• Research
  • Emissary
  • About
  • Experts
Carnegie Global logoCarnegie lettermark logo
DemocracyIran
  • Donate
{
  "authors": [
    "Wyatt Hoffman",
    "Ariel (Eli) Levite"
  ],
  "type": "other",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace"
  ],
  "collections": [],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie Endowment for International Peace",
  "programAffiliation": "NPP",
  "programs": [
    "Nuclear Policy"
  ],
  "projects": [],
  "regions": [],
  "topics": [
    "Security",
    "Nuclear Policy",
    "Technology"
  ]
}

Source: Getty

Other

Rethinking Corporate Active Cyber Defense

The practice of active cyber defense moves the debate over the role of and limits on corporate self-defense in cyberspace beyond the theoretical and into reality.

Link Copied
By Wyatt Hoffman and Ariel (Eli) Levite
Published on Jul 17, 2017
Program mobile hero image

Program

Nuclear Policy

The Nuclear Policy Program aims to reduce the risk of nuclear war. Our experts diagnose acute risks stemming from technical and geopolitical developments, generate pragmatic solutions, and use our global network to advance risk-reduction policies. Our work covers deterrence, disarmament, arms control, nonproliferation, and nuclear energy.

Learn More

Source: Lawfare

The recent WannaCry and NotPetya global cyber incidents have fueled the debate already raging over the role of and limits on corporate self-defense in cyberspace. The emerging international practice of “active cyber defense” (ACD) moves this debate beyond the merely theoretical realm. Private sector active defense potentially shifts the balance in favor of defenders and would improve companies’ ability to complicate and disrupt attacks and mitigate damages. Enhancing private sector defense might also deter future attacks by denying gains and imposing costs to attackers, including by making it easier for law enforcement to identify and punish attackers. Cumulatively, the impact could significantly alter the calculus of malicious actors.

However, aggressive active defense measures—including, most controversially, “hacking back” into attackers’ networks—carry significant risks to the defender and innocent third parties. The risk is especially pronounced if the defender is ill-equipped to attribute the attack and control its effects. The potentially systemically destabilizing effects of unrestrained conduct of active defense internationally lead opponents to warn that it is akin to unleashing the “wild west” in cyberspace.

Self-Restraint among Private Security Contractors: What Can ACD Learn from Somali Piracy?

In reality, much of this debate is academic. A nascent international “gray” market for active cyber defense services (including hacking back) already exists. The growth of private sector ACD mirrors a similar development in maritime security: the shipping industry’s adoption of private armed guards in response to the escalating threat from Somali piracy. By the late 2000s, even huge naval deployments were unable to provide sufficient defense to shipping vessels. Private maritime security contractors left many governments struggling to belatedly impose order where little prevented or discouraged the private sector from turning to its own means of defense. But through the combined efforts of ship-owners, maritime insurers, and private maritime security providers, the private sector was to implement a credible and responsible solution that defused the threat.

The same factors that catalyzed the rise of private maritime security contractors are pervading the cyber domain. Rather than continuing to debate whether to allow the practice of ACD, it is time to consider how to responsibly and credibly place ACD in the corporate tool kit. Wherever possible, this approach should draw on established private sector self-regulation mechanisms, including insurance-based solutions.

Elements of a Strategy for Managing ACD

In a recently released report by the Carnegie Endowment’s Cyber Policy Initiative, we acknowledge that ACD is not a panacea, but submit that it would be a valuable addition to both international and corporate security. Its value is contingent on the creation of principles and requirements to manage the practice of active cyber defense. Consider the follow few examples.

First, the private sector should be allowed to employ only a limited spectrum of active cyber defenses. Measures carrying unacceptable risk, such as destructive hack backs, should be impermissible. The acceptable purposes of ACD activity should be similarly circumscribed to defense and mitigating damage, instead of retribution.

Second, only competent and qualified defenders should undertake active cyber defense.  Legitimate ACD could be gauged to an organizations’ maturity level through a variety of means including a professional accreditation system.

Third, flexible mechanisms are needed to incentivize principled ACD conduct by the private sector. Cyber insurance is well-suited to play a role in an industry-driven approach to regulating private sector ACD based on the maturity level of the practitioners.

Fourth, whatever balance is struck, principles must work toward international harmonization. Uneven approaches between countries may disadvantage those attempting to promote norms of restraint and reward those who disregard them (while raising serious extradition issues).

