Description |
1 online resource (v, 34 pages) : color illustrations |
|
text txt rdacontent |
|
computer c rdamedia |
|
online resource cr rdacarrier |
Series |
Wright flyer paper ; no. 70 |
|
Wright flyer paper ; no. 70.
|
Note |
"Air University, Air Command and Staff College." |
|
"Accepted by Air University Press February 2018 and published November 2019"--Page ii |
Bibliography |
Includes bibliographical references (pages 33-34). |
Contents |
Foreword. -- Abstract. -- Introduction. -- Background. Principles of the DoD Law of War Manual and cyber operations. Attribution and the Law of Armed Conflict. Tallinn Manual on the International Law applicable to cyber warfare. Attributing responsibility to a state. Attribution and non-state actors. -- Analysis. Limitations of attribution. Introduction into multi-dimensional approach to attribution. Evidentiary considerations in attribution. -- Conclusion. -- Abbreviations. -- Bibliography. |
Summary |
"The inherent nature of cyberspace has created an opportunity for adversaries to exploit vulnerabilities of victim state's cyberinfrastructures anonymously for a myriad of reasons. States and nonstate actors can use multiple avenues and techniques to route malicious malware with relative ease and safety. Further, states can utilize nonstate actors in their efforts to achieve political goals with the ability to deny involvement in the act. This is due to both the nature of cyberspace, deficiencies in international law, and the limitations of technical attribution. Therefore, this paper explores what factors, under international law, could be considered in holding nation-states or nonstate actors accountable for malicious cyber acts. The problem/solution method is used to review the relevant deficiencies in international law, general problems associated with attribution in the cyber domain, and other variables that could produce a more comprehensive assessment of whether a particular entity should be held accountable for a cyber action. Instituting and utilizing a multi-dimensional approach to attribution can provide the information necessary to determine responsibility for malicious cyber acts and provide victim states the confidence to respond appropriately."--Abstract |
Note |
Online resource; title from PDF title page (viewed on December 17, 2019). |
Subject |
Cyberterrorism -- Law and legislation.
|
|
Computer networks -- Law and legislation.
|
|
Cyberterrorism -- International cooperation.
|
|
Prosecution -- International cooperation.
|
|
Cyberterrorism -- Law and legislation.
(OCoLC)fst01909447
|
|
Computer networks -- Law and legislation.
(OCoLC)fst00872320
|
|
Cyberspace operations (Military science) (OCoLC)fst01909446
|
|
War (International law) (OCoLC)fst01170412
|
Added Author |
Air University (U.S.). Air Command and Staff College, issuing body.
|
|
Muir S. Fairchild Research Information Center, issuing body.
|
|
Air University (U.S.). Press, publisher.
|
Gpo Item No. |
0422-K-09 (online) |
Sudoc No. |
D 301.26/30:70 |
|