Abstract
This chapter explores the concept of cyber warfare from two different angles. First, from the perspective of public international law on armed conflict (henceforth—international law). This is important to understand, since it addresses the role of cyber warfare in the context of using (armed) force in international conflicts. Second, the chapter explores cyber warfare as a developing military capability, which is finding its place among other (often more mature) capabilities, such as electronic warfare or missile defense. Instead of covering the breadth of each topic, the chapter identifies the key points that help understand the nature of cyber warfare.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Adee S (2008) The hunt for the kill switch. IEEE Spectrum, May. http://spectrum.ieee.org/semiconductors/design/the-hunt-for-the-kill-switch/0. Accessed 02 Oct 2013
Carr J (2009) Inside cyber warfare: mapping the cyber underworld. O’Reilly Media, Sebastopol
Conti G, Surdu J (2009) Army, navy, air force, and cyber—is it time for a cyberwarfare branch of military? IAnewsletter 12(1):14–18
Davis J (2007) Hackers take down the most wired country in Europe. Wired Magazine, 15.09. http://www.wired.com/politics/security/magazine/15-09/ff_estonia. Accessed 02 Oct 2013
Falliere N, Murchu LO, Chien E (2011) W32.Stuxnet dossier. Symantec. http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf. Accessed 02 Oct 2013
Fulghum D (2007) Why Syria’s air defenses failed to detect Israelis. Aviation week, Oct 3. http://www.aviationweek.com. Accessed 02 Oct 2013
Gellman B, Nakashima E (2013) U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show. Washington Post. http://www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html. Accessed 02 Oct 2013
Hoagland B (2013) Manning the next unmanned air force: developing RPA pilots of the future. Policy paper, center for 21st century security and intelligence at brookings
Joint Chiefs of Staff (2006) Information operations. Joint Publication 3-13
Joint Chiefs of Staff (2012) Information operations. Joint Publication 3-13
Peterson S (2011) Exclusive: Iran hijacked US drone, says Iranian engineer (Video), Christian Science Monitor, Dec 15. http://www.csmonitor.com/World/Middle-East/2011/1215/Exclusive-Iran-hijacked-US-drone-says-Iranian-engineer-Video. Accessed 02 Oct 2013
Rawnsley A (2011) Iran’s alleged drone hack: tough, but possible. Wired, Dec 16. http://www.wired.com/dangerroom/2011/12/iran-drone-hack-gps/. Accessed 02 Oct 2013
Rattray G (2001) Strategic warfare in cyberspace. MIT Press, Cambridge
Sanger D (2012) Obama order sped up wave of cyberattacks against Iran. NYTimes.com, June 1. http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-iran.html?_r=2&pagewanted=2&seid=auto&smid=tw-nytimespolitics&pagewanted=all. Accessed 02 Oct 2013
Schmitt M (1999) Computer network attack and use of force in international law: thoughts on a normative framework. Columbia J Transnatl Law 37:885–937
Schmitt M (2002) Wired warfare: computer network attack and jus in bello. Int Rev Red Cross 84(846):365–399
Schmitt M (ed) (2013) Tallinn manual on the international law applicable to cyber warfare. Cambridge University Press, Cambridge
United Nations (1945) Charter of the United Nations
Ziolkowski K (2012) Ius ad bellum in cyberspace—some thoughts on the “Schmitt-criteria” for use of force. In: Czosseck C, Ottis R, Ziolkowski K (eds) Proceedings of the 4th international conference on cyber conflict. NATO CCD COE Publications, Tallinn
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ottis, R. (2015). Cyber Warfare. In: Lehto, M., Neittaanmäki, P. (eds) Cyber Security: Analytics, Technology and Automation. Intelligent Systems, Control and Automation: Science and Engineering, vol 78. Springer, Cham. https://doi.org/10.1007/978-3-319-18302-2_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-18302-2_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18301-5
Online ISBN: 978-3-319-18302-2
eBook Packages: EngineeringEngineering (R0)