Cybersecurity
0
Research Scholar, Global Digital Policy Incubator
charles_mok.jpg

Charles is a Research Scholar at the Global Digital Policy Incubator of the Center on Democracy, Development and the Rule of Law at Stanford University, a member of the Board of Trustees of the Internet Society, and a board member of the International Centre for Trade Transparency and Monitoring. Charles served as an elected member of the Legislative Council in the Hong Kong Special Administrative Region, representing the Information Technology functional constituency, for two terms from 2012 to 2020. In 2021, he founded Tech for Good Asia, an initiative to advocate positive use of technology for businesses and civil communities. As an entrepreneur, Charles co-founded HKNet in 1994, one of the earliest Internet service providers in Hong Kong, which was acquired by NTT Communications in 2000. He was the founding chair of the Internet Society Hong Kong, honorary president and former president of the Hong Kong Information Technology Federation, former chair of the Hong Kong Internet Service Providers Association, and former chair of the Asian, Australiasian and Pacific Islands Regional At-Large Organization (APRALO) of ICANN. Charles holds a BS in Computer and Electrical Engineering and an MS in Electrical Engineering from Purdue University.

Date Label
-

Image
Algorithms, Privacy & the Future of Tech Regulation in California

Register Now


California-grown technology has led the nation and world in multiple ways—from democratizing the ways we live, work and play, to posing enormous ethical and social challenges that have fueled demands for government regulation.

When, and how, should state governments regulate the harms caused by new technologies? And what are the conditions under which industry self-regulation more appropriate? How do we balance the need to encourage innovation while also protecting communities from harm?

Join experts in academia, industry, and government in a deeper conversation about algorithms, privacy, and the future of tech regulation in California.

Featuring Jeremy Weinstein (Stanford professor and co-author of the recent book System Error), Jennifer Urban (Board Chair of the California Privacy Protection Agency), Ernestine Fu (California 100 Commissioner and Venture Partner, Alsop Louie), and Karthick Ramakrishnan (Executive Director, California 100) as the moderator, this discussion will cover present-day challenges and remedies on data privacy and lack of consumer power, as well as larger questions about when and how to step into future regulation conversations involving new technologies.

Authors
News Type
Q&As
Date
Paragraphs

Herbert Lin is the Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution.

In this Q&A, Lin discusses his recently released book Cyber Threats and Nuclear WeaponsHe explains that until this publication, the literature about cyber technology’s impact on the nuclear enterprise has been relatively sparse.

Lin asserts that although policy makers have made incredible achievements in the reduction of nuclear weapons around the world, these inventions nevertheless still represent an existential threat to humanity today. This threat is further compounded by the reality that computers are intimately involved in every step of the operation of weapons systems. As computing technology has advanced, nuclear weapons systems have become more complex and thus more vulnerable to cyberattacks from America’s adversaries, who can disrupt the decision-making process on the use of nuclear weapons. Ultimately, Lin ponders how to best manage the trade-off between technologically advanced systems with numerous capabilities and simplified systems that can provide a higher level of security in the nuclear enterprise.

Read the rest at The Hoover Institution 

Hero Image
Cyber Threats and Nuclear Weapons
All News button
1
Subtitle

In this Q&A, Lin discusses his recently released book Cyber Threats and Nuclear Weapons. He explains that until this publication, the literature about cyber technology’s impact on the nuclear enterprise has been relatively sparse.

-

This event is part of Shorenstein APARC's winter 2022 webinar series, New Frontiers: Technology, Politics, and Society in the Asia-Pacific.

While North Korea’s nuclear capabilities often make headlines, the DPRK increasingly poses a risk that is more difficult to see, in the form of sophisticated cyber attacks. Neighboring South Korea, one of the most digitized nations in the world, must closely monitor and defend against North Korea’s cyber threat, as attacks can disrupt economic, social, and defense infrastructures. This panel will discuss what kind of cyber threat North Korea poses to South Korea and beyond, how South Korea addresses the North Korean cyber attacks, and what other countries can learn from their response.

Speakers:

portrait of Jenny JunJenny Jun is a PhD Candidate in the Department of Political Science at Columbia University and Nonresident Fellow at the Atlantic Council’s Cyber Statecraft Initiative. Her current research explores the dynamics of coercion in cyberspace. Her broader interests include cyber conflict, North Korea, and security issues in East Asia. Jenny is a co-author of the 2015 Center for Strategic and International Studies (CSIS) report North Korea’s Cyber Operations: Strategy and Responses, published by Rowman & Littlefield. She has presented her work on North Korea’s cyber operations at various panels and has provided multiple government briefings and media interviews on the topic. She received her MA and BS each from the Security Studies Program (SSP) and the School of Foreign Service (SFS) at Georgetown University.

Image
portrait of So Jeong Kim

So Jeong Kim is a principal researcher at the National Security Research Institute where she joined in 2004. She currently leads the cybersecurity policy team and provides recommendations on cybersecurity policy and regulatory issues. She was involved in drafting South Korea’s National Cyber Security Strategy published in April 2019, in the 4thand 5th UN Group of Governmental Experts as an adviser, and in the MERIDIAN process as an advisor and organizer. Her main research area is in national cybersecurity policy, international norm-setting processes, confidence building measures, critical information infrastructure protection, law and regulations, and cybersecurity evaluation development. She received her PhD in Engineering from the Graduate School of Information Security at Korea University in 2005.

Gi-Wook Shin, director of APARC and the Korea Program at Stanford University, will moderate the discussion.

Via Zoom. Register at https://bit.ly/3mXJSQW

Panel Discussions
Authors
Josh A. Goldstein
News Type
News
Date
Paragraphs

On Dec. 2, Twitter announced the removal of two Chinese state-linked influence operations: 2,048 accounts that boosted Chinese Communist Party (CCP) narratives about the Xinjiang region and Uyghur population there, and 112 accounts attributed to Changyu Culture, a private company acting on behalf of the Xinjiang regional government.

Our team at the Stanford Internet Observatory analyzed these two networks. We found that both networks amplified pro-CCP narratives about the treatment of Uyghurs in Xinjiang, often posting content from Chinese state media or sharing first-person Uyghur testimonial videos about how great their life is in the province.

Read the rest at Foreign Policy

Hero Image
Person in suit looking at a smartphone GREG BAKER/AFP VIA GETTY IMAGES
All News button
1
Subtitle

China’s state-linked influence operations get very little engagement on Twitter.

Authors
News Type
Q&As
Date
Paragraphs

As the United States modernizes its nuclear forces in coming decades, it will upgrade the computer and communications technology associated with them. Much of such technology now controlling US nuclear weapons was produced before the rise of the Internet. Newer technology will improve aspects of command, control, and communications related to the US nuclear arsenal. But if not carefully planned, the updating of nuclear technology could also increase risk in distinct ways that cyber policy expert and Bulletin Science and Security board member Herbert Lin explains in the following interview.

Read the rest at the Bulletin of the Atomic Scientists

Hero Image
A US Air Force commander simulates launching a nuclear weapon during a test. US Air Force/Staff Sgt. Christopher Ruano.
All News button
1
Subtitle

Much of the technology now controlling US nuclear weapons was produced before the rise of the Internet. Newer technology will improve aspects of command, control, and communications related to the US nuclear arsenal. But if not carefully planned, the updating of nuclear technology could also increase risk in distinct ways that Herbert Lin explains in the following interview.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

I have struggled to find something with which I disagree in Michael Fischerkeller’s response to my thought experiment adopting the 2018 U.S. Cyber Command (USCC) Command Vision. A couple of such points are addressed below, but for the most part I agree with him. He does make one claim that I find surprising. He writes: 

Read the rest at Lawfare Blog

Hero Image
Herb Lin Rod Searcey
All News button
1
Subtitle

I have struggled to find something with which I disagree in Michael Fischerkeller’s response to my thought experiment adopting the 2018 U.S. Cyber Command (USCC) Command Vision. A couple of such points are addressed below, but for the most part I agree with him. He does make one claim that I find surprising.

0
rsd21_040_1169a_-_eyal_zilberman.jpg

Eyal Zilberman, from Tel-Aviv, Israel, is pursuing a joint MIP/MPP degree as a Knight Hennessy scholar. Eyal graduated from Tel-Aviv University with a bachelor’s degree in philosophy, political science, and economics (PPE) and previously served in the Israeli Defense Force as a Cyber Intelligence Officer. Eyal is interested in the societal effects of online platforms and researches the global implications of platform regulations at FSI's Global Digital Policy Incubator. During the summer of 2021, Eyal worked as a public policy intern at the Oversight Board, where he participated in third-party examinations of Facebook's implementation of its content policy rules.

Master's in International Policy Class of 2022
Authors
News Type
Commentary
Date
Paragraphs

ON 8 NOVEMBER 2021, the US Justice Department announced the arrest of several members of the Russian-speaking REvil ransomware group, in a large-scale operation involving US allies in Europe and around the globe. The REvil group, who have since been charged, have been deploying ransomware attacks against American targets including the software provider Kaseya in July 2021. Furthermore, the State Department added REvil to a bounty programme that offers up to US$10 million for information on the REvil leaders.

These efforts followed the two-day virtual international summit on ransomware hosted by the Biden administration on 13-14 October. This summit included 30 countries and was a decisive step towards building a coalition against ransomware attacks. It was acknowledged by all countries that ransomware posed a global and national security threat. Russia ─ as well as China, Iran, and North Korea ─ was not invited.

Read the rest at RSIS

Hero Image
woman smiling Rod Searcey
All News button
1
Subtitle

The US Justice Department’s arrest of several affiliates of the Russian-speaking REvil ransomware group comes a month after Washington hosted a virtual international summit on ransomware attacks. The decision to leave Russia out of the summit will inevitably limit the effectiveness of the operation.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

The nation spends billions of dollars on cybersecurity measures, and yet we seem unable to get ahead of this problem. Why are our computers so hard to protect? An experience with a house cat provided insights. I am allergic to cats. My daughter came home, cat in hand, and I had to find a way of confining Pounce to a limited area. Everything I tried to confine Pounce worked for a little while but eventually failed as he found a way past my newest security barrier — just as hackers eventually find their way through the cybersecurity barriers erected to stop them.

Read the rest at Los Angeles Times

Hero Image
Sketches of cats Magnilion/Getty Images
All News button
1
Subtitle

The nation spends billions of dollars on cybersecurity measures, and yet we seem unable to get ahead of this problem. Why are our computers so hard to protect? An experience with a house cat provided insights.

Subscribe to Cybersecurity