The information assembled here is for any campaign in any party. It was designed to give you simple, actionable information that will make your campaign’s information more secure from adversaries trying to attack your organization—and our democracy
This report recommends policies and actions to improve the return on investment the U.S. government makes in sponsoring research and development (R&D) at the Department of Energy's (DOE) seventeen National Laboratories ("Labs"). While the Labs make a unique and significant contribution to all of the Department of Energy's missions, the authors develop the idea that for the Labs to fully support DOE's energy transformation goals, their R&D management practices need to be updated to better reflect current research into innovation systems and management. They also highlight the necessity of Lab interactions with industry in order to impact the nation's energy infrastructure investment, which is, for the most part, privately held.
Xi is now not only the most powerful leader of China since Mao. He is also the most ambitious leader of any country today. In the past five years, he has proved himself the most effective in advancing his nation’s position in the world. And among all of the competitors on the international stage, he is the most likely to leave a lasting mark on history.
Election systems differ from state to state and precinct to precinct, but many still have security vulnerabilities that foreign actors — not just the Russians — can exploit. The U.S. government must act to improve security and assure Americans that their votes count.
This Handbook offers a comprehensive overview of the latest research from leading scholars on the international political economy of energy and resources. Highlighting the important conceptual and empirical themes, the chapters study all levels of governance, from global to local, and explore the wide range of issues emerging in a changing political and economic environment.
This paper is a background review representing part of the initial phase of the Financing the Urban Transition work program. The review builds on a growing body of research that highlights both the importance of national sustainable infrastructure and the need to develop more effective and efficient financing mechanisms for delivering compact, connected cities that meet the UN’s Sustainable Development Goals. While progress has been made in both these areas over the last five years, there remains a policy gap between the international/national level and the municipal level.
Recent years have seen growing concern over the use of cyber attacks in wartime, but little evidence that these new tools of coercion can change battlefield events. We present the first quantitative analysis of the relationship between cyber activities and physical violence during war. Using new event data from the armed conflict in Ukraine—and additional data from Syria’s civil war—we analyze the dynamics of cyber attacks and find that such activities have had little or no impact on fighting.
According to U.S. cybersecurity company Symantec, a hacking campaign dubbed Dragonfly 2.0 successfully infiltrated U.S. power plants over the past two years. The latest spate of incidents has been particularly alarming because the hackers appear to have accessed control systems at a handful of U.S. facilities. Symantec’s report speculates about the hack’s “potential for sabotage” and “disruptive purposes,” but doesn’t identify the hackers’ origins, saying only that they are “clearly an accomplished attack group.” Other researchers believe the culprits are linked to the Russian government, dovetailing with Ukraine’s allegations that Moscow was behind hacks against its power grids in 2015 and again in 2016.
Alexei Nikolsky, Sputnik, Kremlin Pool Photo via AP
Russia’s cybermeddling in the 2016 U.S. presidential election has been accompanied by what U.S. and European experts describe as a worrisome Kremlin campaign to rewrite the rules for global cyberspace.