Page 213
REVISTA IEEE 9
215
Manuel R. Torres Soriano Proxy wars in cyberspace
events, to thus strengthen its dissuasive character before potential enemies. On the
contrary, the use of a cyber weapon reveals the advantage possessed by the actor using
it, which causes the potential victims to correct those vulnerabilities and take active
measures to avoid an identical cyber attack. This leads the antagonists to ration the
use of their cyber arsenals, making use of them only in contexts where no other viable
alternative exists, or even renouncing their present use so as to have them available in
a potential conflict of greater importance.
This restraint may be observed even in actors with a greater predisposition for the
use of force. It is highly significant that in the conflict between Russia and the Ukraine,
hardly any major cyber attacks were produced beyond the usual attacks of denial of
service and the sabotage of web pages on the part of patriotic cyber militias and hacker
groups7. The Russian annexation of part of the Ukrainian territory and its attempt to
destabilize the Kiev regime have been interpreted as a crystal-clear example of so-called
“hybrid warfare”, where the attacker makes intensive use of those resources of force
which allow him to diffuse his responsibility during the development of the conflict.
In spite of recourse to cyberspace fitting perfectly into the strategy of concealment, in
the Russian case the fear of undesirable effects weighed more than the advantages its
use could provide8. In the words of a member of U.S. intelligence, the problem with
using a cyber weapon is that “once it’s been revealed, it’s the same as using an invisible
airplane for the first time, you’ve rung the bell, and you can’t maintain that the plane
no longer exists. The question is: which aerial battle do you really want to use your
invisible plane in?”9
One of the most established myths about cyber conflict is the supposed technical
impossibility of establishing the origin of an attack, which would have spurred the
aggression of a great number of actors sheltered by the anonymity provided by
cyberspace. The reality is that although technically it is complex to determine the
authorship of a cyber attack, it is not an impossible task10. In fact, the forensic aspect
is not a determinant element; at times, it is not even the principal one. The reaction
against the attacker follows a political logic11, and as such, makes it unlikely that
the aggressor will go unpunished due to lack of reliable proof of his guilt, as would
7 LIBIKI, Martin, “The Cyber War that Wasn’t”, in GEERS, Kenneth (ed.)”Cyber War in Perspective:
Russian Aggression against Ukraine”, Tallin: NATO CCD COE Publications, 2015. https://ccdcoe.
org/sites/default/files/multimedia/pdf/CyberWarinPerspective full book.pdf.
8 VALERIANO, Brandon G., and MANESS, Ryan, “Cyber wars versus Cyber Realities.” “Cyber
Conflict in the International System”, Oxford: Oxford University Press, 2015.
9 KETTER, Kim. “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital
Weapon”, Random House, New York, 2014.
10 GUITTON, Clement and KORZAK, Elaine, “The Sophistication Criterion for Attribution:
Identifying the Perpetrators of Cyber-Attacks”, The RUSI Journal, vol. 158, nº 4 (2013), pp. 62-68.
11 GOMPERT, David C. and LIBICKI, Martin, “Waging Cyber War the American Way”, Survival
Global Politics and Strategy, vol. 57, nº 4 (August-September 2015), pp. 7-28.
http://revista.ieee.es/index.php/ieee
- The Fifth Element
- Book review
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- Book review
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- Central Asians fighting in Syria: the danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- The Islamic state and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- The cartoon, the new weapon of the first world war
- Javier Lion Bustillo
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- Proxy wars in cyberspace
- Salvador Sánchez Tapia
- Presentation of Issue nº 9 of the Spanish Institute for Strategic Studies (IEEE) Magazine
- Manuel R. Torres Soriano
- Miguel Ángel Ballesteros Martín
- Consejo de redacción
- Miguel Ángel Ballesteros Martín
- Presentación de la revista
- Manuel R. Torres Soriano
- Guerras por delegación en el ciberespacio
- Proxy wars in cyberspace
- Salvador SánchezTapia
- Definición de un procedimiento de análisis de modelos de relaciones cívico-militares
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- La viñeta, la nueva arma durante la I Guerra Mundial
- The cartoon, the new weapon of the First World War
- Javier Lion Bustillo
- El Estado Islámico y Jabhat al-Nusra, ¿nuevos actores en el Líbano?
- The Islamic State and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- Centroasiáticos luchando en Siria: El peligro de los retornados del Estado Islámico para Asia Central
- Central Asians fighting in Syria: The danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- Liderazgo ético y gestión responsable como vectores de mejora en las Organizaciones de Seguridad, Emergencia y Defensa
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- El quinto elemento
- Normas para los autores de artículos
- p 111-131.pdf
- The Fifth Element
- Book review
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- Book review
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- Central Asians fighting in Syria: the danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- The Islamic state and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- The cartoon, the new weapon of the first world war
- Javier Lion Bustillo
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- Proxy wars in cyberspace
- Salvador Sánchez Tapia
- Presentation of Issue nº 9 of the Spanish Institute for Strategic Studies (IEEE) Magazine
- Manuel R. Torres Soriano
- Miguel Ángel Ballesteros Martín
- Consejo de redacción
- Miguel Ángel Ballesteros Martín
- Presentación de la revista
- Manuel R. Torres Soriano
- Guerras por delegación en el ciberespacio
- Proxy wars in cyberspace
- Salvador SánchezTapia
- Definición de un procedimiento de análisis de modelos de relaciones cívico-militares
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- La viñeta, la nueva arma durante la I Guerra Mundial
- The cartoon, the new weapon of the First World War
- Javier Lion Bustillo
- El Estado Islámico y Jabhat al-Nusra, ¿nuevos actores en el Líbano?
- The Islamic State and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- Centroasiáticos luchando en Siria: El peligro de los retornados del Estado Islámico para Asia Central
- Central Asians fighting in Syria: The danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- Liderazgo ético y gestión responsable como vectores de mejora en las Organizaciones de Seguridad, Emergencia y Defensa
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- El quinto elemento
- Normas para los autores de artículos
REVISTA IEEE 9
To see the actual publication please follow the link above