Strategies for Resolving the Cyber Attribution Challenge
Research Report
Strategies for Resolving the Cyber Attribution Challenge
Panayotis A. Yannakogeorgos
Copyright Date: Dec. 1, 2013
Published by: Air University Press
Pages: 109
OPEN ACCESS
https://www.jstor.org/stable/resrep13944
Table of Contents
Export Selected Citations Export to NoodleTools Export to RefWorks Export to EasyBib Export a RIS file (For EndNote, ProCite, Reference Manager, Zotero, Mendeley...) Export a Text file (For BibTex)
Select / Unselect all
  1. Front Matter
    Front Matter (pp. i-iv)
  2. Table of Contents
    Table of Contents (pp. v-vi)
  3. List of Illustrations
    List of Illustrations (pp. vii-viii)
  4. Foreword
    Foreword (pp. ix-xii)
    Lynn Mattice

    Today’s complex and interdependent global economy relies heavily on an Internet infrastructure that is fraught with risks, threats, and hazards the average computer user or small- and medium-sized enterprise is unaware of and unprepared for. Confidence in the ability to effectively, efficiently, and securely conduct commerce and business processes over the Internet and through emerging mobile device applications is vital and fundamental for vibrant and stable economies around the globe. The world faces unprecedented risks across the Internet in what has become known as “the twenty-first century’s Wild West,” where attacks on computer systems and networks are generally conducted with...

  5. About the Author
    About the Author (pp. xiii-xiv)
  6. Acknowledgments
    Acknowledgments (pp. xv-xvi)
  7. Executive Summary
    Executive Summary (pp. xvii-xx)
  8. Chapter 1 Introduction
    Chapter 1 Introduction (pp. 1-8)

    Cyber conflict activities constitute a critical form of coercive power. Effects can range from disruption to destruction. The loss of electrical power for extended periods of time, inability to conduct commerce due to networking failures, and incapacity of military organizations to command and control their forces are credible threats. In the past, the United States has faced adversarial states and violent nonstate actors organized in relatively hierarchical vertical structures. However, today the evolution of information and communication technology (ICT), such as those that make up the Internet, and the intensification of reliance on these vulnerable technologies provide US adversaries with...

  9. Chapter 2 The Cyber Environment
    Chapter 2 The Cyber Environment (pp. 9-34)

    Attribution of cyber events to people or machines is an overstated challenge. Every action in cyberspace has a source that can be identified if observers are looking. Experts have noted that “the very fact that one attempts to conduct cyber warfare means that some bit in some data stream is changed to reflect one’s presence and actions.”¹ All agents in the cyber world can be visible if a worldwide effort is in place to monitor malicious traffic and to punish behaviors that fall outside that which aims to use the Internet to communicate ideas freely, open pathways of commerce, or...

  10. Chapter 3 American Sponsorship of Embryonic Global Norms
    Chapter 3 American Sponsorship of Embryonic Global Norms (pp. 35-54)

    Global norms, institutions, and patterns of cooperation among state and private sector stakeholders can serve as a foundation for solving the attribution problem in cyberspace. Norms of state responsibility in cyberspace must be institutionalized at the international level, and they must be enforced by relevant US government departments, including defense, state, justice, and commerce, and by other appropriate federal, national, state, and tribal agencies.

    More than one American expert has noted that “although numerous multinational organizations are working on various aspects of cyber crime and/or cyber conflict, only ITU has taken a global view and put forth an agenda intended...

  11. Chapter 4 A Framework for Development, Diplomacy, and Defense
    Chapter 4 A Framework for Development, Diplomacy, and Defense (pp. 55-68)

    The subject of this chapter is a possible framework to guide US statecraft in cyberspace based on the antitrafficking initiatives the United States sponsored in the past decade. As has been noted throughout this work, nation-states are not currently held culpable for the actions of malicious agents in cyberspace. The United States–China Economic and Security Review Commission recently stated that “even if circumstantial evidence points to China as the culprit, no legislation or policy currently exists to easily determine appropriate response options to attacks on U.S. military or civilian networks in which definitive attribution is lacking. Beijing, understanding this,...

  12. Chapter 5 Conclusion
    Chapter 5 Conclusion (pp. 69-72)

    The only way forward in creating a robust network of global processes and policies to found a formal international agreement is to begin by holding states accountable for malicious activities that originate in or transit their territories. The United States should not shy away from sponsoring existing international frameworks and the emerging institutions such as IMPACT.

    Attributing a cyber attack to a state requires a rapid response to the event. Unlike law enforcement, different standards and technical evidence are required to hold states accountable. Experts have suggested that the high standard of evidence for criminal prosecution is not required from...

  13. Abbreviations
    Abbreviations (pp. 73-74)
  14. Bibliography
    Bibliography (pp. 75-86)
  15. Back Matter
    Back Matter (pp. 87-88)