Skip to main content

2018 | OriginalPaper | Buchkapitel

13. Warfare of the Future

verfasst von : Sara M. Smyth

Erschienen in: Cyber Weaponry

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter discusses implications of cyber war with regard to critical infrastructure, primarily arrangements that relate to industrial control systems and processes that operate power, water, communications, manufacturing, and many other essential functions. The chapter explores the potential for disruption, espionage, and sabotage by rogue individuals, states, or sub-state adversaries. It discusses methods to help safeguard against these attacks as well as looking at the technical obstacles that arise because of the integrated nature of government and private-sector networks. The chapter contemplates the laws of armed conflict and the issue of whether a cyber-attack against the United States is of such magnitude to be considered an armed attack, so as to trigger the lawful exercise of the right of self-defence. The intention is to show that cyber-warfare is all-encompassing and cannot easily be categorized into nation-state, military, or civilian categories. The question of whether such attacks constitute the use of force and the lack of clarity around issues of attribution and detection suggests that traditional legal principles governing war need to be reassessed in the new era of cyber-warfare.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The Internet was created in the late-1960s from a project started by the Defense Advanced Research Projects Agency (DARPA), as part of the American military infrastructure, which was part of a larger experiment to connect computers across the United States. The founding engineers created a network built of many nodes, each connected to other nodes, so that it would be possible to use various routes without any degradation in the quality of the transmission. From this modest beginning, the Internet has grown into an enormous global network, with most of the supporting infrastructure in the hands of private commercial entities.
 
2
United Nations, Charter of the United Nations, 24 October 1945 [hereinafter “the Charter”].
 
3
United Nations, Charter of the United Nations, 24 October 1945, art. 42.
 
4
United Nations, Charter of the United Nations, 24 October 1945, art. 51.
 
5
US Patriot Act, Pub. L. No. 107–56, 115 Stat. 272 (2001). Note that the following sectors have been identified as critical infrastructure: agriculture, food, water, public health, emergency services, defense industrial base, government, information and telecommunications, energy, transportation, banking and finance, chemical industry and hazardous materials, and postal and shipping.
 
Literatur
Zurück zum Zitat Blank LR (2013) International law and cyber threats from non-state actors. Int Law Stud 89:406 Blank LR (2013) International law and cyber threats from non-state actors. Int Law Stud 89:406
Zurück zum Zitat Buchan R (2012) Cyber attacks: unlawful uses of force or prohibited interventions? J Confl Secur Law 17, 211 Buchan R (2012) Cyber attacks: unlawful uses of force or prohibited interventions? J Confl Secur Law 17, 211
Zurück zum Zitat Carr J (2010) Cyber warfare: mapping the cyber underworld, 1st edn Carr J (2010) Cyber warfare: mapping the cyber underworld, 1st edn
Zurück zum Zitat Dinstein Y (2013) Cyber war and international law: concluding remarks at the 2012 Naval War College international law conference. Int Law Stud 89:276 Dinstein Y (2013) Cyber war and international law: concluding remarks at the 2012 Naval War College international law conference. Int Law Stud 89:276
Zurück zum Zitat Etzioni A (2014) The private sector – a reluctant partner in cybersecurity. Georgetown J Int Aff 15:69 Etzioni A (2014) The private sector – a reluctant partner in cybersecurity. Georgetown J Int Aff 15:69
Zurück zum Zitat Hahn RW, Laney-Ferrer A (2006) The law and economics of software security. Harv J Law Public Policy 30:282 Hahn RW, Laney-Ferrer A (2006) The law and economics of software security. Harv J Law Public Policy 30:282
Zurück zum Zitat Harris S (2014) @ War – the rise of the military internet complex. First Mariner Books, New York Harris S (2014) @ War – the rise of the military internet complex. First Mariner Books, New York
Zurück zum Zitat Harris S (2015) @ War – the rise of the military internet complex. Houghton Mifflin Harcourt, New York Harris S (2015) @ War – the rise of the military internet complex. Houghton Mifflin Harcourt, New York
Zurück zum Zitat Hughes R (2010) A treaty for cyberspace. Int Aff 86:523 Hughes R (2010) A treaty for cyberspace. Int Aff 86:523
Zurück zum Zitat Ignatieff M (2000) Virtual war. Picador USA, New York Ignatieff M (2000) Virtual war. Picador USA, New York
Zurück zum Zitat Joy B (2000) Why the future doesn’t need us. Wired, April 1 Joy B (2000) Why the future doesn’t need us. Wired, April 1
Zurück zum Zitat Kelson R, Paganini P, Gittins B, Pace D (2012) The cyber war era began long ago,” The Malta Independent Online, June 25 Kelson R, Paganini P, Gittins B, Pace D (2012) The cyber war era began long ago,” The Malta Independent Online, June 25
Zurück zum Zitat Kutner M (2016) Alleged dam hacking raises fears of cyber threats to infrastructure. March 30 Kutner M (2016) Alleged dam hacking raises fears of cyber threats to infrastructure. March 30
Zurück zum Zitat Lessig L (2004) Insanely destructive devices. Wired, April 1 Lessig L (2004) Insanely destructive devices. Wired, April 1
Zurück zum Zitat Lipovsky R, Cherepanov A (2016) BlackEnergy Trojan strikes again: attacks Ukrainian electric power industry,” Welivesecurity, January 4 Lipovsky R, Cherepanov A (2016) BlackEnergy Trojan strikes again: attacks Ukrainian electric power industry,” Welivesecurity, January 4
Zurück zum Zitat O’Connell ME (2012) Cyber security without cyber war. J Confl Secur Law 17(2):187 O’Connell ME (2012) Cyber security without cyber war. J Confl Secur Law 17(2):187
Zurück zum Zitat Padmanabhan VM (2013) Cyber warriors and the jus in bello. Int Law Stud 89:288 Padmanabhan VM (2013) Cyber warriors and the jus in bello. Int Law Stud 89:288
Zurück zum Zitat Pool P (2013) War of the cyber world: the law of cyber warfare. Int Lawyer 47:299 Pool P (2013) War of the cyber world: the law of cyber warfare. Int Lawyer 47:299
Zurück zum Zitat Preciado M (2012) If you wish cyber peace, prepare for cyber war: the need for the federal government to protect critical infrastructure from cyber warfare. J Law Cyber Warfare 1:99 Preciado M (2012) If you wish cyber peace, prepare for cyber war: the need for the federal government to protect critical infrastructure from cyber warfare. J Law Cyber Warfare 1:99
Zurück zum Zitat Schneier B (2000) Secrets and lies: digital security in a networked world. Wiley Computer Publishing, New York Schneier B (2000) Secrets and lies: digital security in a networked world. Wiley Computer Publishing, New York
Zurück zum Zitat Symantec (2016a) Internet security threat report. vol.21, April Symantec (2016a) Internet security threat report. vol.21, April
Zurück zum Zitat Turns D (2012) Cyber warfare and the notion of direct participation in hostilities. J Confl Secur Law 17:279–297 Turns D (2012) Cyber warfare and the notion of direct participation in hostilities. J Confl Secur Law 17:279–297
Zurück zum Zitat Walker P (2013) Organizing for cyberspace operations: selected issues. Int Law Stud 89:341 Walker P (2013) Organizing for cyberspace operations: selected issues. Int Law Stud 89:341
Zurück zum Zitat Whigham N (2016) Alex Gibney film gives chilling insight into the world of state sponsored cyber warfare unleashed by Stuxnet. July 11, http://news.com.au Whigham N (2016) Alex Gibney film gives chilling insight into the world of state sponsored cyber warfare unleashed by Stuxnet. July 11, http://​news.​com.​au
Zurück zum Zitat Wittes B, Blum G (2015) The future of violence. Basic Books, New York Wittes B, Blum G (2015) The future of violence. Basic Books, New York
Zurück zum Zitat Weiss J (2017) Industrial control systems: the holy grail of cyberwar. The Christian Science Monitor, March 24 Weiss J (2017) Industrial control systems: the holy grail of cyberwar. The Christian Science Monitor, March 24
Metadaten
Titel
Warfare of the Future
verfasst von
Sara M. Smyth
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-74107-9_13