Private active cyber defense and (international) cyber security—pushing the line?

Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of...

Full description

Saved in:
Bibliographic Details
Published inJournal of cybersecurity (Oxford) Vol. 7; no. 1
Main Author Broeders, Dennis
Format Journal Article
LanguageEnglish
Published Oxford Oxford University Press 01.01.2021
Subjects
Online AccessGet full text
ISSN2057-2085
2057-2093
DOI10.1093/cybsec/tyab010

Cover

Loading…
Abstract Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands. Generally, public-private governance solutions for security problems have to manage a balance between (i) questions of capacity and assigning responsibilities, (ii) the political legitimacy of public–private security solutions and (iii) the mitigation of their external effects. The case of private active cyber defence reveals a strong emphasis on addressing the domestic security (and political) problem, while failing to convincingly address the international security problems. The proposals aim to create a legitimate market for active cyber defence, anchored to the state through regulation and certification as a way to balance capacity, responsibilities and domestic political legitimacy. A major problem is that even though these reports anticipate international repercussions and political pushback, against what is likely be received internationally as an escalatory and provocative policy, they offer little to mitigate it.
AbstractList Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands. Generally, public-private governance solutions for security problems have to manage a balance between (i) questions of capacity and assigning responsibilities, (ii) the political legitimacy of public–private security solutions and (iii) the mitigation of their external effects. The case of private active cyber defence reveals a strong emphasis on addressing the domestic security (and political) problem, while failing to convincingly address the international security problems. The proposals aim to create a legitimate market for active cyber defence, anchored to the state through regulation and certification as a way to balance capacity, responsibilities and domestic political legitimacy. A major problem is that even though these reports anticipate international repercussions and political pushback, against what is likely be received internationally as an escalatory and provocative policy, they offer little to mitigate it.
Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands. Generally, public-private governance solutions for security problems have to manage a balance between (i) questions of capacity and assigning responsibilities, (ii) the political legitimacy of public–private security solutions and (iii) the mitigation of their external effects. The case of private active cyber defence reveals a strong emphasis on addressing the domestic security (and political) problem, while failing to convincingly address the international security problems. The proposals aim to create a legitimate market for active cyber defence, anchored to the state through regulation and certification as a way to balance capacity, responsibilities and domestic political legitimacy. A major problem is that even though these reports anticipate international repercussions and political pushback, against what is likely be received internationally as an escalatory and provocative policy, they offer little to mitigate it.
Author Broeders, Dennis
Author_xml – sequence: 1
  givenname: Dennis
  orcidid: 0000-0002-8827-2814
