10.07.2015 Views

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

On the Use of Offensive Cyber Capabilities - Belfer Center for ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>On</strong> <strong>the</strong> <strong>Use</strong> <strong>of</strong> <strong>Offensive</strong> <strong>Cyber</strong> <strong>Capabilities</strong> by Robert Belk and Mat<strong>the</strong>w Noyes is licensed under<strong>the</strong> Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view acopy <strong>of</strong> this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter toCreative Commons, 444 Castro Street, Suite 900, Mountain View, Cali<strong>for</strong>nia, 94041, USA.This work is funded by <strong>the</strong> Office <strong>of</strong> Naval Research under award number N00014-09-1-0597.Any opinions, findings, and conclusions or recommendations expressed in this publication arethose <strong>of</strong> <strong>the</strong> authors and do not necessarily reflect <strong>the</strong> views <strong>of</strong> <strong>the</strong> Office <strong>of</strong> Naval Research.About <strong>the</strong> Authors:Robert Belk is a Naval aviator and Politico-Military Fellow, studyinginternational and global affairs at <strong>the</strong> Harvard Kennedy School. In his 16 years <strong>of</strong>service, he has made four carrier-based deployments and one ground-baseddeployment to Iraq. Following graduation, he is scheduled to report to <strong>the</strong> NavalOperations staff in <strong>the</strong> Pentagon to develop and execute Navy network andcybersecurity policy.Mat<strong>the</strong>w Noyes studies international security policy and is a senior associatewith <strong>the</strong> cybersecurity practice at Good Harbor Consulting. Prior to attending<strong>the</strong> Harvard Kennedy School, he served <strong>for</strong> five years as an infantry <strong>of</strong>ficer in <strong>the</strong>US army serving multiple tours in Iraq. Following graduation he plans tocontinue working on cybersecurity issues. He has a degree in Computer Scienceand Applied Computational Ma<strong>the</strong>matics from <strong>the</strong> University <strong>of</strong> Washington.The authors have completed this project to fulfill <strong>the</strong> capstone Policy AnalysisExercise (PAE) requirement <strong>for</strong> <strong>the</strong> Master in Public Policy (MPP) program at <strong>the</strong>Harvard Kennedy School <strong>of</strong> Government. All views expressed are our own anddo not necessarily reflect <strong>the</strong> views <strong>of</strong> <strong>the</strong> Department <strong>of</strong> Defense.1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!