2 options
The ultimate challenge : attribution for cyber operations / Amanda G. Hill, Major, USAF.
- Format:
- Book
- Government document
- Author/Creator:
- Hill, Amanda G., author.
- Series:
- Wright flyer paper ; no. 70.
- Wright flyer paper ; no. 70
- Language:
- English
- Subjects (All):
- Cyberterrorism--Law and legislation.
- Cyberterrorism.
- Computer networks--Law and legislation.
- Computer networks.
- Cyberterrorism--International cooperation.
- Prosecution--International cooperation.
- Prosecution.
- Cyberspace operations (Military science).
- War (International law).
- Physical Description:
- 1 online resource (v, 34 pages) : color illustrations
- Production:
- Attribution for cyber operations
- Place of Publication:
- Maxwell Air Force Base, Alabama : Air University Press, Muir S. Fairchild Research Information Center, 2019.
- Summary:
- "The inherent nature of cyberspace has created an opportunity for adversaries to exploit vulnerabilities of victim state's cyberinfrastructures anonymously for a myriad of reasons. States and nonstate actors can use multiple avenues and techniques to route malicious malware with relative ease and safety. Further, states can utilize nonstate actors in their efforts to achieve political goals with the ability to deny involvement in the act. This is due to both the nature of cyberspace, deficiencies in international law, and the limitations of technical attribution. Therefore, this paper explores what factors, under international law, could be considered in holding nation-states or nonstate actors accountable for malicious cyber acts. The problem/solution method is used to review the relevant deficiencies in international law, general problems associated with attribution in the cyber domain, and other variables that could produce a more comprehensive assessment of whether a particular entity should be held accountable for a cyber action. Instituting and utilizing a multi-dimensional approach to attribution can provide the information necessary to determine responsibility for malicious cyber acts and provide victim states the confidence to respond appropriately."--Abstract
- Contents:
- Foreword.
- Abstract.
- Introduction.
- Background. Principles of the DoD Law of War Manual and cyber operations. Attribution and the Law of Armed Conflict. Tallinn Manual on the International Law applicable to cyber warfare. Attributing responsibility to a state. Attribution and non-state actors.
- Analysis. Limitations of attribution. Introduction into multi-dimensional approach to attribution. Evidentiary considerations in attribution.
- Conclusion.
- Abbreviations.
- Bibliography.
- Notes:
- "Air University, Air Command and Staff College."
- "Accepted by Air University Press February 2018 and published November 2019"--Page ii
- Includes bibliographical references (pages 33-34).
- Online resource; title from PDF title page (viewed on December 17, 2019).
- OCLC:
- 1145699242
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.