To create trust and security in Cyberspace international actors try to set clear rules for the use of cyber weapons. To support this attempt cyber weapons are often compared to nuclear weapons. However, cyber armament has in comparison to conventional nuclear arms control and disarmament one strong advantage. The domain is—in contrast to air, space, sea and land—completely man made, and its rules are based in the code. Every functional principle is defined and created by people or, rather, international committees. These committees develop technologies for cyberspace and decide about their deployment. This provides a strong point for legislation and means that principles can be further established to support the peaceful development of this domain, to create transparency where it’s necessary and to support measures for international political stability. On a national level, recent political debates on the implementation and institutionalization of processes—such as a vulnerabilities equities process that makes decisions about the disclosure of computer security vulnerabilities that are used or held secret by state institutions—will provide important experience for how the assessment of hazardousness and the possible impact of malicious cyber tools can be used for future arms control institutions.
This is a preview of subscription content, access via your institution.
Tax calculation will be finalised at checkout
Purchases are for personal use onlyLearn about institutional subscriptions
Bradner, S. (1999). Internet Engineering Task Force (IETF) (p. 1). Open Sources: Voices from the Open Source Revolution.
DARPA. (2012). Broad Agency Announcement—Foundational Cyberwarfare (Plan X), DARPA-BAA-13–02. Arlington, USA. Retrieved from https://govtribe.com/project/darpa-baa-13-02-foundational-cyberwarfare-plan-x.
Guerrero-Saade, J. A., & Raiu, C. (2017). Walking in your enemy’s shadow: When fourth-party collection becomes attribution hell. In Virus Bulletin Conference.
Goldansky, V. (1988). Connection between horizontal and vertical proliferation of nuclear weapons. In J. Rotblat & L. Valki (Eds.), Coexistence, cooperation and common security. London: Palgrave Macmillan.
IAEA. (1961). The agency’s safeguards. The International Atomic Energy Agency, Geneva, Switzerland. Retrieved from https://www.iaea.org/sites/default/files/publications/documents/infcircs/1961/infcirc26.pdf.
IAEA. (1968). The agency’s safeguard systems. The International Atomic Energy Agency, Geneva, Switzerland. Retrieved from https://www.iaea.org/sites/default/files/publications/documents/infcircs/1965/infcirc66r2.pdf.
IAEA. (2016). Iran and the IAEA: Verification and monitoring under the JCPOA. The International Atomic Energy Agency, Geneva, Switzerland. Retrieved from https://www.iaea.org/sites/default/files/5722627.pdf.
IAEA. (2018a). The statute of the IAEA. The International Atomic Energy Agency, Geneva, Switzerland. Retrieved from https://www.iaea.org/about/statute.
IAEA. (2018b). Statement on Iran by the IAEA Spokesperson on May 1, 2018, Geneva, Switzerland. Retrieved from https://www.iaea.org/newscenter/pressreleases/statement-on-iran-by-the-iaea-spokesperson.
IRTF. (2018). Internet Research Task Force. Retrieved from https://irtf.org/.
Lessig, L. (2006). Code: And other laws of cyberspace, Version 2.0. Center for Internet and Society Standford.
NPT. (1968). Treaty on the non-proliferation of nuclear weapons. Retrieved from https://www.state.gov/documents/organization/141503.pdf.
Mele, S. (2013). Cyber-weapons: Legal and strategic aspects.
Mölling, C., & Neuneck, G. (2001). Präventive Rüstungskontrolle und Information Warfare. In Rüstungskontrolle im Cyberspace. Perspektiven der Friedenspolitik im Zeitalter von Computerattacken, in: Dokumentation einer Internationalen Konferenz der Heinrich-Böll-Stiftung am 29./30. Juni 2001 in Berlin, S. 47–53.
Müller, H., & Schörning, N. (2006). Rüstungsdynamik und Rüstungskontrolle: Eine exemplarische Einführung in die internationalen Beziehungen Nomos, 2006, Aussenpolitik und Internationale Ordnung.
NATO. (2010). Cyber war and cyber power. Issues for NATO doctrine. Rome: NATO Defense College.
Neuneck, G. (2012). Confidence building measures—Application to the cyber domain. In Cyber Security Conference, Berlin.
Neuneck, G. (2017). 60 Jahre nuklearer - Prometheus oder Sisyphos? Vereinte Nationen Magazin, 2017.
NTI. (2010). Treaty between the United States of America and the Russian Federation on measures for the further reduction and limitation of strategic offensive arms (New START). Nuclear Threat Initiative. Retrieved from http://www.nti.org/media/documents/new_start.pdf.
OSCE. (1992). Treaty on Open Skies. Organization for Security and Cooperation in Europe, Vienna, Austria. Retrieved from https://www.osce.org/library/14127.
Robert, K., & Martin, L. (2009). The promise of institutionalist theory. International Security, 20(1), 39–51. http://www.jstor.org/stable/2539214. (Published by : The MIT Press Stable Robert O. Keohane and Lisa L. Martin).
Tikk, E., & Kerttunen, M. (2017). The Alleged Demise of the UN GGE: An Autopsy and Eulogy. New York, The Hague, Tartu, Jyvaskyla: Published by the Cyber Policy Institute.
United Nations. (1969). Vienna Convention on the law of treaties. United Nations. Geneva, Switzerland. Retrieved from https://treaties.un.org/doc/publication/unts/volume%201155/volume-1155-i-18232-english.pdf.
United Nations. (1992). Convention on the prohibition of the development, production, stockpiling and use of chemical weapons and on their destruction. Retrieved from https://treaties.un.org/doc/Treaties/1997/04/19970429%2007-52%20PM/CTC-XXVI_03_ocred.pdf.
US-DOD. (2016). Department of Defense press briefing by Secretary Carter and Gen. Dunford in the Pentagon briefing room from February 29, 2016. Washington, USA. Retrieved from https://www.defence.gov/News/Transcripts/Transcript-View/Article/682341/department-of-defence-press-briefing-by-secretary-carter-and-gen-dunford-in-the/.
US-ICS-CERT. (2016). Alert (IR-ALERT-H-16-056-01) Cyber-attack against Ukrainian critical infrastructure. The U.S. Industrial Control System Computer Emergency Response Team. Retrieved from https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01.
UNIDIR. (2013). The cyber index—International security trends and realities, Geneva, Switzerland. Retrieved from www.unidir.org/files/publications/pdfs/cyber-index-2013-en-463.pdf.
Wassenaar. (1996). The Wassenaar Arrangement on export controls for conventional arms and dual-use goods and technologies, Initial Elements. Retrieved from https://www.wassenaar.org/docs/IE96.html.
Wassenaar. (2017). The Wassenaar Arrangement on export controls for conventional arms and dual-use goods and technologies—List of dual-use goods and technologies and munitions list. Wassenaar Arrangement Secretariat.
Wehberg, H. (1959). Pacta sunt servanda. The American Journal of International Law, 53(4), 529–551.
Editors and Affiliations
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Reinhold, T. (2020). Cyberspace as Military Domain: Monitoring Cyberweapons. In: Feldner, D. (eds) Redesigning Organizations. Springer, Cham. https://doi.org/10.1007/978-3-030-27957-8_20
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-27956-1
Online ISBN: 978-3-030-27957-8