Security

FSI scholars produce research aimed at creating a safer world and examing the consequences of security policies on institutions and society. They look at longstanding issues including nuclear nonproliferation and the conflicts between countries like North and South Korea. But their research also examines new and emerging areas that transcend traditional borders – the drug war in Mexico and expanding terrorism networks. FSI researchers look at the changing methods of warfare with a focus on biosecurity and nuclear risk. They tackle cybersecurity with an eye toward privacy concerns and explore the implications of new actors like hackers.

Along with the changing face of conflict, terrorism and crime, FSI researchers study food security. They tackle the global problems of hunger, poverty and environmental degradation by generating knowledge and policy-relevant solutions. 

News Type
News
Date
Paragraphs

POLITICO has announced their annual ranking of the 28 power players behind Europe’s tech revolution. In addition to an overall No. 1, the list is divided into three categories — rulemakers, rulebreakers and visionaries — each representing a different type of power. The Cyber Policy Center's Marietje Schaake is included on the list as a visionary and "voice to listen to on both sides of the Atlantic."

From the announcement:

The 42-year-old Dutch native has become a leading voice of European philosophy on how to regulate technology, especially in the U.S., where she’s been teaching at Stanford University’s Cyber Policy Center since leaving European politics.

Her message — that the internet’s early leaders have grown into all-too-dominant behemoths unable to subdue their own vices and are violating human rights — might have seemed out of whack in the U.S. a few years ago. But it has since become mainstream, in part thanks to Schaake’s work to reshape the American conversation on technology and inject some of Europe’s criticism on the sector.

In Europe, too, Schaake’s star keeps rising and rising. Once one of Brussels’ most visible politicians, she has now turned her attention to taming algorithms and the growing issue of cyber threats. In 2019, she launched the CyberPeace Institute in Geneva, a group focused on getting European policymakers to care about the human victims of cyberattack.

READ MORE

Marietje Schaake

Marietje Schaake

International Policy Director at the Cyber Policy Center
FULL BIO

Read More

cyber turns two graphic
News

The Cyber Policy Center Turns Two

A look back at the launch of the CPC and the work of our programs
The Cyber Policy Center Turns Two
Marietje Schaake
News

Marietje Schaake to Join Stanford Cyber Policy Center and Institute for Human-Centered Artificial Intelligence in Dual Policy Roles

Marietje Schaake to Join Stanford Cyber Policy Center and Institute for Human-Centered Artificial Intelligence in Dual Policy Roles
All News button
1
Subtitle

POLITICO’s annual ranking of the 28 power players behind Europe’s tech revolution includes the Cyber Policy Center's Marietje Schaake. The list is divided into three categories — rulemakers, rulebreakers and visionaries — each representing a different type of power.

News Type
Q&As
Date
Paragraphs

This interview with CISAC Affiliate Christopher Painter was originally produced by Jen Kirby. The complete article is available at Vox.

The frequency, scope and scale of ransomware attacks against public and private systems is accelerating. In the latest incident, the ransomware group REvil has demanded $70 million to unlock the systems of the software company Kaseya, an attack that affects not only Kaseya, but simultaneously exploits all of the company’s clients.

The REvil, JBS meatpacking and Colonial Pipeline attacks have abruptly raised the profile of ransomware from a malicious strand of criminality to a national security priority. These are issues that Christopher Painter, an affiliate at the Center for International Security and Cooperation (CISAC), has worked on at length during his tenures as a senior official at the Department of Justice, the FBI, the National Security Council and as the world's first top cyber diplomat at the State Department.

Jen Kirby, a reporter for Vox, interviewed Painter to discuss how cybercrimes are evolving and what governments should do to keep ransomware attacks from escalating geopolitical tensions online and off.



Jen Kirby:
I think a good place to start would be: What are “ransomware attacks”?

Christopher Painter:
It is largely criminal groups who are getting into computers through any number of potential vulnerabilities, and then they essentially lock the systems — they encrypt the data in a way that makes it impossible for you to see your files. And they demand ransom, they demand payment. In exchange for that payment, they will give you — or they claim, they don’t always do it — they claim they’ll give you the decryption keys, or the codes, that allow you to unlock your own files and have access to them again.

That is what traditionally we say is “ransomware.” That’s been going on for some time, but it’s gotten much more acute recently.

There is another half of that, which is that groups don’t just hold your files for ransom, they either leak or threaten to leak or expose your files and your information — your secrets and your emails, whatever you have — publicly, either in an attempt to embarrass you or to extort more money out of you, because you don’t want those things to happen. So it’s split now into two tracks, but they’re a combined method of getting money.

Jen Kirby:
We’ve recently had some high-profile ransomware attacks, including this recent REvil incident. Is it that we’re seeing a lot more of them, or they’re just bigger and bolder? How do you assess that ransomware attacks are becoming more acute?

Christopher Painter:
We’ve seen this going on for some time. I was one of the co-chairs of this Ransomware Task Force that issued a report recently. One of the reasons we did this report was we’re trying to call greater attention to this issue. Although governments and law enforcement were taking it seriously, it wasn’t being given the kind of national-level priority it deserved.

It was being treated as more of an ordinary cybercrime issue. Most governments’ attention is focused on big nation-state activity — like the SolarWinds hack [where suspected Russian government hackers breached US government departments], which are important, and we need to care about those. But we’re very worried about this, too.

It’s especially become more of an issue during the pandemic, when some of the ransomware actors were going after health care systems and health care providers.That combined with these big infrastructure attacks — the Colonial Pipeline clearly was one of them. Another one was the meat processing plants. Another one was hospital systems in Ireland. You also had the DC Police Department being victimized by ransomware. These things are very high-profile. When you’re lining up for gas because of a ransomware attack, and you can’t get your food because of a ransomware attack, that brings it home as a priority. And then, of course, you have what happened this past weekend. So ransomware has not abated, and it continues to get more serious and hit more organizations.

painter

Christopher Painter

Affiliate at the Center for Internatial Security and Cooperation (CISAC)
Full Profile

Read More

Image of the U.S. Capitol where debates on how to reform Section 230 take place.
Blogs

Can Congress Mandate Meaningful Transparency for Tech Platforms

Can Congress Mandate Meaningful Transparency for Tech Platforms
All News button
1
Subtitle

Christopher Painter explains why the emerging pattern of ransomware attacks needs to be addressed at a political level – both domestically and internationally – and not be treated solely as a criminal issue.

Paragraphs

The first COVID-19-related death in the United States was announced on February 29, 2020, the day of the South Carolina primary. International news about the early spread of the coronavirus and the initial reaction from American public health professionals to its quick spread in this country made it clear that the presidential election was facing an existential threat. Election officials who held primaries in early- and mid-March found themselves increasingly making public health decisions to guard both their voters and their staff. The larger societal challenges quickly overwhelmed the ability of states to hold primaries at all, leading to hastily canceled and postponed elections. The one early primary that was not postponed, Wisconsin, provided cautionary tales in the form of closed polling places, poll worker shortages, and massive transitions to mail balloting.

 

Nate Persily

Nathaniel Persily

James B. McClatchy Professor of Law at Stanford Law School | Senior Fellow, Freeman Spogli Institute | Professor, by courtesy, Political Science | Professor, by courtesy, Communication | Co-director, Cyber Policy Center
FULL BIO
All Publications button
1
Publication Type
Working Papers
Publication Date
Subtitle
A Compendium of Research from the Stanford-MIT Healthy Elections Project
Authors
Charles Stewart III
Chelsey Davidson
Zahavah Levine
Authors
Charles Stewart III
Chelsey Davidson
Zahavah Levine
News Type
News
Date
Paragraphs

Today, the Healthy Elections Project, a joint effort of Stanford and MIT, released a new 800 page report based on their research and findings on the administration of the 2020 election. The Stanford-MIT Healthy Elections Project was developed to ensure that the 2020 election could proceed with integrity, safety, and equal access. The Project aimed to do this by bringing together academics, civic organizations, election administrators, and election administration experts to assess and promote best practices. 

The first COVID-19-related death in the United States was announced on February 29, 2020, the day of the South Carolina primary. International news about the early spread of the coronavirus and the initial reaction from American public health professionals to its quick spread in this country made it clear that the presidential election was facing an existential threat. Election officials who held primaries in early- and mid-March found themselves increasingly making public health decisions to guard both their voters and their staff. The larger societal challenges quickly overwhelmed the ability of states to hold primaries at all, leading to hastily canceled and postponed elections. The one early primary that was not postponed, Wisconsin, provided cautionary tales in the form of closed polling places, poll worker shortages, and massive transitions to mail balloting.

Nate Persily

Nathaniel Persily

James B. McClatchy Professor of Law at Stanford Law School | Senior Fellow, Freeman Spogli Institute | Professor, by courtesy, Political Science | Professor, by courtesy, Communication | Co-director, Cyber Policy Center
FULL BIO
Hero Image
All News button
1
Subtitle

A Compendium of Research from the Stanford-MIT Healthy Elections Project

Paragraphs

Whether the targets are local governmentshospital systems, or gas pipelines, ransomware attacks in which hackers lock down a computer network and demand money are a growing threat to critical infrastructure. The attack on Colonial Pipeline, a major supplier of fuel on the East Coast of the United States, is just one of the latest examples—there will likely be many more. Yet the federal government has so far failed to protect these organizations from the cyberattacks, and even its actions since May, when Colonial Pipeline was attacked, fall short of what’s necessary.

Read more 

All Publications button
1
Publication Type
Commentary
Publication Date
Subtitle
Op-ed in Bulletin of the Atomic Scientists, by Gregory Falco and Sejal Jhawer
Authors
Sejal Jhawer
-

Image
German Consulate logo and Stanford Logo

Technological cooperation is one of the key topics of the transatlantic agenda. The capacity of nations to innovate and to regulate will define impact their future relevancy. Beyond setting incentives to enhance innovation, Regulation and setting standards is at the forefront of the geopolitical dimension of tech policy.
 
On June 24 from 12:00 to 1:00 pm Pacific Time, Germany’s Ambassador to the United States, Dr. Emily Haber, International Policy Director at Stanford University’s Cyber Policy Center, Marietje Schaake, and Chris Riley, Senior Fellow for Internet Governance at the R Street Institute, will discuss the opportunities and challenges of the digital transformation for the US and the EU with respect to strategies to strengthen democratic public spheres, restore digital trust and promote liberal liberal-democratic values through a global digital order. Nathanial Persily, co-director of the Stanford Cyber Policy Center, will introduce and moderate the event.
 
This event is part of the series “Meeting America,” virtual talks with the German Ambassador and American stakeholders across the United States.
 
This event is co-sponsored by the German Consulate General San Francisco and the American Council on Germany.

REGISTER

 

About the Speakers

 

Dr. Emily Margarethe Haber has been German Ambassador to the United States since June 2018.   Prior to her transfer to Washington, DC, she served in various leadership functions at the Foreign Office in Berlin. In 2009, she was appointed Political Director and, in 2011, State Secretary, the first woman to hold either post. Thereafter, she was deployed to the Federal Ministry of the Interior, serving as State Secretary in charge of homeland security and migration policy from 2014 until 2018.   Emily Haber has many years of experience with Russia and the former Soviet Union. She held various posts at the German Embassy in Moscow, including Head of the Political Department. At the Foreign Office in Berlin, she served as Head of the OSCE Division and as Deputy Director-General for the Western Balkans, among other positions.   Emily Haber holds a PhD in history and is married to former diplomat Hansjörg Haber. The couple has two sons.

Chris Riley is R Street’s senior fellow of Internet Governance. He will be leading the Knight Foundation-funded project on content moderation, running convenings of a broad range of stakeholders to develop a framework for platforms managing user-generated content. Chris will also be doing policy analysis around content regulatory issues related to that project, including work on Section 230 in the United States and the Digital Services Act in the European Union.

Prior to joining R Street, Chris led global public policy work for the Mozilla Corporation, managing their work on the ground in Washington, D.C., Brussels, Delhi and Nairobi from Mozilla’s San Francisco office, and worked with government policymakers, stakeholders in industry and civil society, and internal teams at Mozilla to advance their mission. Prior to that, he worked in the U.S. Department of State to help manage the Internet Freedom grants portfolio designated by Congress to support technology development, digital safety training, research and related work as a part of advancing the expression of human rights online in internet-repressive countries.

