Intelligence
0
renee-diresta.jpg

Renée DiResta is the former Research Manager at the Stanford Internet Observatory. She investigates the spread of malign narratives across social networks, and assists policymakers in understanding and responding to the problem. She has advised Congress, the State Department, and other academic, civic, and business organizations, and has studied disinformation and computational propaganda in the context of pseudoscience conspiracies, terrorism, and state-sponsored information warfare.

You can see a full list of Renée's writing and speeches on her website: www.reneediresta.com or follow her @noupside.

 

Former Research Manager, Stanford Internet Observatory
Authors
Thomas Holme
News Type
News
Date
Paragraphs

We are delighted to announce that APARC’s Oksenberg-Rohlen Fellow David M. Lampton is the recipient of the 2019 John and Vivian Sabel Award for best article published in the Journal of Contemporary China (JCC), for his article “Xi Jinping and the National Security Commission: Policy Coordination and Political Power.”

Lampton’s article discusses the rationale for, and progress to date of, creating a National Security Commission in China. First announced in late 2013, the commission was part of Xi Jinping's drive to consolidate his personal power over the internal and external coercive and diplomatic arms of the governing structure. Lampton argues that it remains to be seen whether the institutional attempt to achieve coordination will improve, or further complicate, China's long-standing coordination problem.

The John and Vivian Sabel Award was launched in 2016 to celebrate publication of the 100th issue and the 25th anniversary of the JCC. Dr. Lampton’s article was published in Volume 24, Issue 95, 2015.

An award reception and dinner will be held at the Josef Korbel School of International Studies, University of Denver on April 30, 2019.

All News button
1
Authors
News Type
News
Date
Paragraphs

The House Permanent Select Committee on Intelligence held a public hearing on Thursday, March 28, 2019, as part of its investigation into Russian influence during and after the 2016 election campaign.

The hearing, "Putin’s Playbook: The Kremlin’s Use of Oligarchs, Money and Intelligence in 2016 and Beyond” included testimony by Michael McFaul, former U.S. Ambassador to Russia and Director of the Freeman Spogli Institute at Stanford University.


Download Complete Testimony (PDF 263 KB)

EXCERPT

To contain and thwart the malicious effects of “Putinism,” the United States government and the American people must first understand the nature of the threat. This testimony focuses onthe nexus of political and economic power within Russia under Putin’s leadership, and how these domestic practices can be used abroad to advance Putin’s foreign policy agenda. Moreover, it is important to underscore that crony capitalism, property rights provided by the state, bribery, and corruption constitute only a few of many different mechanisms used by Putin in his domestic authority and foreign policy abroad.

This testimony proceeds in three parts. Section I describes the evolution of Putin’s system of government at home, focusing in particular on the relationship between the state and big business. Section II illustrates how Putin seeks to export his ideas and practices abroad. Section III focuses on Putin’s specific foreign policy objective of lifting sanctions on Russian individuals and companies.

Watch the C-SPAN recording of the testimony


Media Contact: Ari Chasnoff, Assistant Director for Communications, 650-725-2371, chasnoff@stanford.edu

All News button
1
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

Congress’s annual worldwide-threat hearings are usually scary affairs, during which intelligence-agency leaders run down all the dangers confronting the United States. This year’s January assessment was especially worrisome, because the minds of American citizens were listed as key battlegrounds for geopolitical conflict for the first time. “China, Russia, Iran, and North Korea increasingly use cyber operations to threaten both minds and machines in an expanding number of ways,” wrote Director of National Intelligence Dan Coats. Coats went on to suggest that Russia’s 2016 election interference is only the beginning, with new tactics and deep fakes probably coming soon, and the bad guys learning from experience.

Deception, of course, has a long history in statecraft and warfare. The Greeks used it to win at the Battle of Salamis in the fifth century b.c. The Allies won the Second World War in Europe with a surprise landing at Normandy—which hinged on an elaborate plan to convince Hitler that the invasion would be elsewhere. Throughout the Cold War, the Soviets engaged in extensive “active measure” operations, using front organizations, propaganda, and forged American documents to peddle half-truths, distortions, and outright lies in the hope of swaying opinion abroad.

But what makes people susceptible to deception? A colleague and I recently launched the two-year Information Warfare Working Group at Stanford. Our first assignment was to read up on psychology research, which drove home how vulnerable we all are to wishful thinking and manipulation.

Read the rest at The Atlantic

All News button
1
Authors
Amy Zegart
Kevin Childs
News Type
Commentary
Date
Paragraphs

Closing the gap between technology leaders and policy makers will require a radically different approach from the defense establishment.

A silent divide is weakening America’s national security, and it has nothing to do with President Donald Trump or party polarization. It’s the growing gulf between the tech community in Silicon Valley and the policy-making community in Washington.

Beyond all the acrimonious headlines, Democrats and Republicans share a growing alarm over the return of great-power conflict. China and Russia are challenging American interests, alliances, and values—through territorial aggression; strong-arm tactics and unfair practices in global trade; cyber theft and information warfare; and massive military buildups in new weapons systems such as Russia’s “Satan 2” nuclear long-range missile, China’s autonomous weapons, and satellite-killing capabilities to destroy our communications and imagery systems in space. Since Trump took office, huge bipartisan majorities in Congress have passed tough sanctions against Russia, sweeping reforms to scrutinize and block Chinese investments in sensitive American technology industries, and record defense-budget increases. You know something’s big when senators like the liberal Ron Wyden and the

In Washington, alarm bells are ringing. Here in Silicon Valley, not so much. “Ask people to finish the sentence, ‘China is a ____ of the United States,’” said the former National Economic Council chairman Keith Hennessey. “Policy makers from both parties are likely to answer with ‘competitor,’ ‘strategic rival,’ or even ‘adversary,’ while Silicon Valley leaders will probably tell you China is a ‘supplier,’ ‘investor,’ and especially ‘potential market.’”

Read the rest at The Atlantic.

 

 

All News button
1
Authors
Amy Zegart
News Type
Commentary
Date
Paragraphs

The Founding Fathers relied on deceit in championing American independence—and that has lessons for the present.

As we celebrate Thanksgiving weekend, a holiday first declared by George Washington’s presidential proclamation in 1789, it is worth remembering that deception played a pivotal role in America’s birth. Our shining city on the hill owes much to the dark arts. George Washington, Benjamin Franklin, and other Founding Fathers are remembered today as virtuous creators of a bold new democracy. But they were also cunning manipulators of their information environment—a side of the founding story that has often been neglected by history.

George Washington’s inability to tell a lie is a lie. That old cherry-tree fable—in which young George admits to his father that he did, indeed, chop down the tree with his hatchet—was invented by a Washington biographer named Mason Locke Weems in 1806 to boost his book sales. In truth, Washington was an avid spymaster with a talent for deception that would remain unequaled by American presidents for the next 150 years. During the Revolutionary War, Washington was referred to by his own secret code number (711), made ready use of ciphers and invisible ink, developed an extensive network of spies that reported on British troop movements and identified American traitors, and used all sorts of schemes to protect his forces, confuse his adversaries, and gain advantage. His military strategy was to outsmart and outlast the enemy, not outfight him. He used intelligence to avoid more battles than he fought, and to trick the British into standing down when standing up could have meant the end of the Continental Army.

Read the rest at The Atlantic

All News button
1
0
rsd18_083_0009a.jpg

Alex Stamos is a cybersecurity expert, business leader and entrepreneur working to improve the security and safety of the Internet. Stamos was the founding director of the Stanford Internet Observatory at the Cyber Policy Center, a part of the Freeman Spogli Institute for International Studies. He is currently a lecturer, teaching in both the Masters in International Policy Program and in Computer Science.

Prior to joining Stanford, Alex served as the Chief Security Officer of Facebook. In this role, Stamos led a team of engineers, researchers, investigators and analysts charged with understanding and mitigating information security risks to the company and safety risks to the 2.5 billion people on Facebook, Instagram and WhatsApp. During his time at Facebook, he led the company’s investigation into manipulation of the 2016 US election and helped pioneer several successful protections against these new classes of abuse. As a senior executive, Alex represented Facebook and Silicon Valley to regulators, lawmakers and civil society on six continents, and has served as a bridge between the interests of the Internet policy community and the complicated reality of platforms operating at billion-user scale. In April 2017, he co-authored “Information Operations and Facebook”, a highly cited examination of the influence campaign against the US election, which still stands as the most thorough description of the issue by a major technology company.

Before joining Facebook, Alex was the Chief Information Security Officer at Yahoo, rebuilding a storied security team while dealing with multiple assaults by nation-state actors. While at Yahoo, he led the company’s response to the Snowden disclosures by implementing massive cryptographic improvements in his first months. He also represented the company in an open hearing of the US Senate’s Permanent Subcommittee on Investigations.

In 2004, Alex co-founded iSEC Partners, an elite security consultancy known for groundbreaking work in secure software development, embedded and mobile security. As a trusted partner to world’s largest technology firms, Alex coordinated the response to the “Aurora” attacks by the People’s Liberation Army at multiple Silicon Valley firms and led groundbreaking work securing the world’s largest desktop and mobile platforms. During this time, he also served as an expert witness in several notable civil and criminal cases, such as the Google Street View incident and pro bono work for the defendants in Sony vs George Hotz and US vs Aaron Swartz. After the 2010 acquisition of iSEC Partners by NCC Group, Alex formed an experimental R&D division at the combined company, producing five patents.

A noted speaker and writer, he has appeared at the Munich Security Conference, NATO CyCon, Web Summit, DEF CON, CanSecWest and numerous other events. His 2017 keynote at Black Hat was noted for its call for a security industry more representative of the diverse people it serves and the actual risks they face. Throughout his career, Alex has worked toward making security a more representative field and has highlighted the work of diverse technologists as an organizer of the Trustworthy Technology Conference and OURSA.

Alex has been involved with securing the US election system as a contributor to Harvard’s Defending Digital Democracy Project and involved in the academic community as an advisor to Stanford’s Cybersecurity Policy Program and UC Berkeley’s Center for Long-Term Cybersecurity. He is a member of the Aspen Institute’s Cyber Security Task Force, the Bay Area CSO Council and the Council on Foreign Relations. Alex also serves on the advisory board to NATO’s Collective Cybersecurity Center of Excellence in Tallinn, Estonia.

Former Director, Stanford Internet Observatory
Lecturer, Masters in International Policy
Lecturer, Computer Science
Date Label
News Type
Blogs
Date
Paragraphs

On May 23, Stanford students enrolled in Technology and Security (MS&E 193/293) met with General James M. Holmes. General Holmes delivered delivered gave a talk, "Applying Technology--the Military Perspective," and engaged students in a Q&A session afterwards. The interisciplinary course explores the relation between technology, war, and national security policy from early history to modern day, focusing on current U.S. national security challenges and the role that technology plays in shaping our understanding and response to these challenges.

 

img 4445 General James M. Holmes

[[{"fid":"231402","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"2":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"2"}}]]

[[{"fid":"231403","view_mode":"crop_870xauto","fields":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"},"link_text":null,"type":"media","field_deltas":{"3":{"format":"crop_870xauto","field_file_image_description[und][0][value]":"General James M. Holmes","field_file_image_alt_text[und][0][value]":"General James M. Holmes","field_file_image_title_text[und][0][value]":"General James M. Holmes","field_credit[und][0][value]":"Margaret Williams","field_caption[und][0][value]":"","thumbnails":"crop_870xauto"}},"attributes":{"alt":"General James M. Holmes","title":"General James M. Holmes","class":"media-element file-crop-870xauto","data-delta":"3"}}]]

Hero Image
All News button
1
-

Abstract: 

  1. What do some of America’s adversaries think about U.S. scientists, engineers and technical specialists they meet?
  2. What is it really like to be an intelligence officer (IO) abroad? What are some of the stresses IO’s experience in their work?
  3. What is Counterintelligence (CI)?
 
Speaker bio: Bill Phillips is a former senior officer of the CIA’s clandestine service (Directorate of Operations.) He has over 36 years experience as a professional intelligence officer. Bill served overseas for most of his 25 years at CIA. Among other things, Bill was the CIA’s senior field operations executive manager in three overseas posts. He also served as the Chief of Staff to the Head of the Clandestine Service  in the months following the 911 attacks. After his retirement from the Directorate of Operations (DO), Bill worked for the National Nuclear Security Administration (DOE) as Director of Counterintelligence at Los Alamos National Laboratory. After that, Bill retired again and worked as a national security consultant on CI to various elements of the executive branch of government. Bill is the recipient of CIA’s Distinguished Career Intelligence Medal, two Meritorious Unit Citations, the CIA National HUMINT Collector Award, CIA’s Latin America Division Medal and numerous other honors for sustained exceptional performance. He was certified as a ‘CI Professional’ by the CIA. Bill is now completely retired and occasionally consults on CI doctrine, the practice of mindfulness in the intelligence profession and resilience issues.
0
bill_philips.jpg

Bill Phillips has vast experience in the US Intelligence Community with over 36 years as a professional intelligence officer, over 25 of which were as a CIA clandestine service officer.  Among his many accomplishments, Bill served as CIA Chief of Station (COS) in Latin America and the Near East, and developed specialized Counterintelligence expertise.  Bill has nationally recognized prowess in HUMINT and extensive knowledge of multiple foreign environments and cultures. He managed and led complex global, HUMINT, counterintelligence, counterterrorism and counternarcotics operations. He worked closely with senior US government officials, Congressional elements, FBI, and elements of the US military, and has substantive expertise in South Asia, the Caribbean and certain remote areas of Latin America.   Bill was awarded CIA’s Distinguished Career Intelligence Medal, the National HUMINT Collector Award, the CIA’s Latin America Division Medal, Two Meritorious Unit Citations and numerous CIA Exceptional Performance Awards.

Bill also served as Director of the Office of Counterintelligence (CI) at Los Alamos National Laboratory from 2005-2010. Bill enhanced that program by focusing CI efforts on educating LANL’s staff to the risks and threats posed by adversarial governments, criminal enterprises and terrorist organizations.  Bill integrated disparate disciplines (collection, analysis, investigations, and cyber) to strengthen the lab’s CI program.  A trusted member of the LANL leadership team, Bill collaborated with elements of the US Intelligence Community and FBI on highly sensitive CI investigations.

Currently, Bill is an independent consultant and has created intelligence related training programs, taught and advised clients in the IC.  He especially enjoys mentoring and guiding individuals new to the intelligence field.

Bill received a B.A. in History from Howard University in 1972 and a J.D. from Rutgers University in 1975.

A longtime student of Ki Aikido and Zen, Bill has used aspects of these disciplines in his work as an intelligence professional, leader, teacher and mentor. While at CIA, Bill helped create a pilot course introducing intelligence officers to the stress relieving benefits and resilience potential of meditation. Bill is a member of the Northern California Chapter of the Explorers Club. He is married with two adult sons.

Topics:   Counterintelligence, Intelligence, National Security, U.S. Intra-agency communication, Race Relations, Leadership, Mindfulness

 

 

Affiliate
Central Intelligence Agency (retired)
Seminars
Paragraphs
Book cover of "Peace on a Knife's Edge" showing South Korean president Roh Moo-hyun alongside George W. Bush and Kim Jong-il

Lee Jong-Seok served as vice-secretary of South Korea’s National Security Council and as its unification minister under the Roh Moo-Hyun administration (2003–08). After Roh’s tragic death in 2009, Lee resolved to present a record of the so-called participatory government’s achievements and failures in the realm of unification, foreign affairs, and national security.

Peace on a Knife’s Edge is the translation of Lee’s 2014 account of Roh’s efforts to bring peace to the Korean Peninsula in the face of opposition at home from conservative forces and abroad from the Bush administration’s hard stances of “tailored containment” and its declaration of the North as part of the “axis of evil.” Lee’s narrative will give American readers rare insights into critical moments of Roh’s incumbency, including the tumultuous Six-Party Talks; the delicate process of negotiating the relocation and reduction of United States Forces Korea; Roh’s pursuit of South Korea’s “autonomous defense”; conflicts with Japan over history issues; and the North’s first nuclear weapons test.

Desk, examination, or review copies can be requested through Stanford University Press.

All Publications button
1
Publication Type
Books
Publication Date
Subtitle

The Inside Story of Roh Moo-hyun's North Korea Policy

Book Publisher
Shorenstein Asia-Pacific Research Center, distributed by Stanford University Press
Number
978-1-931368-43-8
Subscribe to Intelligence