Homeland Security
-

Abstract: For four years running now, the Director of National Intelligence’s Worldwide Threat Assessment to Congress has led with cyber threats to national and international security.  Under statute, the several National Intelligence Officers constitute the most senior advisors of the US Intelligence Community in their areas of expertise.  This discussion with the National Intelligence Officer for Cyber Issues will begin by highlighting the technology trends that are having a transformational change on cyber security and the future of intelligence.  It will then assess strategic developments in international relations and their implications for deterring malicious activity in cyberspace.  The analysis will focus on the (in)applicability of existing arms control mechanisms and deterrence principles to modern information and communication technologies.

About the Speaker: Sean Kanuck was appointed as the first National Intelligence Officer for Cyber Issues in May 2011.  Mr. Kanuck came to the National Intelligence Council after a decade of experience in the Central Intelligence Agency’s Information Operations Center, including both analytic and field assignments.  In his Senior Analytic Service role, he was a contributing author for the 2009 White House Cyberspace Policy Review, an Intelligence Fellow with the Directorates for Cybersecurity and Combating Terrorism at the National Security Council, and a member of the United States delegation to the United Nations Group of Governmental Experts on international information security.

Prior to government service, Mr. Kanuck practiced law with Skadden Arps et al. in New York, where he specialized in mergers and acquisitions, corporate finance, and banking matters.  He is a member of the International Institute for Strategic Studies, and his academic publications focus on information warfare and international law.  Mr. Kanuck holds degrees from Harvard University (A.B., J.D.), the London School of Economics (M.Sc.), and the University of Oslo (LL.M.).

Sean P. Kanuck National Intelligence Officer for Cyber Issues (until April 2016) Office of the Director of National Intelligence
Seminars
-

- Please note that this is a joint CISAC/Science seminar -

Join Chairman of the National Intelligence Council (NIC) Greg Treverton for a discussion on the NIC's work and how it connects to U.S. policy and wider global forecasting, along with a preview of the NIC's upcoming Global Trends report. 

About the Speaker: Dr. Treverton started his duties as Chairman of the National Intelligence Council on September 8, 2014. Prior to his selection, Treverton held several leadership positions at RAND Corporation, including director of the RAND Center for Global Risk and Security, director of the International Security and Defense Policy Center, and associate dean of the Pardee RAND Graduate School. His work at RAND examined terrorism, intelligence and law enforcement, as well as new forms of public–private partnership. 

Treverton has served in government for the first Senate Select Committee on Intelligence, handling Europe for the National Security Council and later, as vice chair of the National Intelligence Council (1993–1995), overseeing the writing of America's National Intelligence Estimates. 

His RAND publications on intelligence include: “Reorganizing U.S. Domestic Intelligence: Assessing the Options” (2008), “Assessing the Tradecraft of Intelligence Analysis” (with C. Bryan Gabbard, 2008) and “The Next Steps in Reshaping Intelligence” (2005). Two books, Intelligence for an Age of Terror and Reshaping National Intelligence for an Age of Information, were published by Cambridge University Press in 2009 and 2001, respectively. 

Treverton holds an A.B. summa cum laude from Princeton University and an M.P.P. and Ph.D. in economics and politics from Harvard University. 

Gregory Treverton Chairman National Intelligence Council
Seminars
Paragraphs

Despite the tempting similarities, the analogy between nuclear and cyber weapons is presently flawed. High-ranking officials that are using it as the basis for policies of deterrence in cyberspace are making a potentially dangerous misjudgment. Given the wide-open future of cyber warfare, it would make sense to expand the analogy to include other revolutionary military technologies to provide the conceptual flexibility necessary to confront the presently unforeseeable challenges that lie ahead in cyberspace.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Bulletin of the Atomic Scientists
Authors
Patrick Cirenza
-

Abstract

Under Secretary Sewall will deliver remarks on Countering Violent Extremism, the U.S. Government’s comprehensive approach for preventing the spread of ISIL and emergence of new terrorist threats. The Under Secretary will describe how the evolution of violent extremism since the 9/11 attacks necessitates a “whole of society” approach to prevent people from aligning with terrorist movements and ideologies in the first place. Drawing on recent travel to Indonesia, India, and Egypt, the Under Secretary will describe the vital role of actors outside government in this approach, including women, youth, religious leaders, businesses, and researchers. She will also elaborate on new steps the U.S. Government is taking to intensify its CVE efforts around the world. The Under Secretary will also take questions from the audience.

Speaker bio

Image
sarah sewall

Dr. Sarah Sewall is the Under Secretary for Civilian Security, Democracy, and Human Rights at the U.S. State Department, and is a longtime advocate for advancing civilian security and human rights around the world. Dr. Sewall was sworn in on February 20, 2014. She serves concurrently as the Special Coordinator for Tibetan Issues. Over the previous decade, Dr. Sewall taught at the Harvard Kennedy School of Government, where she served as Director of the Carr Center for Human Rights Policy and directed the Program on National Security and Human Rights.

Dr. Sewall has extensive experience partnering with the U.S. armed forces around civilian security. At the Kennedy School, she launched the MARO (Mass Atrocities Response Operations Project) to assist the U.S. military with contingency planning to protect civilians from large-scale violence. She was a member of the Defense Policy Board and served as the Minerva Chair at the Naval War College in 2012. She also led several research studies of U.S. military operations for the Department of Defense and served as the inaugural Deputy Assistant Secretary of Defense for Peacekeeping and Humanitarian Assistance in the Clinton Administration. Prior joining the executive branch, Dr. Sewall served for six years as the Senior Foreign Policy Advisor to U.S. Senate Majority Leader George J. Mitchell and earned a Ph.D at Oxford University, where she was a Rhodes Scholar.

This event is co-sponsored by Stanford in Government and CISAC

 

[[{"fid":"222126","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"Sewall Flyer","field_file_image_alt_text[und][0][value]":"","field_file_image_title_text[und][0][value]":"","field_credit[und][0][value]":"","field_caption[und][0][value]":"","field_related_image_aspect[und][0][value]":"","thumbnails":"crop_870xauto"},"type":"media","attributes":{"width":"870","class":"media-element file-crop-870xauto"}}]]

Dr. Sarah Sewall Under Secretary for Civilian Security, Democracy, and Human Rights U. S. State Department
Lectures
Authors
Steve Fyffe
News Type
News
Date
Paragraphs

 

 

Deborah Lee James U.S. Secretary of the Air Force Deborah Lee James speaks at a roundtable on cyber policy at Stanford University on January 6, 2016.

 

The U.S. military needs to train and recruit more “cyber warriors,” and improve its offensive and defensive capabilities in cyberspace, Secretary of the Air Force Deborah Lee James said during a visit to Stanford University last week.

“Today we’re not sufficiently strategizing, organizing, training or equipping to be cyber warriors,” James said at a roundtable discussion on cyber policy. “We’ve made progress over the last year or two, but it’s not good enough. We need to do more, to be open to different ways of bringing people on and retaining people so we can bring the best and brightest into our ranks.”

She called on Silicon Valley to “move past the debate over Edward Snowden and the debate over encryption” and help the military combat cyber threats to U.S. national security. “Particularly here in Silicon Valley, how can we get better access…and work better with some of the great innovations here in Silicon Valley?” she asked.

Deborah Lee James U.S. Secretary of the Air Force Deborah Lee James (left) meets with former Secretary of Defense William J. Perry (second from right) and former Secretaries of State Condoleezza Rice and George P. Shultz (far right) during a visit to Stanford University on January 6, 2016.

Stanford University was just one of the stops on James’ schedule, which also included meetings at Google, Facebook, FireEye and In-Q-Tel (the investment arm of the U.S. intelligence community).

James said she’d come to Silicon Valley to “listen and learn” and search for “the next big thing” – from drones to big data.

“We’re actively on the hunt for what will be our next advantage as the military,” she said.

She said the military was working to streamline its procurement process so it could move more quickly fund new technological development using what she called “rapid acquisition.”

“You can’t build the next fighter aircraft under this, but you can build smaller types of technological products and get something under contract within 30 days,” she said.

Protecting networked weapons systems and critical infrastructure at military bases were two top priorities for the Air Force, James said.

It is also working to develop better defensive capabilities to protect satellites and other assets in space, and prevent adversaries from disabling critical missile warning and global positions systems, James said.

“Space had been a fairly tranquil, uncontested area,” she said.

“Nowadays, space is much more contested and congested. There are many more companies and countries up there.

“If a conflict on earth bleeds into space in some way, how do we defend our constellation?”

Military operations centers will need to integrate more cyber capabilities in order to create more options for defense and offense, James said.

“What we need in future is a multi-domain operations center where we’re fully plugged in terms of cyber and space...so that a commander at every turn has military options that go beyond bombing a target,” she said.

“The President, the Secretary of Defense, everybody is pressing, ‘We want more options. We want more targets.’.”

But James acknowledged that even digital conflict could cause collateral damage in the physical world.

“Let’s say we take out a power grid to shut down a particular part of a country to stop a military action,” she said.  “Maybe you’d shut off power to a hospital and people would die.”

That’s why cyber operations would continue to be governed by the law of armed conflict.

“Before a cyber target would be hit, there would be a legal decision with other parts of the government,” James said. “It’s not solely [up to] a commander on the scene.”

In an indication of the growing importance of cyber operations, political and military leadership in Washington are considering elevating U.S. Cyber Command from under U.S. Strategic Command to become its own unified command, James said.

The Air Force currently has around 1,700 personnel working directly on cyber offense and defense, spread among the National Guard, Reserves and active duty. And it recently established a new Cyber College at Air University on Maxwell Air Force base in Montgomery, Alabama to train more internal talent.

But military leaders are also looking for other ways to scale up their cyber forces, James said.

“Maybe leveraging the private sector and leveraging Silicon Valley can help us,” she said.

Hero Image
All News button
1
Paragraphs

Brad Roberts's book is a counter to the conventional wisdom that the United States can and should do more to reduce both the role of nuclear weapons in its security strategies and the number of nuclear weapons in its arsenal.  

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Stanford University Press
Authors
Brad Roberts
Authors
Brad Roberts with Steve Fyffe
News Type
Q&As
Date
Paragraphs

 

Image
b 2 stealth bomber 3 dod 759591 v yjw78 669

 

This book is a counter to the conventional wisdom that the United States can and should do more to reduce both the role of nuclear weapons in its security strategies and the number of nuclear weapons in its arsenal.  That conventional wisdom, argues Brad Roberts in The Case for Nuclear Weapons in the 21st Century, has not been informed by the experience of the United States since the Cold War in trying to adapt deterrence to a changed world or of the Obama administration to create the conditions that would allow further significant changes to U.S. nuclear policy and posture.  A CISAC affiliate, Roberts served as Deputy Assistant Secretary of Defense for Nuclear and Missile Defense Policy during the first Obama administration. He wrote the book, which draws heavily on his experience in government, during his time as a consulting professor and William J. Perry fellow at CISAC in 2014. To purchase the book, please visit: http://www.sup.org/books/title/?id=26137

Why did you write this book?

My main purpose was to reclaim the middle in the U.S. nuclear policy debate.  As in so much of the rest of our national political life, the middle has disappeared from this particular debate, leaving two deeply antagonistic camps to dominate it. One favors more disarmament now, while the other sees many enduring roles for U.S. nuclear weapons. The division didn’t matter so long as the United States could live off the investments of the Cold War.  It can no longer do so, as old weapons and delivery systems age out and expensive decisions must be made.  A coherent and centrist approach is needed to guide national choices, and this book attempts to fill that gap.

 

What is your main argument?

That the conditions do not now exist for the United States to safely take additional steps to further reduce the number and role of U.S. nuclear weapons. The Obama administration set out a strategy for creating those conditions in 2009, and the results have been disappointing. Russia has rejected further arms control. China has rejected further transparency.  Others have refused to join an international consensus against nuclear weapons. This experience must temper enthusiasm for the disarmament project. The conditions do not exist and are not proximate.

 

What is the case against nuclear weapons? And why do you think the case for nuclear weapons is more compelling?

The case against nuclear weapons has been made on many grounds:  historical (‘these are nothing more than cold war relics’), moral (‘their use in war would violate the laws of war so deterrence is immoral as well’), and prudential (‘we can’t prove that deterrence works but we can prove that these are dangerous weapons’). The case for nuclear weapons derives first and foremost from the role the United States wants to play in the world—as a security guarantor to others and a projector of power to promote stability and our values. In today’s world, without nuclear weapons, the United States could not play that role.

 

Can you ever imagine a scenario where the U.S. would need to use nuclear weapons again?

