I'm a graduate researcher studying national security law and technology policy at the University of Texas.
This is my personal website where I use data science to analyze security policy.
After winning a grant from the Department of Defense, I launched a research project at the University of Texas that maps the legal environment for cyber operations in the Indo-Pacific. I'm excited about our team and what we will accomplish this year.
State and federal transportation agencies are deploying "smart" infrastruture to improve safety and decrease congestion. These technologies rely on communication between infrastructure and vehicle that proponents say preserves the anonymity of individual drivers.
Can smart infrastructure track your trips along public roads?
Cryptography is perhaps the most important tool that we have to protect our information. It relies on very complex mathematical operations. But as technology develops, unraveling those operations becomes easier. Crypto has to develop itself to keep pace. In this post, I look at several different hash algorithms to see how they perform.
How easy is it to crack a password?
In recent years, Texans endured catastrophic failures of their power grid, hazardous chemical fires, persistent drought, and a crippling pandemic. But the state is also experiencing record migration and an economic boom.
How will its infrastructure deal with a future of both greater demand and greater uncertainty?
An Austin police officer recently shot and killed Rajan Moonesinghe while he was standing on his front porch. The tragedy refocused attention on Austin's history of police-involved killings.
Is Austin's struggle with police killings unique?
There is mounting evidence that China, acting both officially and through proxies, is offering training sessions in authoritarian techniques to foreign governments. Use this dashboard to explore these Chinese state-backed training sessions.
Russia's War in Ukraine offers a rare glimpse into the value tanks provide in a modern, conventional war. But the number of tanks destroyed, in light of how much they cost, provokes questions about their value.
Are tanks obsolete on the modern battlefield?
How does technological progress affect crime and conflict? Use this interactive web application to see for yourself.
Demographic trends and modernization have implications for intelligence collection and organized crime. Technology adoption in Africa deserves attention.
How can policy use market forces to increase private investment in cybersecurity?