leaders throughout their careers are constantly analyzing and assessing their ethical thinking with a view to improving it by using training, experiences, and creative thinking. This subject is important to me because doing what is morally right…

    • 550 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cyber Terrorism Case Study

    • 1053 Words
    • 4 Pages

    Chemical Corps. The Road Travelled The Civil Support Team Asymmetric Engagements aren’t a new topic for the United States. Since the early part of the 1960’s America has had to deal with this threat in some form or fashion. Civil disturbances of the 1960’s, the frequency of terrorist acts in the 1970’s, illegal drug use in the 1980’s.…

    • 1053 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Essay On Military Ethics

    • 1225 Words
    • 5 Pages

    The military has a set of rules that every member must follow. These laws hold them to an even higher standard than state and federal laws. Enlisting in the military involves stating an oath, which says that this is a choice without reservation or purpose of avoidance. Locally, the effect of this choice is all around us; there are over three thousand soldiers in the Montana National Guard. The army instills multiple creeds and acronyms into all its up- and- coming soldiers, in attempts to have them know these codes for many years to come.…

    • 1225 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Assess the contemporary coherence of the just war tradition. Realists describe war as an inevitable outcome of the anarchical international system in which states interact with each other. Based on this premise, throughout the centuries, has been witnessed the flourishing of a tradition of thought focusing on the ethics of war: The Just War Tradition. Its central hypothesis is that the use of force can be morally justified, or in other words that war can be morally right. This view differs from the other traditions of thinking that examine the relation between war and politics such as Pacifism and Realism.…

    • 421 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Decent Essays

    Insurgency is just about as old as mankind, and the act of countering it, is known as counter-insurgency (COIN or CO-IN). In this computerization and communication era, information touches every corner of the globe via cyberspace almost instantaneously. This revolutionised the way insurgency is being conducted and prompts the development of a new COIN processor; fighting and winning through the “hearts and minds”. This “hearts and minds” strategy, was spearheaded by General David Petraeus and was eventually developed into a doctrine titled; “Army’s Counterinsurgency Field Manual (U.S. Army/Marine Corps, 2006)”. However, “hearts and minds” is just one of the many COIN processors.…

    • 171 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Today, technological advances in warfare have challenged the foundational principles of Just War Theory and generated scrutiny around ethical behavior in combatant environments. Just War Theory refers to a set of rules that a sovereign state is expected to follow before engaging in war, during war, and after war—jus ad bellum, jus in bellum, and jus post bellum, respectively. With the increased employment of Unmanned Aerial Vehicle (UAV) or drone strikes under the Obama Administration, one may doubt the morality of these attacks. Specifically, the aims of this essay seek to answer the question on whether or not drone strikes in Yemen adhere to the principles of Just War Theory. Considering the unprecedented and regular use of this technology,…

    • 1540 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays