OTHER-THAN-INTERNET (OTI) CYBERWARFARE: CHALLENGES FOR ETHICS, LAW, AND POLICY

Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.

[1]  Keith B Alexander Warfighting in Cyberspace , 2007 .

[2]  F. H. Adler Cybernetics, or Control and Communication in the Animal and the Machine. , 1949 .

[3]  L. Demause,et al.  Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power , 2013 .

[4]  R. Dipert The Ethics of Cyberwarfare , 2010 .

[5]  Gary D. Brown,et al.  The Customary International Law of Cyberspace , 2012 .

[6]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[7]  Panayotis A. Yannakogeorgos Internet Governance and National Security , 2012 .

[8]  Neil C. Rowe,et al.  The Ethics of Cyberweapons in Warfare , 2010, Int. J. Technoethics.

[9]  NCW研究会,et al.  Information operations , 2020, Routledge Handbook of International Cybersecurity.

[10]  B. Schneier Liars and Outliers: Enabling the Trust that Society Needs to Thrive , 2012 .

[11]  M. Walzer Just and Unjust Wars , 1977 .

[12]  Neil C. Rowe,et al.  Challenges in Monitoring Cyberarms Compliance , 2011, Int. J. Cyber Warf. Terror..

[13]  R. Dipert The Future Impact of a Long Period of Limited Cyberwarfare on the Ethics of Warfare , 2014 .

[14]  J. Mcmahan Killing in War , 2009 .

[15]  R. Dipert Preventive War and the Epistemological Dimension of the Morality of War , 2006 .

[16]  Jason Andress,et al.  Chapter 1 – What is Cyber Warfare? , 2011 .

[17]  Ray Bert,et al.  Cyber War: The Next Threat to National Security and What to Do About It , by Richard A. Clarke and Robert K. Knake. New York: HarperCollins, 2010. , 2010 .

[18]  Martin Gürtler NATO Cooperative Cyber Defence Centre of Excellence , 2021, 2021 13th International Conference on Cyber Conflict (CyCon).

[19]  P. Christopher The Ethics of War and Peace: An Introduction to Legal and Moral Issues , 1994 .

[20]  Martin C. Libicki Cyberdeterrence and Cyberwar , 2009 .

[21]  Marc Schattenmann,et al.  IAEA – International Atomic Energy Agency , 2000, A Concise Encyclopedia of the United Nations.

[22]  George R. Lucas Permissible Preventive Cyberwar: Restricting Cyber Conflict to Justified Military Targets , 2014 .

[23]  Colonel James Cook ‘Cyberation’ and Just War Doctrine: A Response to Randall Dipert , 2010 .