Inside the Enemy's Computer: Identifying Cyber-Attackers by Clement GuittonInside the Enemy's Computer: Identifying Cyber-Attackers by Clement Guitton

Inside the Enemy's Computer: Identifying Cyber-Attackers

byClement Guitton

Hardcover | September 1, 2017

Pricing and Purchase Info


Earn 224 plum® points

Prices and offers may vary in store


In stock online

Ships free on orders over $25

Not available in stores


Attribution - tracing those responsible for a cyber attack - is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approachingattribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based ontechnical evidence. In the national security context, decision-makers must analyze unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and power; in nationalsecurity cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role ofprivate companies, the standards of evidence, the role of time, and the plausible deniability of attacks.
Clement Guitton is a former analyst with the Department of Defence, Switzerland; he is now an assistant manager for cyber security at PwC.
Title:Inside the Enemy's Computer: Identifying Cyber-AttackersFormat:HardcoverDimensions:224 pages, 8.58 × 5.79 × 0.98 inPublished:September 1, 2017Publisher:Oxford University PressLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:019069999X

ISBN - 13:9780190699994

Look for similar items by category:


Editorial Reviews

"Inside the Enemy's Computer is a much-needed statement on the difficulties, and possibilities, of attributing cyber actions. Guitton provides a workable framework for moving forward on the issue, for both malicious criminal attacks as well as national security-related intrusions." --Brandon Valeriano, Reader in International Relations, Cardiff University, and author of Cyber War versus Cyber Realities