top of page
THE BLOG
Mar 5, 20203 min read
The Use of Big Data Against International Terrorism
By Inamul Hassan In the fight against international terrorism, there has been an extensive use of defensive countermeasures in the global...
Oct 14, 20183 min read
The OPM Data Breach: Implications for Covert Employees
The 2014 breach of the Office of Personnel Management’s (OPM) databases affected over 20 million people who had background investigations...
Nov 16, 20153 min read
Third Party Doctrine: Supporting Government’s Desire to Collect Information
In the past decade the Senate and House of Representatives have attempted to address the ever-growing concerns surrounding cyber-attacks...
Feb 26, 20143 min read
Data Vulnerability in the Digital Age
In the past three months alone, tens of millions of people have been victims of data breaches. From the recent Target breach, which...
Nov 11, 20132 min read
Keep Your Friends Close . . .
The recent media circus surrounding the leaking of classified information concerning our National Security Agency (NSA) cell phone...
Nov 9, 20134 min read
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Su
On October 29, 2013, the Permanent Select Committee on Intelligence held public hearings regarding NSA surveillance of U.S. citizens, and...
Oct 24, 20134 min read
The Necessity of the Haystack to Find the Needle: A Look into the Controversial NSA Bulk Collection
Through leaking thousands of top-secret documents owned by the National Security Agency (NSA), Edward Snowden publicly disclosed the...
bottom of page