The misunderstood acronym: Why cyber weapons aren’t WMD

@article{Carr2013TheMA,
  title={The misunderstood acronym: Why cyber weapons aren’t WMD},
  author={Jeffrey Carr},
  journal={Bulletin of the Atomic Scientists},
  year={2013},
  volume={69},
  pages={32 - 37}
}
  • Jeffrey Carr
  • Published 1 September 2013
  • Political Science
  • Bulletin of the Atomic Scientists
The potential effect of a digital, or cyber, weapon used against a network is directly proportional to how much a given population relies upon that network. The widespread denial of essential services caused by a network attack, the author writes, could lead indirectly to bodily harm and loss of life, through rioting or other violence. As of now, however, a cyber weapon cannot directly injure or kill human beings as efficiently as guns or bombs, and there is no evidence to support a claim that… 

Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework

The paper will offer a comprehensive analysis of the characteristics and limitations of OCWC, arguing that military conflicts are unlikely to be won solely by cyber weapons, and presents the first iteration of an analytic framework designed to provide a customized estimate of the desirability of OC WC acquisition for individual small states.

Dual-Use and Dilemmas for Cybersecurity, Peace and Technology Assessment

Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regulation help to mitigate the

AI and International Security- the Case of AWS’ and Collective Security System

The chapter examines the relationship between Autonomous Weapons Systems -AWS’s—and the collective security system. The argument is that the goals of the collective security system impose

Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today

The purpose of this chapter is to evaluate the threat Cyber Terrorism poses to the stability of the international community and to explore the concept of Cyber Terrorism, its interpretations and terminology.

Kybernetická zbraň: Přístupy k její definici

Odhaleni pocitacoveho cerva Stuxnet v roce 2010 lze oznacit za zlomový okamžik, který zintenzivnil debaty o kybernetických zbranich. K těm je v odborne literatuře přistupovano různými způsoby, proto

References

SHOWING 1-10 OF 13 REFERENCES

Inside cyber warfare

The second edition of Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet.

Are Cyber-Weapons Effective?

When news of Stuxnet first emerged, many thought that it had caused a major setback to Iran's uranium-enrichment programme. Ivanka Barzashka argues instead that while Stuxnet may have had the

Are cyber-weapons effective? Assessing StuxnetÕs impact on the Iranian enrichment programme

  • RUSI Journal
  • 2013

The Farewell Dossier: Duping the Soviets. CIA historical document

  • 2007

Sources: Staged cyber attack reveals vulnerability in power grid

  • CNN.com

Kazakhstan: The alleged killers of journalist Gennady PavlyukÑknown Kyrgyz special services officer

    Staged cyber attack reveals vulnerability in power grid. Available at: www.youtube. com/watch?v¼fJyWngDco3g

    • 2007

    Shamoon the Wiper: Copycats at work. Available at: www.securelist.com/en/ blog?

    • 2012

    Combating weapons of mass destruction

    • Joint Chiefs of Staff

    The Dubai job. GQ