Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
Russia’s 2022 invasion of Ukraine has dramatically altered global politics, not least that several so-called pariah states appear to be cooperating at a deeper level than at any time since the end of the Cold War. Occupying a critical position between the pariahs and the rest of the community of nations is China, an adversary to the United States, but not a pariah to the degree of Russia or its allies North Korea and Iran. Each of these countries has advanced both cyber and information operations. Considered here is a framework for understanding linkages between China and the pariahs; a chronicle of cyberattacks by each of the countries mentioned as well as consideration of possible collaboration; and observations on their propagandistic information operations since the beginning of the Russo-Ukraine War.
Słowa kluczowe
Czasopismo
Rocznik
Tom
Strony
58--77
Opis fizyczny
Bibliogr. 74 poz., tab.
Twórcy
autor
- Hobby School of Public Affairs, University of Houston
Bibliografia
- [1] M. Kaczmarski, “The Sino-Russian relationship and the West,” Survival, vol. 62, no. 6, pp. 199–212, Dec. 2020, doi: 10.1080/00396338.2020.1851101.
- [2] T. Lattmann, “From partner to pariah: The changing position of Russia in terms of international law,” in Russia’s Imperial Endeavor and Its Geopolitical Consequences: The Russia-Ukraine War, Volume Two, B. Madlovics, B. Magyar, Eds., New York, NY: Central European University Press, 2023, pp. 183–198.
- [3] L. Yu, S. Sui, “China-Russia military cooperation in the context of Sino-Russian strategic partnership,” Asia Europe Journal, vol. 18, pp. 325–345, 2020, doi: 10.1007/s10308-019-00559-x.
- [4] J. Lewis. (Aug. 11, 2023). Cyberattack on civilian critical infrastructures in a Taiwan scenario, Center for Strategic and International Studies. [Online]. Available: https://www.csis.org/analysis/cyberattack-civilian-critical-infrastructurestaiwan-scenario. [Accessed: Dec. 7, 2023].
- [5] S. Ragan. (Sep. 4, 2012). Iran and North Korea Join Forces on Science and Technology, SecurityWeek. [Online]. Available: https://www.securityweek.com/iran-and-northkorea-join-forces-science-and-technology. [Accessed: Nov. 03, 2023].
- [6] A. Malici, S.G. Walker, Role Theory and Role Conflict in US-Iran Relations: Enemies of Our Own Making. Abingdon, Oxfordshire: Routledge, 2016.
- [7] B. J. Kinne, “Defense cooperation agreements and the emergence of a global security network,” International Organization, vol. 72, no. 4, pp. 799–837, 2018, doi: 10.1177/0022002719857796.
- [8] K. Stoner, “The war in Ukraine: How Putin’s war in Ukraine has ruined Russia,” Journal of Democracy, vol. 33, no. 3, pp. 38–44, 2022, doi: 10.1353/jod.2022.0038.
- [9] L.-E. Easley, J.T. Chow, “Enabling pariahs: China’s support of Myanmar, North Korea, and Russia for geopolitical advantage,” Asian Survey, vol. 64, no. 3, pp. 396–427, 2024, doi: 10.1525/as.2024.2113239
- [10] J.T. Chow, L.-E. Easley, “Renegotiating pariah state partnerships: Why Myanmar and North Korea respond differently to Chinese influence,” Contemporary Security Policy, vol. 40, no. 4, pp. 502–525, 2019, doi: 10.1080/13523260.2019.1660483.
- [11] B. Lin, B. Hart, S. Lu, Y.-J. Liao. (Oct. 23, 2023.). Analyzing the latest Xi-Putin meeting and China’s belt and road forum, Commentary, Center for Strategic & International Studies (CSIS). [Online]. Available: https://www.csis.org/analysis/analyzinglatest-xi-putin-meeting-and-chinas-belt-and-road-forum. [Accessed: Nov. 27,2023].
- [12] Reuters. (Jan. 12, 2024.). China-Russia 2023 trade value hits record high of $240 bln - Chinese customs. [Online]. Available: https://www.reuters.com/markets/chinarussia-2023-trade-value-hits-record-high-240-bln-chinese-customs-2024-01-12. [Accessed: Jun. 25, 2024].
- [13] TASS Russian News Agency. (Jan. 19, 2024). Russia exports record oil volume to China in 2023. [Online]. Available: https://tass.com/economy/1734985. [Accessed: Jun. 25, 2024].
- [14] President of Russia. (Feb. 4, 2022). Joint statement of the Russian Federation and the People’s Republic of China on the international relations entering a new era and the global sustainable development. [Online]. Available: www.en.kremlin.ru. [Accessed: Nov. 27, 2023].
- [15] R. Barrios, A. Bowen. (Sep. 13, 2023). China-Russia relations, Congressional Research Service, Washington, DC. [Online]. Available: https://crsreports.congress.gov/product/pdf/IF/IF12100. [Accessed: Nov. 27, 2023].
- [16] W. Yang, “China, Russia double down on ties despite complications in trade relations,” Voice of America, February 15, 2024.
- [17] E.H. Carr, The Twenty Years’ Crisis, 1919-1939: Reissued with a New Preface from Michael Cox. New York, NY: Springer, 2016.
- [18] K.J. Holsti, “National role conceptions in the study of foreign policy,” International Studies Quarterly, vol. 14, no. 3, pp. 233–309, 1970, doi: 10.2307/3013584.
- [19] A. Malici, S.G. Walker, “Role theory and ‘rogue states’,” in Deviance in International Relations: ‘Rogue States’ and International Security. , W. Wagner, W. Werner, M. Onderco, Eds., London: Palgrave Macmillan, 2014, pp. 132–151.
- [20] C.G. Thies, M. Breuning, “Integrating foreign policy analysis and international relations through role theory,”Foreign Policy Analysis, vol. 8, no. 1, pp. 1–4, 2012, doi: 10.1111/j.1743-8594.2011.00169.x
- [21] C. Cantir, J. Kaarbo, “Contested roles and domestic politics: reflections on role theory in foreign policy analysis and IR theory,” Foreign Policy Analysis, vol. 8, no. 1, pp. 5–24, 2012, doi: 10.1111/j.1743-8594.2011.00156.x
- [22] O.A. Hathaway, R. Crootof, P. Levitz, H. Nix, “The law of cyber-attack,” California Law Review, vol. 100, pp. 817, 2012.
- [23] E. Roche, M. Blaine, “The folly of cyber war,” Journal of International Affairs, vol. 75, no. 2, pp. 131–144, 2023.
- [24] L. Panetta, B. Obama, Sustaining US Global Leadership: Priorities for 21st Century Defense. Washington, DC: US Department of Defense, vol. 1, p. 16, 2012.
- [25] During a track two visit by North Korean diplomats to Syracuse University in 2000, the chief of the delegation asked the author several questions suggesting fairly strong knowledge of software design and computer coding: J. S. Wit. (2019). “U.S. strategy towards North Korea: Rebuilding dialogue and engagement”. [Online]. Available: https://usakoreainstitute.org/wp-content/uploads/2010/02/NKreportOCT09jwit.pdf. [Accessed: Nov. 27, 2023].
- [26] A. Greenberg, “North Korean hackers stole nearly $400 million in crypto last year,” Wired, Jan. 13, 2022. [Online]. Available: https://www.wired.com/story/north-korea-cryptocurrency-theft-ethereum. [Accessed: Oct. 10, 2023].
- [27] S. Mohurle, M. Patil, “A brief study of wanna cry threat: Ransomware attack 2017,” International Journal of Advanced Research in Computer Science, vol. 8, no. 5, pp. 1938–1940, 2017, doi: 10.26483/ijarcs.v8i5.4021.
- [28] Web Titan. (Jul. 2, 2020). How much money did wanna cry make? [Online]. Available: https://www.webtitan.com/blog/how-much-money-did-wannacrymake. [Accessed: Dec. 03, 2023].
- [29] G. Siboni, L. Abramski, G. Sapir, “Iran’s activity in cyberspace: Identifying patterns and understanding the strategy,” Cyber, Intelligence, and Security, vol. 4, no. 1, pp. 21–40, 2020.
- [30] C. Bronk, “Cyber intrigue: The flame malware international politics,” Cyber Dialogue, University of Toronto, May 31, 2012. [Online]. Available: https://cyberdialogue.ca/2012/05/cyber-intrigue-the-flame-malware-international-politics/. [Accessed: Nov. 03, 2023].
- [31] C. Bronk, E. Tikk-Ringas, “The cyber attack on Saudi Aramco,” Survival, vol. 55, no. 2, pp. 81–96, 2013, doi: 10.1080/00396338.2013.784468.
- [32] C. Bronk, “Hacking the nation-state: Security, information technology and policies of assurance,” Information Security Journal: A Global Perspective, vol. 17, no. 3, pp. 132–142, 2008, doi: 10.1080/19393550802178565.
- [33] A. Greenberg, “The untold story of NotPetya, the most devastating cyberattack in history,” Wired, Aug. 22, 2018. [Online]. Available: https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world. [Accessed: Nov. 27, 2023].
- [34] R. Lee, M.J. Assante, T. Conway, “Analysis of the cyber attack on the Ukrainian power grid,” Electricity Information Sharing and Analysis Center (E-ISAC), no. 388, pp. 1–29, 2016.
- [35] C.E. Ziegler, “International dimensions of electoral processes: Russia, the USA, and the 2016 elections,” International Politics, vol. 55, no. 5, pp. 557–574, 2018, doi: 10.1057/s41311-017-0113-1.
- [36] N. Inkster, “Cyber espionage,” Adelphi Series, vol. 55, no. 456, pp. 51–82, 2015, doi: 10.1080/19445571.2015.1181443.
- [37] S.J. Hartnett, “Google and the ‘twisted cyber spy’ affair: US–Chinese communication in an age of globalization,” Quarterly Journal of Speech, vol. 97, no. 4, pp. 411–434, 2011, doi: 10.1080/00335630.2011.608705.
- [38] S. Gootman, “OPM hack: The most dangerous threat to the federal government today,” Journal of Applied Security Research, vol. 11, no. 4, pp. 517–525, 2016, doi: 10.1080/19361610.2016.1211876.
- [39] A. Gilli, M. Gilli, “Why China has not caught up yet: Military-technological superiority and the limits of imitation, reverse engineering, and cyber espionage,” International Security, vol. 43, no. 3, pp. 141–189, 2018, doi: 10.1162/isec_a_00337.
- [40] R. Deibert, R. Rohozinski, A. Manchanda, N. Villeneuve, G. Walton, Tracking Ghostnet: Investigating a Cyber Espionage Network. Toronto: Citizen Lab, University of Toronto, 2009.
- [41] J.D. Work, “Private actors and the intelligence contest in cyber conflict,” in Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest, R. Chesney, M. Smeets, Eds., Georgetown University Press, 2023.
- [42] G. López-Rodríguez, I. Moreno-López, J.C. Hernández-Gutiérrez, “Cyberwarfare against critical infrastructures: Russia and Iran in the gray zone,” Applied Cybersecurity & Internet Governance, vol. 2, no. 1, pp. 1–7, 2023, doi: 10.60097/ACIG/162865.
- [43] Iran International. (Dec. 10, 2023). Iranian parliament approves information security deal with Russia. [Online]. Available: https://www.iranintl.com/en/202312105187. [Accessed: Nov. 27, 2023].
- [44] A. Davidi, “Iranian-Russian cooperation on hack attacks may challenge Israeli cyber supremacy,” The Times of Israel, April 18, 2023.
- [45] V. Weber, “The worldwide web of Chinese and Russian information controls,” Oxford: Center for Technology and Global Affairs, University of Oxford, 2019. [Online]. Available: https://www.ctga.ox.ac.uk/article/worldwide-webchinese-and-russian-information-controls. [Accessed: Jun. 25, 2024].
