Attributing Cyber Attacks

Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as depe...

Full description

Saved in:
Bibliographic Details
Published inJournal of strategic studies Vol. 38; no. 1-2; pp. 4 - 37
Main Authors Rid, Thomas, Buchanan, Ben
Format Journal Article
LanguageEnglish
Published London Routledge 02.01.2015
Taylor & Francis Ltd
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.
AbstractList Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. Reprinted by permission of Frank Cass & Co. Ltd.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges. Adapted from the source document.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? - This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.
Author Rid, Thomas
Buchanan, Ben
Author_xml – sequence: 1
  givenname: Thomas
  surname: Rid
  fullname: Rid, Thomas
  organization: Department of War Studies, King's College London
– sequence: 2
  givenname: Ben
  surname: Buchanan
  fullname: Buchanan, Ben
  organization: Department of War Studies, King's College London
BookMark eNqNkM1LwzAUwINMcJv-AYKHgRcvne8ladOeZAy_YOBFwVtI01Q6u2QmLbL_3pTqxYN4eo_H7339ZmRinTWEXCAsEXK4BuRAWQFLGrNlIQTL6RGZouAsKZh4nZDpgCQDc0JmIWwBMM9TNiXnq67zTdl3jX1brA-l8YtYUfo9nJLjWrXBnH3HOXm5u31ePySbp_vH9WqT6BRFl-iaA2iNKUKhhEBmShX3YJWlrMooL2mdqYrSGA2WWqCJWIkRSillXLM5uRrn7r376E3o5K4J2rStssb1QWKWx-MF5_k_0AyAAQoa0ctf6Nb13sZHIpVihsiinTnhI6W9C8GbWu59s1P-IBHkoFb-qJWDWjmqjW03Y1tja-d36tP5tpKdOrTO115Z3QTJ_pzwBR_ffb4
CODEN JSTSD5
CitedBy_id crossref_primary_10_1017_eis_2019_2
crossref_primary_10_1080_13523260_2021_1882812
crossref_primary_10_1080_01402390_2019_1581613
crossref_primary_10_3390_electronics11030416
crossref_primary_10_1016_j_fsidi_2020_300925
crossref_primary_10_2478_pce_2022_0014
crossref_primary_10_1109_COMST_2023_3280465
crossref_primary_10_1177_00220027231153580
crossref_primary_10_1093_fpa_orac003
crossref_primary_10_1080_01402390_2021_1944856
crossref_primary_10_1093_jogss_ogad011
crossref_primary_10_1080_09592318_2022_2021487
crossref_primary_10_1093_jogss_ogad013
crossref_primary_10_1017_ajil_2018_86
crossref_primary_10_1080_02684527_2020_1840746
crossref_primary_10_3917_her_177_0329
crossref_primary_10_1080_10357718_2021_1926423
crossref_primary_10_21830_19006586_528
crossref_primary_10_1080_13523260_2019_1677324
crossref_primary_10_1080_13569775_2018_1493629
crossref_primary_10_2139_ssrn_2836087
crossref_primary_10_2139_ssrn_3104014
crossref_primary_10_1109_ACCESS_2016_2544381
crossref_primary_10_2478_iclr_2019_0015
crossref_primary_10_1093_cybsec_tyaa013
crossref_primary_10_1093_cybsec_tyaa012
crossref_primary_10_1093_isagsq_ksac022
crossref_primary_10_1080_23738871_2018_1453526
crossref_primary_10_1007_s40803_019_00129_8
crossref_primary_10_1007_s42979_019_0036_6
crossref_primary_10_1007_s12652_023_04603_y
crossref_primary_10_1007_s13347_017_0271_5
crossref_primary_10_35784_iapgos_2822
