IEEE Technology and Society Magazine - June 2019 - 73

citizens. First, the existence and effect of the weapon
must be known to the government and the lawmaker so
it could be restricted. A militiaman is armed with his
personal armament: rifle, bayonet, and sidearm. In the
nondigital world, as an example, claymore mines and
hand grenades are not permissible weapons for the citizenry, but are considered "dangerous and unusual" and
therefore restricted to government use. The damage
and hazards surrounding claymore mines and hand
grenades are known to the government and the lawmaker. The tripwire will detonate the claymore mine,
and the hand grenade is thrown without a clear understanding of the final impact and effect. The mine is
autonomous in its execution, and the grenade is not
sufficiently accurate, with a possibility of damages
beyond the intended scope of the defender. These
effects are known to the government. With cyberweapons, this decision path is different.
The lawmaker needs to be aware of cyberweapons
and the means of restricting them. Otherwise, the result
would be a ban on thought and innovation; the law
would then arbitrarily punish what in retrospect is considered "dangerous and unusual cyberweapons"
through law that is ex post facto legislation.

Definition of Cyber Arms
There no precise definition of cyber arms or their anticipated capabilities and effects of their utilization. One
reason is that the very nature of software creates multiple purposes for utilization.
The U.S. Department of Defense has no codified, uniform definition, but refers to cyber arms as a "capability:" "a device, computer program, or technique,
including any combination of software, firmware, or
hardware, designed to create an effect in or through
cyberspace" [5].
The common definition of cyber arms is broad and
comprehensive. One definition, by the North Atlantic
Treaty Organization (NATO) Cooperative Cyber Defence
Centre of Excellence (CCDOE), is [6] "...software, firmware or hardware designed or applied to cause damage
through the cyber domain."
This definition is legally problematic because of the
assumption that the intended usage of software, firmware, or hardware would alter the status of a nonweapon to a weapon. This contradicts elementary principles
in the rule of law, where legal rules altered after the fact
are referred to as ex post facto laws. The cyber community has yet not presented a commonly accepted definition, even if attempts have been made to define cyber
weapons [7].
The U.S. Constitution specifically prohibits this in
Article 1, Section 9: "No Bill of Attainder or ex-post facto
Law shall be passed [8]."
JUNE 2019

∕

Does the Second Amendment to the
United States Constitution give the
right to bear and own military-grade
cyber weapons?

The Second Amendment does not address the
intent of the arms owner. In 1791, the right was derived
from the status of a citizen in the newborn union of
free colonies. The military-design, semi-automatic
rifles that are protected by the Second Amendment
and owned by citizens are primarily hunting rifles - in
other words, a utility that could, if necessary, serve as
a weapon of military conflict. There is a similarity
between the gun-powder-propelled arms that are protected by the Second Amendment and dual-use hacking software since the software is dual-use as both
utility and weapon. The network mapping tools, discovery tools, and port scanners are on one hand practical
system administrative utilities for day-to-day business
operations and also of direct military use in offensive
probes and reconnaissance.

Unusual Weapons
In the legal precedence [9], as exemplified by English v.
State, 35Tex. 473, 476 (1871), Bowie knives, slungshots,
daggers, and brass knuckles with no military value do
not bring Second Amendment protection to bear. In the
digital realm, the unusual is far harder to prove for the
government when the weaponized software is in most
cases of dual use. A computer user can use a port scanner to determine which ports are responding to calls to
install a printer. Thus, the port scanner could be a hacking tool, but it could also be a civilian utility software.
Networking mapping software, such as the open-source
software Nmap [10], is primarily a tool for network discovery. Hackers could use Nmap software to increase
their knowledge of network topography, but Nmap is primarily a utility tool, not a weaponized, hacking tool. A
way to weaponize the tool is to cluster multiple Nmap to
achieve an ability to scan large portions of a network
[11]. So the fact that clustered Nmap can be a weaponized tool and the single use of the software would give
military and intelligence hackers a tool to do network
discovery, even if never intended to be a military tool,
rendering Nmap status as a military useful software.
This dual use pertains not only in civilian and military
realms, but also in the multiple purposes of cyberweapons as a weaponized software, and a networking utility

