Monthly Archives: September 2014

Part 3 – The Digital Threat & Cyber Warfare

The Digital Threat The frequency and sophistication of intrusions into government and civilian institutions has increased over the past ten years.(7) Everyday networks across the Internet are scanned and probed thousands of times.(8) Every year Verizon Wireless and the US … Continue reading

Posted in Part 3 | Tagged , , , , , , | Leave a comment

Part 3 – Social Media

The utilization of mobile Internet devices, thanks to new application environments and mobile Internet browser technologies, has opened the door for Software-as-a-Service (SaaS) to change peoples lives. This combination serves the personal and professional needs on devices that are rarely … Continue reading

Posted in Part 3 | Tagged , , , , , | Leave a comment

Park 3 – Background, Smart Phones, and Tablets

  Background Since the Internet became popular in 1994 due to increased access and computing capabilities, the initial thoughts on its long-term contribution to society were vast and distinctly different. As computing power increased, data storage costs decreased, and high-speed … Continue reading

Posted in Part 3 | Tagged , , , , , , | Leave a comment

Part 3 – Introduction and Specific Aims

If this is the information age, is our information sufficiently secure from theft and illicit use? Since 2005, hundreds of millions of digital records have been stolen in approximately 2500 reported data breaches.(1) If this is the Information Age, is … Continue reading

Posted in Part 3 | Tagged , , , , | 5 Comments

Part 2 – Freedom of The Press

“This is the most closed, control-freak administration I’ve ever covered.” (288) – David Sanger, Chief Washington Correspondent for New York Times “The greatest enemy of press freedom that we have encountered in at least a generation.” (289) – James Risen, … Continue reading

Posted in Part 2 | Tagged , , , , | 1 Comment

Part 2 – What’s Next and The Battle of Ideas

“This is the most transparent administration in history” (286) -Barack Obama February 14, 2013 Information is power.  With non trivial changes over time in information communications technologies, we are at a point in history where private corporations know more about … Continue reading

Posted in Part 2 | Tagged , , , , , | 2 Comments

Part 2 – Conclusion

It is of paramount importance for the human race to understand the true nature of its technologies that come in the form of governance and rule of law.  The debate over decades regarding governmental regulation of the development of new … Continue reading

Posted in Part 2 | Leave a comment

Part 2 – How Important is “Trust” in Economic, International, and Constitutional Law?

Our Distrust is very expensive. – Ralph Waldo Emerson On September 23, 2013 the Secretary General for the Organization for Economic Co- operation and Development (OECD) stated at a conference that public trust is one of the most precious assets … Continue reading

Posted in Part 2 | Tagged , , , | Leave a comment

Part 2 – Harvard Law Review – Anonymous Arguments against the 4th Amendment

The Harvard Law review is one of the few law reviews that will still publish articles anonymously. Most law reviews have moved away from this practice for varying reasons, the ones that still do appear to do so out of … Continue reading

Posted in Part 2 | Tagged , , , , , , , , , , , | Leave a comment

Part 2 – The Modern Communist Manifesto – “The Constitution in 2020”

The movement by primarily liberal legal scholars that advocates for new interpretive methods of the Constitution and the notion of “Positive Rights” is generally referred to as ‘Democratic Constitutionalism’.(130) This movement came into more serious focus in 2005 at an … Continue reading

Posted in Part 2 | Tagged , , , , , , , , , , , , , , , , | 3 Comments