Cybersecurity
-

Abstract: This presentation is adapted from two book chapters.  The first one published in 2007 is “Transforming U.S. Intelligence: The Digital Dimension” and the second chapter published in 2009 is “Vaults, Mirrors and Masks: Rediscovering US Counterintelligence - Counterintelligence Too Narrowly Practiced.”  Additionally, material from recent DSB and NSB studies is included:  “Resilient Military Systems and the Advanced Cyber Threat” and “A Review of U.S. Navy Cyber Defense Capabilities”.  Communications technologies have transformed the way information is created, stored, processed, viewed, and transmitted. But the same technologies have provided our adversaries with the tools for attacking and exploiting our infrastructure and military systems. The U.S. has long operated under the assumption that our critical systems would be secure if we applied current Information Assurance (IA) practices. The reality is that a sophisticated offense easily outmatches the capability of a defensive organization to protect its critical Information Technology (IT) systems.  This briefing attempts to convey the rationale behind this assertion. The presentation represents my views and is specifically not intended to represent the views of any organization with which I’m affiliated.

About the Speaker: Mr. Gosler is a Senior Fellow at the Johns Hopkins University Applied Physics Laboratory.  He is engaged in various DOD and Intelligence Community advisory boards such as the Defense Science Board.

His previous experience includes a 33 year career (1979-2013) at Sandia National Laboratories. His early contributions included red-teaming both cryptographic and nuclear weapon systems.  In 1989, he served as Sandia’s first Visiting Scientist to NSA.  In 1993, he established and directed the Vulnerability Assessments Program. From 1996-2001, he was on a Special Leave of Absence from Sandia.  After returning to Sandia, he became Sandia’s sixth lab Fellow.

In 1996, he entered the Senior Intelligence Service at CIA as the Director of the Clandestine Information Technology Office.  This office integrated targeting, analysis, technology development, and technical/human operations.

Additionally, he served as a Naval Reserve Officer from 1975-2003. 

His awards include: Lockheed Martin’s NOVA award, National Intelligence Medal of Achievement, DONOVAN award, Intelligence Medal of Merit, Director of Central Intelligence Director’s award, and the Legion of Merit.

Mr. Gosler earned a BS degree in Physics/Mathematics and a MS degree in Mathematics.

Encina Hall, 2nd floor

Jim Gosler Senior Fellow Johns Hopkins University Applied Physics Laboratory
Seminars
-

Abstract: What will be the state of digital security in five and 10 years? Will it be a "Wild West" where every person and organization must fight to protect their own personal data? Will the Internet of Things advance so much into our homes and cities that everyone – at all times – is under surveillance? Are sensors going to be smart enough to determine and predict human feelings – opening the door to cybercriminals hacking human emotion? These are scenarios from The University of California - Berkeley's Center for Long-Term Cybersecurity, which has modeled what the Internet and cybersecurity could look like in 2020 and beyond. Steve Weber, Faculty Director, and Betsy Cooper, Executive Director, will use examples from the scenarios to help think through what we should be doing today to prepare for the future of cybersecurity.

About the Speakers: Betsy Cooper is the Executive Director of the Berkeley Center for Long-Term Cybersecurity. Betsy, a former CISAC Postdoctoral Fellow, came to UC Berkeley from the Department of Homeland Security, where she served as an attorney advisor to the Deputy General Counsel and as a policy counselor in the Office of Policy. Prior to her arrival at Berkeley, Betsy worked for over a decade in homeland security consulting, managing projects for Atlantic Philanthropies (Dublin, Ireland), the Prime Minister's Strategy Unit in London, the World Bank, and a number of other think tanks. Betsy is also the author of over twenty manuscripts and articles on US and European immigration and refugee policy, and her book manuscript Europe's Security Solution: Can Immigrant Integration Really Prevent Terrorism? is currently under review. In addition to a law degree from Yale University, Betsy holds a DPhil in Politics from Oxford University, an M.Sc. in Forced Migration from Oxford University, and a B.A. in Industrial and Labor Relations from Cornell University. Betsy previously clerked for Judge William Fletcher on the Ninth Circuit Court of Appeals.
 
Steven Weber is the faculty director for the Berkeley Center for Long Term Cybersecurity (CLTC). He works at the intersection of technology markets, intellectual property regimes, and international politics. His research, teaching, and advisory work focus on the political economy of knowledge intensive industries, with special attention to health care, information technology, software, and global political economy issues relating to competitiveness. Steve went to medical school at Stanford then did his Ph.D. in the political science department also at Stanford. He served as special consultant to the president of the European Bank for Reconstruction and Development and has held academic fellowships with the Council on Foreign Relations and the Center for Advanced Study in the Behavioral Sciences, and was Director of the Institute of International Studies at UC Berkeley from 2003 to 2009. His books include The Success of Open Source and most recently The End of Arrogance: America in the Global Competition of Ideas (with Bruce Jentleson) and Deviant Globalization: Black Market Economy in the 21st Century (with Jesse Goldhammer and Nils Gilman).

Encina Hall, 2nd floor

Executive Director of the Berkeley Center for Long-Term Cybersecurity University of California | Berkeley
Steven Weber Faculty Director for the Berkeley Center for Long Term Cybersecurity University of California | Berkeley
Panel Discussions
-

Abstract: We all know that we face cyberrisks everyday, from destructive attacks on our critical infrastructure to the theft of intellectual property. Yet countries and companies are woefully behind in making the investments necessary to secure themselves and withstand potential attacks. How should we move forward? Given the range of cyberthreats facing the United States and its allies and partners we should focus on (1) securing our most important missions and operations and (2) on planning for the certainty of some technological disruption. The talk begins by presenting a series of assumptions about the limits and opportunities for security planners in mitigating risks (cyber and otherwise), and then outlines strategic recommendations for governments and companies to improve their cybersecuity posture. It explores elements of effective cyber strategy; the role of leaders in managing cybersecurity across large organizations; the future of public-private partnerships for collective defense and contingency response; and the dark but necessary nature of resiliency planning. 

About the Speaker: Jonathan Reiber is currently Senior Fellow at the University of California at Berkeley's Center for Long-Term Cybersecurity. A writer, speaker, and security researcher, Mr. Reiber held a number of senior advisory positions in the Obama Administration within the U.S. Department of Defense. He was also the principal author of the U.S. Department of Defense Cyber Strategy (2015).

From January 2013 to September 2015, he served as Chief Strategy Officer for Cyber Policy in the Office of the Secretary of Defense. As Chief Strategy Officer, he advised the Pentagon leadership and led strategic initiatives across the cyber policy portfolio, to include strategic planning; key international, interagency, and industry partnerships; and strategic communications. In addition to serving as Chief Strategy Officer, he was also the Executive Secretary of the Defense Science Board Task Force on Cyber Deterrence.

Earlier in the Obama Administration, Mr. Reiber served as Special Assistant and Speechwriter to the United States' Deputy Secretary of Defense, Dr. Ashton B. Carter, and previously as Special Assistant to the United States' Principal Deputy Under Secretary of Defense for Policy, Dr. James N. Miller. In both positions he focused on strategy, Middle East security, Asia-Pacific security, cyber policy, and public communications.

From 2007 to 2009, Mr. Reiber was Research Manager at Ergo, a consulting and intelligence firm focusing on emerging markets. At Ergo he coordinated scenario planning exercises and deep-dive geopolitical analysis, advising Fortune 500 companies and other organizations on the political and social affairs of South Asia, Africa, and the Middle East. Earlier in his career he served with the United Nations Peacekeeping Mission in Sudan, as a policy advisor to the Episcopal Church of the United States, and as a Thomas J. Watson Fellow in South Africa, Italy, India, Turkey and Cyprus, where he studied the role of religion in political and social change.

Mr. Reiber is a graduate of Middlebury College, where he studied Religion, and The Fletcher School of Law and Diplomacy, where he focused his studies on international security and U.S. diplomatic history and served as Editor-in-Chief of The Fletcher Forum of World Affairs.

At Berkeley Mr. Reiber focuses his writing and research on human resilience, national contingency planning, and cybersecurity in the Asia-Pacific region. He regularly advises companies and governments on cybersecurity, strategy, and geopolitical risk. 

Encina Hall, 2nd floor

Jonathan Reiber Senior Fellow University of California at Berkeley's Center for Long-Term Cybersecurity
Seminars
-

Abstract:   There is a state of high anxiety about this year's election being "hacked" or "rigged". The media began speculating about the possibility when emails were stolen from the Democratic National Committee and, later, Hillary Clinton's campaign chairman, allegedly by state-sponsored hackers. Additionally, Donald Trump has been predicting that the election will be "rigged", worrying many of his supporters. New voter ID requirements have been imposed in many states in response to allegations of "voter fraud", but voting rights advocates worry that these requirements will disenfranchise many voters. In this talk, I will attempt a rational evaluation of election security risks and propose what we should do to address them.

About the Speaker: David L. Dill is the Donald E. Knuth Professor in the School of Engineering and Professor of Computer Science at Stanford University, where he has been on the faculty for 29 years. He is a member of the National Academy of Engineering and the American Academy of Arts and Sciences. He has been working on policy issues in voting technology since 2003. He is the founder of VerifiedVoting.org, whose mission is to safeguard elections in the digital age, and continues to serve as a board director in that organization.  He was a principle investigator in the National Science Foundation's "ACCURATE" voting tresearch center center from 2006 to 2011. In 2004, he received the Electronic Frontier Foundation's "Pioneer Award" for spearheading and nurturing the popular movement for integrity and transparency in modern elections."

Encina Hall, 2nd floor

David Dill Professor in the School of Engineering and Professor of Computer Science Stanford University
Seminars

CISAC
Stanford University
Encina Hall, E205
Stanford, CA 94305-6165

(650) 725-8035
0
Senior Research Scholar
rsd19_072_0081a.jpg

Harold Trinkunas is the Deputy Director and a Senior Research Scholar at the Center for International Security and Cooperation at the Freeman Spogli Institute for International Studies at Stanford University. Prior to arriving at Stanford, Dr. Trinkunas served as the Charles W. Robinson Chair and senior fellow and director of the Latin America Initiative in the Foreign Policy program at the Brookings Institution. His research focuses on issues related to foreign policy, governance, and security, particularly in Latin America. Trinkunas has written on emerging powers and the international order, ungoverned spaces, terrorism financing, borders, and information operations. 

Trinkunas has co-authored Militants, Criminals and Warlords: The Challenge of Local Governance in an Age of Disorder (Brookings Institution Press, 2017), Aspirational Power: Brazil’s Long Road to Global Influence (Brookings Institution Press, 2016) and authored Crafting Civilian Control of the Military in Venezuela (University of North Carolina Press, 2005). He co-edited and contributed to Oxford Handbook of Peaceful Change in International Relations (Oxford University Press, 2021), Three Tweets to Midnight: The Effect of the Global Information Ecosystem on the Risk of Nuclear Conflict  (Hoover Institution Press, 2020), American Crossings: Border Politics in the Western Hemisphere (Johns Hopkins University Press, 2015), Ungoverned Spaces: Alternatives to State Authority in an Era of Softened Sovereignty (Stanford University Press, 2010), Global Politics of Defense Reform (Palgrave MacMillan, 2008), and Terrorism Financing and State Responses (Stanford University Press, 2007).

Dr. Trinkunas also previously served as an associate professor and chair of the Department of National Security Affairs at the Naval Postgraduate School in Monterey, California. He received his doctorate in political science from Stanford University in 1999. He was born in Maracaibo, Venezuela. 

 

Deputy Director
CV
Date Label

While the Cyber Security Summit 2016 is not open to walk-ins, live-streaming will be available, starting on Monday, September 19 at 2:30PM

http://livestream.com/stanford_webcast

 

The debate on cybersecurity has never been more important. Senior experts on all aspects of cybersecurity will convene at Stanford University for the Munich Security Conference's 4th Cyber Security Summit, hosted by the Center for International Security and Cooperation (CISAC) at the Freeman Spogli Institute for International Studies
(FSI).

Are our societies prepared for large-scale cyberattacks on critical infrastructures? How can countries establish joint norms and rules for cyber space? Which steps are necessary in order to stop the digital advance of the 'Islamic State' and other terrorist groups? In how far should data privacy be compromised for effective intelligence work?

Around 140 senior representatives from science, politics, business and the military will debate these and other questions in the course of several panels held over two days in Encina Hall, home to CISAC and FSI. Among the participants are representatives from US and EU authorities, the cyber security coordinators of several European states, numerous business leaders, as well as security experts from various Silicon Valley companies.

Image
cgm16 stanford twitter header

 

Conferences
Paragraphs

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. A number of well-researched and executed papers cover one or more of these aspects, but integration of these aspects is usually left as an exercise for the analyst. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity. Which type of attribution is relevant depends on the goals of the relevant decision maker. Further, attribution is a multi-dimensional issue that draws on all sources of information available, including technical forensics, human intelligence, signals intelligence, history, and geopolitics, among others. From the perspective of the victim, some degree of factual uncertainty attaches to any of these types of attribution, although the last type—attribution to an ultimately responsible party—also implicates to a very large degree legal, policy, and political questions. But from the perspective of the adversary, the ability to conceal its identity from the victim with high confidence is also uncertain. It is the very existence of such risk that underpins the possibility of deterring hostile actions in cyberspace.

All Publications button
1
Publication Type
Working Papers
Publication Date
Journal Publisher
Social Science Research Network
Authors
Herbert Lin
Paragraphs

This book discusses issues in large-scale systems in the United States and around the world. The authors examine the challenges of education, energy, healthcare, national security, and urban resilience. The book covers challenges in education including America's use of educational funds, standardized testing, and the use of classroom technology.  On the topic of energy, this book examines debates on climate, the current and future developments of the nuclear power industry, the benefits and cost decline of natural gases, and the promise of renewable energy. The authors also discuss national security, focusing on the issues of nuclear weapons, terrorism and cyber security.  Urban resilience is addressed in the context of natural threats such as hurricanes and floods.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Wiley (1st edition)
Authors
Elisabeth Paté-Cornell
Authors
News Type
Q&As
Date
Paragraphs

A real possibility exists that foreign hackers could throw a monkey wrench into the outcome of the U.S. presidential election in the fall, a Stanford expert says.

Herbert Lin, senior research scholar for cyberpolicy and security at Stanford’s Center for International Security and Cooperation and a research fellow at the Hoover Institution, said that electronic voting could be affected by hackers in the presidential race, especially if a candidate claims tampering. In recent months, hackers from outside the country reportedly infiltrated the Democratic National Committee and Hillary Clinton campaign computer networks, leading to data breaches that made headlines worldwide.

The Stanford News Service interviewed Lin on this subject:

How worried are you about possible cyberattacks that could influence the outcome of the November elections in the U.S.?

There are two kinds of things to worry about. One is an actual cyberattack that, for example, alters vote counts in a way that tilts the election away from the will of the voters. That kind of attack is hard to pull off, and I’m not very worried about that – though I worry about it some.

A second worry – much more serious in my opinion – is the possibility that an election loser might challenge the outcome of the election, alleging that the results were altered by a cyberattack, especially if the election were close. How would anyone ever prove that ballots, electronically cast with no permanent and auditable record, were accurately counted?

If the evidence that Russians hacked the Democratic National Committee and the Hillary Clinton campaign proves to be legitimate, how should President Obama respond to Russia and Vladimir Putin?

Herbert Lin

Herbert Lin (Image credit: Rod Searcey/CISAC)

 

The U.S. has many response options, ranging from private diplomatic conversations to military action and everything in between. There are many things we could do to exact a price. But some of these things may be wise and others may be unwise. For example, an unwise option would be to threaten overt military action and otherwise do saber-rattling in response. The balancing act is calibrating a response that exacts a penalty but does not provoke a response that is unacceptable to us – and that’s a hard thing to do.

Would the U.S. ever hack back at Russia in some way?

I would be utterly amazed if the U.S. were not hacking Russia, and every other major power in the world for that matter. And I would be amazed if every other major power in the world were not hacking the U.S. There’s a baseline level of hacking that is going on all the time by everyone.

So, the question isn’t hacking or not hacking, the question is hacking back versus hacking. And on that point, I suspect it would be really hard for the recipient – in this case, Russia – to distinguish between hacking that almost surely is going on already and hacking that was conducted in response to any putative Russian involvement in the Democratic National Committee hack.

Is the hacking symbolic of a poor relationship between the U.S. and Russian governments?

I would not say symbolic – but it’s entirely consistent with a poor relationship.

In this 2015 video, Herb Lin talks about how U.S. policy on offensive cyber operations should be declassified.

 

Clifton Parker is a writer for the Stanford News Service.

Hero Image
gettyimages 515689422usvote Brendan Smialowski (Getty Images)
All News button
1
-

Lunch will be served. Please RSVP to allow for an accurate headcount.

Abstract: Dr. Johnston will present a preliminary analysis of some of the tensions between inter-state crisis management principles (as accepted by many Chinese crisis management experts) and concepts for the use of cyber weapons in military conOlicts being developed by the Chinese military.

About the Speaker: Alastair Iain Johnston is The Governor James Albert Noe and Linda Noe Laine Professor of China in World Affairs at Harvard University and a visiting fellow at the Hoover Institution in summer 2016. He has written on socialization theory, identity and foreign policy, and strategic culture, mostly with application to the study of China’s foreign policy and East Asian international relations.

Alastair Iain Johnston Harvard University
Seminars
Subscribe to Cybersecurity