The document discusses concerns around the increasing use of drones for surveillance purposes by law enforcement and government agencies. It argues that drones threaten privacy and constitutional rights like the 4th amendment protection against unreasonable searches. Drones are proliferating rapidly, with thousands already in use by the military and many more expected over the next few decades. As drone use expands, laws have not kept pace and require updates to prevent potential privacy violations and govern how data collected by drones can be used. The document raises questions over who is accountable for drone data and whether it is ethical to allow machines to decide when to use lethal force.
A lot has happened since the last Cyberwar presentation was posted. This Update2010 includes Iranian cyberwar, South Korea and US Gov attacks, Twitter outage, and the China Google attacks
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can
assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises
severe privacy concerns. In this paper, we have discussed this complex information technology issue of
governmental wiretapping and how it effects both public and private liberties. Legislation has had a
major impact on the uses and the stigma of wiretapping for the war on terrorism. This paper also
analyzes the ethical and legal concerns inherent when discussing the benefits and concerns of
wiretapping. The analysis has concluded with the effects of wiretapping laws as they relate to future
government actions in their fight against terrorists.
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
Cyber Espionage: The Silent Crime of Cyberspace
Virginia Greiman
Boston University, Boston, USA
[email protected]
Abstract: In recent years, the disclosure of secrets through cyber infiltration of America’s largest intelligence organization,
the National Security Agency (NSA), has raised the fears of veteran intelligence officials and close allies around the globe that
no institution or government is secure from those who roam the discrete halls of cyberspace. Although espionage has existed
since before the days of the Greek mythological Trojan horse, no one could have envisioned the sophisticated use of
espionage in today’s networked world. Espionage has been used for political and military intelligence and economic and
industrial pursuits with a lack of understanding of all of the impacts on our daily lives. In the context of foreign or international
law, espionage is sometimes characterized as lawless, without controls or regulation, and it rarely distinguishes between
economic and security based cyber espionage. Through empirical analysis this paper explores the treatment of espionage
under various legal systems including those countries and regions considered the most advanced at cyber espionage, the
United States, the United Kingdom, Russia and China. To provide greater insight into the different perspectives of cyber
espionage from a legal standpoint, this paper distinguishes the law of national intelligence collection from the criminal laws
of economic/industrial espionage on the domestic front. The purpose of this research is to analyze the development of cyber
espionage as a preferred means of contemporary warfare, as well as a tool for economic and political intelligence. The paper
concludes by responding to the challenges faced by nation-states in the development of an effective legal system governing
espionage at the domestic and international level.
Keywords: cyber espionage, cybercrime, foreign surveillance, national intelligence, economic espionage, cyber warfare
1. Introduction
Although many countries all over the world are committing cyber espionage, the United States, Russia, and China
represent the most sophisticated cyber spying capabilities (Senate, 2014). A 2011 Report by the Office of the
National Counterintelligence Executive (ONCIX) suggested that the rise of cyberspace as a platform for
innovation and storage of trade secrets was greatly enhancing the risks faced by American firms. The report also
found that the United States remains the prime target for foreign economic collection and industrial espionage
by virtue of its global technological leadership and innovation (ONCIX, 2011).
Cyber espionage has also become an accepted and even preferred means of warfare. That is not to say that
cyber espionage will replace traditional means of warfare, but it is already affecting the nature of nation-state
conflict. Dunn Cavelty (2012) suggests that this shift began with the Cold War ...
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
ECON 202 Written Assignment
Due April 28th Submitted through Blackboard
Topic: You can choose a business or industry that has been impacted by COVID 19. I want you to write a 2 page paper on how you think the pandemic has effected the business and the impact on society. I want you to relate the topic to the economic effects on the society. This will require you to use the terms we have learned and relate the economic principles we have studied in class.
When I say 2 pages I MEAN content of 2 pages. Do not put your name, class section, or any other info at the top or bottom of the page. I will know who it is when you submit it in blackboard, but, if you want to put that information on your paper, Do A Title Page! Use double spacing and a font of 14 for your paper.
The rubric is:
Economic termsuse a minimum of 15 @ 2points each 30 points
Length of paper minimum of 2 pages, 5 paragraphs 10 points
Content of paper is your paper logical, did you present an
Economic position, is it relevant to society? 10 points
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The Cyber Domain
Metcalf, Andy, USMC;Scott, Dan
Marine Corps Gazette; Aug 2015; 99, 8; ProQuest
pg. 57
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Cyber Espionage: The Silent Crime of Cyberspace
Virginia Greiman
Boston University, Boston, USA
[email protected]
Abstract: In recent years, the disclosure of secrets through cyber infiltration of America’s largest intelligence organization,
the National Security Agency (NSA), has raised the fears of veteran intelligence officials and close allies around the globe that
no institution or government is secure from those who roam the discrete halls of cyberspace. Although espionage has existed
since before the days of the Greek mythological Trojan horse, no one could have envisioned the sophisticated use of
espionage in today’s networked world. Espionage has been used for political and military intelligence and economic and
industrial pursuits with a lack of understanding of all of the impacts on our daily lives. In the context of foreign or international
law, espionage is sometimes characterized as lawless, without controls or regulation, and it rarely distinguishes between
economic and security based cyber espionage. Through empirical analysis this paper explores the treatment of espionage
under various legal systems including those countries and regions considered the most advanced at cyber espionage, the
United States, the United Kingdom, Russia and China. To provide greater insight into the different perspectives of cyber
espionage from a legal standpoint, this paper distinguishes the law of national intelligence collection from the cr ...
Our unstable world has left many American’s to consider the costs and benefits of national security and civil rights. This paper briefly reviews the States Secret Privilege, Foreign Intelligence Surveillance Act (FISA), and The Patriot Act. In response to the attacks to our financial capital in New York and our nation’s defense department, The Patriot Act was enacted. These expansive powers granted to protect our security are examined in terms of how the impact upon potential limitations to our Constitutional Rights.
A lot has happened since the last Cyberwar presentation was posted. This Update2010 includes Iranian cyberwar, South Korea and US Gov attacks, Twitter outage, and the China Google attacks
THE ETHICAL DILEMMA OF THE USA GOVERNMENT WIRETAPPINGZac Darcy
USA Government wiretapping activities is a very controversial issue. Undoubtedly this technology can
assist law enforced authority to detect / identify unlawful or hostile activities; however, this task raises
severe privacy concerns. In this paper, we have discussed this complex information technology issue of
governmental wiretapping and how it effects both public and private liberties. Legislation has had a
major impact on the uses and the stigma of wiretapping for the war on terrorism. This paper also
analyzes the ethical and legal concerns inherent when discussing the benefits and concerns of
wiretapping. The analysis has concluded with the effects of wiretapping laws as they relate to future
government actions in their fight against terrorists.
Anger swells after NSA phone records collection revelationstrupassion
The scale of America's surveillance state was laid bare on Thursday as senior politicians revealed that the US counter-terrorism effort had swept up swaths of personal data from the phone calls of millions of citizens for years.
After the revelation by the Guardian of a sweeping secret court order that authorised the FBI to seize all call records from a subsidiary of Verizon, the Obama administration sought to defuse mounting anger over what critics described as the broadest surveillance ruling ever issued.
Cyber Espionage The Silent Crime of Cyberspace Virginia GOllieShoresna
Cyber Espionage: The Silent Crime of Cyberspace
Virginia Greiman
Boston University, Boston, USA
[email protected]
Abstract: In recent years, the disclosure of secrets through cyber infiltration of America’s largest intelligence organization,
the National Security Agency (NSA), has raised the fears of veteran intelligence officials and close allies around the globe that
no institution or government is secure from those who roam the discrete halls of cyberspace. Although espionage has existed
since before the days of the Greek mythological Trojan horse, no one could have envisioned the sophisticated use of
espionage in today’s networked world. Espionage has been used for political and military intelligence and economic and
industrial pursuits with a lack of understanding of all of the impacts on our daily lives. In the context of foreign or international
law, espionage is sometimes characterized as lawless, without controls or regulation, and it rarely distinguishes between
economic and security based cyber espionage. Through empirical analysis this paper explores the treatment of espionage
under various legal systems including those countries and regions considered the most advanced at cyber espionage, the
United States, the United Kingdom, Russia and China. To provide greater insight into the different perspectives of cyber
espionage from a legal standpoint, this paper distinguishes the law of national intelligence collection from the criminal laws
of economic/industrial espionage on the domestic front. The purpose of this research is to analyze the development of cyber
espionage as a preferred means of contemporary warfare, as well as a tool for economic and political intelligence. The paper
concludes by responding to the challenges faced by nation-states in the development of an effective legal system governing
espionage at the domestic and international level.
