Homeland Security
Authors
Clifton Parker
News Type
News
Date
Paragraphs

U.S. national security faces rising challenges from insider threats and organizational rigidity, a Stanford professor says.

Amy Zegart, co-director of the Center for International Security and Cooperation at Stanford and a senior fellow at the Hoover Institution, wrote in a new study that in the past five years, seemingly trustworthy U.S. military and intelligence insiders have been responsible for a number of national security incidents, including the WikiLeaks publications and the 2009 attack at Fort Hood in Texas that killed 13 and injured more than 30.

She defines "insider threats" as people who use their authorized access to do harm to the security of the United States. They could range from mentally ill people to "coldly calculating officials" who betray critical national security secrets.

In her research, which relies upon declassified investigations by the U.S. military, FBI and Congress, Zegart analyzes the Fort Hood attack and one facet of the insider threat universe – Islamist terrorists.

In this case, a self-radicalized Army psychiatrist named Nidal Hasan walked into a Fort Hood facility in 2009 and fired 200 rounds, killing 13 people and wounding dozens of others. The shooting spree remains the worst terrorist attack on American soil since 9/11 and the worst mass murder at a military site in American history, she added.

Insights and lessons learned

Zegart's study of insider and surprise attacks as well as academic research into the theory of organizations led her to some key insights about why the Army failed to prevent Hasan's attack when clues were clear:

Image
• Routines can create hidden hazards. People in bureaucracies tend to continue doing things the same old way, even when they should not, Zegart said, and not just in America. In the Cuban missile crisis of 1962, for example, U.S. spy planes were able to spot Soviet missile installations in Cuba because the Soviets had built them exactly like they always had in the Soviet Union – without camouflage.

In the Fort Hood case, she said, bureaucratic procedures kept red flags about Hasan in different places, making them harder to detect.

• Career incentives and organizational cultures often backfire. As Zegart wrote, several researchers found that "misaligned incentives and cultures" played major roles in undermining safety before the Challenger space shuttle disaster.

Zegart's earlier research on 9/11 found the same dynamic played a role in the FBI's manhunt for two 9/11 hijackers just 19 days before their attack. Because the FBI's culture prized convicting criminals after the fact rather than preventing disasters beforehand, the search for two would-be terrorists received the lowest priority and was handled by one of the least experienced agents in the New York office.

• Organizations matter more than most people think. Robust structures, processes and cultures that were effective in earlier periods for other tasks proved maladaptive after 9/11.

In the case of the Fort Hood attack, the evidence suggests that government investigations, which focused on individual errors and political correctness (disciplining or investigating a Muslim American in the military) identified only some of the root causes, missing key organizational failures.

Hasan slipped through the cracks not only because people made mistakes or were prone to political correctness, but also because defense organizations "worked in their usual ways," according to Zegart.

Adapting to a new threat

In terms of organizational weaknesses, Hasan's Fort Hood attack signaled a new challenge for the U.S. military: rethinking what "force protection" truly means, Zegart said. Before 9/11, force protection reflected a physical protection or hardening of potential targets from an outside attack. Now, force protection has evolved to mean that the threats could come from within the Defense Department and from Americans, she added.

"For half a century, the department's structure, systems, policies and culture had been oriented to think about protecting forces from the outside, not the inside," Zegart wrote.

In the case of Hasan, the Defense Department failed in three different ways to identify him as a threat: through the disciplinary system, the performance evaluation system and the counter-terrorism investigatory system run jointly with the FBI through Joint Terrorism Task Forces.

"Organizational factors played a significant role in explaining why the Pentagon could not stop Nidal Hasan in time. Despite 9/11 and a rising number of homegrown Jihadi terrorist attacks, the Defense Department struggled to adapt to insider terrorist threats," Zegart wrote.

Difficult to change

Another problem was that the Pentagon faced substantial manpower shortages in the medical corps – especially among psychiatrists. So the Defense Department responded to incentives and promoted Hasan, despite his increasingly poor performance and erratic behavior.

In addition, Zegart found the Defense Department official who investigated Hasan prior to the attack saw nothing amiss because he was the wrong person for the job – he was trained to ferret out waste, fraud and abuse, not counterterrorism, which is why he did not know how to look for signs of radicalization or counterintelligence risk.

"In sum, the Pentagon's force protection, discipline, promotion and counter-terrorism investigatory systems all missed this insider threat because they were designed for other purposes in earlier times, and deep-seated organizational incentives and cultures made it difficult for officials to change what they normally did," she wrote.

Zegart acknowledges the difficulties of learning lessons from tragedies like 9/11, the NASA space shuttle accidents and the 2009 Fort Hood shooting.

"People and organizations often remember what they should forget and forget what they should remember," she said, adding that policymakers tend to attribute failure to people and policies. While seemingly hidden at times, the organizational roots of disaster are much more important than many think, she added.

All News button
1
Authors
Steve Fyffe
News Type
News
Date
Paragraphs

It’s a technique that’s been used to calculate the odds of everything from the likelihood of a nuclear meltdown to the chances of getting sick from eating bad seafood.

Today, a CISAC scholar told the U.S. Senate Judiciary Committee that he hoped probabilistic risk analysis could help move the ball forward in the debate over encryption that’s pitted law enforcement and national security agencies against some of Silicon Valley’s most influential technology companies.

“Neither side can prove its case, and we see a clash of theological absolutes,” said Herb Lin, senior research scholar for cybersecurity at the Center for International Security and Cooperation and research fellow at the Hoover Institution, in his testimony before a full hearing of the committee.

The contentious debate over encryption has developed in the wake of the National Security Agency spying scandal, with tech titans Apple and Google recently announcing plans to implement stringent new cryptography protocols to protect customer data.

“When the Snowden documents revealed that NSA was hacking [the tech companies], there was a real sense of betrayal,” Lin said.

“You now hear tech companies talking about the U.S. government in the same way they talk about China. They feel like they have to protect themselves against the U.S. government in the same way they have to protect themselves against China. That’s a terrifying thought. In that kind of environment, there’s no trust.”

Law enforcement and national security agencies want tech companies to integrate a mechanism for the government to gain “exceptional access” to encrypted data into their new encryption technology. But, industry and privacy advocates have resisted, arguing that creating a so-called “backdoor” would make their software more vulnerable to attacks from hackers.

FBI director James B. Comey, who also testified before the committee, warned that the latest generation of encryption technology was putting American lives at risk. He said that the Islamic State in Iraq and Syria (ISIS) was actively recruiting homegrown terrorists via Twitter then using end-to-end encrypted mobile messaging apps to secretly send orders for them to carry out attacks within the United States.

 

going dark comey yates lin FBI Director James B. Comey (right) testifies before the U.S. Senate Judiciary Committee about the national security risks of end-to-end encryption, with Deputy Attorney General Sally Quillian Yates (left) at his side, as CISAC senior research scholar Herb Lin looks on from the gallery.

 

 

“Our job is to look in a haystack the size of this country for needles that are increasingly invisible to us because of end-to-end encryption,” Comey said.

Deputy Attorney General Sally Quillian Yates, who testified at Comey’s side, said law enforcement could not get access to that kind of encrypted communications, even with a valid court order.

“Critical information becomes in effect ‘warrant proof’,” she said.

“Because of this, we are creating safe zones where dangerous terrorists and criminals can operate and avoid detection.”

It is a polarizing debate.

Image
“You listen to what the privacy advocates say and what the government says and there’s no common ground,” said Lin.

“I’d like to find a way to move the ball forward rather than seeing both sides being stuck in the trenches shouting at each other.”

Lin’s proposal, which he presented to the Senate Judiciary Committee on Wednesday, recommended that both sides focus on estimating how long it would take a hacker to break into an encrypted device equipped for “exceptional access.”

“If it takes a thousand years for a bad guy to figure out how to hack…that’s probably secure enough,” Lin testified.

“If it takes him 30 seconds, using that mechanism is a dumb idea. So somewhere between 30 seconds and a thousand years, the mechanism changes from being unworkable to being secure enough.”

Not all computer security experts believe such a calculation would be possible.

“It’s challenging to come up with a defensible methodology for estimating the risk that a backdoor system will be compromised,” said Jonathan Mayer, a Stanford PhD candidate in Computer Science and former CISAC cybersecurity fellow who garnered national headlines for his research demonstrating that the NSA could use phone metadata to reconstruct detailed personal information.

“Not only are the risks of compromise unknown – they’re unknowable.”

However, Lin said the mathematical methodology known as probabilistic risk analysis, which has widely been used to predict the likelihood of catastrophic failure in complex systems from nuclear power plants to the space shuttle, might be able to shed some useful light on the risks.

And, he said, the only way to find out if it could successfully be used to calculate the risks of encryption software getting hacked would be to conduct more research.

Veterans of the so-called “Crypto Wars” of the ‘70s and ‘90s (when the U.S. government tried to limit public access to encryption technology), like Stanford professor emeritus of electrical engineering and CISAC affiliated faculty member Martin Hellman, said proposals like Lin’s could help advance the public debate and bring both sides closer together.

“Getting the two opposing sides to talk — and listen — is really important,” Hellman said.

“That's what happened 20 years ago when Congress asked the National Academies to look at an almost identical problem. It got those different groups talking and working out compromises.”

Hero Image
All News button
1
Authors
Joshua Alvarez
News Type
News
Date
Paragraphs

What is it about terrorism that makes it so difficult to study and counteract through U.S. government policy? That’s the central question CISAC Senior Fellow Martha Crenshaw hopes to answer in an upcoming book she is co-authoring with Gary LaFree, Director of the National Center for the Study of Terrorism and Responses to Terrorism (START), where Crenshaw serves as lead investigator. at the University of Maryland. 

The idea for the book stems from Crenshaw’s long career in grappling with terrorism and observing how governments struggle to combat it. She has been writing and thinking about terrorism since the 1970s and is currently conducting a multi-year project mapping the evolution of violent extremist groups. However, the difficulties inherent in the topic have not much changed for academics and policymakers.

The problems start with defining terrorism, something that has bedeviled both researchers and policymakers for decades, Crenshaw told a Stanford audience in CISAC. 

“We are still arguing about what terrorism means. But even if you agree on a definition, then applying it to the real world remains difficult,” she said.

Beyond semantics, the study of terrorism faces a series of hurdles inherent to the topic. An overarching social theory of the causes of terrorism remains elusive, and there is no agreement on whether terrorism actually works. 

Additionally, academics have used many different levels of analyses–individual, organizational, cultural, economic, and others–but have yet to agree on which analyses bear more fruit.

Despite what you might gather from what’s said in the media, terrorism events are actually very rare. Terrorist attacks that kill large amounts of people are even more rare. “9/11 was a black swan, a highly consequential event but only a one-of-a-kind. We show why it’s the case that terrorism is very rare and therefore makes it very hard to predict any kind of trends,” Crenshaw said.

Most of the information available is about attacks that actually happened. But there are many more plots, about ten times more, than actual attacks. Crenshaw said she and her research assistants have used news media and government documents to identify failed and foiled plots against the United States, European Union, and NATO countries plus Australia and New Zealand. The plots have been coded in a dataset that she will analyze.  

There are additional obstacles in the way of researchers and policymakers. 

Attributing responsibility for attacks is difficult, which hampers research and government responses. “How do you know who to respond against? The concept of terrorism is mixed in with insurgency. It’s hard to think of a policy that targets one but not the other,” Crenshaw said. Terrorist organizations are very small and the boundaries between groups are extremely porous. Yet, there is not a preponderance of lone wolves.

Sometimes, the U.S. government obstructs research. Crenshaw lamented the over-classification of government documents, and drew particular attention to the designation “For Official Use Only”, which is not a classification but a designation that seems to depend on the agency using it. 

“If you are analyzing illegal forms of violence there are three sources of information: governments, victims, and terrorists. Victims are difficult to find. Self-reporting is even harder and usually unfeasible. And governments are very secretive. We would like to see more transparency and openness on their part,” she said.

“I think what is being done here is really important when it comes to the question of why it’s so hard to find policy solutions for terrorism,” said Betsy Cooper, a Law and International Security Postdoctoral Fellow at CISAC, who offered commentary on the book draft to the seminar. “A lot of what is in the chapter about the state of counter-terrorism research is very important.” 

“I learned a lot especially about the automation in the global terrorism database and it poses some interesting questions. Is something terrorism because we say it is or can we use objective criteria regardless of whether you see it as something else?” 

Hero Image
All News button
1
-

The video recording of this event can be watched on YouTube: https://www.youtube.com/watch?v=j57OuqbtD9Q&feature=youtu.be

In an age of terrorism, where should a democratic society draw the line on government surveillance? Edward Snowden’s explosive disclosures about the National Security Agency’s intelligence-collection operations have ignited an intense debate about the appropriate balance between security and liberty in America. In a special series this year, nationally prominent experts will explore the critical issues raised by the NSA’s activities, including their impact on our security, privacy, and civil liberties. This timely series will address one of the most challenging questions the nation faces today as it tries to strike the right balance between safety and liberty. The Security Conundrum will look behind and beyond the headlines, examining the history and implementation of the NSA operations, the legal questions generated by them, the media’s role in revealing them, and the responsibility of Congress to oversee them. It will also address the NSA’s uneasy and evolving relationship with Silicon Valley. Each session in the series is designed to explore these issues from a different vantage point. The guest speakers, in conversation with Stanford scholars, will probe the problems, explain the political, legal, and technological contours of the NSA actions, and outline ways to preserve the nation’s security without sacrificing our freedoms. 

 

An Evening with U.S. Senator Dianne Feinstein

Senator Dianne Feinstein has been at the vortex of the debate about Edward Snowden’s disclosures since he exposed an array of National Security Agency surveillance programs in 2013. As chair of the Senate Select Committee on Intelligence from 2009-2014, and now the ranking minority member, Senator Feinstein has tried to help the nation strike the appropriate balance between security and liberty as she and her Senate colleagues examined NSA practices in light of the Snowden materials. She also played a leading role in the Senate investigation of the Central Intelligence Agency detention and interrogation program following the terrorist attacks of Sept. 11, 2001. Senator Feinstein pressed to make the Senate report public. Some parts of the study were released in December 2014. A California Democrat and Stanford graduate, she has served in the Senate since 1993.

In her May 28 appearance at Stanford, Senator Feinstein will discuss the Congressional role in overseeing America’s intelligence agencies, including the NSA and CIA, and establishing the laws that govern their operations. The format for her appearance will be a colloquy with Philip Taubman, a consulting professor at Stanford’s Center for International Security and Cooperation and former Washington bureau chief of The New York Times. 

To register for a free ticket, please follow this link.

The Security Conundrum is co-sponsored by Stanford’s Freeman Spogli Institute for International Studies, the Center for International Security and Cooperation,the Hoover Institution, Stanford Continuing Studies, Stanford in Government, and the Stanford Law School.

CEMEX Auditorium

Knight Management Center

641 Knight Way, Stanford University

Dianne Feinstein U.S. Senator from California Speaker United States Senate
0
Affiliate
Taubman_Phil.jpg

