The Cyber Policy Center is a joint initiative of the Freeman Spogli Institute for International Studies and Stanford Law School.
The Virality Project final report finds recycled anti-vaccine narratives and viral content driven by recurring actors.
Bios: Anja Manuel, Pavneet Singh, Thompson Paine
China systematically extracts advanced technology from the West. It does so legally, by mining open source databases, investing in our most advanced companies, and compelling technology transfer as a condition for doing business in China, as well as illicitly, through cybertheft and industrial espionage.
The Transatlantic High Level Working Group on Content Moderation Online and Freedom of Expression is a project of the Annenberg Public Policy Center of the University of Pennsylvania in partnership with The Annenberg Foundation Trust at Sunnylands and the Institute for Information Law of the University of Amsterdam. This is a discussion paper from that working group.
In February, the White House attributed “the most destructive and costly cyberattack in history,” a summer 2017 attack affecting critical infrastructure and other victims around the world, to Russian intelligence services.
Excerpt from: "Publicly Reported Data Breaches: A Measure of Our Ignorance?" Lawfare. July 11, 2018. Online.
In these early days of the regulatory renaissance for digital technologies, China, Europe, and the United States are competing over whose image will be most reflected in market-defining rules and norms. Despite new lows in the trans-Atlantic relationship in the era of Trump, Europe and the United States still have far more in common with each other about how technology should be developed, deployed, and regulated than they do with China.
Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?
Our national discussions about cybersecurity and privacy follow a frustrating pattern: a headline-grabbing incident like the recent Capital One breach occurs, Congress wrings its hands and policymakers more or less move on. So it is no surprise cybersecurity hasn't been much of a focus as the race to the 2020 presidential election heats up.
The issue is here to stay, and it should be debated by the candidates. Here are some concrete ideas that would significantly improve the safety and security of the nation — but require presidential leadership if they are to come to fruition.
Prepared Written Testimony and Statement for the Record of Alexander Stamos, Director, Stanford Internet Observatory before The U.S. House of Representatives Committee on Homeland Security, Subcommittee on Intelligence and Counterterrorism on June 25, 2019.
This report urges policymakers, in both government and the private sector, to act immediately in order to protect the integrity and independence of U.S. elections, particularly in the run-up to the 2020 presidential election, and recommends a number of actions in order to do so. This report was distributed at the launch of the new Cyber Policy Center on June 6th, 2019.
A Research Agenda for Cyber Risk and Cyber Insurance | June 2019
Lead Author: Gregory Falco, Program on Geopolitics, Technology, and Governance at the Cyber Policy Center
Presented at the the 2019 Workshop on the Economics of Information Security (Boston, June 3-4, 2019)
The fruits of a long anticipated technology finally hit the market, with promise to extend human life, revolutionize production, improve consumer welfare, reduce poverty, and inspire countless yet-imagined innovations. A marvel of science and engineering, it reflects the cumulative efforts of a generation of researchers backed by research funding from the U.S. government and private sector investments in (predominantly American) technology companies.
This essay closely examines the effect on free-expression rights when platforms such as Facebook or YouTube silence their users’ speech. The first part describes the often messy blend of government and private power behind many content removals, and discusses how the combination undermines users’ rights to challenge state action. The second part explores the legal minefield for users—or potentially, legislators—claiming a right to speak on major platforms. The essay contends that questions of state and private power are deeply intertwined.
An essay examining the effect on free-expression rights when platforms such as Facebook or YouTube silence their users’ speech
Background: There is a substantial body of evidence supporting the association between maternal active smoking during pregnancy and child development, but the association between prenatal exposure to environmental tobaccos smoke (ETS) and early child development has not been well documented. This cross-sectional study examines the association between prenatal exposure to ETS and the development of children in their first two years of life.
Excerpt from: "Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure." War on the Rocks. November, 2018. Online.
A state-owned Chinese company receives a contract to build and maintain the next generation of railcars that service Metro stations at the Pentagon, near the White House and Capitol Hill, and throughout the Washington, D.C., metro area. What could possibly go wrong?
Prime Minister Theresa May’s political fortunes may be waning in Britain, but her push to make internet companies police their users’ speech is alive and well. In the aftermath of the recent London attacks, Ms. May called platforms like Google and Facebook breeding grounds for terrorism.