Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

Paragraphs

The current regulatory and legislative infrastructure is poorly suited to address the new challenges to U.S. leadership and innovation in key technology sectors. This paper uses the semiconductor industry as a case study to advance a proposal for a strategic approach to technology policy capable of enabling long-term leadership. This proposal, rooted in structural changes to the federal technology policymaking process, would allow the United States to respond more effectively to strategic technology policymaking of China and other rising economic competitors. Initial steps to advance strategic technology policy should aim to revitalize targeted scientific research, grow the science, technology, engineering, and math (STEM) talent development pipeline, and expand highly skilled immigration.

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Paragraphs

Bios: Anja ManuelPavneet Singh, Thompson Paine

China systematically extracts advanced technology from the West. It does so legally, by mining open source databases, investing in our most advanced companies, and compelling technology transfer as a condition for doing business in China, as well as illicitly, through cybertheft and industrial espionage.

How we choose to react will define whether the United States continues to lead in—and reap the benefits of—technical innovation and whether we will be able to set the global norms and standards for technology development and use. Previous U.S. presidents of both parties engaged China in dialogue on IP theft and market access for U.S. firms, among other issues. They were unable to correct China’s behavior. So far, the Trump Administration has focused on trade negotiations and on “defensive” measures: from Congress reforming CFIUS in 2018 and a proposed tightening of export controls, to scrutinizing and slowing cross-border collaboration, and discussing restricting Chinese student visas to the United States. i Yet instead of closing the U.S. system, as we are beginning to do, we can and must compete with China, and in some cases, find ways to collaborate. 

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Paragraphs

Bio: Anthony Vinci

The next presidential term will confront an increasingly urgent question of how to compete with China, economically and militarily. Simply increasing national security funding or R&D spending will not ensure victory against a competitor able to outspend the United States. Instead, we will need once again to revolutionize public-private partnerships to meet the challenge, harnessing more efficient ways of developing and implementing new technology. This paper proposes a novel approach for such partnerships, leveraging a joint venture model to share proprietary federal data with industry—on a limited basis, with appropriate safeguards—to catalyze faster development of new national security technology applications. 

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Paragraphs

Bio: Amy Webb

Despite an abundance of technical experts across its agencies, the federal government lacks a centralized office charged with long-range, comprehensive, streamlined planning to address critical science and technology developments. The status quo risks misalignment between agencies and redundant strategic work. At the outset of the next presidential term, the President should create a new, centralized office championing strategic foresight. This will involve leadership in strategic processes using data-driven models to analyze plausible futures, continually evaluating macro sources of change, finding emerging trends, and mapping the trajectory and velocity of changes. Focused on providing authoritative, unbiased insights to the executive branch, it should facilitate forward-leaning research, knowledge dissemination and capabilities building via ongoing strategic conversations, experiential learning, and rigorous quantitative and qualitative proceedings that result in concrete actions. 

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
-

Vic Baines Vic Baines

Abstract:

Predicting the future is a fool's errand. Or is it? Technology has proved an agent of unprecedented disruption in recent years, but the instinct of some humans to do harm to others remains a constant. Cyber attacks continue to take the global community by surprise, and government actors still have a tendency to describe cybercrime as a new phenomenon. Knowing what we know about criminal modi operandi ​and motivations, can we speculate on the future of cybercrime in a way that enables governments, businesses and citizens to anticipate and prepare for the threats to come? Vic will present her ongoing work to review a past cybersecurity futures exercise, and a new project that aims to see further.

Vic Baines Bio

Downloable Flyer: The Cyber Policy Center Lunch Seminar Series

 

 
Seminars
-

Daphne Keller Daphne Keller
Abstract:

Facebook recently announced its own version of the Supreme Court: a 40-member board that will make final decisions about user posts that Facebook has taken down. The announcement came after extended deliberations that have been described as Facebook’s “constitutional convention.” Sweeping terms such as Supreme Court and constitution are not commonly used to describe the operation of private companies, but here they seem appropriate given the platforms’ importance for the many people who use them in place of newspapers, TV stations, the postal service, and even money. Yet private platforms aren’t really the public square, and internet companies aren’t governments. That’s exactly why they are free to do what so many people seem to want: set aside the First Amendment’s speech rules in favor of new, more restrictive ones. 

Mimicking a few government systems will not make internet platforms adequate substitutes for real governments, subject to real laws and real rights-based constraints on their power. Compared with democratic governments, platforms are far more capable of restricting speech. And they are far less accountable than elected officials for their choices. In this talk, I will delve into the differences we should be considering before urging platforms to take on greater roles as arbiters of speech and information.

Daphne Keller Bio

 

Lunch Seminar Series Flyer
  • E207, Encina Hall
  • 616 Serra Mall, Stanford, CA 94305
 

 

0
top_pick_rsd25_070_0254a.jpg

Daphne Keller is the Director of Platform Regulation at the Stanford Program in Law, Science, & Technology. Her academic, policy, and popular press writing focuses on platform regulation and Internet users'; rights in the U.S., EU, and around the world. Her recent work has focused on platform transparency, data collection for artificial intelligence, interoperability models, and “must-carry” obligations. She has testified before legislatures, courts, and regulatory bodies around the world on topics ranging from the practical realities of content moderation to copyright and data protection. She was previously Associate General Counsel for Google, where she had responsibility for the company’s web search products. She is a graduate of Yale Law School, Brown University, and Head Start.