  surname: Broeders
  fullname: Broeders, Dennis
  email: d.w.j.broeders@fgga.leidenuniv.nl
  organization: The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands
BookMark eNqFkE1Lw0AQhhdRsNZePQe82EPa2d18nkSKX1BQUM9hdzOxW-Km7m4Kufkj_IX-EqMpHgTxNMPM887He0T2TWOQkBMKMwo5n6tOOlRz3wkJFPbIiEGchqxv7f_kWXxIJs6tAYDmjEVpMiIP91ZvhcdAKK-3GPRz0AYlVmhcXzRlcKaNR2uE140R9XRH9Mtaq3338fa-ad1Km-fArzCotcHzY3JQidrhZBfH5Onq8nFxEy7vrm8XF8tQRZD5sEqAKo4qL5WCmEdSgIQoZaqSFZMxAsQJxjxJUy5pJhPJU8wyVZXIkPI04mNyOszd2Oa1ReeLddP2l9au4DTJ4yxhOeupaKCUbZyzWBVK--9vvBW6LigUXw4Wg4PFzsFeNvsl21j9Imz3t2A6CJp28x_7CcegiG4
CitedBy_id crossref_primary_10_1016_j_technovation_2025_103219
crossref_primary_10_1365_s43439_022_00069_4
crossref_primary_10_20525_ijrbs_v12i7_2840
crossref_primary_10_1002_ffo2_208
crossref_primary_10_1080_23738871_2024_2436591
Cites_doi 10.1093/jcsl/krw015
10.1093/acprof:oso/9780198295457.001.0001
10.1111/misr.12023
10.1111/j.1749-5687.2008.00060.x
10.1007/978-3-319-47852-4_17
10.1007/s10611-016-9653-3
10.1093/acprof:oso/9780190204792.001.0001
10.1080/10439463.2015.1072180
10.1007/s10551-012-1494-0
10.1057/9780230299290
10.1177/0305829811401459
10.17645/pag.v6i2.1324
10.12987/yale/9780300181357.001.0001
10.1109/MSP.2015.110
10.1017/9781316422724
10.1111/j.1468-2486.2009.00869.x
10.1016/j.ijcip.2009.08.006
10.1017/9781316822524
10.1080/13523260.2019.1677324
10.1111/1468-2346.12504
10.1017/CBO9780511611117
10.7208/chicago/9780226190174.001.0001
10.1111/1467-6478.00263
10.1111/rego.12125
10.1007/s10611-016-9649-z
10.1111/j.1748-5991.2010.01076.x
10.2307/j.ctt1trkjd1
10.1111/gove.12368
10.1111/gove.12309
10.1177/03058298050330030601
10.1177/1362480611410903
10.1515/9781400823260
10.1080/19331681.2020.1776658
10.1093/isr/viz044
ContentType Journal Article
Copyright The Author(s) 2021. Published by Oxford University Press. 2021
The Author(s) 2021. Published by Oxford University Press. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2021. Published by Oxford University Press. 2021
– notice: The Author(s) 2021. Published by Oxford University Press. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID TOX
AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
DOI 10.1093/cybsec/tyab010
DatabaseName Oxford Journals Open Access Collection
CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
ProQuest SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database
CrossRef

Database_xml – sequence: 1
  dbid: TOX
  name: Oxford Journals Open Access Collection
  url: https://academic.oup.com/journals/
  sourceTypes: Publisher
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2057-2093
ExternalDocumentID 10_1093_cybsec_tyab010
10.1093/cybsec/tyab010
GroupedDBID 0R~
5VS
AAFWJ
AAMVS
AAOGV
AAPPN
AAPXW
AAVAP
ABPTD
ABQLI
ABXVV
ACGFS
ADBBV
AENZO
AFPKN
AFULF
ALMA_UNASSIGNED_HOLDINGS
ALUQC
ARCSS
AVWKF
BAYMD
BCNDV
BTTYL
CIDKT
EBS
EJD
GROUPED_DOAJ
H13
IAO
ICD
IEA
KQ8
KSI
ML0
M~E
O9-
OAWHX
OJQWA
OK1
PEELM
ROX
RXO
TOX
AAYXX
ABEJV
ABGNP
ADMLS
AFKRA
AMNDL
ARAPS
BENPR
BGLVJ
CCPQU
CITATION
HCIFZ
IMI
ITC
K7-
PHGZM
PHGZT
PIMPY
8FE
8FG
ABUWG
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c408t-f601c3ec9dcc0534ba0b0472cfbf2b5e0056e536773b18b6b37e88cfde2e13743
IEDL.DBID BENPR
ISSN 2057-2085
IngestDate Fri Jul 25 22:04:12 EDT 2025
Thu Apr 24 23:06:10 EDT 2025
Tue Jul 01 01:31:26 EDT 2025
Wed Aug 28 03:17:32 EDT 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords public–private governance
sovereignty
cybersecurity
active cyber defence
capacity
Language English
License This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.
