attribution
9 Articles

Does Russia Exercise Overall Control over the Wagner Group? Expert Q&A from Stockton Center’s Russia-Ukraine Conference
Use of the “overall control” test to attribute Wagner Group conduct to Russia is appealing, but considering the test’s application to other factual scenarios, there is some…

SolarWinds: Accountability, Attribution, and Advancing the Ball
Assessing the United States' actions on SolarWinds and what it means for global responses to malicious cyber activities in future.

Iraq’s Legal Responsibility for Militia Attacks on U.S. Forces: Paths Forward
"While Iran has significant control over the militias, Iraq also bears legal responsibility for illegal militia attacks against the coalition. This is because the militias, despite…

Knowns and Unknowns of US Syria Strike: Looming Int’l and Domestic Law Issues
Key legal questions that remain unanswered about the legality of the Syria strike under domestic and international law.

Legal Questions (and Some Answers) Concerning the U.S. Military Strike in Syria
Unpacking the right of self-defense under international law when it comes to use of force in response to a series of attacks.

“Strategic Silence” and State-Sponsored Hacking: The US Gov’t and SolarWinds
The absence to date of executive branch attribution and condemnation of the SolarWinds intrusions may be strategic silence—a tactic employed in the immediate aftermath of past…

The Netherlands Releases a Tour de Force on International Law in Cyberspace: Analysis
The Dutch make a major contribution to interpretation and application of international law in cyberspace with careful legal analysis on topics ranging from sovereignty to the use…

Cyberattack Attribution and the Virtues of Decentralization
In the midst of rising tensions between the United States and Iran over tanker attacks and Iran’s downing of a U.S. drone, reports emerged that U.S. Cyber Command had launched…

“Your Account May Have Been Targeted by State-Sponsored Actors”: Attribution and Evidence of State-Sponsored Cyberattacks
This post is the latest installment of our “Monday Reflections” feature, in which a different Just Security editor examines the big stories from the previous week or looks…
1-9 of 9 items