Earlier this morning I watched William Gibson tweeting about attribution decay:
To which I replied that:
attribution can be seen as a signal and therefore behave accordingly
The cyber warfare literature is full of writings on the demand for proper attribution and the problems it poses when action (kinetic or not) is needed. However I have not yet seen a proper term describing the (instinctive) strategy employed by attackers who want to leave no proper attribution trace behind (usually hopping from system to system). “Attribution decay” seems to fit perfectly.