Intelligence
-

About the Event: In conversation with Philip Taubman, General Hayden will discuss intelligence and cybersecurity challenges the United States faces in combatting terrorism, dealing with North Korea, Iran and Russia, and will assess President Trump’s relations with the U.S. intelligence community. 

About the Speaker: General Michael Hayden is a retired four-star general who served as director of the Central Intelligence Agency and the National Security Agency when the course of world events was changing at a rapid rate. As head of the country’s premier intelligence agencies, he was on the frontline of global change, the war on terrorism and the growing cyber challenge. He understands the dangers, risks, and potential rewards of the political, economic, and security situations facing us. General Hayden dissects political situations in hot spots around the world, analyzing the tumultuous global environment and what it all means for Americans and America’s interests. He speaks on the delicate balance between liberty and security in intelligence work, as well the potential benefits and dangers associated with the cyber domain. As the former head of two multi-billion dollar enterprises, he can also address the challenges of managing complex organizations in times of stress and risk, and the need to develop effective internal and external communications.

In addition to leading CIA and NSA, General Hayden was the country’s first principal deputy director of national intelligence and the highest-ranking military intelligence officer in the country.  In all of these jobs, he worked to put a human face on American intelligence, explaining to the American people the role of espionage in protecting both American security and American liberty.  Hayden also served as commander of the Air Intelligence Agency and Director of the Joint Command and Control Warfare Center and served in senior staff positions at the Pentagon, at U.S. European Command, at the National Security Council, and the U.S. Embassy in Bulgaria. He was also the deputy chief of staff for the United Nations Command and U.S. Forces in South Korea.

Hayden has been a frequent expert and commentator on major news outlets and in top publications, valued for his expertise on intelligence matters like cyber security, government surveillance, geopolitics, and more. He was featured in the HBO documentary Manhunt, which looked at espionage through the eyes of the insiders who led the secret war against Osama bin Laden, and in Showtime’s The Spymasters, a detailed look at the directors of the Central Intelligence Agency.

Hayden is currently a principal at the Chertoff Group and a distinguished visiting professor at the George Mason University Schar School of Policy and Government. He is on the board of directors of Motorola Solutions and serves on a variety of other boards and consultancies. In 2013, the Intelligence and National Security Alliance (INSA) awarded Hayden the 29th annual William Oliver Baker Award.  General Hayden is also the first recipient of the Helms Award presented by the CIA Officers’ Memorial Foundation.  In 2014 he was the inaugural Humanitas visiting professor in intelligence studies at Oxford University in the United Kingdom.  His recent memoir, Playing to the Edge: American Intelligence in the Age of Terror, has been a New York Times best-seller and was recently selected as one of the 100 most notable books of 2016.

Philip Taubman is Adjunct Professor at the Center for International Security and Cooperation. He is also the former Moscow and Washington Bureau Chief, and Deputy Editorial Page Editor, of The New York Times. Philip Taubman served as a reporter and editor at The New York Times for thirty years, specializing in national security coverage. He is author of Secret Empire: Eisenhower, the CIA, and the Hidden Story of America’s Space Espionage, and The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb. He is working on a biography of George P. Shultz, the former secretary of state.

Michael Hayden Former director, CIA, NSA
Seminars
-

About the event: In his talk Toomas Hendrik Ilves will discuss how various digital tools have been used in democracies in Europe and the US in an attempt to disrupt and affect elections outcomes. These are new approaches, meant if not to alter electoral outcomes then at least to sow discord and seem in some instances to have been successful. Methods used include hacking into political parties' servers and “doxxing” embarrassing hacked materials; disseminating via “bots” false stories that have occasionally gone viral; as well highly granular big data analyses to target voters with ads specifically tailored to their profiles as culled from social media.

These methods and tactics have been employed in the U.S, French, and Dutch elections; cyber-break-ins into the Bundestag and German political think tanks suggest they will play a role in the upcoming German parliamentary elections. Perpetrated by an authoritarian government, they are asymmetric: without a free media environment they are immune to such tacts even if democracies were to even try to respond in kind. What democracies have experienced in the past several years will force them to adapt to a new environment with the realization that there are many ways for an adversary to change a nations policies.

About the Speaker: Toomas Hendrik Ilves was born on December 26, 1953, to an Estonian family living in Stockholm, Sweden. He was educated in the United States, receiving a degree from Columbia University in 1976 and a master's degree in psychology from the University of Pennsylvania in 1978.

In 1984 he moved to Munich, Germany, to work at the office of Radio Free Europe, first as a researcher and foreign policy analyst and later as the head of the Estonian Desk.

From 1993 to 1996 Ilves served in Washington as the ambassador of the Republic of Estonia to the United States and Canada. During this time, he launched the Tiger Leap Initiative to computerize and connect all Estonian schools online with Education Minister Jaak Aaviksoo. He then served as minister of foreign affairs from 1996 to 1998. After a brief period as chairman of the North Atlantic Institute in 1998, he was again appointed minister of foreign affairs, serving until 2002.

From 2002 to 2004, Ilves was a member of the Estonian Parliament and in 2004 he was elected a member of the European Parliament, where he was vice-president of the Foreign Affairs Committee. As a MEP, he initiated the Baltic Sea Strategy that was later implemented as official regional policy of the European Union.

Ilves was elected president of the Republic of Estonia in 2006. He was re-elected for a second term in office in 2011.

During his presidency, Ilves has been appointed to serve in several high positions in the field of ICT in the European Union. He served as chairman of the EU Task Force on eHealth from 2011 to 2012 and was chairman of the European Cloud Partnership Steering Board at the invitation of the European Commission from 2012 to 2014. In 2013 he chaired the High-Level Panel on Global Internet Cooperation and Governance Mechanisms convened by ICANN. From 2014 to 2015 Ilves was the co-chair of the advisory panel of the World Bank's World Development Report 2016 "Digital Dividends" and was also the chair of World Economic Forum's Global Agenda Council on Cyber Security beginning in June 2014.

Starting from 2016, Ilves co-chairs The World Economic Forum working group The Global Futures Council on Blockchain Technology. In 2017 he joined Stanford University as a Bernard and Susan Liautaud Distinguished Visiting Fellow at the Center for International Security and Cooperation in the Freeman Spogli Institute for International Studies.

President Ilves has published many essays and articles in Estonian and English on numerous topics ranging from Estonian language, history, and literature to global foreign and security policy and cyber security. His books include essay collections in Estonian, Finnish, Latvian, Hungarian, and Russian.

His international awards and honorary degrees include Knight of Freedom Award by the Casimir Pulaski Foundation (2016), the Aspen Prague Award by the Aspen Institute (2015), the Freedom Award by the Atlantic Council (2014) and the NDI Democracy Award by the National Democratic Institute (2013). His Honorary Degrees include an Honorary Degree from St. Olaf College, US (2014), an Honorary Degree from the John Paul II Catholic University of Lublin, Poland (2010), and an Honorary Degree from Tbilisi University, Georgia (2007).

Encina Hall, 2nd floor

Seminars
-

This event is at maximum capacity. We thank you for your interest and regret that we cannot accept more registrations.

- This event is part of the Robert G. Wesson Lectures Series -

About the Event: Michael Morell, Former Deputy Director and twice Acting Director of the Central Intelligence Agency, will be interviewed by Amy Zegart, CISAC Co-director and Davies Family Senior Fellow at the Hoover Institution. Audience members will have an opportunity to ask questions after the interview. 

About the Speaker: Michael Morell, the former Acting Director and Deputy Director of the Central Intelligence Agency, is the Wesson Lecturer at the Freeman-Spogli Institute for International Studies and the Center for International Security and Cooperation for 2017. He is one of our nation’s leading national security professionals, with extensive experience in intelligence and foreign policy.  He has been at the center of our nation’s fight against terrorism, its work to prevent the proliferation of weapons of mass destruction, and its efforts to respond to trends that are altering the international landscape—including the Arab Spring, the rise of China, and the cyber threat.  Politico has called Michael the “Bob Gates of his generation.”

During his 33-year career at CIA, Michael served as Deputy Director for over three years, a job in which he managed the Agency’s day-to-day operations, represented the Agency at the White House and Congress, and maintained the Agency’s relationships with intelligence services and foreign leaders around the world.  Michael also served twice as Acting Director, leading CIA when Leon Panetta was named Secretary of Defense and again after David Petraeus left government.

Michael’s senior assignments at CIA also included serving for two years as the Director of Intelligence, the Agency’s top analyst, and for two years as Executive Director, the CIA’s top administrator—managing human resources, the budget, security, and information technology for an agency the size of a Fortune 200 firm.

Michael has been a witness to history on multiple occasions.  He is the only person who was both with President Bush on September 11th, when al-Qaida burst into the American consciousness, and with President Obama on May 1st, when Bin Laden was brought to justice.  Michael played a major role in the Bin Laden operation.

Michael is known inside CIA for his leadership.  He inspired individuals and work units to perform beyond expectations.  He mentored most of the Agency’s current senior leadership team, including a significant number of women and minorities.  When he departed CIA, thousands of officers wrote Michael notes of thanks.

Michael is the recipient of many awards.  He received the Presidential Rank Award for exceptional performance – the nation’s highest honor for civilian service.  He also received the Distinguished Intelligence Medal, CIA’s highest award, for his role in the Bin Laden operation.  Michael is also the recipient of the Distinguished Career Intelligence Medal, the National Intelligence Distinguished Service Medal, and the Department of Defense Service Medal.    

Today, Michael is involved in a wide range of activities.  He is a member of the Board of Directors of the Goodyear Tire and Rubber Company; Senior Counselor to Washington’s fastest growing consulting firm, Beacon Global Strategies; and a consultant to a number of private sector entities.  He is the Chairman of the Board of one of those entities – Culpeper National Security Solutions, a subsidiary of DynCorp International.

Much of what Michael does today is tied to national security.  Until recently, he was a senior national security contributor for CBS News.  He is a frequent guest on the Charlie Rose Show discussing national security issues.  He is a Senior Fellow at Harvard University’s Kennedy School of Government; a Senior Fellow at West Point’s Center on Combatting Terrorism; a resident fellow this fall at the Institute of Politics at the University of Chicago, a member of the Aspen Institute’s Homeland Security Group, which advises the Secretary of Homeland Security on national security issues; a member of the Board of Director’s of the Atlantic Council, a member of the Advisory Board to the University of Chicago’s Project on Security and Terrorism, and a member of the Atlantic Council’s advisory group to its study on the future of the Middle East.  He served as a Member of President Obama’s Review Group on Intelligence and Communications Technology.

Michael is the author of the New York Times bestseller on CIA’s nearly 20-year fight against al Qa`ida.  The title of the book is “The Great War of Our Time:  An Insider’s Account of the CIA’s Fight Against Terrorism – From al Qaida to ISIS.”  It was published in May 2015.

Michael is a native of Cuyahoga Falls, Ohio, and he maintains close ties to northeast Ohio.  His father and mother—who taught him hard work, the pursuit of excellence, and humility—were an autoworker and a homemaker.  Michael is a first-generation college student, earning a B.A. summa cum laude in economics from the University of Akron.  He also earned an M.A. in economics from Georgetown University.  

Michael is involved with charities associated with supporting the families of fallen soldiers and intelligence officers.

 

Inside the CIA: A Conversation with Michael Morell
Download pdf

Encina Hall, 2nd floor

Michael Morell Former director Central Intelligence Agency
Seminars
-

Abstract: This presentation is adapted from two book chapters.  The first one published in 2007 is “Transforming U.S. Intelligence: The Digital Dimension” and the second chapter published in 2009 is “Vaults, Mirrors and Masks: Rediscovering US Counterintelligence - Counterintelligence Too Narrowly Practiced.”  Additionally, material from recent DSB and NSB studies is included:  “Resilient Military Systems and the Advanced Cyber Threat” and “A Review of U.S. Navy Cyber Defense Capabilities”.  Communications technologies have transformed the way information is created, stored, processed, viewed, and transmitted. But the same technologies have provided our adversaries with the tools for attacking and exploiting our infrastructure and military systems. The U.S. has long operated under the assumption that our critical systems would be secure if we applied current Information Assurance (IA) practices. The reality is that a sophisticated offense easily outmatches the capability of a defensive organization to protect its critical Information Technology (IT) systems.  This briefing attempts to convey the rationale behind this assertion. The presentation represents my views and is specifically not intended to represent the views of any organization with which I’m affiliated.

About the Speaker: Mr. Gosler is a Senior Fellow at the Johns Hopkins University Applied Physics Laboratory.  He is engaged in various DOD and Intelligence Community advisory boards such as the Defense Science Board.

His previous experience includes a 33 year career (1979-2013) at Sandia National Laboratories. His early contributions included red-teaming both cryptographic and nuclear weapon systems.  In 1989, he served as Sandia’s first Visiting Scientist to NSA.  In 1993, he established and directed the Vulnerability Assessments Program. From 1996-2001, he was on a Special Leave of Absence from Sandia.  After returning to Sandia, he became Sandia’s sixth lab Fellow.

In 1996, he entered the Senior Intelligence Service at CIA as the Director of the Clandestine Information Technology Office.  This office integrated targeting, analysis, technology development, and technical/human operations.

Additionally, he served as a Naval Reserve Officer from 1975-2003. 

His awards include: Lockheed Martin’s NOVA award, National Intelligence Medal of Achievement, DONOVAN award, Intelligence Medal of Merit, Director of Central Intelligence Director’s award, and the Legion of Merit.

Mr. Gosler earned a BS degree in Physics/Mathematics and a MS degree in Mathematics.

Encina Hall, 2nd floor

Jim Gosler Senior Fellow Johns Hopkins University Applied Physics Laboratory
Seminars
-

Abstract: In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. 

Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable. To purchase the book, please click here.

About the Speakers: Samuel J. Rascoff is an expert in national security law, and serves as faculty director of the Center on Law and Security. Named a Carnegie Scholar in 2009, Rascoff came to the Law School from the New York City Police Department, where, as director of intelligence analysis, he created and led a team responsible for assessing the terrorist threat to the city. A graduate of Harvard summa cum laude, Oxford with first class honors, and Yale Law School, Rascoff previously served as a law clerk to US Supreme Court Justice David H. Souter and to Judge Pierre N. Leval of the US Court of Appeals for the Second Circuit. He was also a special assistant with the Coalition Provisional Authority in Iraq and an associate at Wachtell, Lipton, Rosen & Katz. Rascoff’s publications include “Presidential Intelligence” (Harvard Law Review); “Counterterrorism and New Deterrence” (NYU Law Review); “Establishing Official Islam? The Law and Strategy of Counter-Radicalization” (Stanford Law Review); “Domesticating Intelligence” (Southern California Law Review), and “The Law of Homegrown (Counter-) Terrorism” (Texas Law Review).

Zachary K. Goldman is the Executive Director of the Center on Law and Security and an Adjunct Professor of Law at NYU School of Law. Previously, Zachary served as a Special Assistant to the Chairman of the Joint Chiefs of Staff at the U.S. Department of Defense, and as a policy advisor in the U.S. Department of the Treasury’s Office of Terrorism and Financial Intelligence, where he was the subject matter expert on terrorist financing in the Arabian Peninsula and Iran sanctions. In the private sector, he was a litigator at Sullivan & Cromwell LLP in New York.

Zachary is the co-editor of Global Intelligence Oversight: Governing Security in the Twenty-First Century, an edited volume on comparative approaches to intelligence oversight, published by Oxford University Press.  He has testified before Congress and has published on national security strategy, cybersecurity, counterterrorism, and financial sanctions in outlets such as The New York Times, The Wall Street Journal, Foreign Affairs, The Financial Times Chinese, the South China Morning Post, Political Science Quarterly, Cold War History, The Atlantic, The Diplomat, The National Interest, and others.

Zachary is a Term Member of the Council on Foreign Relations, an Adjunct Senior Fellow at the Center for a New American Security, and a member of the Advisory Committee to the American Bar Association’s Standing Committee on Law and National Security. He received his JD from New York University School of Law, his Masters in International Relations from the London School of Economics, and his BA from Harvard University.

Encina Hall, 2nd floor

Samuel J. Rascoff Professor of Law, Faculty Director, Center on Law and Security New York University School of Law
Zachary K. Goldman Executive Director, Center on Law and Security New York University School of Law
Seminars
Authors
News Type
News
Date
Paragraphs

When a Tunisian-born man drove a 19-ton rented truck into a crowd of revelers celebrating France’s national holiday in the Mediterranean town of Nice last week, killing 84 people and injuring hundreds more, it was a deadly new example of an old terrorist tactic of turning vehicles into weapons, according to Stanford experts.

French authorities identified the man behind the wheel as Mohamed Lahouaiej Bouhlel, a 31-year-old immigrant from Tunisia who had lived in France since around 2005 and had been working as a delivery driver. Police shot him dead on the scene.

Martha Crenshaw, a senior fellow at Stanford’s Center for International Security and Cooperation (CISAC), said the fact that Bouhlel already had a commercial driver’s license gave him easy access to his weapon of choice.

“It was just unfortunate that he was somebody who already drove big trucks,” said Crenshaw.

“He did not have to go do something special, like train for a pilot’s license in the way that the 911 hijackers did, in order to acquire the means to kill people.”

Vehicles as tools of terror

Crenshaw said there had been around 30 incidents worldwide since 1994 where terrorists used vehicles as their primary weapon in attacks on civilians (not including car and truck bombs where explosives were used). Crenshaw noted that not all those vehicle attacks caused casualties.

