Lab Blog

The Tech4Humanity Lab blog is comprised of research and general interests posts from lab students and faculty.

  • The Disproportionate Nature of Azerbaijan’s Digital Autocracy: Gendered Targeting Practices

    The Disproportionate Nature of Azerbaijan’s Digital Autocracy: Gendered Targeting Practices

    Digital autocracies leverage invasive technologies to carry out common authoritarian practices that aim to quell dissent, suppress democratic movements, and control their citizens through restricting their internet freedom. Azerbaijan exemplifies this through the documented surveillance of its dissidents. The social landscape of Azerbaijan disproportionately targets women through shame tactics that have transitioned to the…

  • The Cybersecurity, Privacy, and Ethics of EEG-BCI Systems

    The Cybersecurity, Privacy, and Ethics of EEG-BCI Systems

    Neurotechnology, the integration of technology with the nervous system, is an advancing field with potential medical applications by offering individuals with neuromuscular disorders or physical injuries an alternative means of communication beyond traditional verbal speech. One such advancement is the development of an electroencephalography-based brain-computer interface (EEG-based BCI) system, which functions to record and…

  • Investigating Internet Censorship in Rusia

    Investigating Internet Censorship in Rusia

    Internet censorship has long been a controversial issue which involves the selective restriction of information. This could simply be as mundane as upholding copyright laws, but censorship also extends into political repression and human rights violations. Restrictive and authoritarian regimes have been shown to be far more likely to suppress political content to subdue…

  • The History of TOR Usage in Iran

    The History of TOR Usage in Iran

    For as long as the TOR network has existed one of its primary uses has been the circumvention of Internet firewalls run by oppressive regimes. Iran is no exception to this trend, and in as early as 2011 Iran was the 2nd highest country by TOR users.1 There was even a point where TOR…

  • Journalism Targeting on the Dark Web

    Journalism Targeting on the Dark Web

    The Tor network provides unparalleled anonymity to its users. Using anonymity features on top of TCP, The Onion Router has proved useful for moderately low-latency tasks such as web browsing (Borinsov and Goldberg 2008). Tor networks operate through a network of thousands of decentralized, independently run nodes across the world. To connect to the…

  • Bits from Kyiv

    Bits from Kyiv

    Last week I arrived in Kyiv after 48 hours to planes and trains to a rain and snow mix falling on the Kyiv central train station. Men eagerly ran up to the arriving train carriages with flowers in hand to greet wives and girlfriends who had made the journey back to Ukraine. The train…

  • Applications of AI in Healthcare

    Applications of AI in Healthcare

    In the ever-evolving landscape of healthcare, the significance of cybersecurity cannot be overstated, as it plays a pivotal role in both preserving the integrity of services and safeguarding sensitive patient data. With the continuous digitization of healthcare, including the widespread adoption of electronic health records and the integration of new medical devices, the need…

  • The US vs. the EU: A look at the pre- and post-market regulation of medical devices with Medtronic’s pacemaker devices as a case study.

    The US vs. the EU: A look at the pre- and post-market regulation of medical devices with Medtronic’s pacemaker devices as a case study.

    The term “medical devices” is usually used very broadly when referring to a type of technology that helps patients with their health. There are challenges with the categorization of medical devices that might impact their approval process and their availability on the market for patients and providers to use. A slower and more diligent…

  • A Virginia Tech Student’s Experience at SCUSA 74 at the United States Military Academy (West Point)

    A Virginia Tech Student’s Experience at SCUSA 74 at the United States Military Academy (West Point)

    It was a privilege to have been asked to represent Virginia Tech at the 74th Annual Class of 1971 Student Conference on U.S. Affairs – SCUSA 74. This conference has been occurring since 1949 and this year, the class of 1971 graciously donated funds for this event. Since 1949, delegates both nationally and internationally…

  • Fileless Malware: The Tradeoff of Synergy and Security

    Fileless Malware: The Tradeoff of Synergy and Security

    Microsoft Windows is a powerful and long-standing operating system with deep-rooted features that work throughout the system. Windows’ .NET, PowerShell, and Windows Management Instrumentation (WMI) frameworks provide cohesiveness and control, enabling the creation of new features and integration across the system. However, as these systems advance in capabilities and features, malicious actors have more…