O ciberespaço: os desafios da formação de normas

Autores

DOI:

https://doi.org/10.5380/cg.v10i1.78424

Resumo

As regras de conduta apropriadas no ciberespaço sempre foram uma grande discussão ao longo dos anos, especialmente entre os Estados. A rápida expansão do ciberespaço tornou necessária a criação de um regime internacional para a conduta dos Estados, no entanto, as diversas vulnerabilidades existentes, atores e até definições diferentes dificultam o processo de consenso. A questão de atribuição de cyber incidentes, no entanto, era a questão que mais impedia o processo. Com avanços técnicos nesta área juntamente com a utilização de processos investigativos legais, atribuição pública está se tornando mais comum. Este estudo investiga a ligação entre atribuição pública e o que é possivelmente um novo regime no ciberespaço, utilizando um breve estudo de caso do NotPetya e como este é emblemático desta nova tendência.

Palavras-Chave: Ciberespaço; Atribuição Pública; Regimes Internacionais.

Biografia do Autor

Maria Claudia Menezes Leal Nunes, Universidade de São Paulo

Atualmente aluna do mestrado de Relações Internacionais na USP no Instituto de Relações Internacionais.

Bachalerado completo na Ibmec do Rio de Janeiro e specialização em Geopolitica e Defesa foi feita no CEGOV da Universidade Federal do Rio Grande do Sul

Referências

BBC. BBC. US imposes new Russia sanctions over cyber-attacks. BBC News, [S. l.], p. 1-2, 11 jun. 2018. Available at: https://www.bbc.com/news/world-us-canada-44446449. Access in: 28 mar. 2021. Accessed on: 10 Jun. 2021.

BORDIN, Fernando Lusa. REFLECTIONS OF CUSTOMARY INTERNATIONAL LAW: THE AUTHORITY OF CODIFICATION CONVENTIONS AND ILC DRAFT ARTICLES IN INTERNATIONAL LAW. The International and Comparative Law Quarterly, [s. l.], v. 63, n. 3, p. 535-567, July 2014. Available at: https://www.jstor.org/stable/43301622. Accessed on: 10 Jun. 2021.

BROWN, Gary; POELLET, Keira. The Customary International Law of Cyberspace. Strategic Studies Quarterly, [s. l.], v. 6, n. 3, p. 126-145, Fall 2012. Available at: https://www.jstor.org/stable/26267265. Accessed on: 10 Jun. 2021.

CAVELTY, Myriam Dunn; WENGER, Andreas. Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, [s. l.], v. 41, ed. 1, p. 5-32, 14 out. 2019. Available at: https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1678855. Accessed on: 10 Jun. 2021.

CAVELTY, Myriam Dunn et al. The normalization of cyber-international relations. In: CAVELTY, Myriam Dunn. Strategic Trends 2015: Key Developments in Global Affairs. ETH Zurich: [s. n.], March 2015. p. 81-98. Available at: https://www.researchgate.net/publication/274076687_The_Normalization_of_Cyber-International_Relations. Accessed on: 10 Jun. 2021.

CHANG, Lennon YC; GRABOSKY, Peter. The governance of cyberspace. In: DRAHOS, PETER (ed.). Regulatory Theory: Foundations and applications. [S. l.: s. n.], 2017. p. 533-551. Available at: http://www.jstor.com/stable/j.ctt1q1crtm.42. Accessed on: 10 Jun. 2021.

Charter of the United Nations, Chapter VIII, Article 52. 1945. Available at: https://legal.un.org/repertory/art52.shtml. Accessed on: 10 Jun. 2021.

COPYRIGHT ACT. Act nº N/A, de 1 de janeiro de 1970. N/A. THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998, [S. l.]: The Government of Japan, n. 48, 1970. Available at: https://www.wipo.int/edocs/lexdocs/laws/en/jp/jp081en.pdf. Accessed on: 10 Jun. 2021.

EASTTOM, C. An Examination of the Operational Requirements of Weaponised Malware. Journal of Information Warfare, Peregrine Technical Solutions, v. 17, n. 2, p. 1-15, Spring 2018. Available at: https://www.jstor.org/stable/26633150. Accessed on: 10 Jun. 2021.

EGLOFF, Florian J. Contested public attributions of cyber incidents and the role of academia. Contemporary Security Policy, [s. l.], v. 41, ed. 1, p. 55-81, 12 out. 2019. Available at: https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1677324. Accessed on: 10 Jun. 2021.

EU CYBER DIRECT. EU Cyber Direct. NOT PETYA. Cyber Policy Institute, [s. l.], p. 28-31, June 2017. Available at: https://eucyberdirect.eu/wp-content/uploads/2020/11/2017-notpetya.pdf. Accessed on: 10 Jun. 2021.

EUROPEAN COUNCIL. European Union. COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020: amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States. THE COUNCIL OF THE EUROPEAN UNION, [S. l.], p. 1-2, 20 Jun. 2020. Available at: https://www.legislation.gov.uk/eudn/2020/1127. Accessed on: 10 Jun. 2021.

GRABORITZ, Beth D. et al. Why the Law of Armed Conflict (LOAC) Must Be Expanded to Cover Vital Civilian Data. The Cyber Defense Review, Army Cyber Institute, v. 5, n. 3, p. 121-132, Fall 2020. Available at: https://www.jstor.org/stable/26954876?seq=1#metadata_info_tab_contents. Accessed on: 10 Jun. 2021.

GHOSH, Shona. The massive 'Petya' cyberattack has hit 64 countries so far and there's no kill switch this time. Business Insider, [S. l.], p. 1-2, 28 jun. 2017. Available at: https://www.businessinsider.com/petya-cyberattack-hit-64-countries-no-kill-switch-2017-6. Accessed on: 10 Jun. 2021.

GILES, Keir; HAGESTAD, William. Divided by a Common Language: Cyber Definitions in Chinese, Russian and English. In: INTERNATIONAL CONFERENCE ON CYBER CONFLICT, 5., 2013, Tallin. Divided by a Common Language: Cyber Definitions in Chinese, Russian and English ... [S.l.: s.n.], 2013. p. 1-17. Available at: http://conflictstudies.org.uk/files/Cyber_Common_Language.pdf. Accessed on: 10 Jun. 2021.

GROSSMAN, Nadav. EternalBlue: Everything There Is To Know. Check Point Research, [S. l.], p. 1-2, 29 set. 2017. Available at: https://research.checkpoint.com/2017/eternalblue-everything-know/. Accessed on: 10 Jun. 2021.

HANSEN, Lene; NISSENBAUM, Helen. Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, [s. l.], v. 53, n. 4, p. 1155-1175, 2009. Available at: https://www.jstor.org/stable/27735139. Accessed on: 10 Jun. 2021.

HEGINBOTHAM, Eric et al. Scorecard 9: U.S. and Chinese Cyberwarfare Capabilities. In: HEGINBOTHAM, Eric et al. The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017 . [S.l.]: RAND Corporation, 2015. cap. 11, p. 259-283. Available at: https://www.jstor.org/stable/pdf/10.7249/j.ctt17rw5gb.19.pdf?refreqid=excelsior%3A9a9d8e52666b01ef6f71a2f0a59ab08b. Accessed on: 10 Jun. 2021.

KALLBERG, Jan et al. The Unfitness of Traditional Military Thinking in Cyber. IEEE Access, [S. l.], v. 5, p. 8126-8130, 7 jun. 2017. DOI 10.1109/ACCESS.2017.2693260. Available at: https://www.researchgate.net/publication/316078615_The_Unfitness_of_Traditional_Military_Thinking_in_Cyber. Accessed on: 10 Jun. 2021.

LOBATO, LUÍSA CRUZ et al. Discourses of cyberspace securitization in Brazil and in the United States. Revista Brasileira de Política Internacional, [s. l.], v. 58, n. 2, p. 23-43, December 2015. DOI https://doi.org/10.1590/0034-7329201500202. Accessed on: 10 Jun. 2021.

ICRC, Customary IHL Database Available at: https://ihl-databases.icrc.org/customary-ihl/eng/docs/v1_rul_rule8#refFn_49A37214_00001. Accessed on: 10 Jun. 2021.

PORCHE, Isaac R.; SOLLINGER, Jerry M.; MCKAY, Shawn. A Cyberworm That Knows No Boundaries . [S.l.]: RAND Corporation, 2011. 19 p. Available at: https://www.jstor.org/stable/pdf/10.7249/op342osd.8.pdf?refreqid=search%3A43ceee3d8206d1081a1dcbe33afe0f8b. Accessed on: 10 Jun. 2021.

MCKEE, Douglas; MCFARLAND, Charles. Petya More Effective at Destruction Than as Ransomware. McAfee, [S. l.], p. 1-2, 30 jun. 2017. Available at: https://www.mcafee.com/blogs/enterprise/petya-effective-destruction-ransomware/. Accessed on: 10 Jun. 2021.

MEJIA, Eric F. Act and Actor Attribution in Cyberspace:: A Proposed Analytic Framework. Strategic Studies Quarterly, [s. l.], v. 8, n. 1, p. 114-132, 2014. Available at: https://www.jstor.org/stable/10.2307/26270607. Accessed on: 10 Jun. 2021.

MEDEIROS, Breno Pauli; GOLDONI, Luiz Rogério Franco. Contexto Internacional. The Fundamental Conceptual Trinity of Cyberspace, [s. l.], v. 42, n. 1, Jan./Apr 2020. DOI https://doi.org/10.1590/s0102-8529.2019420100002. Accessed on: 10 Jun. 2021.

NAKASHIMA, Ellen. Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes. Washington Post, [S. l.], p. 1-2, 12 jan. 2018. Available at: https://www.washingtonpost.com/world/national-security/russian-military-was-behind-notpetya-cyberattack-in-ukraine-cia-concludes/2018/01/12/048d8506-f7ca-11e7-b34a-b85626af34ef_story.html. Accessed on: 10 Jun. 2021.

SAGAN, Scott D., WALTZ, Kenneth N. The Spread of Nuclear WeaponsSMEETS, Max. How Much Does a Cyber Weapon Cost? Nobody Knows. Council on Foreign Relations, [S. l.], p. 1-2, 21 nov. 2016. Available at: https://www.cfr.org/blog/how-much-does-cyber-weapon-cost-nobody-knows. Accessed on: 10 Jun. 2021.

SCHMITT, M. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.

STEVENS, Tim. A Cyberwar of Ideas? Deterrence and Norms in Cyberspace. Contemporary Security Policy, [s. l.], v. 33, ed. 1, p. 148-170, 13 abr. 2012. Available at: https://doi.org/10.1080/13523260.2012.659597. Accessed on: 10 Jun. 2021.

SINGER, P.W; FRIEDMAN, Allan. Cybersecurity and Cyberwarfare: What Everyone Needs to Know. New York: Oxford University Press, 2014. Accessed on: 10 Jun. 2021.

TANCZER, Leonie Maria. 50 shades of hacking:: How IT and cybersecurity industry actors perceive good, bad, and former hackers. CONTEMPORARY SECURITY POLICY, [s. l.], v. 41, n. 1, p. 108-128, 24 set. 2019. Available at: https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1669336. Accessed on: 10 Jun. 2021.

UNITED STATES DISTRICT COURT WESTERN PENNSYLVANIA (United States). Criminal No. 20-316. [S. l.], 15/10/2020. Disponível em: https://www.justice.gov/opa/press-release/file/1328521/download. Accessed on: 10 Jun. 2021.

U.S. COPYRIGHT OFFICE SUMMARY. Act nº N/A, de 1 de dezembro de 1998. N/A. THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998, [S. l.], 1998. Available at: https://www.copyright.gov/legislation/dmca.pdf. Accessed on: 10 Jun. 2021.

VOLZ, Dustin; YOUNG, Sarah. White House blames Russia for 'reckless' NotPetya cyber attack. Reuters, [S. l.], p. 1-2, 15 fev. 2018. Available at: https://www.reuters.com/article/us-britain-russia-cyber-usa-idUSKCN1FZ2UJ. Accessed on: 10 Jun. 2021.

Downloads

Publicado

2021-06-30

Como Citar

Leal Nunes, M. C. M. (2021). O ciberespaço: os desafios da formação de normas. Conjuntura Global, 10(1). https://doi.org/10.5380/cg.v10i1.78424

Edição

Seção

Artigos de Fluxo Contínuo