Cybersecurity

Defense

Filter By:

Type

Fellow

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Blank Section (Placeholder)Analysis and Commentary

The ‘China, Inc.+’ Challenge To Cyberspace Norms

by Robert D. Williamsvia Aegis Paper Series
Wednesday, February 21, 2018

This paper explores two aspects of China’s governance model that pose distinctive challenges to the construction of international cyberspace norms: the embedded and intertwined nature of the Communist Party-state in China’s economy and the expansive conception of national security reflected in Chinese laws and policies. Viewed in conjunction with Chinese cyberspace strategy and activity, these characteristics of “China, Inc. +” raise vexing questions with considerable implications for US-China relations.

In the News

McFaul: McMaster's Talk of Knowing About Russian Meddling 'Not Enough'

featuring Michael McFaulvia NewsMax
Monday, February 19, 2018

It is not enough for the United States to say it knows Russia meddled in the 2016 presidential election; it must do something about it, former Ambassador Michael McFaul said Monday, after hearing national security adviser H.R. McMaster's speech in person in Munich over the weekend.

In the News

Indicting Hackers Made China Behave, But Russia Will Be Harder

quoting Jack Goldsmithvia Lawfare
Sunday, February 18, 2018

On Friday, Special Counsel Robert Mueller released the indictment of the "Internet Research Agency LLC," also known as the Russian troll factory, and a number of other entities and individuals. The indictment states that the Internet Research Agency and the other named defendants "knowingly and intentionally conspired with each other (and with persons known and unknown to the Grand Jury) to defraud the United States by impairing, obstructing, and defeating the lawful functions of government through fraud and deceit for the purpose of interfering with the U.S. political and electoral processes, including the presidential election of 2016."

Featured

Why Cyber Is Different

by Amy Zegartvia PolicyEd.org
Tuesday, February 13, 2018

Cyber attacks are a new type of dangerous threats that are vastly different from traditional warfare. Cyber attacks threats are increasing, making powerful nations even more susceptible. Because cyber attacks can occur unexpectedly, we need to be more vigilant and increase coordination among organizations to prevent attacks.

Analysis and Commentary

Small Towns, Big Companies: How Surveillance Intermediaries Affect Small And Midsize Law Enforcement Agencies

by Anne Bousteadvia Lawfare
Monday, February 12, 2018

As Justice Samuel Alito noted in United States v. Jones, “[i]n the pre-computer age, the greatest protections of privacy were neither constitutional nor statutory, but practical.” Nevertheless, there has been increasing recognition that practical protections for privacy do not dissipate entirely when digital-age government officials seek commercially collected information.

Blank Section (Placeholder)Analysis and Commentary

A Rubicon

by Dan Geervia Aegis Paper Series
Friday, February 2, 2018

Optimality and efficiency work counter to robustness and resilience. Complexity hides interdependence, and interdependence is the source of black swan events.  The benefits of digitalization are not
transitive, but the risks are.  Because single points of failure
require militarization wherever they underlie gross societal
dependencies, frank minimization of the number of such single points
of failure is a national security obligation.  Because cascade
failure ignited by random faults is quenched by redundancy, whereas
cascade failure ignited by sentient opponents is exacerbated by
redundancy, (preservation of) uncorrelated operational mechanisms
is likewise a national security obligation.

In the News

Ending The Stalemate Over Encrypted Communications

quoting Toomas Hendrik Ilvesvia Washington Examiner
Tuesday, January 23, 2018

A think tank effort led by a former top cybersecurity official at the Department of Homeland Security will try to unlock one of cybersecurity's most intractable policy problems: Balancing the needs of law enforcement against personal privacy when it comes to encrypted communications.

Analysis and Commentary

Anything New Under The Sun? Nuclear Responses To Cyberattacks

by Herbert Linvia Lawfare
Friday, January 19, 2018

A recent New York Times story regarding the draft Nuclear Posture Review (NPR) writes that: A newly drafted United States nuclear strategy that has been sent to President Trump for approval would permit the use of nuclear weapons to respond to a wide range of devastating but non-nuclear attacks on American infrastructure, including what current and former government officials described as the most crippling kind of cyberattacks.

Interviews

Jamil Jaffer: What Is FISA? Rand Paul And Others Debate Privacy And Surveillance (37:20)

interview with Jamil Jaffervia The Federalist
Thursday, January 18, 2018

Hoover Institution fellow Jamil Jaffer discusses surveillance conducted under FISA Section 702.

Analysis and Commentary

Information Warfare and Cybersecurity Are Different, Related and Important

by Herbert Lin, Paul Rosenzweigvia Lawfare
Wednesday, January 17, 2018

Susan Landau pointed last week to a disagreement between the two of us, saying that current definitions of cybersecurity (such as the HSPD-54 that Herb quoted) are outmoded and a new definition is necessary. We agree with Susan, and as we discussed the matter, we find that we are in fact much more in agreement than disagreement. At least part of Susan’s perception that we disagree is understandably rooted in the titles of our respective pieces.

Pages

Watch the LiveStream!

Research Team