Cybersecurity
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

On March 3, the Biden administration released its Interim National Security Strategic Guidance. Regarding cybersecurity, the document stated that 

Read the rest at Lawfareblog

Hero Image
President Joe Biden walks with Vice President Kamala Harris and Secretary of Defense Lloyd Austin. White House Photo by Adam Schultz
All News button
1
Subtitle

The Biden administration released its Interim National Security Strategic Guidance. One would expect a final guidance document to be roughly consistent with the it while also containing more substantial elaboration. To get a sense of relative priorities, I found it interesting to compare the interim guidance to the Trump National Cyber Strategy published in 2018.

Authors
Callista Wells
News Type
News
Date
Paragraphs

On February 10, 2021, the China Program at Shorenstein APARC hosted Professor Oriana Skylar Mastro, Center Fellow at the Freeman Spogli Institute for International Studies​ for the virtual program "Military Competition with China: Harder to Win Than During the Cold War?" Professor Jean Oi, William Haas Professor of Chinese Politics and director of the APARC China Program, moderated the event.

As US-China competition intensifies, experts debate the degree to which the current strategic environment resembles that of the Cold War. Those that argue against the analogy often highlight how China is deeply integrated into the US-led world order. They also point out that, while tense, US-China relations have not turned overtly adversarial. But there is another, less optimistic reason the comparison is unhelpful: deterring and defeating Chinese aggression is harder now than it was against the Soviet Union. In her talk, Dr. Mastro analyzed how technology, geography, relative resources and the alliance system complicate U.S. efforts to enhance the credibility of its deterrence posture and, in a crisis, form any sort of coalition. Mastro and Oi's thought-provoking discussion ranged from the topic of why even US allies are hesitant to take a strong stance against China to whether or not Taiwan could be a catalyst for military conflict. Watch now: 

Read More

Min Ye speaking
News

Domestic or International? The Belt and Road Initiative Is More Internally Focused Than We Think, Says Expert Min Ye

Domestic or International? The Belt and Road Initiative Is More Internally Focused Than We Think, Says Expert Min Ye
Banner of Hau L. Lee
News

The Pandemic, U.S.-China Tensions and Redesigning the Global Supply Chain

The Pandemic, U.S.-China Tensions and Redesigning the Global Supply Chain
Hero Image
Photograph of Xi Jinping and Vladmir Putin walking in front of two lines of armed Chinese soldiers Getty Images
All News button
1
Subtitle

On February 10th, the APARC China Program hosted Professor Oriana Mastro to discuss military relations between the US and China, and why deterrence might be even more difficult than during the Cold War.

Authors
News Type
Commentary
Date
Paragraphs

In 2019, as the Department of Defense considered adopting AI ethics principles, the Defense Innovation Unit held a series of meetings across the U.S. to gather opinions from experts and the public. At one such meeting in Silicon Valley, Stanford University professor Herb Lin argued that he was concerned about people trusting AI too easily and said any application of AI should include a confidence score indicating the algorithm’s degree of certainty.

“AI systems should not only be the best possible. Sometimes they should say ‘I have no idea what I’m doing here, don’t trust me.’ That’s going to be really important,” he said.

Read the rest at VentureBeat

Hero Image
Man smiling
All News button
1
Subtitle

In 2019, as the Department of Defense considered adopting AI ethics principles, the Defense Innovation Unit held a series of meetings across the U.S. to gather opinions from experts and the public. Stanford University professor Herb Lin argued that he was concerned about people trusting AI too easily.

Authors
Herbert Lin
Amy Zegart
News Type
Commentary
Date
Paragraphs

On Jan. 6, the U.S. Capitol was assaulted and occupied for the first time since 1814. Five people were killed, including a Capitol Police officer. Two Republican Representatives have introduced a bill to establish a national bipartisan commission to investigate the attack. We agree that a commission is needed. Here, we sketch the mandate, major areas of inquiry, and legislative language that we believe are needed to guide this effort.

Read the rest at Lawfare Blog

Hero Image
A memorial to Capitol Police Officer Brian Sicknick, who was killed by pro-Trump rioters on Jan. 6
A memorial to Capitol Police Officer Brian Sicknick, who was killed by pro-Trump rioters on Jan. 6
Flickr/Joe Flood, https://flic.kr/p/2krAujQ; CC BY-NC-ND 2.0, https://creativecommons.org/licenses/by-nc-nd/2.0/
All News button
1
Subtitle

On Jan. 6, the U.S. Capitol was assaulted and occupied for the first time since 1814. Five people were killed, including a Capitol Police officer. Two Republican Representatives have introduced a bill to establish a national bipartisan commission to investigate the attack. We agree that a commission is needed.

Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

Last week, I wrote about cybersecurity issues raised by the loss of physical control in the U.S. Capitol during the occupation. Since then, it has become clear that a number of devices are missing and presumably taken by the occupiers. The rioters took laptops from the offices of House Speaker Nancy Pelosi and Sen. Jeff Merkley. These devices are now in the physical possession of people who can be considered adversarial threat actors, and those actors now have the opportunity to take their time in trying to penetrate them and see what data is available on those machines.

Read the rest at Lawfare blog

Hero Image
Riots at the U.S. Capitol Building Getty Images: Samuel Corum / Stringer
All News button
1
Subtitle

Inside the U.S. Capitol last week, laptops from the offices of House Speaker Nancy Pelosi and Sen. Jeff Merkley, and other devices were taken, presumably by the occupiers. These devices are now in the physical possession of people who can be considered adversarial threat actors, who can take their time in trying to see what data is available on those machines.

Authors
Amy Zegart
News Type
News
Date
Paragraphs

The recently revealed SolarWinds hack unfolded like a scene from a horror movie: Victims frantically barricaded the doors, only to discover that the enemy had been hiding inside the house the whole time. For months, intruders have been roaming wild inside the nation’s government networks, nearly all of the Fortune 500, and thousands of other companies and organizations. The breach—believed to be the work of an elite Russian spy agency—penetrated the Pentagon, nuclear labs, the State Department, the Department of Homeland Security (DHS), and other offices that used network-monitoring software made by Texas-based SolarWinds. America’s intelligence agencies and cyberwarriors never detected a problem. Instead, the breach was caught by the cybersecurity firm FireEye, which itself was a victim.

Read the rest at The Atlantic

Hero Image
woman smiling
All News button
1
Subtitle

Because all countries engage in espionage, intrusions like Russia’s latest data hack are devilishly hard to deter.

0
Former Research Scholar, Stanford Internet Observatory
riana.jpg

Riana Pfefferkorn was a Research Scholar at the Stanford Internet Observatory. She investigated the U.S. and other governments' policies and practices for forcing decryption and/or influencing the security design of online platforms and services, devices, and products, both via technical means and through the courts and legislatures. Riana also studies novel forms of electronic surveillance and data access by U.S. law enforcement and their impact on civil liberties. 

Previously, Riana was the Associate Director of Surveillance and Cybersecurity at the Stanford Center for Internet and Society, where she remains an affiliate. Prior to joining Stanford, she was an associate in the Internet Strategy & Litigation group at the law firm of Wilson Sonsini Goodrich & Rosati, and a law clerk to the Honorable Bruce J. McGiverin of the U.S. District Court for the District of Puerto Rico. During law school, she interned for the Honorable Stephen Reinhardt of the U.S. Court of Appeals for the Ninth Circuit.

Riana has spoken at various legal and security conferences, including Black Hat and DEF CON's Crypto & Privacy Village. She is frequently quoted in the press, including the New York Times, the Washington Post, and NPR. Riana is a graduate of the University of Washington School of Law and Whitman College.

Complete list of publications and recent blog posts here.

Date Label
Authors
News Type
Commentary
Date
Paragraphs

On October 19, the U.S. Department of Justice unsealed charges accusing six Russian military intelligence officers of an aggressive worldwide hacking campaign. 

Read the rest at  Council on Foreign Relations

Hero Image
Assistant Attorney General for National Security John C. Demers speaks during a virtual news conference at the Department of Justice
Assistant Attorney General for National Security John C. Demers speaks during a virtual news conference at the Department of Justice.
Sarah Silbiger/Pool via REUTERS
All News button
1
Subtitle

There are three main reasons behind publicly attributing these attacks to Russia.

Authors
Herbert Lin
News Type
Q&As
Date
Paragraphs

Security costs money. You pay for security because you want something to not happen. It’s not that something good happens with security, it's that something bad doesn’t happen. 

Read the rest at Politico 

Hero Image
Man with glasses smiling
All News button
1
Subtitle

Security costs money. You pay for security because you want something to not happen. It’s not that something good happens with security, it's that something bad doesn’t happen.

Authors
News Type
Q&As
Date
Paragraphs

Does a tracking system making laws more enforceable actually improve society? Ahmed examines how technology firms and the Chinese government build databases and information sharing procedures that monitor the behavior of individuals, corporations, legal institutions, and government representatives, with the end goal of building a society where those individuals and corporations follow the law.

Read the rest at Stanford HAI

Hero Image
photo of woman
All News button
1
Subtitle

Does a tracking system making laws more enforceable actually improve society?

Subscribe to Cybersecurity