crossref_primary_10_1177_07388942221111069
crossref_primary_10_2139_ssrn_3226758
crossref_primary_10_7202_1084458ar
crossref_primary_10_1080_00963402_2017_1288445
crossref_primary_10_1016_j_procs_2016_09_287
crossref_primary_10_1177_00220027221116289
crossref_primary_10_1080_10357718_2017_1320972
crossref_primary_10_1177_23477970221099748
crossref_primary_10_1080_19331681_2020_1776658
crossref_primary_10_1007_s10922_021_09586_9
crossref_primary_10_2139_ssrn_2836196
crossref_primary_10_1109_MSEC_2022_3143269
crossref_primary_10_1109_TEM_2020_3004610
crossref_primary_10_1017_S0003055420000362
crossref_primary_10_1093_cybsec_tyac007
crossref_primary_10_1093_cybsec_tyz012
crossref_primary_10_1080_23738871_2019_1640757
crossref_primary_10_2139_ssrn_3634374
crossref_primary_10_1093_cybsec_tyac005
crossref_primary_10_1007_s12063_020_00148_x
crossref_primary_10_1080_01402390_2017_1293194
crossref_primary_10_1080_13523260_2023_2279033
crossref_primary_10_12797_Politeja_19_2022_79_07
crossref_primary_10_3390_s21196522
crossref_primary_10_2139_ssrn_3277517
crossref_primary_10_1017_S1744137420000077
crossref_primary_10_1093_jogss_ogac024
crossref_primary_10_1080_01402390_2015_1115975
crossref_primary_10_1162_ISEC_c_00208
crossref_primary_10_1080_13523260_2023_2271794
crossref_primary_10_2298_MEDJP2401055V
crossref_primary_10_1093_cybsec_tyw017
crossref_primary_10_1093_cybsec_tyz007
crossref_primary_10_1080_01402390_2023_2221779
crossref_primary_10_1080_01402390_2018_1419930
crossref_primary_10_1145_3653973
crossref_primary_10_1016_j_cose_2020_101996
crossref_primary_10_1080_09662839_2022_2082838
crossref_primary_10_1109_ACCESS_2022_3233403
crossref_primary_10_1515_peps_2020_0046
crossref_primary_10_2139_ssrn_2860839
crossref_primary_10_2139_ssrn_3463153
crossref_primary_10_1142_S1013251120400111
crossref_primary_10_1177_00223433231217687
crossref_primary_10_1017_S153759271800110X
crossref_primary_10_2139_ssrn_3579029
crossref_primary_10_1080_14678802_2021_1888512
crossref_primary_10_1080_14702436_2018_1508349
crossref_primary_10_3390_s23042028
crossref_primary_10_1109_OJCOMS_2021_3074591
crossref_primary_10_1016_j_ijcip_2021_100464
crossref_primary_10_1016_j_apergo_2020_103223
crossref_primary_10_1093_jogss_ogy022
crossref_primary_10_1080_25741292_2023_2199964
crossref_primary_10_18535_ijsrm_v9i12_ec04
crossref_primary_10_25136_2409_8671_2022_1_37532
crossref_primary_10_1109_TEM_2020_3029019
crossref_primary_10_1007_s13369_019_04319_2
crossref_primary_10_1080_23738871_2022_2041060
crossref_primary_10_1093_cybsec_tyab019
crossref_primary_10_1017_eis_2021_18
crossref_primary_10_1177_2053168017715930
crossref_primary_10_1080_10345329_2023_2281071
crossref_primary_10_1016_j_cose_2015_06_005
crossref_primary_10_1016_j_cose_2024_103939
crossref_primary_10_1080_23738871_2023_2184708
crossref_primary_10_1080_02684527_2023_2300932
crossref_primary_10_1080_13523260_2019_1678855
crossref_primary_10_1080_01402390_2017_1307741
crossref_primary_10_48175_IJARSCT_1372
crossref_primary_10_1109_TEM_2022_3204165
crossref_primary_10_1016_j_eswa_2020_113219
crossref_primary_10_1080_13523260_2019_1590960
crossref_primary_10_1080_01402390_2018_1559154
crossref_primary_10_1080_14702436_2020_1851603
crossref_primary_10_1093_poq_nfad006
crossref_primary_10_1007_s12399_023_00939_7
crossref_primary_10_1080_01402390_2018_1563779
crossref_primary_10_1007_s13347_016_0251_1
crossref_primary_10_1080_23738871_2016_1243140
crossref_primary_10_1145_3587255
crossref_primary_10_11610_Connections_18_1_2_05
crossref_primary_10_1057_s41288_020_00168_5
crossref_primary_10_2139_ssrn_2836208
crossref_primary_10_1017_S0002930000016894
crossref_primary_10_1080_19480881_2024_2341467
crossref_primary_10_1080_14702436_2022_2080661
crossref_primary_10_1093_jogss_ogz077
crossref_primary_10_1111_gove_12368
crossref_primary_10_1177_0022343320964549
crossref_primary_10_1080_13523260_2019_1581458
crossref_primary_10_1016_j_cose_2021_102396
crossref_primary_10_1080_09662839_2022_2031991
crossref_primary_10_1080_23738871_2019_1604782
crossref_primary_10_53694_bited_809581
crossref_primary_10_1093_cybsec_tyad018
crossref_primary_10_1109_MSEC_2019_2938134
crossref_primary_10_1162_ISEC_a_00266
crossref_primary_10_1016_j_apor_2020_102337
crossref_primary_10_1080_23738871_2021_1937253
crossref_primary_10_1162_ISEC_a_00267
crossref_primary_10_17645_pag_v10i2_5015
crossref_primary_10_1016_j_cose_2024_103960
crossref_primary_10_1073_pnas_1700442114
crossref_primary_10_14746_ps_2022_1_23
crossref_primary_10_1155_2021_7525092
crossref_primary_10_1080_23738871_2019_1636108
crossref_primary_10_1093_cybsec_tyv003
crossref_primary_10_1080_13523260_2022_2164122
crossref_primary_10_1093_isp_ekad001
crossref_primary_10_1080_01402390_2021_1895117
crossref_primary_10_1016_j_bushor_2021_07_013
crossref_primary_10_1093_cybsec_tyab003
crossref_primary_10_1093_cybsec_tyab002
crossref_primary_10_1093_cybsec_tyab008
crossref_primary_10_1080_09592318_2021_1976574
crossref_primary_10_1186_s42400_020_00048_4
crossref_primary_10_1016_j_fsidi_2022_301348
crossref_primary_10_3390_w13010081
crossref_primary_10_4018_IJCWT_2019070103
crossref_primary_10_3390_info11030168
crossref_primary_10_1177_00223433231218178
crossref_primary_10_4018_IJCWT_2020010103
Cites_doi 10.1093/acprof:oso/9780199655014.001.0001
10.1515/9781400837403
10.21236/ADA468859
10.1007/978-0-387-75462-8_6
10.2307/2009967
10.1080/03071847.2013.787735
10.1093/oso/9780195152661.001.0001
10.1093/wentk/9780199918096.001.0001
10.1177/0967010611431079
10.1080/00396338.2013.784468
10.1111/j.1540-5842.2009.01103.x
10.1073/pnas.1322638111
10.1080/09636412.2013.816122
10.1093/jcsl/krs019
ContentType Journal Article
Copyright 2014 Taylor & Francis 2014
Copyright Taylor & Francis Ltd. 2015
Copyright_xml – notice: 2014 Taylor & Francis 2014
– notice: Copyright Taylor & Francis Ltd. 2015
DBID AAYXX
CITATION
7UB
8BJ
FQK
JBE
DOI 10.1080/01402390.2014.977382
DatabaseName CrossRef
Worldwide Political Science Abstracts
International Bibliography of the Social Sciences (IBSS)
International Bibliography of the Social Sciences
International Bibliography of the Social Sciences
DatabaseTitle CrossRef
International Bibliography of the Social Sciences (IBSS)
Worldwide Political Science Abstracts
DatabaseTitleList International Bibliography of the Social Sciences (IBSS)
Worldwide Political Science Abstracts

International Bibliography of the Social Sciences (IBSS)
DeliveryMethod fulltext_linktorsrc
Discipline Military & Naval Science
EISSN 1743-937X
EndPage 37
ExternalDocumentID 3580596951
10_1080_01402390_2014_977382
977382
Genre Original Articles
Feature
GroupedDBID -~X
.7I
.QK
0BK
0R~
29L
2DF
3R3
3YN
4.4
42H
42P
5GY
5VS
AAAVI
AAGZJ
AAMFJ
AAMIU
AAPUL
AATTQ
AAZMC
ABBKH
ABCCY
ABFIM
ABGJC
ABJVF
ABLIJ
ABLJU
ABPEM
ABPTK
ABPTX
ABQHQ
ABSSG
ABTAI
ABXUL
ABZLS
ACGFO
ACGFS
ACHQT
ACLSK
ACTIO
ACTOA
ADAHI
ADCVX
ADLRE
ADXPE
AECIN
AEGYZ
AEISY
AEKEX
AEOZL
AEPSL
AEYOC
AEZRU
AFOLD
AFWLO
AGDLA
AGMYJ
AGRBW
AIJEM
AJWEG
AKBVH
ALMA_UNASSIGNED_HOLDINGS
ALQZU
AVBZW
AWYRJ
BEJHT
BLEHA
BMOTO
BOHLJ
CCCUG
CQ1
CS3
DGFLZ
DKSSO
DU5
EBS
EJD
EOKQO
E~B
E~C
FUNRP
G-F
GTTXZ
H13
HF~
HZ~
IPNFZ
J.O
KDLKA
KYCEM
M4Z
NA5
O-.
O9-
P2P
PQEST
PQQKQ
RIG
RNANH
ROSJB
RSYQP
S-F
STATR
TEY
TFH
TFL
TFW
TN5
TNTFI
TRJHH
UT5
UT9
V1K
VAE
VQA
~01
~45
~S~
AAYXX
ABJNI
ABXYU
ADKVQ
ADMHG
AHDZW
CITATION
TBQAZ
TDBHL
TUROJ
7UB
8BJ
FQK
JBE
ID FETCH-LOGICAL-c517t-cf400cc15109a7713eba2391d653d624b2f6ad22b2fe1bc71e9a7b1ba252234c3
ISSN 0140-2390
IngestDate Wed Dec 04 05:14:32 EST 2024
Wed Dec 04 05:00:50 EST 2024
Thu Oct 10 20:47:40 EDT 2024
Thu Nov 21 22:00:10 EST 2024
Tue Jun 13 20:00:28 EDT 2023
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1-2
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c517t-cf400cc15109a7713eba2391d653d624b2f6ad22b2fe1bc71e9a7b1ba252234c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
OpenAccessLink https://figshare.com/articles/journal_contribution/Attributing_Cyber_Attacks/1284592/2/files/1860725.pdf
PQID 1651611374
PQPubID 31501
PageCount 34
ParticipantIDs proquest_journals_1651611374
proquest_miscellaneous_1660030172
crossref_primary_10_1080_01402390_2014_977382
informaworld_taylorfrancis_310_1080_01402390_2014_977382
proquest_miscellaneous_1680147448
PublicationCentury 2000
PublicationDate 2015-01-02
PublicationDateYYYYMMDD 2015-01-02
PublicationDate_xml – month: 01
  year: 2015
  text: 2015-01-02
  day: 02
PublicationDecade 2010
PublicationPlace London
PublicationPlace_xml – name: London
PublicationTitle Journal of strategic studies
PublicationYear 2015
Publisher Routledge
Taylor & Francis Ltd
Publisher_xml – name: Routledge
– name: Taylor & Francis Ltd
