On the Use of Offensive Cyber Capabilities - Belfer Center for ...
On the Use of Offensive Cyber Capabilities - Belfer Center for ...
On the Use of Offensive Cyber Capabilities - Belfer Center for ...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>On</strong> <strong>the</strong> <strong>Use</strong> <strong>of</strong> <strong>Offensive</strong> <strong>Cyber</strong> <strong>Capabilities</strong> by Robert Belk and Mat<strong>the</strong>w Noyes is licensed under<strong>the</strong> Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view acopy <strong>of</strong> this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ or send a letter toCreative Commons, 444 Castro Street, Suite 900, Mountain View, Cali<strong>for</strong>nia, 94041, USA.This work is funded by <strong>the</strong> Office <strong>of</strong> Naval Research under award number N00014-09-1-0597.Any opinions, findings, and conclusions or recommendations expressed in this publication arethose <strong>of</strong> <strong>the</strong> authors and do not necessarily reflect <strong>the</strong> views <strong>of</strong> <strong>the</strong> Office <strong>of</strong> Naval Research.About <strong>the</strong> Authors:Robert Belk is a Naval aviator and Politico-Military Fellow, studyinginternational and global affairs at <strong>the</strong> Harvard Kennedy School. In his 16 years <strong>of</strong>service, he has made four carrier-based deployments and one ground-baseddeployment to Iraq. Following graduation, he is scheduled to report to <strong>the</strong> NavalOperations staff in <strong>the</strong> Pentagon to develop and execute Navy network andcybersecurity policy.Mat<strong>the</strong>w Noyes studies international security policy and is a senior associatewith <strong>the</strong> cybersecurity practice at Good Harbor Consulting. Prior to attending<strong>the</strong> Harvard Kennedy School, he served <strong>for</strong> five years as an infantry <strong>of</strong>ficer in <strong>the</strong>US army serving multiple tours in Iraq. Following graduation he plans tocontinue working on cybersecurity issues. He has a degree in Computer Scienceand Applied Computational Ma<strong>the</strong>matics from <strong>the</strong> University <strong>of</strong> Washington.The authors have completed this project to fulfill <strong>the</strong> capstone Policy AnalysisExercise (PAE) requirement <strong>for</strong> <strong>the</strong> Master in Public Policy (MPP) program at <strong>the</strong>Harvard Kennedy School <strong>of</strong> Government. All views expressed are our own anddo not necessarily reflect <strong>the</strong> views <strong>of</strong> <strong>the</strong> Department <strong>of</strong> Defense.1