THE BLOG
Kaspersky, the NSA, and Data Breaches: Bad Security Practices
Update Required? Analyzing the Electronic Communications Privacy Act
Ransomware: The Limitations of the Legal System
The Intersection of “Internet Terrorism” and “Individual Privacy” in the Context of the First Amendm
The Slippery Slope of Creating an iPhone Backdoor
Backdoors: National Security versus the Fourth Amendment
The White House’s Cybersecurity National Action Plan and What it Could Mean to the States
iConstitution: How Apple is using the Constitution as a basis for its argument against the FBI
Economics and Tech Giants in Sino-American Relations
Third Party Doctrine: Supporting Government’s Desire to Collect Information
The Department of Justice’s Role as a Deterrent Against Foreign Hackers
The Optic Nerve Program Meets the NSA
Data Vulnerability in the Digital Age
Warrantless Wiretapping Fallout Continues
Spying for Security or Spying because of Habit?
Keep Your Friends Close . . .
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Su
HR 3107 and Potential Cybersecurity Bills for Senate Approval
The Necessity of the Haystack to Find the Needle: A Look into the Controversial NSA Bulk Collection
The Cyber Intelligence Sharing and Protection Act (CISPA): Another SOPA?