The Year in Review

The Year 2012 in Review

With 2012 coming to an end, time has come to evaluate the year we just lived. On the surface, not much changed in 2012 with respect to the partisan political culture that dominates the broad public dialogue.
The Year in Review

The Year 2012 in Review

With 2012 coming to an end, time has come to evaluate the year we just lived. On the surface, not much changed in 2012 with respect to the partisan political culture that dominates the broad public dialogue.

2012 was a big year for IVN. It was a year of significant expansion and accomplishments. IVN reached out to an audience of over seven million people with content written by independent contributors for independent-minded voters.

(Credit: rferl.org)

From the Syrian war to sanctions on Iran, Russia is playing a visible role in the world. With new legislation passed by the Duma, the lower parliamentary chamber, Russia is also asserting itself in what continues to be a chilly relations with the United States.

As reports slowly trickle in disclosing the money spent the week leading up to 2012’s presidential election, the identities of the spenders are coming into focus. Yet, even the most avid researcher won’t see the whole picture given current campaign finance disclosure requirements.

Cybersecurity has become a very important issue for the federal government to address. Threats from cyberspace affect a broad range of government organizations, from the Department of Defense, to the police force, to the Department of Energy, and risk the extraction of important classified information by hackers or hostile parties. This infographic from Fed Tech Magazine takes a look at the development of the cyberthreat.

Cybersecurity has become a very important issue for the federal government to address. Threats from cyberspace affect a broad range of government organizations, from the Department of Defense, to the police force, to the Department of Energy, and risk the extraction of important classified information by hackers or hostile parties. This infographic from Fed Tech Magazine takes a look at the development of the cyberthreat.