Experts Matter. Find Yours.
Connect for media, speaking, professional opportunities & more.
Lawrence Levy, executive dean of the National Center for Suburban Studies, broke down all the key New York races. He appeared on The Point with Marcia Kramer on WCBS-TV 10/20; News 12 on both 10/16 and 10/17, and WCBS-FM on 10/20. He also spoke with Fox 5, which syndicated to several outlets including Yahoo!news. Levy also contributed to a Newsday article about property tax relief. “There is no chance that it [STAR credit] would be anything but increased because it has now become something that people count on,” he said.

#ExpertSpotlight - Remembering the invasion of Grenada
The U.S. invasion of Grenada in 1983 stands as a key moment in Cold War history, reflecting the complex dynamics of American foreign policy in the Caribbean. Known as Operation Urgent Fury, this military action was a response to political instability on the island and perceived threats to U.S. citizens and interests. The invasion not only shaped Grenada’s future but also influenced global perceptions of U.S. interventionism, raising questions about sovereignty, international law, and regional geopolitics. The significance of this event continues to resonate, offering numerous story angles for journalists. Key sub-topics include: Cold War Geopolitics and U.S. Foreign Policy: Exploring the broader Cold War context, the U.S.’s strategic interests in the Caribbean, and how the invasion shaped subsequent American foreign policy decisions. Debates on Sovereignty and International Law: Investigating the legal and ethical implications of the invasion, including debates about military intervention, national sovereignty, and international diplomacy. Impact on Grenada’s Political and Social Landscape: Examining the long-term effects of the invasion on Grenada’s political stability, economy, and society, and how the event is remembered locally. Media Coverage and Public Opinion: Analyzing how the invasion was covered by the media at the time, the public’s reaction in the U.S. and globally, and how it shaped perceptions of U.S. military power. The Role of Regional Powers and Alliances: Looking at the involvement of regional organizations like the Organization of Eastern Caribbean States (OECS), and how the invasion impacted relationships between the U.S., Latin America, and the Caribbean. Lessons for Modern U.S. Military Interventions: Reflecting on the invasion’s legacy and what it teaches about the risks, justifications, and consequences of U.S. military interventions in other nations. As the anniversary of the U.S. invasion of Grenada approaches, this event offers an opportunity to revisit critical discussions on international intervention, geopolitical strategy, and the balance between national interests and global governance. Connect with an expert about the 1983 U.S. invasion of Grenada : To search our full list of experts visit www.expertfile.com Photo credit: Encyclopedia Britannica

Villanova Professor at the Forefront of Work to Tackle Quantum Threats
Securing Our Future Against Quantum Threats Security and privacy are values that everyone cherishes. No tech user wants their personal information getting into the wrong hands, which is why we have security measures in place to protect our private data: face ID to unlock our phones, two-factor authentication to log into banking apps and fingerprint technology to securely enter any system—from a computer to your front door. Encryption codes are used on each of these platforms to encode private data and allow only authorized users to access it. These measures are put in place to protect us, but new advancements in technology could soon challenge these secure systems that we have come to know and trust. Quantum computers are extraordinary machines capable of solving problems far beyond the scope of today’s standard computers. Although these computers are not commercially available, scientists harness their power for experimentation and data storage. Quantum computers excel in scientific development, but they may also prove to be a threat to existing technology that we use in our daily lives. Experts predict that by 2035, quantum computers could crack the very encryption codes that secure everyday transactions and data. Jiafeng Xie, PhD, associate professor of Electrical and Computer Engineering at Villanova University, is at the forefront of this battle, using his Security and Cryptography Lab to strengthen security measures against the threat of quantum computers. The Rise of Post-Quantum Cryptography Since quantum computer advancements are accelerating at an unprecedented pace, post-quantum cryptography (PQC) has emerged as a critical area of research and development. Scientists who study PQC are working to come up with new algorithms to encode our sensitive data, with a goal of being installed after quantum computers crack our current encryption systems. Without these new algorithms, once quantum computers break our current codes, sensitive data—whether personal, corporate or governmental—could be left vulnerable to malicious actors. The core problem of our current encryption system lies in the foundation of public-key cryptosystems. Public-key cryptography is a method of encryption where the user logs into a system using their own private “key”, and the back end of the system has a “key” as well. A “key” is a large numerical value that scrambles data so that it appears random. When a user logs in, their “key” can decrypt private information held by the public “key” in the system to ensure a secure login. This security method is safe right now, but these systems rely on mathematical principles that, while secure against classical computing attacks, are vulnerable to the immense processing power of quantum computers. At the heart of the vulnerability is Shor's algorithm, developed by MIT computer scientist Peter Shor in 1994. As Dr. Xie explained, “Shor invented an algorithm to solve prime factors of an integer that can supposedly run on a quantum computer. This algorithm, if run on a large-scale mature quantum computer, can easily solve all these existing cryptosystems' mathematical formulation, which is a problem." The realization of this potential threat has spurred an increased focus on the development of post-quantum cryptography over the past decade. The goal is clear: "We want to have some sort of cryptosystem that is resistant to quantum computer attacks," says Dr. Xie. In 2016, the National Institute of Standards and Technology (NIST) began the process of standardizing post-quantum cryptography. In July 2022, NIST selected four algorithms to continue on to the standardization process, where they are currently being tested for safety and security against quantum computers. The standardization process for these new algorithms is intensive, and two of the candidates that were announced for testing have already been broken during the process. Scientists are in a race against time to increase the diversity of their algorithms and come up with alternate options for standardization. The urgency of this shift to post-quantum cryptography is underscored by recent government action. The White House released a national security memo in 2022 stating that the U.S. government must transition to quantum-resistant algorithms by 2035. This directive emphasizes the critical nature of post-quantum cryptography in maintaining not just personal but national security. Villanova’s Security and Cryptography Lab Once a new algorithm is selected by NIST, it will need to be embedded into various platforms that need to be secured—this is where Dr. Xie’s Security and Cryptography Lab comes in. This lab is actively conducting research into how the newly selected algorithm can be implemented in the most effective and resourceful way. The lab team is working on developing techniques for this new algorithm so that it can be embedded into many different types of platforms, including credit cards and fingerprint technology. However, there are significant challenges in this process. As Dr. Xie explains, "Different platforms have different constraints. A chip-based credit card, for example, has limited space for embedding new encryption systems. If the implementation technique is too large, it simply won’t work.” Another arising issue from this research is security. During the application of this new algorithm, there's a risk of information or security leakage, so Dr. Xie is always on the lookout for developing security issues that could cause problems down the road. The Future of Post-Quantum Cryptography The implications of PQC are widespread and extend far beyond academic research. As Dr. Xie points out, "All existing cryptosystems, as long as they have some sort of function—for example, signing in or entering a password for login—all of these systems are vulnerable to quantum attacks." This vulnerability affects everything from banking systems to small-scale security measures like fingerprint door locks. The scope of this transition is massive, requiring updates to encrypted systems across all sectors of technology. His goal is to ensure that these new cryptographic systems are flexible enough to be applied to everything from small devices like credit cards and drones to large-scale infrastructure like data centers and military equipment. Although researchers are hard at work now, the future of post-quantum cryptography is not without uncertainties. Dr. Xie raises an important question: "When quantum computers become available, will the algorithms we develop today be broken?" While the newly developed algorithms will theoretically be secure, vulnerabilities can emerge when implementing any kind of new security system. These potential vulnerabilities highlight the importance of conducting this research now so that the new algorithms can go through intensive testing prior to being implemented. Despite these challenges, Dr. Xie emphasizes the importance of being prepared for this new reality. "Society as a whole needs to be prepared with this kind of knowledge,” he says. “A new era is coming. With our current security systems, we need to have revolutionized change. On the other hand, we should not be panicked. We just need continued support to do more related research in this field.” More extensive research is required to ensure that our privacy is protected as we enter a new era of quantum computing, but labs like the Security and Cryptography Lab at Villanova are a step in the right direction. Although the “years to quantum” clock is ticking down, researchers like Dr. Xie are well on their way to ensuring that our digital infrastructure remains secure in the face of evolving technological threats.

With dockworkers on the picket line - what can consumers expect as shipping dries up?
As port workers strike across the country, the shutdown at ports could have reverberating effects on consumers, the economy, and businesses. With consumers already facing higher prices, the strikes will likely cause more supply chain delays and price increases that will be passed on to consumers. There will be a lot of media attention surrounding the looming shortages, the implications for the economy, and how retailers will recover as workers and companies attempt to reach a negotiation. Steven Carnovale, Ph.D., associate professor of supply chain management and David Menachof, Ph.D., associate professor of supply chains and operations management, have the expertise in supply chain, global sourcing and production networks, logistics, and transportation to help reporters make sense of the various impacts this will have. Both experts are ready to help with your stories and contribute to your coverage. To connect with Steven Carnovale and David Menachof - click on their icons below. Photo credit: New York Times

Hezbollah, a powerful political and militant group based in Lebanon, has played a significant role in Middle Eastern politics since its formation in the early 1980s. Understanding the group’s origins, its political evolution, and its regional and global implications is critical in analyzing ongoing conflicts and power dynamics in the region. Hezbollah’s influence extends beyond its militant activities, affecting everything from political governance in Lebanon to its role in broader geopolitical struggles. As global attention often focuses on Middle Eastern stability, the history of Hezbollah provides rich context for journalists to explore various angles on its lasting impact. Here are several story angles that highlight Hezbollah's far-reaching influence: Origins and ideological foundations: Investigate Hezbollah's roots during the Lebanese Civil War, its ideological ties to the Iranian Revolution, and its early activities in resistance movements against Israel. Hezbollah’s role in Lebanese politics: Explore how Hezbollah transformed from a militant group into a major political player, examining its impact on Lebanon's government, elections, and power structure. Regional and international influence: Analyze Hezbollah’s relationships with Iran and Syria, its involvement in the Syrian Civil War, and its role in shaping regional alliances and rivalries in the Middle East. Hezbollah’s military evolution and conflicts with Israel: Provide an in-depth look at the group’s military capabilities, its tactics, and its key confrontations with Israel, including the 2006 Lebanon War. Terrorism designations and global reactions: Investigate Hezbollah’s designation as a terrorist organization by various countries, the group's response, and the wider international community's stance on its activities. Connect with an expert about the the History of Hezbollah: To search our full list of experts visit www.expertfile.com Photo Credit: Council on Foreign Relations
How Will Rate Cuts Affect the Election?
On September 18, the Federal Reserve established the first interest rate cut since the Covid pandemic in 2020. The Fed lowered the federal funds rate by half a percentage point – a much larger change than the typical quarter percentage point cut. Dr. Jeff Haymond, dean of the Robert W. Plaster School of Business at Cedarville University, shared insight about the motivations behind this rate cut in a recent interview. Here are some key points: The United States' national debt has been described as a "ticking time bomb." What impact will this and future interest rate cuts have on the national debt? In light of this recent move, current presidential candidate Donald Trump has articulated his economic plan to put a cap on credit card interest rates. Would this bring down the cost of living in the United States, or will it lead to less options for the consumer? This slashing of the interest rate comes only a short time before the presidential election, with many claiming that this cut was, in fact, a political move. Will it affect the decisions of voters as the election draws near? If you are covering the recent interest rate cut or potential for future cuts and need to know more, let us help with your questions and stories. Dr. Jeff Haymond is an expert on this subject and is available to speak to media regarding the action of the Federal Reserve and what this means for families in the United States – simply click on his icon or email mweinstein@cedarville.edu to arrange an interview.

#ExpertSpotlight: The Origin of Friday the 13th
Friday the 13th is a day shrouded in superstition and mystery, deeply rooted in historical and cultural significance. Often viewed as a day of bad luck, its origins stem from a combination of religious, historical, and folkloric traditions that date back centuries. The fear surrounding the number 13, known as triskaidekaphobia, along with the historically ominous associations with Fridays, have contributed to the day’s infamous reputation. As society continues to explore the psychological effects of superstition, Friday the 13th remains a fascinating topic for public discussion and cultural reflection. Key story angles of interest include: The historical and religious roots of the superstition surrounding Friday the 13th The psychological impact of superstition and its role in modern society The influence of Friday the 13th in popular culture, including movies, books, and folklore Triskaidekaphobia: why the number 13 is feared in many cultures How different cultures interpret and respond to Friday the 13th The commercialization of Friday the 13th in horror films and entertainment Connect with an expert about the Origin of Friday the 13th: To search our full list of experts visit www.expertfile.com Photo Credit: Library of Congress Blogs

How vulnerable are US energy facilities
Earlier this month, alarm bells were ringing at the Justice Department after a Jordanian citizen was arrested for targeting and breaking into solar power facility farm in Florida. During that same time period, energy facilities in New Jersey and Idaho also came under attack. The attacks were politically motivated and have led national media outlets like USA Today to contact experts from Carnegie Mellon University to help explain the situation and break if all down. The Department of Homeland Security has issued warnings that domestic extremists have been developing "credible, specific plans" since at least 2020 and would continue to "encourage physical attacks against electrical infrastructure." Industry experts, federal officials, and others have warned in one report after another since at least 1990 that the power grid was at risk, said Granger Morgan, an engineering professor at Carnegie Mellon University. One challenge is that there's no single entity whose responsibilities span the entire system, Morgan said. And the risks are only increasing as the grid expands to include renewable energy sources such as solar and wind, he said. August 15, 2024 - USA TODAY Professor Granger's comments are startling as America's vulnerabilities to important infrastructure seem to be more exposed than ever. And if you're a journalist looking to cover this emerging topic - then let us help with your questions and stories. Morgan Granger is available to speak with media - simply click on his icon below to arrange an interview today. Photo Credit: Zbynek Burival

The History of the Electoral College
As one of the most debated and misunderstood components of American democracy, the Electoral College plays a crucial role in determining the outcome of U.S. presidential elections. Understanding the history and purpose of the Electoral College is essential for grasping how American elections work and why this system continues to generate controversy. This topic is newsworthy not only because of its impact on election results but also due to ongoing discussions about its relevance in a modern democracy, potential reforms, and its influence on campaign strategies. The Electoral College intersects with broader societal issues such as representation, voter equity, and the balance of power between states, which include: The origins of the Electoral College and the Founding Fathers’ intentions How the Electoral College has influenced the outcomes of past presidential elections The ongoing debate over whether the Electoral College should be reformed or abolished The impact of the Electoral College on voter turnout and representation The role of swing states and how they shape campaign strategies Legal challenges and Supreme Court decisions related to the Electoral College Covering the election? Let us help! Connect with a political expert about the History of the Electoral College: To search our full list of experts visit www.expertfile.com Photo Credit: Clay Banks

#ExpertSpotlight: The History of DNC Conventions in America
As one of the most significant political events in American history, the Democratic National Convention (DNC) has shaped the political landscape and influenced presidential elections for over a century. Understanding the history of DNC conventions offers a window into the evolution of American politics, party ideologies, and electoral strategies. This topic is newsworthy not only because of its historical significance but also due to its ongoing impact on contemporary political discourse, party unity, and voter mobilization. Furthermore, the DNC conventions reflect broader societal changes, such as shifts in public opinion, the role of media in politics, and the influence of grassroots movements, which include: The evolution of the DNC’s role in shaping party platforms and political agendas Key historical moments from past DNC conventions that defined U.S. politics The impact of DNC conventions on voter engagement and turnout The role of media coverage in shaping public perceptions of the DNC How grassroots movements and protests have influenced DNC outcomes The significance of keynote speeches and how they have launched political careers By covering these angles, journalists can provide their audiences with a comprehensive look at the history of these important conventions and topics readers, listeners and viewers want to know more about. Connect with a political expert about the History of DNC Conventions: To search our full list of experts visit www.expertfile.com Photo Credit: Kelly Sikkema






