Mar 5, 20203 min readThe Use of Big Data Against International TerrorismBy Inamul Hassan In the fight against international terrorism, there has been an extensive use of defensive countermeasures in the global...
Oct 14, 20183 min readThe OPM Data Breach: Implications for Covert EmployeesThe 2014 breach of the Office of Personnel Management’s (OPM) databases affected over 20 million people who had background investigations...
Nov 16, 20153 min readThird Party Doctrine: Supporting Government’s Desire to Collect InformationIn the past decade the Senate and House of Representatives have attempted to address the ever-growing concerns surrounding cyber-attacks...
Feb 26, 20143 min readData Vulnerability in the Digital AgeIn the past three months alone, tens of millions of people have been victims of data breaches. From the recent Target breach, which...
Nov 11, 20132 min readKeep Your Friends Close . . .The recent media circus surrounding the leaking of classified information concerning our National Security Agency (NSA) cell phone...
Nov 9, 20134 min readPrivacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA SuOn October 29, 2013, the Permanent Select Committee on Intelligence held public hearings regarding NSA surveillance of U.S. citizens, and...
Oct 24, 20134 min readThe Necessity of the Haystack to Find the Needle: A Look into the Controversial NSA Bulk Collection Through leaking thousands of top-secret documents owned by the National Security Agency (NSA), Edward Snowden publicly disclosed the...