Weaponization of Computers

  • Henry Prunckun
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)


This chapter examines how computer hardware and software can be weaponized. It draws analogies with other items of common use and shows how, why, and by whom cyber technology is weaponization. It concludes with a discussion of the implications for policy and ramifications for practice.


Computers Weaponization Counterintelligence Deception Dual-purpose cyber weapons Kill chain 


  1. Prunckun H (1989) Information security: a practical handbook on business counterintelligence. Charles C Thomas Publisher, SpringfieldGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Australian Graduate School of Policing and SecurityCharles Sturt UniversitySydneyAustralia

Personalised recommendations