Summary: After a major attack there is a difficult and often delicate task of threat attribution: determining the person or organization behind the attack.
Summary: After a major attack there is a difficult and often delicate task of threat attribution: determining the person or organization behind the attack.