top of page
THE BLOG


Kaspersky, the NSA, and Data Breaches: Bad Security Practices
By Ryan Johnston – November 5, 2017 The NSA is one of the foremost agencies responsible for collecting data in the United States, but it...
Nov 5, 20175 min read


Update Required? Analyzing the Electronic Communications Privacy Act
By Carly Nuttall Most people understand that statements shared on Twitter, status updates posted on Facebook, or photos uploaded to...
Sep 30, 20173 min read


Ransomware: The Limitations of the Legal System
By: Ryan Johnston, November 10, 2016 Ransomware is on the rise; while is not a new form of cyber attack, the tools to launch ransomware...
Nov 10, 20165 min read
The Intersection of “Internet Terrorism” and “Individual Privacy” in the Context of the First Amendm
“Deterring Russia, channeling growing Chinese power, and working with others to dismantle the Islamic State are daunting challenges — but...
Mar 27, 20163 min read
The Slippery Slope of Creating an iPhone Backdoor
By Gregory Coutros The FBI’s request that Apple provide an electronic backdoor into the iPhone used by the San Bernardino shooters is, on...
Mar 27, 20163 min read
Backdoors: National Security versus the Fourth Amendment
As citizens of the United States, we rely on our nation’s foundation of rights as defined by the Constitution. These fundamental rights...
Mar 3, 20164 min read
The White House’s Cybersecurity National Action Plan and What it Could Mean to the States
President Obama recently released the White House’s Cybersecurity National Action Plan (CNAP) last Tuesday.[1] After a hacker released a...
Mar 3, 20164 min read
iConstitution: How Apple is using the Constitution as a basis for its argument against the FBI
It’s quite difficult to imagine exactly what the Framers of the Constitution would think of the construal of their document to protect...
Feb 29, 20164 min read
Economics and Tech Giants in Sino-American Relations
Thinking of China and Chinese history, certain things come immediately to mind. The Great Leap Forward, an economic and social campaign...
Jan 6, 20164 min read
Third Party Doctrine: Supporting Government’s Desire to Collect Information
In the past decade the Senate and House of Representatives have attempted to address the ever-growing concerns surrounding cyber-attacks...
Nov 16, 20153 min read
The Department of Justice’s Role as a Deterrent Against Foreign Hackers
On September 10, 2015, James Clapper, the Director of National Intelligence, briefed the House Intelligence Committee on the array of...
Oct 26, 20154 min read
The Optic Nerve Program Meets the NSA
Three United States Senators and members of the Senate Intelligence Committee are among many Americans who recently discovered that the...
Mar 18, 20143 min read
Data Vulnerability in the Digital Age
In the past three months alone, tens of millions of people have been victims of data breaches. From the recent Target breach, which...
Feb 26, 20143 min read
Warrantless Wiretapping Fallout Continues
Earlier this year, a Somali-American man, Mohamed Mohamud, was convicted of trying to use a weapon of mass destruction at a Christmas...
Dec 3, 20132 min read
Spying for Security or Spying because of Habit?
Pulitzer Prize winning journalists Matt Apuzzo and Adam Goldman recently wrote an AP article stating that continued spying on mosques in...
Nov 17, 20133 min read
Keep Your Friends Close . . .
The recent media circus surrounding the leaking of classified information concerning our National Security Agency (NSA) cell phone...
Nov 11, 20132 min read
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Su
On October 29, 2013, the Permanent Select Committee on Intelligence held public hearings regarding NSA surveillance of U.S. citizens, and...
Nov 9, 20134 min read
HR 3107 and Potential Cybersecurity Bills for Senate Approval
The House Homeland Security Committee passed the new Bill, HR 3107, or the Homeland Security Cybersecurity Boots-on-the-Ground Act, on...
Nov 1, 20133 min read
The Necessity of the Haystack to Find the Needle: A Look into the Controversial NSA Bulk Collection
Through leaking thousands of top-secret documents owned by the National Security Agency (NSA), Edward Snowden publicly disclosed the...
Oct 24, 20134 min read
The Cyber Intelligence Sharing and Protection Act (CISPA): Another SOPA?
In February of 2013, the Cyber Intelligence Sharing and Protection Act (CISPA) was reintroduced in the House for renewed debate. An older...
Apr 9, 20133 min read
bottom of page