If you include assaults on police and military targets, there have been more than 155 attacks where a vehicle has been used as a weapon in the way the truck was used in Nice, with over 75 of those attacks occurring in just the last three years, according to data from the National Consortium for the Study of Terrorism and Responses to Terrorism (START).

However, the exceptionally high number of casualties puts the attack in Nice in a league of its own. Most of the vehicle attacks on police and military only result in one or two casualties at a checkpoint or other hard target.

Stanford terrorism expert and former U.S. Special Forces Colonel Joe Felter said he was concerned that the attack in Nice “lowered the threshold” for aspiring terrorists who would be motivated to carry out copycat attacks.

“This was a disturbingly effective attack,” said Felter, a senior research scholar at CISAC.

“The message for would-be terrorists is that you don’t have to become a bomb maker to successfully execute a mass casualty attack. With a driver’s license and a credit card you can weaponize a rental truck.”

A challenge for law enforcement

Former CISAC fellow Terrence Peterson said it would be particularly difficult for law enforcement agencies to prevent terrorists from gaining access to vehicles.

“The types of people who would show up on other lists…like the no-fly list, are not going to show up when they rent a car,” said Peterson.

“A car is such a mundane object. How do you control using an everyday object for a terrorist attack? It’s nearly impossible.”

Al Qaeda had previously advocated using pickup trucks to target civilians, in the “Open Source Jihad” section of its propaganda magazine “Inspire.”

“The idea is to use a pickup truck as a mowing machine, not to mow grass but mow down the enemies of Allah,” according to a translation on the Web site MEMRI Cyber and Jihad Lab, which tracks jihadist postings online.

The article also advised would-be terrorists to, “pick your location and timing carefully. Go for the most crowded locations. Narrower spots are also better because it gives less chance for the people to run away…Therefore, it is important to study your path of operation before hand.”

French prosecutors said that Bouhlel carried out surveillance of the Promenade des Anglais prior to his attack there, and that he conducted online research into the mass shootings in Orlando and Dallas.

Murky motivations

It is still unclear what motivated Bouhlel. He had a history of domestic violence, psychological problems and money troubles, according to media reports. Acquaintances said the divorced father of three was not an outwardly religious Muslim. He reportedly drank alcohol, used drugs, ate pork and had sexual encounters with other men, all of which are forbidden under strict interpretations of Islam.

However, French authorities have suggested that he may have undergone a rapid conversion to radical Islam. And a Web site affiliated with the terror group ISIS has claimed Bouhlel as “a soldier of the Islamic State.”

[[{"fid":"223450","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"A reproduction of the picture on the residence permit of Mohamed Lahouaiej Bouhlel, the man who rammed his truck into a crowd celebrating Bastille Day in Nice on July 14.","field_file_image_alt_text[und][0][value]":"A reproduction of the picture on the residence permit of Mohamed Lahouaiej Bouhlel, the man who rammed his truck into a crowd celebrating Bastille Day in Nice on July 14.","field_file_image_title_text[und][0][value]":"A reproduction of the picture on the residence permit of Mohamed Lahouaiej Bouhlel, the man who rammed his truck into a crowd celebrating Bastille Day in Nice on July 14.","field_credit[und][0][value]":"AFP/Getty Images","field_caption[und][0][value]":"A reproduction of the picture on the residence permit of Mohamed Lahouaiej Bouhlel, the man who rammed his truck into a crowd celebrating Bastille Day in Nice on July 14.","field_related_image_aspect[und][0][value]":"","thumbnails":"crop_870xauto"},"type":"media","attributes":{"alt":"A reproduction of the picture on the residence permit of Mohamed Lahouaiej Bouhlel, the man who rammed his truck into a crowd celebrating Bastille Day in Nice on July 14.","title":"A reproduction of the picture on the residence permit of Mohamed Lahouaiej Bouhlel, the man who rammed his truck into a crowd celebrating Bastille Day in Nice on July 14.","width":"870","style":"width: 250px; height: 362px; float: right; margin-left: 15px","class":"media-element file-crop-870xauto"}}]]“It's plausible that the message of ISIS resonated with him as a Muslim immigrant living on the fringes of society, which would be consistent with my research team’s finding that people who feel “culturally homeless” experience a lack of purpose in their lives, which, in turn, is associated with stronger support for fundamentalist groups and causes,” said Sarah Lyons-Padilla, a Stanford research scientist in the Department of Psychology’s Center for Social Psychological Answers to Real-World Questions who’s studying the marginalization of Muslim immigrants at risk for radicalization.

The apocalyptic ideology of jihadist groups like the Islamic State (also known as “Daesh”) could be particularly appealing to “petty criminals, psychologically deranged or otherwise lost souls” such as Bouhlel, said David Laitin, James T. Watkins IV and Elise V. Watkins professor of Political Science.

“Spurred by Salafist propaganda, these recruits can work privately, away from any institutional connection with Daesh, to cause horror,” Laitin said.

“And many police forces are out of touch with vulnerable populations and are slow to identify potential recruits.”

"Confrontation is unavoidable"

Regardless of Bouhlel’s motivation, his attack would likely bolster the anti-immigrant agenda of France’s far-right political parties such as the National Front, which advocate policies such as closing the borders, exiting the European Union and deporting bi-nationals with links to Islamist groups, said Cécile Alduy, associate professor of French and an affiliated faculty member with the Europe Center at the Freeman Spogli Institute for International Studies.

“The attacks will only strengthen the feeling that the political elites in power failed, and that the National Front “told us so” and are the only ones left to trust,” Alduy said.

Patrick Calvar, the head of France’s counter-terrorism intelligence agency DGSI, warned earlier this year that the recent series of terror attacks on French soil could trigger “inter-ethnic clashes” between far-right vigilante groups and Muslims living in France.

“One or two more terrorist attacks” and “the confrontation [between the two sides] is unavoidable,” said Calvar.

Alduy said she feared the shift in French public opinion could make Calvar’s prediction more likely.

“An opinion poll…in March 2015 put “sadness” as the primary feeling that respondents identified with following the Charlie Hebdo attacks,” Alduy said.

“After the November attacks, it was “anger”, with “hatred” following closely for over 60% of them. Now what will it be?”

 

Hero Image
Police officers and rescue workers stand near the truck that Mohamed Lahouaiej Bouhlel drove into a crowd leaving a fireworks display in the French Riviera town of Nice on July 14, 2016, killing at least 84 people.
Police officers and rescue workers stand near the truck that Mohamed Lahouaiej Bouhlel drove into a crowd leaving a fireworks display in the French Riviera town of Nice on July 14, 2016, killing at least 84 people.
VALERY HACHE/AFP/Getty Images
All News button
1
Authors
News Type
News
Date
Paragraphs

It’s a quintessential Silicon Valley scene. A group of tech-savvy Stanford students are delivering a passionate pitch about a product they hope is going to change the world, while a room full of venture capitalists, angel investors and entrepreneurs peppers them with questions.

But there’s a twist. This Stanford classroom is also packed with decorated military veterans and active duty officers. And a group of analysts from the U.S. intelligence community is monitoring the proceedings live via an iPad propped up on a nearby desk.

These Stanford students aren’t just working on the latest “Uber for X” app. They’re searching for solutions to some of the toughest technological problems facing America’s military and intelligence agencies, as part of a new class called Hacking for Defense.

A student team briefs the class on a wearable sensor they're developing for an elite unit of U.S. Navy SEALs – a product they're pitching as "fitbit for America's divers." A student team briefs the class on a wearable sensor they're developing for an elite unit of U.S. Navy SEALs – a product they're pitching as "fitbit for America's divers."
“There’s no problems quite like the kind of problems that the defense establishment faces, so from an engineering standpoint, it has the most powerful ‘cool factor’ of anything in the world,” said Nitish Kulkarni, a senior in mechanical engineering.

Kulkarni’s team is working with an organization within the US Department of Defense to devise a system that will provide virtual assistance to Afghan and Iraqi coalition forces as they defuse deadly improvised explosive devices.

“At Stanford there’s a lot of opportunities for you to build things and go out and learn new stuff, but this was one of the first few opportunities I’ve seen where as a Stanford student and as an engineer, I can go and work on problems that will actually make a difference and save lives,” said Kulkarni.

A 21st century tech ROTC

That’s exactly the kind of “21st century tech ROTC” model of national service that Steve Blank, a consulting associate professor at Stanford’s Department of Management Science and Engineering, said he had in mind when he developed the class.

“The nation is facing a set of national security threats it’s never faced before, and Silicon Valley has not only the technology resources to help, but knows how to move at the speed that these threats are moving at,” said Blank.

MBA student Rachel Moore presents for Team Sentinel, which is working with the U.S. 7th Fleet to find better ways to analyze drone and satellite imagery. MBA student Rachel Moore presents for Team Sentinel, which is working with the U.S. 7th Fleet to find better ways to analyze drone and satellite imagery.
The students’ primary mission will be to produce products that can help keep Americans and our allies safe, at home and abroad, according to Blank.

Former U.S. Army Special Forces Colonel Joe Felter, who helped create the class and co-teaches it with Blank, said the American military needs to find new ways to maintain its technological advantage on the battlefield.

“Groups like ISIS, al–Qaeda and other adversaries have access to cutting edge technologies and are aggressively using them to do us harm around the world,” said Felter, who served in Iraq and Afghanistan and is currently a senior research scholar at Stanford’s Center for International Security and Cooperation (CISAC) and research fellow at the Hoover Institution.

“The stakes are high – this is literally life and death for our young men and women deployed in harm’s way. We’re in a great position here at Stanford and in Silicon Valley to help make the connections and develop the common language needed to bring innovation into the process, in support of the Department of Defense and other government agencies’ missions.”

Startup guru Steve Blank shares a light moment with a group of students. Startup guru Steve Blank shares a light moment with a group of students.
The class is an interdisciplinary mix of undergraduate and graduate students, from freshman to fifth year PhD student.

“It’s like a smorgasbord of all these people coming together from different parts and different schools of Stanford, and so I think that’s just a really cool environment to be in,” said Rachel Moore, a first-year MBA student.

Moore’s team includes electrical and mechanical engineering students, and they’re working together to develop a system to enable the Navy’s Pacific Fleet to automatically identify enemy ships using images from drones and satellites.

Tough technological challenges

Months before the course start date, class organizers asked U.S. military and intelligence organizations to identify some of their toughest technological challenges.

Class co-teacher Pete Newell throws his hands up to celebrate a student breakthrough. Class co-teacher Pete Newell throws his hands up to celebrate a student breakthrough.
U.S. Army Cyber Command wanted to know if emerging data mining, machine learning and data science capabilities could be used to understand, disrupt and counter adversaries' use of social media.

The Navy Special Warfare Group asked students to design wearable sensors for Navy SEALs, so they could monitor their physiological conditions in real-time during underwater missions.

Intelligence and law enforcement agencies were interested in software that could help identify accounts tied to malicious “catfishing” attempts from hackers trying to steal confidential information.

And those were just a few of the 24 problems submitted by 14 government agencies.

Developing Solutions

The class gives eight teams of four students 10 weeks to actively learn about the problem they are addressing from stake holders and end users most familiar with the problem and to iteratively develop possible solutions or  a “minimum viable product,” using a modified version of Steve Blank’s “lean launchpad methodology,” which has become a revered how-to guide among the Silicon Valley startup community.

Rachel Olney, a graduate student in mechanical engineering, tries on a military-grade dry suit on a visit to the 129th Rescue Wing at Moffett Field. Rachel Olney, a graduate student in mechanical engineering, tries on a military-grade dry suit on a visit to the 129th Rescue Wing at Moffett Field.
A key tenet of Blank’s methodology is what he calls the “customer discovery process.”

“If you’re not crawling in the dirt with these guys, then you don’t understand their problem,” Blank told the class.

