Intelligence
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

The Founding Fathers relied on deceit in championing American independence—and that has lessons for the present.

As we celebrate Thanksgiving weekend, a holiday first declared by George Washington’s presidential proclamation in 1789, it is worth remembering that deception played a pivotal role in America’s birth. Our shining city on the hill owes much to the dark arts. George Washington, Benjamin Franklin, and other Founding Fathers are remembered today as virtuous creators of a bold new democracy. But they were also cunning manipulators of their information environment—a side of the founding story that has often been neglected by history.

George Washington’s inability to tell a lie is a lie. That old cherry-tree fable—in which young George admits to his father that he did, indeed, chop down the tree with his hatchet—was invented by a Washington biographer named Mason Locke Weems in 1806 to boost his book sales. In truth, Washington was an avid spymaster with a talent for deception that would remain unequaled by American presidents for the next 150 years. During the Revolutionary War, Washington was referred to by his own secret code number (711), made ready use of ciphers and invisible ink, developed an extensive network of spies that reported on British troop movements and identified American traitors, and used all sorts of schemes to protect his forces, confuse his adversaries, and gain advantage. His military strategy was to outsmart and outlast the enemy, not outfight him. He used intelligence to avoid more battles than he fought, and to trick the British into standing down when standing up could have meant the end of the Continental Army.

Read the rest at The Atlantic

Hero Image
zegart amy cropped
All News button
1
0
rsd18_083_0009a.jpg

Alex Stamos is a cybersecurity expert, business leader and entrepreneur working to improve the security and safety of the Internet. Stamos was the founding director of the Stanford Internet Observatory at the Cyber Policy Center, a part of the Freeman Spogli Institute for International Studies. He is currently a lecturer, teaching in both the Masters in International Policy Program and in Computer Science.

Prior to joining Stanford, Alex served as the Chief Security Officer of Facebook. In this role, Stamos led a team of engineers, researchers, investigators and analysts charged with understanding and mitigating information security risks to the company and safety risks to the 2.5 billion people on Facebook, Instagram and WhatsApp. During his time at Facebook, he led the company’s investigation into manipulation of the 2016 US election and helped pioneer several successful protections against these new classes of abuse. As a senior executive, Alex represented Facebook and Silicon Valley to regulators, lawmakers and civil society on six continents, and has served as a bridge between the interests of the Internet policy community and the complicated reality of platforms operating at billion-user scale. In April 2017, he co-authored “Information Operations and Facebook”, a highly cited examination of the influence campaign against the US election, which still stands as the most thorough description of the issue by a major technology company.

Before joining Facebook, Alex was the Chief Information Security Officer at Yahoo, rebuilding a storied security team while dealing with multiple assaults by nation-state actors. While at Yahoo, he led the company’s response to the Snowden disclosures by implementing massive cryptographic improvements in his first months. He also represented the company in an open hearing of the US Senate’s Permanent Subcommittee on Investigations.

In 2004, Alex co-founded iSEC Partners, an elite security consultancy known for groundbreaking work in secure software development, embedded and mobile security. As a trusted partner to world’s largest technology firms, Alex coordinated the response to the “Aurora” attacks by the People’s Liberation Army at multiple Silicon Valley firms and led groundbreaking work securing the world’s largest desktop and mobile platforms. During this time, he also served as an expert witness in several notable civil and criminal cases, such as the Google Street View incident and pro bono work for the defendants in Sony vs George Hotz and US vs Aaron Swartz. After the 2010 acquisition of iSEC Partners by NCC Group, Alex formed an experimental R&D division at the combined company, producing five patents.

A noted speaker and writer, he has appeared at the Munich Security Conference, NATO CyCon, Web Summit, DEF CON, CanSecWest and numerous other events. His 2017 keynote at Black Hat was noted for its call for a security industry more representative of the diverse people it serves and the actual risks they face. Throughout his career, Alex has worked toward making security a more representative field and has highlighted the work of diverse technologists as an organizer of the Trustworthy Technology Conference and OURSA.

Alex has been involved with securing the US election system as a contributor to Harvard’s Defending Digital Democracy Project and involved in the academic community as an advisor to Stanford’s Cybersecurity Policy Program and UC Berkeley’s Center for Long-Term Cybersecurity. He is a member of the Aspen Institute’s Cyber Security Task Force, the Bay Area CSO Council and the Council on Foreign Relations. Alex also serves on the advisory board to NATO’s Collective Cybersecurity Center of Excellence in Tallinn, Estonia.

Former Director, Stanford Internet Observatory
Lecturer, Masters in International Policy
Lecturer, Computer Science
Date Label
News Type
Blogs
Date
Paragraphs

On May 23, Stanford students enrolled in Technology and Security (MS&E 193/293) met with General James M. Holmes. General Holmes delivered delivered gave a talk, "Applying Technology--the Military Perspective," and engaged students in a Q&A session afterwards. The interisciplinary course explores the relation between technology, war, and national security policy from early history to modern day, focusing on current U.S. national security challenges and the role that technology plays in shaping our understanding and response to these challenges.

 

img 4445 General James M. Holmes

[[{"fid":"231402","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"2":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"2"}}]]

[[{"fid":"231403","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"3":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"3"}}]]

Hero Image
img 4445
General James M. Holmes
Margaret Williams
All News button
1
-

Abstract: 

  1. What do some of America’s adversaries think about U.S. scientists, engineers and technical specialists they meet?
  2. What is it really like to be an intelligence officer (IO) abroad? What are some of the stresses IO’s experience in their work?
  3. What is Counterintelligence (CI)?
 
