The Democratization of Big Data

The author explores the origins of “big data” and how the phenomenon was able to spread to a wider audience through parallel technological advances in computer hardware and the open source movement. The article focuses specifically on the progress made by Google related to a series of papers published from 2003 to 2006 that were… Continue reading The Democratization of Big Data

Easier Said than Done: Legal Reviews of Cyber Weapons

Allegations that Stuxnet was part of a U.S. planned and led covert cyber operation and assertions that a nation-state used a cyber-attack in support of national security objectives reinvigorated the attention of cyber-law commentators. Military attorneys, however, must translate deeply theoretical discussions into concrete legal advice. This article concludes that treating all cyber techniques as… Continue reading Easier Said than Done: Legal Reviews of Cyber Weapons

Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources

The cybersecurity risks to the nation’s critical infrastructure and key resources are significant and increasing every day. While a sound legal basis exists for the government to use computer intrusion detection technology to protect its own networks, critical infrastructure and key resources, primarily owned by the private sector, are governed by a different set of constitutional principles and laws. This article… Continue reading Virtual Checkpoints and Cyber-Terry Stops: Digital Scans To Protect the Nation’s Critical Infrastructure and Key Resources