Software as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflict

<p>This thesis addresses the topic of ‘Software as a Weapon’ (SaaW) using a mixed-methods approach, bringing together elements of Computer Science, International Relations, and Strategic Studies.</p><br> <p>The thesis therefore first addresses the nature of software, malware...

Full description

Bibliographic Details
Main Author: Silomon, JAM
Other Authors: Roscoe, B
Format: Thesis
Language:English
Published: 2021
Subjects:
_version_ 1797082237525557248
author Silomon, JAM
author2 Roscoe, B
author_facet Roscoe, B
Silomon, JAM
author_sort Silomon, JAM
collection OXFORD
description <p>This thesis addresses the topic of ‘Software as a Weapon’ (SaaW) using a mixed-methods approach, bringing together elements of Computer Science, International Relations, and Strategic Studies.</p><br> <p>The thesis therefore first addresses the nature of software, malware, and weaponised software via questionnaire-based public solicitation, with three groups of respondents: military officers, academics, and others. The results show that there is consensus among participants regarding the importance of defensive software capabilities for state security. However, depending on the training and background of respondents, questions pertaining to the nature of software exhibit statistically significant differences. For example, when deciding whether software should be treated like a physical object, or whether malware is a weapon. Yet, there is also consensus, such as that defensive software capabilities are vital to a state’s security.</p><br> <p>The second part of the thesis investigates the factors that contribute to an actor pursuing SaaW. It explores the proliferation debate and examines similarities and differences to traditional weapon groups, including nuclear, biological, and chemical weapons, as well as small arms and light weapons. These factors are then used to create a Bayesian Network model representing an actor’s source of impetus. From such a model, it is possible to reason about the interplay of complementary and competing forces. By accounting for restraining and motivating elements, the model introduces objectivity to the debate on actor motivation in the cyber domain, giving a variety of stakeholders a tool to evaluate actors’ software weaponisation probabilities.</p><br> <p>To showcase and evaluate this model, three different actors are used, representing terrorists, state powers, and generic attackers. Quantitative data is combined with qualitative interviews, populating network nodes with prior probabilities and relative weightings of observed dependencies. An approach of weighting relative parent-nodes’ influence strength is implemented, creating a linearly growing set of probability distributions. The results show that the probability of the generic actor pursuing SaaW is uncertain, which captures the nature of this scenario well. The state actor also shows ambivalence, but in this case high restraints are being countered by almost equally high capabilities, whilst motivating forces are low. The terrorist actor on the other hand has a medium to low probability, driven by a lack of capabilities and limited motivations despite very low retraining factors.</p><br> <p>Overall, this thesis emphasises the interdisciplinary nature of cyber security, and provides novel tools and concepts from Computer Science, International Relations, and Strategic Studies to understand SaaW.</p>
first_indexed 2024-03-07T01:25:15Z
format Thesis
id oxford-uuid:91bed2fc-2aa6-4d58-837b-5bf9db874be0
institution University of Oxford
language English
last_indexed 2024-03-07T01:25:15Z
publishDate 2021
record_format dspace
spelling oxford-uuid:91bed2fc-2aa6-4d58-837b-5bf9db874be02022-03-26T23:20:48ZSoftware as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflictThesishttp://purl.org/coar/resource_type/c_db06uuid:91bed2fc-2aa6-4d58-837b-5bf9db874be0International relationsComputer scienceEnglishHyrax Deposit2021Silomon, JAMRoscoe, BKello, L<p>This thesis addresses the topic of ‘Software as a Weapon’ (SaaW) using a mixed-methods approach, bringing together elements of Computer Science, International Relations, and Strategic Studies.</p><br> <p>The thesis therefore first addresses the nature of software, malware, and weaponised software via questionnaire-based public solicitation, with three groups of respondents: military officers, academics, and others. The results show that there is consensus among participants regarding the importance of defensive software capabilities for state security. However, depending on the training and background of respondents, questions pertaining to the nature of software exhibit statistically significant differences. For example, when deciding whether software should be treated like a physical object, or whether malware is a weapon. Yet, there is also consensus, such as that defensive software capabilities are vital to a state’s security.</p><br> <p>The second part of the thesis investigates the factors that contribute to an actor pursuing SaaW. It explores the proliferation debate and examines similarities and differences to traditional weapon groups, including nuclear, biological, and chemical weapons, as well as small arms and light weapons. These factors are then used to create a Bayesian Network model representing an actor’s source of impetus. From such a model, it is possible to reason about the interplay of complementary and competing forces. By accounting for restraining and motivating elements, the model introduces objectivity to the debate on actor motivation in the cyber domain, giving a variety of stakeholders a tool to evaluate actors’ software weaponisation probabilities.</p><br> <p>To showcase and evaluate this model, three different actors are used, representing terrorists, state powers, and generic attackers. Quantitative data is combined with qualitative interviews, populating network nodes with prior probabilities and relative weightings of observed dependencies. An approach of weighting relative parent-nodes’ influence strength is implemented, creating a linearly growing set of probability distributions. The results show that the probability of the generic actor pursuing SaaW is uncertain, which captures the nature of this scenario well. The state actor also shows ambivalence, but in this case high restraints are being countered by almost equally high capabilities, whilst motivating forces are low. The terrorist actor on the other hand has a medium to low probability, driven by a lack of capabilities and limited motivations despite very low retraining factors.</p><br> <p>Overall, this thesis emphasises the interdisciplinary nature of cyber security, and provides novel tools and concepts from Computer Science, International Relations, and Strategic Studies to understand SaaW.</p>
spellingShingle International relations
Computer science
Silomon, JAM
Software as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflict
title Software as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflict
title_full Software as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflict
title_fullStr Software as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflict
title_full_unstemmed Software as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflict
title_short Software as a weapon: concepts, perceptions, and motivations in pursuit of a new technology of conflict
title_sort software as a weapon concepts perceptions and motivations in pursuit of a new technology of conflict
topic International relations
Computer science
work_keys_str_mv AT silomonjam softwareasaweaponconceptsperceptionsandmotivationsinpursuitofanewtechnologyofconflict