Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

0
James X. Dempsey large headshot

Jim Dempsey is senior policy advisor to the Stanford Program on Geopolitics, Technology and Governance and a lecturer at the UC Berkeley School of Law, where he teaches a course on cybersecurity law in the LLM program. Until May 2021, Jim was Executive Director of the Berkeley Center for Law & Technology. In 2012, after Senate confirmation, he was appointed by President Barack Obama as a part-time member of the U.S. Privacy and Civil Liberties Oversight Board, an independent agency within the federal government charged with advising senior policymakers and overseeing the nation’s counterterrorism programs. He served in that position until January 2017, while also running BCLT.

From 1997 to 2014, Dempsey was at the Center for Democracy & Technology (CDT), a non-profit public policy organization focused on privacy and other issues affecting the internet, where he held a number of leadership positions. Prior to that he was deputy director of the Center for National Security Studies (1995-1997) and assistant counsel to the House Judiciary Committee (1985-1995), focusing on privacy, FBI oversight, and surveillance issues. 

Jim graduated from Yale College and Harvard Law School.

BOOKS:

 

ARTICLES AND PAPERS

 

COMMENTARY

Senior Policy Advisor, Geopolitics, Technology, and Governance at CISAC
Lecturer at the UC Berkeley School of Law
Date Label
-

Please join our partners at APSIA for their 2021 online grad school fair. Representatives from across the Freeman Spogli Institute for International Studies and other top-line graduate programs in international studies at leading universities will be online to answer your questions and provide resources on the application process.

Whether you are an undergrad student trying to decide what comes next in your academic journey or a professional looking to advance your career, this is an excellent opportunity to network and gain insight into reaching your goals.

Workshops
News Type
News
Date
Paragraphs

POLITICO has announced their annual ranking of the 28 power players behind Europe’s tech revolution. In addition to an overall No. 1, the list is divided into three categories — rulemakers, rulebreakers and visionaries — each representing a different type of power. The Cyber Policy Center's Marietje Schaake is included on the list as a visionary and "voice to listen to on both sides of the Atlantic."

From the announcement:

The 42-year-old Dutch native has become a leading voice of European philosophy on how to regulate technology, especially in the U.S., where she’s been teaching at Stanford University’s Cyber Policy Center since leaving European politics.

Her message — that the internet’s early leaders have grown into all-too-dominant behemoths unable to subdue their own vices and are violating human rights — might have seemed out of whack in the U.S. a few years ago. But it has since become mainstream, in part thanks to Schaake’s work to reshape the American conversation on technology and inject some of Europe’s criticism on the sector.

In Europe, too, Schaake’s star keeps rising and rising. Once one of Brussels’ most visible politicians, she has now turned her attention to taming algorithms and the growing issue of cyber threats. In 2019, she launched the CyberPeace Institute in Geneva, a group focused on getting European policymakers to care about the human victims of cyberattack.

READ MORE

Marietje Schaake

Marietje Schaake

International Policy Director at the Cyber Policy Center
FULL BIO

Read More

cyber turns two graphic
News

The Cyber Policy Center Turns Two

A look back at the launch of the CPC and the work of our programs
The Cyber Policy Center Turns Two
Hero Image
illustration of Marietje Schaake Politico
All News button
1
Subtitle

POLITICO’s annual ranking of the 28 power players behind Europe’s tech revolution includes the Cyber Policy Center's Marietje Schaake. The list is divided into three categories — rulemakers, rulebreakers and visionaries — each representing a different type of power.

Paragraphs

Cross-strait deterrence is arguably weaker today than at any point since the Korean War. Impressive Chinese military modernization, U.S. failure to build robust coalitions to counter Chinese regional aggression, and Xi Jinping’s personal ambition, all coalesce to create a situation in which Chinese leaders may see some aggregate benefit to using force. Mastro supports this assessment in her response to the Commission’s specific questions. 

All Publications button
1
Publication Type
Testimonies
Publication Date
Subtitle
Statement before the U.S.-China Economic and Security Review Commission on “Deterring PRC Aggression Toward Taiwan”
Authors
Oriana Skylar Mastro
News Type
Q&As
Date
Paragraphs

This interview with CISAC Affiliate Christopher Painter was originally produced by Jen Kirby. The complete article is available at Vox.

The frequency, scope and scale of ransomware attacks against public and private systems is accelerating. In the latest incident, the ransomware group REvil has demanded $70 million to unlock the systems of the software company Kaseya, an attack that affects not only Kaseya, but simultaneously exploits all of the company’s clients.

The REvil, JBS meatpacking and Colonial Pipeline attacks have abruptly raised the profile of ransomware from a malicious strand of criminality to a national security priority. These are issues that Christopher Painter, an affiliate at the Center for International Security and Cooperation (CISAC), has worked on at length during his tenures as a senior official at the Department of Justice, the FBI, the National Security Council and as the world's first top cyber diplomat at the State Department.

Jen Kirby, a reporter for Vox, interviewed Painter to discuss how cybercrimes are evolving and what governments should do to keep ransomware attacks from escalating geopolitical tensions online and off.



Jen Kirby:
I think a good place to start would be: What are “ransomware attacks”?

Christopher Painter:
It is largely criminal groups who are getting into computers through any number of potential vulnerabilities, and then they essentially lock the systems — they encrypt the data in a way that makes it impossible for you to see your files. And they demand ransom, they demand payment. In exchange for that payment, they will give you — or they claim, they don’t always do it — they claim they’ll give you the decryption keys, or the codes, that allow you to unlock your own files and have access to them again.

That is what traditionally we say is “ransomware.” That’s been going on for some time, but it’s gotten much more acute recently.

There is another half of that, which is that groups don’t just hold your files for ransom, they either leak or threaten to leak or expose your files and your information — your secrets and your emails, whatever you have — publicly, either in an attempt to embarrass you or to extort more money out of you, because you don’t want those things to happen. So it’s split now into two tracks, but they’re a combined method of getting money.

Jen Kirby:
We’ve recently had some high-profile ransomware attacks, including this recent REvil incident. Is it that we’re seeing a lot more of them, or they’re just bigger and bolder? How do you assess that ransomware attacks are becoming more acute?

Christopher Painter:
We’ve seen this going on for some time. I was one of the co-chairs of this Ransomware Task Force that issued a report recently. One of the reasons we did this report was we’re trying to call greater attention to this issue. Although governments and law enforcement were taking it seriously, it wasn’t being given the kind of national-level priority it deserved.

It was being treated as more of an ordinary cybercrime issue. Most governments’ attention is focused on big nation-state activity — like the SolarWinds hack [where suspected Russian government hackers breached US government departments], which are important, and we need to care about those. But we’re very worried about this, too.

It’s especially become more of an issue during the pandemic, when some of the ransomware actors were going after health care systems and health care providers.That combined with these big infrastructure attacks — the Colonial Pipeline clearly was one of them. Another one was the meat processing plants. Another one was hospital systems in Ireland. You also had the DC Police Department being victimized by ransomware. These things are very high-profile. When you’re lining up for gas because of a ransomware attack, and you can’t get your food because of a ransomware attack, that brings it home as a priority. And then, of course, you have what happened this past weekend. So ransomware has not abated, and it continues to get more serious and hit more organizations.

painter

Christopher Painter

Affiliate at the Center for Internatial Security and Cooperation (CISAC)
Full Profile

Read More

Woman smiling
Commentary

Biden and Putin both place a ‘high priority’ on cybersecurity, says presidential adviser after Geneva summit

Despite tensions in the summit lead-up, the two leaders were overly cordial in their remarks after the meeting. Rose Gottemoeller, lead US negotiator for the New Strategic Arms Reduction Treaty (New START), joined The World's host Marco Werman to offer insight.
Biden and Putin both place a ‘high priority’ on cybersecurity, says presidential adviser after Geneva summit
Man with glasses and gray hair
Commentary

The U.S. says it can answer cyberattacks with nuclear weapons. That’s lunacy.

