IEEE Technology and Society Magazine - September 2016 - 84

plans, ideas, allocations, and plans in plain speech
either as phone conversations, emails, shared documents, or text messages. The abundance of digital information is a new phenomenon in totalitarian states.

Limitations of Traditional Responsibility
to Protect
The high threshold for taking international or unilateral
action to according to the obligations to act according
to principles of responsibility to protect, is that the
action traditionally assumes conventional military
intervention. The compliance enforcement of humanitarian law, driven by the intellectual lineage and precedence started in the UN charter of 1945, is intervention
utilizing military assets. A repressive nation such as
DPRK can, by having a bellicose posture, threaten significant escalation to prevent interference in domestic
affairs, and by doing so avoid interference, even if the
DPRK regime behind the scenes conducts crimes
against humanity [7]. If launched, international military
humanitarian operations would then automatically turn
into to a full-scale conventional war on the Korean peninsula. The DPRK's aggressive stance allows that
repressive state to continue human rights abuses without any intervention.
Over the past decade, as the concept of responsibility
to protect has developed in the U.N. among international
organizations and non-governmental organizations, a
concept of a "moral obligation to act" has surfaced [8].
The international community, and major powers, cannot
silently watch crimes against humanity be perpetrated.
There is a moral obligation to act. This is feasible in
nations with little military resistance to a humanitarian
intervention, such as Rwanda and Sierra Leone. DPRK
can mobilize millions of troops. The majority use obsolete equipment, but they are likely to fight hard as a
result of decades of propaganda and indoctrination.
A relevant question is, then, whether DPRK can nullify responsibility to protect by their confrontational posture. If that is the case, the worst perpetrator wins. This
was already witnessed in the Soviet Stalin terror during
the 1920 and 1930s, where accessible documentation
afterwards is almost non-existent, the witnesses were to
a high degree themselves victims and executed later,
and knowledge of these crimes disappeared over time.
Historians can estimate the number of killed by the
Soviet terror with a granularity of million victims [9], but
very few actual perpetrators can be identified and
linked to their actual actions.

Launching Humanitarian Cyber Operations
Humanitarian cyber operations can play a role in enforcing international humanitarian law and create access to
the secret domains of repressive regimes.

84

Humanitarian cyber operations are launched under
obligations within responsibility to protect, aligned with
the United Nations' framework for intercepting and acting to prevent crimes against humanity. The state that
utilizes humanitarian cyber operations towards another
state declares openly that the state is initiating humanitarian cyber operations in the country of concern.
The open initiation of the humanitarian cyber operations is aligned with responsibility to protect. This avoids
having the upcoming events being seen as acts of war,
and avoids triggering a just and supported-by-international-law declaration of war by the targeted state.
Humanitarian cyber operations will then be allowed
by international law to penetrate the information systems and communication channels of the targeted
nation in the pursuit of information that will either confirm or deny that crimes against humanity are occurring
within the targeted state. The length and size of the
cyber operations is dependent on the initial concern. If
a regime systematically, and in defiance of human
rights, abuses its population, then the established
humanitarian cyber operations continue operating as
long as there is a verified concern.
If a country, known for its systematic human rights
violations, find itself having humanitarian cyber operations launched against its regime by several major
democracies in the international community, the targeted country can appeal in the United Nations.
Humanitarian cyber operations are not a carte blanche to conduct offensive cyber operations. Rather they
follow the mechanisms of conventional military intervention in failing countries and systematic human
rights violation.
There are several benefits of humanitarian cyber
operations:
1) Rapid deployment compared to traditional intervention. Cyber operations can be launched within weeks
compared to months, generating an ability to quickly
gather information.
2) The legal framework is already established in responsibility to protect, Humanitarian cyber operations is
another vehicle to reach the intended results.
3) Humanitarian cyber operations limit the advantage
that bellicose repressive states receive by having
aggressive postures, because these states can not
control their digital footprint.
4) Humanitarian cyber operation can be exclusively utilized by functional democracies that respect human
rights to protect human life and welfare in repressive
states, the repressive states cannot counterstrike at
the same level because that might be an act of war,
with embedded repercussions.
5) There is no kinetic effect or additional violence, such
as a bombing campaign, to soften a repressive regime