- [46] S. Golkar, “The evolution of Iran’s police forces and social control in the Islamic Republic,” Middle East Brief, no. 120, vol. 3, pp. 1–9, 2018.
- [47] K.C. Lee, “In the Kim Jong Un era what is the reality of social control and punishment in North Korea,” Korea Institute for National Unification, 2023. [Online]. Available: https://repo.kinu.or.kr/handle/2015.oak/14464. [Accessed: Jun. 25, 2024].
- [48] C. Chen, “What is behind anti-corruption? A comparison of Russia and China,” Communist and Post-Communist Studies, vol. 53, no. 4, pp. 155–176, 2020, https://doi.org/10.1525/j.postcomstud.2020.53.4.155.
- [49] K. Nakazawa. (Nov. 2, 2023). Analysis: The mysteries and dangers that trail Li Keqiang’s death, Nikkei Asia. [Online]. Available: https://asia.nikkei.com/Editors-Picks/China-up-close/Analysis-The-mysteries-and-dangers-that-trail-LiKeqiang-s-death [Accessed: Oct. 10, 2023].
- [50] Y. Hong, G. T. Goodnight, “How to think about cyber sovereignty: the case of China,” in Norm Diffusion Beyond the West, Š. Kolmašová, Ed. Springer Nature Switzerland, 2020, pp. 8–26.
- [51] S.-A. Kim, C.Y. Kang, J. Park, B.Y. Yoon, A Study on the Access to Information of the North Korean People. Korea Institute for National Unification, 2021.
- [52] S. Kalathil, Beyond the Great Firewall: How China Became a Global Information Power. Washington, DC: Center for International Media Assistance, 2017.
- [53] E. Quan, “Censorship sensing: The capabilities and implications of China’s great firewall under Xi Jinping,” Sigma: Journal of Political and International Studies, vol. 39, no. 1, p. 4, 2022.
- [54] A. Law, “The ‘legal black hole’ CFIUS and the implications of Trump’s executive order against TikTok,” Cornell JL & Pub. Pol’y, vol. 31, p. 217, 2021, doi: 10.59015/wlr.ACHH7075.
- [55] M.L. Mueller, K. Farhat, “Regulation of platform market access by the United States and China: Neo-mercantilism in digital services,” Policy & Internet, vol. 14, no. 2, pp. 348–367, 2022, doi: 10.1002/poi3.305.
- [56] B. Min, L.R. Luqiu, “How propaganda techniques leverage their advantages: A cross-national study of the effects of Chinese international propaganda on the US and South Korean audiences,” Political Communication, vol. 38, no. 3, pp. 305–325, 2021, doi: 10.1080/10584609.2020.1763524.
- [57] J. Bund, Finding China’s Edge: Engineering Influence Operations within the Limits of Social Media Platform Rules. ETH Zurich, 2021.
- [58] Y. Golovchenko, C. Buntain, G. Eady, M.A. Brown, J.A. Tucker, “Cross-platform state propaganda: Russian trolls on Twitter and YouTube during the 2016 US presidential election,” The International Journal of Press/Politics, vol. 25, no. 3, pp. 357–389, 2020, doi: 10.1177/19401612209126.
- [59] A. Nadler, M. Crain, J. Donovan. (2018). Weaponizing the digital influence machine. [Online]. Available: https://datasociety.net/library/weaponizing-the-digitalinfluence-machine. [Accessed: Nov. 27, 2023].
- [60] S. Zuboff, “The age of surveillance capitalism,” in Social Theory Re-Wired, W. Longhofer, D. Winchester, Eds.,Abingdon, Oxfordshire: Routledge, 2023, pp. 203–213.
- [61] H.-C. H. Chang, A. H.-E. Wang, Y. S. Fang. (2023). US-Sskepticism: Misinformation and transnational conspiracy in the 2024 Taiwanese presidential elections, Center for Open Science, [Online]. Available: https://misinforeview.hks.harvard.edu/article/us-skepticism-and-transnational-conspiracy-in-the-2024-taiwanese-presidential-election/. [Accessed: Nov. 27, 2023].
- [62] L. Maschmeyer, A. Abrahams, P. Pomerantsev, V. Yermolenko, “Donetsk don’t tell – ‘hybrid war’ in Ukraine and the limits of social media influence operations,” Journal of Information Technology & Politics, pp. 1–16, 2023, doi: 10.1080/19331681.2023.2211969.
- [63] H. Kermani, “#MahsaAmini: Iranian Twitter activism in the times of computational propaganda,” Social Movement Studies, 2023, doi: 10.1080/14742837.2023.2180354
- [64] R. Padula, M. de Freitas Cecílio, I. Candido de Oliveira, C.J. Prado, “Guyana: Oil, internal disputes, the USA and Venezuela,” Contexto Internacional, vol. 45, 2023. [Online]. Available: https://www.scielo.br/j/cint/a/vTqm4rBBDg6WRMt3NyLyKtF/?format=pdf&lang=en. [Accessed: Jun. 25, 2024].
- [65] S. Bendett, E. Kania. (2019). A new Sino-Russian high-tech partnership,” Australian Strategic Policy Institute. [Online]. Available: https://www.aspi.org.au/report/new-sino-russian-high-tech-partnership. [Accessed: Nov. 27, 2023].
- [66] J. Bodnar, B. Schafer, E. Soula. (2023). A Year of Disinformation: Russia and China’s Influence Campaigns During the War in Ukraine, Alliance for Securing Democracy. [Online]. Available: https://securingdemocracy.gmfus.org/a-year-ofdisinformation-russia-and-chinas-influence-campaigns-during-the-war-inukraine/ [Accessed: Dec. 03, 2023].
- [67] K. Walter, H. Hariharan, “China, Russia target western financial system with propaganda and disinformation,” The Diplomat, Jul. 14, 2023. [Online]. Available: https://thediplomat.com/2023/07/china-russia-target-western-financialsystem-with-propaganda-and-disinformation. [Accessed: Nov. 03, 2023].
- [68] C. Watts. (May 2, 2023). Rinse and repeat: Iran accelerates its cyber influence operations worldwide. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2023/05/02/dtac-iran-cyber-influence-operations-digital-threat. [Accessed: Nov. 03, 2023].
- [69] C. Watts. (Feb. 6, 2024.). Iran accelerates cyber ops against Israel from chaotic start. [Online]. Available: https://blogs.microsoft.com/on-the-issues/2024/02/06/iran-accelerates-cyber-ops-against-israel. [Accessed: Nov. 03, 2023].
- [70] Charles. A. Kupchan, Clifford. A. Kupchan, “The promise of collective security,” International Security, vol. 20, no. 1, pp. 52–61, 1995.
- [71] E.D. Borghard, S.W. Lonergan, “Deterrence by denial in cyberspace,” Journal of Strategic Studies, vol. 46, no. 3, pp. 534–569, 2023, doi: 10.1080/01402390.2021.1944856.
- [72] N. Grajewski, “An illusory entente: The myth of a Russia-China-Iran ‘axis’,” Asian Affairs, vol. 53, no. 1, pp. 164–183, 2022, doi: 10.1080/03068374.2022.2029076.
- [73] K.M. Campbell, R. Doshi, “How America can shore up Asian order,” Foreign Affairs, vol. 12, 2021. [Online]. Available: https://www.foreignaffairs.com/articles/united-states/2021-01-12/how-america-can-shore-asian-order. [Accessed: Jun. 25, 2024].
- [74] D. Singh. (Jan. 18, 2024). Déjà new: A return to the old normal. Security, economics, and technology for Houston Llecture, University of Houston. [Online]. Available: https://www.law.uh.edu/ipil/2024_SETH_Lecture_Series_photos.asp. [Accessed: Nov. 27, 2023].
Uwagi
Opracowanie rekordu ze środków MNiSW, umowa nr POPUL/SP/0154/2024/02 w ramach programu "Społeczna odpowiedzialność nauki II" - moduł: Popularyzacja nauki (2025).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-47c2f01a-b5f9-4f00-8803-67eea82f68d9
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.