Coding

Making Cyber Attribution More Transparent

Following the example of Intrusion Truth, governments should substantiate their attribution statements that identify the perpetrators of malicious cyber operations with open-source intelligence, argues Eugenio Benincasa in this issue of the CSS Policy Perspectives series.

by Sophie Berdoz
(Image: Dado Ruvic / Reuters)
JavaScript has been disabled in your browser