Science and Technology
Paragraphs

Abstract:

Electrical grids have long depended upon information infrastructures—systems for exchanging information about electricity generation, transmission, distribution, and use. But only in the last decade has the notion of a “smart grid” captured the imagination of policymakers, business leaders, and technologists. Smart grid promoters promise that information technology will simultaneously improve the efficiency, reliability, and security of the grid. This article shows how these goals have come into tension as the grid’s information infrastructure has shaped, and been shaped by, government policies. It advances a three-part argument. First, digital technology and digital utopianism played a significant and underanalyzed role in restructuring the electricity industry during the 1980s and 1990s. Second, industry restructuring encouraged utilities to deploy information technology in ways that sacrificed reliability, security, and even physical efficiency for economic efficiency. Third, aligning the many goals for a smart grid will require heterogeneous engineering—designing sociopolitical and technological worlds together.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Information and Culture
Authors
Rebecca Slayton
Paragraphs

Affiliate John Villasenor explains how the American legal framework has not yet caught up to technological progress and how the U.S. Supreme Court may reconsider legal privacy decisions that have been on the books since the 1970s. 

Villasenor explains why legal experts and some Supreme Court justices are becoming increasingly concerned about the third-party doctrine, which allows the government to access any information voluntarily given to a third party without a warrant. In an interconnected world of cloud-based services, GPS and pocket-sized technology, expectations about personal privacy may need to be reconsidered. 

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
The Atlantic
Authors
John Villasenor
Paragraphs

CISAC Affiliate and Forbes Contributor Jennifer Granick explains how NSA domestic surveillance activities might continue, even in the face of legal decisions to rein in the agency's activities. 

Even after the District Court for the District of Columbia ruled that the bulk collection of phone metadata violated the Fourth Amendment, Deputy Attorney General James Cole signaled that the NSA's behavior change will depend on how the court interprets provisions in the legislation.

Granick argues that Cole's comments reflect the Executive Branch's increasing dismissal of Congressional oversight. This trend threatens more than just individual privacy. 

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Forbes
Authors
News Type
News
Date
Paragraphs

CISAC Honors Student Mailyn Fidler has been awarded a Marshall Scholarship to continue her studies in international technology policy. She investigates security implications of the global trade in "zero-day" software exploits. Fidler has also worked as a consultant for Google Glass, autonomous vehicles and Internet access through atmospheric balloons, and was the co-founder and co-editor-in-chief of the Stanford Journal of Public Health.

Marshall Scholarships are named for former U.S. Secretary of State and U.S. Army General George Marshall, and are given to intellectually distinguished Americans to study in Britain.

Hero Image
RSD13 085 0043a logo Rod Searcey
All News button
1
-

About the Topic: The Internet in 2014 is a marvelous communication utility. It provides cheap and fast transfer of information to and from most places on or near the surface of Earth. It also regularly betrays that information to curious onlookers, commercial entities, criminals, and governments.  We will explore the origins of the Internet, the workings of its core protocols, exploits which take advantage of those protocols, and feeble attempts to make those protocols secure. In sum, we will describe the devolution of the Internet from a peaceful commons to the jungle it is today.

About the Speaker: Tom Berson is a CISAC affiliate and the founder of Anagram Laboratories. He is a cryptographer who views cryptography broadly as the science and ethics of trust and betrayal. He has spent his career working both the defensive and the offensive sides of the information security battle and is attracted most strongly to security issues raised at the confluence of technology, business, and world events.

Tom is a student of Sun Tzu’s Art of War and its applicability to modern information conflict. He was the first person to be named a Fellow of the International Association for Cryptologic Research. His citation reads, “For visionary and essential service and for numerous valuable contributions to the technical, social, and commercial development of cryptology and security.” He was an editor of the Journal of Cryptology for fourteen years. He is a Past-Chair of the IEEE Technical Committee on Security and Privacy.

