Nuclear Weapons, Cyber Warfare, and Cyber Security: Ethical and Anticipated Ethical Issues

被引:0
|
作者
Wilson, Richard L. [1 ]
Fitz, Alexia [1 ]
机构
[1] Towson Univ, Towson, MD 21252 USA
来源
PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS | 2023年
关键词
Nuclear Warfare; Nuclear Weapons Systems; Cyber Warfare; Cyber Security; Anticipatory Ethics;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we discuss the interrelationship of nuclear weapons, cyber warfare, and cyber security. Some of the most significant cyber threats to nuclear stability are now due to the intersection of technologies related to nuclear weapons and cyber technology. Cyber warfare can now be used to engage in and influence international events through cyber attacks upon nuclear systems and weapons. In the current war between Russia and Ukraine there has been the threat of the use of nuclear weapons. Since cyber warfare has already been employed in the Russia/Ukraine conflict it is possible that cyber attacks could be employed to trigger a nuclear event. To prevent cyber warfare from leading to nuclear warfare there needs to be a focus on cyber security in order to protect nuclear systems and nuclear arsenals but also to mitigate cyber attacks that could lead to the use of nuclear weapons. One of the main risks to nuclear weapons systems is sabotage. It is easy to imagine cyber attackers placing incorrect information into systems and even taking control of nuclear weapons. Various parts of nuclear weapons systems are capable of being targeted. Command and control systems, alert systems, launch systems, and target-positioning systems could all become targets. Scenarios in which alert systems are hacked and show a nuclear attack by adversaries, may lead to an accidental nuclear conflict. It is also conceivable that hackers could manipulate the coordinates of (pre-programmed) targets of nuclear missiles, or to spoof GPS-like systems that some missiles use to calculate their positions their targets. At the present time there is no evidence that any state or non-state actor is able to successfully perform such manipulations but considering the exponential rate of developments in the cyber arena, in the near future, such attacks might be possible. In the worst-case scenarios, these possibilities could lead to the inadvertent use of nuclear weapons, and/or use against unintended targets. In less dramatic scenarios, the perceived vulnerabilities of the nuclear weapons systems may affect nuclear stability. This could lead to a decrease in the deterrent value of nuclear weapons. This could come about because potential adversaries may think they have options to manipulate these weapons when being used. It is difficult to forecast the effects of decreasing nuclear deterrence. This analysis will define a stakeholder framework for identifying the ethical and anticipated ethical issues with cyber warfare and nuclear warfare and relate these issues to the importance of cyber security. Ethics should be at the center of the discussion of the use of nuclear weapons, nuclear warfare and cyber warfare. Moral concerns should be at the center of the discussion of nuclear warfare. The need for this moral concern is due to the threat to vulnerable populations by nuclear systems and nuclear weapons, as well as the threat posed to democratic institutions by the use of nuclear weapons.
引用
收藏
页码:440 / 448
页数:9
相关论文
共 50 条
  • [1] Cyber warfare: Issues and challenges
    Robinson, Michael
    Jones, Kevin
    Janicke, Helge
    COMPUTERS & SECURITY, 2015, 49 : 70 - 94
  • [2] Cyber Warfare, Terrorist Narratives and Counter Terrorist Narratives: An Anticipatory Ethical Analysis
    Wilson, Richard
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 577 - 586
  • [3] Cyber security issues imposed on nuclear power plants
    Kim, Do-Yeon
    ANNALS OF NUCLEAR ENERGY, 2014, 65 : 141 - 143
  • [4] Cyber Warfare: Terms, Issues, Laws and Controversies
    Sevis, Kamile Nur
    Seker, Ensar
    2016 INTERNATIONAL CONFERENCE ON CYBER SECURITY AND PROTECTION OF DIGITAL SERVICES (CYBER SECURITY), 2016,
  • [5] SCADA security in the light of Cyber-Warfare
    Nicholson, A.
    Webber, S.
    Dyer, S.
    Patel, T.
    Janicke, H.
    COMPUTERS & SECURITY, 2012, 31 (04) : 418 - 436
  • [6] The Impact of Cyber-Physical Warfare on Global Human Security
    Payne, Bryson R.
    Mienie, Edward L.
    INTERNATIONAL JOURNAL OF CYBER WARFARE AND TERRORISM, 2019, 9 (03) : 36 - 50
  • [8] The Impact of Cyber Security issues on Businesses and Governments A framework for implementing a Cyber Security Plan
    Iguer, Hajar
    Medromi, Hicham
    Sayouti, Adil
    Elhasnaoui, Soukaina
    Faris, Sophia
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 316 - 321
  • [9] Just Warfare: Is a Nuclear Attack an Appropriate Response to a Cyber Attack?
    Fitz, Alexia
    Wilson, Richard L.
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 534 - 541
  • [10] Cyber Security Issues of Telecommunication Infrastructure
    Risteski, Aleksandar
    Bogdanoski, Mitko
    Stoilkovski, Marjan
    Jovanovic, Miroslav
    CYBER SECURITY AND RESILIENCY POLICY FRAMEWORK, 2014, 38 : 18 - 35