Jump to ContentJump to Main Navigation
Inside the Enemy's ComputerIdentifying Cyber Attackers$
Users without a subscription are not able to see the full content.

Clement Guitton

Print publication date: 2017

Print ISBN-13: 9780190699994

Published to Oxford Scholarship Online: August 2017

DOI: 10.1093/oso/9780190699994.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 27 September 2021

Modelling Attribution

Modelling Attribution

Chapter:
(p.29) 1 Modelling Attribution
Source:
Inside the Enemy's Computer
Author(s):

Clement Guitton

Publisher:
Oxford University Press
DOI:10.1093/oso/9780190699994.003.0002

How and why does the attribution of an incident become the responsibility of the executive rather than the judiciary? How do the processes of attributing a criminal incident and attributing a national security incident differ? This chapter offers a two-pronged model for attribution, based on the nature of the process either as criminal or as a threat to national security. Criminal cases rarely rise to the level of "national threat," and are mostly dealt with by law enforcement agencies and subsequently by judiciary organizations. Several cases, based on certain criteria, fall within the remit of the executive rather than the judiciary, because government officials regard them as threats to national security. This transfer has several consequences. First and foremost, the question of knowing the full name of the attacker becomes less relevant than knowing who the enemy is and who the sponsors are; for instance, a state actor or a terrorist organization. Second, a national security incident usually implies broader investigative powers, especially those of intelligence services, which can use secret methods bordering legality.

Keywords:   Attribution, Model, Crime, National security, Executive, Judiciary, Intelligence services

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .