CISAC senior fellow Martha Crenshaw challenges statements from presumptive Republican presidential nominee Donald Trump that “thousands upon thousands of people” are entering the United States, “many of whom have the same thought process” as the Orlando shooter, and his assertions that they are forming “large pockets” of people who want to “slaughter us” in an OpEd for The Washington Post.
The Hoover Institution’s Working Group on Foreign Policy and Grand Strategy has produced a national security strategy that acknowledges this uncertainty and hedges as well as engages, recognizing that resources are not limitless. This strategy also endeavors to lay out the conceptual and policy road map for success
The United States is exceptionally secure. No country today presents a clear and imminent security threat in the way that Germany, Japan, or the Soviet Union did in the 20th century. In the short and medium term, there is also no alternative value system that could displace America’s conception of individual liberty and a market-oriented economy—principles that have been embraced by all of the world’s wealthy industrialized countries in Western Europe, North America, and East Asia.
It’s a quintessential Silicon Valley scene. A group of tech-savvy Stanford students are delivering a passionate pitch about a product they hope is going to change the world, while a room full of venture capitalists, angel investors and entrepreneurs peppers them with questions.
But there’s a twist. This Stanford classroom is also packed with decorated military veterans and active duty officers. And a group of analysts from the U.S. intelligence community is monitoring the proceedings live via an iPad propped up on a nearby desk.
These Stanford students aren’t just working on the latest “Uber for X” app. They’re searching for solutions to some of the toughest technological problems facing America’s military and intelligence agencies, as part of a new class called Hacking for Defense.
A student team briefs the class on a wearable sensor they're developing for an elite unit of U.S. Navy SEALs – a product they're pitching as "fitbit for America's divers."
“There’s no problems quite like the kind of problems that the defense establishment faces, so from an engineering standpoint, it has the most powerful ‘cool factor’ of anything in the world,” said Nitish Kulkarni, a senior in mechanical engineering.
Kulkarni’s team is working with an organization within the US Department of Defense to devise a system that will provide virtual assistance to Afghan and Iraqi coalition forces as they defuse deadly improvised explosive devices.
“At Stanford there’s a lot of opportunities for you to build things and go out and learn new stuff, but this was one of the first few opportunities I’ve seen where as a Stanford student and as an engineer, I can go and work on problems that will actually make a difference and save lives,” said Kulkarni.
A 21st century tech ROTC
That’s exactly the kind of “21st century tech ROTC” model of national service that Steve Blank, a consulting associate professor at Stanford’s Department of Management Science and Engineering, said he had in mind when he developed the class.
“The nation is facing a set of national security threats it’s never faced before, and Silicon Valley has not only the technology resources to help, but knows how to move at the speed that these threats are moving at,” said Blank.
MBA student Rachel Moore presents for Team Sentinel, which is working with the U.S. 7th Fleet to find better ways to analyze drone and satellite imagery.
The students’ primary mission will be to produce products that can help keep Americans and our allies safe, at home and abroad, according to Blank.
Former U.S. Army Special Forces Colonel Joe Felter, who helped create the class and co-teaches it with Blank, said the American military needs to find new ways to maintain its technological advantage on the battlefield.
“Groups like ISIS, al–Qaeda and other adversaries have access to cutting edge technologies and are aggressively using them to do us harm around the world,” said Felter, who served in Iraq and Afghanistan and is currently a senior research scholar at Stanford’s Center for International Security and Cooperation (CISAC) and research fellow at the Hoover Institution.
“The stakes are high – this is literally life and death for our young men and women deployed in harm’s way. We’re in a great position here at Stanford and in Silicon Valley to help make the connections and develop the common language needed to bring innovation into the process, in support of the Department of Defense and other government agencies’ missions.”
Startup guru Steve Blank shares a light moment with a group of students.
The class is an interdisciplinary mix of undergraduate and graduate students, from freshman to fifth year PhD student.
“It’s like a smorgasbord of all these people coming together from different parts and different schools of Stanford, and so I think that’s just a really cool environment to be in,” said Rachel Moore, a first-year MBA student.
Moore’s team includes electrical and mechanical engineering students, and they’re working together to develop a system to enable the Navy’s Pacific Fleet to automatically identify enemy ships using images from drones and satellites.
Tough technological challenges
Months before the course start date, class organizers asked U.S. military and intelligence organizations to identify some of their toughest technological challenges.
Class co-teacher Pete Newell throws his hands up to celebrate a student breakthrough.
U.S. Army Cyber Command wanted to know if emerging data mining, machine learning and data science capabilities could be used to understand, disrupt and counter adversaries' use of social media.
The Navy Special Warfare Group asked students to design wearable sensors for Navy SEALs, so they could monitor their physiological conditions in real-time during underwater missions.
Intelligence and law enforcement agencies were interested in software that could help identify accounts tied to malicious “catfishing” attempts from hackers trying to steal confidential information.
And those were just a few of the 24 problems submitted by 14 government agencies.
Developing Solutions
The class gives eight teams of four students 10 weeks to actively learn about the problem they are addressing from stake holders and end users most familiar with the problem and to iteratively develop possible solutions or a “minimum viable product,” using a modified version of Steve Blank’s “lean launchpad methodology,” which has become a revered how-to guide among the Silicon Valley startup community.
Rachel Olney, a graduate student in mechanical engineering, tries on a military-grade dry suit on a visit to the 129th Rescue Wing at Moffett Field.
A key tenet of Blank’s methodology is what he calls the “customer discovery process.”
“If you’re not crawling in the dirt with these guys, then you don’t understand their problem,” Blank told the class.
One student team, which was working on real-time biofeedback sensors and geo-location devices for an elite team of Navy SEALS (a project they were initially pitching at “fitbit for America’s divers”), earned a round of applause from the class when they showed a slide featuring photos from a field trip they took to the 129th Rescue Wing at Moffett Field to find out what it felt like to wear a military-grade dry suit.
Rachel Olney, a graduate student in mechanical engineering, said the experience of squeezing into the tight suit and wearing the heavy dive gear gave her a better appreciation for the physical demands that Navy SEALs have to deal with during a mission.
“They’re diving down to like 200 feet for up to six to eight hours…and during that time they can’t eat, they can’t hydrate, they’re physically exerting a lot, because they’re swimming miles and miles and miles at depth and they can’t see and they can’t talk to each other,” Olney said.
Image
“It’s probably one of the most extreme things that humans do right now.”
Another group came in for some heavy criticism from the teaching team for failing to identify and interview enough end users.
But the next week, they were back in front of the class showing a video from a team member’s visit to an Air Force base in Fresno, where he logged some time inside the 90-pound bomb suit that explosive ordinance disposal units wear in the field.
“You can’t address a customer issue unless and until you really step into the shoes of the customer,” said Gaurav Sharma, who’s a student at Stanford's Graduate School of Business.
“That was the exact reason why I went to Fresno and wore the bomb suit, to get into the shoes of the end customer.”
Navigating the defense bureaucracy
Active duty military officers from CISAC’s Senior Military Fellows program and the Hoover Institution’s National Security Affairs Fellows program act as military liaisons for the class and help students navigate the complex defense bureaucracy.
“[The students] have really just jumped in with both feet and immersed themselves in this Department of Defense world that for so many civilians is just very foreign to them,” said U.S. Army Colonel John Cogbill, who has spent the last year as a senior military fellow at CISAC.
“I think they will come away from this experience with a much better appreciation of what we do inside the Department of Defense and Intelligence community, and where there are opportunities for helping us do our jobs better.”
Cogbill said he hoped that some of the inventions from the class, like an autonomous drone designed to improve situational awareness for Special Forces teams, could help the troops on his next combat deployment, where he will serve as the Deputy Commanding Officer of the U.S. Army’s elite 75th Ranger Regiment.
“It’s not just about making them more lethal, it’s also about how to keep them alive on the battlefield,” said Cogbill.
Students also get support from their project sponsors and personnel at the newly established Defense Innovation Unit Experimental (DIUx) stationed at Moffett Field.
Tech saves lives on the battlefield
Another key member of the teaching team is Pete Newell, who was awarded the Silver Star Medal (America’s third-highest military combat decoration), for leading a U.S. Army battalion into the Battle of Fallujah, where he survived an ambush and left the protection of his armored vehicle in an attempt to save a mortally wounded officer.
Class co-teacher and Silver Star Medal recipient Pete Newell explains some of the classic reasons why military products fail in the field.
Newell said he saw first-hand the difference that technology can make on the battlefield in his next job, when he served as director of the U.S. Army’s Rapid Equipping Force, which was tasked with creating technological solutions to the troops fighting in Afghanistan.
“What I realized is that the guys on the front edge of the battlefield who were actually fighting the fight, don’t have time to figure out what the problem is that they have to solve,” Newell said.
“They’re so involved in just surviving day to day, that they really don’t have time to step back from it and see those problems coming, and what they needed was somebody to look over their shoulder and look a little deeper and anticipate their needs.”
One of the first and most urgent problems Newell faced on the job was responding to the sudden spike in IED attacks on dismounted infantry.
The Army was still using metal detector technology from the ‘50s to find mines, but the new breed of IEDs, which were often hidden inside buried milk jugs, were virtually undetectable to the outdated technology.
Former U.S. Army Colonel Pete Newell demystifies some military jargon for the class.
“They could create an improvised explosive device and a pressure plate trigger…by using almost zero metal content,” Newell said. “It was almost impossible to find.”
Newell’s solution was a handheld gradiometer, the kind of technology used to find small wires in your backyard during a construction project, paired with a ground penetrating radar that can see objects underground.
But by the time the new technology reached troops in the field last summer, more than 4,000 had been wounded or killed in IED attacks.
Newell said he hoped the class would help get life-saving technology deployed throughout the military faster.
“I think it’s important to enable this younger generation of technologists to actually connect with some of the national security issues we face and give them an opportunity to take part in making the world a safer place,” Newell said.
Tom Byers, an entrepreneurship professor in Management Science and Engineering and faculty director of the Stanford Technology Ventures Program, rounds out the teaching team and brings his experience in innovation education and entrepreneurship to the classroom.
Inspiring the next generation
Students said the opportunity to find solutions to consequential problems was their primary inspiration for joining the class.
“When I first came to Stanford, the hype around entrepreneurship was very much around, ‘go out, make an app, do something really fun and cool, and get rich’,” said Darren Hau, a junior in Electrical Engineering.
Students share a laugh during a class break.
“In Hacking for Defense, I think you’re seeing a lot of people bring that same entrepreneurial mindset into a problem statement that seems a lot more impactful.”
Felter said he was humbled that so many students were willing to serve in this way.
“It’s encouraging to find out that students at one of our top universities are very interested and highly motivated to work very hard and use their skills and expertise and talent and focus it on these pressing national security problems,” said Felter.
The teaching team said they planned on expanding their class to other universities across the country in the coming years, to create a kind of open source network for solving unclassified national security problems.
For military officers like Cogbill, who will likely soon be leading U.S. soldiers into combat, that’s welcome news.
“Every time you run a course, that’s eight more problems,” Cogbill said.
“If this scales across 10, 20, 30, 40 more universities, you can imagine how many more problems can be solved, and how many more lives can potentially be saved.”
Hero Image
Influential startup educator Steve Blank (center) gives advice to Stanford students working on tough national security problems, while retired U.S. Army Colonels and class co-teachers Joe Felter (right) and Pete Newell (left) listen in.
Abstract: Institutions like LLNL are part of an enterprise established in the mid-twentieth century to enable teams of scientists and engineers to deliver technological capabilities to address challenges to U.S. national security. The steadily increasing pace of technological change, the reduced proportion of U.S. government funding invested in research and development relative to private sector investments, and the accelerating resources and programs for research globally have dramatically changed the context for this enterprise. Operational practices established to meet the national security needs of the last century must be updated to ensure that the national security science and technology enterprise can continue to deliver high quality capabilities to meet future threats and innovation to enhance U.S. national and economic security. Possible approaches for updating research careers and the structure of institutions include revamping policies for domestic and international partnerships, more effectively managing dual use technologies, and updating enterprise elements to draw on cutting-edge developments in academia and industry.
About the Speaker: Patricia Falcone is the Deputy Director for Science and Technology, and Chief Technology Officer, of the Lawrence Livermore National Laboratory (LLNL). From 2009 to 2015, she served in the White House Office of Science and Technology Policy, including as the presidentially appointed and Senate-confirmed Associate Director for National Security and International Affairs. Earlier she worked at the Sandia National Laboratories in Livermore, CA. She earned a Ph.D. working in the High Temperature Gasdynamics Laboratory in Stanford’s mechanical engineering department.
Patricia Falcone
Deputy Director for Science and Technology, and Chief Technology Officer,
Lawrence Livermore National Laboratory
The coordinated suicide bombings that killed more than 30 people and wounded 250 more at an international airport and downtown subway station in Brussels on Tuesday were “shocking but not surprising” and shared many of the hallmarks of previous European terror attacks, according to Stanford terrorism experts.
“My research shows that in general, terrorist plots in Europe involve larger numbers of conspirators than do plots in the United States,” said Martha Crenshaw, a senior fellow at Stanford’s Center for International Security and Cooperation (CISAC).
Belgian authorities said that as many as five people may have been directly involved in the bombings, including two Belgian-born brothers with violent criminal records, and that several suspects were linked to the same terrorist network that carried out the deadly Paris attacks last November.
“It is common for terrorist conspiracies anywhere to be formed from prior social groupings – friends and relatives,” said Crenshaw.
“The bonds that link individuals are not entirely ideological by any means. Criminal backgrounds are also not surprising. Indeed prison radicalization is a well-known phenomenon.”
A Notorious Neighborhood
Many of the suspects in the Brussels bombings had ties to the inner-city neighborhood of Molenbeek, a majority Muslim enclave of mostly Moroccan descent with a long history as a logistical base for jihadists.
[[{"fid":"222520","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_file_image_alt_text[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_file_image_title_text[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_credit[und][0][value]":"John Thys/AFP/Getty Images","field_caption[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_related_image_aspect[und][0][value]":"","thumbnails":"crop_870xauto"},"type":"media","attributes":{"alt":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","title":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","width":"870","style":"width: 550px; float: right; height: 366px; margin-left: 15px;","class":"media-element file-crop-870xauto"}}]]French and Belgian police arrested Salah Abdesalam, who had been identified as the last surviving member of the ten-man team responsible for the Paris attacks and an apparent associate of the Brussels bombers, near his family home in Molenbeek just four days before the Brussels attacks.
“Brussels and particularly Molenbeek is one of those places that comes up a lot when you’re talking about counter terrorism,” said Terrence Peterson, a postdoctoral fellow at CISAC.
“You do have terrorism networks that use these areas, in the same way that organized crime does, to thrive…It seems to be the place where all the networks are locating in part because Belgian security hasn’t been very effective in fighting terrorism.”
Foreign Fighters Bring the War Home
Belgium is a small nation, with a population of around 11 million people, but it has the highest per capita percentage of any Western country of foreign fighters who have joined the battle in Iraq and Syria, according to a recent report, which estimated the total number at 440.
“People were even saying it was not a matter of if, but when Belgium was attacked,” said Joe Felter, a CISAC senior research scholar and former Colonel in the U.S. Army Special Forces.
“You’ve got a high concentration of radicalized individuals in that neighborhood of Brussels, so logistically it was easier for them to recruit, plan and coordinate the execution of these attacks. Local residents loading up explosive packed suitcases in a cab and driving across town to the airport exposes them to much less risk of compromise than would a plot requiring cross border preparation and movement by foreign citizens.”
Felter said he was concerned that the Brussels bombings, for which the Islamic State group has claimed responsibility, would inspire copycat attacks in other countries.
“The real risk now is these home-grown, self-directed terrorist attacks,” he said.
“A successful attack like this, with all its media attention and publicity, is only going to inspire and motivate more attempts going forward.”
Former U.S. Secretary of State and presidential candidate Hillary Clinton delivers a foreign policy address at Stanford's Freeman Spogli Institute for International Studies on March 23, 2016.
Former U.S. Secretary of State and presidential candidate Hillary Clinton said European nations needed to do a better job of sharing intelligence to track foreign fighters as they returned home, during a foreign policy speech at Stanford’s Freeman Spogli Institute for International Studies on Wednesday.
“The most urgent task is stopping the flow of foreign fighters to and from the Middle East,” Clinton said.
“Thousands of young recruits have flocked to Syria from France, Germany, Belgium and the United Kingdom. Their European passports make it easier for them to cross borders and eventually return home, radicalized and battle-hardened. We need to know the identities of every fighter who makes that trip and start revoking their passports and visas.”
Turkey’s president announced at a press conference on Wednesday that his country had deported one of the suspected Brussels bombers back to the Netherlands last year with a clear warning that he was a jihadi.
Identifying Hot Spots
Clinton said authorities also needed to work to improve social conditions in problem areas such as Molenbeek.
“There…has to be a special emphasis on identifying and investing in the hot spots, the specific neighborhoods, prisons and schools where recruitment happens in clusters as we’ve seen in Brussels,” Clinton said.
Other European countries such as Denmark, which has also been struggling to deal with a high percentage of foreign fighters, are trying to proactively to discourage citizens from travelling to Syria to fight, said Anja Dalgaard-Nielsen, former executive director of the Danish Security and Intelligence Service and a CISAC affiliate.
“Politicians are likely to talk about tougher legislation, but there are also measured voices, calling for a strong, long term preventive effort against radicalization to prevent problems from growing out of hand,” said Dalgaard-Nielsen.
Cover of the book "Why Muslim Integration Fails in Christian-Heritage Societies" co-authored by Stanford Political Science professor David Laitin.
“Police need to prioritize community outreach and long term trust building to try to ensure the collaboration of minority groups and socioeconomically disadvantaged communities in the effort against terrorism.”
Stanford political science professor David Laitin, who recently published the book “Why Muslim Integration Fails in Christian-Heritage Societies,” in collaboration with Claire Adida and Marie-Anne Valfort, said his research found that Muslims faced higher discrimination in the economy, in society and in the political process compared to Christians from similar immigrant backgrounds.
“But there is no evidence that higher degrees of discrimination lead Muslims into the unspeakable acts that members of an inhuman cult are performing in the name of Islam,” said Laitin, who is the James T. Watkins IV and Elise V. Watkins professor in the School of Humanities and Sciences.
“From what we have tragically seen, the attractiveness of the present murderous cult does not derive from everyday discrimination," he said. "Research has shown that it is not the poor and downtrodden who are radicalized in this way; but rather reasonably educated second-generation immigrants from largely secular backgrounds.”
Europe Divided
Laitin said he expected to see many European countries tighten their border controls in response to the Brussels attacks, as well as greater support in the United Kingdom for the movement to leave the European Union in the upcoming referendum.
“The biggest short-term effect, in my judgment, will be the erosion of one of the great achievements of European integration, namely Schengen, which promised open borders throughout the continent,” Laitin said.
“I foresee greater security walls that will come to divide European countries.”
Fighting a Hostile Ideology
Felter said that while it was undoubtedly important to improve intelligence sharing and invest in greater security measures as part of concerted efforts to target ISIS and interdict future terrorist plots, the key to undermining support for and defeating ISIS was combating its perverted version of Islam.
And, he said, that effort would have to come largely from within the Islamic community itself.
“The symptoms may be suicide bombers in airports, but the root cause is this hostile ideology that’s being pushed on these at-risk individuals through aggressive radicalization and recruitment efforts carried out largely via the internet that then inspires them to carry out these self-directed, ISIS-inspired attacks,” Felter said.
“There’s got to be a longer-term effort to address the root causes of this, to discredit and delegitimize the appeal of this ideology that they’re promulgating online and through social media that’s inspiring these young men and women to go off and commit these horrible acts in the misguided belief that it is their religious obligation to do so.”
Hero Image
A woman arrives with flowers at a cordoned-off area near Maelbeek subway station in Brussels on March 23, 2016, a day after bomb attacks in the Belgian capital killed about 35 people and left more than 200 people wounded.
Abstract: For four years running now, the Director of National Intelligence’s Worldwide Threat Assessment to Congress has led with cyber threats to national and international security. Under statute, the several National Intelligence Officers constitute the most senior advisors of the US Intelligence Community in their areas of expertise. This discussion with the National Intelligence Officer for Cyber Issues will begin by highlighting the technology trends that are having a transformational change on cyber security and the future of intelligence. It will then assess strategic developments in international relations and their implications for deterring malicious activity in cyberspace. The analysis will focus on the (in)applicability of existing arms control mechanisms and deterrence principles to modern information and communication technologies.
About the Speaker: Sean Kanuck was appointed as the first National Intelligence Officer for Cyber Issues in May 2011. Mr. Kanuck came to the National Intelligence Council after a decade of experience in the Central Intelligence Agency’s Information Operations Center, including both analytic and field assignments. In his Senior Analytic Service role, he was a contributing author for the 2009 White House Cyberspace Policy Review, an Intelligence Fellow with the Directorates for Cybersecurity and Combating Terrorism at the National Security Council, and a member of the United States delegation to the United Nations Group of Governmental Experts on international information security.
Prior to government service, Mr. Kanuck practiced law with Skadden Arps et al. in New York, where he specialized in mergers and acquisitions, corporate finance, and banking matters. He is a member of the International Institute for Strategic Studies, and his academic publications focus on information warfare and international law. Mr. Kanuck holds degrees from Harvard University (A.B., J.D.), the London School of Economics (M.Sc.), and the University of Oslo (LL.M.).
Sean P. Kanuck
National Intelligence Officer for Cyber Issues (until April 2016)
Office of the Director of National Intelligence
- Please note that this is a joint CISAC/Science seminar -
Join Chairman of the National Intelligence Council (NIC) Greg Treverton for a discussion on the NIC's work and how it connects to U.S. policy and wider global forecasting, along with a preview of the NIC's upcoming Global Trends report.
About the Speaker: Dr. Treverton started his duties as Chairman of the National Intelligence Council on September 8, 2014. Prior to his selection, Treverton held several leadership positions at RAND Corporation, including director of the RAND Center for Global Risk and Security, director of the International Security and Defense Policy Center, and associate dean of the Pardee RAND Graduate School. His work at RAND examined terrorism, intelligence and law enforcement, as well as new forms of public–private partnership.
Treverton has served in government for the first Senate Select Committee on Intelligence, handling Europe for the National Security Council and later, as vice chair of the National Intelligence Council (1993–1995), overseeing the writing of America's National Intelligence Estimates.
His RAND publications on intelligence include: “Reorganizing U.S. Domestic Intelligence: Assessing the Options” (2008), “Assessing the Tradecraft of Intelligence Analysis” (with C. Bryan Gabbard, 2008) and “The Next Steps in Reshaping Intelligence” (2005). Two books, Intelligence for an Age of Terror and Reshaping National Intelligence for an Age of Information, were published by Cambridge University Press in 2009 and 2001, respectively.
Treverton holds an A.B. summa cum laude from Princeton University and an M.P.P. and Ph.D. in economics and politics from Harvard University.
Gregory Treverton
Chairman
National Intelligence Council
Under Secretary Sewall will deliver remarks on Countering Violent Extremism, the U.S. Government’s comprehensive approach for preventing the spread of ISIL and emergence of new terrorist threats. The Under Secretary will describe how the evolution of violent extremism since the 9/11 attacks necessitates a “whole of society” approach to prevent people from aligning with terrorist movements and ideologies in the first place. Drawing on recent travel to Indonesia, India, and Egypt, the Under Secretary will describe the vital role of actors outside government in this approach, including women, youth, religious leaders, businesses, and researchers. She will also elaborate on new steps the U.S. Government is taking to intensify its CVE efforts around the world. The Under Secretary will also take questions from the audience.
Speaker bio
Image
Dr. Sarah Sewall is the Under Secretary for Civilian Security, Democracy, and Human Rights at the U.S. State Department, and is a longtime advocate for advancing civilian security and human rights around the world. Dr. Sewall was sworn in on February 20, 2014. She serves concurrently as the Special Coordinator for Tibetan Issues. Over the previous decade, Dr. Sewall taught at the Harvard Kennedy School of Government, where she served as Director of the Carr Center for Human Rights Policy and directed the Program on National Security and Human Rights.
Dr. Sewall has extensive experience partnering with the U.S. armed forces around civilian security. At the Kennedy School, she launched the MARO (Mass Atrocities Response Operations Project) to assist the U.S. military with contingency planning to protect civilians from large-scale violence. She was a member of the Defense Policy Board and served as the Minerva Chair at the Naval War College in 2012. She also led several research studies of U.S. military operations for the Department of Defense and served as the inaugural Deputy Assistant Secretary of Defense for Peacekeeping and Humanitarian Assistance in the Clinton Administration. Prior joining the executive branch, Dr. Sewall served for six years as the Senior Foreign Policy Advisor to U.S. Senate Majority Leader George J. Mitchell and earned a Ph.D at Oxford University, where she was a Rhodes Scholar.
This event is co-sponsored by Stanford in Government and CISAC.
U.S. Secretary of the Air Force Deborah Lee James speaks at a roundtable on cyber policy at Stanford University on January 6, 2016.
The U.S. military needs to train and recruit more “cyber warriors,” and improve its offensive and defensive capabilities in cyberspace, Secretary of the Air Force Deborah Lee James said during a visit to Stanford University last week.
“Today we’re not sufficiently strategizing, organizing, training or equipping to be cyber warriors,” James said at a roundtable discussion on cyber policy. “We’ve made progress over the last year or two, but it’s not good enough. We need to do more, to be open to different ways of bringing people on and retaining people so we can bring the best and brightest into our ranks.”
She called on Silicon Valley to “move past the debate over Edward Snowden and the debate over encryption” and help the military combat cyber threats to U.S. national security. “Particularly here in Silicon Valley, how can we get better access…and work better with some of the great innovations here in Silicon Valley?” she asked.
U.S. Secretary of the Air Force Deborah Lee James (left) meets with former Secretary of Defense William J. Perry (second from right) and former Secretaries of State Condoleezza Rice and George P. Shultz (far right) during a visit to Stanford University on January 6, 2016.
Stanford University was just one of the stops on James’ schedule, which also included meetings at Google, Facebook, FireEye and In-Q-Tel (the investment arm of the U.S. intelligence community).
James said she’d come to Silicon Valley to “listen and learn” and search for “the next big thing” – from drones to big data.
“We’re actively on the hunt for what will be our next advantage as the military,” she said.
She said the military was working to streamline its procurement process so it could move more quickly fund new technological development using what she called “rapid acquisition.”
“You can’t build the next fighter aircraft under this, but you can build smaller types of technological products and get something under contract within 30 days,” she said.
Protecting networked weapons systems and critical infrastructure at military bases were two top priorities for the Air Force, James said.
It is also working to develop better defensive capabilities to protect satellites and other assets in space, and prevent adversaries from disabling critical missile warning and global positions systems, James said.
“Space had been a fairly tranquil, uncontested area,” she said.
“Nowadays, space is much more contested and congested. There are many more companies and countries up there.
“If a conflict on earth bleeds into space in some way, how do we defend our constellation?”
Military operations centers will need to integrate more cyber capabilities in order to create more options for defense and offense, James said.
“What we need in future is a multi-domain operations center where we’re fully plugged in terms of cyber and space...so that a commander at every turn has military options that go beyond bombing a target,” she said.
“The President, the Secretary of Defense, everybody is pressing, ‘We want more options. We want more targets.’.”
But James acknowledged that even digital conflict could cause collateral damage in the physical world.
“Let’s say we take out a power grid to shut down a particular part of a country to stop a military action,” she said. “Maybe you’d shut off power to a hospital and people would die.”
That’s why cyber operations would continue to be governed by the law of armed conflict.
“Before a cyber target would be hit, there would be a legal decision with other parts of the government,” James said. “It’s not solely [up to] a commander on the scene.”
In an indication of the growing importance of cyber operations, political and military leadership in Washington are considering elevating U.S. Cyber Command from under U.S. Strategic Command to become its own unified command, James said.
The Air Force currently has around 1,700 personnel working directly on cyber offense and defense, spread among the National Guard, Reserves and active duty. And it recently established a new Cyber College at Air University on Maxwell Air Force base in Montgomery, Alabama to train more internal talent.
But military leaders are also looking for other ways to scale up their cyber forces, James said.
“Maybe leveraging the private sector and leveraging Silicon Valley can help us,” she said.
Hero Image
U.S. Secretary of the Air Force Deborah Lee James speaks at a roundtable on cyber policy at Stanford University on January 6, 2016.