References Nye Joseph S. (CIT0035) 2010
CIT0030
McDonald Geoff (CIT0032) 2013
CIT0031
United States of America v Wang Dong, Sun Kailiang (CIT0054) 2014
Waxman Matthew C. (CIT0057) 2011; 36
Clayton Richard (CIT0015) 2005; 653
Gostev Alexander (CIT0021) 2012
Churchill Winston S. (CIT0012) 2002; 1
Rid Thomas (CIT0041) 2013
Panetta Leon (CIT0037) 2012
Clausewitz Carl von (CIT0014) 1976
CIT0036
Weaver Nicholas (CIT0058) 2014
CIT0038
Clark David D. (CIT0013) 2011
Schoen Seth (CIT0045) 2011
Goldsmith Jack (CIT0020) 2006
CIT0040
Betz David (CIT0007) 2011
Global Threat Report (CIT0019) 2014
CIT0043
Healey Jason (CIT0023) 2013
Moran Ned (CIT0033) 2013
Zetter Kim (CIT0062) 2014
Wheeler David A. (CIT0059) 2003
Langner Ralph (CIT0027) 2013
Caltagirone Sergio (CIT0011) 2013
Libicki Martin (CIT0028) 2009
CIT0002
CIT0005
Hartley Nathaniel (CIT0022) 2014
CIT0049
Arquilla John (CIT0003) 1996
CIT0004
CIT0006
CIT0050
Slay Jill (CIT0047) 2008; 253
CIT0052
CIT0051
CIT0010
Department of Defense (CIT0017) 2011
CIT0053
CIT0055
Boebert W. Earl (CIT0008) 2011
Singer P.W. (CIT0046) 2014
Hutchins Eric M. (CIT0024) 2010
CIT0016
CIT0018
Zetter Kim (CIT0061) 2011
Verton Dan (CIT0056) 2000
CIT0060
Anderson Nate (CIT0001) 2013
Stoll Clifford (CIT0048) 1989
Kent Sherman (CIT0025) 1968; 12
Rivner Uri (CIT0042) 2011
Raiu Costin (CIT0039) 2013
Rosenbaum Ron (CIT0044) 2012
Moran Ned (CIT0034) 2014
CIT0026
CIT0029
Brenner Susan (CIT0009) 2007; 97
References_xml – ident: CIT0040
– volume-title: A Fierce Domain (Washington
  year: 2013
  ident: CIT0023
  contributor:
    fullname: Healey Jason
– ident: CIT0038
– volume-title: Stuxnet’s Secret Twin’, Foreign Policy
  year: 2013
  ident: CIT0027
  contributor:
    fullname: Langner Ralph
– volume-title: Arlington, VA: CrowdStrike
  year: 2014
  ident: CIT0019
  contributor:
    fullname: Global Threat Report
– volume-title: Wen Xinyu, Huang Zhenyu, Gu Chunhui
  year: 2014
  ident: CIT0054
  contributor:
    fullname: United States of America v Wang Dong, Sun Kailiang
– volume-title: Operation Poisoned Hurricane
  year: 2014
  ident: CIT0034
  contributor:
    fullname: Moran Ned
– volume-title: Wired Magazine
  year: 2011
  ident: CIT0061
  contributor:
    fullname: Zetter Kim
– ident: CIT0043
  doi: 10.1093/acprof:oso/9780199655014.001.0001
– volume-title: Ars Technica
  year: 2013
  ident: CIT0001
  contributor:
    fullname: Anderson Nate
– volume: 97
  start-page: 379
  issue: 2
  year: 2007
  ident: CIT0009
  publication-title: Journal of Criminal Law & Criminology
  contributor:
    fullname: Brenner Susan
– volume-title: The Cuckoo’s Egg
  year: 1989
  ident: CIT0048
  contributor:
    fullname: Stoll Clifford
– ident: CIT0050
– ident: CIT0002
– volume: 36
  start-page: 421
  year: 2011
  ident: CIT0057
  publication-title: The Yale Journal of International Law
  contributor:
    fullname: Waxman Matthew C.
– volume-title: Anatomy of an Attack
  year: 2011
  ident: CIT0042
  contributor:
    fullname: Rivner Uri
– volume: 653
  volume-title: Anonymity and Traceability in Cyberspace
  year: 2005
  ident: CIT0015
  contributor:
    fullname: Clayton Richard
– volume-title: On War
  year: 1976
  ident: CIT0014
  doi: 10.1515/9781400837403
  contributor:
    fullname: Clausewitz Carl von
– volume-title: Larsen, Techniques for Cyber Attack Attribution
  year: 2003
  ident: CIT0059
  doi: 10.21236/ADA468859
  contributor:
    fullname: Wheeler David A.
– volume-title: Electronic Frontier Foundation
  year: 2011
  ident: CIT0045
  contributor:
    fullname: Schoen Seth
– ident: CIT0060
– volume-title: Cyberspace and the State
  year: 2011
  ident: CIT0007
  contributor:
    fullname: Betz David
– volume-title: Stuxnet 0.5: The Missing Link
  year: 2013
  ident: CIT0032
  contributor:
    fullname: McDonald Geoff
– volume: 253
  start-page: 73
  volume-title: Critical Infrastructure Protection
  year: 2008
  ident: CIT0047
  doi: 10.1007/978-0-387-75462-8_6
  contributor:
    fullname: Slay Jill
– ident: CIT0026
– ident: CIT0006
  doi: 10.2307/2009967
– ident: CIT0005
  doi: 10.1080/03071847.2013.787735
– volume-title: Supply Chain Analysis: From Quartermaster to Sun-shop
  year: 2013
  ident: CIT0033
  contributor:
    fullname: Moran Ned
– ident: CIT0036
– volume-title: Confessions of Teenage Hackers
  year: 2000
  ident: CIT0056
  contributor:
    fullname: Verton Dan
– volume-title: Who Controls the Internet? Illusions of a Borderless World
  year: 2006
  ident: CIT0020
  doi: 10.1093/oso/9780195152661.001.0001
  contributor:
    fullname: Goldsmith Jack
– volume-title: Remarks on Cybersecurity to the Business Executives for National Security’, New York City
  year: 2012
  ident: CIT0037
  contributor:
    fullname: Panetta Leon
– volume-title: Cyber War will Not Take Place
  year: 2013
  ident: CIT0041
  contributor:
    fullname: Rid Thomas
– volume: 12
  start-page: 11
  volume-title: Studies in Intelligence
  year: 1968
  ident: CIT0025
  contributor:
    fullname: Kent Sherman
– volume-title: The Flame: Questions and Answers, Kaspersky Lab
  year: 2012
  ident: CIT0021
  contributor:
    fullname: Gostev Alexander
– volume-title: The Diamond Model of Intrusion Analysis
  year: 2013
  ident: CIT0011
  contributor:
    fullname: Caltagirone Sergio
– volume-title: Cyber Power
  year: 2010
  ident: CIT0035
  contributor:
    fullname: Nye Joseph S.
– ident: CIT0052
– volume-title: Hat-tribution to PLA Unit 61486
  year: 2014
  ident: CIT0022
  contributor:
    fullname: Hartley Nathaniel
– volume-title: Cybersecurity and Cyberwar
  year: 2014
  ident: CIT0046
  doi: 10.1093/wentk/9780199918096.001.0001
  contributor:
    fullname: Singer P.W.
– volume-title: Cyberdeterrence and Cyberwar
  year: 2009
  ident: CIT0028
  contributor:
    fullname: Libicki Martin
– volume-title: A Close Look at the NSA’s Most Powerful Internet Attack Tool’, Wired
  year: 2014
  ident: CIT0058
  contributor:
    fullname: Weaver Nicholas
– volume: 1
  volume-title: The Gathering Storm: The Second World War
  year: 2002
  ident: CIT0012
  contributor:
    fullname: Churchill Winston S.
– ident: CIT0016
  doi: 10.1177/0967010611431079
– start-page: 12
  volume-title: Smithsonian Magazine 43/1
  year: 2012
  ident: CIT0044
  contributor:
    fullname: Rosenbaum Ron
– ident: CIT0010
  doi: 10.1080/00396338.2013.784468
– start-page: 41
  volume-title: Proceedings of a Workshop on Deterring Cyberattacks
  year: 2011
  ident: CIT0008
  contributor:
    fullname: Boebert W. Earl
– volume-title: Cyberspace Policy Report
  year: 2011
  ident: CIT0017
  contributor:
    fullname: Department of Defense
– volume-title: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
  year: 2010
  ident: CIT0024
  contributor:
    fullname: Hutchins Eric M.
– start-page: 25
  volume-title: in Proceedings of a Workshop on Deterring Cyberattacks
  year: 2011
  ident: CIT0013
  contributor:
    fullname: Clark David D.
– ident: CIT0031
  doi: 10.1111/j.1540-5842.2009.01103.x
– ident: CIT0018
– ident: CIT0004
  doi: 10.1073/pnas.1322638111
– volume-title: Countdown to Zero Day
  year: 2014
  ident: CIT0062
  contributor:
    fullname: Zetter Kim
– ident: CIT0029
  doi: 10.1080/09636412.2013.816122
– ident: CIT0049
– ident: CIT0051
– ident: CIT0030
– volume-title: The Advent of Netwar
  year: 1996
  ident: CIT0003
  contributor:
    fullname: Arquilla John
– volume-title: Igor Soumenkov, Kurt Baumgartner and Vitaly Kamluk, The MiniDuke Mystery, Kaspersky Lab
  year: 2013
  ident: CIT0039
  contributor:
    fullname: Raiu Costin
– ident: CIT0055
– ident: CIT0053
  doi: 10.1093/jcsl/krs019
SSID ssj0018853
Score 2.539987
Snippet Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer...
SourceID proquest
crossref
informaworld
SourceType Aggregation Database
Publisher
StartPage 4
SubjectTerms Agency
Attribution
Computer Networks
Computers
Cyber Security
Cybercrime
Information Security
Leadership
Management
National security
Offenders
Security
Signals Intelligence
Skills
Strategic planning
Traceability
Uncertainty
Title Attributing Cyber Attacks
URI https://www.tandfonline.com/doi/abs/10.1080/01402390.2014.977382
https://www.proquest.com/docview/1651611374
https://search.proquest.com/docview/1660030172
https://search.proquest.com/docview/1680147448
Volume 38
