Archives

Archive for March, 2012

Gen. Hayden’s 5 things to look out for: SATSA

I just got back from SATSA's 8th Annual Conference on National & International Security.  The conference was expertly run, with a great range of panelists that spoke on fascinating topics.  The food was good, too (most importantly). I'm going to focus in one the conference's keynote speaker; it's hard not to.  General Michael Hayden (ret.) […]

Comments Off on Gen. Hayden’s 5 things to look out for: SATSA

Case Based in China Puts a Face on Persistent Hacking: NYT

On March 29th, 2012, Nicole Perlroth reported for the New York Times on the identity of one of China's most persistent hackers.  That hacker is Gu Kaiyuan (who went by the alias "scukhkr"), currently an employee at China's #1 Internet portal company.  Kaiyuan was also a graduate student at Sichuan University, an institution which gets […]

Comments Off on Case Based in China Puts a Face on Persistent Hacking: NYT

Mar 30th, 2012 Cyber Exploitation

Military’s cyber chief backs increased oversight of critical infrastructure: Federal Times

On March 28th, 2012, Nicole Blake Johnson reported for the Federal Times on recent comments by CyberComm/NSA head Gen. Keith Alexander.  Specifically, the General testified that critical infrastructure owners are not even taking simple steps–such as installing updates and patches–to ensure basic cybersecurity.  Seeing that this is the case, the General recommended that privately owned […]

1 comment

Cybersecurity: Selected Legal Issues – CRS

Someone has leaked a March 14, 2012, Congressional Research Service report entitled Cybersecurity: Selected Legal Issues. (Such leaks are a daily occurrence and likely done by a member of Congress, but the institution as a whole has never authorized the routine release of CRS reports to the taxpayers.) Topics include: Legal Issues Related to Protecting […]

Comments Off on Cybersecurity: Selected Legal Issues – CRS

Yet another reason to keep the lawyers out of cyberwar

One reason to believe the Stuxnet attack was made in the USA, Clarke says, “was that it very much had the feel to it of having been written by or governed by a team of Washington lawyers.” “What makes you say that?” I asked. “Well, first of all, I’ve sat through a lot of meetings […]

Comments Off on Yet another reason to keep the lawyers out of cyberwar

Mar 29th, 2012 Stuxnet

Cyber Roundup (3/28): A glimpse at cyber ROEs, China behind RSA attack, Richard Clarke on Stuxnet and China, and a growing N. Korean cyber threat

A busy night in cyber news . . . *** Carlo Munoz reported for The Hill on the upcoming release of cyber rules of engagement (ROE) for the U.S. military.  Mostly citing to testimony given by Gen. Keith Alexander (CyberComm/NSA), the article explained that the ROEs will "expand existing Pentagon protocols regarding cyberattacks beyond military […]

1 comment

U.S. Outgunned in Hacker War: WSJ

On March 27th, 2012, Devlin Barret reported for the Wall Street Journal on comments made by Shawn Henry, the FBI's departing cyber head.  Notably, Mr. Henry said that in the context of cyber-espionage, the current public and private approach to trying to stop hackers is "unsustainable."  It's unsustainable in the sense that the U.S. can […]

Comments Off on U.S. Outgunned in Hacker War: WSJ

The mystery of Duqu: SecureList

Alexander Gostev wrote for SecureList (a blog run by Kaspersky Labs) on Duqu.  Symantec recently discovered a new and improved Duqu . . . in Iran. The blog post had an in-depth analysis of the mechanics behind Duqu's coding, but I was more interested in Mr. Gostev's conclusion: The return of the Duqu . . […]

Comments Off on The mystery of Duqu: SecureList

Mar 27th, 2012 cyber attack, Stuxnet

Cyber Roundup (3/27): A new House cyber bill, back for more Lulz, another setback for Huawei, and the US military goes on the cyber offensive

A quick survey of today's news… *** On March 27th, Eric Engleman and Chris Strohm reported for Bloomberg on a new House cybersecurity bill introduced by House Republicans.  According to the article, the bill is very similar to Secure IT, the cyberlegislation introduced by Senate Republicans.  The article didn't mention the bill's name, but explained […]

Comments Off on Cyber Roundup (3/27): A new House cyber bill, back for more Lulz, another setback for Huawei, and the US military goes on the cyber offensive

Microsoft Targets Zeus Botnet: NYT/CNN

On March 26th, 2012, Nick Wingfield and Nicole Perlroth reported for the New York Times on how Microsoft employees disrupted Zeus, one of the world's biggest botnets.  A botnet is a group of zombie computers that help cybercriminals steal personal information.  According to the article, Microsoft raided two office buildings in Scranton, Penn., with the […]

Comments Off on Microsoft Targets Zeus Botnet: NYT/CNN

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories