Recent News

Records 24 / 46

3 ways the Taiwan-China standoff could impact world markets

August 2022

The standoff between China and Taiwan (and the U.S.) has heightened tensions to their highest level in decades but — so far at least — economic observers haven’t seen a worst-case scenario.

DHS plans to overhaul disinformation efforts to 'increase trust with the public'

July 2022

Herb Lin, a disinformation scholar at Stanford, said DHS will need to tread carefully moving forward. He worries “about any government involvement in this business” and whether “any mechanism that...

How the cyberwar between Iran and Israel has intensified

July 2022

Three things to know about the not-so-covert cyber-operations between these two adversaries

The U.S. isn’t getting ahead of the cyber threat, experts say

June 2022

Network experts, including Herb Lin, say the U.S. is just as vulnerable – or even more vulnerable – to cyber attacks.

Barack Obama Addresses the Intersection of Online Disinformation, Regulation and Democracy at Stanford Event

May 2022

At a conference hosted by the Cyber Policy Center and Obama Foundation, former U.S. President Barack Obama delivered the keynote address about how information is created and consumed, and the threat...

Russo-Ukrainian War Highlights Cyber Threats to Satellite Communications

April 2022

Russia's ongoing war in Ukraine demonstrates that hypothetical scenarios of cyberattacks paralyzing satellite communications are already taking place.

Experts puzzled as to why Russia has not launched major cyber attack against Ukraine or US

March 2022

A few possible reasons: the United States has been helping Ukraine strengthen its cyber infrastructure, U.S. cyber offensive forces may have been disrupting Russian attacks against Ukraine, and the...

Israel and Iran’s Cyberwar Is Increasingly Targeting Civilians

March 2022

In 2010, the world was introduced to Stuxnet, a sophisticated malware developed by Israel and the United States that successfully targeted and damaged the Iranian uranium enrichment plant in Natanz...

Inside the secret world of U.S. intelligence with Stanford scholar Amy Zegart

February 2022

In her new book, Stanford scholar Amy Zegart examines the evolution of the U.S. intelligence community and how technology is changing how it operates.

Meet the Nuclear Sleuths Shaking Up U.S. Spycraft

January 2022

Armed with Internet connections rather than security clearances, scholars, hobbyists and conspiracy peddlers are forcing intelligence agencies to rethink how they do business.

Herbert Lin On Cyber Threats And Nuclear Weapons

January 2022

In this Q&A, Lin discusses his recently released book Cyber Threats and Nuclear Weapons. He explains that until this publication, the literature about cyber technology’s impact on the nuclear...

China’s Fake Twitter Accounts Are Tweeting Into the Void

December 2021

China’s state-linked influence operations get very little engagement on Twitter.

Responding to Fischerkeller on Initiative Persistence

December 2021

I have struggled to find something with which I disagree in Michael Fischerkeller’s response to my thought experiment adopting the 2018 U.S. Cyber Command (USCC) Command Vision. A couple of such...

Interview: Stanford’s Herbert Lin on “Cyber Threats and Nuclear Weapons”

November 2021

Much of the technology now controlling US nuclear weapons was produced before the rise of the Internet. Newer technology will improve aspects of command, control, and communications related to the US...

US Global Ransomware Summit: More Needs to be Done

November 2021

The US Justice Department’s arrest of several affiliates of the Russian-speaking REvil ransomware group comes a month after Washington hosted a virtual international summit on ransomware attacks. The...

What a house cat can teach us about cybersecurity

November 2021

The nation spends billions of dollars on cybersecurity measures, and yet we seem unable to get ahead of this problem. Why are our computers so hard to protect? An experience with a house cat...

Black Shadow & the Future of Cyberwarfare

October 2021

The Jerusalem Press Club speaks to cybersecurity expert Dr. Gil Baram about the impact and significance of the Iranian-affiliated hackers' maneuver against a number of Israeli companies on...

C.I.A. Director William Burns Encourages Students to Pursue Public Service with Humility and Open Minds

October 2021

Director Burns shared how he is applying the lessons he learned as a diplomat to make the intelligence community an effective organization for the challenges facing policymakers today.

The nation’s last line of defense is controlled by really, really old technology

October 2021

The oldest information system the government operates might also be the most crucial one. No, not the IRS master file system. It’s the technology that controls nuclear weapons. It dates to the 1950s...

A Hypothetical Command Vision Statement for a Fictional PLA Cyber Command

October 2021

In 2018, U.S. Cyber Command released its Command Vision statement, advancing “defend forward” and “persistent engagement” as new elements in the United States’ approach to advancing its security...

The Standstill Conundrum: The Advent of Second-Strike Vulnerability and Options to Address It

October 2021

Emerging and disruptive technologies spell an uncertain future for second-strike retaliatory forces. New sensors and big data analysis may render mobile missiles and submarines vulnerable to...

U.S., Allies Seek Ways To Combat Ransomware As Online Attacks Proliferate

October 2021

The more countries involved in the discussion, the better but in the end you want to have global controls on cryptocurrency redemption.

‘It’s quite feasible to start a war’: just how dangerous are ransomware hackers?

August 2021

The Russian government has an arrangement w/cyber-mobs who are active outside Russia: if you hack a Russian system, you’re in trouble. “My guess is that Putin gets a cut,” Herb Lin says.

Can Biden Do Anything to Stop Ransomware Attacks?

July 2021

Christopher Painter explains why the emerging pattern of ransomware attacks needs to be addressed at a political level – both domestically and internationally – and not be treated solely as a...


cain Bruce E. Cain Affiliated Faculty, CDDRL Professor, Humanities and Sciences, Professor, Political Science
rsd19 072 0081a Harold Trinkunas Senior Research Scholar
Jennifer Pan Jennifer Pan Senior Fellow Professor of Communication
Thomas Fingar Thomas Fingar Lecturer at APARC
2015 eileen donahoe 04 web Eileen Donahoe Lecturer, CDDRL
rsd18 083 0009a Alex Stamos Director, Stanford Internet Observatory
Women looking straight forward Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Andrew Grotto Andrew Grotto Director, Program on Geopolitics, Technology, and Governance
Herb Lin Herbert Lin Senior Research Scholar
headshot 3 Nathaniel Persily Co-director, Cyber Policy Center, Senior Fellow Professor, Law, Professor, by courtesy, Political Science, Professor, by courtesy, Communication
Dan Boneh Dan Boneh Co-director, Cyber Policy Center Professor, Electrical Engineering
Camila Simoiu Camelia Simoiu PhD Candidate, Management Science & Engineering