This book presents 12 essays that focus on the analysis of the problems prompted by cyber operations (COs). It clarifies and discusses the ethical and regulatory problems raised by the deployment of cyber capabilities by a state¿s army to inflict disruption or damage to an adversary¿s targets in or through cyberspace.
Written by world-leading philosophers, ethicists, policy-makers, and law and military experts, the essays cover such topics as the conceptual novelty of COs and the ethical problems that this engenders; the applicability of existing conceptual and regulatory frameworks to COs deployed in case of conflicts; the definition of deterrence strategies involving COs; and the analysis of models to foster cooperation in managing cyber crises.
Each essay is an invited contribution or a revised version of a paper originally presented at the workshop on Ethics and Policies for Cyber Warfare, organized by the NATO Cooperative Cyber Defence Centre of Excellence in collaboration with the University of Oxford.
The volume endorses a multi-disciplinary approach, as such it offers a comprehensive overview of the ethical, legal, and policy problems posed by COs and of the different approaches and methods that can be used to solve them. It will appeal to a wide readership, including ethicists, philosophers, military experts, strategy planners, and law- and policy-makers.
Ludovica Glorioso, is Captain (Cpt ITA A) of the Italian Army and a legal advisor to the Italian Armed Forces, currently working at the Security Force Assistance Centre in Cesano di Roma (Italy). Prior to her current position, she served as Legal Researcher at the NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD CCOE, 2012-2016), as legal advisor in NATO Peacekeeping Operations in the Balkans and Afghanistan. She holds an MA in Law from University of Palermo (Italy), an LL.M in European and Transitional Law from The University of Trento (Italy) and she is admitted to the Italian bar. Her research and activities focus on International Humanitarian Law, Law of Armed Conflict, and International Law applied to cyber warfare.
1. Hoisington - Regulating Cyber Operations through International Law: In, Out or Against the Box?.- 2. Taddeo - The Ontological Hiatus and the Regulation of Cyber Warfare.- 3. Taylor Smith - Towards an Richer Account of Cyber Harm: The Value of Self-Determination in the Context of Cyber Warfare.- 4. McDonald - Blind Justice? The Role of Distinction in Electronic Attacks.- 5. Roscini - Military Objectives in Cyber Warfare.- 6. Rowe - Challenges of Civilian Distinction in Cyber Warfare.- 7. Shackelford et al. - Defining Cyber security Due Diligence Under International Law: Lessons from the Private Sector.- 8. Cornish - Deterrence as the Basis for Ethical Constraints on Conflict in the Cyber Domain.- 9. Glorioso - The Use of Cyber Weapons. Means and Methods of Cyber warfare.- 10. Casanovas - Cyber Warfare and Organised Crime. A Regulatory Model and Meta-Model for Open Source Intelligence (OSINT).- 11. Happaa & Fairclough - A Model to Facilitate Discussions about Cyber Attacks.- 12. Collier - Cyber Crisis Management: Lessons from the Approach of Estonia and the UK.- Commentary: Baylon - Lessons from the Chatham House Project on Cyber and Nuclear Security: Implications for Ethics in Cyber Warfare.- Report: Cath - Report of the NATO CCD COE Workshop 'Ethics and Policies for Cyber Warfare'.