Incidencia de las agresiones a la seguridad cibernética en el desarrollo informático de las Fuerzas Armadas de Estados Unidos (2003-2013)


Autoria(s): Torres Vargas, Nicole Vanessa
Contribuinte(s)

Garzón Acosta, Juan Nicolás

Data(s)

24/03/2015

Resumo

La presente investigación tiene como objetivo analizar la incidencia de las agresiones cibernéticas en el desarrollo informático de las Fuerzas Armadas de Estados Unidos. Los diferentes estudios que se han realizado sobre el ciberespacio se han enfocado en el papel del individuo como actor principal y se ha dejado de lado las repercusiones que éste ha tenido para el Estado, como un nuevo eje de amenazas. Teniendo en cuenta lo anterior, esta investigación demostrará a partir del concepto de securitización, que se busca priorizar la “ciberseguridad” dentro de la agenda del gobierno estadounidense. Al ser este un estudio que aborda experiencias concretas durante un periodo de tiempo de más de 10 años, el diseño metodológico de la investigación será longitudinal, ya que abarcará estudios, artículos, textos y resoluciones que se han realizado desde 2003 hasta la actualidad.

This research aims to analyze the impact of cyber-attacks in the computer development of the Armed Forces of the United States. The various studies that have been developed on cyberspace have focused primarily on the individual's role as a major player and have largely ignored the impact that this has had on the State, as a new axis of threats. Given the above, this research based on the concept of securitization, will show that since 2003, U.S. governments have prioritized "cyber security" within their political agenda. Since this is a study that addresses specific experiences over a period of more than 10 years, the methodological design of the research is longitudinal, and will cover studies, articles, texts and resolutions that have been made since 2003 to the present.

Formato

application/pdf

Identificador

http://repository.urosario.edu.co/handle/10336/10551

Idioma(s)

spa

Publicador

Facultad de Relaciones Internacionales

Direitos

info:eu-repo/semantics/openAccess

Fonte

instname:Universidad del Rosario

reponame:Repositorio Institucional EdocUR

Buzan, B. (2008). La gente, los Estados, y el miedo. Colorado: Lynne Rienner Publishers

Buzan, B, Waever, O, Wilde, J. (1998).Security: A New Framework for Analysis. Colorado: Lynne Rienner Publishers.

Clarke, R, Knake, R. (2009). Cyberwar: The next threat to national security and what to do about it. New York: Harper Collins

Denning, D. (1998). Information Warfare and Security. Boston, MA: Addison Wesley

Dunn, C. (2008). Cyber-Security and Threat Politics: US Efforts to Secure the Information Age. London: Routledge

Libicki, M. (1997).Defending Cyberspace. Washington D.C: National Defense University

MIT. (1998). Democracy and Cyberspace: First Principles. Massachusetts: MIT’s conference on Democracy and Digital Media

National Research Council. (2010). Letter Report from the Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy. Washington D.C: National Academies Press

Nye, J. (2004). Power in the Global Information Age: From Realism to Globalization. London: Routledge

Waever, O. (1998). Securitization and Desecuritization. New York, Columbia University Press

Hobbes, T. (1985). Of the first and second natural laws, and of contracts. En: Leviathan. (59-65). Oregon: Penguin Book

Hobbes, T. (1985).Of the natural condition of Mankind, as concerning their felicity, and misery.En: Leviathan. (56-59)Oregon: PenguinBook

Balzacq, T. (2005). The Three Faces of Securitization: Political Agency, Audience and Context. European Journal of International Relations. 11 (2), 171-201. Disponible en: http://ejt.sagepub.com/content/11/2/171.short?rss=1&ssource=mfc

Buzan, B. (1991). New Patterns of Global Security in the Twenty-First Century.International Affairs. 67 (3), 431- 451. Disponible en: http://www.jstor.org/discover/10.2307/2621945?sid=21105894502313&uid=4&uid=2

Buzan, B. (2006). Will the ‘global war on terrorism’ be the new Cold War? International Affairs.82 (6), 1101- 1118.

Buzan, B, Waever, O. (2009). Macrosecuritisation and securityconstellations: reconsidering scale insecuritisation theory.International Studies. 35, 253–276

McDonald, M. (2008).Securitization and the Construction of Security.European Journal of International Relations. 14 (4), 563–587. Disponible en: http://ejt.sagepub.com/content/14/4/563.short

Metzl, J. (2001). Network diplomacy.Georgetown Journal of International Affairs.77 (2). Disponible en: http://carnegieendowment.org/2001/04/01/network-diplomacy/

Miranda, C. (1986). Realismo e idealismo en el estudio de las relaciones internacionales: la influencia de Hobbes y de Kant. Revista Ciencia Política. 8 (1), 88-100. Disponible en: www7.uc.cl/icp/revista/pdf/rev812/ar3.pdf

Orozco, G. (2006). El aporte de la Escuela de Copenhague a los estudios de seguridad. Fuerzas Armadas y Sociedad. 20 (1). 141-162

Chinese hackers promptNavycollegesiteclosure. (2005). Washington Times.Disponible en: http://www.washingtontimes.com/news/2006/nov/30/20061130-103049-5042r/?page=all

Graham, B. (2005).Hackers attack via chinese web sites. Washington Post. Disponible en: http://www.washingtonpost.com/wpdyn/content/article/2005/08/24/AR2005082402318_2.html

Thornburgh, N. (2005). The invasion of the Chinese cyberspies.Time Magazine Disponible en: http://courses.cs.washington.edu/courses/csep590/05au/readings/titan.rain.htm

Wo Lap Lam, W. (2003). China army looks to technology. CNN International. Disponible en: http://edition.cnn.com/2003/WORLD/asiapcf/east/03/09/china.generals/index.html

Billo, C, Chang, W. (2004). Cyber Warfare. Institute for Security Technology Studies At Dartmouth College. Disponible en: www.ists.dartmouth.edu/docs/execsum.pdf

Ciclo de vida de un virus. (2013). Universidad Autónoma de Yucatán.Disponible en: http://www.uady.mx/~teleinfo/virus/ciclo.php

Computer Histoy Museum.(2012). Information Age.Computer History Museum.Disponible en: http://www.computerhistory.org/

Computer term definitions. (2013). Pop up definition. Webopedia. Disponible en: http://www.webopedia.com/TERM/P/popup_ad.html

Definitions: Security. (2014). Disponible en: http://www.merriam-webster.com/dictionary/ Webster’s Dictionary security

Department of Defense (2010).U.S. Cyber Command Fact Sheet.Disponible en: http://www.defense.gov/home/features/2010/0410_cybersec/docs/CYberFactSheet%20UPDATED%20replaces%20May%2021%20Fact%20Sheet.pdf

Department of Defense.(2011). Department of defense strategy for operating in cyberspace.Disponible en: http://www.defense.gov/news/d20110714cyber.pdf

Department of Defense.(2003). the national strategy to secure cyberspace.Disponible en: https://www.uscert.gov/sites/default/files/publications/cyberspace_strategy.pdf

Department of Homeland Security (2013). What is critical infrastructure?.Disponible en: http://www.dhs.gov/what-critical-infrastructure

Department of Homeland Security.(2001). Executive Order 13231, 2001.Disponible en: https://www.dhs.gov/.../executive-order-13231-dated-2001-10-16-initial

Department of Transportation.(2013) Federal alert system.Disponible en: http://www.ops.fhwa.dot.gov/publications/fhwahop05029/chapter_1.htm

Department of Homeland Security.(2014). National Critical Infraestructure.Disponible en: http://www.dhs.gov/critical-infrastructure-sectors

Establishment of U.S. Army Cyber Command.(2013). Army Cyber Command Homepage. Disponible en: http://www.arcyber.army.mil/history.html

Ellis, J, Fisher, D, Longstaff, T, Pesante, L, Pethia, R. (1997). Infrastructure protection. Carnegie Mellon University. Disponible en: resources.sei.cmu.edu/library/asset-view.cfm?assetid=12731

Federation of American Scientists.(2014). Information Warfare.Federation of American Scientists.Disponible en: http://www.fas.org/irp/world/china/docs/iw_wang.htm

GovTrack. (2011). S. 3414 (112th): CSA. Disponible en: https://www.govtrack.us/congress/bills/112/s3414

GovTrack. (2012).H.R. 3523 (112th): Cyber Intelligence Sharing and Protection Act. Disponible en:https://www.govtrack.us/congress/bills/112/hr3523

GovTrack. (2013). H.R. 624: Cyber Intelligence Sharing and Protection Act. Disponible en: https://www.govtrack.us/congress/bills/113/hr624

International crime complaint center. (2014). IC3 Annual Crime Report. Disponible en: http://www.ic3.gov/media/annualreports.aspx

Internet Society. (2014). Whatis Internet?.Internet History. Disponible en: http://www.internetsociety.org/internet/what-internet

IP Commission. (2013). IP Commission Report. Disponible en: http://www.ipcommission.org/report/IP_Commission_Report_052213.pdf

Library of Congress.Congressional Research Service Report for Congress. 2007. Disponibleen:http://fpc.state.gov/c18185.htm

Mandiant.(2013). Mandiant Report APT1.MandiantCybersecurity Firm.Disponible en: intelreport.mandiant.com

Navy Force (2013).About the Navy Cyber Forces. United States Navy Homepage Disponible en: http://www.cyberfor.navy.mil/

Norton Advisor.(2014). Computer Virus History.Norton AdvisorCompany. Disponible en: http://www.nortonadvisor.com/knowledge-center/computer-virus-history.html

Organización de los Estados Americanos. (2012). Declaration strengthening cyber-security in the americas. Disponible en: http://www.oas.org/cyber/documents/Declaration.pdf

Organización de los Estados Americanos. (2013). Cyber Security Program. Disponible en: http://www.oas.org/cyber/documents_en.asp

President’s Commission on critical Infraestructure. (2012). Factsheet.24th Air Force Home page.Disponible en: http://www.24af.af.mil/library/factsheets/factsheet.asp?id=15663

Morris, R. (2012). Universidad Politécnica de Madrid.Disponible en: http://www.eui.upm.es/museo_virtual/4g/rtmorris

Senate Committee On Armed Services. (2014). AdmiralHaneyTestimony. Disponible en: https://archive.org/details/pdfy-oJoEPt1k8ej1oLCT

Stewart, W. (2014).Boot and program, viruses.Disponible en: http://www.livinginternet.com/i/is_vir_prog.htm

The Whitehouse.(1998). Presidential Decision Directive/nsc-63, 1998.Disponible en: www.whitehouse.gov/sites/default/files/omb/memoranda/.../m-04-15.pdf

The Whitehouse.(2011). State of the Union Speech 2011.Disponible en: http://www.whitehouse.gov/the-press-office/2011/01/25/remarks-president-state-union-address

The Whitehouse.(2012). State of the Union Speech 2012.Disponible en: http://www.whitehouse.gov/the-press-office/2012/01/24/remarks-president-state-union-address

The Whitehouse.(2013). State of the Union Speech 2013.Disponible en: http://www.whitehouse.gov/the-press-office/2013/02/12/president-barack-obamas-state-union-address

United States Senate. (2002). Testimony: Alan Paller. Disponible en: www.sans.org/press/

Van Munster.(2014). Securitization. Oxford Bibliographies. Disponible en: http://www.oxfordbibliographies.com/view/document/obo-9780199743292/obo-9780199743292-0091.xml

TRI

Palavras-Chave #Relaciones internacionales #Seguridad nacional - Estados Unidos #Fuerzas militares - Estados Unidos #327.73 #cyber security, securitization, information technology, U.S CYBERCOM
Tipo

info:eu-repo/semantics/bachelorThesis

info:eu-repo/semantics/acceptedVersion