Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

0
rsd22_056_0627a.jpg PhD

Dr. Melissa Salm earned her Ph.D. in Sociocultural Anthropology with an emphasis in science and technology studies from UC Davis. In support of her thesis, Dr. Salm conducted multi-sited fieldwork across Peru, examining how the 'One Health' model was incorporated into epidemiological field investigations of zoonoses and integrated into global health governance tools for systematizing global health security capacities across the Americas. Her research was funded by the NIH-FIC, for which she conducted a qualitative study identifying the definitions, practices, and visions of 'global health' among PI's in Latin America and the Caribbean compared to those of PI's in North America.

In her research, Dr. Salm examines conceptualizations and operationalizations of risk in the biosciences and biosecurity management. Her guiding questions are: in what concrete ways do controversial techniques for predicting viral risks, such as GOF/PPP, translate into effective pandemic preparedness and response measures? What tools must be invented and standardized to facilitate coordinated institutional responses to public health threats and to move pro-actively from a state of preparedness to response?

Affiliate
0
rsd22_056_0427a.jpg PhD

J. Luis Rodriguez is an assistant professor of international security and law at George Mason University’s Schar School for Policy and Government. He studies the security preferences and strategies of the Global South, comparing how developing countries design norms of humanitarian intervention, nuclear nonproliferation and disarmament mechanisms, and regulations on emerging technologies. My first book manuscript examines why Latin American countries, traditionally wary of great power interference, shifted their stance on interventions and endorsed a norm that legitimized the use of military force to protect populations.

Dr. Rodriguez is an adjunct non-resident fellow at the Program on Nuclear Issues at the Center for Strategic and International Studies and an affiliate of Stanford University’s Center for International Security and Cooperation. His publications include pieces in International Affairs, Third World Quarterly, The Bulletin of Atomic Scientists, and The Washington Post. He holds a Ph.D. and an M.A. in Political Science from Johns Hopkins University and a B.A. in International Relations from El Colegio de Mexico. Before his academic career, he served as a junior advisor to the Mexican Vice-Minister for Latin American Affairs.

Affiliate
Date Label
0
ronald-e-robertson-2024.jpg PhD

Dr. Ronald E Robertson received his Ph.D. in Network Science from Northeastern University in 2021. He was advised by Christo Wilson, a computer scientist, and David Lazer, a political scientist. For his research, Dr. Robertson uses computational tools, behavioral experiments, and qualitative user studies to measure user activity, algorithmic personalization, and choice architecture in online platforms. By rooting his questions in findings and frameworks from the social, behavioral, and network sciences, his goal is to foster a deeper and more widespread understanding of how humans and algorithms interact in digital spaces.

Prior to Northeastern, Dr. Robertson obtained a BA in Psychology from the University of California San Diego and worked with research psychologist Robert Epstein at the American Institute for Behavioral Research and Technology.

Research Scientist
Date Label
-

Join Recruitment and Admissions Manager Meghan Moura to learn more about the Master's in International Policy program and how to apply. Please register in advance.

The Ford Dorsey Master's in International Policy (MIP) is a two year, full-time, professional graduate degree program. The M.A. degree is earned through completion of core and elective coursework, an area of specialization, and a capstone project. The program is interdisciplinary in nature, and students are encouraged to pursue coursework that spans academic fields at Stanford. Specializations within the program include: Cyber Policy and Security (CYBER); Energy, Natural Resources, and the Environment (ENRE); Global Health (GH) [incorporated into the GOVDEV specialization as of Septemeber 2020]; Governance and Development (GOVDEV); and International Security (ISEC).

Workshops
0
James X. Dempsey large headshot

Jim Dempsey is senior policy advisor to the Stanford Program on Geopolitics, Technology and Governance and a lecturer at the UC Berkeley School of Law, where he teaches a course on cybersecurity law in the LLM program. Until May 2021, Jim was Executive Director of the Berkeley Center for Law & Technology. In 2012, after Senate confirmation, he was appointed by President Barack Obama as a part-time member of the U.S. Privacy and Civil Liberties Oversight Board, an independent agency within the federal government charged with advising senior policymakers and overseeing the nation’s counterterrorism programs. He served in that position until January 2017, while also running BCLT.

From 1997 to 2014, Dempsey was at the Center for Democracy & Technology (CDT), a non-profit public policy organization focused on privacy and other issues affecting the internet, where he held a number of leadership positions. Prior to that he was deputy director of the Center for National Security Studies (1995-1997) and assistant counsel to the House Judiciary Committee (1985-1995), focusing on privacy, FBI oversight, and surveillance issues. 

