claim
Cyber intrusions can be routed through infected computers without the owners' permission, which decreases the verifiability of the attacker's origin.
Authors
Sources
- Rethinking Espionage in the Modern Era cjil.uchicago.edu via serper
Referenced by nodes (1)
- cyber intrusion concept