1st Cyber Attacks
1st Cyber Attacks
undoubtedly helps attackers and those who objectives through cyber actions to harm,
would use the Internet for malicious purposes. coerce, or intimidate a population or state.1
Growing demands for new rules and approaches Much like terrorist attacks, the perpetrators of
to cyberspace have been heard from several cybercrime are difficult to identify unless such
Member States. This shift led to several attacks are claimed by a specific organization.
resolutions over the past few years. But other Many attacks remain unclaimed, no matter
Member States worry that international action which victim is attacked. There have been
could be a veil for efforts to restrict their repeated identifications of the location of the
freedom of action, or advance the particular attackers, but the forensic process typically is
interests of specific countries. Where growing very slow. While an attack may happen in
demands for action will lead is hard to judge. minutes, identification of an attacker can take
months, under the best circumstance. Over time
In an ever-integrating global economy, the the occurrences of cyber-attacks have diversified
prospect of cyber threats looms over everyone. and intensified, with an increasing variety of
The U.N. remains the most prominent forum for more noticeable attacks being enacted all over
addressing global issues. Important steps have the globe.2
been taken to address these threats, including in
the General Assembly, Security Council, and
several UN technical organizations. These have
established important principles to guide
international action. But calls for more
aggressive action have gone unmet. If Member
States wish for a true universal approach to
solving the issues of cyberspace, more work
needs to be done.
1 2
Cyberterrorism Vienna: UN Office on Drugs and 'Significant Cyber Incidents Since 2006,
Crime, 2019, Washington, D.C.: Center for Strategic and
https://www.unodc.org/e4j/en/cybercrime/module- International Studies, September 2020, https://csis-
14/key-issues/cyberterrorism.html website-prod.s3.amazonaws.com/s3fs-
public/200901_Significant_Cyber_Events_List.pdf
2
Cyber Security:
Cyber Crime, Attacks and Terrorism
3
James Andrew Lewis, 'Dismissing Cyber https://www.unidir.org/files/publications/pdfs/the-
Catastrophe', Center for Strategic and International united-nations-cyberspace-and-international-peace-
Studies, 17 August 2020, and-security-en-691.pdf;
5
https://www.csis.org/analysis/dismissing-cyber- David E. Sanger, 'Obama Order Sped Up Wave of
catastrophe Cyberattacks Against Iran', New York Times, 1 June
4
Camino Kavanagh, The United Nations, Cyberspace 2012,
and International Peace and Security: Responding to https://www.nytimes.com/2012/06/01/world/middlee
Complexity in the 21st Century. Geneva: United ast/obama-ordered-wave-of-cyberattacks-against-
Nations Institute for Disarmament Research, 2017, iran.html?pagewanted=all
3
Cyber Security:
Cyber Crime, Attacks and Terrorism
6 8
Jonathan Masters, 'Russia, Trump, and the 2016 Laurens Cerulus, 'How Ukraine became a test bed
U.S. Election', Council on Foreign Relations, 26 for cyberweaponry', Politico, 14 February 2019,
February 2018, https://www.politico.eu/article/ukraine-cyber-war-
https://www.cfr.org/backgrounder/russia-trump-and- frontline-russia-malware-attacks/
9
2016-us-election Angus Watson and James Griffiths, ' Australia says
7
Sam Thielman, ' DNC email leak: Russian hackers it has been targeted by a 'sophisticated' state-based
Cozy Bear and Fancy Bear behind breach', Guardian, cyber attack', CNN Business, 18 June 2020,
26 July 2018, www.edition.cnn.com/2020/06/18/tech/australia-
https://www.theguardian.com/technology/2016/jul/26 cyber-attack-intl-hnk/index.html
/dnc-email-leak-russian-hack-guccifer-2
4
Cyber Security:
Cyber Crime, Attacks and Terrorism
10
General Assembly Resolutions. New York: United www.un.org/en/sections/documents/general-
Nations, 2020, assembly-resolutions/
5
Cyber Security:
Cyber Crime, Attacks and Terrorism
11 12
Group of Governmental Experts. New York: United Nations Launches Global Cybersecurity
United Nations Office for Disarmament Affairs, Index. Geneva: International Telecommunication
2019, www.un.org/disarmament/group-of- Union, n.d., https://www.itu.int/en/ITU-
governmental-experts/ D/Cybersecurity/Pages/United-Nations-Launches-
Global-Cybersecurity-Index.aspx
6
Cyber Security:
Cyber Crime, Attacks and Terrorism
13 15
The protection of critical infrastructure against Advancing responsible State behaviour in
terrorist attacks: Compendium of good practices. cyberspace in the context of international security,
Vienna: United Nations Counter-Terrorism Centre, resolution 74/28. New York: United Nations, 2019,
2018, https://www.un.org/sc/ctc/wp- https://undocs.org/en/A/RES/74/28
16
content/uploads/2018/06/Compendium-CIP-final- Advancing responsible State behaviour in
version- cyberspace in the context of international security,
120618_new_fonts_18_june_2018_optimized.pdf resolution 73/266. New York: United Nations, 2018,
14
Promoting technical assistance and capacity- https://undocs.org/en/A/RES/73/266
17
building to strengthen national measures and Countering the use of information and
international cooperation to combat cybercrime, communications technologies for criminal purposes,
including information-sharing, resolution 74/173. resolution 73/187. New York: United Nations, 2018,
New York: United Nations, 2019, https://undocs.org/en/A/RES/73/187
https://undocs.org/en/A/RES/74/173
7
Cyber Security:
Cyber Crime, Attacks and Terrorism
18 21
Hafizah Osman, ' Cyber security a top priority in www.csis-website-prod.s3.amazonaws.com/s3fs-
Australia: Deloitte', Tech Advisor, 1 November 2012 public/legacy_files/files/publication/151216_Cha_No
https://www.techadvisor.co.uk/feature/security/cyber- rthKoreasCyberOperations_Web.pdf
22
security-top-priority-in-australia-deloitte-3408391/ Andrea Peterson, 'The Sony Pictures hack,
19
Ashish Rajadhyaksha, In the Wake of Aadhaar: explained', Washington Post, 18 December 2014,
The Digital Ecosystem of Governance in India. https://www.washingtonpost.com/news/the-
Bangalore, 2013, switch/wp/2014/12/18/the-sony-pictures-hack-
https://egov.eletsonline.com/2012/11/government-to- explained/
23
invest-200-mn-in-4-yrs-on-cyber-security- Cybersecurity in Europe: stronger rules and better
infrastructure/; protection. Brussels: European Council and the
https://www.dnaindia.com/india/report-india-uk-to- Council of the EU, 31 July 2020,
conduct-talks-bi-annually-on-cyber-security-1762061 https://www.consilium.europa.eu/en/policies/cyberse
20
Lyu Jinghua, ' What Are China’s Cyber curity/
24
Capabilities and Intentions?' Carnegie Endowment The EU Cybersecurity Act. Brussels; European
for International Peace, 1 April Commission, 28 February 2020,
2019, https://ec.europa.eu/digital-single-market/en/eu-
https://carnegieendowment.org/2019/04/01/what-are- cybersecurity-act
china-s-cyber-capabilities-and-intentions-pub-78734
8
Cyber Security:
Cyber Crime, Attacks and Terrorism
to Internet security, and especially insistent that the threat that fast-changing information and
the privacy and rights of private users be technologies could be used for purposes that are
protected from spying by governments. contradictory with maintaining international law
and stability.28 Many in the NAM have proposed
Iran: Iran has been both a victim and originator that a legal framework be developed within the
of cyber conflict. In 2009 is was attacked by UN to combat these rising issues.
Israel and the US through their Olympic Games
(Stuxnet) campaign to temporarily disable part Russia: Although fiercely denied by its leaders
of its nuclear infrastructure. Iran also has been a and spokesmen, Russia is widely suspected or
willing participant in the development of cyber major internet and social media attacks on
capabilities to address cyber defense and against infrastructure (such as electricity
attacks.25 The Iranian history of significant generation), news media and electoral systems in
cyber-attacks is quite large, with a heavy countries like Ukraine, the UK and US.29 Yet,
reliance on attacking critical systems for Russia has also been an ardent supporter of UN
opposing states.26 Most recently following the actions to curtail cybercrime. A significant
American assassination of General Qassem resolution was passed through the General
Soleimani, the threat of Iranian cyberattacks Assembly, written by Russia.30 In this sense,
increased.27 In the UN, Iran favors a state- Russia has become increasingly skilled at
centered approach to cyber security issues like navigating the processes of the UN to further
cyber attack their approach to cyber governance which has
been criticized as “digital authoritarianism.”
Non-Aligned Movement: For the 120 Member They also helped create the OEWG, being the
States of UN's largest voting bloc, development main state to propose new rules and a more
aspects outrank other concerns. NAM Member universal recognition of cyber. Russia has
States may be willing to join resolutions to recently released a statement on the issue of
tighten international standards or support action cyber security in lieu of the Covid-19 pandemic.
against specific countries, even fellow NAM
members like DPR Korea or Iran. In exchange The United States: American cyber security
they will insist on generous development policy focuses on combatting cyber-attacks by
assistant, such as financial support for their securing America's domestic networks and
national broadband networks and cyber law critical infrastructures, along with expanding
enforcement capabilities. The NAM focuses on American influence and norms internationally.31
25
James Andrew Lewis, 'Iran and Cyber Power', UN General Assembly, 24 October 2016,
Center for Strategic and International Studies, 25 www.un.org/press/en/2016/gadis3560.doc.htm
June 2019, https://www.csis.org/analysis/iran-and- 29
Tim Maurer and Garrett Hinck, 'Russia’s Cyber
cyber-power Strategy', Milan: Italian Institute for International
26
Significant Cyber Incidents, op.cit., Political Studies, 21 December 2018,
https://www.csis.org/programs/technology-policy- www.ispionline.it/en/pubblicazione/russias-cyber-
program/significant-cyber-incidents strategy-21835;
27
National Terrorism Advisory System Bulletin, www.russiaun.ru/en/news/arria_220520
30
Washington, D.C.: U.S. Department of Homeland
Security, 4 January 2020, https://www.washingtonpost.com/politics/2019/12/04
https://www.dhs.gov/ntas/advisory/national- /un-passed-russia-backed-cybercrime-resolution-
terrorism-advisory-system-bulletin-january-4-2020 thats-not-good-news-internet-freedom/
28 31
'Calling for Norms to Stymie Cyberattacks, First President Donald J. Trump, National Cyber
Committee Speakers Say States Must Work Together Strategy of the United States of America September
in Preventing Information Arms Race.', New York: 2018. Washington, D.C.: The White House, 2018,
www.whitehouse.gov/wp-
9
Cyber Security:
Cyber Crime, Attacks and Terrorism
The US believes that international cyber stability States were personal freedom and
and conflict prevention are best advanced by privacy are more important.
current international law. Recently, the U.S has
been increasingly aggressive towards cyber • Establish an independent UN agency
threats, increasingly striking suspected threats to monitor Internet activity and
preemptively. Part of this includes being more report to Member States on Internet
open in declaring the suspected culprits of use and attacks by their citizens or
cyberattacks. Cyber has become a massive part foreign sources. This also could be
of American defense and foreign policy, with especially popular in Member States
proposals in 2019 made by the Cyberspace that already restrict private Internet
Solarium Commission to work more closely activity. It will be opposed by Member
with the private sector in sharing information States were personal freedom and
with agencies like the NSA and Cybersecurity privacy are more important. Financing
and Infrastructure Security Agency (CISA). and staffing for the new agencies would
have to be established.
Proposals for Action
• Propose a global definition of cyber
The UN response to cyberspace is still in its terrorism, cyber-attacks, cyber
infancy, thus the only precedence lies in similar security as part of an effort to establish
issues which could be capable in informing or a foundation for new international laws,
framing resolutions. The pre-existing resolutions rules, and norms.
offer a framework to proceed in addressing
issues related to cyber security, but be aware of • Provide technical assistance to states
what kind of action the U.N has undertaken, to increase their security capabilities
whether it be setting up the Group of against potential cyber- attacks.
