SlideShare a Scribd company logo
Cyber Weapons Proliferation
Name:
Date: 03-30-2021
TOPIC: CYBER WEAPON PROLIFERATION
Currently there is no widely accepted definition on the concept
of cyber weapon, but it can be described as a tool which has
been modified for the purpose of carrying out malicious threats
or attacks in the cyber space.
The use of Cyber space as a weapon is gradually gaining
recognition, to the extent that it is currently been considered a
Weapon of Mass Destruction.
In the US. For Instance, the Department of Homeland Security
is tasked with the responsibility of protecting its citizens
against any form of threat including cyber-attacks. The US has
traditionally been perceived to be the world's most dominant
cyber force in terms of this kind. Both their capabilities
(defensive and offensive) have been actively developed over the
last two decades, and appear to be superior to others. In order to
strengthen U.S. space defense, the United States Cyber
Command (US CYBER) was established in 2010 to ensure
freedom of action in cyberspace for the US government and its
allies, but prevent adversaries from doing the same.
The three service elements that comprise USCYBER are the
Army Cybercom, the Air Force Cybercom, and the Fleet
Cybercom. In August 2017 the United States Cyber Command
was elevated to the status of a Unified Combatant Command.
The National Defense Strategy for 2018 stated that the US
government will prioritize the integration of cyber capabilities
into the full spectrum of military operations.[footnoteRef:1] [1:
Cristian Barbieri, Jean-Pierre Darnis & Carolina Polito
“Non-proliferation Regime for Cyber Weapons. A Tentative
Study” http://www.iai.it/sites/default/files/iai1803.pdf accessed
March 30th, 2021]
The proliferations in weaponisation of cyber space by terrorist
groups to carry out destructive threats have necessitated the
need for in depth analysis on the regulation of the use of cyber
space.
In conclusion, although clearly resembling weapons, others say
cyberspace might have a different potential to do great harm
without actually inflicting financial or human loss, often cyber
weapons may be used as less dangerous "conventional" weapons
and canolays.
However, due to the fast pace of cyber-related technological
developments, leadership changes, senior defense officials must
be up to speed with how these technologies impact national
security and defense mechanisms so they can have updated or
revisions to the current laws regulating cyber usage.
Furthermore, it is suggested that in other to combat the use of
cyber space as a weapon, one has to disable the source of the
threat in order to neutralize the "cyber weapon" used to attack a
target, thereby rendering them ineffective.
In my opinion, limited reliance on cyber space is recommended
to effectively combat cyber space terrorism.
Running head: TERRORISM
TERRORISM
TERRORISM
Name:
Date: 03-30-2021
Terrorism is the act of using intimidation and violence
unlawfully to instill fear for political and social gain. Terrorism
can be either domestic where the citizens execute terrorism
without foreign influence or either international, where foreign
governments go beyond their nation's boundaries (Hoffman,
2006). In the aim to respond and combat the terrorism act, the
government is faced with quite several challenges.
Radicalization is a key factor in hinder the fight against
terrorism in terms of corruption among people in government,
oppression against the less powerful countries, and religious
extremism. Another challenge is dealing with terrorism is the
lack of respect and upholding human rights; when people's
rights are denied, they try to seek justice on their hands through
terror activities strategies. Also, several countries especially the
third world countries have limited resources to investing
technology to help them detect the attacks and intercept the
missiles before they hit the ground (Weinberg at el., 2004).
To deal with terrorism, the government is obliged to improve
the border controls by deploying more military forces. This will
limit the movement of foreign travelers without legal documents
into the country who might be the agents of terrorism. Several
countries within the EU have taken the intuitive to introduce
temporary controls at the borders. In addition, ensuring that the
individual human rights are observed, and respect will prevent
the abused citizens or states from taking actions in their hands
in the search for justice. By doing so, they will be minimal
chance of terrorist attacks the public also ought to be alert and
report any suspicious activities within their neighborhood for
the authorities to take the necessary measures before the
terrorist could launch their attacks. The provision of finance to
fund the anti-terrorism department in detect and intercepting
attacks before they happen will help in reducing the magnitude
of the attacks and aid I recovery of the country (Woolsey,
2002).
References
Hoffman, B. (2006). Inside terrorism. Columbia university
press.
Weinberg, L., Pedahzur, A., & Hirsch-Hoefler, S. (2004). The
challenges of conceptualizing terrorism. Terrorism and Political
Violence, 16(4), 777-794.
Woolsey, R. J. (2002). Combating terrorism: strategies of ten
countries. University of Michigan Press.
Department of Homeland Security Mandate 1
Department of Homeland Security Mandate 13
Homeland Security Mandate
Name:
Date: 04-11-2021
Thesis Statement
US Department of Homeland Security (DHS) is a federal
agency mandated to provide; public security, fighting terrorism,
counter cybersecurity threats, border security, immigration
services, and disaster management (Thessin, 2018). It began
operations in the year 2003 after the enactment of “Homeland
security act”.Its formation is attributed to the terrorist attack on
9/11/2001. The mission of the agency is “to develop and
coordinate the implementation of a national strategy to secure
the US from terrorist attacks” This paper will examine DHS role
in counter-terrorism, their capability, how the agency
cooperates with other state intelligence agencies, areas they
require improvement and finally provide recommendations on
how DHS can strengthen their capabilities.
How is DHS structured, its role in anti-terror and counter-terror
capabilities?
DHS is headed by the secretary of homeland security who is
assisted by the deputy secretary. The secretary is in charge of
over 240,000 employees from diverse disciplines such as;
border security, emergency response, aviation, cybersecurity,
and chemical inspectorate. Terrorist activities have evolved and
the DHS faces new terrorism threats such as nuclear, biological,
radiological attacks.
DHS faces threats from foreign terrorist organizations such as
Al Qaeda. Targeted violence is also a major threat to the
peaceful co-existence of the American people. Domestic
terrorism originating from the homeland include; mass attacks
at schools, churches, places of worship, workplace, and during
festival events. DHS is structured in a multi-thronged approach
to fight terrorism(Perrow, 2016). To counter terror attacks, DHS
employs the use of timely intelligence to accurately detect and
respond to threats against US territory. This is done through
collaboration with other partners.
By sharing terrorism threats with; the federal government, state,
local, tribal, private partners, and territorial agencies they have
increased vigilance and protection of critical infrastructure. By
utilizing information sharing border threats are minimized by
recognizing hostile actors long before they set foot on American
soil (Reese, 2017). The introduction of a strategic framework
that focuses on resource allocation, annual assessment, common
understanding of threats, interagency policymaking, and inter-
governmental coordination will be key in thwarting terrorism
attacks in the homeland. The strategic framework will put into
perspective the dangers posed by racially and ethnically
instigated violent extremism, for instance, the white supremacy
extremism.
Further, the strategic framework will provide guidelines on
tackling modern challenges faced today and in the future. The
policy document documents the preventive tools that can be
used to mitigate terrorism threats. To achieve the anticipated
changes, transparency will be key in the endeavor to protect
civil liberties, protection of data, and civil rights. Through the
use of top-notch technologies, advanced training to DHS
personnel, building capacity of international partners, and
analytical capabilities, terrorism threats have been greatly
sustained in the homeland. A multi-layered approach is a
defensive mechanism aimed at reinforcing the first line of
defense. Similarly, this approach has been employed in the
prevention of cyber-terrorism attacks.
DHS through the National Targeting Centre (NTC) has achieved
success in its functions. The targeting center utilizes targeting
tools, classified information to identify terrorist threats
(Monahan, 2016). By “pushing border outside” terrorist
networks, transnational crimes, are identified early in advance
and helps to make interdictions in the global supply chain
before the terrorists find their way into American territory.
Suspicious activity reporting (SAR) is another effective
mechanism to share threat-related information between the
Federal Bureau of investigations(FBI) and SLTT agencies. The
creation of the National SAR helped to streamline
“standardization of collecting, documenting, processing and
analyzing and sharing terrorism-related information.
SLTT agents are trained on emergency response and they help
communities to access resources that build their preparedness.
The federal emergency management agency (FEMA) is involved
in continuous risk evaluation and hazard identification (Reese,
2017). A joint terrorism task force (JTTFs) has been critical in
thwarting terrorist activities. Strong intelligence capabilities
enable DHS to have a glimpse view of the terrorist threat and
this invokes concerted efforts to mitigate the threat and efficacy
in response to the attack.
Online extremism is another emerging threat. It's attributed to
the increased access to the internet. Social media networks have
affected all our daily facets. The availability of the “dark web”
and the increased connectivity of online communities has
become the modern recruiting ground for extremist groups.
Extremist online communities are used as channels to
disseminate their communication and this fosters a sense of
enlightenment to once marginalized groups. To this end, DHS
has employed several measures to counter the growing
misinformation and extremist campaigns.
DHS has stepped up its capability in the use of unmanned
aircraft systems (drones.) Unmanned systems pose a great
danger as they can be used by terrorist groups to deploy
chemical, biological radiological, nuclear chemicals, and drop
explosives. Additionally, drones can be used by terrorists to
surveil their adversaries.DHS cognizant of these new threats has
evolved in its technological capabilities to combat such
terrorism threats (Thessin, 2018).
Additionally, DHS collaborates with other countries to confirm
the identities of people suspected to cause a threat to the
American people. Refugees and asylum seekers are vetted
before their immigration applications are processed. Their
biometrics and biography information is investigated to prevent
exploitation of the National Visa issuance security program.
DHS areas in need of improvement
One of the areas that need urgent attention in DHS is the use of
common technology platforms in its agencies that make up the
DHS. By streamlining information systems, there will be
seamless sharing of actionable information that can lead to
better decision-making. Bureaucracy in DHS has led to
individual agencies procuring IT and security systems that
duplicate similar requirements in other agencies. This is clear
wastage of financial resources. Before new systems are brought
into use, a risk assessment should be conducted to assess the
viability of such security systems.
On the use of unmanned aircraft systems (drones), DHS has to
be more tech-savvy and informed in emerging technological
breakthroughs such as data mining analytics, and
cryptocurrency. Lack of a clear definition of ‘targeted violence’
impedes the understanding as to what constitutes targeted
violence thus the confusion needs to be rectified (Bellavita,
2018). A new definition should be introduced in the DHS
lexicon to shape a common understanding amongst its various
components that are involved in identifying and combating
terrorist threats. Better mitigation measures will be implanted
and adequate resources provided to match the new targeted
violence scope.
Lack of harmonized national statistics on terrorism impedes
better decision-making. DHS should collaboratively work with
other agencies and partners to comprehensively establish
standardized methods of reporting, documenting, and analyzing
terrorism-related statistics and targeted violence. Uniform
nationwide terrorism statistics will help to better protect
communities from terrorism activities.
On transport-related intelligence, identified gaps such as lack of
uniformity in the information held by; aviation, mass transit,
maritime, highway carrier, and freight rail. The department
should re-invent better intelligence sharing with actionable
information that identifies terrorist-related threats to the various
transport nodes (Bellavita, 2018). Passenger/crew vetting
should be harmonized in all transport domains in view of
coordinating accurate intelligence information sharing.
Terrorist group corrupts their way into US territory by coercing
vulnerable government employees working in the transport
sector. The terrorist exploits these corrupt government officials
to obtain insider information that helps them to circumvent
security surveillance systems. Terrorists use these insiders to
launch terrorist attacks. To improve on this, DHS should screen
all its transport sector personnel in all border entry points and
providing security training to the employees. Continuous
vulnerability assessments should be conducted on transport
domain personnel to proactively identify vulnerabilities that can
be exploited by terrorists.
DHS strong points
The US collaborates with its international partners to identify
and mitigate terrorism threats.DHS has been t the forefront to
build the capacity of foreign nations on modern security
procedures. Such partnerships with foreign countries are vital in
countries with poor security tools. Additionally, the department
of defense (DoS) provides such foreign countries with
hardware and software that enable them to actively engage with
DHS agencies to gather and share biometric information of
suspected terrorists (Thessin, 2018). DHS encourages this
country to invest in compatible security tools in their various
installations to identify possible threats and vulnerabilities.
Coast Guard maritime security response team is adequately
trained to combat terrorist threats that occur in the maritime. As
the first line of defense in seas, they are capable of identifying,
interdicting, and neutralizing terror threats in the maritime
domain. SLTT works with professionals, academicians, to have
a clear understanding of the terror threats and hence develop
better strategies to mitigate the threats.DHS Science and
technology directorate helps in the collection, analysis of
threats and provides interventions to prevent terrorism
(Monahan,2016). Going by the latest research, various
engagement efforts are availed to the public to inform them
what to look for in suspected individuals. Cybersecurity and
infrastructure security agency (CISA) in collaboration with
private and public sector take a proactive role in protecting
critical infrastructure.
Indications of how DHS works with national intelligence
agencies, what needs to be improved regarding inter-agency
relations and cooperation?
US intelligence community is made up of 18 agencies which
work autonomously but cooperate in intelligence activities that
support national security.”There are nearly 1,300 governme nt
organizations and nearly 2000 private companies spread in over
10,000 locations in the United States that are devoted to the
task of counterterrorism, homeland security, and intelligence.”
Intelligence has a key role in supporting homeland security to
state, tribal, territorial, and private partners for the department
of homeland security.
Though the FBI is not a component of DHS, it has an initiative
dubbed joint terrorism task force (JTFFs) which fosters
collaboration in the federal government (Thessin, 2018). Coast
Guard intelligence provides actionable information from the
maritime domain to support the operational activities of DHS.
FBI intelligence branch comprises of four components that are
mandated to provide intelligence to DHS. This component
includes; directorate of intelligence, office of the partner
engagement, office of the private sector, and the bureau
intelligence council. These intelligence components of the FBI
and DHS are charged with providing homeland security. Cyber
threat intelligence integration center (CTIIC) is mandated with
the responsibility of analyzing intelligence information
regarding cyber threats to USA territory.
After September 11 attack, most administrative prohibitions that
made it difficult for intelligence agencies to share information
were removed to foster inter-agency cooperation through the
Patriotic act of 2001 and other laws (Perrow, 2016).DHS is not
envisioned to duplicate the work of other intelligence
organizations, and to this end, it doesn’t have its agents,
satellites nor signals. The law that established DHS intended an
information analysis body receiving crucial leads from the
intelligence community (IC), law enforcement, local agencies,
and unclassified open-source information from the media,
journals, internet, periodicals, etc.
Analysts from DHS assess information shared by the
intelligence community by conducting vulnerability assessments
to identify potential terrorist threats. Armed with actionable
information The intelligence community is responsible for
disseminating recommendation measures critical for protecting
critical infrastructure in liaison with other agencies. On the
other hand, DHS is charged with the responsibility of protecting
classified information received from the intelligence community
from unauthorized access and the information must be used in
executing official duties. This guideline is intended to cure the
problem of misusing private information received by DHS
analysts. As is the case with other intelligence agencies,
classified information/materials are to be handled in a manner
prescribed by the director of central intelligence (DCI).
Homeland security act of 2002 makes the DHS information
analysis component a member of the intelligence
community.USA patriotic act gave government officials at all
levels the authority to collect and share information. The
establishment of a national criminal intelligence plan led to the
establishment of the joint terrorism task force in all FBI field
stations (Reese, 2018). The creation of fusion centers in each
state enabled much more sharing of terrorism-related
information. Homeland security information network connects
USA territories and major cities with homeland security
operations. Fusion centers at the local levels(states) provide
actionable information in line with national security objectives.
The national cybersecurity division of the DHS is mandated to
provide cybersecurity by working with public and private
partners to safeguard America’s cyberspace at all times. It does
this by analyzing risks, prioritizing resources, and providing
implementation measures. The cybersecurity component
performs software assurance activities, and “cyber storm” after
every two years to test nations' preparedness on cyber terrorism
threats. Additionally, Einstein network monitoring software is
installed outside the DHS network gateway to monitor data
packets moving in and out of the agencies network with a view
of identifying anomalies that might indicate hacking activities
(Perrow, 2018)
Findings
In the cause of DHS operations and their collaboration with
other deferral agencies, the privacy of the individual, their civil
liberties, and civil rights are jeopardized. As an institution
formed to protect the American people and their critical
infrastructure, these rights and freedom have to be guarded.
Even though the right to express one’s ideas is provided for in
the first amendment, violent acts, anti-government ideologies
cannot be tolerated as they are criminal. Targeted violence is on
the rise and is closely associated with white supremacist
ideologies. DHS must take caution to avoid stigmatizing certain
communities in their methods of identifying targeted violence.
Moreover, DHS should rely on verifiable information at all
times so as not to negate the progress made in achieving civil
rights, privacy, and civil liberties.
Coordinated intelligence sharing is paramount in combating
terrorism and transnational crimes. The deadly attack of 9/11
was attributed to the laxity in sharing crucial leads that could
have helped to prevent the attack (Bullock, 2018). On border
security, it plays a critical role in preventing foreign to resist
from accessing America’s territory. Emerging technologies such
as unmanned aircraft systems pose a security threat to the
homeland. These unmanned systems (drones) can potentially be
used by terrorists to deploy; biological, radiological, and
nuclear materials.
Recommendations
Returnees from extremist groups such as ISIS pose a security
threat to homeland security. Actions should be taken to monitor
their international travel movements as they are capable of
influencing domestic radicalization on the most vulnerable
groups. The department of homeland security should work with
its allies to ensure terrorist fighters do not enter their countries.
To mitigate domestic terrorism, actions should be taken to
counter domestic terrorists who are selective on their targets.
Their targets are motivated by factors such as; race, nationality,
ethnicity, sexual orientation, religion, and gender. White
supremacist is another form of violent extremism. They are
most linked to lone attackers and they can be attributed to
hatred to marginalized groups and the immigrants. This kind of
extremism is now taking a transnational outlook and appears to
be catalyzed by social media. DHS should take decisive actions
to bring down terrorist-linked websites such as; Gab, 8chan,
Endchan, and encrypted communication channels used by
terrorist groups (Thessin, 2018). In this way, the groups would
be disoriented and their conspiracy theories would collapse.
DHS should support local communities by empowering SLTT
to ensure they can identify threats and violent extremism signs.
With changing technological advancement, the intelligence
community should be cognizant of this new reality and adjust
their intelligence landscape appropriately to counter terrorist
threats. Annual homeland threat Assessment should be further
strengthened to provide a baseline report on the level of
preparedness to thwart terrorist attacks. This report would help
homeland security to prioritize resources and measure the level
of inter-agency coordination (Bullock et al., 2018).DHS
methods of collecting and analyzing terror-related statistics
should be streamlined with intelligence information it receives
from other federal agencies. This can be done through a
collaborative approach with academicians, professionals, and
non-governmental partners to establish a standardized method to
collect terror-related statistics.
On the transport node. DHS should adopt the intelligence-driven
approach in sharing actionable knowledge across the other
transport sectors such as aviation, freight, pipeline, and
highway carrier, maritime and mass transit. Moreover, DHS
should invest in research and development and work in
collaboration with the private sector, academician, and federal
agencies to avoid “technological surprise” and to be in a better
position to understand emerging trends in terrorist attacks. By
doing this, DHS will identify technologies that ought to be
developed soon to combat the growing threats of terrorism
(Thessin, 2018).
Bureaucracies at DHS can be a great hindrance in the adoption
of new effective technologies. These bureaucracies should be
eliminated to allow flexible deployment of technology that is in
sync with rapidly evolving terrorism and targeted violence.DHS
should capitalize on its highly specialized knowledge to protect
homeland missions. By extending cooperation to America’s
allies, identification of terrorists can be identified and their
biometrics shared with DHS to block white list them in their
immigration systems.
References
Thessin, J. (2018). Department of Homeland Security.
Perrow, C. (2016). Disaster after 9/11 The Department of
Homeland Security and the Intelligence Reorganization.
Reese, S. (2017, April). Defining homeland security: Analysis
and congressional considerations. Washington, DC:
Congressional Research Service, Library of Congress.
Bullock, J. A., & Haddow, G. D. (2018). Introduction to
homeland security. Elsevier.
Bellavita, C. (2018). Changing homeland security: What is
homeland security?. Homeland Security Affairs, 4(02).
Monahan, T. (2016). The future of security? Surveillance
operations at homeland security fusion centers. Social Justice,
37(2/3 (120-121), 84-98.
1
Cyber Weapon Proliferation
Name:
Due Date: 04-12-2021
Horschig, D. (2020). Cyber-weapons in nuclear counter-
proliferation. Defense & Security Analysis, 36(3), 352-371.
This article provides a view on the conditions that are effective
in nuclear counter-proliferation in cyber weapons. Iran, North
Korea, and Saudi Arabia are some of the states that have shown
great interest in nuclear proliferation, and their effectiveness
remains relevant. Therefore, this article provides the general
applicability of cyber weapons and their importance in nuclear
counter-proliferation. A comparative case study analysed that
the cyber operations are effective against the nuclear programs
whose developments are yet to be finished since they can
disrupt and delay the program at hand but not disrupt the whole
process. This means that effectiveness can only be increased by
combining different conventional weapons.
Kucharski, L., Loss, R., & Reddie, A. (2018). Annotated
Bibliography:" US-Russian Nuclear Arms Control: Crisis and
Collapse or Crossroads?" (No. LLNL-TR-755380). Lawrence
Livermore National Lab.(LLNL), Livermore, CA (United
States).
This article tries to find the standard solution to the nuclear
weapons proliferation frameworks where both the countries
mutually benefit from the agreement. From the article, an
agreement should be set up to like a threat to the nations if
anything comes. Then there are set guidelines that are to be
followed. The agreements aim to solve all the worries the united
states passes through, and it should serve the interest of the
people of America, allies, and partners. The proposal should
identify the benefits and the risks of replanning. There should
be also standby plans to help solve any failure of the arms
control. All these strategies and agreements are aimed at
addressing the risks of cyber weapon proliferation.
Varela-Vaca, Á. J., Rosado, D. G., Sánchez, L. E., Gómez-
López, M. T., Gasca, R. M., & Fernández-Medina, E. (2020).
Definition and Verification of Security Configurations of
Cyber-Physical Systems. In Computer Security (pp. 135-155).
Springer, Cham.
The article focuses on the proliferation of the cyber-physical
system, which is presumed to be raising security challenges.
They serve as complex systems, integrating physical elements
into automated networked systems with several sensors and
actuators. All these devices make the system's data storage a bit
complex to manage. The construction of the secure Coast is a
challenge that requires the adoption and concentration of the
requirements elements in the security configuration.
Nasir, K. The Evolution of Cyber War: The Actors and
Strategies Shaping the Internet of Today. Bangladesh Institute
of Peace and Security Studies (BIPSS), 36.
According to the article, the current world is geared by
information technology and internet connectivity. Through
connectivity, there is connections and collaborations hand,
which is why the evolution of warfare has been on the rise. The
new technologies and techniques are easily acquired from the
internet, which in the long run results in developments. The
developments have been both on the strategic, tactical, and
proliferation of weapons. As a result, both the states and the
non-states are involved in their weapons' technological
advancements, which they can later use to defend themselves
against enemies and ensure the attackers' anonymity. On the
other hand, the cipher weapons in the states are adapting,
resulting in conflicts.
Bellovin, S. M., Landau, S., & Lin, H. S. (2017). Limiting the
undesired impact of cyber weapons: technical requirements and
policy implications. Journal of Cybersecurity, 3(1), 59-68.
This article analyses the proliferation of cyber weapons. Their
proliferation is much easier than the proliferation of kinetic
weapons; their destruction and the target are essential. This
leaves no traces behind, and no parts left after the attack cannot
be assembled by one another after use. Additionally, the
manufacture of cyber weapons is relatively cheaper. This makes
the illegal bodies take advantage and explore in their
manufacturing, leading to warfare among the states.
Hare, F. B. (2019). Precision cyber weapon systems: An
important component of a responsible national security
strategy?. Contemporary security policy, 40(2), 193-213.
This article focuses on the advancements made on the
conventional weapon capabilities and precision. They are the
elements of weapons that are accepted and expected in the
community of cyberspace. The article argues the development
of precision weapon systems should be used in legal conflicts.
This makes a state of being responsible for its national security
strategy to reduce violence and the destructions in conflicts. In
the long run, unnecessary wars will be reduced due to the
responsibilities taken by the states.
References
Bellovin, S. M., Landau, S., & Lin, H. S. (2017). Limiting the
undesired impact of cyber weapons: technical requirements and
policy implications. Journal of Cybersecurity, 3(1), 59-68.
Hare, F. B. (2019). Precision cyber weapon systems: An
important component of a responsible national security
strategy?. Contemporary security policy, 40(2), 193-213.
Horschig, D. (2020). Cyber-weapons in nuclear counter-
proliferation. Defense & Security Analysis, 36(3), 352-371.
Kucharski, L., Loss, R., & Reddie, A. (2018). Annotated
Bibliography:" US-Russian Nuclear Arms Control: Crisis and
Collapse or Crossroads?" (No. LLNL-TR-755380). Lawrence
Livermore National Lab.(LLNL), Livermore, CA (United
States).
Nasir, K. The Evolution of Cyber War: The Actors and
Strategies Shaping the Internet of Today. Bangladesh Institute
of Peace and Security Studies (BIPSS), 36.
Varela-Vaca, Á. J., Rosado, D. G., Sánchez, L. E., Gómez-
López, M. T., Gasca, R. M., & Fernández-Medina, E. (2020).
Definition and Verification of Security Configurations of
Cyber-Physical Systems. In Computer Security (pp. 135-155).
Springer, Cham.
Cyber Weapons Proliferation

More Related Content

Similar to Cyber Weapons Proliferation

Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informaticsmali chum
 
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Elsevier
 
10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate Counterterrori10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate CounterterroriBenitoSumpter862
 
10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate Counterterrori10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate CounterterroriSantosConleyha
 
Heritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendHeritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendGiuliano Tavaroli
 
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...GiulianoBo45
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxIRESH3
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxtawnyataylor528
 
Terrorism and Criminal SEC400 Terrorism .docx
Terrorism and Criminal     SEC400 Terrorism .docxTerrorism and Criminal     SEC400 Terrorism .docx
Terrorism and Criminal SEC400 Terrorism .docxmattinsonjanel
 

Similar to Cyber Weapons Proliferation (15)

Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
Essay On Terrorism
Essay On TerrorismEssay On Terrorism
Essay On Terrorism
 
Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...Statement of Erroll G. Southers before the US House of Representatives Commit...
Statement of Erroll G. Southers before the US House of Representatives Commit...
 
R41674
R41674R41674
R41674
 
R41674
R41674R41674
R41674
 
10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate Counterterrori10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate Counterterrori
 
10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate Counterterrori10Liberty University School of Graduate Counterterrori
10Liberty University School of Graduate Counterterrori
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main
 
Heritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trendHeritage Foundation Report: 40 years of terror trend
Heritage Foundation Report: 40 years of terror trend
 
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
Giulianno Bozzo Moncada National commission-on-terrorism-report-counting-the-...
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
Question 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docxQuestion 1Outline the various components of transportation and.docx
Question 1Outline the various components of transportation and.docx
 
Justin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docxJustin BennettTerrorism is one of the six strategic risk that is.docx
Justin BennettTerrorism is one of the six strategic risk that is.docx
 
Terrorism and Criminal SEC400 Terrorism .docx
Terrorism and Criminal     SEC400 Terrorism .docxTerrorism and Criminal     SEC400 Terrorism .docx
Terrorism and Criminal SEC400 Terrorism .docx
 

More from OllieShoresna

this assignment is about Mesopotamia and Egypt. Some of these cu.docx
this assignment is about Mesopotamia and Egypt. Some of these cu.docxthis assignment is about Mesopotamia and Egypt. Some of these cu.docx
this assignment is about Mesopotamia and Egypt. Some of these cu.docxOllieShoresna
 
This assignment has two goals 1) have students increase their under.docx
This assignment has two goals 1) have students increase their under.docxThis assignment has two goals 1) have students increase their under.docx
This assignment has two goals 1) have students increase their under.docxOllieShoresna
 
This assignment has two parts 1 paragraph per questionIn wh.docx
This assignment has two parts 1 paragraph per questionIn wh.docxThis assignment has two parts 1 paragraph per questionIn wh.docx
This assignment has two parts 1 paragraph per questionIn wh.docxOllieShoresna
 
This assignment is a minimum of 100 word all parts of each querstion.docx
This assignment is a minimum of 100 word all parts of each querstion.docxThis assignment is a minimum of 100 word all parts of each querstion.docx
This assignment is a minimum of 100 word all parts of each querstion.docxOllieShoresna
 
This assignment has three elements a traditional combination format.docx
This assignment has three elements a traditional combination format.docxThis assignment has three elements a traditional combination format.docx
This assignment has three elements a traditional combination format.docxOllieShoresna
 
This assignment has four partsWhat changes in business software p.docx
This assignment has four partsWhat changes in business software p.docxThis assignment has four partsWhat changes in business software p.docx
This assignment has four partsWhat changes in business software p.docxOllieShoresna
 
This assignment consists of two partsthe core evaluation, a.docx
This assignment consists of two partsthe core evaluation, a.docxThis assignment consists of two partsthe core evaluation, a.docx
This assignment consists of two partsthe core evaluation, a.docxOllieShoresna
 
This assignment asks you to analyze a significant textual elemen.docx
This assignment asks you to analyze a significant textual elemen.docxThis assignment asks you to analyze a significant textual elemen.docx
This assignment asks you to analyze a significant textual elemen.docxOllieShoresna
 
This assignment allows you to learn more about one key person in Jew.docx
This assignment allows you to learn more about one key person in Jew.docxThis assignment allows you to learn more about one key person in Jew.docx
This assignment allows you to learn more about one key person in Jew.docxOllieShoresna
 
This assignment allows you to explore the effects of social influe.docx
This assignment allows you to explore the effects of social influe.docxThis assignment allows you to explore the effects of social influe.docx
This assignment allows you to explore the effects of social influe.docxOllieShoresna
 
This assignment addresses pretrial procedures that occur prior to th.docx
This assignment addresses pretrial procedures that occur prior to th.docxThis assignment addresses pretrial procedures that occur prior to th.docx
This assignment addresses pretrial procedures that occur prior to th.docxOllieShoresna
 
This assignment allows you to learn more about one key person in J.docx
This assignment allows you to learn more about one key person in J.docxThis assignment allows you to learn more about one key person in J.docx
This assignment allows you to learn more about one key person in J.docxOllieShoresna
 
This assignment allows you to explore the effects of social infl.docx
This assignment allows you to explore the effects of social infl.docxThis assignment allows you to explore the effects of social infl.docx
This assignment allows you to explore the effects of social infl.docxOllieShoresna
 
this about communication please i eant you answer this question.docx
this about communication please i eant you answer this question.docxthis about communication please i eant you answer this question.docx
this about communication please i eant you answer this question.docxOllieShoresna
 
Think of a time when a company did not process an order or perform a.docx
Think of a time when a company did not process an order or perform a.docxThink of a time when a company did not process an order or perform a.docx
Think of a time when a company did not process an order or perform a.docxOllieShoresna
 
Think_Vision W5- Importance of VaccinationImportance of Vaccinatio.docx
Think_Vision W5- Importance of VaccinationImportance of Vaccinatio.docxThink_Vision W5- Importance of VaccinationImportance of Vaccinatio.docx
Think_Vision W5- Importance of VaccinationImportance of Vaccinatio.docxOllieShoresna
 
Thinks for both only 50 words as much for each one1-xxxxd, unf.docx
Thinks for both only 50 words as much for each one1-xxxxd, unf.docxThinks for both only 50 words as much for each one1-xxxxd, unf.docx
Thinks for both only 50 words as much for each one1-xxxxd, unf.docxOllieShoresna
 
Think of a specific change you would like to bring to your organizat.docx
Think of a specific change you would like to bring to your organizat.docxThink of a specific change you would like to bring to your organizat.docx
Think of a specific change you would like to bring to your organizat.docxOllieShoresna
 
Think of a possible change initiative in your selected organization..docx
Think of a possible change initiative in your selected organization..docxThink of a possible change initiative in your selected organization..docx
Think of a possible change initiative in your selected organization..docxOllieShoresna
 
Thinking About Research PaperConsider the research question and .docx
Thinking About Research PaperConsider the research question and .docxThinking About Research PaperConsider the research question and .docx
Thinking About Research PaperConsider the research question and .docxOllieShoresna
 

More from OllieShoresna (20)

this assignment is about Mesopotamia and Egypt. Some of these cu.docx
this assignment is about Mesopotamia and Egypt. Some of these cu.docxthis assignment is about Mesopotamia and Egypt. Some of these cu.docx
this assignment is about Mesopotamia and Egypt. Some of these cu.docx
 
This assignment has two goals 1) have students increase their under.docx
This assignment has two goals 1) have students increase their under.docxThis assignment has two goals 1) have students increase their under.docx
This assignment has two goals 1) have students increase their under.docx
 
This assignment has two parts 1 paragraph per questionIn wh.docx
This assignment has two parts 1 paragraph per questionIn wh.docxThis assignment has two parts 1 paragraph per questionIn wh.docx
This assignment has two parts 1 paragraph per questionIn wh.docx
 
This assignment is a minimum of 100 word all parts of each querstion.docx
This assignment is a minimum of 100 word all parts of each querstion.docxThis assignment is a minimum of 100 word all parts of each querstion.docx
This assignment is a minimum of 100 word all parts of each querstion.docx
 
This assignment has three elements a traditional combination format.docx
This assignment has three elements a traditional combination format.docxThis assignment has three elements a traditional combination format.docx
This assignment has three elements a traditional combination format.docx
 
This assignment has four partsWhat changes in business software p.docx
This assignment has four partsWhat changes in business software p.docxThis assignment has four partsWhat changes in business software p.docx
This assignment has four partsWhat changes in business software p.docx
 
This assignment consists of two partsthe core evaluation, a.docx
This assignment consists of two partsthe core evaluation, a.docxThis assignment consists of two partsthe core evaluation, a.docx
This assignment consists of two partsthe core evaluation, a.docx
 
This assignment asks you to analyze a significant textual elemen.docx
This assignment asks you to analyze a significant textual elemen.docxThis assignment asks you to analyze a significant textual elemen.docx
This assignment asks you to analyze a significant textual elemen.docx
 
This assignment allows you to learn more about one key person in Jew.docx
This assignment allows you to learn more about one key person in Jew.docxThis assignment allows you to learn more about one key person in Jew.docx
This assignment allows you to learn more about one key person in Jew.docx
 
This assignment allows you to explore the effects of social influe.docx
This assignment allows you to explore the effects of social influe.docxThis assignment allows you to explore the effects of social influe.docx
This assignment allows you to explore the effects of social influe.docx
 
This assignment addresses pretrial procedures that occur prior to th.docx
This assignment addresses pretrial procedures that occur prior to th.docxThis assignment addresses pretrial procedures that occur prior to th.docx
This assignment addresses pretrial procedures that occur prior to th.docx
 
This assignment allows you to learn more about one key person in J.docx
This assignment allows you to learn more about one key person in J.docxThis assignment allows you to learn more about one key person in J.docx
This assignment allows you to learn more about one key person in J.docx
 
This assignment allows you to explore the effects of social infl.docx
This assignment allows you to explore the effects of social infl.docxThis assignment allows you to explore the effects of social infl.docx
This assignment allows you to explore the effects of social infl.docx
 
this about communication please i eant you answer this question.docx
this about communication please i eant you answer this question.docxthis about communication please i eant you answer this question.docx
this about communication please i eant you answer this question.docx
 
Think of a time when a company did not process an order or perform a.docx
Think of a time when a company did not process an order or perform a.docxThink of a time when a company did not process an order or perform a.docx
Think of a time when a company did not process an order or perform a.docx
 
Think_Vision W5- Importance of VaccinationImportance of Vaccinatio.docx
Think_Vision W5- Importance of VaccinationImportance of Vaccinatio.docxThink_Vision W5- Importance of VaccinationImportance of Vaccinatio.docx
Think_Vision W5- Importance of VaccinationImportance of Vaccinatio.docx
 
Thinks for both only 50 words as much for each one1-xxxxd, unf.docx
Thinks for both only 50 words as much for each one1-xxxxd, unf.docxThinks for both only 50 words as much for each one1-xxxxd, unf.docx
Thinks for both only 50 words as much for each one1-xxxxd, unf.docx
 
Think of a specific change you would like to bring to your organizat.docx
Think of a specific change you would like to bring to your organizat.docxThink of a specific change you would like to bring to your organizat.docx
Think of a specific change you would like to bring to your organizat.docx
 
Think of a possible change initiative in your selected organization..docx
Think of a possible change initiative in your selected organization..docxThink of a possible change initiative in your selected organization..docx
Think of a possible change initiative in your selected organization..docx
 
Thinking About Research PaperConsider the research question and .docx
Thinking About Research PaperConsider the research question and .docxThinking About Research PaperConsider the research question and .docx
Thinking About Research PaperConsider the research question and .docx
 

Recently uploaded

Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya - UEM Kolkata Quiz Club
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfQucHHunhnh
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxJenilouCasareno
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfbu07226
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesTechSoup
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resourcesaileywriter
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17Celine George
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...Nguyen Thanh Tu Collection
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxCapitolTechU
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online PresentationGDSCYCCE
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesRased Khan
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTechSoup
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resourcesdimpy50
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17Celine George
 

Recently uploaded (20)

Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
Mattingly "AI & Prompt Design: Limitations and Solutions with LLMs"
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
Keeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security ServicesKeeping Your Information Safe with Centralized Security Services
Keeping Your Information Safe with Centralized Security Services
 
The Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational ResourcesThe Benefits and Challenges of Open Educational Resources
The Benefits and Challenges of Open Educational Resources
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation[GDSC YCCE] Build with AI Online Presentation
[GDSC YCCE] Build with AI Online Presentation
 
Application of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matricesApplication of Matrices in real life. Presentation on application of matrices
Application of Matrices in real life. Presentation on application of matrices
 
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdfTelling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
Telling Your Story_ Simple Steps to Build Your Nonprofit's Brand Webinar.pdf
 
Benefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational ResourcesBenefits and Challenges of Using Open Educational Resources
Benefits and Challenges of Using Open Educational Resources
 
How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17How to the fix Attribute Error in odoo 17
How to the fix Attribute Error in odoo 17
 

Cyber Weapons Proliferation

  • 1. Cyber Weapons Proliferation Name: Date: 03-30-2021 TOPIC: CYBER WEAPON PROLIFERATION Currently there is no widely accepted definition on the concept of cyber weapon, but it can be described as a tool which has been modified for the purpose of carrying out malicious threats or attacks in the cyber space. The use of Cyber space as a weapon is gradually gaining recognition, to the extent that it is currently been considered a Weapon of Mass Destruction. In the US. For Instance, the Department of Homeland Security is tasked with the responsibility of protecting its citizens against any form of threat including cyber-attacks. The US has traditionally been perceived to be the world's most dominant cyber force in terms of this kind. Both their capabilities
  • 2. (defensive and offensive) have been actively developed over the last two decades, and appear to be superior to others. In order to strengthen U.S. space defense, the United States Cyber Command (US CYBER) was established in 2010 to ensure freedom of action in cyberspace for the US government and its allies, but prevent adversaries from doing the same. The three service elements that comprise USCYBER are the Army Cybercom, the Air Force Cybercom, and the Fleet Cybercom. In August 2017 the United States Cyber Command was elevated to the status of a Unified Combatant Command. The National Defense Strategy for 2018 stated that the US government will prioritize the integration of cyber capabilities into the full spectrum of military operations.[footnoteRef:1] [1: Cristian Barbieri, Jean-Pierre Darnis & Carolina Polito “Non-proliferation Regime for Cyber Weapons. A Tentative Study” http://www.iai.it/sites/default/files/iai1803.pdf accessed March 30th, 2021] The proliferations in weaponisation of cyber space by terrorist groups to carry out destructive threats have necessitated the need for in depth analysis on the regulation of the use of cyber space. In conclusion, although clearly resembling weapons, others say cyberspace might have a different potential to do great harm without actually inflicting financial or human loss, often cyber weapons may be used as less dangerous "conventional" weapons and canolays. However, due to the fast pace of cyber-related technological developments, leadership changes, senior defense officials must be up to speed with how these technologies impact national security and defense mechanisms so they can have updated or revisions to the current laws regulating cyber usage. Furthermore, it is suggested that in other to combat the use of cyber space as a weapon, one has to disable the source of the threat in order to neutralize the "cyber weapon" used to attack a
  • 3. target, thereby rendering them ineffective. In my opinion, limited reliance on cyber space is recommended to effectively combat cyber space terrorism. Running head: TERRORISM TERRORISM TERRORISM Name: Date: 03-30-2021
  • 4. Terrorism is the act of using intimidation and violence unlawfully to instill fear for political and social gain. Terrorism can be either domestic where the citizens execute terrorism without foreign influence or either international, where foreign governments go beyond their nation's boundaries (Hoffman, 2006). In the aim to respond and combat the terrorism act, the government is faced with quite several challenges. Radicalization is a key factor in hinder the fight against terrorism in terms of corruption among people in government, oppression against the less powerful countries, and religious extremism. Another challenge is dealing with terrorism is the lack of respect and upholding human rights; when people's rights are denied, they try to seek justice on their hands through terror activities strategies. Also, several countries especially the third world countries have limited resources to investing technology to help them detect the attacks and intercept the missiles before they hit the ground (Weinberg at el., 2004). To deal with terrorism, the government is obliged to improve the border controls by deploying more military forces. This will limit the movement of foreign travelers without legal documents into the country who might be the agents of terrorism. Several countries within the EU have taken the intuitive to introduce temporary controls at the borders. In addition, ensuring that the individual human rights are observed, and respect will prevent the abused citizens or states from taking actions in their hands in the search for justice. By doing so, they will be minimal chance of terrorist attacks the public also ought to be alert and report any suspicious activities within their neighborhood for
  • 5. the authorities to take the necessary measures before the terrorist could launch their attacks. The provision of finance to fund the anti-terrorism department in detect and intercepting attacks before they happen will help in reducing the magnitude of the attacks and aid I recovery of the country (Woolsey, 2002). References Hoffman, B. (2006). Inside terrorism. Columbia university press. Weinberg, L., Pedahzur, A., & Hirsch-Hoefler, S. (2004). The challenges of conceptualizing terrorism. Terrorism and Political Violence, 16(4), 777-794. Woolsey, R. J. (2002). Combating terrorism: strategies of ten countries. University of Michigan Press. Department of Homeland Security Mandate 1 Department of Homeland Security Mandate 13 Homeland Security Mandate Name: Date: 04-11-2021 Thesis Statement
  • 6. US Department of Homeland Security (DHS) is a federal agency mandated to provide; public security, fighting terrorism, counter cybersecurity threats, border security, immigration services, and disaster management (Thessin, 2018). It began operations in the year 2003 after the enactment of “Homeland security act”.Its formation is attributed to the terrorist attack on 9/11/2001. The mission of the agency is “to develop and coordinate the implementation of a national strategy to secure the US from terrorist attacks” This paper will examine DHS role in counter-terrorism, their capability, how the agency cooperates with other state intelligence agencies, areas they require improvement and finally provide recommendations on how DHS can strengthen their capabilities. How is DHS structured, its role in anti-terror and counter-terror capabilities? DHS is headed by the secretary of homeland security who is assisted by the deputy secretary. The secretary is in charge of over 240,000 employees from diverse disciplines such as; border security, emergency response, aviation, cybersecurity, and chemical inspectorate. Terrorist activities have evolved and the DHS faces new terrorism threats such as nuclear, biological, radiological attacks. DHS faces threats from foreign terrorist organizations such as Al Qaeda. Targeted violence is also a major threat to the peaceful co-existence of the American people. Domestic terrorism originating from the homeland include; mass attacks at schools, churches, places of worship, workplace, and during festival events. DHS is structured in a multi-thronged approach to fight terrorism(Perrow, 2016). To counter terror attacks, DHS employs the use of timely intelligence to accurately detect and respond to threats against US territory. This is done through collaboration with other partners. By sharing terrorism threats with; the federal government, state, local, tribal, private partners, and territorial agencies they have increased vigilance and protection of critical infrastructure. By utilizing information sharing border threats are minimized by
  • 7. recognizing hostile actors long before they set foot on American soil (Reese, 2017). The introduction of a strategic framework that focuses on resource allocation, annual assessment, common understanding of threats, interagency policymaking, and inter- governmental coordination will be key in thwarting terrorism attacks in the homeland. The strategic framework will put into perspective the dangers posed by racially and ethnically instigated violent extremism, for instance, the white supremacy extremism. Further, the strategic framework will provide guidelines on tackling modern challenges faced today and in the future. The policy document documents the preventive tools that can be used to mitigate terrorism threats. To achieve the anticipated changes, transparency will be key in the endeavor to protect civil liberties, protection of data, and civil rights. Through the use of top-notch technologies, advanced training to DHS personnel, building capacity of international partners, and analytical capabilities, terrorism threats have been greatly sustained in the homeland. A multi-layered approach is a defensive mechanism aimed at reinforcing the first line of defense. Similarly, this approach has been employed in the prevention of cyber-terrorism attacks. DHS through the National Targeting Centre (NTC) has achieved success in its functions. The targeting center utilizes targeting tools, classified information to identify terrorist threats (Monahan, 2016). By “pushing border outside” terrorist networks, transnational crimes, are identified early in advance and helps to make interdictions in the global supply chain before the terrorists find their way into American territory. Suspicious activity reporting (SAR) is another effective mechanism to share threat-related information between the Federal Bureau of investigations(FBI) and SLTT agencies. The creation of the National SAR helped to streamline “standardization of collecting, documenting, processing and analyzing and sharing terrorism-related information. SLTT agents are trained on emergency response and they help
  • 8. communities to access resources that build their preparedness. The federal emergency management agency (FEMA) is involved in continuous risk evaluation and hazard identification (Reese, 2017). A joint terrorism task force (JTTFs) has been critical in thwarting terrorist activities. Strong intelligence capabilities enable DHS to have a glimpse view of the terrorist threat and this invokes concerted efforts to mitigate the threat and efficacy in response to the attack. Online extremism is another emerging threat. It's attributed to the increased access to the internet. Social media networks have affected all our daily facets. The availability of the “dark web” and the increased connectivity of online communities has become the modern recruiting ground for extremist groups. Extremist online communities are used as channels to disseminate their communication and this fosters a sense of enlightenment to once marginalized groups. To this end, DHS has employed several measures to counter the growing misinformation and extremist campaigns. DHS has stepped up its capability in the use of unmanned aircraft systems (drones.) Unmanned systems pose a great danger as they can be used by terrorist groups to deploy chemical, biological radiological, nuclear chemicals, and drop explosives. Additionally, drones can be used by terrorists to surveil their adversaries.DHS cognizant of these new threats has evolved in its technological capabilities to combat such terrorism threats (Thessin, 2018). Additionally, DHS collaborates with other countries to confirm the identities of people suspected to cause a threat to the American people. Refugees and asylum seekers are vetted before their immigration applications are processed. Their biometrics and biography information is investigated to prevent exploitation of the National Visa issuance security program. DHS areas in need of improvement One of the areas that need urgent attention in DHS is the use of common technology platforms in its agencies that make up the DHS. By streamlining information systems, there will be
  • 9. seamless sharing of actionable information that can lead to better decision-making. Bureaucracy in DHS has led to individual agencies procuring IT and security systems that duplicate similar requirements in other agencies. This is clear wastage of financial resources. Before new systems are brought into use, a risk assessment should be conducted to assess the viability of such security systems. On the use of unmanned aircraft systems (drones), DHS has to be more tech-savvy and informed in emerging technological breakthroughs such as data mining analytics, and cryptocurrency. Lack of a clear definition of ‘targeted violence’ impedes the understanding as to what constitutes targeted violence thus the confusion needs to be rectified (Bellavita, 2018). A new definition should be introduced in the DHS lexicon to shape a common understanding amongst its various components that are involved in identifying and combating terrorist threats. Better mitigation measures will be implanted and adequate resources provided to match the new targeted violence scope. Lack of harmonized national statistics on terrorism impedes better decision-making. DHS should collaboratively work with other agencies and partners to comprehensively establish standardized methods of reporting, documenting, and analyzing terrorism-related statistics and targeted violence. Uniform nationwide terrorism statistics will help to better protect communities from terrorism activities. On transport-related intelligence, identified gaps such as lack of uniformity in the information held by; aviation, mass transit, maritime, highway carrier, and freight rail. The department should re-invent better intelligence sharing with actionable information that identifies terrorist-related threats to the various transport nodes (Bellavita, 2018). Passenger/crew vetting should be harmonized in all transport domains in view of coordinating accurate intelligence information sharing. Terrorist group corrupts their way into US territory by coercing vulnerable government employees working in the transport
  • 10. sector. The terrorist exploits these corrupt government officials to obtain insider information that helps them to circumvent security surveillance systems. Terrorists use these insiders to launch terrorist attacks. To improve on this, DHS should screen all its transport sector personnel in all border entry points and providing security training to the employees. Continuous vulnerability assessments should be conducted on transport domain personnel to proactively identify vulnerabilities that can be exploited by terrorists. DHS strong points The US collaborates with its international partners to identify and mitigate terrorism threats.DHS has been t the forefront to build the capacity of foreign nations on modern security procedures. Such partnerships with foreign countries are vital in countries with poor security tools. Additionally, the department of defense (DoS) provides such foreign countries with hardware and software that enable them to actively engage with DHS agencies to gather and share biometric information of suspected terrorists (Thessin, 2018). DHS encourages this country to invest in compatible security tools in their various installations to identify possible threats and vulnerabilities. Coast Guard maritime security response team is adequately trained to combat terrorist threats that occur in the maritime. As the first line of defense in seas, they are capable of identifying, interdicting, and neutralizing terror threats in the maritime domain. SLTT works with professionals, academicians, to have a clear understanding of the terror threats and hence develop better strategies to mitigate the threats.DHS Science and technology directorate helps in the collection, analysis of threats and provides interventions to prevent terrorism (Monahan,2016). Going by the latest research, various engagement efforts are availed to the public to inform them what to look for in suspected individuals. Cybersecurity and infrastructure security agency (CISA) in collaboration with private and public sector take a proactive role in protecting critical infrastructure.
  • 11. Indications of how DHS works with national intelligence agencies, what needs to be improved regarding inter-agency relations and cooperation? US intelligence community is made up of 18 agencies which work autonomously but cooperate in intelligence activities that support national security.”There are nearly 1,300 governme nt organizations and nearly 2000 private companies spread in over 10,000 locations in the United States that are devoted to the task of counterterrorism, homeland security, and intelligence.” Intelligence has a key role in supporting homeland security to state, tribal, territorial, and private partners for the department of homeland security. Though the FBI is not a component of DHS, it has an initiative dubbed joint terrorism task force (JTFFs) which fosters collaboration in the federal government (Thessin, 2018). Coast Guard intelligence provides actionable information from the maritime domain to support the operational activities of DHS. FBI intelligence branch comprises of four components that are mandated to provide intelligence to DHS. This component includes; directorate of intelligence, office of the partner engagement, office of the private sector, and the bureau intelligence council. These intelligence components of the FBI and DHS are charged with providing homeland security. Cyber threat intelligence integration center (CTIIC) is mandated with the responsibility of analyzing intelligence information regarding cyber threats to USA territory. After September 11 attack, most administrative prohibitions that made it difficult for intelligence agencies to share information were removed to foster inter-agency cooperation through the Patriotic act of 2001 and other laws (Perrow, 2016).DHS is not envisioned to duplicate the work of other intelligence organizations, and to this end, it doesn’t have its agents, satellites nor signals. The law that established DHS intended an information analysis body receiving crucial leads from the intelligence community (IC), law enforcement, local agencies, and unclassified open-source information from the media,
  • 12. journals, internet, periodicals, etc. Analysts from DHS assess information shared by the intelligence community by conducting vulnerability assessments to identify potential terrorist threats. Armed with actionable information The intelligence community is responsible for disseminating recommendation measures critical for protecting critical infrastructure in liaison with other agencies. On the other hand, DHS is charged with the responsibility of protecting classified information received from the intelligence community from unauthorized access and the information must be used in executing official duties. This guideline is intended to cure the problem of misusing private information received by DHS analysts. As is the case with other intelligence agencies, classified information/materials are to be handled in a manner prescribed by the director of central intelligence (DCI). Homeland security act of 2002 makes the DHS information analysis component a member of the intelligence community.USA patriotic act gave government officials at all levels the authority to collect and share information. The establishment of a national criminal intelligence plan led to the establishment of the joint terrorism task force in all FBI field stations (Reese, 2018). The creation of fusion centers in each state enabled much more sharing of terrorism-related information. Homeland security information network connects USA territories and major cities with homeland security operations. Fusion centers at the local levels(states) provide actionable information in line with national security objectives. The national cybersecurity division of the DHS is mandated to provide cybersecurity by working with public and private partners to safeguard America’s cyberspace at all times. It does this by analyzing risks, prioritizing resources, and providing implementation measures. The cybersecurity component performs software assurance activities, and “cyber storm” after every two years to test nations' preparedness on cyber terrorism threats. Additionally, Einstein network monitoring software is installed outside the DHS network gateway to monitor data
  • 13. packets moving in and out of the agencies network with a view of identifying anomalies that might indicate hacking activities (Perrow, 2018) Findings In the cause of DHS operations and their collaboration with other deferral agencies, the privacy of the individual, their civil liberties, and civil rights are jeopardized. As an institution formed to protect the American people and their critical infrastructure, these rights and freedom have to be guarded. Even though the right to express one’s ideas is provided for in the first amendment, violent acts, anti-government ideologies cannot be tolerated as they are criminal. Targeted violence is on the rise and is closely associated with white supremacist ideologies. DHS must take caution to avoid stigmatizing certain communities in their methods of identifying targeted violence. Moreover, DHS should rely on verifiable information at all times so as not to negate the progress made in achieving civil rights, privacy, and civil liberties. Coordinated intelligence sharing is paramount in combating terrorism and transnational crimes. The deadly attack of 9/11 was attributed to the laxity in sharing crucial leads that could have helped to prevent the attack (Bullock, 2018). On border security, it plays a critical role in preventing foreign to resist from accessing America’s territory. Emerging technologies such as unmanned aircraft systems pose a security threat to the homeland. These unmanned systems (drones) can potentially be used by terrorists to deploy; biological, radiological, and nuclear materials. Recommendations Returnees from extremist groups such as ISIS pose a security threat to homeland security. Actions should be taken to monitor their international travel movements as they are capable of influencing domestic radicalization on the most vulnerable groups. The department of homeland security should work with its allies to ensure terrorist fighters do not enter their countries. To mitigate domestic terrorism, actions should be taken to
  • 14. counter domestic terrorists who are selective on their targets. Their targets are motivated by factors such as; race, nationality, ethnicity, sexual orientation, religion, and gender. White supremacist is another form of violent extremism. They are most linked to lone attackers and they can be attributed to hatred to marginalized groups and the immigrants. This kind of extremism is now taking a transnational outlook and appears to be catalyzed by social media. DHS should take decisive actions to bring down terrorist-linked websites such as; Gab, 8chan, Endchan, and encrypted communication channels used by terrorist groups (Thessin, 2018). In this way, the groups would be disoriented and their conspiracy theories would collapse. DHS should support local communities by empowering SLTT to ensure they can identify threats and violent extremism signs. With changing technological advancement, the intelligence community should be cognizant of this new reality and adjust their intelligence landscape appropriately to counter terrorist threats. Annual homeland threat Assessment should be further strengthened to provide a baseline report on the level of preparedness to thwart terrorist attacks. This report would help homeland security to prioritize resources and measure the level of inter-agency coordination (Bullock et al., 2018).DHS methods of collecting and analyzing terror-related statistics should be streamlined with intelligence information it receives from other federal agencies. This can be done through a collaborative approach with academicians, professionals, and non-governmental partners to establish a standardized method to collect terror-related statistics. On the transport node. DHS should adopt the intelligence-driven approach in sharing actionable knowledge across the other transport sectors such as aviation, freight, pipeline, and highway carrier, maritime and mass transit. Moreover, DHS should invest in research and development and work in collaboration with the private sector, academician, and federal agencies to avoid “technological surprise” and to be in a better position to understand emerging trends in terrorist attacks. By
  • 15. doing this, DHS will identify technologies that ought to be developed soon to combat the growing threats of terrorism (Thessin, 2018). Bureaucracies at DHS can be a great hindrance in the adoption of new effective technologies. These bureaucracies should be eliminated to allow flexible deployment of technology that is in sync with rapidly evolving terrorism and targeted violence.DHS should capitalize on its highly specialized knowledge to protect homeland missions. By extending cooperation to America’s allies, identification of terrorists can be identified and their biometrics shared with DHS to block white list them in their immigration systems. References Thessin, J. (2018). Department of Homeland Security. Perrow, C. (2016). Disaster after 9/11 The Department of Homeland Security and the Intelligence Reorganization. Reese, S. (2017, April). Defining homeland security: Analysis and congressional considerations. Washington, DC: Congressional Research Service, Library of Congress. Bullock, J. A., & Haddow, G. D. (2018). Introduction to homeland security. Elsevier. Bellavita, C. (2018). Changing homeland security: What is homeland security?. Homeland Security Affairs, 4(02). Monahan, T. (2016). The future of security? Surveillance operations at homeland security fusion centers. Social Justice, 37(2/3 (120-121), 84-98.
  • 16. 1 Cyber Weapon Proliferation Name: Due Date: 04-12-2021 Horschig, D. (2020). Cyber-weapons in nuclear counter- proliferation. Defense & Security Analysis, 36(3), 352-371. This article provides a view on the conditions that are effective in nuclear counter-proliferation in cyber weapons. Iran, North Korea, and Saudi Arabia are some of the states that have shown great interest in nuclear proliferation, and their effectiveness remains relevant. Therefore, this article provides the general
  • 17. applicability of cyber weapons and their importance in nuclear counter-proliferation. A comparative case study analysed that the cyber operations are effective against the nuclear programs whose developments are yet to be finished since they can disrupt and delay the program at hand but not disrupt the whole process. This means that effectiveness can only be increased by combining different conventional weapons. Kucharski, L., Loss, R., & Reddie, A. (2018). Annotated Bibliography:" US-Russian Nuclear Arms Control: Crisis and Collapse or Crossroads?" (No. LLNL-TR-755380). Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States). This article tries to find the standard solution to the nuclear weapons proliferation frameworks where both the countries mutually benefit from the agreement. From the article, an agreement should be set up to like a threat to the nations if anything comes. Then there are set guidelines that are to be followed. The agreements aim to solve all the worries the united states passes through, and it should serve the interest of the people of America, allies, and partners. The proposal should identify the benefits and the risks of replanning. There should be also standby plans to help solve any failure of the arms control. All these strategies and agreements are aimed at addressing the risks of cyber weapon proliferation. Varela-Vaca, Á. J., Rosado, D. G., Sánchez, L. E., Gómez- López, M. T., Gasca, R. M., & Fernández-Medina, E. (2020). Definition and Verification of Security Configurations of Cyber-Physical Systems. In Computer Security (pp. 135-155). Springer, Cham. The article focuses on the proliferation of the cyber-physical system, which is presumed to be raising security challenges. They serve as complex systems, integrating physical elements into automated networked systems with several sensors and actuators. All these devices make the system's data storage a bit complex to manage. The construction of the secure Coast is a challenge that requires the adoption and concentration of the
  • 18. requirements elements in the security configuration. Nasir, K. The Evolution of Cyber War: The Actors and Strategies Shaping the Internet of Today. Bangladesh Institute of Peace and Security Studies (BIPSS), 36. According to the article, the current world is geared by information technology and internet connectivity. Through connectivity, there is connections and collaborations hand, which is why the evolution of warfare has been on the rise. The new technologies and techniques are easily acquired from the internet, which in the long run results in developments. The developments have been both on the strategic, tactical, and proliferation of weapons. As a result, both the states and the non-states are involved in their weapons' technological advancements, which they can later use to defend themselves against enemies and ensure the attackers' anonymity. On the other hand, the cipher weapons in the states are adapting, resulting in conflicts. Bellovin, S. M., Landau, S., & Lin, H. S. (2017). Limiting the undesired impact of cyber weapons: technical requirements and policy implications. Journal of Cybersecurity, 3(1), 59-68. This article analyses the proliferation of cyber weapons. Their proliferation is much easier than the proliferation of kinetic weapons; their destruction and the target are essential. This leaves no traces behind, and no parts left after the attack cannot be assembled by one another after use. Additionally, the manufacture of cyber weapons is relatively cheaper. This makes the illegal bodies take advantage and explore in their manufacturing, leading to warfare among the states. Hare, F. B. (2019). Precision cyber weapon systems: An important component of a responsible national security strategy?. Contemporary security policy, 40(2), 193-213. This article focuses on the advancements made on the conventional weapon capabilities and precision. They are the elements of weapons that are accepted and expected in the community of cyberspace. The article argues the development of precision weapon systems should be used in legal conflicts.
  • 19. This makes a state of being responsible for its national security strategy to reduce violence and the destructions in conflicts. In the long run, unnecessary wars will be reduced due to the responsibilities taken by the states. References Bellovin, S. M., Landau, S., & Lin, H. S. (2017). Limiting the undesired impact of cyber weapons: technical requirements and policy implications. Journal of Cybersecurity, 3(1), 59-68. Hare, F. B. (2019). Precision cyber weapon systems: An important component of a responsible national security strategy?. Contemporary security policy, 40(2), 193-213. Horschig, D. (2020). Cyber-weapons in nuclear counter- proliferation. Defense & Security Analysis, 36(3), 352-371. Kucharski, L., Loss, R., & Reddie, A. (2018). Annotated Bibliography:" US-Russian Nuclear Arms Control: Crisis and Collapse or Crossroads?" (No. LLNL-TR-755380). Lawrence Livermore National Lab.(LLNL), Livermore, CA (United States). Nasir, K. The Evolution of Cyber War: The Actors and Strategies Shaping the Internet of Today. Bangladesh Institute of Peace and Security Studies (BIPSS), 36. Varela-Vaca, Á. J., Rosado, D. G., Sánchez, L. E., Gómez- López, M. T., Gasca, R. M., & Fernández-Medina, E. (2020). Definition and Verification of Security Configurations of Cyber-Physical Systems. In Computer Security (pp. 135-155). Springer, Cham.