Abstract

Attributing computer network intrusions has grown in importance as cyber penetrations across sovereign borders have become commonplace. Although advances in technology and forensics have made machine attribution easier in recent years, identifying states or others responsible for cyber intrusions remains challenging. This essay provides an overview of the attribution problem and its international legal dimensions and argues that states must develop accountable attribution mechanisms for international law to have practical value in this sphere.

Highlights

  • Attributing computer network intrusions has grown in importance as cyber penetrations across sovereign borders have become commonplace

  • This essay provides an overview of the attribution problem and its international legal dimensions and argues that states must develop accountable attribution mechanisms for international law to have practical value in this sphere

  • Scope and Nature of the Attribution Problem. When it comes to cyber activity, we live in what Lucas Kello calls a state of “unpeace”—“mid-spectrum rivalry lying below the physically destructive threshold of interstate violence, but whose harmful effects far surpass the tolerable level of peacetime competition.”[1]. More than thirty nations are capable of effectively using cyber tools as weapons

Read more

Summary

THE BUMPY ROAD TO A MEANINGFUL INTERNATIONAL LAW OF CYBER ATTRIBUTION

Attributing computer network intrusions has grown in importance as cyber penetrations across sovereign borders have become commonplace. Advances in technology and forensics have made machine attribution easier in recent years, identifying states or others responsible for cyber intrusions remains challenging. This essay provides an overview of the attribution problem and its international legal dimensions and argues that states must develop accountable attribution mechanisms for international law to have practical value in this sphere

Scope and Nature of the Attribution Problem
AJIL UNBOUND
Technical and Practical Challenges
Legal Challenges in Attributing an Unlawful Cyber Intrusion
Prospects for International Legal Regulation
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call