Page 217
REVISTA IEEE 9
219
Manuel R. Torres Soriano Proxy wars in cyberspace
d) Allows undercover operations. Recourse may be had to a proxy in order to avoid
the barriers hindering a State from acting explicitly in specific environments of
cyberspace. One of the most meaningful examples is that of the black markets
in exploits. The cyber capacities of an actor are directly linked to his ability to
construct an arsenal of hardware and software vulnerabilities which may be
integrated into his operations in cyberspace. Although the most advanced actors
are capable of detecting and deactivating these breeches of security by their own
means, normally they also have recourse to non-regulated markets for the sale
and purchase of exploits to increase their resources22. The direct intervention by
a State agency on these non-regulated, or illicit, markets presents a series of
problems which may be avoided if this intervention is carried out undercover.
So, for example, a legal dilemma exists the moment a State has acquired
(usually using opaque funds23) a vulnerability which compromises not only the
security and secrecy of its adversary’s communications, but also that of citizens
themselves. In spite of this, it decides not to make public this vulnerability to
avoid its being “patched”, and to exploit to its benefit this ignorance. Using a
proxy as intermediate actor offers not only denial capability but also additional
advantages such as the avoidance of an image crisis when the existence of the
interactions with actors of dubious reputation is exposed24, or keeping adversaries
from being able to create an accurate image of the cyber capacities which the
State has at is disposition.
A TYPOLOGY OF CYBER PROXIES
The nature of the link established between a State and those groups which it uses as
proxies in a cyber conflict is an essential element in order to understand its dynamics
of performance and capacities. Therefore, the following typology is suggested:
22 HARRIS, Shane, “@War. The Rise of the Military-Internet Complex”, Boston, Mariner Books,
2015.
23 DIEBERT, Ronald J., “Black Code: Inside the Battle for Cyberspace”, Toronto, Signal/
McClelland & Stewart, 2013.
24 This was the situation which was produced when the controversial Italian company Hacking
Team, dedicated to the sale of software for the offensive monitoring of communications systems,
underwent hacking which resulted in the publication on Internet of 400 gigabytes of company
data, including its list of clients and contracts. Many democratic governments had to contend in
the face of their country’s public opinion with the inconvenient reality of having done business with
a company which had on its list of purchasers certain dictatorial regimes which used its services to
repress opposition and violate human rights. See: KOPSTEIN, Joshua, “Meet the Companies that
Helped Hacking Team Sell Tools to Repressive Governments”, Mother Board (July 2015). https://
motherboard.vice.com/read/meet-the-companies-that-helped-hacking-team-sell-tools-to-repressive-governments.
http://revista.ieee.es/index.php/ieee
- The Fifth Element
- Book review
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- Book review
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- Central Asians fighting in Syria: the danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- The Islamic state and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- The cartoon, the new weapon of the first world war
- Javier Lion Bustillo
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- Proxy wars in cyberspace
- Salvador Sánchez Tapia
- Presentation of Issue nº 9 of the Spanish Institute for Strategic Studies (IEEE) Magazine
- Manuel R. Torres Soriano
- Miguel Ángel Ballesteros Martín
- Consejo de redacción
- Miguel Ángel Ballesteros Martín
- Presentación de la revista
- Manuel R. Torres Soriano
- Guerras por delegación en el ciberespacio
- Proxy wars in cyberspace
- Salvador SánchezTapia
- Definición de un procedimiento de análisis de modelos de relaciones cívico-militares
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- La viñeta, la nueva arma durante la I Guerra Mundial
- The cartoon, the new weapon of the First World War
- Javier Lion Bustillo
- El Estado Islámico y Jabhat al-Nusra, ¿nuevos actores en el Líbano?
- The Islamic State and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- Centroasiáticos luchando en Siria: El peligro de los retornados del Estado Islámico para Asia Central
- Central Asians fighting in Syria: The danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- Liderazgo ético y gestión responsable como vectores de mejora en las Organizaciones de Seguridad, Emergencia y Defensa
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- El quinto elemento
- Normas para los autores de artículos
- p 111-131.pdf
- The Fifth Element
- Book review
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- Book review
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- Central Asians fighting in Syria: the danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- The Islamic state and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- The cartoon, the new weapon of the first world war
- Javier Lion Bustillo
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- Proxy wars in cyberspace
- Salvador Sánchez Tapia
- Presentation of Issue nº 9 of the Spanish Institute for Strategic Studies (IEEE) Magazine
- Manuel R. Torres Soriano
- Miguel Ángel Ballesteros Martín
- Consejo de redacción
- Miguel Ángel Ballesteros Martín
- Presentación de la revista
- Manuel R. Torres Soriano
- Guerras por delegación en el ciberespacio
- Proxy wars in cyberspace
- Salvador SánchezTapia
- Definición de un procedimiento de análisis de modelos de relaciones cívico-militares
- Defining a model for analysis of civil-military relations patterns
- Manuel García Ruiz
- La viñeta, la nueva arma durante la I Guerra Mundial
- The cartoon, the new weapon of the First World War
- Javier Lion Bustillo
- El Estado Islámico y Jabhat al-Nusra, ¿nuevos actores en el Líbano?
- The Islamic State and Jabhat Al-Nusra; new actors in Lebanon?
- Antonio Alonso Marcos
- Centroasiáticos luchando en Siria: El peligro de los retornados del Estado Islámico para Asia Central
- Central Asians fighting in Syria: The danger of Islamic State retournees to Central Asia
- Carlos García-Guiu López
- Liderazgo ético y gestión responsable como vectores de mejora en las Organizaciones de Seguridad, Emergencia y Defensa
- Ethical leadership and responsible management as levers for improvement in security, emergency and defence organisations
- Javier Jordán Enamorado
- En busca de una Estrategia de Seguridad Nacional
- Ángel Gómez de Ágreda
- El quinto elemento
- Normas para los autores de artículos
REVISTA IEEE 9
To see the actual publication please follow the link above