IEEE Technology and Society Magazine

∕

september 2016



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - September 2016

IEEE Technology and Society Magazine - September 2016 - Cover1
IEEE Technology and Society Magazine - September 2016 - Cover2
IEEE Technology and Society Magazine - September 2016 - 1
IEEE Technology and Society Magazine - September 2016 - 2
IEEE Technology and Society Magazine - September 2016 - 3
IEEE Technology and Society Magazine - September 2016 - 4
IEEE Technology and Society Magazine - September 2016 - 5
IEEE Technology and Society Magazine - September 2016 - 6
IEEE Technology and Society Magazine - September 2016 - 7
IEEE Technology and Society Magazine - September 2016 - 8
IEEE Technology and Society Magazine - September 2016 - 9
IEEE Technology and Society Magazine - September 2016 - 10
IEEE Technology and Society Magazine - September 2016 - 11
IEEE Technology and Society Magazine - September 2016 - 12
IEEE Technology and Society Magazine - September 2016 - 13
IEEE Technology and Society Magazine - September 2016 - 14
IEEE Technology and Society Magazine - September 2016 - 15
IEEE Technology and Society Magazine - September 2016 - 16
IEEE Technology and Society Magazine - September 2016 - 17
IEEE Technology and Society Magazine - September 2016 - 18
IEEE Technology and Society Magazine - September 2016 - 19
IEEE Technology and Society Magazine - September 2016 - 20
IEEE Technology and Society Magazine - September 2016 - 21
IEEE Technology and Society Magazine - September 2016 - 22
IEEE Technology and Society Magazine - September 2016 - 23
IEEE Technology and Society Magazine - September 2016 - 24
IEEE Technology and Society Magazine - September 2016 - 25
IEEE Technology and Society Magazine - September 2016 - 26
IEEE Technology and Society Magazine - September 2016 - 27
IEEE Technology and Society Magazine - September 2016 - 28
IEEE Technology and Society Magazine - September 2016 - 29
IEEE Technology and Society Magazine - September 2016 - 30
IEEE Technology and Society Magazine - September 2016 - 31
IEEE Technology and Society Magazine - September 2016 - 32
IEEE Technology and Society Magazine - September 2016 - 33
IEEE Technology and Society Magazine - September 2016 - 34
IEEE Technology and Society Magazine - September 2016 - 35
IEEE Technology and Society Magazine - September 2016 - 36
IEEE Technology and Society Magazine - September 2016 - 37
IEEE Technology and Society Magazine - September 2016 - 38
IEEE Technology and Society Magazine - September 2016 - 39
IEEE Technology and Society Magazine - September 2016 - 40
IEEE Technology and Society Magazine - September 2016 - 41
IEEE Technology and Society Magazine - September 2016 - 42
IEEE Technology and Society Magazine - September 2016 - 43
IEEE Technology and Society Magazine - September 2016 - 44
IEEE Technology and Society Magazine - September 2016 - 45
IEEE Technology and Society Magazine - September 2016 - 46
IEEE Technology and Society Magazine - September 2016 - 47
IEEE Technology and Society Magazine - September 2016 - 48
IEEE Technology and Society Magazine - September 2016 - 49
IEEE Technology and Society Magazine - September 2016 - 50
IEEE Technology and Society Magazine - September 2016 - 51
IEEE Technology and Society Magazine - September 2016 - 52
IEEE Technology and Society Magazine - September 2016 - 53
IEEE Technology and Society Magazine - September 2016 - 54
IEEE Technology and Society Magazine - September 2016 - 55
IEEE Technology and Society Magazine - September 2016 - 56
IEEE Technology and Society Magazine - September 2016 - 57
IEEE Technology and Society Magazine - September 2016 - 58
IEEE Technology and Society Magazine - September 2016 - 59
IEEE Technology and Society Magazine - September 2016 - 60
IEEE Technology and Society Magazine - September 2016 - 61
IEEE Technology and Society Magazine - September 2016 - 62
IEEE Technology and Society Magazine - September 2016 - 63
IEEE Technology and Society Magazine - September 2016 - 64
IEEE Technology and Society Magazine - September 2016 - 65
IEEE Technology and Society Magazine - September 2016 - 66
IEEE Technology and Society Magazine - September 2016 - 67
IEEE Technology and Society Magazine - September 2016 - 68
IEEE Technology and Society Magazine - September 2016 - 69
IEEE Technology and Society Magazine - September 2016 - 70
IEEE Technology and Society Magazine - September 2016 - 71
IEEE Technology and Society Magazine - September 2016 - 72
IEEE Technology and Society Magazine - September 2016 - 73
IEEE Technology and Society Magazine - September 2016 - 74
IEEE Technology and Society Magazine - September 2016 - 75
IEEE Technology and Society Magazine - September 2016 - 76
IEEE Technology and Society Magazine - September 2016 - 77
IEEE Technology and Society Magazine - September 2016 - 78
IEEE Technology and Society Magazine - September 2016 - 79
IEEE Technology and Society Magazine - September 2016 - 80
IEEE Technology and Society Magazine - September 2016 - 81
IEEE Technology and Society Magazine - September 2016 - 82
IEEE Technology and Society Magazine - September 2016 - 83
IEEE Technology and Society Magazine - September 2016 - 84
IEEE Technology and Society Magazine - September 2016 - 85
IEEE Technology and Society Magazine - September 2016 - 86
IEEE Technology and Society Magazine - September 2016 - 87
IEEE Technology and Society Magazine - September 2016 - 88
IEEE Technology and Society Magazine - September 2016 - Cover3
IEEE Technology and Society Magazine - September 2016 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com