The Limitation of United States Deterrence Strategy Towards North Korean Cyber Attacks
Downloads
This paper tries to discuss the development of cyberwar that threatens many countries by referring to the example of the North Korean cyberattack against the United States (US). Cyberattack is a relatively new phenomenon that many countries have not been able to anticipate adequately because it is difficult to track it down and also find the actors behind it. So far, countries have frequently accused each other of these attacks, but it is difficult to retaliate or anticipate due to unclear evidence. Unlike conventional warfare, no cyberattack warfare norms have been developed nor have there been any attempts in that direction. One thing that can be done in such a condition is the development of technology that is not only able to ward off the attack but, as stated in the theory of deterrence, can also provide a deterrent effect on the attacking country. By referring to the case of North Korea's attack on the US, we see that even a country as great as the US has not been able to develop a successful deterrence.
Keywords: deterrence, cyberspace, cybersecurity, United States, North Korea
Tulisan ini membahas mengenai perkembangan perang siber yang menjadi ancaman utama bagi banyak negara hari ini, dengan focus pada serangan siber Korea Utara kepada Amerika Serikat(AS). Serangan siber merupakan fenomena yang relative baru, sehingga banyak negara belum mampu untuk mengantisipasi hal tersebut karena sifatnya yang susah untuk dilacak dan susah untuk mengetahui actor dibalik serangan tersebut. Sejauh ini negara tertentu seringkali dituduh menjadi dalang serangan siber, namun bukti yang seringkali tidak jelas membuat langkah antisipasi atau retaliasi menjadi sulit. Berbeda dengan perang konvensional, hingga saat ini belum ada norma serangan siber yang terbangun, bahkan pembicaraan mengenai hal tersebut cenderung minim. Sejalan dengan hal itu maka dalam perang siber dibutuhkan pengembangan tekonologi yang tidak hanya mampu untuk menangkal serangan tapi juga memberikan efek deterrence bagi negara penyerang. Dengan merujuk pada kasus serangan siber Korea Utara kepada Amerika Serikat, kita dapat melihat bahwa negara sekuat Amerika sekalipun ternyata belum mampu membuat mekanisme deterrence dalam serangan siber.
Kata-kata kunci: Deterrence, Ruang Siber, Keamanan Siber, Amerika Serikat, Korea Utara.
Book and Book Chapter
Blank, Stephen, 2001. "Can Information Warfare be Deterred?" in Alber, D. S., & Papp, D. D. (ed.), Information Age Anthology, Volume III: The Information Age Military. Washington, DC: Command and Control Research Program.
Cavelty, Dunn M., 2012. "Cyber Security". In Collins (ed.), Contemporary Security Studies. New York: Oxford University Press.
Geers, K., 2011. Sun Tzu and Cyberwar. Cooperative Cyber Defence Centre of Excellence.
Hathaway, M. E., & Klimburg, A., 2012. "Cyber Terms and Definition" in Klimburg, A. (ed.), National Cyber Security Manual. Tallinn: NATO CCD COE Publications.
Kshetri, N, 2014. The Quest to Cyber Superiority. Springer.
Kuehl, Daniel T. 2009. "Chapter 2: From Cyberspace to Cyberpower: Defining the Problem". In Kramer, F. D. et.al. (ed.), Cyberpower and National Security. Washington, DC: National Defense University.
Kugler, R. L., 2012. "Deterrence of Cyber Attacks" in Kramer, F.D., et.al (ed.), Cyber Power and National. Lincoln: University of Nebraska Press.
Libicki, M. C., 2009. Cyber Deterrence and Cyberwar. Santa Monica: RAND Corporation.
Morgan, P. M., 1977. Deterrence : A conceptual analysis. Beverly Hills, CA: SAGE Publications.
Morgan, P. M. 2010. "Applicability of traditional deterrence concepts and theory to the cyber realm" in Proceedings of a workshop on deterring cyberattacks: Informing strategies and developing options for U.S. policy.
Ohmae, Kenichi, 1995. The End of the Nation State: The Rise of Regional Economies. New York: The Free Press.
Taipale, K., 2010. "Cyber-deterrence" in Reich, P. C., & Gelbstein, E. (ed.), Law, Policy, and Technology: Cyberterrorism, Information Warfare, and Internet Immobilization. Hershey: IGI Global.
Torr, James D., 2003. The Information Age. Michigan: Greenhaven Press.
Journals
Adams, James, 2001. "Virtual Defense", Foreign Affairs, 80(3): 98-112. DOI: 10.2307/20050154
Barnett, Roger W, 1998. "Information Operations, Deterrence, and the Use of Force", Naval War College Review, 51(2).
Gartzke, E., & Lindsay, J. R., 2015. "Weaving tangled webs: Offense, defense, and deception in cyberspace", Security Studies, 24(2) 316–348 https://doi.org/10.1080/09636412.2015.1038188
Geers, K., 2010. "The challenge of cyber attack deterrence", Computer Law & Security Review, 26(3): 298–303 https://doi.org/10.1016/j.clsr.2010.03.003
Goodman, W. 2010. "Cyber deterrence: Tougher in theory than in practice?” Strategic Studies Quarterly, 4(3): 102–135.
Jasper, S., 2015. "Deterring malicious behavior in cyberspace", Strategic Studies Quarterly 2, 9(1): 60–85.
Kaiser, R., 2015. "The Birth of Cyberwar", Political Geography, 46(1): 11–20 https://doi.org/https://doi.org/10.1016/j.polgeo.2014.10.001
Kello, L., 2013. "The meaning of the cyber revolution: Perils to theory and statecraft" International Security, 38(2): 7–40 https://doi.org/10.1162/ISEC_a_00138
Lebow, R. N., 2007. "Thucydides and Deterrence", Security Studies 16(2): 163-188. http://dx.doi.org/10.1080/09636410701399440
Lupovici, A., 2011. "Cyberwarfare and deterrence: Trends and challenges in research", Military and Strategic Affairs, 3(3).
Rice, M., et.al., 2011. "A signaling framework to deter aggression in cyberspace" International Journal of Critical Infrastructure Protection, 4(2): 57–65. https://doi.org/10.1016/j.ijcip.2011.03.003
Reports
Coats, D., 2018. Statement for the Record: Worldwide Threat Assessment of the U.S. Intelligence Community.
Siboni, G., & Siman-Tov, D., 2014. Cyberspace Extortion: North Korea Versus the United States.
U.S. Energy Information Administration, 2010. "Country Analysis Brief-India" [online]. in http://www.eia.doe.gov/cabs/India/Full.html [accessed at 22 October 2010].
Liaropoulos, A., 2011. "Cyber-Security and the Law of War: The Legal and Ethical Aspects of Cyber-Conflict". GPSC working paper.
Internet Articles
Bing, C., & Lynch, S., 2018. "U.S. charges North Korean hacker in Sony, WannaCry cyberattacks" [online]. in https://www.reuters.com/article/us-cyber-northkorea-sony/u-s-charges-north-korean-hacker-in-sony-wannacry-cyberattacks-idUSKCN1LM20W . [Accesed at 28 October 2020]
Busby, M., 2018. "North Korean' hacker'charged over cyber attacks against NHS" [online]. In https://www.theguardian.com/world/2018/sep/06/us-doj-north-korea-sony-hackers-chares [Accesed in 2 October 2020]
Castro, D., 2009. "Thoughts on 4th of July Cyber Attacks" [online]. In https://www.innovationfiles.org/thoughts-on-4th-of-july-cyber-attacks/ [Accesed at 8 October 2020]
Hern, A., 2018. "North Korea is a bigger cyber-attack threat than Russia, says expert" [online]. In https://www.theguardian.com/technology/2018/feb/26/north-korea-cyber-attack-threat-russia [Accessed at 21 October 2020]
Murphy, M. 2010. "War in the Fifth Domain" [online]. In https://www.economist.com/briefing/2010/07/01/war-in-the-fifth-domain [Accessed at 28 October 2020]
Philbin, M. J., 2013. "Cyber deterrence: An old concept in a new domain" [online]. In http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA589940 [Accesed at 28 October 2020]
Shaer, M., 2009. "North Korean hackers blamed for sweeping cyber attack on U.S. networks" [online]. In https://www.csmonitor.com/Technology/Horizons/2009/0708/north-korean-hackers-blamed-for-sweeping-cyber-attack-on-us-networks . [Accesed at 26 October 2020]
Thesis
Beeker, Kevin R., 2009. Strategic Deterrence in Cyberspace. Thesis. Ohio: Air Force Institute of Technology.
Tirrel, W., 2012. United States Cybersecurity Strategy, Policy, and Organization: Poorly Postured to Cope with a Post-9/11 Security Environment?. Tesis. Kansas: The George Washington University.
Authors who publish in this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal
- Authors are unable to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work
- Authors are not permitted to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
- The Copyright Holder of the articles is Global Strategis