Research Article
BibTex RIS Cite

THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION

Year 2018, Volume: 3 Issue: 5, 10 - 22, 31.07.2018

Abstract

This article aims in the first place, to answer why a general definition of cyber-conflicts is
needed. To do so, it explores the reasons why it has not been possible to create a general
definition for this term and what have been the implications of this lack. Among the causes
of not having a general definition for the term of “cyber-conflict” it can be found the lack of
clarity and rigor in the use of this term and the definition of other terms related to cyberspace
that might be confused with each other. In order to better understand the closest
approaches to the meaning and definition of what cyber-conflict is, the first part of this paper
exposes several definitions of key terms surrounding the concept of “cyber”. The second part
of the article shows the relationship between the lack of international organizations that
regulate or give guidelines regarding cyber-space and the lack of a universal definition of
cyber-conflict. The third and last part presents three relevant cases that demonstrate the
recent importance of the cyber-space at the state level, its relationship with cyber-conflicts
and how the lack of a universal framework prevents a solution to these type of conflicts.
After the analysis, the main conclusion of the study is that a universal definition of the term
cyber-conflict is required in order to set a framework that allows the development of
regulation measurements towards this new threat that the cyber-space has brought. 

References

  • Brunner, J. 2018. Cibercultura: la aldea global dividida. Retrieved from: https://www.researchgate.net/publication/265287580_cibercultura_la_aldea_global_dividida El Mundo. 2018. Diccionario el Mundo. Retrieved from: http://diccionarios.elmundo.es/diccionarios/cgi/lee_diccionario.html?busca=Ciberespacio&diccionario=1 Finland. 2013. Finland’s Cyber-Security Strategy Government Resolution 24 Jan 2013. Retrieved from: http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber--security-strategy. Herzog, S. 2011, Revisiting the Estonian Cyber- Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, Vol. 4, No. 2: 49-60, 2011. Retrieved from: https://ssrn.com/abstract=2807582 Holloway, M. 2015. Stuxnet Worm Attack on Iranian Nuclear Facilities. Retrieved from: http://large.stanford.edu/courses/2015/ph241/holloway1/ Hirschfeld, J. 2015. Hacking of Government Computers Exposed 21.5 Million People. Retrieved from: https://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html Kelley, M. 2013. The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought. Retrieved from: http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 Kleinsteuber, H. 2002. El surgimiento del ciberespacio: la palabra y la realidad en Vidal Beneyto, J. (Editor): La ventana global, Taurus, Madrid, 2002, pp. 47. University of Oxford. 2018. Oxford Dictionary. Retrieved from: https://en.oxforddictionaries.com/?utm_source=od-panel&utm_campaign=en McGuinness, D. 2017. How a cyber- attack transformed Estonia. Retrieved from: http://www.bbc.com/news/39655415. Montenegro. 2013. Strategy on Cyber- Security of Montenegro to 2017 (2013). Retrieved from: https://ccdcoe.org/strategies-policies.html. Nakashima, E. 2013. Chinese hackers who breached Google gained access to sensitive data, U.S. officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html?utm_term=.d72ebcb4c83e. Nakashima, E & Warrick, J. 2010. Stuxnet was work of U.S. and Israeli experts, officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html?utm_term=.25cd42acad75 NATO. 2014. NATO AAP-06 Edition 2014. Retrieved from: http://nsa.nato.int/nsa/zPublic/ap/aap6/AAP-6.pdf Orcutt, M. 2017. El nuevo vigilante privado de la geopolítica y el ciberconflicto internacional. Retrieved from: https://www.technologyreview.es/s/8812/el-nuevo-vigilante-privado-de-la-geopolitica-y-el-ciberconflicto-internacional Pasulka, N. 2016. A Virus Altered the Face of Security in Iran. Retrieved from: http://www.takepart.com/article/2016/07/25/zero-days-stuxnet-iran. Prime Minister Office of Israel. 2011. Advancing National Cyber-space Capabilities, Resolution No. 3611 of the Government of august 7, 2011 – 2011. Retrieved from: http://www.pmo.gov.il/English/PrimeMinistersOffice/DivisionsAndAuthorities/cyber-/Documents/Advancing%20National%20Cyber-space%20Capabilities.pdf Sienkiewicz, H. 2017. The Art of Cyber- Conflict. Dog Ear Publishing, (pp. 5-180). Tallinn Manual. 2013. Tallinn Manual on the International Law Applicable to Cyber- Warfare – 2013. Retrieved from: https://ccdcoe.org/tallinn-manual.html Tamkin, E. 2017. 10 Years After the Landmark Attack on Estonia, Is the World Better Prepared for Cyber- Threats?. Retrieved from: http://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber--threats/ Thornburgh, N. 2005. Inside the Chinese Hack Attack. Retrieved from: http://content.time.com/time/nation/article/0,8599,1098371,00.html Traynor, I. 2007. Russia accused of unleashing cyber-war to disable Estonia. Retrieved from: https://www.theguardian.com/world/2007/may/17/topstories3.russia United Kingdom Cabinet Office. 2011. UK Cyber- Security Strategy (2011). Retrieved from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber--security-strategy-final.pdf Valeriano, B & Maness, R. 2015. CYBER- WAR VERSUS CYBER- REALITIES: CYBER- CONFLICT IN THE INTERNATIONAL SYSTEM New York, NY: Oxford University Press, 2015, 288 pages. ISBN: 9780190204792 Zetter, K. 2014. AN UNPRECEDENTED LOOK AT STUXNET, THE WORLD'S FIRST DIGITAL WEAPON. Retrieved from: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ Zetter, K. 2010. GOOGLE HACK ATTACK WAS ULTRA SOPHISTICATED, NEW DETAILS SHOW. Retrieved from: https://www.wired.com/2010/01/operation-aurora/
Year 2018, Volume: 3 Issue: 5, 10 - 22, 31.07.2018

Abstract

References

  • Brunner, J. 2018. Cibercultura: la aldea global dividida. Retrieved from: https://www.researchgate.net/publication/265287580_cibercultura_la_aldea_global_dividida El Mundo. 2018. Diccionario el Mundo. Retrieved from: http://diccionarios.elmundo.es/diccionarios/cgi/lee_diccionario.html?busca=Ciberespacio&diccionario=1 Finland. 2013. Finland’s Cyber-Security Strategy Government Resolution 24 Jan 2013. Retrieved from: http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber--security-strategy. Herzog, S. 2011, Revisiting the Estonian Cyber- Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, Vol. 4, No. 2: 49-60, 2011. Retrieved from: https://ssrn.com/abstract=2807582 Holloway, M. 2015. Stuxnet Worm Attack on Iranian Nuclear Facilities. Retrieved from: http://large.stanford.edu/courses/2015/ph241/holloway1/ Hirschfeld, J. 2015. Hacking of Government Computers Exposed 21.5 Million People. Retrieved from: https://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html Kelley, M. 2013. The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought. Retrieved from: http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 Kleinsteuber, H. 2002. El surgimiento del ciberespacio: la palabra y la realidad en Vidal Beneyto, J. (Editor): La ventana global, Taurus, Madrid, 2002, pp. 47. University of Oxford. 2018. Oxford Dictionary. Retrieved from: https://en.oxforddictionaries.com/?utm_source=od-panel&utm_campaign=en McGuinness, D. 2017. How a cyber- attack transformed Estonia. Retrieved from: http://www.bbc.com/news/39655415. Montenegro. 2013. Strategy on Cyber- Security of Montenegro to 2017 (2013). Retrieved from: https://ccdcoe.org/strategies-policies.html. Nakashima, E. 2013. Chinese hackers who breached Google gained access to sensitive data, U.S. officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html?utm_term=.d72ebcb4c83e. Nakashima, E & Warrick, J. 2010. Stuxnet was work of U.S. and Israeli experts, officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html?utm_term=.25cd42acad75 NATO. 2014. NATO AAP-06 Edition 2014. Retrieved from: http://nsa.nato.int/nsa/zPublic/ap/aap6/AAP-6.pdf Orcutt, M. 2017. El nuevo vigilante privado de la geopolítica y el ciberconflicto internacional. Retrieved from: https://www.technologyreview.es/s/8812/el-nuevo-vigilante-privado-de-la-geopolitica-y-el-ciberconflicto-internacional Pasulka, N. 2016. A Virus Altered the Face of Security in Iran. Retrieved from: http://www.takepart.com/article/2016/07/25/zero-days-stuxnet-iran. Prime Minister Office of Israel. 2011. Advancing National Cyber-space Capabilities, Resolution No. 3611 of the Government of august 7, 2011 – 2011. Retrieved from: http://www.pmo.gov.il/English/PrimeMinistersOffice/DivisionsAndAuthorities/cyber-/Documents/Advancing%20National%20Cyber-space%20Capabilities.pdf Sienkiewicz, H. 2017. The Art of Cyber- Conflict. Dog Ear Publishing, (pp. 5-180). Tallinn Manual. 