Cybersecurity Bootcamp

Total Page:16

File Type:pdf, Size:1020Kb

Cybersecurity Bootcamp 10011001010101010110011000101010110111001100101010101011001100010101011011100110010 10101010110011000101010110110011001010101010110011000101010110111100110010101010101 10011000101010110111001100101010101011001100010101011011100110010101010101100110001 01010110110011001010101010110011000101010110111100110010101010101100110001010101101 11001100101010101011001100010101011011100110010101010101100110001010101101100110010 10101010110011000101010110111100110010101010101100110001010101101110011001010101010 11001100010101011011100110010101010101100110001010101101100110010101010101100110001 01010110111100110010101010101100110001010101101110011001010101010110011000101010110 11100110010101010101100110001010101101100110010101010101100110001010101101111001100 10101010101100110001010101101110011001010101010110011000101010110111001100101010101 01100110001010101101100110010101010101100110001010101101111001100101010101011001100 01010101101110011001010101010110011000101010110111001100101010101011001100010101011 01100110010101010101001010101101111001100101010101011001100010101011011100110010101 01010110011000101010110100110001010101101100110010101010101100110001010101101111010 10110111001100101010101011001100010101011011100110010101010101100111000001010101101 01010110011000101010110100110001010101101100110010101010101100110001010101101111010 10110111001100101010101011001100010101011011100110010101010101100111000001010101100 STANFORD CONGRESSIONAL CYBER BOOT CAMP ! Hoover Institution | Center for International Security! and Cooperation | Stanford University AUGUST 18 – 20, 2014 TABLE OF CONTENTS Note from the Conveners 1 Conference Agenda and Schedule 3 Map of Stanford 5 Keynote Speaker Biographies 6 Session Descriptions 13 Overview of Google Visit 23 Staffer Biographies 24 A NOTE FROM THE CONVENERS Cybersecurity represents one of the most pressing challenges that the United States will face in the coming decades. Ensuring continued economic prosperity and defense readiness requires improving the security of the computing devices, systems, and networks that have become essential to the nation’s commerce and defense. Moreover, the United States has at its disposal powerful offensive capabilities in cyberspace—how can and should it use these capabilities in support of national interests? These and other cyber issues are important, complex, and here to stay. While technological capabilities are moving ahead at international security issues through rigorous lightning speed, policy and legal frameworks in scholarship, policy outreach, and Track II diplomacy. cybersecurity are lagging behind. Historically, Both institutions are dedicated to developing policy governments have safeguarded citizens and national relevant knowledge by bridging academic divides, interests from external threats. In cyber, however, convening leading thinkers across sectors, and training traditional boundaries the next generation.! are fuzzy. What constitutes an The spirit of cross- internal threat? An disciplinary external one? How collaboration and do we even know a drive for innovation threat when we see run deep at Stanford, it? The roles and and help explain why missions in the university ranks cyberspace of various as one of the best in government agencies the world, with top are also unclear. departments ranging What is clear is that from computer the government science to classics cannot go it alone: and scholars and the private sector alumni who include 5 holds key capabilities Pulitzer Prize winners, and owns vital assets 21 astronauts, 27 that make public/private cooperation essential, MacArthur Fellows, 28 current billionaires, and 22 living demanding, and often problematic.! Nobel Laureates. Stanford’s interdisciplinary programs include new undergraduate joint majors combining Stanford University’s Hoover Institution and the Center computer science with English or music, and research for International Security and Cooperation (CISAC) are collaborations between doctors, scientists, and natural partners for tackling cybersecurity challenges engineers that have generated breakthrough discoveries across sectors and academic disciplines. The world’s in medicine. Companies founded by Stanford faculty, growing interconnectedness and the “Internet of researchers, and former students—including Cisco things” raise key questions about privacy, individual Systems, Google, Hewlett-Packard, LinkedIn, Sun liberty, the appropriate role of government, international Microsystems, and Yahoo!