Skip to main content

Lessons from Stuxnet and the Realm of Cyber and Nuclear Security: Implications for Ethics in Cyber Warfare

  • Chapter
  • First Online:
Ethics and Policies for Cyber Operations

Part of the book series: Philosophical Studies Series ((PSSP,volume 124))

Abstract

This commentary examines Stuxnet and the realm of cyber and nuclear security more broadly, looking at what the sector can teach us about ethics in cyber warfare. It considers five key ethical questions: First, it evaluates whether a cyber weapon can be ethical if it is used for a purpose that the majority of the international community would consider “good”. Second, it looks at whether it is ethical for companies (or individuals) to sell zero-day or other vulnerabilities and exploits which can be used for cyber warfare. Third, it assesses whether it is ethical to freely share (or sell) tools designed for “good” purposes that also make it easier to engage in cyber attacks on critical infrastructure and other targets. Fourth, it deliberates whether profit-focused entities, like nuclear facilities or equipment vendors, can be trusted to invest sufficiently in cyber defence. Fifth, it discusses whether governments are at times too focused on short-term benefits—including trade deals and gaining electorate support—without contemplating the long-term consequences for cyber security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.chathamhouse.org/publication/cyber-security-civil-nuclear-facilities-understanding-risks

  2. 2.

    http://www.theregister.co.uk/2013/07/08/snowden_us_israel_stuxnet/

  3. 3.

    http://www.independent.co.uk/life-style/gadgets-and-tech/news/russian-nuclear-power-plant-infected-by-stuxnet-malware-says-cybersecurity-expert-8935529.html

  4. 4.

    http://www.theregister.co.uk/2013/11/11/kaspersky_nuclear_plant_infected_stuxnet/

  5. 5.

    http://www.technologyreview.com/news/429173/stuxnet-tricks-copied-by-computer-criminals/

  6. 6.

    http://money.cnn.com/2015/10/15/technology/isis-energy-grid/

  7. 7.

    http://www.express.co.uk/news/uk/625470/Britain-power-grid-risk-ISIS-terror-attack-kill-thousands

  8. 8.

    http://www.wsj.com/articles/SB123914805204099085

  9. 9.

    https://www.eastwest.ngo/sites/default/files/A%20Measure%20of%20Restraint%20in%20Cyberspace.pdf

  10. 10.

    http://www.un.org/ga/search/view_doc.asp?symbol=A/70/174

  11. 11.

    http://www.forbes.com/sites/thomasbrewster/2015/10/21/scada-zero-day-exploit-sales/#6d149a77d96c

  12. 12.

    http://searchsecurity.techtarget.com/feature/Private-market-growing-for-zero-day-exploits-and-vulnerabilities

  13. 13.

    http://www.reuters.com/article/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510

  14. 14.

    http://www.wired.com/2012/01/scada-exploits/

  15. 15.

    http://thirdcertainty.com/qa/shodan-search-engine-exposes-built-vulnerabilties/

  16. 16.

    http://www.csoonline.com/article/2867407/network-security/shodan-exposes-iot-vulnerabilities.html

  17. 17.

    http://money.cnn.com/2013/04/08/technology/security/shodan/index.html

  18. 18.

    http://edocs.nps.edu/npspubs/institutional/newsletters/strategic%20insight/2011/SI-v10-I1_Kesler.pdf

  19. 19.

    http://www.theguardian.com/environment/2014/mar/11/russian-nuclear-firm-build-power-station-uk

  20. 20.

    http://www.theguardian.com/uk-news/2016/may/13/russias-state-owned-nuclear-group-keen-to-break-into-uk-market

  21. 21.

    http://www.theguardian.com/politics/2015/sep/25/george-osborne-presses-on-with-hinkley-power-station-despite-criticism

  22. 22.

    http://www.theguardian.com/world/2015/oct/21/xi-jinping-poised-to-sign-nuclear-deal-as-uk-seeks-to-clinch-30bn-of-contracts

  23. 23.

    http://www.bbc.com/news/business-34587650

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Caroline Baylon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Baylon, C. (2017). Lessons from Stuxnet and the Realm of Cyber and Nuclear Security: Implications for Ethics in Cyber Warfare. In: Taddeo, M., Glorioso, L. (eds) Ethics and Policies for Cyber Operations. Philosophical Studies Series, vol 124. Springer, Cham. https://doi.org/10.1007/978-3-319-45300-2_12

Download citation

Publish with us

Policies and ethics