Jump to ContentJump to Main Navigation
Inside the Enemy's Computer – Identifying Cyber Attackers - Oxford Scholarship Online
Users without a subscription are not able to see the full content.

Inside the Enemy's Computer: Identifying Cyber Attackers

Clement Guitton


Attribution — tracing those responsible for a cyber attack — is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technica ... More

Keywords: Attribution, Cyber attacks, National security, Standards of evidence, Private companies

Bibliographic Information

Print publication date: 2017 Print ISBN-13: 9780190699994
Published to Oxford Scholarship Online: August 2017 DOI:10.1093/oso/9780190699994.001.0001


Affiliations are at time of print publication.

Clement Guitton, author

Show Summary Details

subscribe or login to access all content.