Prismvol. 7, No. 2 | 2017

Total Page:16

File Type:pdf, Size:1020Kb

Prismvol. 7, No. 2 | 2017 PRISMVOL. 7, NO. 2 | 2017 THE FIFTH DOMAIN PRISM VOL. 7, NO. 2 NO. VOL. 7, | 2017 cco.ndu.edu A JOURNAL OF THE CENTER FOR COMPLEX OPER ATIONS PRISM ABOUT VOL. 7, NO.2 2017 PRISM, a quarterly journal published by the Center for Complex Operations (CCO) at National Defense University, aims to illuminate and provoke debate on whole-of- government efforts to conduct reconstruction, stabilization, counterinsurgency, and EDITOR NDU’S CENTER FOR COMPLEX OPERATIONS irregular warfare operations. Since its inaugural issue in 2010, PRISM’s readership Mr. Michael Miklaucic has expanded to include more than 10,000 officials, servicemen and women, and The United States Congress in 2009 authorized the establishment of a Center for practitioners from across the diplomatic, defense, and development communities in Complex Operations (CCO) in response to a widely perceived need for interagency interoperability in analysis of, planning for, and intervening in complex operations DEPUTY EDITOR more than 88 countries. worldwide. These include reconstruction, stabilization, counterinsurgency, and Ms. Patricia Clough irregular warfare—operations that demand support from all elements of national COMMUNICATIONS power to succeed. WEBMASTER PRISM encourages authors to aggressively seek out and identify problems that should Created within DOD as a collaborative initiative with support from the Department be addressed irrespective of prevailing U.S. Government policy or current military of State and the U.S. Agency for International Development, the aim of CCO is to: Ms. Rebecca Harper doctrine. We welcome unsolicited manusscripts from policymakers, practitioners, and scholars, particularly those that present emerging thought, best practices, or ■ enable more effective networking, coordination, and synchronization of DESIGN training and education innovations. preparations for deployment of U.S. Government (USG) personnel for complex operations; Ms. Jamie Harvey, Please direct editorial contributions to the link on the CCO website or to the ■ compile best practices and lessons learned; U.S. Government Publishing Office addresses below. If you choose to mail a hard copy, please provide a phone number and email for feedback. ■ identify training and education gaps, and then facilitate efforts to fill those gaps; ■ and to serve as a feedback and information conduit to senior U.S. leaders within EDITORIAL ASSISTANTS Editor, PRISM the defense, diplomacy, and development arenas. Ms. Eva Kahan 260 Fifth Avenue, S.W. PRISM is tailored to serve policymakers, scholars, and practitioners working to Mr. Sven Stauder Fort Lesley J. McNair Washington DC 20319 enhance USG competency in complex operations. Mr. Carlton Haelig SUBJ: Manuscript Submission EDITORIAL BOARD <[email protected]> Dr. Gordon Adams Submissions will be reviewed by the PRISM editorial staff, who reviews mate- Dr. Pauline Baker rial on a rolling basis. Publication threshold for articles and critiques varies but Ambassador Rick Barton is largely determined by topical relevance, continuing education for national and Dr. Alain Bauer international security professionals, scholarly standards of argumentation, quality Dr. Hans Binnendijk of writing, and readability. To help achieve threshold, authors are strongly encour- aged to recommend clear solutions or to arm the reader with actionable knowledge. ADM Dennis Blair, USN (ret.) PRISM’s review process can last several months. The staff will contact you during Ambassador James Dobbins that timeframe accepting or regretfully rejecting the submission. If the staff is unable Dr. Francis Fukuyama to publish a submission within four months of acceptance, PRISM will revert publi- Ambassador Marc Grossman cation rights to the author so that they may explore other publication options. Ambassador John Herbst DISCLAIMER Dr. Laura Junor (ex officio) This is the authoritative, official U.S. Department of Defense (DOD) edition of Dr. David Kilcullen PRISM. Any copyrighted portions of this journal may not be reproduced or extracted Ambassador Jacques Paul Klein without permission of the copyright proprietors. PRISM should be acknowledged Dr. Roger B. Myerson whenever material is quoted from or based on its content. The opinions, conclusions, and recommendations expressed or implied within Dr. Moisés Naím are those of the contributors and do not necessarily reflect the views of DOD or any Ambassador Thomas Pickering other agency of the Federal Government, or any other organization