Attribution of Malicious Cyber Incidents: From Soup to Nuts
For those interested—a (prepublication) review paper on attribution of malicious cyber incidents that synthesizes a number of previous works on the subject and adds a few new insights on the topic. Abstract below:
Published by The Lawfare Institute
in Cooperation With
For those interested—a (prepublication) review paper on attribution of malicious cyber incidents that synthesizes a number of previous works on the subject and adds a few new insights on the topic. Abstract below:
Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. A number of well-researched and executed papers cover one or more of these aspects, but integration of these aspects is usually left as an exercise for the analyst. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity. Which type of attribution is relevant depends on the goals of the relevant decision maker. Further, attribution is a multi-dimensional issue that draws on all sources of information available, including technical forensics, human intelligence, signals intelligence, history, and geopolitics, among others. From the perspective of the victim, some degree of factual uncertainty attaches to any of these types of attribution, although the last type—attribution to an ultimately responsible party—also implicates to a very large degree legal, policy, and political questions. But from the perspective of the adversary, the ability to conceal its identity from the victim with high confidence is also uncertain. It is the very existence of such risk that underpins the possibility of deterring hostile actions in cyberspace.