Global Security and Intelligence Studies Volume 2, Issue 1, Fall 2016 | Page 28

Global Security and Intelligence Studies most frequently mentioned right reasons—or “just causes” include “self-defence from . . . attack; the defence of others from such; the protection of innocents from brutal, aggressive regimes; and punishment for a grievous wrongdoing . . .”. Orend adds: An important issue in just cause is whether, to be justified in going to war, one must wait for the aggression actually to happen, or whether in some instances it is permissible to launch a pre-emptive strike against anticipated aggression. The remaining Just War Theory requirements contend that motivations for war or conflict must be morally appropriate; war can only be embarked on if the decision has been made by those who have the authority to do so, has been done by a proper and acceptable process, and publicly announced. As opposed to Jus ad bellum, Jus in bello may cause some real problems for the international community of states and numerous non-state actors. Just how one might hold those in breach of these principles accountable—especially when anonymity applies? Even more difficult in the cyber battle space context, how can we discriminate those innocent users caught up in any escalation from those legitimate targets through the use of “weapons” such as a Distributed Denial of Service (DDOS) or a disseminated malware attack? A deliberate DDOS attack would be taking “deliberate aim at civilians.” That being said, Orend (2008) importantly tells us that “almost all wars since 1900 have featured larger civilian, than military, casualties.” In the twenty-first century cyber-domain, while ethically unjustifiable, this is still likely to remain true. Cyber conflict is becoming increasingly more attractive as a method of “first resort” and a real challenge to the just cause question becomes whether “first strike” cyber-attacks could or should be considered an act of defense from aggression? Targeting critical infrastructure that is managed or controlled via computer networks is now a very real “first strike” option. If we take their efforts and capabilities to date, as well as their language, Anonymous certainly believes that targeting ISIS is worth an effort. And, in particular, where do the likes of Anonymous sit with this dilemma? The use of weapons in cyberspace in a conflict may challenge the proportionality component to Just War Theory. Posner and Sykes (2004) suggest that a just war may proceed only if the benefits are proportional to the costs incurred. In a cyber-war between Anonymous and ISIS, the limits of proportionality may become too big when a nonviolent stratagem is employed against an extremely violent opponent. There may be a kinetic response to a digital attack or disclosure that results in loss of life and is clearly out of proportion. Just how far is a nonviolent non-state actor prepared to go in a war of self-defense? What sacrifices are they willing to make for their cause? Is this the “red line” that distinguishes whether a state actor actively or passively sides with the nonviolent non-state actor? Further examination of some of the activities conducted by Anonymous to date might provide a glimpse of what the organization might, or might not, be capable of doing if it engaged in a full-blown cyber conflict with ISIS. 22