top of page
THE BLOG
Thank You For Your Service?
By Eugene Mok Recently the United States Court of Appeals for the Ninth Circuit delivered a concerning blow to veteran and service-member...
Nov 17, 20163 min read
So-Long NATO?
By Amanda Leonard In an August 2016 speech on terrorism, President-elect Donald Trump stated that the “era of nation-building will be...
Nov 15, 20162 min read


Ransomware: The Limitations of the Legal System
By: Ryan Johnston, November 10, 2016 Ransomware is on the rise; while is not a new form of cyber attack, the tools to launch ransomware...
Nov 10, 20165 min read
Fundamental National Security Flaw in U.S.-Cuba Relations
Written by Ayan Islam The U.S. and Cuba share a distinct commonality that cannot be denied – the pursuit to maintain their respective...
Nov 4, 20162 min read
The Worst Precedent Period Ever Period: Law Regarding Bombing Hospitals and Aid Workers
By Victoria Garcia As one doctor in Syria noted, “Everybody knows that hospitals are the safest place in the world in a time of war, but...
Nov 1, 20163 min read
Issues with Designating Election Infrastructure as Critical Infrastructure
By Daniel Patrick Shaffer Critical Infrastructure and the Power of the Executive Branch Department of Homeland Security Secretary Jeh...
Oct 15, 20165 min read


Danger to U.S. Defense Industry: China’s Monopoly Control of Rare Earths
“Rare earths” refer to seventeen metals found on the periodic table of elements that are important ingredients in some of the most...
Aug 16, 20163 min read
Could Qaddafi’s downfall be the last nail in the coffin for the War Powers Resolution?
As negotiations continue for the surrender of the few cities where deposed tyrant Col. Muammar el-Qaddafi could be hiding, how peaceful...
Aug 16, 20162 min read
The Third Party Records Doctrine and Privacy in the Digital Age and Its Role in National Security
Everyday that passes the expectation of privacy of individuals diminishes. The newest technological crazes revolve around monitoring our...
Apr 30, 20164 min read
Supreme Court Approves Change to Rule 41 Search and Seizure Warrants for Electronic Property
On Thursday, April 28, Chief Justice John Roberts submitted to Congress, the amendments to the Federal Rules of Criminal Procedure that...
Apr 29, 20164 min read
Difficulties in Prosecuting Islamic State Members Under International Law
Since its emergence in 2013, The Islamic State has used increasingly violent tactics in an attempt to establish a worldwide caliphate.[i]...
Apr 28, 20165 min read
Loudspeakers: The Winning Strategy Against North Korea? Part II
Beginning of this year, South Korea and North Korea began shouting at each other again. It was just last August when the escalated...
Apr 28, 20163 min read
Stopping Terrorism at the Border
Are the U.S. borders the last stop before both foreigners and citizens are entitled to the constitutional rights generally afforded to...
Apr 18, 20163 min read
Cell Site Simulator Technology Violating Fourth Amendment Rights
In the age of modern technology, the balance between individuals’ privacy rights and national security have been heavily weighed....
Apr 18, 20164 min read
Donald Trump, Illegal Orders, and the Law of Armed Conflict
During the course of the current Republican Primary campaign, Donald Trump has made a number of jarring comments regarding American armed...
Apr 18, 20165 min read
Constitutionality of the No Fly List
For over ten years the federal government has used the No Fly List to ensure that individuals are barred from flying on U.S. airlines or...
Apr 18, 20167 min read
United States Sanctions on Iran after the Nuclear Deal
The Iran Nuclear Arms Deal is a landmark, but this deal has been heavily criticized due to the United States economic penalties toward...
Apr 11, 20163 min read
National Security v. International Law in the Wake of the Paris and Brussels Attacks
By Ayat Mujais After the recent terror attacks on Brussels and Paris, there has been a push from numerous nations, such as the United...
Mar 28, 20164 min read
The Intersection of “Internet Terrorism” and “Individual Privacy” in the Context of the First Amendm
“Deterring Russia, channeling growing Chinese power, and working with others to dismantle the Islamic State are daunting challenges — but...
Mar 27, 20163 min read
The Slippery Slope of Creating an iPhone Backdoor
By Gregory Coutros The FBI’s request that Apple provide an electronic backdoor into the iPhone used by the San Bernardino shooters is, on...
Mar 27, 20163 min read
bottom of page


