Steps towards Monitoring Cyberarms Compliance

Download
Author
Rowe, Neil C.
Garfinkel, Simson L.
Beverly, Robert
Yannakogeorgos, Panayotis
Date
2011-07Metadata
Show full item recordAbstract
Cyberweapons are difficult weapons to control and police. Nonetheless, technology is becoming available that can help.
We propose here the underlying technology necessary to support cyberarms agreements. Cyberweapons usage can be
distinguished from other malicious Internet traffic in that they are aimed precisely at targets which we can often predict in
advance and can monitor. Unlike cybercriminals, cyberweapons use will have political goals, and thus attackers will likely
not try hard to conceal themselves. Furthermore, cyberweapons are temperamental weapons that depend on flaws in
software, and flaws can get fixed. This means that cyberweapons testing will be seen before a serious attack. As well, we
may be able to find evidence of cyberweapons on computers seized during or after hostilities since cyberweapons have
important differences from other software and are difficult to conceal on their development platforms. Recent advances in
quick methods for assessing the contents of a disk drive can be used to rule out irrelevant data quickly. We also discuss
methods for making cyberweapons more responsible by attribution and reversibility, and we discuss the kinds of
international agreements we need to control them.
Description
This paper appeared in the Proceedings of the 10th European Conference on Information Warfare and Security, Tallinn,
Estonia, July 2011.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Challenges in Monitoring Cyberarms Compliance
Rowe, Neil C.; Garfinkel, Simson L.; Beverly, Robert; Yannakogeorgos, Panayotis (Monterey, California. Naval Postgraduate School, 2011);A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons ... -
The Ethics of Cyberweapons in Warfare
Rowe, Neil C. (2009);We discuss the ethical issues of using cyberweapons, software that attacks data and other software during warfare. Many people assume these are relatively benign weapons, but we argue they can create serious harms like ... -
War Crimes from Cyberweapons
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2007);As information warfare capabilities have grown in recent years, the possibilities of war crimes with cyberattacks have increased. The main ethical problems of cyberweapons in regard to ruses, secrecy, and collateral damage ...