—today generate more than peace and national security, and economic freedom – $2 trillion annually in revenues, a figure equivalent to the issues that lie at the heart of Hoover’s mission to GDP of the world’s 7th largest economy. Stanford’s develop “ideas defining a free society.” CISAC has a location and ties to Silicon Valley put us at the heart of unique and successful model of bringing together the technological ecosystem that is driving scientists and social scientists to address pressing transformative international change. !1 Breaking out of intellectual be brought to bear to understand Washington. The next 72 hours will stovepipes is crucial to developing the relevant issues. Indeed, there is be all about connecting— a better understanding of cyber little consensus even about which generating ideas, insights, challenges and how to address issues constitute the most questions, and relationships that them. Cyber threats involve important ones deserving we hope will better inform both political, legal, organizational, attention. These gaps and policy and academic research to economic, and psychological questions provide an opportunity improve American cybersecurity.! factors that technical experts often for CISAC, Hoover, and Stanford do not fully understand or more broadly to play an early and We would like to thank Hoover appreciate. On the other hand, significant role in thought Institution Director John Raisian these conflicts in cyberspace may leadership and cross-sector and Mariano-Florentino Cuéllar, also involve technologies that convening.! Director of CISAC’s parent institute, social scientists and policymakers the Freeman Spogli Institute for often do not fully grasp. In the Hosting this inaugural cyber boot International Studies, for their policy world, current priorities leave camp for congressional staff—the indispensable support. Thanks also little time for longer term thinking. first program of its kind at Stanford to Leisel Bogan, Heather Campbell, In the academic world, research on —is an important step forward. Our Ryan Mayfield, and Russell Wald for cyber policy and security is siloed aim was to bring together senior taking this boot camp from idea to and embryonic. While there is great legislative staff across political reality. Finally, we are grateful to consensus on the importance of parties, chambers, and committees each of you for sharing your most cyberspace from the standpoint of for three action- packed days of precious resource: time. We are international security, there is workshops, simulations, and thrilled that you could join us for surprisingly little consensus on discussions with leading academic this inaugural boot camp and look appropriate strategy, doctrine, and industry thinkers away from the forward to working together. tactics, theory, or data that might pressures of daily business in Sincerely, Dr. Amy Zegart Dr. Herb Lin Co-Director, CISAC Consulting Scholar, CISAC Associate Director, Davies Family Senior Fellow, Chief Scientist, Computer Science and Telecommunications Hoover Institution Board, National Academies (until December 2014) Professor of Political Science (by courtesy) Senior Research Scholar, CISAC, and Research Fellow, Hoover Institution (effective January 2015) !2 CONFERENCE AGENDA CYBER ATTACKS AND RESPONSES Day 1 – Monday, August 18, 2014 10.00 am Congressional staffers arrive at San Francisco Airport 11.45 pm Welcome: Framing Session Faculty Speakers: Dr. Amy Zegart (CISAC, Hoover), and Dr. John Villasenor (UCLA, CISAC, Hoover) 12.00 pm Lunch and Keynote Address: Dr. Jane Holl Lute (Council of Cybersecurity, CISAC) 1.00 pm Session 1: Security as a Concept Faculty: Professor Tadayoshi Kohno (University of Washington) Discussant: Dr. Herb Lin (National Research Council, CISAC, Hoover) 2.30 pm Break 2.45 pm Session 2: Threats to Cybersecurity Faculty: Professor Carey Nachenberg (UCLA, Symantec) Discussant: Dr. Tim Junio (CISAC, Hoover) 4.15 pm Break 4.30 pm Session 3: Offensive Dimensions of Cybersecurity (dinner served during presentation) Faculty: Col. Matteo Martemucci (U.S. Air Force) and Oren Falkowitz (Area 1 Security) Discussant: Dr. Tim Junio (CISAC, Hoover) 6.00 pm Break 6.15 pm Session 4: Simulation Dr. Lucas Kello (Harvard University) 9.15 pm Return to Stanford Guest House !DEEP DIVE: TECHNICAL & NONTECHNICAL ASPECTS OF CYBER Day 2 – Tuesday, !August 19, 2014 7.15 am Depart from Stanford Guest House for Stanford University 7.45 am Breakfast and debrief from previous day 8.30 am Session 5: Fundamental Principles of Cybersecurity Faculty: Dr. Drew Dean (SRI International Computer Science Laboratory) Discussant: Dr. Herb Lin (National Research Council, CISAC, Hoover) 10.00 am Break 10.15 am Session 6: Economic, Psychological, and Organizational Dimensions of Cybersecurity Faculty: Professor Tyler Moore (South Methodist University), Dr. Janice Stein (University of Toronto), Paul Rosenzweig (George Washington) Discussant: Jonathan Mayer (Stanford, CISAC) !3 AND SCHEDULE OF EVENTS 12.00 pm Lunch and Keynote Address: Dr. John
Recommended publications
  • Inside Her Intellectual Home from the Director’S Desk Greetings from John Raisian Page 2
    talk OF THE tower A QUARTERLY PUBLICATION OF THE HOOVER INSTITUTION, STANFORD UNIVERSITY Fall 2011 Hoover Institution welcomes Senior Fellow Amy Zegart Award-winning author and national security affairs expert Amy Zegart calls her Hoover appointment a return to inside her intellectual home From the director’s desk Greetings from John Raisian Page 2 In the Exhibition Pavilion Commemorating the hundred by Amy Hellman Courtesy of The Strauss Center years since the Chinese revolution Page 2 Google “Amy Zegart” and it’s easy her MA and PhD in political science, brings her full circle. What they’re reading, to see why Hoover sought her out At Hoover, she will take her place alongside the same what they’re writing Recommended reading from to join its distinguished cadre of Hoover scholars who advised her as part of her dissertation our fellows fellows. She’s a leading expert on the committee: David Brady, Stephen Krasner, Terry Moe, Page 3 organizational deficiencies of national and Condoleezza Rice. Stanford also holds personal Meet the class of 2011 security agencies—one of the significance: it was here that she met the law student who Get to know the newest members of the Board of Overseers nation’s ten most influential experts in would become her husband. Page 4 intelligence reform. She has served on Amy views the move to Hoover as a return to her the National Security Council, testified Splendor in the glass intellectual home, one that allows her to be part of a Our Bradley Prize winners treat before the US Congress, provided guests to a stirring day in Napa vibrant community and recharge her intellectual batteries.
    [Show full text]
  • Russia Panel Dec-14 Page 1 of 28 Amy Zegart
    Russia Panel Dec-14 Amy Zegart: Good afternoon, everyone. I want to invite you all to get seated and get comfortable for a very interesting afternoon. I want to welcome you all. My name is Amy Zegart. I’m a Senior Fellow and the Co-director of the Center for International Security and Cooperation here in the Freeman Spogli Institute, and I’m also a Senior Fellow at the Hoover Institution. Boy, are we lucky to have this panel this afternoon. It is no more timely moment to be looking at the past, present and future of U.S.-Russian relations and nuclear security than today. Let me add for those of you who may not have seen the news that Tom Schilling, one of the great strategic thinkers in nuclear security passed away today. So, it’s particularly fitting that we Reflect in part on the ideas and the contributions of the distinguished panelists that we have here, and Tom Schilling whose work was so central to Deterrence Theory during the Cold War. Now, each of our panelists I have to add on a lighter note since it is the holiday season, has written one, if not more, critically acclaimed books with very uplifting titles like, “Doomed to Cooperate,” “My Journey at the Nuclear Brink,” “Stalin and the Bomb,” and “The Dead Hand.” However, Mike McFaul has written a book that he’s recently finished that’s due out soon, so I’m hoping there’s a more uplifting title than that. Mike McFaul: All my titles are way more uplifting than these others.
