[PDF][PDF] Public attribution of cyber intrusions

FJ Egloff - Journal of cybersecurity, 2020 - academic.oup.com
Attribution is central to the debate on how to respond to cyber intrusions. The policy
challenge is increasingly moving from identifying who is behind a cyber intrusion to finding …

Contested public attributions of cyber incidents and the role of academia

FJ Egloff - Contemporary Security Policy, 2020 - Taylor & Francis
Public attributions of cyber incidents by governments and private industry have become
prevalent in recent years. This article argues that they display a skewed version of cyber …

National Security by Platform

E Chachko - Stan. Tech. L. Rev., 2021 - HeinOnline
ABSTRACT Since 2016, platforms like Facebook, Google and Twitter have scaled up their
efforts to meet a plethora of security and geopolitical challenges. They have gradually …

[PDF][PDF] Attribution and knowledge creation assemblages in cybersecurity politics

FJ Egloff, M Dunn Cavelty - Journal of Cybersecurity, 2021 - academic.oup.com
Attribution is central to cybersecurity politics. It establishes a link between technical
occurrences and political consequences by reducing the uncertainty about who is behind an …

[图书][B] Semi-State Actors in Cybersecurity

FJ Egloff - 2022 - books.google.com
The universe of actors involved in international cybersecurity includes both state actors and
semi-and non-state actors, including technology companies, state-sponsored hackers, and …

Revisiting past cyber operations in light of new cyber norms and interpretations of international law: inching towards lines in the sand?

D Broeders, E De Busser, F Cristiano… - Journal of Cyber …, 2022 - Taylor & Francis
This article traces the evolution of interpretations of international law and international cyber
norms on responsible state behaviour in cyberspace by reassessing five major–and …

Attribution across cyber attack types: network intrusions and information operations

S Goel, B Nussbaum - IEEE Open Journal of the …, 2021 - ieeexplore.ieee.org
The objective of this paper is to articulate the problem of attribution in cyber warfare
incidents, including, surveillance, data theft, espionage, and misinformation campaigns. As …

How privilege undermines cybersecurity

D Schwarcz, J Wolff, DW Woods - Harv. JL & Tech., 2022 - HeinOnline
In recent years, cyberattacks have cost firms countless billions of dollars, undermined
consumer privacy, distorted world geopolitics, and even resulted in death and bodily harm …

Business Warfare

TCW Lin - BCL Rev., 2022 - HeinOnline
Businesses are under attack. State and non-state adversaries are assaulting companies
using drones, mercenaries, cyberweapons, sanctions, and restrictions. Instead of military …

Cyber attribution and state responsibility

W Banks - International Law Studies, 2021 - digital-commons.usnwc.edu
We might expect international law to specifically address cyber attribution requirements due
to the significance of attribution in framing the legal responsibility of States and the …