The Food and Drug Administration (FDA) is a United States agency responsible for regulating medical devices among other functions. The regulation process entails a lengthy pre-market process that looks at pre-clinical trials, clinical trials, the warehouse in which the device is manufactured, ethics behind the device, and more. When it comes to the device…
When Project Mayhem won the DARPA Grand Challenge in 2014, the project lead from Carnegie Mellon, Dr. David Brumley, writing on his team’s success, quoted DARPA program director Mike Walker saying the program was just the ““beginning of a revolution” in software security.” What could be better than an AI white hat hacker finding…
The tech world has been rocked by the revelations of a more efficient and less expensive LLM created by the Chinese company DeepSeek. The revelations of the new model led to a single day $1 trillion loss on the U.S. Nasdaq 100. DeepSeek avoided U.S. microchip sanctions by training on the lower tier Nvidea…
Pakistan presents a critical case study in digital surveillance and privacy rights within emerging democracies. An evolving framework of digital surveillance and censorship laws in Pakistan increasingly constrain personal rights to privacy and freedom of speech. Pakistan’s unique placement as a post-colonial emerging democracy offers a study of how emerging democracies adapt to the…
I am not a Luddite. Unlike English textile workers who fought the industrialization of manufacturing in the early 19th century, I generally embrace technology. In many ways, I consider myself to be a futurist and a leading-edge adopter of different forms of technology. I am a technically competent professor of political science; I have…
In early October, I had the privilege of attending The Class of 1971 Student Conference on U.S. Affairs (SCUSA) at the United States Military Academy. This year marked the 75th anniversary of the conference since its inception in 1949. From the beginning, SCUSA has provided a unique opportunity for collaboration between more than 200…
The Russia-affiliated ransomware group LockBit has become the most prolific ransomware of the modern day in part due to their Ransomware-as-a-Service (RaaS) model. Ransomware groups that use RaaS offer ransomware on dark web marketplaces to be used by attackers in exchange for some of the attackers’ profits.
Last month I took part in the “Cyber Conflict: Lessons from the Indo-Pacific” workshop hosted at the Lee Kuan Yew (LKY) School of Public Policy at the National University of Singapore alongside Dr. Aaron Brantly. This workshop brought together scholars, policymakers and cyber security experts to address important cyber challenges in the Indo-Pacific region.…
The U.S. election is over, and Americans voted for Donald Trump to take the reins of the country for the next four years. President Trump’s election implications for policy areas ranging from immigration to the environment and nearly everything in between. Yet one area that will impact everyone nationally will be the relationship between…
Amidst the ever-evolving landscape of cyberspace, policies seeking to regulate and maintain digital rights at the state and supranational levels remain largely the same. The European Union’s approach to data and surveillance presents two different regulatory approaches to cyber capabilities. The General Data Protection Regulation (GDPR) regulates its consumers through data protection standards.[1] The…