Steps towards Monitoring Cyberarms Compliance
Rowe, Neil C.
Garfinkel, Simson L.
MetadataShow full item record
Cyberweapons are difficult weapons to control and police. Nonetheless, technology is becoming available that can help. We propose here the underlying technology necessary to support cyberarms agreements. Cyberweapons usage can be distinguished from other malicious Internet traffic in that they are aimed precisely at targets which we can often predict in advance and can monitor. Unlike cybercriminals, cyberweapons use will have political goals, and thus attackers will likely not try hard to conceal themselves. Furthermore, cyberweapons are temperamental weapons that depend on flaws in software, and flaws can get fixed. This means that cyberweapons testing will be seen before a serious attack. As well, we may be able to find evidence of cyberweapons on computers seized during or after hostilities since cyberweapons have important differences from other software and are difficult to conceal on their development platforms. Recent advances in quick methods for assessing the contents of a disk drive can be used to rule out irrelevant data quickly. We also discuss methods for making cyberweapons more responsible by attribution and reversibility, and we discuss the kinds of international agreements we need to control them.
This paper appeared in the Proceedings of the 10th European Conference on Information Warfare and Security, Tallinn, Estonia, July 2011.
Showing items related by title, author, creator and subject.
Rowe, Neil C.; Garfinkel, Simson L.; Beverly, Robert; Yannakogeorgos, Panayotis (Monterey, California. Naval Postgraduate School, 2011);A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons ...
Rowe, Neil C. (2009);We discuss the ethical issues of using cyberweapons, software that attacks data and other software during warfare. Many people assume these are relatively benign weapons, but we argue they can create serious harms like ...
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2007);As information warfare capabilities have grown in recent years, the possibilities of war crimes with cyberattacks have increased. The main ethical problems of cyberweapons in regard to ruses, secrecy, and collateral damage ...