sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

Closing Critical Gaps that Hinder Homeland Security Technology Innovation

Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic.

Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded.




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

Closing Critical Gaps that Hinder Homeland Security Technology Innovation

Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic.

Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

Closing Critical Gaps that Hinder Homeland Security Technology Innovation

Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic.

Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Hamilton looks to 2011 for second title

Lewis Hamilton is determined to bounce back in 2011 after missing out on the championship this year, and is confident McLaren is the team to deliver him a car to do it




sec

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

Closing Critical Gaps that Hinder Homeland Security Technology Innovation

Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic.

Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded.




sec

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Capital Choices: Sectoral Politics and the Variation of Sovereign Wealth

Capital Choices analyzes the creation of different SWFs from a comparative political economy perspective, arguing that different state-society structures at the sectoral level are the drivers for SWF variation. Juergen Braunstein focuses on the early formation period of SWFs, a critical but little understood area given the high levels of political sensitivity and lack of transparency that surround SWF creation. Braunstein’s novel analytical framework provides practical lessons for the business and finance organizations and policymakers of countries that have created, or are planning to create, SWFs.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

Capital Choices: Sectoral Politics and the Variation of Sovereign Wealth

Capital Choices analyzes the creation of different SWFs from a comparative political economy perspective, arguing that different state-society structures at the sectoral level are the drivers for SWF variation. Juergen Braunstein focuses on the early formation period of SWFs, a critical but little understood area given the high levels of political sensitivity and lack of transparency that surround SWF creation. Braunstein’s novel analytical framework provides practical lessons for the business and finance organizations and policymakers of countries that have created, or are planning to create, SWFs.




sec

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Bruce Schneier on Cybersecurity in the Age of Coronavirus

Is Zoom secure? What about your home computer? Cyber expert Bruce Schneier says that we all need to be aware of the things cyber criminals thrive on during the confusion caused by coronavirus.




sec

Closing Critical Gaps that Hinder Homeland Security Technology Innovation

Rapid technological advances are making nonstate actors much more capable than they were even a decade ago. Malicious actors like terrorist groups, criminal organizations, and state proxies are increasingly able to threaten American civilians and their interests around the world. At the same time, we are increasingly vulnerable to the emergence of new disease and natural disasters, as vividly shown by the hurricanes of 2017 (Harvey, Irma, and Maria) and the COVID-19 pandemic.

Effectively countering these threats, including by developing and supporting private sector-generated new technological solutions, is a core government responsibility. DHS is the U.S. government’s primary civilian public safety agency and the main source of government funding for nonmilitary development of public safety technologies. Unfortunately, DHS has a poor record of developing new technological solutions to advance its mission and address emerging threats. This article assesses the current situation, identifies lines of research that are urgently needed, and makes recommendations on how DHS can more effectively partner with industry and how new technologies can be quickly seeded.




sec

2020–2021 International Security Program Research Fellowships: Apply Now

The International Security Program (ISP) is still accepting applications for 2020–2021.  ISP is a multidisciplinary research group that develops and trains new talent in security studies by hosting pre- and postdoctoral research fellows. 








sec

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance

Joseph S. Nye: U.S. and China Need a More Cooperative Security Stance




sec

An Interview with Bruce Schneier, Renowned Security Technologist

Bruce Schneier discusses current security technology concerns with The Politic's Eric Wallach.




sec

Webber grateful for second-place finish

Mark Webber confessed himself happy with his second place at the Belgian Grand Prix after a clutch issue saw him drop back several places from his starting position of second




sec

Nine drivers hit with five-second penalties

The stewards have slapped five-second penalties onto the finishing times of nine Formula One drivers at the European Grand Prix for lapping too quickly under safety car conditions




sec

Hamilton eyeing victory from second row

Lewis Hamilton insists he is not out of the running at the Korean Grand Prix, despite qualifying fourth and admitting he was baffled by the Red Bulls' pace




sec

Second 'a great result' - Hamilton

Lewis Hamilton said it was still a great result to finish second behind Fernando Alonso and remain firmly in the title hunt




sec

2020–2021 International Security Program Research Fellowships: Apply Now

The International Security Program (ISP) is still accepting applications for 2020–2021.  ISP is a multidisciplinary research group that develops and trains new talent in security studies by hosting pre- and postdoctoral research fellows. 




sec

2020–2021 International Security Program Research Fellowships: Apply Now

The International Security Program (ISP) is still accepting applications for 2020–2021.  ISP is a multidisciplinary research group that develops and trains new talent in security studies by hosting pre- and postdoctoral research fellows. 




sec

Grosjean gets second Renault seat

Lotus Renault has announced that Romain Grosjean will drive alongside Kimi Raikkonen next season




sec

Section 3: Building Skills


     
 
 




sec

Section 2: Supporting Disadvantaged Youth


     
 
 




sec

Section 4: Improving Safety Net and Work Support


     
 
 




sec

Section 1: Promoting Early Childhood Development


     
 
 




sec

How Second Earners Can Rescue the Middle Class from Stagnant Incomes


In his state of the union and his budget, the President spoke of the stagnation of middle class incomes. Whatever growth we have had has not been broadly shared.  More than 78% of the growth in GDP between 1979 and 2013 has gone to the top one percent. Even Republicans are beginning to worry about this issue although they have yet to develop concrete proposals to address it.

Slow Growth in Incomes

Middle class incomes were growing slowly before the recession and have actually declined over the past decade.   In addition, according to the New York Times, the proportion of the population with incomes between $35,000 and $100,000 in inflation-adjusted terms fell from 53% in 1967 to 43% in 2013.  During the first four decades this was primarily because more people were moving into higher income groups, but more recently it was because they have moved down the ladder, not up.  One can define the middle class in many different ways or torture the data in various ways, but there is plenty of evidence that we have a problem.

What to Do

The most promising approach is what I call “the second earner solution.”  For many decades now, the labor force participation rate of prime age men has been falling while that of women has been rising.  The entry of so many women into the labor force was the major force propelling whatever growth in middle class incomes occurred up until about 2000. That growth in women’s work has now levelled off.  Getting it back on an upward track would do more than any policy I can think of to help the middle class.

Imagine a household with one earner making the average wage of today’s worker and spending full-time in the job market.  That household will have an income of around $34,000. But if he (or she) has a spouse making a similar amount, the household’s income will double to $68,000. That is why the President’s focus on a second-earner credit of $500, a tripling of the child care tax credit, expanding the Earned Income Tax Credit, and providing paid leave are so important. These policies are all pro-work and research shows they would increase employment.

No Marriage = No Second Earner

One problem, of course, is that fewer and fewer households contain two potential workers.  So it would also help to bring back marriage or at least its first cousin, a stable cohabiting relationship.  My ideas on this front are spelled out in my new book, Generation Unbound. In a nutshell, we need to empower women to not have children before they have found a committed partner with whom to raise children in a stable, two-parent family. Whatever the other benefits of two parents, they have twice as much time and potentially twice as much income.    

Other Needed Responses

Shouldn’t we also worry about the wages or the employment of men?  Of course.  But an increase in, say, the minimum wage or a better collective bargaining environment or more job training will have far smaller effects than “the second earner solution.”  In addition, the decline in male employment is related to still more difficult problems such as high rates of incarceration and the failure of men to take advantage of postsecondary education as much as women have. 

Still the two-earner solution should not be pursued in isolation. In the short-term, a stronger recovery from the recession is needed and in the longer-term, more effective investments in education, research, infrastructure, and in labor market institutions that produce more widely-shared growth, as argued by the Commission on Inclusive Prosperity. But do we really expect families to wait for these long-term policies to pay off?  It could be decades. 

In the meantime, the President’s proposals to make work more appealing to existing or potential second earners deserves more attention.  

Publication: Real Clear Markets
Image Source: © Kevin Lamarque / Reuters
      
 
 




sec

The Need for Creative and Effective Nuclear Security Vulnerability Assessment and Testing

Realistic, creative vulnerability assessment and testing are critical to finding and fixing nuclear security weaknesses and avoiding over-confidence. Both vulnerability assessment and realistic testing are needed to ensure that nuclear security systems are providing the level of protection required. Systems must be challenged by experts thinking like adversaries, trying to find ways to overcome them. Effective vulnerability assessment and realistic testing are more difficult in the case of insider threats, and special attention is needed. Organizations need to find ways to give people the mission and the incentives to find nuclear security weaknesses and suggest ways they might be fixed. With the right approaches and incentives in place, effective vulnerability assessment and testing can be a key part of achieving and sustaining high levels of nuclear security.




sec

The Risks and Rewards of Emerging Technology in Nuclear Security

Nuclear security is never finished. Nuclear security measures for protecting all nuclear weapons, weapons-usable nuclear materials, and facilities whose sabotage could cause disastrous consequences should protect against the full range of plausible threats. It is an ongoing endeavor that requires constant assessment of physical protection operations and reevaluation of potential threats. One of the most challenging areas of nuclear security is how to account for the impact–positive and negative—of non-nuclear emerging technologies. The amended Convention on the Physical Protection of Nuclear Material (amended CPPNM) states it should be reviewed in light of the prevailing situation, and a key part of the prevailing situation is technological evolution. Therefore, the upcoming review conference in 2021, as well as any future review conferences, should examine the security threats and benefits posed by emerging technologies.