Attributing Cyber Attacks
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as depe...
Saved in:
Published in | Journal of strategic studies Vol. 38; no. 1-2; pp. 4 - 37 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
London
Routledge
02.01.2015
Taylor & Francis Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. |
---|---|
AbstractList | Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. Reprinted by permission of Frank Cass & Co. Ltd. Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. Adapted from the source document. Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. |
Author | Rid, Thomas Buchanan, Ben |
Author_xml | – sequence: 1 givenname: Thomas surname: Rid fullname: Rid, Thomas organization: Department of War Studies, King's College London – sequence: 2 givenname: Ben surname: Buchanan fullname: Buchanan, Ben organization: Department of War Studies, King's College London |
BookMark | eNqNkM1LwzAUwINMcJv-AYKHgRcvne8ladOeZAy_YOBFwVtI01Q6u2QmLbL_3pTqxYN4eo_H7339ZmRinTWEXCAsEXK4BuRAWQFLGrNlIQTL6RGZouAsKZh4nZDpgCQDc0JmIWwBMM9TNiXnq67zTdl3jX1brA-l8YtYUfo9nJLjWrXBnH3HOXm5u31ePySbp_vH9WqT6BRFl-iaA2iNKUKhhEBmShX3YJWlrMooL2mdqYrSGA2WWqCJWIkRSillXLM5uRrn7r376E3o5K4J2rStssb1QWKWx-MF5_k_0AyAAQoa0ctf6Nb13sZHIpVihsiinTnhI6W9C8GbWu59s1P-IBHkoFb-qJWDWjmqjW03Y1tja-d36tP5tpKdOrTO115Z3QTJ_pzwBR_ffb4 |
CODEN | JSTSD5 |
CitedBy_id | crossref_primary_10_1017_eis_2019_2 crossref_primary_10_1080_13523260_2021_1882812 crossref_primary_10_1080_01402390_2019_1581613 crossref_primary_10_3390_electronics11030416 crossref_primary_10_1016_j_fsidi_2020_300925 crossref_primary_10_2478_pce_2022_0014 crossref_primary_10_1109_COMST_2023_3280465 crossref_primary_10_1177_00220027231153580 crossref_primary_10_1093_fpa_orac003 crossref_primary_10_1080_01402390_2021_1944856 crossref_primary_10_1093_jogss_ogad011 crossref_primary_10_1080_09592318_2022_2021487 crossref_primary_10_1093_jogss_ogad013 crossref_primary_10_1017_ajil_2018_86 crossref_primary_10_1080_02684527_2020_1840746 crossref_primary_10_3917_her_177_0329 crossref_primary_10_1080_10357718_2021_1926423 crossref_primary_10_21830_19006586_528 crossref_primary_10_1080_13523260_2019_1677324 crossref_primary_10_1080_13569775_2018_1493629 crossref_primary_10_2139_ssrn_2836087 crossref_primary_10_2139_ssrn_3104014 crossref_primary_10_1109_ACCESS_2016_2544381 crossref_primary_10_2478_iclr_2019_0015 crossref_primary_10_1093_cybsec_tyaa013 crossref_primary_10_1093_cybsec_tyaa012 crossref_primary_10_1093_isagsq_ksac022 crossref_primary_10_1080_23738871_2018_1453526 crossref_primary_10_1007_s40803_019_00129_8 crossref_primary_10_1007_s42979_019_0036_6 crossref_primary_10_1007_s12652_023_04603_y crossref_primary_10_1007_s13347_017_0271_5 crossref_primary_10_35784_iapgos_2822 crossref_primary_10_1177_07388942221111069 crossref_primary_10_2139_ssrn_3226758 crossref_primary_10_7202_1084458ar crossref_primary_10_1080_00963402_2017_1288445 crossref_primary_10_1016_j_procs_2016_09_287 crossref_primary_10_1177_00220027221116289 crossref_primary_10_1080_10357718_2017_1320972 crossref_primary_10_1177_23477970221099748 crossref_primary_10_1080_19331681_2020_1776658 crossref_primary_10_1007_s10922_021_09586_9 crossref_primary_10_2139_ssrn_2836196 crossref_primary_10_1109_MSEC_2022_3143269 crossref_primary_10_1109_TEM_2020_3004610 crossref_primary_10_1017_S0003055420000362 crossref_primary_10_1093_cybsec_tyac007 crossref_primary_10_1093_cybsec_tyz012 crossref_primary_10_1080_23738871_2019_1640757 crossref_primary_10_2139_ssrn_3634374 crossref_primary_10_1093_cybsec_tyac005 crossref_primary_10_1007_s12063_020_00148_x crossref_primary_10_1080_01402390_2017_1293194 crossref_primary_10_1080_13523260_2023_2279033 crossref_primary_10_12797_Politeja_19_2022_79_07 crossref_primary_10_3390_s21196522 crossref_primary_10_2139_ssrn_3277517 crossref_primary_10_1017_S1744137420000077 crossref_primary_10_1093_jogss_ogac024 crossref_primary_10_1080_01402390_2015_1115975 crossref_primary_10_1162_ISEC_c_00208 crossref_primary_10_1080_13523260_2023_2271794 crossref_primary_10_2298_MEDJP2401055V crossref_primary_10_1093_cybsec_tyw017 crossref_primary_10_1093_cybsec_tyz007 crossref_primary_10_1080_01402390_2023_2221779 crossref_primary_10_1080_01402390_2018_1419930 crossref_primary_10_1145_3653973 crossref_primary_10_1016_j_cose_2020_101996 crossref_primary_10_1080_09662839_2022_2082838 crossref_primary_10_1109_ACCESS_2022_3233403 crossref_primary_10_1515_peps_2020_0046 crossref_primary_10_2139_ssrn_2860839 crossref_primary_10_2139_ssrn_3463153 crossref_primary_10_1142_S1013251120400111 crossref_primary_10_1177_00223433231217687 crossref_primary_10_1017_S153759271800110X crossref_primary_10_2139_ssrn_3579029 crossref_primary_10_1080_14678802_2021_1888512 crossref_primary_10_1080_14702436_2018_1508349 crossref_primary_10_3390_s23042028 crossref_primary_10_1109_OJCOMS_2021_3074591 crossref_primary_10_1016_j_ijcip_2021_100464 crossref_primary_10_1016_j_apergo_2020_103223 crossref_primary_10_1093_jogss_ogy022 crossref_primary_10_1080_25741292_2023_2199964 crossref_primary_10_18535_ijsrm_v9i12_ec04 crossref_primary_10_25136_2409_8671_2022_1_37532 crossref_primary_10_1109_TEM_2020_3029019 crossref_primary_10_1007_s13369_019_04319_2 crossref_primary_10_1080_23738871_2022_2041060 crossref_primary_10_1093_cybsec_tyab019 crossref_primary_10_1017_eis_2021_18 crossref_primary_10_1177_2053168017715930 crossref_primary_10_1080_10345329_2023_2281071 crossref_primary_10_1016_j_cose_2015_06_005 crossref_primary_10_1016_j_cose_2024_103939 crossref_primary_10_1080_23738871_2023_2184708 crossref_primary_10_1080_02684527_2023_2300932 crossref_primary_10_1080_13523260_2019_1678855 crossref_primary_10_1080_01402390_2017_1307741 crossref_primary_10_48175_IJARSCT_1372 crossref_primary_10_1109_TEM_2022_3204165 crossref_primary_10_1016_j_eswa_2020_113219 crossref_primary_10_1080_13523260_2019_1590960 crossref_primary_10_1080_01402390_2018_1559154 crossref_primary_10_1080_14702436_2020_1851603 crossref_primary_10_1093_poq_nfad006 crossref_primary_10_1007_s12399_023_00939_7 crossref_primary_10_1080_01402390_2018_1563779 crossref_primary_10_1007_s13347_016_0251_1 crossref_primary_10_1080_23738871_2016_1243140 crossref_primary_10_1145_3587255 crossref_primary_10_11610_Connections_18_1_2_05 crossref_primary_10_1057_s41288_020_00168_5 crossref_primary_10_2139_ssrn_2836208 crossref_primary_10_1017_S0002930000016894 crossref_primary_10_1080_19480881_2024_2341467 crossref_primary_10_1080_14702436_2022_2080661 crossref_primary_10_1093_jogss_ogz077 crossref_primary_10_1111_gove_12368 crossref_primary_10_1177_0022343320964549 crossref_primary_10_1080_13523260_2019_1581458 crossref_primary_10_1016_j_cose_2021_102396 crossref_primary_10_1080_09662839_2022_2031991 crossref_primary_10_1080_23738871_2019_1604782 crossref_primary_10_53694_bited_809581 crossref_primary_10_1093_cybsec_tyad018 crossref_primary_10_1109_MSEC_2019_2938134 crossref_primary_10_1162_ISEC_a_00266 crossref_primary_10_1016_j_apor_2020_102337 crossref_primary_10_1080_23738871_2021_1937253 crossref_primary_10_1162_ISEC_a_00267 crossref_primary_10_17645_pag_v10i2_5015 crossref_primary_10_1016_j_cose_2024_103960 crossref_primary_10_1073_pnas_1700442114 crossref_primary_10_14746_ps_2022_1_23 crossref_primary_10_1155_2021_7525092 crossref_primary_10_1080_23738871_2019_1636108 crossref_primary_10_1093_cybsec_tyv003 crossref_primary_10_1080_13523260_2022_2164122 crossref_primary_10_1093_isp_ekad001 crossref_primary_10_1080_01402390_2021_1895117 crossref_primary_10_1016_j_bushor_2021_07_013 crossref_primary_10_1093_cybsec_tyab003 crossref_primary_10_1093_cybsec_tyab002 crossref_primary_10_1093_cybsec_tyab008 crossref_primary_10_1080_09592318_2021_1976574 crossref_primary_10_1186_s42400_020_00048_4 crossref_primary_10_1016_j_fsidi_2022_301348 crossref_primary_10_3390_w13010081 crossref_primary_10_4018_IJCWT_2019070103 crossref_primary_10_3390_info11030168 crossref_primary_10_1177_00223433231218178 crossref_primary_10_4018_IJCWT_2020010103 |
Cites_doi | 10.1093/acprof:oso/9780199655014.001.0001 10.1515/9781400837403 10.21236/ADA468859 10.1007/978-0-387-75462-8_6 10.2307/2009967 10.1080/03071847.2013.787735 10.1093/oso/9780195152661.001.0001 10.1093/wentk/9780199918096.001.0001 10.1177/0967010611431079 10.1080/00396338.2013.784468 10.1111/j.1540-5842.2009.01103.x 10.1073/pnas.1322638111 10.1080/09636412.2013.816122 10.1093/jcsl/krs019 |
ContentType | Journal Article |
Copyright | 2014 Taylor & Francis 2014 Copyright Taylor & Francis Ltd. 2015 |
Copyright_xml | – notice: 2014 Taylor & Francis 2014 – notice: Copyright Taylor & Francis Ltd. 2015 |
DBID | AAYXX CITATION 7UB 8BJ FQK JBE |
DOI | 10.1080/01402390.2014.977382 |
DatabaseName | CrossRef Worldwide Political Science Abstracts International Bibliography of the Social Sciences (IBSS) International Bibliography of the Social Sciences International Bibliography of the Social Sciences |
DatabaseTitle | CrossRef International Bibliography of the Social Sciences (IBSS) Worldwide Political Science Abstracts |
DatabaseTitleList | International Bibliography of the Social Sciences (IBSS) Worldwide Political Science Abstracts International Bibliography of the Social Sciences (IBSS) |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Military & Naval Science |
EISSN | 1743-937X |
EndPage | 37 |
ExternalDocumentID | 3580596951 10_1080_01402390_2014_977382 977382 |
Genre | Original Articles Feature |
GroupedDBID | -~X .7I .QK 0BK 0R~ 29L 2DF 3R3 3YN 4.4 42H 42P 5GY 5VS AAAVI AAGZJ AAMFJ AAMIU AAPUL AATTQ AAZMC ABBKH ABCCY ABFIM ABGJC ABJVF ABLIJ ABLJU ABPEM ABPTK ABPTX ABQHQ ABSSG ABTAI ABXUL ABZLS ACGFO ACGFS ACHQT ACLSK ACTIO ACTOA ADAHI ADCVX ADLRE ADXPE AECIN AEGYZ AEISY AEKEX AEOZL AEPSL AEYOC AEZRU AFOLD AFWLO AGDLA AGMYJ AGRBW AIJEM AJWEG AKBVH ALMA_UNASSIGNED_HOLDINGS ALQZU AVBZW AWYRJ BEJHT BLEHA BMOTO BOHLJ CCCUG CQ1 CS3 DGFLZ DKSSO DU5 EBS EJD EOKQO E~B E~C FUNRP G-F GTTXZ H13 HF~ HZ~ IPNFZ J.O KDLKA KYCEM M4Z NA5 O-. O9- P2P PQEST PQQKQ RIG RNANH ROSJB RSYQP S-F STATR TEY TFH TFL TFW TN5 TNTFI TRJHH UT5 UT9 V1K VAE VQA ~01 ~45 ~S~ AAYXX ABJNI ABXYU ADKVQ ADMHG AHDZW CITATION TBQAZ TDBHL TUROJ 7UB 8BJ FQK JBE |
ID | FETCH-LOGICAL-c517t-cf400cc15109a7713eba2391d653d624b2f6ad22b2fe1bc71e9a7b1ba252234c3 |
ISSN | 0140-2390 |
IngestDate | Wed Dec 04 05:14:32 EST 2024 Wed Dec 04 05:00:50 EST 2024 Thu Oct 10 20:47:40 EDT 2024 Thu Nov 21 22:00:10 EST 2024 Tue Jun 13 20:00:28 EDT 2023 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1-2 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c517t-cf400cc15109a7713eba2391d653d624b2f6ad22b2fe1bc71e9a7b1ba252234c3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
OpenAccessLink | https://figshare.com/articles/journal_contribution/Attributing_Cyber_Attacks/1284592/2/files/1860725.pdf |
PQID | 1651611374 |
PQPubID | 31501 |
PageCount | 34 |
ParticipantIDs | proquest_journals_1651611374 proquest_miscellaneous_1660030172 crossref_primary_10_1080_01402390_2014_977382 informaworld_taylorfrancis_310_1080_01402390_2014_977382 proquest_miscellaneous_1680147448 |
PublicationCentury | 2000 |
PublicationDate | 2015-01-02 |
PublicationDateYYYYMMDD | 2015-01-02 |
PublicationDate_xml | – month: 01 year: 2015 text: 2015-01-02 day: 02 |
PublicationDecade | 2010 |
PublicationPlace | London |
PublicationPlace_xml | – name: London |
PublicationTitle | Journal of strategic studies |
PublicationYear | 2015 |
Publisher | Routledge Taylor & Francis Ltd |
Publisher_xml | – name: Routledge – name: Taylor & Francis Ltd |
References | Nye Joseph S. (CIT0035) 2010 CIT0030 McDonald Geoff (CIT0032) 2013 CIT0031 United States of America v Wang Dong, Sun Kailiang (CIT0054) 2014 Waxman Matthew C. (CIT0057) 2011; 36 Clayton Richard (CIT0015) 2005; 653 Gostev Alexander (CIT0021) 2012 Churchill Winston S. (CIT0012) 2002; 1 Rid Thomas (CIT0041) 2013 Panetta Leon (CIT0037) 2012 Clausewitz Carl von (CIT0014) 1976 CIT0036 Weaver Nicholas (CIT0058) 2014 CIT0038 Clark David D. (CIT0013) 2011 Schoen Seth (CIT0045) 2011 Goldsmith Jack (CIT0020) 2006 CIT0040 Betz David (CIT0007) 2011 Global Threat Report (CIT0019) 2014 CIT0043 Healey Jason (CIT0023) 2013 Moran Ned (CIT0033) 2013 Zetter Kim (CIT0062) 2014 Wheeler David A. (CIT0059) 2003 Langner Ralph (CIT0027) 2013 Caltagirone Sergio (CIT0011) 2013 Libicki Martin (CIT0028) 2009 CIT0002 CIT0005 Hartley Nathaniel (CIT0022) 2014 CIT0049 Arquilla John (CIT0003) 1996 CIT0004 CIT0006 CIT0050 Slay Jill (CIT0047) 2008; 253 CIT0052 CIT0051 CIT0010 Department of Defense (CIT0017) 2011 CIT0053 CIT0055 Boebert W. Earl (CIT0008) 2011 Singer P.W. (CIT0046) 2014 Hutchins Eric M. (CIT0024) 2010 CIT0016 CIT0018 Zetter Kim (CIT0061) 2011 Verton Dan (CIT0056) 2000 CIT0060 Anderson Nate (CIT0001) 2013 Stoll Clifford (CIT0048) 1989 Kent Sherman (CIT0025) 1968; 12 Rivner Uri (CIT0042) 2011 Raiu Costin (CIT0039) 2013 Rosenbaum Ron (CIT0044) 2012 Moran Ned (CIT0034) 2014 CIT0026 CIT0029 Brenner Susan (CIT0009) 2007; 97 |
References_xml | – ident: CIT0040 – volume-title: A Fierce Domain (Washington year: 2013 ident: CIT0023 contributor: fullname: Healey Jason – ident: CIT0038 – volume-title: Stuxnet’s Secret Twin’, Foreign Policy year: 2013 ident: CIT0027 contributor: fullname: Langner Ralph – volume-title: Arlington, VA: CrowdStrike year: 2014 ident: CIT0019 contributor: fullname: Global Threat Report – volume-title: Wen Xinyu, Huang Zhenyu, Gu Chunhui year: 2014 ident: CIT0054 contributor: fullname: United States of America v Wang Dong, Sun Kailiang – volume-title: Operation Poisoned Hurricane year: 2014 ident: CIT0034 contributor: fullname: Moran Ned – volume-title: Wired Magazine year: 2011 ident: CIT0061 contributor: fullname: Zetter Kim – ident: CIT0043 doi: 10.1093/acprof:oso/9780199655014.001.0001 – volume-title: Ars Technica year: 2013 ident: CIT0001 contributor: fullname: Anderson Nate – volume: 97 start-page: 379 issue: 2 year: 2007 ident: CIT0009 publication-title: Journal of Criminal Law & Criminology contributor: fullname: Brenner Susan – volume-title: The Cuckoo’s Egg year: 1989 ident: CIT0048 contributor: fullname: Stoll Clifford – ident: CIT0050 – ident: CIT0002 – volume: 36 start-page: 421 year: 2011 ident: CIT0057 publication-title: The Yale Journal of International Law contributor: fullname: Waxman Matthew C. – volume-title: Anatomy of an Attack year: 2011 ident: CIT0042 contributor: fullname: Rivner Uri – volume: 653 volume-title: Anonymity and Traceability in Cyberspace year: 2005 ident: CIT0015 contributor: fullname: Clayton Richard – volume-title: On War year: 1976 ident: CIT0014 doi: 10.1515/9781400837403 contributor: fullname: Clausewitz Carl von – volume-title: Larsen, Techniques for Cyber Attack Attribution year: 2003 ident: CIT0059 doi: 10.21236/ADA468859 contributor: fullname: Wheeler David A. – volume-title: Electronic Frontier Foundation year: 2011 ident: CIT0045 contributor: fullname: Schoen Seth – ident: CIT0060 – volume-title: Cyberspace and the State year: 2011 ident: CIT0007 contributor: fullname: Betz David – volume-title: Stuxnet 0.5: The Missing Link year: 2013 ident: CIT0032 contributor: fullname: McDonald Geoff – volume: 253 start-page: 73 volume-title: Critical Infrastructure Protection year: 2008 ident: CIT0047 doi: 10.1007/978-0-387-75462-8_6 contributor: fullname: Slay Jill – ident: CIT0026 – ident: CIT0006 doi: 10.2307/2009967 – ident: CIT0005 doi: 10.1080/03071847.2013.787735 – volume-title: Supply Chain Analysis: From Quartermaster to Sun-shop year: 2013 ident: CIT0033 contributor: fullname: Moran Ned – ident: CIT0036 – volume-title: Confessions of Teenage Hackers year: 2000 ident: CIT0056 contributor: fullname: Verton Dan – volume-title: Who Controls the Internet? Illusions of a Borderless World year: 2006 ident: CIT0020 doi: 10.1093/oso/9780195152661.001.0001 contributor: fullname: Goldsmith Jack – volume-title: Remarks on Cybersecurity to the Business Executives for National Security’, New York City year: 2012 ident: CIT0037 contributor: fullname: Panetta Leon – volume-title: Cyber War will Not Take Place year: 2013 ident: CIT0041 contributor: fullname: Rid Thomas – volume: 12 start-page: 11 volume-title: Studies in Intelligence year: 1968 ident: CIT0025 contributor: fullname: Kent Sherman – volume-title: The Flame: Questions and Answers, Kaspersky Lab year: 2012 ident: CIT0021 contributor: fullname: Gostev Alexander – volume-title: The Diamond Model of Intrusion Analysis year: 2013 ident: CIT0011 contributor: fullname: Caltagirone Sergio – volume-title: Cyber Power year: 2010 ident: CIT0035 contributor: fullname: Nye Joseph S. – ident: CIT0052 – volume-title: Hat-tribution to PLA Unit 61486 year: 2014 ident: CIT0022 contributor: fullname: Hartley Nathaniel – volume-title: Cybersecurity and Cyberwar year: 2014 ident: CIT0046 doi: 10.1093/wentk/9780199918096.001.0001 contributor: fullname: Singer P.W. – volume-title: Cyberdeterrence and Cyberwar year: 2009 ident: CIT0028 contributor: fullname: Libicki Martin – volume-title: A Close Look at the NSA’s Most Powerful Internet Attack Tool’, Wired year: 2014 ident: CIT0058 contributor: fullname: Weaver Nicholas – volume: 1 volume-title: The Gathering Storm: The Second World War year: 2002 ident: CIT0012 contributor: fullname: Churchill Winston S. – ident: CIT0016 doi: 10.1177/0967010611431079 – start-page: 12 volume-title: Smithsonian Magazine 43/1 year: 2012 ident: CIT0044 contributor: fullname: Rosenbaum Ron – ident: CIT0010 doi: 10.1080/00396338.2013.784468 – start-page: 41 volume-title: Proceedings of a Workshop on Deterring Cyberattacks year: 2011 ident: CIT0008 contributor: fullname: Boebert W. Earl – volume-title: Cyberspace Policy Report year: 2011 ident: CIT0017 contributor: fullname: Department of Defense – volume-title: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains year: 2010 ident: CIT0024 contributor: fullname: Hutchins Eric M. – start-page: 25 volume-title: in Proceedings of a Workshop on Deterring Cyberattacks year: 2011 ident: CIT0013 contributor: fullname: Clark David D. – ident: CIT0031 doi: 10.1111/j.1540-5842.2009.01103.x – ident: CIT0018 – ident: CIT0004 doi: 10.1073/pnas.1322638111 – volume-title: Countdown to Zero Day year: 2014 ident: CIT0062 contributor: fullname: Zetter Kim – ident: CIT0029 doi: 10.1080/09636412.2013.816122 – ident: CIT0049 – ident: CIT0051 – ident: CIT0030 – volume-title: The Advent of Netwar year: 1996 ident: CIT0003 contributor: fullname: Arquilla John – volume-title: Igor Soumenkov, Kurt Baumgartner and Vitaly Kamluk, The MiniDuke Mystery, Kaspersky Lab year: 2013 ident: CIT0039 contributor: fullname: Raiu Costin – ident: CIT0055 – ident: CIT0053 doi: 10.1093/jcsl/krs019 |
SSID | ssj0018853 |
Score | 2.539987 |
Snippet | Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer... |
SourceID | proquest crossref informaworld |
SourceType | Aggregation Database Publisher |
StartPage | 4 |
SubjectTerms | Agency Attribution Computer Networks Computers Cyber Security Cybercrime Information Security Leadership Management National security Offenders Security Signals Intelligence Skills Strategic planning Traceability Uncertainty |
Title | Attributing Cyber Attacks |
URI | https://www.tandfonline.com/doi/abs/10.1080/01402390.2014.977382 https://www.proquest.com/docview/1651611374 https://search.proquest.com/docview/1660030172 https://search.proquest.com/docview/1680147448 |
Volume | 38 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA46X3wRrzhvVBBfJNJcmnaPKsoQnSAd7C0kWQa-TNnqg_56Ty6dnTfUl3Z0WVbOl56cnOb7DkJHBmY9Q5TAQhQcc6oIVkYZnBNqrOE5TGouNXDbE90-vx5kg3etZ88uqfSpef2SV_IfVOEa4OpYsn9AdtYpXIDPgC8cAWE4_grjsyrWq3LE2RdtJyeqqhxp_puQcxqlaI1XlW1sH7x_GH7YLeQZDo4VHBKk55ExFvMDJPP5gfmUYYopC0U5a5_Hiia2kYAYXBhvzIVBj-WTl43bEqFj16_bH8dPIY5koYzQvKh1705e9W9uZHk5KBfRktMr5C20VN5fd7uz1z1FEeRC61utOY5OBP2Lf5mLIeYUZj_NqD5MKFfRSjR2chbAWkMLdryOtm-9FvrkJTlOegpGQBJd6gZqNzBMPIZJxHAT9a8uy4sujuUqsMlIXmEzAn9oDIRQaUfBIGdWK7hzMhQZGwrKNR0JNaQUzpZokxMLzTSBRhADM27YFmqNH8d2GyVUmE5OVZYSeF5SDSGDgoWu7nDNTSpGoo1wbQD5FFRJJKnFXqPBpDOYDAZro6JpJVn5bNAolG6R7Oef7tUWlXHoTyURGawUCMt5Gx3OvgbH5N42qbF9fHZthF9v5_SnNk68KOe82PlFP7to-X2A76FWNXm2-xASVvogDqg3v1BaNw |
link.rule.ids | 314,780,784,27924,27925,59651,60440 |
linkProvider | Taylor & Francis |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpR1NT8IwtDFw0IvfBhR1JsbbcO26djsSIpkIHAwk3pq2dB5MhoFxwF_v6z6IaOSgpyXr69K39_36-orQrQarp7FkLmMhdSmR2JVaapdjoo2mHIyaTQ0MRyye0P5LUFUTLsqyShtDJ0WjiFxXW-G2yeiqJO7eRgUEgnVbmUXb4MH4IWjhehCxAGSzPn7ux_F6KyEMi1aUto7RTqrOz_3ynQ37tNG99Ie2zk1Q7wCpavFF5clbe5mptv741tfxX9gdov3SQXU6BUcdoR2THqPGMG_mPV85d85IAnM6pU44Qc1OVl6alb463ZUycwfe2JP7p2jSexh3Y7e8b8HVAeaZqxMQaK3BB_AiCVTyjZKwEDxlgT9lhCqSMDklBJ4GK82xATCFAQicOJ9q_wzV0llqGsghTEecyMDDQHBPgc2TEKmpiCqqPZawJnKrvyzei7YaAlfdSkv8hcVfFPg3UfiVFCLL0xlJcfeI8LdPbVVkE6V8LgQGTmEY-5w20c16GCTLbpfI1MyWFoblASMn22Bs9x0OMe7531d4jXbj8XAgBo-jpwu0ByNBnuQhLVTL5ktzCW5Ppq5Kxv4ELBLyaw |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT8IwFH8xkBgvfhtQ1JkYb0Padd04EpQgCjEGEm5NWzoPJoPgOOBf7-s-iGjkoKcla7v07fV9ta-_B3Ct0eppIrnLechcRiVxpZbaDQjVRrMAjZrdGugPeHfEemN__OUWv02rtDF0lAFFpLraCvdsEhUZcbc2KKAYq9vELFZHB8YLUQmXua2eXILy8KXX7a5OEsIwQ6K0aYx2UHF97pfvrJmnNfDSH8o6tUCdPZDF3LPEk7f6IlF1_fEN1vE_xO3Dbu6eOq1sPR3AlokPodJPobznS-fGGUhcmk6uEY6g2kryklnxq9NeKjN38I29t38Mo879sN1182oLrvZJkLg6QnHWGj2ARlMijzyjJE6ETLjvTThlikZcTijFpyFKB8RgN0WwE7pwHtPeCZTiaWwq4FCumwGVfoMguxsKLZ7EOE01mWK6wSNeBbf4yWKWgWoIUmCV5vQLS7_I6K9C-JUTIkk3M6Ks8ojwNg-tFVwTuXS-C8J9dHSJF7AqXK2aUa7sYYmMzXRh-_A0XAzopj4WeyfACPf07zO8hO3nu454ehg8nsEONvjpDg-tQSmZL8w5-jyJusiX9ScsBvEP |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Attributing+cyber+attacks&rft.jtitle=Journal+of+strategic+studies&rft.au=Rid%2C+Thomas&rft.au=Buchanan%2C+Ben&rft.date=2015-01-02&rft.issn=0140-2390&rft.volume=38&rft.issue=1-2&rft.spage=4&rft.epage=37&rft_id=info:doi/10.1080%2F01402390.2014.977382&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-2390&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-2390&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-2390&client=summon |