Lesson 2 Progress Check _ WAR-961S Ethics of Emerging Military Technologies

pdf

School

Air University *

*We aren’t endorsed by this school

Course

601S

Subject

Philosophy

Date

Jan 9, 2024

Type

pdf

Pages

8

Uploaded by PresidentLlama3892

Report
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 1/8 Lesson 2 Progress Check Due No due date Points 100 Questions 10 Time Limit 15 Minutes Allowed Attempts Unlimited Instructions Attempt History Attempt Time Sco LATEST Attempt 1 (https://canvas.asu.edu/courses/153180/quizzes/1151413/history? version=1) 13 minutes 80 o of 1 Correct answers are hidden. Score for this attempt: 80 out of 100 Submitted Dec 23 at 2:23am This attempt took 13 minutes. This quiz checks your understanding of lesson concepts. This is a timed assessment. You are allowed multiple attempts. Minimum passing score is 80%. Take the Quiz Again (https://canvas.asu.edu/courses/153180/quizzes/1151413/take? user_id=486526) 10 / 10 pts Question 1 According to Cook, the threat of cyberwar raises moral concerns akin to those raised by the prospect of a nuclear exchange. Prominent among these concerns _______________
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 2/8 Is the question of whether cyber-supremacy, or even cyber-superiority, is achievable. is the question of whether one may threaten to do what it is immoral to do. Answer is correct. Cook writes on page 18, “[T]he threat of cyberwar reinvigorates an important question posed during the waning years of the Cold War” may one morally threaten to do what would be immoral if one in fact did it?” (Emphasis is in the original.) is the matter of counter-value cyber-strikes. is the worry over a “cyber winter.” 10 / 10 pts Question 2 According to Dipert’s “The Ethics of Cyberwar,” cyber conflict poses epistemic challenges that are absent in more conventional conflicts. Among these is _______________ the conundrum of legitimacy. the conundrum of unintended consequences. the problem of “the one and the many.” the problem of attribution. Answer is correct. Dipert writes on page 385, “[I]t is very difficult to determine the source of cyberattacks: this is the ‘attribution problem. . . .” He notes on page 393 that this is one of a set of epistemic problems.
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 3/8 0 / 10 pts Question 3 Incorrect Incorrect According to Cook, there are several reasons why cyber war may be morally special. Which choice below best captures some of these reasons? Cyber may change our understanding of reality; cyber threats do not, fortunately, pervade time. Answer is incorrect. Cook writes on page 27, “Phenomenologically, it is quite possible to devote increasingly more of oneself to the experience of a reality filtered through others’ consciousnesses or even through realities that are generated independently of human authorship.” He writes on page 31, “[cyberwar] may . . . be morally unique because of three characteristics. The first is ubiquity. . . . Normally we call something ubiquitous if it is present nearly everywhere or very frequently. It is most natural to think of presence spatially, but ubiquity can have a temporal dimension, as when one never finds a moment’s respite from something such as an unwanted memory.” (Emphasis in the original.) Cyber may change our understanding of reality; cyber threats pervade time. Cyber cannot change our understanding of reality; cyber threats pervade time. Cyber warfare may be uncontrollable; cyber threats do not, fortunately, pervade time. 10 / 10 pts Question 4
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 4/8 According to Dipert’s “Distinctive Ethical Issues of Cyberwarfare,” two of the traditional criteria for going to war ( jus ad bellum ) are particularly ill- suited to cyberwar. They are ________________ just cause and probability of success. just cause and last resort. Answer is correct. Dipert writes on page 65: “Of the four core principles of just war theory for going to war – initiating the use of force – two are especially problematic for some forms of cyberwarfare. The four are just cause, last resort, probability of success, and proportionality. The widely accepted “high” barrier for just cause – namely armed invasion by an enemy with an intention to use lethal force – does not seem to apply to many forms of cyberwarfare. Likewise, cyberwarfare is not necessarily a last resort. That would continue to be the use of lethal force or force that brings extensive permanent destruction.” last resort and probability of success. just cause and proportionality. 10 / 10 pts Question 5 According to Dipert’s “Distinctive Ethical Issues of Cyberwarfare,” the lack of agreement over the foundations of the just war tradition _______________ suggests that ethical concerns about conflict are misplaced. is particularly serious for cyberwar.
