top of page
THE BLOG


Who is Khorasan?
On September 22, the U.S. military expanded its reach to the Islamic State in Iraq and Syria (ISIS) and launched Tomahawk cruise missiles...
Nov 12, 20143 min read
JP Morgan breach and cybersecurity legislation
A recent cyber attack on J.P. Morgan Chase has compromised about 76 million private accounts and several small business accounts[1]. This...
Oct 27, 20144 min read
Germany's Grundgesetz and the NSA
In July, a 31-year old member of the German BND (foreign intelligence service) was arrested under suspicion of offering secret...
Oct 25, 20144 min read
In Defense of Using Force Against Iran's Nuclear Program
Iran’s nuclear weapons program is inextricably linked to the national security of the United States. The program first came under...
Oct 21, 20143 min read
The New Frontier: Cyberspace
We all use it. Â From filing taxes to shopping, the Internet and cyberspace have been deeply entrenched into the every day lives of the...
Apr 3, 20143 min read
Russia's New Eastern Bloc
The recent conflict in Ukraine has brought to light the very real and increasing presence of Russia in its previous satellite states....
Mar 22, 20144 min read
New Year's Resolution
The definition of a word is meant to be a singular idea. Â In the evolution of usage and the blending of disparate cultures, naturally an...
Mar 21, 20144 min read
The Optic Nerve Program Meets the NSA
Three United States Senators and members of the Senate Intelligence Committee are among many Americans who recently discovered that the...
Mar 18, 20143 min read
NSA Leaker Edward Snowden a Traitor?
NSA Leaker Edward Snowden a Traitor? American computer specialist and former National Security Agency (NSA) contractor Edward Snowden,...
Mar 10, 20144 min read
Violation of Privacy or Protection of Citizens?
Being free from unreasonable searches and seizures has always been viewed as part of a fundamental right in our society. Airport...
Mar 9, 20143 min read
Data Vulnerability in the Digital Age
In the past three months alone, tens of millions of people have been victims of data breaches. From the recent Target breach, which...
Feb 26, 20143 min read
Cyber Laundering, Bank Secrecy Act, and terrorist financing
Anti-money laundering laws have traditionally served the purpose of eliminating the profits for he commission of crimes. After September...
Jan 6, 20143 min read
Sequestration, Contingency Operations, and Why America Needs a Marine Corps
On November 10, 1775 while sitting at a local tavern in Philadelphia, Benjamin Franklin witnessed the first of a few volunteers who would...
Dec 20, 20133 min read
UNCLOS-er than ever; why the U.S. should learn to stop worrying and love the law of the sea
Robert Ballard, the oceanographer best known for discovering the wreckage of the RMS Titanic, has embarked on a ten-year project to map...
Dec 19, 20133 min read
Warrantless Wiretapping Fallout Continues
Earlier this year, a Somali-American man, Mohamed Mohamud, was convicted of trying to use a weapon of mass destruction at a Christmas...
Dec 3, 20132 min read
The Quirin Jury-Trial Exception Should be Expanded
The D.C. Circuit is currently debating whether to expand the jurisdiction of military commissions in al Bahlul v. United States. After...
Nov 26, 20133 min read
US-India Economic and Financial Partnership – Combating Terrorist Financing
Last month, US Treasury Secretary Jack Lew announced a new bilateral effort with India to implement international anti-money laundering /...
Nov 19, 20132 min read
Spying for Security or Spying because of Habit?
Pulitzer Prize winning journalists Matt Apuzzo and Adam Goldman recently wrote an AP article stating that continued spying on mosques in...
Nov 17, 20133 min read
Mixed Scorecard for Recent Legal Challenges to Iran Sanctions
Targeted economic sanctions became a central issue during recent negotiations in Geneva over Iran’s nuclear program.  While future...
Nov 12, 20132 min read
Keep Your Friends Close . . .
The recent media circus surrounding the leaking of classified information concerning our National Security Agency (NSA) cell phone...
Nov 11, 20132 min read
bottom of page


