Cybersecurity
-

 

Registration is required. Tickets to this event can be obtained here.

 

***Please note that this event is closed to the press***

President Obama signaled the national import of cybersecurity with a White House Summit on Cybersecurity and Consumer Protection in February 2015. We watched as U.S. allegations of North Korea’s hacking into Sony Corporation unfolded on the world stage. China's PLA Unit 61398 grabbed headlines with its cyber espionage into U.S. interests. The threat of cyber espionage proves ubiquitous. This panel will focus on the most critical bilateral relationship in the world of cybersecurity today: between U.S. and China. Since the Mandiant report and the Snowden leaks, hostility between the two governments around cybersecurity has reached an all-time high. This program brings together leading experts from the government, private sector and academia to critically examine cyber espionage waged by both countries; the threats implied; and preventive measures envisioned by the best minds in the industry.

This is the second in a two-part ASNC program series titled Digital Dilemma on cybersecurity and U.S.-Asia relations.

Speakers:

Jing De Jong-Chen, Senior Director of Microsoft, Inc., and VIce President of Trusted Computing Group

Jesse Goldhammer (moderator), Associate Dean of Business Development and Strategy, UC Berkeley School of Information 

James Andrew Lewis, Director and Senior Fellow at Center for Strategic and International Studies

Herbert Lin, Senior Research Scholar for Cyber Policy and Security, Center for International Security and Cooperation, Freeman Spogli Institute for International Studies, Stanford University

Michael Nacht, Schneider Professor of Public Policy at the University of California, Berkeley, and former Assistant Secretary of Defense for Global Strategic Affairs


 

Program Agenda:

5:30 - 6:00 pm: Registration
6:00 - 7:30 pm: Panel Discussion and Q&A
7:30 - 8:00 pm: Reception and Networking 

Promotional Co-Sponsors: Cal-Asia Business Council; Center for International Security and Cooperation, Stanford; Center for Long-Term Cybersecurity, UC Berkeley; Institute for East Asian Studies, UC Berkeley; School of Information, UC Berkeley

K&L Gates LLP

4 Embarcadero Center, Suite 1200

San Francisco, CA 94111

Panel Discussions
Authors
News Type
News
Date
Paragraphs

Secretary of Defense Ashton B. Carter unveiled the Pentagon’s new cybersecurity strategy before a Stanford audience Thursday, saying the United States would defend the nation using cyber warfare and calling for a renewed partnership with Silicon Valley.

Carter, the first sitting secretary of defense to speak on the Stanford campus in two decades, warned cyber criminals that Washington considers a cyber attack against the homeland or American businesses and citizens like any other threat to national security.

“Adversaries should know that our preference for deterrence and our defensive posture don’t diminish our willingness to use cyber options if necessary,” he told the audience at CEMEX Auditorium. “And when we do take action – defensive or otherwise, conventionally or in cyberspace – we operate under rules of engagement that comply with domestic and international law.”

Carter, who has a doctorate in theoretical physics, has strong ties to technology. He knows that as he takes the helm at the Pentagon, digital innovators and cyber criminals are trying to outpace one another at breakneck speeds. A strong partnership between military strategist and technologists would establish an unbeatable pact, he said.

The secretary was a senior partner at Global Technology Partners, where he advised major investment firms on technology and defense. He acknowledges the boundless transformation of technology and the opportunities and prosperity that it has brought to all sectors of American society.

But, he added: “The same Internet that enables Wikipedia also allows terrorists to learn how to build a bomb. And the same technologies we use to target cruise missiles and jam enemy air defenses can be used against our own forces – and they’re now available to the highest bidder.”

This is why, he said, the Pentagon must rebuild the bridge between Washington and Silicon Valley. “Renewing our partnership is the only way we can do this right.” Carter was building on President Barack Obama’s cybersecurity policies outlined by the president at the White House Summit on Cybersecurity and Consumer Protection at Stanford earlier this year. 

Carter was the Payne distinguished visitor at the Freeman Spogli Institute for International Studies and a distinguished visiting fellow at the Hoover Institution until he was sworn in as the 25th secretary of defense in February.

Carter’s speech was delivered as the annual Drell Lecture for Stanford’s Center for International Security and Cooperation (CISAC).

The lecture is named for theoretical physicist and arms control expert Sidney Drell, the center’s co-founder, a senior fellow at Hoover and former director of the SLAC National Accelerator Laboratory. Drell and former Secretary of Defense William J. Perry – a FSI senior fellow and consulting professor at CISAC – were both mentors to Carter and he thanked them at length before his formal policy speech. (Read here.)

"Secretary Carter is the first sitting secretary of defense to speak in Silicon Valley in 20 years," said CISAC Co-Director and Hoover senior fellow Amy Zegart, who led a Q&A session with Carter at the end of his talk. "This was an historic day, with the unveiling of DoD's new cyber strategy, and we are honored that Stanford could play a part. Cybersecurity is one of the toughest international security challenges of our time, and we are dedicated to playing a leading role in bringing together policymakers, scholars, and industry leaders to develop the new technologies, talent, and ideas that our nation requires."

Image
amyash

 

As Carter was speaking, the Department of Defense released online its new cyber strategy based on three primary missions: To defend the Pentagon’s networks; to defend the United States and its interests against cyber attacks of “significant consequences”; and to provide integrated cyber capabilities to support military operations and contingency plans.

“The cyber threat against U.S. interests is increasing in severity and sophistication,” Carter said. “While the North Korean cyber attack on Sony was the most destructive on a U.S. entity so far, this threat affects us all. Just as Russia and China have advanced cyber capabilities and strategies ranging from stealthy network penetration to intellectual property theft, criminal and terrorist networks are also increasing their cyber operations. Low-cost and global proliferation of malware have lowered barriers to entry and made it easier for smaller malicious actors to strike in cyberspace.”

The cyber strategy calls for a 6,200-strong Cyber Mission Force of military, civilian and defense contractors, with 133 cyber protection and combat teams in action by 2018.

“These are the talented individuals who hunt down intruders, red-team our networks and perform the forensics that help keep our systems secure,” Carter said.

And the Pentagon is creating a new “point of partnership” in the Silicon Valley called the Defense Innovation Unit X.

“The first-of-its-kind unit will be staffed by an elite team of active-duty and civilian personnel, plus key people from the Reserves, where some of our best technical talent resides,” he said, adding the unit would scout for breakthrough and emerging technologies and potentially help startups find new ways to work with the military.

The Pentagon will establish a branch of the U.S. Digital Service, the outgrowth of the technical team that helped rescue the beleaguered healthcare.gov site, which collapsed when the Affordable Care Act was implemented.

Herb Lin, a senior research scholar for cyber policy and security at CISAC and a research fellow at Hoover, said the concept was particularly noteworthy. “He’s asking technologists to take a tour of duty helping the DoD by working on some important technical problems. I heartily endorse this vision.”

Lin said the new DoD cyber strategy that was released online is also notable for its openness about the role of the Pentagon’s offensive cyber capabilities.

“It’s been an open secret for a long time that DoD has these capabilities, but by discussing them more forthrightly than any defense secretary has done before, Dr. Carter has done a real public service,” Lin said. “And the announcement of the new strategy will spark much needed conversations among policymakers and researchers about what should be done with these capabilities.”

Lin – chief scientist for the Computer Science and Telecommunications Board, National Research Council of the National Academies before coming to Stanford earlier this year – was also impressed by how open Carter was about wanting to repair relations with Silicon Valley. Those have been frosty at best since the Edward Snowden revelations.

“That will be a hard task, but you have to start somewhere, and Carter is quite tech-savvy, so if anyone can make headway, he can,” Lin said.

The secretary was slated to visit Facebook after his speech and meet with tech leaders on Friday. Not only does he hope to make amends, but to enlist their support in countering the threat of cyber attacks and ensuring the military has the technology it needs.

Carter revealed that earlier this year, sensors that guard the Pentagon’s unclassified networks detected what they believed were Russian hackers. After investigating, they discovered an old vulnerability in one of the DoD’s legacy networks that hadn’t been patched. But they caught it and kicked off the hackers within 24 hours.

He said the incident had not been made public until now.

“Shining a bright light on such intrusions can eventually benefit us all, government and business alike,” he said. “As secretary of defense, I believe that we at the Pentagon must be open, and think, as I like to say, outside our five-sided box.”

After his speech, the secretary took questions from the Stanford and Twitter audiences in a session moderated by Zegart.

One of those questions from Twitter asked why young Stanford computer scientists or technologists from the valley would want to join the cyber teams at the Pentagon.

“Because we have the most exciting problems you can have in technology,” he said. “And they’re consequential – they matter.”

 

Image
group drell

 

All Photos by Rod Searcey.

Hero Image
dsc 8278
All News button
1
-

The Freeman Spogli Institute for International Studies, the Center for International Security & Cooperation, and the Hoover Institution are honored to co-sponsor the 2015 Drell Lecture with The Honorable Ashton B. Carter, 25th U.S. Secretary of Defense, who will speak on "Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity." The event will include welcoming remarks by Stanford University President John Hennessy. The talk will be followed by a Q&A session with Carter moderated by Amy Zegart, co-director of the CISAC and senior fellow at Hoover. Questions will be collected from the audience as well as from Twitter, using the hashtag #SecDefAtStanford. 

 

Drell Lecture Recording: NA

 

Drell Lecture Transcript: NA

 

Speaker's Biography: Secretary Carter was the 2014-2015 Payne Distinguished Visitor at the Freeman-Spogli Institute for International Studies until he left upon his nomination by the White House. Ash Carter served in numerous jobs in the Department of Defense, and as the twenty-fifth Secretary of Defense under President Obama. 

 

 

Cemex Auditorium

655 Knight Way

Stanford University

Ashton Carter 25th United States Secretary of Defense Speaker United States Department of Defense
Lectures
News Type
News
Date
Paragraphs

 

U.S. Navy Adm. Cecil D. Haney, the U.S. Strategic Command commander, hosted CISAC Co-Directors David Relman and Amy Zegart as well as CISAC faculty and fellows at Offutt Air Force Base in Nebraska on March 30-31, 2015, to promote military-to-university cooperation and innovation, and provide a better understanding of USSTRATCOM’s global missions.

The visit follows Haney’s trip to Stanford last year, during which he held seminars and private meetings with faculty, scholars and students to discuss strategic deterrence in the 21st century. Those discussions focused on reducing the U.S. nuclear weapons stockpile while maintaining an effective deterrent, the integration of space and cyberspace in nuclear platforms and the congested, contested and competitive operating environment in space.

“Developing and maintaining partnerships with security experts from the private sector and academic institutions like CISAC enables USSTRATCOM to view the strategic environment from a different perspective and adjust our decision calculous accordingly,” Haney said. “We are excited about this unique opportunity to exchange ideas and share information with this prestigious organization.” 

Haney opened the discussions by presenting a command mission brief, in which he described USSTRATCOM’s nine Unified Command Plan-assigned missions, his priorities as commander and his ongoing effort to build enduring relationships with partner organizations to exchange ideas and confront the broad range of global strategic challenges.

Zegart, who is also a senior fellow at Stanford’s Hoover Institution, said getting to see and experience how USSTRATCOM operates first-hand was “an eye opener.”

“It’s one thing to think about deterrence, it’s another to live it,” she said. “When you go to each other’s neighborhoods, you gain a better understanding of where each side is coming from … and that’s enormously important to us in how we think about deterrence and what we can do to help USSTRATCOM and its mission.”

“These kinds of exchanges have cascade effects on young people; how they think about civil-military relations [and] how they understand what our military is doing,” she added.

Image
stratcomm group

The delegation also received a tour of USSTRATCOM’s global operations center and held discussions with subject matter experts on strategic deterrence, cyber responsibility and nuclear modernization.

“As a cybersecurity fellow, it was fascinating to visit the global operations center and the battle deck to see the role that cybersecurity and information technology plays in the strategic deterrence mission,” said Andreas Kuehn, a CISAC pre-doctoral cybersecurity fellow from Switzerland. “At CISAC, we often discuss deterrence from a theoretical perspective, so it was very insightful to hear from people who work in [this field] and see how they deal with deterrence in an operational manner.”

The two-day visit concluded with an open discussion, during which CISAC and USSTRATCOM members discussed the most effective means to share information, plan future engagements and continue working to build on the mutually beneficial relationship between the two organizations.

“Sometimes people talk [about strategic issues] in the abstract and it becomes difficult to understand what is happening on the ground and in the real world,” Kuehn said. “I think [USSTRATCOM] took extra steps to keep the conversations open and concrete.”

USSTRATCOM is one of nine Department of Defense unified combatant commands charged with strategic deterrence, space operations, cyberspace operations, joint electronic warfare, global strike, missile defense, intelligence, surveillance and reconnaissance, combating weapons of mass destruction, and analysis and targeting.

 

Hero Image
stratcomm haney
U.S. Navy Adm. Cecil D. Haney (center), U.S. Strategic Command commander, presents a USSTRATCOM mission briefing to the leadership, faculty members and fellows from Stanford University’s Center for International Security and Cooperation, during their visit to Offutt Air Force Base, Neb., March 30, 2015.
USSTRATCOM Photo by U.S. Air Force Staff Sgt. Jonathan Lovelady
All News button
1
Authors
News Type
News
Date
Paragraphs
 

Former U.S. Sen. Mark Udall gained notoriety for his vocal opposition to National Security Agency surveillance programs in the wake of the Edward Snowden disclosures of June 2013.

Before losing his seat in the mid-term elections last year, the senior senator from Colorado had become one of the staunchest critics of the U.S. spy agency for conducting massive, warrantless data grabs on millions of Americans without their knowledge.

Even before the Snowden leaks, Udall had warned on the Senate floor in 2011 that the Patriot Act was being interpreted in a way to allow domestic surveillance activities that many members of Congress and the American public do not understand.

"Americans would be alarmed if they knew how this law is being carried out," he told fellow senators before he introduced amendments to the Patriot Act that would have secured tougher privacy mechanisms. The act was renewed without the amendments.

Udall – who served on the Senate's Intelligence and Armed Services committees – will be in conversation with Center for International Security and Cooperation Co-Director Amy Zegart Thursday, April 2, at 7:30 p.m. in CEMEX Auditorium as part of Stanford's Security Conundrum lecture series. The event is open to the public but an RSVP is required by 5 p.m. April 1.

The special series has brought together nationally prominent experts this academic year to explore the critical issues raised by the NSA's activities, including their impact on security, privacy and civil liberties. The series ends April 10 with a public conversation with Judge Reggie Barnett Walton, former presiding judge of the Foreign Intelligence Surveillance Court, known as the FISA court.

The Foreign Intelligence Surveillance Act of 1978 empowered the FISA court to oversee government requests for surveillance of foreign intelligence agencies. During its existence, the court has granted more than 30,000 warrants; it has denied only 11.

Walton, in conversation with Stanford Law School Professor Jenny Martinez, will explain the role that the secretive institution attempts to play in maintaining the balance between civil liberties and national security.

"We're delighted to end the Security Conundrum series with a view from Congress and the courts," said Zegart, who is also a senior fellow at the Hoover Institution. "Holding serious campus-wide conversations about issues of national importance is an essential part of the Stanford experience."

Zegart said CISAC and Hoover would conduct a similar series on international cybersecurity challenges in the coming academic year.

Udall, the third speaker in the series, also advocated for the declassification of the Senate Intelligence Committee's study on the CIA's enhanced interrogation program. The post-9/11 program allowed the government to ship suspected terrorists to secret overseas prisons and subject them to waterboarding and other torture techniques.

Gen. Michael Hayden, the former director of the NSA and CIA who has defended the government surveillance programs, kicked off the Security Conundrum series in October. In that talk, he said the metadata collection "is something we would never have done on Sept. 9 or Sept. 10. But it seemed reasonable after Sept. 11. No one is doing this out of prurient interests. No – it as a logical response to the needs of the moment."

The second speaker in the series, journalist Barton Gellman, gave a detailed account of his relationship with former NSA contractor Snowden and how he worked with him to reveal the details of the NSA's global and domestic surveillance programs.

One of the first Snowden revelations, Gellman said, was the top-secret PRISM surveillance program, in which the NSA tapped into the servers of nine large U.S. Internet companies, including Google, Microsoft, Yahoo and Facebook. Snowden said he believed the extent of mass data collection on American citizens was far greater than what the public knew.

The PRISM program allows the U.S. intelligence community to gain access from the tech companies to a wide range of digital information, including audio, video chats, photographs, emails and stored data, that enables analysts to track foreign targets. The program does not require individual warrants, but instead operates under the broad authorization of the FISA court.

"I asked him very bluntly, 'Why are you doing this?'" Gellman said of Snowden.

"He gave me very persuasive and consistent answers about his motives. Whatever you think of what he did or whether or not I should have published these stories, I would claim to you that all the evidence supports his claim that he had come across a dangerous accumulation of state power that the people needed to know about."

 
Hero Image
walton Federal Intelligence Surveillance Court
All News button
1
-

Abstract: Any given computer or network runs code from an enormous number of sources, including the producer of the operating system, the hardware, built-in and user-installed applications, websites, and the user herself.  Computers may also run code injected by remote attackers of various sorts including autonomous viruses, individual hackers and state-backed organizations.  What happens when the authors of these various software components have different objectives for the behavior of that single computer or network?

This talk will propose a simple theory that predicts which of these contestants will tend to win in different kinds of computer security contests, including the robustness of encrypted communications; the control of cloud-based and distributed computing systems; and some hypothetical future applications to the security of AI systems.

About the Speaker: Peter Eckersley is Technology Projects Director at the Electronic Frontier Foundation. He leads a team of technologists who do both coding and policy work to strengthen Internet security, privacy, and innovation.

His work at EFF has included several projects to improve the strength and deployment of cryptography on the Internet, including HTTPS Everywhere, the SSL Observatory, and Sovereign Keys; efforts to educate Internet users about privacy and security threats such as Surveillance Self-Defense International and Panopticlick; rallying computer scientists in opposition to Internet blacklist legislation; and efforts to make networks more neutral, open, and transparent, including the first controlled tests of packet forgery by Comcast and promoting secure forms of open wireless networks.

Peter holds a PhD in computer science and law from the University of Melbourne. His doctoral research was on digital copyright and the alternatives, including the computer security dimensions of copyright policy.

Encina Hall (2nd floor)

Peter Eckersley Technology Projects Director Speaker Electronic Frontier Foundation
Seminars
-
Abstract: In many real-world settings, the need for security is often at odds with the desire to protect user privacy. In this talk we will describe some recent cryptographic mechanisms that can be used to resolve this tension. In doing so we will present developments in cryptography of the past few years as well as areas for future work. The talk will be self-contained and intended for a broad audience.
 
About the Speaker: Dr. Boneh is a Professor of Computer Science at Stanford University where he heads the applied cryptography group. Dr. Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, security for mobile devices, web security, and cryptanalysis.  He is the author of over a hundred publications in the field and is a recipient of the Godel prize, the Packard Award, the Alfred P. Sloan Award, the RSA award in mathematics and five best paper awards.  In 2011 Dr. Boneh received the Ishii award for industry education innovation.

Encina Hall (2nd floor)

Not in residence

0
Rajeev Motwani Professor in the School of Engineering and Professor of Electrical Engineering
Co-director of the Stanford Computer Security Lab
Co-director of the Stanford Cyber Initiative
Affiliate Faculty at CISAC
dabo.jpg MA, PhD

Professor Boneh heads the applied cryptography group and co-direct the computer security lab. Professor Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, web security, security for mobile devices, and cryptanalysis. He is the author of over a hundred publications in the field and is a Packard and Alfred P. Sloan fellow. He is a recipient of the 2014 ACM prize and the 2013 Godel prize. In 2011 Dr. Boneh received the Ishii award for industry education innovation. Professor Boneh received his Ph.D from Princeton University and joined Stanford in 1997.

Dan Boneh Professor of Computer Science and Electrical Engineering; Co-director of the Stanford Computer Security Lab Speaker Stanford University
Seminars
-

Abstract: When President Obama approved the "Olympic Games'' cyber attacks on Iran, he told aides that he was worried about what would happen when nations around the world began to use destructive cyber attacks as a new weapon of disruption and coercion. Now, we've begun to find out. David Sanger, the national security correspondent of The New York Times and author of Confront and Conceal, the book that revealed the cyber program against Iran, will explore how offensive cyber operations have developed in the Obama administration -- and why they have been so little debated.

