Skip to:

Cybersecurity

Recent Other Publications

Records 21 / 21

Artificial Intelligence and Counterterrorism: Possibilities and Limitations

June 2019

Prepared Written Testimony and Statement for the Record of Alexander Stamos, Director, Stanford Internet Observatory before The U.S.

Spies, Lies, and Algorithms: Why U.S. Intelligence Agencies Must Adapt or Fail

May 2019

For U.S. intelligence agencies, the twenty-first century began with a shock, when 19 al Qaeda operatives hijacked four planes and perpetrated the deadliest attack ever on U.S. soil.

Andrew Grotto Testimony on "Cybersecurity and California Elections"

March 2018

To assess the threat to California's elections systems, the Assembly and Senate elections committees held a joint informational hearing on cybersecurity. The hearing discussed steps California...

Offensive Cyber Capabilities: To What Ends?

January 2018

Abstract: There is a growing interest in the use of offensive cyber capabilities (OCC) among states.

Countering the Proliferation of Offensive Cyber Capabilities

December 2017

How to build NERC CIP compliance: a new course by the SANS Institute

June 2016

This post is a review of a five-day NERC Critical Infrastructure Protection (CIP) training being offered by the SANS institute.

Risk in Cyber Systems

December 2015

Currently, significant uncertainty surrounds cyber security investments.

Maneuvering The China-U.S. Relationship in Cyberspace

October 2015

The article examines the impact of the summit between President Obama and President Xi on future cybersecurity relations between the two countries, and the changing nature of cyber cooperation and...

Analysis of Pin and TPM for Microsoft Laptops

September 2015

Organizations routinely face risk trade-offs.

House Energy & Commerce Committee Testimony on Cyber Threats

March 2015

On Tuesday March 3, 2015, the Subcommittee on Oversight and Investigations held a hearing entitled, “Understanding the Cyber Threat and Implications for the 21st Century Economy.” This was the...

NSA's Creative Interpretations of Law Subvert Congress and the Rule of Law

December 2013

CISAC Affiliate and Forbes Contributor Jennifer Granick explains how NSA domestic surveillance activities might continue, even in the face of legal decisions to rein in the agency's activities. ...

What We Need to Know About PRISM

June 2013

On June 6, the National Security Agency acknowledged the existence of a massive public surveillance program, called PRISM.

Role of Economic Incentives in Securing Cyberspace, The

November 2004

In the last eight years, every significant public policy initiative to address the safety and security of U.S.

Civil Liberties and Security in Cyberspace

August 2000

Societies are becoming more dependent on computer networks and therefore more vulnerable to cyber crime and terrorism.

U.S. Military and Civil Infrastructure Protection: Restrictions and Discretion under the Posse Comitatus Act, The

November 1999

This article sets out the constraints of the Posse Comitatus Act of 1878 (the “Act”), which generally prohibits active enforcement of civilian laws by the military, and describes the discretion of...

High-Performance Computing, National Security Applications, and Export Control Policy at the Close of the 20th Century

May 1998

If high-performance computing (HPC) export control policy is to be effective, three basic premises must hold: There exist problems of great national security importance that require high...

Old Law for a New World? The Applicability of International Law to Information Warfare

February 1997

The development of "information warfare" presents international legal issues that will complicate nations' efforts both to execute and to respond to certain information warfare attacks,...

People

Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Eileen Donahoe Lecturer, CDDRL
Herb Lin Herbert Lin Senior Research Scholar
Alex Stamos Adjunct Professor Visiting Scholar, Hoover Institution, Director, Stanford Internet Observatory
Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Headshot of Thomas Fingar Thomas Fingar Lecturer at APARC
Dan Boneh Dan Boneh Co-director, Cyber Policy Center Professor, Electrical Engineering
Nathaniel Persily Co-director, Cyber Policy Center, Senior Fellow Professor, Law, Professor, by courtesy, Political Science, Professor, by courtesy, Communication
Jan Rydzak Research Scholar, CDDRL Research Scholar and Associate Director for Program, GDPi
Max Smeets Max Smeets Postdoctoral Fellow
Gregory Falco Postdoctoral Fellow