IEEE TECHNOLOGY AND SOCIETY MAGAZINE

73



IEEE Technology and Society Magazine - June 2019

Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - June 2019

Contents
IEEE Technology and Society Magazine - June 2019 - Cover1
IEEE Technology and Society Magazine - June 2019 - Cover2
IEEE Technology and Society Magazine - June 2019 - 1
IEEE Technology and Society Magazine - June 2019 - Contents
IEEE Technology and Society Magazine - June 2019 - 3
IEEE Technology and Society Magazine - June 2019 - 4
IEEE Technology and Society Magazine - June 2019 - 5
IEEE Technology and Society Magazine - June 2019 - 6
IEEE Technology and Society Magazine - June 2019 - 7
IEEE Technology and Society Magazine - June 2019 - 8
IEEE Technology and Society Magazine - June 2019 - 9
IEEE Technology and Society Magazine - June 2019 - 10
IEEE Technology and Society Magazine - June 2019 - 11
IEEE Technology and Society Magazine - June 2019 - 12
IEEE Technology and Society Magazine - June 2019 - 13
IEEE Technology and Society Magazine - June 2019 - 14
IEEE Technology and Society Magazine - June 2019 - 15
IEEE Technology and Society Magazine - June 2019 - 16
IEEE Technology and Society Magazine - June 2019 - 17
IEEE Technology and Society Magazine - June 2019 - 18
IEEE Technology and Society Magazine - June 2019 - 19
IEEE Technology and Society Magazine - June 2019 - 20
IEEE Technology and Society Magazine - June 2019 - 21
IEEE Technology and Society Magazine - June 2019 - 22
IEEE Technology and Society Magazine - June 2019 - 23
IEEE Technology and Society Magazine - June 2019 - 24
IEEE Technology and Society Magazine - June 2019 - 25
IEEE Technology and Society Magazine - June 2019 - 26
IEEE Technology and Society Magazine - June 2019 - 27
IEEE Technology and Society Magazine - June 2019 - 28
IEEE Technology and Society Magazine - June 2019 - 29
IEEE Technology and Society Magazine - June 2019 - 30
IEEE Technology and Society Magazine - June 2019 - 31
IEEE Technology and Society Magazine - June 2019 - 32
IEEE Technology and Society Magazine - June 2019 - 33
IEEE Technology and Society Magazine - June 2019 - 34
IEEE Technology and Society Magazine - June 2019 - 35
IEEE Technology and Society Magazine - June 2019 - 36
IEEE Technology and Society Magazine - June 2019 - 37
IEEE Technology and Society Magazine - June 2019 - 38
IEEE Technology and Society Magazine - June 2019 - 39
IEEE Technology and Society Magazine - June 2019 - 40
IEEE Technology and Society Magazine - June 2019 - 41
IEEE Technology and Society Magazine - June 2019 - 42
IEEE Technology and Society Magazine - June 2019 - 43
IEEE Technology and Society Magazine - June 2019 - 44
IEEE Technology and Society Magazine - June 2019 - 45
IEEE Technology and Society Magazine - June 2019 - 46
IEEE Technology and Society Magazine - June 2019 - 47
IEEE Technology and Society Magazine - June 2019 - 48
IEEE Technology and Society Magazine - June 2019 - 49
IEEE Technology and Society Magazine - June 2019 - 50
IEEE Technology and Society Magazine - June 2019 - 51
IEEE Technology and Society Magazine - June 2019 - 52
IEEE Technology and Society Magazine - June 2019 - 53
IEEE Technology and Society Magazine - June 2019 - 54
IEEE Technology and Society Magazine - June 2019 - 55
IEEE Technology and Society Magazine - June 2019 - 56
IEEE Technology and Society Magazine - June 2019 - 57
IEEE Technology and Society Magazine - June 2019 - 58
IEEE Technology and Society Magazine - June 2019 - 59
IEEE Technology and Society Magazine - June 2019 - 60
IEEE Technology and Society Magazine - June 2019 - 61
IEEE Technology and Society Magazine - June 2019 - 62
IEEE Technology and Society Magazine - June 2019 - 63
IEEE Technology and Society Magazine - June 2019 - 64
IEEE Technology and Society Magazine - June 2019 - 65
IEEE Technology and Society Magazine - June 2019 - 66
IEEE Technology and Society Magazine - June 2019 - 67
IEEE Technology and Society Magazine - June 2019 - 68
IEEE Technology and Society Magazine - June 2019 - 69
IEEE Technology and Society Magazine - June 2019 - 70
IEEE Technology and Society Magazine - June 2019 - 71
IEEE Technology and Society Magazine - June 2019 - 72
IEEE Technology and Society Magazine - June 2019 - 73
IEEE Technology and Society Magazine - June 2019 - 74
IEEE Technology and Society Magazine - June 2019 - 75
IEEE Technology and Society Magazine - June 2019 - 76
IEEE Technology and Society Magazine - June 2019 - 77
IEEE Technology and Society Magazine - June 2019 - 78
IEEE Technology and Society Magazine - June 2019 - 79
IEEE Technology and Society Magazine - June 2019 - 80
IEEE Technology and Society Magazine - June 2019 - 81
IEEE Technology and Society Magazine - June 2019 - 82
IEEE Technology and Society Magazine - June 2019 - 83
IEEE Technology and Society Magazine - June 2019 - 84
IEEE Technology and Society Magazine - June 2019 - 85
IEEE Technology and Society Magazine - June 2019 - 86
IEEE Technology and Society Magazine - June 2019 - 87
IEEE Technology and Society Magazine - June 2019 - 88
IEEE Technology and Society Magazine - June 2019 - Cover3
IEEE Technology and Society Magazine - June 2019 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com