PROBLEM OF ATTRIBUTION OF CYBER-ATTACKS: POLITICAL ASPECTS

Authors

  • Ivana Damnjanović University of Belgrade - Faculty of Political Science

Keywords:

cyber-attacks, attribution, politics, retribution

Abstract

Purpose

In this paper the author aims to reconsider the problem of attribution of cyber-attacks, arguably one of the most important issues in cybersecurity, from the point of view of political science. The purpose is to show what are political aspects are involved in cyber-attacks and in the process of attribution and why they are important, from both academic and practical point of view.

Design/Methods/Approach

Drawing from the notion developed by Rid and Buchanan (2015), that the process of attribution is a techno-political problem, this paper will, through three chapters, consider motivation of cyber-attacks as an important criterion for classification, political aspects of the attribution process as well as politically important relationship between attribution and possible retribution for cyber-attacks. Starting from qualitative analysis of recent scholarly literature as well as available data on politically motivated cyber-attacks, the author will then use methods of induction and deduction, analysis and synthesis, to form the conclusions.

Findings

The main findings of the paper are identification of political aspects of the attribution process and their consequences. Unlike research that uses cyber-security approach and focuses on technical issues, this paper identifies political actors and political issues emerging in the attribution process, as well as those political actors who are to make decisions on the follow-up actions after the process is completed.

Originality/Value

While certain political aspects of the process of attribution of cyber-attacks have been considered in recent academic works, there seems to be no research focusing exclusively on this aspect, nor starting from the point of view of political science. Therefore, the originality of the proposed paper is both in its scope and its approach. Apart from scientific contribution, the value of the paper consists in production of tentative guidelines for state agencies tasked with dealing with the aftermath of cyber-attacks.

References

Bannet, J., Price, D. W., Rudys, A., Singer, J., & Wallach, D. S. (2004). Hack-a-vote: Security issues with electronic voting systems. IEEE Security & Privacy, 2(1), 32–37. DOI: 10.1109/MSECP.2004.1264851

Bilge, L., & Dumitraş, T. (2012). Before we knew it: An empirical study of zero-day attacks in the real world. Proceedings of the 2012 ACM conference on Computer and communications security. 833–844. DOI: 10.1145/2382196.2382284

Boebert, W. E. (2010). A survey of challenges in attribution. Proceedings of a workshop on Deterring CyberAttacks. 41–54.

Buchanan, B. (2020). The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics. Harvard: Harvard University Press.

Caltagirone, S., Pendergast, A., & Betz, C. (2013). The diamond model of intrusion analysis. Threat Connect, 298(0704), 1–61.

Clark, D. D., & Landau, S. (2011). Untangling attribution. Harvard National Security Journal, 2, 323.

Coleman, S. (2001). The transformation of citizenship. In B. Axford & R. Huggins (Eds.), New media and politics (pp. 109–126). London: Sage.

Dahan, M. (2013). Hacking for the homeland: Patriotic hackers versus hacktivists. Proceedings of the 8th International Conference on Information Warfare and Security: ICIW 2013, 51–57.

Damnjanović, I. (2009). Postoji li sajberterorizam? Politička revija, 8(1), 237–253. DOI: 10.22182/pr.1912009.13

Damnjanović, I. (2015). Polity Without Politics? Artificial Intelligence Versus Democracy: Lessons From Neal Asher’s Polity Universe. Bulletin of Science, Technology & Society, 35(3–4), 76–83. DOI: 10.1177/0270467615623877

Damnjanović, I. (2018). Politika i tehnologija: teorijski pristupi. Beograd: Udruženje Nauka i društvo.

Denning, D. E. (2010). Terror’s web: How the Internet is transforming terrorism. In: Y. Jewkes & M. Yar (Eds.), Handbook of Internet Crime (pp. 194–213). London: Routledge.

Denning, D. E. (2001, November 1). Is Cyber Terror Next? Items, http://essays.ssrc.org/sept11/essays/denning.htm

Edwards, B., Furnas, A., Forrest, S., & Axelrod, R. (2017). Strategic aspects of cyberattack, attribution, and blame. Proceedings of the National Academy of Sciences, 114(11), 2825–2830. DOI: 10.1073/pnas.1700442114

Giblin, R., & Doctorow, C. (2022). Chokepoint Capitalism: How Big Tech and Big Content Captured Creative Labor Markets and How We’ll Win Them Back. Boston: Beacon Press.

Delio, M. Hacktivism and How It Got Here. (2004, July 14). Wired. https://www.wired.com/2004/07/hacktivism-and-how-it-got-here/

Happa, J., & Fairclough, G. (2017). A Model to Facilitate Discussions About Cyber Attacks. In M. Taddeo & L. Glorioso (Eds.), Ethics and Policies for Cyber Operations: A NATO Cooperative Cyber Defence Centre of Excellence Initiative (pp. 169–185). Cham: Springer International Publishing. DOI: 10.1007/978-3-319-45300-2_10

Hathaway, O. A., Crootof, R., Levitz, P., Nix, H., Nowlan, A., Perdue, W., & Spiegel, J. (2012). The law of cyber-attack. California Law Review, 817–885.

