Menu

Blog

Archive for the ‘law’ category: Page 84

Mar 20, 2016

Self-driving Cars and an Underappreciated Impact They Will Bring

Posted by in categories: business, law, robotics/AI, transportation

The momentum of self-driving cars on the road is accelerating with the question clearly becoming “when” not “if” the widespread use of self-driving cars will be allowed. A 2015 Business Intelligence Report forecasts a compounded annual growth rate of 134% from 2015 to 2020 with at least 10 million cars on the road by 2020.

2016-03-15-1458064694-2801158-drivelesscarsgraph.png

This should not come as a surprise, the descriptors for a car are heavily technology based with the importance of the car’s brains (software) rivaling its brawn (styling). Cars are already equipped with the ability to conduct specific tasks with varying degrees of driver interaction such as fully autonomous emergency breaking and semi-autonomous driver assisted parallel parking that are performed more adroitly — and safely — then the vehicle is operated by the driver. But the narrative of the self-driving car isn’t evolutionary but thought of as leapfrogging breakthroughs. Perhaps what has painted the imagery with futuristic color is the vocabulary of artificial intelligence. Fully autonomous driverless cars such as Google’s use an artificial intelligence system to pilot the car. In February the National Highway Traffic Safety Administration posted on its website that it informed Google that the artificial intelligence system pilot in a self-driving Google car could be considered the driver under federal law.

Continue reading “Self-driving Cars and an Underappreciated Impact They Will Bring” »

Mar 16, 2016

The 21st century Star Wars — By Dr Patricia Lewis | The World Today

Posted by in categories: governance, government, law, policy, satellites, security, space, transparency, treaties, weapons

Cover pic_0

“Modern life relies on satellite sytems but they are alarmingly vulnerable to attack as they orbit the Earth. Patricia Lewis explains why defending them from hostile forces is now a primary concern for states”

Read more

Mar 14, 2016

EU justice ministers defined cyber crimes as terrorism

Posted by in categories: biotech/medical, cybercrime/malcode, government, internet, law

EU Justice Ministers Claims Cyber Attackers are terrorists. I wouldn’t say all of them are terrorists. Those who attack hospitals, attack government infrastructures, threaten markets, etc, are terrorists. The next door neighbor’s 13 yr old kid hacking to use your wireless internet service; not a terrorist.


European Union justice ministers on March 11th adopted a general approach on the directive on combatting terrorism, including serious cyber crimes, informs LETA/BNS.

On Friday the council greed its negotiating position on the proposal for a directive on combatting terrorism. The proposed directive strengthens the EU’s legal framework in preventing terrorist attacks by criminalising preparatory acts such as training and travel abroad for terrorist purposes – hence addressing the issue of foreign fighters – as well as aiding and abetting, inciting or attempting such acts. It also reinforce rules on the rights for the victims of terrorism, the Ministry of Justice said.

Continue reading “EU justice ministers defined cyber crimes as terrorism” »

Mar 9, 2016

Apple Says the NSA Should Hack San Bernardino Terrorist’s iPhone

Posted by in categories: business, cybercrime/malcode, electronics, encryption, government, law, mobile phones, privacy

Let’s just hypothesize a little on this topic: let’s say Apple goes ahead and gives in to the US Government and enables government to access the phone’s info. Does Apple have any protection in the future from lawsuits from it’s customers in situations where their own customers information is hacked by criminals and published to the world or used for illegal activities? Because I do see in the future more lawsuits coming at the tech companies for not ensuring their platforms and devices are un-hackable. So, if the government has its way; what protections does tech have now with any future lawsuits by consumers and other businesses?


His comments come during the ongoing legal battle over an iPhone used by Syed Farook, one of the individuals responsible for the San Bernardino, Calif. mass shooting December 2. “I don’t think requiring backdoors with encryption is either going to be an effective way to increase security or is really the right thing to do for just the direction that the world is going to”.

This is because First Amendment treats computer code as speech and according to Apple, meeting the demands of the government would be equivalent to “compelled speech and viewpoint discrimination”.

Continue reading “Apple Says the NSA Should Hack San Bernardino Terrorist’s iPhone” »

Mar 7, 2016

Crowdsourcing The Hyperloop: How A Group Of Redditors Are Taking On Elon Musk’s Challenge

Posted by in categories: Elon Musk, engineering, law, sustainability, transportation

VideoDisclaimer: The author of this article, Jason Belzer, is a member of rLoop and serves as the non-profit’s legal counsel. When billionaire entrepreneur Elon Musk proposed the Hyperloop — a futuristic transportation system capable of propelling passengers to supersonic speeds — back in 2013, it is unlikely that even he could have imagined that just a few years later his vision would be tantalizing close to reality. Yet ironically, Musk, who has helped build companies like Tesla Motors and SpaceX that are on the leading edge of technological innovation, will not receive the credit if the Hyperloop indeed becomes a reality. Instead, that honor will be bestowed upon on a small group of teams now working feverishly to construct a prototype that will be tested this summer at SpaceX headquarters in California.

Imagine tackling one of the most complex engineering projects in the history of the human race, requiring countless hours of collaboration and experimentation by some of the world’s most talented engineers, and never actually meeting the people you are working with in a physical setting. You might think it’s impossible, or you might be a member of rLoop — the only non student team to reach the final stage of the SpaceX Hyperloop Pod Competition.

rLoop V6 3AM.259 - Final

Continue reading “Crowdsourcing The Hyperloop: How A Group Of Redditors Are Taking On Elon Musk’s Challenge” »

Mar 5, 2016

Rise in cyber risk leads to jobs boost

Posted by in categories: cybercrime/malcode, employment, internet, law

Big money in hacking law firms. Hackers being hired and paid by parties in suits, companies in acquisition, etc.


The growing influence of the internet in law has opened up a wealth of opportunities for cyber law specialists, according to cyber law expert Bradley Deacon.

Continue reading “Rise in cyber risk leads to jobs boost” »

Mar 1, 2016

Autonomous Killing Machines Are More Dangerous Than We Think

Posted by in categories: cybercrime/malcode, drones, ethics, law, military, policy, robotics/AI

I see articles and reports like the following about military actually considering fully autonomous missals, drones with missals, etc. I have to ask myself what happened to the logical thinking.


A former Pentagon official is warning that autonomous weapons would likely be uncontrollable in real-world situations thanks to design failures, hacking, and external manipulation. The answer, he says, is to always keep humans “in the loop.”

The new report, titled “ Autonomous Weapons and Operational Risk,” was written by Paul Scharre, a director at the Center for a New American Security. Scharre used to work at the office of the Secretary of Defense where he helped the US military craft its policy on the use of unmanned and autonomous weapons. Once deployed, these future weapons would be capable of choosing and engaging targets of their own choosing, raising a host of legal, ethical, and moral questions. But as Scharre points out in the new report, “They also raise critically important considerations regarding safety and risk.”

Continue reading “Autonomous Killing Machines Are More Dangerous Than We Think” »

Feb 24, 2016

Cyber Security: How to Protect Your Firm and its Clients

Posted by in categories: biotech/medical, cybercrime/malcode, law

Law Firms are prime targets for hackers.


Law firms are considered by many hackers to be soft targets with a wealth of valuable information. Data from social security numbers, credit cards, and client confidences is enough to make the criminal mind salivate with malicious intent. Between 31–45% and 10–20% of firms have been infected by spyware or experienced security breaches respectively. But what can a private practitioner or law firm do to prevent these trespasses on their networks?

Continue reading “Cyber Security: How to Protect Your Firm and its Clients” »

Feb 23, 2016

Calif.‘s Harris Outlines ‘Reasonable’Data Security

Posted by in categories: business, cybercrime/malcode, internet, law, policy, quantum physics

I wish the CA AG a lot of luck; however, her approach is very questionable when you think about downstream access and feed type scenarios. Example, Business in Boston MA has an agreement with a cloud host company in CA, and Boston also has data that it pulls in from Italy, DE, etc. plus has a service that it offers to all of users and partners in the US and Europe that is hosted in CA.

How is the CA AG going to impose a policy on Boston? It can’t; in fact the business in Boston will change providers and choose to use someone in another state that will not impact their costs and business.

BTW — I didn’t even mention the whole recent announcement from China on deploying out a fully Quantum “secured” infrastructure. If this is true; everyone is exposed and this means there is no way companies can be held accountable because US didn’t have access to the more advance Quantum infrastructure technology.

Continue reading “Calif.‘s Harris Outlines ‘Reasonable’Data Security” »

Feb 18, 2016

Cyber Threat Information Sharing Guidelines Released

Posted by in categories: cybercrime/malcode, law

Finally; it’s a start at least.


This week, the Federal government took the first steps toward implementation of the The Cybersecurity Information Sharing Act (CISA), enacted into law last December. CISA aims to encourage sharing of cyber threat indicators and defensive measures among private companies and between the private sector and the Federal government by providing liability protection for sharing such information in accordance with the Act. The DHS Federal Register notice was published this morning here.

As required by the Act, the government has released four pieces of guidance designed to assist companies and Federal agencies with respect to sharing, receiving and handling cyber threat information.

Read more

Page 84 of 91First8182838485868788Last