Tom earned a B.S. in physics from the State University of New York in 1967 and a Ph.D. in computer science from the University of London in 1977. He was a Visiting Fellow in Mathematics in the University of Cambridge, and is a life member of Clare Hall, Cambridge. Tom has been a member of several National Research Council committees: including the Committee on Computer Security in the Department of Energy, the Committee to Review DoD C4I Plans and Programs, and the Committee on Offensive Information Warfare. 

CISAC Conference Room

Tom Berson CISAC Affiliate; Founder, Anagram Laboratories Speaker
Seminars
-

More information TBA.

CISAC Conference Room

0
Affiliate
slayton_headshot.jpg PhD

Slayton’s research and teaching examine the relationships between and among risk, governance, and expertise, with a focus on international security and cooperation since World War II. Slayton’s current book project, Shadowing Cybersecurity, examines the historical emergence of cybersecurity expertise. Shadowing Cybersecurity shows how efforts to establish credible expertise in corporate, governmental, and non-governmental contexts have produced varying and sometimes conflicting expert practices. Nonetheless, all cybersecurity experts wrestle with the irreducible uncertainties that characterize intelligent adversaries, and the fundamental inability to prove that systems are secure. The book shows how cybersecurity experts have paradoxically gained credibility by making threats and vulnerabilities visible, while acknowledging that more always remain in the shadows.

Slayton’s first book, Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012 (MIT Press, 2013), shows how the rise of a new field of expertise in computing reshaped public policies and perceptions about the risks of missile defense in the United States. In 2015, Arguments that Count won the Computer History Museum Prize. In 2016, Slayton was awarded a National Science Foundation CAREER grant for her project “Enacting Cybersecurity Expertise.” In 2019, Slayton was also a recipient of the United States Presidential Early Career Award for Scientists and Engineers, for her NSF CAREER project.

CV
Date Label
Rebecca Slayton Junior Faculty Fellow Speaker
Seminars
-

More information TBA. 

CISAC Conference Room

Scott Fendorf Terry Huffington Professor of Earth Systems; Department Chair; Senior Fellow, Woods Institute for the Environment, Stanford Speaker
Seminars
-

Abstract:

Nipah virus lives in large fruit bats in South and Southeast Asia. When people become infected with Nipah virus over half of them die. Nipah virus can also be transmitted from person to person. This talk will describe how this bat virus occasionally infects human populations and causes outbreaks through person-to-person transmission. It will explore the risk of a global pandemic of Nipah virus and consider appropriate policy responses.

Speaker bio:

Stephen Luby is Professor of Medicine in the Division of Infectious Diseases and Geographic Medicine; Deputy Director for Research at the Center for Global Health Innovation; Senior Fellow at the Woods Institute for the Environment and Senior Fellow at the Freeman Spogli Institute for International Studies at Stanford University.

Dr. Luby studied philosophy and earned a Bachelor of Arts summa cum laude from Creighton University. Dr. Luby earned his medical degree from the University of Texas Southwestern Medical School at Dallas and completed his residency in internal medicine at the University of Rochester-Strong Memorial Hospital. He studied epidemiology and preventive medicine at the Centers for Disease Control and Prevention.

Dr. Luby's former positions include leading the Epidemiology Unit of the Community Health Sciences Department at the Aga Khan University in Karachi, Pakistan for 5 years and working as a Medical Epidemiologist in the Foodborne and Diarrheal Diseases Branch of the Centers for Disease Control and Prevention exploring causes and prevention of diarrheal disease in settings where diarrhea is a leading cause of childhood death.  Immediately prior to his current appointment, Dr. Luby served for eight years at the International Centre for Diarrheal Diseases Research, Bangladesh (ICDDR,B), where he directed the Centre for Communicable Diseases. Dr. Luby was seconded from the US Centers for Disease Control and Prevention (CDC) and was the Country Director for CDC in Bangladesh.

