Cybersecurity
-

About the event: In his talk Toomas Hendrik Ilves will discuss how various digital tools have been used in democracies in Europe and the US in an attempt to disrupt and affect elections outcomes. These are new approaches, meant if not to alter electoral outcomes then at least to sow discord and seem in some instances to have been successful. Methods used include hacking into political parties' servers and “doxxing” embarrassing hacked materials; disseminating via “bots” false stories that have occasionally gone viral; as well highly granular big data analyses to target voters with ads specifically tailored to their profiles as culled from social media.

These methods and tactics have been employed in the U.S, French, and Dutch elections; cyber-break-ins into the Bundestag and German political think tanks suggest they will play a role in the upcoming German parliamentary elections. Perpetrated by an authoritarian government, they are asymmetric: without a free media environment they are immune to such tacts even if democracies were to even try to respond in kind. What democracies have experienced in the past several years will force them to adapt to a new environment with the realization that there are many ways for an adversary to change a nations policies.

About the Speaker: Toomas Hendrik Ilves was born on December 26, 1953, to an Estonian family living in Stockholm, Sweden. He was educated in the United States, receiving a degree from Columbia University in 1976 and a master's degree in psychology from the University of Pennsylvania in 1978.

In 1984 he moved to Munich, Germany, to work at the office of Radio Free Europe, first as a researcher and foreign policy analyst and later as the head of the Estonian Desk.

From 1993 to 1996 Ilves served in Washington as the ambassador of the Republic of Estonia to the United States and Canada. During this time, he launched the Tiger Leap Initiative to computerize and connect all Estonian schools online with Education Minister Jaak Aaviksoo. He then served as minister of foreign affairs from 1996 to 1998. After a brief period as chairman of the North Atlantic Institute in 1998, he was again appointed minister of foreign affairs, serving until 2002.

From 2002 to 2004, Ilves was a member of the Estonian Parliament and in 2004 he was elected a member of the European Parliament, where he was vice-president of the Foreign Affairs Committee. As a MEP, he initiated the Baltic Sea Strategy that was later implemented as official regional policy of the European Union.

Ilves was elected president of the Republic of Estonia in 2006. He was re-elected for a second term in office in 2011.

During his presidency, Ilves has been appointed to serve in several high positions in the field of ICT in the European Union. He served as chairman of the EU Task Force on eHealth from 2011 to 2012 and was chairman of the European Cloud Partnership Steering Board at the invitation of the European Commission from 2012 to 2014. In 2013 he chaired the High-Level Panel on Global Internet Cooperation and Governance Mechanisms convened by ICANN. From 2014 to 2015 Ilves was the co-chair of the advisory panel of the World Bank's World Development Report 2016 "Digital Dividends" and was also the chair of World Economic Forum's Global Agenda Council on Cyber Security beginning in June 2014.

Starting from 2016, Ilves co-chairs The World Economic Forum working group The Global Futures Council on Blockchain Technology. In 2017 he joined Stanford University as a Bernard and Susan Liautaud Distinguished Visiting Fellow at the Center for International Security and Cooperation in the Freeman Spogli Institute for International Studies.

President Ilves has published many essays and articles in Estonian and English on numerous topics ranging from Estonian language, history, and literature to global foreign and security policy and cyber security. His books include essay collections in Estonian, Finnish, Latvian, Hungarian, and Russian.

His international awards and honorary degrees include Knight of Freedom Award by the Casimir Pulaski Foundation (2016), the Aspen Prague Award by the Aspen Institute (2015), the Freedom Award by the Atlantic Council (2014) and the NDI Democracy Award by the National Democratic Institute (2013). His Honorary Degrees include an Honorary Degree from St. Olaf College, US (2014), an Honorary Degree from the John Paul II Catholic University of Lublin, Poland (2010), and an Honorary Degree from Tbilisi University, Georgia (2007).

Encina Hall, 2nd floor

Seminars
-

Abstract: High-security organizations around the world face devastating threats from insiders—trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose.

About the Speakers: Matthew Bunn is a Professor of Practice at Harvard University's John F. Kennedy School of Government. His research interests include nuclear theft and terrorism; nuclear proliferation and measures to control it; the future of nuclear energy and its fuel cycle; and policies to promote innovation in energy technologies. Before joining the Kennedy School in January 1997, he served for three years as an adviser to the Office of Science and Technology Policy, where he played a major role in U.S. policies related to the control and disposition of weapons-usable nuclear materials in the United States and the former Soviet Union, and directed a secret study for President Clinton on security for nuclear materials in Russia.

Scott S. Sagan is the Caroline S.G. Munro Professor of Political Science, the Mimi and Peter Haas University Fellow in Undergraduate Education, and Senior Fellow at the Center for International Security and Cooperation and the Freeman Spogli Institute at Stanford University. He also serves as Project Chair for the American Academy of Arts and Sciences’ Initiative on New Dilemmas in Ethics, Technology, and War. Before joining the Stanford faculty, Sagan was a lecturer in the Department of Government at Harvard University. From 1984 to 1985, he served as special assistant to the director of the Organization of the Joint Chiefs of Staff in the Pentagon. Sagan has also served as a consultant to the office of the Secretary of Defense and at the Sandia National Laboratory and the Los Alamos National Laboratory. 

Amy Zegart is is co-director of CISAC and Professor of Political Science, by courtesy. She is also the Davies Family Senior Fellow at the Hoover Institution. 

Before coming to Stanford in 2011, Zegart served as professor of public policy at UCLA’s Luskin School of Public Affairs and as a fellow at the Burkle Center for International Relations. Her research examines the organization of American national security agencies and their effectiveness. She is the author of two award-winning books. Flawed by Design, which chronicles the development of the Central Intelligence Agency, Joint Chiefs of Staff, and National Security Council, won the highest national dissertation award in political science. Spying Blind, which examines why American intelligence agencies failed to adapt to the terrorist threat before 9/11, won the National Academy of Public Administration’s Brownlow Book Award. She has also published in International Security, Political Science Quarterly, and other leading academic journals. She serves on the editorial boards of Terrorism and Political Violence and Intelligence and National Security. Her most recent book is Eyes on Spies: Congress and the United States Intelligence Community.
 
Zegart was featured by the National Journal as one of the ten most influential experts in intelligence reform. 

- The book, Insider Threats, will be available for purchase at the event -

CISAC
Stanford University
Encina Hall, E202
Stanford, CA 94305-6165

(650) 725-2715 (650) 723-0089
0
The Caroline S.G. Munro Professor of Political Science
The Bass University Fellow in Undergraduate Education  
Senior Fellow, Freeman Spogli Institute for International Studies
rsd25_073_1160a_1.jpg PhD

Scott D. Sagan is Co-Director and Senior Fellow at the Center for International Security and Cooperation, the Caroline S.G. Munro Professor of Political Science, and the Bass University Fellow in Undergraduate Education at Stanford University. He also serves as Co-Chair of the American Academy of Arts and Sciences’ Committee on International Security Studies. Before joining the Stanford faculty, Sagan was a lecturer in the Department of Government at Harvard University and served as special assistant to the director of the Organization of the Joint Chiefs of Staff in the Pentagon.

Sagan is the author of Moving Targets: Nuclear Strategy and National Security (Princeton University Press, 1989); The Limits of Safety: Organizations, Accidents, and Nuclear Weapons (Princeton University Press, 1993); and, with co-author Kenneth N. Waltz, The Spread of Nuclear Weapons: An Enduring Debate (W.W. Norton, 2012). He is the co-editor of Insider Threats (Cornell University Press, 2017) with Matthew Bunn; and co-editor of The Fragile Balance of Terror (Cornell University Press, 2022) with Vipin Narang. Sagan was also the guest editor of a two-volume special issue of DaedalusEthics, Technology, and War (Fall 2016) and The Changing Rules of War (Winter 2017).

Recent publications include “Creeds and Contestation: How US Nuclear and Legal Doctrine Influence Each Other,” with Janina Dill, in a special issue of Security Studies (December 2025); “Kettles of Hawks: Public Opinion on the Nuclear Taboo and Noncombatant Immunity in the United States, United Kingdom, France, and Israel”, with Janina Dill and Benjamin A. Valentino in Security Studies (February 2022); “The Rule of Law and the Role of Strategy in U.S. Nuclear Doctrine” with Allen S. Weiner in International Security (Spring 2021); “Does the Noncombatant Immunity Norm Have Stopping Power?” with Benjamin A. Valentino in International Security (Fall 2020); and “Just War and Unjust Soldiers: American Public Opinion on the Moral Equality of Combatants” and “On Reciprocity, Revenge, and Replication: A Rejoinder to Walzer, McMahan, and Keohane” with Benjamin A. Valentino in Ethics & International Affairs (Winter 2019).

In 2022, Sagan was awarded Thérèse Delpech Memorial Award from the Carnegie Endowment for International Peace at their International Nuclear Policy Conference. In 2017, he received the International Studies Association’s Susan Strange Award which recognizes the scholar whose “singular intellect, assertiveness, and insight most challenge conventional wisdom and intellectual and organizational complacency" in the international studies community. Sagan was also the recipient of the National Academy of Sciences William and Katherine Estes Award in 2015, for his work addressing the risks of nuclear weapons and the causes of nuclear proliferation. The award, which is granted triennially, recognizes “research in any field of cognitive or behavioral science that advances understanding of issues relating to the risk of nuclear war.” In 2013, Sagan received the International Studies Association's International Security Studies Section Distinguished Scholar Award. He has also won four teaching awards: Stanford’s 1998-99 Dean’s Award for Distinguished Teaching; Stanford's 1996 Hoagland Prize for Undergraduate Teaching; the International Studies Association’s 2008 Innovative Teaching Award; and the Monterey Institute for International Studies’ Nonproliferation Education Award in 2009.     

Co-director of the Center for International Security and Cooperation
CV
Date Label
Stanford University
Matthew Bunn Professor of Practice; Co-Principal Investigator, Project on Managing the Atom Belfer Center, Harvard Kennedy School

CISAC
Stanford University
Encina Hall, E216
Stanford, CA 94305-6165

(650) 725-9754 (650) 723-0089
0
Senior Fellow at the Freeman Spogli Institute for International Studies
Morris Arnold and Nona Jean Cox Senior Fellow at the Hoover Institution
Senior Fellow at the Stanford Institute for Human-Centered AI
Professor, by courtesy, of Political Science
amyzegart-9.jpg PhD

Dr. Amy Zegart is the Morris Arnold and Nona Jean Cox Senior Fellow at the Hoover Institution. The author of five books, she specializes in U.S. intelligence, emerging technologies, and national security. At Hoover, she leads the Technology Policy Accelerator and the Oster National Security Affairs Fellows Program. She also is an associate director and senior fellow at the Stanford Institute for Human-Centered AI; a senior fellow at the Freeman Spogli Institute; and professor of political science by courtesy, teaching 100 students each year about how emerging technologies are transforming espionage.

Her award-winning research includes the leading academic study of intelligence failures before 9/11: Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton, 2007) and the bestseller Spies, Lies, and Algorithms: The History and Future of American Intelligence (Princeton, 2022), which was nominated by Princeton University Press for the Pulitzer Prize. She also coauthored Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity, with Condoleezza Rice (Twelve, 2018). Her op-eds and essays have appeared in Foreign Affairs, Politico, the New York Times, the Washington Post, and the Wall Street Journal.

Zegart has advised senior officials about intelligence and foreign policy for more than two decades. She served on the National Security Council staff and as a presidential campaign foreign policy advisor and has testified before numerous congressional committees. Before her academic career, she spent several years as a McKinsey & Company consultant.

Zegart received an AB in East Asian studies from Harvard and an MA and a PhD in political science from Stanford. She serves on the boards of the Council on Foreign Relations, Kratos Defense & Security Solutions, and the American Funds/Capital Group.

Date Label
Stanford University
Seminars
Paragraphs

Safety-critical system domains such as critical infrastructures, aerospace, automotive, and industrial manufacturing and control are becoming increasingly dependent on the use of distributed systems to achieve their functionality. These distributed systems can contain many complex interactions among their constituent components. Despite extensive testing and verification of individual components, security vulnerabilities resulting from unintended and unforeseen component interactions (so-called implicit interactions) often remain undetected and can have an impact on the safety, security, and reliability of a system. This paper presents an approach for identifying and analyzing the existence and severity of implicit interactions in distributed systems. The approach is based on the modeling framework known as Communicating Concurrent Kleene Algebra (C²KA). Experimental results confirm that this approach can successfully identify and analyze dependencies in system designs that would otherwise be very hard to find. More broadly, the methods presented in this paper can help address the growing need for rigorous and practical methods and techniques for assuring the safe, secure, and reliable operation of distributed systems in critical domains.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
IEEE Transactions on Reliability
Authors
John Villasenor
-

Abstract: Microsoft President Brad Smith recently analogized Microsoft to a “Digital Switzerland.” This moniker captures the role that U.S. technology companies have increasingly taken on with respect to cybersecurity and privacy: they are acting like states and running their own foreign policies, and they are setting themselves as neutrals with respect to existing national authorities, including the United States. U.S. tech companies are not the first super-empowered private companies, but they have numerous features that set them apart from prior private powers like the Dutch East India Company or more recent examples like ExxonMobil. This article first provides an account of how the relationship between U.S. tech companies and governments has evolved over time. By breaking down the “Digital Switzerland” idea, the article then explores the extent to which and how the companies differ from the powerful private interests of earlier eras, and it concludes by analyzing the implications of the companies’ role for governance and for individuals going forward.

About the Speaker: Kristen Eichensehr is an Assistant Professor of Law at UCLA School of Law. She writes and teaches about foreign relations, separation of powers, cybersecurity, and national security law. Before joining the UCLA faculty, Eichensehr clerked for Chief Judge Merrick B. Garland of the U.S. Court of Appeals for the D.C. Circuit and for Justices Sandra Day O’Connor and Sonia Sotomayor of the Supreme Court of the United States. Eichensehr also served as Special Assistant to the Legal Adviser of the U.S. Department of State and practiced at Covington & Burling LLP. Eichensehr received her J.D. from Yale Law School, where she served as executive editor of the Yale Law Journal. Eichensehr is a term member of the Council on Foreign Relations, a former visiting fellow at the Hoover Institution, and an affiliate scholar at the Center for Internet and Society at Stanford Law School. She is a frequent contributor to and member of the editorial board of the national security blog, Just Security.

Encina Hall, 2nd floor

Kristen Eichensehr Assistant Professor UCLA School of Law
Seminars
-

Abstract: Recently, Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud, and The New York Times were knocked out by a botnet driven by the Mirai malware. Mirai is a contemporary case of a more general phenomenon: the illegitimate appropriation of online resources for prestige, economic, and/or political gain. Historically participants in the anti-abuse regime have used reputation indicators to characterize subsets of this illegitimate activity as abuse: any traffic---spam, malware communications, DDOS traffic---that is not explicitly consensual, is abusive. Participants in this regime use decentralized, transnational monitoring to aggregate and vet credible reputation indicators, then redistribute these indicators to participants enforcing anti-abuse norms. This work explains how these reputation indicators have functioned over the course of their evolution within this regime, from products of supposedly “vigilante blacklists” into credible mechanisms based on graduated sanction as a remediative signaling mechanism rather than a punitive sanction. Returning to Mirai, this work concludes by evaluating the potential for this regime to tackle contemporary IoT security challenges. In particular, can the anti-abuse regime discipline a market projected to grow from $900M in 2015 to $3.7B in 2020, or will it need help from conventional authorities?

About the Speaker: Jesse is the 2016-2017 Cybersecurity Fellow at the Center for International Security and Cooperation and holds a PhD in Technology, Management, and Policy from MIT.  Jesse focuses on understanding the institutions and political economy of Internet operations vis a vis conventional modes of domestic and inter-state governance mechanisms. This work includes studies on infrastructure resource management and policy, infrastructure security, credible knowledge assessment, and operational epistemic communities’ role informing public policy. Jesse’s dissertation evaluates the common resource management institutions that sustain the integrity and security of the Internet’s numbers and routing system. The dissertation documents how the roles of these institutions, comprising diverse transnational operator communities, managing the complex of physical and information resources supporting the integrity of global Internet connectivity. Concluding analyses narrow the focus from operational authority to the character of political authority in these communities, rooted in the family of consensus processes used to adapt resource policy and institutions apace with Internet growth and development.  Jesse is currently working on a number of papers from his dissertation: reputation and security in the numbers and routing system, contrasting consensus as a decision-making process with conventional mechanisms for credible knowledge assessment, and the challenges in comity between substantive-purposive authority in operational institutions with governments’ conventional, formal-legalistic modes of authority. Ongoing work is developing a theory of epistemic constructivism and case work on developing joint capabilities between operational security regimes and law enforcement/national security actors.

Encina Hall, 2nd floor

Cybersecurity Postdoctoral Fellow CISAC
Seminars
-

Drell Lecture Recording: https://youtu.be/K8qLqJwi4Qc

 

Drell Lecture Transcript: NA

 

Speaker's Biography: Admiral Inman graduated from the University of Texas at Austin in 1950, and from the National War College in 1972.  He became an adjunct professor at the University of Texas at Austin in 1987.  He was appointed as a tenured professor holding the Lyndon B. Johnson Centennial Chair in National Policy in August 2001.  He served as Interim Dean of the LBJ School of Public Affairs from 1 January to 31 December 2005 and again from January 2009 to March 2010.

Admiral Inman served in the U.S. Navy from November 1951 to July 1982, when he retired with the permanent rank of Admiral.  While on active duty he served as Director of the National Security Agency and Deputy Director of Central Intelligence.  After retirement from the Navy, he was Chairman and Chief Executive Officer of the Microelectronics and Computer Technology Corporation (MCC) in Austin, Texas for four years and Chairman, President and Chief Executive Officer of Westmark Systems, Inc., a privately owned electronics industry holding company for three years.  Admiral Inman also served as Chairman of the Federal Reserve Bank of Dallas from 1987 through 1990.

Admiral Inman’s primary business activity since 1990 has been investing in start-up technology companies, where he is a Managing Director of Gefinor Ventures and of Limestone Capital Advisors.  He serves as a Trustee of the American Assembly and the California Institute of Technology.  He is an elected Fellow of the National Academy of Public Administration.