Governmental Experts to make reports on the Financing and paying for technical
use of cyberspace, or sub-organizations like assistance could be a problem, but
UNODC, UNOCT, and the ITU. These all focus countries interested in expanding their
on improving knowledge and security of global influence might be willing to
Member States and businesses against cyber subsidize such a resolution, if it favors
terrorism and crime. Some potential proposals to their firms.
consider include:
• Sponsor the development of a U.N.
• Require Internet service providers—
framework organization to coordinate
the companies that make the internet
all cyber security responses and
work—to monitor and enforce
considerations.
restrictions on use of the Internet to
harm the infrastructure or interests of
UN Member States. This could be • Encourage Member States to prepare
especially popular in Member States their own defenses. Such a limited
that already restrict private Internet proposal might be most popular with
activity. It will be opposed by Member Member States determined to protect
content/uploads/2018/09/National-Cyber- www.economist.com/united-
Strategy.pdf; 'Cyber-defence ; and, 'America rethinks states/2020/05/28/america-rethinks-its-strategy-in-
its strategy in the Wild West of cyberspace', The the-wild-west-of-cyberspace
Economist, 28 May 2020,
10
Cyber Security:
Cyber Crime, Attacks and Terrorism
Bibliography
Center for Strategic and International Studies. Significant Cyber Incidents Since 2006, Washington, D.C.: Center for
Strategic and International Studies, September 2020, https://csis-website-prod.s3.amazonaws.com/s3fs-
public/200901_Significant_Cyber_Events_List.pdf
Cerulus, Laurens. 'How Ukraine became a test bed for cyberweaponry', Politico, 14 February 2019,
https://www.politico.eu/article/ukraine-cyber-war-frontline-russia-malware-attacks/
Economist. 'America rethinks its strategy in the Wild West of cyberspace', The Economist, 28 May 2020,
www.economist.com/united-states/2020/05/28/america-rethinks-its-strategy-in-the-wild-west-of-cyberspace
European Commission. The EU Cybersecurity Act. Brussels; European Commission, 28 February 2020,
https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-act
European Council. Cybersecurity in Europe: stronger rules and better protection. Brussels: European Council and
the Council of the EU, 31 July 2020, https://www.consilium.europa.eu/en/policies/cybersecurity/
International Telecommunication Union. United Nations Launches Global Cybersecurity Index. Geneva:
International Telecommunication Union, n.d., https://www.itu.int/en/ITU-D/Cybersecurity/Pages/United-Nations-
Launches-Global-Cybersecurity-Index.aspx
Kavanagh, Camino. The United Nations, Cyberspace and International Peace and Security: Responding to
Complexity in the 21st Century. Geneva: United Nations Institute for Disarmament Research, 2017,
https://www.unidir.org/files/publications/pdfs/the-united-nations-cyberspace-and-international-peace-and-security-
en-691.pdf;
Lewis, James Andrew. 'Dismissing Cyber Catastrophe', Center for Strategic and International Studies, 17 August
2020, https://www.csis.org/analysis/dismissing-cyber-catastrophe
Lewis, James Andrew, 'Iran and Cyber Power', Center for Strategic and International Studies, 25 June 2019,
https://www.csis.org/analysis/iran-and-cyber-power
11
Cyber Security:
Cyber Crime, Attacks and Terrorism
Lyu Jinghua, ' What Are China’s Cyber Capabilities and Intentions?' Carnegie Endowment for International Peace,
1 April 2019, https://carnegieendowment.org/2019/04/01/what-are-china-s-cyber-capabilities-and-intentions-pub-
78734
Masters, Jonathan. 'Russia, Trump, and the 2016 U.S. Election', Council on Foreign Relations, 26 February 2018,
https://www.cfr.org/backgrounder/russia-trump-and-2016-us-election
Maurer, Tim, and Garrett Hinck, 'Russia’s Cyber Strategy', Milan: Italian Institute for International Political Studies,
