Ransomware, the Colonial Pipeline, and U.S. Infrastructure
THE BLOG
Tiktok is the Least of our Concerns—A Look at Data Brokers
How TikTok Became the Center of a Data Privacy Showdown
Why Geofencing Violates the Fourth Amendment Post-Carpenter
Hey Alexa, Who Hacked my Phone? Jeff Bezos’ Cellphone Hack’s Implications on National Cybersecurity
The Use of Big Data Against International Terrorism
Balancing Security & Privacy of Electronic Border Searches
Facebook, China, and The Cryptocurrency Race
The Rise of Facial Recognition Technology in Airports
Legal Means to Prosecute Actors Behind Deepfakes
What Individual Rights Apply For A Telepathic Future?
Lighting the Way for the Next “Going Dark” Encryption Battle
Giving Cyberwar a Geneva Convention
The Looming Threat to the 2020 Election
Anticipating the Emergence of Disruptive Technology
Watch Your SIM: SIM Swapping and Cryptocurrency Theft
Election Security in an Age of Electoral Cyber Warfare
Defending Against the Threat of Cyber Attacks and Its Legal Implications
The OPM Data Breach: Implications for Covert Employees
Critical Questions for the Critical Infrastructure Designation for Financial Services