Skip to main content

Advertisement

Log in

Offensive cyber-weapons: technical, legal, and strategic aspects

  • Published:
Environment Systems and Decisions Aims and scope Submit manuscript

Abstract

This paper reviews international technical, legal, strategy, and policy initiatives aimed at providing a legal infrastructure for what transpires over the cyberspace. It provides readers with the understanding required to handle delicate legal and definitional issues, and concludes by examining the role of the international humanitarian law and other UN conventions in further developing international regulatory framework, standards, and norms.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Notes

  1. Yarnell (1998). Also refer to Maitra (1996).

  2. Mandel and Irene (1999). Also refer to Maitra (1997), which defined the requirements for online Shared Supply-Chain Network for Koch-Glitch Professionals worldwide and was designed to serve as an access point to the latest refinery industry news, presentations, supply chain contacts, and events.

  3. Zhang (2003). Also refer to Maitra (2000).

  4. Bradley et al. (2013). Also refer to Maitra (2009) and Glenn (2010).

  5. Maitra’s Internet Solutions for Project Managers, Ibid 3 (Maitra 2000) Chapter 6.

  6. Cerf. Vint. Re-evaluating mission, performance and outcomes, interview article published in Glenn (2010), p. 22.

  7. Botnets are collections of computers injected with malicious code that can be controlled remotely through a command and control infrastructure. A bot is an individual computer infected with malicious code that participates in a botnet and carries out the commands of the botnet controller.

  8. Cyber Terrorist Group ‘Anonymous’ Sends Warning to Banks, Corporations, Power Elite and NATO (2011).

  9. Ibid.

  10. Tiku (2010a).

  11. Tiku (2010b).

  12. Ibid 9.

  13. Defending the Nation from Cyber Attack (Business Executives for National Security) (2012).

  14. Cyber Defence Forum (2012).

  15. Advanced persistent threats: how they work. Symantec. http://www.symantec.com/theme.jsp?themeid=apt-infographic-1.

  16. Hathaway (2009).

  17. Nakashima (2014).

  18. Convention on Cybercrime CETS No: 185. Council of Europe. http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&CL=ENG.

  19. Emm (2009).

  20. A DoS attack floods a server with huge quantities of emails or server requests and the server ultimately collapses. A more advanced DoS attack is known as Distributed Denial of Service (DDoS). Under DDoS attacks, more than one computer is used to send the data or requests to the server. The same laws are applicable for both DoS and DDoS attacks.

  21. UK and Sweden Enact Laws Against Cyber Crimes—Hackers Given A Message: DoS is a Crime. SECURE64. http://www.secure64.com/news-uk-sweden-laws-cyber-crimes.

  22. Ibid.

  23. Ibid.

  24. Cybercrime, Cybersecurity, and Right to Privacy (2014).

  25. Mele (2012).

  26. Ibid.

  27. Mele et al. (2013).

  28. Sanger (2012).

  29. Ibid.

  30. Ibid, supra note 1, at A1.

  31. Ibid.

  32. Fidler (2011).

  33. Clarke (2010).

  34. Paganini (2012).

  35. Falliere et al. (2011).

  36. Paganini (2014a). Also refer to Paganini (2014b).

  37. As referenced in ibid.

  38. Ibid.

  39. Ibid.

  40. Paganini (2014b).

  41. http://www.businesswire.com/news/home/20120917005929/en/Investigation-Points-Flame-Related-Malicious-Programs-Wild.

  42. Crippling Cyber-Attacks Relied on 200,000 Computers (2009). Referenced in Malawer (2010).

  43. Cyberattacks Jam Government and Commercial Web Sites in USA and South Korea (2009). As referenced in Malawer, Ibid.

  44. Perlroth and Hardy (2013).

  45. Ibid.

  46. Ibid.

  47. Paganini, ibid. 37.

  48. Ibid.

  49. Ibid.

  50. Ibid.

  51. Ibid.

  52. Ibid.

  53. Kelly (2012).

  54. More Intelligent, More Effective Cyber-Security Protection (2013), Obama Outlines Coordinated Cyber-Security Plan (2009). Ibid.

