{"id":535,"date":"2015-09-30T14:01:22","date_gmt":"2015-09-30T18:01:22","guid":{"rendered":"https:\/\/www2.law.temple.edu\/voices\/?p=535"},"modified":"2016-07-28T11:42:19","modified_gmt":"2016-07-28T15:42:19","slug":"cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning","status":"publish","type":"post","link":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/","title":{"rendered":"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning"},"content":{"rendered":"<p>Back in 2012, I was pleased to receive an invitation to a <a href=\"https:\/\/www.law.upenn.edu\/institutes\/cerl\/conferences\/cyberwar\/\" target=\"_blank\">conference <\/a>that Jens, Kevin Govern, and Claire Finkelstein were hosting on the law and ethics of cyberwar. \u00a0It was a great conversation; so great, in fact, that Jens and his colleagues were inspired to use it as the launching pad for this volume \u2014 <a href=\"https:\/\/global.oup.com\/academic\/product\/cyber-war-9780198717508?cc=ie&amp;lang=en&amp;promocode=29300\" target=\"_blank\">Cyberwar: Law and Ethics for Virtual Conflicts<\/a>. \u00a0They asked me to write a <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2424230\" target=\"_blank\">chapter <\/a>on an idea I\u2019d been thinking about since <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=1083889\" target=\"_blank\">my first foray<\/a> into the cyber arena back in 2007 \u2014 whether and when IHL (international humanitarian law, or the law of armed conflict for those of you trained in the United States) might involve a duty to hack? \u00a0The basic idea was straightforward \u2014 if a cyber-operation could achieve a military objective (say disabling a power grid or a war-supporting factory\u2019s operations) without killing anyone or causing any lasting damage to the facility, shouldn\u2019t IHL require States to employ it in lieu of kinetic operations that might cause civilian casualties or property damage?<\/p>\n<p>Looking at the law today, the answer to this\u00a0question is (largely) a negative one. Certainly, IHL contains a requirement for States to take precautionary measures (see Additional Protocol I, Art. 57) such as (i) choosing\u00a0a means and method of warfare that minimizes\u00a0\u2018incidental loss of civilian life, injury to civilians, and damage to civilian objects\u2019 and (ii)\u00a0selecting\u00a0military objectives \u2018expected to cause the least danger to civilian lives and to civilian objects\u2019 in cases where \u2018a choice is possible between several military objectives for obtaining a similar military advantage.\u2019 \u00a0And these requirements could require a cyber-operation over a kinetic one in specific cases akin to the arguments for using available precision weaponry. \u00a0But, there\u2019s nothing in IHL that has ever said States have to use a particular type of weapon first, as my\u00a0duty to hack might suggest.<\/p>\n<p>More importantly,\u00a0some\u00a0cyber-operations might not even fall within\u00a0IHL\u2019s current ambit. \u00a0Although there\u2019s continuing debate, the majority view is that IHL\u2019s principles of precaution, discrimination, and proportionality only apply in cases of an \u201cattack.\u201d \u00a0IHL does not prohibit targeting or even harming civilians or civilian objects in a cyber-operation so long as the\u00a0effects are not analogous to those previously crossing the attack threshold (i.e., those with violent consequences involving injury, death, destruction or damage). The scope of IHL\u2019s precautions are similarly qualified; where a cyber operation does not qualify as an attack (i.e., it doesn\u2019t physically damage anything), it does not need to be among the range of options military planners are required to consider in deciding what and how to attack. \u00a0IHL thus appears to authorize attacks \u2013 kinetic or otherwise \u2013 that cause physical damage and loss or injury of human life so long as they compare favorably to potential losses from other types of\u00a0\u2018attacks\u2019 even if the same objective could be achieved without any\u00a0attack at all. \u00a0That result may be incongruous with the humanity values that motivate much of IHL, but it represents the law as it stands today.<\/p>\n<p>My chapter, therefore, undertakes a normative argument for a Duty to Hack, recognizing that the idea is clearly <em>lex ferenda<\/em>. \u00a0I argue that IHL should require states to use cyber-operations in their military operations when they are expected to be the least harmful means available for achieving military objectives. This duty departs from the current law in two key respects. \u00a0First, it would remove the \u201cattack\u201d threshold for precautionary measures since the novel and wide-ranging capacities of cyber-operations unsettle the idea that only attacks can achieve military objectives.\u00a0 A cyber-operation may be able to achieve a military objective (e.g., shutting down a factory for some desired period of time) without causing <em>any<\/em> physical harm.\u00a0 Rather than leave such cyber-operations outside the requirements of precaution because they do not meet the definition of an \u2018attack\u2019, a Duty to Hack would require that they be part of any choice in means, methods and objectives. \u00a0A cyber-operation that can achieve a particular military objective without an attack should be required in lieu of any \u2018attack\u2019 on that same objective by other means or methods, whether cyber, kinetic, or non-kinetic in nature. \u00a0In other words, so long as the military objective is achievable (and nothing in my idea would require hacking if it can\u2019t achieve lawful military objectives),\u00a0the Duty to Hack requires employing cyber-operations generating <em>no <\/em>physical harm over those means and methods of warfare that, by definition, must generate <em>some <\/em>physical harm (similarly, it would prioritize\u00a0cases involving<em>some\u00a0<\/em>harm in comparison to means and methods that would generate\u00a0<em>more\u00a0<\/em>harm).