Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Paragraphs

The Program on Democracy and the Internet runs the work of the Kofi Annan Commission on Elections and Democracy in the Digital Age which will produce guidelines to support democracies, particularly those of the global south. 

In the span of just two years, the widely shared utopian vision of the internet’s impact on governance has turned decidedly pessimistic.  The original promise of digital technologies was unapologetically democratic: empowering the voiceless, breaking down borders to build cross-national communities, and eliminating elite referees who restricted political discourse. 

That promise has been undercut by concern that the most democratic features of the internet are, in fact, endangering democracy itself.  Democracies pay a price for internet freedom, under this view, in the form of disinformation, hate speech, incitement, and foreign interference in elections.  They also become captive to the economic power of certain platforms, with all the accompanying challenges to privacy and speech regulation that these new, powerful information monopolies have posed.

As it forges ahead in its mandate, the Kofi Annan Commission on Elections and Democracy in the Digital Age must consider these many challenges, as well as the opportunities they present. Professor Nathaniel Persily, a member of the Kofi Annan Commission, he has produced a framing paper for its work, available for download.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
0
Carly Miller
Carly Miller is a research analyst at the Stanford Internet Observatory. She was most recently a Team Lead at the Human Rights Investigations Lab at Berkeley Law School where she worked to unearth patterns of various bad actors’ media campaigns. Carly is interested in combining investigative and digital forensic research with the power of effective policy recommendations.   Carly received her BA with honors in political science from the University of California, Berkeley in May 2019.
Former Research Analyst, Stanford Internet Observatory
-

Image
shanto profile
Abstract: 

Using behavioral web-tracking data collected over the 2016 U.S. general election, Matthew Tyler, Justin Grimmer and Shanto Iyengar demonstrate that partisans direct their attention at congenial sources and apolitical portal sites, while ignoring more antagonistic news outlets. While users of all-purpose sites such as Yahoo and MSN come from across the political spectrum, users of dedicated news sites diverge by their partisanship.  The authors further demonstrate that partisans tend to consume more news when campaign events favor their party's candidate. They show that the release of the Access Hollywood tape increased news consumption among Democrats, while the announcement of the Comey letter bolstered news consumption among Republicans. These short-term effects on news consumption proved asymmetric.  While partisans became more engaged in the aftermath of “good news,'' the authors find no evidence that they avoided exposure to the news in the aftermath of “bad news.'' Overall, the results show that partisans engage with the news more frequently when the news favors their side, and they engage at sites that attract like-minded partisans.  

Shanto Iyengar Bio

 

Lectures
-

Image
Kate Starbird
Abstract:

This talk describes the disinformation campaign targeting the Syria Civil Defense (or “White Helmets”), a humanitarian response group that works in rebel held areas of Syria. The White Helmets provide medical aid, search, and rescue to people affected by the civil war in Syria. They also document the impacts of atrocities — including airstrikes and chemical weapons attacks — perpetrated by the Syrian regime and their Russian allies. For several years, the White Helmets have been the target of a campaign to undermine and delegitimize their work. In this talk, I describe a multi-study research effort that reveals how this multi-dimensional, cross-platform campaign “works” — including a look at the media ecosystems that support the campaign, the networks of actors who collaborate to produce and spread its narratives (including government agents and “unwitting crowds” of online activists), and the “work” that these actors participate in, using the affordances of social media platforms to connect, recruit, organize, promote their messages, attack opposing messages, and otherwise advance the goals of their campaign. 

Kate Starbird Bio

 

 

Paragraphs

In these early days of the regulatory renaissance for digital technologies, China, Europe, and the United States are competing over whose image will be most reflected in market-defining rules and norms. Despite new lows in the trans-Atlantic relationship in the era of Trump, Europe and the United States still have far more in common with each other about how technology should be developed, deployed, and regulated than they do with China.

 

All Publications button
1
Publication Type
Commentary
Publication Date
Authors
Paragraphs

The fruits of a long anticipated technology finally hit the market, with promise to extend human life, revolutionize production, improve consumer welfare, reduce poverty, and inspire countless yet-imagined innovations. A marvel of science and engineering, it reflects the cumulative efforts of a generation of researchers backed by research funding from the U.S. government and private sector investments in (predominantly American) technology companies. 

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
Paragraphs

Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?

 

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
Paragraphs

Our national discussions about cybersecurity and privacy follow a frustrating pattern: a headline-grabbing incident like the recent Capital One breach occurs, Congress wrings its hands and policymakers more or less move on. So it is no surprise cybersecurity hasn't been much of a focus as the race to the 2020 presidential election heats up.

The issue is here to stay, and it should be debated by the candidates. Here are some concrete ideas that would significantly improve the safety and security of the nation — but require presidential leadership if they are to come to fruition.

 

All Publications button
1
Publication Type
Commentary
Publication Date
Authors
Paragraphs

The current regulatory and legislative infrastructure is poorly suited to address the new challenges to U.S. leadership and innovation in key technology sectors. This paper uses the semiconductor industry as a case study to advance a proposal for a strategic approach to technology policy capable of enabling long-term leadership. This proposal, rooted in structural changes to the federal technology policymaking process, would allow the United States to respond more effectively to strategic technology policymaking of China and other rising economic competitors. Initial steps to advance strategic technology policy should aim to revitalize targeted scientific research, grow the science, technology, engineering, and math (STEM) talent development pipeline, and expand highly skilled immigration.

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Paragraphs

Bios: Anja ManuelPavneet Singh, Thompson Paine

China systematically extracts advanced technology from the West. It does so legally, by mining open source databases, investing in our most advanced companies, and compelling technology transfer as a condition for doing business in China, as well as illicitly, through cybertheft and industrial espionage.

How we choose to react will define whether the United States continues to lead in—and reap the benefits of—technical innovation and whether we will be able to set the global norms and standards for technology development and use. Previous U.S. presidents of both parties engaged China in dialogue on IP theft and market access for U.S. firms, among other issues. They were unable to correct China’s behavior. So far, the Trump Administration has focused on trade negotiations and on “defensive” measures: from Congress reforming CFIUS in 2018 and a proposed tightening of export controls, to scrutinizing and slowing cross-border collaboration, and discussing restricting Chinese student visas to the United States. i Yet instead of closing the U.S. system, as we are beginning to do, we can and must compete with China, and in some cases, find ways to collaborate. 

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Subscribe to Security