2010
DOI: 10.4018/jte.2010081002
|View full text |Cite
|
Sign up to set email alerts
|

The Ethics of Cyberweapons in Warfare

Abstract: The author discusses the ethical issues of using cyberweapons, software that attacks data and other software during warfare. Many people assume these are relatively benign weapons, but we argue that they can create serious harms like any weapon. He defines cyberweapons and describes them in general terms, and survey their status as per the laws of war. He then discusses the unreliability of cyberweapons, the problem of collateral damage, and the associated problems of damage assessment, maintenance of secrecy,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 23 publications
0
4
0
Order By: Relevance
“…It now appears that some cyber-weapons can be highly discriminating Á more precise even than precision bombing. This is contrary to the position taken as recently as Rowe (2009). Discriminating attacks in cyberwarfare have been those on Syria and in the case of Stuxnet.…”
Section: Legal and Further Ethical Considerationsmentioning
confidence: 50%
“…It now appears that some cyber-weapons can be highly discriminating Á more precise even than precision bombing. This is contrary to the position taken as recently as Rowe (2009). Discriminating attacks in cyberwarfare have been those on Syria and in the case of Stuxnet.…”
Section: Legal and Further Ethical Considerationsmentioning
confidence: 50%
“…Computer science professor and cyber expert, Neil Rowe (2007Rowe ( , 2008Rowe ( , 2010Rowe ( , 2011, for example, has published several papers raising an alarm that the weapons and tactics frequently and (from the standpoint of ethics, at least) unreflectively envisioned as part of any routine preparation to wage or defend against cyber war are aimed at civilians, and that their use would cause widespread destruction of lives and property, and otherwise inflict surprisingly massive and terrible suffering among the civilian population of the target state. Such cyber strategy is thus, he argues, inherently a violation of LOAC.…”
Section: Ethics and Cyber Conflictmentioning
confidence: 99%
“…A decoy can also be equipped with more detailed monitoring of its usage that would not be possible for most sites, and should use honeypot technology to implement attack resilience and intelligence-gathering capabilities that are not easily disabled. Decoys do not generally raise ethical concerns because they are passive, but guidelines should be followed in their use (Rowe, 2010) since decoys are also used by phishers.…”
Section: Network Monitoring For Cyberweaponsmentioning
confidence: 99%
“…They seem to require fewer resources to mount since their delivery can be accomplished in small payloads such as malicious devices or packets that can be primarily delivered through existing infrastructure such as the Internet. They also seem "cleaner" than conventional weapons in that their damage is primarily to data and data can be repaired, although they are difficult to control and usually entail actions close to perfidy, something outlawed by the laws of war (Rowe, 2010). Cyberweapons can be developed with modest technological infrastructure, even…”
Section: Introductionmentioning
confidence: 99%