Nowe trendy w aktywności państw w przestrzeni teleinformatycznej w drugiej dekadzie XXI wieku
Abstract
Abstrakt: Nowe trendy w aktywności państw w przestrzeni teleinformatycznej w drugiej dekadzie XXI wieku
Prezentowany artykuł stanowi próbę zidentyfikowania nowych tendencji w zakresie aktywności aktorów państwowych w cyberprzestrzeni w drugiej dekadzie XXI wieku. W tekście wskazano na cztery, w opinii autora najważniejsze, trendy. Przede wszystkim, doszło do zmiany podejścia Federacji Rosyjskiej do wykorzystania potencjału przestrzeni teleinformatycznej w warunkach konfliktu zbrojnego, czego dowiodły doświadczenia Ukrainy. Po drugie, stosunkowo nowym zjawiskiem są wysoce zorganizowane kampanie cyberszpiegowskie, których celem jest wywieranie wpływu na procesy demokratyczne w państwach rozwiniętych. Po trzecie, doszło także do istotnego złagodzenia kontrowersji w dziedzinie cyberbezpieczeństwa między Chinami a USA. Wreszcie, potwierdzono użyteczność komponentu cyberprzestrzennego sił zbrojnych w warunkach konfliktu asymetrycznego.
Słowa kluczowe: cyberbezpieczeństwo, bezpieczeństwo międzynarodowe, cyberwojna, cyberszpiegostwo
Abstract: New trends in activities of states in cyberspace in the second decade of the 21st century
This article identifies and characterizes new tendencies in activities of states in cyberspace in the second decade of the 21st century. The paper argues that there are four major trends noticeable. Firstly, the Russian Federation has changed its approach to the use of cyberspace during military conflicts, which was visible during the conflict in Donbass. Secondly, advanced cyber espionage campaigns attempting to influence democratic processes in developed countries have been also a new phenomenon. Thirdly, previous controversies between China and the U.S. on cybersecurity problems have been toned down due to their recent agreement. And finally, the usability of military cyber‑units in asymmetric conflict was also proven.
Key words: cybersecurity, cyber war, cyber espionage, international security
References
APT1. Exposing One of China’s Cyber Espionage Units. Mandiant 2013 — https://cs.brown.edu/courses/csi1800/sources/2013_Mandiant_APT1_Report.pdf (dostęp: 11.09.2017).
APT28. A Window into Russia’s Cyber Espionage Operations? “FireEye Special Report” 2014.
Assessing Russian Activities and Intentions in Recent US Elections. Intelligence Community Assessment, Office of the Director of National Intelligence, 6.01.2017 — https://www.dni.gov/files/documents/ICA_2017_01.pdf (dostęp: 11.09.2017).
Berger S.: Hackers Leak Ukraine Military Documents Revealing Plan to Increase Spending on Armed Forces — http://www.ibtimes.com/hackers‑leak‑ukraine‑military‑documents‑revealing‑plan‑increase‑spending‑armed‑forces‑1989742 (dostęp: 15.09.2017).
Bing C.: Why the U.S. is Struggling with the Digital War on ISIS — https://www.cyberscoop.com/us‑cyber‑command‑digital‑war‑isis/ (dostęp: 17.09.2017).
Buchanan B., Sulmeyer M.: Russia and Cyber Operations: Challenges and Opportunities for the Next U.S. Administration. Carnegie Endowment for International Peace 2016.
Cohen A., Ham ilton R.E.: The Russian Military and the Georgia War: Lessons and Implications. Carlisle 2011.
Cyber-Berkut atakuje polskie serwisy internetowe. Prezydent.pl padł. GPW także — https://niebezpiecznik.pl/post/cyber‑berkut‑atakuje‑polskie‑serwisy‑internetowe‑prezydent‑pl‑padl‑gwp‑tez/ (dostęp: 15.09.2017).
Dunn Cavelty M.: The Militarisation of Cyberspace: Why Less May be Better. In: 2012 4th International Conference on Cyber Conflict. Eds. C. Czosseck, R. Ottis, K. Ziolkowski. Tallin 2012.
Revelations from Wikileaks’ Hacked Clinton Emails — http://www.bbc.com/news/world‑us‑canada‑37639370 (dostęp: 16.09.2017).
Gartenstein‑Ross D., Barr N., Moreng B.: The Islamic State’s Global Propaganda Strategy. “ICCT Research Paper” 2016, No 1.
Grizzly Steppe — Russian Malicious Cyber Activity. Joint Analysis Report, Federal Bureau of Investigation, NCCIC — https://www.us‑cert.gov/sites/default/files/publications/JAR_16‑20296A_GRIZZLY%20STEPPE‑2016‑1229.pdf (dostęp: 11.09.2017).
Harold S.W., Libicki M.C., Cevallos A.S.: Getting to Yes with China in Cyberspace. Santa Monica 2016.
Henderson B., Graham C.: Russia Blamed as Macron Campaign Blasts ‘massive hacking attack’ ahead of French Presidential Election — http://www.telegraph.co.uk/news/2017/05/05/macron‑campaign‑blasts‑massive‑hacking‑attack‑aheadfrench‑presidential/ (dostęp: 16.09.2017).
Herzog S.: Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. “Journal of Strategic Security” 2011, Vol. 4, No 2.
Jacobs A., Helft M.: Google, Citing Attack, Threatens to Exit China — http://www.nytimes.com/2010/01/13/world/asia/13beijing.html?_r=1 (dostęp: 15.09.2017).
Kaiman J.: China Reacts Furiously to US Cyber‑ espionage Charges — https://www.theguardian.com/world/2014/may/20/china‑reacts‑furiously‑us‑cyber‑espionagecharges (dostęp: 15.09.2017).
Kamass a M.: Odtajnienie izraelskiego ataku na syryjski reaktor. Nieprzypadkowy moment — http://www.defence24.pl/odtajnienie‑izraelskiego‑ataku‑na‑syryjskireaktor‑nieprzypadkowy‑moment (dostęp: 25.03.2018).
Key Events. In: Cyber War in Perspective: Russian Aggression Against Ukraine. Ed. K. Geers. Tallin 2015.
Koval N.: Revolution Hacking. In: Cyber War in Perspective: Russian Aggression Against Ukraine. Ed. K. Geers. Tallin 2015.
Kozłowski A.: Comparative Analysis of Cyberattacks on Estonia, Georgia and Kyrgyzstan. “European Scientific Journal” 2014, Vol. 3.
Lakomy M.: Cracks in the Online “Caliphate”: How the Islamic State is Losing Ground in the Battle for Cyberspace. “Perspectives on Terrorism” 2017, Vol. 11, No 3.
Lakomy M.: Cyberprzestrzeń jako nowy wymiar rywalizacji i współpracy państw. Katowice 2015.
Langner R.: To Kill a Centrifuge. The Langner Group. November 2013 — https://www.langner.com/wp‑content/uploads/2017/03/to‑kill‑a‑centrifuge.pdf (dostęp: 11.09.2017).
Libicki M.: The Cyberwar Challenge to NATO. W: Cyberterroryzm zagrożeniem XXI wieku. Perspektywa politologiczna i prawna. Red. A. Podraza, P. Potakowski, K. Wiak. Warszawa 2013.
Malkin B.: Edward Snowden Claims US Hacks Chinese Phone Messages — http://www.telegraph.co.uk/news/worldnews/asia/hongkong/10137215/Edward-Snowden‑claims‑US‑hacks‑ Chinese‑phone‑messages. html (dostęp: 11.09.2017).
Morton C.: Stuxnet, Flame, and Duqu — the OLYMPIC GAMES. In: A Fierce Domain: Conflict in Cyber Space, 1986 to 2012. Ed. J. Healy. Arlington 2013.
Nakas hima E., Ryan M.: U.S. Military Has Launched a New Digital War against the Islamic State — https://www.washingtonpost.com/world/national‑security/us‑militarys‑digital‑war‑against‑the‑islamic‑state‑is‑off‑to‑a‑slow‑start/2016/07/15/76a3fe82‑3da3‑11e6‑a66f‑aa6c1883b6b1_story.html?utm_term=.23b62580ea67 (dostęp: 17.09.2017).
Nakas hima E.: U.S. Military Cyber Operation to Attack ISIS Last Year Sparked Heated Debate over Alerting Allies — https://www.washingtonpost.com/world/national‑security/us‑military‑cyber‑operation‑to‑attack‑isis‑last‑year‑sparked‑heated-debate‑over‑alerting‑allies/2017/05/08/93a120a2‑30d5‑11e7‑9dec-764dc781686f_story.html?utm_term=.c91ece2fddf6 (dostęp: 17.09.2017).
Pakharenko G.: Cyber Operations at Maidan: A First-Hand Account. In: Cyber War in Perspective: Russian Aggression against Ukraine. Ed. K. Geers. Tallin 2015.
Piklington E.: US and China to Discuss Cybersecurity at High-level Diplomatic Meetings — https://www.theguardian.com/world/2013/jun/02/us-china-cybersecurity-hacking‑espionage-meetings (dostęp: 19.05.2017).
