GUERRAS POR DELEGACIÓN EN EL CIBERESPACIO

Manuel Ricardo Torres Soriano

Resumen


El propósito de este artículo es profundizar en las dinámicas específicas que posee el ciberespacio como escenario en el cual proyectar las llamadas guerras por delegación. Se parte de la tesis de que la principal ventaja que aporta esta estrategia (bajo riesgo de padecer la represalia por parte del actor atacado) es también su principal debilidad, ya que la participación indirecta en un ciber-conflicto, resta eficacia a un Estado para que este pueda alcanzar objetivos tácticos, y tiene un valor reducido para avanzar en la consecución de objetivos estratégicos. A lo largo del trabajo se analizan las ventajas y limitaciones del uso de esta estrategia, y se propone una tipología de los diferentes ciber-proxies en función de su relación con respecto al Estado que los instrumentaliza.


Palabras clave


ciberespacio, conflictos; espionaje; disuasión; hacktivismo

Texto completo:

PDF PDF (English)

Referencias


ADELKHAH, Nima. “Iran and Its Cyber-Terrorism Strategies”, Terrorism Monitor, vol. 14, núm. 10 (May 16, 2016) http://www.jamestown.org/single/?tx_ttnews[tt_news]=45435&tx_ttnews[backPid]=7&cHash=fa0da141d63052f600aa6a7bffa1f625

BBC. “The Interview: A guide to the cyber attack on Hollywood”, BBC News (December 29, 2014). http://www.bbc.com/news/entertainment-arts-30512032

BETZ, David y STEVENS, Tim. “Power and cyberspace”, Adelphi Series, Vol. 51, núm. 424 (2011), pp. 9-34.

BETZ, David. “Cyberpower in Strategic Affairs: Neither Unthinkable nor Blessed”, Journal of Strategic Studies, vol. 35, núm. 5 (2012), pp. 689-711.

BORGHARD, Erica D. y LONERGAN, Shawn W. “Can States Calculate the Risks of Using Cyber Proxies?”, Orbis, vol. 60, núm, 3 (2016), pp. 395-416.

BRIGHT, Peter. “Independent Iranian Hacker Claims Responsibility for Comodo Hack”, Wired (March 28, 2011). http://www.wired.com/threatlevel/2011/03/comodo_hack/

BRONK, Christopher y TIKK-RINGAS, Eneken. “The Cyber Attack on Saudi Aramco”, Survival, vol. 55, núm. 2 (April 2013), pp. 81-96.

DEIBERT, Ronald J. Black Code: Inside the Battle for Cyberspace, Toronto: Signal/McClelland & Stewart, 2013.

GEERS, Kenneth (ed.) Cyber War in Perspective: Russian Aggression against Ukraine, Tallin: NATO CCD COE Publications, 2015. https://ccdcoe.org/sites/default/files/multimedia/pdf/CyberWarinPerspective_full_book.pdf

GHOSH, Sumit, MALEK, Manu y STOHR, Edward A. (coord.) Guarding Your Business: A Management Approach to Security, Nueva Yok: Springer, 2004.

GOLDMAN, Emily O. y ARQUILLA, John (eds.) Cyber Analogies, Monterey, CA: Departament of Defense Information Operations Center for Research, 2014.

GOMPERT, David C. y LIBICKI, Martin. Waging Cyber War the American Way, Survival: Global Politics and Strategy, vol. 57, núm. 4 (August–September 2015), pp. 7-28.

GUITTON, Clement y KORZAK, Elaine. “The Sophistication Criterion for Attribution: Identifying the Perpetrators of Cyber-Attacks”, The RUSI Journal, vol. 158, núm. 4 (2013), pp. 62-68.

HARRIS, Shane. @WAR: The Rise of the Military-Internet Complex, Boston: Mariner Books, 2015

INKSTER, Nigel. “Cyber Attacks in La-La Land”, Survival: Global Politics and Strategy, vol. 57, núm. 1 (February–March 2015), pp. 105-116.

JONES, Sam. “Cyber warfare: Iran opens a new front”, Financial Times (April 26, 2016). http://www.ft.com/cms/s/0/15e1acf0-0a47-11e6-b0f1-61f222853ff3.html

KAPLAN, Fred. Dark Territory. The secret History of Cyber War, New York: Simon & Schuster, 2016.

KETTER, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, Random House, New York, 2014.

KOPSTEIN, Joshua. “Meet the Companies that Helped Hacking Team Sell Tools to Repressive Governments”, Mother Board, (July 9, 2015). https://motherboard.vice.com/read/meet-the-companies-that-helped-hacking-team-sell-tools-to-repressive-governments

LEE, Robert M. y RID, Thomas. “OMG Cyber!”, The RUSI Journal, vol. 159, núm 5 (October-November 2014), pp. 4-12. http://www.tandfonline.com/doi/pdf/10.1080/03071847.2014.969932

LINDSAY, Jon R. “Proxy Wars: Control Problems in Irregular Warfare and Cyber Operations”, International Studies Association anual meeting, San Francisco, (April 2013). http://www.jonrlindsay.com/papers

LINDSAY, Jon R. “Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack”, Journal of Cybersecurity, vol. 1, núm. 1 (2015), pp. 53-67. http://cybersecurity.oxfordjournals.org/content/cybers/1/1/53.full.pdf

LINDSAY, JON R. China and Cybersecurity. Espionage, Strategy, and Politics the Digital Domain, Oxford: Oxford University Press, 2015.

LITWAK, Robert y KING, Meg. “Arms Control in Cyberspace?”, Wilson Briefs, (October 2015). https://www.wilsoncenter.org/publication/arms-control-cyberspace

MADIANT. “APT1: Exposing One of China's Cyber Espionage Units”, Mandiant Intelligence Center (2013). http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

MCKIE, Gladys. “Cutting Sword of Justice”, Cyber Threat Research (sin fecha). https://cyberthreatresearch.wordpress.com/hacktivist-groups/cutting-sword-of-justice/

MUMFORD, Andrew. “Proxy Warfare and the Future of Conflict”, The RUSI Journal, vol. 158, núm. 2 (2013), pp. 40-46.

REVERON, Derek S. Cyberspace and National Security: Threats, Opportunities, and Power in a Virtual World, Washington D.C.: Georgetown University Press, 2012.

RID, Thomas y BUCHANAN, Ben. “Attributing Cyber Attacks”, Journal of Strategic Studies, vol. 38, núm. 1-2 (2015), pp. 4-37.

RUSHE, Dominic. “The Interview revenge hack cost Sony just $15m”, The Guardian (February 4, 2015) http://www.theguardian.com/film/2015/feb/04/guardians-peace-revenge-hack-sony-finances-unscathed

SCOTT, James y SPANIEL, Drew. “Know Your Enemies 2.0”, ICIT Report (February 2016). http://icitech.org/wp-content/uploads/2016/02/ICIT-Brief-Know-Your-Enemies-2.0.pdf

SHACHTMAN, Noah. “Russia’s Top Cyber Sleuth Foils US Spies, Helps Kremlin Pals”, Wired, (June 23, 2012). http://www.wired.com/dangerroom/2012/07/ff_kaspersky/

SMITH, David. “Russian Cyber Operations”, Potomac Institute for Policy Studies (2012). http://www.potomacinstitute.org/80-potomac-institute-cyber-center/piccpublications/670-new-picc-paper-russian-cyber-operations

VALERIANO, Brandon G. y MANESS, Ryan. “The Dynamics of Cyber Conflict between Rival Antagonists, 2001-2011”, Journal of Peace Research, vol. 51, núm. 3 (May 2014), pp. 347-360.

VALERIANO, Brandon G. y MANESS, Ryan. Cyberwars versus Cyber Realities. Cyber Conflict in the International System, Oxford: Oxford University Press, 2015.

VALLEJO, Ángel. “El avance de la ciber-retorsión”, Ciber Elcano, núm. 3 (Mayo 2015), pp.7-13. http://www.realinstitutoelcano.org/wps/wcm/connect/68979900485661a5a4b6b77939ebc85f/Ciber_Elcano_Num3.pdf?MOD=AJPERES&CACHEID=1431364739259

ZETTER, Kim. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, New York: Crown, 2014.


Enlaces refback

  • No hay ningún enlace refback.