Attribution in Cyberspace: Challenges for U.S. Law Enforcement

نویسنده

  • Kristin Finklea
چکیده

"Who did it?" Attribution, some may argue, is a challenge "as old as crime and punishment." In the cyber realm too, criminal attribution is a key delineating factor between cybercrime and other threats. When investigating a given incident, law enforcement is challenged with tracing the action to its source and determining whether the actor is a criminal or whether the actor may be a terrorist or state actor posing a potentially greater national security threat.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Disciplinary Challenges in Addiction Prevention through Countering the Distribution of Industrial Narcotics (A Case Study of Kermanshah Police Stations)

Objective: The aim of this study was to explain the disciplinary challenges in preventing addiction by countering the distribution of industrial narcotics in Kermanshah. Method: The present study was applied in terms of purpose and qualitative-quantitative in terms of methodology and nature. The statistical population in qualitative section included NAJA experts in Kermanshah province, and in q...

متن کامل

Protection of consumer rights in Cyberspace

Today’s civil law faced new challenges and situations for protecting human in role of consumer and also attention to industrial life growing made new branch of law called consumer law that have some positive result in all economic, social and political aspects like increasing household income, reduce conflict and tension between buyer and seller in society and increased public participation in ...

متن کامل

Practical Vulnerabilities of the Tor Anonymity Network

Onion routing is a technology designed at the U.S. Naval Research Laboratory to protect the security and privacy of network communications. In particular, Tor, the current widely-used onion routing system, was originally designed to protect intelligence gathering from open sources and to otherwise protect military communications over insecure or public networks, but it is also used by human rig...

متن کامل

Identification in Cyberspace as a Main Challenge of e-Government (A Legal Approach to e-Identity Management System)

The penetration and growth of the Internet, as a key technology of the 21st century, caused to some major changes in all individual and social aspects of human life. Some of these changes, which associated with the evolution and changes in the concepts, including legal and political ones, have become a challenge. Identity as a legal and Government as a political concepts are in those fields whi...

متن کامل

Justifiability of State Surveillance of the Internet as E-Security Mechanism

The purpose of this paper is to investigate the legal justifiability of measures contained in state surveillance laws pertaining to the Internet. Prior to the terrorist attack on the United States of America (U.S.) on 11 September 2001, the concept ‘surveillance’ was nothing new and is indeed as old as human society. As far back as the sixteenth century the first central state surveillance appe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015