Chris received his bachelor’s in computer science from Wheeling Jesuit University, his PhD in computer science from Johns Hopkins University and his JD from Yale Law School.

Nathaniel Persily is the James B. McClatchy Professor of Law at Stanford Law School, with appointments in the departments of Political Science, Communication, and FSI.

Marietje Schaake is the International Policy Director at Stanford University’s Cyber Policy Center and international policy fellow at Stanford’s Institute for Human-Centered Artificial Intelligence. 

 

0
marietje.schaake

Marietje Schaake is a non-resident Fellow at Stanford’s Cyber Policy Center and at the Institute for Human-Centered AI. She is a columnist for the Financial Times and serves on a number of not-for-profit Boards as well as the UN's High Level Advisory Body on AI. Between 2009-2019 she served as a Member of European Parliament where she worked on trade-, foreign- and tech policy. She is the author of The Tech Coup.


 

Non-Resident Fellow, Cyber Policy Center
Fellow, Institute for Human-Centered Artificial Intelligence
Date Label
Emily Margarethe Haber
Chris Riley
Authors
Riana Pfefferkorn
Riana Pfefferkorn
News Type
Blogs
Date
Paragraphs

India’s information technology ministry recently finalized a set of rules that the government argues will make online service providers more accountable for their users’ bad behavior. Noncompliance may expose a provider to legal liability from which it is otherwise immune. Despite the rules’ apparently noble aim of incentivizing providers to better police their services, in reality, the changes pose a serious threat to Indians’ data security and reflect the Indian government’s increasingly authoritarian approach to internet governance.

The government of Prime Minister Narendra Modi has in recent years taken a distinctly illiberal approach to online speech. When India’s IT ministry released its original draft of the rules more than two years ago, civil society groups criticized the proposal as a grave threat to free speech and privacy rights. In the intervening years, threats to free speech have only grown. To quell dissent, Modi’s government has shut off the internet in multiple regions. Facing widespread protests led by the country’s farmers against his government, Modi has escalated his attacks on the press and pressured Twitter into taking down hundreds of accounts critical of the government’s protest response. The new rules represent the latest tightening of state control over online content, and as other backsliding democracies consider greater restrictions on online speech, the Modi government is providing a troubling model for how to do so. 

Beyond chilling digital rights, the new rules threaten to undermine computer security systems that Indian internet users rely on every day in order to grant the state increased power to police online content. The new rules require messaging services to be able to determine the origin of content and demand that online platforms develop automated tools to take down certain content deemed illegal. Taken together, the new rules pose threats to freedom of speech and the privacy and security of India’s internet users. 

The relevant provisions apply to “significant” “social media intermediaries” (which I’ll call SSMIs for short). “Significant” means the provider has hit a yet to be defined number of registered Indian users. “Social media intermediary” broadly encompasses many kinds of user-generated content-driven services. A government press release calls out WhatsApp, YouTube, Facebook, Instagram, and Twitter specifically, but services as diverse as LinkedIn, Twitch, Medium, TikTok, and Reddit also fall within the definition. 

Two provisions are of particular concern. Section 4(2) of the new rules requires SSMIs that are “primarily” messaging providers to be able to identify the “first originator” of content on the platform. Section 4(4) requires any SSMI (not limited to messaging) to “endeavour to deploy technology-based measures, including automated tools or other mechanisms to proactively identify” two categories of content: child sex abuse material and content identical to anything that’s been taken down before. I’ll call these the “traceability” and “filtering” provisions.

These provisions endanger the security of Indian internet users because they are incompatible with end-to-end encryption. End-to-end encryption, or E2EE, is a data security measure for protecting information by encoding it into an illegible scramble that no one but the sender and the intended recipient can decode. That way, the encrypted data remains private, and outsiders can’t alter it en route to the recipient. These features, confidentiality and integrity, are core underpinnings of data security. 

Not even the provider of an E2EE service can decrypt encrypted information. That’s why E2EE is incompatible with tracing and filtering content. Tracing the “originator” of information requires the ability to identify every instance when some user sent a given piece of information, which an intermediary can’t do if it can’t decode the encrypted information. The same problem applies to automatically filtering a service for certain content. 

Put simply, SSMIs can’t provide end-to-end encryption and still comply with these two provisions. This is by design. Speaking anonymously to The Economic Times, one government official said the new rules will force large online platforms to “control” what the government deems to be unlawful content: Under the new rules, “platforms like WhatsApp can’t give end-to-end encryption as an excuse for not removing such content,” the official said

The rules confront SSMIs with a Hobson’s choice: either weaken their data security practices, or open themselves up to expensive litigation as the price of strong security. That is an untenable dilemma. Intermediaries should not be penalized for choosing to protect users’ data. Indeed, the existing rules already require intermediaries to take “reasonable measures” to secure user data. If SSMIs weaken their encryption to comply with the new traceability and filtering provisions, will that violate the “reasonable data security” provision? This tension creates yet another quandary for intermediaries. 

The new rules make a contradictory demand: Secure Indians’ data—but not too well. A nation of 1.3 billion people cannot afford half-measures. National, economic, and personal security have become indivisible from data security. Strong encryption is critical to protecting data, be it military communications, proprietary business information, medical information, or private conversations between loved ones. Good data security is even more vital since the COVID-19 pandemic shifted much of daily life online. Without adequate protective measures, sensitive information is ripe for privacy invasions, theft, espionage, and hacking.

Weakening intermediaries’ data security is a gift to those who seek to harm India and its people. Citing national security and privacy concerns, Indian authorities have moved to restrict the presence of Chinese apps in India, but these new rules risk exposing the country’s internet users. The rules affect all of an intermediary’s users, not just those using the platform for bad acts. Over 400 million Indians currently use WhatsApp, and Signal hopes to add 100-200 million Indian users in the next two years. Most of those half-billion people are not criminals. If intermediaries drop E2EE to comply with the new rules, that primarily jeopardizes the privacy and security of law-abiding people, in return for making it easier for police to monitor the small criminal minority. 

Such monitoring may prove less effective than the Indian government expects. If popular apps cease offering E2EE, many criminals will drop those apps and move to the dark web, where they’re harder to track down. Some might create their own encrypted apps, as Al-Qaeda did as far back as 2007. In short, India’s new rules may lead to a perverse outcome where outlaws have better security than the law-abiding people whom they target. 

Meanwhile, weakening encryption is not the only way for police to gather evidence. We live in a “golden age for surveillance” in which our activities, movements, and communications generate a wealth of digital information about us. Many sources of digital evidence, such as communications metadata, cloud backups, and email, are not typically end-to-end encrypted. That means they’re available from the service provider in readable form. If Indian police have difficulty acquiring such data (for example because the data and the company are located outside of India), it’s not due to encryption, and passing rules limiting encryption will do nothing to ameliorate the problem.

When intermediaries employ end-to-end encryption, that means stronger security for communities, businesses, government, the military, institutions, and individuals—all of which adds up to the security of the nation. But the new traceability and filtering requirements may put an end to end-to-end encryption in India. The revised intermediary rules put the whole country’s security at risk. Amid a global backsliding for internet freedom, the proposal may offer an example for other would-be authoritarians to follow. 

Riana Pfefferkorn is a research scholar at the Stanford Internet Observatory.

Facebook, Google, and Microsoft provide financial support to the Brookings Institution, a nonprofit organization devoted to rigorous, independent, in-depth public policy research. 

Read More

Riana Pfefferkorn
News

Q&A with Riana Pfefferkorn, Stanford Internet Observatory Research Scholar

Riana Pfefferkorn joined the Stanford Internet Observatory as a research scholar in December. She comes from Stanford’s Center for Internet and Society, where she was the Associate Director of Surveillance and Cybersecurity.
Q&A with Riana Pfefferkorn, Stanford Internet Observatory Research Scholar
twitter takedown headliner
Blogs

Analysis of February 2021 Twitter Takedowns

In this post and in the attached reports we investigate a Twitter network attributed to actors in Armenia, Iran, and Russia.
Analysis of February 2021 Twitter Takedowns
img 5787
Blogs

Analyzing a Twitter Takedown Originating in Saudi Arabia

Analyzing a Twitter Takedown Originating in Saudi Arabia
All News button
1
Authors
Stanford Internet Observatory
News Type
Blogs
Date
Paragraphs

On May 6, 2021, Facebook announced the takedown of 32 Pages, 46 Profiles, and six Instagram accounts operated by individuals in the Central African Republic (CAR) whose activities targeted audiences in CAR. Facebook shared this network with the Stanford Internet Observatory (SIO) on April 26, 2021. This network was suspended not due to the content of its posts, but rather for coordinated inauthentic behavior. SIO found significant indications both on and off platform that many of the assets removed in this takedown were aliases for the same entity. 

The suspended network exhibited strong ties to Harouna Douamba, a pseudonym for an allegedly Burkinabe individual who has gained notoriety in CAR for the information campaigns he wages on social media. Douamba claims to be the president of three non-governmental organizations (NGOs): Aimons Notre Afrique (ANA), Coalition Afrique Engagée (CAE), and Fédération Nationale des Ivoiriens d’Origine Étrangères (FENIOE). Facebook Pages for these organizations were included in the suspended network, in addition to Pages for several other NGOs and media companies with ties to Douamba. We also found some evidence that one of the suspended Profiles may be the individual behind the Harouna Douamba pseudonym. Facebook attributes the network to ANA.

List of NGOs and media outlets linked to Harouna Douamba NGOs and media outlets linked to Harouna Douamba

Suspended Pages consistently disparaged France’s involvement with CAR, but praised President Faustin-Archange Touadéra and Russia. They also published slanted stories on other west and central African countries. 

We also investigated Douamba’s connections to a disinformation campaign that claimed four officials associated with the UN peacekeeping mission in CAR (the Multidimensional Integrated Stabilization Mission in the Central African Republic, known as MINUSCA) trafficked arms to rebels operating in a neighborhood in Bangui, the CAR capitol. One of the suspended Pages was deeply involved in this effort and posted what might qualify as incitements to violence. 

Key takeaways: 

  • The suspended network centered around the activities of Harouna Douamba. Nearly all of the suspended Pages have connections to Douamba and/or frequently published content featuring Douamba and the activities of his NGOs. Several of the suspended Profiles and Instagram accounts also appear to have direct ties to Douamba, his NGOs, or affiliated media companies. 

  • Many of the suspended Pages claimed to be NGOs that seek to advance Pan-African causes. However, these NGOs largely appear to be thinly veiled aliases for Douamba’s ANA and CAE NGOs. Pages for these organizations demonstrated significant coordinated behavior. For instance, they frequently shared duplicated content from ANA and CAE, usually within 10 to 15 minutes of the original posts. 

  • One of the suspended Pages was a coordinating force around a disinformation campaign in 2020 alleging that UN peacekeepers in CAR trafficked weapons to rebel groups and calling for revolt at the peacekeeping operation. This is strong evidence that Douamba is linked to that disinformation campaign. 

  • Eighteen domains, largely French-language news sites covering central and west Africa, were linked to the network. There is substantial evidence that the sites are linked to each other and to Douamba. The ANA website, for instance, lists nearly all of the news sites as part of their media group, ANA-COM.

  • Topically, the network largely pushed content critical of France and supportive of the Touadéra regime and Russia. They also published slanted stories on other west and central African countries.

  • The network also attempted to build its audience across platforms. One post that was shared widely by suspended Pages called for Pan-Africanists to include their WhatsApp numbers in the comments. However, few users shared this information.

 

Read More

twitter takedown headliner
Blogs

Analysis of February 2021 Twitter Takedowns

In this post and in the attached reports we investigate a Twitter network attributed to actors in Armenia, Iran, and Russia.
Analysis of February 2021 Twitter Takedowns
palestine takedown headliner
Blogs

Staying Current

An Investigation Into a Suspended Facebook Network Supporting the Leader of the Palestinian Democratic Reform Current
Staying Current
takedown report headliner
Blogs

Stoking Conflict by Keystroke

New Facebook takedowns expose networks of Russian-linked assets targeting Libya, Sudan, Syria, and the Central African Republic.
Stoking Conflict by Keystroke
All News button
1
Subtitle

A Facebook takedown exposes a network of NGO and media entities linked to Harouna Douamba.

Subscribe to Security