Explorations in Cyber International Relations (ECIR) Patrick Henry Winston Explorations in Cyber International Relations OSD Minerva Research Project at.

Slides:



Advertisements
Similar presentations
V.J Day By Alex & kyle. Where, When and Who When- August 14 th 1945 Major Players- Japan and U.S Where- Hiroshima and Nagasaki, Japan.
Advertisements

Regions the United States has been Politically Involved with Since The Fall Of The Soviet Union Indicator 5-6.1: Use a map to identify the regions of the.
How to Make Yourself Smarter via the Story of Artificial Intelligence Patrick Henry Winston.
Modern Day Terrorism. Three Perspectives “This is not a battle between the United States of America and terrorism, but between the free and democratic.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
MIT-Harvard Conference Cyber International Relations (ECIR)
1 MIT-Harvard Conference Explorations in Cyber International Relations (ECIR) Closing Remarks – Next Steps Nazli Choucri Professor of Political Science.
1 Explorations in Cyber International Relations (ECIR) Dr. Michael Siegel Daniel Goldsmith Explorations in Cyber International Relations OSD Minerva Research.
TEACHING WITH PRIMARY SOURCES The Library of Congress and then some!
The Fight Against Terrorism
EQ: “Afghanistan: The conflict past and present”.
BELLWORK 1. How was Germany divided after WWII? 2. When was the Berlin Wall built? Who built it? 3. Why was the Berlin Wall built? 4. What was the Berlin.
World War II Test Review Answers. 1. Why were Japanese Americans Held in internment camps during WWII?
Middle East Fundamentalism.  1.What are the roots of modern Islamic Fundamentalism? 2.What was the United States’ response to global terrorism? 3.What.
U.S. Foreign Policy Since WWII. Ronald Reagan – “Mr. Gorbachev, tear down this wall!” –
Why Do People Migrate?. Migrate / Migrate means to move permanently  Usually this means moving to another state or country / Migrate means to move permanently.
National Anthem.  Although America is very diverse, it is united under a common political culture.  A political culture is a common set of beliefs and.
Chapter 39 Study Guide. 1. The Allies divided Germany into four occupation zones. When the United States, Britain, and France announced plans to unite.
Cyber Warfare Case Study: Estonia
Cyber Attacks Response of the Criminal Law Margus Kurm State Prosecutor Office of the Prosecutor General of Estonia.
What do you think are some of the possible themes of History??? Explain What do you think are some of the possible themes of History??? Explain Come up.
TEKS 8C: Calculate percent composition and empirical and molecular formulas. American Expansion in the Pacific.
Europe after 1989: Goodbye to Grand Narratives? Siobhan Kattago Winter School: Politics of Memory Tartu,
Chapter 25 Section 1 The Cold War Begins Section 3 The United States and East Asia Examine the causes and consequences of the Philippine insurrection.
Section Outline 1 of 12 American Foreign Policy Section 3: Foreign Policy in Action I.Foreign Policy Through World War II II.The Cold War III.Today’s Challenges.
New Immigrants Unit 6.6 and Extras.
Cultural Clashes EQ: Why do certain barriers produce conflict? When do they encourage cooperation?
By Eric Hartnett and Szilard Annus
Chapter 25 Section 1 The Cold War Begins Section 3 The United States and East Asia Examine the causes and consequences of the Philippine insurrection.
Standard SS6H7 The student will explain conflict and change in Europe to the 21 st century.
The US Goes to War in Afghanistan. Background 1992: Osama Bin Laden is banned from Saudi Arabia –Criticizes government for allowing U.S. forces onto Muslim.
Can North Korea Build More Nuclear Weapons?. A North Korean People’s Army naval unit tests a new type of anti-ship cruise missile in this undated photo.
World War II Begins Objective: Explain the events that led to the beginning of World War II.
Controversy Surrounding Dresden Bombing Mary Saunders, Bridget Taylor, Jennifer Sybrandt, Caroline Edwards.
Ayman Irziqat Katarzyna Kosarska Sergio Pradel 1.
OUTCOME: SWBAT RECALL THE CHARACTERISTICS OF STATES AND THEORIES OF GOVERNMENT EXAMINE THE PURPOSES OF AMERICAN GOVERNMENT KECSSMS. MURREN ECONOMICS 2/17/12.
The United States & World War II
Etics, Emics, Estonians and Russians in Contemporary Estonia: Is the Past still Dominating the Present? Aksel Kirch, Tarmo Tuisk, Hanna-Hulda Reinkort.
Terrorism!. Terrorism Introduction under-attack-cm-orig.cnn/video/playlists/paris- shootings/
Quebec’s Independence Movement Unit 8 Notes SS6H5a.
What is happening in this cartoon? What do you think the term ‘cold war’ means and how was it different to the two world wars? What can we infer about.
Today we will identify and describe the events of September 11 th, By discussing what happened that day and how it impacted our nation. To understand.
2011: Largest Countries….? Why and how did this happen?
Afghanistan Mr. McDuffie World Geography Spring 2008.
PENNSYLVANIA STANDARDS ALIGNED SYSTEM.  HISTORICAL CONTEXT IS NEEDED TO COMPREHEND TIME AND SPACE Why is time and space important to the study of history?
Religion & Human Rights. What I expect from everyone is……… What I expect from most is……… What I expect from a few is ………  To understand what is meant.
Terrorism!.
An area organized into an independent political unit is a
International Terrorism: Defined
Cyberwar Becomes a Reality
PresentationExpress.
World War II Begins.
Operation Enduring Freedom
Stockmann, D. , & Gallagher, M. E. (2011)
The Second World War Conflict that changed the World
Objectives Examine the causes and consequences of the Philippine insurrection. Analyze the effects of the Open Door Policy. Describe how the United States.
Objectives Examine the causes and consequences of the Philippine insurrection. Analyze the effects of the Open Door Policy. Describe how the United States.
The ability to link ideas or events based on a causal relationship.
How ordinary Canadians survived the cold war
An Introduction to Fahrenheit “The temperature at which
Early Cold War to 1952.
Objectives Examine the causes and consequences of the Philippine insurrection. Analyze the effects of the Open Door Policy. Describe how the United States.
The US Goes to War in Afghanistan
BELLWORK: 3/27 Explain the causes of détente.
Objectives Examine the causes and consequences of the Philippine insurrection. Analyze the effects of the Open Door Policy. Describe how the United States.
Jeopardy Key Events Tragedy Key People Home-front The end of it all
Agenda Review Terrorism Notes Video Iraq Debate.
Failure to Halt Aggression
History of the Middle East
Presentation transcript:

Explorations in Cyber International Relations (ECIR) Patrick Henry Winston Explorations in Cyber International Relations OSD Minerva Research Project at Harvard & MIT Taking Machine Intelligence to the Next Level Conference on Cyber International Relations: Emergent Realities of Conflict and Cooperation | October 14, 2010

Why are we different?

The Story Hypothesis Micro culture Experience Family Macro culture Religion School History Literature Fairy and folk tales Parables Narratives Precedents Propaganda Cases Science and engineering Law Business Medicine

Which two are the same?

Genesis story understanding system Parser Semantic analysis Commonsense analysis Reflective analysis Domain independent English Syntactic relations Semantic events Elaboration graph Thoughts about thoughts Question expert Situation onset expert Precedent retrieval expert Analogy expert

The Russia-Estonia Cyberwar Estonia and Russia are countries. Estonia believed computer networks are valuable. Estonia built many valuable computer networks. Estonia insulted Russia because Estonia moved a war memorial. Someone damaged the valuable computer networks of Estonia after Estonia harmed Russia. The damage of the computer networks included the defacement of the web sites. The defacement of the sites showed that someone did not respect Estonia. Estonia created a center to study computer security. Estonia believed other states would support the center. The end.

All knowledge in English Commonsense If xx insults yy, then xx harms yy. If xx damages yy's artifact, then xx harms yy. Reflective "Teaching a lesson" occurs when: xx's harming yy leads to yy's harming xx. xx's harming yy leads to xx's harming me.

Video omitted.

Exciting future! X anticipates Y’s reaction, avoids blunder X intervenes to prevent Y from acting X understands Y’s point of view X negotiates with Y X explains situation to Y in Y’s terms X teaches Y how to interpret situation X shapes Y’s reaction

Video omitted.

The Russia-Estonia Cyberwar With Katz’s START parser: Estonia and Russia are countries. Estonia believed computer networks are valuable. Estonia built many valuable computer networks. Estonia insulted Russia because Estonia moved a war memorial. Someone damaged the valuable computer networks of Estonia after Estonia harmed Russia. The damage of the computer networks included the defacement of the web sites. The defacement of the sites showed that someone did not respect Estonia. Estonia created a center to study computer security. Estonia believed other states would support the center. With Finlayson’s Story Workbench: In 2007, Estonia chose to relocate The Bronze Soldier of Talinn, a controversial statue, from the city center to a nearby cemetery. While a seemingly innocuous event, it ended up causing massive political backlash. At the heart of the matter was the controversy around the statue itself: to Russia and ethnic Russian immigrants, it symbolizes the victory of the Sovient Union over Germany in World War II, whereas to many Estonians, it symbolizes Soviet occupation and repression following the war. As such, when the plan to move the statue was announced, many russians were furious at Estonia, leading to the largest instance of state-sponsored cyber-warfare since Titan Rain. …

Revenge emerges from experience In 1998, Afghan terrorists bombed the U.S.'s embassy in Cairo, killing over 200 people and 12 Americans. Two weeks later, The U.S. retaliated for the bombing with cruise missile attacks on the terrorist's camps in Afghanistan, which were largely unsuccessful. The terrorists claimed that the bombing was a response to America torturing Egyptian terrorists several months earlier. In early 2010, Google's servers were attacked by Chinese hackers. As such, Google decided to withdraw from China, removing its censored search site and publically criticizing the Chinese policy of censorship. In response, a week later China banned all of Google's search sites.

Contributions Suggested the Story Hypothesis Argued for humanlike thinking at cyber speed Demonstrated the Genesis system With two persona With question answered With situation onset detected Illustrated scaling ability of Story Workbench