Cyberdefense and its global and specific dimensions in the Spanish National Security Strategy
DOI:
https://doi.org/10.14422/icade.i92.y2014.002Keywords:
Spanish National Security Strategy, cyberthreats, Defense, use of forceAbstract
The 2013 Spanish National Security Strategy includes cyberattacks as one of the threats which Spain is exposed to, and which according to the defined strategy routes, Spain will have to face to. Nevertheless, cyberthreats analysis cannot be done disconnectedly from those threats which are, also included in the document. On the opposite, most part of the threats mentioned in the ESN, are able to turn up through a cyberattack, so a global perspective, analyzing the subject, is due. A new question arises from this analysis, in the sense of having in mind when a ciberattack becomes a threat for Defense instead of a threat for security. A legal perspective will be the only proper way to settle when a cyberattack could
be considered as a use of force, in order to answer the former question.
References
ARQUILLA, J. RONFELDT, D., “Cyberwar is Coming!”, Comparative Strategy (Vol. 12, No. 2, Spring 1993), pp. 141–165.
BENCSATH B., PEK G., BUTTYAN L. y FELEGYHAZI M., “The Cousins of Stuxnet: Duqu, Flame, and Gauss”, Future Internet 2012 (núm. 4, 971- 1003; doi:10.3390/fi4040971), en: http://www.mdpi.com/journal/futureinternet.
DE LUCCA, C.D., “The Need for International Laws of War to Include Cyber Attacks Involving State and Non- State Actors”, Pace International Law Review Online Companion. School of Law (Vol. 3:9, enero 2013), pp. 278 a 315.
DE TOMÁS MORALES, S. y VELÁZQUEZ ORTIZ, A.P. “La responsabilidad del Mando en la conducción de las operaciones durante la ciberguerra: la necesidad de un adiestramiento eficaz”. Premio Defensa 2013, categoría
“José Francisco de Querol y Lombardero”, en: http:// www. portalcultura. mde.es/actividades/ premios/ defensa/2013/.
FOLTZ A.C., “Stuxnet, Schmitt Analysis, and the Cyber “Use-of-Force” Debate”,
JFQ (issue 67, 4th quarter 2012), pp .40 a 48.
GONZÁLEZ CUSSAC, J. L. “Estrategias legales frente a las ciberamenazas”. Ciberseguridad. Retos y amenazas a la seguridad nacional en el ciberespacio, en Cuadernos de Estrategia (Núm. 149, Diciembre 2010). pp. 92-102.
GOMEZ DE AGREDA, A., “El ciberespacio como escenario del conflicto. Identificación de las amenazas. El Ciberespacio nuevo escenario de confrontación”, Monografías CESEDEN (núm. 126, febrero 2012), pp. 169 a 203.
HATHAWAY O. A., CROOTOF R., LEVITZ P., NIX H., NOWLAN A., PERDUE W., SPIEGEL J., “The law of cyber-attack”, Yale Faculty Scholarship Series (paper 3852, 2012), pp. 817 a 886.
HOLLIS, D. B., “Why States Need an International Law for Information Operations”, 11 LEWIS & CLARK L. REV (1023, 1093. 2007), pp. 1023 a 1061.
MINISTERIO DE DEFENSA, “Ciberseguridad. Retos y amenazas a la Seguridad Nacional en el Ciberespacio”, Cuadernos de Estrategia, núm. 149, Ministerio de Defensa, 2011.
MINISTERIO DE DEFENSA, “Necesidad de una conciencia nacional de ciberseguridad. La ciberdefensa: un reto prioritario”, Monografías, núm. 137, CESEDEN, 2013.
RABOIN, B. “Corresponding Evolution: International Law and the Emergence of Cyber Warfare”, Cleveland State Law Review, (núm. 31, 2013), pp. 603-668.
SCHMITT M.N., “Cyber operations and the jus ad bellum revisited”, Villanova Law Review (Vol. 56, diciembre 2011), pp. 569-606.
SCHMITT, M. y otros, Manual on the International Law Applicable to Cyber Warfare, Cambridge University Press 2013.
TIKK E. y otros, Cyber Attacks Against Georgia: Legal Lessons Identified, CCDCOE, 2008.
TIKK, E., International Cyberincidents. Legal considerations, CCDCOE, 2010.
ZIOLKOWSKI K., “Ius ad bellum in Cyberspace –Some Thoughts on the “Schmitt–Criteria” for Use of Force”, en CZOSSECK, C., 2012 4th International Conference on Cyber Conflict., NATO CCD COE Publications, Tallinn, 2012.
Downloads
Issue
Section
License
The authors of articles published in icade. Revista de la Facultad de Derecho retain the intellectual property rights over their works and grant the journal their distribution and public communication rights, consenting to their publication under aCreative Commons Attribution-NonCommercial-NoDerivates 4.0 Internacional. Authors are encouraged to publish their work on the Internet (for example, on institutional or personal pages, repositories, etc.) respecting the conditions of this license and quoting appropriately the original source.