associated with Dr. William Reno this publication. Lt. Gen. John F. Sattler, USMC (ret.) SUBSCRIPTIONS Dr. James A. Schear PRISM is provided as an educational public service. Please visit the CCO website to Dr. Joanna Spear subscribe. Should your address change, please email the editorial staff at the address ADM James Stavridis, USN (ret.) listed above. Dr. Ruth Wedgwood COVER ART PUBLISHER Image is a derivative of “Teo Spiller computer graphic image from 1997” by Cacophonia Artwork. From <https://commons.wikimedia.org/wiki/File:CYber_ Dr. Joseph J. Collins Graphic.jpg>. Licensed under CC BY-SA 4.0 <https://creativecommons.org/ ISSN 2157–0663 licenses/by-sa/4.0/deed.en>. PRISM ABOUT VOL. 7, NO.2 2017 PRISM, a quarterly journal published by the Center for Complex Operations (CCO) at National Defense University, aims to illuminate and provoke debate on whole-of- government efforts to conduct reconstruction, stabilization, counterinsurgency, and EDITOR NDU’S CENTER FOR COMPLEX OPERATIONS irregular warfare operations. Since its inaugural issue in 2010, PRISM’s readership Mr. Michael Miklaucic has expanded to include more than 10,000 officials, servicemen and women, and The United States Congress in 2009 authorized the establishment of a Center for practitioners from across the diplomatic, defense, and development communities in Complex Operations (CCO) in response to a widely perceived need for interagency interoperability in analysis of, planning for, and intervening in complex operations DEPUTY EDITOR more than 88 countries. worldwide. These include reconstruction, stabilization, counterinsurgency, and Ms. Patricia Clough irregular warfare—operations that demand support from all elements of national COMMUNICATIONS power to succeed. WEBMASTER PRISM encourages authors to aggressively seek out and identify problems that should Created within DOD as a collaborative initiative with support from the Department be addressed irrespective of prevailing U.S. Government policy or current military of State and the U.S. Agency for International Development, the aim of CCO is to: Ms. Rebecca Harper doctrine. We welcome unsolicited manusscripts from policymakers, practitioners, and scholars, particularly those that present emerging thought, best practices, or ■ enable more effective networking, coordination, and synchronization of DESIGN training and education innovations. preparations for deployment of U.S. Government (USG) personnel for complex operations; Ms. Jamie Harvey, Please direct editorial contributions to the link on the CCO website or to the ■ compile best practices and lessons learned; U.S. Government Publishing Office addresses below. If you choose to mail a hard copy, please provide a phone number and email for feedback. ■ identify training and education gaps, and then facilitate efforts to fill those gaps; ■ and to serve as a feedback and information conduit to senior U.S. leaders within EDITORIAL ASSISTANTS Editor, PRISM the defense, diplomacy, and development arenas. Ms. Eva Kahan 260 Fifth Avenue, S.W. PRISM is tailored to serve policymakers, scholars, and practitioners working to Mr. Sven Stauder Fort Lesley J. McNair Washington DC 20319 enhance USG competency in complex operations. Mr. Carlton Haelig SUBJ: Manuscript Submission EDITORIAL BOARD <[email protected]> Dr. Gordon Adams Submissions will be reviewed by the PRISM editorial staff, who reviews mate- Dr. Pauline Baker rial on a rolling basis. Publication threshold for articles and critiques varies but Ambassador Rick Barton is largely determined by topical relevance, continuing education for national and Dr. Alain Bauer international security professionals, scholarly standards of argumentation, quality Dr. Hans Binnendijk of writing, and readability. To help achieve threshold, authors are strongly encour- aged to recommend clear solutions or to arm the reader with actionable knowledge. ADM Dennis Blair, USN (ret.) PRISM’s review process can last several months. The staff will contact you during Ambassador James Dobbins that timeframe accepting or regretfully rejecting the submission. If the staff is unable Dr. Francis Fukuyama to publish a submission within four months of acceptance, PRISM will revert publi- Ambassador Marc Grossman cation rights to the author so that they may explore other publication options. Ambassador John Herbst DISCLAIMER Dr. Laura Junor (ex officio) This is the authoritative, official U.S. Department of Defense (DOD) edition of Dr. David Kilcullen PRISM. Any copyrighted portions of this journal may not be reproduced or extracted Ambassador Jacques Paul Klein without permission of the copyright proprietors. PRISM should be acknowledged Dr. Roger B. Myerson whenever material is quoted from or based on its content. The opinions, conclusions, and recommendations expressed or implied within Dr. Moisés Naím are those of the contributors and do not necessarily reflect the views of DOD or any Ambassador Thomas Pickering other agency of the Federal Government, or any other organization associated with Dr. William Reno this