Dr. Luby's research has focused on clarifying the burden of several communicable diseases in low income countries and developing and evaluating practical strategies to mitigate their impact. He is currently exploring circumstances where economic and political forces encourage environmental degradation that exerts substantial disease burden in low income countries, with a view to developing and evaluating interventions.

CISAC Central Conference Room

Stephen Luby Senior Fellow, Stanford Woods Institute for the Environment; Sr. Fellow, Freeman Spogli Inst. for International Studies; Research Deputy Director for the Stanford Univ. Center for Innovation in Global Health; Prof. of Medicine, Infectious Diseases Speaker
Seminars
-

Africa (Proceedings of the National Academy of Sciences 2013): USAID and the UN's World Food Program have proposed strategies for allocating ready-to-use (therapeutic and supplementary) foods to children in developing countries. Analysis is needed to investigate whether there are better alternatives. We use a longitudinal data set of 5657 children from Bwamanda to construct a statistical model that tracks each child's height and weight  throughout the first five years of life. We embed this model into an optimization framework that chooses which individual children should receive food based on a child's sex, age, height and weight, to minimize the mean number of disability-adjusted life years per child subject to a budget constraint. Our proposed policy compares favorably to those proposed by the aid groups. Time permitting, we will also discuss a recent analysis of a nutrition program in Guatemala that quantifies the age dependence in the impact of supplementary food, and develops a food allocation policy that exploits this age dependence and reduces child stunting.

India: Motivated by India's nationwide biometric program for social inclusion, we analyze verification (i.e., one-to-one matching) in the case where we possess 12 similarity scores (for 10 fingerprints and two irises) between a resident's biometric images at enrollment and his biometric images during his first verification. At subsequent verifications, we allow individualized strategies based on these 12 scores: we acquire a subset of the 12 images, get new scores for this subset that quantify the similarity to the corresponding enrollment images, and use the likelihood ratio to decide whether a resident is genuine or an imposter. Compared to the policy currently used in India, our proposed policy provides a five-log (i.e., 100,000-fold) reduction in the false reject rate while only increasing the mean delay from 31 to 38 seconds.

A full speaker bio is available on CISAC's website. 

CISAC Conference Room

Graduate School of Business
Stanford University
Stanford, CA 94305-5015

(650) 724-1676 (650) 725-0468
0
Jeffrey S. Skoll Professor of Management Science
CISAC Affiliated Faculty Member
Wein.jpg PhD

Lawrence Wein is the Jeffrey S. Skoll Professor of Management Science at the Graduate School of Business, Stanford University, and an affiliated faculty member at CISAC. After getting a PhD in Operations Research from Stanford University in 1988, he spent 14 years at the Sloan School of Management at MIT, where he was the DEC Leaders for Manufacturing Professor of Management Science. His research interests include mathematical models in operations management, medicine and biology.

Since 2001, he has analyzed a variety of homeland security problems. His homeland security work includes four papers in Proceedings of the National Academy of Sciences, on an emergency response to a smallpox attack, an emergency response to an anthrax attack, a biometric analysis of the US-VISIT Program, and an analysis of a bioterror attack on the milk supply. He has also published the Washington Post op-ed "Unready for Anthrax" (2003) and the New York Times op-ed "Got Toxic Milk?", and has written papers on port security, indoor remediation after an anthrax attack, and the detention and removal of illegal aliens.

For his homeland security research, Wein has received several awards from the International Federation of Operations Research and Management Science (INFORMS), including the Koopman Prize for the best paper in military operations research, the INFORMS Expository Writing Award, the INFORMS President’s Award for contributions to society, the Philip McCord Morse Lectureship, the Frederick W. Lanchester Prize for best research publication, and the George E. Kimball Medal. He was Editor-in-Chief of Operations Research from 2000 to 2005, and was elected to the National Academy of Engineering in 2009.   

CV
Lawrence Wein Jeffrey S. Skoll Professor of Management Science; CISAC Affiliated Faculty Member Speaker
Seminars
Subscribe to Science and Technology