Cyber Weapons and the U.S. Constitution.

Autor: Kushwaha, Neal, Watson, Bruce
Zdroj: Proceedings of the European Conference on Cyber Warfare & Security; 2018, p612-622, 11p, 5 Diagrams
Abstrakt: Over the last few decades, several technology specialists have collected computer viruses and other malware. Today, if one desires, they can download current malware collections from Internet-based sources1. It could be argued that a large majority of older malware would not be as effective as the day they were written, due to the target systems of their time. But what if a nation state's tailored cyber weapons cache was copied and used against you, your fellow citizen, a corporation, your nation, or another nation? The public perception of cyber weapons combined with the interpretation of the U.S. Constitution's Second and Fourteenth Amendments may lead the U.S. public to believe they have the right to bear "cyber" arms and use them. Upon establishing that U.S. citizens have these rights, this paper examines the possibility of cyber weapon storage regulations, the challenges of policing, and the potential international impact. This position paper compares cyber weapons and their use with traditional firearms, allowing the reader to easily digest the contrasts and similarities. The paper further explores the complexities of cyber borders, attribution, harming unintended targets, the black letter rules of the Tallinn Manual, and more. Will these challenges influence U.S. law makers to possibly consider limiting the interpretation of the U.S Constitution's Amendments to explicitly exclude cyber weapons? [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index