Admiral Bob R. Inman National Security Agency
Lectures
Paragraphs

Modern distributed systems and networks, like those found in cyber-physical system domains such as critical infrastructures, contain many complex interactions among their constituent software and/or hardware components. Despite extensive testing of individual components, security vulnerabilities resulting from unintended and unforeseen component interactions (so-called implicit interactions) often remain undetected. This paper presents a method for identifying the existence of implicit interactions in designs of distributed cyber-physical systems using the algebraic modeling framework known as Communicating Concurrent Kleene Algebra (C²KA). Experimental results verifying the applicability of C²KA for identifying dependencies in system designs that would otherwise be very hard to find are also presented. More broadly, this research aims to advance the specification, design, and implementation of distributed cyber-physical systems with improved cybersecurity assurance by providing a new way of thinking about the problem of implicit interactions through the application of formal methods.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Proceedings of the 50th Hawaii International Conference on System Sciences, HICSS-50, pages 5988–5997
Authors
John Villasenor
-
Abstract: From programing firmware for IoT devices to misoperations in the field and control room, humans have the potential to offer creative, collaborative, and highly efficient solutions to some of society’s greatest challenges. However, human errors can lead to software vulnerabilities, blackouts, and loss of public trust. As we strive to make infrastructures more robust and lives safer, paradoxically, we often put humans at increased risk of distraction and error. Growing system and market speeds, interconnectivities between critical infrastructures, fear of compliance violations, and public scrutiny create challenges for operators, increase risks and costs, and prevent the system from deriving the greatest benefit from its people. Organizations are complex sociotechnical systems with complex political hierarchies; techniques such as root cause analysis demonstrate how intertwined our people and organizations are with technical system outcomes. Michael Legatt will highlight his work as a human factors engineer, from an emergency operations center during the 2003 blackout, to ten years at ERCOT (the grid operator for most of Texas), to founder of a company focused on improving human-computer and human-organizational interfaces for critical infrastructure management.
 
About the Speaker: Michael Legatt is the CEO and Founder of ResilientGrid. He has been a programmer for over 20 years in the energy, financial, medical, neuroscience research, and educational sectors. He has a Ph.D. in Clinical Health Psychology/Neuropsychology, a Ph.D. in Energy Systems Engineering, and is a Certified Performance Technologist.
 
As an amateur radio operator, he received a commendation for helping to provide emergency communications during the 2003 blackout in the northeastern United States, which sparked his interest in the psychology of critical infrastructure management.
 
Prior to founding ResilientGrid, Michael spent a decade as Electric Reliability Council of Texas’ Principal Human Factors Engineer. There, his development of the Macomber Map® was featured in several news outlets, and was credited as being instrumental in helping ERCOT operators maintain grid reliability through severe weather and record-setting wind generation. He also works on the behavioral aspects of consumer electric use, electric vehicle to grid integration, behavioral aspects of conservation and consumer awareness in grid management, and the cybersecurity, behavioral, and reliability issues that arise with integrating new technologies across layers of the grid.

Encina Hall, 2nd floor

Michael Legatt CEO and Founder ResilientGrid
Seminars
-

Abstract: Critical infrastructure systems including manufacturing facilities, ports, transportation systems, communications networks, and energy and water distribution systems often consist of many interacting components linked in complex ways. This can lead to unforeseen interactions among components that may not be expected or intended by the designers and operators of the system. These interactions constitute linkages within a system of which designers are generally unaware, and that therefore constitute a security vulnerability. In this talk, I will present and discuss a formal approach for identifying and analyzing the existence and severity of security vulnerabilities resulting from these previously unknown linkages (so-called implicit interactions) in critical infrastructure systems. The presence of these implicit interactions in a system can indicate unforeseen flaws that, if not mitigated, could be exploited by an attacker. This can have severe consequences in terms of the safety, security, and reliability of the system. Therefore, this notion of implicit interactions must be carefully managed in order to have systems that operate as intended, and that are resistant to cyber-attacks and failures. 

 
About the Speaker: Jason Jaskolka is a U.S. Department of Homeland Security Cybersecurity Postdoctoral Scholar at Stanford University within the Center for International Security and Cooperation (CISAC). He received his Ph.D. in Software Engineering in 2015 from McMaster University in Hamilton, Ontario, Canada. His research aims to address increasingly critical issues in designing and implementing safe, secure, and reliable systems. His current work involves the design and development of critical infrastructure cybersecurity assessment methodologies and associated modeling and simulation environments. His research interests include cybersecurity assurance, covert channel analysis, distributed multi-agent systems, and algebraic approaches to software engineering.

Encina Hall, 2nd floor

U.S. Department of Homeland Security Cybersecurity Postdoctoral Scholar CISAC
Seminars
Subscribe to Cybersecurity