http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c408t-f601c3ec9dcc0534ba0b0472cfbf2b5e0056e536773b18b6b37e88cfde2e13743
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-8827-2814
OpenAccessLink https://www.proquest.com/docview/3169586292?pq-origsite=%requestingapplication%
PQID 3169586292
PQPubID 7121347
ParticipantIDs proquest_journals_3169586292
crossref_citationtrail_10_1093_cybsec_tyab010
crossref_primary_10_1093_cybsec_tyab010
oup_primary_10_1093_cybsec_tyab010
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-01-01
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-01-01
  day: 01
PublicationDecade 2020
PublicationPlace Oxford
PublicationPlace_xml – name: Oxford
PublicationTitle Journal of cybersecurity (Oxford)
PublicationYear 2021
Publisher Oxford University Press
Publisher_xml – name: Oxford University Press
References Harris (2021070819462539300_tyab010-B22) 2014
Scarpello (2021070819462539300_tyab010-B30) 2017; 19
Lachow (2021070819462539300_tyab010-B72) 2013
Buchanan (2021070819462539300_tyab010-B58) 2016
Chang (2021070819462539300_tyab010-B31) 2018; 12
France (2021070819462539300_tyab010-B83) 2018
Rabkin (2021070819462539300_tyab010-B78) 2016
Hoffman (2021070819462539300_tyab010-B76) 2017
Thompson (2021070819462539300_tyab010-B41) 1994
Broeders (2021070819462539300_tyab010-B54) 2020
Börzel (2021070819462539300_tyab010-B38) 2005
Schmitt (2021070819462539300_tyab010-B52) 2017
Broeders (2021070819462539300_tyab010-B48) 2019
Tan (2021070819462539300_tyab010-B67) 2012; 110
Weiss (2021070819462539300_tyab010-B26) 2019; 32
White (2021070819462539300_tyab010-B35) 2010
Abrahamsen (2021070819462539300_tyab010-B10) 2009; 3
Active Cyber Defense Certainty Act, H.R. 4036, 115th Cong (2021070819462539300_tyab010-B8) 2017
Gould (2021070819462539300_tyab010-B14) 2017; 27
Sobczak (2021070819462539300_tyab010-B69) 2018
Demchak (2021070819462539300_tyab010-B44) 2013
Rosenzweig (2021070819462539300_tyab010-B79) 2013; 50
Egloff (2021070819462539300_tyab010-B82) 2017
Dupont (2021070819462539300_tyab010-B34) 2017; 67
Börzel (2021070819462539300_tyab010-B37) 2010; 4
World Economic Forum (2021070819462539300_tyab010-B1) 2018
Loader (2021070819462539300_tyab010-B28) 2007
Sanger (2021070819462539300_tyab010-B80) 2018
Bossong (2021070819462539300_tyab010-B24) 2017; 67
Krasner (2021070819462539300_tyab010-B50) 1999
Maschmeyer (2021070819462539300_tyab010-B63) 2021; 18
Leander (2021070819462539300_tyab010-B13) 2005; 33
Nelson (2021070819462539300_tyab010-B75) 2018
Center for Cyber and Homeland Security (2021070819462539300_tyab010-B9) 2016
Broeders (2021070819462539300_tyab010-B17) 2015
Mueller (2021070819462539300_tyab010-B51) 2020
Dunn Cavelty (2021070819462539300_tyab010-B3) 2013; 15
Roguski (2021070819462539300_tyab010-B56) 2020
Arnold (2021070819462539300_tyab010-B5) 2015
Chesney (2021070819462539300_tyab010-B7) 2019
Schneier (2021070819462539300_tyab010-B84) 2014
DeNardis (2021070819462539300_tyab010-B19) 2014
Weber (2021070819462539300_tyab010-B40) 2004
Fisher (2021070819462539300_tyab010-B59) 2013
Scharpf (2021070819462539300_tyab010-B36) 1999
Nusca (2021070819462539300_tyab010-B62) 2011
Abrahamsen (2021070819462539300_tyab010-B11) 2011
Maurer (2021070819462539300_tyab010-B57) 2016; 21
Timberg (2021070819462539300_tyab010-B68) 2014
Creemers (2021070819462539300_tyab010-B46) 2020
Foundation for Defense of Democracies (2021070819462539300_tyab010-B71) 2020
Maurer (2021070819462539300_tyab010-B21) 2018
van Eeten (2021070819462539300_tyab010-B65) 2010
White (2021070819462539300_tyab010-B29) 2012; 16
