POPULARITY
In a rapidly evolving digital landscape, artificial intelligence (AI) has started revolutionizing every facet of our lives, including warfare. AI-driven robots and drones, equipped with machine-learning algorithms, navigate complex terrains, conduct surveillance, and execute missions with unparalleled precision. This ability to process vast amounts of data in real-time and make split-second decisions provides a critical advantage in the fast-paced environment of modern warfare, revolutionizing the scope of military engagements and offering new possibilities for tactical offensives and national security defense. As a result, AI-driven military spending is projected to reach $38.8 billion by 2028. However, integrating AI into warfare also raises important ethical and legal questions. How is the global geopolitical landscape being reshaped by nations investing heavily in AI-driven military technologies? How reliable and trustworthy are AI-driven decisions in high-stakes military scenarios? How might AI change the nature of future military engagements and warfare tactics? Today, we're joined by Dr. Heather Roff, Senior Research Scientist at the Center for Naval Analysis, Dr. Herbert Lin, Senior Research Scholar at the Center for International Security and Cooperation and Wendell Wallach, Co-director of the AI and Equality Initiative at the Carnegie Council for Ethics in International Affairs.Follow us at:Network2020.orgTwitter: @Network2020LinkedIn: Network 20/20Facebook: @network2020Instagram: @network_2020
On this episode we talk about the end of the world and all the elements that make up some of humanities' biggest threats. Sam and Ali talk to Herbert Lin, senior research scholar for cyber policy and security at the Center for International Security and Cooperation and Hank J. Holland Fellow in Cyber Policy and Security at the Hoover Institution, both at Stanford University. They discuss the Doomsday Clock, its origins, process and efficacy in warning humanity of some of its biggest threats. Podcast notes: Lin's letter to his students, here. More about the Doomsday Clock, here. The FFS Show is only possible thanks to your support. If you want to help us do more fact-checking work, become a member of The Ferret for just £5 per month.You can subscribe to The FFS Show on your favourite podcast platform.
Joining us this week is Herbert Lin, Senior Research Scholar at the Center for International Security and Cooperation and Hank J. Holland Fellow at Stanford University. He's author of the book, Cyber Threats and Nuclear Weapons, in which he outlines the challenges the U.S. faces in modernizing the control systems for our nuclear weapons arsenal, the dangers of connecting these systems to the internet, and the peril of feature-creep and increased complexity in the nuclear age.
Podcast: Recorded Future - Inside Security Intelligence (LS 46 · TOP 1% what is this?)Episode: 238 Shielding the Nuclear Arsenal From Cyber AttacksPub date: 2021-12-13Joining us this week is Herbert Lin, Senior Research Scholar at the Center for International Security and Cooperation and Hank J. Holland Fellow at Stanford University. He's author of the book, Cyber Threats and Nuclear Weapons, in which he outlines the challenges the U.S. faces in modernizing the control systems for our nuclear weapons arsenal, the dangers of connecting these systems to the internet, and the peril of feature-creep and increased complexity in the nuclear age.The podcast and artwork embedded on this page are from Recorded Future, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Recorded Future - Inside Threat Intelligence for Cyber Security
Joining us this week is Herbert Lin, Senior Research Scholar at the Center for International Security and Cooperation and Hank J. Holland Fellow at Stanford University. He's author of the book, Cyber Threats and Nuclear Weapons, in which he outlines the challenges the U.S. faces in modernizing the control systems for our nuclear weapons arsenal, the dangers of connecting these systems to the internet, and the peril of feature-creep and increased complexity in the nuclear age.
What does America's growing dependence on modern information technology systems mean for the management of its nuclear weapons? In his new book, Cyber Threats and Nuclear Weapons (Stanford University Press, 2021), Dr. Herb Lin explores the promise and peril of managing the bomb in the digital age. A Senior Research Scholar at the Center for International Security and Cooperation at Stanford University, Dr. Lin cautions that management of the future nuclear enterprise will require a series of difficult tradeoffs: between integrity and reliability, functionality and security, and usability and security. Moving beyond a historical focus on the command and control of nuclear forces, Lin argues that these compromises will affect each aspect of the US nuclear enterprise, from technology acquisition and maintenance to operations and employment. On the podcast, I talk to Dr. Lin about what historical near-misses can tell us about future nuclear threats, how digitization could magnify the risks of deception and misperception, and the applicability of Silicon Valley-style software development practices for the Pentagon. John Sakellariadis is a 2021-2022 Fulbright US Student Research Grantee. He holds a master's degree in public policy from the School of International and Public Affairs at Columbia and a bachelor's degree in History & Literature from Harvard University. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/new-books-network
What does America's growing dependence on modern information technology systems mean for the management of its nuclear weapons? In his new book, Cyber Threats and Nuclear Weapons (Stanford University Press, 2021), Dr. Herb Lin explores the promise and peril of managing the bomb in the digital age. A Senior Research Scholar at the Center for International Security and Cooperation at Stanford University, Dr. Lin cautions that management of the future nuclear enterprise will require a series of difficult tradeoffs: between integrity and reliability, functionality and security, and usability and security. Moving beyond a historical focus on the command and control of nuclear forces, Lin argues that these compromises will affect each aspect of the US nuclear enterprise, from technology acquisition and maintenance to operations and employment. On the podcast, I talk to Dr. Lin about what historical near-misses can tell us about future nuclear threats, how digitization could magnify the risks of deception and misperception, and the applicability of Silicon Valley-style software development practices for the Pentagon. John Sakellariadis is a 2021-2022 Fulbright US Student Research Grantee. He holds a master's degree in public policy from the School of International and Public Affairs at Columbia and a bachelor's degree in History & Literature from Harvard University. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/science-technology-and-society
What does America's growing dependence on modern information technology systems mean for the management of its nuclear weapons? In his new book, Cyber Threats and Nuclear Weapons (Stanford University Press, 2021), Dr. Herb Lin explores the promise and peril of managing the bomb in the digital age. A Senior Research Scholar at the Center for International Security and Cooperation at Stanford University, Dr. Lin cautions that management of the future nuclear enterprise will require a series of difficult tradeoffs: between integrity and reliability, functionality and security, and usability and security. Moving beyond a historical focus on the command and control of nuclear forces, Lin argues that these compromises will affect each aspect of the US nuclear enterprise, from technology acquisition and maintenance to operations and employment. On the podcast, I talk to Dr. Lin about what historical near-misses can tell us about future nuclear threats, how digitization could magnify the risks of deception and misperception, and the applicability of Silicon Valley-style software development practices for the Pentagon. John Sakellariadis is a 2021-2022 Fulbright US Student Research Grantee. He holds a master's degree in public policy from the School of International and Public Affairs at Columbia and a bachelor's degree in History & Literature from Harvard University. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/political-science
What does America's growing dependence on modern information technology systems mean for the management of its nuclear weapons? In his new book, Cyber Threats and Nuclear Weapons (Stanford University Press, 2021), Dr. Herb Lin explores the promise and peril of managing the bomb in the digital age. A Senior Research Scholar at the Center for International Security and Cooperation at Stanford University, Dr. Lin cautions that management of the future nuclear enterprise will require a series of difficult tradeoffs: between integrity and reliability, functionality and security, and usability and security. Moving beyond a historical focus on the command and control of nuclear forces, Lin argues that these compromises will affect each aspect of the US nuclear enterprise, from technology acquisition and maintenance to operations and employment. On the podcast, I talk to Dr. Lin about what historical near-misses can tell us about future nuclear threats, how digitization could magnify the risks of deception and misperception, and the applicability of Silicon Valley-style software development practices for the Pentagon. John Sakellariadis is a 2021-2022 Fulbright US Student Research Grantee. He holds a master's degree in public policy from the School of International and Public Affairs at Columbia and a bachelor's degree in History & Literature from Harvard University. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
What does America's growing dependence on modern information technology systems mean for the management of its nuclear weapons? In his new book, Cyber Threats and Nuclear Weapons (Stanford University Press, 2021), Dr. Herb Lin explores the promise and peril of managing the bomb in the digital age. A Senior Research Scholar at the Center for International Security and Cooperation at Stanford University, Dr. Lin cautions that management of the future nuclear enterprise will require a series of difficult tradeoffs: between integrity and reliability, functionality and security, and usability and security. Moving beyond a historical focus on the command and control of nuclear forces, Lin argues that these compromises will affect each aspect of the US nuclear enterprise, from technology acquisition and maintenance to operations and employment. On the podcast, I talk to Dr. Lin about what historical near-misses can tell us about future nuclear threats, how digitization could magnify the risks of deception and misperception, and the applicability of Silicon Valley-style software development practices for the Pentagon. John Sakellariadis is a 2021-2022 Fulbright US Student Research Grantee. He holds a master's degree in public policy from the School of International and Public Affairs at Columbia and a bachelor's degree in History & Literature from Harvard University. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/technology
What does America's growing dependence on modern information technology systems mean for the management of its nuclear weapons? In his new book, Cyber Threats and Nuclear Weapons (Stanford University Press, 2021), Dr. Herb Lin explores the promise and peril of managing the bomb in the digital age. A Senior Research Scholar at the Center for International Security and Cooperation at Stanford University, Dr. Lin cautions that management of the future nuclear enterprise will require a series of difficult tradeoffs: between integrity and reliability, functionality and security, and usability and security. Moving beyond a historical focus on the command and control of nuclear forces, Lin argues that these compromises will affect each aspect of the US nuclear enterprise, from technology acquisition and maintenance to operations and employment. On the podcast, I talk to Dr. Lin about what historical near-misses can tell us about future nuclear threats, how digitization could magnify the risks of deception and misperception, and the applicability of Silicon Valley-style software development practices for the Pentagon. John Sakellariadis is a 2021-2022 Fulbright US Student Research Grantee. He holds a master's degree in public policy from the School of International and Public Affairs at Columbia and a bachelor's degree in History & Literature from Harvard University. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/military-history
What does America's growing dependence on modern information technology systems mean for the management of its nuclear weapons? In his new book, Cyber Threats and Nuclear Weapons (Stanford University Press, 2021), Dr. Herb Lin explores the promise and peril of managing the bomb in the digital age. A Senior Research Scholar at the Center for International Security and Cooperation at Stanford University, Dr. Lin cautions that management of the future nuclear enterprise will require a series of difficult tradeoffs: between integrity and reliability, functionality and security, and usability and security. Moving beyond a historical focus on the command and control of nuclear forces, Lin argues that these compromises will affect each aspect of the US nuclear enterprise, from technology acquisition and maintenance to operations and employment. On the podcast, I talk to Dr. Lin about what historical near-misses can tell us about future nuclear threats, how digitization could magnify the risks of deception and misperception, and the applicability of Silicon Valley-style software development practices for the Pentagon. John Sakellariadis is a 2021-2022 Fulbright US Student Research Grantee. He holds a master's degree in public policy from the School of International and Public Affairs at Columbia and a bachelor's degree in History & Literature from Harvard University. Learn more about your ad choices. Visit megaphone.fm/adchoices Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/world-affairs
Thursday, November 18, 2021 Hoover Institution, Stanford University Join the Hoover Book Club for engaging discussions with leading authors on the hottest policy issues of the day. Hoover scholars explore the latest books that delve into some of the most vexing policy issues facing the United States and the world. Find out what makes these authors tick and how they think we should approach our most difficult challenges. In the second meeting, watch a discussion with Hoover Fellow Herbert Lin on his latest book, Cyber Threats and Nuclear Weapons, moderated by Bill Whalen on Thursday, November 18th at 10AM PT/1:00PM ET. Please join us at the Hoover DC office or watch our Livestream.
Interview by Jane Lo, Singapore Correspondent with Dr. Herbert Lin, Senior research scholar, Cyber Policy and Security, Center for International Security and Cooperation; Hank J. Holland Fellow, Cyber Policy and Security, Hoover Institution; and Elected Fellow, American Association for the Advancement of Science. In addition to his positions at Stanford University, Dr. Lin is Chief Scientist, Emeritus for the Computer Science and Telecommunications Board, National Research Council (NRC) of the National Academies, where he served from 1990 through 2014 as study director of major projects on public policy and information technology, and Adjunct Senior Research Scholar and Senior Fellow in Cybersecurity (not in residence) at the Saltzman Institute for War and Peace Studies in the School for International and Public Affairs at Columbia University; and a member of the Science and Security Board of the Bulletin of Atomic Scientists. He served on President Obama’s Commission on Enhancing National Cybersecurity. Prior to his NRC service, he was a professional staff member and staff scientist for the House Armed Services Committee (1986-1990), where his portfolio included defense policy and arms control issues. He received his doctorate in physics from MIT. Dr. Lin’s research interests relate broadly to policy-related dimensions of cybersecurity and cyberspace, and he is particularly interested in and knowledgeable about the use of offensive operations in cyberspace, especially as instruments of national policy. Avocationally, Dr. Lin is a long-time folk and swing dancer and a poor magician. Apart from his work on cyberspace and cybersecurity, he is published in cognitive science, science education, biophysics, and arms control and defense policy. He also consults on K-12 math and science education. In this podcast, Dr Lin discussed cyber influence and the modern phenomenon of misinformation, offering historical perspectives and insights into how technological tools are leveraged in today’s misinformation campaigns. He emphasised the key differences between cyber operations and cyber enabled information operations, where the former (e.g. ransomware) targets computer systems, the latter (misinformation) targets our hearts and minds. Giving examples observed in the U.S., he noted challenges with implementing effective mitigation measures against misinformation whilst preserving the free flow of ideas. He also addressed some commonly asked questions for deploying misinformation and information warfare as a psychological operation from a national security perspective. With non-stop advances in technology and no-shortage of opportunities to sow misinformation, Dr. Lin also shared his thoughts on the evolution of the threat landscape.
Dr. Herbert Lin, senior research scholar for cyber policy and security at the Center for International Security and Cooperation, joins Press the Button for a discussion on cyberattacks and their potential effects on nuclear weapons in the wake of the SolarWinds hack that targeted at least 18,000 government and private networks. Early Warning features Derek Johnson of Global Zero and Patrick Hiller of the Jubitz Family Foundation analyzing last week's attack on the US Capitol and how the nuclear chain of command really works. National Suicide Prevention Hotline https://suicidepreventionlifeline.org/ Depression & Bipolar Support Alliance https://www.dbsalliance.org/crisis/suicide-hotline-helpline-information/ Tom Collina's recent op-ed with 19th US Secretary of Defense William J. Perry: https://www.politico.com/news/magazine/2021/01/08/trump-still-has-his-finger-on-the-nuclear-button-this-must-change-456667
A discussion about a new volume from the Brookings Institution Press on the increasing role of offensive cyber operations in U.S. national security. Herbert Lin and Amy Zegart are co-editors of “.” Lin and Zegart are scholars at the Hoover Institution and co-directors of the Stanford Cyber Policy Program. Bill Finan, director of the Brookings Press, conducts the interview. Also, Brookings Senior Fellow Molly Reynolds examines congressional oversight of the Trump administration, from subpoenas to impeachment Subscribe to Brookings podcasts or on , send feedback email to , and follow us and tweet us at on Twitter. The Brookings Cafeteria is part of the .
In this conversation, David and Dr. Herbert Lin discuss the attribution problem as it relates to cybersecurity, the cost of being secure in cyberspace, and the internet of things (IoT).
As the President of Estonia, Toomas Hendrik Ilves witnessed firsthand a devastating cyberattack — a series of 2007 attacks that comprise one of the largest instances of state-sponsored cyberwarfare in the modern era. Now a distinguished visiting fellow at the Hoover Institution, he talks here with Herbert Lin, a senior research scholar for cyber policy and security at the Center for International Security and Cooperation. They discuss how ubiquitous information technology has become in our everyday lives and what that means for our security. They answer questions about the tradeoff between privacy and safety and ultimately urge for a change in mindset with our approach to cyber issues.
As the President of Estonia, Toomas Hendrik Ilves witnessed firsthand a devastating cyberattack — a series of 2007 attacks that comprise one of the largest instances of state-sponsored cyberwarfare in the modern era. Now a distinguished visiting fellow at the Hoover Institution, he talks here with Herbert Lin, a senior research scholar for cyber policy and security at the Center for International Security and Cooperation. They discuss how ubiquitous information technology has become in our everyday lives and what that means for our security. They answer questions about the tradeoff between privacy and safety and ultimately urge for a change in mindset with our approach to cyber issues.
Monday, December 5th, 2016 - On this 14th episode of the Propaganda Report, we again cross over with WSB's Monica Perez show to discuss flag burning, fake news, and the first amendment with callers. Check out our new website, https://propagandareportdaily.com/ If you haven’t yet, be sure to Subscribe To…. Click Here To Subscribe To The Propaganda Report On iTunes Click Here To Subscribe To The Propaganda Report On Google Play Music Click Here To Subscribe To Monica’s Blog Click Here To Subscribe To Brad’s Youtube Page SHOW NOTES Hampshire College Draws Protests Over Removal of U.S. Flaghttp://www.nytimes.com/2016/11/28/us/hampshire-college-flag-veterans-protest.html?_r=1 “If it was a political act, it was pretty craven and ineffective since people did it in secret and no one knows what it was meant to state,” Hampshire college’s president, Jonathan Lash, 71, said in a phone interview on Monday. “And we replaced the flag the next day.” But within a week Mr. Lash had sent an email announcing that the flag was to be taken down altogether. “Some on campus perceived the flag as “a powerful symbol of fear they’ve felt all their lives because they grew up in marginalized communities, never feeling safe….So something that I have been learning about over the six years but I saw with incredible intensity after the election was the genuineness and depth of the fear of people who have grown up with racism,” Lash, said in a statement. “Who look at the deaths on city streets and say, that could easily have been me.” FBI and NSA poised to gain new surveillance powers under trumphttps://www.bloomberg.com/news/articles/2016-11-29/fbi-and-nsa-poised-to-gain-new-surveillance-powers-under-trump “Trump’s first two choices to head law enforcement and intelligence agencies — Republican Senator Jeff Sessions for attorney general and Republican Representative Mike Pompeo for director of the Central Intelligence Agency — are leading advocates for domestic government spying at levels not seen since the aftermath of the Sept. 11, 2001, terrorist attacks.” In a reversal of curbs imposed after Edward Snowden’s revelations in 2013 about mass data-gathering by the NSA, Trump and Congress may move to reinstate the collection of bulk telephone records, renew powers to collect the content of e-mails and other internet activity, ease restrictions on hacking into computers and let the FBI keep preliminary investigations open longer. A first challenge for privacy advocates comes this week: A new rule is set to go into effect on Dec. 1 letting the FBI get permission from a judge in a single jurisdiction to hack into multiple computers whose locations aren’t known. [wouldn’t put it past them to do it in every jurisdiction with no expiry] “Under the proposed rules, the government would now be able to obtain a single warrant to access and search thousands or millions of computers at once; and the vast majority of the affected computers would belong to the victims, not the perpetrators, of a cybercrime,” Senator Ron Wyden, an Oregon Democrat who serves on the Intelligence Committee, said in a statement. Wyden is one of seven senators, including libertarian Republican Rand Paul, who have introduced a bill, S. 3475, to delay the new policy until July to give Congress time to debate its merits and consider amendments. https://www.rt.com/usa/368759-fbi-gets-expanded-hacking-powers/ http://www.reuters.com/article/us-usa-cyber-warrants-idUSKCN0Y32YC From Trump’s picks for CIA (Pompeo) and Attorney General (Sessions): Time for a Rigorous National Debate About SurveillancePost-9/11 measures have been weakened or discarded. A coherent new approach is needed.http://www.wsj.com/articles/time-for-a-rigorous-national-debate-about-surveillance-1451856106 The use of strong encryption in personal communications may itself be a red flag…. Reasonable warrantless searches are compatible with the Fourth Amendment. So are searches of data shared with third parties, such as social-media posts… Surveillance should feature prominently in the 2016 presidential campaign, giving the next commander in chief a mandate and sense of obligation to implement reforms. Opposition to surveillance has been bipartisan, and the strategy for overcoming it must be bipartisan too….. Congress should pass a law re-establishing collection of all metadata, and combining it with publicly available financial and lifestyle information into a comprehensive, searchable database. Legal and bureaucratic impediments to surveillance should be removed…. Sessions: “The civil libertarians among us would rather defend the constitution than protect our nation’s security.” Problem with Sessions’ theory is that the Constitution is what would protect national security—undeclared wars, MIC–create danger both incidentally and purposely. See George Washington’s farewell address for more. Panel urges better cybersecurity to President-elect Trumphttp://www.wsbradio.com/ap/ap/top-news/panel-urges-better-cybersecurity-to-president-elec/ntHpn/ The release of the 100-page report follows the worst hacking of U.S. government systems in history and accusations by the Obama administration that Russia meddled in the U.S. presidential election by hacking Democrats. The commission recommended that Trump create an assistant to the president for cybersecurity, who would report through the national security adviser, and establish an ambassador for cybersecurity, who would lead efforts to create international rules. It urged steps, such as getting rid of traditional passwords, to end the threat of identity theft by 2021 and said Trump’s administration should train 100,000 new cybersecurity workers by 2020. Steven Chabinsky, a commission member and the global chair of the data, privacy and cybersecurity practice for White & Case LLP…said the group wanted the burden of cybersecurity “moved away from every computer user and handled at higher levels,” including internet providers and product developers who could ensure security by default and design “for everyone’s benefit.” One commissioner, Herbert Lin of Stanford University, said some senior information technology managers distrust the federal government as much as they distrust China, widely regarded as actively hacking in the U.S. It was not immediately clear whether Trump would accept the group’s recommendations. Trump won the election on promises to reduce government regulations, although decades of relying on market pressure or asking businesses to voluntarily make their products and services safer have been largely ineffective. Though Trump is a prolific user of online social media services, especially Twitter, he is rarely seen using a computer. His campaign manager, Kellyanne Conway, tweeted a photograph Monday of Trump working on an Apple laptop inside his office at Trump Tower. He testified in a deposition in 2012 that he did not own a personal computer or smartphone, and in another deposition earlier this year said he deliberately does not use email. But note… CISA passed 12/15 http://www.dataprotectionreport.com/2016/01/federal-cybersecurity-information-sharing-act-signed-into-law/ private sector would work if no back door unregulated, competitive environment would lead to airtight security McAfee solved viruses problem privately highly publicized massive hacks have been leading to this The Orwellian War Against Skepticismhttps://consortiumnews.com/2016/12/01/the-orwellian-war-against-skepticism/ “Yet, what Stengel and various mainstream media outlets appear to be arguing for is the creation of a “Ministry of Truth” managed by mainstream U.S. media outlets and enforced by Google, Facebook and other technology platforms.” “As veteran war correspondent Don North reported in 2015 regarding this new StratCom, “the U.S. government has come to view the control and manipulation of information as a ‘soft power’ weapon, merging psychological operations, propaganda and public affairs under the catch phrase ‘strategic communications.’” “Typical of this new McCarthyism, the report lacked evidence that any such network actually exists but instead targeted cases where American journalists expressed skepticism about claims from Western officialdom.”
Today’s battlefields are not clearly defined. On the ground, we see drawn out campaigns and militants living and fighting among civilians. Warfare has become more autonomous, with the use of unmanned drones. It has also moved into the digital realm. In recent years, concerns about cyberattacks have grown and hackers have joined terrorists on the list of global threats. But this situation is not new – we have been fighting cyberwars for decades. From the Gulf War to conflicts in Serbia and Iraq, warfare has entered a digital battlefield.What does war look like in the digital age? How has the United States integrated cyberwar into its national security strategy? What do we know about other countries' cyber programs and the potential risks they pose? Pulitzer Prize-winning journalist Fred Kaplan will examine the history of cyberwar and consider its implications for future conflicts.Kaplan is the author, most recently, of "Dark Territory: The Secret History of Cyber War" (Simon & Schuster, March 2016).Speaker Fred Kaplan is the National Security Columnist for Slate.Herbert Lin is the Senior Research Scholar for Cyber Policy and Security, Center for International Security and Cooperation, Stanford University.For more information about this event please visit: http://www.worldaffairs.org/media-library/event/1572
If you experience any technical difficulties with this video or would like to make an accessibility-related request, please send a message to digicomm@uchicago.edu. "God: Theological Accounts and Ethical Possibilities." A conference at the University of Chicago Divinity School. Session 9: Herbert Lin, Moderator/Respondent; Pamela Sue Anderson, Oxford University "Ethical Reflection and the Concept of "God:" On Sense-Making" Questions about the relationship between God and the good and the right remain as urgent today as they did in ancient times. For example, what is the relationship between claims about the nature or character of God and the moral actions motivated by those claims? What is the relationship between moral codes underwritten by claims about God and the ethics espoused by the (ideally agnostic) civic sphere? Are beliefs about God open to moral critique by others who espouse different beliefs or no beliefs at all? Today answers to these questions must take into account factors such as cultural and religious pluralism, hybrid theologies that incorporate teachings and beliefs from a variety of religious traditions, and religiously motivated violence around the world. This conference invites philosophers, theologians and religious ethicists to offer accounts of God relevant to the current state of affairs in the West while taking seriously the possibility of a relationship between God and ethics. This conference was supported by grants from the University of Chicago Divinity School, the Martin Marty Center for the Advanced Study of Religion, the University of Chicago Franke Institute for the Humanities, the Norman Wait Harris Fund of the University of Chicago Center for International Studies, and the Aronberg Fund of the University of Chicago Center for Jewish Studies. Recorded in Swift Hall on April 9-11, 2014.
If you experience any technical difficulties with this video or would like to make an accessibility-related request, please send a message to digicomm@uchicago.edu. "God: Theological Accounts and Ethical Possibilities." A conference at the University of Chicago Divinity School. Session 9: Herbert Lin, Moderator/Respondent; Pamela Sue Anderson, Oxford University "Ethical Reflection and the Concept of "God:" On Sense-Making" Questions about the relationship between God and the good and the right remain as urgent today as they did in ancient times. For example, what is the relationship between claims about the nature or character of God and the moral actions motivated by those claims? What is the relationship between moral codes underwritten by claims about God and the ethics espoused by the (ideally agnostic) civic sphere? Are beliefs about God open to moral critique by others who espouse different beliefs or no beliefs at all? Today answers to these questions must take into account factors such as cultural and religious pluralism, hybrid theologies that incorporate teachings and beliefs from a variety of religious traditions, and religiously motivated violence around the world. This conference invites philosophers, theologians and religious ethicists to offer accounts of God relevant to the current state of affairs in the West while taking seriously the possibility of a relationship between God and ethics. This conference was supported by grants from the University of Chicago Divinity School, the Martin Marty Center for the Advanced Study of Religion, the University of Chicago Franke Institute for the Humanities, the Norman Wait Harris Fund of the University of Chicago Center for International Studies, and the Aronberg Fund of the University of Chicago Center for Jewish Studies. Recorded in Swift Hall on April 9-11, 2014.
Herbert Lin is chief scientist for the National Research Council’s Computer Science and Telecommunications Board, where he directs major study projects at the intersection of public policy and information technology. In this lecture he talks about cyberattack and the technical and ethical implications of using it as an instrument of U.S. policy. Lin’s appearance at the School of Engineering was followed by a panel discussion moderated by Stephanie Forrest, chair, UNM Department of Computer Science. In addition to Lin, panelists are: Andrew Ross, director, UNM Center for Science, Technology and Policy and professor, UNM Department of Political Science Daniel Dennett, Austin B. Fletcher professor of philosophy, Tufts University and Miller scholar, Santa Fe Institute David Ackley, associate professor, UNM Department of Computer Science and external professor, Santa Fe Institute Robert Hutchison, senior manager for computer science and information operations, Sandia National Laboratories
Dr. Herbert Lin is chief scientist at the Computer Science and Telecommunications Board, National Research Council of the National Academies. An expert on cyber security, Herb discusses various aspects of cyber attacks, including ways in which cyber weapons can be used for covert action. To view his co-edited report on this subject, visit: http://www.anagram.com/berson/nrcoiw.pdf