  55. “Beyond a cyber command, the Pentagon is grappling with a dizzying array of policy and doctrinal questions involving cyber warfare.” “Questions Stall Pentagon Computer Defenses.” Washington Post, 2010. Also, see Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities (National Academy of Sciences and National Research Council, 2009). http://books.nap.edu/openbook.php?record_id=12651&page=R1. Ibid.

  56. Securing cyberspace for the 44th presidency—a report of the center for strategic and international studies commission on cybersecurity for the 44th presidency (Center for Strategic and International Studies, December 2008). http://csis.org/files/media/csis/pubs/081208_securingcyberspace_44.pdf. Ibid.

  57. Kelly, Ibid.

  58. Ibid.

  59. Ibid.

  60. Estonia has risen to become a thought leader in cyber-domain after sustaining a serious attack across its government sites in 2007.

  61. Mele, Ibid.

  62. Ibid.

  63. Cyber War: War in the Fifth Domain (2010).

  64. Lynn III (2010).

  65. Military Command is Created for Cyber Security (2009).

  66. Paganini, Ibid.

  67. Wolf (2012); also refer to Herzog (2011) and Geers (2011).

  68. Palace Calls for End to Cyber-Attacks Over Panatag Shoal Row (2012).

  69. Ibid.

  70. Cyber War: War in the Fifth Domain, Ibid.

  71. Herzon, Ibid.

  72. The Tallinan Manual (forthcoming, © Cambridge University Press 2013), pending formal publication, its citation is The Rule.

  73. White House (2011).

  74. White House (2009).

  75. U.K. Cabinet Office (2009).

  76. National Academy of Sciences and National Research Council (2009).

  77. Center for Strategic and International Studies (2008).

  78. Mele, Ibid.

  79. Cyber War: War in the Fifth Domain, Ibid.

  80. The Rule. Ibid.

  81. Lele and Samuel (2012).

  82. The Tallinn Manual, © Cambridge University Press 2013.

  83. Mele (2012).

  84. Ibid.

  85. Samuel (2012).

  86. Ibid. Lele and Samuel (2012).

  87. Cyber War: War in the Fifth Domain, Ibid.

References

Download references

Acknowledgments

This report is dedicated to those in government, business, academic, and non-profit communities who protect our sensitive information/data against cyber-attacks and to all of our citizens who ensure the safety and integrity of corporate and institutional databases and through that, the strength of our nation. As the principal author, I have drawn on the work of my peers and colleagues, but there are several to whom I am particularly indebted for their insight on how best to formulate and effectively use key International Law Principles in the new cyberdomain. They are Nitasha Tiku, Melissa Hathaway, Stefano Mele, Pierluigi Paganini, LTC Jan Stinissen, and Suzanne Kelly. I am grateful to Springer Journals Production Editor Noorjahan Ram and her support team who worked with me on the references and footnotes. The most important acknowledgement comes last. My wife, Julie Binder Maitra, has aided me beyond measure. She is my most demanding critic for consistency and traceability of the key points offered in the entire manuscript. She has to be admired and recognized for reading the manuscript several times and for her continued editorial assistance. Revisions and later drafts were largely mine; hence I must assume full responsibility for all erroneous statements and other shortcomings.

Disclaimer

The work on this paper represents the author’s own research and observations and does not reflect any US government agency position vis-à-vis international cyber-law, strategy, and policy.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amit K. Maitra.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Maitra, A.K. Offensive cyber-weapons: technical, legal, and strategic aspects. Environ Syst Decis 35, 169–182 (2015). https://doi.org/10.1007/s10669-014-9520-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10669-014-9520-7

Keywords

Navigation