Archives

Archive for October, 2012

Cyber roundup (10/31): Update on SC breach, FBI attribution emphasis draws criticism, WashPo cyber conference, private firms hiring U.S. information warfare experts for hackback, and more . . .

Happy Halloween!  Here’s a quick survey of some recent cyber news . . . *** Tim Smith, for GreenvilleOnline.com, on that breach of South Carolina’s Department of Revenue.  According to Smith, that breach saw “3.6 million Social Security numbers and 387,000 mostly encrypted credit or debit card numbers” compromised.  Moreover, it appears that the hacker […]

Comments Off on Cyber roundup (10/31): Update on SC breach, FBI attribution emphasis draws criticism, WashPo cyber conference, private firms hiring U.S. information warfare experts for hackback, and more . . .

Cyber roundup (10/30): Georgia outs Russia-based hacker, FBI working on attribution, DOD and BYOD, and cyber triage

Quick survey of recent cyber news . . . *** Fascinating article from Computerworld’s Jeremy Kirk.  Apparently the Georgian government outed a Russian hacker with ties to the Russian government by hacking back into his computer, taking his photograph, and releasing that photograph.  Kirk documented the entire incident: a very talented Russian hacker kept breaking […]

Comments Off on Cyber roundup (10/30): Georgia outs Russia-based hacker, FBI working on attribution, DOD and BYOD, and cyber triage

Suits and Spooks DC 2013 conference talks hackback, private sector active defense

Never really heard of them before, but trolling around on Twitter, I came across AIA Global Inc’s Suits and Spooks DC 2013 conference.  I posted it here because the conference sounds fascinating.  Take a look at the topic: “Offense As Defense” Some of the most important discussions that will take place in 2013 will be […]

Comments Off on Suits and Spooks DC 2013 conference talks hackback, private sector active defense

NSTIC Update: FierceGovernmentIT/Nextgov

On 10/22, Molly Bernhart Walker wrote for FiereceGovernmentIT on NSTIC and the Centers for Medicare and Medicaid Services (“CMS”).  According to the article, CMS is interested in relying on NSTIC’s federated identity management program as a relying party rather than a credential provider.  The article also mentioned that the Office of Management and Budget “is […]

Comments Off on NSTIC Update: FierceGovernmentIT/Nextgov

Oct 29th, 2012 Identity Management, NS-TIC

U.S. Army building cyber into its combat exercises: Foreign Policy

John Reed, for Foreign Policy’s Killer Apps blog, on how the U.S. Army is integrating cyber capabilities into its combat exercises.  According to Reed, reps from U.S. Army CyberComm embedded with Army units in a war games scenario against a near peer nation with an advanced military.  Over the course of the exercise, Army commanders […]

Comments Off on U.S. Army building cyber into its combat exercises: Foreign Policy

Should we lie online? infosecurity

On 10/26, infosecurity reported on a suggestion from the head of security for one of Europe’s largest public services networks: lie.  Lie to Facebook.  Lie to Twitter.  Lie to all social sites.  According to the article,  Andy Smith of the Cabinet Office suggested that users should “only provide their true personal details to trusted websites […]

Comments Off on Should we lie online? infosecurity

Oct 28th, 2012 anonymity, NS-TIC, privacy

The Unexpected Importance of Geography in a Digital World – The Economist

The October 29, 2012 issue of The Economist has a lengthy special report on technology and geography entitled, “Location, Location, Location.”  Parts of it, I believe, are behind the subsrcibers’ only paywall, but at least parts are available to all.  For my students, I would call this an excellent update to Jack Goldsmith’s book Who […]

Comments Off on The Unexpected Importance of Geography in a Digital World – The Economist

Oct 28th, 2012 anonymity, future, regulation

Cybersecurity bill likely dead: The Hill

Jennifer Martinez reported for The Hill on cybersecurity legislation.  There has been some renewed optimism that cybersecurity legislation might see passage before the end of the term.  DefSec Panetta urged it.  Sen. Harry Reid pushed for it.  Unfortunately, it doesn’t look like it’s going to happen.  Martinez explained that a packed legislative docket, lack of […]

Comments Off on Cybersecurity bill likely dead: The Hill

Oct 27th, 2012 Legislation

Taxpayer data exposed in cyber attack on South Carolina: Reuters

On 10/27, Harriet McLeod reported for Reuters on a cyberattack against South Carolina’s Department of Revenue.  According to the article, that cyberattack potentially exposed “3.6 million Social Security numbers and 387,000 credit and debit card numbers used by state taxpayers,” with 16,000 of those credit card numbers unencrypted.  Most of the credit card numbers were […]

Comments Off on Taxpayer data exposed in cyber attack on South Carolina: Reuters

Oct 27th, 2012 Cyber Exploitation

When is a cyberattack an act of war? WashPo

On 10/26, Ellen Nakashima wrote a great article for The Washington Post on the ambiguity behind cyberwar.  Noting DefSec Panetta’s recent comments, Nakashima asked a series of questions: “[W]hat does an act of war look like in cyberspace?”  How will the U.S. respond?  What will the U.S. do if a cyberattack falls short of that […]

Comments Off on When is a cyberattack an act of war? WashPo

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories