Loading...
You are here:  Home  >  Cyber-terrorism/Finance/Other  -  Page 2
Latest

Backdoors: National Security versus the Fourth Amendment

By   /  March 3, 2016  /  Cyber-terrorism/Finance/Other, Events  /  No Comments

As citizens of the United States, we rely on our nation’s foundation of rights as defined by the Constitution. These fundamental rights are guaranteed us, and these rights are protected and enforced by our Government – but what happens when it is the Government that is testing the boundaries of one of those rights, namely, […]

Read More →
Latest

The White House’s Cybersecurity National Action Plan and What it Could Mean to the States

By   /  March 3, 2016  /  Cyber-terrorism/Finance/Other, Events  /  No Comments

President Obama recently released the White House’s Cybersecurity National Action Plan (CNAP) last Tuesday.[1] After a hacker released a statement last Monday that he is planning to dump thousands of FBI and DHS employee details[2], the release of the CNAP comes none too soon. The President’s plan outlines the formation of a new commission, a […]

Read More →
Latest

iConstitution: How Apple is using the Constitution as a basis for its argument against the FBI

By   /  March 1, 2016  /  Cyber-terrorism/Finance/Other, National Security Law, News, News & Events, Pending Cases, Trending Topics, Unsorted  /  No Comments

It’s quite difficult to imagine exactly what the Framers of the Constitution would think of the construal of their document to protect the locked-away iMessages and data of the San Bernardino terrorists. Yet, the principles of the Constitution that Apple is using to rebut the arguments of the FBI protect the rights of the individual […]

Read More →
Latest

Economics and Tech Giants in Sino-American Relations

By   /  January 6, 2016  /  Cyber-terrorism/Finance/Other, Events  /  No Comments

Thinking of China and Chinese history, certain things come immediately to mind. The Great Leap Forward, an economic and social campaign under Mao Zedong aimed at rapidly industrializing the country’s agrarian economy is an event most have heard of. Many of us have also heard of the Great Fire Wall, a legislative tool used by […]

Read More →
Latest

Third Party Doctrine: Supporting Government’s Desire to Collect Information

By   /  November 17, 2015  /  Analysis, Cyber-terrorism/Finance/Other  /  No Comments

In the past decade the Senate and House of Representatives have attempted to address the ever-growing concerns surrounding cyber-attacks (i.e., independent computer-network attacks), and cyber-espionage (i.e., government funded network attacks) through a variety of legislation.[1] The majority of proposed legislation on this topic is targeted towards improving information sharing networks across both private and public […]

Read More →