Cybersecurity
Authors
Melissa Morgan
News Type
News
Date
Paragraphs

William Burns has been many things in his long career: U.S. ambassador to Jordan and later Russia, deputy secretary of state, career ambassador, and president of the Carnegie Endowment for International Peace, among others. But with his confirmation on March 19, 2021 he added a wholly unique title to his already remarkable list of accomplishments: the first diplomat to ever serve as director of the Central Intelligence Agency.

Burns’ career path was not always clear. As a young college graduate in 1981, he received an offer from the Foriegn Service, but hesitated to take it. His father, a Major General in the U.S. Army, wrote him a note with the advice, “Nothing can make you prouder than to serve your country with honor.”

At his recent visit to the Freeman Spogli Institute for International Studies, Burns offered the students in attendance similar council about pursuing careers in public service. A recording of his remarks is below.

“I’m a believer in the virtues of public service and what it means to our country,” Burns told the audience.

He recognized that this moment in American policy at home and around the world is one of transition and uncertainty and that the current climate of distrust between the American public and government has had a tremendous impact on domestic politics. Abroad, the rise of China cuts across all sectors of U.S. geopolitics, while even larger, non-state challenges such as climate change, global health insecurity, and the rapid advancement of technology pose even greater existential challenges.

Still, Burns has faith in the unique relationship that the United States has to its public service institutions.

“It’s my obligation as a leader, and your opportunity [as potential future public servants] to demonstrate that we can produce institutions in this country that are professional, apolitical, and devoted to the national interest and doing things in accordance with American values,” he emphasized.

It’s my obligation as a leader, and your opportunity to demonstrate that we can produce institutions in this country that are professional, apolitical, and devoted to the national interest and doing things in accordance with American values.
William J. Burns
Director of the C.I.A.

In his jurisdiction over the C.I.A, Burns has already set benchmarks to ensure the agency remains competitive and serves its purpose of providing policymakers with high-quality, timely intelligence which supports their decision-making process. He is committed to streamlining the hiring process at the C.I.A. and making it more attractive to top talent, as well as diversifying the workforce and drawing on expertise from across all types of professional backgrounds and abilities. “We’re not going to be an effective intelligence organization if everyone at the C.I.A. looks like me,” he quipped.

Keeping the bigger picture in mind, Director Burns reiterated one of the underlying principles that has guided his approach to public service. “Both [diplomacy and intelligence] require a sense of humility. There are perspectives in the world that are not identical to ours. You don’t have to accept or indulge those perspectives, but understanding them is the starting point of effective intelligence work and effective diplomacy.”

Read More

William Burns
News

Ambassador William Burns Reflects On a Career in Diplomacy

Ambassador William Burns Reflects On a Career in Diplomacy
encina
News

Call for Applications: Visiting Fellow in Israel Studies at the Freeman Spogli Institute for International Studies, Stanford University

The visiting fellow will teach at least one course during the quarter of the visit on some aspect of Israel’s politics, society, economy, modern history, technological development and/or regional or international relations.
Call for Applications: Visiting Fellow in Israel Studies at the Freeman Spogli Institute for International Studies, Stanford University
Byter, Bombs, and Spies  - new book by Amy Zegart and Herb Lin
News

Scholars examine cyber warfare in new book

Scholars examine cyber warfare in new book
Hero Image
C.I.A. Director William Burns speaks to students at the Freeman Spogli Institute for International Studies at Stanford University. Rod Searcy
All News button
1
Subtitle

Director Burns shared how he is applying the lessons he learned as a diplomat to make the intelligence community an effective organization for the challenges facing policymakers today.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

The oldest information system the government operates might also be the most crucial one. No, not the IRS master file system. It’s the technology that controls nuclear weapons. It dates to the 1950s. Yet imagine if the control systems were online in the age of ransomware. Our guest has thought about exactly that. A long time scholar and researcher in cybersecurity, he’s written a book called Cyber Threats and Nuclear Weapons. Stanford University Fellow Dr. Herb Lin joined Federal Drive with Tom Temin.

Read the rest at Federal News Network

Hero Image
Herb Lin Rod Searcey
All News button
1
Subtitle

The oldest information system the government operates might also be the most crucial one. No, not the IRS master file system. It’s the technology that controls nuclear weapons. It dates to the 1950s. Yet imagine if the control systems were online in the age of ransomware.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

In 2018, U.S. Cyber Command (USCC) released its Command Vision statement for the organization, advancing officially for the first time “defend forward” and “persistent engagement” as new elements in the United States’ approach to advancing its security interests in and through cyberspace. Since then, much debate has ensued about the pros and cons of these concepts. But this debate has not included much discussion of one key aspect—what would be the impact of other cyber powers adopting these concepts in pursuing their own security interests?

Read the rest at Lawfare

Hero Image
Sign outside building Fort George G. Meade Public Affairs Office
All News button
1
Subtitle

In 2018, U.S. Cyber Command released its Command Vision statement, advancing “defend forward” and “persistent engagement” as new elements in the United States’ approach to advancing its security interests in and through cyberspace. Since then, the debate has not included much discussion of the impact of other cyber powers adopting these concepts?

Authors
Rose Gottemoeller
News Type
Commentary
Date
Paragraphs

Emerging and disruptive technologies spell an uncertain future for second-strike retaliatory forces. New sensors and big data analysis may render mobile missiles and submarines vulnerable to detection. I call this development the “standstill conundrum”: States will no longer be able to assure a nuclear response should they be hit by a nuclear first strike. If the nuclear weapons states can manage this vulnerability, however, they might be able to escape its worst effects. “Managing” could mean shoring up nuclear deterrence; it could mean focusing more on defenses; or it could mean negotiating to ensure continued viability of second-strike deterrent forces.

Read the rest at Texas National Security Review

Hero Image
rocket launched over the ocean defense.gov
All News button
1
Subtitle

Emerging and disruptive technologies spell an uncertain future for second-strike retaliatory forces. New sensors and big data analysis may render mobile missiles and submarines vulnerable to detection. I call this development the “standstill conundrum”: States will no longer be able to assure a nuclear response should they be hit by a nuclear first strike.

-

 Register for System Error, Live!

This event will be held outside on Stanford's campus. In accordance with Santa Clara County Public Health, masks are encouraged to be worn by all at crowded outdoor events.

Join Profs. Rob Reich, Mehran Sahami, and Jeremy Weinstein — the authors of System Error: Where Big Tech Went Wrong and How We Can Reboot — for a discussion hosted by Professor Michael McFaul, director of the Freeman Spogli Institute for International Studies. The operating system of Big Tech is broken, and this panel discussion will explore the path to a reboot. Plus, it will also allow you experience Professor Sahami’s famous tradition of throwing candy into the audience!

A forward-thinking manifesto from three Stanford professors — experts who have worked at ground zero of the tech revolution for decades — System Error reveals how Big Tech’s obsession with optimization and efficiency has sacrificed fundamental human values and demands that we change course to renew our democracy and save ourselves.

Armed with an understanding of how technologists think and exercise their power, these three Stanford professors—a philosopher working at the intersection of tech and ethics, the director of the undergraduate computer science program who was also an early Google engineer, and a political scientist who served under Barack Obama—reveal how we can hold that power to account. Troubled by the values that permeate the university and Silicon Valley, these professors worked together to chart a new path forward, creating a popular course to transform how tomorrow’s technologists might better approach their profession. Now, as the dominance of Big Tech becomes an explosive societal conundrum, join us as they share their provocative insights and concrete solutions to help everyone understand what is happening, what is at stake, and what we can do to control technology instead of letting it control us.

Books will be available for purchase at the event, and the authors will be signing copies as well.

This event is hosted by Professor Michael McFaul, director of the Freeman Spogli Institute for International Studies, and it is co-sponsored by the Center on Philanthropy and Civil Society, the McCoy Family Center for Ethics in Society, the Stanford School of Engineering, and the Stanford School of Humanities and Sciences.

Rob Reich | FSI Affiliate
Mehran Sahami | Associate Chair for Education, Computer Science Department Associate Chair for Education, Computer Science Department
Jeremy Weinstein | FSI Senior Fellow at CDDRL
Lectures
All Publications button
1
Publication Type
Conference Memos
Publication Date
Subtitle
The Project on Middle East Political Science partnered with Stanford University’s Center for Democracy, Development and the Rule of Law and its Global Digital Policy Incubator for an innovative two week online seminar to explore the issues surrounding digital activism and authoritarianism. This workshop was built upon more than a decade of our collaboration on issues related to the internet and politics in the Middle East, beginning in 2011 with a series of workshops in the “Blogs and Bullets” project supported by the United States Institute for Peace and the PeaceTech Lab. This new collaboration brought together more than a dozen scholars and practitioners with deep experience in digital policy and activism, some focused on the Middle East and others offering a global and comparative perspective. POMEPS STUDIES 43 collects essays from that workshop, shaped by two weeks of public and private discussion.
Authors
Larry Diamond
Eileen Donahoe
Shelby Grossman
Authors
News Type
Commentary
Date
Paragraphs

They have the sort of names that only teenage boys or aspiring Bond villains would dream up (REvil, Grief, Wizard Spider, Ragnar), they base themselves in countries that do not cooperate with international law enforcement and they don’t care whether they attack a hospital or a multinational corporation. Ransomware gangs are suddenly everywhere, seemingly unstoppable – and very successful.

Read the rest at The Guardian

Hero Image
System Hacked computer screen solrseven/Getty Images
All News button
1
Subtitle

The Russian government has an arrangement w/cyber-mobs who are active outside Russia: if you hack a Russian system, you’re in trouble. “My guess is that Putin gets a cut,” Herb Lin says.

Authors
News Type
Commentary
Date
Paragraphs

A problem for investors is that companies don’t have proper incentives for preventing attacks. Herb Lin, cyber policy and security scholar at Stanford University’s Hoover Institution, said companies spend too much energy avoiding responsibility for attacks, rather than preventing them. As a result, manufacturers don’t take responsibility for fully protecting themselves from security breaches, he said.

Kaseya’s end-user agreement largely absolves it of breaches that compromise customers’ data unless there was gross negligence or misconduct.

A Kaseya spokeswoman said in an email that their agreement’s language is “standard for our industry.”

According to Lin, widespread use of such agreements is precisely the problem.

“Companies go out of their way to say we’re not liable for any consequences of this type of attack,” he said, pointing to user agreements pre-emptively absolving themselves of responsibility, and seemingly catastrophic events without lasting harm to companies’ stock prices.

 

Read the rest at Barron's

Hero Image
Herb Lin Rod Searcey
All News button
1
Subtitle

A problem for investors is that companies don’t have proper incentives for preventing attacks. Herb Lin, cyber policy and security scholar at Stanford University’s Hoover Institution, said companies spend too much energy avoiding responsibility for attacks, rather than preventing them.

News Type
Q&As
Date
Paragraphs

This interview with CISAC Affiliate Christopher Painter was originally produced by Jen Kirby. The complete article is available at Vox.

The frequency, scope and scale of ransomware attacks against public and private systems is accelerating. In the latest incident, the ransomware group REvil has demanded $70 million to unlock the systems of the software company Kaseya, an attack that affects not only Kaseya, but simultaneously exploits all of the company’s clients.

The REvil, JBS meatpacking and Colonial Pipeline attacks have abruptly raised the profile of ransomware from a malicious strand of criminality to a national security priority. These are issues that Christopher Painter, an affiliate at the Center for International Security and Cooperation (CISAC), has worked on at length during his tenures as a senior official at the Department of Justice, the FBI, the National Security Council and as the world's first top cyber diplomat at the State Department.

Jen Kirby, a reporter for Vox, interviewed Painter to discuss how cybercrimes are evolving and what governments should do to keep ransomware attacks from escalating geopolitical tensions online and off.



Jen Kirby:
I think a good place to start would be: What are “ransomware attacks”?

Christopher Painter:
It is largely criminal groups who are getting into computers through any number of potential vulnerabilities, and then they essentially lock the systems — they encrypt the data in a way that makes it impossible for you to see your files. And they demand ransom, they demand payment. In exchange for that payment, they will give you — or they claim, they don’t always do it — they claim they’ll give you the decryption keys, or the codes, that allow you to unlock your own files and have access to them again.

That is what traditionally we say is “ransomware.” That’s been going on for some time, but it’s gotten much more acute recently.

There is another half of that, which is that groups don’t just hold your files for ransom, they either leak or threaten to leak or expose your files and your information — your secrets and your emails, whatever you have — publicly, either in an attempt to embarrass you or to extort more money out of you, because you don’t want those things to happen. So it’s split now into two tracks, but they’re a combined method of getting money.

Jen Kirby:
We’ve recently had some high-profile ransomware attacks, including this recent REvil incident. Is it that we’re seeing a lot more of them, or they’re just bigger and bolder? How do you assess that ransomware attacks are becoming more acute?

Christopher Painter:
We’ve seen this going on for some time. I was one of the co-chairs of this Ransomware Task Force that issued a report recently. One of the reasons we did this report was we’re trying to call greater attention to this issue. Although governments and law enforcement were taking it seriously, it wasn’t being given the kind of national-level priority it deserved.

It was being treated as more of an ordinary cybercrime issue. Most governments’ attention is focused on big nation-state activity — like the SolarWinds hack [where suspected Russian government hackers breached US government departments], which are important, and we need to care about those. But we’re very worried about this, too.

It’s especially become more of an issue during the pandemic, when some of the ransomware actors were going after health care systems and health care providers.That combined with these big infrastructure attacks — the Colonial Pipeline clearly was one of them. Another one was the meat processing plants. Another one was hospital systems in Ireland. You also had the DC Police Department being victimized by ransomware. These things are very high-profile. When you’re lining up for gas because of a ransomware attack, and you can’t get your food because of a ransomware attack, that brings it home as a priority. And then, of course, you have what happened this past weekend. So ransomware has not abated, and it continues to get more serious and hit more organizations.

painter

Christopher Painter

Affiliate at the Center for Internatial Security and Cooperation (CISAC)
Full Profile

Read More

Woman smiling
Commentary

Biden and Putin both place a ‘high priority’ on cybersecurity, says presidential adviser after Geneva summit

Despite tensions in the summit lead-up, the two leaders were overly cordial in their remarks after the meeting. Rose Gottemoeller, lead US negotiator for the New Strategic Arms Reduction Treaty (New START), joined The World's host Marco Werman to offer insight.
Biden and Putin both place a ‘high priority’ on cybersecurity, says presidential adviser after Geneva summit
Man with glasses and gray hair
Commentary

The U.S. says it can answer cyberattacks with nuclear weapons. That’s lunacy.

Over the July 4 weekend, the Russian-based cybercriminal organization REvil claimed credit for hacking into as many as 1,500 companies. In May, another cybercriminal group, DarkSide shut down most of the operations of Colonial Pipeline. These incidents were bad enough.
The U.S. says it can answer cyberattacks with nuclear weapons. That’s lunacy.
Hero Image
Ransomware locks up digital data until a fee is paid to the hackers. Getty Images
All News button
1
Subtitle

Christopher Painter explains why the emerging pattern of ransomware attacks needs to be addressed at a political level – both domestically and internationally – and not be treated solely as a criminal issue.

Subscribe to Cybersecurity