Authors
News Type
News
Date
Paragraphs

Andrew J. Grotto, a former top National Security Council cybersecurity official in the White House, will join Stanford’s Center for International Security and Cooperation this summer.

Grotto will hold the William J. Perry International Security Fellowship and serve as a research fellow at the Hoover Institution. His appointment is for two years, and he will also be a fellow in the Stanford Cyber Initiative

Cybersecurity focus

Grotto has been involved in virtually every major U.S. cyber policy initiative of the past nine years, from his time on Capitol Hill through his tenure in the Obama Administration as Commerce Secretary Penny Pritzker's senior advisor on technology policy, and to his recent service for two presidents as senior director for cyber policy at the National Security Council. 

Amy Zegart, CISAC's co-director for the social sciences and a senior fellow at the Hoover Institution, said, "Grotto is one of the world's leading cyber policymakers. He brings deep knowledge, penetrating insights, and experience at the highest levels on issues ranging from trade to espionage to cyber warfare. We are delighted to have him join the cyber community at CISAC and Hoover."

In an interview, Grotto said that cyber policy remains underdeveloped as a distinct policy domain. And that has drawn him to CISAC, he noted, “for its commitment to becoming a leading institution supporting the development of this domain.”

Image
image1
Grotto added, “In more established national security domains, such as nonproliferation and counterterrorism, there is a well-developed corpus of scholarly work, historical precedent, and practical experience within the domain that we can draw from to inform, contextualize and evaluate policy decisions. This corpus is still thin with respect to cyber policy making. We don’t have the luxury of waiting decades to create this corpus for cyber – we need to develop it quickly.” 

Grotto first became familiar with CISAC's work during an earlier phase of his career when he focused on U.S. policy towards nuclear weapons - how to prevent their spread, and their role in U.S. national security strategy. CISAC core faculty member Scott Sagan was an early mentor of Grotto’s and first exposed him to CISAC and its scholarly work. Grotto describes the center as a “first-rate research institution at a world class university, with great people. I'm thrilled to be a part of it.”

 

Topics to explore

Cybersecurity policy is a vast field, Grotto said, because virtually every national security challenge facing the country has a cyber dimension to it. 

“I'd be hard pressed to identify a single directorate within the National Security Council that my team and I did not at some point work with on a ‘cyber and…’ problem: cyber and the financial services sector, cyber and the electric grid, cyber and global economic competitiveness, cyber and China, to name a few. So, there's no shortage of cyber-related topics to write on,” he said. 

Several policy problems stand out as foundational for Grotto, and these will be the focus of his research and writing while at CISAC:

• Development of analytic frameworks for defining the dimensions and boundaries of private sector responsibility, especially infrastructure, for defending against cyber threats, versus the government’s responsibility, and using these frameworks to evaluate cybersecurity regulation and identify opportunities and challenges for more effective cybersecurity partnerships between the government and the private sector.

• Cyber-enabled information operations as both a threat to, and a tool of statecraft for, liberal democracies.

• Opportunities and constraints facing offensive cyber operations as a tool of statecraft, especially those relating to norms of sovereignty in a digitally connected world. 

For example, Grotto explained, an adversary physically located in Country X may have cyber infrastructure in Country Y and Country Z, such that an operation against that adversary generates effects in one or more third countries. “How we approach this ‘third country’ issue will have dramatic ramifications for the practical role of offensive cyber operations in U.S. national security strategy,” he noted.

• Governance of global trade in information technologies, especially cybersecurity-related regulation, norms of behavior in cyberspace for governments and private actors, and the appropriateness of applying traditional arms control tools such as export controls to limit the proliferation and use of malicious cyber capabilities.

National Security Council highlights

Grotto said working at the National Security Council was “a privilege of a lifetime. It was the most challenging and intense job I have ever had, and easily the most rewarding.” 

His portfolio spanned a range of cyber policy issues, including defense of critical infrastructure—financial services, energy, communications, transportation, health care, electoral infrastructure, and other vital sectors—cybersecurity risk management policies for federal networks, consumer cybersecurity, and cyber incident response policy and incident management. He also covered technology policy topics with a nexus to cyber policy including encryption, surveillance, privacy, Internet of Things, and the national security dimensions of artificial intelligence and machine learning. 

Grotto said his first job out of graduate school was at a prominent Washington, D.C. think tank. “I viewed it as a waypoint on the path to becoming a law professor, and an academic career focused on international trade law and policy,” he said.

There he was surrounded by people who had served in government, and their “passion for public service was infectious,” he recalled.

He left the think tank to join the Professional Staff of the Senate Select Committee on Intelligence, where he served as then-Chairman Dianne Feinstein’s (D-CA) lead staff overseeing cyber-related activities of the intelligence community and all aspects of NSA’s mission. He also served as committee designee first for Senator Sheldon Whitehouse (D-RI) and later for Senator Kent Conrad (D-ND), advising the senators on oversight of the intelligence community, including of covert action programs, and was a contributing author of the “Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program.”

In 2013, he left the committee to become Commerce Secretary Penny Pritzker’s senior advisor on technology policy, advising Pritzker on all aspects of technology policy, including Internet of Things, net neutrality, privacy, national security reviews of foreign investment in the U.S. technology sector, and international developments affecting the competitiveness of the U.S. technology sector.

While serving on the NSC, Grotto played a key role in shaping President Obama’s Cybersecurity National Action Plan and driving its implementation. He was also the principal architect of the Trump Administration's cybersecurity executive order, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”

During his time on Capitol Hill, he led the negotiation and drafting of the information sharing title of the Cybersecurity Act of 2012, which later served as the foundation for the Cybersecurity Information Sharing Act that President Obama signed in 2015.

Grotto received a master’s degree in public administration from Harvard University, a law degree from UC Berkeley, and a bachelor’s degree in philosophy from the University of Kentucky.

MEDIA CONTACT:

Andy Grotto, Center for International Security and Cooperation: grotto@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: 650-725-6488, cbparker@stanford.edu

 

 

Hero Image
gettyimages 646068058
Andrew J. Grotto, a former top National Security Council cybersecurity official, will join Stanford’s Center for International Security and Cooperation this summer.
Getty Images
All News button
1
Authors
Amy Zegart
News Type
News
Date
Paragraphs

CISAC's co-director Amy Zegart wrote this essay, "James Comey's 'Shock and Awe' Testimony," for The Atlantic in its June 8 edition and was also quoted in this Stanford News Service article:

Imagine that two years ago, you sequestered a jury of 12 Americans, kept them in a news-free zone, and brought them today to hear former FBI Director James Comey testify before the Senate Intelligence Committee. Chances are that all of them—no matter what their political beliefs—would be stunned and outraged.

From the perspective of one of these Americans, Comey dropped bombshell after bombshell: The Russians are mucking around in American democratic elections, trying to change how we think, how we act, how we vote—and they will be back. The attorney general cannot be trusted to ensure impartial enforcement of the law. The president fired the FBI director and then lied about why he did it. Yet by the time Comey said these things in an open hearing, all of it was old news. It should have been more shocking than it was, but on some level, Americans were used to it.

Some historical context here is important. Only one FBI Director has ever been fired since J. Edgar Hoover took the job back in 1924: William Sessions, who was sacked by President Bill Clinton in 1993 after the Justice Department's own Office of Professional Responsibility found so many severe ethical lapses, they filled a 161-page report. It included schemes to avoid paying taxes, using government funds to build an expensive home fence that actually reduced the security of the property, using FBI resources for personal purposes, and involving his wife, Alice, in bureau management in “entirely inappropriate” ways. Comey, by contrast, was fired by President Trump for doing his job. Big difference. One was miscarrying justice and abusing power; the other was carrying out justice and speaking truth to power.

Similarly, the only episode in recent history approximating the cloud hanging over the attorney general’s office occurred during the Watergate scandal. That attorney general chose to resign rather than fire White House special prosecutor Archibald Cox and impede an investigation reaching into the White House. This attorney general, by contrast, appears to be implicated in an investigation that reaches into the White House.

Finally, never in American history has a foreign power so deliberately, powerfully, and maliciously tried to distort the cornerstone of American democracy. Comey sent this point home in the hearing, declaring, “There should be no fuzz on this whatsoever. The Russians interfered in our election during the 2016 cycle. They did it with purpose. They did it with sophistication. They did it with overwhelming technical efforts. … It is a high confidence judgment of the entire intelligence community. ... It's not a close call.”

Comey’s testimony delivered a “shock and awe” campaign, FBI-style: calm, cautious, and candid, at once stoic and relatable. It was as though Comey were trying to reach through our television sets and shake the body politic into our collective senses.

And yet, his shock and awe testimony may not shock and awe for long. The biggest story of the day is how unlikely this is to remain the biggest story. In all likelihood, after the Twittersphere dies down, partisans will retreat to their respective corners and business as usual will return to Washington.

Why?

Because of something called the “normalization of deviance:” the more frequently exceptional things happen, the less we think of them as exceptional.  Over time, we become desensitized to events that fall far outside the normal range—often with disastrous consequences. The space shuttle Challenger exploded in 1986 despite previous shuttle launches that revealed O-ring seals in the shuttle’s rocket boosters were cracking in cold weather. They shouldn’t have been cracking at all. But NASA “normalized” the poor performance of O-rings as acceptable and okayed the launch, even with record low temperatures forecast for liftoff. Seven astronauts, including Christa McAuliffe, the first teacher in space, were killed.

We experience the normalization of deviance in daily life, too. Ever hear a funny noise in your car? The first time, it seems alarming. After living with it for a few days, however, you think it must not be so serious after all. You tell yourself the car seems to be running just fine. You grow accustomed to the noise. After a while you don’t notice it anymore. And maybe the car really is fine. Or maybe the funny noise is an indication that the car is about to experience a catastrophic breakdown (which is what happened to me one night, when I assumed a strange noise in my car was really nothing, until the car broke down on the freeway, at night, in Los Angeles, “without warning.”)

The Trump era has brought the normalization of deviance to politics. In four short months, this administration’s national-security advisor has had to resign in disgrace for lying about his contacts with Russians and now faces possible criminal charges. The attorney general is so tainted by his own Russian-related activities that he has had to recuse himself from the bureau’s investigation of Russian-related activities. And the FBI director, who by law serves a 10-year term precisely to ensure independence from the president, was fired by the president because he was independent. This is bizarro world. Any one of these events would in normal times be enough to bring down a president. And yet senators today were talking about whether President Trump’s exact words to Jim Comey constituted a hope, a wish, an order, a directive, a threat, or as one senator characterized it, simply a “light touch” approach.

Comey was right about one thing: The Russians “are coming after America.” They may not have to. In this era of normalized deviance, we are defeating ourselves.

Read Amy Zegart's comments and those from other Stanford faculty in this Stanford News Service article.

Hero Image
gettyimages 693800194
Former FBI Director James Comey moves from an open hearing to a closed hearing during a break in testimony before the Senate Intelligence Committee in the Hart Senate Office Building on June 8, 2017 in Washington, DC. CISAC's Amy Zegart says Comey was right about one thing: The Russians “are coming after America.” They may not have to, she added -- in this era of normalized deviance, we are defeating ourselves.
Chip Somodevilla/Getty Images
All News button
1
News Type
News
Date
Paragraphs

 

The Center on Democracy, Development, and the Rule of Law (CDDRL) at Stanford University announced today that it has launched the Global Digital Policy Incubator (GDPi). GDPi’s mission is to help develop governance norms for the global digital ecosystem that reinforce democratic values, universal human rights and the rule of law. It will serve as a multi-stakeholder collaboration hub at Stanford for technologists, governments, civil society and the private sector actors. GDPi will identify and incubate global policy and governance innovations that enhance freedom, security and trust in the digital realm. 

 

Image

GDPi will be led by Eileen Donahoe who is widely recognized as a leading advocate for human rights in the digital realm, and as an experienced international lawyer and diplomat working to develop global norms for Internet governance and digital policy.  

Donahoe was appointed by President Obama to serve as the first United States Ambassador to the United Nations Human Rights Council in Geneva. After leaving government, Donahoe served as director of global affairs at Human Rights Watch, where she represented the organization worldwide on human rights foreign policy, with special emphasis on digital rights, cybersecurity and Internet governance. 

“Silicon Valley is a natural locus for cross-sector international collaboration on global digital norms,” said Donahoe. “Our mission will be to facilitate development of operational policies and processes to address societal challenges that arise from technological innovation. I am so excited to have the opportunity to build this global innovation hub for digital policy at CDDRL, the perfect home for this dynamic and interdisciplinary project.”  

GDPi will explore the complex roles of government and private sector technology firms in the digital environment. While rapid adoption of digital technology has brought many benefits and challenges to society, most legal and governance institutions have not kept pace or adjusted to meet the corresponding changes.  

GDPi will address governance challenges in four interrelated areas: digital rights; digital security; artificial Intelligence-based governance and trans-national Internet governance. The initiative seeks to engage stakeholders in new articulations of existing international human rights and humanitarian law.  [[{"fid":"226716","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"","field_file_image_alt_text[und][0][value]":false,"field_file_image_title_text[und][0][value]":false,"field_credit[und][0][value]":"","field_caption[und][0][value]":"Eileen with President Obama during her tenure as the first US Ambassador to the United Nations Human Rights Council in Geneva. ","thumbnails":"crop_870xauto","alt":"","title":""},"type":"media","field_deltas":{"3":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"","field_file_image_alt_text[und][0][value]":false,"field_file_image_title_text[und][0][value]":false,"field_credit[und][0][value]":"","field_caption[und][0][value]":"Eileen with President Obama during her tenure as the first US Ambassador to the United Nations Human Rights Council in Geneva. ","thumbnails":"crop_870xauto","alt":"","title":""}},"link_text":null,"attributes":{"style":"margin: 3px 10px; float: right; height: 393px; width: 300px;","class":"media-element file-crop-870xauto","data-delta":"3"}}]]

Larry Diamond, a senior fellow at the Freeman Spogli Institute and an affiliated faculty member at CDDRL, will serve as the principal investigator on the GDPi project.  

“We are really delighted that Eileen Donahoe has agreed to join CDDRL as adjunct professor and executive director of the new GDPi,” said Diamond. “Every month, it seems, social media and other digital tools are becoming more and more powerful and pervasive in their effects on our politics, government and daily lives. As digital technology races forward, it not only generates new platforms and possibilities for human empowerment, but it also poses growing challenges for human rights and individual, national and international security.”   

Diamond launched the Program on Liberation Technology (LibTech) at CDDRL in 2009 to examine how technology has empowered democratic progress. GDPi is a successor to the LibTech program, enabling the Stanford team to take a more comprehensive and policy-oriented approach to digital policy challenges - involving not only research but also innovation to incubate new ideas and approaches.  

Quarterly workshops and an annual global conference will be the foundation for GDPi’s work in the coming year.  

The GDPi initiative joins five other core research programs at CDDRL, which probe some of the most urgent issues facing the field of democracy and development. Working in partnership with other institutes on campus, the program will benefit from the guidance and active engagement of cross-disciplinary faculty from Stanford Law School, the Center for Internet and Society, the Stanford Cyber Initiative and the Center for Social Innovation at the Graduate School of Business. 

Michael McFaul, director of Stanford’s Freeman Spogli Institute for International Studies expressed confidence that GDPi will help solidify Stanford’s role as a global thought-leader on governance challenges that flow from digital technology. 

“The Global Digital Policy Incubator will become an important hub at Stanford, as we seek to help government and private sector policymakers address governance challenges of the 21st century digital world.”  

More information about the Global Digital Policy Incubator can be found at http://cddrl.fsi.stanford.edu/global-digital-policy-incubator

 

 

CAPTIONS:

The picture in the left upper corner: Eileen Donahoe addressing the United Nations Human Rights Council in Geneva, where she served as the first US Ambassador 2010-2013.

The picture on the right: Eileen Donahoe with President Obama during her tenure at the UNHRC. 

 

Hero Image
ambdonahoe 5 1000pix
All News button
1
Authors
News Type
News
Date
Paragraphs

Emily Tuong-Vi Nguyen, a Stanford student studying human biology, writes about the Asia Health Policy Program’s international conference on diabetes

The Asia Health Policy Program at the Shorenstein Asia-Pacific Research Center hosted the Net Value in Diabetes Management Workshop in March to discuss progress on an international research collaboration. Research teams from Hong Kong, Singapore, China, Taiwan, South Korea and the United States convened at the Stanford Center at Peking University (SCPKU) in Beijing to work on research that compares utilization and spending patterns on diabetes across different countries and to develop a method for measuring the net value of diabetes internationally, based on previous methods discussed in a Eggleston and Newhouse et al. 2009 study with Mayo Clinic Data for Type 2 diabetes.

The research teams from various Asian countries are attempting to calculate the net value of diabetes in those countries by observing the changes in diabetes value and spending. These calculations include monetizing the value of health benefits of new treatments and improvements in health, as well as avoided spending on treatments when prevention was effective, and associated mortality and probability of survival. Previous models used to measure diabetic values and risks, such as the United Kingdom Prospective Diabetes Study (UKPDS) risk engine that was created from U.K. data and populations, are not very relevant for Asian populations. The goal is to create separate risk models specifically suited for populations from Hong Kong, Singapore, China, Taiwan and South Korea.

During the workshop that spanned two days, the research teams had an opportunity to share updates on their individual projects and to discuss methods and ideas for future collaboration.

On the first day, each research team presented its work, describing data sets and explaining the risk models that were used or developed. Karen Eggleston, director of the Asia Health Policy Program, delivered introductory remarks and shared current progress by the Japan and Netherlands research teams on calculating value and risk for diabetes with data from the Netherlands and Japan. The data sets from those two countries were best estimated by the JJ Risk Engine for the Japan data and the UKPDS model for the Netherlands data.

Chao Quan of the University of Hong Kong presented the risk model used for Hong Kong populations. His work primarily looked at how the UKPDS risk engine predicted risk in Hong Kong populations as compared to a local Hong Kong risk engine and how to best calibrate the Hong Kong risk engine. His next step will be to monetize the value for improved survival in diabetes in Hong Kong. He offered to re-estimate the model using the risk factors available on others’ datasets so that the Hong Kong risk model could potentially be used by other teams as well.

Stefan Ma and Zheng Li Yau of the Ministry of Health of Singapore discussed the 5-year prediction model and statistical methods they used for all-cause mortality of Singaporean individuals with diabetes. Their work is based on Singapore’s extensive administrative and claims data as well as data provided by the national health surveys conducted every six years by the National Health Service of Singapore. The researchers plan to look into how their overall risk model compares with models for specific subpopulations, such as Chinese, Malay and Indian populations in Singapore.

Katherine Hastings from the Stanford University team, led by principal investigator Latha Palaniappan, presented preliminary ideas about measuring cardiovascular risk with the Atherosclerotic Cardiovascular Disease Risk Score in analyses of Stanford health system diabetic patients. The researchers are collaborating with a clinical bioinformatics team at Stanford to use machine learning to expedite the analysis.

Min Yu and Haibin Wu of the Zhejiang Center for Disease Control and Prevention shared results from their analysis of health data collected from community health centers for diabetes management, diabetes surveillance data, cause of death data and insurance claims data that showed relationships between different patient characteristics and insurance types. The researchers then estimated the annual cost of Type 2 diabetes and its complications in Tongxiang province, China.

Hai Fang and Huyang Zhang of Peking University worked with claims data of diabetic patients insured by the New Cooperative Medical Scheme in Beijing, and at the workshop, shared regression analyses on the relationship between outpatient visits and inpatient admissions.

Jianqun Dong of the People’s Republic of China Center for Disease Control and Prevention presented ongoing research about diabetes management in China, including preliminary results of a randomized control trial of diabetes self-management strategies.

Wankyo Chung of Seoul National University shared preliminary estimates of a risk model for mortality among diabetic patients in South Korea and discussed next steps for estimating net value of diabetes management using the detailed clinical and claims data available in South Korea.

On the second day, the workshop concluded with a videoconference between workshop participants in Beijing and collaborators at Stanford Graduate Business School, including Stanford professor Latha Palaniappan and Harvard visiting professor Joseph P. Newhouse, using the Highly Immersive Classroom.

The workshop was a good opportunity for the research teams to discuss preliminary models, to offer each other suggestions regarding research methods, and to discuss the future direction of the international collaboration on the net value of diabetes. All research teams are preparing comparative research papers that will be included in the working paper series of the Asia Health Policy Program. A follow-up event will be held at Stanford in November 2017 in recognition of World Diabetes Day.

