Cyberwarfare: The Ethical Concerns

Cyberwarfare: The Ethical Concerns


This article dives into the digital battlegrounds, unraveling the tricky moral questions and real-world impacts of hacking and cyber attacks in global politics. Get ready to explore the wild west of modern warfare!


Privacy Violations

Privacy Violations GIFs - Find & Share on GIPHY

Imagine if someone could peek into your private messages, emails, and photos without you knowing. Creepy, right? That’s what happens during cyberattacks. Cyberattacks often involve hacking into personal data, violating privacy. Mass surveillance and data breaches raise significant ethical concerns.

  • Take the NSA, for example. They’ve got programs like Section 702, which have been under fire for snooping on tons of communications, even those of everyday Americans. Picture a giant vacuum cleaner sucking up all your texts, calls, and emails. The problem? This data is often collected secretly, leaving people unaware that their privacy is being compromised. This mass surveillance sparks big ethical questions about how much spying is too much and where to draw the line on government surveillance.

Blurred Lines Between War and Peace:

war peace GIF by Darruda

Think of traditional war ethics, like the rules of a game. Just War Theory is one of those rulebooks, helping us figure out what’s fair and what’s not during wartime. But here’s the twist: in the world of cyberwarfare, the lines between peace and war get super blurry, making the old rules hard to follow.

Unlike battles on the ground, where it’s pretty obvious when a war is happening, cyberwarfare sneaks around in the shadows. One moment everything’s peaceful, and the next, a cyberattack strikes out of nowhere. This gray area makes it tricky to apply traditional ethical principles, leaving us wondering how to play by the rules when the game keeps changing.

  • The Stuxnet Case is an example of this. The attack on Iran’s nuclear facilities were conducted covertly without a formal declaration of war. The covert nature of this attack throws a wrench into our usual war ethics. It’s like trying to use the rules of chess to play a game of hide-and-seek. This murky situation makes it tough to tell the difference between a legitimate military strike and outright digital sabotage.

Collateral Damage and Civilian Impact: 

Flickering Ghost Lights Flickering GIF - Flickering Ghost Lights Flickering  Cinema - Discover & Share GIFs

You’re in a hospital, and suddenly, all the computers freeze. Doctors can’t access patient records, surgeries get delayed, and the entire place is in chaos. Sounds like a scene from a movie, right? Unfortunately, it’s real and has happened before! Cyberattacks often hit civilian infrastructure, like hospitals and utilities, affecting non-combatants.

  • Take the WannaCry ransomware attacks of 2017, for example. This nasty virus hit hospitals in the UK, locking down their systems. Doctors couldn’t access patient files, and critical medical services were disrupted. putting patients at risk. Similar to traditional warfare, these incidents make us question the ethics of cyber warfare. Is it fair to target things that everyday people rely on? Should there be rules to protect civilian infrastructure from such attacks?

Who Did It?

YARN | Like trying to catch smoke with your bare hands. | Harry Potter and  the Prisoner of Azkaban (2004) | Video gifs by quotes | 8da1e100 | 紗

 Imagine trying to catch smoke with your bare hands (shoutout Harry Potter). Identifying cyber-attackers is tough due to the anonymity in cyberspace. That’s what it’s like identifying cyber-attackers. Cyberspace is a vast, shadowy place where attackers can hide their tracks and stay anonymous. This makes accountability tricky and raises issues about retaliation and defense without clear proof of the attacker’s identity.

  • Picture this: it’s 2014, and suddenly, Sony Pictures is hit by a massive cyberattack, with private emails and unreleased movies leaked everywhere. The finger points at North Korea, but proving it is a whole different story. This hack shows just how tricky it is to nail down who’s behind a cyberattack. The mystery complicates how we respond ethically and legally. Imagine trying to punish someone when you’re not 100% sure they did it—there’s a big risk of blaming the wrong person. In the world of cyber whodunits, things are never as clear-cut as they seem!

Proportionality and Regulation:

Chaos GIFs | Tenor

 Imagine a world where there are no rules, and anything goes—that’s kind of what cyberwarfare is like right now. Because there aren’t clear regulations for cyberattacks, things can get pretty wild. Without these rules, cyberattacks might not stick to principles of proportionality, which is a fancy way of saying they could go way overboard. This means the damage could be excessive and unfair, causing a lot of unnecessary harm.

  • You’re sitting at home and suddenly, the lights go out—not just in your house but across the entire city. That’s what happened in Ukraine in 2015 when a Russian cyberattack took down the power grid, leaving nearly 225,000 civilians in the dark.  This attack wasn’t just a technical glitch; it raised big questions about fairness and ethics. Was it right to cause such widespread harm? Again, without clear international rules for cyberwarfare, these questions get even trickier

I hope you enjoyed this article! Please leave a comment and share it with friends!!!


Stuxnet | CFR Interactives, https://www.cfr.org/cyber-operations/stuxnet.

“Are There Any Ethical Issues in Cyber Security? – The Stemettes Zine.” Stemettes, 31 May 2021, https://stemettes.org/zine/articles/are-there-any-ethical-issues-in-cybersecurity/.

“Continuous Diagnostics and Mitigation (CDM) Program.” CISA, https://www.cisa.gov/resources-tools/programs/continuous-diagnostics-and-mitigation-cdm-program.

Craig, David J. “The Age of Cyberwarfare | Columbia Magazine.” Columbia Magazine, https://magazine.columbia.edu/article/age-cyberwarfare.

“Cyber Case Study: SolarWinds Supply Chain Cyberattack.” Ollis/Akers/Arney, 17 October 2021, https://ollisakersarney.com/blog/cyber-case-study-solarwinds-supply-chain-cyberattack/.

“Cybersecurity GIFs – Find & Share on GIPHY.” Giphy, https://giphy.com/explore/cybersecurity.

“DarkChronicles: the consequences of the Colonial Pipeline attack.” Kaspersky ICS CERT, 21 May 2021, https://ics-cert.kaspersky.com/publications/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/.

Doubleday, Justin. “Biden budget request includes $13B for cybersecurity, continuing upward trend.” Federal News Network, 11 March 2024, https://federalnewsnetwork.com/budget/2024/03/biden-budget-request-includes-13b-for-cybersecurity-continuing-upward-trend/.

Edionwe, Tolulope. “39 states were hit by the 2016 Russian cyber attacks.” The Outline, 13 June 2017.

“Faculty NPS.” Ethics of cyberwar attacks, https://faculty.nps.edu/ncrowe/attackethics.htm.

Farhat, Jawhar. “Unit 8200: Israel’s Stealthy Sentinel.” Grey Dynamics, 16 March 2024, https://greydynamics.com/unit-8200-israels-stealthy-sentinel/.

Fidler, David P. “Transforming Election Cybersecurity.” Council on Foreign Relations, 17 May 2017, https://www.cfr.org/report/transforming-election-cybersecurity.

Filkins, Dexter. “Was There a Connection Between a Russian Bank and the Trump Campaign?” The New Yorker, 8 October 2018, https://www.newyorker.com/magazine/2018/10/15/was-there-a-connection-between-a-russian-bank-and-the-trump-campaign.

Giles, Keir. “Russian cyber and information warfare in practice.” Chatham House, 14 December 2023, https://www.chathamhouse.org/2023/12/russian-cyber-and-information-warfare-practice.

“Giphy: Cyberwarfare.” https://giphy.com/explore/cyberwarfare.

Goldman, Emily O. “Lessons From Israel’s Rise as a Cyber Power.” Lawfare, 2 February 2024, https://www.lawfaremedia.org/article/lessons-from-israel-s-rise-as-a-cyber-power.

Iran International Newsroom. “Iran International Newsroom.” Israel Builds ‘Cyber Dome’ to Counter Attacks from Iran and Proxies, 3 May 2024, https://www.iranintl.com/en/202405036209.

Kaur, Gagandeep. “Cyberattacks on Israel intensify as the war against Hamas rages: Check Point.” CSO Online, 23 November 2023, https://www.csoonline.com/article/1249135/cyberattacks-on-israel-intensify-as-the-war-against-hamas-rages-check-point.html.

Kerr, Jaclyn A. Assessing Russian Cyber and Information Warfare in Ukraine: Expectations, Realities, and Lessons, 22 November 2023, https://www.cna.org/reports/2023/11/assessing-russian-cyber-and-information-warfare-in-ukraine.

Kilner, Pete. “Ethics of Cyber Operations: ‘5th Domain’ Creates Challenges, Needs New Rules.” AUSA, 21 December 2017, https://www.ausa.org/articles/ethics-cyber-operations-%E2%80%985th-domain%E2%80%99-creates-challenges-needs-new-rules.

Lee, Ronald, et al. “Lessons Learned from the SolarWinds Cyberattack, and the Future for the New York Department of Financial Services’ Cybersecurity Regulation | Advisories.” Arnold & Porter, 11 June 2021, https://www.arnoldporter.com/en/perspectives/advisories/2021/06/lessons-learned-from-the-solarwinds-cyberattack.

Lim, Bram. “Cyberwarfare Conundrum: An Ethical Analysis – Viterbi Conversations in Ethics.” Viterbi Conversations in Ethics, 17 February 2022, https://vce.usc.edu/volume-5-issue-3/cyberwarfare-conundrum-an-ethical-analysis/.

Maizland, Lindsay. “The Colonial Pipeline Incident Shows the Need for Broader Thinking about Cyber Resilience.” Council on Foreign Relations, 20 May 2021, https://www.cfr.org/blog/colonial-pipeline-incident-shows-need-broader-thinking-about-cyber-resilience.

Nouwens, Meia. “China’s new Information Support Force.” IISS, 3 May 2024, https://www.iiss.org/en/online-analysis/online-analysis/2024/05/chinas-new-information-support-force/.

Sakellariadis, John, et al. “Ukraine gears up for new phase of cyber war with Russia.” Politico, 25 February 2023, https://www.politico.com/news/2023/02/25/ukraine-russian-cyberattacks-00084429.

Sammarco, Natalie. “The Great Firewall and the Perils of Censorship in Modern China.” Yale Journal of International Affairs, 11 June 2023, https://www.yalejournal.org/publications/the-great-firewall-and-the-perils-of-censorship-in-modern-china.

Shankar, Niranjan. “The Biden Administration’s National Cybersecurity Strategy: Opportunities and Challenges.” Middle East Institute, 21 February 2024, https://www.mei.edu/publications/biden-administrations-national-cybersecurity-strategy-opportunities-and-challenges

Taddeo, Mariarosaria. “Why we need philosophy and ethics of cyber warfare.” University of Oxford, 16 June 2022, https://www.ox.ac.uk/news/2022-06-16-why-we-need-philosophy-and-ethics-cyber-warfare

Townsend, Kevin. “Operation Cloud Hopper: China-based Hackers Target Managed Service ProvidersK.” Security Week, 6 April 2017.

Young, Kelli. “Cyber Case Study: SolarWinds Supply Chain Cyberattack.” coverlink insurance, 18 October 2021, https://coverlink.com/case-study/solarwinds-supply-chain-cyberattack/.