Featured Image

Encoded Laws, Policies, and Virtues

With artificial intelligence systems becoming an increasingly important factor in government and business, public policy professionals must be prepared to engage with the biases that can influence artificial intelligence.

Featured Image

Russian Disinformation: How U.S. Information Operations Need to Adapt

Building on a legacy of propaganda and information warfare, Russia has displayed a unique ability to selectively obscure truth, seed doubt, and spread disinformation on a global scale. With Russia’s gaze set on the United States as a rival in an increasingly multipolar world, the United States has already felt the impact of these types of information operations (IO) through the hacking and selective releasing of emails relating to Hillary Clinton and the Democratic National Committee.

Featured Image

The Opacity of National Security Letters

Transparency reports of electronic data requests are common for major communications and technology companies, but universities, which often act as small internet service providers, have yet to embrace transparency. Security activists are calling on universities to develop their own transparency reports, but it is important to understand what information these reports are not reporting.

Featured Image

Housing Policy in Silicon Valley

The tech boom has brought incredible wealth to Silicon Valley, but the region also struggles with extreme poverty. The Department of Housing and Urban Development reported that Santa Clara County ranks seventh in the nation for the size of its homeless population, with a count of 7,567 in 2014. The area ranks behind only Los… Read more »

Featured Image

Constant Crisis: Federal Cybersecurity’s Administrative Failures Highlight Key Policy Challenges

CONSTANT CRISIS Although the White House, and in particular the American military establishment under Cyber Command (CYBERCOM), has attempted to unify a policy framework for a comprehensive cybersecurity plan, persistent administrative failures at the agency and inter-agency level have led to severely compromised computer networks. Since 2005, over 709 breaches have occurred within the public… Read more »