Over the July 4 weekend, the Russian-based cybercriminal organization REvil claimed credit for hacking into as many as 1,500 companies. In May, another cybercriminal group, DarkSide shut down most of the operations of Colonial Pipeline. These incidents were bad enough.
The U.S. says it can answer cyberattacks with nuclear weapons. That’s lunacy.
Hero Image
Ransomware locks up digital data until a fee is paid to the hackers. Getty Images
All News button
1
Subtitle

Christopher Painter explains why the emerging pattern of ransomware attacks needs to be addressed at a political level – both domestically and internationally – and not be treated solely as a criminal issue.

Paragraphs

The first COVID-19-related death in the United States was announced on February 29, 2020, the day of the South Carolina primary. International news about the early spread of the coronavirus and the initial reaction from American public health professionals to its quick spread in this country made it clear that the presidential election was facing an existential threat. Election officials who held primaries in early- and mid-March found themselves increasingly making public health decisions to guard both their voters and their staff. The larger societal challenges quickly overwhelmed the ability of states to hold primaries at all, leading to hastily canceled and postponed elections. The one early primary that was not postponed, Wisconsin, provided cautionary tales in the form of closed polling places, poll worker shortages, and massive transitions to mail balloting.

 

Nate Persily

Nathaniel Persily

James B. McClatchy Professor of Law at Stanford Law School | Senior Fellow, Freeman Spogli Institute | Professor, by courtesy, Political Science | Professor, by courtesy, Communication | Co-director, Cyber Policy Center
FULL BIO
All Publications button
1
Publication Type
Working Papers
Publication Date
Subtitle
A Compendium of Research from the Stanford-MIT Healthy Elections Project
Authors
Nathaniel Persily
Authors
Nathaniel Persily
News Type
News
Date
Paragraphs

Today, the Healthy Elections Project, a joint effort of Stanford and MIT, released a new 800 page report based on their research and findings on the administration of the 2020 election. The Stanford-MIT Healthy Elections Project was developed to ensure that the 2020 election could proceed with integrity, safety, and equal access. The Project aimed to do this by bringing together academics, civic organizations, election administrators, and election administration experts to assess and promote best practices. 

The first COVID-19-related death in the United States was announced on February 29, 2020, the day of the South Carolina primary. International news about the early spread of the coronavirus and the initial reaction from American public health professionals to its quick spread in this country made it clear that the presidential election was facing an existential threat. Election officials who held primaries in early- and mid-March found themselves increasingly making public health decisions to guard both their voters and their staff. The larger societal challenges quickly overwhelmed the ability of states to hold primaries at all, leading to hastily canceled and postponed elections. The one early primary that was not postponed, Wisconsin, provided cautionary tales in the form of closed polling places, poll worker shortages, and massive transitions to mail balloting.

Nate Persily

Nathaniel Persily

James B. McClatchy Professor of Law at Stanford Law School | Senior Fellow, Freeman Spogli Institute | Professor, by courtesy, Political Science | Professor, by courtesy, Communication | Co-director, Cyber Policy Center
FULL BIO
Hero Image
virus and the vote
All News button
1
Subtitle

A Compendium of Research from the Stanford-MIT Healthy Elections Project

Authors
Arzan Tarapore
News Type
Commentary
Date
Paragraphs

This blog post was first published by the Australian Strategic Policy Institute's The Strategist analysis and commentary site.


The Quad is stronger than ever. The informal ‘minilateral’ grouping of Australia, India, Japan and the United States has in the past year held its first stand-alone ministerial meeting and its first leaders’ summit, and launched an ambitious project to deliver Covid-19 vaccines. This ‘golden age’ of the Quad is a product of newfound Indian enthusiasm for the grouping, in turn, spurred by the military crisis in Ladakh, where India faces ongoing Chinese troop incursions across the two countries’ disputed border.

But the Quad is not bulletproof. Some experts have suggested that the economic and diplomatic effects of the devastating second wave of the pandemic in India will preoccupy the Indian government, sapping the Quad of capacity for any new initiatives. Others counter that India remains committed to competition with China—which is what really matters for the Quad—although its partners always expected ‘two steps forward, one step back’ from India.


