Lab Blog

The Tech4Humanity Lab blog is comprised of research and general interests posts from lab students and faculty.

  • The Legal Right to Privacy: Origins and International Regulation

    The Legal Right to Privacy: Origins and International Regulation

    The concept of privacy is supported by no formal definition despite its popular usage in legal frameworks and the international codification of the “right to privacy”. A multi-faceted approach to the condition of privacy has been detailed by previous work in the lab. The objective of the following writing is to offer insight into…

  • Conceptualizing Privacy

    Conceptualizing Privacy

    The idea of privacy is a convoluted subject evolving alongside technological breakthroughs that have repeatedly reinvented what constitutes an individual’s concept of privacy. This review seeks to characterize primary elements relating to the condition of privacy. Deliberations around the principles of privacy such as autonomy, self-determination, power, and reasonability will be covered. This work…

  • Reflecting on the European Cyber Conflict Research Initiative Forum at Oxford University

    Reflecting on the European Cyber Conflict Research Initiative Forum at Oxford University

                The European Cyber Conflict Research Initiative (ECCRI) is a collective of professionals, scholars, journalists, and government officials within the cybersecurity space that seeks to “promote interdisciplinary research on cyber conflict and statecraft.”[1] Their 2024 Cyber Forum at the Blavatnik School of Government of Oxford University was the first of its kind. The Forum…

  • Exploring Neuralink’s Telepathy: The Future of Brain Implants

    Exploring Neuralink’s Telepathy: The Future of Brain Implants

    Founded in 2016, Neuralink is an American neurotech company focused on both treating human disease through technology and synthesizing human and artificial intelligence. Presently, Neuralink is undergoing human trials for their device, Telepathy, an implant intended to enable individuals with paralysis the ability to control electronic devices with their mind. Although it remains under…

  • Safeguarding Digital Rights in the EU: The Evolving Landscape of Data Protection and Content Moderation

    Safeguarding Digital Rights in the EU: The Evolving Landscape of Data Protection and Content Moderation

    The European Union has made significant strides in protecting digital rights by introducing of comprehensive laws, most notably the General Data Protection Regulation (GDPR) and the proposed Digital Services Act (DSA). The GDPR, which came into effect in 2018, is a far-reaching data protection law that applies to any organization processing the personal data…

  • Understanding Poland’s Spyware Probe

    Understanding Poland’s Spyware Probe

    Poland’s inquiry into the use of mercenary spyware is a groundbreaking initiative towards achieving accountability against the misuse of digital surveillance tools. The probe beginning in early 2024 was founded on allegations by civil society against the former ruling Law and Justice (PiS) Party for the targeting of up to six hundred individuals with…

  • Methods of the Heart: The Vulnerabilities of Rechargeable Pacemakers

    Methods of the Heart: The Vulnerabilities of Rechargeable Pacemakers

    According to Yale University there are over 3 million people in the United States who use pacemakers to prevent or treat too slow, too fast, or irregular heartbeat. Pacemakers are small, implanted battery-powered devices that help regulate the rhythm of the heartbeat. They include electrodes that deliver electrical impulses to one’s heart to make…

  • Case Study: Black Basta Ransomware Operator Group

    Case Study: Black Basta Ransomware Operator Group

    The Black Basta Ransomware Operator group is an infamous organization in the world of cybercrime, known for its ransomware attacks on organizations throughout the world. The group’s efforts showed a significant rise in the complexity and effects of ransomware attacks and how devastating they can be. The Russian-based group reportedly tallied over $107 million…

  • Ransomware Threats on Health Care Services

    Ransomware Threats on Health Care Services

    “Ransomware is a type of malware used by cyber criminals who encrypt files and then extort money in return for unlocking these files”[1]. The ransoms demanded are most often in the form of bitcoin or other forms of cryptocurrency which allow for the sender and demanding party to remain anonymous. In the past, ransomware…

  •  Exploring Ransomware attack trends during the COVID-19 Pandemic in the United States

     Exploring Ransomware attack trends during the COVID-19 Pandemic in the United States

    Covid-19 has had lasting effects on the world with its impact on societal, infrastructure, and political landscapes. One of the more notable consequences has been the increase in ransomware attacks. These attacks are usually targeted toward certain companies, industries, or sectors. Ransomware is a form of malware that is evolving continuously as time goes…