IEEE Technology and Society Magazine - June 2019 - 77

An example of what could be considered dangerous
could be software that autonomously attacks other information systems at the bootup of a networked computer.
The software has no controlled harm creation, but
instead - without any intent at the moment of engagement, nor human control - starts attacking other systems. Such software could be prohibited.
The current Second Amendment doctrine would
not exclude cyber arms unless these arms are of no
military value or not suitable for military use, or
require no intent to be dangerous for the general population. The Second Amendment protects individual
ownership of cyber arms, and to a degree protects
corporate ownership of cyber arms. The case for government intervention and prohibition of cyber arms
faces significant constitutional limitations to be a realistic policy option.

Acknowledgment
The views expressed are those of the author and do not
reflect the official policy or position of the Army Cyber
Institute at West Point, the United States Military Academy, or the Department of Defense.
The author thanks Robert E. Barnsby, JD, and Dr.
Greg Conti for valuable input and information sharing.

Author Information
The author is with the Army Cyber Institute at West Point
(ACI) and the Department of Social Sciences, United
States Military Academy, West Point, NY 10996. He
earned his Ph.D. and M.A. degrees from the University
of Texas at Dallas and earned a JD/LL.M. from Juridicum Law School, Stockholm University, Sweden. Email:
jan.kallberg@usma.edu.

References

[1] S.P. Halbrook, A Right to Bear Arms: State and Federal Bills of
Rights and Constitutional Guarantees, (Contributions in Political
Science, no. 243), 1st ed. Praeger, 1989.
[2] S.P. Halbrook "What the framers intended: A linguistic analysis of
the right to bear arms," in Law & Contemp. Probs., vol. 49, p. 151,
1986.
[3] T. Jefferson, "No freeman shall be debarred the use of arms,"
Thomas Jefferson Encyclopedia, Monticello, Research and Collections, [Online]. Available: https://www.monticello.org/site/jefferson/
no-freeman-shall-be-debarred-use-arms-spurious-quotation [Accessed:
June 18, 2018].
[4] District of Columbia v. Heller, 554 U.S. 570 (2008).

JUNE 2019

∕

[5] U.S. Joint Chief of Staffs "Operations, Cyberspace," Joint Publication 3--12 (R), 2013.
[6] NATO Cooperative Cyber Defence Centre of Excellence NATO
CCDCOE, "Cyber definitions," [Online]. Available: https://ccdcoe.
org/cyber-definitions.html [Accessed: June 18, 2018].
[7] C. Maathuis, W. Pieters and J.V. Den Berg, "Cyber weapons: A
profiling framework," in Proc. 2016 IEEE Int. Conf. Cyber Conflict
(CyCon U.S.), Washington, DC, 2016, pp. 1-8. doi: 10.1109/CYCONUS.2016.7836621 Available: http://ieeexplore.ieee.org.proxygw.wrlc
.org/st amp/st amp.jsp?tp=&ar number=7836621&isnumb
er=7836602 [Accessed: July 27, 2018].
[8] U.S. Constitution, Article 1, Section 9.
[9] District of Columbia v. Heller, 554 U.S. 570 (2008) (Docket no.
07-290), p. 54.
[10] G.F. Fyodor, "Nmap network scanning: The official Nmap project guide to network discovery and security scanning," Insecure,
2009.
[11] R.R. Rohrmann, V.J. Ercolani and M.W. Patton, "Large scale port
scanning through tor using parallel Nmap scans to scan large portions of the IPv4 range," in Proc. 2017 IEEE Int. Conf. Intelligence
and Security Informatics (ISI), Beijing, China, 2017, pp. 185-187.
doi: 10.1109/ISI.2017.8004906.
[12] Fromdev, "100+ free hacking tools to become a powerful
hacker," [Online]. Available: https://www.fromdev.com/2014/09/freehacking-tools-hacker.html [Accessed: June 18, 2018].
[13] S. Samtani, R. Chinn and H. Chen, "Exploring hacker assets in
underground forums," in Proc. 2015 IEEE Int. Conf. Intelligence
and Security Informatics (ISI), Baltimore, MD, 2015, pp. 31-36.
doi: 10.1109/ISI.2015.7165935.
[14] F.T. Johnsen et al., "Application of IoT in military operations in
a smart city," in Proc. 2018 IEEE Int. Conf. Military Communications and Information Systems (ICMCIS), Warsaw, Poland, 2018,
pp. 1-8. doi: 10.1109/ICMCIS.2018.8398690.
[15] R. Ciancioso, D. Budhwa and T. Hayajneh, "A framework for
Zero Day exploit detection and containment," in Proc. 2017 IEEE
15th Int. Conf. Dependable, Autonomic and Secure Computing,
15th Int. Conf. Pervasive Intelligence and Computing, 3rd Int.
Conf. Big Data Intelligence and Computing and Cyber Science
and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), Orlando, FL, 2017, pp. 663-668. doi: 10.1109/DASC-PIComDataCom-CyberSciTec.2017.116.
[16] J. Kallberg, "A right to cyber counter strikes: The risks of legalizing hack backs," IEEE IT Professional vol.17, no. 1, pp. 30-35,
2015.
[17] D. Paquette, J. Bihari, and E. Elliott. "The state of the castle: An
overview of recent trends in State Castle Doctrine legislation and
public policy," Criminal Justice Rev., vol. 34, no. 4, pp. 515-535,
2009.
[18] C. Wilson, "Holding management accountable: A new policy
for protection against computer crime," in Proc. IEEE 2000 National Aerospace and Electronics Conference. NAECON 2000. Engineering Tomorrow (Cat. No.00CH37093), Dayton, OH, 2000, pp.
272-281. doi: 10.1109/NAECON.2000.894921.
[19] S. Samtani, K. Chinn, C. Larson, and H. Chen, "AZSecure
hacker assets portal: Cyber threat intelligence and malware
analysis," in Proc. 2016 IEEE Conf. Intelligence and Security
Informatics (ISI), Tucson, AZ, 2016, pp. 19-24. doi: 10.1109/
ISI.2016.7745437.

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

77


https://ccdcoe.org/cyber-definitions.html https://ccdcoe.org/cyber-definitions.html http://ieeexplore.ieee.org.proxygw.wrlc.org/stamp/stamp.jsp?tp=&arnumber=7836621&isnumber=7836602 http://ieeexplore.ieee.org.proxygw.wrlc.org/stamp/stamp.jsp?tp=&arnumber=7836621&isnumber=7836602 http://ieeexplore.ieee.org.proxygw.wrlc.org/stamp/stamp.jsp?tp=&arnumber=7836621&isnumber=7836602 https://www.fromdev.com/2014/09/free-hacking-tools-hacker.html https://www.fromdev.com/2014/09/free-hacking-tools-hacker.html https://www.monticello.org/site/research-and-collections/no-freeman-shall-be-debarred-use-arms https://www.monticello.org/site/research-and-collections/no-freeman-shall-be-debarred-use-arms

IEEE Technology and Society Magazine - June 2019

Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - June 2019

Contents
IEEE Technology and Society Magazine - June 2019 - Cover1
IEEE Technology and Society Magazine - June 2019 - Cover2
IEEE Technology and Society Magazine - June 2019 - 1
IEEE Technology and Society Magazine - June 2019 - Contents
IEEE Technology and Society Magazine - June 2019 - 3
IEEE Technology and Society Magazine - June 2019 - 4
IEEE Technology and Society Magazine - June 2019 - 5
IEEE Technology and Society Magazine - June 2019 - 6
IEEE Technology and Society Magazine - June 2019 - 7
IEEE Technology and Society Magazine - June 2019 - 8
IEEE Technology and Society Magazine - June 2019 - 9
IEEE Technology and Society Magazine - June 2019 - 10
IEEE Technology and Society Magazine - June 2019 - 11
IEEE Technology and Society Magazine - June 2019 - 12
IEEE Technology and Society Magazine - June 2019 - 13
IEEE Technology and Society Magazine - June 2019 - 14
IEEE Technology and Society Magazine - June 2019 - 15
IEEE Technology and Society Magazine - June 2019 - 16
IEEE Technology and Society Magazine - June 2019 - 17
IEEE Technology and Society Magazine - June 2019 - 18
IEEE Technology and Society Magazine - June 2019 - 19
IEEE Technology and Society Magazine - June 2019 - 20
IEEE Technology and Society Magazine - June 2019 - 21
IEEE Technology and Society Magazine - June 2019 - 22
IEEE Technology and Society Magazine - June 2019 - 23
IEEE Technology and Society Magazine - June 2019 - 24
IEEE Technology and Society Magazine - June 2019 - 25
IEEE Technology and Society Magazine - June 2019 - 26
IEEE Technology and Society Magazine - June 2019 - 27
IEEE Technology and Society Magazine - June 2019 - 28
IEEE Technology and Society Magazine - June 2019 - 29
IEEE Technology and Society Magazine - June 2019 - 30
IEEE Technology and Society Magazine - June 2019 - 31
IEEE Technology and Society Magazine - June 2019 - 32
IEEE Technology and Society Magazine - June 2019 - 33
IEEE Technology and Society Magazine - June 2019 - 34
IEEE Technology and Society Magazine - June 2019 - 35
IEEE Technology and Society Magazine - June 2019 - 36
