My Account Log in

2 options

The ultimate challenge : attribution for cyber operations / Amanda G. Hill, Major, USAF.

Online

Available online

View online

U.S. Government Documents Available online

View online
Format:
Book
Government document
Author/Creator:
Hill, Amanda G., author.
Contributor:
Air University (U.S.). Air Command and Staff College, issuing body.
Muir S. Fairchild Research Information Center, issuing body.
Air University (U.S.). Press, publisher.
Series:
Wright flyer paper ; no. 70.
Wright flyer paper ; no. 70
Language:
English
Subjects (All):
Cyberterrorism--Law and legislation.
Cyberterrorism.
Computer networks--Law and legislation.
Computer networks.
Cyberterrorism--International cooperation.
Prosecution--International cooperation.
Prosecution.
Cyberspace operations (Military science).
War (International law).
Physical Description:
1 online resource (v, 34 pages) : color illustrations
Production:
Attribution for cyber operations
Place of Publication:
Maxwell Air Force Base, Alabama : Air University Press, Muir S. Fairchild Research Information Center, 2019.
Summary:
"The inherent nature of cyberspace has created an opportunity for adversaries to exploit vulnerabilities of victim state's cyberinfrastructures anonymously for a myriad of reasons. States and nonstate actors can use multiple avenues and techniques to route malicious malware with relative ease and safety. Further, states can utilize nonstate actors in their efforts to achieve political goals with the ability to deny involvement in the act. This is due to both the nature of cyberspace, deficiencies in international law, and the limitations of technical attribution. Therefore, this paper explores what factors, under international law, could be considered in holding nation-states or nonstate actors accountable for malicious cyber acts. The problem/solution method is used to review the relevant deficiencies in international law, general problems associated with attribution in the cyber domain, and other variables that could produce a more comprehensive assessment of whether a particular entity should be held accountable for a cyber action. Instituting and utilizing a multi-dimensional approach to attribution can provide the information necessary to determine responsibility for malicious cyber acts and provide victim states the confidence to respond appropriately."--Abstract
Contents:
Foreword.
Abstract.
Introduction.
Background. Principles of the DoD Law of War Manual and cyber operations. Attribution and the Law of Armed Conflict. Tallinn Manual on the International Law applicable to cyber warfare. Attributing responsibility to a state. Attribution and non-state actors.
Analysis. Limitations of attribution. Introduction into multi-dimensional approach to attribution. Evidentiary considerations in attribution.
Conclusion.
Abbreviations.
Bibliography.
Notes:
"Air University, Air Command and Staff College."
"Accepted by Air University Press February 2018 and published November 2019"--Page ii
Includes bibliographical references (pages 33-34).
Online resource; title from PDF title page (viewed on December 17, 2019).
OCLC:
1145699242

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account