ABSTRACT

This chapter argues that a way forward in developing an ethics of cyberintelligence, at least insofar as consideration of proportionality is to play a role, is to consider likely reciprocity. It explores this through an analysis of the aforementioned digital sleeper cells. Cyber security is relatively passive, seeking to prevent attacks and espionage through the use of firewalls, monitoring and the development of highly secure systems. Cyber counterintelligence is the more active state of preventing attacks and espionage through the active gathering of intelligence about the terrorist or espionage intentions of adversaries. Cyber intelligence is therefore focused on attacking adversaries in order to gain intelligence on their broader intentions and abilities insofar as these have a bearing on the state. The digital sleeper cell is therefore distinct from more traditional forms of cyberattack such as worms, Trojan horses and phishing attacks. Digital sleeper cells do not have to be used solely for the purpose of sabotage.