• DocumentCode
    565390
  • Title

    A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict

  • Author

    Fanelli, Robert ; Conti, Gregory

  • Author_Institution
    United States Cyber Command, Fort Meade, MD, USA
  • fYear
    2012
  • fDate
    5-8 June 2012
  • Firstpage
    1
  • Lastpage
    13
  • Abstract
    Throughout history, the law of warfare has evolved to protect non-combatants and limit collateral damage. The same legal and ethical constraints apply to the conduct of cyber warfare, where it is similarly desirable to limit the effects of offensive actions to specific locations and groups. However, conventional wisdom suggests that this is extremely difficult, if not impossible to accomplish in the cyber domain. In this paper, we argue to the contrary. It is possible to constrain the effects of cyber actions to specifically desired, legitimate targets while significantly limiting collateral damage and injury to non-combatants. To this end we present a generalized methodology for analysis of the targeting and effects of cyber operations with respect to principles of lawful conduct in armed conflict. This methodology includes a framework of effects categories, target attributes and control measures to direct and constrain cyber operations. It also includes a process for evaluating these effects and controls against the principles for lawful conduct in armed conflict. We illustrate the methodology in action by applying it to W32.Stuxnet, software widely considered to be a cyber weapon. Our results indicate that it is entirely possible to analyze complex cyber war problems, identify legally authorized courses of action, and focus effects on desired targets while greatly minimizing collateral damage.
  • Keywords
    Internet; law; military computing; collateral damage; cyber operations; cyber warfare; lawful armed conflict context; Cyberspace; Force; Information systems; Kinetic theory; Law; Sea measurements; Weapons; collateral damage; cyber operations; law of armed conflict; targeting;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cyber Conflict (CYCON), 2012 4th International Conference on
  • Conference_Location
    Tallinn
  • Print_ISBN
    978-1-4673-1270-7
  • Type

    conf

  • Filename
    6243983