2013
DOI: 10.1080/15027570.2013.785126
|View full text |Cite
|
Sign up to set email alerts
|

Other-Than-Internet (Oti) Cyberwarfare: Challenges for Ethics, Law, and Policy

Abstract: Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage Á the Internet as a 'vector,' using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them Á thumb drives, CD… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 8 publications
0
2
0
1
Order By: Relevance
“…However, nontechnical components of this method are likely to be inconclusive (i.e., using electronic and human intelligence sources to verify an attacker's identity) or are morally irrelevant (i.e., inferring from means and motive). See Dipert (2013). 42 I am obviously calling into question the legitimacy of punishing for retributive and utilitarian (i.e., deterrence and public order) purposes, and would argue that public safety and reform should be the guiding purposes.…”
Section: Attributionmentioning
confidence: 98%
“…However, nontechnical components of this method are likely to be inconclusive (i.e., using electronic and human intelligence sources to verify an attacker's identity) or are morally irrelevant (i.e., inferring from means and motive). See Dipert (2013). 42 I am obviously calling into question the legitimacy of punishing for retributive and utilitarian (i.e., deterrence and public order) purposes, and would argue that public safety and reform should be the guiding purposes.…”
Section: Attributionmentioning
confidence: 98%
“…In that operation, according to the literature [ 7 , 8 , 9 ], the Israeli air force attacked a Syrian facility without being noticed, thanks to a malicious cyber mechanism installed in the Syrian radar system. One hypothesis raised in the literature [ 7 , 8 , 9 ] regards to the possibility that an Electronic Attack (EA)—i.e., an attack performed in the electromagnetic spectrum—was used to unleash a cyberattack capable of hindering the radar computational process. The EA, in that case, would have been used to send commands to the Syrian air surveillance system, by using the radar receiver as an open door for attack commands.…”
Section: Introductionmentioning
confidence: 99%
“…Apesar das dificuldades para descobrir e dissecar ataques cibernéticos -por vezes mantidos sob sigilo -, o princípio de Efeitos Cinéticos é frequentemente identificado nos casos estudados. Dentre os ataques mais conhecidos, cujos efeitos produzidos/alegados reforçam a pertinência deste princípio, citamos o ataque associado à explosão no gasoduto transiberiano (REED, 2005;CLARK;KNAKE, 2010), o ataque cibernético que apoiou a Operação Orchard (ADEE, 2008;CLARK;KNAKE, 2010;DIPERT, 2013), e o worm Stuxnet (LANGNER, 2011;ZETTER, 2014) que impactou o programa nuclear iraniano.…”
Section: Introductionunclassified