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFA46X3wRrzhvVBBfJNJcmnaPKsoQnSAd7C0kWQa-TNnqg_56Ty6dnTfUl3Z0WVbOl56cnOb7DkJHBmY9Q5TAQhQcc6oIVkYZnBNqrOE5TGouNXDbE90-vx5kg3etZ88uqfSpef2SV_IfVOEa4OpYsn9AdtYpXIDPgC8cAWE4_grjsyrWq3LE2RdtJyeqqhxp_puQcxqlaI1XlW1sH7x_GH7YLeQZDo4VHBKk55ExFvMDJPP5gfmUYYopC0U5a5_Hiia2kYAYXBhvzIVBj-WTl43bEqFj16_bH8dPIY5koYzQvKh1705e9W9uZHk5KBfRktMr5C20VN5fd7uz1z1FEeRC61utOY5OBP2Lf5mLIeYUZj_NqD5MKFfRSjR2chbAWkMLdryOtm-9FvrkJTlOegpGQBJd6gZqNzBMPIZJxHAT9a8uy4sujuUqsMlIXmEzAn9oDIRQaUfBIGdWK7hzMhQZGwrKNR0JNaQUzpZokxMLzTSBRhADM27YFmqNH8d2GyVUmE5OVZYSeF5SDSGDgoWu7nDNTSpGoo1wbQD5FFRJJKnFXqPBpDOYDAZro6JpJVn5bNAolG6R7Oef7tUWlXHoTyURGawUCMt5Gx3OvgbH5N42qbF9fHZthF9v5_SnNk68KOe82PlFP7to-X2A76FWNXm2-xASVvogDqg3v1BaNw
link.rule.ids 314,780,784,27924,27925,59651,60440
linkProvider Taylor & Francis
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpR1NT8IwtDFw0IvfBhR1JsbbcO26djsSIpkIHAwk3pq2dB5MhoFxwF_v6z6IaOSgpyXr69K39_36-orQrQarp7FkLmMhdSmR2JVaapdjoo2mHIyaTQ0MRyye0P5LUFUTLsqyShtDJ0WjiFxXW-G2yeiqJO7eRgUEgnVbmUXb4MH4IWjhehCxAGSzPn7ux_F6KyEMi1aUto7RTqrOz_3ynQ37tNG99Ie2zk1Q7wCpavFF5clbe5mptv741tfxX9gdov3SQXU6BUcdoR2THqPGMG_mPV85d85IAnM6pU44Qc1OVl6alb463ZUycwfe2JP7p2jSexh3Y7e8b8HVAeaZqxMQaK3BB_AiCVTyjZKwEDxlgT9lhCqSMDklBJ4GK82xATCFAQicOJ9q_wzV0llqGsghTEecyMDDQHBPgc2TEKmpiCqqPZawJnKrvyzei7YaAlfdSkv8hcVfFPg3UfiVFCLL0xlJcfeI8LdPbVVkE6V8LgQGTmEY-5w20c16GCTLbpfI1MyWFoblASMn22Bs9x0OMe7531d4jXbj8XAgBo-jpwu0ByNBnuQhLVTL5ktzCW5Ppq5Kxv4ELBLyaw
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NT8IwFH8xkBgvfhtQ1JkYb0Padd04EpQgCjEGEm5NWzoPJoPgOOBf7-s-iGjkoKcla7v07fV9ta-_B3Ct0eppIrnLechcRiVxpZbaDQjVRrMAjZrdGugPeHfEemN__OUWv02rtDF0lAFFpLraCvdsEhUZcbc2KKAYq9vELFZHB8YLUQmXua2eXILy8KXX7a5OEsIwQ6K0aYx2UHF97pfvrJmnNfDSH8o6tUCdPZDF3LPEk7f6IlF1_fEN1vE_xO3Dbu6eOq1sPR3AlokPodJPobznS-fGGUhcmk6uEY6g2kryklnxq9NeKjN38I29t38Mo879sN1182oLrvZJkLg6QnHWGj2ARlMijzyjJE6ETLjvTThlikZcTijFpyFKB8RgN0WwE7pwHtPeCZTiaWwq4FCumwGVfoMguxsKLZ7EOE01mWK6wSNeBbf4yWKWgWoIUmCV5vQLS7_I6K9C-JUTIkk3M6Ks8ojwNg-tFVwTuXS-C8J9dHSJF7AqXK2aUa7sYYmMzXRh-_A0XAzopj4WeyfACPf07zO8hO3nu454ehg8nsEONvjpDg-tQSmZL8w5-jyJusiX9ScsBvEP
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Attributing+cyber+attacks&rft.jtitle=Journal+of+strategic+studies&rft.au=Rid%2C+Thomas&rft.au=Buchanan%2C+Ben&rft.date=2015-01-02&rft.issn=0140-2390&rft.volume=38&rft.issue=1-2&rft.spage=4&rft.epage=37&rft_id=info:doi/10.1080%2F01402390.2014.977382&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0140-2390&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0140-2390&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0140-2390&client=summon