Hero Image
diabetes conference beijing
A group of participants from the workshop, “Net Value in Diabetes Management,” at Stanford Center at Peking University, March 24, 2017, from left to right: Zheng Yi Lau from the Ministry of Health of Singapore; Chao Quan (University of Hong Kong); Jui-fen Rachel Lu (Chang Gung University); Emily Nguyen, Karen Eggleston, and Katie Hastings (Stanford); and Stefan Ma (Ministry of Health of Singapore).
Courtesy of Emily Tuong-Vi Nyugen
All News button
1
News Type
News
Date
Paragraphs

(The following interview with CISAC's Siegfried Hecker appeared in the May 15 issue of the Bulletin of the Atomic Scientists.)

By Elisabeth Eaves

Siegfried Hecker has the rare distinction of being an American who has visited both North Korean and Russian nuclear facilities. An expert on plutonium science and a professor at Stanford University’s Center for International Security and Cooperation, Hecker is also a former director of the Los Alamos National Laboratory. Here he answers questions on Pyongyang’s nuclear capabilities, its most recent missile test, and what influence the new president of South Korea might have on the regional balance of power. He explains how North Korea developed its arsenal despite global opposition, and says there is no conceivable way the United States can destroy all North Korean nuclear weapons with military might.

BAS: Is North Korea currently capable of delivering any nuclear weapons any distance? How do you know?

SH: We know they have nuclear weapons that work because they have tested five nuclear devices over a period of 10 years. That test experience most likely enables them to miniaturize nuclear warheads to make them small and light enough to mount on missiles. They have also demonstrated over many years that they can launch relatively short-range missiles reliably. We have to assume they can mate the warheads and the missiles so as to reach targets anywhere in South Korea and Japan.

BAS: What does Pyongyang’s most recent missile test, which took place on Sunday, tell us about their capabilities and intentions?

SH: The missile experts are still analyzing the test as North Korea releases details and photos. However, they already agree that this missile outperformed any previous North Korean missile launch. It is reported to have traveled nearly 800 kilometers (497 miles) for 30 minutes (splashing down in the Sea of Japan south of the Russian border) and reached an altitude in excess of 2000 km (1243 miles). Since it was launched in a lofted trajectory, it may be able to travel at least 4,000 km (2486 miles) if launched on a standard trajectory. 

This would make it a real intermediate-range ballistic missile that puts Guam within range. But the more important objective of this test was to move North Korea closer to having an intercontinental ballistic missile (ICBM). 

BAS: What sequence of events might lead Kim Jong-un to launch a nuclear attack on one of its neighbors like South Korea or Japan? 

SH: I cannot imagine any circumstance that would lead Kim Jong-un to launch an unprovoked nuclear attack on anyone. However, we know so little about him and even less about the military that controls the country’s strategic rocket forces that we can’t rule out a miscalculation or a desperate response to a crisis. It is conceivable that they believe a small nuclear weapon could be used to de-escalate or terminate a conventional confrontation on their terms. 

BAS: How big is the largest nuclear bomb tested by North Korea, and can you give a sense of the level of damage such a bomb would cause? 

SH: The highest yield of the North Korean tests to date is in the range of 15 to 25 kilotons—an explosive power similar to the bombs that destroyed Hiroshima and Nagasaki, causing roughly 200,000 immediate fatalities and lingering radiological health effects for many survivors. If such a weapon were to be exploded over Seoul, it is possible that several hundred thousand people or more would perish. 

BAS: If Pyongyang were to attack South Korea or Japan, what would be the immediate and longer-term effects?

SH: The immediate effects would be horrific, the longer-term effects catastrophic. If several bombs exploded over South Korean or Japanese cities, there could be a million or more casualties. Beyond that, the cities would face massive evacuations and long-term building and grounds decontamination efforts. Dangerous radioactive clouds would drift over South Korea, Japan, China, or Russia, depending on the wind flow. An international order would be destroyed. 

BAS: How close is North Korea to being able to attack somewhere as far distant as the United States with a nuclear weapon? What technical leaps does it need to make to achieve that capability?

SH: I believe that North Korea does not yet have the capability to reach the US mainland with a nuclear-tipped missile. It has a very sparse and not very successful long-range rocket test history, although the missile test on Sunday brings it somewhat closer. Its solid-fueled rockets, which are of greatest concern because they can be launched quickly and from hidden locations, have failed regularly. It will need to miniaturize warheads to a much greater extent than it is currently likely capable of doing, and the warheads will have to survive the stresses at launch and the high temperatures and stresses during re-entry. At the current pace, North Korea may be able to make the technological progress required for a nuclear-tipped ICBM in five or so years. 

One corollary question that one must ask, however, is why would North Korea want to strike the US mainland? It is quite clear that it wants to threaten Washington with such a capability, but to launch would be suicidal, and I don’t believe the regime is suicidal. 

BAS: Besides being able to threaten the United States and its allies, what else could the Kim regime be trying to accomplish with its nuclear weapons?

SH: We need to look closely at how the North’s growing nuclear arsenal may change its domestic policies and foreign relations. Domestically, the nuclear arsenal may help justify the regime’s continued call for sacrifice by its citizens. But it may also provide a more solid foundation for the state’s security, allowing it to devote more resources to economic growth. Foreign visitors have reported that living conditions in Pyongyang have improved markedly in the past few years despite international sanctions. Kim Jong-un has officially promoted the dual policy of military and economic growth. 

Looking abroad, the regime’s nuclear arsenal could make it more aggressive in dealings with South Korea and the rest of the region. We have not seen a return to the North’s especially aggressive behavior of the late 1960s. Nevertheless, being one of fewer than 10 states in the world with nuclear weapons may change Pyongyang’s foreign policy toward its neighbors. And we don’t know how possessing a nuclear arsenal will affect the regime’s behavior in a crisis. 

BAS: Is it plausible that a US pre-emptive strike could destroy all North Korean nuclear weapons, fissile material, and nuclear production facilities? Why or why not?

SH: There is no conceivable way the United States could destroy all North Korean nuclear weapons. It is not possible to know where they all are. Even if a few could be located, it would be difficult to destroy them without causing them to detonate and create a mushroom cloud over the Korean peninsula. 

It is even less likely that the United States could locate and demolish all of the North’s nuclear materials. Missile launch sites could be destroyed, nuclear test tunnels could be bombed, production sites could be destroyed, and North Korean missiles could possibly be intercepted after launch. But North Korea is developing road-mobile and submarine-launched missiles, which cannot be located reliably. New test tunnels can be dug. And while we know North Korea has covert production facilities, we don’t know where they are. The US military may not be able to intercept missiles after launch. The bottom line is, military strikes could be used to set back the North Korean nuclear program but not to eliminate it.

Moreover, I believe the US and South Korean governments consider the consequences of any military intervention unacceptably high—in spite of the proclamation that “all options are on the table.” I believe the military option will only really be on the table if North Korea initiates military actions. 

BAS: There is talk that North Korea is about to conduct a sixth nuclear test. What do you make of these reports? Do you have any insight into what to expect?

SH: North Korea has ample technical reason to test again as it moves toward developing a credible nuclear-tipped ICBM. The test site appears to be ready. I believe the only thing that inhibits them from testing is the political fallout they would face—particularly from China and the new South Korean administration.

BAS: You recently estimated that North Korea has 20 to 25 nuclear weapons. How do we know?

SH: My estimate that it has sufficient plutonium and highly enriched uranium for 20 to 25 nuclear weapons is highly uncertain because we know so little about its uranium enrichment capacity. All estimates are to a large extent based on the observations my Stanford colleagues and I made during my last visit to Yongbyon in November 2010. To my knowledge, no outsiders have been in their nuclear complex since. So the only direct evidence we have is from that 30-minute tour and discussions with their experts at the centrifuge facility. The rest of the estimate is based on indirect evidence—that is, satellite imagery, and what North Korea chooses to publicize, combined with modeling of their capabilities and acquisitions. 

BAS: North Korea carried out its first nuclear test in 2006. How was it able to go from that widely condemned first test to today’s arsenal despite global opposition? 

SH: How they developed a threatening nuclear arsenal despite global opposition is a sad reflection on unwise US policies and the international community’s approach to preventing nuclear proliferation. Controlling the supply side of proliferation has been the predominant international mechanism for halting nuclear weapons development, but it failed terribly in the North Korean case. The international export system is leaky enough that a determined government can develop indigenous bomb-building capabilities over time. In North Korea, this process was exacerbated by the fact that once they built the Bomb, sanctions and isolation allowed them to build a whole arsenal instead of forcing them to give it up.

Insufficient attention has been paid to the demand side—that is, to why states want nuclear weapons and what can be done to influence the decision to acquire them. In the North Korean case, the Clinton administration greatly slowed North Korea’s drive to the Bomb with diplomacy. The Bush administration rejected diplomacy, but was unprepared for the consequences. It stood by while North Korea built a nuclear weapon. Subsequent attempts at diplomacy amounted to too little, too late. (This should serve as a lesson on the Iran nuclear agreement: if you kill a deal, you better be prepared for the consequences). The Obama administration was greeted with a North Korean nuclear test in 2009 and was never able or willing to pursue diplomacy effectively. It relied on two tactics, imposing sanctions and pressuring China, while North Korea continued to build its arsenal. Washington and Beijing never got on the same page on how to deal with Pyongyang. 

BAS: South Korea just elected a new president who takes a more conciliatory approach to North Korea than his predecessor. How might this affect the North’s nuclear activities?

SH: In the end, the Korean peninsula nuclear crisis has to be resolved to the satisfaction of the Korean people. South Korean President Moon Jae-in favors diplomatic engagement with North Korea. I believe that at this point, it is imperative for Seoul and Washington to craft a unified strategy on North Korea and speak with one voice. That voice should reflect the new South Korean president’s views on finding a diplomatic resolution. I hope that the Trump administration will support President Moon, and that Pyongyang won’t pre-empt diplomacy with a nuclear or long-range missile test. 

BAS: If you were advising president Trump, what would you tell him to do in the next month regarding North Korea? In the next six months? The next year?

SH: In the next few weeks, after consultation with President Moon, President Trump should send an envoy to Pyongyang to tackle the most immediate danger—that is, to avoid a nuclear detonation on the Korean peninsula. There is a danger that overconfidence or miscalculation by Kim Jong-un, or an unpredictable reaction to a crisis, could result in a nuclear detonation. I also have serious concerns about a nuclear-weapon accident in North Korea, particularly if Pyongyang feels threatened and begins to deploy its nuclear arsenal. Moreover, in the case of upheaval or chaos in the North, who will control the weapons, and what will become of them? 

The next six months should be followed up with additional bilateral US-North Korea dialogue, with Washington separately keeping Seoul and Beijing informed. Washington should stress the seriousness of the situation, but also listen to the North’s concerns. 

These dialogues may then lay the foundation within the next year for a resumption of multilateral negotiations to halt, roll back, and eventually eliminate North Korea’s nuclear weapons. Talks could also lay the groundwork for normalizing relations between the North and its neighbors and the United States.

Follow CISAC at @StanfordCISAC and www.facebook.com/StanfordCISAC.

MEDIA CONTACTS:

Siegfried Hecker, Center for International Security and Cooperation: (650) 725-6468, shecker@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-6488, cbparker@stanford.edu

 
Hero Image
gettyimages 111717564 Getty Images/Feng Li
All News button
1
Authors
Amy Zegart
News Type
News
Date
Paragraphs

(Amy Zegart, co-director of the Center for International Security and Cooperation, wrote the following essay for The Atlantic.)

Today The Washington Post dropped the bombshell that President Trump had revealed classified information about the Islamic State to Russian Foreign Minister Sergei Lavrov and Russian ambassador Sergey Kislyak when the three of them met at the White House last week. You know a story is big when it gets as many concurrent visitors as the story about the infamous Access Hollywood video. There was no hiding near bushes in the dark this time to walk back the damage. Deputy National-Security Advisor Dina Powell declared the story “false,” and the administration also called out the big guns, with Secretary of State Rex Tillerson and National Security Advisor H.R. McMaster dutifully rushing into the breach to discuss the breach, using oh-so-carefully worded statements about how the president did not reveal “sources or methods” or any “military operations” that were not already known publicly.

So just how bad is the damage? On a scale of 1 to 10—and I’m just ball parking here—it’s about a billion. The story, which has since been confirmed by The Wall Street Journal, The New York Times, Reuters, Buzzfeed, and CNN, notes that the president could have jeopardized a critical source of intelligence on the Islamic State. Not America’s source. Somebody else’s. Presumably from an allied intelligence service who now knows that the American president cannot be trusted with sensitive information.

The type of information Trump cavalierly shared fell under a classification known as “code word,” according to the Post. There are three basic levels of classified information. Confidential information is defined as anything that could reasonably be expected to “cause damage” to American national security if shared without authorization. Secret information is one step up, considered to have the potential to cause “serious damage” if revealed. Top Secret information is a higher classification level still, comprising anything that could reasonably be expected to cause “exceptionally grave damage” to U.S. national security if revealed.

Code word is beyond Top Secret. It limits access to classified information to a much narrower pool of people to provide an extra layer of security. Many secrets are super-secrets—Harry Truman, as vice president, didn’t know about the Manhattan project. He learned of it only after Franklin Delano Roosevelt died and Truman was sworn in as president. Code word classification is so far off the scale, even fake spies rarely refer to it in the movies. Technically, the president can "declassify" anything he wants, so he did not violate any laws. But as Lawfare notes, if the president tweeted out the nuclear codes, he also wouldn't violate the law—but he would rightly be considered unfit for office.

