top of page
THE BLOG
Mar 10, 20144 min read
NSA Leaker Edward Snowden a Traitor?
NSA Leaker Edward Snowden a Traitor? American computer specialist and former National Security Agency (NSA) contractor Edward Snowden,...
Mar 9, 20143 min read
Violation of Privacy or Protection of Citizens?
Being free from unreasonable searches and seizures has always been viewed as part of a fundamental right in our society. Airport...
Jan 6, 20143 min read
Cyber Laundering, Bank Secrecy Act, and terrorist financing
Anti-money laundering laws have traditionally served the purpose of eliminating the profits for he commission of crimes. After September...
Dec 20, 20133 min read
Sequestration, Contingency Operations, and Why America Needs a Marine Corps
On November 10, 1775 while sitting at a local tavern in Philadelphia, Benjamin Franklin witnessed the first of a few volunteers who would...
Dec 3, 20132 min read
Warrantless Wiretapping Fallout Continues
Earlier this year, a Somali-American man, Mohamed Mohamud, was convicted of trying to use a weapon of mass destruction at a Christmas...
Nov 19, 20132 min read
US-India Economic and Financial Partnership – Combating Terrorist Financing
Last month, US Treasury Secretary Jack Lew announced a new bilateral effort with India to implement international anti-money laundering /...
Nov 17, 20133 min read
Spying for Security or Spying because of Habit?
Pulitzer Prize winning journalists Matt Apuzzo and Adam Goldman recently wrote an AP article stating that continued spying on mosques in...
Nov 11, 20132 min read
Keep Your Friends Close . . .
The recent media circus surrounding the leaking of classified information concerning our National Security Agency (NSA) cell phone...
Nov 9, 20134 min read
Privacy vs. Security: Analyzing Rep. Rogers’ Comments about Privacy in the Context of Blanket NSA Su
On October 29, 2013, the Permanent Select Committee on Intelligence held public hearings regarding NSA surveillance of U.S. citizens, and...
Nov 1, 20133 min read
HR 3107 and Potential Cybersecurity Bills for Senate Approval
The House Homeland Security Committee passed the new Bill, HR 3107, or the Homeland Security Cybersecurity Boots-on-the-Ground Act, on...
Oct 24, 20134 min read
The Necessity of the Haystack to Find the Needle: A Look into the Controversial NSA Bulk Collection
Through leaking thousands of top-secret documents owned by the National Security Agency (NSA), Edward Snowden publicly disclosed the...
Oct 23, 20132 min read
Are you safer on flights? Maybe not…
Since 2001 the United States has taken many precautions to guard against another similar tragedy from occurring. One of those changes was...
Oct 14, 20133 min read
Abu Anas at Sea: Alleged al Qaeda Operative Held in Detention
In 2000, Abu Anas, born Nazih Abdul-Hamed al-Ruqai, was indicted in Manhattan for alleged conspiracy with Osama Bin Laden in his plot to...
Sep 30, 20137 min read
Presidential Power and National Security Decisions: The Domestic and International Legal Justificati
We would like to thank all the attendees and everyone who contributed to a successful syposium. Below please find links for the webcasts...
Apr 18, 20133 min read
Keep the CFIUS Curtain Shut
“The U.S. Intelligence Community judges with moderate confidence that there is likely a coordinated strategy among one or more foreign...
Apr 10, 20133 min read
License Plate Readers: Protecting National Security Interests or Infringing on Civil Liberties?
With ever increasing modern technologies, American citizens are constantly subject to numerous forms of government-sanctioned...
Apr 9, 20133 min read
The Cyber Intelligence Sharing and Protection Act (CISPA): Another SOPA?
In February of 2013, the Cyber Intelligence Sharing and Protection Act (CISPA) was reintroduced in the House for renewed debate. An older...
Apr 2, 20132 min read
Congress v. China: The Cyber-Espionage Debate Turns Into Concrete Action
During a speech to the Asia Society on March 11, 2013, National Security Advisor Tom Donilon took China to task for suspected acts of...
Mar 28, 20132 min read
The Danger of Lowest Cost Embassy Security Arrangements
On September 11, 2012, militants attacked a United States Special Mission in Benghazi, Libya and killed four Americans, including the...
Mar 27, 20133 min read
Drones and Unintended Consequences
The introduction of new technology to warfare holds the potential for unforeseen consequences as the law and norms regulating the use of...
bottom of page