In this article, Sasha Romanosky and Zachary Goldman address the problem of how to define “collateral damage” in the cyber realm. Arguing that unintended effects on data alone can constitute collateral damage, Romanosky and Goldman propose ways for the US military and law enforcement to conceptualize and estimate collateral damage in the context of cyber operations.
In this article, Anthony Pfaff discusses what ethical norms should govern proxy war and the relationships that sustain them; the way the existence of a benefactor-proxy relationship complicates the application of traditional jus ad bellum criteria; and the additional moral problems caused by the way proxy wars shift risk away from benefactors. He concludes by suggesting a set of norms that should guide proxy relationships.
In coalition operations, individual States may be responsible in law for some, but not all, of the activities conducted, and coalition members will often have different legal obligations or varying interpretations of the same obligations. In this article, David S. Goddard explores the challenges of achieving legal interoperability—the effective managing of these differences— and suggests a framework for understanding and addressing this problem.