Item Details
Skip Navigation Links
   ActiveUsers:2126Hits:19250429Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID190772
Title ProperPublicly attributing cyber attacks
Other Title Informationa framework
LanguageENG
AuthorSmeets, Max ;  Egloff, Florian J
Summary / Abstract (Note)When should states publicly attribute cyber intrusions? Whilst this is a question governments increasingly grapple with, academia has hardly helped in providing answers. This article describes the stages of public attribution and provides a Public Attribution Framework designed to explain, guide, and improve decision making of public attribution by states. Our general argument is that public attribution is a highly complex process which requires trade-offs of multiple considerations. Effective public attribution not only necessitates a clear understanding of the attributed cyber operation and the cyber threat actor, but also the broader geopolitical environment, allied positions and activities, and the legal context. This also implies that more public attribution is not always better. Public attribution carries significant risks, which are often badly understood. We propose the decision maker’s attitude towards public attribution should be one of ‘strategic, coordinated pragmatism’. Public attribution – as part of a strategy – can only be successful if there is a consistent goal, whilst the avenues for potential negative counter effects are assessed on a case-by-case basis.
`In' analytical NoteJournal of Strategic Studies Vol. 46, No.3; Jun 2023: p.502-533
Journal SourceJournal of Strategic Studies Vol: 46 No 3
Key WordsIntelligence ;  Deterrence ;  Norms ;  Attribution ;  Cyber Operations ;  Public Attribution ;  Cyber Intrusions


 
 
Media / Other Links  Full Text