Recommended publications
  • Analysis of Cyberwarfare Ethics As It Pertains to Civilian Computer Networks/Infrastructures
    Analysis of Cyberwarfare Ethics as It Pertains to Civilian Computer Networks/Infrastructures Vanessa Paradine Terms of Reference and Scope The Department of Defense (DoD) currently operates more than fifteen thousand different computer networks across four thousand military installations around the world, with as many as seven million DoD computers and telecommunications tools in use in eighty-eight countries.1 These networks experience over six million unauthorized probes per day.2 Due to the close integration of DoD and commercial networks, an attack within the cyber domain may significantly impact critical civilian infrastructures and networks. For the purpose of this article, the following definitions are pro­ vided: • Cyberspace, as defined by the National Security Presidential Di­ rective 541H0meland Security Presidential Directive 23, is "the interdependent network of information technology infrastruc­ tures, and includes the Internet, telecommunications networks, computer systems, and embedded processors and controllers in critical industries."3 • Cyberspace operations is defined as "the employment of cy­ berspace capabilities where the primary purpose is to achieve military objectives or effects in or through cyberspace."4 • Cyberwarfare/cyberattack has not been defined by the Depart­ ment of the Defense (DoD); however, according to Deputy Defense Secretary William J. Lynn III, it can include a range of things-"from exploitation and exfiltration of data to degrada­ tion of networks to destruction of networks or even physical equipment, physical property."5 • Cyber Threats6 o Virtual-nonkinetic threats to DoD information networks that are just as real and damaging as physical threats. 34 Internatianal Journal of Intelligence Ethics, Vol. 4, No. 1 / Spring/Summer 2013 Analysis of Cyberwarfare Ethics 35 o Physical-kinetic threats mixed with nonkinetic threats; can severely impact the effectiveness of military joint operations.
    [Show full text]
  • Digital Investigation and Trojan Defense.Pdf
    Digital Investigation and the Trojan Defense, Revisited Golden G. Richard III Professor of Computer Science and University Research Professor Director, Greater New Orleans Center for Information Assurance (GNOCIA) University of New Orleans GIAC-certified Digital Forensics Investigator Founder, Arcane Alloy, LLC [email protected] / [email protected] / @nolaforensix http://www.cs.uno.edu/~golden 2 Who? Professor of Computer Science and University Research Professor, Director, Greater New Orleans Center for Information Assurance (GNOCIA), University of New Orleans http://www.cs.uno.edu/~golden Digital forensics, OS internals, reverse engineering, offensive computing, pushing students to the brink of destruction, et al. Founder, Arcane Alloy, LLC. http://www.arcanealloy.com Digital forensics, reverse engineering, malware analysis, security research, tool development, training. Co-Founder, Partner / Photographer, High ISO Music, LLC. http://www.highisomusic.com Music. Rock stars. Earplugs. Copyright 2015 by Golden G. Richard III (@nolaforensix) 3 Digital Forensics “Tools and techniques to recover, preserve, and examine digital evidence stored on or transmitted by digital devices.” Computers, PDAs, cellular phones, videogame consoles, digital cameras, copy machines, printers, digital voice recorders… 4 What That Really Means • Data. “You only think it’s gone.” • Sensitive data tenaciously clings to life. • The vast majority of users—and lots of technical people, too— have no idea what’s really stored on their digital devices… • …and no ability to properly “clean up” even if they do suspect what’s there Copyright 2015 by Golden G. Richard III (@nolaforensix) 5 Where’s the Evidence? Files and Filesystem Application Windows Deleted Files metadata metadata registry Print spool Hibernation Temp files Log files files files Browser Network Slack space Swap files caches traces RAM: OS and app data Volatile Evidence structures Copyright 2015 by Golden G.
