Rachel Choi, Author at NYU Law and NYU Tandon - Page 3 of 3
×
Accessibility
Mobile Menu
September 13, 2017

Equifax Fallout: FTC Launches Probe, Websites and Phones Jammed With Angry Consumers

“In an unusual move, the FTC announced Thursday it had launched a probe into the Equifax data breach, turning up the heat on the credit bureau after it revealed that data on 143 million Americans had been stolen after hackers exploited a months-old computer server bug. “The FTC typically does not comment on ongoing investigations,” Peter […]

August 4, 2017

Trump is trying to politicize intelligence to support his Iran policy. That’s dangerous.

“David S. Cohen served as deputy director of the Central Intelligence Agency and undersecretary of the Treasury for terrorism and financial intelligence during the Obama administration. The relationship between the intelligence community and President Trump surely has been tested in the first six months of this administration. But the president’s reported demand for intelligence to […]

August 4, 2017

A First Legislative Step in the IoT Security Battle

“Despite appearances, there is some important bipartisan work afoot on Capitol Hill. On Aug. 1, Sens. Mark Warner, Cory Gardner, Ron Wyden and Steve Daines dropped the Internet of Things (IoT) Cybersecurity Improvements Act of 2017. The bill seeks to use the federal government’s purchasing power to drive much-needed cybersecurity improvements in internet-connected devices. In addition, […]

July 28, 2017

Help Wanted: Custodians for the Rule of Law

“A version of these remarks were delivered by Lisa Monaco at the University of Chicago Law School Diploma and Hooding Ceremony on June 10, 2017, where she also received the Distinguished Alumna Award.  The author gratefully acknowledges helpful comments from former White House Counsel Bob Bauer and former Legal Advisor to the National Security Council […]

July 8, 2017

Combating a Real Threat to Election Integrity

“Russia’s meddling in the 2016 election may not have altered the outcome of any races, but it showed that America’s voting system is far more vulnerable to attack than most people realized. Whether the attackers are hostile nations like Russia (which could well try it again even though President Trump has raised the issue with President Vladimir […]

June 6, 2017

The Internet Is Where We Share — and Steal — the Best Ideas

“In April, a photograph of Rihanna and Lupita Nyong’o taken at a Miu Miu fashion show three years ago began recirculating online. Their friendly body language and chic clothes (Rihanna wore thigh-highs, fur and leather; Lupita a plum jacket with a jeweled collar) caught the imagination of the internet. A Twitter user named @1800SADGAL suggested […]

June 4, 2017

Bank at Center of U.S. Inquiry Projects Russian ‘Soft Power’

“It has offices in a sleek Manhattan skyscraper. Its bonds are accessible to millions of American investors. And it holds ties to some of New York’s biggest banks. Despite this presence on Wall Street, detailed in previously unreported financial records, Vnesheconombank, or VEB, is no normal bank. It is wholly owned by the Russian state. […]

June 2, 2017

Campaign Finance Law: When “Collusion” with a Foreign Government Becomes a Crime

“Commentary on Russian intervention in the 2016 elections has included one confidently expressed and perhaps growing view: that there may be a scandal there, but no conceivable crime. It is claimed that the Trump campaign could wink and nod at Russian hacking, and derive the full benefit, but that without considerably more evidence of direct […]

May 11, 2017

The Next Front in the U.S. Fight Against ISIS

“More than two years into the American-led campaign against the Islamic State, freeing the cities of Mosul, in Iraq, and Raqqa, in Syria, is within reach. But since the group’s leader, Abu Bakr al-Baghdadi, declared the establishment of its caliphate from the pulpit of a mosque in Mosul in 2014, the Islamic State has claimed […]

May 9, 2017

Attention Team Trump: Globalism works in fighting terror

“Editor’s Note: Lisa Monaco served as White House Homeland Security and Counterterrorism Adviser from 2013-2017. She is now a Distinguished Senior Fellow at New York University Law School’s Center on Law & Security and a CNN Senior National Security Analyst. The views expressed in this commentary are her own.”

April 25, 2017

What is 5G NR?

“While listening to the many excellent technical 5G presentations at the Brooklyn 5G Summit held at NYU Tandon School of Engineering and co-hosted by NYU WIRELESS and Nokia this year, I heard the term 5G NR mentioned. For those of you who are not familiar with 5G NR, it refers to 5G New Radio. Qualcomm commented […]

April 25, 2017

You Really Should Read An App’s Service Terms

“When you install an app on your phone, do you read the terms of service agreement? Probably not. When computer science and engineering professor Justin Cappos of the NYU Tandon School of Engineering describes himself as “pretty paranoid” he not only means he does read those terms-of-service agreements but also often refrains from downloading apps […]

April 18, 2017

Five Years Out: Jeramie Scott ’12 discusses his career in privacy and national security law

“Five years after graduating from law school, Jeramie Scott ’12 serves as national security counsel at the Electronic Privacy Information Center (EPIC) and works on some of today’s most pressing privacy issues. He has helped EPIC file high-profile amicus briefs in the US Supreme Court on issues concerning government surveillance. This has included an amicus […]

April 17, 2017

Former counterterrorism adviser: There are bound to be more cyberattacks

“Chicago (CNN)Russia’s successful incursion into the 2016 presidential election has opened a new, menacing phase in cyberwarfare and is a harbinger of attacks to come, says President Barack Obama’s former top counterterrorism adviser. “We in the United States have … crossed into a new threshold where we have state actors and others trying to use […]

April 10, 2017

That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

“SAN FRANCISCO — Fingerprint sensors have turned modern smartphones into miracles of convenience. A touch of a finger unlocks the phone — no password required. With services like Apple Pay or Android Pay, a fingerprint can buy a bag of groceries, a new laptop or even a $1 million vintage Aston Martin. And pressing a […]

April 4, 2017

Gorsuch’s writings borrow from other authors

“Oxford’s academic guidance for plagiarism states that “paraphrasing the work of others by altering a few words and changing their order, or by closely following the structure of their argument, is plagiarism if you do not give due acknowledgement to the author whose work you are using.” Christopher Sprigman, a New York University law professor […]

March 28, 2017

Days After London Terror Attack, the UK Government Is Already Going After WhatsApp’s Encryption

“After the horrifying terror attack in London last week, the familiar debate over government access to encrypted communications has reared its head again.  This time, Britain’s home secretary Amber Rudd—who deals with security, terrorism, and policing, among other things—pointed the finger of blame at companies that make encrypted communications possible. “We need to make sure […]

March 16, 2017

Quick Take: Zachary Goldman on the US indictment of Russians allegedly behind Yahoo hack

“In a March 15 indictment, the US Department of Justice alleged that two Russian spies working with two criminal conspirators were behind a massive hack that stole data on 500 million Yahoo accounts in 2014. According to the charges, the defendants used some of that stolen information to access to the contents of email accounts […]

January 6, 2017

Inside Cyber Security Awareness Week

Shortly after Election Day, before the interference of Russian hackers became front-page news, a group of thirty-one high-school students gathered at N.Y.U.’s Tandon School of Engineering, in Brooklyn, for Cyber Security Awareness Week. Their mission: to solve a murder mystery involving a fictional Presidential race by analyzing digital “evidence” of security breaches.


Back To Top
Font Resize
Contrast