2013. Tallinn Manual on the International Law Applicable to Cyber- Warfare – 2013. Retrieved from: https://ccdcoe.org/tallinn-manual.html Tamkin, E. 2017. 10 Years After the Landmark Attack on Estonia, Is the World Better Prepared for Cyber- Threats?. Retrieved from: http://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber--threats/ Thornburgh, N. 2005. Inside the Chinese Hack Attack. Retrieved from: http://content.time.com/time/nation/article/0,8599,1098371,00.html Traynor, I. 2007. Russia accused of unleashing cyber-war to disable Estonia. Retrieved from: https://www.theguardian.com/world/2007/may/17/topstories3.russia United Kingdom Cabinet Office. 2011. UK Cyber- Security Strategy (2011). Retrieved from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber--security-strategy-final.pdf Valeriano, B & Maness, R. 2015. CYBER- WAR VERSUS CYBER- REALITIES: CYBER- CONFLICT IN THE INTERNATIONAL SYSTEM New York, NY: Oxford University Press, 2015, 288 pages. ISBN: 9780190204792 Zetter, K. 2014. AN UNPRECEDENTED LOOK AT STUXNET, THE WORLD'S FIRST DIGITAL WEAPON. Retrieved from: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ Zetter, K. 2010. GOOGLE HACK ATTACK WAS ULTRA SOPHISTICATED, NEW DETAILS SHOW. Retrieved from: https://www.wired.com/2010/01/operation-aurora/
There are 1 citations in total.

Details

Primary Language English
Journal Section Research Article
Authors

Luis Carlos Avella Huerfano This is me

Publication Date July 31, 2018
Acceptance Date July 15, 2018
Published in Issue Year 2018 Volume: 3 Issue: 5

Cite

APA Avella Huerfano, L. C. (2018). THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION. Cyberpolitik Journal, 3(5), 10-22.
AMA Avella Huerfano LC. THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION. Cyberpolitik Journal. July 2018;3(5):10-22.
Chicago Avella Huerfano, Luis Carlos. “THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION”. Cyberpolitik Journal 3, no. 5 (July 2018): 10-22.
EndNote Avella Huerfano LC (July 1, 2018) THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION. Cyberpolitik Journal 3 5 10–22.
IEEE L. C. Avella Huerfano, “THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION”, Cyberpolitik Journal, vol. 3, no. 5, pp. 10–22, 2018.
ISNAD Avella Huerfano, Luis Carlos. “THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION”. Cyberpolitik Journal 3/5 (July 2018), 10-22.
JAMA Avella Huerfano LC. THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION. Cyberpolitik Journal. 2018;3:10–22.
MLA Avella Huerfano, Luis Carlos. “THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION”. Cyberpolitik Journal, vol. 3, no. 5, 2018, pp. 10-22.
Vancouver Avella Huerfano LC. THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION. Cyberpolitik Journal. 2018;3(5):10-22.