Book contents
- Cyber Operations and International Law
- Cambridge Studies in International and Comparative Law: 146
- Cyber Operations and International Law
- Copyright page
- Contents
- Abbreviations
- 1 Does International Law Matter in Cyberspace?
- Part I Attribution
- 2 Attribution to a Machine or a Human: A Technical Process
- 3 The Question of Evidence: From Technical to Legal Attribution
- 4 Attribution to a State
- Part I – Conclusion
- Part II The Lawfulness of Cyber Operations
- Part III Remedies against State-Sponsored Cyber Operations
- 11 Conclusion
- Appendix Table Assessing the Lawfulness of Cyber Operations and Potential Responses
- Select Bibliography
- Index
- Cambridge Studies in International and Comparative Law
2 - Attribution to a Machine or a Human: A Technical Process
from Part I - Attribution
Published online by Cambridge University Press: 28 February 2020
- Cyber Operations and International Law
- Cambridge Studies in International and Comparative Law: 146
- Cyber Operations and International Law
- Copyright page
- Contents
- Abbreviations
- 1 Does International Law Matter in Cyberspace?
- Part I Attribution
- 2 Attribution to a Machine or a Human: A Technical Process
- 3 The Question of Evidence: From Technical to Legal Attribution
- 4 Attribution to a State
- Part I – Conclusion
- Part II The Lawfulness of Cyber Operations
- Part III Remedies against State-Sponsored Cyber Operations
- 11 Conclusion
- Appendix Table Assessing the Lawfulness of Cyber Operations and Potential Responses
- Select Bibliography
- Index
- Cambridge Studies in International and Comparative Law
Summary
The perpetration of a cyber operation implies the involvement of one or more human perpetrators and computer systems. On the one hand, computer systems may be used for the creation, launch or transit of cyber operations. On the other, there is always a human involved in the perpetration of cyber operations, even when they imply a large level of automation. This observation is also true for state-conducted or state-sponsored cyber operations. As an abstract entity, a State must rely on human perpetrators to act on its behalf. This chapter, dedicated to the question of attribution, thus focuses on attribution to computer systems and to the individuals involved in the creation, launch or transit of cyber operations. These attribution processes are mainly technical and based on forensic analysis.
- Type
- Chapter
- Information
- Cyber Operations and International Law , pp. 55 - 86Publisher: Cambridge University PressPrint publication year: 2020