Cybersecurity
0
marietje.schaake

Marietje Schaake is a non-resident Fellow at Stanford’s Cyber Policy Center and at the Institute for Human-Centered AI. She is a columnist for the Financial Times and serves on a number of not-for-profit Boards as well as the UN's High Level Advisory Body on AI. Between 2009-2019 she served as a Member of European Parliament where she worked on trade-, foreign- and tech policy. She is the author of The Tech Coup.


 

Non-Resident Fellow, Cyber Policy Center
Fellow, Institute for Human-Centered Artificial Intelligence
Date Label
-

Seminar Recording: https://youtu.be/X_0mm8UkVOc

 

Abstract:  In the movie WarGames, a 1980s teenager hacks into a U.S. nuclear control program, almost starting a nuclear war.  This movie has become a common illustration for the dangers of increasingly digitized nuclear arsenals and reflects what many scholars and practitioners see as the most perilous implication of the rise of cyberattacks--instability to states' nuclear command, control, and communications (NC3).  Research conducted during the Cold War suggested that even the threat of serious vulnerabilities to states' NC3 could incentivize preemptive launches of nuclear weapons.  Despite this widespread concern about the destabilizing effects of NC3 vulnerabilities, there is almost no empirical research to support these conclusions.  In order to test these theories, this paper uses an experimentally-designed war game to explore the role that vulnerabilities and exploits within a hypothetical NC3 architecture play in decisions to use nuclear weapons.  The game, which uses 4-6 players to simulate a national security cabinet, includes three treatment scenarios and one control scenario with no vulnerabilities or exploits.  Players are randomized into the scenario groups and games are played over the course of a year in seven different locations with a sample of elite players from the U.S. and other nations. Together, a longitudinal analysis of these games examines the role that culture, cognitive biases, and expertise play in the likelihood of thermonuclear cyber war with significant implications for both cyber strategy and nuclear modernization.


Speaker's Biography:

Image
jackie schneider photo
Dr. Schneider is a Hoover Fellow at the Hoover Institution and a non-resident fellow at the Naval War College’s Cyber and Innovation Policy Institute.  She researches the intersection of technology, national security, and political psychology with a special interest in cyber, unmanned technologies, and wargaming. Her work has appeared in a variety of outlets including Security Studies, Journal of Conflict Resolution, Journal of Strategic Studies, Foreign Affairs, Lawfare, War on the Rocks, Washington Post, and Bulletin of the Atomic Scientists.  She has a BA from Columbia University, a MA from Arizona State University, and a PhD from George Washington University.

Jacquelyn Schneider Non-resident Fellow Naval War College’s Cyber and Innovation Policy Institute
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

Thirty years ago this week, I watched the news from Beijing and started shredding my bedding. It was the night before my college graduation, I had been studying Chinese politics, and news had broken that college students just like us had been gunned down in Tiananmen Square after weeks of peaceful and exhilarating democracy protests—carried on international TV. In the iconic square where Mao Zedong had proclaimed the People’s Republic decades before, bespectacled students from China’s best universities had camped out, putting up posters with slogans of freedom in Chinese and English. A “goddess of democracy” figure modeled after the Statue of Liberty embodied their hopes—and ours—for political liberation in China.

On my campus back then were just a handful of students majoring in East Asian studies. Learning of the brutal crackdown in Beijing, we somehow found one another, gathered our friends, and stayed up making hundreds of white armbands for classmates to wear at commencement the next day. Grappling with the cold realities of the “real world” we were about to enter, we didn’t know what else to do. So we tore sheets and cried for what might have been.

The June 4, 1989, massacre was a horrifying spectacle that the Chinese government has sought to erase from national memory ever since. But, 30 years later, contemplating what might have been is more important than ever. In hindsight, Tiananmen Square serves as a continuing reminder about just how much China has defied, and continues to defy, the odds and predictions of experts. The fact is that generations of American policy makers, political scientists, and economists have gotten China wrong more often than they’ve gotten China right. In domestic politics, economic development, and foreign policy, China has charted a surprising path that flies in the face of professional prognostications, general theories about anything, and the experience of other nations.

Read the rest at The Atlantic

Hero Image
zegart amy cropped
All News button
1
0
renee-diresta.jpg

Renée DiResta is the former Research Manager at the Stanford Internet Observatory. She investigates the spread of malign narratives across social networks, and assists policymakers in understanding and responding to the problem. She has advised Congress, the State Department, and other academic, civic, and business organizations, and has studied disinformation and computational propaganda in the context of pseudoscience conspiracies, terrorism, and state-sponsored information warfare.

You can see a full list of Renée's writing and speeches on her website: www.reneediresta.com or follow her @noupside.

 

Former Research Manager, Stanford Internet Observatory
News Type
Blogs
Date
Paragraphs

"Being at Stanford is a unique experience... Over time I just became interested in how cyberspace is very realistically connected to our everyday life, and on a larger scale, national security." Read more on our FSI blog on how our MIP student, Maho Sugihara, is focusing on cyber policy and its security implications. #MIPFeatureFriday

Hero Image
q79duzj
All News button
1
Authors
News Type
News
Date
Paragraphs

To thwart the effects of ‘Putinism,’ the American people must first understand the nature of the threat, Michael McFaul told the House Intelligence Committee.

What is “Putinism,” and what threat does it pose to U.S. national security? What steps can the U.S. take to confront it? These are the questions that former U.S. Ambassador to Russia and Freeman Spogli Institute (FSI) Director Michael McFaul sought to answer in his testimony before the House Intelligence Committee on March 28, 2019.

Sign up for the FSI newsletter to receive more stories like this directly to your email inbox.


The committee’s hearing, “Putin’s Playbook: The Kremlin’s Use of Oligarchs, Money and Intelligence in 2016 and Beyond,” focused on the complex web of political and economic forces within Russia, and how they are leveraged abroad to advance Putin’s foreign policy agenda.

Chaired by Representative Adam Schiff, the committee listened as McFaul emphasized the need for foreign policy decision making to be based on the latest data-based research and evidence.

“To contain and thwart the malicious effects of ‘Putinism,’ said McFaul, “the United States government and the American people must first understand the nature of the threat.”

There Goes the Neighborhood

Since Putin’s first term as president in 2000, McFaul explained, the Russian economy has experienced a radical redistribution of property rights, increasing public ownership at the expense of the private sector, and further weakening property protection laws. Strengthened state ownership to support political aims has entrenched Putin’s leadership over the country but not fostered vibrant or sustainable economic growth.

Now You See it, Now You Don’t

To distract from domestic corruption, economic inefficiency and overall inequality, said McFaul, the Kremlin has drawn the public’s attention toward its foreign adversaries, particularly the United States. A fabricated narrative claims that sanctions are a foreign ploy to cause economic stagnation, rather than a diplomatic response to Russian violations of international law.

Putinism On The Move

According to McFaul, Putin leverages several powerful methods of influence, many of which parallel those used within Russia, to further disrupt and weaken the international order:

  1. Heavy investment in international media, such as RT and Sputnik International
  2. The creation of organizations, fake identities and bots to influence public opinion on non-Russian social media platforms, particularly in the West
  3. “Doxing” — the theft of information by digital means with the aim of weakening perceived adversaries
  4. The cultivation of direct contacts and financial support with sympathetic non-governmental organizations and individual politicians
  5. Strategic business engagements with foreign entities to establish political influence and leverage
  6. Mobilization of coercive actors, such as soldiers, mercenaries and even assassins


Although lifting sanctions is a high priority for the Kremlin, noted McFaul, Putin has sought to develop relationships with sympathetic figures in foreign governments and wait for a favorable change in power rather than addressing the primary reasons that sanctions were enacted in the first place.

Defining the U.S. Response

In response to these so-called rules of ‘Putin’s Playbook,’ McFaul has already partnered with Congressman Ro Khanna and Alex Stamos, the Director of the Stanford Internet Observatory, to define and advocate for the specific actions that will protect the United States’ national security, beginning with reforms to deter doxing operations and enhance the cybersecurity of voting infrastructure.

“National security is not a partisan issue,” said McFaul in his testimony before the House Intelligence Committee. “When it comes to national security, if the Russians attack us, they’re not going to just attack the Republicans and leave the Democrats to the side… I want us to get back to the national security threats that threaten all of us together.”

Read Michael McFaul’s complete written testimony.

Hero Image
Michael McFaul testifies before the House Intelligence Committee.
FSI Director Michael McFaul, left, testified on Russian election interference before the House Intelligence Committee on March 28, 2019.
Drew Angerer/Getty Images
All News button
1
Authors
News Type
News
Date
Paragraphs

The House Permanent Select Committee on Intelligence held a public hearing on Thursday, March 28, 2019, as part of its investigation into Russian influence during and after the 2016 election campaign.

The hearing, "Putin’s Playbook: The Kremlin’s Use of Oligarchs, Money and Intelligence in 2016 and Beyond” included testimony by Michael McFaul, former U.S. Ambassador to Russia and Director of the Freeman Spogli Institute at Stanford University.


Download Complete Testimony (PDF 263 KB)

EXCERPT

To contain and thwart the malicious effects of “Putinism,” the United States government and the American people must first understand the nature of the threat. This testimony focuses onthe nexus of political and economic power within Russia under Putin’s leadership, and how these domestic practices can be used abroad to advance Putin’s foreign policy agenda. Moreover, it is important to underscore that crony capitalism, property rights provided by the state, bribery, and corruption constitute only a few of many different mechanisms used by Putin in his domestic authority and foreign policy abroad.

This testimony proceeds in three parts. Section I describes the evolution of Putin’s system of government at home, focusing in particular on the relationship between the state and big business. Section II illustrates how Putin seeks to export his ideas and practices abroad. Section III focuses on Putin’s specific foreign policy objective of lifting sanctions on Russian individuals and companies.

Watch the C-SPAN recording of the testimony


Media Contact: Ari Chasnoff, Assistant Director for Communications, 650-725-2371, chasnoff@stanford.edu

Hero Image
Michael McFaul
All News button
1
-

Recent years have witnessed an increasing number of cyber attacks originating in Russia that target the United States, European Union and EU member-states.  In Russia’s undeclared war against Ukraine—a conflict that has claimed some 13,000 lives—Russia has employed cyber tactics on a regular basis, including release against Ukraine of the Petya and NotPetya viruses.

Those attacks had consequences far beyond Ukraine’s borders.  The NonPetya attack, initiated against a small tech firm in Ukraine, spread to global businesses and government agencies throughout Europe and crossed the Atlantic to the United States.  The West should closely examine the Ukrainian experience, as Russia perfects tactics that could be turned against Europe and the United States as well.

Improving the security of the Internet will require sharing knowledge and experience, promoting greater awareness on cyber security, developing cyber security capacities, and deepening communication and cooperation among different stakeholders.  The Panel will discuss the nature of the threat as well as what governments, international organizations and businesses should do in these areas.

Speaker Bios:

Image
stamos
Alex Stamos is a cybersecurity expert, business leader and entrepreneur working to improve the security and safety of the Internet through his teaching and research at Stanford University. Stamos is an Adjunct Professor at Stanford’s Freeman-Spogli Institute, a William J. Perry Fellow at the Center for International Security and Cooperation, and a visiting scholar at the Hoover Institution. Prior to joining Stanford, Alex served as the Chief Security Officer of Facebook. In this role, Stamos led a team of engineers, researchers, investigators and analysts charged with understanding and mitigating information security risks to the company and safety risks to the 2.5 billion people on Facebook, Instagram and WhatsApp. During his time at Facebook, he led the company’s investigation into manipulation of the 2016 US election and helped pioneer several successful protections against these new classes of abuse. As a senior executive, Alex represented Facebook and Silicon Valley to regulators, lawmakers and civil society on six continents, and has served as a bridge between the interests of the Internet policy community and the complicated reality of platforms operating at billion-user scale.

Image
oleh derevianko
Oleh Derevianko is a business and social entrepreneur. He is the co-founder and chairman of the Board of ISSP — Information Systems Security Partners — a private international cybersecurity company founded in Ukraine in 2008 and currently operating in seven countries of Central and Eastern Europe and Middle Asia. Having a strong presence in the countries at the front line of cyber and hybrid war, such as Ukraine, and serving both private and public sectors, ISSP provides unique expertise for APT attacks analysis, detection and response. Derevianko is also a co-founder of International Cyber Academy (Kyiv), which provides worldclass learning opportunities for students who want to become skilled professionals in a world that depends on the use of cyberspace. In 2015–2016 he served as Deputy Minister, Chief of Staff at Ministry of Education and Science of Ukraine. 

Image
cortes sarah linderpix120815 scortes 0652 high res

Dr. Sarah Lewis Cortes has managed Security at American Express, Putnam Investments, Fidelity, and Biogen, among others. A postoctoral researcher at ACSO Digital Crime Lab, she performs training and consultation with the FBI and Interpol. She earned her degrees at Harvard University and Northeastern, and her research focuses on threat intelligence and the darknet, privacy and privacy law, international criminal legal treaties (MLATs), and digital forensics. At Putnam Investments, which manages over $1.3 trillion in assets, Sarah was SVP, Security. She oversaw Putnam’s recovery on 9/11 when parent company Marsh & McLennan’s World Trade Center 99th floor data center was destroyed.

Image
screen shot 2019 03 14 at 6 42 11 pm
Jason Min is the Head of Business Development at Check Point Software Technologies. In this role he sources, evaluates, and executes M&A transactions. Jason is responsible for overseeing business development and sale enablement activities that involve Check Point technology partners. Since joining Check Point in 2014, Jason has contributed to the success of Check Point’s major acquisitions and partnership growth. Prior to joining Check Point, Jason was at Highland Capital, a global venture capital firm, where he sourced and executed investments in security and software companies. Before working at Highland Capital, Jason was at General Atlantic, a $28B global private equity firm, where he focused on security and software investments across all stages of company growth.

Image
dafina toncheva usvp
Dafina Toncheva invests in emerging technologies in the enterprise space with focus on Enterprise SaaS applications and security. Dafina joined USVP in 2012 and has led investments in and joined the boards of InsideSales.com, Apptimize, Luma Health, Arkose Labs and Raken. Most recently, Dafina served on the board of Prevoty, a leader in application security, who was acquired by Imperva where USVP was the lead investor and largest shareholder. Prior to joining USVP, Dafina was a principal investor with Tugboat Ventures since 2010. Before that, she spent two years at Venrock helping to expand the firm’s investments in SaaS, virtualization, security, infrastructure and enterprise applications. Dafina led the first institutional investment round in Cloudflare which has since transformed into one of the most successful Internet security startups in Silicon Valley. 

Image
nm
Nataliya Mykolska is the Ukrainian Emerging Leaders Fellow at Stanford Center for Democracy Development and Rule of Law. Before coming to Stanford Nataliya was the Trade Representative of Ukraine - Deputy Minister of Economic Development and Trade. In the government, Nataliya was responsible for developing and implementing consistent, predictable and efficient trade policy. She focused on export strategy and Ukrainian exportpromotion, free trade agreements, protecting Ukrainian trade interests in the World Trade Organization (WTO), dialogue with Ukrainian exporters. Nataliya was the Vice-Chair of the International Trade Council and the Intergovernmental Committee on International Trade.

Moderator: 

Image
steven pifer 0
Steven Pifer is a William J. Perry fellow at Stanford’s Freeman Spogli Institute for International Studies (FSI), where he is affiliated with FSI’s Center for International Security and Cooperation and Europe Center.  He is also a nonresident senior fellow with the Brookings Institution. A retired Foreign Service officer, Pifer’s more than 25 years with the State Department focused on U.S. relations with the former Soviet Union and Europe, as well as arms control and security issues.  He served as deputy assistant secretary of state in the Bureau of European and Eurasian Affairs with responsibilities for Russia and Ukraine (2001-2004), ambassador to Ukraine (1998-2000), and special assistant to the president and senior director for Russia, Ukraine and Eurasia on the National Security Council (1996-1997).  

Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

Congress’s annual worldwide-threat hearings are usually scary affairs, during which intelligence-agency leaders run down all the dangers confronting the United States. This year’s January assessment was especially worrisome, because the minds of American citizens were listed as key battlegrounds for geopolitical conflict for the first time. “China, Russia, Iran, and North Korea increasingly use cyber operations to threaten both minds and machines in an expanding number of ways,” wrote Director of National Intelligence Dan Coats. Coats went on to suggest that Russia’s 2016 election interference is only the beginning, with new tactics and deep fakes probably coming soon, and the bad guys learning from experience.

Deception, of course, has a long history in statecraft and warfare. The Greeks used it to win at the Battle of Salamis in the fifth century b.c. The Allies won the Second World War in Europe with a surprise landing at Normandy—which hinged on an elaborate plan to convince Hitler that the invasion would be elsewhere. Throughout the Cold War, the Soviets engaged in extensive “active measure” operations, using front organizations, propaganda, and forged American documents to peddle half-truths, distortions, and outright lies in the hope of swaying opinion abroad.

But what makes people susceptible to deception? A colleague and I recently launched the two-year Information Warfare Working Group at Stanford. Our first assignment was to read up on psychology research, which drove home how vulnerable we all are to wishful thinking and manipulation.

Read the rest at The Atlantic

Hero Image
zegart amy cropped
All News button
1
News Type
News
Date
Paragraphs

Cyber Initiative grantees and researchers in the news, February 2019

Here is a selection of Cyber Initiative grantee and researcher publications and citations for February 2019:

1-30-2019:  Larry Diamond “Chinese Influence, American Interests” in The Diplomat. 

1-30-19:  Michelle Mello “Stanford’s Michelle Mello on Latest Measles Outbreak” in SLS Blogs.  

1/31/19:  Matthew Gentzkow “How Quitting Facebook Could Change Your Life” in Fortune.  

1/30/29:  Matthew Gentzkow “This is Your Brain Off Facebook” in Health.   

2/3/19:  Herb Lin “Atomic Scientists: Hunanity flirting with annhilation” in Tribune.   

2/4/19:  Matthew Gentzkow “Quitting Facebook makes people happier, study finds” in Irish Examiner.   

2/6/19:  Herb Lin “Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists” in CSO.  

2/6/19:  Herb Lin “Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists” in CIO.  

2/8/19:  Elaine Treharne “Statement on the Hoover Institution” in The Stanford Daily.  

2/13/19:  Michelle Mello “Stanford’s Michael Wald on Vaccinations, Children’s Rights, and the Law” in The Stanford Report.  

2/15/19:  Fei-Fei Li and Elaine Treharne “Human-centered Artificial Intelligence Initiative talks AI, humanities and the arts” in The Stanford Daily.  

2/19/19:  Fei-Fei Li “5 Women advancing AI industry research” in Tech Talks.  

2/19/19:  Fei-Fei Li “10 AI influencers you should be following on Twitter” in Siliconrepublic.com.  

2/22/19 Larry Diamond “Utah Against Health Insurance” in New York Times.  

2/23/19 Sharad Goel “Algorithms Can Decide Pre-Trial Jail” in urbanmilwaukee.  

2/25/19:  Dan Boneh “Zether developers from Stanford aim to add new layer of privacy to Ethereum” in Dapp Life.  

2/26/19:  Susan Athey “Ripple Lead on Questions – Student Seeks Clarification for Promoting XRP Over Bitcoin in Stanford University" in CoinGape.  

2/26/19:  Larry Diamond “George Pyle: Utah’s Medicaid reversal makes us a fool coast-to-coast” in Salt Lake Tribune.  

2/27/19:  Arnold Milstein “AI will not solve health care challenges now, but there are innovative alternatives, researcher writes” in Scope.

2/28/19:  Dan Boneh “New Privacy Protocol Zether Can Conceal Ethereum Transactions” in Blockonomi.  

2/28/19:  Jure Leskovec “Species evolve ways to back up life's machinery” in Phys.org.  

2/28/19: Matthew Gentzkow “What happens when you get off Facebook for four weeks? Stanford researchers found out” in Recode.  

All News button
1
Subscribe to Cybersecurity