Sign up for APARC newsletters to receive our experts' commentary and analysis.


Related: On the Conversation Six podcast, Tarapore discusses the policy paper on which this blog post is based with Jawaharlal Nehru University Professor of International Politics Rajesh Rajagopalan. Listen:


The pandemic may well prove to be a hiccup in the Quad’s evolution, but a potentially much larger disruption may come from the ongoing Ladakh crisis itself. As I argue in a new ASPI Strategic Insights paper, the crisis has greatly increased the risk of a border war between India and China, which would present a defining test of the Quad. A possible war could either strengthen or enervate the Quad—depending on how India and its partners, including Australia, act now to shape the strategic environment.

Risk is a function of likelihood and consequence. The likelihood of war on the India–China border is still low—both countries would prefer to avoid it—but has risen since the crisis began. Both countries have greatly expanded their military deployments on the border and backed them with new permanent infrastructure to resupply and reinforce them. China has proved its revisionist intent with large and costly military incursions, although its specific objectives and plans remain unknown. And the interaction of both countries’ military strategies and doctrines would, on the threshold of conflict, promote escalation.

The consequences of a possible conflict would be dire for both belligerents and for the region. China — assuming it is the provocateur of conflict—would likely face some political rebuke from states that consider themselves its competitors, but it will work strenuously to reduce those costs, and would likely have priced them in to its calculations of whether to fight. India will suffer high tactical costs on the border, and may also suffer wider harm if China uses coercive cyberattacks against strategic or dual-use targets.

In a costly war, the repercussions may spill over to damage India’s recently developing strategic partnerships, especially with the United States and Australia. Despite generally favorable views of the US, the Indian strategic elite still harbors some latent suspicions. This was highlighted in two episodes in April 2021, when the US Navy conducted a freedom of navigation patrol through the Indian exclusive economic zone, and when the US was slow in delivering Covid-19 vaccine raw materials and other relief. Both instances quickly receded from the Indian public imagination—thanks to quick correctives from Washington—but they did reveal that, under some conditions, Indian perceptions of its new partnerships can be quickly colored by distrust.

A China–India border war may create exactly those conditions. There is a chance that conflict may result in a redoubled Indian commitment to the Quad, if New Delhi judges that it has no option but to seek more external assistance. Conversely, unless a conflict is managed well by India and its partners, it is more likely to result in Indian disaffection with the Quad. India deepened Quad cooperation during the Ladakh crisis partly as a deterrent signal to China, and partly because the Quad is still full of promise. However, after a conflict—when China hasn’t been deterred and has probably imposed significant costs on India—the Quad’s utility would have been tested, and probably not ameliorated India’s wartime disadvantage.

The task before Quad governments is to be sensitized to this risk and implement mitigation strategies before a possible conflict, to buttress the coalition in advance. As I outline in the ASPI paper, they could do this at three levels. First, they could offer operational support—such as intelligence or resupply of key equipment, as the US already has done in the Ladakh crisis—although Quad partners’ role here would be limited. Second, they could provide support in other theatres or domains—with a naval show of force, for example, although cyber operations would probably be more meaningful in deterring conflict or dampening its costs. Third, they could provide political and diplomatic support — signaling to Beijing that a conflict would harm its regional political standing.

For Quad members, the main goal would be to deter conflict in the first place, and, failing that, to preserve the long-term strategic partnership with India for the sake of maintaining as powerful and energetic a coalition as possible to counterbalance China in the long term.

Read More

An Island that lies inside Taiwan's territory is seen with the Chinese city of Xiamen in the background.
Commentary

The Taiwan Temptation

Why Beijing Might Resort to Force
The Taiwan Temptation
Protesters against the military coup in Myanmar hold banners.
Commentary

Southeast Asia: China’s Long Shadow

Chinese foreign policy in Southeast Asia affects, and is affected by, the more despotic character of ASEAN’s mainland compared with its maritime member states. But the destiny of even the already undemocratic mainland portion of Southeast Asia is not—not yet at least—made in Beijing.
Southeast Asia: China’s Long Shadow
Little white cup of espresso coffee, opened book, blue semi-transparent vase with purple lilac flowers on rustic wooden table in the garden at spring morning after sunrise or at evening before sunset
News