International Strategy for Cyberspace: Prosperity, Security, and Openess in a Networked World. (2011). The White House. https://nsarchive.gwu.edu/document/20843-04

Iqbal, F., Debbabi, M., & Fung, B. C. M. (2020). Machine Learning for Authorship Attribution and Cyber Forensics. Cham: Springer International Publishing. DOI: 10.1007/978-3-030-61675-5

James, N. (2022, December 19). 160 Cybersecurity Statistics: Updated Report 2023. https://www.getastra.com/blog/security-audit/cyber-security-statistics/

Jordan, T., & Taylor, P. (2004). Hacktivism and Cyberwars: Rebels with a Cause? (1st edition). London: Routledge.

Lee, H. (2023). Public attribution in the US government: Implications for diplomacy and norms in cyberspace. Policy Design and Practice, 6(2), 198–216. DOI: 10.1080/25741292.2023.2199964

Liu, E. (2015). Al Qaeda Electronic: A Sleeping Dog. A Report by the Critical Threats Project of the American Enterprise Institute, 4–7. https://www.criticalthreats.org/analysis/al-qaeda-electronic-a-sleeping-dog

MacKenzie, D., & Wajcman, J. (1999). Introductory essay: The social shaping of technology. In D. MacKenzie & J. Wajcman, The Social Shaping of Technology (2nd ed., pp. 3–28). Maidenhead: Open University Press/McGraw-Hill.

Maurer, T. (2018). Cyber Mercenaries: The State, Hackers, and Power. Cambridge: Cambridge University Press. DOI: 10.1017/9781316422724

Nunes, E., Shakarian, P., Simari, G. I., & Ruef, A. (2018). Artificial Intelligence Tools for Cyber Attribution. Cham: Springer International Publishing. DOI: 10.1007/978-3-319-73788-1

Parish, M., & Madahar, B. (2016). Understanding Cyberspace Through Cyber Situational Awareness. Defence Science and Technology Laboratory Cyber and Information Systems Division.

Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37. DOI: 10.1080/01402390.2014.977382

Rid, T., & Buchanan, B. (2018). Hacking democracy. SAIS Review of International Affairs, 38 (1), 3–16.

Romagna, M. (2020). Hacktivism: Conceptualization, techniques, and historical view. In: T.J. Holt & A. M. Bossler (Eds.), The Palgrave Handbook of International Cybercrime and Cyberdeviance, 743–769.

Saalbach, K.-P. (2019). Attribution of Cyber Attacks. In: C. Reuter (Ed.), Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts, Crises, War, and Peace (pp. 279–303). Springer Fachmedien Wiesbaden. DOI: 10.1007/978-3-658-25652-4_13

Sandywell, B. (2010). On the globalisation of crime: The Internet and new criminality. Y. Jewkes & M. Yar (Eds.), Handbook of Internet Crime, 38–66. London: Routledge.

Shamsi, J. A., Zeadally, S., Sheikh, F., & Flowers, A. (2016). Attribution in cyberspace: Techniques and legal implications. Security and Communication Networks, 9(15), 2886–2900. DOI: 10.1002/sec.1485

Simeunović, D. (2009). Terorizam—Opšti deo. Beograd: Pravni fakultet Univerziteta u Beogradu.

Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., & Wu, Q. (2009). AVOIDIT: A cyber attack taxonomy. University of Memphis, Technical Report CS-09-003.

Stalans, L. J., & Donner, C. M. (2018). Explaining Why Cybercrime Occurs: Criminological and Psychological Theories. In: H. Jahankhani (Ed.), Cyber Criminology (pp. 25–45). Springer International Publishing. DOI: 10.1007/978-3-319-97181-0_2

Starodubtsev, Yu. I., Balenko, E. G., Vershennik, E. V., & Fedorov, V. H. (2020). Cyberspace: Terminology, Properties, Problems of Operation. 2020 International Multi-Conference on Industrial Engineering and Modern Technologies (FarEastCon), 1–3. DOI: 10.1109/FarEastCon50210.2020.9271282

Steffens, T. (2020). Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage. Cham: Springer. DOI:10.1007/978-3-662-61313-9

Street, J. (1992). Politics&Technology. New York: The Guilford Press.

Tsagourias, N. (2012). Cyber attacks, self-defence and the problem of attribution. Journal of Conflict and Security Law, 17(2), 229–244. DOI: 10.1093/jcsl/krs019

Uma, M., & Padmavathi, G. (2013). A survey on various cyber attacks and their classification. International Journal of Network Security, 15(5), 390–396.

Weimann, G. (2006). Terror on the Internet: The new arena, the new challenges. Washington: US Institute of Peace Press.

Weimann, G. (2016). Going dark: Terrorism on the dark web. Studies in Conflict & Terrorism, 39(3), 195–206. DOI: 10.1080/1057610X.2015.1119546

What is a cyberattack? (2022, February 18). | Chatham House – International Affairs Think Tank. https://www.chathamhouse.org/2022/02/what-cyber-attack

Zhuang, R., Bardas, A. G., DeLoach, S. A., & Ou, X. (2015). A theory of cyber attacks: A step towards analyzing MTD systems. Proceedings of the second ACM workshop on moving target defense. 11–20. DOI: 10.1145/2808475.2808478

Downloads

Published

2024-04-29

Issue

Section

Contemporary Challenges in Detecting and Proving Crime