Skip to main content

Warfare of the Future

  • Chapter
  • First Online:
  • 889 Accesses

Abstract

This chapter discusses implications of cyber war with regard to critical infrastructure, primarily arrangements that relate to industrial control systems and processes that operate power, water, communications, manufacturing, and many other essential functions. The chapter explores the potential for disruption, espionage, and sabotage by rogue individuals, states, or sub-state adversaries. It discusses methods to help safeguard against these attacks as well as looking at the technical obstacles that arise because of the integrated nature of government and private-sector networks. The chapter contemplates the laws of armed conflict and the issue of whether a cyber-attack against the United States is of such magnitude to be considered an armed attack, so as to trigger the lawful exercise of the right of self-defence. The intention is to show that cyber-warfare is all-encompassing and cannot easily be categorized into nation-state, military, or civilian categories. The question of whether such attacks constitute the use of force and the lack of clarity around issues of attribution and detection suggests that traditional legal principles governing war need to be reassessed in the new era of cyber-warfare.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   99.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The Internet was created in the late-1960s from a project started by the Defense Advanced Research Projects Agency (DARPA), as part of the American military infrastructure, which was part of a larger experiment to connect computers across the United States. The founding engineers created a network built of many nodes, each connected to other nodes, so that it would be possible to use various routes without any degradation in the quality of the transmission. From this modest beginning, the Internet has grown into an enormous global network, with most of the supporting infrastructure in the hands of private commercial entities.

  2. 2.

    United Nations, Charter of the United Nations, 24 October 1945 [hereinafter “the Charter”].

  3. 3.

    United Nations, Charter of the United Nations, 24 October 1945, art. 42.

  4. 4.

    United Nations, Charter of the United Nations, 24 October 1945, art. 51.

  5. 5.

    US Patriot Act, Pub. L. No. 107–56, 115 Stat. 272 (2001). Note that the following sectors have been identified as critical infrastructure: agriculture, food, water, public health, emergency services, defense industrial base, government, information and telecommunications, energy, transportation, banking and finance, chemical industry and hazardous materials, and postal and shipping.

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sara M. Smyth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Smyth, S.M. (2018). Warfare of the Future. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-74107-9_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-74106-2

  • Online ISBN: 978-3-319-74107-9

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics