Skip to:

Cybersecurity

Recent News

Records 48 / 130

What’s ‘Communist’ about the Communist Party of China?

March 2021

Is the Chinese Communist Party really communist at all? Expert Jude Blanchette, Freeman Chair in China Studies at the Center for Strategic and International Studies, weighs in.

How Biden’s Cyber Strategy Echoes Trump’s

March 2021

The Biden administration released its Interim National Security Strategic Guidance. One would expect a final guidance document to be roughly consistent with the it while also containing more...

Military Competition with China: Harder to Win Than During the Cold War?

February 2021

On February 10th, the APARC China Program hosted Professor Oriana Mastro to discuss military relations between the US and China, and why deterrence might be even more difficult than during the Cold...

Confidence, uncertainty, and trust in AI affect how humans make decisions

February 2021

In 2019, as the Department of Defense considered adopting AI ethics principles, the Defense Innovation Unit held a series of meetings across the U.S. to gather opinions from experts and the public...

A Proposal for a Commission on the Capitol Siege

January 2021

On Jan. 6, the U.S. Capitol was assaulted and occupied for the first time since 1814. Five people were killed, including a Capitol Police officer. Two Republican Representatives have introduced a...

Longer-Term Cybersecurity Implications of the Occupation of the Capitol—Beware of Fake Leaks

January 2021

Inside the U.S. Capitol last week, laptops from the offices of House Speaker Nancy Pelosi and Sen. Jeff Merkley, and other devices were taken, presumably by the occupiers. These devices are now in...

Everybody Spies in Cyberspace. The U.S. Must Plan Accordingly.

December 2020

Because all countries engage in espionage, intrusions like Russia’s latest data hack are devilishly hard to deter.

Indicting Russia's Most Destructive Cyberwar Unit: The Implications of Public Attribution

November 2020

There are three main reasons behind publicly attributing these attacks to Russia.

Hacking the Classroom

September 2020

Security costs money. You pay for security because you want something to not happen. It’s not that something good happens with security, it's that something bad doesn’t happen.

Understanding China's Social Credit System

August 2020

Does a tracking system making laws more enforceable actually improve society?

The Geopolitical Ramifications of Starlink Internet Service?

June 2020

Starlink is a space-based internet service provider that seeks to provide high-speed (40 mbps upload, 100 mbps download ), near-global coverage of the populated world by 2021—bringing this service to...

Online Misinformation about Vaccines

June 2020

In the June 2020 Sabin-Aspen Vaccine Science Policy Report, "Meeting the Challenge of Vaccination Hesitancy," Stanford Internet Observatory research manager Renée DiResta and First Draft...

Cybersecurity Lessons From the Pandemic, or Pandemic Lessons From Cybersecurity

June 2020

Important pandemic lessons from cybersecurity would have saved the U.S. economic and medical heartbreak had those lessons been heeded earlier.

Analysis of April 2020 Twitter takedowns linked to Saudia Arabia, the UAE, Egypt, Honduras, Serbia, and Indonesia

April 2020

On March 11, 2020 Twitter shared with the Stanford Internet Observatory accounts and tweets associated with five distinct takedowns.

Doctrinal Confusion and Cultural Dysfunction in the Pentagon Over Information and Cyber Operations

March 2020

In a Lawfare post earlier this year, I questioned the wisdom of referring to cyber operations as psychological operations. These campaigns are the bread and butter of U.S.

‘Just Say No’ Is Not a Strategy for Supply Chain Security

March 2020

On Feb. 12, White House National Security Adviser Robert O’Brien announced that the U.S.

As US-Russian Arms Control Faces Expiration, Sides Face Tough Choices

March 2020

The Trump administration’s proposal for trilateral arms control negotiations appears to be gaining little traction in Moscow and Beijing, and the era of traditional nuclear arms control may be...

Technology Tensions Redefining U.S.-China Relations, Says Security Expert Adam Segal

March 2020

The headlines about the United States and China have been dominated by the spread of COVID-19 and trade deal negotiations.

China’s Great Firewall Is Built on Friction-based Censorship, Says Margaret Roberts

March 2020

The Great Wall of China is one of Asia’s most photographed and visited landmarks.

Senior Huawei Official Acknowledges Ability to Clandestinely Access Mobile Networks

February 2020

/*-->*/ While everyone was distracted with Justice Department controversies and the New Hampshire primary, a senior Huawei official has conceded that the company can clandestinely access users’...

Iowa caucuses did one thing right: Require paper ballots

February 2020

/*-->*/ “As the confusion that was the Iowa caucuses unfolds, there will be a lot of questions about what happened and how to avoid it in the future.

On the Integration of Psychological Operations with Cyber Operations

January 2020

/*-->*/ In a story released on Christmas Day, 2019, the Washington Post reported that U.S.

Engineering and Technology Expert Cautions Against U.S. Restrictions on Collaboration with Chinese Nationals

November 2019

As a U.S.-China trade deal hangs in the balance and the world’s two largest economies are locked in a race for technological supremacy, concerns have arisen about China’s counterintelligence threat...

People

dan correa Daniel Correa Cyber Initiative Fellow
thumbnail headshot Marc Goodman Affiliate
chuck eesley Charles Eesley Associate Professor, Stanford Technology Ventures Program (STVP), W.M. Keck Foundation Faculty Scholar, Morgenthaler Faculty Fellow, Schulze Family Foundation Distinguished Professor
ramesh johari Ramesh Johari Associate Professor of Management Science and Engineering and Computer Science (by courtesy) and Electrical Engineering (by courtesy)
Lenore Herzenberg Leonore A. Herzenberg Department of Genetics Professor
Jeff Chi Jeffrey Chi Clinical Associate Professor of Medicine
nigam shah Nigam H. Shah Associate Professor of Medicine (Biomedical Informatics Research) and of Biomedical Data Science
Jennifer Pan Jennifer Pan Assistant Professor of Communication, Assistant Professor, by courtesy, of Political Science, Assistant Professor, by courtesy, of Sociology
Ben Calvert Ben Calvert Chief Information Security Officer at SLAC National Accelerator Laboratory
George Triantis George Triantis Charles J. Meyers Professor of Law and Business
Kostas Bimpikis Kostas Bimpikis Associate Professor, Operations, Information & Technology
Yonatan Gur Yonatan Gur Assistant Professor, Operations, Information & Technology