We have entered a world not of factual anarchy but of factual oligarchy—a picture in which the ultimate seat of power is simultaneously least accountable and most protected when it comes to the demands of proof and verifiability.
Aegis: Security Policy in Depth
Aegis explores legal and policy issues at the intersection of technology and national security. Published in partnership with the Hoover Institution National Security, Technology and Law Working Group, it features long-form essays of the working group, examines major new books in the field, and carries podcasts and videos or the working group’s events in Washington and Stanford. Aegis examines the legal and policy options that better shield America, its allies, and civilians worldwide from the risks of the modern world. The Hoover Working Group on National Security, Technology, and Law brings together national and international specialists with broad interdisciplinary expertise to analyze how technology affects national security and national security law.
Climate change as national and global security problem emerges as one of the single loudest themes in the Obama administration’s reflections on its eight-year legacy and the challenges that remain.
An overview of the administration's new rules for disseminating raw SIGINT among intelligence agencies.
Subheaders from seven of the 27 cabinet exit memos released yesterday.
The next in our series of book soirees at the Hoover Institution will take place from 5-7 pm on Monday, January 9, when Jack will interview Jameel Jaffer on his new book The Drone Memos: Targeted Killing, Secrecy, and the Law.
The Trump administration has an opportunity for the ages: building U.S. resilience in the face of the grave and myriad security challenges presented by climate change.
Jennifer Daskal examines the potential international side effects of the policies proposed in the encryption debate and highlights the need to proceed with care, and for centralized, executive-level review and monitoring of sought-after decryption orders, so as to better account for these effects.
Subscribe to Aegis: Security Policy in Depth via RSS.