scispace - formally typeset
Search or ask a question

Lärobok i Militärteknik, vol. 9: Teori och metod

TL;DR: Amnet militarteknik utgar fran att tekniska system ar officerens arbetsredskap och att en forstaelse for och kunskap om dessa verktyg ar central for att kunna utova professionen framgangsrikt as mentioned in this paper.
Abstract: Amnet militarteknik utgar fran att tekniska system ar officerens arbetsredskap och att en forstaelse for och kunskap om dessa verktyg ar central for att kunna utova professionen framgangsrikt. Denn ...
Citations
More filters
Journal ArticleDOI
TL;DR: In this article, a concept called Military Utility is proposed for the study of the use of technology in military operations, which is derived through conceptual analysis and is based on related concepts used in social sciences, the military domain and Systems Engineering.

19 citations


Cites background from "Lärobok i Militärteknik, vol. 9: Te..."

  • ...Our understanding of capability is that it is being able to do something and being able to do it well [3]....

    [...]

  • ...Our viewpoint originates from postulates in militarytechnology [3]: the character of war change in pace with the development of technology, technology has influence on all military command levels, and a lack of understanding of technology causes diminishing military opportunities....

    [...]

Proceedings ArticleDOI
06 Oct 2014
TL;DR: A model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data, concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations may also incur non-negligible risks of collateral damage and other societal costs.
Abstract: Flaws in computer software or hardware that are as yet unknown to the public, known as zero-day vulnerabilities, are an increasingly sought-after resource by actors conducting cyber operations. While the objective pursued is commonly defensive, as in protecting own systems and networks, cyber operations may also involve exploiting identified vulnerabilities for intelligence collection or to produce military effects. The weapon zing and stockpiling of such vulnerabilities by various actors, or even the intentional implantation into cyberspace infrastructure, is a trend that currently resembles an arms race. An open question is how to measure the utility that access to these exploitable vulnerabilities provides for military purposes, and how to contrast and compare this to the possible adverse societal consequences that withholding disclosure of them may result in, such as loss of privacy or impeded freedom of the press. This paper presents a case study focusing on the Heart bleed bug, used as a tool in an offensive cyber operation. We introduce a model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data. Our calculations show that reaching a global adoption of at least 50 % would take approximately three years from the time of release, given that the vulnerability remains undiscovered, while surpassing 75 % adoption would take an estimated four years. The paper concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations take time. They may also incur non-negligible risks of collateral damage and other societal costs.

8 citations


Cites background from "Lärobok i Militärteknik, vol. 9: Te..."

  • ...Technical artifacts can be said to have military utility if they, or the effects of their use, allow the goals of a military operation to be reached at a lower cost [11]....

    [...]

References
More filters
Journal ArticleDOI
TL;DR: In this article, a concept called Military Utility is proposed for the study of the use of technology in military operations, which is derived through conceptual analysis and is based on related concepts used in social sciences, the military domain and Systems Engineering.

19 citations

Proceedings ArticleDOI
06 Oct 2014
TL;DR: A model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data, concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations may also incur non-negligible risks of collateral damage and other societal costs.
Abstract: Flaws in computer software or hardware that are as yet unknown to the public, known as zero-day vulnerabilities, are an increasingly sought-after resource by actors conducting cyber operations. While the objective pursued is commonly defensive, as in protecting own systems and networks, cyber operations may also involve exploiting identified vulnerabilities for intelligence collection or to produce military effects. The weapon zing and stockpiling of such vulnerabilities by various actors, or even the intentional implantation into cyberspace infrastructure, is a trend that currently resembles an arms race. An open question is how to measure the utility that access to these exploitable vulnerabilities provides for military purposes, and how to contrast and compare this to the possible adverse societal consequences that withholding disclosure of them may result in, such as loss of privacy or impeded freedom of the press. This paper presents a case study focusing on the Heart bleed bug, used as a tool in an offensive cyber operation. We introduce a model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data. Our calculations show that reaching a global adoption of at least 50 % would take approximately three years from the time of release, given that the vulnerability remains undiscovered, while surpassing 75 % adoption would take an estimated four years. The paper concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations take time. They may also incur non-negligible risks of collateral damage and other societal costs.

8 citations