Author Archive

The Ethics of Voice Cloning

  • July 17, 2021
  • Clayton Rice, K.C.

Digital cloning is a technology that uses deep learning algorithms to manipulate audio, photographs and videos making it difficult to distinguish what is fake from what is real. Although the technology has been used for beneficial educational purposes, such as…

Privacy and Genetic Genealogy Sites

  • June 30, 2021
  • Clayton Rice, K.C.

Investigative genetic genealogy is a technique used by law enforcement to identify suspects in criminal investigations. It involves uploading a crime scene DNA profile to one or more genetic genealogy databases with the object of identifying a suspect’s relatives and,…

The Colonial Pipeline Cyberattack

  • May 30, 2021
  • Clayton Rice, K.C.

On May 7, 2021, Colonial Pipeline Co. sustained a ransomware cyberattack disabling the computerized equipment that manages its pipeline. The pipeline carries gasoline, diesel and jet fuel from Texas to New York and services much of the eastern seaboard. It…

Cyberespionage and the New Hacktivism

  • April 30, 2021
  • Clayton Rice, K.C.

Cyberespionage is the act of obtaining information from individuals, governments and private-sector entities without permission for political or military advantage. In the cyber universe espionage involves access to computers or networks for a strategic gain. It is distinct from cyber…

Privacy and Aerial Surveillance

  • March 15, 2021
  • Clayton Rice, K.C.

Aerial surveillance includes monitoring by drones, unmanned aircraft and surveillance planes operated by human pilots. The concern about the privacy implications arising from the warrantless use of aircraft to take photographs and videos has increased over the last year with…

Page 19of 58: 1 ... 17 18 19 20 21 ... 58