Summary: Identifying the attacker is the key to modern military defense, so one can launch a reprisal or counter-strike. But attributing cyberattacks is difficult because nothing in cyberspace has to look like anything familiar. How do you attribute a weapon that was created out of thin air and used by an enemy that has no physical location? Links to other chapters of this series are at the end.
Article deleted at author’s request.
(5) For More Information
See the Wikipedia entry for more information about forensic science.
See all posts about Cyber-espionage and Cyber-war.