Author Archive

Privacy and Genetic Genealogy Sites

  • June 30, 2021
  • Clayton Rice, K.C.

Investigative genetic genealogy is a technique used by law enforcement to identify suspects in criminal investigations. It involves uploading a crime scene DNA profile to one or more genetic genealogy databases with the object of identifying a suspect’s relatives and,…

The Colonial Pipeline Cyberattack

  • May 30, 2021
  • Clayton Rice, K.C.

On May 7, 2021, Colonial Pipeline Co. sustained a ransomware cyberattack disabling the computerized equipment that manages its pipeline. The pipeline carries gasoline, diesel and jet fuel from Texas to New York and services much of the eastern seaboard. It…

Cyberespionage and the New Hacktivism

  • April 30, 2021
  • Clayton Rice, K.C.

Cyberespionage is the act of obtaining information from individuals, governments and private-sector entities without permission for political or military advantage. In the cyber universe espionage involves access to computers or networks for a strategic gain. It is distinct from cyber…

Privacy and Aerial Surveillance

  • March 15, 2021
  • Clayton Rice, K.C.

Aerial surveillance includes monitoring by drones, unmanned aircraft and surveillance planes operated by human pilots. The concern about the privacy implications arising from the warrantless use of aircraft to take photographs and videos has increased over the last year with…

Dancing With Killer Robots

  • February 28, 2021
  • Clayton Rice, K.C.

Lethal autonomous weapons are a type of robot that can independently search out and engage targets without meaningful human control. They are also called lethal autonomous weapon systems (LAWS), lethal autonomous robots (LAR) and autonomous weapons systems (AWS). The international…

Page 20of 59: 1 ... 18 19 20 21 22 ... 59