Did Trump reveal intelligence crown jewels or just boast about the fact that he liked diamonds? According to the Post he revealed information about a purported ISIS plot involving laptops. It’s likely, however, that Tillerson, McMaster, the Postand the Times are ALL correct: The president did not reveal sources or methods or military operations. But that doesn’t matter much if he gave away information that will enable the Russians to identify the source or the methods. It looks like he did, since according to the Post’s account he talked about the content of a specific plot, the potential harm, and the location of the city in the Islamic State’s territory where the allied state’s intelligence service detected it. It was almost everything except the GPS coordinates. The denials by Tillerson and McMaster are a classic case of intelligence super-parsing—saying things that are technically and narrowly true but may not be accurate at all. No spin can hide the fact that the breach was deadly serious and reckless in the extreme.

Then there’s the impact on America’s unnamed ally, whom the Post reported was already nervous about sharing such sensitive intelligence with the United States. It is difficult to penetrate the Islamic State, and there is a major risk that this breach will close down a vital source. It’s an even bigger deal in the big picture, potentially jeopardizing intelligence cooperation with other U.S. allies around the world. Trump already raised intelligence eyebrows when he turned his Mar-a-Lago dining area into an impromptu Situation Room after the North Koreans decided to launch a ballistic missile. The president and his aides used the lights on cell phones to illuminate field reports, in full view of resort dinner guests snapping photos. If you’re known as someone who cannot keep a secret, the world’s secret-keepers are not going to tell you much.

“Can you believe the world we live in today?” President Trump said, according to one official in the two Sergeis meeting. “Isn’t it crazy?”

Yes, Mr. President. It’s crazy.

Hero Image
gettyimages 95466434 Getty Images/Tetra Images
All News button
1
News Type
News
Date
Paragraphs

Fellows will arrive at Stanford in July to begin the three-week academic training program taught by Stanford faculty, policymakers and thought-leaders in the technology sector.

 

Image
collagewebsite2

 

Stanford's Center on Democracy, Development, and the Rule of Law is proud to announce the 2017 class of Draper Hills Summer Fellows, which is composed of 28 leaders – selected from among hundreds of applications – advancing democratic development in some of the most challenging corners of the world.

In Bahrain, Burma, Rwanda and Sudan our fellows are working on peace-building initiatives to create more tolerant and inclusive societies. Judges and lawyers are holding government and criminals accountable and reforming the rule of law in Argentina, Guatemala and the Philippines. Gender rights activists are creating new tools and programs to protect the safety and freedom of women and girls in India, Kuwait and Papua New Guinea.

In Egypt, Morocco, Pakistan, Serbia and Ukraine, our fellows are serving inside the government as members of Parliament and senior civil servants to advance reform and new policy agendas. Business leaders in Jordan and India launched initiatives to support more inclusive economic growth and social development.

CDDRL is excited to launch another powerful network of leaders determined to advance change in their communities. They will emerge with new tools, frameworks and connections to enhance their work and deepen their impact on democratic reform.

The 2017 class will mark the 13th cohort of the Draper Hills Summer Fellows Program and the fellows will join the Omidyar Network Leadership Forum, an alumni community of over 300 alumni in 75 countries worldwide.

Hero Image
collagewebsite2
All News button
1
-

Please note that this workshop is open to Stanford faculty, students, visiting scholars, and staff only.

Migration is obviously the single biggest challenge for European countries and the European Union today. It is closely linked to questions of (national) identity, social pluralism, and diversity. However, it is mostly understood as a purely contemporary phenomenon, something ahistorical, as though migration had no history in Europe and as though migration has not been altering societies and cultures since ever before. With a special focus on Austria and Germany and with different case studies, the workshop puts the current so-called “refugee crisis” in the context of the broader history of the 19th and 20th century. It also discusses general questions like the status of migration in the hegemonic collective memory and the challenges it poses for historiography.
 

SCHEDULE:

9:30am: Welcome and Introductions

Dirk Rupnow, Visiting Austrian Chair Professor, The Europe Center, Stanford University, and Professor of Modern History, University of Innsbruck
 

9:35am: Austria, Germany, and Migration: Putting the Current European “Refugee Crisis” in Historical Perspective

Dirk Rupnow, Visiting Austrian Chair Professor, The Europe Center, Stanford University, and Professor of Modern History, University of Innsbruck

Austria and Germany were crucial actors in the so-called “refugee crisis” during the summer of 2015. Both countries have a distinct, but in part also a shared, history of migration. The talk focuses on Austria as an example and puts the current so-called “refugee crisis” in the context of the broader history of the postwar Austrian Republic. It discusses the status of migration in the hegemonic collective memory and the challenges it poses for historiography.


10:15am: Migration Backed Securities: European Migrants and the Transatlantic Bond Market

Benjamin Hein, PhD candidate in Modern European History, Stanford University

Historians often think about migration as a story that unfolds between two key actors: the sovereign state and the (im)migrant. But what if the state was only an intermediary channeling another party’s interests? In the 19th century German Empire, progressive legislation aimed at improving the lives of emigrants to the Americas has been interpreted as part and parcel of the Bismarckian welfare state. There is evidence to suggest, however, that such legislation emerged not as a matter of German government policy but instead as a result of enterprising bankers who sought to prop up nascent transatlantic securities markets. In this paper, I will consider the case of Kaiserreich Germany to complicate narratives about migration that have followed a more traditional sovereign state versus (im)migrant binary.
 

11:05am: In Transit or Asylum Seekers? Austria and the Cold War Refugees from the Communist Bloc

Maximilian Graf, Visiting Scholar, The Europe Center, Stanford, and Project Leader, Austrian Academy of Sciences

The presumption of an extraordinary humanitarian engagement is an integral part of Austria’s popular postwar history and memory. The country’s aid for refugees from the communist bloc continues to shape this image until today. In each case – the “Hungarian Revolution” in 1956, the “Prague Spring” in 1968, the crisis in Poland 1980/81, and the revolutions of 1989 in East Germany and Romania – within a short period of time, tens of thousands fled to Austria, although constellations differed significantly. Even though Austria earned considerable merits in handling the early stages of the Cold War “refugee crises”, the resulting picture requires a demythologization: Austria never aimed at serving as a refugee’s haven, but as a transit country only. By critically reassessing the existing master narrative, a first comparative analysis of the major “waves“ of Cold War refugees reaching Austria will be provided.
 

11:45am: Sending Foreigners Home: Historical Origins of EU Voluntary Repatriation Programs

Michelle Kahn, PhD Candidate in Modern European History, Stanford University

A central question amid today’s refugee crisis is if, when, and how the refugees will ever return to their home countries. Yet this question has deeper historical origins. As early as the 1970s, European nation-states began devising programs aimed at the voluntary repatriation of refugees, labor migrants, and other foreign nationals. This talk examines the case of West Germany, focusing on the controversial 1983 “Law for the Promotion of Voluntary Return” (Rückkehrförderungsgesetz). Aimed at reducing the Turkish population at a time of rising anti-foreigner sentiment, the law offered unemployed former guest workers a “return premium” of 10,500 Deutschmarks to return to their home countries. The talk explores contemporary debates surrounding the law, as well as parallels to the development of German and EU-wide voluntary repatriation programs still in use today.


