Attribution of Cyber Operations
Technical, Legal and Political Perspectives
DOI:
https://doi.org/10.5507/Keywords:
attribution, state responsibility, cyber operations, technical attribution, legal attribution, political attribution, cyber forensicsAbstract
The article deals with the issue of attribution of cyber operations from the technical, legal and political point of view. The first part is devoted to the possibilities of technical attribution, which have increased significantly in connection with the development of technology and the sharing of information about attackers. The second part discusses the issue of legal attribution for purposes of state responsibility under international law, with attention also given to the burden of proof and standard of proof. The third part briefly summarizes the problem of political attribution and the possibility of establishing an international attribution mechanism.
References
BANKS, William. Cyber Attribution and State Responsibility. International Law Studies, 2021,
vol. 97, pp. 1039–1072.
BANNELIER, Karine. and CHRISTAKIS, Theodore. Cyber-Attacks: Preventions-Reactions: The Role
of States and Private Actors. 1st ed. Paris: Les Cahiers de la Revue Défense Nationale, 2017, 88 p.
CRAWFORD, James. The International Law Commission’s Articles on State Responsibility: Introduction,
Text and Commentaries. Cambridge: Cambridge University Press, 2002, 428 p.
DEDERER, Hans-Georg and SINGER, Tassilo. Adverse Cyber Operations: Causality, Attribution,
Evidence, and Due Diligence. International Law Studies, 2019, vol. 95, pp. 430–466.
DINSTEIN, Yoram. Computer Network Attacks and Self-Defence. In: SCHMITT, Michael, N. and
O’DONNELL, Brian, T. (eds.). Computer Network Attack & International Law. Newport: Naval
War College, 2002, pp. 99–119.
FAIX, Martin and BRUNER, Tomáš. Problém přičitatelnosti jako nástroj lawfare. Defence & Strategy,
, vol. 18, no. 2, pp. 79–94.
GOEL, Sanjay and NUSSBAUM, Brian. Attribution Across Cyber Attack Types: Network Intrusions
and Information Operations. Journal of the Communications Society, 2021, vol. 2, no. 1,
pp. 1082–1093.
HANDLER, Stephenie, Gosnell. The New Cyber Face of Battle: Developing a Legal Approach to
Accommodate Emerging Trends in Warfare. Stanford Journal of International Law, 2012, vol. 48,
no. 1, pp. 209–237.
MUELLER Milton et al. Cyber Attribution: Can a New Institution Achieve Transnational Credibility?.
The Cyber Defense Review, 2019, vol. 4, no. 1, pp. 107–122.
NGUYEN, Reese. Navigating Jus Ad Bellum in the Age of Cyber Warfare, California Law Review,
, vol. 101, no. 4, pp. 1079–1129.
OSULA, Anna-Maria, KASPER, Agnes and KAJANDER, Aleksi. EU Common Position on
International Law and Cyberspace. Masaryk University Journal of Law and Technology, 2022,
vol. 16, no. 1, pp. 89–123.
PAYNE, Christian and FINLAY, Lorraine. Addressing Obstacles to Cyber-Attribution: A Model
Based on State Response to Cyber-Attack. George Washington International Law Review, 2017,
vol. 49, no. 3, pp. 202–206.
PRECIADO, Michael. If You Wish Cyber Peace, Prepare for Cyber War: The Need for the Federal
Government to Protect Critical Infrastructure from Cyber Warfare. Journal of Law & Cyber
Warfare, 2012, vol. 1, no. 1, pp. 99–154.
RID, Thomas and BUCHANAN, Ben. Attributing Cyber Attacks. The Journal of Strategic Studies,
, vol. 38, no. 1–2, pp. 4–37.
ROSCINI, Marco. Evidentiary Issues in International Disputes Related to State Responsibility for
Cyber Operations. Texas International Law Journal, 2015, vol. 50, pp. 233–275.
SAALBACH, Klaus-Peter. Attribution of Cyber Attacks. In: REUTER, C. (ed.). Information
Technology for Peace and Security. Springer Vieweg Wiesbaden, 2019.
SHANY, Yuval and SCHMITT, Michael, N. An International Attribution Mechanism for Hostile
Cyber Operations?. Hebrew University of Jerusalem Legal Studies Research Paper Series No. 20–16, 2020.
SCHMITT Michael, N. “Below the Threshold” Cyber Operations: The Countermeasures Response
Option and International Law. Virginia Journal of International Law, 2015, vol. 54, no. 1, pp. 697–732.
SCHMITT, Michael, N. et al. Tallinn Manual 2.0 on the International Law Applicable to Cyber
Operations. 2nd ed. Cambridge: Cambridge University Press, 2017, 638 p.
SCHMITT, Michael, N. Peacetime Cyber Responses and Wartime Cyber Operations Under International Law: an Analytical Vade Mecum. Harvard National Security Journal, 2017, vol. 8, no. 2, pp. 239–280.
SCHMITT, Michael, N. Terminological Precision and International Cyber Law. [online]. Available at: <https://lieber.westpoint.edu/terminological-precision-international-cyber-law/> Accessed: 24. 3. 2024.
SCHÖNDORF, Roy. Israel’s Perspective on Key Legal and Practical Issues Concerning the Application of International Law to Cyber Operations. International Law Studies, 2021, vol. 97, no. 1, pp. 395–406.
SILVER, Daniel, B. Computer Network Attack as a Use of Force Under Article 2(4) of the United Nations Charter. In: SCHMITT, Michael, N. and O’DONNELL, Brian, T. (eds.). Computer Network Attack & International Law. Newport: Naval War College, 2002, pp. 73–97.
SINGER, Peter, W. and FRIEDMAN, Allan. Cybersecurity and Cyberwar: What Everyone Needs to Know. New York: Oxford University Press, 2014, 320 p.
SKOPIK, Florian and PAHI, Timea. Under false flag: using technical artifacts for cyber attack attribution. Cybersecurity, 2020, vol. 3, pp. 1–20.
SPÁČIL, Jakub. Countermeasures against Cyber Operations: Moving forward?. International and Comparative Law Review, 2023, vol. 23, no. 2, pp. 86–110.
SPÁČIL, Jakub. Plea of Necessity: Legal Key to Protection against Unattributable Cyber Operations. Masaryk University Journal of Law and Technology, 2022, vol. 16, no. 2, pp. 215–239.
SVAČEK, Ondřej. Srebrenica: Nicaragua nebo Tadic? K subjektivnímu prvku mezinárodně protiprávního jednání. In. Olomouc: Vydavatelství Univerzity Palackého, 2007.
TSAGOURIAS, Nicholas and FARRELL, Michael. Cyber Attribution: Technical and Legal Approaches and Challenges. European Journal of International Law, 2020, vol. 31, no. 3, pp. 941–967.
VALUCH, Jozef and HAMUĽÁK, Ondrej. Use of Force in Cyberspace. International and Comparative Law Review, 2020, vol. 20, no. 2, pp. 174–191.
van der MEER, S. State-level responses to massive cyber-attacks: a policy toolbox. Clingendael: Netherlands Institute of International Relations, 2018, 8 p.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.