Fire-Eye (2021070819462539300_tyab010-B81) 2018
Egloff (2021070819462539300_tyab010-B55) 2020; 41
Shearing (2021070819462539300_tyab010-B27) 2003; 30
De Carvalho (2021070819462539300_tyab010-B43) 2011; 39
Zarate (2021070819462539300_tyab010-B73) 2015
Deibert (2021070819462539300_tyab010-B18) 2013
Asghari (2021070819462539300_tyab010-B66) 2015; 13
Dunn Cavelty (2021070819462539300_tyab010-B4) 2009; 2
Carr (2021070819462539300_tyab010-B2) 2016; 92
Segal (2021070819462539300_tyab010-B49) 2018; 97
Ponta (2021070819462539300_tyab010-B60) 2020
Collier (2021070819462539300_tyab010-B16) 2018; 6
Broeders (2021070819462539300_tyab010-B53) 2017
Broeders (2021070819462539300_tyab010-B15) 2017
Lachow (2021070819462539300_tyab010-B20) 2018
Valeriano (2021070819462539300_tyab010-B32) 2015
Singer (2021070819462539300_tyab010-B12) 2003
Cook (2021070819462539300_tyab010-B61) 2018; 29
Kurowska (2021070819462539300_tyab010-B47) 2020
Boeke (2021070819462539300_tyab010-B25) 2018; 31
Garland (2021070819462539300_tyab010-B33) 2001
Schäferhoff (2021070819462539300_tyab010-B39) 2009; 11
Weidenbaum (2021070819462539300_tyab010-B70) 2008
Commission on the Theft of American Intellectual Property. The IP Commission Report. Washington DC: The IP Commission (2021070819462539300_tyab010-B74) 2013
Rosenzweig (2021070819462539300_tyab010-B77) 2017
Boeke (2021070819462539300_tyab010-B23) 2015
Zarate (2021070819462539300_tyab010-B6) 2015
Lewis (2021070819462539300_tyab010-B45) 2013
Kello (2021070819462539300_tyab010-B42) 2017
Healey (2021070819462539300_tyab010-B64) 2020
References_xml – volume-title: The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data
  year: 2010
  ident: 2021070819462539300_tyab010-B65
– volume: 21
  start-page: 383
  year: 2016
  ident: 2021070819462539300_tyab010-B57
  article-title: ‘Proxies’ and Cyberspace
  publication-title: J Confl Sec Law
  doi: 10.1093/jcsl/krw015
– volume: 29
  start-page: 205
  year: 2018
  ident: 2021070819462539300_tyab010-B61
  article-title: Cross-border data access and active cyber defense: assessing legislative options for a new international cyber security rulebook
  publication-title: Stanf Law Policy Rev
– volume: 19
  start-page: 407
  year: 2017
  ident: 2021070819462539300_tyab010-B30
  article-title: Toward the political economy of plural policing: tacking stock of a burgeoning literature
  publication-title: Int Stud Rev
– year: 2014
  ident: 2021070819462539300_tyab010-B68
– volume-title: Governing Europe: Effective and Democratic?
  year: 1999
  ident: 2021070819462539300_tyab010-B36
  doi: 10.1093/acprof:oso/9780198295457.001.0001
– start-page: 251
  year: 2020
  ident: 2021070819462539300_tyab010-B64
– volume: 15
  start-page: 105
  year: 2013
  ident: 2021070819462539300_tyab010-B3
  article-title: From Cyber-bombs to political fallout: threat representations with an impact in the cyber-security discourse
  publication-title: Int Stud Rev
  doi: 10.1111/misr.12023
– volume: 3
  start-page: 1
  year: 2009
  ident: 2021070819462539300_tyab010-B10
  article-title: Security beyond the state: global security assemblages in international politics
  publication-title: Int Political Sociol
  doi: 10.1111/j.1749-5687.2008.00060.x
– volume-title: Application of International Law to Cyber Operations: A Comparative Analysis of States’ Views
  year: 2020
  ident: 2021070819462539300_tyab010-B56
– year: 2014
  ident: 2021070819462539300_tyab010-B84
– start-page: 315
  volume-title: The Responsibilities of Online Service Providers
  year: 2017
  ident: 2021070819462539300_tyab010-B53
  doi: 10.1007/978-3-319-47852-4_17
– volume: 97
  start-page: 10
  year: 2018
  ident: 2021070819462539300_tyab010-B49
  article-title: When China rules the web: technology in service of the state
  publication-title: Foreign Aff
– volume: 67
  start-page: 265
  year: 2017
  ident: 2021070819462539300_tyab010-B24
  article-title: A typology of cybersecurity and public-private partnerships in the context of the EU
  publication-title: Crime Law Soc Change
  doi: 10.1007/s10611-016-9653-3
– volume-title: Cyber War versus Cyber Realities. Cyber Conflict in the International System
  year: 2015
  ident: 2021070819462539300_tyab010-B32
  doi: 10.1093/acprof:oso/9780190204792.001.0001
– volume: 27
  start-page: 408
  year: 2017
  ident: 2021070819462539300_tyab010-B14
  article-title: Global assemblages and counter-piracy: public and private maritime policing
  publication-title: Polic Soc
  doi: 10.1080/10439463.2015.1072180
– start-page: 231
  volume-title: Understanding Cyber Conflict: Fourteen Analogies
  year: 2017
  ident: 2021070819462539300_tyab010-B82
– volume-title: Security Beyond the State: Private Security in International Politics
  year: 2011
  ident: 2021070819462539300_tyab010-B11
– year: 2018
  ident: 2021070819462539300_tyab010-B69
– start-page: 69
  year: 2015
  ident: 2021070819462539300_tyab010-B23
– start-page: 85
  volume-title: Governing Cyberspace: Behavior, Power, and Diplomacy
  year: 2020
  ident: 2021070819462539300_tyab010-B47
– volume-title: Private Sector Cyber Defense, Can Active Measures Help Stabilize Cyberspace?
  year: 2017
  ident: 2021070819462539300_tyab010-B76
– volume: 110
  start-page: 469
  year: 2012
  ident: 2021070819462539300_tyab010-B67
  article-title: Business under threat, technology under attack, ethics under fire: the experience of google in China
  publication-title: J Bus Ethics
  doi: 10.1007/s10551-012-1494-0
– volume-title: The Politics of Private Security
  year: 2010
  ident: 2021070819462539300_tyab010-B35
  doi: 10.1057/9780230299290
– volume: 39
  start-page: 735
  year: 2011
  ident: 2021070819462539300_tyab010-B43
  article-title: The big bangs of IR: the myths that your teachers still tell you about 1648 and 1919
  publication-title: Millennium
  doi: 10.1177/0305829811401459
– volume: 6
  start-page: 13
  year: 2018
  ident: 2021070819462539300_tyab010-B16
  article-title: Cyber security assemblages: a framework for understanding the dynamic and contested nature of security provision
  publication-title: Politics Gov
  doi: 10.17645/pag.v6i2.1324
– start-page: 93
  volume-title: Cyber Enabled Economic Warfare: An Evolving Challenge
  year: 2015
  ident: 2021070819462539300_tyab010-B6
– volume-title: The Global War for Internet Governance
  year: 2014
  ident: 2021070819462539300_tyab010-B19
  doi: 10.12987/yale/9780300181357.001.0001
– volume: 13
  start-page: 16
  year: 2015
  ident: 2021070819462539300_tyab010-B66
  article-title: Economics of fighting botnets: lessons from a decade of mitigation
  publication-title: IEEE Secur Priv
  doi: 10.1109/MSP.2015.110
– volume-title: Cyber Mercenaries: The State, Hackers, and Power
  year: 2018
  ident: 2021070819462539300_tyab010-B21
  doi: 10.1017/9781316422724
– start-page: 107
  volume-title: Governing cyberspace: behavior, power, and diplomacy
  year: 2020
  ident: 2021070819462539300_tyab010-B46
– volume: 11
  start-page: 451
  year: 2009
  ident: 2021070819462539300_tyab010-B39
  article-title: Transnational public-private partnerships in international relations: making sense of concepts, research frameworks, and results
  publication-title: Int Stud Rev
  doi: 10.1111/j.1468-2486.2009.00869.x
– year: 2020
  ident: 2021070819462539300_tyab010-B71
– volume: 2
  start-page: 179
  year: 2009
  ident: 2021070819462539300_tyab010-B4
  article-title: Public-private partnerships are no silver bullet: an expanded governance model for critical infrastructure protection
  publication-title: Int J Crit Infrastruct Prot
  doi: 10.1016/j.ijcip.2009.08.006
– volume-title: The Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations
  year: 2017
  ident: 2021070819462539300_tyab010-B52
  doi: 10.1017/9781316822524
– volume: 41
  start-page: 55
  year: 2020
  ident: 2021070819462539300_tyab010-B55
  article-title: Contested public attributions of cyber incidents and the role of academia
  publication-title: Contemp Secur Policy
  doi: 10.1080/13523260.2019.1677324
– volume: 92
  start-page: 43
  year: 2016
  ident: 2021070819462539300_tyab010-B2
  article-title: Public-private partnerships in national cyber-security strategies
  publication-title: Int Aff
  doi: 10.1111/1468-2346.12504
– volume-title: @War: The Rise of the Military Industry Complex
  year: 2014
  ident: 2021070819462539300_tyab010-B22
– volume-title: Civilizing Security
  year: 2007
  ident: 2021070819462539300_tyab010-B28
  doi: 10.1017/CBO9780511611117
– start-page: 29
  year: 2013
  ident: 2021070819462539300_tyab010-B44
  article-title: Cyber Westphalia: asserting state prerogatives in cyberspace
  publication-title: Georget J Int Aff
– volume: 50
  start-page: 103
  year: 2013
  ident: 2021070819462539300_tyab010-B79
  article-title: International Law and Private Actor Cyber Defensive Measures
  publication-title: Stanf J Int Law
– volume-title: Culture of Control: Crime and Social Order in Contemporary Society
  year: 2001
  ident: 2021070819462539300_tyab010-B33
  doi: 10.7208/chicago/9780226190174.001.0001
– volume-title: Should the U.S. Allow Companies to ‘Hack Back’ Against Foreign Cyber Spies?.
  year: 2013
  ident: 2021070819462539300_tyab010-B59
– start-page: 379
  volume-title: Bytes, Bombs and Spies. The Strategic Dimensions of Offensive Cyber Operations
  year: 2018
  ident: 2021070819462539300_tyab010-B20
– volume: 30
  start-page: 400
  year: 2003
  ident: 2021070819462539300_tyab010-B27
  article-title: Nodal governance, democracy, and the new ‘denizens’
  publication-title: J Law Soc
  doi: 10.1111/1467-6478.00263
– year: 2019
  ident: 2021070819462539300_tyab010-B7
– volume: 12
  start-page: 101
  year: 2018
  ident: 2021070819462539300_tyab010-B31
  article-title: Citizen co-production of cyber security: self-help, vigilantes and cybercrime
  publication-title: Regul Gov
  doi: 10.1111/rego.12125
– year: 2013
  ident: 2021070819462539300_tyab010-B74
– volume: 67
  start-page: 97
  year: 2017
  ident: 2021070819462539300_tyab010-B34
  article-title: Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime
  publication-title: Crime Law Soc Change
  doi: 10.1007/s10611-016-9649-z
– volume-title: Active Cyber Defense, a Framework for Policy Makers
  year: 2013
  ident: 2021070819462539300_tyab010-B72
– start-page: 195
  volume-title: Complex Sovereignty: Reconstituting Political Authority in the 21st Century
  year: 2005
  ident: 2021070819462539300_tyab010-B38
– volume-title: The Competition of Ideas: The World of the Washington Think Tanks
  year: 2008
  ident: 2021070819462539300_tyab010-B70
– volume: 4
  start-page: 113
  year: 2010
  ident: 2021070819462539300_tyab010-B37
  article-title: Governance without a state. Can it work?
  publication-title: Regul Gov
  doi: 10.1111/j.1748-5991.2010.01076.x
– start-page: 190
  volume-title: The Virtual Weapon and International Order
  year: 2017
  ident: 2021070819462539300_tyab010-B42
  doi: 10.2307/j.ctt1trkjd1
– volume-title: Corporate Warriors: The Rise of Privatized Military Industry
  year: 2003
  ident: 2021070819462539300_tyab010-B12
– volume: 32
  start-page: 259
  year: 2019
  ident: 2021070819462539300_tyab010-B26
  article-title: Securing cyberspace: how states design governance arrangements
  publication-title: Governance
  doi: 10.1111/gove.12368
– start-page: 38
  year: 2017
  ident: 2021070819462539300_tyab010-B15
  article-title: The hybridization of cyber security governance: the emergence of global cyber security assemblages
  publication-title: Glob Policy Digit Debates
– volume: 31
  start-page: 449
  year: 2018
  ident: 2021070819462539300_tyab010-B25
  article-title: National cyber crisis management: different European approaches
  publication-title: Governance
  doi: 10.1111/gove.12309
– volume-title: The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations
  year: 2016
  ident: 2021070819462539300_tyab010-B58
– volume: 33
  start-page: 803
  year: 2005
  ident: 2021070819462539300_tyab010-B13
  article-title: The power to construct international security: on the significance of private military companies
  publication-title: Millenn J Int Stud
  doi: 10.1177/03058298050330030601
– year: 2015
  ident: 2021070819462539300_tyab010-B5
– year: 2011
  ident: 2021070819462539300_tyab010-B62
– year: 2020
  ident: 2021070819462539300_tyab010-B60
– volume-title: The Perfect Weapon. War, Sabotage, and Fear in the Cyber Age
  year: 2018
  ident: 2021070819462539300_tyab010-B80
– volume: 16
  start-page: 85
  year: 2012
  ident: 2021070819462539300_tyab010-B29
  article-title: The new political economy of private security
  publication-title: Theor Criminol
  doi: 10.1177/1362480611410903
– volume-title: Sovereignty: Organized Hypocrisy
  year: 1999
  ident: 2021070819462539300_tyab010-B50
  doi: 10.1515/9781400823260
– year: 2018
  ident: 2021070819462539300_tyab010-B83
– volume-title: The Public Core of the Internet: An International Agenda for Internet Governance
  year: 2015
  ident: 2021070819462539300_tyab010-B17
– volume-title: The Vocation Lectures. Science as a Vocation/Politics as a Vocation
  year: 2004
  ident: 2021070819462539300_tyab010-B40
– volume-title: Next Steps for U.S. Cybersecurity in the Trump Administration: Active Cyber Defense
  year: 2017
  ident: 2021070819462539300_tyab010-B77
– year: 2018
  ident: 2021070819462539300_tyab010-B81
– year: 2018
  ident: 2021070819462539300_tyab010-B75
– volume-title: Black Code. Inside the Battle for Cyber Space
  year: 2013
  ident: 2021070819462539300_tyab010-B18
– volume-title: Regional Risks for Doing Business 2018
  year: 2018
  ident: 2021070819462539300_tyab010-B1
– volume-title: Coalition of the Unwilling? Chinese and Russian Perspectives on Cyberspace
  year: 2019
  ident: 2021070819462539300_tyab010-B48
– volume: 18
  start-page: 1
  year: 2021
  ident: 2021070819462539300_tyab010-B63
  article-title: A tale of two cybers – how threat reporting by cybersecurity firms systematically underrepresents threats to civil society
  publication-title: J Inf Technol Politics
  doi: 10.1080/19331681.2020.1776658
– volume-title: Into the Gray Zone. The Private Sector and Active Defense against Cyber Threats
  year: 2016
  ident: 2021070819462539300_tyab010-B9
– year: 2013
  ident: 2021070819462539300_tyab010-B45
– year: 2017
  ident: 2021070819462539300_tyab010-B8
– start-page: 779
  year: 2020
  ident: 2021070819462539300_tyab010-B51
  article-title: Against sovereignty in cyberspace
  publication-title: Int Stud Rev
  doi: 10.1093/isr/viz044
– volume-title: The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response
  year: 2015
  ident: 2021070819462539300_tyab010-B73
– volume-title: Enhancing Network Security. A Cyber Strategy for the Next Administration
  year: 2016
  ident: 2021070819462539300_tyab010-B78
– volume-title: Mercenaries, Pirates & Sovereigns
  year: 1994
  ident: 2021070819462539300_tyab010-B41
– volume-title: Three Tales of Attribution in Cyberspace: Criminal Law, International Law and Policy Debates
  year: 2020
  ident: 2021070819462539300_tyab010-B54
SSID ssj0001922476
Score 2.2286353
Snippet Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often...
Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the...
SourceID proquest
crossref
oup
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
SubjectTerms Cybersecurity
Politics
Title Private active cyber defense and (international) cyber security—pushing the line?
URI https://www.proquest.com/docview/3169586292
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LSwMxEA62Xrz4Fqu1BBHUw9Ju9pWcikprEaxFW-ht2TwWBNnW7vbQmz_CX-gvcbKbbetBvexhMxCYZGa-mSTzIXQRBEwIYkvITahvuSxyLUbB8FxbQopLlE-krnc89v3eyH0Ye2NTcEvNtcrSJ-aOWk6ErpE3HdtnHsBvRtrTd0uzRunTVUOhUUGb4IIpJF-bt53-4HlVZWEQogqGOQAmliakXHZudJpiwVMlmtki4i39hHYtMv147Va65zzmdHfRtgGL-KZY3T20oZJ9tFMSMWBjlwfoZTDTJGUKR7n3wjAjDEsVQ44KPxOJr17XK3_XRiI15HVfH5_TeV6LwoAHsUae7UM06naGdz3LsCVYAvScWTGkVsJRgkkhwLJcHrW4bgUpYh4T7ind9FN5jh8EDrcp97kTKEpFLBVRtgNA4ghVk0mijhF29etUiOW-ZEo376EUUBkXriJxRLmUNWSVmgqFaSWuGS3ewuJI2wkLzYZGszV0uZSfFk00fpU8B8X_K1Qv1yU0FpeGq_1x8vfwKdoi-l5KXkapo2o2m6szABYZb6AK7d43zB5q5Ok5fIdP429-X9L9
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2xHODCjigUsBAIOERt7DSxD6hCQClLKyRaqbcQL5GQUCm0CPXGR_AdfBRfwjgLhQNw4hpbSTQez7wZe-YBbAeBUIq6GmMT7jueiDxHcNx4nqsxxKXGp9rmOxpNv972zjuVzhi85bUw9lplbhMTQ63vlc2Rl5jriwrCb0GrvQfHskbZ09WcQiNViwszfMaQrX9wdozru0Np7aR1VHcyVgFH4f8MnBhDEMWMElop1EBPRmVpWyaqWMZUVoxtjmkqzA8CJl0ufckCw7mKtaHGZehw8b3jMOkxJuyO4rXTUU5HoENM-ewQBjmW_vKzTyQrqaHsG1UaDCNZtgW7X_zgt9q63BkkHq42BzMZNCWHqS7Nw5jpLsBsTvtAMiuwCNdXj5YSzZAosZUEv4jD2sQYEePDriZ7t1_zjPvZjH5Glff-8tp7SjJfBNEnsTi3ugTtf5HiMkx077tmBYhna2EROfhaGNsqiHPEgFJ5hsYRl1oXwMklFaqscbnlz7gL0wN0FqaSDTPJFmD3c34vbdnx48wtFPyfk4r5uoTZ_u6HI21c_X14E6bqrcZleHnWvFiDaWpvxCQJnCJMDB6fzDpCmoHcSPSIwM1_K-4Hqe4L_Q
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Private+active+cyber+defense+and+%28international%29+cyber+security%E2%80%94pushing+the+line%3F&rft.jtitle=Journal+of+cybersecurity+%28Oxford%29&rft.au=Broeders%2C+Dennis&rft.date=2021-01-01&rft.issn=2057-2085&rft.eissn=2057-2093&rft.volume=7&rft.issue=1&rft_id=info:doi/10.1093%2Fcybsec%2Ftyab010&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_cybsec_tyab010
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2057-2085&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2057-2085&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2057-2085&client=summon