{"title":"美国政府的公共归属:对网络空间外交和规范的影响","authors":"H. Lee","doi":"10.1080/25741292.2023.2199964","DOIUrl":null,"url":null,"abstract":"Abstract In recent years, states have publicly assigned responsibility for cyber incidents to state adversaries with increasing frequency. While emerging scholarship provides insight into the strategic rationale for public cyber attribution, the literature lacks a rigorous understanding of when and under what circumstances states publicly attribute cyber incidents in practice. This paper seeks to address this gap by providing an empirical study of public cyber attribution by the US government from 2010–2020. Based on an original dataset, I find that US government actors publicly attribute cyber incidents through four distinct “channels”–criminal, technical, official policy, and unofficial policy. The purpose, timing, and state subject of attribution appear to vary consistently by channel, while organizational interests and channel-specific factors shape the context in which public attribution takes place. The lack of a unified approach creates challenges for US diplomacy—as adversaries may misperceive attributions as reflecting a whole-of-government agenda—and informs the normative environment of cyber operations in ways potentially unanticipated by individual agencies.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":"6 1","pages":"198 - 216"},"PeriodicalIF":3.1000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Public attribution in the US government: implications for diplomacy and norms in cyberspace\",\"authors\":\"H. Lee\",\"doi\":\"10.1080/25741292.2023.2199964\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract In recent years, states have publicly assigned responsibility for cyber incidents to state adversaries with increasing frequency. While emerging scholarship provides insight into the strategic rationale for public cyber attribution, the literature lacks a rigorous understanding of when and under what circumstances states publicly attribute cyber incidents in practice. This paper seeks to address this gap by providing an empirical study of public cyber attribution by the US government from 2010–2020. Based on an original dataset, I find that US government actors publicly attribute cyber incidents through four distinct “channels”–criminal, technical, official policy, and unofficial policy. The purpose, timing, and state subject of attribution appear to vary consistently by channel, while organizational interests and channel-specific factors shape the context in which public attribution takes place. The lack of a unified approach creates challenges for US diplomacy—as adversaries may misperceive attributions as reflecting a whole-of-government agenda—and informs the normative environment of cyber operations in ways potentially unanticipated by individual agencies.\",\"PeriodicalId\":20397,\"journal\":{\"name\":\"Policy Design and Practice\",\"volume\":\"6 1\",\"pages\":\"198 - 216\"},\"PeriodicalIF\":3.1000,\"publicationDate\":\"2023-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Policy Design and Practice\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/25741292.2023.2199964\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PUBLIC ADMINISTRATION\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Policy Design and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/25741292.2023.2199964","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PUBLIC ADMINISTRATION","Score":null,"Total":0}
Public attribution in the US government: implications for diplomacy and norms in cyberspace
Abstract In recent years, states have publicly assigned responsibility for cyber incidents to state adversaries with increasing frequency. While emerging scholarship provides insight into the strategic rationale for public cyber attribution, the literature lacks a rigorous understanding of when and under what circumstances states publicly attribute cyber incidents in practice. This paper seeks to address this gap by providing an empirical study of public cyber attribution by the US government from 2010–2020. Based on an original dataset, I find that US government actors publicly attribute cyber incidents through four distinct “channels”–criminal, technical, official policy, and unofficial policy. The purpose, timing, and state subject of attribution appear to vary consistently by channel, while organizational interests and channel-specific factors shape the context in which public attribution takes place. The lack of a unified approach creates challenges for US diplomacy—as adversaries may misperceive attributions as reflecting a whole-of-government agenda—and informs the normative environment of cyber operations in ways potentially unanticipated by individual agencies.