Cyberspace: the challenges of norm formation

Autores/as

DOI:

https://doi.org/10.5380/cg.v10i1.78424

Resumen

The rules of appropriate conduct in cyberspace have always been a discussion throughout the various years, especially between States. With the rapid expansion of cyberspace, the creation of an international regime for the conduct of States became necessary, however, the many different vulnerabilities, actors, and even definitions made the consensus process difficult. The attributional question of cyberspace, however, was the question that most impeded the process. Technical advances in this area, along with the use of legal standards of proof made public attribution possible and more common. This paper seeks to investigate the link between public attribution with what is possibly an embryo of an international regime for cyberspace with a case study of NotPetya as emblematic of this trend.

Keywords: Cyberspace; Public Attribution; International Regimes.

Biografía del autor/a

Maria Claudia Menezes Leal Nunes, Universidade de São Paulo

Atualmente aluna de mestrado da Universidade de São Paulo em Relações Internacionais pelo o Instituto de Relações Internacionais. Obtive bacharelado na Ibmec no Rio de Janeiro em 2018, e completei especialização em Geopolítica e Defesa pela CEGOV da Universidade Federal do Rio Grande do Sul em Abril de 2020.

Citas

BBC. BBC. US imposes new Russia sanctions over cyber-attacks. BBC News, [S. l.], p. 1-2, 11 jun. 2018. Available at: https://www.bbc.com/news/world-us-canada-44446449. Access in: 28 mar. 2021. Accessed on: 10 Jun. 2021.

BORDIN, Fernando Lusa. REFLECTIONS OF CUSTOMARY INTERNATIONAL LAW: THE AUTHORITY OF CODIFICATION CONVENTIONS AND ILC DRAFT ARTICLES IN INTERNATIONAL LAW. The International and Comparative Law Quarterly, [s. l.], v. 63, n. 3, p. 535-567, July 2014. Available at: https://www.jstor.org/stable/43301622. Accessed on: 10 Jun. 2021.

BROWN, Gary; POELLET, Keira. The Customary International Law of Cyberspace. Strategic Studies Quarterly, [s. l.], v. 6, n. 3, p. 126-145, Fall 2012. Available at: https://www.jstor.org/stable/26267265. Accessed on: 10 Jun. 2021.

CAVELTY, Myriam Dunn; WENGER, Andreas. Cyber security meets security politics: Complex technology, fragmented politics, and networked science. Contemporary Security Policy, [s. l.], v. 41, ed. 1, p. 5-32, 14 out. 2019. Available at: https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1678855. Accessed on: 10 Jun. 2021.

CAVELTY, Myriam Dunn et al. The normalization of cyber-international relations. In: CAVELTY, Myriam Dunn. Strategic Trends 2015: Key Developments in Global Affairs. ETH Zurich: [s. n.], March 2015. p. 81-98. Available at: https://www.researchgate.net/publication/274076687_The_Normalization_of_Cyber-International_Relations. Accessed on: 10 Jun. 2021.

CHANG, Lennon YC; GRABOSKY, Peter. The governance of cyberspace. In: DRAHOS, PETER (ed.). Regulatory Theory: Foundations and applications. [S. l.: s. n.], 2017. p. 533-551. Available at: http://www.jstor.com/stable/j.ctt1q1crtm.42. Accessed on: 10 Jun. 2021.

Charter of the United Nations, Chapter VIII, Article 52. 1945. Available at: https://legal.un.org/repertory/art52.shtml. Accessed on: 10 Jun. 2021.

COPYRIGHT ACT. Act nº N/A, de 1 de janeiro de 1970. N/A. THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998, [S. l.]: The Government of Japan, n. 48, 1970. Available at: https://www.wipo.int/edocs/lexdocs/laws/en/jp/jp081en.pdf. Accessed on: 10 Jun. 2021.

EASTTOM, C. An Examination of the Operational Requirements of Weaponised Malware. Journal of Information Warfare, Peregrine Technical Solutions, v. 17, n. 2, p. 1-15, Spring 2018. Available at: https://www.jstor.org/stable/26633150. Accessed on: 10 Jun. 2021.

EGLOFF, Florian J. Contested public attributions of cyber incidents and the role of academia. Contemporary Security Policy, [s. l.], v. 41, ed. 1, p. 55-81, 12 out. 2019. Available at: https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1677324. Accessed on: 10 Jun. 2021.

EU CYBER DIRECT. EU Cyber Direct. NOT PETYA. Cyber Policy Institute, [s. l.], p. 28-31, June 2017. Available at: https://eucyberdirect.eu/wp-content/uploads/2020/11/2017-notpetya.pdf. Accessed on: 10 Jun. 2021.

EUROPEAN COUNCIL. European Union. COUNCIL DECISION (CFSP) 2020/1127 of 30 July 2020: amending Decision (CFSP) 2019/797 concerning restrictive measures against cyber-attacks threatening the Union or its Member States. THE COUNCIL OF THE EUROPEAN UNION, [S. l.], p. 1-2, 20 Jun. 2020. Available at: https://www.legislation.gov.uk/eudn/2020/1127. Accessed on: 10 Jun. 2021.

GRABORITZ, Beth D. et al. Why the Law of Armed Conflict (LOAC) Must Be Expanded to Cover Vital Civilian Data. The Cyber Defense Review, Army Cyber Institute, v. 5, n. 3, p. 121-132, Fall 2020. Available at: https://www.jstor.org/stable/26954876?seq=1#metadata_info_tab_contents. Accessed on: 10 Jun. 2021.

GHOSH, Shona. The massive 'Petya' cyberattack has hit 64 countries so far and there's no kill switch this time. Business Insider, [S. l.], p. 1-2, 28 jun. 2017. Available at: https://www.businessinsider.com/petya-cyberattack-hit-64-countries-no-kill-switch-2017-6. Accessed on: 10 Jun. 2021.

GILES, Keir; HAGESTAD, William. Divided by a Common Language: Cyber Definitions in Chinese, Russian and English. In: INTERNATIONAL CONFERENCE ON CYBER CONFLICT, 5., 2013, Tallin. Divided by a Common Language: Cyber Definitions in Chinese, Russian and English ... [S.l.: s.n.], 2013. p. 1-17. Available at: http://conflictstudies.org.uk/files/Cyber_Common_Language.pdf. Accessed on: 10 Jun. 2021.

GROSSMAN, Nadav. EternalBlue: Everything There Is To Know. Check Point Research, [S. l.], p. 1-2, 29 set. 2017. Available at: https://research.checkpoint.com/2017/eternalblue-everything-know/. Accessed on: 10 Jun. 2021.

HANSEN, Lene; NISSENBAUM, Helen. Digital Disaster, Cyber Security, and the Copenhagen School. International Studies Quarterly, [s. l.], v. 53, n. 4, p. 1155-1175, 2009. Available at: https://www.jstor.org/stable/27735139. Accessed on: 10 Jun. 2021.

HEGINBOTHAM, Eric et al. Scorecard 9: U.S. and Chinese Cyberwarfare Capabilities. In: HEGINBOTHAM, Eric et al. The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017 . [S.l.]: RAND Corporation, 2015. cap. 11, p. 259-283. Available at: https://www.jstor.org/stable/pdf/10.7249/j.ctt17rw5gb.19.pdf?refreqid=excelsior%3A9a9d8e52666b01ef6f71a2f0a59ab08b. Accessed on: 10 Jun. 2021.

KALLBERG, Jan et al. The Unfitness of Traditional Military Thinking in Cyber. IEEE Access, [S. l.], v. 5, p. 8126-8130, 7 jun. 2017. DOI 10.1109/ACCESS.2017.2693260. Available at: https://www.researchgate.net/publication/316078615_The_Unfitness_of_Traditional_Military_Thinking_in_Cyber. Accessed on: 10 Jun. 2021.

LOBATO, LUÍSA CRUZ et al. Discourses of cyberspace securitization in Brazil and in the United States. Revista Brasileira de Política Internacional, [s. l.], v. 58, n. 2, p. 23-43, December 2015. DOI https://doi.org/10.1590/0034-7329201500202. Accessed on: 10 Jun. 2021.

ICRC, Customary IHL Database Available at: https://ihl-databases.icrc.org/customary-ihl/eng/docs/v1_rul_rule8#refFn_49A37214_00001. Accessed on: 10 Jun. 2021.

PORCHE, Isaac R.; SOLLINGER, Jerry M.; MCKAY, Shawn. A Cyberworm That Knows No Boundaries . [S.l.]: RAND Corporation, 2011. 19 p. Available at: https://www.jstor.org/stable/pdf/10.7249/op342osd.8.pdf?refreqid=search%3A43ceee3d8206d1081a1dcbe33afe0f8b. Accessed on: 10 Jun. 2021.

MCKEE, Douglas; MCFARLAND, Charles. Petya More Effective at Destruction Than as Ransomware. McAfee, [S. l.], p. 1-2, 30 jun. 2017. Available at: https://www.mcafee.com/blogs/enterprise/petya-effective-destruction-ransomware/. Accessed on: 10 Jun. 2021.

MEJIA, Eric F. Act and Actor Attribution in Cyberspace:: A Proposed Analytic Framework. Strategic Studies Quarterly, [s. l.], v. 8, n. 1, p. 114-132, 2014. Available at: https://www.jstor.org/stable/10.2307/26270607. Accessed on: 10 Jun. 2021.

MEDEIROS, Breno Pauli; GOLDONI, Luiz Rogério Franco. Contexto Internacional. The Fundamental Conceptual Trinity of Cyberspace, [s. l.], v. 42, n. 1, Jan./Apr 2020. DOI https://doi.org/10.1590/s0102-8529.2019420100002. Accessed on: 10 Jun. 2021.

NAKASHIMA, Ellen. Russian military was behind ‘NotPetya’ cyberattack in Ukraine, CIA concludes. Washington Post, [S. l.], p. 1-2, 12 jan. 2018. Available at: https://www.washingtonpost.com/world/national-security/russian-military-was-behind-notpetya-cyberattack-in-ukraine-cia-concludes/2018/01/12/048d8506-f7ca-11e7-b34a-b85626af34ef_story.html. Accessed on: 10 Jun. 2021.

SAGAN, Scott D., WALTZ, Kenneth N. The Spread of Nuclear WeaponsSMEETS, Max. How Much Does a Cyber Weapon Cost? Nobody Knows. Council on Foreign Relations, [S. l.], p. 1-2, 21 nov. 2016. Available at: https://www.cfr.org/blog/how-much-does-cyber-weapon-cost-nobody-knows. Accessed on: 10 Jun. 2021.

SCHMITT, M. Tallinn Manual on the International Law Applicable to Cyber Warfare. Cambridge: Cambridge University Press, 2013.

STEVENS, Tim. A Cyberwar of Ideas? Deterrence and Norms in Cyberspace. Contemporary Security Policy, [s. l.], v. 33, ed. 1, p. 148-170, 13 abr. 2012. Available at: https://doi.org/10.1080/13523260.2012.659597. Accessed on: 10 Jun. 2021.

SINGER, P.W; FRIEDMAN, Allan. Cybersecurity and Cyberwarfare: What Everyone Needs to Know. New York: Oxford University Press, 2014. Accessed on: 10 Jun. 2021.

TANCZER, Leonie Maria. 50 shades of hacking:: How IT and cybersecurity industry actors perceive good, bad, and former hackers. CONTEMPORARY SECURITY POLICY, [s. l.], v. 41, n. 1, p. 108-128, 24 set. 2019. Available at: https://www.tandfonline.com/doi/full/10.1080/13523260.2019.1669336. Accessed on: 10 Jun. 2021.

UNITED STATES DISTRICT COURT WESTERN PENNSYLVANIA (United States). Criminal No. 20-316. [S. l.], 15/10/2020. Disponível em: https://www.justice.gov/opa/press-release/file/1328521/download. Accessed on: 10 Jun. 2021.

U.S. COPYRIGHT OFFICE SUMMARY. Act nº N/A, de 1 de dezembro de 1998. N/A. THE DIGITAL MILLENNIUM COPYRIGHT ACT OF 1998, [S. l.], 1998. Available at: https://www.copyright.gov/legislation/dmca.pdf. Accessed on: 10 Jun. 2021.

VOLZ, Dustin; YOUNG, Sarah. White House blames Russia for 'reckless' NotPetya cyber attack. Reuters, [S. l.], p. 1-2, 15 fev. 2018. Available at: https://www.reuters.com/article/us-britain-russia-cyber-usa-idUSKCN1FZ2UJ. Accessed on: 10 Jun. 2021.

Descargas

Publicado

2021-06-30

Cómo citar

Leal Nunes, M. C. M. (2021). Cyberspace: the challenges of norm formation. Conjuntura Global, 10(1). https://doi.org/10.5380/cg.v10i1.78424

Número

Sección

Artigos de Fluxo Contínuo