Philip Taubman is an affiliate at CISAC. His biography of George Shultz, In The Nation's Service: The Life and Times of George P. Shultz, was published by Stanford University Press in January 2023. Before joining CISAC in 2008, Taubman worked at the New York Times as a reporter and editor for nearly 30 years, specializing in national security issues, including United States diplomacy, and intelligence and defense policy and operations. At the Times, Taubman served as a Washington correspondent, Moscow bureau chief, deputy editorial page editor, Washington bureau chief and associate editor. McNamara At War: A New History, co-authored by Philip Taubman and William Taubman, will be published in September 2025 by W.W. Norton. Philip Taubman was a history major at Stanford, Class of 1970, and served as editor-in-chief of the Stanford Daily in 1969. Before joining the New York Times, he worked as a correspondent for Time magazine and was sports editor of Esquire. He was a member of the Stanford Board of Trustees, 1978-1982, and served as secretary of the Stanford Board, 2011-2018. He is author of The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb (Harper Collins, 2012) and Secret Empire: Eisenhower, the CIA, and the Hidden Story of America's Space Espionage. (Simon & Schuster, 2003). 

Date Label
Philip Taubman Journalist Moderator CISAC
Lectures
-

The Freeman Spogli Institute for International Studies, the Center for International Security & Cooperation, and the Hoover Institution are honored to co-sponsor the 2015 Drell Lecture with The Honorable Ashton B. Carter, 25th U.S. Secretary of Defense, who will speak on "Rewiring the Pentagon: Charting a New Path on Innovation and Cybersecurity." The event will include welcoming remarks by Stanford University President John Hennessy. The talk will be followed by a Q&A session with Carter moderated by Amy Zegart, co-director of the CISAC and senior fellow at Hoover. Questions will be collected from the audience as well as from Twitter, using the hashtag #SecDefAtStanford. 

 

Drell Lecture Recording: NA

 

Drell Lecture Transcript: NA

 

Speaker's Biography: Secretary Carter was the 2014-2015 Payne Distinguished Visitor at the Freeman-Spogli Institute for International Studies until he left upon his nomination by the White House. Ash Carter served in numerous jobs in the Department of Defense, and as the twenty-fifth Secretary of Defense under President Obama. 

 

 

Cemex Auditorium

655 Knight Way

Stanford University

Ashton Carter 25th United States Secretary of Defense Speaker United States Department of Defense
Lectures
News Type
News
Date
Paragraphs

 

U.S. Navy Adm. Cecil D. Haney, the U.S. Strategic Command commander, hosted CISAC Co-Directors David Relman and Amy Zegart as well as CISAC faculty and fellows at Offutt Air Force Base in Nebraska on March 30-31, 2015, to promote military-to-university cooperation and innovation, and provide a better understanding of USSTRATCOM’s global missions.

The visit follows Haney’s trip to Stanford last year, during which he held seminars and private meetings with faculty, scholars and students to discuss strategic deterrence in the 21st century. Those discussions focused on reducing the U.S. nuclear weapons stockpile while maintaining an effective deterrent, the integration of space and cyberspace in nuclear platforms and the congested, contested and competitive operating environment in space.

“Developing and maintaining partnerships with security experts from the private sector and academic institutions like CISAC enables USSTRATCOM to view the strategic environment from a different perspective and adjust our decision calculous accordingly,” Haney said. “We are excited about this unique opportunity to exchange ideas and share information with this prestigious organization.” 

Haney opened the discussions by presenting a command mission brief, in which he described USSTRATCOM’s nine Unified Command Plan-assigned missions, his priorities as commander and his ongoing effort to build enduring relationships with partner organizations to exchange ideas and confront the broad range of global strategic challenges.

Zegart, who is also a senior fellow at Stanford’s Hoover Institution, said getting to see and experience how USSTRATCOM operates first-hand was “an eye opener.”

“It’s one thing to think about deterrence, it’s another to live it,” she said. “When you go to each other’s neighborhoods, you gain a better understanding of where each side is coming from … and that’s enormously important to us in how we think about deterrence and what we can do to help USSTRATCOM and its mission.”

“These kinds of exchanges have cascade effects on young people; how they think about civil-military relations [and] how they understand what our military is doing,” she added.

Image
stratcomm group

The delegation also received a tour of USSTRATCOM’s global operations center and held discussions with subject matter experts on strategic deterrence, cyber responsibility and nuclear modernization.

