Private active cyber defense and (international) cyber security—pushing the line?
Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of...
Saved in:
Published in | Journal of cybersecurity (Oxford) Vol. 7; no. 1 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
Oxford
Oxford University Press
01.01.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2057-2085 2057-2093 |
DOI | 10.1093/cybsec/tyab010 |
Cover
Loading…
Abstract | Abstract
Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands. Generally, public-private governance solutions for security problems have to manage a balance between (i) questions of capacity and assigning responsibilities, (ii) the political legitimacy of public–private security solutions and (iii) the mitigation of their external effects. The case of private active cyber defence reveals a strong emphasis on addressing the domestic security (and political) problem, while failing to convincingly address the international security problems. The proposals aim to create a legitimate market for active cyber defence, anchored to the state through regulation and certification as a way to balance capacity, responsibilities and domestic political legitimacy. A major problem is that even though these reports anticipate international repercussions and political pushback, against what is likely be received internationally as an escalatory and provocative policy, they offer little to mitigate it. |
---|---|
AbstractList | Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands. Generally, public-private governance solutions for security problems have to manage a balance between (i) questions of capacity and assigning responsibilities, (ii) the political legitimacy of public–private security solutions and (iii) the mitigation of their external effects. The case of private active cyber defence reveals a strong emphasis on addressing the domestic security (and political) problem, while failing to convincingly address the international security problems. The proposals aim to create a legitimate market for active cyber defence, anchored to the state through regulation and certification as a way to balance capacity, responsibilities and domestic political legitimacy. A major problem is that even though these reports anticipate international repercussions and political pushback, against what is likely be received internationally as an escalatory and provocative policy, they offer little to mitigate it. Abstract Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the more provocative flag of ‘hack back’, in the American debate about cyber security. This article looks at the theory and practice of private cyber security provision and analyses in more detail a number of recent reports and publications on ACD by Washington DC based commissions and think tanks. Many of these propose legalizing forms of active cyber defence, in which private cyber security companies would be allowed to operate beyond their own, or their clients’ networks, and push beyond American law as it currently stands. Generally, public-private governance solutions for security problems have to manage a balance between (i) questions of capacity and assigning responsibilities, (ii) the political legitimacy of public–private security solutions and (iii) the mitigation of their external effects. The case of private active cyber defence reveals a strong emphasis on addressing the domestic security (and political) problem, while failing to convincingly address the international security problems. The proposals aim to create a legitimate market for active cyber defence, anchored to the state through regulation and certification as a way to balance capacity, responsibilities and domestic political legitimacy. A major problem is that even though these reports anticipate international repercussions and political pushback, against what is likely be received internationally as an escalatory and provocative policy, they offer little to mitigate it. |
Author | Broeders, Dennis |
Author_xml | – sequence: 1 givenname: Dennis orcidid: 0000-0002-8827-2814 surname: Broeders fullname: Broeders, Dennis email: d.w.j.broeders@fgga.leidenuniv.nl organization: The Hague Program for Cyber Norms, Institute of Security and Global Affairs, Leiden University, The Hague, The Netherlands |
BookMark | eNqFkE1Lw0AQhhdRsNZePQe82EPa2d18nkSKX1BQUM9hdzOxW-Km7m4Kufkj_IX-EqMpHgTxNMPM887He0T2TWOQkBMKMwo5n6tOOlRz3wkJFPbIiEGchqxv7f_kWXxIJs6tAYDmjEVpMiIP91ZvhcdAKK-3GPRz0AYlVmhcXzRlcKaNR2uE140R9XRH9Mtaq3338fa-ad1Km-fArzCotcHzY3JQidrhZBfH5Onq8nFxEy7vrm8XF8tQRZD5sEqAKo4qL5WCmEdSgIQoZaqSFZMxAsQJxjxJUy5pJhPJU8wyVZXIkPI04mNyOszd2Oa1ReeLddP2l9au4DTJ4yxhOeupaKCUbZyzWBVK--9vvBW6LigUXw4Wg4PFzsFeNvsl21j9Imz3t2A6CJp28x_7CcegiG4 |
CitedBy_id | crossref_primary_10_1016_j_technovation_2025_103219 crossref_primary_10_1365_s43439_022_00069_4 crossref_primary_10_20525_ijrbs_v12i7_2840 crossref_primary_10_1002_ffo2_208 crossref_primary_10_1080_23738871_2024_2436591 |
Cites_doi | 10.1093/jcsl/krw015 10.1093/acprof:oso/9780198295457.001.0001 10.1111/misr.12023 10.1111/j.1749-5687.2008.00060.x 10.1007/978-3-319-47852-4_17 10.1007/s10611-016-9653-3 10.1093/acprof:oso/9780190204792.001.0001 10.1080/10439463.2015.1072180 10.1007/s10551-012-1494-0 10.1057/9780230299290 10.1177/0305829811401459 10.17645/pag.v6i2.1324 10.12987/yale/9780300181357.001.0001 10.1109/MSP.2015.110 10.1017/9781316422724 10.1111/j.1468-2486.2009.00869.x 10.1016/j.ijcip.2009.08.006 10.1017/9781316822524 10.1080/13523260.2019.1677324 10.1111/1468-2346.12504 10.1017/CBO9780511611117 10.7208/chicago/9780226190174.001.0001 10.1111/1467-6478.00263 10.1111/rego.12125 10.1007/s10611-016-9649-z 10.1111/j.1748-5991.2010.01076.x 10.2307/j.ctt1trkjd1 10.1111/gove.12368 10.1111/gove.12309 10.1177/03058298050330030601 10.1177/1362480611410903 10.1515/9781400823260 10.1080/19331681.2020.1776658 10.1093/isr/viz044 |
ContentType | Journal Article |
Copyright | The Author(s) 2021. Published by Oxford University Press. 2021 The Author(s) 2021. Published by Oxford University Press. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: The Author(s) 2021. Published by Oxford University Press. 2021 – notice: The Author(s) 2021. Published by Oxford University Press. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | TOX AAYXX CITATION 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
DOI | 10.1093/cybsec/tyab010 |
DatabaseName | Oxford Journals Open Access Collection CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student ProQuest SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China |
DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: TOX name: Oxford Journals Open Access Collection url: https://academic.oup.com/journals/ sourceTypes: Publisher – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2057-2093 |
ExternalDocumentID | 10_1093_cybsec_tyab010 10.1093/cybsec/tyab010 |
GroupedDBID | 0R~ 5VS AAFWJ AAMVS AAOGV AAPPN AAPXW AAVAP ABPTD ABQLI ABXVV ACGFS ADBBV AENZO AFPKN AFULF ALMA_UNASSIGNED_HOLDINGS ALUQC ARCSS AVWKF BAYMD BCNDV BTTYL CIDKT EBS EJD GROUPED_DOAJ H13 IAO ICD IEA KQ8 KSI ML0 M~E O9- OAWHX OJQWA OK1 PEELM ROX RXO TOX AAYXX ABEJV ABGNP ADMLS AFKRA AMNDL ARAPS BENPR BGLVJ CCPQU CITATION HCIFZ IMI ITC K7- PHGZM PHGZT PIMPY 8FE 8FG ABUWG AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQGLB PQQKQ PQUKI PRINS |
ID | FETCH-LOGICAL-c408t-f601c3ec9dcc0534ba0b0472cfbf2b5e0056e536773b18b6b37e88cfde2e13743 |
IEDL.DBID | BENPR |
ISSN | 2057-2085 |
IngestDate | Fri Jul 25 22:04:12 EDT 2025 Thu Apr 24 23:06:10 EDT 2025 Tue Jul 01 01:31:26 EDT 2025 Wed Aug 28 03:17:32 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | public–private governance sovereignty cybersecurity active cyber defence capacity |
Language | English |
License | This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited. http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c408t-f601c3ec9dcc0534ba0b0472cfbf2b5e0056e536773b18b6b37e88cfde2e13743 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-8827-2814 |
OpenAccessLink | https://www.proquest.com/docview/3169586292?pq-origsite=%requestingapplication% |
PQID | 3169586292 |
PQPubID | 7121347 |
ParticipantIDs | proquest_journals_3169586292 crossref_citationtrail_10_1093_cybsec_tyab010 crossref_primary_10_1093_cybsec_tyab010 oup_primary_10_1093_cybsec_tyab010 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2021-01-01 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – month: 01 year: 2021 text: 2021-01-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Oxford |
PublicationPlace_xml | – name: Oxford |
PublicationTitle | Journal of cybersecurity (Oxford) |
PublicationYear | 2021 |
Publisher | Oxford University Press |
Publisher_xml | – name: Oxford University Press |
References | Harris (2021070819462539300_tyab010-B22) 2014 Scarpello (2021070819462539300_tyab010-B30) 2017; 19 Lachow (2021070819462539300_tyab010-B72) 2013 Buchanan (2021070819462539300_tyab010-B58) 2016 Chang (2021070819462539300_tyab010-B31) 2018; 12 France (2021070819462539300_tyab010-B83) 2018 Rabkin (2021070819462539300_tyab010-B78) 2016 Hoffman (2021070819462539300_tyab010-B76) 2017 Thompson (2021070819462539300_tyab010-B41) 1994 Broeders (2021070819462539300_tyab010-B54) 2020 Börzel (2021070819462539300_tyab010-B38) 2005 Schmitt (2021070819462539300_tyab010-B52) 2017 Broeders (2021070819462539300_tyab010-B48) 2019 Tan (2021070819462539300_tyab010-B67) 2012; 110 Weiss (2021070819462539300_tyab010-B26) 2019; 32 White (2021070819462539300_tyab010-B35) 2010 Abrahamsen (2021070819462539300_tyab010-B10) 2009; 3 Active Cyber Defense Certainty Act, H.R. 4036, 115th Cong (2021070819462539300_tyab010-B8) 2017 Gould (2021070819462539300_tyab010-B14) 2017; 27 Sobczak (2021070819462539300_tyab010-B69) 2018 Demchak (2021070819462539300_tyab010-B44) 2013 Rosenzweig (2021070819462539300_tyab010-B79) 2013; 50 Egloff (2021070819462539300_tyab010-B82) 2017 Dupont (2021070819462539300_tyab010-B34) 2017; 67 Börzel (2021070819462539300_tyab010-B37) 2010; 4 World Economic Forum (2021070819462539300_tyab010-B1) 2018 Loader (2021070819462539300_tyab010-B28) 2007 Sanger (2021070819462539300_tyab010-B80) 2018 Bossong (2021070819462539300_tyab010-B24) 2017; 67 Krasner (2021070819462539300_tyab010-B50) 1999 Maschmeyer (2021070819462539300_tyab010-B63) 2021; 18 Leander (2021070819462539300_tyab010-B13) 2005; 33 Nelson (2021070819462539300_tyab010-B75) 2018 Center for Cyber and Homeland Security (2021070819462539300_tyab010-B9) 2016 Broeders (2021070819462539300_tyab010-B17) 2015 Mueller (2021070819462539300_tyab010-B51) 2020 Dunn Cavelty (2021070819462539300_tyab010-B3) 2013; 15 Roguski (2021070819462539300_tyab010-B56) 2020 Arnold (2021070819462539300_tyab010-B5) 2015 Chesney (2021070819462539300_tyab010-B7) 2019 Schneier (2021070819462539300_tyab010-B84) 2014 DeNardis (2021070819462539300_tyab010-B19) 2014 Weber (2021070819462539300_tyab010-B40) 2004 Fisher (2021070819462539300_tyab010-B59) 2013 Scharpf (2021070819462539300_tyab010-B36) 1999 Nusca (2021070819462539300_tyab010-B62) 2011 Abrahamsen (2021070819462539300_tyab010-B11) 2011 Maurer (2021070819462539300_tyab010-B57) 2016; 21 Timberg (2021070819462539300_tyab010-B68) 2014 Creemers (2021070819462539300_tyab010-B46) 2020 Foundation for Defense of Democracies (2021070819462539300_tyab010-B71) 2020 Maurer (2021070819462539300_tyab010-B21) 2018 van Eeten (2021070819462539300_tyab010-B65) 2010 White (2021070819462539300_tyab010-B29) 2012; 16 Fire-Eye (2021070819462539300_tyab010-B81) 2018 Egloff (2021070819462539300_tyab010-B55) 2020; 41 Shearing (2021070819462539300_tyab010-B27) 2003; 30 De Carvalho (2021070819462539300_tyab010-B43) 2011; 39 Zarate (2021070819462539300_tyab010-B73) 2015 Deibert (2021070819462539300_tyab010-B18) 2013 Asghari (2021070819462539300_tyab010-B66) 2015; 13 Dunn Cavelty (2021070819462539300_tyab010-B4) 2009; 2 Carr (2021070819462539300_tyab010-B2) 2016; 92 Segal (2021070819462539300_tyab010-B49) 2018; 97 Ponta (2021070819462539300_tyab010-B60) 2020 Collier (2021070819462539300_tyab010-B16) 2018; 6 Broeders (2021070819462539300_tyab010-B53) 2017 Broeders (2021070819462539300_tyab010-B15) 2017 Lachow (2021070819462539300_tyab010-B20) 2018 Valeriano (2021070819462539300_tyab010-B32) 2015 Singer (2021070819462539300_tyab010-B12) 2003 Cook (2021070819462539300_tyab010-B61) 2018; 29 Kurowska (2021070819462539300_tyab010-B47) 2020 Boeke (2021070819462539300_tyab010-B25) 2018; 31 Garland (2021070819462539300_tyab010-B33) 2001 Schäferhoff (2021070819462539300_tyab010-B39) 2009; 11 Weidenbaum (2021070819462539300_tyab010-B70) 2008 Commission on the Theft of American Intellectual Property. The IP Commission Report. Washington DC: The IP Commission (2021070819462539300_tyab010-B74) 2013 Rosenzweig (2021070819462539300_tyab010-B77) 2017 Boeke (2021070819462539300_tyab010-B23) 2015 Zarate (2021070819462539300_tyab010-B6) 2015 Lewis (2021070819462539300_tyab010-B45) 2013 Kello (2021070819462539300_tyab010-B42) 2017 Healey (2021070819462539300_tyab010-B64) 2020 |
References_xml | – volume-title: The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data year: 2010 ident: 2021070819462539300_tyab010-B65 – volume: 21 start-page: 383 year: 2016 ident: 2021070819462539300_tyab010-B57 article-title: ‘Proxies’ and Cyberspace publication-title: J Confl Sec Law doi: 10.1093/jcsl/krw015 – volume: 29 start-page: 205 year: 2018 ident: 2021070819462539300_tyab010-B61 article-title: Cross-border data access and active cyber defense: assessing legislative options for a new international cyber security rulebook publication-title: Stanf Law Policy Rev – volume: 19 start-page: 407 year: 2017 ident: 2021070819462539300_tyab010-B30 article-title: Toward the political economy of plural policing: tacking stock of a burgeoning literature publication-title: Int Stud Rev – year: 2014 ident: 2021070819462539300_tyab010-B68 – volume-title: Governing Europe: Effective and Democratic? year: 1999 ident: 2021070819462539300_tyab010-B36 doi: 10.1093/acprof:oso/9780198295457.001.0001 – start-page: 251 year: 2020 ident: 2021070819462539300_tyab010-B64 – volume: 15 start-page: 105 year: 2013 ident: 2021070819462539300_tyab010-B3 article-title: From Cyber-bombs to political fallout: threat representations with an impact in the cyber-security discourse publication-title: Int Stud Rev doi: 10.1111/misr.12023 – volume: 3 start-page: 1 year: 2009 ident: 2021070819462539300_tyab010-B10 article-title: Security beyond the state: global security assemblages in international politics publication-title: Int Political Sociol doi: 10.1111/j.1749-5687.2008.00060.x – volume-title: Application of International Law to Cyber Operations: A Comparative Analysis of States’ Views year: 2020 ident: 2021070819462539300_tyab010-B56 – year: 2014 ident: 2021070819462539300_tyab010-B84 – start-page: 315 volume-title: The Responsibilities of Online Service Providers year: 2017 ident: 2021070819462539300_tyab010-B53 doi: 10.1007/978-3-319-47852-4_17 – volume: 97 start-page: 10 year: 2018 ident: 2021070819462539300_tyab010-B49 article-title: When China rules the web: technology in service of the state publication-title: Foreign Aff – volume: 67 start-page: 265 year: 2017 ident: 2021070819462539300_tyab010-B24 article-title: A typology of cybersecurity and public-private partnerships in the context of the EU publication-title: Crime Law Soc Change doi: 10.1007/s10611-016-9653-3 – volume-title: Cyber War versus Cyber Realities. Cyber Conflict in the International System year: 2015 ident: 2021070819462539300_tyab010-B32 doi: 10.1093/acprof:oso/9780190204792.001.0001 – volume: 27 start-page: 408 year: 2017 ident: 2021070819462539300_tyab010-B14 article-title: Global assemblages and counter-piracy: public and private maritime policing publication-title: Polic Soc doi: 10.1080/10439463.2015.1072180 – start-page: 231 volume-title: Understanding Cyber Conflict: Fourteen Analogies year: 2017 ident: 2021070819462539300_tyab010-B82 – volume-title: Security Beyond the State: Private Security in International Politics year: 2011 ident: 2021070819462539300_tyab010-B11 – year: 2018 ident: 2021070819462539300_tyab010-B69 – start-page: 69 year: 2015 ident: 2021070819462539300_tyab010-B23 – start-page: 85 volume-title: Governing Cyberspace: Behavior, Power, and Diplomacy year: 2020 ident: 2021070819462539300_tyab010-B47 – volume-title: Private Sector Cyber Defense, Can Active Measures Help Stabilize Cyberspace? year: 2017 ident: 2021070819462539300_tyab010-B76 – volume: 110 start-page: 469 year: 2012 ident: 2021070819462539300_tyab010-B67 article-title: Business under threat, technology under attack, ethics under fire: the experience of google in China publication-title: J Bus Ethics doi: 10.1007/s10551-012-1494-0 – volume-title: The Politics of Private Security year: 2010 ident: 2021070819462539300_tyab010-B35 doi: 10.1057/9780230299290 – volume: 39 start-page: 735 year: 2011 ident: 2021070819462539300_tyab010-B43 article-title: The big bangs of IR: the myths that your teachers still tell you about 1648 and 1919 publication-title: Millennium doi: 10.1177/0305829811401459 – volume: 6 start-page: 13 year: 2018 ident: 2021070819462539300_tyab010-B16 article-title: Cyber security assemblages: a framework for understanding the dynamic and contested nature of security provision publication-title: Politics Gov doi: 10.17645/pag.v6i2.1324 – start-page: 93 volume-title: Cyber Enabled Economic Warfare: An Evolving Challenge year: 2015 ident: 2021070819462539300_tyab010-B6 – volume-title: The Global War for Internet Governance year: 2014 ident: 2021070819462539300_tyab010-B19 doi: 10.12987/yale/9780300181357.001.0001 – volume: 13 start-page: 16 year: 2015 ident: 2021070819462539300_tyab010-B66 article-title: Economics of fighting botnets: lessons from a decade of mitigation publication-title: IEEE Secur Priv doi: 10.1109/MSP.2015.110 – volume-title: Cyber Mercenaries: The State, Hackers, and Power year: 2018 ident: 2021070819462539300_tyab010-B21 doi: 10.1017/9781316422724 – start-page: 107 volume-title: Governing cyberspace: behavior, power, and diplomacy year: 2020 ident: 2021070819462539300_tyab010-B46 – volume: 11 start-page: 451 year: 2009 ident: 2021070819462539300_tyab010-B39 article-title: Transnational public-private partnerships in international relations: making sense of concepts, research frameworks, and results publication-title: Int Stud Rev doi: 10.1111/j.1468-2486.2009.00869.x – year: 2020 ident: 2021070819462539300_tyab010-B71 – volume: 2 start-page: 179 year: 2009 ident: 2021070819462539300_tyab010-B4 article-title: Public-private partnerships are no silver bullet: an expanded governance model for critical infrastructure protection publication-title: Int J Crit Infrastruct Prot doi: 10.1016/j.ijcip.2009.08.006 – volume-title: The Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations year: 2017 ident: 2021070819462539300_tyab010-B52 doi: 10.1017/9781316822524 – volume: 41 start-page: 55 year: 2020 ident: 2021070819462539300_tyab010-B55 article-title: Contested public attributions of cyber incidents and the role of academia publication-title: Contemp Secur Policy doi: 10.1080/13523260.2019.1677324 – volume: 92 start-page: 43 year: 2016 ident: 2021070819462539300_tyab010-B2 article-title: Public-private partnerships in national cyber-security strategies publication-title: Int Aff doi: 10.1111/1468-2346.12504 – volume-title: @War: The Rise of the Military Industry Complex year: 2014 ident: 2021070819462539300_tyab010-B22 – volume-title: Civilizing Security year: 2007 ident: 2021070819462539300_tyab010-B28 doi: 10.1017/CBO9780511611117 – start-page: 29 year: 2013 ident: 2021070819462539300_tyab010-B44 article-title: Cyber Westphalia: asserting state prerogatives in cyberspace publication-title: Georget J Int Aff – volume: 50 start-page: 103 year: 2013 ident: 2021070819462539300_tyab010-B79 article-title: International Law and Private Actor Cyber Defensive Measures publication-title: Stanf J Int Law – volume-title: Culture of Control: Crime and Social Order in Contemporary Society year: 2001 ident: 2021070819462539300_tyab010-B33 doi: 10.7208/chicago/9780226190174.001.0001 – volume-title: Should the U.S. Allow Companies to ‘Hack Back’ Against Foreign Cyber Spies?. year: 2013 ident: 2021070819462539300_tyab010-B59 – start-page: 379 volume-title: Bytes, Bombs and Spies. The Strategic Dimensions of Offensive Cyber Operations year: 2018 ident: 2021070819462539300_tyab010-B20 – volume: 30 start-page: 400 year: 2003 ident: 2021070819462539300_tyab010-B27 article-title: Nodal governance, democracy, and the new ‘denizens’ publication-title: J Law Soc doi: 10.1111/1467-6478.00263 – year: 2019 ident: 2021070819462539300_tyab010-B7 – volume: 12 start-page: 101 year: 2018 ident: 2021070819462539300_tyab010-B31 article-title: Citizen co-production of cyber security: self-help, vigilantes and cybercrime publication-title: Regul Gov doi: 10.1111/rego.12125 – year: 2013 ident: 2021070819462539300_tyab010-B74 – volume: 67 start-page: 97 year: 2017 ident: 2021070819462539300_tyab010-B34 article-title: Bots, cops, and corporations: on the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime publication-title: Crime Law Soc Change doi: 10.1007/s10611-016-9649-z – volume-title: Active Cyber Defense, a Framework for Policy Makers year: 2013 ident: 2021070819462539300_tyab010-B72 – start-page: 195 volume-title: Complex Sovereignty: Reconstituting Political Authority in the 21st Century year: 2005 ident: 2021070819462539300_tyab010-B38 – volume-title: The Competition of Ideas: The World of the Washington Think Tanks year: 2008 ident: 2021070819462539300_tyab010-B70 – volume: 4 start-page: 113 year: 2010 ident: 2021070819462539300_tyab010-B37 article-title: Governance without a state. Can it work? publication-title: Regul Gov doi: 10.1111/j.1748-5991.2010.01076.x – start-page: 190 volume-title: The Virtual Weapon and International Order year: 2017 ident: 2021070819462539300_tyab010-B42 doi: 10.2307/j.ctt1trkjd1 – volume-title: Corporate Warriors: The Rise of Privatized Military Industry year: 2003 ident: 2021070819462539300_tyab010-B12 – volume: 32 start-page: 259 year: 2019 ident: 2021070819462539300_tyab010-B26 article-title: Securing cyberspace: how states design governance arrangements publication-title: Governance doi: 10.1111/gove.12368 – start-page: 38 year: 2017 ident: 2021070819462539300_tyab010-B15 article-title: The hybridization of cyber security governance: the emergence of global cyber security assemblages publication-title: Glob Policy Digit Debates – volume: 31 start-page: 449 year: 2018 ident: 2021070819462539300_tyab010-B25 article-title: National cyber crisis management: different European approaches publication-title: Governance doi: 10.1111/gove.12309 – volume-title: The Cybersecurity Dilemma: Hacking, Trust, and Fear between Nations year: 2016 ident: 2021070819462539300_tyab010-B58 – volume: 33 start-page: 803 year: 2005 ident: 2021070819462539300_tyab010-B13 article-title: The power to construct international security: on the significance of private military companies publication-title: Millenn J Int Stud doi: 10.1177/03058298050330030601 – year: 2015 ident: 2021070819462539300_tyab010-B5 – year: 2011 ident: 2021070819462539300_tyab010-B62 – year: 2020 ident: 2021070819462539300_tyab010-B60 – volume-title: The Perfect Weapon. War, Sabotage, and Fear in the Cyber Age year: 2018 ident: 2021070819462539300_tyab010-B80 – volume: 16 start-page: 85 year: 2012 ident: 2021070819462539300_tyab010-B29 article-title: The new political economy of private security publication-title: Theor Criminol doi: 10.1177/1362480611410903 – volume-title: Sovereignty: Organized Hypocrisy year: 1999 ident: 2021070819462539300_tyab010-B50 doi: 10.1515/9781400823260 – year: 2018 ident: 2021070819462539300_tyab010-B83 – volume-title: The Public Core of the Internet: An International Agenda for Internet Governance year: 2015 ident: 2021070819462539300_tyab010-B17 – volume-title: The Vocation Lectures. Science as a Vocation/Politics as a Vocation year: 2004 ident: 2021070819462539300_tyab010-B40 – volume-title: Next Steps for U.S. Cybersecurity in the Trump Administration: Active Cyber Defense year: 2017 ident: 2021070819462539300_tyab010-B77 – year: 2018 ident: 2021070819462539300_tyab010-B81 – year: 2018 ident: 2021070819462539300_tyab010-B75 – volume-title: Black Code. Inside the Battle for Cyber Space year: 2013 ident: 2021070819462539300_tyab010-B18 – volume-title: Regional Risks for Doing Business 2018 year: 2018 ident: 2021070819462539300_tyab010-B1 – volume-title: Coalition of the Unwilling? Chinese and Russian Perspectives on Cyberspace year: 2019 ident: 2021070819462539300_tyab010-B48 – volume: 18 start-page: 1 year: 2021 ident: 2021070819462539300_tyab010-B63 article-title: A tale of two cybers – how threat reporting by cybersecurity firms systematically underrepresents threats to civil society publication-title: J Inf Technol Politics doi: 10.1080/19331681.2020.1776658 – volume-title: Into the Gray Zone. The Private Sector and Active Defense against Cyber Threats year: 2016 ident: 2021070819462539300_tyab010-B9 – year: 2013 ident: 2021070819462539300_tyab010-B45 – year: 2017 ident: 2021070819462539300_tyab010-B8 – start-page: 779 year: 2020 ident: 2021070819462539300_tyab010-B51 article-title: Against sovereignty in cyberspace publication-title: Int Stud Rev doi: 10.1093/isr/viz044 – volume-title: The Cyber Financial Wars on the Horizon: The Convergence of Financial and Cyber Warfare and the Need for a 21st Century National Security Response year: 2015 ident: 2021070819462539300_tyab010-B73 – volume-title: Enhancing Network Security. A Cyber Strategy for the Next Administration year: 2016 ident: 2021070819462539300_tyab010-B78 – volume-title: Mercenaries, Pirates & Sovereigns year: 1994 ident: 2021070819462539300_tyab010-B41 – volume-title: Three Tales of Attribution in Cyberspace: Criminal Law, International Law and Policy Debates year: 2020 ident: 2021070819462539300_tyab010-B54 |
SSID | ssj0001922476 |
Score | 2.2286353 |
Snippet | Abstract
Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often... Private sector Active Cyber Defence (ACD) lies on the intersection of domestic security and international security and is a recurring subject, often under the... |
SourceID | proquest crossref oup |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
SubjectTerms | Cybersecurity Politics |
Title | Private active cyber defense and (international) cyber security—pushing the line? |
URI | https://www.proquest.com/docview/3169586292 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwhV1LSwMxEA62Xrz4Fqu1BBHUw9Ju9pWcikprEaxFW-ht2TwWBNnW7vbQmz_CX-gvcbKbbetBvexhMxCYZGa-mSTzIXQRBEwIYkvITahvuSxyLUbB8FxbQopLlE-krnc89v3eyH0Ye2NTcEvNtcrSJ-aOWk6ErpE3HdtnHsBvRtrTd0uzRunTVUOhUUGb4IIpJF-bt53-4HlVZWEQogqGOQAmliakXHZudJpiwVMlmtki4i39hHYtMv147Va65zzmdHfRtgGL-KZY3T20oZJ9tFMSMWBjlwfoZTDTJGUKR7n3wjAjDEsVQ44KPxOJr17XK3_XRiI15HVfH5_TeV6LwoAHsUae7UM06naGdz3LsCVYAvScWTGkVsJRgkkhwLJcHrW4bgUpYh4T7ind9FN5jh8EDrcp97kTKEpFLBVRtgNA4ghVk0mijhF29etUiOW-ZEo376EUUBkXriJxRLmUNWSVmgqFaSWuGS3ewuJI2wkLzYZGszV0uZSfFk00fpU8B8X_K1Qv1yU0FpeGq_1x8vfwKdoi-l5KXkapo2o2m6szABYZb6AK7d43zB5q5Ok5fIdP429-X9L9 |
linkProvider | ProQuest |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB2xHODCjigUsBAIOERt7DSxD6hCQClLKyRaqbcQL5GQUCm0CPXGR_AdfBRfwjgLhQNw4hpbSTQez7wZe-YBbAeBUIq6GmMT7jueiDxHcNx4nqsxxKXGp9rmOxpNv972zjuVzhi85bUw9lplbhMTQ63vlc2Rl5jriwrCb0GrvQfHskbZ09WcQiNViwszfMaQrX9wdozru0Np7aR1VHcyVgFH4f8MnBhDEMWMElop1EBPRmVpWyaqWMZUVoxtjmkqzA8CJl0ufckCw7mKtaHGZehw8b3jMOkxJuyO4rXTUU5HoENM-ewQBjmW_vKzTyQrqaHsG1UaDCNZtgW7X_zgt9q63BkkHq42BzMZNCWHqS7Nw5jpLsBsTvtAMiuwCNdXj5YSzZAosZUEv4jD2sQYEePDriZ7t1_zjPvZjH5Glff-8tp7SjJfBNEnsTi3ugTtf5HiMkx077tmBYhna2EROfhaGNsqiHPEgFJ5hsYRl1oXwMklFaqscbnlz7gL0wN0FqaSDTPJFmD3c34vbdnx48wtFPyfk4r5uoTZ_u6HI21c_X14E6bqrcZleHnWvFiDaWpvxCQJnCJMDB6fzDpCmoHcSPSIwM1_K-4Hqe4L_Q |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Private+active+cyber+defense+and+%28international%29+cyber+security%E2%80%94pushing+the+line%3F&rft.jtitle=Journal+of+cybersecurity+%28Oxford%29&rft.au=Broeders%2C+Dennis&rft.date=2021-01-01&rft.issn=2057-2085&rft.eissn=2057-2093&rft.volume=7&rft.issue=1&rft_id=info:doi/10.1093%2Fcybsec%2Ftyab010&rft.externalDBID=n%2Fa&rft.externalDocID=10_1093_cybsec_tyab010 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2057-2085&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2057-2085&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2057-2085&client=summon |