Filter By:



Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover


A Conversation With Cyber Warfare Expert Jacquelyn Schneider

interview with Jacquelyn Schneidervia C-SPAN’s The Weekly Podcast
Friday, November 1, 2019

Hoover Institution fellow Jacquelyn Schneider, discusses cyber warfare on C-SPAN’s The Weekly Podcast with Steve Scully.

In the News

Announcing 'Huawei, 5G And National Security: A Lawfare Compilation,' A New Lawfare E-Book

mentioning Herbert Linvia Lawfare Blog
Wednesday, October 30, 2019

A new Lawfare Institute e-book, "Huawei, 5G and National Security: A Lawfare Compilation," is now available on Kindle.

In the News

U.S. Technology Control Policy Not Likely To Stop China's Hi-Tech Development: Scholar

quoting Andrew Grottovia Xinhua (China)
Wednesday, October 30, 2019

U.S. government policy on controlling technology exports to China won't likely halt the Asian country's pace of hi-tech development, a Stanford scholar said Tuesday.

In the News

What Will Be The Effect Of The Latest US Cyberattack On Iran?

quoting Jacquelyn Schneidervia Fifth Domain
Thursday, October 24, 2019

The United States launched a cyber operation against Iran in response to the September attacks on Saudi oil facilities, according to Reuters. Citing two unnamed U.S. officials, the report claims that the cyber operation “affected physical hardware” in an effort to degrade Iranian capabilities to spread “propaganda.”


Jacquelyn Schneider: Strategic Insights

interview with Jacquelyn Schneidervia NDU College of Information and Cyberspace
Thursday, October 24, 2019

Hoover Institution fellow Jacquelyn Schneider discusses the role cyber-operations play in stability, instability, and decisions concerning going to war, etc.

Analysis and Commentary

CISA’s Request For Subpoena Power

by Herbert Linvia Lawfare
Monday, October 14, 2019

Recent stories in Cyberscoop and TechCrunch indicate that the Department of Homeland Security is asking Congress to grant the Cybersecurity and Infrastructure Security Agency (CISA) the power to issue administrative subpoenas to internet service providers (ISPs). The subpoena power will be used to compel ISPs to identify certain private-sector subscribers that CISA has found to be vulnerable to external threats, requiring ISPs to share contact information for those subscribers.

In the News

The Cybersecurity 202: There's A Fight Brewing Over Homeland Security's Push For Subpoena Power

quoting Herbert Linvia The Washington Post
Thursday, October 10, 2019
The U.S. government is currently seeing warning signs of cyberattacks on industrial control systems that could cause massive financial damage or loss of life -- and there's nothing it can do to alert the companies that own them.

National Security Intelligence And American Threats With Guest Amy Zegart

interview with Amy Zegartvia Stanford Radio
Monday, October 7, 2019

Hoover Institution fellow Amy Zegart discusses national security, intelligence, and threats against the US including cyber-security, drone warfare, and political risks.

In the News

Hacking Back At Nations May Be Less Risky Than We Thought, Studies Show

quoting Jacquelyn Schneidervia SF Gate
Wednesday, October 2, 2019

The United States has historically been wary of punching back in cyberspace, fearing that a digital conflict could rapidly escalate to rockets and bombs. But those concerns may be overblown. A pair of recent studies has found it's extremely rare for nations to ratchet up a cyber conflict, let alone escalate it to a conventional military exchange, and that the U.S. public may put extra pressure on leaders not to let a cyber conflict get out of hand.


Are Cyber-Operations A U.S. Retaliatory Option For The Saudi Oil Field Strikes? Would Such Action Deter Iran?

by Jacquelyn Schneidervia The Washington Post
Tuesday, October 1, 2019

Successful retaliatory strikes need to do two things. First, they send a credible signal to the target that attacks of this kind will not be tolerated. Second, they need to limit the risk of escalation through spiraling retaliation and counter-retaliations.


Watch the LiveStream!