Hostname: page-component-848d4c4894-xm8r8 Total loading time: 0 Render date: 2024-06-14T07:47:07.908Z Has data issue: false hasContentIssue false

Just War Reasoning in an Age of Risk

Published online by Cambridge University Press:  01 January 2024

Esther D. Reed*
Affiliation:
Department of Theology and Religion, University of Exeter, Exeter, EX4 4RJ

Abstract

The classic, theological tradition of just war reasoning (JWT) is not exhausted but needed more than ever in the shadow of global risks, when facing “hybrid” war, and when the difference between war and peace is said to be blurring. The tradition does not speak with one voice but debate within the tradition about the (un)acceptability of military action under conditions of uncertainty sheds light, in at least three ways, on ways of approaching the range of unorthodox tactics threated in conflict today:

  1. 1. How to be fearful. Fear and anxiety in an age of risk are potential threats to reason. The JWT has resources with which to consider “how to fear” wisely.

  2. 2. How to grapple with issues of classification, including what constitutes an attack equivalent to an “armed attack” under UN Charter Art 51. When, for instance, are cyber-attacks better dealt with under civilian, international commercial law, and when the laws of war?

  3. 3. How to approach new challenges in a principled manner. Are different principles or criteria needed to govern action (e.g., the criterion of intensity) or do immediacy and necessity remain the most critically important principles in our moral arsenal?

Type
Original Article
Copyright
Copyright © 2014 The Dominican Council

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

1 Douglas, Mary and Wildavsky, Aaron. Risk and Culture: An essay on the selection of technical and environmental dangers (University of California Press, 1982)Google Scholar.

2 Beck, Ulrich, World Risk Society (Polity Press, 1999)Google Scholar. On this, see Darryl, S.L. and Jarvis, D.S., ‘Risk, Globalisation and the State: A Critical Appraisal of Ulrich Beck and the World Risk Society Thesis’, Global Society, Vol. 21, No. 1, January, 2007, p.23Google Scholar.

3 Beck, World Risk Society, p.333.

5 Preliminary RUSI Briefing: The National Security Strategy 2010, 18 Oct 2010. https://www.rusi.org/analysis/commentary/ref:C4CBC6D8637AB7/#.VARL6EsWA8M (accessed: 19 October, 2014).

6 NSS, 1.32.

7 Christopher Coker, War in an Age of Risk (Polity Press, 2009). For an excellent review, see Claudia Aradau in Ethics and International Affairs, Volume 24.1 (Spring 2010).

8 Coker, War in an Age of Risk, p.73.

9 Coker, War in an Age of Risk, p. ix.

10 Coker, War in an Age of Risk, p.17. Aradnau's summary is useful: “While enmeshed in speculations about the future, the risk society appears to paradoxically lack a future that would radically change the status quo”.

11 Schulte, Paul, “Morality and War” in Oxford Handbook of War (OUP, 2012), p.113Google Scholar.

12 Reed, Esther D., Theology for International Law (T and T Clark, 2013), ch. 5Google Scholar.

13 Tuck, Richard, The Rights of War: Political Thought and the International Order from Grotius to Kant (OUP, 2001)CrossRefGoogle Scholar.

14 Grotius, Hugo, On the Law of War and Peace (LWP), transl. A.C. Campbell (Batoche Books, 2001), Bk II, ch. 1, sec. II, p.61Google Scholar.

15 Grotius, LWP, Bk II, ch. 1, sec. II, p.61.

16 John Chrysostom, Homily 34 on the Gospel of St Matthew 10:23. From Nicene and Post-Nicene Fathers, First Series, Vol. 10. Edited by Philip Schaff. (Buffalo, NY: Christian Literature Publishing Co., 1888.) Revised and edited for New Advent by Kevin Knight http://www.newadvent.org/fathers/200134.htm.

17 Augustine, , The City of God, transl. Dods, Marcus (New York: Random House, 1978), Bk IX, Ch. 5, p. 285Google Scholar.

18 Thomas Aquinas, Summa Theologica (ST) I-II, q. 17, a. 7. Translated by Fathers of the English Dominican Province, 1920. Online Edition Copyright © 2008 by Kevin Knight. http://www.newadvent.org/summa/index.html

19 Aquinas, ST I-II, q. 56, a. 4:

20 Aquinas, ST I-II, q. 17, a. 7:

21 Aquinas, ST I-II, q. 59, a. 5: “But if by passions we understand any movement of the sensitive appetite, it is plain that moral virtues, which are about the passions as about their proper matter, cannot be without passions”.

