top of page
THE BLOG


Nov 9, 20213 min read
Ransomware, the Colonial Pipeline, and U.S. Infrastructure
By Rachel Feinstein On May 8, 2021, Colonial Pipeline, which supplies approximately 45% of the refined fuel for the Eastern Seaboard of...


Dec 2, 20202 min read
Tiktok is the Least of our Concerns—A Look at Data Brokers
By Heather Wilson The Trump Administration is waging a war against TikTok, citing national security concerns regarding TikTok’s vast...


Sep 28, 20204 min read
How TikTok Became the Center of a Data Privacy Showdown
By Victoria Tinker Over the past weekend, from September 18 to September 20, 2020, TikTok’s standoff with the Trump administration...

Apr 13, 20206 min read
Why Geofencing Violates the Fourth Amendment Post-Carpenter
By Daniel de Zayas As technology advances, new forms of data are created, providing new avenues for law enforcement to investigate...

Mar 9, 20203 min read
Hey Alexa, Who Hacked my Phone? Jeff Bezos’ Cellphone Hack’s Implications on National Cybersecurity
By Kimiya Gilani In 2018, Amazon founder and CEO Jeff Bezos was the victim of a cyberattack that targeted his personal cell phone, an...


Mar 5, 20203 min read
The Use of Big Data Against International Terrorism
By Inamul Hassan In the fight against international terrorism, there has been an extensive use of defensive countermeasures in the global...

Dec 2, 20197 min read
Balancing Security & Privacy of Electronic Border Searches
By Sasha Brisbon The Fourth Amendment provides the fundamental right to security and privacy from intrusion by the government by...


Oct 30, 20193 min read
Facebook, China, and The Cryptocurrency Race
Facebook has suffered increasingly negative publicity as of late due to its cryptocurrency ambitions with the Libra, as the United States...


Oct 16, 20192 min read
The Rise of Facial Recognition Technology in Airports
By Kimiya Gilani Facial recognition technology is rising in many facets of everyday life. Whether it is being used to unlock phones,...
Sep 23, 20193 min read
Legal Means to Prosecute Actors Behind Deepfakes
By Daniel de Zayas In June 2019, many U.S. government officials learned that nothing was real about their recent LinkedIn connection...


May 22, 20192 min read
What Individual Rights Apply For A Telepathic Future?
By: Halie B. Peacher President Dwight Eisenhower stated that the United States “must be forward looking in our research and development...


Apr 9, 20194 min read
Lighting the Way for the Next “Going Dark” Encryption Battle
By: Daniel de Zayas “[Encryption] takes us to a place—absolute privacy—that we have not been to before, where the balance we have long...


Apr 6, 20193 min read
Giving Cyberwar a Geneva Convention
By: Joshua Stanley There has been no shortage of cyberattacks against the US filling up the news headlines over the last several years,...


Mar 12, 20193 min read
The Looming Threat to the 2020 Election
By: Kimiya Gilani With the investigation that was sparked after the 2016 election, interference by Russia in the 2020 election is a...

Feb 27, 20193 min read
Anticipating the Emergence of Disruptive Technology
By: Sasha Brisbon Thomas Jefferson said in 1816, “Laws and institutions must go hand in hand with the progress of the human mind. As that...


Feb 25, 20194 min read
Watch Your SIM: SIM Swapping and Cryptocurrency Theft
By: Heather Wilson A Subscriber Information/Identity Module, or SIM, is the heart of your phone. It contains, among other information,...


Nov 27, 20183 min read
Election Security in an Age of Electoral Cyber Warfare
By: Maria Latimer Election security has been an immense topic of debate since President Donald Trump secured the 2016 Presidential...


Nov 19, 20183 min read
Defending Against the Threat of Cyber Attacks and Its Legal Implications
By: Kimiya Gilani The rising threat and implementation of cyberattacks from foreign actors has compromised the basic foundation of...

Oct 14, 20183 min read
The OPM Data Breach: Implications for Covert Employees
The 2014 breach of the Office of Personnel Management’s (OPM) databases affected over 20 million people who had background investigations...


Nov 18, 20174 min read
Critical Questions for the Critical Infrastructure Designation for Financial Services
By Anthony Bjelke This past September, several institutions, including the Securities and Exchange Commission, the credit rating...
bottom of page