The information assembled here is for any campaign in any party. It was designed to give you simple, actionable information that will make your campaign’s information more secure from adversaries trying to attack your organization—and our democracy
This report recommends policies and actions to improve the return on investment the U.S. government makes in sponsoring research and development (R&D) at the Department of Energy's (DOE) seventeen National Laboratories ("Labs"). While the Labs make a unique and significant contribution to all of the Department of Energy's missions, the authors develop the idea that for the Labs to fully support DOE's energy transformation goals, their R&D management practices need to be updated to better reflect current research into innovation systems and management. They also highlight the necessity of Lab interactions with industry in order to impact the nation's energy infrastructure investment, which is, for the most part, privately held.
Xi is now not only the most powerful leader of China since Mao. He is also the most ambitious leader of any country today. In the past five years, he has proved himself the most effective in advancing his nation’s position in the world. And among all of the competitors on the international stage, he is the most likely to leave a lasting mark on history.
This paper presents a new dataset of more than 2,600 vulnerabilities, and estimates vulnerability rediscovery across different vendors and software types. It is an update to the original publication, from July 2017.
This paper presents a new dataset of more than 4,300 vulnerabilities, and estimates vulnerability rediscovery across different vendors and software types. It concludes that rediscovery happens more than twice as often as the 1-9% range previously reported.
Bruce Schneier discusses WannaCry, the National Security Agency, and the Vulnerabilities Equities Process and asks what the government's responsibility is when it discovers a vulnerability in a piece of software: alert the software vendor or keep it secret to use offensively.
After the WannaCry outbreak, the Shadow Brokers threatened to release more NSA secrets every month, giving cybercriminals and other governments worldwide even more exploits and hacking tools. Who are these guys? And how did they steal this information? The short answer is: We don't know. But we can make some educated guesses based on the material they've published.
Bruce Schneier advocates for stricter government regulation to improve security on "Internet of Things" (IoT) devices. Without that, he argues, we are going to see hackers attacking our cars, digital video recorders, web cameras, refrigerators, and so much more as our dependency on IoT devices grows.
As more and more of our everyday devices connect to the Internet, they become vulnerable to ransomware and other computer threats. Bruce Schneier advocates for minimum security standards for critical IoT devices.
University of Michigan Journal of Law Reform
- University of Michigan Journal of Law Reform
With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.
"Accountability is a major problem for U.S. elections. The candidates are the ones required to petition for recounts, and we throw the matter into the courts when we can't figure it out. This all happens after an election, and because the battle lines have already been drawn, the process is intensely political. Unlike many other countries, we don't have an independent body empowered to investigate these matters."