One student team, which was working on real-time biofeedback sensors and geo-location devices for an elite team of Navy SEALS (a project they were initially pitching at “fitbit for America’s divers”), earned a round of applause from the class when they showed a slide featuring photos from a field trip they took to the 129th Rescue Wing at Moffett Field to find out what it felt like to wear a military-grade dry suit.

Rachel Olney, a graduate student in mechanical engineering, said the experience of squeezing into the tight suit and wearing the heavy dive gear gave her a better appreciation for the physical demands that Navy SEALs have to deal with during a mission.

“They’re diving down to like 200 feet for up to six to eight hours…and during that time they can’t eat, they can’t hydrate, they’re physically exerting a lot, because they’re swimming miles and miles and miles at depth and they can’t see and they can’t talk to each other,” Olney said.

Image
“It’s probably one of the most extreme things that humans do right now.”

Another group came in for some heavy criticism from the teaching team for failing to identify and interview enough end users.

But the next week, they were back in front of the class showing a video from a team member’s visit to an Air Force base in Fresno, where he logged some time inside the 90-pound bomb suit that explosive ordinance disposal units wear in the field.

“You can’t address a customer issue unless and until you really step into the shoes of the customer,” said Gaurav Sharma, who’s a student at Stanford's Graduate School of Business.

“That was the exact reason why I went to Fresno and wore the bomb suit, to get into the shoes of the end customer.”

Navigating the defense bureaucracy

Active duty military officers from CISAC’s Senior Military Fellows program and the Hoover Institution’s National Security Affairs Fellows program act as military liaisons for the class and help students navigate the complex defense bureaucracy.

Colonel John Cogbill, U.S. Army“[The students] have really just jumped in with both feet and immersed themselves in this Department of Defense world that for so many civilians is just very foreign to them,” said U.S. Army Colonel John Cogbill, who has spent the last year as a senior military fellow at CISAC.

“I think they will come away from this experience with a much better appreciation of what we do inside the Department of Defense and Intelligence community, and where there are opportunities for helping us do our jobs better.”

Cogbill said he hoped that some of the inventions from the class, like an autonomous drone designed to improve situational awareness for Special Forces teams, could help the troops on his next combat deployment, where he will serve as the Deputy Commanding Officer of the U.S. Army’s elite 75th  Ranger Regiment.

“It’s not just about making them more lethal, it’s also about how to keep them alive on the battlefield,” said Cogbill.

Students also get support from their project sponsors and personnel at the newly established Defense Innovation Unit Experimental (DIUx) stationed at Moffett Field.

Tech saves lives on the battlefield

Another key member of the teaching team is Pete Newell, who was awarded the Silver Star Medal (America’s third-highest military combat decoration), for leading a U.S. Army battalion into the Battle of Fallujah, where he survived an ambush and left the protection of his armored vehicle in an attempt to save a mortally wounded officer.

Class co-teacher and Silver Star Medal recipient Pete Newell explains some of the classic reasons why military products fail in the field. Class co-teacher and Silver Star Medal recipient Pete Newell explains some of the classic reasons why military products fail in the field.
Newell said he saw first-hand the difference that technology can make on the battlefield in his next job, when he served as director of the U.S. Army’s Rapid Equipping Force, which was tasked with creating technological solutions to the troops fighting in Afghanistan.

“What I realized is that the guys on the front edge of the battlefield who were actually fighting the fight, don’t have time to figure out what the problem is that they have to solve,” Newell said.

“They’re so involved in just surviving day to day, that they really don’t have time to step back from it and see those problems coming, and what they needed was somebody to look over their shoulder and look a little deeper and anticipate their needs.”

One of the first and most urgent problems Newell faced on the job was responding to the sudden spike in IED attacks on dismounted infantry.

The Army was still using metal detector technology from the ‘50s to find mines, but the new breed of IEDs, which were often hidden inside buried milk jugs, were virtually undetectable to the outdated technology.

Former U.S. Army Colonel Pete Newell demystifies some military jargon for the class. Former U.S. Army Colonel Pete Newell demystifies some military jargon for the class.
“They could create an improvised explosive device and a pressure plate trigger…by using almost zero metal content,” Newell said. “It was almost impossible to find.”

Newell’s solution was a handheld gradiometer, the kind of technology used to find small wires in your backyard during a construction project, paired with a ground penetrating radar that can see objects underground.

But by the time the new technology reached troops in the field last summer, more than 4,000 had been wounded or killed in IED attacks.

Newell said he hoped the class would help get life-saving technology deployed throughout the military faster.

“I think it’s important to enable this younger generation of technologists to actually connect with some of the national security issues we face and give them an opportunity to take part in making the world a safer place,” Newell said.

Tom Byers, an entrepreneurship professor in Management Science and Engineering and faculty director of the Stanford Technology Ventures Program, rounds out the teaching team and brings his experience in innovation education and entrepreneurship to the classroom.

Inspiring the next generation

Students said the opportunity to find solutions to consequential problems was their primary inspiration for joining the class.

“When I first came to Stanford, the hype around entrepreneurship was very much around, ‘go out, make an app, do something really fun and cool, and get rich’,” said Darren Hau, a junior in Electrical Engineering.

Students share a laugh during a class break. Students share a laugh during a class break.
“In Hacking for Defense, I think you’re seeing a lot of people bring that same entrepreneurial mindset into a problem statement that seems a lot more impactful.”

Felter said he was humbled that so many students were willing to serve in this way.

“It’s encouraging to find out that students at one of our top universities are very interested and highly motivated to work very hard and use their skills and expertise and talent and focus it on these pressing national security problems,” said Felter.

The teaching team said they planned on expanding their class to other universities across the country in the coming years, to create a kind of open source network for solving unclassified national security problems.

For military officers like Cogbill, who will likely soon be leading U.S. soldiers into combat, that’s welcome news.

“Every time you run a course, that’s eight more problems,” Cogbill said.

“If this scales across 10, 20, 30, 40 more universities, you can imagine how many more problems can be solved, and how many more lives can potentially be saved.”

