Cybersecurity
Authors
Andrew Grotto
News Type
News
Date
Paragraphs

On March 7, 2018, CISAC scholar and Hoover Institution Research Fellow Andrew Grotto testified before a bicameral hearing of the California Legislature on “Cybersecurity and California Elections.” Grotto emphasized the importance of upholding the public's confidence in our electoral infrastructure, and highlighted the need for California's state and county election professionals to implement cybersecurity best practices. 

Image
Andy Grotto
He urged that they practice their incident response and communications plans in order to ensure they are prepared for contingencies during the 2018 election cycle, in light of threats emanating from Russia and elsewhere. 

He also reminded that campaigns and elected officials are also vital components of our nation's electoral infrastructure, and that they too have a responsibility for upholding the public's confidence in our democracy. He emphasized the need for candidates to be vigilant and not allow their campaigns to become unwitting ampflifiers of Russian disinformation efforts. The full testimony is available here.

Hero Image
gettyimages 515689422usvote voting Getty Images
All News button
1
-

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information warfare (CEIW) leverages the features of modern information and communications technology to age-old techniques of propaganda, deception, and chaos production to confuse, mislead, and to influence the choices and decisions that the adversary makes—and a recent example of CEIW can be seen in the Russian hacks on the U.S. presidential election in 2016.  CEIW is a hostile activity, or at least an activity that is conducted between two parties whose interests are not well-aligned, but it does not constitute warfare in the sense that international law or domestic institutions construe it.  Nor is it cyber war or cyber conflict as we have come to understand those ideas.  Some approaches to counter CEIW show some promise of having some modest but valuable defensive effect.  If better solutions for countering CEIW waged against free and democratic societies are not forthcoming, societal discourse will no longer be grounded in reason and objective reality—an outcome that can fairly be called the end of the Enlightenment.

Speaker bios: Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University.  His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy.  In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University; and a member of the Science and Security Board of the Bulletin of Atomic Scientists. He recently served on President Obama’s Commission on Enhancing National Cybersecurity.  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

To read more about Herb Lin's interests, please read "An Evolving Research Agenda in Cyber Policy and Security."

Jackie Kerr is a Postdoctoral Research Fellow at the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory.  Her research examines cybersecurity and information security strategy, Internet governance, and the Internet policies of non-democratic regimes.  She was a 2015-2016 Science, Technology, and Public Policy (STPP) Pre-Doctoral Fellow with the Cyber Security Project at the Belfer Center for Science and International Affairs and Visiting Scholar at the Davis Center for Russian and Eurasian Studies at Harvard University and a Cybersecurity Predoctoral Fellow at Stanford University's Center for International Security and Cooperation in 2014-2015.  Jackie holds a PhD and MA in Government from Georgetown University, and an MA in Russian, East European, and Eurasian Studies and BAS in Mathematics and Slavic Languages and Literatures from Stanford University.  She has held research fellowships in Russia, Kazakhstan, and Qatar, and has previous professional experience as a software engineer.

CISAC
Stanford University
Encina Hall, C236
Stanford, CA 94305-6165

650-497-8600
0
Senior Research Scholar at the Center for International Security and Cooperation
Hank J. Holland Fellow in Cyber Policy and Security, Hoover Institution
HerbertLin.jpg

Dr. Herb Lin is senior research scholar at the Center for International Security and Cooperation and Research Fellow at the Hoover Institution, both at Stanford University.  His research interests relate broadly to the impact of emerging technologies on national security, especially in the digital domain (cyber, artificial intelligence, information warfare and operations), and has written extensively on the role of offensive operations in cyberspace as instruments of national policy.  In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology.  From 2016 to 2025, he was a member of the Science and Security Board of the Bulletin of Atomic Scientists. In 2016, he served on President Obama’s Commission on Enhancing National Cybersecurity and in  2021 on the Aspen Commission on Information Disorder.  Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

Avocationally, he is a longtime folk and swing dancer and a lousy magician. Apart from his work on cyberspace and cybersecurity, he is published in cognitive science, science education, biophysics, and arms control and defense policy. He also consults on K-12 math and science education.

Date Label
Herbert Lin Senior Research Scholar for Cyber Policy and Security CISAC, Stanford University
0
Affiliate
jaclyn_kerr.jpg PhD

Jackie Kerr is a Professor in the College of Information and Cyberspace (CIC) at National Defense University (NDU).  She is also a Nonresident Fellow with the Brookings Institution Foreign Policy Program and an Adjunct Professor at Georgetown University’s Center for Russian, Eurasian, and East European Studies in the School of Foreign Service.  Her work focuses on digital and emerging technologies and their current and future impacts on international politics, national security, and democracy.  She has conducted research and taught on the digital politics of authoritarian regimes, the role of information technologies in civil society and protest mobilization, cyber domain strategy, global Internet governance, the role of artificial intelligence in national security and foreign policy, and on the role of digital technologies in the politics of Russia, China, and Eurasia.  While at NDU, Dr. Kerr previously served as Senior Research Fellow for Defense and Technology Futures at the Center for Strategic Research (2020-2024) and the Center for Emerging Technology and Future Warfare (2024-2025) within the Institute for National Strategic Studies (INSS).  In 2019-2020, she served as a AAAS Science and Technology Policy Fellow at the U.S. Department of State’s Office of the Science and Technology Advisor to the Secretary (STAS), where she advised on digital technology policy, particularly as it pertains to human rights, democracy, and national security.  From 2016 to 2019, she was a postdoctoral research fellow at the Center for Global Security Research (CGSR) at Lawrence Livermore National Laboratory, where she led work on cybersecurity, cyber domain strategy, and information conflict.  Dr. Kerr was previously a Science, Technology, and Public Policy Fellow at Harvard University’s Belfer Center for Science and International Affairs, a Visiting Scholar at Harvard's Davis Center for Russian and Eurasian Studies, a Cybersecurity Fellow at Stanford University’s Center for International Security and Cooperation (CISAC), and has held research fellowships in Russia, Kazakhstan, and Qatar.  She also has prior professional experience as a software engineer with Comcast and Symantec.  Dr. Kerr holds a PhD and MA in Government from Georgetown University, and an MA in Russian, East European, and Eurasian Studies and BAS in Mathematics and Slavic Languages and Literatures from Stanford University. 

CV
Date Label
Jaclyn A. Kerr Lawrence Livermore National Laboratory; CISAC Affiliate
Seminars
-

Abstract: Recent public attention and debate around “fake news” has highlighted the growing challenge of determining information veracity online. This is a complex and dynamic problem at the intersection of technology, human cognition, and human behavior—i.e. our strategies and heuristics for making sense of information may make us vulnerable, within online spaces, to absorbing and passing along misinformation. Increasingly, it appears that certain actors are intentionally exploiting these vulnerabilities, spreading intentional misinformation—or disinformation—for various purposes, including geopolitical goals. Drawing on research conducted on online rumors in the context of crisis response, this talk explores what alternative narratives (or “conspiracy theories”) of crisis events reveal about “fake news”, political propaganda, and disinformation online

Speaker Bio: Kate Starbird is an Assistant Professor at the Department of Human Centered Design & Engineering (HCDE) at the University of Washington (UW). Kate's research is situated within human-computer interaction (HCI) and the emerging field of crisis informatics—the study of the how information-communication technologies (ICTs) are used during crisis events. One aspect of her research focuses on how online rumors spread—and how online rumors are corrected—during natural disasters and man-made crisis events. More recently, she has begun exploring the propagation of disinformation and political propaganda through online spaces. Kate earned her PhD from the University of Colorado at Boulder in Technology, Media and Society and holds a BS in Computer Science from Stanford University.

Kate Starbird Department of Human Centered Design & Engineering, University of Washington
Seminars

CISAC
Stanford University
Encina Hall, C428

Stanford, CA 94305-6165

(650) 723-9866
0
Andrew Grotto

Andrew J. Grotto is a research scholar at the Center for International Security and Cooperation at Stanford University.

Grotto’s research interests center on the national security and international economic dimensions of America’s global leadership in information technology innovation, and its growing reliance on this innovation for its economic and social life. He is particularly interested in the allocation of responsibility between the government and the private sector for defending against cyber threats, especially as it pertains to critical infrastructure; cyber-enabled information operations as both a threat to, and a tool of statecraft for, liberal democracies; opportunities and constraints facing offensive cyber operations as a tool of statecraft, especially those relating to norms of sovereignty in a digitally connected world; and governance of global trade in information technologies.

Before coming to Stanford, Grotto was the Senior Director for Cybersecurity Policy at the White House in both the Obama and Trump Administrations. His portfolio spanned a range of cyber policy issues, including defense of the financial services, energy, communications, transportation, health care, electoral infrastructure, and other vital critical infrastructure sectors; cybersecurity risk management policies for federal networks; consumer cybersecurity; and cyber incident response policy and incident management. He also coordinated development and execution of technology policy topics with a nexus to cyber policy, such as encryption, surveillance, privacy, and the national security dimensions of artificial intelligence and machine learning. 

At the White House, he played a key role in shaping President Obama’s Cybersecurity National Action Plan and driving its implementation. He was also the principal architect of President Trump’s cybersecurity executive order, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure.”

Grotto joined the White House after serving as Senior Advisor for Technology Policy to Commerce Secretary Penny Pritzker, advising Pritzker on all aspects of technology policy, including Internet of Things, net neutrality, privacy, national security reviews of foreign investment in the U.S. technology sector, and international developments affecting the competitiveness of the U.S. technology sector.

Grotto worked on Capitol Hill prior to the Executive Branch, as a member of the professional staff of the Senate Select Committee on Intelligence. He served as then-Chairman Dianne Feinstein’s lead staff overseeing cyber-related activities of the intelligence community and all aspects of NSA’s mission. He led the negotiation and drafting of the information sharing title of the Cybersecurity Act of 2012, which later served as the foundation for the Cybersecurity Information Sharing Act that President Obama signed in 2015. He also served as committee designee first for Senator Sheldon Whitehouse and later for Senator Kent Conrad, advising the senators on oversight of the intelligence community, including of covert action programs, and was a contributing author of the “Committee Study of the Central Intelligence Agency’s Detention and Interrogation Program.”

Before his time on Capitol Hill, Grotto was a Senior National Security Analyst at the Center for American Progress, where his research and writing focused on U.S. policy towards nuclear weapons - how to prevent their spread, and their role in U.S. national security strategy.

Grotto received his JD from the University of California at Berkeley, his MPA from Harvard University, and his BA from the University of Kentucky.

Research Scholar, Center for International Security and Cooperation
Director, Program on Geopolitics, Technology, and Governance
Date Label
-

Abstract: The U.S. government continues to struggle with how best to defend the country from cyber attacks. Reacting out in frustration, Senator John McCain wondered aloud if the United States should consider what lessons can be learned from a new cyber defense organization in the United Kingdom called the National Cyber Security Center (NCSC). In this paper, Stuart Russell and Michael Sulmeyer examine the NCSC, its origins, its missions, and its effectiveness. They then consider how certain aspects of the NCSC might map onto the more complicated governance structure around cyber defense in the United States. Despite important differences between the United Kingdom and the United States, they conclude that there is a great deal the United States can adapt from the United Kingdom’s efforts, particularly the NCSC’s ambitious Active Defense agenda. 

Speaker Bio: Dr. Michael Sulmeyer is the Belfer Center's Cyber Security Project Director at the Harvard Kennedy School. He is also a Contributing Editor for the national security blog Lawfare. Before Harvard, he served as the Director for Plans and Operations for Cyber Policy in the Office of the Secretary of Defense. There, he worked closely with the Joint Staff and Cyber Command on a variety of efforts to counter malicious cyber activity against U.S. and DoD interests. For this work, he received the Secretary Medal for Exceptional Public Service.

Previously, he worked on arms control and the maintenance of strategic stability between the United States, Russia, and China. As a Marshall Scholar, Sulmeyer received his PhD (DPhil) in Politics from Oxford University, and his dissertation, "Money for Nothing: Understanding the Termination of U.S. Major Defense Acquisition Programs," won the Sir Walter Bagehot Prize for best dissertation in government and public administration. He received his B.A. and J.D. from Stanford University and his M.A. in War Studies from King's College London. In the mid-1990s, he was the System Operator (SysOp) of The Summit BBS in Santa Barbara, California.

William J. Perry Conference Room

Encina Hall, 2nd floor

616 Serra Street

Stanford, CA 94305

Director, Cyber Security Project Belfer Center for Science and International Affairs
Seminars
-

Abstract: What is the strategic value of cyber weapons? Even though a growing body of research has addressed the destructive potential of cyber weapons, there remains a large gap in thinking about the strategic utility of these capabilities. The purpose of this paper is to partially fill this gap, by means of assessing under what conditions 'counterforce’ and ‘countervalue’ cyber weapons can be effective. I argue that cyber weapons can provide an ‘extra option’ to leaders. The discussed cases suggest that they can be used both as an important force-multiplier enabler for conventional military assets or as independent capability. Cyber weapons can also be used to achieve a form of psychological ascendancy and can be used effectively with few casualties.

Speaker Bio: Max Smeets is a cybersecurity fellow at the Center for International Security and Cooperation and holds a DPhil in International Relations from the University of Oxford, St. John’s College. Max current book project focuses on the causes underlying cyber proliferation and restraint. The results of this research are valuable for understanding the likely changes in the future prevalence of cyber weapons. It clarifies to what degree this is an ‘inevitable’ development – and if/how it can be stopped.

Max was a College Lecturer in Politics at Keble College, University of Oxford, and Research Affiliate of the Oxford Cyber Studies Programme. He was also a Carnegie Visiting Scholar at Columbia University SIPA and a Doctoral Visiting Scholar at Sciences Po CERI. He holds an undergraduate degree from University College Roosevelt, Utrecht University, and an M.Phil in International Relations from the University of Oxford, Brasenose College.  Max has a diverse professional background, having worked for financial, political, and non-governmental organizations.

 

 

 

William J. Perry Conference Room

Encina Hall, 2nd floor

616 Serra Street

Stanford, CA 94305

0
max_headshotupdated_1.png DPhil

Max Smeets is the Co-Director of Virtual Routes, and serves as Managing Editor of Binding Hook. He also holds research positions at ETH Zurich, the Royal United Services Institute (RUSI) and Stanford University’s Center for International Security and Cooperation. Max is the author of Ransom War: How Cyber Crime Became a Threat to National Security and No Shortcuts: Why States Struggle to Develop a Military Cyber Force.

Max received a BA in Economics, Politics and Statistics from University College Roosevelt, Utrecht University and an MPhil (Brasenose College) and DPhil (St. John’s College) in International Relations from the University of Oxford.

Affiliate
Date Label
Cybersecurity Fellow CISAC
Seminars

CISAC Stanford University

Encina Hall, E111

 

Stanford, CA 94305

 

(650) 736-4703
0
bradleyboyd_cropped.jpg

Brad Boyd is a U.S. Army infantry officer with 27 years of experience in the Marines and the Army. Most recently, he served as the Joint Readiness Training Center’s Chief of Plans and Exercise Maneuver Control. He also served as the Deputy Commander of the 2nd Brigade Combat Team of the 82nd Airborne Division, an organization of 4,000 paratroopers. Prior to this, Brad was the commander of the U.S. Army’s Global Response Force—responsible for readiness to conduct worldwide combat operations upon 18-hour notification. As a liaison officer, Brad helped develop the British Army’s Expeditionary Warfare Doctrine and Human Terrain Doctrine in 2013 and 2014, while also advising Senior British Army leaders on U.S.–U.K. Alliance issues.  Previously, Brad commanded a company that played a key role in the hunt for Saddam Hussein in 2003, and in 2010, he served as the Chief of Plans for all conventional military operations in Anbar Province, Iraq. Brad has a Master's degree in Military Science from the Army’s Command and General Staff College and a Master of Studies in International Relations from Cambridge. His research interests include political disinformation and deception in the cyber domain.

Senior Military Fellow
CV
Date Label
-

Abstract: The United States is (belatedly) waking up to the risk that adversaries will use social media and botnets to influence U.S. elections. However, we have only begun to analyze how adversaries might conduct information operations in the United States to help advance other political goals, especially during intense crises or escalating cyber conflicts.  Strategies to counter such information operations in the U.S. homeland do not exist. To help begin filling that gap, this presentation examines the risk that adversaries will combine cyberattacks on the power grid with disinformation campaigns, tailored to maximize the disruptive effect of blackouts and gain leverage over U.S. leaders for conflict resolution. The presentation also proposes how the electric industry can build on its expertise for “unity of messaging” in hurricane-induced outages, and partner with government agencies to meet the very different (and vastly more difficult) challenges of countering information warfare.  

Speaker Bio: Paul Stockton is the Managing Director of Sonecon LLC, an economic and security advisory firm in Washington, DC.  Before joining Sonecon, Dr. Stockton served as the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs from May 2009 until January 2013.  In that position, he helped lead the Department’s response to Superstorm Sandy and other disasters. Dr. Stockton also guided Defense Critical Infrastructure Protection policies and programs. Dr. Stockton was twice awarded the Department of Defense Medal for Distinguished Public Service, DOD's highest civilian award. He holds a Ph.D. from Harvard University and a BA from Dartmouth College.  He is the author of Superstorm Sandy: Implications for Designing a Post-Cyber Attack Power Restoration System and numerous other publications on cybersecurity and infrastructure resilience. 

Paul Stockton Managing Director Sonecon
Seminars
Paragraphs

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z. George and Harvey Rishikof that provides practitioners' insights into the operation, missions, and organizational cultures of the principal national security agencies and other institutions that shape the U.S. national security decision-making process. Unlike some textbooks on American foreign policy, it offers analysis from insiders who have worked at the National Security Council, the State and Defense Departments, the intelligence community, and the other critical government entities. The book explains how organizational missions and cultures create the labyrinth in which a coherent national security policy must be fashioned. Understanding and appreciating these organizations and their cultures is essential for formulating and implementing it. Taking into account the changes introduced by the Obama administration, the second edition includes four new or entirely revised chapters (Congress, Department of Homeland Security, Treasury, and USAID) and updates to the text throughout. It covers changes instituted since the first edition was published in 2011, implications of the government campaign to prosecute leaks, and lessons learned from more than a decade of war in Afghanistan and Iraq. This up-to-date book will appeal to students of U.S. national security and foreign policy as well as career policymakers.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Georgetown University Press
Authors
Thomas Fingar
Subscribe to Cybersecurity