THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION
Yıl 2018,
Cilt: 3 Sayı: 5, 10 - 22, 31.07.2018
Luis Carlos Avella Huerfano
Öz
This article aims in the first place, to answer why a general definition of cyber-conflicts is
needed. To do so, it explores the reasons why it has not been possible to create a general
definition for this term and what have been the implications of this lack. Among the causes
of not having a general definition for the term of “cyber-conflict” it can be found the lack of
clarity and rigor in the use of this term and the definition of other terms related to cyberspace
that might be confused with each other. In order to better understand the closest
approaches to the meaning and definition of what cyber-conflict is, the first part of this paper
exposes several definitions of key terms surrounding the concept of “cyber”. The second part
of the article shows the relationship between the lack of international organizations that
regulate or give guidelines regarding cyber-space and the lack of a universal definition of
cyber-conflict. The third and last part presents three relevant cases that demonstrate the
recent importance of the cyber-space at the state level, its relationship with cyber-conflicts
and how the lack of a universal framework prevents a solution to these type of conflicts.
After the analysis, the main conclusion of the study is that a universal definition of the term
cyber-conflict is required in order to set a framework that allows the development of
regulation measurements towards this new threat that the cyber-space has brought.
Kaynakça
- Brunner, J. 2018. Cibercultura: la aldea global dividida. Retrieved from: https://www.researchgate.net/publication/265287580_cibercultura_la_aldea_global_dividida
El Mundo. 2018. Diccionario el Mundo. Retrieved from: http://diccionarios.elmundo.es/diccionarios/cgi/lee_diccionario.html?busca=Ciberespacio&diccionario=1
Finland. 2013. Finland’s Cyber-Security Strategy Government Resolution 24 Jan 2013. Retrieved from: http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber--security-strategy.
Herzog, S. 2011, Revisiting the Estonian Cyber- Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, Vol. 4, No. 2: 49-60, 2011. Retrieved from: https://ssrn.com/abstract=2807582
Holloway, M. 2015. Stuxnet Worm Attack on Iranian Nuclear Facilities. Retrieved from: http://large.stanford.edu/courses/2015/ph241/holloway1/
Hirschfeld, J. 2015. Hacking of Government Computers Exposed 21.5 Million People. Retrieved from: https://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html
Kelley, M. 2013. The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought. Retrieved from: http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11
Kleinsteuber, H. 2002. El surgimiento del ciberespacio: la palabra y la realidad en Vidal Beneyto, J. (Editor): La ventana global, Taurus, Madrid, 2002, pp. 47.
University of Oxford. 2018. Oxford Dictionary. Retrieved from: https://en.oxforddictionaries.com/?utm_source=od-panel&utm_campaign=en
McGuinness, D. 2017. How a cyber- attack transformed Estonia. Retrieved from: http://www.bbc.com/news/39655415.
Montenegro. 2013. Strategy on Cyber- Security of Montenegro to 2017 (2013). Retrieved from: https://ccdcoe.org/strategies-policies.html.
Nakashima, E. 2013. Chinese hackers who breached Google gained access to sensitive data, U.S. officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html?utm_term=.d72ebcb4c83e.
Nakashima, E & Warrick, J. 2010. Stuxnet was work of U.S. and Israeli experts, officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html?utm_term=.25cd42acad75
NATO. 2014. NATO AAP-06 Edition 2014. Retrieved from: http://nsa.nato.int/nsa/zPublic/ap/aap6/AAP-6.pdf
Orcutt, M. 2017. El nuevo vigilante privado de la geopolítica y el ciberconflicto internacional. Retrieved from: https://www.technologyreview.es/s/8812/el-nuevo-vigilante-privado-de-la-geopolitica-y-el-ciberconflicto-internacional
Pasulka, N. 2016. A Virus Altered the Face of Security in Iran. Retrieved from: http://www.takepart.com/article/2016/07/25/zero-days-stuxnet-iran.
Prime Minister Office of Israel. 2011. Advancing National Cyber-space Capabilities, Resolution No. 3611 of the Government of august 7, 2011 – 2011. Retrieved from: http://www.pmo.gov.il/English/PrimeMinistersOffice/DivisionsAndAuthorities/cyber-/Documents/Advancing%20National%20Cyber-space%20Capabilities.pdf
Sienkiewicz, H. 2017. The Art of Cyber- Conflict. Dog Ear Publishing, (pp. 5-180).
Tallinn Manual. 2013. Tallinn Manual on the International Law Applicable to Cyber- Warfare – 2013. Retrieved from: https://ccdcoe.org/tallinn-manual.html
Tamkin, E. 2017. 10 Years After the Landmark Attack on Estonia, Is the World Better Prepared for Cyber- Threats?. Retrieved from: http://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber--threats/
Thornburgh, N. 2005. Inside the Chinese Hack Attack. Retrieved from: http://content.time.com/time/nation/article/0,8599,1098371,00.html
Traynor, I. 2007. Russia accused of unleashing cyber-war to disable Estonia. Retrieved from: https://www.theguardian.com/world/2007/may/17/topstories3.russia
United Kingdom Cabinet Office. 2011. UK Cyber- Security Strategy (2011). Retrieved from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber--security-strategy-final.pdf
Valeriano, B & Maness, R. 2015. CYBER- WAR VERSUS CYBER- REALITIES: CYBER- CONFLICT IN THE
INTERNATIONAL SYSTEM New York, NY: Oxford University Press, 2015, 288 pages. ISBN: 9780190204792
Zetter, K. 2014. AN UNPRECEDENTED LOOK AT STUXNET, THE WORLD'S FIRST DIGITAL WEAPON. Retrieved from: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
Zetter, K. 2010. GOOGLE HACK ATTACK WAS ULTRA SOPHISTICATED, NEW DETAILS SHOW. Retrieved from: https://www.wired.com/2010/01/operation-aurora/
Yıl 2018,
Cilt: 3 Sayı: 5, 10 - 22, 31.07.2018
Luis Carlos Avella Huerfano
Kaynakça
- Brunner, J. 2018. Cibercultura: la aldea global dividida. Retrieved from: https://www.researchgate.net/publication/265287580_cibercultura_la_aldea_global_dividida
El Mundo. 2018. Diccionario el Mundo. Retrieved from: http://diccionarios.elmundo.es/diccionarios/cgi/lee_diccionario.html?busca=Ciberespacio&diccionario=1
Finland. 2013. Finland’s Cyber-Security Strategy Government Resolution 24 Jan 2013. Retrieved from: http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber--security-strategy.
Herzog, S. 2011, Revisiting the Estonian Cyber- Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, Vol. 4, No. 2: 49-60, 2011. Retrieved from: https://ssrn.com/abstract=2807582
Holloway, M. 2015. Stuxnet Worm Attack on Iranian Nuclear Facilities. Retrieved from: http://large.stanford.edu/courses/2015/ph241/holloway1/
Hirschfeld, J. 2015. Hacking of Government Computers Exposed 21.5 Million People. Retrieved from: https://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html
Kelley, M. 2013. The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought. Retrieved from: http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11
Kleinsteuber, H. 2002. El surgimiento del ciberespacio: la palabra y la realidad en Vidal Beneyto, J. (Editor): La ventana global, Taurus, Madrid, 2002, pp. 47.
University of Oxford. 2018. Oxford Dictionary. Retrieved from: https://en.oxforddictionaries.com/?utm_source=od-panel&utm_campaign=en
McGuinness, D. 2017. How a cyber- attack transformed Estonia. Retrieved from: http://www.bbc.com/news/39655415.
Montenegro. 2013. Strategy on Cyber- Security of Montenegro to 2017 (2013). Retrieved from: https://ccdcoe.org/strategies-policies.html.
Nakashima, E. 2013. Chinese hackers who breached Google gained access to sensitive data, U.S. officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html?utm_term=.d72ebcb4c83e.
Nakashima, E & Warrick, J. 2010. Stuxnet was work of U.S. and Israeli experts, officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html?utm_term=.25cd42acad75
NATO. 2014. NATO AAP-06 Edition 2014. Retrieved from: http://nsa.nato.int/nsa/zPublic/ap/aap6/AAP-6.pdf
Orcutt, M. 2017. El nuevo vigilante privado de la geopolítica y el ciberconflicto internacional. Retrieved from: https://www.technologyreview.es/s/8812/el-nuevo-vigilante-privado-de-la-geopolitica-y-el-ciberconflicto-internacional
Pasulka, N. 2016. A Virus Altered the Face of Security in Iran. Retrieved from: http://www.takepart.com/article/2016/07/25/zero-days-stuxnet-iran.
Prime Minister Office of Israel. 2011. Advancing National Cyber-space Capabilities, Resolution No. 3611 of the Government of august 7, 2011 – 2011. Retrieved from: http://www.pmo.gov.il/English/PrimeMinistersOffice/DivisionsAndAuthorities/cyber-/Documents/Advancing%20National%20Cyber-space%20Capabilities.pdf
Sienkiewicz, H. 2017. The Art of Cyber- Conflict. Dog Ear Publishing, (pp. 5-180).
Tallinn Manual. 2013. Tallinn Manual on the International Law Applicable to Cyber- Warfare – 2013. Retrieved from: https://ccdcoe.org/tallinn-manual.html
Tamkin, E. 2017. 10 Years After the Landmark Attack on Estonia, Is the World Better Prepared for Cyber- Threats?. Retrieved from: http://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber--threats/
Thornburgh, N. 2005. Inside the Chinese Hack Attack. Retrieved from: http://content.time.com/time/nation/article/0,8599,1098371,00.html
Traynor, I. 2007. Russia accused of unleashing cyber-war to disable Estonia. Retrieved from: https://www.theguardian.com/world/2007/may/17/topstories3.russia
United Kingdom Cabinet Office. 2011. UK Cyber- Security Strategy (2011). Retrieved from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber--security-strategy-final.pdf
Valeriano, B & Maness, R. 2015. CYBER- WAR VERSUS CYBER- REALITIES: CYBER- CONFLICT IN THE
INTERNATIONAL SYSTEM New York, NY: Oxford University Press, 2015, 288 pages. ISBN: 9780190204792
Zetter, K. 2014. AN UNPRECEDENTED LOOK AT STUXNET, THE WORLD'S FIRST DIGITAL WEAPON. Retrieved from: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/
Zetter, K. 2010. GOOGLE HACK ATTACK WAS ULTRA SOPHISTICATED, NEW DETAILS SHOW. Retrieved from: https://www.wired.com/2010/01/operation-aurora/