Information Technology
News Type
News
Date
Paragraphs

CISAC cybersecurity fellow Jonathan Mayer talks to CBS News about the Android app he created with fellow Stanford PhD computer science student, Kevin Mutchler for a Stanford Security Lab project. They asked volunteers to share their phone records via MetaPhone to learn what could be uncovered in the metadata collected by the NSA.

He spoke to CBS News about the project. Be patient; you have to get past an ad first.

 

All News button
1
News Type
Commentary
Date
Paragraphs

Scott Charney, corporate vice president for Microsoft's Trustworthy Computing Group, addresses a CISAC seminar about the evolving pursuit of security and privacy. He shares his views on the NSA revelations as well as the industry perspective regarding concerns about government metadata programs, the key cybersecurity challenges and Microsoft's view of what we need to know as we try to advance cyber policy. You can watch his entire talk here.

All News button
1
-

CISAC Central Conference Room, 2d floor

Scott Charney Corporate Vice President , Trustworthy Computing Group Speaker Microsoft
Scott Charney Corporate Vice President, Trustworthy Computing Speaker Microsoft Corporation
Seminars
Paragraphs

Abstract:

Electrical grids have long depended upon information infrastructures—systems for exchanging information about electricity generation, transmission, distribution, and use. But only in the last decade has the notion of a “smart grid” captured the imagination of policymakers, business leaders, and technologists. Smart grid promoters promise that information technology will simultaneously improve the efficiency, reliability, and security of the grid. This article shows how these goals have come into tension as the grid’s information infrastructure has shaped, and been shaped by, government policies. It advances a three-part argument. First, digital technology and digital utopianism played a significant and underanalyzed role in restructuring the electricity industry during the 1980s and 1990s. Second, industry restructuring encouraged utilities to deploy information technology in ways that sacrificed reliability, security, and even physical efficiency for economic efficiency. Third, aligning the many goals for a smart grid will require heterogeneous engineering—designing sociopolitical and technological worlds together.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Information and Culture
Authors
Rebecca Slayton
Rebecca Slayton
News Type
News
Date
Paragraphs

Analysts at CISAC, together with the James Martin Center for Nonproliferation Studies, are playing a leading role in deriving new and timely information of global security relevance from a variety of open-source geospatial tools. These include digital virtual globes like Google Earth together with satellite imagery available from commercial vendors via cloud computing. This article describes some discoveries, by CISAC researchers and others, which have recently become possible through the use of such tools.

All News button
1
-

CISAC Conference Room

Timothy Junio Cybersecurity Fellow Speaker CISAC
0
Affiliate
Diffie_Whit.jpg

Whitfield Diffie is a consulting scholar at CISAC. He was a visiting scholar in 2009-2010 and an affiliate from 2010-2012. He is best known for the discovery of the concept of public key cryptography, in 1975, which he developed along with Stanford University Electrical Engineering Professor Martin Hellman. Public key cryptography, which revolutionized not only cryptography but also the cryptographic community, now underlies the security of internet commerce.

During the 1980s, Diffie served as manager of secure systems research at Northern Telecom. In 1991, he joined Sun Microsystems as distinguished engineer and remained as Sun fellow and chief security officer until the spring of 2009.

Diffie spent the 1990s working to protect the individual and business right to use encryption, for which he argues in the book Privacy on the Line, the Politics of Wiretapping and Encryption, which he wrote jointly with Susan Landau. Diffie is a Marconi fellow and the recipient of a number of awards including the National Computer Systems Security Award (given jointly by NIST and NSA) and the Franklin Institute's Levy Prize.

Whitfield Diffie Affiliate Commentator CISAC
Seminars
-

The Internet Freedom Fellows program brings human rights activists from across the globe to Geneva, Washington, and Silicon Valley to meet with fellow activists, U.S. and international government leaders, and members of civil society and the private sector engaged in technology and human rights. A key goal of the program is to share experiences and lessons learned on the importance of a free Internet to the promotion of freedom of expression and freedom of assembly as fundamental human rights.  As a part of the Silicon Valey tour, the six fellows for this year will stop at Stanford for a round table discussion. 

The fellows will present their work pertaining to internet freedom and challenges they face, that we will have a chance to discuss.  The event is free and open to the public.
You can find more information about the fellowship program at:

 

The internet freedom fellows for this year are:

 

Mac-Jordan Disu-Degadjor

@MacJordaN

 

A co-founder and executive of the sole blogging association in Ghana, Blogging Ghana, Mr. Disu-Degadjor promotes the freedom of expression through blogs and social media both on and off-line. Starting in 2009, Mac-Jordan and other young Ghanaians organized 18 BarCamps across Ghana, providing aspiring Ghanaian bloggers with technical help and networking opportunities. These conferences are designed to inspire youth to get on-line wherever and however they can.

On several occasions, Mac-Jordan has presented on the need to use blogs and other social media to amplify youth voices. In 2009, Global Voices appointed him as their aggregator for Ghana, and Dr. Dorothy Gordon, the Director-General of Ghana's Advanced Information Technology Institute, stated that he was a critical and necessary voice for the advancement of the nation.

Michael Anti

@mranti

 

Michael Anti was a computer programmer before turning to journalism in 2001. He is a longstanding advocate for a freer internet in China, noting that social media is the force that may ultimately challenge the political foundation of the country. Mr. Anti believes that the internet will facilitate a new conception of civic participation, inspiring the Chinese to see freedom of speech as a fundamental right. Microsoft MSN was forced to delete his award winning blog under pressure from the Chinese government, causing a media uproar in 2005. He has been an advocate of Virtual Private Networks for Chinese citizens, stating that those who don’t use them are “second-class citizens in the world of the internet.” Mr. Anti is known for his prolific career as a journalist, his 2012 Ted Talk, and his commitment to a freer China.

Edetaen Ojo

@EdetOjo; @MRA_ Nigeria

 

Edetaen Ojo is the director of The Media Rights Agenda, an organization that promotes excellence and professionalism in journalism. He spearheaded and orchestrated the movement that led the Nigerian legislature to pass the Freedom of Information Act, which empowers journalists to seek and access information from government establishments.

Mr. Ojo holds over twenty years of experience promoting and defending internet freedom as part of the broader right to freedom of expression, through monitoring transgressions and limitations on freedom and human rights online. His involvement in international human rights includes positions on the advisory group for the BBC World Service Trust-led Africa Media Development Initiative (AMDI) and the Task Force of the UN Economic Commission for Africa (UNECA). Mr. Ojo also serves as Convenor (Chair) of the International Freedom of Expression Exchange (IFEX), a global network of organizations with its secretariat in Toronto, Canada.

Grigory Okhotin

@okhotin; @OvdInfo

 

Grigory Okhotin is a prominent journalist and human rights activist in Russia. Previously the director of the news site Inosmi.RU, Mr. Okhotin resigned in protest of the censorship imposed upon public media in Russia. After his resignation, Mr. Okhotin began writing publically about censorship and human rights violations in Russia.

After experiencing detainment himself, Mr. Okhotin co-founded the portal ovdinfo.org to provide a public forum for sharing information about Russian citizens detained while exercising their right to freedom of assembly. Mr. Okhotin’s website is unique in that it provides real-time detailed information about those who have been detained, and features mini-interviews in which activists describe the manner of their arrest and the conditions of their confinement. According to Mr. Okhotin, “That helps us to understand what happens behind closed doors.”

 

Usamah Mohamed

@simsimt

 

Usamah Mohamed is a computer programmer and human rights activist, who currently owns and operates an IT business in Khartoum. During the recent wave of anti-government demonstrations in Sudan, Mr. Mohamed organized peaceful demonstrations from the Twitter page he supervises and supplied international media with fresh pictures and news on demonstrations across the country. The government took several steps to halt Mr. Mohamed’s work, including subjecting him to a period of detention. Undeterred, Mr. Mohamed continues to use social media to promote human rights in Sudan. The U.S. Embassy follows his blog daily, considering it an important source of news and opinions about Sudan. In April 2012, Usamah was chosen to be a part of the Sudan Social Media Team to meet with the U.S. Department of State’s special representative to Muslim communities, Farah Pandith.

Mr. Mohamed currently trains activists to use online tools effectively and efficiently. This includes training on blogging, bypassing online censorship, using circumvention tools, digital and online security, citizen journalism, effective audio and video recording, and live-tweeting for the coverage of events such as protests, sit-ins, and forums.

 

Bronwen Robertson

 

Bronwen Robertson is the Director of Operations for a London based NGO called Small Media. While in Iran working on a PhD in music, Ms. Robertson became interested in working for the rights of repressed Iranians, especially homosexuals. In Iran, Ms. Roberson spearheaded a research project and report entitled “LGBT Republic of Iran: An Online Reality?” The report, published in May of this year, led to a number of projects that connect Farsi speaking communities worldwide. One such project is a website called Degarvajeh, which gives online support to the LGBT community by providing general information and the proper Farsi vocabulary to discuss LGBT issues in a non-derogatory fashion.

Through Small Media, Ms. Robertson works to counter Iran’s efforts to block websites and censor information. Small Media spends much of its time working on creating new and innovative ways to make the internet safe and useful for Iranians. The group holds numerous online training sessions in personal online security, citizen journalism, and general information. They also report on related issues such as cultural censorship in Iran, Iranian women sports, and struggles faced by Iranian Bloggers. Recently, the group held an awareness raising workshop to demonstrate the challenges faced by Iranians using the internet under oppression.

CISAC Conference Room

Panel Discussions
-

Almost every company is asking the question of survivability – how to balance business needs and growth, while meeting regulatory compliance and mitigating security risks? This question is facing organizations of all sizes, and for some the answer is changing the mission and scope of their IT security initiatives. In this session, Malcolm will discuss Intel’s approach to managing risk with its new “Protect to Enable” information security strategy.


Malcolm Harkins is vice president of the Information Technology Group and chief information security officer (CISO) and general manager of Information Risk and Security. The group is responsible for managing the risk, controls, privacy, security and other related compliance activities for all of Intel Corporation's information assets.


Before becoming Intel's first CISO, Harkins held roles in Finance, Procurement and Operations. He has managed efforts encompassing IT benchmarking and Sarbanes Oxley systems compliance. Joining Intel in 1992, Harkins previously held positions as the profit and loss manager for the Flash Products Group; general manager of Enterprise Capabilities, responsible for the delivery and support of Intel's finance and HR systems; and in an Intel business venture focusing on e-commerce hosting. Harkins previously taught at the CIO institute at the UCLA Anderson School of Business and was an adjunct faculty member at Susquehanna University in Pennsylvania. He received the 'Excellence in the Field of Security' award from the RSA conference as well as an Intel Achievement Award. Harkins received his bachelor's degree in economics from the University of California at Irvine and an MBA in finance and accounting from the University of California at Davis.

CISAC Conference Room

Malcolm Harkins Vice President, Information Technology Group; Chief Information Security Officer; General Manager, Information Risk and Security Speaker Intel Corporation
Seminars
-

About the topic: This talk will present four important but largely unexplored topics in regarding conflict in cyberspace – two in some detail and two in a passing mention. These include escalation dynamics, uncertainties in threat assessment, offensive cyber operations for the private sector, and attribution in practice.

About the Speaker: Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies, where he has been study director of major projects on public policy and information technology. Of particular note are two recent studies: a 2009 study on offensive information warfare (Technology, Policy, Law, and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities), and a 2010 study on cyber deterrence (Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy). Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT. 

CISAC Conference Room

Herbert Lin Chief Scientist, Computer Science and Telecommunications Board, National Research Council of the National Academies Speaker
Seminars
Subscribe to Information Technology