top of page
THE BLOG
Mar 9, 20224 min read
Blowback Builds with the Vaccine Mandate on the Horizon
By Drake Birnbaum In an attempt to end the COVID-19 pandemic, President Biden delivered Executive Orders 14042 and 14043 which require...
Jan 21, 20223 min read
What is Disinformation and How Does It Work?
By Aaron McDuffie Merriam-Webster defines disinformation as “false information deliberately and often covertly spread (as by the planting...
Apr 10, 20204 min read
The National Security Exception to the First Amendment Prohibition on Prior Restraints
By Bree Evans The release of former National Security Advisor Ambassador John Bolton’s memoir has been held up while the National...
Apr 6, 20204 min read
The Department of Defense’s Inconsistent Response to Extremists in the Ranks
By Christopher Nelson On February 11, 2020, I attended a hearing in front of the House Subcommittee on Military Personnel regarding white...
Oct 24, 20193 min read
Blurred Lines: Surprise Difficulties in Criminalizing Domestic Terrorism
By Maria L. Stratienko In late July and early August 2019, over the course of a single week, back-to-back mass shootings in El Paso,...
May 6, 20193 min read
Interconnectedness & Responsibility
It is axiomatic that the introduction of the internet radically shaped history and conferred upon society the immeasurable capability for...
Nov 17, 20174 min read
Neo-Nazis, White Supremacists, and Free Speech: How far is too far?
By Alix Bruce In the wake of the slaying of Heather Heyer at a counter-protest to a neo-Nazi protest in Charlottesville, Virginia, a...
Mar 27, 20163 min read
The Intersection of “Internet Terrorism” and “Individual Privacy” in the Context of the First Amendm
“Deterring Russia, channeling growing Chinese power, and working with others to dismantle the Islamic State are daunting challenges — but...
Feb 29, 20164 min read
iConstitution: How Apple is using the Constitution as a basis for its argument against the FBI
It’s quite difficult to imagine exactly what the Framers of the Constitution would think of the construal of their document to protect...
Mar 18, 20143 min read
The Optic Nerve Program Meets the NSA
Three United States Senators and members of the Senate Intelligence Committee are among many Americans who recently discovered that the...
Dec 3, 20132 min read
Warrantless Wiretapping Fallout Continues
Earlier this year, a Somali-American man, Mohamed Mohamud, was convicted of trying to use a weapon of mass destruction at a Christmas...
Nov 17, 20133 min read
Spying for Security or Spying because of Habit?
Pulitzer Prize winning journalists Matt Apuzzo and Adam Goldman recently wrote an AP article stating that continued spying on mosques in...
Nov 9, 20134 min read
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Su
On October 29, 2013, the Permanent Select Committee on Intelligence held public hearings regarding NSA surveillance of U.S. citizens, and...
Apr 10, 20133 min read
License Plate Readers: Protecting National Security Interests or Infringing on Civil Liberties?
With ever increasing modern technologies, American citizens are constantly subject to numerous forms of government-sanctioned...
Mar 31, 20121 min read
Free Speech or Terrorist Supporter? Prosecuting Terrorism through the Material Support Statutes: Apr
The National Security Law Brief’s Annual Symposium will include a panel of academic and practicing experts in terrorism prosecutions, who...
Nov 23, 20115 min read
Stolen Valor: Protect Free Speech or Military Honor?
In 2005 Democratic Congressman John Salazar pushed the Stolen Valor Act easily through a bipartisan Congress. Clay Calvert and Rebekah...
bottom of page