Keywords: cyber espionage, cybercrime, foreign surveillance, national intelligence, economic espionage, cyber warfare
1. Introduction
Although many countries all over the world are committing cyber espionage, the United States, Russia, and China
represent the most sophisticated cyber spying capabilities (Senate, 2014). A 2011 Report by the Office of the
National Counterintelligence Executive (ONCIX) suggested that the rise of cyberspace as a platform for
innovation and storage of trade secrets was greatly enhancing the risks faced by American firms. The report also
found that the United States remains the prime target for foreign economic collection and industrial espionage
by virtue of its global technological leadership and innovation (ONCIX, 2011).
Cyber espionage has also become an accepted and even preferred means of warfare. That is not to say that
cyber espionage will replace traditional means of warfare, but it is already affecting the nature of nation-state
conflict. Dunn Cavelty (2012) suggests that this shift began with the Cold War ...
ECON 202 Written AssignmentDue April 28th Submitted through BlacEvonCanales257
ECON 202 Written Assignment
Due April 28th Submitted through Blackboard
Topic: You can choose a business or industry that has been impacted by COVID 19. I want you to write a 2 page paper on how you think the pandemic has effected the business and the impact on society. I want you to relate the topic to the economic effects on the society. This will require you to use the terms we have learned and relate the economic principles we have studied in class.
When I say 2 pages I MEAN content of 2 pages. Do not put your name, class section, or any other info at the top or bottom of the page. I will know who it is when you submit it in blackboard, but, if you want to put that information on your paper, Do A Title Page! Use double spacing and a font of 14 for your paper.
The rubric is:
Economic termsuse a minimum of 15 @ 2points each 30 points
Length of paper minimum of 2 pages, 5 paragraphs 10 points
Content of paper is your paper logical, did you present an
Economic position, is it relevant to society? 10 points
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
The Cyber Domain
Metcalf, Andy, USMC;Scott, Dan
Marine Corps Gazette; Aug 2015; 99, 8; ProQuest
pg. 57
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Reproduced with permission of the copyright owner. Further reproduction prohibited without permission.
Cyber Espionage: The Silent Crime of Cyberspace
Virginia Greiman
Boston University, Boston, USA
[email protected]
Abstract: In recent years, the disclosure of secrets through cyber infiltration of America’s largest intelligence organization,
the National Security Agency (NSA), has raised the fears of veteran intelligence officials and close allies around the globe that
no institution or government is secure from those who roam the discrete halls of cyberspace. Although espionage has existed
since before the days of the Greek mythological Trojan horse, no one could have envisioned the sophisticated use of
espionage in today’s networked world. Espionage has been used for political and military intelligence and economic and
industrial pursuits with a lack of understanding of all of the impacts on our daily lives. In the context of foreign or international
law, espionage is sometimes characterized as lawless, without controls or regulation, and it rarely distinguishes between
economic and security based cyber espionage. Through empirical analysis this paper explores the treatment of espionage
under various legal systems including those countries and regions considered the most advanced at cyber espionage, the
United States, the United Kingdom, Russia and China. To provide greater insight into the different perspectives of cyber
espionage from a legal standpoint, this paper distinguishes the law of national intelligence collection from the cr ...
Our unstable world has left many American’s to consider the costs and benefits of national security and civil rights. This paper briefly reviews the States Secret Privilege, Foreign Intelligence Surveillance Act (FISA), and The Patriot Act. In response to the attacks to our financial capital in New York and our nation’s defense department, The Patriot Act was enacted. These expansive powers granted to protect our security are examined in terms of how the impact upon potential limitations to our Constitutional Rights.
In this research paper, I attempt to construct a consistent, malleable conceptualization of the contemporary drone. I draw on a wide variety of academic papers, articles, opinion pieces, and sources - The Intercept, Donna Harraway in the Feminist Studies journal, Pew Research Center etc.
Securing our liberty
Commonweal. 140.12 (July 12, 2013): p5.
Copyright: COPYRIGHT 2013 Commonweal Foundation
http://www.cweal.org/
Listen
Full Text:
Edward J. Snowden, the thirty-year-old former National Security Agency contractor who handed over a treasure trove of classified documents about U.S. government surveillance to the Washington Post and Britain's Guardian, is a hero to some and a traitor to others. He claims to have acted out of a sense of outrage over the NSA's indiscriminate collection of the phone and internet records of Americans, decrying the danger such intrusive government oversight poses to democracy and privacy. Snowden subsequently fled to Hong Kong, and from there to Moscow. His eventual destination appears to be Ecuador, Cuba, or Venezuela.
Snowden's efforts to elude U.S. authorities cast an ambiguous light on his motives; the countries where he has sought refuge are not known for upholding the sort of democratic values he claims to be defending. While demanding accountability from the U.S. government, he appears to be seeking immunity for his own actions. Snowden's purposes and fate, however, should be of secondary concern. However misguided his actions may have been, they have reopened a much-needed debate about the reach and authority of what is often called the National Security State. While defending the NSA programs, even President Barack Obama seems to welcome that debate. "You can't have 100 percent security and also then have 100 percent privacy and zero inconvenience," Obama noted when asked about Snowden's leaks. "We're going to have to make some choices as a society. ... There are trade-offs involved."
Administration officials and members of Congress say the government's extensive surveillance programs are crucial to preventing terrorist attacks, and that Snowden has done real damage to efforts to keep Americans safe. Because almost all the relevant information remains classified, it is difficult to assess that claim. NSA officials have now promised to make public details of some of the dozens of terrorist plots they say the massive data-collection effort, called Prism, has helped thwart. That sort of disclosure is long overdue. Although Prism was approved by the Foreign Intelligence Surveillance Act court and is monitored by the intelligence committees of Congress, many Americans were shocked to learn that the government now stores their phone and internet records for possible use in future investigations. While the government is prohibited from listening to the tracked calls, it uses sophisticated algorithms to trace calling patterns. If a series of related calls seems suspicious, the NSA or FBI then gets a warrant from the FISA court to investigate further. No abuse of those procedures has come to light. Still, the mere existence of such records in the government's hands, information that might easily be exploited for political purposes, should concern every American.
It is axiomatic that fighting clande.
Similar to Targeted Surveillance: Big Brother Takes to the Sky (6)
In a May 9, 2024 paper, Juri Opitz from the University of Zurich, along with Shira Wein and Nathan Schneider form Georgetown University, discussed the importance of linguistic expertise in natural language processing (NLP) in an era dominated by large language models (LLMs).
The authors explained that while machine translation (MT) previously relied heavily on linguists, the landscape has shifted. “Linguistics is no longer front and center in the way we build NLP systems,” they said. With the emergence of LLMs, which can generate fluent text without the need for specialized modules to handle grammar or semantic coherence, the need for linguistic expertise in NLP is being questioned.
हम आग्रह करते हैं कि जो भी सत्ता में आए, वह संविधान का पालन करे, उसकी रक्षा करे और उसे बनाए रखे।" प्रस्ताव में कुल तीन प्रमुख हस्तक्षेप और उनके तंत्र भी प्रस्तुत किए गए। पहला हस्तक्षेप स्वतंत्र मीडिया को प्रोत्साहित करके, वास्तविकता पर आधारित काउंटर नैरेटिव का निर्माण करके और सत्तारूढ़ सरकार द्वारा नियोजित मनोवैज्ञानिक हेरफेर की रणनीति का मुकाबला करके लोगों द्वारा निर्धारित कथा को बनाए रखना और उस पर कार्यकरना था।
role of women and girls in various terror groupssadiakorobi2
Women have three distinct types of involvement: direct involvement in terrorist acts; enabling of others to commit such acts; and facilitating the disengagement of others from violent or extremist groups.
26052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
27052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
25052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
Future Of Fintech In India | Evolution Of Fintech In IndiaTheUnitedIndian
Navigating the Future of Fintech in India: Insights into how AI, blockchain, and digital payments are driving unprecedented growth in India's fintech industry, redefining financial services and accessibility.
ys jagan mohan reddy political career, Biography.pdfVoterMood
Yeduguri Sandinti Jagan Mohan Reddy, often referred to as Y.S. Jagan Mohan Reddy, is an Indian politician who currently serves as the Chief Minister of the state of Andhra Pradesh. He was born on December 21, 1972, in Pulivendula, Andhra Pradesh, to Yeduguri Sandinti Rajasekhara Reddy (popularly known as YSR), a former Chief Minister of Andhra Pradesh, and Y.S. Vijayamma.
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
Welcome to the new Mizzima Weekly !
Mizzima Media Group is pleased to announce the relaunch of Mizzima Weekly. Mizzima is dedicated to helping our readers and viewers keep up to date on the latest developments in Myanmar and related to Myanmar by offering analysis and insight into the subjects that matter. Our websites and our social media channels provide readers and viewers with up-to-the-minute and up-to-date news, which we don’t necessarily need to replicate in our Mizzima Weekly magazine. But where we see a gap is in providing more analysis, insight and in-depth coverage of Myanmar, that is of particular interest to a range of readers.
Targeted Surveillance: Big Brother Takes to the Sky
1. Targeted Surveillance: Big Brother Takes to the Sky
Various technologies designed to intrude on our privacy and effectively strip us of our
Constitutional Rightsalready exist. So why all the controversy surrounding the use of
drones? Why do they strike such fear in our hearts? Is it fear of ending up on a secret
“terrorist” list and being ruthlessly hunted down by a metallic harbinger of death? Is it a
simple fear of being spied upon by law enforcement agencies that are not required to
uphold the principle of probable cause? Or is it invasion of one’s privacy?
The United States Air Force and other intelligence agencies began developing
drones or Unmanned Aerial Vehicles (UAV) following World War II (Science, 2012). Not
all drones are engaged in spying on or annihilating human beings. Some are extremely
useful in preserving life. Recently, drones have been developed that can spot sharks,
locate lost hikers, monitor crops, gather information from active volcanic craters, and
assess various situations too hazardous to accommodate human investigation.
According to NBC News, the Federal Aviation Administration (FAA) has issued fewer
than 400 permits for drones. The FAA has, however, has been tasked with fully
integrating drones into U.S. airspace by 2015. Most drones currently tested or in use by
Texas law enforcement agencies are very different from large UAVs used by military or
other federal agencies. Police drones are typically smaller and usually flown within sight
of their operator, unlike military drones which are operated remotely, often from
thousands of miles away. Currently, the FAA only allows drone use in urban areas when
life is in “imminent danger” (KTRK, 2013).
2. Al Qaeda hijacked airplanes, turning them into weapons of mass destruction.The Patriot
Act which ensued from these terroristicattacks, continues to expand exponentially and
has given the government the ability to invade our privacy, and even deny us our
constitutional rights and freedoms for a perceived protection from terroristic acts.The
fear of a terrorist lurking behind every bush has allowed the government to invade our
homes and private lives.Where will it end?
Equally alarming, or perhaps even more so, is how targeted use of drones is already
being used in some American cities by law enforcement agencies to illegally obtain
evidence. This is another blatant violation of constitutionally guaranteed Fifth
Amendment Rights as well as Fourth Amendment Rights that require Probable Cause
be established.
Law enforcement agencies across the country have already added drones to their
arsenals. It has even been proposed that no search warrant is necessary to launch one
of thesetiny unmanned vehicles, completely bypassing the judicial system. Police would
have the power to decide if reasonable cause exists. If the current push to strip
Americans of their Second Amendment right to bear arms is successful, how could we
defend ourselves?
Privacy laws are not keeping up with rapidly emerging surveillance technologies.
Although drones are illuminating this issue, it is expected that courts will uphold certain
rights to privacy ensured by the Fourth Amendment. Some believe current laws are
insufficient to protect privacy, but regulating drones is just the tip of the iceberg. The
growing need for greater oversight is painfully evident. Street cameras, recent attempts
2
3. to acquire one’s email and other social media messages, and Google’s mapping vans
are good examples.
A hodge-podge of state laws regulating drone use are beginning to crop up. Several
states, including Texas, are pushing legislation limiting the use of drones and requiring
a warrant be obtained by law enforcement or other governmental agencies before
deployingdrones to collect aerial photography or thermal data as part of a criminal
investigation.Some bills favor excludinglimitation of drones for selected operations such
as search and rescue. United States Representative Ted Poe co-sponsors the
Preserving America Privacy Act,which proposes to mandate governments to obtain
warrants from a court of law before using drones "to collect information that can identify
individuals in a private area". This Act would also prevent drones being equipped with
weapons (Hans, 2013).
A National policy is long overdue and sorely needed to address how drone use may
violateFifth Amendment Rights designed to protect against governmental abuse.Due
process—the right to a trial before being gunned down—is guaranteed to all American
citizens.
This right has already been trampled on by the Obama Administration, which continues
to claim legal authority to attack terroristsuspectsno matter where they are.Recently, an
American citizen was targeted, attacked, and killed by an unmanned aircraft, or drone,
on authority of the United States President. There was no due process,only suspicions
of engaging in terroristic activities against the United States.
3
4. Obama continues to expand his executive powers granted to the President, who has the
right to order strikes against foreign militants actively at war against the United
States(Roth, 2013). He has claimed American citizens abroad not actively engaged in
war against the United States are fair game for a place of honor on his kill list and can
legally be executed.
When did the President gain the power to single-handedly determinethe criteria that
characterizes and establishes one as a terrorist engaged in war against the United
States?Obama insists that America is a “theater of war” and his drone rulesapply. He
boasts that he alone controls the infamous secretive kill list; no one elseknows who’son
it. What we do know is two American citizens, Awlaki and hisminor son, made the kill list
and were subsequently eliminated (Scaliger, 2013). Who else resides on his list, and
how many are next?
Senator Rand Paul is to be commended for his courage in demanding that Obama
must acknowledge he doesn’t have a constitutional right to kill American citizens without
due process. Without first charging them, providing them an attorney, and allowing a
court to determine their guilt in a legal trial.
Has our fear of terrorism changed our society so much we tolerate a dictator? Who
exactly is minding the store? No laws exist on how data is collected, stored, or used.
Who is accountable? Is it ethical to allow a machine to decide whether or under what
circumstances to kill a human being? These questions must be analyzed and the
American public reckoned with.
4
5. Thousands of drones are known to be in use by the American military. How many are
unknown, quietly lurking on American soil, poised for attack, ready to gun down anyone
merely suspected of wrongdoing?The number of drones swarming our skies, whether
the large military type destined to kill or the small police type slated for spying, is
expected to rise to 30,000 or more during next quarter century.(Pinkerton, 2012).Ready
or not, here come the drones.Is one peering through your blinds?
5
6. Works Cited
"The Drones Are Coming ... but Our Laws Aren't Ready -." N.p., n.d. Web. 22 Apr. 2013.
"The Drones Are Coming ... but Our Laws Aren't Ready -." Technology on NBCNews.com.N.p., n.d.
Web. 22 Apr. 2013. <http://www.nbcnews.com/technology/technolog/drones-are-coming-ourlaws-arent-ready-1C9006243>.
Hans, G.S. "Drone Privacy Bills Attempt to Protect Americans from Governmental, Commercial
Surveillance." Center for Democracy & Technology.N.p., 8 Apr. 2013. Web. 04 May 2013.
<https://www.cdt.org/blogs/gs-hans/0804drone-privacy-bills-attempt-protect-americansgovernmental-commercial-surveillance>.
Miller, Greg. "Drone Wars." Science 336 (2012): 842-43. Web.
Pinkerton, J. "Use of Drones in Community Policing 'unchartered Territory'" Houston Chronicle. N.p.,
25 Oct. 2012. Web. 22 Apr. 2013. <http://www.chron.com/news/houstontexas/houston/article/Use-of-drones-in-community-policing-unchartered-3981675.php>.
Roth, K. "What Rules Should Govern US Drone Attacks? | Human Rights Watch." Human Rights
Watch.N.p., 3 Mar. 2013. Web. 22 Apr. 2013. <http://www.hrw.org/news/2013/03/11/whatrules-should-govern-us-drone-attacks>.
Scalinger, C. "Drones Over America." N.p., n.d. Web. 22 Apr. 2013. <New American.com>.
"Texas Grapples with the Rapid Advent of Drones." Texas Grapples with the Rapid Advent of Drones.
N.p., 17 Mar. 2013. Web. 22 Apr. 2012.
<http://abclocal.go.com/ktrk/story?section=news/state&id=9031089>.
6