Jump to ContentJump to Main Navigation
Inside the Enemy's ComputerIdentifying Cyber Attackers$
Users without a subscription are not able to see the full content.

Clement Guitton

Print publication date: 2017

Print ISBN-13: 9780190699994

Published to Oxford Scholarship Online: August 2017

DOI: 10.1093/oso/9780190699994.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (oxford.universitypressscholarship.com). (c) Copyright Oxford University Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use. date: 17 September 2021



(p.137) 5 Time
Inside the Enemy's Computer

Clement Guitton

Oxford University Press

How important is the time constraint for attribution? How has the time constraint evolved? And what constitutes an appropriate time for attributing cyber attacks? Timing plays a significant role in attribution. The common assumption is that attribution is time-consuming, and warrants efforts to try to reduce the time it takes to identify instigators of cyber attacks. In the context of a national security incident, the rationale continues, this is problematic because fast reaction times are needed to ensure that any response will still be consistent with the fast-changing geopolitical context. Yet, counter-intuitively, focusing on time reduction can be misleading. In the national security context, timing matters, but not in terms of the measurable passage of time as much as in terms of external conjectures that influence the decision to attribute an act. Whether for a violent act of sabotage where the public expects a government reaction or for a less visible act of espionage, the time may not always be such that it is politically appropriate to attribute an attack. In this context, talking about reducing the time for attribution does not make much sense: such a proposal foregoes all the political elements that inform attribution, and over-emphasizes the technical aspect of attribution over the context in which an attack takes place.

Keywords:   Time constraint, Timing, Attribution, Cyber attacks, Fast reaction

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .