Optimizing Lawful Responses to Cyber Intrusions

dc.contributor.authorWingfield, Thomas C.
dc.contributor.authorMichael, James B.
dc.contributor.authorWijesekera, Duminda
dc.date2005-06
dc.date.accessioned2022-06-30T23:57:38Z
dc.date.available2022-06-30T23:57:38Z
dc.date.issued2005-06
dc.description.abstractCyber intrusions are rarely met with the most effective possible response, less for technical than legal reasons. Different rogue actors (terrorists, criminals, spies, etc.) are governed by overlapping but separate domestic and international legal regimes. Each of these regimes has unique limitations, but also offers unique opportunities for evidence collection, intelligence gathering, and use of force. We propose a framework which automates the mechanistic aspects of the decision-making process, with human intervention for only those legal judgments that necessitate human judgment and official responsibility. The basis of our framework is a pair of decision trees, one executable solely by the threatened system, the other by the attorneys responsible for the lawful pursuit of the intruders. These parallel decision trees are interconnected, and contain pre-distilled legal resources for making an objective, principled determination at each decision point. We offer an open-source development strategy for realizing and maintaining the framework.
dc.identifier.urihttps://hdl.handle.net/10945/70076
dc.language.isoen
dc.publisherNaval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleOptimizing Lawful Responses to Cyber Intrusionsen US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Wingfield_Thomas_C-Michael_James_B-Wijesekera_Duminda_Optimizing_Lawful_Responses_to_Cyber_Intrusions_2005-06.pdf
Size:
255.12 KB
Format:
Adobe Portable Document Format
Collections