Jim graduated from Yale College and Harvard Law School.

BOOKS:

 

ARTICLES AND PAPERS

 

COMMENTARY

Senior Policy Advisor, Geopolitics, Technology, and Governance at CISAC
Lecturer at the UC Berkeley School of Law
Date Label
-

Please join our partners at APSIA for their 2021 online grad school fair. Representatives from across the Freeman Spogli Institute for International Studies and other top-line graduate programs in international studies at leading universities will be online to answer your questions and provide resources on the application process.

Whether you are an undergrad student trying to decide what comes next in your academic journey or a professional looking to advance your career, this is an excellent opportunity to network and gain insight into reaching your goals.

Workshops
News Type
News
Date
Paragraphs

POLITICO has announced their annual ranking of the 28 power players behind Europe’s tech revolution. In addition to an overall No. 1, the list is divided into three categories — rulemakers, rulebreakers and visionaries — each representing a different type of power. The Cyber Policy Center's Marietje Schaake is included on the list as a visionary and "voice to listen to on both sides of the Atlantic."

From the announcement:

The 42-year-old Dutch native has become a leading voice of European philosophy on how to regulate technology, especially in the U.S., where she’s been teaching at Stanford University’s Cyber Policy Center since leaving European politics.

Her message — that the internet’s early leaders have grown into all-too-dominant behemoths unable to subdue their own vices and are violating human rights — might have seemed out of whack in the U.S. a few years ago. But it has since become mainstream, in part thanks to Schaake’s work to reshape the American conversation on technology and inject some of Europe’s criticism on the sector.

In Europe, too, Schaake’s star keeps rising and rising. Once one of Brussels’ most visible politicians, she has now turned her attention to taming algorithms and the growing issue of cyber threats. In 2019, she launched the CyberPeace Institute in Geneva, a group focused on getting European policymakers to care about the human victims of cyberattack.

READ MORE

Marietje Schaake

Marietje Schaake

International Policy Director at the Cyber Policy Center
FULL BIO

Read More

cyber turns two graphic
News

The Cyber Policy Center Turns Two

A look back at the launch of the CPC and the work of our programs
The Cyber Policy Center Turns Two
Hero Image
illustration of Marietje Schaake Politico
All News button
1
Subtitle

POLITICO’s annual ranking of the 28 power players behind Europe’s tech revolution includes the Cyber Policy Center's Marietje Schaake. The list is divided into three categories — rulemakers, rulebreakers and visionaries — each representing a different type of power.

Paragraphs

Cross-strait deterrence is arguably weaker today than at any point since the Korean War. Impressive Chinese military modernization, U.S. failure to build robust coalitions to counter Chinese regional aggression, and Xi Jinping’s personal ambition, all coalesce to create a situation in which Chinese leaders may see some aggregate benefit to using force. Mastro supports this assessment in her response to the Commission’s specific questions. 

All Publications button
1
Publication Type
Testimonies
Publication Date
Subtitle
Statement before the U.S.-China Economic and Security Review Commission on “Deterring PRC Aggression Toward Taiwan”
Authors
Oriana Skylar Mastro
News Type
Q&As
Date
Paragraphs

This interview with CISAC Affiliate Christopher Painter was originally produced by Jen Kirby. The complete article is available at Vox.

The frequency, scope and scale of ransomware attacks against public and private systems is accelerating. In the latest incident, the ransomware group REvil has demanded $70 million to unlock the systems of the software company Kaseya, an attack that affects not only Kaseya, but simultaneously exploits all of the company’s clients.

The REvil, JBS meatpacking and Colonial Pipeline attacks have abruptly raised the profile of ransomware from a malicious strand of criminality to a national security priority. These are issues that Christopher Painter, an affiliate at the Center for International Security and Cooperation (CISAC), has worked on at length during his tenures as a senior official at the Department of Justice, the FBI, the National Security Council and as the world's first top cyber diplomat at the State Department.

Jen Kirby, a reporter for Vox, interviewed Painter to discuss how cybercrimes are evolving and what governments should do to keep ransomware attacks from escalating geopolitical tensions online and off.



Jen Kirby:
I think a good place to start would be: What are “ransomware attacks”?

Christopher Painter:
It is largely criminal groups who are getting into computers through any number of potential vulnerabilities, and then they essentially lock the systems — they encrypt the data in a way that makes it impossible for you to see your files. And they demand ransom, they demand payment. In exchange for that payment, they will give you — or they claim, they don’t always do it — they claim they’ll give you the decryption keys, or the codes, that allow you to unlock your own files and have access to them again.

That is what traditionally we say is “ransomware.” That’s been going on for some time, but it’s gotten much more acute recently.

There is another half of that, which is that groups don’t just hold your files for ransom, they either leak or threaten to leak or expose your files and your information — your secrets and your emails, whatever you have — publicly, either in an attempt to embarrass you or to extort more money out of you, because you don’t want those things to happen. So it’s split now into two tracks, but they’re a combined method of getting money.

Jen Kirby:
We’ve recently had some high-profile ransomware attacks, including this recent REvil incident. Is it that we’re seeing a lot more of them, or they’re just bigger and bolder? How do you assess that ransomware attacks are becoming more acute?

Christopher Painter:
We’ve seen this going on for some time. I was one of the co-chairs of this Ransomware Task Force that issued a report recently. One of the reasons we did this report was we’re trying to call greater attention to this issue. Although governments and law enforcement were taking it seriously, it wasn’t being given the kind of national-level priority it deserved.

It was being treated as more of an ordinary cybercrime issue. Most governments’ attention is focused on big nation-state activity — like the SolarWinds hack [where suspected Russian government hackers breached US government departments], which are important, and we need to care about those. But we’re very worried about this, too.

It’s especially become more of an issue during the pandemic, when some of the ransomware actors were going after health care systems and health care providers.That combined with these big infrastructure attacks — the Colonial Pipeline clearly was one of them. Another one was the meat processing plants. Another one was hospital systems in Ireland. You also had the DC Police Department being victimized by ransomware. These things are very high-profile. When you’re lining up for gas because of a ransomware attack, and you can’t get your food because of a ransomware attack, that brings it home as a priority. And then, of course, you have what happened this past weekend. So ransomware has not abated, and it continues to get more serious and hit more organizations.

painter

Christopher Painter

Affiliate at the Center for Internatial Security and Cooperation (CISAC)
Full Profile

Read More

Woman smiling
Commentary

Biden and Putin both place a ‘high priority’ on cybersecurity, says presidential adviser after Geneva summit

Despite tensions in the summit lead-up, the two leaders were overly cordial in their remarks after the meeting. Rose Gottemoeller, lead US negotiator for the New Strategic Arms Reduction Treaty (New START), joined The World's host Marco Werman to offer insight.
Biden and Putin both place a ‘high priority’ on cybersecurity, says presidential adviser after Geneva summit
Man with glasses and gray hair
Commentary

The U.S. says it can answer cyberattacks with nuclear weapons. That’s lunacy.

Over the July 4 weekend, the Russian-based cybercriminal organization REvil claimed credit for hacking into as many as 1,500 companies. In May, another cybercriminal group, DarkSide shut down most of the operations of Colonial Pipeline. These incidents were bad enough.
The U.S. says it can answer cyberattacks with nuclear weapons. That’s lunacy.
Hero Image
Ransomware locks up digital data until a fee is paid to the hackers. Getty Images
All News button
1
Subtitle

Christopher Painter explains why the emerging pattern of ransomware attacks needs to be addressed at a political level – both domestically and internationally – and not be treated solely as a criminal issue.

Paragraphs

The first COVID-19-related death in the United States was announced on February 29, 2020, the day of the South Carolina primary. International news about the early spread of the coronavirus and the initial reaction from American public health professionals to its quick spread in this country made it clear that the presidential election was facing an existential threat. Election officials who held primaries in early- and mid-March found themselves increasingly making public health decisions to guard both their voters and their staff. The larger societal challenges quickly overwhelmed the ability of states to hold primaries at all, leading to hastily canceled and postponed elections. The one early primary that was not postponed, Wisconsin, provided cautionary tales in the form of closed polling places, poll worker shortages, and massive transitions to mail balloting.

 

Nate Persily

Nathaniel Persily

James B. McClatchy Professor of Law at Stanford Law School | Senior Fellow, Freeman Spogli Institute | Professor, by courtesy, Political Science | Professor, by courtesy, Communication | Co-director, Cyber Policy Center
FULL BIO
All Publications button
1
Publication Type
Working Papers
Publication Date
Subtitle
A Compendium of Research from the Stanford-MIT Healthy Elections Project
Authors
Nathaniel Persily
Subscribe to Security