July 3, 2019
Posted by: Jessica Beyer
This event was the fourth in a series of events. The first focused on privacy. The second focused on systemic risk. The third tackled questions around Artificial Intelligence (AI). The next one will focus on
February 1, 2019
Posted by: Jessica Beyer
As cyber-information technologies became “weapons of choice” in today’s geopolitics, the leading nation-states have engaged in the so-called latest technological race. The governments recognize the potential of Artificial Intelligence (AI) and blockchain in offensive and defensive applications, and security, placing significant attention on the rapid adoption of these emerging technologies. Russia in particular has been “claiming” to pioneer blockchain technology.
January 24, 2018
Posted by: dpal
Cybersecurity Postdoctoral Fellow and Lecturer Jessica Beyer and Ph.D. Candidate Donghui Park‘s analysis published by Reuters in December 2017 has been quoted in an article on North Korean cyber attacks
December 21, 2017
Posted by: Monique Thormann
Cybersecurity Postdoctoral Fellow and Lecturer Jessica Beyer and Ph.D. Candidate Donghui Park, who researches cyberwar and non-state actors, analyze the potential for North Korea to destroy critical infrastructure without a nuclear weapon, which has
December 1, 2017
Posted by: Monique Thormann
In their article “Russia Is Now Providing North Korea With Internet: What That Could Mean For Cyber Warfare“, Matthew Newton and Donghui Park, both Jackson School graduate students and Jackson
October 25, 2017
Posted by: Jessica Beyer
For the past year, Russia’s offensive cyber-activities in the United States have been under a spotlight. However, whether it is cyberattacks on U.S. governmental agencies by “patriotic” hackers or interference
October 11, 2017
Posted by: Jessica Beyer
On December 23, 2015, the control centers of three Ukrainian electricity distribution companies were remotely accessed. Taking control of the facilities’ SCADA systems, malicious actors opened breakers at some 30
September 6, 2017
Posted by: Jessica Beyer
Since the start of the Putin era in 1999, relations between Russia and the West have been tenuous at best. The advent of information and communications technology (ICT) has offered
July 29, 2017
Posted by: Jessica Beyer
During spring quarter, one of the Jackson School’s Applied Research Program student teams was given a daunting task – help Microsoft think about Brad Smith’s call for a Digital Geneva Convention. In addition to weighing in on current Microsoft strategy, the students found out that they were working on the exact same research task that Microsoft had asked RAND to tackle. The project was the fifth product of a Jackson School Applied Research collaboration with Microsoft’s Global Security Strategy & Diplomacy Team.
June 7, 2017
Posted by: Jessica Beyer
Nuclear facilities are among the most highly secured type of critical infrastructure in the U.S. Despite the implementation of safety measures, digital instruments and computer-based systems associated with the physical protection system and the control systems inside facilities are still vulnerable. Creating air-gaps and standalone systems is somewhat ineffective when it comes to protecting nuclear facilities against complicated and targeted cyber-attacks. Cyber-attacks on nuclear power plants and their control systems could expedite the theft of usable nuclear materials and malicious acts by adversaries.