The business that we are all somehow associated with—of contemplating war, preparing for war, deterring war, initiating war, prosecuting war, providing relief in war, ending war, recovering from war—is consequential. Getting as right as possible the intricate dance of decisions that define the initiation, conduct, and conclusion of warfare is incredibly important for societies. It also has varying degrees of impact on individuals, from merely defining the outlines of individual service members’ daily lives to shattering or ending the mental and physical existence of combatants and innocents.
The rich legal literature that has grown up to assess the constitutionality of bulk communications collection by the government has focused overwhelmingly—and understandably—on the challenge such programs pose to particular claims of individual right against the state, yet attempting to describe what seems troubling about bulk collection in terms of individual rights alone has significant doctrinal and conceptual limits.
In this article, Sasha Romanosky and Zachary Goldman address the problem of how to define “collateral damage” in the cyber realm. Arguing that unintended effects on data alone can constitute collateral damage, Romanosky and Goldman propose ways for the US military and law enforcement to conceptualize and estimate collateral damage in the context of cyber operations.
Understanding Cyber Collateral Damage