-

This event is co-sponsored by the European Security Initiative

* Please note all CISAC events are scheduled using the Pacific Time Zone

 

Seminar Recording: https://youtu.be/1rkTwxnf2Fg

 

About this Event: Russia has employed the semi-state Wagner Group security company in Ukraine, Syria, the Central African Republic, Libya, Mozambique, and Mali (so far). Wagner is tightly connected to Russia's military intelligence organization (the GRU), and partially funded by one of Vladimir Putin's cronies, Evgeny Prigozhin, who also uses it for private duties. So why is Wagner technically illegal (and even unconstitutional) in Russia? Its use is less costly in budgetary and political terms than using the uniformed military, and it provides (limited) plausible deniability for Russian actions. But it is also unclear what Russia wants from impoverished sub-Saharan Africa. Using the best available evidence, this presentation explores these mysteries.

 

About the Speaker: Kimberly Marten is a professor of political science (and the department chair) at Barnard College, Columbia University, and a faculty member of Columbia’s Harriman Institute and Saltzman Institute. She has written four books, including Warlords: Strong-Arm Brokers in Weak States (Cornell, 2012), and Engaging the Enemy: Organization Theory and Soviet Military Innovation (Princeton, 1993) which received the Marshall Shulman Prize. The Council on Foreign Relations (where she is a member) published her special report, Reducing Tensions between Russia and NATO (2017). She is a frequent media commentator, and appeared on “The Daily Show” with Jon Stewart. She earned her A.B. at Harvard and Ph.D. at Stanford, and was a CISAC post-doc.

Virtual Seminar

Kimberly Marten Professor of Political Science (and the department chair) at Barnard College, Columbia University Barnard College, Columbia University
Seminars
-

Join Stephen Stedman, Nathaniel Persily, the Cyber Policy Center, and the Center on Democracy, Development and the Rule of Law (CDDRL) in an enlightening exploration of the recent report, Protecting Electoral Integrity in the Digital Age, put out by the Kofi Annan Commission on Elections and Democracy in the Digital Age. Moderated by Kelly Born, Executive Director of the Cyber Policy Center.

More on the report:

 

Abstract:

New information and communication technologies (ICTs) pose difficult challenges for electoral integrity. In recent years foreign governments have used social media and the Internet to interfere in elections around the globe. Disinformation has been weaponized to discredit democratic institutions, sow societal distrust, and attack political candidates. Social media has proved a useful tool for extremist groups to send messages of hate and to incite violence. Democratic governments strain to respond to a revolution in political advertising brought about by ICTs. Electoral integrity has been at risk from attacks on the electoral process, and on the quality of democratic deliberation.

The relationship between the Internet, social media, elections, and democracy is complex, systemic, and unfolding. Our ability to assess some of the most important claims about social media is constrained by the unwillingness of the major platforms to share data with researchers. Nonetheless, we are confident about several important findings.

About the Speakers

Image
Stephen Stedman
Stephen Stedman is a senior fellow at the Freeman Spogli Institute for International Studies, professor, by courtesy, of political science, and deputy director of the Center on Democracy, Development and Rule of Law. Professor Stedman currently serves as the Secretary General of the Kofi Annan Commission on Elections and Democracy in the Digital Age, and is the principal drafter of the Commission’s report, “Protecting Electoral Integrity in the Digital Age.”

Professor Stedman served as a special adviser and assistant secretary general of the United Nations, where he helped to create the United Nations Peacebuilding Commission, the UN’s Peacebuilding Support Office, the UN’s Mediation Support Office, the Secretary’s General’s Policy Committee, and the UN’s counterterrorism strategy. During 2005 his office successfully negotiated General Assembly approval of the Responsibility to Protect. From 2010 to 2012, he directed the Global Commission on Elections, Democracy, and Security, an international body mandated to promote and protect the integrity of elections worldwide.  Professor Stedman served as Chair of the Stanford Faculty Senate in 2018-2019. He and his wife Corinne Thomas are the Resident Fellows in Crothers, Stanford’s academic theme house for Global Citizenship. In 2018, Professor Stedman was awarded the Lloyd B. Dinkelspiel Award for outstanding service to undergraduate education at Stanford.

Image
Nathaniel Persily

Nathaniel Persily is the James B. McClatchy Professor of Law at Stanford Law School, with appointments in the departments of Political Science, Communication and FSI.  Prior to joining Stanford, Professor Persily taught at Columbia and the University of Pennsylvania Law School, and as a visiting professor at Harvard, NYU, Princeton, the University of Amsterdam, and the University of Melbourne. Professor Persily’s scholarship and legal practice focus on American election law or what is sometimes called the “law of democracy,” which addresses issues such as voting rights, political parties, campaign finance, redistricting, and election administration. He has served as a special master or court-appointed expert to craft congressional or legislative districting plans for Georgia, Maryland, Connecticut, and New York, and as the Senior Research Director for the Presidential Commission on Election Administration.

Also among the commissioners of the report were FSI's Alex Stamos, and Toomas Ilves

 

 

Stephen Stedman
-

Abstract:

China’s cyberspace and technology regime is going through a period of change—but it’s taking a while. The U.S.–China economic and tech competition both influences Chinese government developments and awaits their outcomes, and the 2017 Cybersecurity Law set up a host of still-unresolved questions. Data governance, security standards, market access, compliance, and other questions saw only modest new clarity in 2019. But 2020 promises new laws on personal information protection and data security, and the Stanford-based DigiChina Project in the Program on Geopolitics, Technology, and Governance, is devoted to monitoring, translating, and explaining these developments. From AI governance to the the nexus of cybersecurity and supply chains, this talk will summarize recent Chinese policymaking and lay out expectations for the year to come.

Image
Graham Webster
About the Speaker:

Graham Webster is editor in chief of the Stanford–New America DigiChina Project at the Stanford University Cyber Policy Center and a China digital economy fellow at New America. He was previously a senior fellow and lecturer at Yale Law School, where he was responsible for the Paul Tsai China Center’s U.S.–China Track 2 and Track 1.5 dialogues for five years before leading programming on cyberspace and technology issues. In the past, he wrote a CNET News blog on technology and society from Beijing, worked at the Center for American Progress, and taught East Asian politics at NYU's Center for Global Affairs. Webster holds a master's degree in East Asian studies from Harvard University and a bachelor's degree in journalism from Northwestern University. Webster also writes the independent Transpacifica e-mail newsletter.

0
Research Scholar
Graham Webster

Graham Webster is a research scholar in the Program on Geopolitics, Technology, and Governance and editor-in-chief of the DigiChina Project at the Center for International Security and Cooperation at Stanford University. He researches, writes, and teaches on technology policy in China and US-China relations.

Before bringing DigiChina to Stanford in 2019, he was its cofounder and coordinating editor at New America, where he was a China digital economy fellow. From 2012 to 2017, Webster worked for Yale Law School as a senior fellow and lecturer responsible for the Paul Tsai China Center’s Track II dialogues between the United States and China and co-taught seminars on contemporary China and Chinese law and policy. While there, he was an affiliated fellow with the Yale Information Society Project, a visiting scholar at China Foreign Affairs University, and a Transatlantic Digital Debates fellow with New America and the Global Public Policy Institute in Berlin. He was previously an adjunct instructor teaching East Asian politics at New York University and a Beijing-based journalist writing on the Internet in China for CNET News. 

In recent years, Webster's writing has been published in MIT Technology Review, Foreign Affairs, Slate, The Wire China, The Information, Tech Policy Press, and Foreign Policy. He has been quoted by The Wall Street Journal, The New York Times, The Washington Post, and Bloomberg and spoken to NPR and BBC World Service. Webster has testified before the US-China Economic and Security Review Commission and speaks regularly at universities and conferences in North America, East Asia, and Europe. His chapter, "What Is at Stake in the US–China Technological Relationship?" appears in The China Questions II (Harvard University Press, 2022).

Webster holds a bachelor's in journalism and international studies from Northwestern University and a master's in East Asian studies from Harvard University. He took doctoral coursework in political science at the University of Washington and language training at Tsinghua University, Peking University, Stanford University, and Kanda University of International Studies.

Editor-in-Chief, DigiChina
Date Label
Graham Webster
-

Multilateral Negotiations on ICTs (information and communications technologies) and International Security: Process and Prospects for the UN Group of Government Experts and the UN Open-Ended Working Group

Abstract: The intent of this seminar is to provide an update on recent events at the UN relevant to international discussions of cybersecurity (and a primer of sorts on current UN processes for addressing this topic).

In 2018, UN Member States decided to establish two concurrent negotiations with nearly identical mandates on the international security dimension of ICTs—a sixth limited membership UN Group of Governmental Experts (GGE) and an Open-Ended Working Group (OEWG) open to all governments. How did this happen? Are they competing or complementary endeavors? Is it likely that one will be able to bridge the longstanding divides on how international law applies to cyberspace or agree by consensus to additional norms of responsible State behavior? What would be a good outcome of each process? And how do these negotiations fit into the wider UN ecosystem, including the follow-up to the Secretary-General’s High Level Panel on Digital Cooperation.  

Image
Kerstin Vignard
About the Speaker: Kerstin Vignard is an international security policy professional with nearly 25 years’ experience at the United Nations, with a particular interest in the nexus of international security policy and technology. Vignard is Deputy to the Director at UNIDIR, currently on temporary assignment leading UNIDIR’s team supporting the Chairmen of the latest Group of Governmental Experts (GGEs) on Cyber Security and the Open-Ended Working Group. She has led UNIDIR’s team supporting four previous cyber GGEs. From 2013 to 2018, she initiated and led UNIDIR’s work on the weaponization of increasingly autonomous technologies, and is the co-Principal Investigator of a CIFAR AI & Society grant examining potential regulatory approaches for security and defence applications of AI.

