Cybersecurity
-

This event is co-sponsored with the Project on Russian Power and Purpose in the 21st Century

 

Seminar Recording:   https://youtu.be/5gWmnsTD0MA

 

About this Event: Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple neighboring states—yet the regime has also maintained a thin veneer of deniability and avoided strikes that cross the line into acts of war. How should a targeted nation respond? The international effort to counter Russian cyber operations by imposing sanctions and indictments, in combination with a new defend forward approach, has done little to alter Moscow’s behavior.  Therefore, in his new book on Russian Cyber Operations, Scott Jasper takes a deep dive into the legal and technical maneuvers that are used to avoid consequences, proposing that nations develop robust solutions for resilience to withstand future attacks.

 

About the Speaker: Scott Jasper, CAPT, USN (ret) is a Lecturer at the National Security Affairs Department and the Institute for Security Government at the Naval Postgraduate School, specializing in defense strategy, hybrid warfare, and cyber policy. Scott has published chapters in various handbooks related to cybersecurity and articles in Strategic Studies Quarterly, the International Journal of Intelligence and CounterIntelligence, United States Cybersecurity Magazine, The National InterestSmall Wars Journal, and The Diplomat. He is the author of Russian Cyber Operations: Coding the Boundaries of ConflictStrategic Cyber Deterrence: The Active Cyber Defense Option and editor of Conflict and Cooperation in the Global Commons, Security Freedom in the Global Commons, and Transforming Defense Capabilities: New Approaches for International Security. He received his Ph.D. from the University of Reading, U.K. 

Virtual Seminar

Scott Jasper Naval Postgraduate School
Seminars
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

“As the confusion that was the Iowa caucuses unfolds, there will be a lot of questions about what happened and how to avoid it in the future. But the results, ultimately, will be clear and undisputed because, amid everything they did wrong, the Iowa Democratic Party did one thing right: It required that votes be counted on paper, and then tallied electronically,” writes Herb Lin in the Conversation. To those of us who study cybersecurity carefully, that’s crucial."

 

Read the Rest at The Conversation

Hero Image
Getty Images Krisanapong Detraphiphat/Getty Images
All News button
1
-

IMPORTANT EVENT UPDATE: 

In keeping with Stanford University's March 3 message to the campus community on COVID-19 and current recommendations of the CDC, the Asia-Pacific Research Center is electing to postpone this event until further notice. We apologize for any inconvenience this may cause, and appreciate your understanding and cooperation as we do our best to keep our community healthy and well. 

 

Data-intensive technologies such as AI may reshape the modern world. We propose that two features of data interact to shape innovation in data-intensive economies: first, states are key collectors and repositories of data; second, data is a non-rival input in innovation. We document the importance of state-collected data for innovation using comprehensive data on Chinese facial recognition AI firms and government contracts. Firms produce more commercial software and patents, particularly data-intensive ones, after receiving government public security contracts. Moreover, effects are largest when contracts provide more data. We then build a directed technical change model to study the state's role in three applications: autocracies demanding AI for surveillance purposes, data-driven industrial policy, and data regulation due to privacy concerns. When the degree of non-rivalry is as strong as our empirical evidence suggests, the state's collection and processing of data can shape the direction of innovation and growth of data-intensive economies.

Image
Portrait of David Yang
David Yang’s research focuses on political economy, behavioral and experimental economics, economic history, and cultural economics. In particular, David studies the forces of stability and forces of changes in authoritarian regimes, drawing lessons from historical and contemporary China. David received a B.A. in Statistics and B.S. in Business Administration from University of California at Berkeley, and PhD in Economics from Stanford. David is currently a Prize Fellow in Economics, History, and Politics at Harvard and a Postdoctoral Fellow at J-PAL at MIT. He also joined Harvard’s Economics Department as an Assistant Professor as of 2020.

David Yang Prize Fellow in Economics, History, and Politics; Department of Economics, Harvard University
Seminars
Authors
Herbert Lin
News Type
Commentary
Date
Paragraphs

In a story released on Christmas Day, 2019, the Washington Post reported that U.S. Cyber Command is “developing information warfare tactics that could be deployed against senior Russian officials and oligarchs if Moscow tries to interfere in the 2020 U.S. elections through hacking election systems or sowing widespread discord.” According to this story, one option being explored is the targeting of “senior leadership and Russian elites (though probably not President Vladimir Putin, which would be considered too provocative)” to demonstrate that the “sensitive personal data” of these individuals could be hit if the election interference did not stop. The Post article also quotes Lawfare’s Bobby Chesney saying that such actions would send “credible signals to key decision-makers that they are vulnerable if they take certain adversarial actions.” Photo: U.S. Cyber Command Public Affairs

 

Read the Rest at The LawFare Blog

Hero Image
48233740157 e84ec55e9b h
All News button
1
Authors
News Type
Commentary
Date
Paragraphs

In Aug. 2019, Bobby Chesney (from Strauss Center at the University of Texas at Austin) and Max Smeets (from ETH Zurich and also Stanford University’s Center for International Security and Cooperation (CISAC)) convened a workshop in Amsterdam focusing on military operations in the cyber domain, from a transatlantic perspective. The “Transatlantic Dialogue on Military Cyber Operations—Amsterdam” gathered experts from military, civilian, and academic institutions hailing from a range of countries, including the United States, United Kingdom, Germany, the Netherlands, Denmark, Estonia, and France.

 

Read the Rest at Lawfare Blog

Hero Image
screen shot 2019 12 18 at 8 32 53 am
All News button
1
-

WE HAVE REACHED VENUE CAPACITY AND ARE NO LONGER ACCEPTING RSVPS

 

Authoritarian governments around the world are developing increasingly sophisticated technologies for controlling information. In the digital age, many see these efforts as futile, as they are easily thwarted by savvy Internet users who quickly find ways to evade and circumvent them. In this talk, Professor Roberts demonstrates that even censorship that is easy to circumvent is enormously effective. Censorship acts like a tax on information, requiring those seeking information to spend more time and money if they want access. By creating small inconveniences that are easy to explain away, censorship powerfully influences the spread of information and, in turn, what people know about politics. Through analysis of Chinese social media data, online experiments, nationally representative surveys, and leaks from China’s Propaganda Department, Professor Roberts find that when Internet users notice blatant censorship they are willing to compensate for better access.  But subtler censorship, such as burying search results or introducing distracting information on the web, is more effective because users are less aware of it. Roberts challenges the conventional wisdom that online censorship is undermined when it is incomplete and shows instead how censorship’s porous nature is used strategically to divide the public and target influencers. 

Image
Portrait of Margaret E. Roberts
Margaret E. Roberts is an Associate Professor at the U.C. San Diego Department of Political Science. Her research interests lie in the intersection of political methodology and the politics of information, specifically focused on automated text analysis and understanding censorship and propaganda in China. Her work has appeared in venues such as the American Journal of Political Science, American Political Science Review, Political Analysis and Science. Her recent book Censored: Distraction and Diversion Inside China’s Great Firewall was listed as one of the Foreign Affairs Best Books of 2018, was honored with the Goldsmith Book Award, and has been awarded the Best Book Award in the Human Rights Section and Information Technology and Politics Section of the American Political Science Association.  She received her Ph.D. from Harvard University, an M.S. in statistics from Stanford University, and a B.A. in Economics and International Relations from Stanford.

Advisory on Novel Coronavirus (COVID-19)

In accordance with university guidelines, if you (or a spouse/housemate) have returned from travel to mainland China in the last 14 days, we ask that you DO NOT come to campus until 14 days have passed since your return date and you remain symptom-free. For more information and updates, please refer to the Stanford Environmental Health & Safety website: https://ehs.stanford.edu/news/novel-coronavirus-covid-19


Image
Image of red flag over the Shanghai Bund
This event is part of the 2020 Winter/Spring Colloquia series, The PRC at 70: The Past, Present – and Future?, sponsored by APARC's China Program.

 

Margaret E. Roberts Associate Professor, Department of Political Science, U.C. San Diego
Seminars
Authors
Noa Ronkin
News Type
News
Date
Paragraphs

As a U.S.-China trade deal hangs in the balance and the world’s two largest economies are locked in a race for technological supremacy, concerns have arisen about China’s counterintelligence threat to the United States. In July 2019, FBI Director Christopher Wray told members of the U.S. Senate Judiciary Committee that China poses the most severe counterintelligence threat to the United States than any other country, and described that national security and economic espionage threat as “deep and diverse and wide and vexing.” He noted that the FBI has to contend not only with Chinese officials but also with “nontraditional collectors,” including Chinese scientists and students who are looking to steal American innovation. There are currently multiple legislative proposals in Congress, all of which, in one way or another, are aimed at limiting university collaboration with Chinese nationals and the education of Chinese nationals in “strategic” research fields by U.S. higher education institutions.

These legislative endeavors, however, argues Arthur Bienenstock, co-chair of the American Academy of Arts and Sciences’ Committee on International Scientific Partnerships, may endanger the U.S. science and technology workforce and limit the effectiveness of U.S. academic research, thus weakening the very fields the nation is most anxious to protect.

Bienenstock is also a member of the National Science Board, the governing body of the National Science Foundation, and former associate director for science of the White House Office of Science and Technology Policy. At Stanford, he is special assistant to the President for federal research policy, associate director of the Wallenberg Research Link, and professor emeritus of photon science. At a recent lecture hosted by APARC’s China Program, Bienenstock discussed some of the proposed legislation and federal acts regarding international scientific collaboration with China and their implications for the U.S. scientific workforce. He cautioned U.S policymakers against an expansive interpretation of what constitutes “sensitive research” in strategic areas, such as artificial intelligence and quantum science, and offered a framework for determining when scientific research should be subject to greater control.

[To get more stories like this delivered to your inbox sign up for APARC newsletters]

Image
Arthur Bienenstock and Gi-Wook Shin seated at a conference room.
Indeed, said Bienenstock, “China is the only nation in the world that can and plans to challenge U.S. economic, military and ideological leadership” – a challenge that is partly based on its becoming a major scientific and technological power. He agreed that the concerns of FBI Director Wray and others are valid and must be considered carefully, but noted, based on his observations at informative sessions and a meeting with an FBI officer, that the overall number of documented misdeeds involving Chinese nationals is over 100 – far from a deep and wide threat – and that he has not seen evidence of significant student participation in those misdeeds.

We must come to terms with reality, claimed Bienenstock, presenting evidence that the United States is no longer the dominant funder of science and technology research; that Chinese nationals constitute a very significant portion of the U.S. workforce in computer science, engineering, and mathematics; and that the U.S. science and technology workforce is highly dependent on Chinese graduate students.

The United States must maintain and strengthen its scientific and technological efforts if it is to maintain a leadership position, Bienenstock said. To do so, he emphasized, U.S. universities must maintain their openness, and lawmakers, in turn, must thoughtfully understand the benefits of collaboration with Chinese scientists and engineers as well as keep the country attractive for Chinese students.

Listen to highlights from Bienenstock’s presentation on our SoundCloud channel. A transcript is available below.

Photo: Arthur Bienenstock (right) and APARC DIrector Gi-Wook Shin (credit: Andrea Brown).

Hero Image
Concept of U,S.-China technology competition: brain-shaped boxing gloves covered in U.S. and China flags facing against each other on a background of a motherboard Just Super/ Getty Images
All News button
1
Authors
News Type
Commentary
Date
Paragraphs

Image
screen shot 2019 11 20 at 9 08 20 am

Given much of the recent coverage surrounding security and the fifth generation (5G) of cellular networks, you would be forgiven for assuming that security concerns are largely limited to China in general and Huawei in particular.

This is not the case.

Equally important are the concerns for United States’ security that extend beyond Huawei’s role in the development and deployment of 5G technology. Notably, while Huawei amplifies many pre-existing areas of concern, 5G would represent a significant challenge for American national security even if China was not a peer competitor in the market. 

 

Read the rest at The Wilson Center

Hero Image
melissa griffith 0
All News button
1
0
Carly Miller
Carly Miller is a research analyst at the Stanford Internet Observatory. She was most recently a Team Lead at the Human Rights Investigations Lab at Berkeley Law School where she worked to unearth patterns of various bad actors’ media campaigns. Carly is interested in combining investigative and digital forensic research with the power of effective policy recommendations.   Carly received her BA with honors in political science from the University of California, Berkeley in May 2019.
Former Research Analyst, Stanford Internet Observatory
Subscribe to Cybersecurity