12:25pm: Wrap Up

Dirk Rupnow, Visiting Austrian Chair Professor, The Europe Center, Stanford University, and Professor of Modern History, University of Innsbruck

 

Speakers:

Maximilian Graf is a Visiting Scholar at The Europe Center.  He studied history in Vienna and worked as a Junior Scholar and Postdoc at the Austrian Academy of Sciences and the University of Vienna. He is currently project leader at the Institute for Modern and Contemporary Historical Research of the Austrian Academy of Sciences. His main areas of research are Cold War history and the history of Communism. He was Chercheur Associée at the Centre Marc Bloch in Berlin and was awarded the Karl von Vogelsang Prize for the History of Social Sciences in 2014 and the Dr. Alois Mock Prize in 2015. Selected publications: Österreich und die DDR 1949–1990. Politik und Wirtschaft im Schatten der deutschen Teilung (2016); (co-ed.) Österreich im Kalten Krieg. Neue Forschungen im internationalen Kontext (2016); (co-ed.) Orient und Okzident. Begegnungen und Wahrnehmungen aus fünf Jahrhunderten (2016).

Benjamin Hein is a PhD candidate in modern European history at Stanford University. He received his B.A. in history and economic (summa cum laude) from Emory University. Currently, Benjamin is completing his dissertation entitled "Emigration and the Industrial Revolution in German Europe, 1820-1900," in which he explores the impact of sustained emigration to North America on the evolution of key economic institutions and commercial law in German-speaking Europe. Benjamin teaches and is interested in topics in the history of capitalism; the history of migration; Atlantic World and Global History; and political economy.

Michelle Kahn is a PhD Candidate in Modern European History at Stanford University. Her dissertation, “Becoming Almancı: The Transnational History of Turkish-German Migrants, 1961–2011” explores the political, social, and economic history of Turkish immigrants’ transnational connections to their home country. Her research and teaching interests include German and Turkish history, transnational history, migration history, and the histories of race, gender, and sexuality. After serving as a 2015–2016 German Chancellor Fellow of the Alexander von Humboldt Foundation, Michelle is currently completing her dissertation in Cologne. She has an office at her primary archive, the Documentation Centre and Museum for Migration in Germany (DOMiD), where she contributes voluntarily as a Research Associate. She is also a Guest Scholar at the University of Cologne’s Historical Institute.

Dirk Rupnow is Stanford University's 2016-2017 Visiting Austrian Chair Professor and is in residence at The Europe Center.  He is Professor of Contemporary History and head of the Institute for Contemporary History at the University of Innsbruck where he is also the founding coordinator of the Research Center Migration & Globalization. He earned his M.A. in 1999 (Vienna), PhD in 2002 (Klagenfurt) and Habilitation in 2009 (Vienna). Rupnow was project researcher with the Historian’s Commission of the Republic of Austria in 1999/2000. He has been awarded numerous research stays and fellowships in Austria, Germany, France, Israel, and the US, as well as the 2009 Fraenkel Prize in Contemporary History of the Wiener Library, London. His main research interests are 20th Century European History, Holocaust and Jewish Studies, Cultures and Politics of Memory, Intellectual and Migration History. Selected publications: (co-ed.), “Holocaust”-Fiktion. Kunst jenseits der Authentizität (2015); Judenforschung im Dritten Reich. Wissenschaft zwischen Politik, Propaganda und Ideologie (2011); (co-ed.), Zeitgeschichte ausstellen in Österreich. Museen – Gedenkstätten – Ausstellungen (2011); (co-ed.), Pseudowissenschaft. Konzeptionen von Nichtwissenschaftlichkeit in der Wissenschaftsgeschichte (2008); Vernichten und Erinnern. Spuren nationalsozialistischer Gedächtnispolitik (2005).

 

Encina Hall
616 Serra Street
Stanford, CA  94305-6165

0
Distinguished Visiting Austrian Chair Professor (2016-2017)
Professor of Contemporary History, University of Innsbruck
dirk_rupnow.jpg

Prof. Dr. Dirk Rupnow studied history, German literature, art history and philosophy in Berlin and Vienna, earning his M.A. in 1999 (Vienna), Ph.D. in 2002 (Klagenfurt) and Habilitation in 2009 (Vienna). Prof. Rupnow was Project Researcher with the Historian’s Commission of the Republic of Austria in 1999/2000. He has been awarded numerous research stays and fellowships in Austria, Germany, France, Israel, and the USA and the 2009 Fraenkel Prize in Contemporary History of the Wiener Library, London. Prof. Rupnow has been on faculty at the University of Innsbruck since 2009 and the Head of the Institute for Contemporary History since 2010. His main research interests are 20th Century European History, Holocaust and Jewish Studies, Cultures and Politics of Memory, Intellectual and Migration History.

Prof. Rupnow will be teaching the course "The Holocaust and its Aftermath" for the Department of History in the Spring Quarter.

 

Head, Institute for Contemporary History, University of Innsbruck
Founding Coordinator, Center for Migration & Globalization, University of Innsbruck
Visiting Austrian Chair Professor University of Innsbruck

Encina Hall
616 Serra Street
Stanford, CA  94305-6165

0
Visiting Scholar at The Europe Center, 2016-2017
maximilian_graf.jpg

Maximilian Graf is a Visiting Scholar from the Institute for Modern and Contemporary Historical Research of the Austrian Academy of Sciences. He specializes in Cold War Studies and the History of Communism. In November/December 2013, he was chercheur associée at the Centre Marc Bloch in Berlin. In 2014, he received the Karl von Vogelsang Prize – Austrian State Prize for the History of Social Sciences, and in 2015 the Dr.-Alois-Mock-Wissenschaftspreis. In September 2017, he will start a new position at the European University Institute in Florence. At the moment, he is working on a book with the working title Overcoming the Iron Curtain. A New History of Détente in Cold War Central Europe.

Graf's most recent publications include his first book on Austrian–East German relations during the Cold War Österreich und die DDR 1949–1990. Politik und Wirtschaft im Schatten der deutschen Teilung (Vienna: ÖAW, 2016); the edited volumes Franz Marek. Beruf und Berufung Kommunist. Lebenserinnerungen und Schlüsseltexte (Vienna: Mandelbaum, 2017); Österreich im Kalten Krieg. Neue Forschungen im internationalen Kontext (Göttingen: V&R unipress, 2016); Orient & Okzident. Begegnungen und Wahrnehmungen aus fünf Jahrhunderten (Vienna: Neue Welt Verlag 2016, ²2017); and numerous articles and book chapters, including: together with Wolfgang Mueller, "An Austrian mediation in Vietnam? The superpowers, neutrality, and Kurt Waldheim’s good offices," in the Sandra Bott/Jussi Hanhimaki/Janick Schaufelbuehl/Marco Wyss (eds.) book Neutrality and Neutralism in the Global Cold War. Between or within the blocs?, (London: Routledge, 2016), 127–143; "(Kalter) Krieg am Bergisel. Skispringen im Spannungsfeld von Politik, Sport und Nation: Österreich und die DDR als Fallbeispiele," in Zeitgeschichte 42 (2015) 4, 215–232; "The Rise and Fall of 'Austro-Eurocommunism'. On the 'Crisis' within the KPÖ and the Significance of East German Influence in the 1960s," in the Journal of European Integration History 20 (2014) 2, 203–218.

Visiting Scholar Austrian Academy of Science
Benjamin Hein PhD candidate in modern European History Stanford
Michelle Kahn PhD candidate in modern European History Stanford
Workshops
News Type
News
Date
Paragraphs

When one thinks of the casualties of war, it is easy to imagine severed limbs, bullet holes, shrapnel, perhaps even sarin gas or Agent Orange. But in a recent Daedalus essay, Paul Wise argues that the most damaging health impacts of war are often indirect. Losing access to food supplies, medication and electricity can kill more people than battle itself. In this video by the American Academy of Arts and Sciences, Wise, a professor of pediatrics and Stanford Health Policy core faculty member, explains how fatal the indirect costs of war can be.

Read More

Hero Image
paul just war video
All News button
1
Authors
News Type
News
Date
Paragraphs

While the United States has no peers in conventional military power, it is especially vulnerable – as a free and democratic society – to cyber misinformation campaigns, a Stanford scholar says.

Herbert Lin, a senior research scholar for cyberpolicy and security at Stanford’s Center for International Security and Cooperation (CISAC), is the co-author of a new draft working paper that spells out the perilous risks facing democratic, wired-up countries around the world.

America’s adversaries are seeking “asymmetric” methods for social disruption, rather than direct military conflict, Lin said.

“Cyber warfare is one asymmetric counter to Western (and especially U.S.) military advantages that depend on the use of cyberspace,” wrote Lin and his co-author Jackie Kerr, a research fellow at the Lawrence Livermore National Laboratory.

This new type of cyber aggression is aimed at winning – and confusing – hearts and minds, the very control centers of human existence, Lin said.

As a result, “information/influence warfare and manipulation,” or IIWAM as Lin describes it, poses profound implications for Western democracies, even though much of it may not be illegal under international law. This approach is based on the deliberate use of information by one party on an adversary to confuse, mislead, and ultimately to influence the choices and decisions that the adversary makes.

A recent example in point would be the 2016 Russian hacking of the U.S. presidential election and the surge of so-called “fake news.”

Lin points out that while misinformation campaigns are not new, the technology to spread it far and wide globally is. He noted that the patron saint of distorting reality for war-like purposes is Sun Tzu, who wrote that, “The supreme art of war is to subdue the enemy without fighting.”

While traditional cyber attacks typically hit hard targets like computer systems, cyber “influence” campaigns are conducted over longer periods of time and rely on soft power – propaganda, persuasion, culture, social forces, confusion and deception, Lin said. 

Words and images

How does it work? Lin explains:

“Victory is achieved by A when A succeeds changing B’s political goals so that they are aligned with those of A.  But such alignment is not the result of B’s 'capitulation' or B’s loss of the ability to resist – on the contrary, B (the losing side) is openly willing.”  That is, such victory shares the focus on subverting the opponent’s will, though not on destroying his military forces.

The ammunition in these cyberspace battles are “words and images,” the kind that persuade, inform, mislead, and deceive so that the adversary cannot respond militarily. In the example of a “fake news” story, they often take place below legal thresholds of “use of force” or “armed attack,” and at least in an international legal sense, do not trigger a military response.

The target is the “adversary’s perceptions,” which reside in the “cognitive dimension of the information environment.” In other words, such cyber warfare focuses on “damaging knowledge, truth, and confidence, rather than physical or digital artifacts,” according to Lin. It is the “brain-space.”

Additionally, IIWAM injects fear, anger, anxiety, uncertainty, and doubt into the adversary’s decision making processes, he added.  Success is defined as altering such perceptions so the target makes choices favoring the aggressor.

“Sowing chaos and confusion is thus essentially operational preparation of the information battlefield – shaping actions that make the information environment more favorable for actual operations should they become necessary,” the researchers wrote.

These cyber manipulations often prey upon cognitive and emotional biases present in the psychological and mental makeup of human beings, Lin said. 

For example, media channels such as Fox News play to “confirmation bias” for individuals with a right-of-center orientation, and similarly for MSNBC for those with a left-of-center, orientation, he wrote. Confirmation bias is the tendency to interpret new evidence as confirmation of one's existing beliefs or theories.

Countering misinformation

“Naming and shaming” is probably ineffective against many nation states conducting cyber disinformation campaigns, Lin said. And the idea that a government like the U.S. can quickly respond to misinformation created in the private sphere is unlikely to be effective as well.

What, then, might work? Lin suggests new tactics are needed, as no existing approach seems adequate. For example, Facebook is deploying a new protocol for its users to flag questionable news sites.  Google has banned fake news web sites from using its online advertising service. Twitter, YouTube, and Facebook shut down accounts that they determine are promoting terrorist content.  He noted that a recent Facebook letter from CEO Mark Zuckerberg states that, “Our approach will focus less on banning misinformation and more on surfacing additional perspectives and information, including that fact checkers dispute an item's accuracy.”

But such measures are unlikely to stem the “rising tide of misinformation conveyed” through cyber warfare, Lin said, because they mostly require users to do additional mental work.  

Wired world riskier

Today’s Internet-driven Western world offers countless opportunities for cyber influence mischief, Lin wrote.

“Democracy has rested on an underlying foundation of an enlightened, informed populace engaging in rational debate and argument to sort out truth from fiction and half-truth in an attempt to produce the best possible policy and political outcomes,” Lin wrote.

Cyber manipulators have exploited an arguable gap between ideals and reality in democratic systems – “rendered it much more questionable” – through the tremendous reach and speed of misinformation, he said. Many countries cannot deal with the onslaught of such focused efforts. This serves to make the democratic process look weak and unstable in the eyes of its citizens. The same dynamic does not apply equally around the world.

“Cyber weapons pose a greater threat to nations that are more advanced users of information technology than to less-developed nations,” Lin wrote.

He said that less developed or authoritarian countries do not have much Internet infrastructure or that wield control over expression – North Korea is an example.

MEDIA CONTACTS

Herbert Lin, Center for International Security and Cooperation: (650) 497-8600, herbert.s.lin@stanford.edu

Clifton B. Parker, Center for International Security and Cooperation: (650) 725-0224, cbparker@stanford.edu

 

 

 

Hero Image
gettyimages 597931354
Stanford cybersecurity expert Herb Lin says a new brand of cyber warfare aims to destabilize Western democracies through misinformation and even changing the way people think about reality.
Getty Images/Vertigo3d
All News button
1
Subscribe to Europe