Pearl Harbor 2.0: When Cyber-Acts Lead to the Battlefield

Abstract

America is under constant attack in cyberspace. Which of these attacks equate to a Pearl Harbor or the terrorists' acts on September 11? Despite an ever increasing number of attacks, no international policy has adequately established a characterization for what acts constitute an "act of war." Many issues are left unaddressed that need to begin with a classification of cyber attacks. We present a method of classification and a broad taxonomy using an effects-based approach to examine malevolent cyber-activities that may evoke counteractions. We aim to spur discussions under our framework for more granular international level discussions.


AUTHORS

Air Force Institute of Technology Wright-Patterson AFB,
USA

Wayne “Chris” Henry attends the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, OH studying for his Master’s in Computer Engineering. He graduated from Penn State University with a Bachelor’s in Computer Engineering in 2004. His research interests include Network Attribution Techniques, Cyber Attack Tactics, and Malware Reverse Engineering.

Air Force Institute of Technology Wright-Patterson AFB,
USA

Jacob Stange attends the Air Force Institute of Technology (AFIT), Wright-Patterson AFB, OH studying for his Master’s in Cyber Operations. He graduated from the College of Mount St. Joseph with a Bachelor’s in Computer Science in 2009. His research interests include Artificial Intelligence in Crowds, Cyber Attack Tactics, and Attacking Wireless Sensor Networks.

Air Force Institute of Technology Wright-Patterson AFB,
USA

Eric D. Trias, Ph.D. is an Assistant Professor of Computer Science at the Air Force Institute of Technology (AFIT), Wright Patterson AFB, OH. His research interest includes Knowledge Discovery and Data Mining, Information Systems Security, Digital Forensics, Cyberspace Operations, and Information Theory.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com