21 December 2018,
www.ispionline.it/en/pubblicazione/russias-cyber-strategy-21835; www.russiaun.ru/en/news/arria_220520
Osman, Hafizah.' Cyber security a top priority in Australia: Deloitte', Tech Advisor, 1 November 2012
https://www.techadvisor.co.uk/feature/security/cyber-security-top-priority-in-australia-deloitte-3408391/
Peterson, Andrea. 'The Sony Pictures hack, explained', Washington Post, 18 December 2014,
https://www.washingtonpost.com/news/the-switch/wp/2014/12/18/the-sony-pictures-hack-explained/
Rajadhyaksha, Ashish. In the Wake of Aadhaar: The Digital Ecosystem of Governance in India. Bangalore, 2013,
https://egov.eletsonline.com/2012/11/government-to-invest-200-mn-in-4-yrs-on-cyber-security-infrastructure/;
https://www.dnaindia.com/india/report-india-uk-to-conduct-talks-bi-annually-on-cyber-security-1762061
Sanger, David E. 'Obama Order Sped Up Wave of Cyberattacks Against Iran', New York Times, 1 June 2012,
https://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-of-cyberattacks-against-
iran.html?pagewanted=all
Thielman, Sam. ' DNC email leak: Russian hackers Cozy Bear and Fancy Bear behind breach', Guardian, 26 July
2018, https://www.theguardian.com/technology/2016/jul/26/dnc-email-leak-russian-hack-guccifer-2
Trump, President Donald J. National Cyber Strategy of the United States of America September 2018. Washington,
D.C.: The White House, 2018, www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf;
'Cyber-defence
UN Counter-Terrorism Centre . The protection of critical infrastructure against terrorist attacks: Compendium of
good practices. Vienna: United Nations Counter-Terrorism Centre, 2018, https://www.un.org/sc/ctc/wp-
content/uploads/2018/06/Compendium-CIP-final-version-120618_new_fonts_18_june_2018_optimized.pdf
UN General Assembly. Advancing responsible State behaviour in cyberspace in the context of international
security, resolution 73/266. New York: United Nations, 2018, https://undocs.org/en/A/RES/73/266
UN General Assembly. Advancing responsible State behaviour in cyberspace in the context of international
security, resolution 74/28. New York: United Nations, 2019, https://undocs.org/en/A/RES/74/28
UN General Assembly. 'Calling for Norms to Stymie Cyberattacks, First Committee Speakers Say States Must
Work Together in Preventing Information Arms Race.', New York: UN General Assembly, 24 October 2016,
www.un.org/press/en/2016/gadis3560.doc.htm
UN General Assembly. Countering the use of information and communications technologies for criminal purposes,
resolution 73/187. New York: United Nations, 2018, https://undocs.org/en/A/RES/73/187
12
Cyber Security:
Cyber Crime, Attacks and Terrorism
UN General Assembly. Promoting technical assistance and capacity-building to strengthen national measures and
international cooperation to combat cybercrime, including information-sharing, resolution 74/173. New York:
United Nations, 2019, https://undocs.org/en/A/RES/74/173
UN General Assembly. General Assembly Resolutions. New York: United Nations, 2020,
www.un.org/en/sections/documents/general-assembly-resolutions/
UN Office for Disarmament Affairs. Group of Governmental Experts. New York: United Nations Office for
Disarmament Affairs, 2019, www.un.org/disarmament/group-of-governmental-experts/
UN Office on Drugs and Crime. Cyberterrorism Vienna: UN Office on Drugs and Crime, 2019,
https://www.unodc.org/e4j/en/cybercrime/module-14/key-issues/cyberterrorism.html
U.S. Department of Homeland Security. National Terrorism Advisory System Bulletin, Washington, D.C.: U.S.
Department of Homeland Security, 4 January 2020, https://www.dhs.gov/ntas/advisory/national-terrorism-advisory-
system-bulletin-january-4-2020
Watson, Angus, and James Griffiths, ' Australia says it has been targeted by a 'sophisticated' state-based cyber
attack', CNN Business, 18 June 2020, www.edition.cnn.com/2020/06/18/tech/australia-cyber-attack-intl-
hnk/index.html
13