Herb Lin

HLin's picture

Dr. Herb Lin is senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University. His research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy. In addition to his positions at Stanford University, he is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT.

Subscribe to this Lawfare contributor via RSS.

Artificial Intelligence

Principles of AI Governance and Ethics Should Apply to All Technologies

Despite Google’s recent dissolution of its artificial intelligence (AI) ethics board, IT vendors (including Google) are increasingly defining principles to guide the development of AI applications and solutions. And it’s worth taking a look at what these principles actually say.

Cyber & Technology

Huawei and Managing 5G Risk

Based on cybersecurity concerns, the United States, Australia and New Zealand have staked out policy positions that prevent or strongly discourage the acquisition of Huawei 5G technology for use in the national communications infrastructure of these nations. Other U.S. allies have announced or are considering policy positions that do not go so far and would indeed allow such acquisition at least to some extent.

Encryption

A Lesson from the College Admissions Scandal for the Encryption Debate

Last Tuesday, the U.S. attorney’s office in Massachusetts announced charges against dozens of parents, college sports coaches and test-prep teachers with in a scheme to win admission to big name universities including Georgetown, Yale and Stanford. Of particular interest for this blog posting is the following excerpt from one of the charging documents.

Cybersecurity and Deterrence

Active Cyber Defense and Interpreting the Computer Fraud and Abuse Act

In the cybersecurity field, the term “active defense” is often used in a variety of ways, referring to any activity undertaken outside the legitimate span of control of an organization being attacked; any non-cooperative, harmful or damaging activity undertaken outside such scope; or any proactive step taken inside or outside that span of control.