The misunderstood acronym: Why cyber weapons aren’t WMD
@article{Carr2013TheMA, title={The misunderstood acronym: Why cyber weapons aren’t WMD}, author={Jeffrey Carr}, journal={Bulletin of the Atomic Scientists}, year={2013}, volume={69}, pages={32 - 37} }
The potential effect of a digital, or cyber, weapon used against a network is directly proportional to how much a given population relies upon that network. The widespread denial of essential services caused by a network attack, the author writes, could lead indirectly to bodily harm and loss of life, through rioting or other violence. As of now, however, a cyber weapon cannot directly injure or kill human beings as efficiently as guns or bombs, and there is no evidence to support a claim that…
5 Citations
Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework
- SociologyPAISI
- 2016
The paper will offer a comprehensive analysis of the characteristics and limitations of OCWC, arguing that military conflicts are unlikely to be won solely by cyber weapons, and presents the first iteration of an analytic framework designed to provide a customized estimate of the desirability of OC WC acquisition for individual small states.
Dual-Use and Dilemmas for Cybersecurity, Peace and Technology Assessment
- Political ScienceInformation Technology for Peace and Security
- 2019
Dual-use in information technology is a pressing issue: how can we prevent, control or manage the risk of a harmful application of IT? How can dual-use awareness and regulation help to mitigate the…
AI and International Security- the Case of AWS’ and Collective Security System
- Political ScienceLaw, Governance and Technology Series
- 2021
The chapter examines the relationship between Autonomous Weapons Systems -AWS’s—and the collective security system. The argument is that the goals of the collective security system impose…
Attack Scenarios Perpetrated by Terrorist Organizations Through the Use of IT and ICT: On the Basis of What Is Already Available Today
- Political Science, Computer Science
- 2016
The purpose of this chapter is to evaluate the threat Cyber Terrorism poses to the stability of the international community and to explore the concept of Cyber Terrorism, its interpretations and terminology.
Kybernetická zbraň: Přístupy k její definici
- 2020
Odhaleni pocitacoveho cerva Stuxnet v roce 2010 lze oznacit za zlomový okamžik, který zintenzivnil debaty o kybernetických zbranich. K těm je v odborne literatuře přistupovano různými způsoby, proto…
References
SHOWING 1-10 OF 13 REFERENCES
Inside cyber warfare
- Computer Science
- 2011
The second edition of Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet.
Are Cyber-Weapons Effective?
- Geology
- 2013
When news of Stuxnet first emerged, many thought that it had caused a major setback to Iran's uranium-enrichment programme. Ivanka Barzashka argues instead that while Stuxnet may have had the…
Are cyber-weapons effective? Assessing StuxnetÕs impact on the Iranian enrichment programme
- RUSI Journal
- 2013
The Farewell Dossier: Duping the Soviets. CIA historical document
- 2007
Sources: Staged cyber attack reveals vulnerability in power grid
- CNN.com
Kazakhstan: The alleged killers of journalist Gennady PavlyukÑknown Kyrgyz special services officer
Staged cyber attack reveals vulnerability in power grid. Available at: www.youtube. com/watch?v¼fJyWngDco3g
- 2007
Shamoon the Wiper: Copycats at work. Available at: www.securelist.com/en/ blog?
- 2012
Combating weapons of mass destruction
- Joint Chiefs of Staff