Archives

Archive for November, 2013

Microsoft Launches Whitepapers, Video Series to Assist with Corporate Cybersecurity

Microsoft Security Blog recently published a series of whitepapers and videos designed to help companies better understand the risks posed by cyber threats.   Some of the papers cover potential adversaries to be aware of, targeted attacks, Pass-the-Hash (PtH) attacks, and best practices.  The videos also offer techniques to mitigate threat and harm to vital […]

Comments Off on Microsoft Launches Whitepapers, Video Series to Assist with Corporate Cybersecurity

Cyber Roundup: Kenya Supports Invasive Cyber Law; FBI Adds Five to “Cyber Most Wanted List”; Anonymous Claims Responsibility for Singapore Cyber Strike

The Daily Nation reports that a convention in the African Union that would, at a minimum, require persons or corporations engaging in electronic financial transactions to provide full identifying information, such as PIN numbers and addresses, will be supported by Kenya.  Opponents are reportedly concerned about the invasiveness of the law, its costs, and the […]

Comments Off on Cyber Roundup: Kenya Supports Invasive Cyber Law; FBI Adds Five to “Cyber Most Wanted List”; Anonymous Claims Responsibility for Singapore Cyber Strike

Classified NSA Document May Act as Authorization for Allied Surveillance

The New York Times reports that a recently revealed but classified National Security Agency (NSA) document authorizes the agency to conduct surveillance activities targeting Great Britain (and other close allies), without consent or knowledge, despite a pact between the nations to the contrary. Labeled “secret” and “NOFORN” (an indication it may not be shared with […]

Comments Off on Classified NSA Document May Act as Authorization for Allied Surveillance

PCAST Report: Government Rarely Follows Best Practices in Cybersecurity

The President’s Council of Advisors on Science and Technology (PCAST) released the following report entitled, “Immediate Opportunities for Strengthening the Nation’s Cybersecurity.” Generally, it appears PCAST believes the Obama Administration could be doing more to protect our nation’s cyber interests.  Specifically, one of the report’s findings is that: The Federal Government rarely follows accepted best […]

Comments Off on PCAST Report: Government Rarely Follows Best Practices in Cybersecurity

Cyber Roundup: iPhone 5s Fingerprint Sensor Hacked; New Cyberlaw in Pakistan Carries Penalty of Death; London Pros Participate in Cyber Simulation

IsTouchIDHackedYet, a site created by Nick DePetrillo and Robert David Graham, offered more than $16,000 in cash and other prizes to the first person to successfully hack the Touch ID fingerprint sensor on the new iPhone 5S.  The winner was Starbug who pledged the funds to Raumfahrtagentur, a spinoff from CCC-Berlin. According to The New York […]

Comments Off on Cyber Roundup: iPhone 5s Fingerprint Sensor Hacked; New Cyberlaw in Pakistan Carries Penalty of Death; London Pros Participate in Cyber Simulation

The Lobbying of the Cybersecurity-Industrial Complex

In their study on campaign contributions for the 2012 elections, political scientist Thomas Ferguson and his colleagues found telecommunications and information technology contributed significantly to President Obama’s election campaign. The scholars based their analyses on a new and more comprehensive dataset that captures political contributions from businesses and investors to a wider extent than previous […]

Comments Off on The Lobbying of the Cybersecurity-Industrial Complex

DHS Must Turn Over “Internet Kill Switch” Protocol, Court Says: Part II of II

Yesterday, I gave a run-down of the D.C. District Court’s treatment of Freedom of Information Act (FOIA) Exemption 7(E) in a recent lawsuit between the Electronic Privacy Information Center (EPIC) and the Department of Homeland Security (DHS.)  As I mentioned, the Court ultimately ruled that DHS must turn over the requested documentation to EPIC within […]

Comments Off on DHS Must Turn Over “Internet Kill Switch” Protocol, Court Says: Part II of II

DHS Must Turn Over “Internet Kill Switch” Protocol, Court Says: Part I of II

Earlier this year, the Electronic Privacy Center (EPIC) filed a Freedom of Information Act (FOIA) request to obtain Department of Homeland Security (DHS) documents related to Standard Operating Procedure 303 (SOP 303). Basically, SOP 303 authorizes the shutdown of wireless networks in emergencies to prevent remote detonation of explosive devices.  The “Internet kill switch” framework, […]

Comments Off on DHS Must Turn Over “Internet Kill Switch” Protocol, Court Says: Part I of II

Nov 21st, 2013 Current Affairs, Law, Legislation

The Interpreter: “Cyber Security—Why Military Forces Should Take a Back Seat”

Ian Wallace, responding to comments on his earlier article (“Is there Such Thing as Cyberwar?”), argues that the military should not be centrally involved in cybersecurity efforts. As a foundation to his assertion, Wallace contends that cyber threats do not fit neatly within a traditional law enforcement framework because they most often originate overseas.  Nor […]

Comments Off on The Interpreter: “Cyber Security—Why Military Forces Should Take a Back Seat”

Nov 20th, 2013 Criticism, cyber attack, warfare

Briefs Available in the Case of Verizon v. FCC

In September, Verizon Wireless and the Federal Communications Commission (FCC) appeared before the United States Court of Appeals for the District of Columbia Circuit to present oral arguments in a lawsuit filed by Verizon challenging the FCC’s Open Internet Rules. I posted about this case in September, but I wanted to provide more information about the […]

Comments Off on Briefs Available in the Case of Verizon v. FCC

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories