Intelligence
-

Abstract: TBA

About the Speaker: Amy Zegart is co-director of CISAC and Professor of Political Science, by courtesy. She is also the Davies Family Senior Fellow at the Hoover Institution. 

Before coming to Stanford in 2011, Zegart served as professor of public policy at UCLA’s Luskin School of Public Affairs and as a fellow at the Burkle Center for International Relations. Her research examines the organization of American national security agencies and their effectiveness. She is the author of two award-winning books. Flawed by Design, which chronicles the development of the Central Intelligence Agency, Joint Chiefs of Staff, and National Security Council, won the highest national dissertation award in political science. Spying Blind, which examines why American intelligence agencies failed to adapt to the terrorist threat before 9/11, won the National Academy of Public Administration’s Brownlow Book Award. She has also published in International SecurityPolitical Science Quarterly, and other leading academic journals. She serves on the editorial boards of Terrorism and Political Violence and Intelligence and National Security. Her most recent book is Eyes on Spies: Congress and the United States Intelligence Community.

Zegart was featured by the National Journal as one of the ten most influential experts in intelligence reform. She served on the Clinton administration's National Security Council staff and as a foreign policy adviser to the Bush-Cheney 2000 presidential campaign. She has testified before the Senate Intelligence Committee, provided training to the Marine Corps, and advised officials on intelligence and homeland security matters. From 2009 to 2011 she served on the National Academies of Science Panel to Improve Intelligence Analysis. Her commentary has been featured on national television and radio shows and in the New York TimesWashington Post, and Los Angeles Times.

Before her academic career, Zegart spent three years at McKinsey & Company advising Fortune 100 companies about strategy and organizational effectiveness.

A former Fulbright scholar, Zegart received an AB in East Asian studies magna cum laude from Harvard University and an MA and PhD in political science from Stanford University. She served on the FBI Intelligence Analysts Association National Advisory Board and the Los Angeles Police Department’s Counter-terrorism and Community Police Advisory Board. She also served on the Secretary of Energy Advisory Board Task Force on Nuclear Nonproliferation and is a lifetime member of the Council on Foreign Relations. She was appointed to the board of directors of Kratos Defense and Security Solutions in September 2014.

CISAC
Stanford University
Encina Hall, E216
Stanford, CA 94305-6165

(650) 725-9754 (650) 723-0089
0
Senior Fellow at the Freeman Spogli Institute for International Studies
Morris Arnold and Nona Jean Cox Senior Fellow at the Hoover Institution
Professor, by courtesy, of Political Science
amyzegart-9.jpg
PhD

Amy Zegart is a senior fellow at the Freeman Spogli Institute for International Studies, the Morris Arnold and Nona Jean Cox Senior Fellow at the Hoover Institution, and Professor of Political Science by courtesy at Stanford University. She is also a contributing writer at The Atlantic. The author of five books, Zegart is an internationally recognized expert in U.S. intelligence, emerging technologies, and global political risk management.

Her award-winning research includes the leading academic study of intelligence failures before 9/11 — Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton, 2007). Her most recent book is the bestseller Spies, Lies, and Algorithms: The History and Future of American Intelligence (Princeton, 2022), which was nominated by Princeton University Press for the Pulitzer Prize. She also co-authored Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity, with Condoleezza Rice (Twelve, 2018) and co-edited Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations with Herbert Lin (Brookings, 2019). Her op-eds and essays have appeared in Foreign Affairs, Politico, the New York Times, Washington Post, and Wall Street Journal

Zegart has advised senior officials about intelligence and foreign policy for more than two decades. She served on the National Security Council staff, as a presidential campaign foreign policy advisor, and has testified before the House and Senate Intelligence committees. 

In addition to her research and teaching, she led Stanford’s Center for International Security and Cooperation, founded the Stanford Cyber Policy Program, and served as chief academic officer of the Hoover Institution. Before coming to Stanford, she was Professor of Public Policy at UCLA and a McKinsey & Company consultant.

She is the recipient of a Fullbright Fellowship, the American Political Science Association's Leonard D. White Dissertation Prize, and research grants from the Carnegie Corporation of New York, the Hewlett Foundation, the Smith Richardson Foundation, and the National Science Foundation.

A native of Louisville, Kentucky, Zegart received an AB in East Asian studies, magna cum laude, from Harvard and a PhD in political science from Stanford. She serves on the board of directors of the council on Foreign Relations, Kratos Defense & Secretary Solutions (KTOS), and the American Funds/Capital Group.

Amy Zegart Co-director CISAC
Seminars
-

Since Iran's Green Revolution, technology has demonstrated its power to mobilize millions of people demanding political and social change in countries where authoritarian regimes remained untouchable for decades. The same technology and open networks have also been used by oppressive governments to surveil populations and thwart these social movements. In facing these tensions, activists and hackers share a common mission of challenging the status quo to improve existing systems - whether governments or networks. How do the two communities work together to defend civil liberties online and on the ground?
 

Image
rita zolotova
Rita Zolotova is a Director of Public Policy for Wickr Inc. and the Wickr Foundation where she leads a global effort to raise privacy awareness and provide security education to human rights activists, journalists, and policy-makers. Rita works closely with technology innovators and security experts to engage kids, particularly young girls, in learning about encryption, cyber security and white-hat hacking. Rita came to Wickr from Middlebury College's Center for Nonproliferation Studies, a policy research center focused on WMD security and terrorism issues. At CNS Rita managed online education initiatives, co-directed the development of a policy design framework for the U.S. State Department on ways to employ new media technology in addressing global arms control and nonproliferation threats. Rita has an extensive experience in political consulting and journalism in Russia. She has degrees in Political Science, Management and holds a Masters Degree in Terrorism and Nonproliferation Studies from the Graduate School of Middlebury College.
 

Wallenberg Theatre

450 Serra Mall #124

(The room is located in the main quad, across the road from Stanford Oval).

-

Sponsored by the Taiwan Democracy Project and the U.S. Asia Security Initiative at the Asia-Pacific Research Center (APARC)

Abstract

During the recent meeting between PRC President Xi Jinping and Taiwan President Ma Ying-jeou, the “1992 One China Consensus” served as a mutually acceptable paradigm for maintaining “peaceful and stable” conditions across the Taiwan Strait.  For Xi Jinping, the warmth of the visit thinly veiled a message to Taiwan’s leaders and electorate, as well as to onlookers in Washington.  Chinese officials and media clearly link the talks and confirmation of the 1992 Consensus to “the great rejuvenation of the Chinese nation”—a concept that is increasingly unpalatable to many in Taiwan.  Xi hopes to keep DPP presidential candidate Tsai Ing-wen (and perhaps even future KMT leaders) in the 1992 Consensus “box” and to co-opt the U.S. in this effort, but perhaps underestimates the political transformation underway on Taiwan. 

The Xi administration has also hardened its position regarding “core interests” such as Taiwan, embodied in a “bottom line principle” policy directive that eschews compromise.  Although many commentators and most officials across the region have shied away from stating that the PRC and Taiwan are at the crossroads of crisis, the collision of political transformation on Taiwan and the PRC’s “bottom line principle” will challenge the fragile foundations of peaceful cross-Strait co-existence.  Changes in the regional balance of military power brought about by a more muscular People’s Liberation Army compounds the potential for increased friction, providing Beijing with more credible options for coercion and deterrence.

This talk will consider the politics and principles involved in cross-Taiwan Strait relations in light of the upcoming 2016 Taiwan elections and the policies of the Xi Jinping administration; and will discuss some of the possible implications for China’s national security policy, regional stability, and the future of cross-Strait relations.

Bio

Image
Cortez Cooper
Mr. Cortez A. Cooper III joined RAND in April 2009, providing assessments of security challenges across political, military, economic, cultural, and informational arenas for a broad range of U.S. government clients.  Prior to joining RAND, Mr. Cooper was the Director of the East Asia Studies Center for Hicks and Associates, Inc.  He has also served in the U.S. Navy Executive Service as the Senior Analyst for the Joint Intelligence Center Pacific, U.S. Pacific Command.  As the senior intelligence analyst and Asia regional specialist in the Pacific Theater, he advised Pacific Command leadership on trends and developments in the Command’s area of responsibility.  Before his Hawaii assignment, Mr. Cooper was a Senior Analyst with CENTRA Technology, Inc., specializing in Asia-Pacific political-military affairs.  Mr. Cooper’s 20 years of military service included assignments as both an Army Signal Corps Officer and a China Foreign Area Officer.  In addition to numerous military decorations, the Secretary of Defense awarded Mr. Cooper with the Exceptional Civilian Service Award in 2001.

2016 Taiwan Elections and Implications for Cross-Strait and Regional Security
Download pdf
Cortez Cooper Senior International Policy Analyst RAND Corporation
Seminars
-

Abstract: A number of senior Intelligence Community (IC) officials describe compliance as one of the IC’s biggest problems, perhaps the biggest. The underlying legal and informational issues are bound to become more acute and complex.  How can AI help? The IC protects our nation by analyzing the relationships between people, places, and things - essentially "connecting the dots.”  Doing so while remaining compliant with policies such as Executive Order 12333[1] and Presidential Policy Directive 28[2] is a balancing act. The interpretation, implementation, and enforcement of policy vary across organizations and administrations.  This frequently leaves analysts struggling to determine what data they can and cannot look at. The Internet, mobile, and “Big Data” generally further complicate the problem. The sheer volume, velocity, and variety of data that is constantly being generated necessitate automation, and even AI, to manage.  However, the benefits of analytic automation over the data deluge will remain limited, until the IC finds a way to scale the processing of legal judgments at a comparable rate.

Before we consider the potential benefits to AI-based methodologies we need to understand two things: Data Rights and Application Uncertainty. Data rights are data attributes derived from laws and dependent institutional policies.  Data rights include but are not limited to classifications, access policies, source limitations, “privacy” constraints, etc. While such data rights are entailed in the data itself, the interpretation and application of these rights are contextual and will vary.  More specifically, application of laws on a data set may be indeterminate: they may vary by time, user, and/or geography; the Second Circuit may issue an unexpected, divergent opinion; access may occur before or after a seminal FISA decision; the Office of Legal Counsel may change its mind; the legal state of a data set at the time of collection may be indeterminate; etc. 
 
About the Speakers: As Executive Vice President at In-Q-Tel, Bob Gleichauf supports technology advancement programs. He is also Director of IQT’s Lab41 initiative, a unique Silicon Valley-based challenge lab that provides “innovation through collaboration” in the area of Big Data analytics. Gleichauf joined IQT from Cisco Systems, where he spent a decade working on the development of secure network infrastructures across a variety of the company’s products. Gleichauf, who has more than a dozen patents in network security, served as CTO for the Wireless and Security Technology Group at Cisco, and is respected globally for his work in information security. He previously served as head of product engineering for the WheelGroup prior to its acquisition by Cisco. Earlier, he was with IQ Software, a leader in the development of database report writing tools. Before making the leap into technology, Gleichauf pursued a Ph.D. in Early Human Prehistory at the University of Michigan, where he earned a fellowship and had the privilege of working in East Africa with the celebrated Leakey family.
 
Joshua H. Walker is an Intellectual Property (IP) partner at Greenberg Traurig, LLP, handling all aspects of IP strategy and transactions, and a legal informatics entrepreneur. Josh has built his career at the nexus of law and computer science. Historically, as an analyst, his work has included helping prosecutors convict orchestrators of the 1996 Rwandan genocide to, now, as an attorney, helping many of the largest and most dynamic technology and financial entities in the world improve IP and data rights outcomes in the M&A, licensing, strategic litigation, and network theft contexts. To help clients solve IP governance, transactional, and risk management problems, Josh cofounded the first law and computer science lab in the country (CodeX), at Stanford University, as well as the top “big data” company for IP litigation (Lex Machina; founding CEO & Chief Legal Architect). However, data wins neither cases nor negotiations. We focus on client collaborations employing engineering efficiencies, design thinking, and empirical data to enhance and advance traditional legal practice. Josh’s IP work has been featured in The Wall Street Journal, The New York Times, The Economist, The Financial Times (listed, 2014 Top Ten Legal Innovator for North America), and numerous other publications. He co-taught “IP Analytics, Strategy, and Decision-Making” at Berkeley Law School, and an advanced IP media transactions seminar at Stanford Law School (“SIPX”). He received his J.D. from the University of Chicago Law School, and an A.B. in Conflict Studies (Special Concentrations) from Harvard College, m.c.l.

 

Bob Gleichauf Chief Scientist and Director of Lab41 In-Q-Tel
Joshua H. Walker Co-founder CodeX: The Stanford Center for Legal Informatics
Seminars
Authors
Clifton Parker
News Type
News
Date
Paragraphs

U.S. national security faces rising challenges from insider threats and organizational rigidity, a Stanford professor says.

Amy Zegart, co-director of the Center for International Security and Cooperation at Stanford and a senior fellow at the Hoover Institution, wrote in a new study that in the past five years, seemingly trustworthy U.S. military and intelligence insiders have been responsible for a number of national security incidents, including the WikiLeaks publications and the 2009 attack at Fort Hood in Texas that killed 13 and injured more than 30.

She defines "insider threats" as people who use their authorized access to do harm to the security of the United States. They could range from mentally ill people to "coldly calculating officials" who betray critical national security secrets.

In her research, which relies upon declassified investigations by the U.S. military, FBI and Congress, Zegart analyzes the Fort Hood attack and one facet of the insider threat universe – Islamist terrorists.

In this case, a self-radicalized Army psychiatrist named Nidal Hasan walked into a Fort Hood facility in 2009 and fired 200 rounds, killing 13 people and wounding dozens of others. The shooting spree remains the worst terrorist attack on American soil since 9/11 and the worst mass murder at a military site in American history, she added.

Insights and lessons learned

Zegart's study of insider and surprise attacks as well as academic research into the theory of organizations led her to some key insights about why the Army failed to prevent Hasan's attack when clues were clear:

Image
• Routines can create hidden hazards. People in bureaucracies tend to continue doing things the same old way, even when they should not, Zegart said, and not just in America. In the Cuban missile crisis of 1962, for example, U.S. spy planes were able to spot Soviet missile installations in Cuba because the Soviets had built them exactly like they always had in the Soviet Union – without camouflage.

In the Fort Hood case, she said, bureaucratic procedures kept red flags about Hasan in different places, making them harder to detect.

• Career incentives and organizational cultures often backfire. As Zegart wrote, several researchers found that "misaligned incentives and cultures" played major roles in undermining safety before the Challenger space shuttle disaster.

Zegart's earlier research on 9/11 found the same dynamic played a role in the FBI's manhunt for two 9/11 hijackers just 19 days before their attack. Because the FBI's culture prized convicting criminals after the fact rather than preventing disasters beforehand, the search for two would-be terrorists received the lowest priority and was handled by one of the least experienced agents in the New York office.

• Organizations matter more than most people think. Robust structures, processes and cultures that were effective in earlier periods for other tasks proved maladaptive after 9/11.

In the case of the Fort Hood attack, the evidence suggests that government investigations, which focused on individual errors and political correctness (disciplining or investigating a Muslim American in the military) identified only some of the root causes, missing key organizational failures.

Hasan slipped through the cracks not only because people made mistakes or were prone to political correctness, but also because defense organizations "worked in their usual ways," according to Zegart.

Adapting to a new threat

In terms of organizational weaknesses, Hasan's Fort Hood attack signaled a new challenge for the U.S. military: rethinking what "force protection" truly means, Zegart said. Before 9/11, force protection reflected a physical protection or hardening of potential targets from an outside attack. Now, force protection has evolved to mean that the threats could come from within the Defense Department and from Americans, she added.

"For half a century, the department's structure, systems, policies and culture had been oriented to think about protecting forces from the outside, not the inside," Zegart wrote.

In the case of Hasan, the Defense Department failed in three different ways to identify him as a threat: through the disciplinary system, the performance evaluation system and the counter-terrorism investigatory system run jointly with the FBI through Joint Terrorism Task Forces.

"Organizational factors played a significant role in explaining why the Pentagon could not stop Nidal Hasan in time. Despite 9/11 and a rising number of homegrown Jihadi terrorist attacks, the Defense Department struggled to adapt to insider terrorist threats," Zegart wrote.

Difficult to change

Another problem was that the Pentagon faced substantial manpower shortages in the medical corps – especially among psychiatrists. So the Defense Department responded to incentives and promoted Hasan, despite his increasingly poor performance and erratic behavior.

In addition, Zegart found the Defense Department official who investigated Hasan prior to the attack saw nothing amiss because he was the wrong person for the job – he was trained to ferret out waste, fraud and abuse, not counterterrorism, which is why he did not know how to look for signs of radicalization or counterintelligence risk.

"In sum, the Pentagon's force protection, discipline, promotion and counter-terrorism investigatory systems all missed this insider threat because they were designed for other purposes in earlier times, and deep-seated organizational incentives and cultures made it difficult for officials to change what they normally did," she wrote.

Zegart acknowledges the difficulties of learning lessons from tragedies like 9/11, the NASA space shuttle accidents and the 2009 Fort Hood shooting.

"People and organizations often remember what they should forget and forget what they should remember," she said, adding that policymakers tend to attribute failure to people and policies. While seemingly hidden at times, the organizational roots of disaster are much more important than many think, she added.

All News button
1
Paragraphs

In an unusually well-documented contribution on Russian secret intelligence, David Holloway posits reasons for Stalin’s unpreparedness in 1940-1941. This, it is fair to say, has long been an obsessive object of interest and study in Russia, because it made all the difference to the course of the war that followed from June 1941. Rather than rushing into moral judgments about the régime, Holloway instead takes a cool look at what information came in to Stalin and allows for the fact that not all the incoming intelligence data were consistent. And in respect of revelations about U.S. construction of the atomic bomb, Holloway shows that Stalin once again consciously distanced himself from the findings of the intelligence services in reaching a final judgment. Whereas in the former case, it nearly led to disaster; in respect of the latter, Stalin was undoubtedly correct.

All Publications button
1
Publication Type
Books
Publication Date
Journal Publisher
Stanford University Press
Authors
David Holloway
David Holloway
Authors
Clifton Parker
News Type
News
Date
Paragraphs

U.S. Sen. Dianne Feinstein (D-Calif.) told a Stanford audience Thursday that mass surveillance programs are designed to find possible terrorists, not snoop on American citizens.

She pointed to the rise of groups like ISIS – now in 12 countries, she said – and the gruesome spectacles of their brand of terrorism as proof that the world is more dangerous than ever.

"I don't think during my lifetime I've ever seen the degree of evil that is out there in the world today," said Feinstein, noting mass murders and beheadings of innocent civilians, including children. "These [surveillance] programs aim to protect this country, pure and simple. They're not aimed to go after Americans."

Feinstein was the final speaker in the yearlong series titled "The Security Conundrum." She spoke in a colloquy format with Stanford's Philip Taubman, consulting professor at Stanford's Center for International Security and Cooperation (CISAC) and former Washington bureau chief of the New York Times. 

Sen. Dianne Feinstein was the final speaker in the yearlong series titled 'The Security Conundrum.' 

Image

The discussion comes during a national debate on how to strike the right balance between security and liberty when technology now makes it possible for the government to collect phone and email data on citizens. With the USA Freedom Act expiring on June 1, Congress is considering legislation to reform the National Security Agency's mass surveillance program.

"We recognize that some reform is in order," said Feinstein, who plans to fly back to Washington for a rare Sunday Senate session on the expiring law.

"The big reform is that the data would be held by the phone companies and not the NSA," she said. If red flags resulted in queries, then warrants would have to be approved.

She took issue with descriptions of those programs as "mass surveillance." In 2013, warrants were sought in just 12 cases out of 288 queries about possible suspects. She said it is a selective process to find a suspect who raises enough concerns to trigger a query.

Feinstein's talk, titled "Congressional Oversight and the Intelligence Community," was held at CEMEX Auditorium.

Feinstein served as chair of the Senate Select Committee on Intelligence from 2009 to 2014 and is now the ranking minority member. She played a leading role in the Senate investigation of the Central Intelligence Agency detention and interrogation program following the terrorist attacks of Sept. 11, 2001.

'Miscarriages of justice'

Taubman asked Feinstein if she was worried that the surveillance programs could track law-abiding citizens, like more primitive efforts in the 1960s and '70s that targeted political and civil rights groups. Feinstein acknowledged that abuses happened in the past, but that congressional oversight of the programs – as is the case today – is essential to a fair process.

In particular, Feinstein decried the government's interrogation process of terrorism suspects at Guantanamo Bay that resulted in claims of torture. Her committee reviewed considerable intelligence data on that issue. "We found there were terrible miscarriages of justice," she said.

She described intelligence agencies as akin to "presidents" in the power they wield. "How do you make these agencies follow the law?" she asked. The only way is to "get in deep enough and close enough" to make it impossible for them to tell an "untruth" in a congressional hearing, she said.

Taubman suggested that it's extremely hard for a few dozen congressional staffers and members to oversee large agencies that employ thousands of people. "You're outgunned," he said.

Feinstein replied that "we have to look beyond the hearing." She said bipartisanship and a focus on producing effective legislation that addresses real problems is critical. "That's the nature of what we do."

She added that no other country in the world has an intelligence committee with as strong an oversight function as does the United States. China and Russia, for example, have growing intelligence agencies but no one watching them.

Feinstein agreed with Taubman that too much secrecy is detrimental to a democratic society. She said she wished she would have held more open, public meetings while in charge of the intelligence committee.

Feinstein expects that renewing the legislation will depend on perhaps three votes in the Senate. "It's possible. If not, the law ends at midnight and that creates a chink in our armor. There's no question in my mind," she said.

Feinstein said there is a "backup" bill that is similar to the USA Freedom Act, but she would prefer to reform the original legislation.

Taubman asked her if the surveillance efforts were actually preventing terrorist acts.

Feinstein said that people are arrested every week under the program, and that relevant information also goes to other countries to help them.

But more than ever, she noted, it's the private sector – not the government – that is extremely enterprising in collecting vast amounts of data from people, such as how they use their cellphones or surf the web.

CIA, China an issue

A California Democrat and Stanford graduate, Feinstein has served in the U.S. Senate since 1993.

When asked why she continues to work as a public servant, she said that 9/11 was a pivotal point in her life. That tragic event and flawed intelligence regarding the justification for the war in Iraq convinced her that a senior position on the intelligence committee would give her a way to help protect her country and fellow citizens.

Taubman expressed amazement that the CIA was actually spying on Feinstein's committee during its review of the hostage intelligence data.

"It was a real dust-up, there's no question about. I think it was a real violation of the separation of powers," she said.

On other issues, such as the rise of China, Feinstein said that country is now practicing "soft power" and flexing its muscles in the South China Sea. Plus, China is "eating our lunch" in regard to cybersecurity.

"I am very worried," she said. "I do not see China as a necessary enemy, but it seems to be going the opposite direction now."

In addition to CISAC, sponsors of "The Security Conundrum" series included the Freeman Spogli Institute for International Studies, the Hoover InstitutionStanford Continuing StudiesStanford in Government and Stanford Law School.

The series "was designed to be an open inquiry in the ongoing debate on how to balance security and liberty," said Amy Zegart, co-director of CISAC and a senior fellow at the Hoover Institution.

This year the series has also included Gen. Michael Hayden, the former director of the National Security Agency and the CIA; journalist Barton Gellman; and former U.S. Sen. Mark Udall.

Hero Image
All News button
1
Authors
Clifton Parker
News Type
News
Date
Paragraphs

U.S. Sen. Dianne Feinstein will speak at Stanford next Thursday, May 28, about striking a balance between security and liberty at a time when Congress is considering legislation to reform the National Security Agency's mass surveillance programs.

Feinstein, D-Calif., is the final speaker in the yearlong Security Conundrum lecture series. She will engage in conversation with Stanford's Philip Taubman, a consulting professor at Stanford'sCenter for International Security and Cooperation and former Washington bureau chief of the New York Times.

Feinstein is expected to discuss Congress' role in overseeing America's intelligence agencies, such as the National Security Agency and the Central Intelligence Agency, and laws that govern their operations. The idea behind the Security Conundrum series is to invite national experts to Stanford to explore issues raised by the federal government's mass surveillance programs, especially in the area of national security, privacy and civil liberties.

The talk, titled "The Security Conundrum: An Evening with Senator Dianne Feinstein," is free and open to the public. It starts at 6:30 p.m., and will be held at the Cemex Auditorium, 641 Knight Way on campus. No TV cameras or film equipment are permitted. Advance registration is required – register here for tickets.

Feinstein has been at the center of the debate about the NSA since Edward Snowden's disclosures exposed an array of mass surveillance programs in 2013. She served as chair of the Senate Select Committee on Intelligence from 2009-2014 and is now the ranking minority member.

Feinstein also played a leading role in the Senate investigation of the CIA detention and interrogation program following the terrorist attacks of Sept. 11, 2001. She pressed to make the Senate report public, and some parts of it were eventually released. A Stanford graduate, Feinstein has served in the U.S. Senate since 1993.

The Security Conundrum is co-sponsored by Stanford's Freeman Spogli Institute for International Studies, the Center for International Security and Cooperation, the Hoover Institution, Stanford Continuing Studies, Stanford in Government and Stanford Law School.

Amy Zegart, CISAC co-director and a senior fellow at the Hoover Institution, has said CISAC and the Hoover Institution would conduct a similar series on international cybersecurity challenges in the coming academic year.

The Security Conundrum series for this past year included Gen. Michael Hayden, the former director of the National Security Agency and the CIA; journalist Barton Gellman; and former U.S. Sen. Mark Udall.

All News button
1
-

The video recording of this event can be watched on YouTube: https://www.youtube.com/watch?v=j57OuqbtD9Q&feature=youtu.be

In an age of terrorism, where should a democratic society draw the line on government surveillance? Edward Snowden’s explosive disclosures about the National Security Agency’s intelligence-collection operations have ignited an intense debate about the appropriate balance between security and liberty in America. In a special series this year, nationally prominent experts will explore the critical issues raised by the NSA’s activities, including their impact on our security, privacy, and civil liberties. This timely series will address one of the most challenging questions the nation faces today as it tries to strike the right balance between safety and liberty. The Security Conundrum will look behind and beyond the headlines, examining the history and implementation of the NSA operations, the legal questions generated by them, the media’s role in revealing them, and the responsibility of Congress to oversee them. It will also address the NSA’s uneasy and evolving relationship with Silicon Valley. Each session in the series is designed to explore these issues from a different vantage point. The guest speakers, in conversation with Stanford scholars, will probe the problems, explain the political, legal, and technological contours of the NSA actions, and outline ways to preserve the nation’s security without sacrificing our freedoms. 

 

An Evening with U.S. Senator Dianne Feinstein

Senator Dianne Feinstein has been at the vortex of the debate about Edward Snowden’s disclosures since he exposed an array of National Security Agency surveillance programs in 2013. As chair of the Senate Select Committee on Intelligence from 2009-2014, and now the ranking minority member, Senator Feinstein has tried to help the nation strike the appropriate balance between security and liberty as she and her Senate colleagues examined NSA practices in light of the Snowden materials. She also played a leading role in the Senate investigation of the Central Intelligence Agency detention and interrogation program following the terrorist attacks of Sept. 11, 2001. Senator Feinstein pressed to make the Senate report public. Some parts of the study were released in December 2014. A California Democrat and Stanford graduate, she has served in the Senate since 1993.

In her May 28 appearance at Stanford, Senator Feinstein will discuss the Congressional role in overseeing America’s intelligence agencies, including the NSA and CIA, and establishing the laws that govern their operations. The format for her appearance will be a colloquy with Philip Taubman, a consulting professor at Stanford’s Center for International Security and Cooperation and former Washington bureau chief of The New York Times. 

To register for a free ticket, please follow this link.

The Security Conundrum is co-sponsored by Stanford’s Freeman Spogli Institute for International Studies, the Center for International Security and Cooperation,the Hoover Institution, Stanford Continuing Studies, Stanford in Government, and the Stanford Law School.

CEMEX Auditorium

Knight Management Center

641 Knight Way, Stanford University

Dianne Feinstein U.S. Senator from California Speaker United States Senate
0
Affiliate
Taubman_Phil.jpg

Philip Taubman is an affiliate at CISAC. His biography of George Shultz, In The Nation's Service: The Life and Times of George P. Shultz, was published by Stanford University Press in January 2023. Before joining CISAC in 2008, Taubman worked at the New York Times as a reporter and editor for nearly 30 years, specializing in national security issues, including United States diplomacy, and intelligence and defense policy and operations. At the Times, Taubman served as a Washington correspondent, Moscow bureau chief, deputy editorial page editor, Washington bureau chief and associate editor. McNamara At War: A New History, co-authored by Philip Taubman and William Taubman, will be published in September 2025 by W.W. Norton. Philip Taubman was a history major at Stanford, Class of 1970, and served as editor-in-chief of the Stanford Daily in 1969. Before joining the New York Times, he worked as a correspondent for Time magazine and was sports editor of Esquire. He was a member of the Stanford Board of Trustees, 1978-1982, and served as secretary of the Stanford Board, 2011-2018. He is author of The Partnership: Five Cold Warriors and Their Quest to Ban the Bomb (Harper Collins, 2012) and Secret Empire: Eisenhower, the CIA, and the Hidden Story of America's Space Espionage. (Simon & Schuster, 2003). 

Date Label
Philip Taubman Journalist Moderator CISAC
Lectures
Subscribe to Intelligence