Cybersecurity

Scholarly Publications

The Strategic Promise of Offensive Cyber Operations

September 2018

Abstract: Could offensive cyber operations provide strategic value? If so, how and under what conditions?

Integrating offensive cyber capabilities: meaning, dilemmas, and assessment

August 2018

Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Integrating Offensive Cyber Capabilities: Meaning, dilemmas, and assessment

August 2018

Abstract: Across the world, states are establishing military cyber commands or similar units to develop offensive cyber capabilities.

Other Publications

Andrew Grotto Testimony on "Cybersecurity and California Elections"

March 2018

To assess the threat to California's elections systems, the Assembly and Senate elections committees held a joint informational hearing on cybersecurity. The hearing discussed steps California...

News

America’s misbegotten cyber strategy

February 2019

I used to think we didn’t have enough strategic documents guiding U.S. cyber policy. Now I think we have at least one too many.

Scholars examine cyber warfare in new book

January 2019

War is changing, and the U.S.

Active cyber defense and interpreting the computer fraud and abuse act

December 2018

 In the cybersecurity field, the term “active defense” is often used in a variety of ways, referring to any activity undertaken outside the legitimate span of control of an organization being...

Events

Bytes, Bombs, and Spies The Strategic Dimensions of Offensive Cyber Operations

December 14, 2018

Offensive cyber operations have become increasingly important elements of U.S. national security policy.

The Perfect Weapon: War, Sabotage and Fear in the Modern Age

October 22, 2018

Click here to RSVPAbstract: The Perfect Weapon is the startling inside story of how the rise of cyberweapons in all their forms—from attacks on electric grids to attacks on electoral systems—has...

Cyber-Enabled Information Warfare and the End of the Enlightenment

December 18, 2017

Abstract: The West has no peer competitors in conventional military power.  But its adversaries are increasingly turning to asymmetric methods for engaging in conflict.  Cyber-enabled information...

Projects

Critical Infrastructure Resilience

The Critical Infrastructure Initiative builds the cyber-resilience of critical infrastructure through methodologically diverse outputs-oriented research and engagement with end users and homeland...
English

Multimedia

Drell Lecture: Secretary of Defense Ashton Carter

April 2015

The Honorable Ashton B. Carter, 25th U.S.

Cybersecurity Boot Camp

October 2014

Video of Cyber Boot Camp  The Stanford Congressional Cyber Boot Camp, sponsored by the Hoover Institution and the Center for International Security and Cooperation, was held on the Stanford campus from Aug. 18-20, 4014.

People

Andrew Grotto Andrew Grotto Research Scholar, Lecturer
Amy Zegart Senior Fellow Senior Fellow, Hoover Institution, Professor, by courtesy, Political Science
Herb Lin Herbert Lin Senior Research Scholar
Harold Trinkunas Harold Trinkunas Deputy Director, Senior Research Scholar
Alex Stamos Adjunct Professor William J. Perry Fellow
Thomas Fingar Shorenstein APARC Fellow
Max Smeets Max Smeets Postdoctoral Fellow
Gregory Falco Postdoctoral Fellow
Alexa Corse CISAC Honors Student
Sean Kanuck Sean Kanuck Affiliate
Marc Goodman Marc Goodman Affiliate
Robert Silvers Robert Silvers Affiliate