The U.S. Should Not Ignore the Global Context

Finally, our report underscores the risks inherent in the U.S. going it alone. Continuing to prohibit private sector active cyber defense entirely leaves law-abiding corporations vulnerable while rewarding those that circumvent restrictions or outsource active defense services. On the other hand, creating an overly permissive environment without international norms could increase tensions with other countries, including by opening the door to criticism that the U.S. is promoting vigilantism. We should not forget the striking lessons from several traumatic centuries of privateering before the maritime domain was pacified. The U.S. would be well-advised to adopt a cautious, evolutionary approach to the ACD domain – harmonized internationally and tailored to experience and evolving technology.

This article was originally published in Lawfare

About the Authors

Wyatt Hoffman

Former Senior Research Analyst, Cyber Policy Initiative

Wyatt Hoffman was a senior research analyst with the Nuclear Policy Program and the Cyber Policy Initiative at the Carnegie Endowment for International Peace.

Ariel (Eli) Levite

Senior Fellow, Nuclear Policy Program, Technology and International Affairs Program

Levite was the principal deputy director general for policy at the Israeli Atomic Energy Commission from 2002 to 2007.

Authors

Wyatt Hoffman
Former Senior Research Analyst, Cyber Policy Initiative
Ariel (Eli) Levite
Senior Fellow, Nuclear Policy Program, Technology and International Affairs Program
Ariel (Eli) Levite
SecurityNuclear PolicyTechnology

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Endowment for International Peace

  • U.S. President Donald Trump (C) oversees "Operation Epic Fury" with (L-R) Central Intelligence Agency Director John Ratcliffe, U.S. Secretary of State Marco Rubio and White House Chief of Staff Susie Wiles at Mar-a-Lago on February 28, 2026 in Palm Beach, Florida. President Trump announced today that the United States and Israel had launched strikes on Iran targeting political and military leaders, as well as Iran’s ballistic missile and nuclear programs. (Photo by Daniel Torok/White House via Getty Images)
    Paper
    Operation Epic Fury and the International Law on the Use of Force

    Assessing U.S. compliance with the international laws of war is essential at a time when these frameworks are already fraying.

      • Federica D'Alessandra

      Federica D’Alessandra

  • A Black man pulls a trolley. He is small in the bottom center of the frame; in the background are stacks of large, colorful shipping containers and the parts of a large crane or similar piece of equipment.
    Article
    Africa’s Global Economic Edge: Advancing Strategic Sectors

    In key sectors such as critical minerals, specialty agriculture, and fintech, Africa can become a global powerhouse by investing more in manufacturing, value-add, and scaling.

      • Kholofelo Kugler

      Kholofelo Kugler, Georgia Schaefer-Brown

  • Xi walking into a room with people standing and applauding around him
    Commentary
    Emissary
    The Xi Doctrine Zeros in on “High-Quality Development” for China’s Economic Future

    In the latest Five-Year Plan, the Chinese president cements the shift to an innovation-driven economy over a consumption-driven one.

      • Damien Ma

      Damien Ma

  • apan's 8,900-ton Maritime Self-Defense Force supply ship Oosumi leaves Muroran port escorted by the 4,550-ton destroyer Murasame bound for Kuwait February 20, 2004 in Muroran, Japan.
    Article
    Japan’s Security Policy Is Still Caught Between the Alliance and Domestic Reality

    Japan’s response to U.S. pressure over Hormuz highlights a broader dilemma: How to preserve the alliance while remaining bound by legal limits, public opinion, and an Asia-centered security agenda. Tokyo gained diplomatic space through an alliance-embracing strategy, but only under conditions that may not endure.

      • Ryo Sahashi

      Ryo Sahashi

  • Article
    Kenya’s Health Deal Is a Stress Test for the America First Global Health Strategy

    U.S. agreements must contend with national data protection laws to make durable foreign policy instruments.

      • A Black woman with long hair wears a black blazer

      Jane Munga, Rose Mosero

Get more news and analysis from
Carnegie Endowment for International Peace
Carnegie global logo, stacked
1779 Massachusetts Avenue NWWashington, DC, 20036-2103Phone: 202 483 7600Fax: 202 483 1840
  • Research
  • Emissary
  • About
  • Experts
  • Donate
  • Programs
  • Events
  • Blogs
  • Podcasts
  • Contact
  • Annual Reports
  • Careers
  • Privacy
  • For Media
  • Government Resources
Get more news and analysis from
Carnegie Endowment for International Peace
© 2026 Carnegie Endowment for International Peace. All rights reserved.