Information Technology

Recent Old Events

Records 24 / 31

Seizing the Moment: America's Alliances and the Technology Race

May 15, 2020

This event is co-sponsored with the Cyber Policy Center and the Center for a New American Security.* Please note all CISAC events are scheduled using the Pacific Time Zone Seminar Recording: https:...

Uncertainty, Risk, and Responsibility: Lessons from Three Technologies

February 18, 2020

Seminar Recording: About this Event: Are we still in the Nuclear Age? Is this the Age of AI? Are we entering the Age of Synthetic Biology?

Chinese Investments in U.S. Venture Technology: Accessing the Crown Jewels of U.S. Innovation

February 12, 2018

Abstract: China’s participation in venture deals financing is at a record level of 10-16% of all venture deals (2015-2017) and has grown quite rapidly in the past seven years.  Technologies where...

Bits and pieces: Liberal democracy in the digital era

March 14, 2017

 The event is a joint sponsorship between CISAC, the Freeman Spogli Institute for International Studies, the European Security Initiative (in The Europe Center) and the Center for Russian, East...

The Challenges of Providing Data Security

January 18, 2017

Drell Lecture Recording: Drell Lecture Transcript: NA Speaker's Biography: Admiral Inman graduated from the University of Texas at Austin in 1950, and from the National...

CANCELLED -- The Great War of Our Time: The CIA's Fight Against Terrorism - From al Qa'ida to ISIS

November 17, 2015


Crowdsourced Democracy: Algorithms, Platforms, and Mechanisms

November 9, 2015

Abstract: While social media pervades many aspects of our lives, it has not yet proved to be an effective tool for large scale decision making: crowds of hundreds, perhaps millions, of individuals...

Earthquake Alert: Warning before shaking using smartphones

October 19, 2015

Abstract: Today, 100 people get an alert before earthquakes in California.  Recent legislation says everyone should get a warning.  In the future, your phone will detect earthquakes.  In the era of...

Can AI Make AI More Compliant (Semi-Automated Analysis - Ex Ante, In Situ, Ex Post)

October 12, 2015

Abstract: A number of senior Intelligence Community (IC) officials describe compliance as one of the IC’s biggest problems, perhaps the biggest.

Who Controls A Computer? A Predictive Theory of Comparative Strength in Computer Security Conflicts

April 27, 2015

Abstract: Any given computer or network runs code from an enormous number of sources, including the producer of the operating system, the hardware, built-in and user-installed applications,...

Bulk Collection of Signal Intelligence: Technical Alternatives

April 20, 2015

Abstract: The first Snowden disclosure was that Verizon was providing daily updates of telephony metadata to the NSA.

Modern Surveillance

March 19, 2015

Abstract: NSA stands for National Security Agency, but the agency is at odds with itself in its security mission.

Cybersecurity at the United Nations

January 22, 2015

Abstract: With the development of cyber capabilities by an increasing number of states, policymakers as well as scholars have been calling for the negotiation of a new international treaty to...

Round table with Internet Freedom Fellows

March 14, 2013

The Internet Freedom Fellows program brings human rights activists from across the globe to Geneva, Washington, and Silicon Valley to meet with fellow activists, U.S.

Away from the Keyboard? The Challenges of Command and Control over Cyber Operations

March 7, 2013

ABOUT THE TOPIC: Nearly all scholars writing about the potential for cyber war conclude that states, assumed to be unitary rational actors, are unlikely to use offensive cyber capabilities.

Can Information Security Survive?

June 11, 2012

Almost every company is asking the question of survivability – how to balance business needs and growth, while meeting regulatory compliance and mitigating security risks?

Some unexplored topics relating to cyber conflict

March 28, 2012

About the topic: This talk will present four important but largely unexplored topics in regarding conflict in cyberspace – two in some detail and two in a passing mention.

The Security Implications of Information Technology

May 6, 2010

AbstractInformation access and distribution is expanding exponentially.  Recent technological advancements have created a state of information openness where the general public has easy access both...

Got Twitter, Facebook, and YouTube? Mastering Social Networks for Academic Outreach

January 13, 2010

Margot Gerritsen is an Associate Professor in Energy Resources Engineering.

End of the World: Sense, Nonsense, and Nuclear War

May 21, 2009

Lynn Eden is acting co-director (2008-09) at the Center for International Security and Cooperation, Freeman Spogli Institute for International Studies, Stanford University.

Lasers, Bad; Landmines, Really Bad; Killer Robots, No Big Deal: Network Centrality, Agenda-Vetting, and the Paradox of Weapons Norms

April 2, 2009

Reading is available in the publications shelf (located on the left hand side of CISAC's main reception area) in a limited number of hard copies.

U.S. Intelligence Transformation: The Digital Dimension

December 5, 2007

James R. Gosler joined Sandia National Laboratories in 1979.

Sensors, Search and Seizure

March 13, 2007

A major component of the strategy to prevent attacks with Weapons of Mass Destruction (WMD) by transnational terrorist groups requires the widespread utilization of chemical, biological and...


Herb Lin Herbert Lin Senior Research Scholar
2015 eileen donahoe 04 web Eileen Donahoe Lecturer, CDDRL
van Schewick Barbara Barbara van Schewick Associate Professor, Law
2018 02 12 miis day1 high res 112 Melissa Hanham Affiliate
thumbnail headshot Marc Goodman Affiliate