The authors would like to thank the more than 200 people who generously contributed their time and expertise to this proj-ect. We are especially indebted to our co-chairs Bob Kahn, Mike McConnell, Joe Nye and Peter Schwartz or their tremendoussupport and guidance over the past year. We also thank our contributing authors or producing such insightul essays.We are particularly grateul to the many people who reviewed drats o the papers included in this volume, including IrvLachow, James Mulvenon, Charles Dunlap, Eric Rosenbach, Je Lord, Tom Gjelten, Greg Rattray, David Asher, Je Pryce,Andrew Lewman, Daniel Calingeart, David Gross, Nova Daly and several anonymous reviewers. In addition, we wish tothank the dozens o dedicated proessionals in the U.S. government, armed services and private sector who candidly sharedtheir perspectives. We also thank Global Business Network or hosting a workshop in San Francisco in February 2011, as wellas the many technologists and other experts who attended. Peter Schwartz, David Babington and Audrey Plonk deservespecial recognition or making the workshop a success.We would like to recognize the valuable contributions made by our colleagues at CNAS, particularly Nate Fick, John Nagl, Tom Ricks, Richard Fontaine, Andrew Exum, Christine Parthemore, Brian Burton, Bill Uhlmeyer, Richard Weitz and WillRogers. Nora Bensahel was a diligent and helpul editor. Liz Fontaine provided her usual high caliber o design expertise.Finally, we oer special thanks to our colleagues Abe Denmark, who played a key role in launching this project and partici-pated in many o our working group sessions, and Jessica Glover and Jackie Koo, who provided scrupulous research andact checking or this report.Readers should note that the views expressed in each essay o Volumes I and II belong to the author(s) alone. They do notnecessarily reect the views o the editors, co-chairs or any o the other contributing authors, nor do they necessarily reectthe views o the authors’ employers or any other organization.
A Nt abt Fndng
This report was made possible, in part, through the generous support o the Markle Foundation. The opinions expressed inthe report are those o the authors and do not necessarily reect the views o the Markle Foundation.Some organizations and companies that are mentioned in this report or have vested interests related to cyber security sup-port CNAS fnancially. CNAS retains sole editorial control over its projects and maintains a broad and diverse group o morethan one hundred unders including oundations, government agencies, corporations and private individuals. A completelist o CNAS’ fnancial supporters can be ound at http://www.cnas.org/support/our-supporters.