Cybersecurity

Defense

Filter By:

Type

Fellow

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Featured

An Intelligent History

by Amy Zegartvia The American Interest
Thursday, October 18, 2018

Spying has always been part of great power conflict. Egyptians chiseled the oldest surviving intelligence reports on clay tablets 3,000 years ago. Even spy-themed entertainment has deep roots.

In the News

Stanford Researcher, Cybersecurity Specialist Alex Stamos Calls For Cooperation Between Government And Technology Companies

featuring Alex Stamosvia Stanford News
Wednesday, October 17, 2018

During a lecture Tuesday evening, Alex Stamos, a Stanford researcher and a former chief security officer at Facebook, encouraged technology companies, researchers and the government to work together to solve cybersecurity issues.

Analysis and Commentary

Sharing Is Caring: The United States’ New Cyber Commitment For NATO

by Trey Herrvia Council on Foreign Relations
Wednesday, October 10, 2018

An expected Pentagon announcement suggests that the United States might use cyber capabilities alongside conventional weapons with NATO allies. That's a subtle, yet significant shift in policy.

Featured

Hacking Academia

by Niall Fergusonvia Boston Globe
Monday, October 8, 2018

Rosa Klebb is back — as a hacker. In April, the heirs of 007’s nemesis attempted to hack the Organization for the Prohibition of Chemical Weapons in The Hague, after the OPCW had exposed Moscow’s use of chemical weapons in an attempted assassination.

Interviews

A Chip On A Motherboard Is Amateurish Hack, Says Jamil Jaffer

interview with Jamil Jaffervia CNBC
Friday, October 5, 2018

Hoover Institution fellow Jamil Jaffer discusses chips made in China that are spying on Apple and Amazon, and gives an overall picture of the cybersecurity and governments.

In the News

Is The US Legal System An Effective Cyber Deterrent?

quoting Sean Kanuckvia Fifth Domain
Thursday, October 4, 2018
The U.S. Department of Justice indicted seven agents associated with the Russian Main Intelligence Directorate, or GRU — a Moscow military intelligence agency — for hacking anti-doping agencies overseas and organizations in the United States. The Oct. 4 charges are the latest example of the United States’ whole-of-government approach to deterring malicious cyber activity via naming and shaming perpetrators, an approach that has detractors and defenders.
In the News

1 Big Thing: Foiling North Korea's Bank-Robbing Hackers

quoting Andrew Grottovia Axios
Thursday, October 4, 2018
For several years, North Korea has been conducting a spree of bank robberies online. A new report from FireEye makes clear that a recent attempt to "name and shame" a North Korean government-affiliated hacker did nothing to curtail the digital heists, and sanctions have only made Pyongyang more eager to steal money. But experts think the U.S. still has other levers it can pull.
Featured

Cybersecurity: Media Roundtable Eyes Threats

quoting Herbert Lin, Alex Stamos, Andrew Grotto, John Villasenor, Irving Lachow, Sean Kanuckvia Center for International Security And Cooperation (CISAC)
Wednesday, October 3, 2018
Whether it’s foreign government meddling or corporate hacking, every day brings a new challenge in cybersecurity for the United States, said experts at a recent Hoover Institution media roundtable.
In the News

Classy Classes: INTLPOL 268 Stresses Cybersecurity

featuring Alex Stamosvia Stanford Daily
Monday, October 1, 2018
Freeman-Spogli Institute (FSI) adjunct professor and former Facebook Chief Security Officer (CSO) Alex Stamos is teaching an autumn quarter course addressing contemporary cybersecurity issues in an effort to prepare students for technology’s prominence as both a friend and foe in the modern world. The course — titled INTLPOL268: “Hack Lab” — also aims to highlight the value of Silicon Valley research and University interplay in the context of information.
In the News

The High-Stakes Trade-Offs For US Cybersecurity Policy

quoting Jack Goldsmithvia AEI
Monday, October 1, 2018

Last week, my AEI colleague Gary Schmitt presented a careful analysis of the Trump administration’s new cybersecurity policy. He noted that while a number of the themes were not new, the Trump administration did advance in certain areas. The document directly called out China’s and Russia’s efforts to leverage cyberspace as a weapon in great power competition. 

Pages

Watch the LiveStream!

Research Team