Filter By:



Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover


John Yoo: Barr Will Get To Bottom Of If Spying On Trump Campaign Was Justified

interview with John Yoovia Fox News
Friday, April 12, 2019

Hoover Institution fellow John Yoo says the question isn't about the term 'spying' vs. 'surveillance,' it's about why it was done to the Trump campaign and administration.

In the News

Nielsen's Departure Raises Questions About Cyber Plans

quoting Jamil Jaffervia The Hill
Tuesday, April 9, 2019

Kirstjen Nielsen’s departure as head of Homeland Security is creating uncertainty about the agency’s cyber efforts.


Huawei And Managing 5G Risk

by Herbert Linvia Lawfare
Wednesday, April 3, 2019

Based on cybersecurity concerns, the United States, Australia and New Zealand have staked out policy positions that prevent or strongly discourage the acquisition of Huawei 5G technology for use in the national communications infrastructure of these nations. Other U.S. allies have announced or are considering policy positions that do not go so far and would indeed allow such acquisition at least to some extent.

In the News

National Bloviation Strategy

mentioning Amy Zegartvia Reason
Monday, March 25, 2019

I know. The title could be talking about pretty much any national strategy written in the last 15 years. And that's the point. In the interview, Dr. Amy Zegart and I discuss the national cyber strategy and what's wrong with it, besides all the bloviating. We also explore the culture clash between DOD and Silicon Valley (especially Google), and whether the right response to the Mueller report would be to conduct a thorough investigation into how the Intelligence Community and Justice handled the collusion allegations at the start of the Trump Administration.


Amy Zegart: Episode 256: National Bloviation Strategy (30:35)

interview with Amy Zegartvia Steptoe
Monday, March 25, 2019

Hoover Institution fellow Amy Zegart discusses the divide between Google and the military. Zegart notes that encouraging undergraduates to study technology, security, and privacy would help them understand the need to protect the national interest.

In the News

The Beautiful Benefits Of Contemplating Doom

quoting Herbert Linvia Wired
Monday, March 25, 2019

Every year, in late January, a small group of beetle-browed scientists, politicians, and journalists gather at the National Press Club in Washington, DC, to ponder the end of the world. This is a day of solemn kitsch: the unveiling of the Doomsday Clock, the minimalist midcentury dataviz that, since 1947, has been adjusted to dramatize the imminence of global catastrophe.

In the News

There Are Too Many Red Lines In Cyberspace

quoting Herbert Linvia Lawfare Blog
Wednesday, March 20, 2019

U.S. officials increasingly express old frustrations about the lack of standards for appropriate state behavior in cyberspace.

In the News

SIEPR Summit Highlights Trade, Tech And THC

quoting Alex Stamosvia Stanford Institute for Economic Policy Research (SIEPR)
Tuesday, March 12, 2019

Cyber threats lurking in our cell phones. Tectonic shifts in trade. The powerful rise of tech giants. And the not-so-thrilling aspects of marijuana regulation. As ominous as some of the topics were at the 2019 SIEPR Economic Summit, they are among some of today’s most pressing policy questions, according to the conference speakers.

In the News

Rules Of Cyber Road For America, Russia

quoting Jack Goldsmithvia The Korea Times
Tuesday, March 12, 2019

The United States responded weakly after Russian cyber operations disrupted the 2016 presidential election. U.S. President Barack Obama had warned his Russian counterpart, Vladimir Putin, of repercussions, but an effective reply became entangled in the domestic politics of Donald Trump's election. That could be about to change.

In the News

Rules Of The Cyber Road For America And Russia

quoting Jack Goldsmithvia Project Syndicate
Tuesday, March 5, 2019

In the cyber realm, the difference between a weapon and a non-weapon may come down to a single line of code, or simply the intent of a computer program’s user. While this makes negotiating cyber arms-control treaties problematic, it does not make diplomacy impossible.


Watch the LiveStream!