Author: Kevin Govern

[Kevin Govern is Associate Professor of Law at Ave Maria School of Law.] The science fiction author William Gibson coined the term cyberspace in his short story, Burning Chrome (1982), before most of the public had a concept of, let alone experience with, using networked computer systems. Science fiction has given way to cyber reality, with 42.3% of the world’s population using the Internet on a regular basis, some 741% growth between 2000-2014 alone. At the same time, cyber weapons and cyber warfare are among the most dangerous innovations in recent years. Cyber weapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide ranging potential consequences. A non-exclusive list of some notable past cyber incidents includes but is not limited to: The US director of national intelligence, James Clapper, recently told the House intelligence committee the next phase of escalating online data theft most likely will involve manipulation of digital information, with a lower likelihood of a “cyber Armageddon” of digitally triggered damage to catastrophically damage physical infrastructure. Contemporaneous with this writing, a Chinese delegation met with representatives from the FBI, the intelligence community and the state, treasury and justice departments for a “frank and open exchange about cyber issues” amounting to “urgent negotiations…on a cybersecurity deal and may announce an agreement when President Chinese President Xi Jinping arrives in Washington on a state visit on Thursday [24 September].” In this era of great cyber peril and opportunity, my colleagues and co-editors Jens Ohlin from Cornell Law School and Claire Finkelstein from the University of Pennsylvania Law School and I had the privilege of contributing to and editing a book that assembles the timely and insightful writings of renowned technical experts, industrial leaders, philosophers, legal scholars, and military officers as presented at a Center for Ethics and the Rule of Law roundtable conference entitled Cyberwar and the Rule of Law. The collected work, Cyber War – Law and Ethics for Virtual Conflicts, explores cyber warfare’s moral and legal issues in three categories. First, it addresses foundational questions regarding cyber attacks. What are they and what does it mean to talk about a cyber war? State sponsored cyber warriors as well as hackers employ ever more sophisticated and persistent means to penetrate government computer systems; in response, governments and industry develop more elaborate and innovative defensive systems. The book presents alternative views concerning whether the laws of war should apply, whether transnational criminal law or some other peacetime framework is more appropriate, or if there is a tipping point that enables the laws of war to be used. Secondly, this work examines the key principles of the law of war, or jus in bello, to determine how they might be applied to cyber-conflicts, in particular those of proportionality and necessity. It also investigates the distinction between civilian and combatant in this context, and studies the level of causation necessary to elicit a response, looking at the notion of a “proximate cause.” Finally, it analyzes the specific operational realities implicated by cyber warfare technology employed and deployed under existing and potential future regulatory regimes. Here is the full Table of Contents: