In this article, Sasha Romanosky and Zachary Goldman address the problem of how to define “collateral damage” in the cyber realm. Arguing that unintended effects on data alone can constitute collateral damage, Romanosky and Goldman propose ways for the US military and law enforcement to conceptualize and estimate collateral damage in the context of cyber operations.
In this article, Anthony Pfaff discusses what ethical norms should govern proxy war and the relationships that sustain them; the way the existence of a benefactor-proxy relationship complicates the application of traditional jus ad bellum criteria; and the additional moral problems caused by the way proxy wars shift risk away from benefactors. He concludes by suggesting a set of norms that should guide proxy relationships.
From the perspective of private industry, Mieke Eoyang examines the interplay between US national security electronic surveillance and the US telecommunications companies that are necessary intermediaries for this surveillance, tracing the history of major surveillance programs and identifying key areas of tension. Eoyang recommends reforms including a court process for government access to overseas data on foreign customers, leaving bulk, unfiltered data in the hands of private industry, and working with close allies to build consensus around electronic surveillance norms.