SHORT PIECES

 

ACADEMIC PUBLICATIONS

 

POLICY PUBLICATIONS

 

FILINGS

  • U.S. Supreme Court amicus brief on behalf of Francis Fukuyama, NetChoice v. Moody (2024)
  • U.S. Supreme Court amicus brief with ACLU, Gonzalez v. Google (2023)
  • Comment to European Commission on data access under EU Digital Services Act
  • U.S. Senate testimony on platform transparency

 

PUBLICATIONS LIST

Director of Platform Regulation, Stanford Program in Law, Science & Technology (LST)
Social Science Research Scholar
Date Label
Director of Intermediary Liability Center for Internet and Society
Seminars
Paragraphs

In February, the White House attributed “the most destructive and costly cyberattack in history,” a summer 2017 attack affecting critical infrastructure and other victims around the world, to Russian intelligence services. The malicious code used in the attack, known as NotPetya, permanently encrypts the data on the computers that it has infected, essentially destroying them. Ground zero for the malware was Ukraine, but it self-propagated and quickly spread to Asia, Europe and the United States, costing its victims billions of dollars in damage. Russia’s hand in the NotPetya attack ought to send a chill down the spine of anybody who uses products by the Moscow-based antivirus company Kaspersky Labs. Russian law and practice, grants Russian intelligence agencies virtually unfettered authority to compel any internet-facing business in Russia to support their operations.

 

All Publications button
1
Publication Type
Journal Articles
Publication Date
Authors
Paragraphs

Excerpt from: "Publicly Reported Data Breaches: A Measure of Our Ignorance?"  Lawfare. July 11, 2018. Online.

There is a mounting gap between what the headlines say about the costs of cyber insecurity to the U.S. economy and the results of data-driven research on this topic—with negative implications for cybersecurity. Congress should move to narrow the gap by passing a federal law that takes two steps to protect data. First, it should require companies that possess sensitive personal information to publicly disclose when significant breaches of this information occur. Second, the law should also establish across-the-board requirements for companies that own and operate critical infrastructure, such as power plants and water utilities, to notify the authorities when sensitive operational systems are under credible threat from malicious cyber actors. A uniform, comprehensive framework would aid national security and enable executives, investors and policymakers alike to make data-driven investment and policy decisions.

Full article >

All Publications button
1
Publication Type
Blogs
Publication Date
Authors
Paragraphs

Excerpt from: "Cyber Security Derailed? Recommendations for Smarter Investments in Infrastructure." War on the Rocks. November, 2018. Online.

A state-owned Chinese company receives a contract to build and maintain the next generation of railcars that service Metro stations at the Pentagon, near the White House and Capitol Hill, and throughout the Washington, D.C., metro area. What could possibly go wrong? 

Possibly nothing, but maybe something. Commuter trains have come a long way from the unconnected transit assets that moved through and between cities independently. Modern rail cars are nodes in complex transit communications networks, extensions of a transit authority’s information and operational technology infrastructures, and even WiFi hotspots. Procurement announcements for the next generation of cars, like the one recently issued by D.C.’s Washington Metropolitan Area Transit Authority (WMATA), illustrate the complex, connected technologies that underpin promised improvements in automation, safety, and commuter experience.

 

All Publications button
1
Publication Type
Commentary
Publication Date
Authors
-

Stanford University's Hoover Institution in Washington is pleased to invite you to attend the next National Security and Technology Congressional Briefing. The briefing, centered on the U.S. race with China for technological superiority, will feature various experts outlining actionable policy proposals to meet this rising challenge.

With the 2020 presidential campaign in full swing, the time is ripe to develop new nonpartisan policy ideas to inform the national security and technology policy priorities of whomever will occupy the White House in 2021. The Technology and Public Policy Project housed within the Freeman Spogli Institute's Cyber Policy Center, and in partnership with the Hoover Institution, seeks to address these policy challenges and questions by developing implementation-ready proposals that meet the needs of current and future policymakers.

Hosted by Hoover Research Fellow Andrew Grotto, the briefing will focus on opportunities for action, featuring proposals by: 

  • Anja Manuel, on developing an affirmative strategy for competing, contesting, and cooperating with China in response to its efforts to systematically extract advanced technology from the West.
  • Anthony Vinci, on harnessing a new joint venture model for public-private technology innovation to meet national security technology challenges. 

 

Schedule:

  • 9:00a.m. - Registration and Coffee
  • 9:30a.m. - 11:00a.m. - Panel Discussion
  • Hoover Institution DC
  • 1399 New York Avenue NW, Suite 500
  • Washington, DC 20005
Panel Discussions
Subscribe to Security