Essay On Ethics In Irregular War And Cyber Warfare

Superior Essays
This paper seeks to better understand ethics in irregular war and cyber warfare. Notably the relationship between US and China. Both actors are two major developed economies, which highly depend on the Internet. Therefore they are both remarkably exposed to cyber war. In addition, we will see how both actors use cyber warfare to towards each other. Cyber warfare is defined as “actions by nation-state used to invade another nation´s networks or computer to cause damage and disruption.” Today we can also see that cyber warfare is being used by terrorist organizations, companies, political or ideological extremist groups as well. From a rational perspective, ethical decision-making involves balancing risk between mission, soldiers and civilians. …show more content…
The first pillar recognizes that there is a new area of warfare is the cyberspace. The second pillar is a proactive defense as opposed to passive defense, so that US is preparing of the threats and will act before the attacks. The third pillar is critical infrastructure protection, also known as CIP. It is a concept that relates to how prepared and the response to the attacks that will hurt our critical infrastructure of a region or nation. The fourth pillar is the use of collective defense, which provides the capability of early detection and to incorporate them in the defense strategy against cyber warfare. Lastly the fifth pillar is to maintain and build up the advantage of technological change. Examples would be to improve computer literacy and increase the artificial intelligence capabilities. These Five Pillars were published in 2011. Which tells us that cyber warfare is a relatively new warfare.
In a recent article from US News; Russia, China, Iran and North Korea all have tactical advantages against the US. These nations have already launched cyber attacks towards civilian areas. The Chinese military stole US plan for the technically sophisticated F-35 Joint Strike Fighter, they created a copycat named J-31. Hackers with strong connections in the Iranian government were earlier this year charged for attacks on US banks. This shows us that cyber war might be the next step in

Related Documents

  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    (MEU Coursebook p. 12). However, just as cyber threats are expected to increase, so too must the MEU’s ability to combat them. The MEU must create a more robust cyber capability within the CEWCC, including subject matter experts in fields of fires, information operations, intelligence, and cyber law. While the nature of war remains the same, the conduct of war will – and should – change.…

    • 912 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Cyber Terrorism Case Study

    • 1053 Words
    • 4 Pages

    Chemical Corps. The Road Travelled The Civil Support Team Asymmetric Engagements aren’t a new topic for the United States. Since the early part of the 1960’s America has had to deal with this threat in some form or fashion. Civil disturbances of the 1960’s, the frequency of terrorist acts in the 1970’s, illegal drug use in the 1980’s.…

    • 1053 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Assess the contemporary coherence of the just war tradition. Realists describe war as an inevitable outcome of the anarchical international system in which states interact with each other. Based on this premise, throughout the centuries, has been witnessed the flourishing of a tradition of thought focusing on the ethics of war: The Just War Tradition. Its central hypothesis is that the use of force can be morally justified, or in other words that war can be morally right. This view differs from the other traditions of thinking that examine the relation between war and politics such as Pacifism and Realism.…

    • 421 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ethical Problem Solving I chose Ethical Problem Solving as my topic because it represents a difficult and important training area, not just for the military but for any organization. From my experience in the Army, I have noticed that the Army is always seeking to develop ethical problem solving from officers and soldiers who come from many different religious, personal, and philosophical backgrounds, who may view some problems and solutions within the ethical field in different ways. All soldiers and leaders throughout their careers are constantly analyzing and assessing their ethical thinking with a view to improving it by using training, experiences, and creative thinking. This subject is important to me because doing what is morally right…

    • 550 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Carl Von Clausewitz describes in his book On War, that war will always have some level of savage passion, and thus if we strive to maintain a level of civility in war, we must teach ourselves intelligent ways to manage force. We must maintain an ethical nature. This poses the question, with the ever-present savage passion in war, how do we maintain an ethical way of war? This is by no means easy to answer.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On Military Ethics

    • 1225 Words
    • 5 Pages

    The military has a set of rules that every member must follow. These laws hold them to an even higher standard than state and federal laws. Enlisting in the military involves stating an oath, which says that this is a choice without reservation or purpose of avoidance. Locally, the effect of this choice is all around us; there are over three thousand soldiers in the Montana National Guard. The army instills multiple creeds and acronyms into all its up- and- coming soldiers, in attempts to have them know these codes for many years to come.…

    • 1225 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Insurgency is just about as old as mankind, and the act of countering it, is known as counter-insurgency (COIN or CO-IN). In this computerization and communication era, information touches every corner of the globe via cyberspace almost instantaneously. This revolutionised the way insurgency is being conducted and prompts the development of a new COIN processor; fighting and winning through the “hearts and minds”. This “hearts and minds” strategy, was spearheaded by General David Petraeus and was eventually developed into a doctrine titled; “Army’s Counterinsurgency Field Manual (U.S. Army/Marine Corps, 2006)”. However, “hearts and minds” is just one of the many COIN processors.…

    • 171 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Alex K. Rich and Gerson Moreno-Riano are the authors of the article War on Terror. Gerson Moreno-Riano earned a doctorate in Philosophy and a Master of Arts degree in political science from the University of Cincinnati (Rich, 2016, p.7). The purpose of this article is to explain the overview and understanding on how the war on terrorism is fought. Although the authors mention several effect that war has throughout the world, the authors argue that the war on terror causes the largest impact because it includes military operations. In paragraph one, the author establishes a setting by providing significant terrorist groups, locations and time.…

    • 991 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    Cyber Domain Case Study

    • 1692 Words
    • 7 Pages

    Introduction The cyber domain is perhaps the most complex domain to define in modern warfare. Academic literature has secured cyber as both a domain and part of the global common. National laws, policies, and understanding of the cyber domain are just being to mature; thus, the strategy to guide and form the required organizations to support cyber is just being to develop. This paper will consider whether the current national cyber construct is sufficient to address the cyber domains unique geography.…

    • 1692 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    For instance, in cases of cyber warfare, the just war tradition has moral ground limitation. In the oxford’s dictionary cyberattack refers, an attempt by hackers to damage or destroy a computer network or system . Like Oxford’s dictionary described, cyber attacks are used by hackers (humans) with the intention to destroy a computer or network (physical object); the impact of it destruction depends on the target group. It sounded like cyber attacks have moral ground but based on the Just War theory principles, it does not, Because, it does not include an armed conflict, and does not count with physical representation. This situation creates a challenge for the international community and policymakers.…

    • 1419 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Cyberwarfare Since the 1900’s with the start of the Internet, the world has become more and more dependent on it. The word cyberwarfare is very well known across the world in the current days because everyone lives in a technologically interconnected world. It is defined as actions by a nation-state to penetrate another nation 's computer or networks for the purposes of causing damage or disruption; also we can include non-state actors such as terrorist groups, companies, etc.…

    • 1220 Words
    • 5 Pages
    Superior Essays