Podraza A.: Cyberterroryzm jako wzrastające zagrożenie dla bezpieczeństwa międzynarodowego
w XXI wieku. W: Cyberterroryzm zagrożeniem XXI wieku. Perspektywa politologiczna i prawna. Red. A. Podraza, P. Potakowski, K. Wiak. Warszawa 2013.
Red Line Drawn: China Recalculates Its Use of Cyber Espionage. “FireEye iSIGHT Intelligence Special Report”, June 2016.
Rid T.: Cyber War Will Not Take Place. “Journal of Strategic Studies” 2012, Vol. 35, No 1.
Sakkov S.: Foreword. In: Cyber War in Perspective: Russian Aggression Against Ukraine. Ed. K. Geers. Tallin 2015.
Scarborough R.: U.S. Cyber Command Launches Hacking Offensive against Islamic State — http://www.washingtontimes.com/news/2016/feb/29/us-launches-cyber-attacks-islamic-state/ (dostęp: 17.09.2017).
Schofield J.: Google, Yahoo, Adobe and Who? — https://www.theguardian.com/technology/2010/jan/14/google-yahoo-china-cyber-attack(dostęp: 15.09.2017).
Senate Intelligence Committee: Russia and 2016 Election. “Fireye” 2017.
Storm D.: Political Hackers Attack Russia, Nazi Defacement, Threaten US CENTCOM with Cyberattack — https://www.computerworld.com/article/2476002/cybercrime-hacking/political-hackers-attack-russia--nazi-defacement--threaten-us-centcom-with-cybera.html (dostęp: 15.09.2017).
The White House, Off ice of the Press Secreta ry: FACT SHEET: President Xi Jinping’s State Visit to the United States — https://obamawhitehouse.archives.gov/the-press-office/2015/09/25/fact-sheet-president-xi-jinpings-state-visit-united-states (dostęp: 15.09.2017).
Theohary C.A., Welt C.: Russia and the U.S. Presidential Elections. “CRS Insight” 2017, January 17.
Thornburgh N.: Inside the Chinese Hack Attack — https://courses.cs.washington.edu/courses/csep590/05au/readings/Titan.Rain.pdf (dostęp: 11.09.2017).
Towards Trustworthy Elections. New Directions in Electronic Voting. Eds. D. Chaum et al. Berlin 2010.
Downloads
Published
How to Cite
Issue
Section
License
The Copyright Owners of the submitted texts grant the Reader the right to use the pdf documents under the provisions of the Creative Commons 4.0 International License: Attribution-Share-Alike (CC BY-SA). The user can copy and redistribute the material in any medium or format and remix, transform, and build upon the material for any purpose.
1. License
The University of Silesia Press provides immediate open access to journal’s content under the Creative Commons BY-SA 4.0 license (http://creativecommons.org/licenses/by-sa/4.0/). Authors who publish with this journal retain all copyrights and agree to the terms of the above-mentioned CC BY-SA 4.0 license.
2. Author’s Warranties
The author warrants that the article is original, written by stated author/s, has not been published before, contains no unlawful statements, does not infringe the rights of others, is subject to copyright that is vested exclusively in the author and free of any third party rights, and that any necessary written permissions to quote from other sources have been obtained by the author/s.
If the article contains illustrative material (drawings, photos, graphs, maps), the author declares that the said works are of his authorship, they do not infringe the rights of the third party (including personal rights, i.a. the authorization to reproduce physical likeness) and the author holds exclusive proprietary copyrights. The author publishes the above works as part of the article under the licence "Creative Commons Attribution-ShareAlike 4.0 International".
ATTENTION! When the legal situation of the illustrative material has not been determined and the necessary consent has not been granted by the proprietary copyrights holders, the submitted material will not be accepted for editorial process. At the same time the author takes full responsibility for providing false data (this also regards covering the costs incurred by the University of Silesia Press and financial claims of the third party).
3. User Rights
Under the CC BY-SA 4.0 license, the users are free to share (copy, distribute and transmit the contribution) and adapt (remix, transform, and build upon the material) the article for any purpose, provided they attribute the contribution in the manner specified by the author or licensor.
4. Co-Authorship
If the article was prepared jointly with other authors, the signatory of this form warrants that he/she has been authorized by all co-authors to sign this agreement on their behalf, and agrees to inform his/her co-authors of the terms of this agreement.
I hereby declare that in the event of withdrawal of the text from the publishing process or submitting it to another publisher without agreement from the editorial office, I agree to cover all costs incurred by the University of Silesia in connection with my application.