The Cyber Solarium Commission’s new white paper explores what the coronavirus can teach us about how to prepare for a major cyber attack. But it also highlights cybersecurity principles that would have been and are relevant to responding to the current pandemic.
Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University. His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy. In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.
Subscribe to this Lawfare contributor via RSS.
The FBI and CISA are worried about intellectual property theft of coronavirus vaccines and treatments. But to develop cures quickly, the scientific community needs to think cooperatively.
As the House considers establishing alternatives to in-person voting during the pandemic, it must also provide confidence that a representative’s vote has not been hacked or compromised.
Within the Department of Defense, terms such as “information warfare” and “psychological operations” have elastic and ambiguous meanings. What does this reveal about the Department’s approach to non-kinetic operations?
Globalization has left Western end-users at least partially dependent on capabilities and services provided by foreign vendors that may not be entirely trustworthy.
In a Wall Street Journal article, a senior Huawei official acknowledged the company has a significant capability.
When U.S. Cyber Command gets involved with psychological operations, what is the role of military psy-ops troops?