Overview

This page provides an overview of the over all intent of the pro-US research effort.
The specific problem is that while the general US cybersecurity operational environment understands that the United States (US) is under an increasing level of cyber-attacks, the cyber leadership does not have a good understanding of the motivational factors of the U.S. Red Team, penetration (PEN) Testers, and offensive cyber-capable individuals, in using their skills in direct offensive/defend-forward US support, against US adversaries.
These motivational factors may have personal and professional attributes or involve situational-specific components. Better understanding of these motivations will help US law makers in developing more effective laws or policies, to utilize these offensive cyber operator skills in defending forward the US, and thereby better defending the entire nation against cyber adversaries, as well as increasing retention in direct support of the US and its critical infrastructure.
The purpose of this research is to fill the literature gap to better understand the motivational factors of US Offensive Cyber Operators, PEN Testers, and Red Team members. Understanding these motivational factors to utilize offensive cyber capabilities in direct forward-support operations against U.S. adversaries is crucial. This gap in knowledge is currently restricting the nation’s ability to fully leverage its offensive cyber talent pool, in combating foreign state-sponsored and state-tolerated threats to the US. The findings of this research are intended to directly inform U.S. lawmakers, policymakers, and cybersecurity leaders. By highlighting actionable recommendations, informed leadership will be able to create better laws and regulations that empower offensive cyber operators, increase retention in support of the Federal government, and address the offensive cyber operators’ legal concerns, in supporting the US, its Defense Industrial Base (DIB), and its critical infrastructure.
The survey questions are structured to explore Self-Determination Theory (SDT) and Role Theory motivations, specifically in the context of Offensive Cyber Operators across the:
1. Defense Industrial Base (DIB)
2. Department of Defense (DoD)
3. With DoD Members, Civilians, and Contractors
Survey Design:
• Consent portion required
• Demographic Questions with full anonymity
• Likert Scale, (Strongly Agree to Strongly Disagree)
• 5-Point Scale (Extremely important to Not at all important)
• Scenario-Based – 5-Point Scale (Very Likely to Very Unlikely)
Note on Ethics Vs Morality:
• Ethics refers to community values, more than personal values. It’s more defined as a system of values determined by a community. An example: there is a legal set of ethical standards, where a lawyer may be forced to ignore his/her personal morality in the execution of their duties as a public defender (Loggins, 2025).
• Morality tends to be a person’s or society's idea of right or wrong at the individual level of behavior. An example: morality may be measured by bravery, fairness, helping group, loving your family, internal measures, etc. (EnglishStudyOnline, 2024). Example - if you come across a wallet on the floor of a Department Store, you turn it into the Loss and Found because it is the personal moral thing to do.
PLEASE keep in mind that ANY survey results or percentages (%) you may recieve are not related to, nor have ANYTHING to do with, a "final grade." The results you may or may not see, have NOTHING to do with any type of "grade." The results are randomized so are neither good nor bad. Lastly, not only are your answers appreciated, but ANY written comments you may provide are most welcome.
Please note that that are some overlaps in questions. This overlap is intentional to try and provide applicable correlation between the two motivational theories being analyzed in support of cybersecurity operators’ motivations. As a reminder, the surveys provide complete anonymity for anything being published.
Lastly, please ensure that you 'Preview' your answers before moving onto the next section, throughout the survey. This will be your only opportunity to review your responses for completness and accuracy before final submission. Section-by-section review is recommended.

T