Ethics and Emerging Military Technology (EEMT): Cyber Technology
This research guide is an aid to those looking for information on the subject of ethics, including military ethics, ethics and technology, society and art. It contains links to websites, newsfeeds, the library catalog, and suggested databases.
@War by Shane HarrisA surprising, page-turning account of how the wars of the future are already being fought today The United States military currently views cyberspace as the "fifth domain" of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. In fact, as@WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America's new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains whatthe new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet -- and are vulnerable to its dangers.
Call Number: U163 .H37 2014
Publication Date: 2014
Binary Bullets by Fritz Allhoff (Editor)Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain" of warfare. Does anaggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Isthere such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in thecyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harmanyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.
Call Number: U163 .B5525 2016
Publication Date: 2016
Bit Wars: Cyber Crime, Hacking and Information Warfare by Thomas HyslipDo you hear news everyday on the latest hacking attack, but just don't quite understand what it is all about? Well this is the book for you. In BIT WARS, Dr. Thomas Hyslip presents the history of cybercrime, hacking and information warfare that has lead us to where we are today. Espionage, Stuxnet, Cyber Terrorism, Anonymous, TOR, the Deep Web, they are included. Hacking started as a quest for knowledge and curiosity, but has become a worldwide problem with no end in sight. The Center for Strategic and International Studies estimated the annual cost of cybercrime at more than $445 billion annually.Furthermore, the number and sophistication of attacks has steadily increased. In 2014, Target and Home Depot were victims of large scale point of sale attacks, and millions of credit and debit cards were stolen. Ebay lost the account information of over 233 million users, and Sony was attacked by North Korea in retaliation for the movie, "The Interview." Read about it all in BIT WARS: Cyber Crime, Hacking and Information Warfare, and understand why you should be concerned.
Call Number: HV6773 .H975 2015
Publication Date: 2015
Counterterrorism and Cybersecurity by Newton LeeImagine James Bond meets Sherlock Holmes: Counterterrorism and Cybersecurity is the sequel to Facebook Nation in the Total Information Awareness book series by Newton Lee. The book examines U.S. counterterrorism history, technologies, and strategies from a unique and thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from great thought leaders, and even the make-believe of Hollywood. Demystifying Total Information Awareness, the author expounds on the U.S. intelligence community, artificial intelligence in data mining, social media and privacy, cyber attacks and prevention, causes and cures for terrorism, and longstanding issues of war and peace. The book offers practical advice for businesses, governments, and individuals to better secure the world and protect cyberspace. It quotes U.S. Navy Admiral and NATO's Supreme Allied Commander James Stavridis: "Instead of building walls to create security, we need to build bridges." The book also provides a glimpse into the future of Plan X and Generation Z, along with an ominous prediction from security advisor Marc Goodman at TEDGlobal 2012: "If you control the code, you control the world." Counterterrorism and Cybersecurity: Total Information Awareness will keep you up at night but at the same time give you some peace of mind knowing that "our problems are manmade -- therefore they can be solved by man [or woman]," as President John F. Kennedy said at the American University commencement in June 1963.
Call Number: Online
Publication Date: 2013
Cyber Attacks and International Law on the Use of Force by Samuli HaatajaExamining the thematic intersection of law, technology and violence, this book explores cyber attacks against states and current international law on the use of force. The theory of information ethics is used to critique the law's conception of violence and to develop an informational approach as an alternative way to think about cyber attacks. Cyber attacks against states constitute a new form of violence in the information age, and international law on the use of force is limited in its capacity to regulate them. This book draws on Luciano Floridi's theory of information ethics to critique the narrow conception of violence embodied in the law and to develop an alternative way to think about cyber attacks, violence, and the state. The author uses three case studies - the 2007 cyber attacks against Estonia, the Stuxnet incident involving Iran that was discovered in 2010, and the cyber attacks used as part of the Russian interference in the 2016 US presidential election - to demonstrate that an informational approach offers a means to reimagine the state as an entity and cyber attacks as a form of violence against it. This interdisciplinary approach will appeal to an international audience of scholars in international law, international relations, security studies, cyber security, and anyone interested in the issues surrounding emerging technologies.
Call Number: Online
Publication Date: 2018
Cyber Operations and the Use of Force in International Law by Marco RosciniThe internet has changed the rules of many industries, and war is no exception. But can a computer virus be classed as an act of war? Does a Denial of Service attack count as an armed attack? And does a state have a right to self-defence when cyber attacked? With the range and sophistication of cyber attacks against states showing a dramatic increase in recent times, this book investigates the traditional concepts of 'use of force', 'armed attack', and 'armed conflict' and asks whether existing laws created for analogue technologies can be applied to new digital developments.The book provides a comprehensive analysis of primary documents and surrounding literature, to investigate whether and how existing rules on the use of force in international law apply to a relatively new phenomenon such as cyberspace operations. It assesses the rules of jus ad bellum and jus in bello, whether based on treaty or custom, and analyses why each rule applies or does not apply to cyber operations. Those rules which can be seen to apply are then discussed in the context of each specific type of cyber operation. The book addresses the key questions of whether a cyber operation amounts to the use of force and, if so, whether the victim state can exercise its right of self-defence; whether cyber operations trigger the application of international humanitarian law when they are not accompanied by traditional hostilities; what rules must be followed in the conduct of cyber hostilities; how neutrality is affected by cyber operations; whether those conducting cyber operations are combatants, civilians, or civilians taking direct part in hostilities. The book is essential reading for everyone wanting a better understanding of how international law regulates cyber combat.
Cybersecurity Ethics by Mary ManjikianThis new textbook offers an accessible introduction to the topic of cybersecurity ethics. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, intellectual property and piracy, surveillance, and cyberethics in relation to military affairs. The third part concludes by exploring current codes of ethics used in cybersecurity. The overall aims of the book are to: provide ethical frameworks to aid decision making; present the key ethical issues in relation to computer security; highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: 'Going Deeper' provides background information on key individuals and concepts; 'Critical Issues' features contemporary case studies; and 'Applications' examine specific technologies or practices which raise ethical issues. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.
Call Number: Online
Publication Date: 2017
Cyber War by Claire Finkelstein (Editor)Cyber weapons and cyber warfare have become one of the most dangerous innovations of recent years, and a significant threat to national security. Cyber weapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-rangingpotential consequences. Unlike past forms of warfare circumscribed by centuries of just war tradition and Law of Armed Conflict prohibitions, cyber warfare occupies a particularly ambiguous status in the conventions of the laws of war. Furthermore, cyber attacks put immense pressure on conventionalnotions of sovereignty, and the moral and legal doctrines that were developed to regulate them. This book, written by an unrivalled set of experts, assists in proactively addressing the ethical and legal issues that surround cyber warfare by considering, first, whether the Laws of Armed Conflictapply to cyberspace just as they do to traditional warfare, and second, the ethical position of cyber warfare against the background of our generally recognized moral traditions in armed conflict.The book explores these moral and legal issues in three categories. First, it addresses foundational questions regarding cyber attacks. What are they and what does it mean to talk about a cyber war? The book presents alternative views concerning whether the laws of war should apply, or whethertransnational criminal law or some other peacetime framework is more appropriate, or if there is a tipping point that enables the laws of war to be used. Secondly, it examines the key principles of jus in bello to determine how they might be applied to cyber-conflicts, in particular those ofproportionality and necessity. It also investigates the distinction between civilian and combatant in this context, and studies the level of causation necessary to elicit a response, looking at the notion of a "proximate cause". Finally, it analyses the specific operational realities implicated byparticular regulatory regimes. This book is unmissable reading for anyone interested in the impact of cyber warfare on international law and the laws of war.
Call Number: KZ6718 .C93 2015
Publication Date: 2015
The Ethics of Informational Warfare by Luciano Floridi (Editor); Mariarosaria Taddeo (Editor)This book offers an overview of the ethical problems posed by Information Warfare, and of the different approaches and methods used to solve them, in order to provide the reader with a better grasp of the ethical conundrums posed by this new form of warfare. The volume is divided into three parts, each comprising four chapters. The first part focuses on issues pertaining to the concept of Information Warfare and the clarifications that need to be made in order to address its ethical implications. The second part collects contributions focusing on Just War Theory and its application to the case of Information Warfare. The third part adopts alternative approaches to Just War Theory for analysing the ethical implications of this phenomenon. Finally, an afterword by Neelie Kroes - Vice President of the European Commission and European Digital Agenda Commissioner - concludes the volume. Her contribution describes the interests and commitments of the European Digital Agenda with respect to research for the development and deployment of robots in various circumstances, including warfare.
Call Number: U163 .E84 2014
Publication Date: 2014
The Evolution of Cyber War by Brian M. MazanecFormer secretary of defense Leon Panetta once described cyber warfare as "the most serious threat in the twenty-first century," capable of destroying our entire infrastructure and crippling the nation. Already, major cyber attacks have affected countries around the world: Estonia in 2007, Georgia in 2008, Iran in 2010, and most recently the United States. As with other methods of war, cyber technology can be used not only against military forces and facilities but also against civilian targets. Information technology has enabled a new method of warfare that is proving extremely difficult to combat, let alone defeat. And yet cyber warfare is still in its infancy, with innumerable possibilities and contingencies for how such conflicts may play out in the coming decades. Brian M. Mazanec examines the worldwide development of constraining norms for cyber war and predicts how those norms will unfold in the future. Employing case studies of other emerging-technology weapons--chemical and biological, strategic bombing, and nuclear weaponry--Mazanec expands previous understandings of norm-evolution theory, offering recommendations for U.S. policymakers and citizens alike as they grapple with the reality of cyber terrorism in our own backyard.
Call Number: KZ6718 .M39 2015
Publication Date: 2015
Iwar by Bill GertzNew York Times bestselling author and veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars. America is at war, but most of its citizens don’t know it. Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.
Call Number: U163 .G47 2017
Publication Date: 2017
New Books
AI for Digital Warfare by Niklas Hageback; Daniel HedblomAI for Digital Warfare explores how the weaponising of artificial intelligence can and will change how warfare is being conducted, and what impact it will have on the corporate world. With artificial intelligence tools becoming increasingly advanced, and in many cases more humanlike, their potential in psychological warfare is being recognised, which means digital warfare can move beyond just shutting down IT systems into more all-encompassing hybrid war strategies.
Call Number: Online
Publication Date: 2021
Cyber Attacks and International Law on the Use of Force by Samuli HaatajaExamining the thematic intersection of law, technology and violence, this book explores cyber attacks against states and current international law on the use of force. The theory of information ethics is used to critique the law¿s conception of violence and to develop an informational approach as an alternative way to think about cyber attacks. Cyber attacks against states constitute a new form of violence in the information age, and international law on the use of force is limited in its capacity to regulate them. This book draws on Luciano Floridi¿s theory of information ethics to critique the narrow conception of violence embodied in the law and to develop an alternative way to think about cyber attacks, violence, and the state. The author uses three case studies ¿ the 2007 cyber attacks against Estonia, the Stuxnet incident involving Iran that was discovered in 2010, and the cyber attacks used as part of the Russian interference in the 2016 US presidential election ¿ to demonstrate that an informational approach offers a means to reimagine the state as an entity and cyber attacks as a form of violence against it. This interdisciplinary approach will appeal to an international audience of scholars in international law, international relations, security studies, cyber security, and anyone interested in the issues surrounding emerging technologies.
Call Number: Online
Publication Date: 2018
Cyber Peace by Shackelford; Douzet; AnkersenThe international community is too often focused on responding to the latest cyber-attack instead of addressing the reality of pervasive and persistent cyber conflict. From ransomware against the city government of Baltimore to state-sponsored campaigns targeting electrical grids in Ukraine and the U.S., we seem to have relatively little bandwidth left over to ask what we can hope for in terms of 'peace' on the Internet, and how to get there. It's also important to identify the long-term implications for such pervasive cyber insecurity across the public and private sectors, and how they can be curtailed. This edited volume analyzes the history and evolution of cyber peace and reviews recent international efforts aimed at promoting it, providing recommendations for students, practitioners and policymakers seeking an understanding of the complexity of international law and international relations involved in cyber peace. This title is also available as Open Access on Cambridge Core.
Call Number: Online
Publication Date: 2022
Cyber Persistence Theory by Michael P. Fischerkeller; Emily O. Goldman; Richard J. Harknett; Paul M. Nakasone (Foreword by)A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace.Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states tomisapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates theexploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.
Call Number: Online
Publication Date: 2022
Cybersecurity and Decision Makers by Marie De éminvilleCyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
Call Number: Online
ISBN: 9781119720355
Publication Date: 2020
Cybersecurity Discourse in the United States by Sean T. LawsonThis book examines the role of cyber-doom rhetoric in the U.S. cybersecurity debate. For more than two decades, fear of "cyber-doom" scenarios--i.e. cyberattacks against critical infrastructure resulting in catastrophic physical, social, and economic impacts--has been a persistent feature of the U.S. cybersecurity debate. This is despite the fact that no cyberattack has come close to realizing such impacts. This book argues that such scenarios are part of a broader rhetoric of cyber-doom within the U.S. cybersecurity debate, and takes a multidisciplinary approach that draws on research in history, sociology, communication, psychology, and political science. It identifies a number of variations of cyber-doom rhetoric, then places them into a larger historical context, assesses how realistic the fears expressed in such rhetoric are, and finally draws out the policy implications of relying on these fears to structure our response to cybersecurity challenges. The United States faces very real cybersecurity challenges that are, nonetheless, much less dramatic than what is implied in the rhetoric. This book argues that relying on cyber-doom rhetoric to frame our thinking about such threats is counterproductive, and encourages us to develop ways of thinking and speaking about cybersecurity beyond cyber-doom. This book will be of much interest to students of cybersecurity, foreign policy, public administration, national security, and international relations in general.
Call Number: Online
Publication Date: 2019
Cybersecurity Ethics by Mary ManjikianThis new textbook offers an accessible introduction to the topic of cybersecurity ethics. The book is split into three parts. Part I provides an introduction to the field of ethics, philosophy and philosophy of science, three ethical frameworks - virtue ethics, utilitarian ethics and communitarian ethics - and the notion of ethical hacking. Part II applies these frameworks to particular issues within the field of cybersecurity, including privacy rights, intellectual property and piracy, surveillance, and cyberethics in relation to military affairs. The third part concludes by exploring current codes of ethics used in cybersecurity. The overall aims of the book are to: provide ethical frameworks to aid decision making; present the key ethical issues in relation to computer security; highlight the connection between values and beliefs and the professional code of ethics. The textbook also includes three different features to aid students: 'Going Deeper' provides background information on key individuals and concepts; 'Critical Issues' features contemporary case studies; and 'Applications' examine specific technologies or practices which raise ethical issues. The book will be of much interest to students of cybersecurity, cyberethics, hacking, surveillance studies, ethics and information science.
Call Number: Online
Publication Date: 2017
Information Warfare in the Age of Cyber Conflict by Christopher Whyte (Editor)This book examines the shape, sources and dangers of information warfare (IW) as it pertains to military, diplomatic and civilian stakeholders. Cyber warfare and information warfare are different beasts. Both concern information, but where the former does so exclusively in its digitized and operationalized form, the latter does so in a much broader sense: with IW, information itself is the weapon. The present work aims to help scholars, analysts and policymakers understand IW within the context of cyber conflict. Specifically, the chapters in the volume address the shape of influence campaigns waged across digital infrastructure and in the psychology of democratic populations in recent years by belligerent state actors, from the Russian Federation to the Islamic Republic of Iran. In marshalling evidence on the shape and evolution of IW as a broad-scoped phenomenon aimed at societies writ large, the authors in this book present timely empirical investigations into the global landscape of influence operations, legal and strategic analyses of their role in international politics, and insightful examinations of the potential for democratic process to overcome pervasive foreign manipulation. This book will be of much interest to students of cybersecurity, national security, strategic studies, defence studies and International Relations in general.
Call Number: Online
Publication Date: 2020
Listening in by Susan LandauA cybersecurity expert and former Google privacy analyst's urgent call to protect devices and networks against malicious hackers? New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country's electricity--and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.
Call Number: K3264 .C65 L38 2017
Publication Date: 2017
The United States' Defend Forward Cyber Strategy by Jack GoldsmithIn the 2010s, America's adversaries conducted numerous damaging cyber operations inside the United States: the Office of Personnel Management breach, attacks on banks, persistent intellectual property theft by China, and the Russian intervention in the 2016 election. The US - possessor of theworld's most powerful cyber arsenal - responded in 2018 by unveiling a new Defend Forward strategy. It is a large step in the direction of more aggressive action in cyberspace - albeit for defensive ends. The US has not attempted to hide this shift. To the contrary, it has telegraphed the change.But the telegraphing has taken place at a highly abstract level. Very little is known about precisely what types of operations Defend Forward entails. While the US government has asserted that Defend Forward is consistent with domestic and international law, it has not explained how the new strategyovercomes the perceived legal constraints that previously tempered US responses to cyber intrusions and threats. This volume, edited by Jack Goldsmith and featuring a cast of leading scholars in the field, provides an authoritative overview of the origins and operation of Defend Forward, and acomprehensive assessment of its legality. For anyone interested in the future of great power conflict and the cyber strategies that the US is deploying against its adversaries, The United States' Defend Forward Cyber Strategy is an essential read.
DTIC (Defense Technical Information Center)This link opens in a new windowPublic STINET: Scientific & Technical Information Network
Unclassified defense information
Data on a wide range of defense and defense-related topics
Technical reports and contractor studies, many in full-text PDF format
Student papers originating at the various service schools
Naval War College JMO papers
EBSCO Int'l Security & Counter-Terrorism Reference CenterThis link opens in a new windowIntelligence, security, and counter-terrorism issues
Full text
Journal articles; reference material
Country reports, news feeds, and Web-based information on terrorism and security
Expert analyses and reports
Recent developments across the international political, military, economic, social and technical spectrum
Current biographies
EBSCO Military & Government CollectionThis link opens in a new windowMilitary and defense related periodicals, pamphlets, and newsletters
Select Military & Government Collection (option to select Security and Counter Terrorism Reference Center and to search both collections simultaneously)
Search for a specific title or browse a particular periodical
Publications indexed in this database include Air Force Comptroller, Army Reserve Magazine, Defence Studies, Global Security Review, JFQ: Joint Force Quarterly, Military Technology, National Review, Combat Edge, FBI Law Enforcement Bulletin, Foreign Affairs, and Naval Forces
Print or save single pages, one page at a time.
Homeland Security Digital LibraryThis link opens in a new windowHomeland security strategy, policy and research documents published by:
Federal, state and local government agencies
International governments and institutions
Research institutions, universities, think tanks
Jane's Online (CAC access)This link opens in a new windowMilitary and defense information
Country by country internal and external security and threat assessments
Defense news and analysis
Order of battle information for armies, navies and air forces worldwide
Information on military systems and equipment
Geopolitical and terrorism intelligence
ProQuest CentralThis link opens in a new windowThis collection serves as the central resource for researchers at all levels. Covers more than 160 subject areas including business, economics, military, news and world affars, science, telecommunications, etc. through scholarly journals, newspapers, reports, books, magazines, trade publications and videos.
Includes: ProQuest Research Library; ProQuest Military; ProQuest Asian Business; ABI/Inform Complete; Wall Street Journal; OxResearch; and many more.