We don't have nuclear weapons to fight and win wars with them; we have nuclear weapons to ensure they are never used against us or our allies—in other words, for deterrence.  The President would only consider the employment of nuclear weapons in extreme circumstances when the vital interests of the United States or an ally are at risk. Though extreme, such circumstances are not implausible. The cold-war vintage bolt-from-the-blue major strike isn’t the potential problem today; rather, the problem is a regional conflict that goes badly for an adversary who then tries to escalate his way out of failed aggression against a U.S. ally. At least three nuclear-armed potential adversaries have now long studied the common problem they face:  deterring and defeating a conventionally-superior nuclear-armed major power and its allies. They have developed theories of victory built around nuclear coercion, blackmail, and brinksmanship, aimed at breaking the will of the United States and its allies, including with limited nuclear strikes to demonstrate their resolve. Our deterrence strategy requires that we have an effective ability to respond and that the threat to employ it in the circumstances they create is credible. Moreover, let us distinguish the verb “employ” from “use.” U.S. nuclear weapons are used every day to cast a shadow of doubt over the thinking of potential challengers to U.S. interests and to assure our allies. 

 

President Obama set out a vision for a world free of nuclear weapons at a speech in Prague in April, 2009. Does your book contradict the President’s strategic vision?

President Obama is a pragmatist and this was reflected in the Prague speech. In 2009, we took some steps to reduce the role and number of nuclear weapons and set out a plan for working with others to create the conditions for further reductions. But so long as nuclear weapons remain, the President is committed to ensuring that nuclear deterrence remains effective. Toward that end, the administration has expended considerable time, energy, and money.  This is the story of that effort and a distillation of key lessons.

 

All News button
1
-

Abstract: Once limited by concerns about its technological feasibility, affordability and destabilizing potential, today, missile defense is becoming a multinational enterprise deployed on a global scale. The 21st century renaissance of missile defense technology has been powered by the belief that the capability to defend against ballistic missiles will reduce nuclear risks in the post-cold-war era. The assumptions that underpin this conclusion are challenged by a shift in the international security environment – the re-emergence of Russia, a major nuclear power, as a regional threat to the United States and its European allies. Both Cold War and more recent scholarship cannot fully explain contemporary dynamics. I will provide an overview of the current U.S., NATO and Russian missile defense programs and discuss their strategic, operational and technical dimensions. I will explain why we need a new understanding of the relationship between missile defense and nuclear weapons in the current strategic environment.

 

About the Speaker: Ivanka Barzashka is a MacArthur Nuclear Security Fellow at CISAC. Her research focuses on how ballistic missile defense (BMD) affects nuclear risks in the changing strategic environment. She is concurrently a researcher at the Department of War Studies of King’s College London (KCL). As a visiting scholar at the Bulgarian Academy of Sciences, Barzashka examined options for Bulgarian active participation in NATO’s BMD system, for which she did fieldwork at NATO’s Joint Forces Training Center in Poland. She also assessed technical options for BMD cooperation between NATO and Russia in collaboration with American, European and Russian scientists. Barzashka continued that project at the Centre for Science and Security Studies at KCL, where she developed a physics-based model for assessing BMD effectiveness for policy applications.

MacArthur Nuclear Security Predoctoral Fellow CISAC
Seminars
Paragraphs

Technical and operational realities make it prohibitively difficult to adapt a Cold War paradigm of “deterrence stability” to the new domain of cyber warfare. Information quality problems are likely to forestall the development of a cyber equivalent of the strategic exchange models that assessed deterrence stability during the Cold War. Since cyberspace is not firmly connected to geographic space the way other domains are, it makes modeling extremely difficult as well as muddles neat conceptual distinctions between “counterforce” (military) and “countervalue” (civilian) targets. These obstacles seriously complicate U.S. planning for a credible cyber “assured response,” and also present substantial challenges to potential adversaries contemplating cyber attacks against U.S. interests. To create a maximally effective deterrent against cyber threats, the United States should seek to maximize the challenges for possible opponents by creating a cyber “strategy of technology” emphasizing resilience, denial, and offensive capabilities.

All Publications button
1
Publication Type
Journal Articles
Publication Date
Journal Publisher
Strategic Studies Quarterly
Authors
Number
4
Authors
Clifton B. Parker
News Type
News
Date
Paragraphs

The U.S. Senate summary report on the allegations of CIA torture during the "war on terror" failed to live up to its original purpose, according to Amy Zegart, co-director of Stanford's Center on International Security and Cooperation (CISAC).

In a new journal article, Zegart wrote that the report has "not changed minds on either side of the torture debate and is unlikely to do so."

In December 2014, after five years of research, the U.S. Senate Select Committee on Intelligence issued a summary report of its investigation into the Central Intelligence Agency's terrorist detention and interrogation program between 2001 and 2006.

As Zegart noted, the Senate's summary released to the public amounted to less than a tenth of the full report, most of which remains classified. In an interview, she said the issue at hand should concern all Americans.

"How do secret agencies operate in a democratic society? Were the CIA's interrogation methods effective? Were they legal or moral? What role should the Congress have played when decisions about detainees were being made? All of these are vital questions which, sadly, remain unanswered and hotly contested – in large part because they have been caught in the maw of politics on both sides," said Zegart, the co-director of the Center for International Security and Cooperation at Stanford and a senior fellow at the Hoover Institution.

'A tiny portion of the full study'

Zegart explained that four key errors have doomed the Senate report to "eternal controversy."

"It was not bipartisan, took too long to write, made little effort to generate public support along the way and produced a declassified version that constituted a tiny portion of the full study," she said.

In contrast, Zegart said, the U.S. Senate's 1975-76 Church Committee investigation of intelligence abuses made different calls on all four issues, which helped it achieve significantly more impact. That committee was formed in the wake of Watergate and disclosures in the New York Times that U.S. intelligence agencies had engaged in a number of illegal activities for years, including widespread domestic surveillance on American citizens.

[[{"fid":"221516","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"","field_file_image_alt_text[und][0][value]":"","field_file_image_title_text[und][0][value]":"The cover of the U.S. Senate Select Committee on Intelligence's report on the CIA's detention and interrogation program.","field_credit[und][0][value]":"","field_caption[und][0][value]":"","field_related_image_aspect[und][0][value]":"","thumbnails":"crop_870xauto"},"type":"media","attributes":{"title":"The cover of the U.S. Senate Select Committee on Intelligence's report on the CIA's detention and interrogation program.","width":"870","style":"width: 350px; height: 521px; float: right;","class":"media-element file-crop-870xauto"}}]]She said the Church Committee was bipartisan and finished its job in 16 months. As a result, Congress passed new laws aimed at curbing aggressive spying on Americans and political assassinations abroad, among other measures.

Zegart wrote, "This was deliberate: As one Church Committee source told the New York Times in December 1975, 'If you wait too long, both the public and the members of Congress forget what you're trying to reform.' He was right."

On the other hand, she said, the Senate committee investigating CIA torture consisted entirely of Democrats and took five years to deliver what turned out to be a heavily redacted report. U.S. Sen. Dianne Feinstein (D-Calif.) chaired the committee.

While Feinstein's staff worked from 2009 to 2014, Zegart said, public outrage about torture faded – in fact, public support for coercive techniques actually increased. According to Zegart, a 2007 Rasmussen poll showed that 27 percent of Americans said the U.S. should torture captured terrorists, while 53 percent said the U.S. should not. A 2012 YouGov national poll conducted by Zegart found that support for torture rose 14 points while opposition fell 19 points.

Another problem was that the investigation did not hold a single public hearing to generate public attention or support, she said. In contrast, Church's investigation held 21 public hearings in 15 months.

Finally, the Senate report is still almost entirely classified, Zegart said.

"The 'report' released in December 2014 was a redacted executive summary of 500 pages – that's less than 10 percent of the 6,700-page report. No one knows when the other 6,200 pages will see the light of day," she wrote.

'Extraordinary resistance'

The aforementioned factors gave CIA defenders the upper hand when the report was eventually issued, she said.

"When the summary was released, former CIA officials launched an unprecedented public relations campaign replete with a web site, op-ed onslaught, and even a 'CIAsavedlives' Twitter hashtag," Zegart wrote.

And so, the episode represented one of the controversial episodes in the history of the CIA's relationship with the U.S. Senate, Zegart said.

"They [the Senate] faced extraordinary resistance from the CIA that included spying on the investigation; stonewalling and whittling away what parts of the report would be declassified; and a publicity campaign to discredit the study as soon as it was released," she wrote.

Zegart said the Feinstein investigation serves as a "cautionary tale" for Congress in its constitutional role of intelligence oversight.

"Even those who consider the interrogation and detention programs a dark mark on American history should be wary of calling the Senate report the definitive account of the subject or a model of intelligence oversight success," she wrote.

All News button
1
Subscribe to Homeland Security