THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION

THE IMPLICATIONS OF THE LACK OF A CYBER-CONFLICT DEFINITION

This article aims in the first place, to answer why a general definition of cyber-conflicts is needed. To do so, it explores the reasons why it has not been possible to create a general definition for this term and what have been the implications of this lack. Among the causes of not having a general definition for the term of “cyber-conflict” it can be found the lack of clarity and rigor in the use of this term and the definition of other terms related to cyberspace that might be confused with each other. In order to better understand the closest approaches to the meaning and definition of what cyber-conflict is, the first part of this paper exposes several definitions of key terms surrounding the concept of “cyber”. The second part of the article shows the relationship between the lack of international organizations that regulate or give guidelines regarding cyber-space and the lack of a universal definition of cyber-conflict. The third and last part presents three relevant cases that demonstrate the recent importance of the cyber-space at the state level, its relationship with cyber-conflicts and how the lack of a universal framework prevents a solution to these type of conflicts. After the analysis, the main conclusion of the study is that a universal definition of the term cyber-conflict is required in order to set a framework that allows the development of regulation measurements towards this new threat that the cyber-space has brought. 

___

  • Brunner, J. 2018. Cibercultura: la aldea global dividida. Retrieved from: https://www.researchgate.net/publication/265287580_cibercultura_la_aldea_global_dividida El Mundo. 2018. Diccionario el Mundo. Retrieved from: http://diccionarios.elmundo.es/diccionarios/cgi/lee_diccionario.html?busca=Ciberespacio&diccionario=1 Finland. 2013. Finland’s Cyber-Security Strategy Government Resolution 24 Jan 2013. Retrieved from: http://www.yhteiskunnanturvallisuus.fi/en/materials/doc_download/40-finlandas-cyber--security-strategy. Herzog, S. 2011, Revisiting the Estonian Cyber- Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, Vol. 4, No. 2: 49-60, 2011. Retrieved from: https://ssrn.com/abstract=2807582 Holloway, M. 2015. Stuxnet Worm Attack on Iranian Nuclear Facilities. Retrieved from: http://large.stanford.edu/courses/2015/ph241/holloway1/ Hirschfeld, J. 2015. Hacking of Government Computers Exposed 21.5 Million People. Retrieved from: https://www.nytimes.com/2015/07/10/us/office-of-personnel-management-hackers-got-data-of-millions.html Kelley, M. 2013. The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought. Retrieved from: http://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11 Kleinsteuber, H. 2002. El surgimiento del ciberespacio: la palabra y la realidad en Vidal Beneyto, J. (Editor): La ventana global, Taurus, Madrid, 2002, pp. 47. University of Oxford. 2018. Oxford Dictionary. Retrieved from: https://en.oxforddictionaries.com/?utm_source=od-panel&utm_campaign=en McGuinness, D. 2017. How a cyber- attack transformed Estonia. Retrieved from: http://www.bbc.com/news/39655415. Montenegro. 2013. Strategy on Cyber- Security of Montenegro to 2017 (2013). Retrieved from: https://ccdcoe.org/strategies-policies.html. Nakashima, E. 2013. Chinese hackers who breached Google gained access to sensitive data, U.S. officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/chinese-hackers-who-breached-google-gained-access-to-sensitive-data-us-officials-say/2013/05/20/51330428-be34-11e2-89c9-3be8095fe767_story.html?utm_term=.d72ebcb4c83e. Nakashima, E & Warrick, J. 2010. Stuxnet was work of U.S. and Israeli experts, officials say. Retrieved from: https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html?utm_term=.25cd42acad75 NATO. 2014. NATO AAP-06 Edition 2014. Retrieved from: http://nsa.nato.int/nsa/zPublic/ap/aap6/AAP-6.pdf Orcutt, M. 2017. El nuevo vigilante privado de la geopolítica y el ciberconflicto internacional. Retrieved from: https://www.technologyreview.es/s/8812/el-nuevo-vigilante-privado-de-la-geopolitica-y-el-ciberconflicto-internacional Pasulka, N. 2016. A Virus Altered the Face of Security in Iran. Retrieved from: http://www.takepart.com/article/2016/07/25/zero-days-stuxnet-iran. Prime Minister Office of Israel. 2011. Advancing National Cyber-space Capabilities, Resolution No. 3611 of the Government of august 7, 2011 – 2011. Retrieved from: http://www.pmo.gov.il/English/PrimeMinistersOffice/DivisionsAndAuthorities/cyber-/Documents/Advancing%20National%20Cyber-space%20Capabilities.pdf Sienkiewicz, H. 2017. The Art of Cyber- Conflict. Dog Ear Publishing, (pp. 5-180). Tallinn Manual. 2013. Tallinn Manual on the International Law Applicable to Cyber- Warfare – 2013. Retrieved from: https://ccdcoe.org/tallinn-manual.html Tamkin, E. 2017. 10 Years After the Landmark Attack on Estonia, Is the World Better Prepared for Cyber- Threats?. Retrieved from: http://foreignpolicy.com/2017/04/27/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber--threats/ Thornburgh, N. 2005. Inside the Chinese Hack Attack. Retrieved from: http://content.time.com/time/nation/article/0,8599,1098371,00.html Traynor, I. 2007. Russia accused of unleashing cyber-war to disable Estonia. Retrieved from: https://www.theguardian.com/world/2007/may/17/topstories3.russia United Kingdom Cabinet Office. 2011. UK Cyber- Security Strategy (2011). Retrieved from: https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/60961/uk-cyber--security-strategy-final.pdf Valeriano, B & Maness, R. 2015. CYBER- WAR VERSUS CYBER- REALITIES: CYBER- CONFLICT IN THE INTERNATIONAL SYSTEM New York, NY: Oxford University Press, 2015, 288 pages. ISBN: 9780190204792 Zetter, K. 2014. AN UNPRECEDENTED LOOK AT STUXNET, THE WORLD'S FIRST DIGITAL WEAPON. Retrieved from: https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ Zetter, K. 2010. GOOGLE HACK ATTACK WAS ULTRA SOPHISTICATED, NEW DETAILS SHOW. Retrieved from: https://www.wired.com/2010/01/operation-aurora/