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 5/8 Answer is correct. Dipert writes on page 57, “The lack of agreement about [just war] foundations is . . . especially problematic for cyberwarfare.” matters little for cyberwar. shows that just war thinking is unfounded. 10 / 10 pts Question 6 According to Cook, cyberwar may be different from other kinds of war for several reasons. One of these _________________ is that it never involves kinetic effects. is that it is not “politics with other means” in von Clausewitz’s sense. is that frequently there is no good understanding of sovereignty in cyberspace. Answer is correct. Cook writes on page 20, “Cyberwar may seem different from other kinds of war because often there is no clear sense of sovereignty to cyberspace, either of actors or territory, as there tends to be in more traditional realms of conflict, such as land, sea, air, and even space.” is that the just war tradition cannot accommodate it. 10 / 10 pts Question 7 According to Dipert’s “Distinctive Ethical Issues of Cyberwarfare,” ____________
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 6/8 most political theorists and leaders have rejected cyberwar, as have most ethicists. most ethicists have rejected deterrence, while most political theorists and leaders have not. Answer is correct. Dipert writes on page 64, “Ethical theories of war have oddly ignored certain game-theoretic results, and so they have generally rejected ‘realist’ approaches that form one of the major schools of international relations. In particular, philosophers have rejected deterrent strategies, including Mutually Assured (nuclear) Destruction, while most geopolitical thinkers and leaders have endorsed them.” most political theorists and leaders have rejected deterrence, while most philosophers have not. Most political theorists and leaders have rejected deception, as have most ethicists. 10 / 10 pts Question 8 According to Franz, ______________ it is not necessary to understand the function a network performs in order to defend it.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 7/8 the communications career field has historically been oriented toward maintaining technical infrastructure; the cyber community should now focus on the mission(s) that infrastructure support(s) as well. Answer is correct. Franz writes on page 94, “Unfortunately, the ‘comm’ culture historically has placed more emphasis on the health and availability of the network than on the mission for which it exists. We do need our cyber defenders to have expertise in the technologies of their networks; we also need them to have expertise in the supported missions. . . .” the communications career field has historically been oriented toward the mission(s) its infrastructure supports and the cyber community. cyberwar professionals should not specialize in particular technical areas as most technology becomes obsolete. 10 / 10 pts Question 9 Cancian offers a number of reasons to support his assertion that cyberwarriors should not be in the Marine Corps. Which response below best captures one of his reasons? Cyberwarriors don’t face personal danger. Answer is correct. Cancian writes on his second page, "Cyber warriors don’t exert lethal force and don’t face personal danger." Many of the most talented cyber professionals struggle to meet Marine Corps physical fitness standards. Many of the most talented cyber professionals disdain military service.
12/23/23, 12:23 PM Lesson 2 Progress Check : WAR-961S Ethics of Emerging Military Technologies https://canvas.asu.edu/courses/153180/quizzes/1151413 8/8 Many of the most talented cyber professionals do not share the Marines’ core values. 0 / 10 pts Question 10 Incorrect Incorrect According to Beard, there are several reasons why the traditional code of the warrior is hard to apply to cyber conflict. Which response below best captures one of the reasons? The traditional code is overly broad. The traditional code is too imprecise to reflect the realities of cyber conflict. The traditional warrior and the cyberwarrior do not share a common teleology. Answer is incorrect. Beard writes on page 148, “conventional war and cyberwar can, and often will, share a common teleology; and similarly, conventional warriors and cyberwarriors may at times be committed to achieving the same goals. . . .” The traditional code is too narrow to capture the spectrum of activity in cyber conflict. Quiz Score: 80 out of 100