22 These definitions are given by Reichberg, Gregory M., “Preventive War in Classical Just War Theory”, Journal of the History of International Law 9 (2007) 534, at p. 6CrossRefGoogle Scholar.

23 Raymundus de Pennafort, Summa de poenitentia, et matrimonio, cum glossis Ioannis de Friburgo [ = William of Rennes], part II, § 18, Rome, 1603. Cited in Reichberg, “Preventive War”, p.9.

24 de Pennafort, Summa, ibid.

25 Francisco de Vitoria, Relectio de iure belli; o, Paz dinámica, L. Pereña, V. Abril, C. Baciero, A. García, & F. Maseda, eds., Corpus Hispanorum de Pace VI (Madrid: Consejo Superior de Investigaciones Científicas, 1981). Translation: Vitoria, Francisco de, Political Writings, Pagden, Anthony and Lawrance, Jeremy, eds. (Cambridge University Press, 1991), 295327Google Scholar, § 15. Cited in Reichberg, “Preventive War”, p.15.

26 Gentili, Alberico, De iure belli libri tres (Hanau: G. Antonius, 1612)Google Scholar, I, XIV, pp. 96–107. Cited in Reichberg, “Preventive War”, p.15.

27 Gentili, De iure belli, I, XIV.

28 Gentili, De iure belli, ibid.

29 Grotius, LWP, Bk II, ch. 1, sec. II, p.61.

30 Grotius, LWP, Bk II, ch. 1, sec. III, p.63.

31 Grotius, LWP, Bk II, ch. 1, sec. V, p.65.

32 Grotius, LWP, Bk II, ch. 1, sec. V, p.64. “The danger must be immediate, which is one necessary point. Though it must be confessed, that when an assailant seizes any weapon with an apparent intention to kill me I have a right to anticipate and prevent the danger.”

33 Grotius, LWP, Bk II, ch. 1, sec. XVI, p.69.

34 Grotius, LWP, Bk II, ch. 1, sec. XVII, p.70.

35 Emer de Vattel, Le droit des gens, 1758, in Fenwick, Charles G., The Law of Nations or the Principles of Natural Law, Applied to the Conduct and the Affairs of Nations and of Sovereigns (Washington, D.C.: Carnegie Institution, 1916), §30Google Scholar. Cited in Reichberg, “Preventive War”, p.52.

36 Vattel, Le droit des gens, §44.

37 NSS 3.28.

39 Sam Jones, August 28, 2014. http://www.ft.com/cms/s/2/ea5e82fa-2e0c-11e4-b760--00144feabdc0.html#axzz3CQPNClOw (accessed 19 October, 2014).

40 Sam Jones, ibid. N.b.: Three “cyber” cases have been much discussed in recent literature: Estonia & NATO, April 2007, where, in response to the moving of a Soviet War Memorial, hackers began interfering with Estonian government websites through distributed denial of service attacks; Georgia-Russia, 2008, which was the known use of the internet during a conventional armed conflict to interfere with civilian use of the internet; Stuxnet, 2009–2010, when a computer worm infected computers used in the Iranian nuclear programme.

41 See O'Connell, Mary Ellen, “Cyber Security without Cyber War”, Journal of Conflict & Security Law (2012), Vol. 17 No. 2, 187209, at p.196CrossRefGoogle Scholar.

42 For a useful summary of the most pertinent questions, see Schmitt, Michael N., “Cyber Operations and the Jus ad Bellum Revisited”, Villanova Law Review (2011), Vol. 56, 569605Google Scholar.

43 Schmitt, Michael N., Ed., The Tallinn Manual on the International Law Applicable to Cyber Warfare (CUP, 2013)CrossRefGoogle Scholar.

44 The Tallinn Manual, p.48.

45 Lovin, Robin, “Security and the State: a Christian Realist Perspective on the World since 9/11” in Reed, Esther D. and Dumper, Michael, eds, Civil Liberties, National Security and Prospects for Consensus: Legal, Philosophical and Religious Perspectives (CUP, 2014)Google Scholar.

46 Mary Ellen O'Connell, “Cyber Security and International Law”, Chatham House 29 May, 2013. http://www.chathamhouse.org/sites/files/chathamhouse/public/Research/International%20Law/290512summary.pdf (accessed 19 October, 2014).

47 O'Connell, ibid.

48 Schmitt, Michael, “Classification of Cyber Conflict”, Law Journal of Conflict and Security Law Vol. 17, 2, 245260, at p.259CrossRefGoogle Scholar.

49 Schmitt, “Classification of Cyber Conflict”, p.260.