 

Hero Image
Influential startup educator Steve Blank (center) gives advice to Stanford students working on tough national security problems, while retired U.S. Army Colonels and class co-teachers Joe Felter (right) and Pete Newell (left) listen in.
Influential startup educator Steve Blank (center) gives advice to Stanford students working on tough national security problems, while retired U.S. Army Colonels and class co-teachers Joe Felter (right) and Pete Newell (left) listen in.
Rod Searcey
All News button
1
Authors
News Type
News
Date
Paragraphs

The coordinated suicide bombings that killed more than 30 people and wounded 250 more at an international airport and downtown subway station in Brussels on Tuesday were “shocking but not surprising” and shared many of the hallmarks of previous European terror attacks, according to Stanford terrorism experts.

“My research shows that in general, terrorist plots in Europe involve larger numbers of conspirators than do plots in the United States,” said Martha Crenshaw, a senior fellow at Stanford’s Center for International Security and Cooperation (CISAC).

Belgian authorities said that as many as five people may have been directly involved in the bombings, including two Belgian-born brothers with violent criminal records, and that several suspects were linked to the same terrorist network that carried out the deadly Paris attacks last November.

“It is common for terrorist conspiracies anywhere to be formed from prior social groupings – friends and relatives,” said Crenshaw.

“The bonds that link individuals are not entirely ideological by any means. Criminal backgrounds are also not surprising. Indeed prison radicalization is a well-known phenomenon.”

A Notorious Neighborhood

Many of the suspects in the Brussels bombings had ties to the inner-city neighborhood of Molenbeek, a majority Muslim enclave of mostly Moroccan descent with a long history as a logistical base for jihadists.

[[{"fid":"222520","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_file_image_alt_text[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_file_image_title_text[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_credit[und][0][value]":"John Thys/AFP/Getty Images","field_caption[und][0][value]":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","field_related_image_aspect[und][0][value]":"","thumbnails":"crop_870xauto"},"type":"media","attributes":{"alt":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","title":"Belgian police stand guard in the Molenbeek district in Brussels during an operation to arrest Paris attacks suspect Salah Abdeslam on March 18, 2016.","width":"870","style":"width: 550px; float: right; height: 366px; margin-left: 15px;","class":"media-element file-crop-870xauto"}}]]French and Belgian police arrested Salah Abdesalam, who had been identified as the last surviving member of the ten-man team responsible for the Paris attacks and an apparent associate of the Brussels bombers, near his family home in Molenbeek just four days before the Brussels attacks.

“Brussels and particularly Molenbeek is one of those places that comes up a lot when you’re talking about counter terrorism,” said Terrence Peterson, a postdoctoral fellow at CISAC.

“You do have terrorism networks that use these areas, in the same way that organized crime does, to thrive…It seems to be the place where all the networks are locating in part because Belgian security hasn’t been very effective in fighting terrorism.”

Foreign Fighters Bring the War Home

Belgium is a small nation, with a population of around 11 million people, but it has the highest per capita percentage of any Western country of foreign fighters who have joined the battle in Iraq and Syria, according to a recent report, which estimated the total number at 440.

“People were even saying it was not a matter of if, but when Belgium was attacked,” said Joe Felter, a CISAC senior research scholar and former Colonel in the U.S. Army Special Forces.

“You’ve got a high concentration of radicalized individuals in that neighborhood of Brussels, so logistically it was easier for them to recruit, plan and coordinate the execution of these attacks. Local residents loading up explosive packed suitcases in a cab and driving across town to the airport exposes them to much less risk of compromise than would a plot requiring cross border preparation and movement by foreign citizens.”

Felter said he was concerned that the Brussels bombings, for which the Islamic State group has claimed responsibility, would inspire copycat attacks in other countries.

“The real risk now is these home-grown, self-directed terrorist attacks,” he said.

“A successful attack like this, with all its media attention and publicity, is only going to inspire and motivate more attempts going forward.”

Former U.S. Secretary of State and presidential candidate Hillary Clinton delivers a foreign policy address at Stanford's Freeman Spogli Institute for International Studies on March 23, 2016. Former U.S. Secretary of State and presidential candidate Hillary Clinton delivers a foreign policy address at Stanford's Freeman Spogli Institute for International Studies on March 23, 2016.
Former U.S. Secretary of State and presidential candidate Hillary Clinton said European nations needed to do a better job of sharing intelligence to track foreign fighters as they returned home, during a foreign policy speech at Stanford’s Freeman Spogli Institute for International Studies on Wednesday.

“The most urgent task is stopping the flow of foreign fighters to and from the Middle East,” Clinton said.

“Thousands of young recruits have flocked to Syria from France, Germany, Belgium and the United Kingdom. Their European passports make it easier for them to cross borders and eventually return home, radicalized and battle-hardened. We need to know the identities of every fighter who makes that trip and start revoking their passports and visas.”

Turkey’s president announced at a press conference on Wednesday that his country had deported one of the suspected Brussels bombers back to the Netherlands last year with a clear warning that he was a jihadi.

Identifying Hot Spots

Clinton said authorities also needed to work to improve social conditions in problem areas such as Molenbeek.

“There…has to be a special emphasis on identifying and investing in the hot spots, the specific neighborhoods, prisons and schools where recruitment happens in clusters as we’ve seen in Brussels,” Clinton said.

Other European countries such as Denmark, which has also been struggling to deal with a high percentage of foreign fighters, are trying to proactively to discourage citizens from travelling to Syria to fight, said Anja Dalgaard-Nielsen, former executive director of the Danish Security and Intelligence Service and a CISAC affiliate.

“Politicians are likely to talk about tougher legislation, but there are also measured voices, calling for a strong, long term preventive effort against radicalization to prevent problems from growing out of hand,” said Dalgaard-Nielsen.

Cover of the book "Why Muslim Integration Fails in Christian-Heritage Societies" co-authored by Stanford Political Science professor David Laitin. Cover of the book "Why Muslim Integration Fails in Christian-Heritage Societies" co-authored by Stanford Political Science professor David Laitin.
“Police need to prioritize community outreach and long term trust building to try to ensure the collaboration of minority groups and socioeconomically disadvantaged communities in the effort against terrorism.”

Stanford political science professor David Laitin, who recently published the book “Why Muslim Integration Fails in Christian-Heritage Societies,” in collaboration with Claire Adida and Marie-Anne Valfort, said his research found that Muslims faced higher discrimination in the economy, in society and in the political process compared to Christians from similar immigrant backgrounds.

“But there is no evidence that higher degrees of discrimination lead Muslims into the unspeakable acts that members of an inhuman cult are performing in the name of Islam,” said Laitin, who is the James T. Watkins IV and Elise V. Watkins professor in the School of Humanities and Sciences.

“From what we have tragically seen, the attractiveness of the present murderous cult does not derive from everyday discrimination," he said. "Research has shown that it is not the poor and downtrodden who are radicalized in this way; but rather reasonably educated second-generation immigrants from largely secular backgrounds.”

Europe Divided

Laitin said he expected to see many European countries tighten their border controls in response to the Brussels attacks, as well as greater support in the United Kingdom for the movement to leave the European Union in the upcoming referendum.

“The biggest short-term effect, in my judgment, will be the erosion of one of the great achievements of European integration, namely Schengen, which promised open borders throughout the continent,” Laitin said.

“I foresee greater security walls that will come to divide European countries.”

Fighting a Hostile Ideology

Felter said that while it was undoubtedly important to improve intelligence sharing and invest in greater security measures as part of concerted efforts to target ISIS and interdict future terrorist plots, the key to undermining support for and defeating ISIS was combating its perverted version of Islam.

And, he said, that effort would have to come largely from within the Islamic community itself.

“The symptoms may be suicide bombers in airports, but the root cause is this hostile ideology that’s being pushed on these at-risk individuals through aggressive radicalization and recruitment efforts carried out largely via the internet that then inspires them to carry out these self-directed, ISIS-inspired attacks,” Felter said.

“There’s got to be a longer-term effort to address the root causes of this, to discredit and delegitimize the appeal of this ideology that they’re promulgating online and through social media that’s inspiring these young men and women to go off and commit these horrible acts in the misguided belief that it is their religious obligation to do so.”

 

Hero Image
A woman arrives with flowers at a cordoned-off area near Maelbeek subway station in Brussels on March 23, 2016, a day after bomb attacks in the Belgian capital killed about 35 people and left more than 200 people wounded.
A woman arrives with flowers at a cordoned-off area near Maelbeek subway station in Brussels on March 23, 2016, a day after bomb attacks in the Belgian capital killed about 35 people and left more than 200 people wounded.
Kenzo Tribouillard/AFP/Getty Images
All News button
1
-

Abstract: For four years running now, the Director of National Intelligence’s Worldwide Threat Assessment to Congress has led with cyber threats to national and international security.  Under statute, the several National Intelligence Officers constitute the most senior advisors of the US Intelligence Community in their areas of expertise.  This discussion with the National Intelligence Officer for Cyber Issues will begin by highlighting the technology trends that are having a transformational change on cyber security and the future of intelligence.  It will then assess strategic developments in international relations and their implications for deterring malicious activity in cyberspace.  The analysis will focus on the (in)applicability of existing arms control mechanisms and deterrence principles to modern information and communication technologies.

About the Speaker: Sean Kanuck was appointed as the first National Intelligence Officer for Cyber Issues in May 2011.  Mr. Kanuck came to the National Intelligence Council after a decade of experience in the Central Intelligence Agency’s Information Operations Center, including both analytic and field assignments.  In his Senior Analytic Service role, he was a contributing author for the 2009 White House Cyberspace Policy Review, an Intelligence Fellow with the Directorates for Cybersecurity and Combating Terrorism at the National Security Council, and a member of the United States delegation to the United Nations Group of Governmental Experts on international information security.

Prior to government service, Mr. Kanuck practiced law with Skadden Arps et al. in New York, where he specialized in mergers and acquisitions, corporate finance, and banking matters.  He is a member of the International Institute for Strategic Studies, and his academic publications focus on information warfare and international law.  Mr. Kanuck holds degrees from Harvard University (A.B., J.D.), the London School of Economics (M.Sc.), and the University of Oslo (LL.M.).

Sean P. Kanuck National Intelligence Officer for Cyber Issues (until April 2016) Office of the Director of National Intelligence
Seminars
-

- Please note that this is a joint CISAC/Science seminar -

Join Chairman of the National Intelligence Council (NIC) Greg Treverton for a discussion on the NIC's work and how it connects to U.S. policy and wider global forecasting, along with a preview of the NIC's upcoming Global Trends report. 

About the Speaker: Dr. Treverton started his duties as Chairman of the National Intelligence Council on September 8, 2014. Prior to his selection, Treverton held several leadership positions at RAND Corporation, including director of the RAND Center for Global Risk and Security, director of the International Security and Defense Policy Center, and associate dean of the Pardee RAND Graduate School. His work at RAND examined terrorism, intelligence and law enforcement, as well as new forms of public–private partnership. 

Treverton has served in government for the first Senate Select Committee on Intelligence, handling Europe for the National Security Council and later, as vice chair of the National Intelligence Council (1993–1995), overseeing the writing of America's National Intelligence Estimates. 

His RAND publications on intelligence include: “Reorganizing U.S. Domestic Intelligence: Assessing the Options” (2008), “Assessing the Tradecraft of Intelligence Analysis” (with C. Bryan Gabbard, 2008) and “The Next Steps in Reshaping Intelligence” (2005). Two books, Intelligence for an Age of Terror and Reshaping National Intelligence for an Age of Information, were published by Cambridge University Press in 2009 and 2001, respectively. 

Treverton holds an A.B. summa cum laude from Princeton University and an M.P.P. and Ph.D. in economics and politics from Harvard University. 

Gregory Treverton Chairman National Intelligence Council
Seminars
Subscribe to Intelligence