Archives

Archive for February, 2011

BSA, ITI, and TechAmerica Oppose Effort to Strip Funding for Trusted Identities in Cyberspace

ag-IP-news Agency, a member of Talal Abu-Ghazaleh Organization, reports in an article dated February 20, 2011, that Business Softwar Alliance (BSA) has joined TechAmerica and the Information Technology Industry Council (ITI) "in urging Congress to support development and implementation of trusted identities online."  According to ag-IP-news Agency, "the Business Software Alliance is the world's foremost […]

Comments Off on BSA, ITI, and TechAmerica Oppose Effort to Strip Funding for Trusted Identities in Cyberspace

DoD: Military Must Be Capable Within ‘Cyber’ Domain

In an article by George V. Hulme, dated February 16, 2011, NetworkWorld reports that the "Department of Defense is set to soon complete a new cyber security strategy that will explicitly recognize cyberspace as a new and official warfare domain." The new strategy, "Cyber 3.0" will charge the military with "defending government networks just as […]

Comments Off on DoD: Military Must Be Capable Within ‘Cyber’ Domain

Microsoft Has a Change of Heart on How to Keep Internet Safe

Robert McMillan of PCWorld, reports in an article dated February 15, 2011, that Scott Charney, Microsoft's Corporate Vice President for Trustworthy Computing, has changed his mind about who should lead the charge in keeping "sick" computers from infecting the Internet.  I've pulled the actual text of Scott Charney's presentation from Microsoft's site – all quoted […]

Comments Off on Microsoft Has a Change of Heart on How to Keep Internet Safe

Lynn: NATO Must Get Ahead of Cyber Threat

By Jim GaramoneAmerican Forces Press Service BRUSSELS, Belgium, Jan. 25, 2011 – Now is the time for NATO to get ahead of the cyber threat, Deputy Defense Secretary William J. Lynn III said here today. “The cyber threat is still maturing,” he told reporters at the European Defense Agency. “I don’t think we’re at the […]

Comments Off on Lynn: NATO Must Get Ahead of Cyber Threat

What Should the Department of Defense’s Role in Cyber Be?

Right now, as I type this on Friday, February 11, 2011,  the House Armed Services Committe Subcommittee on Emerging Threats and Capabilities is holding a hearing entitled, "What Should the Department of Defense’s Role in Cyber Be?"  The subcommittee's page includes copies of submitted testimony as well as video of the hearing.  Witnesses include: Shari L. Pfleeger […]

Comments Off on What Should the Department of Defense’s Role in Cyber Be?

Proposal for Cyber War Rules of Engagement

In an article by Susan Watts, of BBC Newsnight, published February 3, 2011, it appears that cyber security and specific rules of engagement in dealing with a cyber attack will, for the first time, be considered at this year's annual Munich Security Conference.   "The world needs cyber war 'Rules of Engagement' to cope with […]

Comments Off on Proposal for Cyber War Rules of Engagement

U.S. Has Secret Tools to Force Internet on Dictators

On February 7, 2011, CNN.com posted an article by Spencer Ackerman of WIRED, which highlighted the potential tools at the United States' disposal in the event of another Egypt-like Internet shutdown.   Aside from politely asking a nation's ruler to restore connectivity, "the American military does have a second set of options, if it ever […]

Comments Off on U.S. Has Secret Tools to Force Internet on Dictators

A Primer On The Government’s ‘Private Internet’ – NPR

Here is a quick (2 minute) story from National Public Radio (NPR) dated 10/29/10 explaining the Secret Internet Protocol Router Network — or SIPRNET — from which it is believe the Wikileaks cables were stolen.  Security expert Bruce Schneier explains that it is the same technology as the Internet but is a separate network.  Also mentioned […]

Comments Off on A Primer On The Government’s ‘Private Internet’ – NPR

Editorial: Obama and the Internet Pharaoh

In an editorial appearing in the Washington Times on February 4, 2011, the writer criticizes the Obama Administration's National Strategy for Trusted Identities in Cyberspace ("NS-TIC"), as well as the federal government overall for recent attempts to grant "a White House cyberczar [what the writer calls] Mubarak-like power to declare an emergency and issue directives […]

Comments Off on Editorial: Obama and the Internet Pharaoh

Negotiations Over New Zealand’s IGovt Identity Plan

Tom Pullar-Strecker, of Stuff.Co.NZ, an online news agency, reports in an article published February 7, 2011, that the New Zealand Government is working with NZ Post (New Zealand's postal service) "to promote its $122 million iGovt identity system, which may now be mirrored in the United States by the Obama Administration."  Internal Affairs – the […]

Comments Off on Negotiations Over New Zealand’s IGovt Identity Plan

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

is 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories