Essays

Essays Icon

Filter By:

Topic

Author

Research Team

Use comma-separated ID numbers for each author

Support the Hoover Institution

Join the Hoover Institution's community of supporters in advancing ideas defining a free society.

Support Hoover

Blank Section (Placeholder)EssaysAnalysis and Commentary

Decryption Mandates And Global Internet Freedom

by Adam I. Kleinvia Aegis Paper Series
Monday, September 26, 2016

The potential international effects of a domestic decryption mandate have been a significant factor in the debate over U.S. encryption policy.  Some fear that a U.S. decryption mandate would empower authoritarian regimes and would clash with the United States’ international Internet-freedom agenda.

US Political Parties
EssaysBlank Section (Placeholder)Blank Section (Placeholder)Featured

The Political Parties Have Sorted

by Morris P. Fiorinavia Hoover Institution Press
Wednesday, September 21, 2016

Although the American public at large has not polarized, it is better sorted than a generation ago. Whereas the parties were once “big tents,” they are now ideologically more homogeneous: liberal Republicans and conservative Democrats have largely disappeared.

Blank Section (Placeholder)Analysis and Commentary

Attribution Of Malicious Cyber Incidents: From Soup To Nuts

by Herbert Linvia Lawfare
Tuesday, September 20, 2016

Attribution of malicious cyber activities is a deep issue, about which confusion and disquiet can be found in abundance. Attribution has many aspects, and a variety of well-researched and well-executed papers cover one or more of these aspects; these papers are referenced in the body of the paper and are called out again in the Acknowledgments section.

Blank Section (Placeholder)Essays

Attribution of Malicious Cyber Incidents: From Soup to Nuts

by Herbert Linvia Aegis Paper Series
Monday, September 19, 2016

Attribution of malicious cyber activities is a deep issue about which confusion and disquiet can be found in abundance. Attribution has many aspects—technical, political, legal, policy, and so on. This paper distinguishes between attribution of malicious cyber activity to a machine, to a specific human being pressing the keys that initiate that activity, and to a party that is deemed ultimately responsible for that activity.

EssaysBlank Section (Placeholder)Blank Section (Placeholder)

An Era Of Tenuous Majorities: Historical Context

by Morris P. Fiorinavia Hoover Institution Press
Wednesday, September 7, 2016

The United States is currently experiencing an almost unprecedented period of electoral instability. This essay describes this important feature of contemporary politics and sets the stage for later essays that describe and attempt to explain current developments and trace their consequences for American government.

EssaysBlank Section (Placeholder)Featured

Security Strategies: Experiences Of The Mexican States Of Chihuahua And Nuevo León

via Hoover Institution
Wednesday, August 24, 2016

Mexico has struggled to consolidate a solid rule of law. The northern Mexican states of Chihuahua and Nuevo León are notable, however, for having successfully reduced the levels of violence that spiked there in 2010–11.

Blank Section (Placeholder)Analysis and Commentary

Hacking Back Without Cracking Up

by Jeremy Rabkin, Ariel Rabkinvia Lawfare
Friday, July 1, 2016

For at least two decades, American firms and institutions have been victimized by attacks on their computer systems. Hackers disrupt their websites, interfere with their communications, and—most costly of all—steal their data. General Keith Alexander, then director of the National Security Agency (NSA), characterized the scale of intellectual property theft by cyber attacks as “the largest transfer of wealth in world history.” 

Blank Section (Placeholder)Essays

Go Big, Go Global: Subject the NSA ’s Overseas Programs to Judicial Review

by Timothy Edgarvia Aegis Paper Series
Thursday, June 30, 2016

Congress should use the debate over section 702 of the Foreign Intelligence Surveillance Act to think big.  Section 702 brings some NSA programs directed at foreign targets under judicial review, showing such review is feasible even for complex programs of transnational surveillance.

Blank Section (Placeholder)Essays

Hacking Back Without Cracking Up

by Jeremy Rabkin, Ariel Rabkinvia Aegis Paper Series
Tuesday, June 28, 2016

Malicious hackers, often under the protection of hostile foreign states, have engaged in massive data theft from U.S. business firms and private institutions.  Intelligence agencies predict the problem will get worse. 

EssaysBlank Section (Placeholder)

A Tale of Six Cities: Underfunded Retiree Health Care

by Joshua D. Rauh, Robert C. Pozenvia Hoover Institution Press
Friday, June 17, 2016

The growing costs of health care benefits for retired public employees—known as OPEB (other post-employment benefits)—pose a serious challenge to many city governments. In this paper, we analyze the retiree health care systems of six American cities: Boston, Minneapolis, Pittsburgh, San Francisco, San Antonia, and Tampa, Florida.

Pages