    [Show full text]
  • View Conference Program with Speaker Bios
    Nuclear Weapons In a New Century: Facing the Emerging Challenges March 6 and 7, 2007 UCLA Ronald W. Burkle Center for International Relations at UCLA Welcome “The most spectacular event of the past half century is one that did not occur” THE 21st century has ushered in new security challenges to the international order, while older challenges persist. Among the most pressing is the threat of nuclear weapons. In accepting the Nobel prize for economics in 2005, Tom Schelling wrote the words above, remarking on the astonishing sixty years the world has enjoyed – astonishing because, despite possessing many thousands of nuclear warheads, the world has managed to refrain from using any of them in conflict. We hope the same will be said after sixty more years. We have convened this conference at UCLA to examine the urgent nuclear challenges the world faces in the 21st century, and to explore solutions, or at least approaches, to these challenges. The situations in North Korea and Iran dominate the news today, but other problems exist as well. Tensions in South Asia, the accelerating demand for peaceful nuclear technology, the prospect of nuclear terrorism – these and many other threats are serious and difficult. Are our existing multilateral regimes up to the task? Or will nations increasingly choose to take unilateral steps to prevent proliferation? While not all of the issues at stake in the field of nuclear proliferation can be addressed in a day-and-a-half, the conference format allows us to discuss many of the most significant. We have invited an outstanding set of speakers to UCLA, and I encourage each of you to attend as many of the panels as possible.
    [Show full text]
  • Demystifying Us Intelligence
    DEMYSTIFYING U.S INTELLIGENCE Preliminary Syllabus Stanford Continuing Studies Instructors: Profs Thomas Fingar and Barry Schutz Dates/Times: Prof Barry Schutz will be available for a few minutes after each class and Prof Tom Fingar will be available on evenings when he is present. For course questions and administrative comments, please contact only Prof Schutz by email. Course Grading: Three Options: ` No Grade Requested (default option) . If you elect to Credit/No Credit, attendance will determine grade . If you elect a letter grade, the paper to be elaborated later will determine your grade Course Description This course focuses on the importance of intelligence analysis in the entire intelligence process. While espionage and covert action comprise the sexy material for intelligence in the movies and in fictional literature, it is written analysis that provides policymakers with the knowledge that they need. It is no exaggeration to say that it is impossible to understand the objectives, priorities, approaches, and instruments of American foreign policy without understanding the processes of intelligence production. This course examines roles, missions, and methods of the U.S. Intelligence Community, and how intelligence professionals, primarily analysts, manufacture an essential product for the effective making of foreign policy. Instructors Thomas Fingar served as the first Deputy Director of National Intelligence for Analysis and, at the same time, Chairman of the National Intelligence Council from 2005 through 2008. His responsibilities included production of the President’s Daily Brief, National Intelligence Estimates, and implementation of the historic 2004 Intelligence Reform Act. He also served as Assistant Secretary of State for Intelligence and Research in the administrations of Bill Clinton and George W.
    [Show full text]
  • Spying Blind
    Spying Blind N This page intentionally left blank Spying Blind The CIA, the FBI, and the Origins of 9/11 N AMY B. ZEGART PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2007 by Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 3 Market Place, Woodstock, Oxfordshire OX20 1SY All Rights Reserved Library of Congress Cataloging-in-Publication Data Zegart, Amy, 1967– Spying blind : the CIA, the FBI, and the origins of 9/11 / Amy B. Zegart. p. cm. Includes bibliographical references and index. ISBN: 978-0-691-12021-8 1. Intelligence service—United States. 2. United States. Central Intelligence Agency. 3. United States. Federal Bureau of Investigation. 4. September 11 Terrorist Attacks, 2001. 5. Terrorism—Government policy—United States. I. Title. JK468.I6Z42 2007 973.931——dc22 2006103325 British Library Cataloging-in-Publication Data is available This book has been composed in Palatino Printed on acid-free paper. ∞ press.princeton.edu Printed in the United States of America 13579108642 For my children: Alexander, Jack, and Kate N This page intentionally left blank N Contents N Acknowledgments xiii CHAPTER ONE An Organizational View of 9/11 1 CHAPTER TWO Canaries in the Coal Mine: The Case for Failed Adaptation 15 CHAPTER THREE Crossing an Academic No-Man’s Land: Explaining Failed Adaptation 43 CHAPTER FOUR Fighting Osama One Bureaucrat at a Time: Adaptation Failure in the CIA 61 CHAPTER FIVE Signals Found and Lost: The CIA and 9/11 101 CHAPTER SIX Real Men Don’t Type: Adaptation Failure in the FBI 120 CHAPTER SEVEN Evidence Teams at the Ready: The FBI and 9/11 156 CHAPTER EIGHT The More Things Change .
    [Show full text]