Speaker bio: Bill Phillips is a former senior officer of the CIA’s clandestine service (Directorate of Operations.) He has over 36 years experience as a professional intelligence officer. Bill served overseas for most of his 25 years at CIA. Among other things, Bill was the CIA’s senior field operations executive manager in three overseas posts. He also served as the Chief of Staff to the Head of the Clandestine Service  in the months following the 911 attacks. After his retirement from the Directorate of Operations (DO), Bill worked for the National Nuclear Security Administration (DOE) as Director of Counterintelligence at Los Alamos National Laboratory. After that, Bill retired again and worked as a national security consultant on CI to various elements of the executive branch of government. Bill is the recipient of CIA’s Distinguished Career Intelligence Medal, two Meritorious Unit Citations, the CIA National HUMINT Collector Award, CIA’s Latin America Division Medal and numerous other honors for sustained exceptional performance. He was certified as a ‘CI Professional’ by the CIA. Bill is now completely retired and occasionally consults on CI doctrine, the practice of mindfulness in the intelligence profession and resilience issues.
Central Intelligence Agency (retired)
Seminars
Paragraphs
Book cover of "Peace on a Knife's Edge" showing South Korean president Roh Moo-hyun alongside George W. Bush and Kim Jong-il

Lee Jong-Seok served as vice-secretary of South Korea’s National Security Council and as its unification minister under the Roh Moo-Hyun administration (2003–08). After Roh’s tragic death in 2009, Lee resolved to present a record of the so-called participatory government’s achievements and failures in the realm of unification, foreign affairs, and national security.

Peace on a Knife’s Edge is the translation of Lee’s 2014 account of Roh’s efforts to bring peace to the Korean Peninsula in the face of opposition at home from conservative forces and abroad from the Bush administration’s hard stances of “tailored containment” and its declaration of the North as part of the “axis of evil.” Lee’s narrative will give American readers rare insights into critical moments of Roh’s incumbency, including the tumultuous Six-Party Talks; the delicate process of negotiating the relocation and reduction of United States Forces Korea; Roh’s pursuit of South Korea’s “autonomous defense”; conflicts with Japan over history issues; and the North’s first nuclear weapons test.

Desk, examination, or review copies can be requested through Stanford University Press.

All Publications button
1
Publication Type
Books
Publication Date
Subtitle

The Inside Story of Roh Moo-hyun's North Korea Policy

Book Publisher
Shorenstein APARC
-

Through the Hack the Pentagon program, The Department of Defense (DoD) had asked Synack to look for vulnerabilities left undetected by traditional security solutions in one of their highly complex and sensitive systems. The DoD was going to push the limits of security beyond that of most enterprises, and the results were surprising. Hear from Synack CEO Jay Kaplan how the government can benefit from bug bounty programs, what Hack the Pentagon revealed about DoD security, and why more and more organizations are employing red team penetration testing. 

Jay Kaplan co-founded Synack after serving in several security-related capacities at the Department of Defense, including the DoD’s Incident Response and Red Team. Prior to founding Synack, Jay was a Senior Cyber Analyst at the National Security Agency (NSA), where his focus was supporting counterterrorism-related intelligence operations. Jay received a BS in Computer Science with a focus in Information Assurance and a MS in Engineering Management from George Washington University studying under a DoD/NSA-sponsored fellowship. Jay holds a number of security certifications from ISC(2) and GIAC.

Encina Hall, E008 (garden level)

Jay Kaplan CEO Synack
Seminars

Are you interested in cybersecurity? Have you wanted to learn offensive cyber techniques  but don't know where to get started? The Applied Cybersecurity team is hosting an introductory workshop to get people going with practicing exploitation and offensive cyber techniques in an ethical setting. In particular, we will focus on gaining familiarity with techniques used for competing in Capture the Flag (CTF)* competitions. We'll be hosting the first workshop this Friday, in preparation for the Hitcon CTF next week. Bring a laptop! This workshop will assume no prerequisite experience with hacking or cybersecurity so please attend regardless of how unfamiliar you are with the topic. For this workshop, we will focus on web vulnerabilities, binary reversing, and some basic cryptography challenges. Note that experience equivalent to CS107 will be useful. Food will be provided! RSVP here: https://goo.gl/forms/M5yzuQasIZpL4Ovy1

Shriram 366

Paragraphs

President Donald Trump's ominous threat to unleash “fire and fury” on North Korea succeeded at least in garnering the attention of not only Kim Jong Un but the globe. The vague assertion of readiness to carry out a preventive attack on North Korea, even to use nuclear weapons, roiled stock markets, sent Japanese to look for bomb shelters and prompted alarmed warnings against the use of force from both foes and allies, including South Korean President Moon Jae-in. The piece is available in Chinese, English and Japanese.

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Dun Jiao Du
Authors
Daniel C. Sneider
0
Corporate Affiliate Visiting Fellow, 2017-18
kazushi_nomura.jpg

 

Kazushi Nomura is a corporate affiliate visiting fellow at the Walter H. Shorenstein Asia-Pacific Research Center (Shorenstein APARC) for 2017-18.  Prior to joining Shorenstein APARC, he served as a Patent Examiner at the Japan Patent Office, where he was in charge of human computer interfaces.    

Subscribe to Intelligence