Retomando a iniciativa: inteligência prospectiva e capacidade ofensiva para a proatividade no ciberespaço
DOI:
http://doi.org/10.5902/2357797595736Palavras-chave:
Soberania cibernética, Poder cibernético, Inteligência, Prospectiva estratégica, Armas cibernéticas ofensivasResumo
A conjuntura atual apresenta uma divisão dos estados em três blocos. No primeiro estão as
democracias liberais, caracterizados pela cautela no exercício do poder no espaço cibernético. No
segundo estão estados autoritários, cuja atuação no ciberespaço combina visão estratégica,
dissimulação e audácia. O terceiro é composto pela maioria dos demais países que, por falta de
capacidade, não possuem efetiva influência. Nesse cenário, as ameaças cibernéticas atuam com
desenvoltura, assumindo riscos e provocando prejuízos. A hipótese deste trabalho é que o emprego
de Inteligência Cibernética Prospectiva e o desenvolvimento de capacidades cibernéticas ofensivas
compõem a base de uma estratégia capaz de alinhar estado, academia e indústria para,
democraticamente, fortalecer a segurança, contribuir para o alerta estratégico e desafiar a liberdade
de ação explorada pelas ameaças cibernéticas. Após rever os conceitos de soberania e poder no
ciberespaço, serão abordadas as vantagens do atacante sobre o defensor e os riscos de uma postura
reativa, para explicar o sucesso que estados autoritários vêm obtendo na dissuasão cibernética.
Downloads
Referências
Baur, Michel. 2024. 360-defree Scenario Design and Development. Joint Warfare Centre. http://www.jwc.nato.int/our-work/scenario-development/
Borghard, Erica D.; Lonergan, Shawn W. 2018. Confidence Building Measures for the Cyber Domain. Strategic Studies Quarterly. http://www.airuniversity.af.edu/Portals/10/SSQ/documents/Volume-12_Issue-3/Borghard-Lonergan.pdf.
Brock, Julia V.; Lewis, James A. 2025. Mutual Defense in Cyberspace: Joint Action on Attribution. Center for Strategic and International Studies. http://www.csis.org/analysis/mutual-defense-cyberspace-joint-action-attribution
Cybersecurity and Infrastructure Security Agency (CISA). 2024. Enhancing Cyber Resilience: Insights from CISA Red Team Assessment of a U.S. Critical Infrastructure Sector Organization. http://www.cisa.gov/sites/default/files/2024-11/aa24-326a-enhancing-cyber-resilience-insights-from-cisa-red-team-assessment_0.pdf
Corn, Gary P.; Taylor, Robert. Sovereignty in the age of cyber. Cambridge University Press. http://doi.org/10.1017/aju.2017.57
Derian-Toth, Garrett; Walsh, Ryan; Sergueeva, Alexandra; Kim, Edward; Coon, Relieves; Hada, Hilda; Stancombe, Jared. Opportunities for Public and Private Atrribution of Cyber Operations. NATO Cooperative Cyber Defence Centre of Excellence. http://ccdcoe.org/uploads/2021/08/Tallinn_Papers_Attribution_18082021.pdf.
Dijk, Allard; Meier, Roland; Melella, Cosimo; Pihelgas, Mauno; Vaarandi, Risto; Lenders, Vincent. 2025. "Next Steps in Cyber Blue Tem Automation – Leveraging the Power of LLMs". 17th International Conference on Cyber Conflict: The Next Step. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/17th-international-conference-on-cyber-conflict-the-next-step/
Gartzke, Erik; Lindsay, Jon R. 2015. Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace. Security Studies. Routledge. http://dx.doi.org/10.1080/09636412.2015.1038188.
Gehri, Lina; Meier, Roland; Hulliger, Daniel; Lenders, Vincent. 2023. "Towards Generalizing Machine Learning Models to Detect Command and Control Attack Traffic". 15th International Conference on Cyber Conflict: Meeting Reality. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/15th-international-conference-on-cyber-conflict-meeting-reality/.
Goyal, Pankaj; Scott, Cody; Tucker, Todd. 2025. A FAIR Taxonomy for Cyber Risk Scenarios: An Analyst's Guide for Defining Risk Scenarios for Continuous Risk Management. FAIR Institute. http://www.fairinstitute.org/resources/fair-cyber-risk-scenario-taxonomy
Halisdemir, Emre; Karacan, Hacer; Pihelgas, Mauno; Lepik, Toomas; Cho, Sungbaek. 2022. "Data Quality Problem in AI-Based Network Intrusion Detection Systems Studies and a Solution Proposal". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/cycon-2022-book/.
Jacobsen, Jeppe T. 2021. "Cyber offense in NATO: challenges and opportunities". International Affairs 97. http://www.researchgate.net/publication/350527052_Cyber_offense_in_NATO_challenges_and_opportunities
Kosseff, Jeff. 2020. "Retorsion as a Response to Ongoing Malign Cyber Operations". 12th International Conference on Cyber Conflict: 20/20 Vision – The Next Decade. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/12th-international-conference-on-cyber-conflict-20-20-vision-the-next-decade-proceedings-2020/
Leiter, Andrea. 2020. "Cyber Sovereignty: A Snapshot From A Field In Motion". Harvard International Law Journal Frontiers. http://journals.law.harvard.edu/ilj/wp-content/uploads/sites/84/Leiter-PDF-format.pdf.
Lewis, James A. 2022. "A Strategic Outlook for Cyberspace Operations". Cyberspace Strategic Outlook 2030: Horizon Scanning and Analysis. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/cyberspace-strategic-outlook-2030-horizon-scanning-and-analysis/.
Lewis, James A. 2015. "The role of offensive ciber operations in NATO's collective defence". Tallinn Paper No. 8. NATO CCDCOE Publications. http://ccdcoe.org/uploads/2018/10/TP_08_2015_0.pdf .
Lonergan, Erica D.; Montgomery, Mark. 2022. "The Promise and Perils of Allied Offensive Cyber Operations". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/cycon-2022-book/.
Neill, Martin; Hinkle, Wade P.; Morgan, Gary. 2016. Scenarios – International Best Practice: An Analysis of Their Use by the United States, United Kingdom and Republic of Korea. Institute for Defense Analysis. http://www.ida.org/research-and-publications/publications/all/s/sc/scenarios-international-best-practice-analysis-of-their-use-by-the-united-states-united-kingdom-and.
Nye, Joseph, Jr. 2010. Cyber Power. Belfer Center for Science and International Affairs". Harvard Kennedy School. http://www.belfercenter.org/publication/cyber-power.
Schmitt, Michael N (editor). 2016. Tallinn manual 2.0 on the international law applicable to cyber operations. Cambridge University Press.
Stejskal, Petr; Faix, Martin. 2022. "Legal Aspects of Misattribution Caused by Cyber Deception". 14th International Conference on Cyber Conflict: Keeping Moving. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/cycon-2022-book/.
Sullivan, Scott. 2023. "Unpacking Cyber Neutrality". 15th International Conference on Cyber Conflict: Meeting Reality. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/15th-international-conference-on-cyber-conflict-meeting-reality/.
Sullivan, Scott; Ricket, Iben. 2024. "Targeting in the Black Box". 16th International Conference on Cyber Conflict: Over the Horizon. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/16th-international-conference-on-cyber-conflict-over-the-horizon/
Vesnic-Alujevic, Lucia; d'Ambrosio, Salvatore. 2025. "Augmented foresight: The transformative power of generative AI for anticipatory governance". Policy Foresight Analysis. European Parliament. http://www.europarl.europa.eu/RegData/etudes/BRIE/2025/774665/EPRS_BRI(2025)774665_EN.pdf
Voo, Julia; Hemani, Irfan; Jones, Simon; From Sombre, Winnona. 2020. Reconceptualizing Cyber Power. Belfer Center for Science and International Affairs, Harvard Kennedy School. http://www.belfercenter.org/publication/reconceptualizing-cyber-power.
Voo, Julia; Hemani, Irfan; Cassidy, Daniel. 2022. National Cyber Power Index 2022. Belfer Center for Science and International Affairs, Harvard Kennedy School. http://www.belfercenter.org/publication/national-cyber-power-index-2022.
Vuuren, Ian van. 2025. The Dawn of Scenario Plannling 3.0). http://ianjvv2.substack.com/p/the-dawn-of-scenario-planning-30.
"Significant Cyber Incidents | Strategic Technologies Program | CSIS". 2025. http://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents.
Taddeo, Mariarosaria. 2017. Deterrence by Norms to Stop Interstate Cyber Attacks. University of Oxford. http://ora.ox.ac.uk/objects/uuid:a58db80f-8661-4911-beb9-adf45f650c19.
Taddeo, Mariarosaria. 2018. "How to Deter in Cyberspace". Hybrid COE Strategic Analysis. http://www.hybridcoe.fi/publications/hybrid-coe-strategic-analysis-9-how-to-deter-in-cyberspace/
Wang, Wei-Che. 2024. "Legal, Policy and Compliance Issues in Using AI for Security: Using Taiwan's Cybersecuriy Management Act ans Penetration Testing as Examples". 16th International Conference on Cyber Conflict: Over the Horizon. NATO CCDCOE Publications. http://ccdcoe.org/library/publications/16th-international-conference-on-cyber-conflict-over-the-horizon/
Yulianto, Semi; Soewito, Benfano; Gaol, Ford Lumban; Kurniawan, Aditya. 2025. "Enhancing cybersecurity resilience through advanced red-teaming exercises and MITRE ATT&CK framework integration: A paradigm shift in cybersecurity assessment". Cyber Security and Applications Volume 3. http://doi.org/10.1016/j.csa.2024.100077
Downloads
Publicado
Como Citar
Edição
Seção
Licença

Este trabalho está licenciado sob uma licença Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