About the Speaker: David E. Sanger is National Security Correspondent and senior writer for The New York Times. He is the author of two bestsellers on foreign affairs: The Inheritance: The World Obama Confronts and the Challenges to American Power (2009) and Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (2012). He served as the Times’ Tokyo Bureau Chief, Washington Economic Correspondent, White House correspondent during the Clinton and Bush Administrations and Chief Washington Correspondent.

Mr. Sanger has twice been a member of New York Times teams that won the Pulitzer Prize, first for the investigation into the causes of the Challenger disaster in 1986, and later for investigations into the struggles within the Clinton administration over technology exports to China. He teaches national security policy at Harvard's Kennedy School of Government.

This event is offered as a joint sponsorship with the Hoover Institution.

 

Encina Hall (2nd floor)

David Sanger National Security Correspondent and senior writer for The New York Times Speaker New York Times
Seminars
Paragraphs

On Tuesday March 3, 2015, the Subcommittee on Oversight and Investigations held a hearing entitled, “Understanding the Cyber Threat and Implications for the 21st Century Economy.” This was the first in a series of hearings focused on cyberspace, the Internet, and the challenges and opportunities that they present. Cyberspace has become the backbone and engine of the 21st century economy, and recent high-profile information security breaches have raised awareness of the vulnerabilities and risks facing cyberspace. With this hearing series, the subcommittee seeks to expand the discussion surrounding these issues to examine the broader implications for businesses and consumers in today’s 21st century economy. This initial hearing will provide an overview of the issue, focusing on the history, evolution, and future of cybersecurity.

The witnesses included Herbert Lin, Senior Research Scholar at the Center for International Security and Cooperation and Senior Fellow at the Hoover Institution, Stanford University; Richard Bejtlich, Chief Security Strategist, FireEye, Incorporated; and Gregory Shannon, Chief Scientist, CERT Program, the Software Engineering Institute, Carnegie Mellon University. III.

Lin's testimony begins at 21:00.

All Publications button
1
Publication Type
Testimonies
Publication Date
Authors
Herbert Lin
-

Abstract: The first Snowden disclosure was that Verizon was providing daily updates of telephony metadata to the NSA. This caused great consternation, and resulted in two government studies, one by the President's NSA Review Committee and one by the Privacy and Civil Liberties Oversight Board.  Both concluded the collection should be ended. The President asked Office of the Director of National Intelligence to produce a report "assessing the feasibility of creating software that would allow the intelligence community more easily to conduct targeted information acquisition rather than bulk collection."  This talk reports on that work, which considered the issue from the angle of technical alternatives, and concluded that there is no technical replacement for bulk data collection, but that software can enhance targeted collection and automate control of data usage. This talk will discuss that report, conducted by the National Research Council, explaining what the report says — and what it doesn't say.

About the Speaker: Susan Landau is Professor of Cybersecurity Policy in the Department of Social Science and Policy Studies at Worcester Polytechnic Institute. Landau has been a senior staff Privacy Analyst at Google, a Distinguished Engineer at Sun Microsystems, a faculty member at the University of Massachusetts at Amherst and at Wesleyan University. She has held visiting positions at Harvard, Cornell, and Yale, and the Mathematical Sciences Research Institute. Landau is the author of Surveillance or Security?  The Risks Posed by New Wiretapping Technologies (MIT Press, 2011), and co-author, with Whitfield Diffie, of Privacy on the Line: The Politics of Wiretapping and Encryption (MIT Press, 1998, rev. ed. 2007). She has written numerous scientific and policy research papers, and has also published in other venues, including Science, Scientific American, and the Washington Post. Landau has testified in Congress on cybersecurity and on electronic surveillance. Landau currently serves on the Computer Science Telecommunications Board of the National Research Council.  A 2012 Guggenheim fellow, Landau was a 2010-2011 fellow at the Radcliffe Institute for Advanced Study, the recipient of the 2008 Women of Vision Social Impact Award, and also a fellow of the American Association for the Advancement of Science and the Association for Computing Machinery.  She received her BA from Princeton, her MS from Cornell, and her PhD from MIT.

Encina Hall (2nd floor)

Susan Landau Professor of Cybersecurity Policy in the Department of Social Science and Policy Studies Speaker Worcester Polytechnic Institute
Seminars
Subscribe to Cybersecurity