Archives

Archive for October, 2014

Cyber Round Up: White House Breach Linked to Russian Government; New Law Against Cyber Squatting in Nigeria; DHS Probes Cybersecurity Dangers in Medical Devices; New Report Links Cyber Espionage Group to Chinese Intelligence; Justice Official Speaks on Government-Business Cooperation to Improve Cybersecurity

The Washington Post reports that hackers thought to be working for the Russian government breached the unclassified White House computer networks in recent weeks resulting in temporary disruptions to some services while cybersecurity teams worked to contain the intrusion.  However, the article also states that the intruders did not damage any of the systems and […]

Comments Off on Cyber Round Up: White House Breach Linked to Russian Government; New Law Against Cyber Squatting in Nigeria; DHS Probes Cybersecurity Dangers in Medical Devices; New Report Links Cyber Espionage Group to Chinese Intelligence; Justice Official Speaks on Government-Business Cooperation to Improve Cybersecurity

Offensive Cyber Operations in US Military Doctrine

The term “offensive cyberspace operations (OCO)” has been added to the official Department of Defense lexicon, and the term is discussed in depth in a newly discovered Department of Defense doctrinal publication by the Joint Chiefs as Staff.  How is this term defined and when should the military resort to offensive cyberspace operations? See below for excerpts […]

Comments Off on Offensive Cyber Operations in US Military Doctrine

New UK Law Quadruples Sentence for Cyber Abuse

The UK has a plan to crack down on cyber abuse: quadruple the current sentence. According to a BBC News report, a new amendment to the Criminal Justice and Courts Bill going through Parliament would allow magistrates to pass serious cases on to crown courts, where the maximum sentence would be extended. Under the act, […]

Comments Off on New UK Law Quadruples Sentence for Cyber Abuse

Cyber Round Up: US Government Investigates Cyber Vulnerabilities in Medical Devices; DOJ Creates New Roles for Cybersecurity; Israeli Start-up Provides New Method for Early Detection of Cyber Attacks; China’s Cybersecurity Stance at Upcoming Summit; Obama’s Order to Cut Identity Theft Signals Further Need for Cybersecurity Legislation

While there are no known instances of hackers attacking patients through medical devices, the Department of Homeland Security is working with manufacturers to identify and repair software coding bugs and other vulnerabilities that hackers can potentially use to expose confidential data or attack hospital equipment, according to a report by Reuters.  According to the report, the […]

Comments Off on Cyber Round Up: US Government Investigates Cyber Vulnerabilities in Medical Devices; DOJ Creates New Roles for Cybersecurity; Israeli Start-up Provides New Method for Early Detection of Cyber Attacks; China’s Cybersecurity Stance at Upcoming Summit; Obama’s Order to Cut Identity Theft Signals Further Need for Cybersecurity Legislation

Justice Shifts to Cyber From Terrorists With Reorganization Announced Today

“The US Justice Department is shifting the focus of its national security prosecution team to deal with cyber instead of spies,” writes Lawfare.  “U.S. national security prosecutors shift focus from spies to cyber,” proclaims Reuters.  “DOJ heightens focus on state-backed cyber crime” is The Hill’s headline.  All are reacting to a press release from the […]

1 comment

The Internal Cybersecurity Struggle Between the Government and Private Industry

October is Cyber Awareness Month, which means that cyber news is in abundance.  However, the cyber issue that continues to gain the most attention is the evolving debate over the nature of the relationship between the federal government and private industry when it comes to cybersecurity.  Should the government be more involved in how private companies handle cybersecurity?  […]

Comments Off on The Internal Cybersecurity Struggle Between the Government and Private Industry

Cyber Round Up: President Obama Puts Focus Back on Cybersecurity; Cyber Sabotage by Digital Cat Burglars; Israel Aims to Become a Cybersecurity Superpower; South Korea Switches to Offensive Cyber Capabilities; Problems with Russia’s New Internet Policy; China Claims US Fabricating Cyber Accusations; Ninth Circuit Considers Overturning National Security Letters Ruling

According to FoxBusinessNews, when President Obama spoke at fundraising events in New York City and Connecticut last week, he tried to turn America’s focus away from Ebola and back towards what he described as one of the biggest threats to National Security: cyber terrorism.  FoxBusinessNews reported that after downplaying the Ebola scare, the president laid out a […]

Comments Off on Cyber Round Up: President Obama Puts Focus Back on Cybersecurity; Cyber Sabotage by Digital Cat Burglars; Israel Aims to Become a Cybersecurity Superpower; South Korea Switches to Offensive Cyber Capabilities; Problems with Russia’s New Internet Policy; China Claims US Fabricating Cyber Accusations; Ninth Circuit Considers Overturning National Security Letters Ruling

The Hidden War in Cyberspace

When sound was added to film between World War I and World War II, newsreels playing in movie theaters vividly portrayed the sights and sounds of American foreign battlefields, combat-footage, and invasions. We’ve become accustomed to relying on these images and videos in our television and print news media, to stay informed on war-related current […]

Comments Off on The Hidden War in Cyberspace

Cyber Round Up: Researchers Aimed at Plugging Cybersecurity Holes in UK’s Power Stations; France’s New Cybersecurity Law; China’s Cyberwar on Hong Kong Protestors; Rising Cyber Threats in Software Used in Nuclear Power Plants; Japan Launches Cybersecurity Talks

ZDNET reports that a team of experts will be looking at how to plug security holes in the vital systems that run the UK’s power stations, rail networks and manufacturing plants.  According to the report, the researchers aim to improve operational decision making and lay the groundwork for a new, cyber-threat-resilient control architecture for the grid. […]

Comments Off on Cyber Round Up: Researchers Aimed at Plugging Cybersecurity Holes in UK’s Power Stations; France’s New Cybersecurity Law; China’s Cyberwar on Hong Kong Protestors; Rising Cyber Threats in Software Used in Nuclear Power Plants; Japan Launches Cybersecurity Talks

Potential Public Safety Issues with the FCC’s Proposed Network Neutrality Rules

Is network neutrality a public-safety issue? The answer is yes, according to Catherine Sandoval, a commissioner with the California Public Utilities Commission, who spoke out at a recent network neutrality public forum in Sacramento, California. The forum was hosted by Representative Doris Matsui, and featured FCC commissioners Jessica Rosenworcel and Mignon Clyburn. Multichannel News, Fox40 […]

Comments Off on Potential Public Safety Issues with the FCC’s Proposed Network Neutrality Rules

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories