At light speed: Attribution and response to cybercrime/terrorism/warfare

被引:0
|
作者
Brenner, Susan W. [1 ]
机构
[1] Univ Dayton, Sch Law, Dayton, OH 45469 USA
来源
JOURNAL OF CRIMINAL LAW & CRIMINOLOGY | 2007年 / 97卷 / 02期
关键词
D O I
暂无
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
This Article explains why and how computer technology complicates the related processes of identifying internal (crime and terrorism) and external (war) threats to social order of responding to those threats. First, it divides the process-attribution-into two categories: what-attribution (what kind of attack is this?) and who-attribution (who is responsible for this attack?). Then, it analyzes, in detail, how and why our adversaries' use of computer technology blurs the distinctions between what is now cybercrime, cyberterrorism, and cyberwarfare. The Article goes on to analyze how and why computer technology and the blurring of these distinctions erode our ability to mount an effective response to threats of either type. Finally, it explores ways in which we can modify how we currently divide responsibility for identifying and responding to the three threat categories among law enforcement and the military, respectively. The goal here is to identify techniques we can use to improve attribution and response processes for emerging cyberthreats.
引用
收藏
页码:379 / 475
页数:97
相关论文
共 50 条
  • [21] Hybrid warfare and counter-terrorism medicine
    Tin, Derrick
    Barten, Dennis G. G.
    Granholm, Fredrik
    Kovtonyuk, Pavlo
    Burkle, Frederick M. M.
    Ciottone, Gregory R. R.
    EUROPEAN JOURNAL OF TRAUMA AND EMERGENCY SURGERY, 2023, 49 (02) : 589 - 593
  • [22] On Western Terrorism: From Hiroshima to Drone Warfare
    Simbirski, Brian
    POLITICAL STUDIES REVIEW, 2015, 13 (02) : 279 - 279
  • [23] ITALY - AUTONOMIA - FROM TERRORISM TO GUERRILLA WARFARE
    PIPERNO, F
    SEMIOTEXTE, 1980, 3 (03): : 220 - 227
  • [24] An evaluation of bioregulators/modulators as terrorism and warfare agents
    Bokan, S
    Orahovec, Z
    TECHNOLOGY FOR COMBATING WMD TERRORISM, 2004, 174 : 29 - 40
  • [25] The Emergence of Cybercrime and the Legal Response
    Alexander, George
    JOURNAL OF APPLIED SECURITY RESEARCH, 2007, 2 (02) : 47 - 79
  • [26] Light warfare
    Hecht, Jeff
    NEW SCIENTIST, 2015, 226 (3025) : 24 - 25
  • [27] Dark Figure of Cybercrime: Bringing it into the Light
    Petrishcheva, Natalia
    Baybarin, Andrey
    Grebenkov, Alexander
    Sinyaeva, Maria
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 4411 - 4418
  • [28] Chemical attribution of chemical warfare agents for forensic purposes
    Noort, Daniel
    Van der Schans, Marcel
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2017, 253
  • [29] Terrorism and DeepFake: from Hybrid Warfare to Post-Truth Warfare in a Hybrid World
    Antinori, Arije
    PROCEEDINGS OF THE EUROPEAN CONFERENCE ON THE IMPACT OF ARTIFICIAL INTELLIGENCE AND ROBOTICS (ECIAIR 2019), 2019, : 23 - 30
  • [30] Habits Attribution and Digital Evidence Object Models Based Tool for Cybercrime Investigation
    Grigaliunas, Sarunas
    Toldinas, Jevgenijus
    BALTIC JOURNAL OF MODERN COMPUTING, 2020, 8 (02): : 275 - 292