Advertisement

The Rule of Law: Controlling Cyber Weapons

  • Henry Prunckun
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

This chapter discusses how information and communications technology (computer systems and data transmission) are used as cyber weapons for criminal purposes. It canvasses a number of legislative policy options for controlling their misuse. It concludes with the view that implementing cyber weapons laws—in the same vein as firearms legislation—would not only help ensure society’s domestic wellbeing, it would aid national security.

Keywords

Cyber weapons Legislative controls Legal controls Cybersecurity Crime prevention Computer crime 

Notes

Acknowledgement

The author would like to thank the editor of the Global Crime for permission to use his previously published paper (Prunckun 2008).

References

  1. Arquilla J, Ronfeldt D (eds) (2001) Networks and netwars: the future of terrorism, crime and militancy. Rand Corp, Santa MonicaGoogle Scholar
  2. Associated Press (2017) World cyberattack cripples UK hospitals, demands ransoms. The New York Times, 12 May, available at: https://www.nytimes.com/aponline/2017/05/12/world/europe/ap-eu-britain-hospital-problems.html?_r=0. Accessed 16 May 2017
  3. Bayles WJ (2001) The ethics of computer network attack. Parameters, Spring, pp 44–58Google Scholar
  4. Brenner J (2007), quoted in Jeanne Meserve, Official: international hackers going after US networks. CNN Washington Bureau, 19 Oct [online]. Available at http://www.cnn.com/2007/US/10/19/cyber.threats/index.html. Accessed 17 May 2017
  5. Campbell, Major General John H., cited in Stephen Green (1999) Pentagon giving cyberwarfare high priority. Copley News Service, 21 Dec, available at http://www.fas.org/irp/news/1999/12/991221-cyber.htm. Accessed 17 May 2017
  6. Choo K-KR (2007) Zombies and Botnets. In: Trends and issues in crime and criminal justice, No. 337. Australian Institute of Criminology, CanberraGoogle Scholar
  7. Choo K-KR, Smith RG, McCusker R (2007) The future of technology-enabled crime in Australia. In: Trends and issues in crime and criminal justice, No. 341. Australian Institute of Criminology, Canberra, p 6Google Scholar
  8. Denning D (2000) Reflections on cyber weapons controls. Comput Secur J XVI(4, Fall):43–53Google Scholar
  9. Grabosky PN (2005) Recent trends in cybercrime. 11th United Nations congress on crime prevention and criminal justice, Bangkok, April 22, 13Google Scholar
  10. Grabosky PN, Smith RG (2007) Crime in the digital age: controlling telecommunications and cyberspace illegalities. Transaction Publishers, New BrunswickGoogle Scholar
  11. Mouzos J (1999) International traffic in small arms: an Australian perspective. In: Trends and issues in crime and criminal justice, No. 104. Australian Institute of Criminology, CanberraGoogle Scholar
  12. Prunckun H (2008) Bogies in the wire: is there a need for legislative control of cyber weapons. Glob Crime 9(3):262–272CrossRefGoogle Scholar
  13. Prunckun H (2015) Scientific methods of inquiry for intelligence analysis, 2nd edn. Rowman & Littlefield, LanhamGoogle Scholar
  14. Quinney R (1970) The social reality of crime. Little, Brown and Company, BostonGoogle Scholar
  15. Simpson D (2007) quoted in Logan Ward, Facing down disaster. Popular Mechanics, number 58Google Scholar
  16. Sofaer A, Goodman S, Cuéllar M-F, Drozdova E, Elliott D, Grove G, Lukasik S, Tonya P, Wilson G (2000) A proposal for an international convention on cyber crime and terrorism. Stanford University/The Hoover Institution/The Consortium for Research on Information Security and Policy/The Center for International Security and Cooperation, Stanford. AugustGoogle Scholar
  17. Strauss H (2007a) Cyberwarrior: operationalizing cyberwarfare involves challenges across the defense enterprise and beyond. Gartner Inc., Stamford, p 8Google Scholar
  18. Strauss H (2007b) Findings: cyberwarfare matures as a military option. Gartner Inc., Stamford, p 2Google Scholar
  19. United States (2010) US code. Section 921(3)Google Scholar
  20. Yunos Z, Zin ANM (2003) Future cyber weapons. The Star in Tech, November 13Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Australian Graduate School of Policing and SecurityCharles Sturt UniversitySydneyAustralia

Personalised recommendations