Weighing the Case For a Convention to Limit Cyberwarfare

By David Elliott

Cyberattack is emerging as a new type of nonlethal weapon that can cause substantial harm to society, especially when used in its most advanced version by countries at war. It may be time to consider an international convention to limit the initiation of such use, particularly against targets that are part of critical national infrastructure and are basically civilian.

Click here to return to the full article.

3 comments:

Anonymous said...

The current, and most widely accepted, definition of cyberattack is derived from DoD. Cyberattack—or, more commonly, Computer Network Attack (CNA)—is defined as actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Note the term ‘deceive’ is not included in the definition. Deception effects are those measures designed to mislead the enemy by manipulation, distortion, or falsification of evidence to induce the enemy to react in a manner prejudicial to the enemy’s interests. CNA can support a deception operation by providing a deception narrative through computers. Furthermore, deception operations support CNA by providing targets and narratives to enhance CNA. However, CNA does not deceive an Information System.

Anonymous said...

The current, and most widely accepted, definition of cyberattack is derived from DoD. Cyberattack—or, more commonly, Computer Network Attack (CNA)—is defined as actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Note the term ‘deceive’ is not included in the definition. Deception effects are those measures designed to mislead the enemy by manipulation, distortion, or falsification of evidence to induce the enemy to react in a manner prejudicial to the enemy’s interests. CNA can support a deception operation by providing a deception narrative through computers. Furthermore, deception operations support CNA by providing targets and narratives to enhance CNA. However, CNA does not deceive an Information System.

Lima Tango said...

Following the Wikileaks fiasco, the time has now come for the United States and its Allies to embrace a global strategy to combat cyber-terrorism.