IEEE Technology and Society Magazine - June 2019 - 37
IEEE Technology and Society Magazine - June 2019 - 38
IEEE Technology and Society Magazine - June 2019 - 39
IEEE Technology and Society Magazine - June 2019 - 40
IEEE Technology and Society Magazine - June 2019 - 41
IEEE Technology and Society Magazine - June 2019 - 42
IEEE Technology and Society Magazine - June 2019 - 43
IEEE Technology and Society Magazine - June 2019 - 44
IEEE Technology and Society Magazine - June 2019 - 45
IEEE Technology and Society Magazine - June 2019 - 46
IEEE Technology and Society Magazine - June 2019 - 47
IEEE Technology and Society Magazine - June 2019 - 48
IEEE Technology and Society Magazine - June 2019 - 49
IEEE Technology and Society Magazine - June 2019 - 50
IEEE Technology and Society Magazine - June 2019 - 51
IEEE Technology and Society Magazine - June 2019 - 52
IEEE Technology and Society Magazine - June 2019 - 53
IEEE Technology and Society Magazine - June 2019 - 54
IEEE Technology and Society Magazine - June 2019 - 55
IEEE Technology and Society Magazine - June 2019 - 56
IEEE Technology and Society Magazine - June 2019 - 57
IEEE Technology and Society Magazine - June 2019 - 58
IEEE Technology and Society Magazine - June 2019 - 59
IEEE Technology and Society Magazine - June 2019 - 60
IEEE Technology and Society Magazine - June 2019 - 61
IEEE Technology and Society Magazine - June 2019 - 62
IEEE Technology and Society Magazine - June 2019 - 63
IEEE Technology and Society Magazine - June 2019 - 64
IEEE Technology and Society Magazine - June 2019 - 65
IEEE Technology and Society Magazine - June 2019 - 66
IEEE Technology and Society Magazine - June 2019 - 67
IEEE Technology and Society Magazine - June 2019 - 68
IEEE Technology and Society Magazine - June 2019 - 69
IEEE Technology and Society Magazine - June 2019 - 70
IEEE Technology and Society Magazine - June 2019 - 71
IEEE Technology and Society Magazine - June 2019 - 72
IEEE Technology and Society Magazine - June 2019 - 73
IEEE Technology and Society Magazine - June 2019 - 74
IEEE Technology and Society Magazine - June 2019 - 75
IEEE Technology and Society Magazine - June 2019 - 76
IEEE Technology and Society Magazine - June 2019 - 77
IEEE Technology and Society Magazine - June 2019 - 78
IEEE Technology and Society Magazine - June 2019 - 79
IEEE Technology and Society Magazine - June 2019 - 80
IEEE Technology and Society Magazine - June 2019 - 81
IEEE Technology and Society Magazine - June 2019 - 82
IEEE Technology and Society Magazine - June 2019 - 83
IEEE Technology and Society Magazine - June 2019 - 84
IEEE Technology and Society Magazine - June 2019 - 85
IEEE Technology and Society Magazine - June 2019 - 86
IEEE Technology and Society Magazine - June 2019 - 87
IEEE Technology and Society Magazine - June 2019 - 88
IEEE Technology and Society Magazine - June 2019 - Cover3
IEEE Technology and Society Magazine - June 2019 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com