“As a cybersecurity fellow, it was fascinating to visit the global operations center and the battle deck to see the role that cybersecurity and information technology plays in the strategic deterrence mission,” said Andreas Kuehn, a CISAC pre-doctoral cybersecurity fellow from Switzerland. “At CISAC, we often discuss deterrence from a theoretical perspective, so it was very insightful to hear from people who work in [this field] and see how they deal with deterrence in an operational manner.”

The two-day visit concluded with an open discussion, during which CISAC and USSTRATCOM members discussed the most effective means to share information, plan future engagements and continue working to build on the mutually beneficial relationship between the two organizations.

“Sometimes people talk [about strategic issues] in the abstract and it becomes difficult to understand what is happening on the ground and in the real world,” Kuehn said. “I think [USSTRATCOM] took extra steps to keep the conversations open and concrete.”

USSTRATCOM is one of nine Department of Defense unified combatant commands charged with strategic deterrence, space operations, cyberspace operations, joint electronic warfare, global strike, missile defense, intelligence, surveillance and reconnaissance, combating weapons of mass destruction, and analysis and targeting.

 

Hero Image
All News button
1
News Type
News
Date
Paragraphs

 

In this talk sponsored by the Stanford Institute for Economic Policy Research, three CISAC scholars discuss the Islamic State, Iran and the Taliban and the threats they impose to American security. The talk is moderated by Brad Kapnick, a Partner at Katten & Temple, LLP, and SIEPR Advisory Board member. Joining him are Martha Crenshaw, a senior fellow at CISAC and the Freeman Spogli Institute for International Studies and professor, by courtesy, of political science; CISAC Senior Fellow Scott Sagan, the Caroline S.G. Munro Professor of Political Science; former U.S. Ambassador to Afghanistan Karl Eikenberry, the William J. Perry Fellow at CISAC and a consulting professor at the Freeman Spogli Institute.

This is an abbreviated version of the talk below. The full talk can be found here.

 

 

Hero Image
All News button
1
-

Abstract: The purpose of this book project is to explain what it is about terrorism that makes it inherently difficult for the American government to formulate an effective counterterrorism policy. Why is terrorism such an intractable problem?  What are the obstacles to developing a consistent and coherent counterterrorism strategy?  The barriers that we identify flow from the issue itself, not the particular political predispositions of individual policy makers or flawed organizational processes.  We also find that scholars and policy makers face similar difficulties – the study of terrorism is often confused and contentious, and the study of counterterrorism can be even more frustrating.  

The book is co-authored by Martha Crenshaw and  Gary LaFree, Director of the National Center for the Study of Terrorism and Responses to Terrorism (START) at the University of Maryland, as well as professor in the Department of Criminology and Criminal Justice.

 

About the Speaker: Martha Crenshaw is a senior fellow at CISAC and FSI and a professor of political science by courtesy at Stanford. She was the Colin and Nancy Campbell Professor of Global Issues and Democratic Thought and professor of government at Wesleyan University in Middletown, Conn., where she taught from 1974 to 2007. She has written extensively on the issue of political terrorism; her first article, "The Concept of Revolutionary Terrorism," was published in the Journal of Conflict Resolution in 1972. Her recent work includes “Trajectories of terrorism: Attack patterns of foreign groups that have targeted the United States, 1970–2004,” in Criminology & Public Policy, 8, 3 (August 2009) (with Gary LaFree and Sue-Ming Yang), “The Obama Administration and Counterterrorism,” in Obama in Office: the First Two Years, ed. James Thurber (Paradigm Publishers, 2011), and “Will Threats Deter Nuclear Terrorism?” in Deterring Terrorism: Theory and Practice, ed. Andreas Wenger and Alex Wilner (Stanford University Press, 2012). She is also the editor of The Consequences of Counterterrorism (Russell Sage Foundation, 2010). In 2011 Routledge published Explaining Terrorism, a collection of her previously published work.

She served on the Executive Board of Women in International Security and is a former President and Councilor of the International Society of Political Psychology (ISPP). She coordinated the working group on political explanations of terrorism for the 2005 Club de Madrid International Summit on Democracy, Terrorism and Security. In 2005-2006 she was a Guggenheim Fellow. Since 2005 she has been a lead investigator with the National Center for the Study of Terrorism and the Response to Terrorism (START) at the University of Maryland, funded by the Department of Homeland Security. In 2009 she was awarded a grant from the National Science Foundation/Department of Defense Minerva Initiative for a project on "mapping terrorist organizations." She serves on the editorial boards of the journals International Security, Political Psychology, Security Studies, Dynamics of Asymmetric Conflict, and Terrorism and Political Violence. She is currently a member of the Committee on Evaluating the Effectiveness of the Global Nuclear Detection Architecture of the National Academies of Science.

 


Encina Hall (2nd floor)

Not in residence

0
Senior Fellow at the Freeman Spogli Institute for International Studies, Emerita
Professor, by courtesy, of Political Science, Emerita
crenshaw_martha.jpg
PhD

Martha Crenshaw is a senior fellow emerita at CISAC and FSI. She taught at Wesleyan University in Middletown, Connecticut, from 1974 to 2007.  She has published extensively on the subject of terrorism.  In 2011 Routledge published Explaining Terrorism, a collection of her previously published work.  A book co-authored with Gary LaFree titled Countering Terrorism was published by the Brookings Institution Press in 2017. She recently authored a report for the U.S. Institute of Peace, “Rethinking Transnational Terrorism:  An Integrated Approach”.

 

 She served on the Executive Board of Women in International Security and is a former President and Councilor of the International Society of Political Psychology (ISPP). In 2005-2006 she was a Guggenheim Fellow. She was a lead investigator with the National Consortium for the Study of Terrorism and the Response to Terrorism (START) at the University of Maryland from 2005 to 2017.  She is currently affiliated with the National Counterterrorism, Innovation, Technology, and Education (NCITE) Center, also a Center of Excellence for the Department of Homeland Security.  In 2009 the National Science Foundation/Department of Defense Minerva Initiative awarded her a grant for a research project on "mapping terrorist organizations," which is ongoing.  She has served on several committees of the National Academy of Sciences.  In 2015 she was elected a Corresponding Fellow of the British Academy.  She is the recipient of the International Studies Association International Security Studies Section Distinguished Scholar Award for 2016. Also in 2016 Ghent University awarded her an honorary doctorate.  She serves on the editorial boards of the journals International Security, Security Studies, Dynamics of Asymmetric Conflict, Orbis, and Terrorism and Political Violence.

Date Label
Martha Crenshaw Senior Fellow at the Freeman Spogli Institute for International Studies Professor, by courtesy, of Political Science Speaker Stanford University
Seminars
-

Abstract: When President Obama approved the "Olympic Games'' cyber attacks on Iran, he told aides that he was worried about what would happen when nations around the world began to use destructive cyber attacks as a new weapon of disruption and coercion. Now, we've begun to find out. David Sanger, the national security correspondent of The New York Times and author of Confront and Conceal, the book that revealed the cyber program against Iran, will explore how offensive cyber operations have developed in the Obama administration -- and why they have been so little debated.

About the Speaker: David E. Sanger is National Security Correspondent and senior writer for The New York Times. He is the author of two bestsellers on foreign affairs: The Inheritance: The World Obama Confronts and the Challenges to American Power (2009) and Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power (2012). He served as the Times’ Tokyo Bureau Chief, Washington Economic Correspondent, White House correspondent during the Clinton and Bush Administrations and Chief Washington Correspondent.

Mr. Sanger has twice been a member of New York Times teams that won the Pulitzer Prize, first for the investigation into the causes of the Challenger disaster in 1986, and later for investigations into the struggles within the Clinton administration over technology exports to China. He teaches national security policy at Harvard's Kennedy School of Government.

This event is offered as a joint sponsorship with the Hoover Institution.

 

Encina Hall (2nd floor)

David Sanger National Security Correspondent and senior writer for The New York Times Speaker New York Times
Seminars
Subscribe to Homeland Security