ABSTRACT

This chapter emphasizes the limitations of the efforts pursued by the United States and the United Kingdom as they try to map, mitigate, and deter hostile threats to government, private industry, individual computer systems, and cloud services. The author argues that cyber deterrence needs to be built on agreed red lines between nation states. Upholding the rule of law within and between states in areas of cybercrime and cyber espionage is essential to determine these red lines. This process should involve government agencies as well as civil society and private industry to be successful.