Name: | Description: | Size: | Format: | |
---|---|---|---|---|
792.38 KB | Adobe PDF |
Authors
Advisor(s)
Abstract(s)
Este trabalho investiga a temática da imputação de ataques ciber aos Estados. Neste caso analisou-se especificamente o caso do IT ARMY e de que forma será possível imputar os seus ciberataques ao Estado da Ucrânia. A imputação e a clarificação dos limites da imputação funcional são parâmetros muito importantes nas relações entre Estados. E existem atividades que até recentemente eram executadas somente pelo próprio Estado que hoje são executadas por agentes privados. Pensa-se que o IT ARMY é uma organização composta por indivíduos de todo o mundo ligados em rede através do Telegram, e pensa-se que essa rede é controlada pelo Ministério da Defesa Ucrâniano, que dispõe os alvos e as ações a serem executadas pelos vários membros deste grupo. O IT Army é estudado para identificar o que é esta organização, quem faz parte, e de que maneira atuam. De seguida, fez-se um enquadramento da dimensão ciber dos conflitos. Para focar depois na imputação dos ataques. É então que este trabalho desenvolve o processo de imputação funcional bem como os comportamentos de direção e controlo, tão importantes na imputação funcional. Por fim, foram apresentadas perspetivas futuras para uma evolução no processo de imputação funcional no universo ciber.
This work investigates the theme of attributing cyber attacks to States. In this case, the specific analysis was conducted on the IT Army and how it is possible to attribute cyber attacks to the State of Ukraine. Attribution and clarification of the boundaries of functional attribution are very important parameters in State relations. There are activities that were, until recently, solely performed by the State but are now carried out by private agents. It is believed that the IT Army is an organization composed of individuals from around the world connected through the Telegram network, and it is thought that this network is controlled by the Ukranian Ministry of Defense, which assigns targets and actions to be carried out by various members of this group. The IT Army is studied to identify what this organization is, who is involved, and how they operate. Next, the cyber dimension of conflicts is framed, with a focus on attributing cyberattacks. It is at this point that this work develops the process of functional attribution, as well as the behaviors of direction and control, which are crucial in functional attribution. Finally, future perspectives for an evolution in the process of functional attribution in cyber universe were presented.
This work investigates the theme of attributing cyber attacks to States. In this case, the specific analysis was conducted on the IT Army and how it is possible to attribute cyber attacks to the State of Ukraine. Attribution and clarification of the boundaries of functional attribution are very important parameters in State relations. There are activities that were, until recently, solely performed by the State but are now carried out by private agents. It is believed that the IT Army is an organization composed of individuals from around the world connected through the Telegram network, and it is thought that this network is controlled by the Ukranian Ministry of Defense, which assigns targets and actions to be carried out by various members of this group. The IT Army is studied to identify what this organization is, who is involved, and how they operate. Next, the cyber dimension of conflicts is framed, with a focus on attributing cyberattacks. It is at this point that this work develops the process of functional attribution, as well as the behaviors of direction and control, which are crucial in functional attribution. Finally, future perspectives for an evolution in the process of functional attribution in cyber universe were presented.
Description
Keywords
IT ARMY Imputação Direito internacional humanitário PARI Manual de Tallin Controlo global Controlo efetivo Attribution International humanitarian law Tallin manual Global control Effective control