For a government cyber deterrence strategy to be effective, it must have network penetration tools, as well as, tools for distributed denial of service (DDOS), parallel scanning, reconnaissance, surveillance, and other capabilities. Most importantly, it must be able to assess cyber-attack...