What to Read This Summer — 2021: Book Recommendations by APARC Faculty

APARC faculty suggest dozens of books for your summer reading.
What to Read This Summer — 2021: Book Recommendations by APARC Faculty
Hero Image
Indian Prime Minister Narendra Modi rides in a tank at Longewala in Jaisalmer, Rajasthan, 14 November 2020.
Indian Prime Minister, Narendra Modi rides in a tank at Longewala in Jaisalmer, Rajasthan, 14 November 2020.
Press Information Bureau, Government of India
All News button
1
Subtitle

The Ladakh crisis between China and India seems to have settled into a stalemate, but its trajectory could again turn suddenly. If it flares into a limited conventional war, one of its incidental victims could be the Quad.

Paragraphs
A quote from Arzan Tarapore's policy brief on the implications of the China-India border tension for the Quad and a cover of the paper in the Australian Strategic Policy Institute

The Ladakh crisis between China and India seems to have settled into a stalemate, marked by somewhat reduced tactical tensions and continuing fruitless talks on disengagement—but its trajectory could again turn suddenly, even flaring into a limited conventional war. Despite a limited disengagement, both sides continue to make military preparations near the Line of Actual Control (LAC) to increase their readiness for potential conflict. While China proved its revisionist intent with its 2020 incursions, its specific goals and plans remain opaque. The broader political context is marked by distrust and hostility, and bilateral relations are at their lowest ebb in decades. War remains unlikely—both sides can ill-afford the distraction from higher national priorities and have demonstrated a recent keenness to step back from the brink. But, with growing capabilities and unclear intent, and with military operations no longer impaired by winter, the Ladakh crisis may still escalate to conflict.

The crisis has been full of surprises. Despite observing major military maneuvers in China, India didn’t anticipate the multiple incursions across the LAC in May 2020. For weeks thereafter, the Indian Army leadership insisted the incursions were nothing out of the ordinary. After both sides agreed to an early disengagement plan, the crisis took a shocking turn with a deadly skirmish in June — the first loss of life on the LAC in 45 years. India also mustered its own surprises, deploying troops to occupy tactically valuable heights in late August, to gain some bargaining leverage. And the crisis also abated with a surprise, with the sudden announcement of disengagement from heavily militarised stand-off sites around Pangong Tso Lake in February 2021.

Future surprises may yet occur. This paper argues that the risk of China–India conflict is significant because, even if its likelihood is low, its consequences may be considerable. A limited conventional war would be likely to impose significant costs on India, but, depending on the reactions of its partners, it may also reinforce latent Indian suspicions over the utility and reliability of its strategic partnerships. In that way, even a localized limited war on the LAC may have far-reaching implications, if it incidentally drives a wedge between India and its partners in the Quad. Mitigating that risk will require sound policy settings and astute diplomatic and public messaging from Canberra, Washington, Tokyo, and other like-minded capitals.

The remainder of this paper is in three parts: first, why a border war is plausible; second, what costs it would impose on India and how it might stir distrust of India’s Quad partners; and, finally, a framework to mitigate those risks.

All Publications button
1
Publication Type
Policy Briefs
Publication Date
Journal Publisher
Australian Strategic Policy Institute
Authors
Arzan Tarapore
Paragraphs

Whether the targets are local governmentshospital systems, or gas pipelines, ransomware attacks in which hackers lock down a computer network and demand money are a growing threat to critical infrastructure. The attack on Colonial Pipeline, a major supplier of fuel on the East Coast of the United States, is just one of the latest examples—there will likely be many more. Yet the federal government has so far failed to protect these organizations from the cyberattacks, and even its actions since May, when Colonial Pipeline was attacked, fall short of what’s necessary.

Read more 

All Publications button
1
Publication Type
Commentary
Publication Date
Subtitle
Op-ed in Bulletin of the Atomic Scientists, by Gregory Falco and Sejal Jhawer
Authors
Subscribe to Security