Cybersecurity

Defense

Filter By:

Type

Fellow

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

In the News

The Cybersecurity 202: Trump Is Getting Tough On Chinese Hacking. Will It Work?

quoting Herbert Linvia The Washington Post
Wednesday, December 12, 2018

The Trump administration is prepping a slate of get-tough measures against Chinese government-linked hackers — including indictments, a naming and shaming campaign by multiple federal agencies and possible sanctions against hackers and the organizations that back them.

In the News

The Cybersecurity 202: Trump Is Getting Tough On Chinese Hacking. Will It Work?

quoting Herbert Linvia The Washington Post
Wednesday, December 12, 2018

The Trump administration is prepping a slate of get-tough measures against Chinese government-linked hackers — including indictments, a naming and shaming campaign by multiple federal agencies and possible sanctions against hackers and the organizations that back them.

Normative Restraints on Cyber Conflict

by Joseph Nyevia Belfer Center for Science and International Affairs
Wednesday, August 1, 2018

Cyber security is a relatively new international problem. A decade ago, it received little attention as an international issue, but since 2013 the Director of National Intelligence has named cyber security risks as the biggest threat facing the USA. Although the exact numbers can be debated, various non-profit organisations have listed hundreds of state-sponsored attacks by a score of countries in the past decade. Many observers have called for laws and norms to manage the growing cyber threat. In this paper the author outlines the key normative restraints on cyber conflict. The author draws on the development of international norms in recent history to offer insights into the formation of normative restraints in the cyber realm.

In the News

Bytes, Bombs, And Spies

featuring Herbert Lin, Amy Zegartvia Brookings Institution
Tuesday, December 11, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy. From the deployment of Stuxnet to disrupt Iranian centrifuges to the possible use of cyber methods against North Korean ballistic missile launches, the prominence of offensive cyber capabilities as instruments of national power continues to grow.

In the News

The Dilemmas Of Competing With Xi Jinping’s China

quoting Elizabeth Economyvia War on the Rocks
Thursday, November 29, 2018
Last year in October, President Xi Jinping strutted to the podium at the Chinese Communist Party’s 19th Party Congress to read his work report. For more than three hours, Xi forced his colleagues to sit and listen in one of the most ostentatious displays of that infamous Chinese phrase, “you listen, I speak,” to which anyone has ever been subjected. More than any other event of the last six years, the 19th Party Congress pressed home Xi’s influence on the Chinese party-state. His ideas were incorporated into the constitution. No obvious successor emerged, suggesting Xi would hold the reins of power indefinitely.
In the News

China Is Using 'Economic Espionage' And 'Theft' To Grab Us Technology

quoting Larry Diamond, Hoover Institutionvia Fox News
Thursday, November 29, 2018
A new report issued by several prominent experts on Chinese and American foreign policy claims that China is using a range of methods to misappropriate U.S. technology. The 200-page report, entitled “Chinese Influence & American Interests: Promoting Constructive Vigilance,” warns that American intellectual property is at risk.
In the News

Study: China Engaging In Wide Campaign To Influence American Life

featuring Hoover Institutionvia VOA News
Thursday, November 29, 2018
A new study by longtime China experts in the U.S. has concluded that Beijing is engaging in an increasingly aggressive campaign to influence and shape perceptions about China held by American politicians, university scholars and students, as well as executives at major corporations.
Analysis and Commentary

An Outcome-Based Analysis Of U.S. Cyber Strategy Of Persistence & Defense Forward

by Herbert Lin, Max Smeetsvia Lawfare
Wednesday, November 28, 2018

The new U.S. Cyber Command (USCYBERCOM) vision and the Department of Defense Cyber Strategy embody a fundamental reorientation in strategic thinking.

In the News

Why Cyberspace Demands An Always-On Approach

quoting Andrew Grottovia Fifth Domain
Monday, November 26, 2018

The U.S. government has determined it must remain constantly engaged in cyberspace in response to the steps other countries and non-state actors are taking online. Enemies are participating in economic espionage, theft of intellectual property and sowing distrust in society and American institutions, all of which take place below the threshold of armed conflict.

In the News

The SEC And Cybersecurity Regulation

quoting Jack Goldsmithvia Lawfare
Monday, November 19, 2018

American companies are getting hacked, and the Securities and Exchange Commission wants corporate executives to do something about it. 

Pages

Watch the LiveStream!

Research Team