Intelligence
Authors
News Type
News
Date
Paragraphs

The House Permanent Select Committee on Intelligence held a public hearing on Thursday, March 28, 2019, as part of its investigation into Russian influence during and after the 2016 election campaign.

The hearing, "Putin’s Playbook: The Kremlin’s Use of Oligarchs, Money and Intelligence in 2016 and Beyond” included testimony by Michael McFaul, former U.S. Ambassador to Russia and Director of the Freeman Spogli Institute at Stanford University.


Download Complete Testimony (PDF 263 KB)

EXCERPT

To contain and thwart the malicious effects of “Putinism,” the United States government and the American people must first understand the nature of the threat. This testimony focuses onthe nexus of political and economic power within Russia under Putin’s leadership, and how these domestic practices can be used abroad to advance Putin’s foreign policy agenda. Moreover, it is important to underscore that crony capitalism, property rights provided by the state, bribery, and corruption constitute only a few of many different mechanisms used by Putin in his domestic authority and foreign policy abroad.

This testimony proceeds in three parts. Section I describes the evolution of Putin’s system of government at home, focusing in particular on the relationship between the state and big business. Section II illustrates how Putin seeks to export his ideas and practices abroad. Section III focuses on Putin’s specific foreign policy objective of lifting sanctions on Russian individuals and companies.

Watch the C-SPAN recording of the testimony


Media Contact: Ari Chasnoff, Assistant Director for Communications, 650-725-2371, chasnoff@stanford.edu

Hero Image
Michael McFaul
All News button
1
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

Congress’s annual worldwide-threat hearings are usually scary affairs, during which intelligence-agency leaders run down all the dangers confronting the United States. This year’s January assessment was especially worrisome, because the minds of American citizens were listed as key battlegrounds for geopolitical conflict for the first time. “China, Russia, Iran, and North Korea increasingly use cyber operations to threaten both minds and machines in an expanding number of ways,” wrote Director of National Intelligence Dan Coats. Coats went on to suggest that Russia’s 2016 election interference is only the beginning, with new tactics and deep fakes probably coming soon, and the bad guys learning from experience.

Deception, of course, has a long history in statecraft and warfare. The Greeks used it to win at the Battle of Salamis in the fifth century b.c. The Allies won the Second World War in Europe with a surprise landing at Normandy—which hinged on an elaborate plan to convince Hitler that the invasion would be elsewhere. Throughout the Cold War, the Soviets engaged in extensive “active measure” operations, using front organizations, propaganda, and forged American documents to peddle half-truths, distortions, and outright lies in the hope of swaying opinion abroad.

But what makes people susceptible to deception? A colleague and I recently launched the two-year Information Warfare Working Group at Stanford. Our first assignment was to read up on psychology research, which drove home how vulnerable we all are to wishful thinking and manipulation.

Read the rest at The Atlantic

Hero Image
zegart amy cropped
All News button
1
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

Closing the gap between technology leaders and policy makers will require a radically different approach from the defense establishment.

A silent divide is weakening America’s national security, and it has nothing to do with President Donald Trump or party polarization. It’s the growing gulf between the tech community in Silicon Valley and the policy-making community in Washington.

Beyond all the acrimonious headlines, Democrats and Republicans share a growing alarm over the return of great-power conflict. China and Russia are challenging American interests, alliances, and values—through territorial aggression; strong-arm tactics and unfair practices in global trade; cyber theft and information warfare; and massive military buildups in new weapons systems such as Russia’s “Satan 2” nuclear long-range missile, China’s autonomous weapons, and satellite-killing capabilities to destroy our communications and imagery systems in space. Since Trump took office, huge bipartisan majorities in Congress have passed tough sanctions against Russia, sweeping reforms to scrutinize and block Chinese investments in sensitive American technology industries, and record defense-budget increases. You know something’s big when senators like the liberal Ron Wyden and the

In Washington, alarm bells are ringing. Here in Silicon Valley, not so much. “Ask people to finish the sentence, ‘China is a ____ of the United States,’” said the former National Economic Council chairman Keith Hennessey. “Policy makers from both parties are likely to answer with ‘competitor,’ ‘strategic rival,’ or even ‘adversary,’ while Silicon Valley leaders will probably tell you China is a ‘supplier,’ ‘investor,’ and especially ‘potential market.’”

Read the rest at The Atlantic.

 

 

Hero Image
zegart amy cropped
All News button
1
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

The Founding Fathers relied on deceit in championing American independence—and that has lessons for the present.

As we celebrate Thanksgiving weekend, a holiday first declared by George Washington’s presidential proclamation in 1789, it is worth remembering that deception played a pivotal role in America’s birth. Our shining city on the hill owes much to the dark arts. George Washington, Benjamin Franklin, and other Founding Fathers are remembered today as virtuous creators of a bold new democracy. But they were also cunning manipulators of their information environment—a side of the founding story that has often been neglected by history.

George Washington’s inability to tell a lie is a lie. That old cherry-tree fable—in which young George admits to his father that he did, indeed, chop down the tree with his hatchet—was invented by a Washington biographer named Mason Locke Weems in 1806 to boost his book sales. In truth, Washington was an avid spymaster with a talent for deception that would remain unequaled by American presidents for the next 150 years. During the Revolutionary War, Washington was referred to by his own secret code number (711), made ready use of ciphers and invisible ink, developed an extensive network of spies that reported on British troop movements and identified American traitors, and used all sorts of schemes to protect his forces, confuse his adversaries, and gain advantage. His military strategy was to outsmart and outlast the enemy, not outfight him. He used intelligence to avoid more battles than he fought, and to trick the British into standing down when standing up could have meant the end of the Continental Army.

Read the rest at The Atlantic

Hero Image
zegart amy cropped
All News button
1
0
rsd18_083_0009a.jpg

Alex Stamos is a cybersecurity expert, business leader and entrepreneur working to improve the security and safety of the Internet. Stamos was the founding director of the Stanford Internet Observatory at the Cyber Policy Center, a part of the Freeman Spogli Institute for International Studies. He is currently a lecturer, teaching in both the Masters in International Policy Program and in Computer Science.

Prior to joining Stanford, Alex served as the Chief Security Officer of Facebook. In this role, Stamos led a team of engineers, researchers, investigators and analysts charged with understanding and mitigating information security risks to the company and safety risks to the 2.5 billion people on Facebook, Instagram and WhatsApp. During his time at Facebook, he led the company’s investigation into manipulation of the 2016 US election and helped pioneer several successful protections against these new classes of abuse. As a senior executive, Alex represented Facebook and Silicon Valley to regulators, lawmakers and civil society on six continents, and has served as a bridge between the interests of the Internet policy community and the complicated reality of platforms operating at billion-user scale. In April 2017, he co-authored “Information Operations and Facebook”, a highly cited examination of the influence campaign against the US election, which still stands as the most thorough description of the issue by a major technology company.

Before joining Facebook, Alex was the Chief Information Security Officer at Yahoo, rebuilding a storied security team while dealing with multiple assaults by nation-state actors. While at Yahoo, he led the company’s response to the Snowden disclosures by implementing massive cryptographic improvements in his first months. He also represented the company in an open hearing of the US Senate’s Permanent Subcommittee on Investigations.

In 2004, Alex co-founded iSEC Partners, an elite security consultancy known for groundbreaking work in secure software development, embedded and mobile security. As a trusted partner to world’s largest technology firms, Alex coordinated the response to the “Aurora” attacks by the People’s Liberation Army at multiple Silicon Valley firms and led groundbreaking work securing the world’s largest desktop and mobile platforms. During this time, he also served as an expert witness in several notable civil and criminal cases, such as the Google Street View incident and pro bono work for the defendants in Sony vs George Hotz and US vs Aaron Swartz. After the 2010 acquisition of iSEC Partners by NCC Group, Alex formed an experimental R&D division at the combined company, producing five patents.

A noted speaker and writer, he has appeared at the Munich Security Conference, NATO CyCon, Web Summit, DEF CON, CanSecWest and numerous other events. His 2017 keynote at Black Hat was noted for its call for a security industry more representative of the diverse people it serves and the actual risks they face. Throughout his career, Alex has worked toward making security a more representative field and has highlighted the work of diverse technologists as an organizer of the Trustworthy Technology Conference and OURSA.

Alex has been involved with securing the US election system as a contributor to Harvard’s Defending Digital Democracy Project and involved in the academic community as an advisor to Stanford’s Cybersecurity Policy Program and UC Berkeley’s Center for Long-Term Cybersecurity. He is a member of the Aspen Institute’s Cyber Security Task Force, the Bay Area CSO Council and the Council on Foreign Relations. Alex also serves on the advisory board to NATO’s Collective Cybersecurity Center of Excellence in Tallinn, Estonia.

Former Director, Stanford Internet Observatory
Lecturer, Masters in International Policy
Lecturer, Computer Science
Date Label
News Type
Blogs
Date
Paragraphs

On May 23, Stanford students enrolled in Technology and Security (MS&E 193/293) met with General James M. Holmes. General Holmes delivered delivered gave a talk, "Applying Technology--the Military Perspective," and engaged students in a Q&A session afterwards. The interisciplinary course explores the relation between technology, war, and national security policy from early history to modern day, focusing on current U.S. national security challenges and the role that technology plays in shaping our understanding and response to these challenges.

 

img 4445 General James M. Holmes

[[{"fid":"231402","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"2":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"2"}}]]

[[{"fid":"231403","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"3":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"3"}}]]

Hero Image
img 4445
General James M. Holmes
Margaret Williams
All News button
1
-

Abstract: 

  1. What do some of America’s adversaries think about U.S. scientists, engineers and technical specialists they meet?
  2. What is it really like to be an intelligence officer (IO) abroad? What are some of the stresses IO’s experience in their work?
  3. What is Counterintelligence (CI)?
 
Speaker bio: Bill Phillips is a former senior officer of the CIA’s clandestine service (Directorate of Operations.) He has over 36 years experience as a professional intelligence officer. Bill served overseas for most of his 25 years at CIA. Among other things, Bill was the CIA’s senior field operations executive manager in three overseas posts. He also served as the Chief of Staff to the Head of the Clandestine Service  in the months following the 911 attacks. After his retirement from the Directorate of Operations (DO), Bill worked for the National Nuclear Security Administration (DOE) as Director of Counterintelligence at Los Alamos National Laboratory. After that, Bill retired again and worked as a national security consultant on CI to various elements of the executive branch of government. Bill is the recipient of CIA’s Distinguished Career Intelligence Medal, two Meritorious Unit Citations, the CIA National HUMINT Collector Award, CIA’s Latin America Division Medal and numerous other honors for sustained exceptional performance. He was certified as a ‘CI Professional’ by the CIA. Bill is now completely retired and occasionally consults on CI doctrine, the practice of mindfulness in the intelligence profession and resilience issues.
Central Intelligence Agency (retired)
Seminars
Paragraphs
Book cover of "Peace on a Knife's Edge" showing South Korean president Roh Moo-hyun alongside George W. Bush and Kim Jong-il

Lee Jong-Seok served as vice-secretary of South Korea’s National Security Council and as its unification minister under the Roh Moo-Hyun administration (2003–08). After Roh’s tragic death in 2009, Lee resolved to present a record of the so-called participatory government’s achievements and failures in the realm of unification, foreign affairs, and national security.

Peace on a Knife’s Edge is the translation of Lee’s 2014 account of Roh’s efforts to bring peace to the Korean Peninsula in the face of opposition at home from conservative forces and abroad from the Bush administration’s hard stances of “tailored containment” and its declaration of the North as part of the “axis of evil.” Lee’s narrative will give American readers rare insights into critical moments of Roh’s incumbency, including the tumultuous Six-Party Talks; the delicate process of negotiating the relocation and reduction of United States Forces Korea; Roh’s pursuit of South Korea’s “autonomous defense”; conflicts with Japan over history issues; and the North’s first nuclear weapons test.

Desk, examination, or review copies can be requested through Stanford University Press.

All Publications button
1
Publication Type
Books
Publication Date
Subtitle

The Inside Story of Roh Moo-hyun's North Korea Policy

Book Publisher
Shorenstein APARC
-

Through the Hack the Pentagon program, The Department of Defense (DoD) had asked Synack to look for vulnerabilities left undetected by traditional security solutions in one of their highly complex and sensitive systems. The DoD was going to push the limits of security beyond that of most enterprises, and the results were surprising. Hear from Synack CEO Jay Kaplan how the government can benefit from bug bounty programs, what Hack the Pentagon revealed about DoD security, and why more and more organizations are employing red team penetration testing. 

Jay Kaplan co-founded Synack after serving in several security-related capacities at the Department of Defense, including the DoD’s Incident Response and Red Team. Prior to founding Synack, Jay was a Senior Cyber Analyst at the National Security Agency (NSA), where his focus was supporting counterterrorism-related intelligence operations. Jay received a BS in Computer Science with a focus in Information Assurance and a MS in Engineering Management from George Washington University studying under a DoD/NSA-sponsored fellowship. Jay holds a number of security certifications from ISC(2) and GIAC.

Encina Hall, E008 (garden level)

Jay Kaplan CEO Synack
Seminars

Are you interested in cybersecurity? Have you wanted to learn offensive cyber techniques  but don't know where to get started? The Applied Cybersecurity team is hosting an introductory workshop to get people going with practicing exploitation and offensive cyber techniques in an ethical setting. In particular, we will focus on gaining familiarity with techniques used for competing in Capture the Flag (CTF)* competitions. We'll be hosting the first workshop this Friday, in preparation for the Hitcon CTF next week. Bring a laptop! This workshop will assume no prerequisite experience with hacking or cybersecurity so please attend regardless of how unfamiliar you are with the topic. For this workshop, we will focus on web vulnerabilities, binary reversing, and some basic cryptography challenges. Note that experience equivalent to CS107 will be useful. Food will be provided! RSVP here: https://goo.gl/forms/M5yzuQasIZpL4Ovy1

Shriram 366

Subscribe to Intelligence