5 Year Base Period - MIT Computer Science and Artificial
Transcription
5 Year Base Period - MIT Computer Science and Artificial
MRI Topic 5: ECIR - Explorations in Cyber International Relations PI: Professor Nazli Choucri, Political Science Department, Massachusetts Institute of Technology (MIT) Participating Universities: Harvard University, MIT 5 Year Base Period: $8,322,070 5 Year Option Period: $9,636,248 Total Cost: $17, 958,318 With Option 1 (2008-2013): $9,585,254 With Option 2 (2008-2013): $10,380,352 Abstract: This project creates a multidisciplinary, policy relevant research program to investigate the threats and opportunities arising in cyberspace for our national security, welfare and influence. The program will develop new tools and methods to identify, measure, interpret, and analyze their critical features, and new frameworks to formulate and evaluate responses. Research will also focus on the implications of challenges and potential responses for international systems’ stability and instability. Given the prodigious growth and penetration of cyberspace, the program takes a long-range view and frames issues as broad modules of international systems, e.g., economic interactions, as well as specific activities, e.g., exfiltration for industrial espionage. Research will involve personnel at MIT and Harvard in the social sciences, computer science, public policy and legal studies and close collaborations among them will enable the integration of their perspectives. Methods will include the reformulation of international relations theories to link interactions in the ‘real’ and cyber domains; the specification, collection, fusion and advanced analysis of data sets for incidents and events in cyberspace; new work in game theory to analyze interdependence of risks and to facilitate cooperative international agreements on cyberspace issues; simulations of policy consequences over time; the analysis of broad strategic approaches to cyber defense and their limitations; the identification of legal and institutional conditions and constraints on efforts to secure and govern the Internet, and analysis of economic and organizational barriers to uptake by industry of high assurance hardware and software. The expected results include capabilities for projecting systemic effects of international conflict (cooperation) in cyberspace; protocols and tools for cyber and real world data that enable better warning and alerts; enhanced knowledge of threat actors’ capabilities, intentions and motivations; protocols for negotiating agreements on cyberspace and discrimination of those issues more conducive to such agreements; suggested legal frameworks for cyber defense; robust principles for Internet governance; models of cyber conflict escalation and de-escalation as a basis for limited deterrence strategies, and the integration of soft power approaches into cyber defense. We aim to produce a field of international cyber relations that includes research methodologies, demonstrated analytical tools and trained personnel who can formulate and implement effective policies for cyber defense and management of cyberspace. Cyber defense is already a top national security priority and the most critical and extensive technical problem facing the US military, intelligence services, critical civilian sectors and even the general population. During the next decade while technical solutions are developed, partial measures must be deployed to slow exponential rises in cyber crime, to suppress nascent cyber terrorism, to reverse trends in industrial espionage, and to mitigate cyber threats to the military, intelligence services and critical infrastructures. These measures will likely include technical patches, strategic policies and communications, international agreements, and new laws. In this context, our research methods and results, disseminated through students, publications, workshops, briefings and mid-career refreshers that help national defense and other officials: • Understand cyberspace as an environment and means for international conflict and cooperation; • Understand transformations in international orders as consequent contexts for cyber defense and security; • Identify emergent cyber threats and opportunities for effective responses; • Anticipate limits, gaps and unintended consequences in policies; and provide to them: • Frameworks for rigorous risk and impact analyses of cyber defense policies and initiatives. • Conceptual tools to study and enable cooperation in a potentially adversarial strategic interaction; • Theories and decision frameworks to grasp the technical, political and strategic dimensions of cyberspace and to evaluate proposed strategies and agreements. BAA Number: W911NF-08-R-0007 Topic Number: 5 Topic Title: New Approaches to Understanding Dimensions of National Security, Conflict and Cooperation ECIR - Explorations in Cyber International Relations Nazli Choucri (PI), David D. Clark, Roger Hurwitz, Stuart Madnick, John C. Mallery, Silvio Micali, Patrick H. Winston Massachusetts Institute of Technology! Ashton Carter, Jack Goldsmith, Joseph S. Nye, Jr., Eric Rosenbach Harvard University September 28, 2008 Principal Investigator: Professor Nazli Choucri Department of Political Science, E53-470! Massachusetts Institute of Technology! 77 Massachusetts Avenue! Cambridge, MA 02139-4307 Email: [email protected] Phone: 617-253-6198! FAX: 617-258-6164 Other universities involved in the MRI team: Harvard University Performing Organization: Massachusetts Institute of Technology CAGE Number: 80230 DUNS Number: 00-142-5594 Contracting Point of Contact: William Barrett, Assistant Director Office of Sponsored Programs Massachusetts Institute of Technology 77 Massachusetts Avenue Cambridge, MA 02139-4307 Email: [email protected] Phone: 617-253-0460 FAX: 617-253-4734 2 Table of Contents 1 Project Description .....................................................................................................5 1.1 International Relations Theory & Cyberspace (Task A) - Choucri, Hurwitz, Mallery, Nye .............. 5 1.2 Case Studies and Area Studies (Task B) - Carter, Hurwitz, Nye .................................................... 7 1.2.1 Estonia ..................................................................................................................................... 7 1.2.2 Other Cases ............................................................................................................................. 8 1.3 Cyber Threat Analysis (Task C) - Clark, Mallery, Rosenbach ......................................................... 8 1.3.1 Threat Actors............................................................................................................................ 8 1.3.2 Cyber Targets .......................................................................................................................... 8 1.3.3 Technical Bases for Vulnerabilities .......................................................................................... 8 1.4 Data Development (Task D) - Choucri, Hurwitz, Madnick, Mallery, Winston ................................. 9 1.4.1 Data Ontology, Requirements and Limitations ........................................................................ 9 1.4.2 Data Theories ......................................................................................................................... 11 1.4.3 Data Collection and Integration ............................................................................................. 12 1.4.4 Data Analysis & Interpretation................................................................................................ 12 1.5 Methods........................................................................................................................................ 12 1.5.1 Game Theory and Dynamic Simulations (Task E) .................................................................. 12 1.5.2 Resilient Incentives as a Secure Mechanism Alternative to Deterrence - Micali ................... 13 1.5.3 Game Theoretic Modeling And Interdependent Risk Analysis - Ortiz ................................... 14 1.5.4 Simulations and System Dynamics Modeling – D. Goldsmith............................................... 15 1.6 Institutional Constraints on Strategic Cyber Defense (Task F) ..................................................... 16 1.6.1 International Law on Cyber Defense - J. Goldsmith .............................................................. 16 1.6.2 Global Internet Governance - Clark ....................................................................................... 17 1.7 International Strategies for Cyber Threat Mitigation (Task G) Choucri, full team ......................... 18 1.8 Policy Analysis And Recommendations (Task H) – Carter, Choucri, Nye, Rosenbach ................ 19 1.8.1 The Role of Soft Power in Cyber Defense (Nye) .................................................................... 19 1.8.2 The Objects of Policy ............................................................................................................. 20 1.9 Innovation, Industrial Organization & Sector Strategies (Task I) – Madnick, Mallery ................... 22 1.10 Related Research ....................................................................................................................... 22 1.11 Expected Results........................................................................................................................ 22 1.12 Relevance to Defense Missions and Requirements ................................................................... 23 1.13 Potential Implications For National Defense............................................................................... 23 1.14 Education and Training............................................................................................................... 23 1.15 Project Schedule, Milestones, and Deliverables ........................................................................ 24 1.16 Assertion of Data Rights ............................................................................................................. 25 1.17 Management Approach .............................................................................................................. 25 2 Facilities and Other Resources.................................................................................28 3 Equipment.................................................................................................................30 4 References................................................................................................................31 5 Curriculum Vitae .......................................................................................................35 5.1 Ashton B. Carter ........................................................................................................................... 35 5.2 Nazli Choucri (Principal Investigator) ............................................................................................ 37 5.3 David D. Clark............................................................................................................................... 40 5.4 Jack Goldsmith............................................................................................................................. 43 5.5 Roger Hurwitz ............................................................................................................................... 44 5.6 Stuart Elliot Madnick..................................................................................................................... 46 5.7 John C. Mallery............................................................................................................................. 49 5.8 Silvio Micali ................................................................................................................................... 50 5.9 Joseph S. Nye, Jr. ........................................................................................................................ 53 3 5.10 Luis E. Ortiz ................................................................................................................................ 55 5.11 Eric Rosenbach .......................................................................................................................... 57 5.12 Patrick H. Winston ...................................................................................................................... 58 4 1 Project Description We shall develop a policy-relevant research program that investigates the near- and long-term threats and opportunities in cyberspace for national security, welfare and influence. We understand cyberspace as the ever-growing pervasive, international, digital networks that: • Enable new strategic interactions among nation states and other actors that can affect national security and well-being; • Stimulate competition and collaboration among the actors concerning Internet management and control; • Transform social, economic, political, scientific and cultural activities in ways that change the strategic capabilities of the actors; • Call for innovative modes of management and offer varying potentials for “governance.” In support of cyber strategy, this multidisciplinary project will create new theoretical frameworks and develop tools to identify, measure, interpret, analyze and evaluate challenges and responses in international cyber relations. Our research plan integrates social sciences, legal studies, computer science and policy analysis. The research team will bring together personnel and institutional resources from MIT and Harvard. Our research program aims to produce a technically-informed and practicallygrounded field of international cyber relations that includes research methodologies, demonstrations of analytical tools and trained personnel who can formulate, evaluate and implement effective policies for cyber defense and management of cyberspace. This proposal incorporates some innovative steps to reach this goal. It will: • Extend current descriptions and theories of international relations to include cyberspace as an opportunity for the exercise of power by states and a source of vulnerability for them; • Develop case studies that illustrate (a) ways nation states use cyberspace and (b) types of problems cyber policies must address; • Specify taxonomies for cyber threats, their technical bases, and target vulnerabilities and link them these values of categories to specific state and non-state actors; • Interface international relations theories to these taxonomies in the context of cyberspace evolution; • Develop theories that specify data collection requirements for theory testing and policymaking regarding cyberspace; • Analyze broad strategic approaches to cyber defense and their limitations; • Model the problems and possible solutions for multilateral (and bilateral) approaches to collective cyber security and cyber defense; • Identify legal and institutional conditions and constraints for cyber security and Internet governance; • Analyze cyber policy objects and develop frameworks for policy choices and assessment of impact on relations among state and non-state actors. 1.1 International Relations Theory & Cyberspace (Task A) - Choucri, Hurwitz, Mallery, Nye Pervasive Vulnerability: Ubiquitous networking and computing have become indispensable for communication, coordination and control in the modern world, but they introduce numerous vulnerabilities at all levels of analysis – from the individual to the national levels and even the international and global. Given widespread availability of tools to disrupt networks and to access linked computers surreptitiously, people, organizations and states that rely on networked computing face grave threats to their security and prosperity the full nature of which remains ambiguous at best. In the United States, the current administration and the major presidential candidates have proposals to enhance cyber defense. They view the threats mostly in terms of Information Warfare (IW) targeting military resources (C4ISR) and critical civilian infrastructures, e.g., power grids, financial flows, Computer Network Attack (CNA) Information Exploitation (IE), industrial espionage, Information Operations (IO) against civilians, cyber crime and cyber terrorism. They also acknowledge that no quick technological fixes are guaranteed. So, in the near- and medium-term future, partial technological measures must be combined with deterrence and international cooperation to address these very serious threats. Salience of Broader Context: These and other cyber threats arise in a wider international context characterized by shifts in the distribution of economic and technological power, by cyber-enabled 5 transformations in production, distribution, knowledge building, knowledge networking, social interaction and political participation, and, finally, the emergence of Internet governance as a contentious issue among nation states and other international actors. These global features will lead to emergent challenges that will inevitably call for evolving efficacy of response strategies. Consequently, cyber defense is best supported by a broad research program, specifically one that formulates and evaluates policy in the context of wider long-term trends. This program needs to integrate methods and theories drawn from social sciences, international studies, policy and risk analysis, communication studies, economics, computer science and law. The program must also be empirically grounded. It will collect and analyze data bearing on the characteristics, rate, extent and potential losses of cyber attacks, the impact of incremental technological solutions, the mechanisms and effectiveness of international cooperation and deterrence, the impacts of cyber penetration on state power and content control at national and international levels. Cyberspace and State Power: The Internet and globe spanning intranets both enable and challenge the nation’s security, economy and authority. They enable military and national security organizations to manage complex operations, exchange information, monitor communications, integrate sensor data and guide remote robots, but at the price of increased vulnerability to penetration of their own embedded applications, networks and supply chains. Networking critical infrastructures for power, communication and finance has created greater risks of disruption. As they become global with electronically mediated distributed operations, corporations may also lose control of their intellectual property, technological advantages, and internal hierarchical control. Undoubtedly the Internet is a vital vehicle for American soft power, but it may also erode the government’s control over the images, discourse and language to which its citizens attend and amplifies citizens’ political demands. Furthermore, it may erode nations’ command of their loyalties, identities and aspirations, by exposing them to competing, foreign influences and including them in international conversations about global challenges. Under these conditions a government cannot assume unquestioned public support for security policies or military actions. Therefore, the research program will generate scenarios for the long-term economic, social and cultural impact of the Internet. International Relations Theories: These challenges to state power arising in cyberspace also suggest a need to move beyond traditional state centric theories of international relations toward theories that accommodate the consequences of the digital revolution, including new dimensions of power, transnational social networking, global industrial organization and an international digital divide with accompanying asymmetries in reliance on cyber infrastructures. On that view, four current theories of international relations are useful for relating the uses of cyberspace to major changes in global systems: • Lateral Pressure Theory (Choucri & North, 1975) points to increased contention among state actors for economic resources and external influence as a consequence of their growth in population and technological capabilities; • Soft Power (Nye 2004, 2007a, 2007b, 2007c) notes that a state can project its cultural prestige and values to attract other states and people to support its interests; • Dialectics Of World Order (Alker & Biersteker, 1984) observes that the economic rise of China and India are moving the international order toward multi-polarity, while the spread of transnational cultures, the global diffusion of skills and capabilities and the emergence of transnational virtual organizations suggest a decline in a nation state’s power to mobilize and control activities of its citizens, much less other states. • Global System for Strategic Decisions (GSSD) (Choucri, 2001; Wickboldt & Choucri, 2006; Choucri, et al., 2007) offers an ontology of actions, problems and solution strategies, pertaining to factors threatening system stability and to mechanisms reinforcing security and sustainability. It thus provides the framework and rule-structure for addressing and integrating cyber-based attributes and events into our understandings of ‘real’ strategic contexts. These four theoretical perspectives are empirically grounded in data and responsive to changing realities. Events and actions in cyberspace have distinct properties. Data on events in cyberspace, discussed below, can test hypotheses based on these theories. Lateral Pressure Theory, for example, suggests that states might turn to cyber space instead of the physical world to increase their resources and influence, even to the point of cyber attacks on other states. Soft Power and Lateral Pressure Theory together suggest that governance of the Internet and practices like filtering its flows will become 6 increasingly contentious issues, with rising states like China challenging US approaches. Theories positing declines in state power would predict (a) an increasing percent of cyber attacks that could not be attributed to state sponsorship and (b) the increasing, sometimes clandestine, use of the Internet to create transnational consciousness, based on particularistic identities or beliefs. The possibility of aligning data about uses and abuses of cyberspace with IR theories highlights the significance of the data themselves and supports extrapolations of the trends. 1.2 Case Studies and Area Studies (Task B) - Carter, Hurwitz, Nye We shall develop internally consistent and externally comparable case studies in order to illustrate different cyber postures of actors, and the ways in which state and non-state actors may challenge one another or respond to opportunities and threats in cyberspace. We shall also use the case studies to highlight problems for effective cyberspace policymaking and possible for ways of overcoming them. The following vignette on the denial of service attacks in Estonia, 2007, gives a sense of this task. 1.2.1 Estonia The concern for cyber defense was greatly stimulated by, among other things, a set of recent cyber events. A salient example is the distributed denial of service (DDOS) and web-site defacement attacks on Estonia during Spring 2007. These attacks lasted several weeks and gravely disrupted activities of the country’s government, media and financial system. The attacks occurred during a dispute between the Estonian and Russian governments over Estonia’s relocation of a memorial to World War II Russian soldiers. Estonian officials charged the Russian government with having organized the attacks, but acknowledged a lack of conclusive evidence. Russian officials denied the charges and European experts, who investigated the attacks, were unable to confirm involvement by the Russian government. Many observers, however, believe the attacks were perpetrated by either Russian nationalists or a cyber crime organization and coordinated by the Russian military or security service (FSB). As a consequence of these attacks, the attention they drew and the experience gained by Estonians, NATO has established a center of excellence for cyber security in Estonia. A closer view of these events reveals some of the complex conditions in cyber international relations that effective cyber defense policies will need to address. First, cyber attacks are becoming standard features of rhetorically heated or armed conflicts between technologically advanced states or groups, as evidenced, in addition to the Estonian case, Palestinian and Israeli attacks at the beginning of the Second Intifada (2001-2002) and the Russian attacks on Georgian sites during the recent conflict over South Ossetia. Second, cyber attacks might be highly asymmetrical with respect to attacker and target, such that even limited capabilities and effort can wreak considerable havoc. Estonia was particularly devastated by the attacks, because its institutions had become highly net-centric. It was arguably the most wired country in Europe, in result of its government having promoted Internet and new media penetration to enhance its population’s technical skills and build their position in the new global economy (as Lateral Pressure Theory might have predicted). Third, the difficulties of timely attribution of cyber attacks, as noted in the Estonian case, limit the credibility of deterrence strategies in cyberspace. Can an announced policy of graduated retaliation be sufficiently credible to deter another state’s attack, absent a demonstrated means for quick and sure attribution of the attack? If the attacks are attributed to private citizens, is it credible or legal to hold their government responsible for their behavior and target them for retaliation? Fourth, there may be little legal recourse for victims of cyber attack under current conventions and treaties. Estonian officials formally requested Russian assistance in investigating several suspected attackers who were under Russian jurisdiction, but the Russian government declined to help. Against the Estonian interpretation, Russia claimed that the requested procedures were not covered by the Mutual Legal Assistance Treaty between the states. Fifth, even friends and allies might be reluctant to share information about cyber offensive and defensive capabilities. Apparently, Italy, Spain and some other NATO countries with limited cyber strategy or cyber warfare capabilities have joined the work at the Center of Excellence in Estonia, while the US and the UK, which have greater capabilities, have not. Governments have been generally reluctant to disclose their capabilities to attack or to detect attack. According to observers who believe the Russian military organized the attacks in Estonia and Georgia, attacks were kept at a low technological level to avoid disclosing the full extent of Russian cyber capabilities. 7 1.2.2 Other Cases Other candidates for case studies include China’s policy of Internet filtering and doctrine of information security and Islamic militants use of the Internet for public relations, fund raising and recruitment. Like the Estonian case, we believe each study will reveal its own, perhaps unique, set of conditions with which efforts to secure cyberspace must deal. We shall also develop broad overviews of how different areas, regions and cultures of the world respond to the threats and opportunities in cyberspace. 1.3 Cyber Threat Analysis (Task C) - Clark, Mallery, Rosenbach We shall track and analyze the evolving cyber threat landscape, including actors, capabilities, vulnerabilities and the corresponding technical requirements for cyber attack and defense. 1.3.1 Threat Actors Our initial taxonomy of bad actors will link them to targets according to their intent and capabilities. • Military Organizations: Information Warfare (IW), or attacks on an opponent’s ability to process information, and Information Operations (IO), or attacks on an opponent’s ability to think clearly, can be expected from peer opponents in any major armed conflict. • Intelligence Services: Intelligence agencies employ full-spectrum methods, including cyber espionage and sabotage (Gosler, 2005). Known practitioners include China, Russia and the US. • Cyber Criminals: The scale of criminal activities with a cyber component, such as identity theft and email-initiated scams, is hard to estimate. Some estimates put direct and indirect costs art over $100 billion per year, with growth between 35% and 100% per year. Cyber crime’s impact on national security requires understanding the consequences and costs of different activities and the organizations responsible for them. • Political Activists: Political groups have employed cyber operations to distress their opponents. These events include exchanges of cyber attacks between Israelis and Palestinians, and attacks on former Soviet republic website presumably by Russian nationalists or “patriots.” • Terrorists: Terrorists have yet to emerge as a critical cyber threat at the information warfare or cyber espionage level, but they have used the Internet for recruitment, propaganda and fundraising. • Script Kiddies: Random 15-year olds, who have downloaded cyber attack tools readily available on the Internet, can cause considerable damage to isolated computer systems. Fortunately, most are unlikely to sustain a long-term focus on their objectives. 1.3.2 Cyber Targets Although there is concern about cyber attacks across a full range of sectors, major targets include: • Military and Intelligence Systems: Doctrines of Net-centric warfare – linking military networks together to create massive informational support for command decisions – can also increase vulnerability of the decision cycle to denial of service attacks and data corruption. Because military infrastructure is not cleanly separated from civilian infrastructure, an adversary may attack civilian cyber targets to achieve a desired degradation of military systems. • Critical Civilian Infrastructures: Power grids, major telecommunication systems and financials systems can reportedly be taken down and kept off line by expert hackers for extended periods. • Intellectual Property: US companies are ill equipped to prevent large-scale industrial espionage by nation states that are intent on rapid technological development and enjoy full spectrum capabilities. • Institutions and Individuals: With the emergence of professional Internet crime, individuals and institutions have become increasingly vulnerable, due to higher criminal motivation, expanding infrastructure for cyber crime, and skill sets approaching the level of state actors. Some international cyber criminals do not fear prosecution, having reached an understanding with their local sheriffs. 1.3.3 Technical Bases for Vulnerabilities Network: One class of network attack uses the Internet as a vehicle for attacks on hosts or services. The other, less likely, class of attack targets the network infrastructure itself to deny overall service, may occur when a state actor tries to degrade another country’s infrastructure as part of a larger campaign. The main network level attacks are denial of service and man-in-the-middle attacks. Distributed denial of service (DDOS) attacks flood a victim host or site with so much traffic that the site becomes inoperative. But, they may attack network packet routers or host routing tables --the instructions for network paths from one host to another -- to achieve the similar results. Man-in-the-middle attacks insert a malicious host between a user and the end point host. These attacks can be executed by corrupting the domain 8 name system (DNS), which maps host names to IP addresses. Or an attack can advertise malicious routes to a destination host via the Border Gateway Protocol (BGP) in order to intercept incoming network traffic, such as voice-over-IP (VOIP) telephone calls. Host: Experts estimate that over 80% of the vulnerability rests with the host computers and that less than 20% is in the network. Within the host, 80% of the attack vectors leverage buffer overflow errors to gain command of the operating system. The main objective is to subvert the operating system in order to by-pass its security mechanisms and take full command of the victim’s computer. Today, cyber criminals and intelligence services are cracking vast numbers of personal computers (mostly those running Windows) and ganging them together into “Botnets,” that, according to crude estimates, can range in size 1 and 50 million zombie computers. In a series of moves and counter moves, botnets are becoming increasingly sophisticated, using peer-to-peer architectures and encrypted command and control. The malefactors not only exploit these subverted computers for their own purposes but also rent out botnet time. Botnets have been used in large-scale denial of service attacks like Estonia in 2007, in emailing spam and malware, and in other criminal activities. Today, there are even lively international black markets in malware, spy-ware, attack-ware and hijacked platforms. Computer viruses are usually designed to propagate attack malware to breach host operating systems before installing root kits. The viruses now have mutating footprints that render anti-virus techniques ineffective. Web sites are now cracked for the purpose of distributing malware to their viewers, to the extent that Google recently reported that 5% of 66 million Web sites examined were serving malware. Weak Architectures: Even though today’s commercial (COTS) systems offer numerous entry points for attackers, hardening our computers and networks by removing the major attack vectors will only displace the threat to other less convenient or more expensive lines of attack. A huge problem with current security architectures is that the overall system is only as strong as the weakest link in the trust chain, and the attacker has the advantage of choosing the most inopportune time and weakest point to strike. Future architectures will need to emphasize resilient security mechanisms based on redundant and crosschecking approaches throughout the architecture from silicon to application and throughout the life cycles from the design and development to deployment and operation. In the meantime, we will develop an index to track trends by type and quantity of reported attacks and reflect impacts of incremental security improvements. 1.4 Data Development (Task D) - Choucri, Hurwitz, Madnick, Mallery, Winston Although the objective of our data theory research is to better understand cyber conflict and cooperation, including its systemic impact, work in this area also significantly contributes to the development of warnings and indications systems for cyber defense. We shall define types of attack, exploitation and other aggressive behaviors in cyberspace that target the United States and its allies. We will collect data on their incidence, analyze the trends and use the results to test relevant hypotheses drawn from theories of international relations, including: Lateral Pressure Theory, Soft Power, Dialectics of World Order and Global System for Strategies for Strategic Decisions (GSSD). Note, however, perspectives on cyber defense vary across actors and domains. China’s leadership, for example, considers state control of content part of its cyber security, whereas Western states are more concerned with violation of digital rights. Potentials for cooperative actions to secure cyberspace may therefore depend on the extent of shared norms and convergence on what should be protected. Our research to address value questions will use secondary analysis on value surveys, content analysis of discussions about information security, agent based models, as applied to the diffusion of ideas (Hurwitz), and artificial intelligence models of belief systems and collective intelligence (Winston). 1.4.1 Data Ontology, Requirements and Limitations Two broad classes of data are required for the study of international cyber relations. Foreground data refers to explicitly cyber attributes, actions and processes, while background data refers to the noncyber characteristics of the international system, nations, actors and the social economic processes. Within foreground cyber data, we distinguish the following categories: • State-centric Data focus on transnational cyber conflict and cooperation among nation states. It includes cyber defense as well as alliance or collective defense activities. Naturally, cyber defense capabilities and vulnerabilities of actors are important actor attributes. More general contextual data characterizes actors physically and ideationally as well as cyber related aspects of national social, economic and political processes. 9 Critical Infrastructure Centric Data focus on cyber-mediated attacks, their impact and risks to synergistic physical and economics systems. • Cyber Crime Data characterizes criminal activities using cyber means, including black markets for cyber crime, financial losses and impact, policing activities, and conviction rates. • Cyber Activism refers to political activism broadly and terrorism-related cyber activities spanning attacks, psychometrics of recruitment techniques and coordination and logistics. • Cyber Scatter is registrations of anomalous behavior, which cannot be unambiguously tied to specific actors, but may signal emerging disruptions or responses. • Communications Patterns constitute the terrain of cyber interactions and include physical connectivity, the IT supply chain, economic activity, e-commerce, social networks, and diffusion of norms and culture. We distinguish actor attributes from cyber incidents, where some noteworthy occurrence takes place. On the offense side, cyber incidents range from port scanning to DDOS attacks and computer penetrations to insider attacks or life cycle attacks. On the defense side, they would include detection, remediation, recovery and reconstitution. Cyber incidents involve a precursor or material change, to cyber systems that effect their security, integrity or availability and may affect functioning of social, economic or military systems to which they are linked. When cyber incidents can be attributed to an actor and the target is known, they become cyber events. Cyber events capture who is doing what to whom, when, where and why. Data theories describe categories of theoretically interesting cyber events and their range of values or qualia. Further, data theories must anticipate the class and range of analytical modeling in order to capture information in commensurate data formats. The range and richness of data collected make possible and contain the potential range of results. By segmenting the data collection into the following levels, it becomes possible to separate highly technical cyber forensics from theory-based data requirements and provide a composable framework. • Cyber Incidents: Detect incidents and populate incident records from log files and security administrators automatically as feasible or via human reports. • Cyber Events: Identify theory-relevant incidents and attribute them to an actor (or an anonymous actor) directly or via signature-based methods. Again, these levels may be captured by humans at first and later with increasing automation. • Cyber Interactions: These are patterns or grammars of cyber events among international actors. These patterns will include sequences of escalation and de-escalation as well as the widening and narrowing of the scope of activity. Macro patterns of interactions may indicate systemic cyber threats. For cyber crime, data theories are somewhat different. The objectives are to measure: • Criminal Activity: Estimates of the volume and breadth of cyber crime is important for identifying trends as well as determining success of efforts to contain and reduce cyber crime. Most of this data will be cyber incidents because perpetrators are often unknown even if victims are identified. In some cases, criminal enterprises may be identified before or after the fact. • Black Markets: Estimates of volume and quality of stolen data, tools and expertise traded by criminals are an important predictor of the level and sophistication of cyber crime. Data on illegal payment schemes can be particularly useful. • Justice System and Law Enforcement: Rates at which cyber crime is detected, criminals apprehended, and legal prosecutions pursued indicates the level and range of official response to cyber crime as well as the effectiveness of law enforcement and policy measures. Differentiating data on cyber crime is important from a state-centric view of IW, CNA and IE because precursors and scatter from battlefield preparations may be registered as criminal activity before being recognized as more serious threats. They are also important due to the economic costs of cyber crime. Creating reliable datasets to characterize cyber phenomena is very challenging due to these problems: • Covert Actions o Adversarial cyber activities are often covert and undetected; o When detected, victims are often unwilling to acknowledge covert activities; o Refraining from certain conflictual activities and incomplete cooperation are negative actions, which are indistinguishable from inaction; • 10 Attribution o Attribution of authorship is difficult, ambiguous, or impossible; o Forensic analysis of attacks is time consuming and costly; • Detection o Operating system attacks (80%) may not leave a clear footprint like DDOS attacks. • Obfuscation o Volume of attack precursors is vast (e.g., spam, phishing, port scanning); o Volume of system penetrations is large and growing rapidly. • Ambiguity o Attributes of the phenomenon itself may be unclear, ill-defined or emergent; o Classification may not be possible without disambiguation based on correlated data. Nevertheless, data collection is crucial for understanding and tracking cyber conflict and cooperation and correlating it with other dimensions of international interaction. Over time, one can expect technical systems to evolve towards higher assurance architectures, which are engineered to facilitate detection of cyber incidents. 1.4.2 Data Theories Before data can be collected, we need a data theory of categories that describes the form and procedure for capturing data. The selection of data is motivated by the theoretical framework within which specific analytical tools are used to learn new hypotheses and test them empirically. We intend to integrate our proposed approaches (presented below) with existing conventions of data gathering, development, reconciliation and analysis of data in international relations. This means that we must also develop data theories customized to cyber ‘realities’ and cyber features. Accordingly, we will develop codebooks for datasets that characterize countries and other relevant entities according to the degree to which they depend on cyber systems for social, economic, and military position. This information correlates with their vulnerability to cyber attacks as well as their ability to project hard or soft power in cyberspace. We will develop codebooks for datasets that characterize the general interactions of countries in cyber space, including cross boarder dimensions of social, cultural, economic, political interactions, and codebooks for capturing the specific economic processes that are linked by value chains in cyber space. A fundamental challenge and an expected result of this project is integration and reconciliation of ‘real’ and cyber data about international relations. For example, we want to answer questions like where on a hostility to friendship scale should we put a wide-spread denial of service attack by one country on another, like the Estonian case. On the view of international law, this is unlikely to rise to the level of an armed attack, but seems more hostile than a nasty rhetorical attack or economic sanctions. By convincing answers to such questions, we will be able to extend with cyber events the traditional events data sets (Merritt, et al., 1993; Schrodt, 1994, 2006) and enable analyses of how cyber actions relate to international conflict and cooperation. In the years since the beginning of events data collection in the 1960s, the data code books and their categories have come to characterize disputes and quarrels among states and non-state actors. For cyber actions, we will develop corresponding, compatible categories of cyber conflict and cooperation actions and on their basis models of escalation and deescalation. Our data formats will include conventional feature vectors as well as phased-structured data (Farris, Alker, Carley & Sherman, 1980; Sherman, 1987a, 1987b, 1988; Davies & McDaniel, 1993) suitable for use in predicting escalation or de-escalation of hostilities (Mallery & Sherman, 1993a, 1993b). We will also design strategies for harvesting data from structured and semi-structured sources, including narrative text, e.g., news reports, blogs. These sources often usefully describe cases of cyber conflict and cooperation, including the antecedents that led to various actions by participants. They may also describe consequences of cyber events, for which data is needed if we want to make grounded hypotheses about the impacts of cyber incidents on a system, by using precedent reasoning (Winston, Alker) or another methodology suitable for a small sample size. Finally, our computer representations of the sources as texts, i.e., syntactically and semantically interconnected words, are ideal for data and knowledge fusion and also lend themselves to hierarchical abstraction. They thus, can support summary reporting on cyber events with user-driven drill down based on question answering (Mallery, 1994). • 11 1.4.3 Data Collection and Integration Initial work in the project will involve identifying and collecting existing data sets relevant to cyber international relations. The second step will involve proposing data theories. In the third step, the project will make prioritized recommendations to OSD and other parties on data collection. It will also undertake its own data collection efforts as academic research with outside collaborators. The project’s primary data collection efforts will focus on event data, broadly understood as actor-action-target triples, whether captured as feature vectors or structured graphs. Although the tasks recognizing cyber incidents in log data and cyber events within cyber incidents will be framed by the program’s research, these tasks are highly technical or costly and fall beyond our scope. We will employ approaches to data collection and synthesis: • Structured Reporting (Base): We will design Web-based interfaces for reporting cyber events based on data codebooks. When automated systems exist, they will be able to enter data via a programmatic version of these interfaces. Various data formats will be captured and generated. • Contextual Data Fusion (Base): Given the importance of context for interpretation of data in the physical as well as the cyber domains, we will identify existing datasets and integrate them using interpolation technologies. (Madnick) • Event Data Extraction (Option 1): We will explore the suitability and reliability of automated methods for extracting event data from text (Gerner, et al., 1994; Schrodt & Gerner, 1994; Bond, et al., 1997) for cyber related data. • Machine Parsable Narratives (Option 1): We will specify rules for machine parsable English for narrative descriptions of cyber interaction useful for language understanding systems capable of precedent reasoning. Data will be captured or synthesized from structured sources. • Content Analysis (Option 2): We will use computer-assisted textual analysis to extract meaning from formal speeches, structured documents, and narratives about cyber attack and defense. • Survey Research and Interview Schedules (Option 2): We will design instruments for gathering semi-structured and open-ended reports on cyber incidents and events from experts. 1.4.4 Data Analysis & Interpretation We will explore the suitability of these analytical techniques for pattern learning and recognition as well as early warning and prediction: • Machine Learning on Event Data (Base): Machine learning techniques, including entropy based rule learning for non-rectangular data (Unseld & Mallery, 1992; Unseld, 1997) have been productively applied to international relations data sets (Mallery, 1994). We will select and apply the most promising algorithms and analytical tools in the area to the cyber conflict and cooperation data assembled by the project. • Text Modeling and Precedent Analysis (Option 1): Text modeling using natural language systems (Alker & Mallery, 1988; Alker, et al., 1991) has been explored as an advanced methodology for precedent reasoning (Alker, Bennet & Mefford, 1980; Winston 1975, 1980, 1992; Mallery, 1988, 1991; Mallery & Hurwitz, 1987). We will investigate precedent analysis of text bases in machine parsable text for evaluating cascading effects of cyber disruptions as well as explore representation and analysis of cyber conflict cases. This work will use CSAIL research systems, like Winston’s cognitive representations for trajectories in time and space. • Bayesian Pattern Recognition and Markov Modeling (Option 2): Bayesian pattern recognition techniques (Alpert, 1975) and Markov modeling (Duncan & Siverson, 1975; Schrodt, 1976, 1998, 2000) have been applied to international event data. We will explore these techniques drawing on local MIT CSAIL expertise and algorithms for Bayesian inference and Markov modeling. 1.5 Methods 1.5.1 Game Theory and Dynamic Simulations (Task E) Risk analysis, game theoretic models and dynamic simulations will inform evaluation of policy proposals and strategies. Beyond assessing how well proposals respond to the current and projected threats, risk analysis also needs to estimate convincingly costs of future security failures and to identify the impact on other key cyber issues, e.g., privacy, access, performance. As described below, a principal focus of our research involves developing models for situations where actors face interdependent risks or need to reach and abide by agreements against certain behaviors. We will use the results of this research and 12 other game theory models to analyze cyber defense proposals, involving two or more actors, as problems of collective action, minimum coalitions or mutual deterrence, depending on the issue involved, and to suggest incentive mechanisms for the desired behaviors. Arguably, grounding our models in game theory and its assumptions of disinterested utility maximizing players might be too pessimistic. Studies of “real world” collective actions find that extra rational factors, such as belief in the “rule of law,” often motivate people to limit utility maximizing behavior, even in the absence of sanctions. Consequently effective regimes for computer security might depend on the diffusion and influence of norms for online behavior as well as capabilities for detecting and sanctioning violations. Game theory may also be too simplifying in modeling players as individuals and economically rational. In a broad international setting collusion is not easily punished, and irrationality should not be excluded. Accordingly, we plan to develop game-theoretic mechanisms that are resilient to the presence of both collusive and irrational players, i.e., Resilient Mechanism Design. Since model adequacy requires the integration of such potential motivations and mechanisms, we will measure the prevalence and diffusion of norms, values, laws and memes and their influence over different issues and domains of cyber security and defense. System dynamics models will help ‘pull key pieces together’ taking into account feedback, delays, and other inter-temporal processes. Because even powerful norms and/or credible sanctions do not guarantee compliance with agreements, our modeling efforts will also simulate different levels of violations and sanctioning to determine thresholds where parties find the costs intolerable, then change the rules (more deterrence) or withdraw completely (unilateral, autarchic strategies). 1.5.2 Resilient Incentives as a Secure Mechanism Alternative to Deterrence - Micali In an international setting, the costs of detecting and punishing violators of agreements can be very high. We propose to develop alternatives ways to analyze and design international interactions, so as to lessen these difficulties and offer new and preferable policy recommendations and tools. In essence, we propose to develop a new approach to Mechanism Design, with fundamental assumptions more aligned with the needs and demands of strategic interactions in the international arena. Mechanism Design, a crucial branch of Game Theory (Vickery, 1961; Osburn & Rubenstein, 1997), enables the achievement of a desired social outcome, relying solely on individual incentives. A game is designed so players by maximizing their individual utilities produce the socially valued outcome – in effect, work for the common good. Although mechanism design ultimately is a mathematical concept, it has influenced practical policies. However, it is traditionally based on two assumptions: (1) each player is rational and (2) each player acts individually. In international settings it is often more appropriate to assume players will act irrationally and two or more or them will collude. So even if a mechanism is perfect from a traditional perspective (i.e., perfect with respect to individual players), it may offer no guarantees whatsoever against collusive players. We therefore propose to develop Resilient Mechanism Design (RMD), i.e., conceptual frameworks, tools and techniques for designing mechanisms that are provably robust against the presence of irrational or collusive players. The guarantees offered by RMD about their outcomes should continue to hold even if groups of players secretly coordinate their actions in arbitrary ways, and have their own internal enforcement methods to guarantee that each colluder stick to its secretly agreed upon action. Since resilient mechanism design is also a mathematical discipline, we shall need to translate as translate its abstract principles and techniques into realistic policies. But we shall have the advantage: that the abstract framework and tools guiding the policies will be much closer to the reality of an international setting. Thus, rather than having a policy modeled in too simplified a setting fail in practice, we can be confident that a policy modeled for a very adversarial setting will work in an actual setting. Collaboration among the team members will greatly help translate these mathematical ideas into practical policies that take into account the constraints and structure of their application domains. Incentives, Privacy, And Correctness In Perfect Negotiations: Sometimes parties with distinct incentives can more easily reach agreement on a common policy when a mediator trusted by all of them is present. Then each party can describe all its secret information and incentives to the mediator, who will then correctly finds the agreement that maximizes the common good. Unfortunately, such mediators are hard to find, even in the domestic, private sector. The possibility of such a mediator in international negotiations is more remote. Consider, for example, the case of two countries, each of which has the capability of conducting industrial espionage on some companies of the other. The first country is willing 13 to not spy on a particular subset of companies in the other country, as long as the other country agrees not to spy on a subset of companies in the first country. To an external observer who knows the preferences of each, mutually satisfactory agreement can be reached, but what if one or both countries are reluctant to reveal which sets of companies it considers vital, unless the agreement is indeed reached. They almost certainly would be reluctant to confide such secret to an external mediator. We believe there might be a way to resolve such an impasse by building on techniques devised in cryptography for multiple parties to correctly compute any function of their own secrets by themselves (i.e., without relying on any external trusted party) and without revealing their secrets more than the final desired result does. These techniques, however, rely on the honesty of the majority of the participants, and honesty is probably not a realistic condition when the players are sovereign nations. Instead, we plan to explore and design negotiation games that enable different players to reach agreement (or realize that no agreement is reachable), without revealing their negotiating initial position, by relying on incentives alone rather than honesty. In this case as with the resilient design mechanism, we will need to ultimately face important questions about idealization, e.g., are the methods too complex to be carried out by computationally or time bounded players? Does the specific structure of a domain limit the applicability of the theoretic framework? Related Work: Secure Mechanism Design and Secure Computation relate to the privacy and correctness issues involved when players rely on a mediator. It aims at replacing the mediator with an interaction among the players alone. As such, it bears on the ideal negotiating example, but not on the design of resilient mechanisms. VCG (Clark, 1971; Groves, 1973) is a traditional mechanism that achieves efficiency in general auctions. Ausubel and Milgrom (2006) have noted that it is not resilient at all against collusion. Traditional (non-cooperative) game theory deals with how games will be played by rational and individual players. The emphasis here is on what happens when we have not only individual players, but also secretly colluding players that pose as acting independently. 1.5.3 Game Theoretic Modeling And Interdependent Risk Analysis - Ortiz We will create a toolkit of novel computational game theoretic and economic models, and correspondingly efficient algorithms, that will allow expert political scientists and policy makers to easily explore and effectively apply game theoretic approaches to shared risks in cyber defense. The research builds upon game theoretic models of Interdependent Security (IDS) (Kunreuther & Heal, 2002), which capture a fundamental aspect of interdependent risks: the cost-effectiveness of an agent's decision to invest in “security” depends on the decisions of other individuals in the population to which the agent is exposed. They models project back to the individual level the common perception in cyber defense that the chain is only as strong as its weakest link. IDS games provide an excellent start in our search to frame problems about cyber defense using formal and computationally tractable models and solutions. The close interactions and knowledge exchange expected between expert social scientists, policy analysts and computer scientists in the project's team will enable creating, extending, adapting and developing models that are realistic, practical, accurate and applicable. The research will (1) introduce generalizations of IDS games to explicitly handle "external" agents (e.g., terrorists, hackers); (2) develop and explore stochastic versions of such games, which will allow us to model scenarios where the detailed dynamics of the interactions are essential; (3) incorporate network structure as a core component of the models; and (4) create novel machine learning techniques to both infer qualitative network structure and quantify model parameters from behavioral data collected throughout the project. We will study how local individual decisions affect the overall global security in cyberspace, and pay particular attention to the role of network structure to characterize the stable outcomes of the system. We will use the acquired knowledge to design novel algorithms to identify "minimal coalitions" (Heal & Kunreuther, 2003), whose formation will lead to an overall improvement in security with minimal external intervention in cyber space and efficient use of resources. (Such coalitions could be achieved via a combination of incentives, regulations and diplomacy.) The research will make extensive use of recent technological advances in the emerging area of computational and behavioral game theory and economics (Nisan, et. al., 2007; Camerer, 2003), artificial intelligence (Russell & Norvig, 2003) and machine learning and the theoretical computer science community to address problems of cyber defense at the international level. This research takes a different, but complementary approach to Micali’s RMD altering of the behavior of agents and systems to achieve particular outcomes. 14 The computational models will help frame the articulation of the theoretical foundations, particularly creating and making available practical models that explicitly incorporate the sources of threats, compactly represent the complexities of international relations and facilitate explanations and implications of cyberspace moves by state and non-state actors. The research will benefit from the program’s area research and case studies that highlight these essential aspects that our models need to take into account. In return, the models can improve the efficiency with which such cases are studied as well as their generation of testable hypothesis and empirically based insights. The modeling can also help guide the design of the data collection process, while the machine learning techniques developed can help in the analysis of such data. The software tools resulting from the computational models, algorithms and other technology generated as a by-product of the proposed research will naturally help the study of threat mitigation and cyber defense as well as policy development and analysis. Incorporating network structure as a core component of the IDS models continues previous work (Kearns & Ortiz, 2003), but the general study of the relationship between network structure and behavior is largely open, and is considered as a promising area of research (Jackson, 2007) with relevance to network defense. Previous work in computer science has helped characterize the structure and complexity of computing stable outcomes in terms of structural and statistical properties of the local interaction game network (Kakade, et al., 2003; Kakade, et al., 2004a; Kakade, et al., 2004b). Other work in economics has studied the problem of identifying the "key" player in game-theoretic models of a particular parametric form with application to crime network, and characterize the properties of the such "key" players based on "network centrality" concepts (Ballester et. al., 2004; Ballester et. al., 2006). Recent work in theoretical computer science has studied the problem of identifying "influential nodes" in dynamic models of contagion in networks (Kleinberg, et al., 2007). There has also been some recent work within the multi-agent system's community to study computational problems in hybrid models merging cooperative and non-cooperative game theory, including some within the context of cyber security and defense. The research is expected to create new knowledge about the properties of IDS games, make them more widely applicable, and demonstrate their capabilities in the context of cyber defense and international relations in cyberspace. The results will also generate new insights into the role of network structure in the characterization and efficient computation of the stable outcomes in graphical (networkbased) games. We will be able to demonstrate the power of game theoretic modeling and computation in specific policymaking processes and analysis tasks for some problems in cyber defense. We expect the research to generate sophisticated computational tools that social scientists can use to frame and thoroughly explore their models and develop testable hypothesis with ease. Using such tools, policy makers and analysts will be able to perform risk analysis on their proposed policies, and explore and study the effect of such policies in detail at a large scale. This capability can lead to the development and implementation of better-informed and theoretically grounded policy decisions. 1.5.4 Simulations and System Dynamics Modeling – D. Goldsmith We shall explore using the results of the game theory research described above and agent-based modeling to represent the complexity and dynamics of situations where multiple actors with different agendas and motives interact. In such situations local, limited interactions among a subset of actors can affect overall outcomes and system stabilities or catalyze the emergence of new phenomena, e.g., coalitions, and these can be captured in the simulations. Simulations can also capture effects of experience-based, endogenous changes in agents’ motives and values, i.e., learning, and other critical path dependencies, e.g., reaching a tipping point in the broad acceptance of a standard or agreement. The models thus can answer how-possible and what-if questions that are vital in evaluating the prospects and strengths of policies. We shall employ System Dynamics Modeling (SDM) to tie together actions and outcome in one sector or module with effects and consequences in another sector or module. (Choucri, et al., 2007) SDM is an approach for modeling and simulating complex physical and social systems. The core of the modeling strategy is to represent system structure in terms of stocks, flows, and the causal mechanisms that govern their rates of change. Feedback loops are the building blocks for articulating the causality represented in these models. In this domain, the interaction among the various modular sectors (i.e., social, economic, political, scientific and cultural) can be used to explain overall system behavior, such as identifying the sources and recognizing the evolution of cyber threats. 15 The appeal for the analysis of national security challenges associated with cyberspace lies in SDM’s capacity to link observable patterns of behavior of a system to macro- and micro-level structure and decision-making processes. In other words, models will be tightly grounded in observations of real world cyber venues, but also will be associated with multiple theoretical frameworks of actor behavior. This multi-level modeling approach incorporates complex interactions among different major actors and entities while capturing non-linear causal relationships. By understanding how non-linear causal connections among actors create different propensities for risk, we can use the model to explore policy alternatives and identify high-leverage options to mitigate risk. 1.6 Institutional Constraints on Strategic Cyber Defense (Task F) Although the game theoretic approaches require real world specifications, there are many open questions regarding what international laws and Internet rules may limit the options for states in providing cyber defense. Our team’s research into the problems of governing behavior in cyberspace and the governance of cyberspace itself will investigate how these problems affect strategies of state and non-state actors and the overall stability of cyberspace. It will also develop technologically informed, institutionally realistic agendas, guides and proposals for policy makers and policy analysts. 1.6.1 International Law on Cyber Defense - J. Goldsmith Designing an effective legal regime for responding to cyber attacks presents enormous challenges. (Goldsmith & Wu, 2006; Hollis, 2008) These challenges are more urgent and difficult than related ones presented by threats of nuclear, biological, and chemical weapons, yet the theoretical study of the legal issues implicated by cyber attack is much less extensive and sophisticated than the theoretical study of these related threats. (Schmitt, 1999; Barkham, 2001) So our research raises some prominent challenges and investigates in collaboration with team members how input from social science and technology can help cyber lawyers and policymakers craft their resolutions. Self-Defense: On the view of international law, an armed response or even a response in kind to a cyber attack is problematic. Consequently, the options space for credible deterrence or enforceable multilateral agreements may be limited. Under the UN Charter, a nation can use force against another nation in self-defense, i.e., if it suffers an armed attack from that nation. The main questions here are whether any cyber attack rises to the level of an armed attack, if so, on what basis, and whether responsibility for the cyber attack can be attributed with some assurance to a foreign government. As noted in the Estonian case, the attacks are the work of private citizens and plausibly deniable by their government. (Indeed a state’s responsibility for and regulation of its citizens in cyberspace is an issue that cuts across many fields of cyber law.) Under the Laws of War, a self-defensive, armed or cyber attack on military targets in the other state is permitted, providing it does not disproportionately damage civilians or civilian infrastructure. With selfdefensive attacks on computer networks, however, all sorts of unforeseeable and potentially large consequences may befall civilian populations and infrastructures. For example, a self-defensive cyber attack on a nation’s military command and control system might inadvertently but significantly affect a nation’s private communication system or its electrical grid. The intelligence needed to make accurate collateral damage estimates as required by law will frequently be absent in the short term in a largescale computer attacks for self-defense. Multi-lateral agreements and International Regimes: Under any negotiated agreement or regime, the United States would ideally want to maintain maximum flexibility in the offensive use of cyber weapons while at the same time maintaining maximum capacity to defend its considerable computer resources (as of course would other technically advanced countries). Coming up with a legal regime that balances these factors properly requires enormous technical and theoretical expertise across many disciplines ranging from computer science to international relations theory to game theory and law. Such intellectual resources are also needed to spark genuine and mutually beneficial international cooperation in cyber security and defense. Such cooperation is vital for many reasons. For example, an effective response to a private cyber attack from one nation into another often depends on speedy cooperation between government officials in both nations. This is very difficult to achieve because real-time cooperation across borders is always hard, and because nations are wary about the intrusions on sovereignty that such cooperation often entails. A good example of these difficulties can be found in the Cybercrime Convention, which establishes minimum standards for what counts as criminal activity related to computer networks. Less than a third of the nations of the world have signed on to the Cybercrime 16 Convention, and the Convention contains large exceptions to requests for assistance. On the whole the Convention has not been very successful. And yet the Convention imposes many fewer reciprocal demands on nations than a successful regime of preventing or minimizing cyber-warfare would require. Assuming that there are collective action problems to be overcome (an assumption that depends on the precise issue and the nations involved), overcoming them is very hard. Domestic Law: Our research will also address the challenges for domestic law and government operations that cyber defense policies can create. These include the effective lack of Congressional oversight and timely notification for defensive cyber attacks by the military, the lack of a scheme for coordinating agencies at officials across the federal government and at the state levels in response to a cyber attack and the excessive secrecy within the government and between government and private industry. For example, testimony at a recent Congressional hearing suggested that classification of a power grid vulnerability hindered electric utilities from taking preventive measures recommended by the government that had done the classification. Excessive government secrecy is an enormous problem, and in few areas is the government as secretive as it is in the area of cyber attack and cyber warfare. Any comprehensive policy on cyber attacks must confront the issue of secrecy both within and without government. An intriguing research perspective is determining whether some help for this can be found in cryptographic based procedures that could enable parties to reach working agreements without revealing their respective secrets. 1.6.2 Global Internet Governance - Clark The nature of the Internet is shaped both by technical decisions, e.g., the specification of standards, and by policy decisions concerning key operational issues. These latter decisions are often referred to as governance issues. In some respects, recent controversies over standards and governance of the Internet have seen the same devolution of centralized control and expansion of contending international parties. To the extent then that the US’s role in governing the Internet contributes to its global influence (soft power), policies that help maintain that role are aspects of cyber defense. Of course there are also possible operations and standards that could increase the cyber security of the US and other legitimate Internet users. Policy makers need to know whether and how they work. Contending bodies: Starting in the mid-1980s, the technical standards that define the Internet have been set by an essentially self-governing group called the Internet Engineering Task Force (IETF). While the IETF controls the standards that define the core of the Internet, there are other standards bodies: the World Wide Web is specified by a consortium (the W3C) hosted at MIT, and many of the technology standards, like Ethernet and Wi-Fi, are defined by the IEEE. The International Telecommunication Union (ITU), which operates as an arm of the UN and sets standards for the telephone industry, is attempting to define a role for itself in the Internet. It has set various standards at the application level, such as for video coding. Some observers have asserted that today the IETF is dominated by equipment suppliers and the ITU by traditional telecoms operators. There is a certain amount of “venue shopping” as different actors vie to put forward their ideas. Internet governance issues were initially resolved informally by volunteers under the leadership of Jon Postel, who was seen to act with wisdom and disinterest. The transition to a more formal structure was disrupted by Postel’s sudden death about 10 years ago. What emerged was the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN was created by the U.S. Department of Commerce, which asserted the right to act because of the U.S. history of control over the DNS. The Internet has grown enormously in the meantime, and ICANN has been predictably criticized as being U.S. centric, as well as incompetent and power-hungry. In response to general global dissatisfaction with the governance of the Internet, the UN General Assembly, acting through the ITU, convened the World Summit on the Information Society (WSIS), which met twice, and involved heads of state and others of similar stature. This highly political context is not generally viewed as having achieved any substantive outcomes, but was a platform for many parts of the world to voice their dissatisfaction and present alternative views of Internet governance. A follow-on activity under the leadership of the U.N. is the Internet Governance Forum, or IGF, which will meet for the third time late this year. The agenda again centers on the global nature of the Internet, and the perception that the Internet is still too much a creature governed by US interests. Two critical issues of global scope are how Domain Name System (DNS) names are allocated and how Internet addresses are allocated. A DNS name such as “mcdonalds.com” can only be allocated to 17 one entity, so disputes over ownership of a name have a global component. The disputes over address allocation center on how many addresses should be allocated to various parts of the world (the U.S. is relatively rich in IP addresses compared to Asia, for example) and which entities should control those addresses. In many parts of the world today, addresses are typically given in blocks to Internet Service Providers, who are often trans-national. One proposal put forward by the ITU under Chinese leadership was that addresses should be allocated to countries, which would then license them to ISPs within these countries. This proposal would have given countries more control over the operation of their ISPs, and made jurisdictional boundaries much easier to define and enforce. Of course, there are also governance issues at the national level (e.g., spectrum policy for wireless, and competition policy for residential access) and at the local level (e.g., access to right of way and zoning for towers.) Certain issues that are traditionally regulated in the telephone system, such as the rules for interconnection among carriers, remain unregulated in the case of the Internet, but there is continuing concern that the actions of the private sector, if left entirely to them, will not lead to a network with the best social outcome. The current US-origin debate over network neutrality and so-called “network management”, or the rights of the ISP to shape or block certain traffic, will be a growing concern over the next years. In parallel with the evolution of formal governance bodies, we see the evolution of the private sector, with consolidation in the ISP market, transnational mergers in the supplier sector (e.g., the merger of Lucent with Alcatel) and emerging technology suppliers from other parts of the globe, such as China. Governance of Information and Content: Above the technology layers of the Internet are at least three important issues concerning information and content: protection of copyright, right of lawful intercept (wiretap) and the state or other actors limiting access to certain information by state (and other) actors. With respect to copyright, the U.S. is again seen as taking a U.S.-centric view, because of the powerful influence of the U.S. content industries. The issues surrounding wiretap are complex, because concerns about the need to combat terrorism collide with concerns about the use of such tools, once embedded in technology, by more authoritarian governments. The desire of some countries to block access to content they find offensive or inappropriate signals to some the future of the Internet, if it is engineered to facilitate greater controls in the name of law enforcement. Over the long run, the intrinsic security of the network can be improved, as well as the ability of the network to limit the damage done to or by insecure nodes. Techniques include are new techniques to regionalize the network and providing checks of authentication at trust boundaries, support for highly diverse architectures that provide high levels of availability despite attacks and failures in the networks, end to end confirmation of correct connection termination (to prevent so-called phishing and pharming attacks), and redesign of applications to make it easier to insert suitable application-level checks into communications. Policy makers will, of course, need to know the extent that these techniques reduce our national vulnerability. However, it is unlikely that the new Internet can solve the problem of attribution. Most cyber attacks are carried out using many intermediate computers on the network, often-innocent nodes that have themselves been infiltrated. So tracking back to the root of the attack involves unwinding a series of connections; reliably knowing the identity of the first hop is only a small step. One proposal to identify the attacker in the case of exfiltration of information is to secretly watermark the information itself. This would demonstrate the provenance of the information and implicate the actor who gained it surreptitiously. The implementation of such techniques would require considerable interaction among the standard setting and governing layers of the Internet, law enforcement agencies, cyber lawyers and government policy makers. Such rich stew of parties, often with competing interests and incentives, may produce interesting but indigestible results. The collaboration of our team members, with their varying expertise, might find practicable ways of assuring good cyber security measures are accepted. 1.7 International Strategies for Cyber Threat Mitigation (Task G) Choucri, full team If comprehensive technical solutions require decades to develop and deploy and cyber threats continue their exponential growth, international strategy must reduce cyber insecurity in the medium-term and provide a sound basis for national security beyond. Of late, analysts have endeavored to fit cyber defense into the framework of deterrence theories developed for nuclear weapons. Major differences, however, make this approach ineffective at best and dangerous at worst. Our ability to attribute cyber attacks is very poor due to the inability in the current network architecture to trace reliably and quickly 18 network packets to originating hosts. Even if the network were fully instrumented, we could not be certain that the origin host had not been subverted by a 3rd party intending to provoke a conflict among major powers. Furthermore, to whom can we attribute a sleeper attack long after the Trojan horse was prepositioned? So, any threat to respond in kind or cross domain to cyber attacks is likely to be ignored or dismissed as incredible. Threats become incredible when the adversary runs a low probably of detection. Even if the attacker is detected, policymakers may be reluctant to respond to abstract losses, in which nobody is killed or injured and no physical damage is inflicted. Some have suggested that if we “catch” adversaries once in a thousand attacks, we should retaliate a thousand fold. Such an approach, we believe, would be highly incredible, if announced, and very destabilizing, if practiced. Like the stated Russian policy of reserving the right to respond to a cyber attack with nuclear weapons, threats of dramatic escalations also carry low credibility. In this environment, defense relies on what offense can learn, which may often be incomplete and late. Nevertheless, we expect to spend considerable research time on developing and evaluating the potential efficacy of defense strategies based partly on deterrence, practiced in carefully defined situations, such as forms of graduated retaliation and cross-domain sanctions. Work on shared models of escalatory cyber actions is also planned because it is crucial for avoiding unintended conflicts. Such models must distinguish levels of attack and limit “all of nothing” thinking that interprets ostensibly hostile cyber event as necessarily indicating hostile intent. To reduce risk of misperception, reliable communications lines, like hot lines, become absolutely essential for the leadership to speak with their counterparts in extraordinary situations when normal communications may have been disrupted. A more promising approach is cooperative arrangements with friends and adversaries to work together countering bad actors or sharing information. With friends, collective defense efforts, like the NATO cyber defense arrangements, make good sense and help distribute best practices and situational awareness among allies. With adversaries, cooperative deals can be struck to refrain from dysfunctional behaviors and to protect important shared values, like trade, non-interference in world economic functions, and not targeting civilians in cyber campaigns. Major powers will likely agree that dissemination of national-level cyber capabilities to 3rd parties is potentially destabilizing and not worth the limited benefits in camouflaging through criminal proxies activities of which they are suspected anyway. Our research will include tracking the interest in and simulating the effects of such proposals. In sum, lack of transparency makes deterrence exceedingly difficult to implement, but cooperative strategies offer the possibility of agreements designed to increase transparency and assure verifiability. 1.8 Policy Analysis And Recommendations (Task H) – Carter, Choucri, Nye, Rosenbach Integration of theories, methods, and policies: The research program will follow a modular approach in applying theories and methods to produce domain- and system-level results. Specific results can serve as inputs for analysis of other domains or evaluation of policies, resulting in the connection of theories and methods across the issues of cyber security and timely frameworks for risk analysis and policy evaluations. This strategy of accumulation and integration of theories and methods follows new developments in Lateral Pressure Theory, which highlight the impact of cyberspace on technology, economics and culture linking the real world and virtual domains. The approach mirrors the increasing interdependencies of human activities at the global level and underscores the important of smart policies and soft power in the conduct of international relations. 1.8.1 The Role of Soft Power in Cyber Defense (Nye) The information revolution is transforming international relations. Two major power shifts are occurring: the rise of Asian states, and power diffusion to non-state actors. As noted before, cyber threats and potential cyber warfare illustrate increased vulnerabilities and loss of control of modern societies in the face of both these shifts. Governments have mainly been concerned about hackers attacks on their own bureaucracy’s information technology (IT) infrastructure, but experts point to social vulnerabilities well beyond government computers, and in the murky world of the internet, attackers are difficult to identify. At the same time, the information revolution is increasing the role of soft or attractive power in world politics. Traditionally, the key to success in world politics was whose army wins. Today it also matters whose story wins. The ability to generate and propagate an attractive narrative is increasingly important in world affairs, and the competition involves non-state as well as governmental narratives. American 19 policy makers will need to engage in two quite different conversations to limit damages from cyber threats, and smart use of soft power will be part of those conversations. One conversation relates to power transitions among states, with particular emphasis on the rise of Chinese power. This need not be a zero sum game or even plotted as a mixed motive game. China and the US can prosper simultaneously, and it is interesting that China’s President Hu Jintao has set a goal of increasing China’s soft power. While China can use cyber techniques to damage the US, they can also do so with military means. China can bring us to our knees, but in doing so they would bring themselves to their ankles. Given the symmetry of the interdependence, it is possible to move beyond deterrence and engage the Chinese in a dialogue about limits to threats and attacks in the cyber world as well as in the military and economic worlds. The second conversation is more difficult. Many non-state actors can threaten and attack, thinking that we cannot be sure of attribution of the source, and even if we could, lack concrete targets for retaliation. But many such organizations are concerned about both their survival and their soft power. Al Qaeda is in the business of winning hearts and minds. By delegitimating their activities, we can strike at their soft power and hold at risk something they care very much about. As for criminal non-state actors, by developing interstates norms and treaties that delegitimate their activities and serve as a basis for cooperation among governments, it is possible to isolate them the way pirates and privateers were a century and a half ago. Internet access can be defined as a public good like freedom of the seas, and denial of service attacks can be treated as a form of piracy about which governments are obliged to cooperate. A first step is to separate governmental from non-state actors and prevent the former from hiding behind the latter. There are no simple solutions to cyber security. But cooperation among governments will be important in a period of power shifts, and governments will need to use the full panoply of hard and soft power tools at their disposal. Figure 1 Cyber Policy Space 1.8.2 The Objects of Policy We can expect numerous conversations with allies and adversaries, because of the number of complex issues involved in securing and defending cyberspace. The diagram in Figure 1 represents layers and modules that constitute cyberspace. The supply chain specifies, produces, connects and administers the components, devices and bit flows through which cyberspace processes are realized. The cyberspace layers comprise different domains of human and sometime purely machine activity and their noetic outputs in beliefs, ideas and practices shared by different groups and communities. The Governance layers are a superstructure of standards and processes that regulate these activities and which derive their authority from informal consensus (soft power) or more formal agreements and conventions. All the cells in this space can be sources of vulnerability or threat for the US and, as such, 20 they are all potential objects of cyber defense policies. By policies we mean expressions of how “we” want things to function and rules on what to do when they do not function those ways. Some of the cells might not need policies -- “if it isn’t broke, don’t fix it” -- but without a synoptic view of cyberspace, like the diagram provides, policy makers might be surprised when something is broken in a cell they had not previously noticed. For example, the possibility that ICs manufactured in China had Trojans was ignored for some years in the sense of not thought about rather than dismissed. So the first question a cyber defense policy maker or analyst needs to ask is whether her map covers the territory. We believe our technologically informed, multidisciplinary approach provides such a map and can update it in pace with the rapidly changing terrain. The second question is which cells require policy fixes. Our team can produce guides and tools that help analysts answer that question, given its technical knowledge resources, and its commitment to data development, threat profiling and risk analysis. The next question may be whether the approach encoded by the policy proposal is appropriate for the issue. In this regard our critiques of various strategic approaches, the cases histories, machine learning on the data and the game theoretic modeling combined with legal analysis provide multifaceted frameworks for deciding whether a proposed policy can work. Such a framework can be provided through conventional academic means of training students and publishing books and papers, but also through software tools we plan to deliver by the program’s fifth year. Ideally, analysts should also be able to anticipate the effects of proposed policies on activities in other cells or on the actions of other actors engaged in the cells. Again, we believe that our program through research in realistic game theoretic and system dynamics modeling, and other methods, discussed above, can provide guides and tools for addressing that issue. Finally, various parts of the program’s research, from its development of event data for monitoring and alerting to its investigation of soft power in cyber defense, can help answers questions about how success of a policy should be measured and what is the expected time gap between a policy’s adoption and the result it seeks. In sum, because the landscape of cyberspace and the real world it helps coordinate are complex and in rapid flux. Policymakers and analysts need better methods for developing and evaluating cyber defense policies that surpass standard cost-benefit analysis, deterrent logics and regime theories. Our research program will provide those methods. Cyberspace Policies and System Stability: Figure 2 locates cyber policies and proposals in a two dimensional space, whose horizontal axis ranges from competition to cooperation and whose vertical axis ranges from opaque and extra-legal to transparent and legal. Actors’ policies that support or tolerate activities in the competitive-opaque (southwest) quadrant, like low level information warfare (probing for battlefield awareness) and industrial espionage are potential sources of inter state conflict. Exploitation of the Internet by terrorist and criminal groups are also in this quadrant. Policies in the cooperative-legal (northeast) quadrant such as participation in the European Union Treaty on Cyber Crime can help stabilize international relations. On that view, proposals that move actors toward multilateral responses to cyber threats, in the traditions of arms control or rules of war, are more conducive to stability than unilateral, covert responses and mutual deterrence. Policy relevant research will consequently locate proposals within this space, evaluate their risks and benefits and analyze the tradeoffs across differing conditions, e.g., levels of compliance, and time ranges. We will also consider, in regard to system stability, semi-overt, competitive policies, like states’ filtering digital content available to their citizen, and covert, cooperative policies, like alliance members’ sharing information about cyber attack tools. In the middle of this space are policies that might be reached on the basis of sufficient individual incentives under a design mechanism or through protocols that do not require parties to disclose to one another their evaluations of outcomes. The policies of the respective parties are aligned and non-conflicting, but they are not committed to a common goal. We shall also investigate the impact of such arrangements on system stability, national security and national influence. 21 Figure 2 Dimensions of Cyber Policy 1.9 Innovation, Industrial Organization & Sector Strategies (Task I) – Madnick, Mallery Truly effective solutions to cyber insecurity require technical innovation to computer and network architectures which assure security by design and support high-productivity high-assurance software development, intelligent configuration management, adaptive reconstitution, and intuitive user interfaces. Because important elements of the necessary information assurance and computer science are missing, organizational strategies are needed for rapid research, development and deployment of next generation high-assurance commodity technologies. These efforts involve formulating strategies for effective basic research, development and application insertion, university research modernization, expediting certification and accreditation, and incentivizing industrial uptake. An important research issue involves policy-trade offs between wide spread adoption of high assurance commodity systems and national security interests, such as system and technology dissemination and impact on offense. 1.10 Related Research In the past 15 years there has been spectacular proliferation of doctrine, research and studies, mainly within military organizations, on information warfare, information operations, information exploitation, net-centric warfare, their international legal ramifications and cyber security responses to them (NPS, 2008, for a recent bibliography). The same period also witnessed numerous studies and prognostication on the social, economic, political and cultural impact of the Internet and new media at the domestic and international level (Choucri, 2000), with (Benkler, 2007) being one of the best recent summaries. This interest has spawned new courses, centers, e.g., Harvard’s Berkman Center for the Internet and Society, and new departments at the university level, e.g., MIT’s Comparative Media Studies. Our research program will benefit from these efforts, but we believe that it will be unique in its focus on international system stability rather than narrow unilateral gain and its focus on broader cyber defense policies, including supporting conceptual frameworks, data and methods. 1.11 Expected Results We expect to produce results and thought leadership in the following areas: • Effective theoretical understanding of interactions in international relations between the ‘real’ and cyber domains – with all critical implications for national defense. • Case and area studies on the experiences and perspectives of key countries and transnational actors. • Cyber threat analyses to maintain awareness of the cyber terrain and its technical evolution. 22 • • • • • • • • • Collection, fusion and advanced analysis of data sets based on new data theories as well new analytical techniques, replicable research exemplars, foundations, principles, and metrics. Robust governance principles for cyberspace, including technical, communications and content dimensions. Legal frameworks for regulating international competition and cooperation in cyberspace. Strategies for cyber defense based on advances in RMD and IDS, among other approaches. Policy frameworks for cyber defense. Simulations of policy choices over time. Education and training at the university level, through Congressional briefings and tutorials and in mid-career refresher courses. Publication of research papers and books on international cyber relations. Workshops on a series of cyber defense topics. 1.12 Relevance to Defense Missions and Requirements In the context of the Comprehensive National Cybersecurity Initiative (CNCI), this project will contribute to the cyber defense mission by developing effective and technically grounded policy frameworks and strategies based on new theoretical understandings, awareness of the cyber terrain, empirical findings, case studies, advances in game theory and ground breaking legal analyses. Through research on new data theories and focused analyses informed by international relations and novel algorithms, this project will contribute to cyber indications and warnings efforts. 1.13 Potential Implications For National Defense Cyber defense is already a top national security priority and the most critical and extensive technical problem facing the US military, intelligence services and critical civilian sectors. For at least the next decade, partial measures must be deployed to slow exponential rises in cyber crime, to suppress nascent cyber terrorism, to reverse trends in industrial espionage, and to mitigate cyber threats to the military, intelligence services and critical infrastructures. These measures will likely include technological fixes, strategic policies and communications, international agreements and new laws. To assist the development of such measures, the research effort will: • Understand computing and networking as an environment and vehicle for conflict and cooperation; • Understand transformations in international orders as contexts for cyber defense and security; • Identify emergent cyber threats and opportunities for effective responses; • Anticipate limits, gaps and unintended consequences in policies; • Provide frameworks for rigorous risk and impact analyses of cyber defense policies and initiatives. • Provide conceptual tools to study and enable cooperation in a potentially adversarial strategic interaction; • Provide theories and decision frameworks that enable policymakers to grasp the technical, political and strategic dimensions of cyberspace and to evaluate proposed strategies and agreements. The research program will also include knowledge building in support of policies that encourage effective R&D for transformational cyber assurance technologies (even when all the science is not known) and for strategies that speed uptake of such high-assurance technology in the supply chain. If successful, the Resilient Mechanism Design effort will provide a universal theoretical basis supporting self-enforcing cooperation and yield effective applications to specific international negotiations and agreements necessary for mitigation of cyber threats. 1.14 Education and Training A major objective of the effort is to train a new generation of scholars, analysts and policymakers who are fluent in cyber defense and international cyber relations. MIT is updating the undergraduate course on “International Relations for the 21st Century,” which will incorporate a cyber component. The January MIT independent activities period will be exploited for outreach to the MIT community with tutorials and short courses. The Kennedy School will develop new courses to train policy makers in cyber-related fields. It will also incorporate cyber defense into its ongoing education and training programs for Congress and government officials. The Harvard Law 23 School will add additional focus on cyber defense to its existing educational programs on Internet and Society. The MIT Sloan School of management will introduce students to cyber security administration. Research and data sets will be disseminated, as appropriate, over a project Web site. Micali will develop a new interdisciplinary field in Resilient Mechanism Design (RMS), create a course to train students in the new field and author papers and other publications. In addition to teaching tutorials in conference settings and participating workshops, Ortiz will publish research on Interdependent Security (IDS) in computer science journals as well as broader publications like PNAS and Science. He will also make software and publications available online. RSM and IDS tutorials and interactions will bring these techniques to law and policy applications. Undergraduate students at MIT and Harvard will be included in the project, but funded separately. Eight full-time graduate students will be supported under the base budget, and if funded, option 1 will support three more and option 2 two more. 1.15 Project Schedule, Milestones, and Deliverables Research Milestones Track A B C D Investigators Choucri, Hurwitz, Mallery, Nye Hurwitz, Nye, Carter Clark, Mallery, Rosenbach Choucri, Hurwitz, Madnick, Mallery, Winston E Micali, Ortiz, D. Goldsmith F Clark, J. Goldsmith G All PIs H Carter, Nye, Rosenbach, Choucri I Madnick, Mallery 2009 2010 2011 2012 Book Framework Indexes Rmd Tools & Concepts 2013 Book China, Russia Theory For Assessment Non-State Actors Data Codebook Fused Datasets Prototype Indicators Results From Analysis, Indicators Rmd Proofs & Examples, Sdm Demo Rmd Initial Applications, Ids Publications Rdm Advanced Tools, Ids Simulations & Hybrid Models Rdm Extensions Based On Feedback, Ids Applications, Sdm Policy Choices Policy Briefing Stability Analysis Cooperative Strategy Alliance & Coallitons Strategy By Issues Congressional Training Policy Policy Policy Book Innovation Policy Uptake Analysis Incentive Strategy Cyber Certification Dilemma Identification Book Book The program will have the following research tracks (tasks in the project description). Key investigators are identified for each track in the proposal above and the tables for deliverables and milestones. A. Articulation of Theoretical Foundations: Delineate the broad domain of cyber defense with emphasis on security threats, threat actors, and cyber actions. This will be grounded in understanding of international system dynamics, including cyber-related transformations in economic power, political authority, social organization and cultural dominance. B. Area Research & Case Studies: Guided by theory, regional and case studies will examine key actors in detail and evaluate potential impacts. Research in this area includes various government policies on information control, cyber warfare capabilities and options of NATO, Russia, China, US, and non-state actors and how they respond to and exploit threats and opportunities in cyberspace. 24 Research Deliverables Track A B C D Investigators Choucri, Hurwitz, Mallery, Nye Hurwitz, Nye, Carter Clark, Mallery, Rosenbach 2009 Workshop Working Papers Index & Assessments Choucri, Hurwitz, Madnick, Mallery, Winston E Micali, Ortiz, D Goldsmith G Clark, J. Goldsmith, F All PIs H Carter, Nye, Rosenbach, Choucri I Madnick, Mallery 2010 Working Papers Index & Assessments RMD Framework, SDM Demo Innovation Policy 2012 Book Data Code Books, Congressional Training 2011 Policy (Briefing) Strategies Workshop Policy (Briefing, Tutorials) Uptake Analysis Working Papers Index & Assessments Fused Data, Results Based On Analysis Indicators, Workshop 2013 Book Working Papers Index & Assessments Working Papers Index & Assessments Results Based On Analysis, Indicators Results Based On Analysis, Indicators IDS Models & Tools, RMD Applications IDS Applications Workshop RMD Applications, IDS Applications, SDM Of Policy Policy, Book Policy Policy, Book Strategies Strategies Strategies, Workshop Policy Policy Book Incentive Strategy C. Cyber Threat Analysis: This research tracks and analyzes evolving cyber threat landscape, including actors, capabilities and vulnerabilities, as well as corresponding technical requirements for cyber defense. D. Data Development & Analysis: Research will develop data theories as well as collection strategies and techniques. It will identify available data sets and collaborate with government, industry and academia to enhance those data sets through new theoretical and analytical approaches. E. Game Theory & Dynamic Simulations: Efforts will focus on Resilient Mechanism Design and Interdependent Security as well as system dynamics simulations of international system stability. F. Legal And Policy Approaches To Governance: This effort will propose legal frameworks for international cooperation and cyber conflict as well as domestic cyber security policy. It will also suggest policy approaches for Internet governance as well as incentives to encourage transformation of cyber infrastructures and IT supply chains for greater security and resilience. G. Strategies for Threat Mitigation and Cyber Defense: This will propose strategies and frameworks for threat mitigation and cyber defense together with analyses of their strengths and limitations. H. Policy Development and Analysis: Development of a knowledge base and guide for policy makers in their developing policies for assuring, regulating, exploiting and governing cyberspace. I. Industrial Organization, Innovation, and Sector Strategies: As an option, this track will research the conditions, organizational structures, initiatives and policies needed to produce new transformational hardware and software necessary for technological solutions to cyber insecurity. 1.16 Assertion of Data Rights No proprietary claims. 1.17 Management Approach Nazli Choucri will serve as the PI, with responsibility for coordinating the overall research effort and maintaining its focus. A program policy committee, consisting of the PI, Nye (Harvard), Clark (CSAIL) will provide oversight. It will work together with the project manager (Hurwitz) to provide intellectual integration of the program. The project manager will monitor task execution and manage collaboration among the investigators. Each participating center will have a point of contact who coordinates local execution of the project plan with the project manager based on guidance from the steering committee 25 and the PI. They are: Choucri for the Political Science Department; Eric Rosenbach for the Belfer Center for Science & International Relations of the Harvard Kennedy School of Government; Goldsmith for the Harvard Law School; Madnick for the Sloan School of Management; and Clark for the Computer Science and Artificial Intelligence Laboratory. The steering committee will designate the best messengers to interface with policymakers, government and industry for each case and support them with the combined intellectual resources of the program. An advisory committee drawn from industry, academia and government experts on international cyber relations will help assure the value of the program’s research and the effectiveness of its management. This committee will meet twice yearly with senior investigators to review progress, assess current efforts and identify emergent research issues. The steering committee will consider the committee’s advice as they assess progress, identify emergent issues and align goals for the following six months. To enhance internal communication and knowledge building, the research team will meet online or face to face on a weekly basis to discuss issues, problems and solutions across the project and in particular areas. Team members are also expected to comment regularly on a project blog about their own and fellow team members’ research. During the academic calendar, the project will conduct bimonthly seminars, where team members and external speakers will lead discussions on topics in international cyber relations. These sessions will be open to the wider MIT-Harvard and Boston communities. Concurrently, we will hold weekly seminars for the research assistants and their direct supervisors to ensure sustained interaction and cohesion within and across the individual efforts. Research results will be disseminated through co-branded and co-authored working papers series at the MIT Center for International Studies (CIS) and the Belfer Center, and by a program web site. Team members can also present new results at an annual workshop where they and invited participants will discuss in depth a focal topic in cyber defense. As already noted, team members will integrate program relevant material into the courses they teach; they will also supervise masters and doctoral students whose theses fall with the project’s scope. In addition, the team will offer seminar-style training and information sessions to members of the federal government’s executive and legislative branches. As new topics arise that require additional research leadership, the PI in conjunction with other co-PIs will identify faculty or research staff with appropriate expertise within the MIT and Harvard community who can lead such efforts. Additional staffing will be particularly relevant for the two options, which pursue new research thrusts. MIT will administer all project funds and distribute funds to Harvard researchers through a single subcontract to the Belfer Center and to outside consultants through separate subcontracts. CIS, CSAIL and the Belfer Center will provide facilities for the seminar series and annual workshop. The Political Science Dept. and CSAIL will provide office space for MIT team members on an “as needed” basis. Sub-awards: The project will include people and groups who can make substantial contributions to the research effort, but will not be directly involved in training students at Harvard and MIT. Luis Ortiz, an assistant professor at Stony Brook University, has been named a co-investigator in the core proposal to help develop economically oriented, computational tools for analyzing risk in networks and other interdependencies. Choucri will coordinate his work with other research and Hurwitz will monitor his progress. We are considering for Option Layer 1 a group like the United States Cyber Consequence Unit (USCCU) to fill a consulting role. It is a non-academic 501(c)3 organization that investigates cyber security breaches on behalf of US government agencies and financial institutions. Collaborations: We have made contact with a number of outside organizations and we are exploring areas of possible collaboration. These organizations include: • Bureau of Intelligence and Research, US Department of State (Threat mitigation, diplomatic strategy) • Center for Computational Social Sciences, George Mason University (innovations, analysis) • MIT Lincoln Laboratory (cyber indication and warnings) • Sandia National Laboratory (cyber indications and warnings) • Symantec Inc. (Data theory, data collection and possible student support) Time Commitments: The PI, co-investigators and key personnel will be involved with the program through the course of the entire year. Their respective commitments in terms of months and FTE percents are as follow: Choucri, 3 months, 25%; Ashton Carter, 2 months, 18%; David Clark, 1.2 months, 10%; D. Goldsmith, 3 months, 25%; J. Goldsmith, 1 month, 8%; Hurwitz, 6 months, 50%; 26 Madnick, 1 month, 8%; Mallery, 6 months, 50%; Micali, 2 months, 18%, Nye, 1 month, 8%; Ortiz, 1.5 months, 13%; Rosenbach, 2 months, 25%; Winston, 1 month, 8%. We believe the research is remarkably qualified to conduct the programʼs research and realize its goals, due to their research experience, scholarly accomplishments, insights into cyberspace and knowledge of policy making. Here are some details for several of the teamʼs members. • Ashton Carter is an expert on nuclear strategy and managing nuclear weapons, a longtime member of the Defense Science Board and the Defense Policy Board, and chair of the International and Global Affairs faculty at the Harvard Kennedy School of Government. He is also a member of several other advisory panels to the government and foreign policy review groups, Co-Director (with former Secretary of Defense William J. Perry) of the Preventive Defense Project, a research collaboration of Harvard and Stanford Universities and the author of several books and numerous papers on security and defense policies. • Nazli Choucri (PI) has authored several books and over 120 articles in international relations. Her book, Cyber Politics in International Relations (MIT Press, forthcoming) directly relates to the proposed research. She is associate director of MIT’s Interdisciplinary Technology and Development Program (TDP), which is known for its wide reach in international collaborative research; she also directs the multilingual Global System for Sustainable Development (GSSD). In education, she has a long record of introducing new directions and courses in the MIT educational curriculum. • David Clark was chief Protocol Architect of the Internet (1981 – 1989), a chairman of the Computer Science and Telecommunications Board of the National Academies, and is currently do-director of the MIT Communications Futures Program. His current research looks at re-definition of the architectural underpinnings of the Internet and the relation of technology and architecture to economic, societal and policy considerations. • Jack Goldsmith is a leading internet regulation expert, co-author of Who Controls The Internet: Illusions of a Borderless World (2006), a member of the National Academies' ongoing project on Policy Consequences and Legal Ethical Implications of Offensive Information Warfare, and the author of many books and articles on international law and international relations. As Assistant Attorney General, Office of Legal Counsel (2003-2004 he advised the President and Attorney General on legal issues concerning communications technologies, war, and international law. • Joseph Nye is University Distinguished Service Professor and former dean of Harvard’s Kennedy School of Government. He joined the Harvard Faculty in 1964, and taught one of the largest core curriculum courses in the college. In 2005, Foreign Policy listed him as one of the top ten scholars of international affairs. He has also been Deputy to the Under Secretary of State for Security Assistance, Science and Technology and chaired the National Security Council Group on Nonproliferation of Nuclear Weapons, chairman of the National Intelligence Council, and Assistant Secretary of Defense for International Security Affairs, where he also won the Distinguished Service Medal with an Oak Leaf Cluster. His recent books are Soft Power: The Means to Success in World Politics (2004), an anthology, Power in the Global Information Age (2004), a textbook Understanding International Conflict (6th ed. 2006), and The Powers to Lead (2008). • Stuart Madnick has been head of MIT’s Information Technologies Group for more than twenty years and has been a key designer and developer in many information technology projects, including Lockheed’s DIALOG information retrieval system. He has been the PI of the DARPA-funded research effort on Context Interchange. His over 250 published books, articles and reports includes the classic textbook Operating Systems and The Dynamics of Software Development. • Silvio Micali is a member of the National Academy of Science and has investigated for 30 years adversarial interactions of many players. He introduced fundamental notions to cryptography, such as zero-knowledge proofs, and co-authored fundamental results, such as secure multi-party computation. 27 2 Facilities and Other Resources We are not aware of any special Government resources that will benefit this effort, but we are naturally interested in collaborations and dialogues that advance the research effort. The project will benefit from the rich intellectual environment of the MIT and Harvard communities. The follow centers and schools are resources upon which the project mat draw: • Belfer Center for Science and International Affairs at Harvard’s John F. Kennedy School of Government s the hub of the Harvard Kennedy School's research, teaching, and training in international security affairs, environmental and resource issues, and science and technology policy. The Center's mission is to provide leadership in advancing policy-relevant knowledge about the most important challenges of international security and other critical issues where science, technology, environmental policy, and international affairs intersect. The center’s resident research community comprises more than 150 scholars including Harvard faculty, analysts, practitioners, and each year a new, international, interdisciplinary group of research fellows. The Center's work is enriched by frequent seminars, workshops, conferences, and discussions with distinguished visitors from the policy arena, colleagues from universities and research institutions, and affiliates at Harvard and in the greater Boston area. • Harvard Berkman Center for Internet and Society is one of the country's leading Internet research centers. It was founded to explore cyberspace, share in its study, and help pioneer its development. It represents a network of faculty, students, fellows, entrepreneurs, lawyers, and virtual architects working to identify and engage with the challenges and opportunities of cyberspace. • Harvard Kennedy School of Government has evolved into one of the world’s most eminent social science research institutions – housing 15 research centers and institutes and more than thirty executive education and degree programs – with worldwide reach and influence. More than 27,000 Kennedy School alumni reside in 137 countries and serve in a wide range of positions in the public, private and nonprofit sectors. Through its distinguished faculty, innovative research centers, diverse student body and global network of accomplished alumni, it is redefining what it means to advance the public interest while honoring John F. Kennedy’s call to public service. • Harvard Law School has over 1900 students, 100 full time professors, and 150 visiting professors. The HLS library is the second largest at Harvard with a staff of 94 librarians, a budget of over $10 million, and 1.7 million volumes. • MIT Center for International Studies (CIS) has capitalized since World War II on MIT's great strengths in science and engineering, examining the international aspects of these fields as they relate to both policy and practice, and focusing on those issues where science and engineering intersect most closely with foreign affairs. CIS includes 160 members of the MIT faculty and staff, mainly drawn from the departments of political science and urban studies, and visiting scholars from around the world. • MIT Comparative Media Studies Program focuses on key issues surrounding media change, which cuts across different national borders and delivery techniques and develops in-depth understanding of multiple media traditions, old and new. Program members regularly consult with leaders in industry, the arts, public policy, journalism, education and the non-profit sector. • MIT Computer Science & Artificial Intelligence Laboratory (CSAIL) is the largest interdepartmental laboratory on the MIT campus, with over 90 principal investigators and nearly 800 members. Its primary mission is research in all aspects of both computer science and artificial intelligence, and allied application fields. The laboratory brings together researchers from 7 academic departments, including Electrical Engineering and Computer Science, Mathematics, and Brain and Cognitive Science. CSAIL also hosts the World Wide Web Consortium. • MIT Cryptography and Information Security Group at CSAIL is a world center for research in cryptography, and the wider community at MIT and Harvard include many top cryptographers. 28 • • MIT Political Science Department carries forward from 1995 a tradition of focus on international issues and. It has focus areas in international politics and security studies, American politics, comparative and international political economy, and comparative politics of, Japan, the Middle East, South Asia, and Latin America. The Department has an orientation toward domestic and international public policy issues, both domestic and international as well as an ability to interact with scientists, engineers, and other social scientists at MIT and Harvard. MIT Sloan School of Management is one of the world’s leading business schools — conducting cutting-edge research and providing management education to top students from more than 60 countries. Since its inception in 1914 as an offshoot of the MIT Economics Department, the scope and depth of the School’s educational focus have grown steadily in response to advances in the theory and practice of management to today’s broad-based management school. It has offered master’s degrees in management since 1925 and executive education as MIT Sloan Fellows since 1931. 29 3 Equipment We do not anticipate need for any special equipment or test facilities. 30 4 References Alker, H. R., Jr., ``Polimetrics: Its Descriptive Foundations,'' In The Handbook of Political Science, volume 7, F. Greenstein and N. Polsby, eds, Reading: Addison-Wesley, 1975: 140-210. Alker, H. R., Jr., & T. J. Biersteker, “The Dialectics of World Order: Notes for a Future Archeologist of International Savior Faire,” International Studies Quarterly, 28, 1984: 121-142. Alker, H. R., Jr., G. Duffy, R. Hurwitz, and J. C. Mallery, ``Text Modeling for International Politics: A Tourist's Guide to RELATUS,'' In Artificial Intelligence and International Politics, V. Hudson, ed, Boulder: Westview Press, 1991: 97-126. Alker, H. R., Jr., and J. C. Mallery, ``From Events Data To Computational Histories: A RELATUS-Based Research Programme In International Cooperation and Conflict,'' paper presented at The 1988 Meeting of The International Studies Association, 1988. Alker, H. R., Jr., J. Bennett, and D. Mefford, [1980], ``Generalized Precedent Logics for Resolving Insecurity Dilemmas,'' International Interactions, 1980, 7: 165-206. Alpert, Eugene J., Capabilities, “Perceptions and Risks: A Bayesian Model of International Behavior,” International Studies Quarterly, 20 (3), 1976: 415-440. Ausubel, L. M. and Milgrom, P. “The Lovely but Lonely Vickrey Auction. Combinatorial Auctions,” 2006: 17-40. Benkler, Y., The wealth of networks: how social production transforms markets and freedom, New Haven: Yale U. Press, 2007. Bond, Doug, J. Craig Jenkins, Charles L. Taylor and Kurt Schock, “Mapping Mass Political Conflict and Civil Society: The Automated Development of Event Data,” Journal of Conflict Resolution, 41 (4), 1997: 553-579. Breiman, L., J. Friedman, C. J. Stone, R. A. Olshen, Classification and Regression Trees, Boca Raton, FL: CRC Press, 1998. Originally published in 1984. Butterworth, R. L., with M. E. Scranton, Managing Interstate Conflict, 1945-74, New York: Knopf, 1976. Butterworth, R. L., Managing Interstate Conflict, 1945-79, Final Report to ARPA, State College: Department of Political Science, Pennsylvania State University, February, 1980. Choucri, Nazli & Robert C. North, Nations in Conflict: National Growth and Industrial Violence, San Francisco: Freeman, 1975. Choucri, N., “Knowledge Networking for Global Sustainability: New Modes of Cyber Partnering,” in D. J. Richards, B. R. Allenby, &W. D. Compton, eds., Information Systems and the Environment, Washington: National Academy Press 2001: 195-210. Choucri, N., et al., eds., Mapping Sustainability: Knowledge e-Networking and the Value Chain, London: Springer, 2007. Choucri, N., Goldsmith, D., Madnick, S., Morrison B., Siegel, M. “Using System Dynamics to Model and Better Understand State Stability,” System Dynamics Conference, Cambridge, MA, 2007. 31 Clarke, E. H. “Multipart Pricing of Public Goods.” Public Choice, 11, 1971: 17-33. Camerer, C., Behavioral Game Theory: Experiments On Strategic Interaction, Princeton University Press, 2003. Davies, J. L., & C. K. McDaniel, “The Global Event-Data System!,” in (Meritt et al., 1993). Duncan, G. and R. Siverson, “Markov Chain Models for Conflict Analysis: Results from Sino-Indian Relations, 1959-1964,” International Studies Quarterly,19, 1975: 344-374. Farris, L., H. R. Alker, Jr., K. Carley, and F. L. Sherman, ``The Phase/Actor Disaggregated ButterworthScranton Codebook,'' Working Paper, Cambridge: Center for International Studies, M.I.T., 1980. Gerner, Deborah J., Philip A. Schrodt, Ronald A., Francisco, and Judith L. Weddle, “The Machine Coding of Events from Regional and International Sources,” International Studies Quarterly, 38, 1994:91-119. Goldsmith, Jack, & Tim Wu, Who Controls The Internet? Illusions of a Borderless World (2006) Gosler, James, “The Digital Dimension,” in Transforming U.S. Intelligence, J. E. Sims and B. Gerber, eds., Washington, DC: Georgetown University Press, 2005: 96-115. Groves, T., “Incentives in Teams.” Econometrica, 41, 1973: 617-631. Heal, G., & Kunreuther, H., “You only die once: Managing discrete interdependent risks,” Columbia Business School and Wharton Risk Management and Decision Processes Center, Working paper, 2003. Hollis, Duncan B., "New Tools, New Rules: International Law and Information Operations," in The Message of War: Information, Influence and Perception in Armed Conflict, eds., G. David and T. McKeldin, forthcoming 2008. Jason Barkham, “Information Warfare and International Law on the Use of Force," New York University International Law and Politics. 34, 2001: 57-113. Kakade, S., Kearns, M., Langford, J., & Ortiz, L., “Correlated Equilibria In Graphical Games,” in Proceedings of the ACM Conference on Electronic Commerce, 2003. Kakade, S. M., Kearns, M., & Ortiz, L. E., “Graphical economics,” Proceedings of the 17th Annual Conference on Learning Theory, Berlin: Springer, July 2004a: 17–32. Kakade, S. M., Kearns, M., Ortiz, L. E., Pemantle, R., & Suri, S., Economic properties of social networks, Neural Information Processing Systems (NIPS), 2004. Kleinberg, J., “Cascading Behavior in Networks: Algorithmic and Economic Issues,” in (Nisan, et al., 2007: 613–632). Kunreuther, H., & Heal, G., “Interdependent Security,” Journal of Risk and Uncertainty, Special Issue on Terrorist Risks, December, 2002. Nisan, N., T. Roughgarden, ́Eva Tardos, & V. V. Vazirani, eds., Algorithmic Game Theory, Cambridge University Press., 2007. 32 Mallery, J. C., Thinking About Foreign Policy: Finding an Appropriate Role for Artificially Intelligent Computers, Master's Thesis, Cambridge: Department of Political Science, M.I.T., February, 1988. Mallery, John C., “Semantic Content Analysis: A New Methodology for The RELATUS Natural Language Environment,” in Artificial Intelligence and International Politics, V. Hudson, ed., Boulder: Westview Press, 1991. Mallery, John C., “Beyond Correlation: Bringing Artificial Intelligence to Event Data,” International Interactions, 1994, 20 (1-2): 101-145. Mallery, J. C., and R. Hurwitz, ``Analogy and Precedent in Strategic Decision-Making: A Computational Approach,'' paper presented at The 1987 Meeting of the American Political Science Association, 1987. Mallery, J. C., and F. L. Sherman, ``Learning Historical Rules of Major Power Intervention in the Post-War International System,'' paper presented at The 1993 Meeting of the International Studies Association, Acapulco, Mexico March, 1993a. Mallery, J. C., and F. L. Sherman, ``Learning Rules of Phase Transition in the Presence of Conflict Managers: Identifying Historical Precedents in the Post-War International System,'' paper presented at The 1993 Meeting of the International Studies Association, Acapulco, Mexico March, 1993b. Marlatt, G., Information Warfare And Information Operations (IW/IO): A Bibliography, Monterey, CA: Dudley Knox LIbrary, Naval Postgraduate School, 2008. Merritt, R. L., R.G. Munchester & D. Zinnes, eds., International Event Data Developments: DDIR Phase II, Ann Arbor: University of Michigan Press, 1993. Nye, J. S., Soft Power: The Means to Success in World Politics, New York: Public Affairs, 2004. Nye, J. S., ”The Place of Soft Power in State-Based conflict Management,” in Chester A. Crocker, Fen Osler Hampson, and Pamela Aall, eds., Leashing the Dogs of War: Conflict Management in a Divided World, Washington: United States Institute of Peace Press, 2007a. Nye, J. S., “Culture, Soft Power, and ‘Americanization,” in David Held and Henrietta Moore, eds., Cultural Politics in a Global Age; Uncertainly, Solidarity and Innovation, London: Oneworld Publications 2007b: 168-175. Nye, J. S., "Notes for a Soft Power Research Agenda," in Felix Berenskoetter and M. J. Williams, eds., Power in World Politics (London, Routledge, 2007c) Osborne, M. J. and Rubinstein, A., Game Theory, Cambridge: MIT Press, 1997. Russell, S. J., & Norvig, P., Artificial Intelligence: A Modern Approach, Prentice-Hall, 1995. Schmitt, Michael, "Computer Network Attack and the Use of Force in International Law: Thoughts on a Normative Framework," Columbia Journal of Transnational Law, 37, 1999: 885-937. Schrodt!, Philip A., “Richardson’s Model as a Markov Process,” in Mathematical Models in International Relations, eds. D. Zinnes & J. Gillespie, Praeger, 1976. Schrodt!, Philip A., “The Statistical Characteristics of Event Data,” International Interactions, 20, (1-2), 1994: 35-53. 33 Schrodt!, Philip A., “Forecasting Conflict in the Balkans using Hidden Markov Models,” paper presented at The 2000 Meeting of the American Political Science Association, September, 2000. Schrodt!, Philip A., “Twenty Years of the Kansas Event Data System Project,” The Political Methodologist, 14 (1), 2006: 2-6. Schrodt, Philip A. and Deborah J. Gerner, “Validity assessment of a machine-coded event data set for the Middle East, 1982-1992.” American Journal of Political Science, 38, 1994: 825-854. Schrodt!, Philip A., “Pattern Recognition of International Crises Using Hidden Markov Models,” in Non-linear Models and Methods in Political Science, ed. D. Richards, Ann Arbor: University of Michigan Press, 1998. Sherman, F. L., Partway to Peace: The United Nations and The Road to Nowhere, State College: Doctoral Dissertation, Department of Political Science, Pennsylvania State University, 1987. Sherman, F. L., ``Four Major Traditions of Historical Events Research: A Brief Comparison,'' paper presented at the M.I.T./D.D.I.R Conference on ``New Directions for Storing, Indexing, Retrieving, Coding and Analyzing Information on International Events,'' Cambridge: Center for International Studies, M.I.T., November, 1987. Sherman, F. L., ``SHERFACS: A New Cross-Paradigm, International Conflict Dataset,'' paper presented at The 1988 Meeting of The International Studies Association, 1988. Unseld, S., & J.C. Mallery, “Interaction Detection in Complex Datamodels,” Cambridge: MIT Artificial Intelligence Laboratory, AI Memo, May 1992. Unseld, S., Exploration of International Relations Data: An Object-oriented Approach, IEEE Computer Society Press, 1997. Vickrey, W., “Counterspeculation, Auctions, and Competitive Sealed Tenders,” Journal of Finance, 16, 1961:8-37. Wickboldt, A., & N. Choucri, “Profiles of States as Fuzzy Sets: Methodological Refinement of Lateral Pressure Theory,” International Interactions, 12 (2), June 2006: 153-1881. Winston, P. H., ``Learning Structural Descriptions from Examples,'' In P. H. Winston, ed., The Psychology of Computer Vision, New York: McGraw-Hill, 1975: 157-210. Winston, P. H., ``Learning and Reasoning by Analogy,'' In Communications of the ACM, December, 23(1980). Winston, P. H., Artificial Intelligence, 3rd edition, Reading: Addison-Wesley, 1992. 34 5 5.1 Curriculum Vitae Ashton B. Carter A. Professional Preparation Dr. Ashton B. Carter received bachelor's degrees in physics and in medieval history from Yale University, summa cum laude, Phi Beta Kappa in 1976. In 1979, he received his doctorate in theoretical physics from Oxford University, where he was a Rhodes Scholar. B. Professional Appointments Dr. Carter is chair of the International and Global Affairs faculty at Harvard’s John F. Kennedy School of Government. He is also Co-Director (with former Secretary of Defense William J. Perry) of the Preventive Defense Project, a research collaboration of Harvard and Stanford Universities. C. Publications In addition to authoring numerous articles, scientific publications, government studies, and Congressional testimonies, Dr. Carter co-edited and co-authored eleven books, including Keeping the Edge: Managing Defense for the Future (2001), Preventive Defense: A New Security Strategy for America (1997), Cooperative Denuclearization: From Pledges to Deeds (1993), A New Concept of Cooperative Security (1992), Beyond Spinoff: Military and Commercial Technologies in a Changing World (1992), Soviet Nuclear Fission: Control of the Nuclear Arsenal in a Disintegrating Soviet Union (1991), Managing Nuclear Operations (1987), Ballistic Missile Defense (1984), and Directed Energy Missile Defense in Space (1984). D. Synergistic Activities Dr. Carter served as Assistant Secretary of Defense for International Security Policy during President Clinton’s first term (1993-1996). His Pentagon responsibilities encompassed: countering weapons of mass destruction worldwide, oversight of the U.S. nuclear arsenal and missile defense programs, policy regarding the collapse of the former Soviet Union (including its nuclear weapons and other weapons of mass destruction), control over sensitive U.S. exports, and chairmanship of NATO’s High Level Group. A longtime member of the Defense Science Board and the Defense Policy Board, the principal advisory bodies to the Secretary of Defense, Dr. Carter has also advised the U.S. government as a member of Secretary of State Condoleezza Rice’s International Security Advisory Board. Dr. Carter is co-chair of the Senate Foreign Relations Committee’s Policy Advisory Group, co-chair of the Review Panel on Future Directions for DTRA (Defense Threat Reduction Agency) Missions and Capabilities to Combat Weapons of Mass Destruction, a consultant to the Defense Science Board, a member of the National Missile Defense White Team, a member of the National Academy of Sciences Committee on International Security and Arms Control, and has most recently been named Chair of the Expert Working Group on National Security Strategy and Policies for the Congressional Commission on the Strategic Posture of the United States. In addition to his public service, Dr. Carter is currently a Senior Partner at Global Technology Partners and a member of the Board of Trustees of the MITRE Corporation, and the Advisory Boards of MIT’s Lincoln Laboratories and the Draper Laboratory. He is a consultant to Goldman, Sachs and Mitretek Systems on international affairs and technology 35 matters, and speaks frequently to business and policy audiences. Dr. Carter is also a member of the Aspen Strategy Group, the Council on Foreign Relations, the American Physical Society, the International Institute for Strategic Studies, and the National Committee on U.S.-China Relations. Dr. Carter was elected a Fellow of the American Academy of Arts and Sciences. E. Collaborators (i) Collaborators and coeditors: Dr. Carter has written several books and articles with former Secretary of Defense William J. Perry. He and Dr. Perry have also convened numerous workshops and meetings, and led a number of U.S. delegations overseas under the auspices of their joint research project, the Preventive Defense Project. 36 5.2 Nazli Choucri (Principal Investigator) A. Professional Preparation American University, Cairo, B.A., Social Sciences 1962 Stanford University, California, M.A., Political Science,1964 Stanford University, California, Ph.D., Political Science, 1967 B. Academic Appointments Current Academic Professor of Political Science, MIT 1978Associate Director, Technology and Development Program, 1976 Senior Faculty, Center for International Studies, MIT 1975Head, Middle East Program at MIT 1983Previous Academic Director, Energy and Development Research Program Associate Professor, MIT 1972-1978 Assistant Professor, MIT 1969-1972 Assistant Professor, Queen's University 1967-1969 Research Associate, Stanford University (summers) 1980-1984 1968-1970 Areas of Research Interests CyberPolitics in International relations and international political economy Global environmental change and dimensions of global security International energy issues Analytical and quantitative techniques Advances in distributed knowledge management C. Select Publications • Choucri, et. al. Eds. 2007. Mapping Sustainability: Knowledge e-Networking and the Value Chain. Springer: London. • N. Choucri, 2001 “Knowledge Networking for Global Sustainability: New Modes of Cyberpartnering” in D.J. Richards, B.R. Allenby, and W.D. Compton (eds) Information Systems and the Environment. Washington: National Academy Press, pp. 195-210. • Choucri, ed. 1993. Global Accord: Environmental Challenges and International Responses. Cambridge, Mass.: MIT Press. • Choucri 1981. International Energy Futures: Petroleum Prices, Power, and Payments. Cambridge, Mass.: MIT Press. • N. Choucri, R. C. North, and S. Yamakage. 1992. The Challenge of Japan Before World War II and After: A Study of National Growth and Expansion. London: Routledge. • • • • • Other Relevant Publications. (select) N. Choucri. 1991. "Analytical and Behavioral Perspectives: Causes of War and Strategies for Peace," In W. Scott Thompson et al., eds., Approaches to Peace: An Intellectual Map, Washington, D.C.: US Institute of Peace, 271-98. Choucri and R. C. North. 1993. "Population and (In)Security: National Perspectives and Global Imperatives," in David B. Dewitt, David Haglund, and John Kirton, eds., Emerging Trends I International Security, New York: Oxford University Press, 229-56. Choucri, “Environmentalism”, 2001 in J. Krieger ed. The Oxford Companion to Politics of the World. 2nd ed. Choucri. 2000. “Governance and International Management,” in Ted Munn, ed., 37 D. Synergistic Activities • • • • • • • Development of databases for analysis of international relations –by country – 1945-present Interdisciplinary graduate courses Technology and Policy – co-teaching across 4 departments Associate Director of MIT research program on technology and development – research in 5 countries GSSD Director , managing collaborative research on knowledge provision and sharing across disciplines, languages, and cultures (including Arabic, Chinese, French) ; Contribution to US Academy of Engineering study on Information Systems and the Environment 1997; publication in 2001. Patent: United States Patent States Patent #5752023, May 12, 1998 Networked Database System for Geographically Dispersed Global Sustainability Data. D.1 Outside Professional Activities (select) Member, Working Group 3, UN-ICT, Preparations for World Summit on Information Technology, 2001present; Panel Member for National Academy of Sciences Committee on Terrorism, 2001-2002; Panel Member for DARPA-National Academy of Sciences Committee on Understanding Terrorism in order to Deter Terrorism, 2001-2002; Member, Scientific Advisory Committee, SCOPE-ICSU, 1998-present; Member, Science Board, Santa Fe Institute 1995-1997; Special Advisor, to the Administrator of the United Nations Development, 1994-1996; Member, Advisory Board, Global Stewardship Initiative, Pew Charitable Trust,1993-1995; Advisor to the Secretary General of the United Nations Conference on Environment and Development, 1990-1992; Member, AAAS Committee on Population, Resources, and the Environment and Chair, Working Group on International Aspects, 1985-1990 Convener and Session Organizer, International Political Science Association Congress, 1983, 1985; Planning Committee, International Scientific Forum on Energy, 1983-1988; Advisory Committee, Office of Technology Assessment, U.S. Congress, 1982-1983; Board of Directors, Pathfinder Fund, 1981-1983 Council Member, American Political Science Association, 1981-1983; Panel for 1979 U.S. Conference of Science and Technology for Development, National Research Council, 1977- 1978 International Advisory Committee, World Population Society 1976-1977 International Social Science Documentation Committee 1976-1978 E. Collaborators & Other Affiliations (i) Research Collaborators (recent) Stuart Madnick, Michael Siegel, Daniel Goldsmith, Fred Moavenzadeh, (MIT), Brad Morrison (Brandies), Edward Anderson (U. of Texas) (ii) Graduate Thesis Supervision MIT - 42 students from – Political Science, Technology and Policy – Engineering Systems Division (ESD), Sloan School of Management (iii) Editor Positions Founding Editor, MIT Press Series on Global Environmental Accords Co-Editor, International Political Science Review (IPSR), 1994-2000 Editorial Advisory Committee (IPSR), 2000-2004 Board of Editors, Business & the Contemporary World, 1992-1994 Advisory Board, Global Environmental Politics 2002(iv) Recent Honors 38 1993- Elected to the European Academy of Sciences; 2003 Elected as Chair of the Scientific Advisory Committee of UNESCO’s MOST Program (Management of Social Transformation), 2004; Recipient of Dr. Jean Mayer Global Citizenship Award, 2005 (v) Professional Associations –Select: Council on Foreign Relations; American Political Science Association; American Association for the Advancement of Science; International Political Science Association Languages Fluent: English, French, Arabic. Limited: Spanish, Italian 39 5.3 David D. Clark A. Professional Preparation: Swarthmore College, Electrical Engineering, BS, 1966 MIT, Computer Science, MS and EE, 1969 MIT, Computer Science, PhD, 1973 B. Professional Appointments: Senior Research Scientist, M.I.T. Computer Science and Artificial Intelligence Laboratory, 1984-present (Formerly Lab for Computer Science) Principal Research Scientist, M.I.T. Lab for Computer Science, 1980-1984 Research Scientist, M.I.T. Lab for Computer Science, 1973-1980 C. Publications: Relevant publications include: • D. Clark, K. Sollins, J.T. Wroclawski, T. Faber.: Addressing Reality: An Architectural Response to Real-World Demands on the Internet”. Proceedings of ACM SigComm workshop on Future Directions in Network Architecture. Karlruhe, Germany, August, 2003 • Clark, D., R. Braden, et al. “FARA: Reorganizing the addressing architecture” Proceedings of ACM SigComm workshop on Future Directions in Network Architecture. Karlruhe, Germany, August,2003 • Marjory S. Blumenthal and David D. Clark, “Rethinking the design of the Internet: The end to end arguments vs. the brave new world”. ACM Transactions on Internet Technology. August 2001, Vol. 1, No. 1 Version appeared in Communications Policy in Transition: The Internet and Beyond, B. Compaine and S. Greenstein, eds. MIT Press, Sept. 2001. • Clark, D., J Wroclawski, K. Sollins, R. Braden. “Tussle in Cyberspace: Defining Tomorrow’s Internet”, Proceedings of the ACM SigComm 2002 Conference, Pittsburg, PA August, 2002, Computer Communications Review, vol. 32, num. 4. • Clark, D., C Partridge et al. “A knowledge plane for the Internet”. Proceedings of the 2003 ACm SigComm, Karlsruhe, Germany 2003 • Clark, D., "The Design Philosophy of the DARPA Internet Protocols", SIGCOMM Symposium, ACM, August 1988, pp. 106-114. • Clark, D., and Wilson, D., "A Comparison of Commercial and Military Computer Security Policies", Proceedings of the 1987 IEEE Symposium on Security and Privacy, IEEE, Oakland, CA, April 1987, pp. 184-194. • Saltzer, J., Reed, D., and Clark, D.D., "End-to-End Arguments in System Design", ACM Transactions on Computer Systems, Vol. 2, No. 4, November 1984, pp. 277- 288. D. Synergistic Activities: David Clark is a Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory. Since the mid 70s, Dr. Clark has been leading the development of the Internet; from 19811989 he acted as Chief Protocol Architect in this development, and chaired the Internet Activities Board. More recent activities include extensions to the Internet to support real-time traffic, pricing and related economic issues, and policy issues surrounding the Internet, such as broadband local loop deployment. His current research looks at re-definition of the architectural underpinnings of the Internet, and the relation of technology and architecture to economic, societal and policy considerations. Dr. Clark is past chairman of the Computer Science and Telecommunications Board of the National Academies, and has 40 contributed to a number of studies on the societal and policy impact of computer communications. He is co-director of the MIT Communications Futures Program, a project for industry collaboration and coordination along the communications value chain. He was co-PI of DARPA NewArch project, a cleanslate reconsideration of the Internet, 2000-2004. He is currently funded by NSF to support the NSF Future Internet Design program. E. Collaborators & Other Affiliations: i. Graduate and Postdoctoral Advisors: Tom Anderson, U Washington Paul Barford, U Wisconsin Steve Bellovin, Columbia Univarsity Robert Braden, USC ISI Dan Blumenthal, UCSB Marjory Blumenthal, Georgetown University Jon Crowcroft, Cambridge University Bruce Davie, Cisco Deborah Estrin, UCLA Ted Faber,USC ISI Aaron Falk, BBN Sally Floyd, Berkeley Greg Minshall Craig Partridge, BBN Adrian Perrig, CMU Larry Peterson, Princeton Venkata Pingali. USC K.K. Ramakrishnan, ATT Labs Chris Ramming, DARPA Dipankar Raychaudhuri, Rutgers Jennifer Rexford, Princeton U Timothy Roscoe, ETH Scott Shenker, UC Berkeley Marvin Sirbu, Carnegie Mellon University Dawn Song, CMU Sharon Gillett, BU/State of Massachusetts Mark Handley, UCL Van Jacobson, PARC Dina Katabi, MIT William Lehr, MIT Ion Stoica, Berkely Karen Sollins, MIT CSAIL John Wroclawski, USC ISI Lixia Zhang, UCLA ii. Graduate and Postdoctoral Advisors: Prof. Robert Graham (UMass Amherst, emeritus) Prof. Jerome Saltzer, PhD supervisor (MIT, emeritus) iii. Thesis Advisor and Postgraduate-Scholar Sponsor during past five years: Total PhD and MS supervised: 42 George Lee Michael Afergan (Akamai) Simson Garfinkel (Harvard) Xiaowei Yang (UC Irvine) Joanna Kulic (BBN) Dina Katabi (MIT) Donya Krairit (Asian Institute of Technology) Joseph Bailey (University of Maryland) Tim Shepard (Consultant) Rainer Gawlick (Lightship Telecom) Greg Troxel (BBN Research) Lixia Zhang (UCLA) Radia Perlman (Sun Microsystems) Pu Ng Stephen Kent (BBN Research) Allan Luniewski (IBM Research) 41 Anna Charny (Cisco Systems) Warren Montgomery (ATT Labs) 42 5.4 Jack Goldsmith A. Professional Preparation Goldsmith received his bachelorʼs degree summa cum laude from Washington & Lee University in 1984, a B.A. from Oxford University in 1986, and a J.D. from Yale law School in 1989. B. Professional Appointments Goldsmith is the Henry L. Shattuck Professor at Harvard Law School. He has also been on the law faculties at the University of Virginia and the University of Chicago. He also served as the Assistant Attorney General, Office of Legal Counsel, in the Department of Justice from 20032004, and as Special Counsel to the General Counsel in the Department of Defense from 20022003. C. Publications Goldsmith is the author of dozens of books and articles. His most recent publication is The Terror Presidency: Law and Judgment Inside the Bush Administration (2007). He is also the coauthor of Who Controls the Internet? Illusions of a Borderless World (2006) and The Limits of International Law (2005). In addition to Who Controls the Internet?, he has written many articles about internet regulation, including “Against Cyberanarchy,” 65 Chicago Law Review 1199 (1998) and “Unilateral Regulation of the Internet: A Modest Defense,” 11 European Journal of International Law 135 (2000). D. Other Activities Goldsmith is a member of the National Academy of Scienceʼs Computer Science and Telecommunications Board study of the Policy Consequences and Legal Ethical Implications of Offensive Information Warfare. 43 5.5 Roger Hurwitz A. Professional Preparation Hebrew University International Relations M.A. 1976 MIT (computational) Political Science Ph.D. 1991 B. Professional Appointments 2008-present: Research Affiliate, MIT Department of Political Science 2003-present: Research Affiliate, MIT Computer Science & Artificial Intelligence Laboratory 1993-2003: Research Scientist, MIT Artificial Intelligence Laboratory 1991-1993: Visiting Lecturer in Social Sciences, Hebrew University, Jerusalem 1983-1989: Research Associate, MIT Research Program on Communications Policy C. Publications Hurwitz has written on the development of information systems and their impact on government service, political discourse and growth of scientific knowledge. His publications in this area include: • Roger Hurwitz, Alexander Wawer & Stephen Butler. Classifying Drug Experiences in Networks of Users. Paper presented to the NATO Advanced Study Institute on Mining Massive Data Sets for Security, Villa Cagnola, Italy, September, 2007. • Roger Hurwitz, Boris Katz, Jimmy Lin & Ozlem Uzuner. Better pubic policy through natural language information access. in Proceedings of the 2003 annual national conference on digital government research. Boston, MA. • Roger Hurwitz & John Mallery. The Open Meeting: A Web-based system for conferencing and collaboration. World Wide Web Journal, 1996, 1(1). • Roger Hurwitz. The Ironies of Democracy in Cyberspace. in H. Jenkins & D. Thorburn, eds. Democracy and New Media. Cambridge, MA: MIT Press, 2003. D. Synergistic Activities Hurwitz was on the organizing committee for and presented at the NSF, INR, ONR Workshop on International Strategy and Policy for Cyber Security, June 12-13, MIT CSAIL, Cambridge (at which 36 current and former top USG officials, technologists and international relations experts discussed strategies to mitigate cyber threats). He was on the advisory committee for NSF sponsored workshops on E-rulemaking (2003) and a section editor of the report on the NSF workshop on Communication Technologies and Response to Disaster (2002). He organized workshops for the World Wide Web Consortium on Measuring Utilization of the Internet (1996) and online collaboration (1995). He was a governor of the MIT Communications Forum (1998-2002) and a director of the MIT Media in Transition Project (2000-2002), a multi-year study and forum devoted to the impact of new media technologies on culture and politics. He co-developed the White House Electronic Publications Service (1993-1998), an email and web based distribution and subscription system for executive branch media releases, and the Open Meeting System (1994), an internet based system for wide area collaboration and deliberation for proposed regulations and legislation. He currently advises the Information Storage Industry Center at the University of California at San Diego on measuring and projecting the annual global production of information. E. Collaborators & Other Affiliations i. Collaborators and Co-Editors 44 • • • • • • • • • • • Hayward Alker, USC (deceased) Yigal Arens, USC Stephen Butler, Inflexxion (Newton, MA) Lars-Eric Cederman, ETH (Zurich) Cary Coglianese, Harvard Michael Fischer, MIT David Lazar, Harvard John Mallery, MIT Stuart Shulman, U. of Pittsburgh Patrick Winston, MIT James Short, UCSD ii. Editorial Board: Journal of Information Technology and Politics 45 5.6 Stuart Elliot Madnick A. Professional Preparation B.S., Electrical Engineering, 1966, M.I.T. M.S., Alfred P. Sloan School of Management, 1969, M.I.T. M.S., Electrical Engineering, 1969, M.I.T. Ph.D., Computer Science, 1972, M.I.T. B. Professional Appointments 2000- present MIT School of Engineering, Professor of Engineering Systems 1990-95 MIT, Leaders for Manufacturing Professor of Management Science (term chair) 1989-present MIT School of Management, John Norris Maguire Professor of Information Technology (chair) 1988-89 MIT, Professor 1976-88 MIT, Associate Professor 1972-76 MIT, Assistant Professor 1978-86 Co-founder and Member of the Board, Advanced Information Systems & Services 1972-75 Co-founder, Member of the Board and technical director, MITROL, Inc. 1970-72 Principal Scientist, Honeywell Information Sciences Center 1968-70 Manager of Systems Development, International Computation, Inc. 1967-69 Associate Engineer, Lockheed Missiles and Space Company, Palo Alto Research Lab 1966-71 Systems Designer, IBM Cambridge Scientific Center. C. Publications Most Closely Related Publications (5) • • • • 2007 Firat, A., B. Grosof, S. Madnick, “Contextual Alignment of Ontologies in the eCoin Semantic Interoperability Framework”, Information Technology and Management Journal, Vol. 8, No. 1, Springer US, March 2007, pp. 47-63. 2006 Madnick, S., Zhu, H., “Improving Data Quality Through Effective Use of Data Semantics,” Data & Knowledge Engineering, Vol. 59, 2006, pp. 460-476. 2002 Madnick, S., M. Siegel. “Seizing the Opportunity: Exploiting Web Aggregation”, MISQ Executive, Vol 1, No. 1, March 2002, pp. 35-46. 2000 Bresson, S., C. Goh, N. Levina, S. Madnick, A. Shah, and M. Siegel, “Context Knowledge Representation and Reasoning in the Context Interchange System,” The International Journal of Artificial Intelligence, Volume 12, Number 2, September 2000, pp. 165-180. 1999 Goh, C., S. Bresson, S. Madnick, and M. Siegel , “Context Interchange: New Features and Formalisms for the Intelligent Integration of Information,” ACM Transactions on Information Systems, July 1999. Additional Recent / Relevant Publications (5) • • • 2008 Zhu, H. and S. Madnick, “One Size does not Fit All: Legal Protection for NonCopyrightable Data,” to appear in Communications of the ACM. 2004 Choucri, N., Madnick, S., Moulton, A., Siegel, M., and Zhu, H, “Information Integration for Counter Terrorism Activities: The Requirement for Context Mediation,” Proceedings of the 2004 IEEE Aerospace Conference, Big Sky, Montana, March 6-13, 2004 2002 Firat, A., S. Madnick, and Grosof, B., “Financial Information Integration In the Presence of Equational Ontological Conflicts,” Proceedings of the Workshop on Information Technology and Systems, Barcelona, Spain, December 14-15, 2002, pp. 211-216 46 • • 2001 Madnick, S., “The Misguided Silver Bullet: What XML will and will NOT do to help Information Integration,” Proceedings of the Third International Conference on Information Integration and Web-based Applications and Services (IIWAS2001; Linz, Austria), published by Osterreichische Computer Gesellschaft (ISBN 3-85403-157-2), September 2001, pp. 61-72. 1996 Lee, J., S. Madnick, and M. Siegel, “Conceptualizing Semantic Interoperability: A Perspective from the Knowledge Level”, International Journal of Cooperative Information Systems: [Special Issue on Formal Methods in Cooperative Information Systems], Vol. 5, No. 4, December 1996. D. Synergistic Activities • • • • Actively involved in Professional Societies and Journals (e.g., Board of Governors, IEEE Computer Society, 19791981; Chairman, IEEE Technical Committee on Database Engineering, 1980-82; VLDB Endowment, Vice President 1991-1997; Treasurer 1989-1991; Executive Committee, International Workshop on Information Technology & Systems, 1995-2006, founding Editor-in-Chief, ACM Journal on Data and Information Quality, 2006-present.) Authored or co-authored 5 books, including the classic textbook, Operating Systems, and over 300 papers (and working papers) that have been published in Communications of the ACM, ACM Transactions on Database Systems, Information Processing Letters, Journal of MIS, and other major journals and conference proceedings. Extensive teaching and course development activities (in areas such as, information technologies, strategic use of information technologies, operating systems, database systems) to Undergraduates, Graduates, Professionals, and Senior Executives. Served as Principal Investigator for various projects and programs, such as: Context Interchange (COIN), Total Data Quality Management (TDQM), PROductivity From Information Technology (PROFIT), Pro-Active INTelligence (PAINT), Knowledge-Based Integrated Information Systems Engineering (KBIISE), INFOPLEX, Family of Operating System (FOS). Sponsors have included NSF, DARPA, iARPA, US Navy, and industry companies. E. Collaborators & Other Affiliations i. Collaborators and coeditors: (48 months) D. Ballow (State University of New York at Albany), S. Bhalla (University of Aizu, Japan), S. Bressan (National University of Singapore), S. Bansali (MIT), N. Choucri (MIT), K. Chettayar (D & B), F. Dravis (FirstLogic Corp), T. Gannon (MITRE), D. Goldsmith (MIT), F. Haghseta (State of Massachusetts), A. Firat (Northeastern U), C. Fisher (Marist College), J. Funk (S.C. Johnson), B. Grosof (MIT), Y. Lee (Northeastern), F. Manola (independent consultant), N. Minami (US Army), D. Mistree (MIT), B. Morrison (Brandeis), A. Moulton (MIT), E. Pierce (University of Arkansas at Little Rock), M. Siegel (MIT), D. Strong (WPI), K-L Tan, National University of Singapore), S. Tu (Soochow University, Taiwan), C. Velu (Cambridge University), M. Van Alstyne (Boston University), R. Wang (MIT), L. Wu (MIT), X. Xian (Oracle), N.A. Yahaya (Malaysia University of Science and Technology), H. Zhu (Old Dominion University). ii. Graduate and Postdoctoral Advisors: John Donovan (most recently at Cambridge Technology Group), Robert Graham (Professor Emeritus, University of Mass), J.C.R. Licklider (deceased). iii. Thesis Advisor and Postgraduate-Scholar Sponsor during past five years: Thesis advisor: Juan Ignacio Aguirre, Wee Horng Ang, Faisel Anwar, Renato Teixeira Catalan, David SuKai Cheng, Lindsey Christian, Shin Wee Chuang, Patrick De Suza, Aykut Firat, Sajindra Kolitha Bandara Jayasena M. Bilal Kaleem, Philip Lee, Ahmad Shuja, Benjamin Spead, Philip Tan, Ee-leen Tan, Paulo Guilherme Vita, Xiang Xian. (Total number of thesis advisees: ~172 in total). 47 Current Undergraduate Advisor to: Tara Chang, Michelle Law, Brian Manley, Justin Moe, Lindsey Pete, Gil Zamfirescu-Pereira. 48 5.7 John C. Mallery A. Professional Preparation McGill University B.A, MIT SM 1988, MIT Ph.D. Candidate (ABD) F. Professional Appointments 2007-present: Research Scientist, MIT Computer Science & Artificial Intelligence Laboratory 2003-2007: Research Affiliate, MIT Computer Science & Artificial Intelligence Laboratory 1993-2003: Research Scientist, MIT Artificial Intelligence Laboratory 1981-1993: Affiliated with the MIT AI Lab as a graduate student or research assistant G. Publications Published over a dozen refereed articles treating natural language understanding, machine learning, wide-area collaboration, Internet technologies, and computational politics. Presented over fifty conference papers and academic talks in the additional areas of introspective software, online politics, e-government, survey research, international political economy. Co-authored several major technical white papers for senior elements of DoD and various MIT research proposals for DoD agencies. Numerous presentations to government, including EOP, OSD, Defense Science Board, NSA, NRO, State Department, Congress. Selected publications: • • • John C. Mallery, “Semantic Content Analysis: A New Methodology for The RELATUS Natural Language Environment,” in Artificial Intelligence and International Politics, V. Hudson, ed., Boulder: Westview Press, 1991. Roger Hurwitz & John C. Mallery, “The Open Meeting: A Web-Based System For Conferencing And Collaboration,” World Wide Web Journal, 1996, 1 (1). John C. Mallery, “Beyond Correlation: Bringing Artificial Intelligence to Event Data,” International Interactions, 1994, 20 (1-2): 101-145. H. Synergistic Activities With a research focus on computational politics, John Mallery has worked at MIT in the areas of natural language understanding and machine learning since 1980, and more recently biologically-grounded cognitive architectures. As a Research Scientist at the MIT AI Lab during the 1990s, he was the principal architect of the White House Electronic Publications System (1992-2000), which showcased numerous Internet firsts (inter alia, HTTP 1.1, fragment-aware URNs). Before this, he developed some early systems for online politics in 1992, including systems for multi-protocol hierarchical adaptive surveys (1992, 1994, 1996) and wide-area collaboration (1994 Vice President President’s Open Meeting on the National Performance Review). After a BA in Latin American Studies at McGill University, John interned at US State Department in LA/ECP and INR. Following his SM degree from MIT in Political Science, he reached ABD in an interdepartmental PhD between Political Science and EE & CS in International Relations and Machine Learning. Mallery’s interests span fields from social science -- including international relations, economics, organizational learning, and computational politics -- to cognitive science and philosophy and on to computer science, artificial intelligence, computational linguistics. Mallery has been working in the area of computer security and novel architectures for computing since the late 1990s and has coauthored a number of major white papers and smaller reports to various government agencies (NRO, NSA), including a serious of presentations to the Defense Science Board on 49 Security Tagged Architectures during the Summer 2006. Mallery currently works on topics in finegrained security with funding under the NSF Cybertrust Program. Mallery has been a chair or principal organizer of a series of workshops on cyber security: I. • Safe Computing Workshop Planning Meeting, August 21-22, 2006 MIT CSAIL, Cambridge (DTO/IARPA, MIT, NSA, NSF, Sandia, UPenn) • • NSF-DTO-NSA Safe Computing Workshop, November 29 – December 1, 2006 Sandia National Laboratory, Albuquerque, NM (80 top US IA experts from government, industry and academia looked at entire computing & networking stack) • NSF-DTO-NSA Itanium STA Workshop, March 26-27 2007, MIT CSAIL, Cambridge (25 specialists examined Itanium as platform for security tagged architectures and looked at programming language verification) • Information Assurance Leadership Workshop, June 13, 2007, Northrop Grumman Corporation, Reston, VA Workshop (20 USG IA leaders reviewed NCDI progress to date) • IARPA, NSF, NSA, OSD Workshop on Game-Changing Solutions for Cyber Security, November 6, 2007, IARPA, College Park, MD. (about 70 participants discussed and red teamed about 20 vignettes on game-changing solutions for cyber security selected from over 70 submissions.) • NSF, INR, ONR Workshop on International Strategy and Policy for Cyber Security, June 12-13, 2008, MIT CSAIL, Cambridge (36 current and former top USG officials came together with leading technologists and international relations experts to identify international strategies to mitigate cyber threats.) Collaborators & Other Affiliations iv. Collaborators and coeditors: Hayward R. Alker (Deceased), Andre DeHon (UPenn), Roger Hurwitz (MIT), Thomas Knight (MIT), Carl Landwehr (IARPA), Karl N. Levitt (NSF), Ron Rivest (MIT), Howard Shrobe (MIT), Karen Sollins (MIT), Patrick Winston (MIT) v. Graduate and Postdoctoral Advisors: Hayward R. Alker, Jr. (MIT), Lincoln Bloomfield (MIT), Marvin Minsky (MIT), Patrick H. Winston (MIT) vi. Thesis Advisor and Postgraduate-Scholar Sponsor during past five years: none vii. Languages: English, French, Spanish 5.8 Silvio Micali A. Professional Preparation Laurea (cum laude) in Mathematics, University of Rome, March 1978. Thesis title: Minimal Forms in Lambda- Calculus Computations. Ph.D. in Computer Science, University of California at Berkeley, December 1983. Thesis title: Randomness versus Hardness. Post-doctoral Fellow in Computer Science, University of Toronto, 1982-83. 50 B. Academic Appointments Dugald Jackson Professor, Computer Science and Artificial Intelligence Laboratory, M.I.T.,1991- present Tenured Associate Professor, M.I.T.,1988-91 Associate Professor, M.I.T.,1986-88 Assistant Professor, M.I.T.,1983-86 C. Publications Most Relevant to the Proposal • • Rational Secure Computation and Ideal Mechanism Design S. Izmalkov, M. Lepinski and S. Micali, Proc. . FOCS, Pittsburgh, PA, October 2005 • • Local Zero Knowledge S. Micali and R. Pass, Symposium on Theory of Computing 2006 • Collusion-Free Protocols M. Lepinski, S. Micali, and A. Shelat, Symposium on Theory of Computing 2004 • Completely Fair SFE and Coalition-Stable Cheap Talk M. Lepinski, S. Micali, C. Peikert, and A. Shelat, Proc. PODC 2004 • How To Play Any Mental Game Goldreich O., Micali S. and Wigderson A., Symposium on Theory of Computing 1987 Sample Other Significant Publications • Probabilistic Encryption, Goldwasser S. and Micali S., Journal of Computer and System Sciences, 28(2), pp 270-299 • Computationally Sound Proofs, Silvio Micali, SICOMP Vol. 30, Number 4, pp.1 1253-1298, 2000 • The All-Or-Nothing Nature of Secure Computation, Beimel A., T. Malkin and S. Micali, Proc. Crypto 99, Santa Barbara, CA, August 1999 • Proofs That Yield Nothing But their Validity, Or, All Languages in NP Have Zero-Knowledge Proofs, Goldreich O., Micali S. and Wigderson A., Journal of ACM, 38 n. 3, July 1991, pp. 691729 • Zero-Knowledge Sets Micali S., Rabin M., and Kilian J., Proc. FOCS 2000, New York, NY, October 2000 D. Synergistic Activities Micali is the founder of two companies (Corestreet, Ltd. and Peppercoin, Inc.), the holder of over forty patents, some of which have been licensed to US Government and major US corporations, and the Chairman and Chief Science Officer of Corestreet, Ltd., a provider of Real-Time Credentials. He restructured MIT’s graduate introduction to cryptography and developed MIT’s advanced course in cryptography and a Cryptographic Game Theory Course.. He also organized the MIT workshop on zero-knowledge and secure protocols. E. Collaborators & Other Affiliations 51 (i) Collaborations Recent Collaborators: Amos Beimel (Ben-Gurion), Mihir Bellare (UC San Diego), Sasha Boldyreva (UC San Diego), Christian Cachin (IBM), Ran Canetti (Tel Aviv), Yevgeniy Dodis (NYU), Marc Fischlin (Fraunhofer-Gesellschaft), Oded Godlreich (Weizmann), Shafi Goldwasser (MIT), John Herzog (MIT), Sergei Izmalkov (MIT), Markus Jakobsson (RSA), Joe Kilian (NEC), Eyal Kushilevitz (Technion), Tom Leighton (MIT), Matt Lepinski (BBN), Moses Liskov (William&Mary), Anna Lysyanskaya (Brown), Tal Malkin (Columbia), Kazuo Ohta (University of Electro-Communications, Japan), Rafail Ostrovsky (UCLA), Rafael Pass (Cornell), Michael Rabin (Harvard), Leo Reyzin (BU), Alon Rosen, H Sacham (Stanford), Abhi Shelat (U. of Virginia), Adam Smith (MIT), Markus Stadler (Crypto AG), Mike Szydlo (RSA), Salil Vadhan (Harvard) Thesis advisor: Manuel Blum (CMU) Graduate theses supervised (16) : Paul Valiant (MIT); Rafael Pass (Cornell University); Moses Liskov (William&Mary), Abhi Shelat (Univ. of Virginia), Chris Peikert (SRI), Matt Lepinski (BBN), Leo Reyzin (BU), Shai Halevi (IBM), Rosario Gennaro (IBM), Ray Sidney (Google), Rafail Ostrovsky (UCLA), Mihir Bellare (UC San Diego), Phil Rogaway (UC Davis), Bonnie Berger (MIT), Claude Crépeau (McGill), Paul Feldman (unknown) (ii) Main Awards • Gödel Prize (in Theoretical Computer Science) • RSA Prize (in Cryptography) • Member, National Academy of Science • Member, National Academy of Engineering • Member, American Academy of Arts & Sciences 52 5.9 Joseph S. Nye, Jr. A. Professional Preparation He received his bachelor’s degree summa cum laude from Princeton University in 1958. He did postgraduate work at Oxford University on a Rhodes Scholarship and earned a Ph.D. in political science from Harvard. B. Academic Appointments Joe Nye is University Distinguished Service Professor and former dean of Harvard’s Kennedy School of Government. He joined the Harvard Faculty in 1964, and taught one of the largest core curriculum courses in the college. In 2005, Foreign Policy listed him as one of the top ten scholars of international affairs. In addition to teaching at Harvard, Mr. Nye also has taught for brief periods in Geneva, Ottawa, and Oxford where he is a Visiting Professor and an honorary fellow. He has lived for extended periods in Europe, East Africa, Central America, and traveled to more than 100 countries. C. Publications He is the author of numerous books and more than one hundred and fifty articles in professional and policy journals. His most recent publications are Soft Power: The Means to Success in World Politics (2004), an anthology, Power in the Global Information Age (2004), a textbook Understanding International Conflict (6th ed 2006), and The Powers to Lead (2008). In addition, he has published policy articles in various newspapers and magazines, and his internationally syndicated column appears in papers in more than 70 countries. D. Synergistic Activities He has also worked in three government agencies. From 1977 to 1979, Nye served as Deputy to the Under Secretary of State for Security Assistance, Science and Technology and chaired the National Security Council Group on Nonproliferation of Nuclear Weapons. In recognition of his service, he received the highest Department of State commendation, the Distinguished Honor Award. In 1993 and 1994, he was chairman of the National Intelligence Council, which coordinates intelligence estimates for the President. He was awarded the Intelligence Community’s Distinguished Service Medal. In 1994 and 1995, he served as Assistant Secretary of Defense for International Security Affairs, where he also won the Distinguished Service Medal with an Oak Leaf Cluster. A Fellow of the American Academy of Arts and Sciences and of the Academy of Diplomacy, and of the British Academy, Nye is co-chair (with Brent Scowcroft) of the Aspen Strategy Group, chair of the North American Group of the Trilateral Commission, a director of the Council on Foreign Relations, and of the Center for Strategic and International Studies. He has served as a director of the Institute for East-West Security Studies, a director of the International Institute for Strategic Studies, a member of the advisory committee of the Institute of International Economics, and the American representative on the United Nations Advisory Committee on Disarmament Affairs. He has been a trustee of Wells College and of Radcliffe College. He is the recipient of the Woodrow Wilson Award from Princeton University, the Charles Merriam Award from the American Political Science Association, and the Palmes Academiques from the French government. 53 E. Collaborators & Other Affiliations i. Collaborators and coeditors: several books and articles with Robert O. Keohane. Various seminars and conferences including co-chairing NSF, INR, ONR Workshop on International Strategy and Policy for Cyber Security, June 12-13, 2008, MIT CSAIL, Cambridge (36 current and former top USG officials came together with leading technologists and international relations experts to identify international strategies to mitigate cyber threats. 54 5.10 Luis E. Ortiz A. Professional Preparation B.S. (with high distinction) in Computer Science, University of Minnesota, June 1995. M.S. in Computer Science, Brown University, May 1998. Ph.D. in Computer Science, Brown University, May 2002. Post-doctoral Researcher in Computer Science, University of Pennsylvania, 2002-2004. Post-doctoral Lecturer, MIT, 2004-2006 B. Academic Appointments Assistant Professor, Stony Brook University (SUNY), September 2008-present Assistant Professor, University of Puerto Rico at Mayagüez, January 2007-June 2008 C. Publications Most Relevant to the Proposal • Michael Kearns and Luis E. Ortiz. Algorithms for Interdependent Security Games, Neural Information Processing Systems (NIPS), 2003. http://www.cs.sunysb.edu/~leortiz/papers/ids.pdf • Sham M. Kakade, Michael Kearns, Luis E. Ortiz, Robin Pemantle and Siddharth Suri. Economic Properties of Social Networks. In Neural Information Processing Systems (NIPS), 2004. http://www.cs.sunysb.edu/~leortiz/papers/socialecon.pdf • Sham M. Kakade, Michael Kearns and Luis E. Ortiz. Graphical Economics, Seventeenth Annual Conference on Learning Theory (COLT), 2004. http://www.cs.sunysb.edu/~leortiz/papers/graphecon.pdf • Sham Kakade, Michael Kearns, John Langford and Luis Ortiz. Correlated Equilibria in Graphical Games, ACM Conference on Electronic Commerce (EC), 2003. http://www.cs.sunysb.edu/~leortiz/papers/cegg.pdf • Luis Perez-Breva, Luis E. Ortiz, Chen-Hsiang Yeang, and Tommi Jaakkola. Game-Theoretic Algorithms for Protein-DNA Binding. In Advances in Neural Information Processing Systems (NIPS) 19, 2007. http://www.cs.sunysb.edu/~leortiz/papers/Perez_etal_NIPS2006.pdf Sample of Other Significant Publications • Luis E. Ortiz and Michael Kearns. Nash Propagation for Loopy Graphical Games, Neural Information Processing Systems (NIPS), 2002. http://www.cs.sunysb.edu/~leortiz/papers/nashprop.pdf • Luis E. Ortiz. CPR for CSPs: A Probabilistic Relaxation of Constraint Propagation. In Neural Information Processing Systems (NIPS), 2007. http://www.cs.sunysb.edu/~leortiz/papers/nips2007.pdf • Luis E. Ortiz and Leslie Pack Kaelbling. Adaptive Importance Sampling for Estimation in Structured Domains, Proceeding of the Sixteenth Conference on Uncertainty in Artificial Intelligence (UAI), 2000. http://www.cs.sunysb.edu/~leortiz/papers/uai2000paper.pdf 55 • Luis E. Ortiz and Leslie Pack Kaelbling. Sampling Methods for Action Selection in Influence Diagrams, Proceedings of the Seventeenth National Conference on Artificial Intelligence (AAAI), 2000. http://www.cs.sunysb.edu/~leortiz/papers/aaai2000-paper.pdf • David McAllester and Luis Ortiz. Concentration Inequalities for the Missing Mass and for Histogram Rule Error, Journal of Artificial Intelligence Research (JAIR), Special Issue on Learning Theory, Volume 4, Pages 895-911, October, 2003. http://www.jmlr.org/papers/volume4/mcallester03a/mcallester03a.pdf D. Synergistic Activities While at the University of Pennsylvania, along with his colleague Michael Kearns (Penn), Ortiz helped to design and develop the Penn Exchange Simulator (PXS), a software simulator for automated stock trading that merges automated client orders with real-world, real-time order data as part of the Penn-Lehman Automated Trading Project (PLAT). PXS was widely used by the international research community to design, develop and test automated trading strategies. The simulator also runs in “historical mode” for which he helped to create and maintain a database of real-world limit orders that was used for research, development and testing offline. In addition, he also helped to run seminars for both graduate and undergraduate students on the use of the simulator, and to design, evaluate and analyze competitions to encourage participation in the project. (Please visit http://www.cis.upenn.edu/~mkearns/projects/plat.html for more info). Ortiz has also served on an NSF Review Panel (Robust Intelligence, IIS). E. Collaborators & Other Affiliations ii. Collaborators and coeditors: Tommi Jaakkola (MIT), Sham M. Kakade (Toyota Technological Institute at Chicago), Michael Kearns (Penn), Yishay Mansour (Tel Aviv), Robin Pemantle (Penn), Luis Perez-Breva (MIT), Robert E. Schapire (Princeton), Siddharth Suri (Yahoo! Research, New York), Chen-Hsiang Yeang (Institute for Advanced Study) iii. Graduate and Postdoctoral Advisors: Leslie Kaelbling (MIT), Michael Kearns (Penn) iv. Thesis Advisor and Postgraduate-Scholar Sponsor during past five years: none 56 5.11 Eric Rosenbach A. Professional Preparation Rosenbach completed a juris doctor at Georgetown University Law Center, a master's in public policy at the Harvard Kennedy School and bachelor of arts at Davidson College. As a Fulbright Scholar, Rosenbach conducted post-graduate research on privatization programs in Eastern Europe. B. Professional Appointments Rosenbach is the Executive Director for Research at the Belfer Center for Science and International Affairs. He is a member of the Belfer Center’s Board of Directors. C. Publications Rosenbach co-authored a book on counter-terrorism policy with Richard A. Clarke and other experts, entitled Defeating the Jihadists (2004). He co-edited a book on military leadership, In Search of Excellence (2008). His published work also has appeared in the Washington Post, Baltimore Sun, Chicago Tribune and International Herald Tribune. D. Synergistic Activities Prior to his work at the Belfer Center, Rosenbach was a professional staff member on the Senate Select Committee on Intelligence and served as the national security advisor for U.S. Senator Chuck Hagel. On the Intelligence Committee, Rosenbach provided oversight of the intelligence community’s counterterrorism efforts. Rosenbach led and authored two formal Senate Intelligence Committee investigations of prewar intelligence on Iraq, entitled Postwar Findings about Iraq’s Links to Terrorism and Prewar Intelligence about Postwar Iraq. In the private sector, Rosenbach previously worked as a vice president and chief security officer for the largest internet service provider in Europe. He was responsible for all aspects of cyber-security, privacy and network operations. Rosenbach served as an active-duty military intelligence officer supporting post-conflict operations in the Balkans. As a Company Commander, he was awarded the Meritorious Service Medal. The Director of Central Intelligence named his company as the top intelligence organization in the U.S. military for two consecutive years. E. Collaborators & Other Affiliations Various seminars and conferences including member organizing committee for the NSF, INR, ONR Workshop on International Strategy and Policy for Cyber Security, June 12-13, 2008, MIT CSAIL, Cambridge (36 current and former top USG officials came together with leading technologists and international relations experts to identify international strategies to mitigate cyber threats. 57 5.12 Patrick H. Winston A. Professional Preparation Professor Winston received the B.S. in 1965, the M.S. in 1967, and the Ph.D. in 1970, all from the Massachusetts Institute of Technology. B. Professional Appointments Patrick H. Winston is Ford Professor of Artificial Intelligence and Computer Science at the Massachusetts Institute of Technology. Professor Winston has been with MIT Artificial Intelligence Laboratory since 1967. He joined the faculty in 1970, and he was the Director of the Laboratory from 1972 to 1997. C. Publications Professor Winston's publications include major textbooks on Artificial Intelligence and several programming languages, an edited collection of papers about AI applications, and several edited collections of key MIT research papers. • • • • • • • • • • On to Smalltalk On to Java On to C++ On to C Artificial Intelligence, Third Edition Lisp, Third Edition (with Berthold K. P. Horn) The AI Business: Commercial Uses of Artificial Intelligence (editor, with Karen A. Prendergast) Artificial Intelligence at MIT: Expanding Frontiers (editor, with Sarah A. Shellard, two volumes) Artificial Intelligence: An MIT Perspective (editor, with Richard H. Brown, two volumes) The Psychology of Computer Vision (editor) D. Synergistic Activities Professor Winston is chairman and co-founder of Ascent Technology, Inc., a company that produces sophisticated scheduling, resource allocation, and schedule recovery applications, enabled by AI technology, and in use throughout the world in major airports and the Department of Defense. Professor Winston is a member of the Naval Research Advisory Committee (NRAC) (1985-1990, 19942000, 2003-present) for which he served as Chair from 1997 to 2000. During his service on NRAC, he has chaired several studies, including a study of how the Navy can best exploit the next generation of computer resources, a study of technology for reduced manning, and a study of software-intensive systems. Professor Winston is also a past president of the American Association for Artificial Intelligence. E. Collaborators & Other Affiliations (i) Collaborators and coeditors: None (ii) Graduate and Postdoctoral Advisors: Professor Marvin Minsky, MIT Media Laboratory (iii) Thesis Advisor (45) and Postgraduate-Scholar Sponsor (1) during past five years: 58 Jonathan Amsterdam, unknown; Peter Andreae, University of Wellington; Daniel Barkalow, unknown; John Bender, unknown; Robert Berwick, MIT; Richard Boberg, Network Appliance; Keith Bonawitz, MIT; Gary Borchardt, MIT; Eugene Chang, Funk Software; Steven Czerwinsky, unknown; Michael De la Maza, unknown; Richard Doyle, Jet Propulsion Laboratory; Scott Fahlman, CMU; Krzysztof Gajos, University of Washington; Philip Greenspun, retired; Marion Groh, Microsoft; Robert Hall, Hewlett-Packard; Glen Iba, MIT; Michal Kahan, unknown; Manolis Kellis, MIT; Paul Keel, MIT; Anthony Kim, unknown; Stephen Larson, UCSD; Richard Lathrop, University of California, Irvine; Jintae Lee, University of Colorado; Albert Lester, unknown; Tomas Lozano-Perez, MIT; Catherine Miller, unknown; Raymond Molnar, unknown; Barbara Moore, Millenium; Pegor Papazian, unknown; Eve Philips, Vector Capital; Satyajit Rao, University of Genova; Lukas Ruecker, Delta Research; Arian Shadadi, Oracle Corporation; Jimmy Shih, unknown; Matt Sither, unknown; David Spenser, unknown; Oana Stamatoiu, unknown Seth Tardif, unknown; David Waltz, NEC Research; John Williams, unknown; Robert Woodham, University of British Columbia; Deniz Yuret, Koc University, Istanbul; Zakia Zerhouni, Oracle Corporation. 59