top of page
THE BLOG


Sep 28, 20204 min read
How TikTok Became the Center of a Data Privacy Showdown
By Victoria Tinker Over the past weekend, from September 18 to September 20, 2020, TikTok’s standoff with the Trump administration...

Mar 9, 20203 min read
Hey Alexa, Who Hacked my Phone? Jeff Bezos’ Cellphone Hack’s Implications on National Cybersecurity
By Kimiya Gilani In 2018, Amazon founder and CEO Jeff Bezos was the victim of a cyberattack that targeted his personal cell phone, an...


Mar 5, 20203 min read
The Use of Big Data Against International Terrorism
By Inamul Hassan In the fight against international terrorism, there has been an extensive use of defensive countermeasures in the global...

Dec 2, 20197 min read
Balancing Security & Privacy of Electronic Border Searches
By Sasha Brisbon The Fourth Amendment provides the fundamental right to security and privacy from intrusion by the government by...
Sep 23, 20193 min read
Legal Means to Prosecute Actors Behind Deepfakes
By Daniel de Zayas In June 2019, many U.S. government officials learned that nothing was real about their recent LinkedIn connection...


Nov 18, 20174 min read
Critical Questions for the Critical Infrastructure Designation for Financial Services
By Anthony Bjelke This past September, several institutions, including the Securities and Exchange Commission, the credit rating...


Sep 30, 20173 min read
Update Required? Analyzing the Electronic Communications Privacy Act
By Carly Nuttall Most people understand that statements shared on Twitter, status updates posted on Facebook, or photos uploaded to...


Nov 10, 20165 min read
Ransomware: The Limitations of the Legal System
By: Ryan Johnston, November 10, 2016 Ransomware is on the rise; while is not a new form of cyber attack, the tools to launch ransomware...
Mar 27, 20163 min read
The Intersection of “Internet Terrorism” and “Individual Privacy” in the Context of the First Amendm
“Deterring Russia, channeling growing Chinese power, and working with others to dismantle the Islamic State are daunting challenges — but...
Mar 27, 20163 min read
The Slippery Slope of Creating an iPhone Backdoor
By Gregory Coutros The FBI’s request that Apple provide an electronic backdoor into the iPhone used by the San Bernardino shooters is, on...
Mar 3, 20164 min read
Backdoors: National Security versus the Fourth Amendment
As citizens of the United States, we rely on our nation’s foundation of rights as defined by the Constitution. These fundamental rights...
Mar 3, 20164 min read
The White House’s Cybersecurity National Action Plan and What it Could Mean to the States
President Obama recently released the White House’s Cybersecurity National Action Plan (CNAP) last Tuesday.[1] After a hacker released a...
Feb 29, 20164 min read
iConstitution: How Apple is using the Constitution as a basis for its argument against the FBI
It’s quite difficult to imagine exactly what the Framers of the Constitution would think of the construal of their document to protect...
Nov 16, 20153 min read
Third Party Doctrine: Supporting Government’s Desire to Collect Information
In the past decade the Senate and House of Representatives have attempted to address the ever-growing concerns surrounding cyber-attacks...
Oct 26, 20154 min read
The Department of Justice’s Role as a Deterrent Against Foreign Hackers
On September 10, 2015, James Clapper, the Director of National Intelligence, briefed the House Intelligence Committee on the array of...
Mar 18, 20143 min read
The Optic Nerve Program Meets the NSA
Three United States Senators and members of the Senate Intelligence Committee are among many Americans who recently discovered that the...
Feb 26, 20143 min read
Data Vulnerability in the Digital Age
In the past three months alone, tens of millions of people have been victims of data breaches. From the recent Target breach, which...
Nov 17, 20133 min read
Spying for Security or Spying because of Habit?
Pulitzer Prize winning journalists Matt Apuzzo and Adam Goldman recently wrote an AP article stating that continued spying on mosques in...
Nov 11, 20132 min read
Keep Your Friends Close . . .
The recent media circus surrounding the leaking of classified information concerning our National Security Agency (NSA) cell phone...
Nov 9, 20134 min read
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Su
On October 29, 2013, the Permanent Select Committee on Intelligence held public hearings regarding NSA surveillance of U.S. citizens, and...
bottom of page