Cybersecurity
Authors
Brad D. Williams
News Type
News
Date
Paragraphs

The US government today formally attributed the SolarWinds cyberespionage campaign to the Russian Foreign Intelligence Service (SVR). The Intelligence Community has “high confidence” in this assessment, the White House statement says, and President Biden signed an Executive Order imposing economic sanctions and other actions on Russia.

Read the rest at Breaking Defense

All News button
1
Subtitle

The White House Executive Order comes on the same day that CISA and CNMF issue SolarWinds-related malware analysis and NSA-CISA-FBI issue a joint advisory warning of ongoing SVR exploitation of known vulnerabilities in common products. Herb Lin comments.

Authors
Charlie Mitchell
News Type
News
Date
Paragraphs

Stanford University’s Herb Lin, a member of the Aspen Institute’s new Commission on Information Disorder, says “cyber-enabled information warfare” poses an existential threat that in many ways defies current government and private-sector structures organized to protect digital systems from cyber attack.

“Cybersecurity is usually thought of in technical terms -- viruses, firewalls, etc. -- and the primary focus is on protecting the computer,” Lin told Inside Cybersecurity. “The problem of defending against information disorder is more about protecting the human mind than about computers. A computer can be patched but there’s no downloadable patch for the human mind.”

Read the rest at Inside CyberSecurity

Hero Image
All News button
1
Subtitle

Stanford University’s Herb Lin, a member of the Aspen Institute’s new Commission on Information Disorder, says “cyber-enabled information warfare” poses an existential threat that in many ways defies current government and private-sector structures organized to protect digital systems from cyber attack.

Authors
Daniel Howley
News Type
News
Date
Paragraphs

It's impossible to stop all hacks, and a lack of cybersecurity experts isn't helping

The U.S. government is still managing the fallout from two separate, massive cyberattacks linked to Russian and Chinese hackers, with a White House task force meeting this past Monday to probe the most recent attack, which involved Microsoft’s (MSFT) e-mail software.

On Thursday, the Senate’s homeland security committee will hold a hearing to probe the other attack, which exploited a vulnerability in a software company called SolarWinds (SWI) in one of history’s most far-reaching cyberattacks on governments and private companies.

Read the rest at Yahoo News

All News button
1
Subtitle

The U.S. government is still managing the fallout from two separate, massive cyberattacks linked to Russian and Chinese hackers, with a White House task force meeting this past Monday to probe the most recent attack, which involved Microsoft’s (MSFT) e-mail software. Herb Lin said, “Nobody knows how to make a system that is usable and perfectly secure.

Authors
Callista Wells
News Type
News
Date
Paragraphs

The China Program at Shorenstein APARC had the privilege of hosting Jude Blanchette, the Freeman Chair in China Studies at the Center for Strategic and International Studies (CSIS). The program, entitled "What’s ‘Communist’ about the Communist Party of China?," explored the goals and ideology of the Chinese Communist Party (CCP), as well as what they might mean for the future of China in the global community. Professor Jean Oi, William Haas Professor of Chinese Politics and director of the APARC China Program, moderated the event.

After the death of Mao Zedong in 1976, the goals of the CCP became less clear. As the country began to adopt market reforms in the 1980s and 1990s, CCP theorists were forced into contortions providing ideological justifications for policies that appeared overtly capitalist. Deng Xiaoping’s concept of “Socialism with Chinese characteristics” came to be seen as a theoretical fig leaf rather than a description of an egalitarian economic system, and by the 2000s, a consensus emerged that the CCP had completely abandoned any pretense of pursuing the Marxist vision it purported to hold. With the rise of Xi Jinping, however, the Party talks with renewed vigor about Marxism-Leninism and the goal of achieving actual, existing socialism. Has the CCP re-discovered communism?  In his talk, Blanchette discussed the abandoned and existing legacies of Mao Zedong, Marxism-Leninism, and the CCP’s vision of socialism. Watch now: 

Read More

Min Ye speaking
News

Domestic or International? The Belt and Road Initiative Is More Internally Focused Than We Think, Says Expert Min Ye

Domestic or International? The Belt and Road Initiative Is More Internally Focused Than We Think, Says Expert Min Ye
Banner of Hau L. Lee
News

The Pandemic, U.S.-China Tensions and Redesigning the Global Supply Chain

The Pandemic, U.S.-China Tensions and Redesigning the Global Supply Chain
American and Chinese flags
News

U.S.-China Relations in the Biden Era

Dr. Thomas Wright examines the recent history of US-China relations and what that might mean for the new administration.
U.S.-China Relations in the Biden Era
All News button
1
Subtitle

Is the Chinese Communist Party really communist at all? Expert Jude Blanchette, Freeman Chair in China Studies at the Center for Strategic and International Studies, weighs in.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

On March 3, the Biden administration released its Interim National Security Strategic Guidance. Regarding cybersecurity, the document stated that 

Read the rest at Lawfareblog

All News button
1
Subtitle

The Biden administration released its Interim National Security Strategic Guidance. One would expect a final guidance document to be roughly consistent with the it while also containing more substantial elaboration. To get a sense of relative priorities, I found it interesting to compare the interim guidance to the Trump National Cyber Strategy published in 2018.

Authors
Callista Wells
News Type
News
Date
Paragraphs

On February 10, 2021, the China Program at Shorenstein APARC hosted Professor Oriana Skylar Mastro, Center Fellow at the Freeman Spogli Institute for International Studies​ for the virtual program "Military Competition with China: Harder to Win Than During the Cold War?" Professor Jean Oi, William Haas Professor of Chinese Politics and director of the APARC China Program, moderated the event.

As US-China competition intensifies, experts debate the degree to which the current strategic environment resembles that of the Cold War. Those that argue against the analogy often highlight how China is deeply integrated into the US-led world order. They also point out that, while tense, US-China relations have not turned overtly adversarial. But there is another, less optimistic reason the comparison is unhelpful: deterring and defeating Chinese aggression is harder now than it was against the Soviet Union. In her talk, Dr. Mastro analyzed how technology, geography, relative resources and the alliance system complicate U.S. efforts to enhance the credibility of its deterrence posture and, in a crisis, form any sort of coalition. Mastro and Oi's thought-provoking discussion ranged from the topic of why even US allies are hesitant to take a strong stance against China to whether or not Taiwan could be a catalyst for military conflict. Watch now: 

Read More

Min Ye speaking
News

Domestic or International? The Belt and Road Initiative Is More Internally Focused Than We Think, Says Expert Min Ye

Domestic or International? The Belt and Road Initiative Is More Internally Focused Than We Think, Says Expert Min Ye
Concept of U,S.-China technology competition: brain-shaped boxing gloves covered in U.S. and China flags facing against each other on a background of a motherboard
News

Caught in the Crossfire: The Future Of U.S.-China Science Collaboration and Its Impact on University Education

Caught in the Crossfire: The Future Of U.S.-China Science Collaboration and Its Impact on University Education
Banner of Hau L. Lee
News

The Pandemic, U.S.-China Tensions and Redesigning the Global Supply Chain

The Pandemic, U.S.-China Tensions and Redesigning the Global Supply Chain
All News button
1
Subtitle

On February 10th, the APARC China Program hosted Professor Oriana Mastro to discuss military relations between the US and China, and why deterrence might be even more difficult than during the Cold War.

Authors
Khari Johnson
News Type
Commentary
Date
Paragraphs

In 2019, as the Department of Defense considered adopting AI ethics principles, the Defense Innovation Unit held a series of meetings across the U.S. to gather opinions from experts and the public. At one such meeting in Silicon Valley, Stanford University professor Herb Lin argued that he was concerned about people trusting AI too easily and said any application of AI should include a confidence score indicating the algorithm’s degree of certainty.

“AI systems should not only be the best possible. Sometimes they should say ‘I have no idea what I’m doing here, don’t trust me.’ That’s going to be really important,” he said.

Read the rest at VentureBeat

Hero Image
All News button
1
Subtitle

In 2019, as the Department of Defense considered adopting AI ethics principles, the Defense Innovation Unit held a series of meetings across the U.S. to gather opinions from experts and the public. Stanford University professor Herb Lin argued that he was concerned about people trusting AI too easily.

Authors
Herbert Lin
Amy Zegart
News Type
Commentary
Date
Paragraphs

On Jan. 6, the U.S. Capitol was assaulted and occupied for the first time since 1814. Five people were killed, including a Capitol Police officer. Two Republican Representatives have introduced a bill to establish a national bipartisan commission to investigate the attack. We agree that a commission is needed. Here, we sketch the mandate, major areas of inquiry, and legislative language that we believe are needed to guide this effort.

Read the rest at Lawfare Blog

Hero Image
All News button
1
Subtitle

On Jan. 6, the U.S. Capitol was assaulted and occupied for the first time since 1814. Five people were killed, including a Capitol Police officer. Two Republican Representatives have introduced a bill to establish a national bipartisan commission to investigate the attack. We agree that a commission is needed.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

Last week, I wrote about cybersecurity issues raised by the loss of physical control in the U.S. Capitol during the occupation. Since then, it has become clear that a number of devices are missing and presumably taken by the occupiers. The rioters took laptops from the offices of House Speaker Nancy Pelosi and Sen. Jeff Merkley. These devices are now in the physical possession of people who can be considered adversarial threat actors, and those actors now have the opportunity to take their time in trying to penetrate them and see what data is available on those machines.

Read the rest at Lawfare blog

All News button
1
Subtitle

Inside the U.S. Capitol last week, laptops from the offices of House Speaker Nancy Pelosi and Sen. Jeff Merkley, and other devices were taken, presumably by the occupiers. These devices are now in the physical possession of people who can be considered adversarial threat actors, who can take their time in trying to see what data is available on those machines.

Authors
Amy Zegart
News Type
News
Date
Paragraphs

The recently revealed SolarWinds hack unfolded like a scene from a horror movie: Victims frantically barricaded the doors, only to discover that the enemy had been hiding inside the house the whole time. For months, intruders have been roaming wild inside the nation’s government networks, nearly all of the Fortune 500, and thousands of other companies and organizations. The breach—believed to be the work of an elite Russian spy agency—penetrated the Pentagon, nuclear labs, the State Department, the Department of Homeland Security (DHS), and other offices that used network-monitoring software made by Texas-based SolarWinds. America’s intelligence agencies and cyberwarriors never detected a problem. Instead, the breach was caught by the cybersecurity firm FireEye, which itself was a victim.

Read the rest at The Atlantic

All News button
1
Subtitle

Because all countries engage in espionage, intrusions like Russia’s latest data hack are devilishly hard to deter.

Subscribe to Cybersecurity