    [Show full text]
  • Attribution and Response to Cybercrime/Terrorism/Warfare Susan W
    Journal of Criminal Law and Criminology Volume 97 Article 2 Issue 2 Winter Winter 2007 At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare Susan W. Brenner Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Susan W. Brenner, At Light Speed: Attribution and Response to Cybercrime/Terrorism/Warfare, 97 J. Crim. L. & Criminology 379 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0379 THE JOURNALOF CRIMINAL LAW & CRIMINOLOGY Vol. 97. No. 2 Copyright 0 2007 by NorthwesternUniversity. Schoolof Low Printedin U.S.A. "AT LIGHT SPEED": ATTRIBUTION AND RESPONSE TO CYBERCRIME/TERRORISM/WARFARE SUSAN W. BRENNER* This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of respondingto those threats. First, it divides the process-attribution-intotwo categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsiblefor this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type.
    [Show full text]
  • Modelling, Meteorology, Impacts Preparedness
    ADVANCES IN HURRICANE RESEARCH MODELLING, METEOROLOGY, PREPAREDNESS AND IMPACTS Edited by Kieran Hickey ADVANCES IN HURRICANE RESEARCH - MODELLING, METEOROLOGY, PREPAREDNESS AND IMPACTS Edited by Kieran Hickey Advances in Hurricane Research - Modelling, Meteorology, Preparedness and Impacts http://dx.doi.org/10.5772/3399 Edited by Kieran Hickey Contributors Eric Hendricks, Melinda Peng, Alexander Grankov, Vladimir Krapivin, Svyatoslav Marechek, Mariya Marechek, Alexander Mil`shin, Evgenii Novichikhin, Sergey Golovachev, Nadezda Shelobanova, Anatolii Shutko, Gary Moynihan, Daniel Fonseca, Robert Gensure, Jeff Novak, Ariel Szogi, Ken Stone, Xuefeng Chu, Don Watts, Mel Johnson, Gunnar Schade, Qin Chen, Kelin Hu, Patrick FitzPatrick, Dongxiao Wang, Kieran Richard Hickey Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2012 InTech All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which allows users to download, copy and build upon published articles even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. Notice Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published chapters. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book.
    [Show full text]
  • Cognitive Warfare.Pdf
    1 Table of Contents Executive Summary 3 Introduction 5 Evolution of Non-Kinetic Warfare 6 Origins 6 Psychological Warfare (PsyOps) 7 Electronic Warfare (EW) 7 Cyberwarfare 8 Information Warfare 8 Cognitive Warfare 9 Goals of Cognitive Warfare 11 Destabilization 12 Case 1: Destabilization through Confusion 13 Case 2: Destabilization by Sowing Division 15 Case 3: Destabilization as a Means to Influence 17 Influence 20 Case 1: Influencing to Recruit 21 Case 2: Influencing Policy Enactment 22 Case 3: Influencing as a Means to Destabilize 23 Future Threats 27 Looking Ahead 27 Threat 1: Ease of Selection and Virality 29 Threat 2: A New Age of Truth 30 Threat 3: Cyber-induced Institutional Discomfort and Distrust 31 Threat 4: Biological and Therapeutic Emotional Manipulation 32 Threat 5: Enhanced Recruitment of Agents 33 Strategy Recommendations 35 Threat Recognition Framework and Criteria 35 Risk Assessment 36 Organizational Implementations 37 Offensive Considerations 39 Closing Thoughts 40 Bibliography 41 2 Executive Summary Warfare has shifted dramatically over the past several decades, moving away from the physical threats of conventional warfare. War now moves towards the social and ideological threats brought about by mass media and advances in technology. The advent of this new type of warfare is different from anything we have seen before. Although it takes elements from previous types of hybrid warfare, the reach and level of impact it possesses make it far more dangerous than its predecessors. We have dubbed this new way of war cognitive warfare. ​ ​ Cognitive warfare, although sharing various similarities to other non-conventional and non-kinetic types of warfare/operations, is ultimately unique in its execution and purpose.
    [Show full text]
  • WMO Statement on the Status of the Global Climate in 2011
    WMO statement on the status of the global climate in 2011 WMO-No. 1085 WMO-No. 1085 © World Meteorological Organization, 2012 The right of publication in print, electronic and any other form and in any language is reserved by WMO. Short extracts from WMO publications may be reproduced without authorization, provided that the complete source is clearly indicated. Editorial correspondence and requests to publish, reproduce or translate this publication in part or in whole should be addressed to: Chair, Publications Board World Meteorological Organization (WMO) 7 bis, avenue de la Paix Tel.: +41 (0) 22 730 84 03 P.O. Box 2300 Fax: +41 (0) 22 730 80 40 CH-1211 Geneva 2, Switzerland E-mail: [email protected] ISBN 978-92-63-11085-5 WMO in collaboration with Members issues since 1993 annual statements on the status of the global climate. This publication was issued in collaboration with the Hadley Centre of the UK Meteorological Office, United Kingdom of Great Britain and Northern Ireland; the Climatic Research Unit (CRU), University of East Anglia, United Kingdom; the Climate Prediction Center (CPC), the National Climatic Data Center (NCDC), the National Environmental Satellite, Data, and Information Service (NESDIS), the National Hurricane Center (NHC) and the National Weather Service (NWS) of the National Oceanic and Atmospheric Administration (NOAA), United States of America; the Goddard Institute for Space Studies (GISS) operated by the National Aeronautics and Space Administration (NASA), United States; the National Snow and Ice Data Center (NSIDC), United States; the European Centre for Medium-Range Weather Forecasts (ECMWF), United Kingdom; the Global Precipitation Climatology Centre (GPCC), Germany; and the Dartmouth Flood Observatory, United States.
    [Show full text]
  • Protecting the Children: Challenges That Result In, and Consequences Resulting From, Inconsistent Prosecution of Child Pornography Cases in a Technical World, 16 Rich
    Richmond Journal of Law and Technology Volume 16 | Issue 3 Article 5 2010 Protecting The hiC ldren: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World Francis S. Monterosso Follow this and additional works at: http://scholarship.richmond.edu/jolt Part of the Computer Law Commons, and the Internet Law Commons Recommended Citation Francis S. Monterosso, Protecting The Children: Challenges That Result In, And Consequences Resulting From, Inconsistent Prosecution Of Child Pornography Cases In A Technical World, 16 Rich. J.L. & Tech 11 (2010). Available at: http://scholarship.richmond.edu/jolt/vol16/iss3/5 This Article is brought to you for free and open access by UR Scholarship Repository. It has been accepted for inclusion in Richmond Journal of Law and Technology by an authorized administrator of UR Scholarship Repository. For more information, please contact [email protected]. Richmond Journal of Law & Technology Volume XVI, Issue 3 PROTECTING THE CHILDREN : CHALLENGES THAT RESULT IN, AND CONSEQUENCES RESULTING FROM , INCONSISTENT PROSECUTION OF CHILD PORNOGRAPHY CASES IN A TECHNICAL WORLD By Francis S. Monterosso * Cite as: Francis S. Monterosso, Note: Protecting the Children: Challenges that Result In, and Consequences Resulting From, Inconsistent Prosecution of Child Pornography Cases in a Technical World , XVI Rich. J.L. & Tech. 11 (2010), http://jolt.richmond.edu/v16i3/ article11.pdf. INTRODUCTION Of all the sinister things that Internet viruses do, this might be the worst: They can make you an unsuspecting collector of child pornography. Heinous pictures and videos can be deposited on computers by viruses—the malicious programs better known for swiping your credit card numbers.
    [Show full text]
  • Civilians in Cyberwarfare: Conscripts
    Civilians in Cyberwarfare: Conscripts Susan W. Brenner* with Leo L. Clarke** ABSTRACT Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation’s infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their cyberwarfare response structures if a state is to be able to respond effectively to cyberattacks. While many companies may voluntarily elect to participate in such an effort, others may decline to do so, which creates a need, in effect, to conscript companies for this purpose. This Article explores how the U.S. government can go about compelling civilian cooperation in cyberwarfare without violating constitutional guarantees and limitations on the power of the Legislature and the Executive. * NCR Distinguished Professor of Law and Technology, University of Dayton School of Law. ** Associate, Drew, Cooper & Anding, P.C., Grand Rapids, Michigan. 1011 1012 Vanderbilt Journal of Transnational Law [Vol. 43:1011 TABLE OF CONTENTS I. INTRODUCTION .............................................................
    [Show full text]
  • Tropical Storm Maria Threatens Eastern Caribbean 10 September 2011, by DANICA COTO , Associated Press
    Tropical Storm Maria threatens eastern Caribbean 10 September 2011, By DANICA COTO , Associated Press Virgin Islands on Saturday morning, where the storm is expected to dump up to 6 inches (15 centimeters) of rain, said Walter Snell with the National Weather Service office in Puerto Rico. "Residents should be prepared for whatever the worst this storm can do," he said. Maria is forecast to become a Category 1 hurricane late Monday and possibly a Category 2 hurricane by Tuesday, when it is expected to pass just east of the Bahamas as it continues on a northward path, This NOAA satellite image taken Friday, September 9, the hurricane center said. 2011 at 1:45 PM EDT shows Hurricane Katia located about 385 miles south-southwest of Halifax, Nova Flight cancellations were reported across the Scotia. The system remains at Category 1 strength with Caribbean region Friday. maximum winds at 85 mph and will continue moving northeastward and further away from the East Coast of The U.S. Virgin Islands government said it would the U.S. To the south, Tropical Storm Maria is about 135 close its airport Saturday and has advised an miles northeast of Barbados with maximum sustained winds at 45 mph. Tropical storm warnings are in effect estimated 3,000 tourists currently in the territory to for most of the eastern Caribbean Islands from the stay indoors. Lesser Antilles to the Bahamas. In the Gulf of Mexico, Tropical Storm Nate is located about 150 miles west of In Puerto Rico, the government urged tourists to Campeche, Mexico with maximum winds at 50 mph.
    [Show full text]
  • The Ethics of Cyberwarfare Randall R
    This article was downloaded by: [University of Pennsylvania] On: 28 February 2013, At: 08:22 Publisher: Routledge Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer House, 37-41 Mortimer Street, London W1T 3JH, UK Journal of Military Ethics Publication details, including instructions for authors and subscription information: http://www.tandfonline.com/loi/smil20 The Ethics of Cyberwarfare Randall R. Dipert a a SUNY (State University of New York) at Buffalo, NY, USA Version of record first published: 16 Dec 2010. To cite this article: Randall R. Dipert (2010): The Ethics of Cyberwarfare, Journal of Military Ethics, 9:4, 384-410 To link to this article: http://dx.doi.org/10.1080/15027570.2010.536404 PLEASE SCROLL DOWN FOR ARTICLE Full terms and conditions of use: http://www.tandfonline.com/page/terms-and- conditions This article may be used for research, teaching, and private study purposes. Any substantial or systematic reproduction, redistribution, reselling, loan, sub-licensing, systematic supply, or distribution in any form to anyone is expressly forbidden. The publisher does not give any warranty express or implied or make any representation that the contents will be complete or accurate or up to date. The accuracy of any instructions, formulae, and drug doses should be independently verified with primary sources. The publisher shall not be liable for any loss, actions, claims, proceedings, demand, or costs or damages whatsoever or howsoever caused arising directly or indirectly in connection with or arising out of the use of this material. Journal of Military Ethics, Vol. 9, No. 4, 384Á410, 2010 The Ethics of Cyberwarfare RANDALL R.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Cyber War Law, Ethics & Policy
    The Internet in Bello: Cyber War Law, Ethics & Policy Seminar held 18 November 2011, Berkeley Law Kate Jastram and Anne Quintin1 I. Introduction .................................................................................................................... 2 II. Summary of presentations and recommendations ................................................... 2 A. Significance of the issue and applicability of IHL/LOAC to cyber operations .......... 3 B. Insights on specific IHL/LOAC principles and definitions ........................................ 4 C. The need for, and obstacles to, greater U.S. engagement ..................................... 5 D. Cyber speed ............................................................................................................. 6 E. Unique role of the private sector ............................................................................. 6 F. Recommendations for further reflection ................................................................. 6 III. Opening remarks by David Caron ................................................................................ 7 IV. Preparing the Battlefield: The Best Defense ............................................................... 8 A. Comments by Michael Nacht ................................................................................. 8 B. Comments by Sir Daniel Bethlehem ...................................................................... 11 C. Comments by Abraham Sofaer .............................................................................
    [Show full text]