Cybersecurity
0
rsd21_040_1169a_-_eyal_zilberman.jpg

Eyal Zilberman, from Tel-Aviv, Israel, is pursuing a joint MIP/MPP degree as a Knight Hennessy scholar. Eyal graduated from Tel-Aviv University with a bachelor’s degree in philosophy, political science, and economics (PPE) and previously served in the Israeli Defense Force as a Cyber Intelligence Officer. Eyal is interested in the societal effects of online platforms and researches the global implications of platform regulations at FSI's Global Digital Policy Incubator. During the summer of 2021, Eyal worked as a public policy intern at the Oversight Board, where he participated in third-party examinations of Facebook's implementation of its content policy rules.

Master's in International Policy Class of 2022
Authors
Gil Baram
News Type
Commentary
Date
Paragraphs

ON 8 NOVEMBER 2021, the US Justice Department announced the arrest of several members of the Russian-speaking REvil ransomware group, in a large-scale operation involving US allies in Europe and around the globe. The REvil group, who have since been charged, have been deploying ransomware attacks against American targets including the software provider Kaseya in July 2021. Furthermore, the State Department added REvil to a bounty programme that offers up to US$10 million for information on the REvil leaders.

These efforts followed the two-day virtual international summit on ransomware hosted by the Biden administration on 13-14 October. This summit included 30 countries and was a decisive step towards building a coalition against ransomware attacks. It was acknowledged by all countries that ransomware posed a global and national security threat. Russia ─ as well as China, Iran, and North Korea ─ was not invited.

Read the rest at RSIS

Hero Image
All News button
1
Subtitle

The US Justice Department’s arrest of several affiliates of the Russian-speaking REvil ransomware group comes a month after Washington hosted a virtual international summit on ransomware attacks. The decision to leave Russia out of the summit will inevitably limit the effectiveness of the operation.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

The nation spends billions of dollars on cybersecurity measures, and yet we seem unable to get ahead of this problem. Why are our computers so hard to protect? An experience with a house cat provided insights. I am allergic to cats. My daughter came home, cat in hand, and I had to find a way of confining Pounce to a limited area. Everything I tried to confine Pounce worked for a little while but eventually failed as he found a way past my newest security barrier — just as hackers eventually find their way through the cybersecurity barriers erected to stop them.

Read the rest at Los Angeles Times

All News button
1
Subtitle

The nation spends billions of dollars on cybersecurity measures, and yet we seem unable to get ahead of this problem. Why are our computers so hard to protect? An experience with a house cat provided insights.

News Type
News
Date
Paragraphs

Herbert Lin, a senior research scholar for cyber policy and security at Stanford University, told RFE/RL that conference participants need to focus on how to interfere with cryptocurrency payments.

Ransomware will become less attractive if cybercriminals can't turn the cryptocurrency payments into cash, he said.

Read the rest at RadioFreeEurope

Hero Image
All News button
1
Subtitle

The more countries involved in the discussion, the better but in the end you want to have global controls on cryptocurrency redemption.

Paragraphs

Drawing on a qualitative analysis of 7,506 tweets by state-sponsored accounts from Russia’s GRU and the Internet Research Agency (IRA), Iran, and Venezuela, this article examines the gender dimensions of foreign influence operations. By examining the political communication of feminism and women’s rights, we find, first, that foreign state actors co-opted intersectional critiques and countermovement narratives about feminism and female empowerment to demobilize civil society activists, spread progovernment propaganda, and generate virality around divisive political topics. Second, 10 amplifier accounts—particularly from the Russian IRA and GRU—drove more than one-third of the Twitter conversations about feminism and women’s rights. Third, high-profile feminist politicians, activists, celebrities, and journalists were targeted with character attacks by the Russian GRU. These attacks happened indirectly, reinforcing a culture of hate rather than attempting to stifle or suppress the expression of rights through threats or harassment. This comparative look at the online political communication of women’s rights by foreign state actors highlights distinct blueprints for foreign influence operations while enriching the literature about the unique challenges women face online.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
International Journal of Communication
Authors
Amélie Henle
Number
p. 23
Authors
Melissa Morgan
News Type
News
Date
Paragraphs

William Burns has been many things in his long career: U.S. ambassador to Jordan and later Russia, deputy secretary of state, career ambassador, and president of the Carnegie Endowment for International Peace, among others. But with his confirmation on March 19, 2021 he added a wholly unique title to his already remarkable list of accomplishments: the first diplomat to ever serve as director of the Central Intelligence Agency.

Burns’ career path was not always clear. As a young college graduate in 1981, he received an offer from the Foriegn Service, but hesitated to take it. His father, a Major General in the U.S. Army, wrote him a note with the advice, “Nothing can make you prouder than to serve your country with honor.”

At his recent visit to the Freeman Spogli Institute for International Studies, Burns offered the students in attendance similar council about pursuing careers in public service. A recording of his remarks is below.

“I’m a believer in the virtues of public service and what it means to our country,” Burns told the audience.

He recognized that this moment in American policy at home and around the world is one of transition and uncertainty and that the current climate of distrust between the American public and government has had a tremendous impact on domestic politics. Abroad, the rise of China cuts across all sectors of U.S. geopolitics, while even larger, non-state challenges such as climate change, global health insecurity, and the rapid advancement of technology pose even greater existential challenges.

Still, Burns has faith in the unique relationship that the United States has to its public service institutions.

“It’s my obligation as a leader, and your opportunity [as potential future public servants] to demonstrate that we can produce institutions in this country that are professional, apolitical, and devoted to the national interest and doing things in accordance with American values,” he emphasized.

It’s my obligation as a leader, and your opportunity to demonstrate that we can produce institutions in this country that are professional, apolitical, and devoted to the national interest and doing things in accordance with American values.
William J. Burns
Director of the C.I.A.

In his jurisdiction over the C.I.A, Burns has already set benchmarks to ensure the agency remains competitive and serves its purpose of providing policymakers with high-quality, timely intelligence which supports their decision-making process. He is committed to streamlining the hiring process at the C.I.A. and making it more attractive to top talent, as well as diversifying the workforce and drawing on expertise from across all types of professional backgrounds and abilities. “We’re not going to be an effective intelligence organization if everyone at the C.I.A. looks like me,” he quipped.

Keeping the bigger picture in mind, Director Burns reiterated one of the underlying principles that has guided his approach to public service. “Both [diplomacy and intelligence] require a sense of humility. There are perspectives in the world that are not identical to ours. You don’t have to accept or indulge those perspectives, but understanding them is the starting point of effective intelligence work and effective diplomacy.”

Read More

William Burns
News

Ambassador William Burns Reflects On a Career in Diplomacy

Ambassador William Burns Reflects On a Career in Diplomacy
encina
News

Call for Applications: Visiting Fellow in Israel Studies at the Freeman Spogli Institute for International Studies, Stanford University

The visiting fellow will teach at least one course during the quarter of the visit on some aspect of Israel’s politics, society, economy, modern history, technological development and/or regional or international relations.
Call for Applications: Visiting Fellow in Israel Studies at the Freeman Spogli Institute for International Studies, Stanford University
Byter, Bombs, and Spies  - new book by Amy Zegart and Herb Lin
News

Scholars examine cyber warfare in new book

Scholars examine cyber warfare in new book
All News button
1
Subtitle

Director Burns shared how he is applying the lessons he learned as a diplomat to make the intelligence community an effective organization for the challenges facing policymakers today.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

The oldest information system the government operates might also be the most crucial one. No, not the IRS master file system. It’s the technology that controls nuclear weapons. It dates to the 1950s. Yet imagine if the control systems were online in the age of ransomware. Our guest has thought about exactly that. A long time scholar and researcher in cybersecurity, he’s written a book called Cyber Threats and Nuclear Weapons. Stanford University Fellow Dr. Herb Lin joined Federal Drive with Tom Temin.

Read the rest at Federal News Network

Hero Image
All News button
1
Subtitle

The oldest information system the government operates might also be the most crucial one. No, not the IRS master file system. It’s the technology that controls nuclear weapons. It dates to the 1950s. Yet imagine if the control systems were online in the age of ransomware.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

In 2018, U.S. Cyber Command (USCC) released its Command Vision statement for the organization, advancing officially for the first time “defend forward” and “persistent engagement” as new elements in the United States’ approach to advancing its security interests in and through cyberspace. Since then, much debate has ensued about the pros and cons of these concepts. But this debate has not included much discussion of one key aspect—what would be the impact of other cyber powers adopting these concepts in pursuing their own security interests?

Read the rest at Lawfare

All News button
1
Subtitle

In 2018, U.S. Cyber Command released its Command Vision statement, advancing “defend forward” and “persistent engagement” as new elements in the United States’ approach to advancing its security interests in and through cyberspace. Since then, the debate has not included much discussion of the impact of other cyber powers adopting these concepts?

Authors
Rose Gottemoeller
News Type
Commentary
Date
Paragraphs

Emerging and disruptive technologies spell an uncertain future for second-strike retaliatory forces. New sensors and big data analysis may render mobile missiles and submarines vulnerable to detection. I call this development the “standstill conundrum”: States will no longer be able to assure a nuclear response should they be hit by a nuclear first strike. If the nuclear weapons states can manage this vulnerability, however, they might be able to escape its worst effects. “Managing” could mean shoring up nuclear deterrence; it could mean focusing more on defenses; or it could mean negotiating to ensure continued viability of second-strike deterrent forces.

Read the rest at Texas National Security Review

Hero Image
All News button
1
Subtitle

Emerging and disruptive technologies spell an uncertain future for second-strike retaliatory forces. New sensors and big data analysis may render mobile missiles and submarines vulnerable to detection. I call this development the “standstill conundrum”: States will no longer be able to assure a nuclear response should they be hit by a nuclear first strike.

Subscribe to Cybersecurity