Public Attribution of Cyber Intrusions
dc.contributor.author
Egloff, Florian
dc.date.accessioned
2020-09-28T09:11:52Z
dc.date.available
2020-09-25T08:33:45Z
dc.date.available
2020-09-28T09:11:52Z
dc.date.issued
2020
dc.identifier.other
10.1093/cybsec/tyaa012
en_US
dc.identifier.uri
http://hdl.handle.net/20.500.11850/442557
dc.identifier.doi
10.3929/ethz-b-000442557
dc.description.abstract
Attribution is central to the debate on how to respond to cyber intrusions. The policy challenge is increasingly moving from identifying who is behind a cyber intrusion to finding the adequate policy response, including whether to publicly attribute. The article examines the use of public attribution as a political strategy for attaining specific political effects beyond the dyadic attacker–victim relationship, including shaping the operational and normative environment of cyber operations, with the potential to exert an independent deterrent effect. My analysis unfolds in three parts. The first part introduces two core concepts—sense-making and meaning-making—to capture different parts of the attribution process. I then introduce a theoretical understanding of public attribution drawing on the literature on revealing covert activity and argue that public attribution can serve the function of defining a particular interaction order, i.e. shape the rules of the ‘game’. In part two and three I discuss two empirical examples of both concepts. I bring to the fore three observations: First, some states have shifted their policy responses from dealing with individual cyber intrusions to responding in a broader political framework of relations with a specific adversary leading to campaign-like responses. Second, the political decision whether to attribute publicly is not only a signal to the adversary, but also aims at shaping the future political and normative operational environment. Third, such norm shaping has the potential to exert an independent—though limited—deterrent effect, particularly on potential adversaries. The analysis demonstrates the importance of the meaning-making process to understanding the politics of attribution and the rewards of theoretically integrating it into the politics of secrecy and exposure of covert activities of states.
en_US
dc.format
application/pdf
en_US
dc.language.iso
en
en_US
dc.publisher
Oxford University Press
dc.rights.uri
http://creativecommons.org/licenses/by/4.0/
dc.subject
cyber security
en_US
dc.subject
attribution
en_US
dc.subject
public attribution
en_US
dc.subject
signals intelligence
en_US
dc.subject
national security policy
en_US
dc.subject
intelligence policy
en_US
dc.title
Public Attribution of Cyber Intrusions
en_US
dc.type
Journal Article
dc.rights.license
Creative Commons Attribution 4.0 International
dc.date.published
2020-09-14
ethz.journal.title
Journal of Cybersecurity
ethz.journal.volume
6
en_US
ethz.journal.issue
1
en_US
ethz.pages.start
tyaa012
en_US
ethz.size
12 p.
en_US
ethz.version.deposit
publishedVersion
en_US
ethz.identifier.wos
ethz.publication.place
Oxford
ethz.publication.status
published
en_US
ethz.leitzahl
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02045 - Dep. Geistes-, Sozial- u. Staatswiss. / Dep. of Humanities, Social and Pol.Sc.::03515 - Wenger, Andreas / Wenger, Andreas
en_US
ethz.leitzahl.certified
ETH Zürich::00002 - ETH Zürich::00012 - Lehre und Forschung::00007 - Departemente::02045 - Dep. Geistes-, Sozial- u. Staatswiss. / Dep. of Humanities, Social and Pol.Sc.::03515 - Wenger, Andreas / Wenger, Andreas
en_US
ethz.date.deposited
2020-09-25T08:33:53Z
ethz.source
FORM
ethz.eth
yes
en_US
ethz.availability
Open access
en_US
ethz.rosetta.installDate
2020-09-28T09:12:02Z
ethz.rosetta.lastUpdated
2022-03-29T03:13:26Z
ethz.rosetta.exportRequired
true
ethz.rosetta.versionExported
true
ethz.COinS
ctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.atitle=Public%20Attribution%20of%20Cyber%20Intrusions&rft.jtitle=Journal%20of%20Cybersecurity&rft.date=2020&rft.volume=6&rft.issue=1&rft.spage=tyaa012&rft.au=Egloff,%20Florian&rft.genre=article&rft_id=info:doi/10.1093/cybsec/tyaa012&
Dateien zu diesem Eintrag
Publikationstyp
-
Journal Article [121987]