Essays

Essays Icon

Filter By:

Topic

Author

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Blank Section (Placeholder)

China, Encryption Policy, and International Influence

by Adam Segalvia Aegis Paper Series
Monday, November 28, 2016

It is difficult to disentangle the influence of U.S. encryption policy on the development of Chinese regulations and laws. Independent of what happens in Washington, Beijing has a long history of using encryption policy to foster national and domestic security as well as to promote economic growth and indigenous innovation. 

Blank Section (Placeholder)FeaturedBlank Section (Placeholder)

Independents: The Marginal Members Of An Electoral Coalition

by Morris P. Fiorinavia Essays on Contemporary American Politics
Wednesday, October 12, 2016

Currently, the party balance in the United States is nearly even, roughly one-third Democratic, one-third Republican, and one-third independent, taking turnout into account.

Blank Section (Placeholder)Analysis and Commentary

The International Legal Dynamics Of Encryption

by Ashley Deeksvia Aegis Paper Series
Tuesday, October 11, 2016

To date there has been little international coordinated action to address encryption, though interest is growing. This paper looks at encryption through five different international lenses: human rights, law enforcement, intelligence, economics, and export controls. 

Blank Section (Placeholder)Analysis and Commentary

Decryption Mandates And Global Internet Freedom

by Adam I. Kleinvia Aegis Paper Series
Monday, September 26, 2016

The potential international effects of a domestic decryption mandate have been a significant factor in the debate over U.S. encryption policy.  Some fear that a U.S. decryption mandate would empower authoritarian regimes and would clash with the United States’ international Internet-freedom agenda.

US Political Parties
Blank Section (Placeholder)Blank Section (Placeholder)Featured

The Political Parties Have Sorted

by Morris P. Fiorinavia Essays on Contemporary American Politics
Wednesday, September 21, 2016

Although the American public at large has not polarized, it is better sorted than a generation ago. Whereas the parties were once “big tents,” they are now ideologically more homogeneous: liberal Republicans and conservative Democrats have largely disappeared.

Blank Section (Placeholder)

Attribution of Malicious Cyber Incidents: From Soup to Nuts

by Herbert Linvia Aegis Paper Series
Monday, September 19, 2016

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity.

Blank Section (Placeholder)Blank Section (Placeholder)

An Era Of Tenuous Majorities: Historical Context

by Morris P. Fiorinavia Essays on Contemporary American Politics
Wednesday, September 7, 2016

The United States is currently experiencing an almost unprecedented period of electoral instability. This essay describes this important feature of contemporary politics and sets the stage for later essays that describe and attempt to explain current developments and trace their consequences for American government.

Blank Section (Placeholder)Featured

Security Strategies: Experiences Of The Mexican States Of Chihuahua And Nuevo León

via Hoover Institution
Wednesday, August 24, 2016

Mexico has struggled to consolidate a solid rule of law. The northern Mexican states of Chihuahua and Nuevo León are notable, however, for having successfully reduced the levels of violence that spiked there in 2010–11.

Blank Section (Placeholder)

Go Big, Go Global: Subject the NSA ’s Overseas Programs to Judicial Review

by Timothy Edgarvia Aegis Paper Series
Thursday, June 30, 2016

Congress should use the debate over section 702 of the Foreign Intelligence Surveillance Act to think big.  Section 702 brings some NSA programs directed at foreign targets under judicial review, showing such review is feasible even for complex programs of transnational surveillance.

Blank Section (Placeholder)

Hacking Back Without Cracking Up

by Jeremy Rabkin, Ariel Rabkinvia Aegis Paper Series
Tuesday, June 28, 2016

Malicious hackers, often under the protection of hostile foreign states, have engaged in massive data theft from U.S. business firms and private institutions.  Intelligence agencies predict the problem will get worse. 

Pages