Paragraphs

Despite pressure from President Donald Trump and Attorney General William Barr, Apple continues to stand its ground and refuses to re-engineer iPhones so law enforcement can unlock the devices. Apple has maintained that it has done everything required by law and that creating a "backdoor" would undermine cybersecurity and privacy for iPhone users everywhere.

Apple is right to stand firm in its position that building a "backdoor" could put user data at risk.

At its most basic, encryption is the act of converting plaintext (like a credit card number) into unintelligible ciphertext using a very large, random number called a key. Anyone with the key can convert the ciphertext back to plaintext. Persons without the key cannot, meaning that even if they acquire the ciphertext, it should still be impossible for them to discover the meaning of the underlying plaintext.

Full Text at CNN

 

 

 

 

All Publications button
1
Publication Type
Commentary
Publication Date
Authors
Andrew Grotto
Paragraphs

Democratic consolidation around the world currently faces major challenges. Threats to democracy have become more insidious, especially due to the manipulation of legal and constitutional procedures originally designed to guard democracy against arbitrary action and abuse. Free and fair elections, the cornerstone of democratic legitimacy, are under considerable stress from populism and post-truth movements, who abuse new digital communication technologies to confuse and mislead citizens. Today, free and fair elections, the primary expression of democratic will for collective government, are far from guaranteed in many countries around the world. Protecting them will require a new set of policies and actions from technological platforms, governments, and citizens.

Read online.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
Stephen J. Stedman
Nathaniel Persily
-

Abstract:

Considerable scholarship has established that algorithms are an increasingly important part of what information people encounter in everyday life. Much less work has focused on studying users’ experiences with, understandings of, and attitudes about how algorithms may influence what they see and do. The dearth of research on this topic may be in part due to the difficulty in studying a subject about which there is no known ground truth given that details about algorithms are proprietary and rarely made public. In this talk, I will report on the methodological challenges of studying people’s algorithm skills based on 83 in-person interviews conducted in five countries. I will also discuss the types of algorithm skills identified from our data. The talk will advocate for more such scholarship to accompany existing system-level analyses of algorithms’ social implications and offers a blue print for how to do this.

Image
Eszter Hargittai
About the Speaker:

Eszter Hargittai is Professor and Chair of Internet Use and Society at the Institute of Communication and Media Research, University of Zurich. Previously, she was the Delaney Family Professor in the Communication Studies Department at Northwestern University. In 2019, she was elected Fellow of the International Communication Association and also received the William F. Ogburn Mid-Career Achievement Award from the American Sociological Association’s section on Communication, Information Technology and Media Sociology. For over two decades, she has been researching people’s Internet uses and skills, and how these relate to questions of social inequality.

 

News Type
News
Date
Paragraphs

"The Kofi Annan Commission on Elections and Democracy in the Digital Age found the rise of social media has caused irrevocable harm to global electoral integrity and democratic institutions—and the effects may get even worse," Paris Martineau writes in Wired. CDDRL's Deputy Director Stephen J. Stedman served as the Secretary-General of the Commission. Read here.

Hero Image
person dropping paper on box 1550337 Photo by Element5 Digital from Pexels
All News button
1
Paragraphs

Protecting Electoral Integrity in the Digital Age | The Report of the Kofi Annan Commission on Elections and Democracy in the Digital Age

New information and communication technologies (ICTs) pose difficult challenges for electoral integrity. In recent years foreign governments have used social media and the Internet to interfere in elections around the globe. Disinformation has been weaponized to discredit democratic institutions, sow societal distrust, and attack political candidates. Social media has proved a useful tool for extremist groups to send messages of hate and to incite violence. Democratic governments strain to respond to a revolution in political advertising brought about by ICTs. Electoral integrity has been at risk from attacks on the electoral process, and on the quality of democratic deliberation.

The relationship between the Internet, social media, elections, and democracy is complex, systemic, and unfolding. Our ability to assess some of the most important claims about social media is constrained by the unwillingness of the major platforms to share data with researchers. Nonetheless, we are confident about several important findings.

All Publications button
1
Publication Type
Annual Reports
Publication Date
Authors
Nathaniel Persily
Alex Stamos
Stephen J. Stedman
Paragraphs

Since the publication of the Journal of Democracy began in 1990, the political climate has shifted from one of democratic gains and optimism to what Larry Diamond labels a “democratic recession.” Underlying these changes has been a reorientation of the major axis of political polarization, from a left-right divide defined largely in economic terms toward a politics based on identity. In a second major shift, technological development has had unexpected effects—including that of facilitating the rise of identity-based social fragmentation. The environment for democracy has been further transformed by other slow-moving changes, among them the shift toward neoliberal economic policies, the legacy of the wars in Iraq and Afghanistan, and lowered expectations regarding democratic transitions. Sustaining democracy will require rebuilding the legitimate authority of the institutions of liberal democracy, while resisting those powers that aspire to make nondemocratic institutions central.

Read online.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
Francis Fukuyama
Subscribe to Middle East and North Africa