Cybersecurity
-

WE HAVE REACHED VENUE CAPACITY AND ARE NO LONGER ACCEPTING RSVPS

 

Authoritarian governments around the world are developing increasingly sophisticated technologies for controlling information. In the digital age, many see these efforts as futile, as they are easily thwarted by savvy Internet users who quickly find ways to evade and circumvent them. In this talk, Professor Roberts demonstrates that even censorship that is easy to circumvent is enormously effective. Censorship acts like a tax on information, requiring those seeking information to spend more time and money if they want access. By creating small inconveniences that are easy to explain away, censorship powerfully influences the spread of information and, in turn, what people know about politics. Through analysis of Chinese social media data, online experiments, nationally representative surveys, and leaks from China’s Propaganda Department, Professor Roberts find that when Internet users notice blatant censorship they are willing to compensate for better access.  But subtler censorship, such as burying search results or introducing distracting information on the web, is more effective because users are less aware of it. Roberts challenges the conventional wisdom that online censorship is undermined when it is incomplete and shows instead how censorship’s porous nature is used strategically to divide the public and target influencers. 

Image
Portrait of Margaret E. Roberts
Margaret E. Roberts is an Associate Professor at the U.C. San Diego Department of Political Science. Her research interests lie in the intersection of political methodology and the politics of information, specifically focused on automated text analysis and understanding censorship and propaganda in China. Her work has appeared in venues such as the American Journal of Political Science, American Political Science Review, Political Analysis and Science. Her recent book Censored: Distraction and Diversion Inside China’s Great Firewall was listed as one of the Foreign Affairs Best Books of 2018, was honored with the Goldsmith Book Award, and has been awarded the Best Book Award in the Human Rights Section and Information Technology and Politics Section of the American Political Science Association.  She received her Ph.D. from Harvard University, an M.S. in statistics from Stanford University, and a B.A. in Economics and International Relations from Stanford.

Advisory on Novel Coronavirus (COVID-19)

In accordance with university guidelines, if you (or a spouse/housemate) have returned from travel to mainland China in the last 14 days, we ask that you DO NOT come to campus until 14 days have passed since your return date and you remain symptom-free. For more information and updates, please refer to the Stanford Environmental Health & Safety website: https://ehs.stanford.edu/news/novel-coronavirus-covid-19


Image
Image of red flag over the Shanghai Bund
This event is part of the 2020 Winter/Spring Colloquia series, The PRC at 70: The Past, Present – and Future?, sponsored by APARC's China Program.

 

Margaret E. Roberts Associate Professor, Department of Political Science, U.C. San Diego
Seminars
Authors
Noa Ronkin
News Type
News
Date
Paragraphs

As a U.S.-China trade deal hangs in the balance and the world’s two largest economies are locked in a race for technological supremacy, concerns have arisen about China’s counterintelligence threat to the United States. In July 2019, FBI Director Christopher Wray told members of the U.S. Senate Judiciary Committee that China poses the most severe counterintelligence threat to the United States than any other country, and described that national security and economic espionage threat as “deep and diverse and wide and vexing.” He noted that the FBI has to contend not only with Chinese officials but also with “nontraditional collectors,” including Chinese scientists and students who are looking to steal American innovation. There are currently multiple legislative proposals in Congress, all of which, in one way or another, are aimed at limiting university collaboration with Chinese nationals and the education of Chinese nationals in “strategic” research fields by U.S. higher education institutions.

These legislative endeavors, however, argues Arthur Bienenstock, co-chair of the American Academy of Arts and Sciences’ Committee on International Scientific Partnerships, may endanger the U.S. science and technology workforce and limit the effectiveness of U.S. academic research, thus weakening the very fields the nation is most anxious to protect.

Bienenstock is also a member of the National Science Board, the governing body of the National Science Foundation, and former associate director for science of the White House Office of Science and Technology Policy. At Stanford, he is special assistant to the President for federal research policy, associate director of the Wallenberg Research Link, and professor emeritus of photon science. At a recent lecture hosted by APARC’s China Program, Bienenstock discussed some of the proposed legislation and federal acts regarding international scientific collaboration with China and their implications for the U.S. scientific workforce. He cautioned U.S policymakers against an expansive interpretation of what constitutes “sensitive research” in strategic areas, such as artificial intelligence and quantum science, and offered a framework for determining when scientific research should be subject to greater control.

[To get more stories like this delivered to your inbox sign up for APARC newsletters]

Image
Arthur Bienenstock and Gi-Wook Shin seated at a conference room.
Indeed, said Bienenstock, “China is the only nation in the world that can and plans to challenge U.S. economic, military and ideological leadership” – a challenge that is partly based on its becoming a major scientific and technological power. He agreed that the concerns of FBI Director Wray and others are valid and must be considered carefully, but noted, based on his observations at informative sessions and a meeting with an FBI officer, that the overall number of documented misdeeds involving Chinese nationals is over 100 – far from a deep and wide threat – and that he has not seen evidence of significant student participation in those misdeeds.

We must come to terms with reality, claimed Bienenstock, presenting evidence that the United States is no longer the dominant funder of science and technology research; that Chinese nationals constitute a very significant portion of the U.S. workforce in computer science, engineering, and mathematics; and that the U.S. science and technology workforce is highly dependent on Chinese graduate students.

The United States must maintain and strengthen its scientific and technological efforts if it is to maintain a leadership position, Bienenstock said. To do so, he emphasized, U.S. universities must maintain their openness, and lawmakers, in turn, must thoughtfully understand the benefits of collaboration with Chinese scientists and engineers as well as keep the country attractive for Chinese students.

Listen to highlights from Bienenstock’s presentation on our SoundCloud channel. A transcript is available below.

Photo: Arthur Bienenstock (right) and APARC DIrector Gi-Wook Shin (credit: Andrea Brown).

Hero Image
Concept of U,S.-China technology competition: brain-shaped boxing gloves covered in U.S. and China flags facing against each other on a background of a motherboard Just Super/ Getty Images
All News button
1
News Type
Blogs
Date
Paragraphs

On May 23, Stanford students enrolled in Technology and Security (MS&E 193/293) met with General James M. Holmes. General Holmes delivered delivered gave a talk, "Applying Technology--the Military Perspective," and engaged students in a Q&A session afterwards. The interisciplinary course explores the relation between technology, war, and national security policy from early history to modern day, focusing on current U.S. national security challenges and the role that technology plays in shaping our understanding and response to these challenges.

 

img 4445 General James M. Holmes

[[{"fid":"231402","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"2":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"2"}}]]

[[{"fid":"231403","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"3":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"3"}}]]

Hero Image
img 4445
General James M. Holmes
Margaret Williams
All News button
1
Paragraphs

This is a chapter in the second edition of The National Security Enterprise, a book edited by Roger Z. George and Harvey Rishikof that provides practitioners' insights into the operation, missions, and organizational cultures of the principal national security agencies and other institutions that shape the U.S. national security decision-making process. Unlike some textbooks on American foreign policy, it offers analysis from insiders who have worked at the National Security Council, the State and Defense Departments, the intelligence community, and the other critical government entities. The book explains how organizational missions and cultures create the labyrinth in which a coherent national security policy must be fashioned. Understanding and appreciating these organizations and their cultures is essential for formulating and implementing it. Taking into account the changes introduced by the Obama administration, the second edition includes four new or entirely revised chapters (Congress, Department of Homeland Security, Treasury, and USAID) and updates to the text throughout. It covers changes instituted since the first edition was published in 2011, implications of the government campaign to prosecute leaks, and lessons learned from more than a decade of war in Afghanistan and Iraq. This up-to-date book will appeal to students of U.S. national security and foreign policy as well as career policymakers.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Georgetown University Press
Authors
Thomas Fingar
News Type
Commentary
Date
Paragraphs

Shorenstein Asia-Pacific Research Center (APARC) Director Gi-Wook Shin spoke with Yonhap News about the situation on the Korean Peninsula, following a visit to U.S. Pacific Command with a delegation of scholars from the Freeman Spogli Institute for International Studies.

While there, U.S. officials conveyed that the United States has the capability to strike North Korea should the president make that call.

U.S. officials said that North Korea had already moved into the “red zone,” and that the Trump administration has the view that it cannot miss a window of opportunity to stop the nuclear and missile program before it advances further.

Shin also said he believed that the Trump administration holds a view that the policy of “strategic patience” failed under the Obama administration, and that growing tensions on the Peninsula have compelled the Trump administration to consider – with greater plausibility – the option of a preemptive military strike.

Regional tensions have risen in the midst of impending political shifts in South Korea, where a new president will assume office following a snap election this May, and in China, where the Party Congress will meet to appoint new senior leadership of the Chinese Communist Party this fall.

Whoever becomes president in South Korea should place relations with North Korea at the top of the agenda and consider sending an envoy early on to meet its leader Kim Jong-un in-person, Shin said.

The Yonhap interview can be viewed in Korean, and a shorter version, in English. A related analysis piece is also available on MK News (in Korean).

Hero Image
north korea hydrogen bomb test
Korea Meteorological Administration (KMA) staff check a screen showing seismic waves from North Korea at the KMA center on Jan. 6, 2016, in Seoul, South Korea.
Chung Sung-Jun/Getty Images News
All News button
1
0
Corporate Affiliate Visiting Fellow, 2016-17
akihiko_sado.jpg MS

Akihiko Sado is a corporate affiliate visiting fellow at the Walter H. Shorenstein Asia-Pacific Research Center (Shorenstein APARC) for 2016-17.  Sado has more than 13 years of experience as a computer engineer at The Asahi Shimbun, the national leading newspaper in Japan.  Most recently, he has worked mainly in the security and network field.  While at Shorenstein APARC, Sado will research the technology necessary for future media.  Sado graduated from Waseda University with a M.S. in Information Technology.

Date Label
News Type
Q&As
Date
Paragraphs

Sony Pictures Entertainment was set to release a satirical comedy, “The Interview,” in late 2014, but a cyberattack hit the organization that leaked corporate information, leading the company to initially pull the film and opening up a string of theories over who was behind the attack and how to respond.

Speculation began to mount as a clearer picture of the unprecedented hacking, both comprehensive and large in size, began to emerge. The breach is thought to be retribution for Sony’s production of the film, which carries a plot to assassinate North Korean leader Kim Jong-un.

Then, a threat was directed at movie theaters and moviegoers planning to screen and see “The Interview.” The message warned those against involvement ahead of the film’s Dec. 25 opening, indicating a “bitter fate” and alluding to the 9/11 attacks in the United States.

An unknown group, The Guardians of Peace “GOP,” claimed responsibility for the cyberattack. Media and those familiar with North Korea began to point blame on the country, which had already publicly condemned the film last June and has a history of cybercrime. Responding to accusations, top North Korean leadership rejected any involvement in the attack.

Image
rsd14 078 0248a

The White House responded as Sony canceled the film’s New York premiere and said it would discontinue distribution. Following his year-end press conference, President Barack Obama condemned the hacking, citing the Federal Bureau of Investigation’s conclusion that North Korea was behind the attack. The President said the United States would respond “proportionally,” and on Jan. 2, signed an Executive Order that put into action a series of sanctions imposed by the Department of the Treasury.

David Straub, a Korea expert at Stanford University, answered questions about the Sony hacking and its policy implications for the United States and North-South Korean relations. Straub is the associate director of the Korea Program at the Walter H. Shorenstein Asia-Pacific Research Center. He formerly served as the State Department’s Korean affairs director.

What do we know about the Sony hacking? Who’s responsible?

Based on many types of evidence, including confidential information, U.S. government officials appear to be quite confident that North Korea did in fact conduct this operation. There’s still some disagreement in the media and among tech experts over who is responsible. They’ve cited a number of reasons but the main one is that the FBI’s official statement attributing the attack to North Korea provided evidence that they believe is far from conclusive. I myself am not a technical expert, but based upon my following North Korea for many years – the attack strikes me as being very likely to have been a North Korean operation. The FBI statement noted that the Sony attack is similar to an attack that the North Koreans conducted against South Korean banks and media outlets in March 2013. In that attack, many South Korean banks had their hard drives completely wiped clean. It was a hugely destructive attack and very similar to what happened to Sony.

Does North Korea’s response to the Sony hack coincide with past behavior?

In addition to the 2013 South Korean bank cyberattack, the North Koreans apparently sank a South Korean naval vessel in 2010, killing 46 sailors. In both instances, the North Koreans denied that they did it, expressed outrage over being accused, demanded that the South Koreans produce proof, said that they could prove that they didn’t do it, and then requested that the South Koreans conduct a joint investigation. These same demands are being made in response to the U.S. blaming Pyongyang for the Sony cyberattack. It couldn’t be more similar. More generally, the North Korean regime is very calculating. They know they can’t win an outright military confrontation with South Korea, much less the United States, so what they do is try to find a weak link and go after it in a way in which they have plausible deniability – a situation where it’s very difficult for the attacked party to prove who did it.

Describe North Korea’s hacking capabilities.

North Korea is a very secretive country, so it’s hard to be completely certain of their cyber capabilities. However, according to many accounts, the North Korean government has established professional hacking schools and units over the years, resulting in hundreds if not thousands of trained hackers. North Korea has engaged in a number of attacks in the past, the most prominent one was the attack on South Korean banks in March 2013. But also, a few years ago, North Korea conducted less sophisticated attacks on major U.S. government websites.

Why would they conduct an attack?

The North Koreans appear to have both the capability and the motivation to attack Sony. The nation’s entire political system rests on a cult of personality – now a cult of family, actually – that began with the founder of the regime, Kim Il-sung, and extends to his grandson today, leader Kim Jong-un, who has been in power since Dec. 2011. It’s the only thing holding the political system together at this point. The cult of personality is so strong that any direct criticism of the top leader is something that North Koreans will compete among each other to reject. From this standpoint, it seems very likely that they would feel they had to prevent the showing of a movie that features an assassination of Kim Jong-un. And, the hackers had plenty of time to prepare for and implement the attack because everyone knew well ahead of when the movie would be released.

The United States placed new financial sanctions on North Korea. What impact will the sanctions have?

President Obama made it clear that the U.S. government would respond at a time, in a place, and in a manner of its own choosing. Not all measures taken would be made public. So far, the first publically announced measure was the President’s Executive Order on Jan. 2 imposing additional sanctions on a number of North Korean agencies and officials. This in itself is unlikely to have major consequences because most of those entities were already sanctioned. But, the Executive Order states that the sanctions are being implemented not only because of the cyberattack against Sony, but more generally because of North Korea’s actions and policies, including its serious human rights abuses. So in a sense, the North Koreans got the United States to expand its reasons for sanctioning them.

 

President Obama addresses the Sony hacking, saying the United States will "respond proportionally," at his year-end press briefing on Dec. 19.

President Obama addresses the Sony hacking at his year-end press briefing on Dec. 19. Photo credit: WhiteHouse.gov

 

What other steps will the United States likely take?

President Obama left open the possibility that North Korea might be returned to the U.S. State Sponsors of Terrorism list, from which the nation was removed in 2008. I think it was a mistake to remove North Korea from that list in the first place. It was done to promote progress on the nuclear talks, which eventually failed, and ignored a number of terroristic actions that North Korea has committed in recent years. Another possibility, which is being pushed by Republicans in Congress, is to increase financial sanctions that mirror the type that were successfully implemented in Iran.

How will the U.S. response influence cybersecurity policy going forward?

The attack on Sony is a huge wakeup call to American businesses, and even to the U.S. government. It’s the first attack of this size on a company located in the United States. It got tremendous profile in the media and the President has been personally engaged in responding. Nearly everyone has heard about it, so U.S. companies are now going to be focused much more on cybersecurity because it has exposed some potential vulnerabilities – a “if North Korea can do it, presumably others can too” mentality. Moreover, if an attack can be executed on a film company, it could also be done to other businesses and even to elements of U.S. critical infrastructure.

How do you view North Korean leader Kim Jong-un’s possible offer to meet with South Korean leadership this year?

Kim Jong-un said that he was open to the possibility of a summit with South Korea in his annual New Year’s address, although he made no specific proposal. He made clear that the summit would be conditional on actions to be taken in advance by South Korea. Among these, Kim demanded ending U.S.-South Korean military exercises and halting the flow of propaganda-filled balloons sent over the border into the North by non-governmental activist groups in the South. Moreover, North Korea has a history of expanding its conditions later, without any warning. So, I think one has to be skeptical. The signal is unfortunately less likely to be a sincere effort toward real, sustained dialogue, and more likely to be a North Korean propaganda effort devised to confuse, divert and divide international public opinion. That said, South Korea has acted entirely appropriately in welcoming the signal and reiterating its own offer of high-level talks. Let’s hope for the best.

David Straub also participated in an interview with Public Radio International on Jan. 1 about the prospect for North-South talks, the audio can be accessed on the PRI website.

Hero Image
reuters theinterview
"The Interview," a Sony Pictures film starring actors Seth Rogen and James Franco about a fictional plot to assasinate North Korean leader Kim Jong-un, releases in theaters.
Reuters/Kevork Djansezian
All News button
1
-

The U.S.-Japan relationship is not much in the headlines these days—and when it is the stories seem to focus on issues, such as Okinawa and beef, that have bedeviled ties seemingly for decades. But, in the midst of seismic shifts in Asia-Pacific security and global economic relations, shouldn’t the two countries be talking about something else?

Many in American industry have thought so and in 2009 the American Chamber of Commerce in Japan released a white paper calling for a new set of discussions with Japan directed at capturing the innovation and growth potential of the emerging global Internet economy. Accompanying the call were a set of over 70 specific recommendations for discussion in areas ranging from privacy, security, intellectual property, spectrum management, cyber security to competition—an agenda for the future not the past.

The paper found resonance with the new Democratic Party government in Japan and the Obama administration that were searching for a new direction and vocabulary for U.S.-Japan economic relations and were mindful that partnership with Japan in this area strengthened the U.S. hand in dealing with preemptive attempts elsewhere to define rule of the road for the Internet and “cloud computing.” 

The Dialogue was formally launched in the fall of 2010 and its third plenary session is taking place in Washington, D.C. October 16 to 19, 2012. Professor Jim Foster is participating in the Dialogue as a leading member of the U.S. private sector delegation to the talks. He will be coming to Stanford immediately following the joint industry-government meeting on October 18 (the governments will continue in closed-door session through the 19th) and will offer his analysis and insight into the discussions in Washington and their implications for future cooperation between Japan and the U.S. industry in the cloud computing field and for the two governments on challenging issues of broader Internet governance.

Jim Foster is currently a professor in the Graduate School of Media and Governance at Keio University, where he teaches and researches on U.S. foreign policy issues and global Internet policy. He is the co-director of Keio’s Internet and Society Institute. Foster worked as a U.S. diplomat from 1981 to 2006, serving in Japan, Korea, the Philippines and at the U.S. Mission to the EU. He was director for corporate affairs at Microsoft Japan from 2006 to 2011. He is a former vice president of the American Chamber of Commerce in Japan and a co-author of the ACCJ White Paper on the Internet Economy.

Philippines Conference Room

Jim Foster Professor, Keio University and Vice-Chair of the American Chamber of Commerce (ACCJ) in Japan Internet Economy Task Force Speaker
Seminars
Subscribe to Cybersecurity