Cyber Collateral Damage

Abstract Unintended damage to non-military targets is typically straightforward to characterize and weigh against anticipated benefits because of well-established definitions, technical assessments, and legal conventions. In a kinetic military context, collateral damage occurs when a hostile action causes physical or property damage to a civilian target. However, collateral effects caused by cyber operations lack formal recognition when they are limited to electronic data, information technology and computing systems, whether caused by conventional military operations, or the result of law enforcement, or private sector operations. Even though there may be tangible consequences stemming from the loss or destruction of data, conventional norms are ill equipped to formally recognize them. Uniquely in the cybersecurity context, tactical operations may have broad systemic “collateral” effects on other important policy priorities that must be accounted for. In short, we lack a clear conceptual vocabulary for cyber operations for both the military operations, as well as for non-military operations, where many cyber activities occur. This research examines this discontinuity by first examining conventional military definitions of “cyber operations,” “collateral damage” and international norms governing operations conducted by lawful participants against military targets. It then examines a number of important similarities and differences between conventional and cyber operations as they relate to damage and injury. Finally, it introduces other contexts for considering collateral damage in the cyber realm, and the way in which other legal and strategic regimes have handled the concept, providing specific examples of these outcomes and guidance for how to think about collateral damage in a range of contexts.