Archives

Archive for February, 2015

WANTED: Evgeniy Bogachev, Cyber Criminal

A $3 million dollar reward has been offered in exchange for information that leads to the arrest or conviction of Evgeniy Bogachev, a Russian national, believed to be the leader of the criminal organization responsible for the use of the malware “Gameover Zeus” (“GOZ”) and “Cryptolocker”, reported Reuters. Bogachev was named a defendant in the complaint, […]

Comments Off on WANTED: Evgeniy Bogachev, Cyber Criminal

Is the US Indirectly Supporting Cyber Vigilantism? A Look at The Jester…

Called a  “Patriotic Hacker”… “Cyber Vigilante” … “Cyber Patriot” … which only begs the question: Who Is The Jester? He has allegedly taken down more than 170 Jihadi websites since 2010. He has over 66,000 Twitter followers. He hacked Wikileaks. He even hacked Anonymous. Five months ago he agreed to take part in a rare interview […]

Comments Off on Is the US Indirectly Supporting Cyber Vigilantism? A Look at The Jester…

NSA or Not, Equation Group is Recognized as the “Most Advanced” Threat Actor in Cyberspace

Another report has been released identifying widespread spyware breaches. This most recent report released by Kaspersky Lab, a cyberthreat firm, named the “Equation Group” the most advanced “threat actor” out of over 60 advanced attackers investigated by the firm over the past several years, reports Defense One. According to the report, the Equation Group has been active […]

Comments Off on NSA or Not, Equation Group is Recognized as the “Most Advanced” Threat Actor in Cyberspace

Cyber Round Up: Iran Learns from West; Auto-Hacking Risks on the Rise; Facebook’s Cyber Security Network; Traps over Firewalls

NSA: Iran Learns from Western Cyberattacks: The Intercept reports that by studying and replicating Western cyber tactics, a NSA document warns that Iran has been able to create increasingly sophisticated cyberattacks.  According to the article, Iran’s destructive cyber attack against Saudi Aramco in August 2012 is questionably similar to a cyberattacks against Iran’s own oil industry […]

Comments Off on Cyber Round Up: Iran Learns from West; Auto-Hacking Risks on the Rise; Facebook’s Cyber Security Network; Traps over Firewalls

Draft AUMF from White House

On February 11, 2015, the President of the United States sent a letter to Congress “submitting a draft AUMF that would authorize the continued use of military force to degrade and defeat ISIL.”  Recall that past Authorizations for Military Force (AUMF) have been cited by the White House as authority for electronic surveillance as “signals […]

Comments Off on Draft AUMF from White House

New Center Being Created to Streamline Cybersecurity Strategy

The increasing threat posed by cyberattacks has prompted the US government to establish a new agency called the Cyber Threat Intelligence Integration Center (“CTIIC”), the Washington Post reported. The  Office of the Director of National Intelligence (“ODNI”) will oversee the new department along with other centers including the National Counterterrorism Center (“NCTC”), adds the report. The […]

Comments Off on New Center Being Created to Streamline Cybersecurity Strategy

Nation-State Cyberattacks are NOT Terrorism, asserts RAND expert

According to Martin C. Libicki, even when backed by nation-states, cyberattacks are not terrorism and should not be considered a national-security concern.  Do you agree? Libicki is a senior management scientist at the nonprofit, nonpartisan RAND corporation.  In an article on the topic for Newsweek, Libicki defines terrorism as “the use of attacks to create […]

Comments Off on Nation-State Cyberattacks are NOT Terrorism, asserts RAND expert

SATSA’s Conference on The Global Threat: Emerging Issues in National Security

Just calling your attention to what promises to be a very good event…   Keynote speakers include: Col. Bill Smullen (Ret.), Former Chief of Staff, US Secretary of State Colin Powell Rear Adm. James E. McPherson (Ret.), 39th Judge Advocate General, US Navy Mohammed Albasha, Spokesperson, Yemen Embassy to the US Vice Adm. Robert B. […]

Comments Off on SATSA’s Conference on The Global Threat: Emerging Issues in National Security

Crowdsourcing National Cybersecurity?

When a project is just too big or too complex, the crowd can play an important role, and according to an article by The Washington Post, national cybersecurity might just be the type of project in need of a crowd. According to the article, cyber networks are best viewed as an asset that we all […]

Comments Off on Crowdsourcing National Cybersecurity?

A Hacktivist View of US Cybersecurity

When those in power break their own laws then there is no law and no moral authority; there are just competing factions in an international power struggle to control resources. – Jeremy Hammond, Anonymous hacktivist. Following the SONY and CENTCOM cyber attacks, there has been a lot of discussion about the difference between nation-state and individual hackers, large-scale […]

Comments Off on A Hacktivist View of US Cybersecurity

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

is 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories