How TikTok Became the Center of a Data Privacy Showdown
THE BLOG
Hey Alexa, Who Hacked my Phone? Jeff Bezos’ Cellphone Hack’s Implications on National Cybersecurity
The Use of Big Data Against International Terrorism
Balancing Security & Privacy of Electronic Border Searches
Legal Means to Prosecute Actors Behind Deepfakes
Critical Questions for the Critical Infrastructure Designation for Financial Services
Update Required? Analyzing the Electronic Communications Privacy Act
Ransomware: The Limitations of the Legal System
The Intersection of “Internet Terrorism” and “Individual Privacy” in the Context of the First Amendm
The Slippery Slope of Creating an iPhone Backdoor
Backdoors: National Security versus the Fourth Amendment
The White House’s Cybersecurity National Action Plan and What it Could Mean to the States
iConstitution: How Apple is using the Constitution as a basis for its argument against the FBI
Third Party Doctrine: Supporting Government’s Desire to Collect Information
The Department of Justice’s Role as a Deterrent Against Foreign Hackers
The Optic Nerve Program Meets the NSA
Data Vulnerability in the Digital Age
Spying for Security or Spying because of Habit?
Keep Your Friends Close . . .
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Su