<\/p>\n<p>Second, the Duty to Hack would addresses all forms of physical harm from cyber-operations, not just those of a <em>civilian <\/em>character. Existing IHL \u2013 distinction, proportionality, and precautions \u2013 only require efforts to avoid, limit, or minimize <em>civilian <\/em>harm. Absent the harmful civilian impacts protected by these and other IHL rules, militaries are free to employ destructive and lethal force against military objects and belligerents.\u00a0 This approach furthers military necessity \u2013 complete submission of the enemy as soon as possible \u2013 and made sense where military objectives were usually military in character and dual-use objects qualified as military objects only on occasion. But, as is well known, information communication technologies are regularly dual-use (that is, they are used by both civilian and military actors). \u00a0I question whether\u00a0this\u00a0default treatment of dual-use objects as military objects should continue where all these cyber-related\u00a0dual-use objects may be attacked (and damaged or destroyed) without regard to any questions of distinction, proportionality or precautions vis-\u00e0-vis the objects themselves. \u00a0Of course, one solution would be to require more careful segregation of military objects in cases where they are\u00a0situated within or among civilian objects.\u00a0My\u00a0Duty to Hack, however, takes a different, and simpler, approach. \u00a0It would\u00a0require using cyber-operations that cause the least harm to achieve a military objective in military operations. For example, assuming disruption of Iran\u2019s nuclear processing plant was a lawful military objective, the prospect of deploying Stuxnet to achieve that objective would take priority over doing so by an airstrike if that airstrike \u2013 even a precise one \u2013 would foreseeably involve greater risks of injury, death, damage or destruction than spinning centrifuges out of control periodically.<\/p>\n<p>Ultimately, my Duty to Hack idea\u00a0is designed to preserve the principles of distinction and proportionality; IHL would continue to prohibit direct attacks on civilians and their objects by cyber-operations or otherwise, just as any military operation that does constitute an attack must not generate excessive civilian harm.\u00a0 Nor would my\u00a0Duty to Hack override the requirement to comply with the principles of discrimination and avoidance of unnecessary suffering when it comes to developing or deploying cyber-operations.<\/p>\n<p>My chapter offers a longer examination of the Duty to Hack concept than space permits here (including a discussion of how it differs from the \u201cduty to capture\u201d concept that has caused much controversy in IHL circles). \u00a0I explore the trade offs involved in adopting it (including the potential for it to incentivize greater military cyber surveillance to solidify the reliability of various cyber capabilities). \u00a0In doing this analysis, however,\u00a0I was struck by the larger challenges of using analogies to carve out the existing lines of IHL in cyberspace (not to mention the contours of any new lines that I propose).\u00a0As a result, I ended up framing my chapter around\u00a0a larger, introductory analysis of the role of boundaries in legal discourse over cyberspace.<\/p>\n<p>Readers may\u00a0be familiar with debates over whether cyberspace is subject to physical, territorial boundaries, most notable in on-going debates about which governance models best serve cyberspace (the traditional sovereign territorial model, a multistakeholder model where cyberspace is a\u00a0<em>res communis<\/em>, or some sort of hybrid approach). \u00a0But, I notice similar sorts of conceptual boundary disputes in questions over what rules of international law apply in cyberspace, with much of the existing analyses\u00a0resting on analogies to pre-existing regulatory regimes. \u00a0I find this \u201claw-by-analogy\u201d approach problematic, particularly when it comes to IHL and rules on the use of force. My chapter\u00a0explains the problems such line-drawing poses in terms of their\u00a0(i) accuracy, (ii) effectiveness and (iii) completeness. \u00a0Law-by-analogy works well where analogies hold (i.e., defining a use of force in cyberspace where the effects of a cyber operation analogize to the effects of prior activities treated as uses of force in the past; or, defining a non-use of force where the effects analogize to activities not treated as uses of force in the past). \u00a0But analogies break down where the technology includes previously-unseen capacities, which have no prior analogues. \u00a0In such cases, default presumptions may simply regard the behavoir as automatically prohibited or permitted in ways that create tensions with the law\u2019s underlying nature and purpose. \u00a0For example, I find it problematic that cyber-operations do not qualify as attacks simply because they do not involve violent consequence even if they can achieve the very same military objective as an attack. \u00a0My\u00a0Duty to Hack idea serves as a response to such\u00a0difficulties by thinking more carefully about the rules for cyber operations and the values they serve when there are no analogues to earlier operations defined as attacks.<\/p>\n<p>In the end, I had two overarching goals for this chapter. \u00a0First, I wanted to highlight the role of boundaries in governing cyberspace, and problematize the reasoning\u00a0it generates\u00a0as a result, particularly when done under the heading of law-by-analogy. \u00a0Second, I offer a critique of how existing boundaries operate with respect to contrasting cyber operations with other forms of attack, leading me to call for IHL to include a\u00a0Duty to Hack. \u00a0Although such a duty would not come without costs, I believe it would more accurately and effectively account for IHL\u2019s fundamental principles and cyberspace\u2019s unique attributes than existing efforts to foist legal boundaries upon State cyber-operations by analogy. It could, moreover, offer a necessary first step to resolving the larger theoretical and functional challenges currently associated with law\u2019s boundaries in cyberspace.<\/p>\n<p>Interested in more? \u00a0You could always\u00a0<a href=\"https:\/\/global.oup.com\/academic\/product\/cyber-war-9780198717508?cc=ie&amp;lang=en&amp;promocode=29300#\" target=\"_blank\">buy the book<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><em>This article originally appeared on <a href=\"http:\/\/opiniojuris.org\/2015\/09\/23\/book-symposium-cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/\" target=\"_blank\">Opinio Juris<\/a>.\u00a0<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back in 2012, I was pleased to receive an invitation to a conference that Jens, Kevin Govern, and Claire Finkelstein were hosting on the law and ethics of cyberwar. \u00a0It was a great conversation; so great, in fact, that Jens and his colleagues were inspired to use it as the launching pad for this volume \u2014 Cyberwar: Law and Ethics for Virtual Conflicts. \u00a0They asked me to write a chapter on an idea I\u2019d been thinking about since my first foray into the cyber arena back in 2007 \u2014 whether and when IHL (international humanitarian law, or the law of armed conflict for those of you trained in the United States) might involve a duty to hack? \u00a0The basic idea was straightforward \u2014 if a cyber-operation could achieve a military objective (say disabling a power grid or a war-supporting factory\u2019s operations) without killing anyone or causing any lasting damage to the facility, shouldn\u2019t IHL require States to employ it in lieu of kinetic operations that might cause civilian casualties or property damage? Looking at the &hellip;<\/p>\n","protected":false},"author":3,"featured_media":537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[94,95,70],"audience":[],"coauthors":[48],"class_list":["post-535","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-faculty-commentary","tag-cyberwar","tag-data-hacking","tag-international-law"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning - Voices at Temple<\/title>\r\n<meta name=\"description\" content=\"I was asked to write a chapter on an idea I\u2019d been thinking about since 2007 \u2014 whether and when International Humanitarian Law might involve a duty to hack?\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning - Voices at Temple\" \/>\r\n<meta property=\"og:description\" content=\"I was asked to write a chapter on an idea I\u2019d been thinking about since 2007 \u2014 whether and when International Humanitarian Law might involve a duty to hack?\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Voices at Temple\" \/>\r\n<meta property=\"article:published_time\" content=\"2015-09-30T18:01:22+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2016-07-28T15:42:19+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/09\/DataHacking.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"840\" \/>\r\n\t<meta property=\"og:image:height\" content=\"560\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"Duncan B. Hollis\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Duncan B. Hollis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/\"},\"author\":{\"name\":\"Beckie Schatschneider\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#\\\/schema\\\/person\\\/505b7875ef49205bf81379b92d47f94e\"},\"headline\":\"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning\",\"datePublished\":\"2015-09-30T18:01:22+00:00\",\"dateModified\":\"2016-07-28T15:42:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/\"},\"wordCount\":1706,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/DataHacking.png\",\"keywords\":[\"Cyberwar\",\"Data Hacking\",\"International Law\"],\"articleSection\":[\"Faculty Commentary\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/\",\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/\",\"name\":\"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning - Voices at Temple\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/DataHacking.png\",\"datePublished\":\"2015-09-30T18:01:22+00:00\",\"dateModified\":\"2016-07-28T15:42:19+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#\\\/schema\\\/person\\\/505b7875ef49205bf81379b92d47f94e\"},\"description\":\"I was asked to write a chapter on an idea I\u2019d been thinking about since 2007 \u2014 whether and when International Humanitarian Law might involve a duty to hack?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/DataHacking.png\",\"contentUrl\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cms\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/DataHacking.png\",\"width\":840,\"height\":560,\"caption\":\"Data Hacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#website\",\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/\",\"name\":\"Voices at Temple\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/#\\\/schema\\\/person\\\/505b7875ef49205bf81379b92d47f94e\",\"name\":\"Beckie Schatschneider\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g\",\"caption\":\"Beckie Schatschneider\"},\"url\":\"https:\\\/\\\/www2.law.temple.edu\\\/voices\\\/author\\\/rschatsc\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning - Voices at Temple","description":"I was asked to write a chapter on an idea I\u2019d been thinking about since 2007 \u2014 whether and when International Humanitarian Law might involve a duty to hack?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/","og_locale":"en_US","og_type":"article","og_title":"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning - Voices at Temple","og_description":"I was asked to write a chapter on an idea I\u2019d been thinking about since 2007 \u2014 whether and when International Humanitarian Law might involve a duty to hack?","og_url":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/","og_site_name":"Voices at Temple","article_published_time":"2015-09-30T18:01:22+00:00","article_modified_time":"2016-07-28T15:42:19+00:00","og_image":[{"width":840,"height":560,"url":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/09\/DataHacking.png","type":"image\/png"}],"author":"Duncan B. Hollis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Duncan B. Hollis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#article","isPartOf":{"@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/"},"author":{"name":"Beckie Schatschneider","@id":"https:\/\/www2.law.temple.edu\/voices\/#\/schema\/person\/505b7875ef49205bf81379b92d47f94e"},"headline":"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning","datePublished":"2015-09-30T18:01:22+00:00","dateModified":"2016-07-28T15:42:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/"},"wordCount":1706,"commentCount":0,"image":{"@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#primaryimage"},"thumbnailUrl":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/09\/DataHacking.png","keywords":["Cyberwar","Data Hacking","International Law"],"articleSection":["Faculty Commentary"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/","url":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/","name":"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning - Voices at Temple","isPartOf":{"@id":"https:\/\/www2.law.temple.edu\/voices\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#primaryimage"},"image":{"@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#primaryimage"},"thumbnailUrl":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/09\/DataHacking.png","datePublished":"2015-09-30T18:01:22+00:00","dateModified":"2016-07-28T15:42:19+00:00","author":{"@id":"https:\/\/www2.law.temple.edu\/voices\/#\/schema\/person\/505b7875ef49205bf81379b92d47f94e"},"description":"I was asked to write a chapter on an idea I\u2019d been thinking about since 2007 \u2014 whether and when International Humanitarian Law might involve a duty to hack?","breadcrumb":{"@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#primaryimage","url":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/09\/DataHacking.png","contentUrl":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/09\/DataHacking.png","width":840,"height":560,"caption":"Data Hacking"},{"@type":"BreadcrumbList","@id":"https:\/\/www2.law.temple.edu\/voices\/cyber-war-a-duty-to-hack-and-the-boundaries-of-analogical-reasoning\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www2.law.temple.edu\/voices\/"},{"@type":"ListItem","position":2,"name":"Cyber War \u2013 A Duty to Hack and the Boundaries of Analogical Reasoning"}]},{"@type":"WebSite","@id":"https:\/\/www2.law.temple.edu\/voices\/#website","url":"https:\/\/www2.law.temple.edu\/voices\/","name":"Voices at Temple","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www2.law.temple.edu\/voices\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www2.law.temple.edu\/voices\/#\/schema\/person\/505b7875ef49205bf81379b92d47f94e","name":"Beckie Schatschneider","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g9dc77189f33a293d2c82a50cd24ebb9f","url":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/62b6c5fa1068c42262dab498d74cb3fc60fbba8344047dc13348bd3aacf7b70a?s=96&d=mm&r=g","caption":"Beckie Schatschneider"},"url":"https:\/\/www2.law.temple.edu\/voices\/author\/rschatsc\/"}]}},"jetpack_featured_media_url":"https:\/\/www2.law.temple.edu\/voices\/cms\/wp-content\/uploads\/2015\/09\/DataHacking.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts\/535","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/comments?post=535"}],"version-history":[{"count":3,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts\/535\/revisions"}],"predecessor-version":[{"id":539,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/posts\/535\/revisions\/539"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/media\/537"}],"wp:attachment":[{"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/media?parent=535"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/categories?post=535"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/tags?post=535"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/audience?post=535"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.law.temple.edu\/voices\/wp-json\/wp\/v2\/coauthors?post=535"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}