Archives

Archive for the ‘Cyber Exploitation’ Category

U.S. Charges Chinese Man With Economic Espionage For Stealing Source Code With Intent To Benefit The Chinese Government

Announced June 14, 2016: Manhattan U.S. Attorney Announces Economic Espionage Charges Against Chinese Man For Stealing Valuable Source Code From Former Employer With Intent To Benefit The Chinese Government Preet Bharara, the United States Attorney for the Southern District of New York, and John P. Carlin, Assistant Attorney General for National Security, announced a six-count […]

Comments Off on U.S. Charges Chinese Man With Economic Espionage For Stealing Source Code With Intent To Benefit The Chinese Government

Cyber “Emergency” Order Nets No Culprits, Reports FAS

“In April 2015, President Obama issued Executive Order 13694 declaring a national emergency to deal with the threat of hostile cyber activity against the United States. But six months later, the emergency powers that he invoked to punish offenders had still not been used because no qualifying targets were identified, according to a newly released […]

Comments Off on Cyber “Emergency” Order Nets No Culprits, Reports FAS

Cyber Round Up: ‘Human Rights in Cyberspace’ — CCDCOE NATO Report, NSA Reports it Releases Most Zero-day Vulnerabilities, Australia Submarine Project Experiences Hacking Attempts

‘Human Rights in Cyberspace’ — NATO CCD COE Report (CCDCOE NATO):  The NATO Cooperative Cyber Defence Centre of Excellence (“CCDCEO”) and the Institute of National Security and Counterterrorism (“INSCT”) hosted a workshop on October 1st and 2nd on Human Rights in Cyberspace, according to the CCDCOE.  The workshop resulted in a report containing the findings […]

Comments Off on Cyber Round Up: ‘Human Rights in Cyberspace’ — CCDCOE NATO Report, NSA Reports it Releases Most Zero-day Vulnerabilities, Australia Submarine Project Experiences Hacking Attempts

Cyber Round Up: U.S. Tracking Cyber Activity in Syria Conflict, DPRK Hacked ROK Metro System — ROK Legislator, Aircraft Vulnerable to Cyber Attacks — European Official

U.S. Tracking Cyber Activity in Syria Conflict (AirForceTimes):  Air Force Lt. Gen. James McLaughlin told the AirForceTimes that since Russia began its airstrikes in Syria, the U.S. began monitoring the cyber landscape for potential cyber threats that could emerge due to the conflict in Syria, the AirForceTimes reported.  He did not specify what types of cyber threats […]

1 comment

NSA or Not, Equation Group is Recognized as the “Most Advanced” Threat Actor in Cyberspace

Another report has been released identifying widespread spyware breaches. This most recent report released by Kaspersky Lab, a cyberthreat firm, named the “Equation Group” the most advanced “threat actor” out of over 60 advanced attackers investigated by the firm over the past several years, reports Defense One. According to the report, the Equation Group has been active […]

Comments Off on NSA or Not, Equation Group is Recognized as the “Most Advanced” Threat Actor in Cyberspace

A Look Back in Review: Analyzing the CentCom Hack

When Twitter and YouTube accounts belonging to the military’s US Central Command were hacked, the Pentagon brass quickly dismissed the hack as nothing more than “cybervandalism,” or a “cyberprank.”  However, the opinions of cybersecurity experts vary on the impact of what appeared to be a  “trivial hack.”  I have compiled views from both sides and provided links to read […]

Comments Off on A Look Back in Review: Analyzing the CentCom Hack

“Cyber-vandalism”? Wrong, Again, Mr. President.

The other day, I criticized the Administration for using the language of war to discuss the Sony hack.  Now, CNN reports that the President has switched to the other end of the rhetorical spectrum: “‘It was an act of cybervandalism,’ Obama said in an interview with CNN.”  Wrong again.  What happened to Sony was not […]

Comments Off on “Cyber-vandalism”? Wrong, Again, Mr. President.

The Five Ws of REGIN

“In the world of malware threats, only a few rare examples can truly be considered GROUNDBREAKING and almost PEERLESS,” – Symantec. With all the recent hype surrounding Regin, we have scoured the net and broken down the five W’s of Regin below: WHO: The highly complex and sophisticated makeup of Regin, as well as its extensive […]

Comments Off on The Five Ws of REGIN

Cyber Round Up: REGIN Malware; Egyptian Cyber Army; Potential Iran Cyber Attacks; State-Sponsored Hackers VS Human Rights Groups

REGIN  – Top-tier espionage malware that Symantec and Kaspersky reports indicate was created by a nation state has been described as a highly sophisticated back door-type Trojan that is customizable with an extensive range of capabilities depending on the target.  Stay tuned to Crossroads Blog this week for an in-depth look at “The Five Ws […]

Comments Off on Cyber Round Up: REGIN Malware; Egyptian Cyber Army; Potential Iran Cyber Attacks; State-Sponsored Hackers VS Human Rights Groups

US Control Systems Have Been Hacked By Nation States – NSA Director Warns “This Is Not Theoretical”

“The cyber threat is real, this is not theoretical.” – National Security Agency Director Admiral Michael Rogers. At a hearing in Washington today of the House Intelligence Committee, National Security Agency Director Admiral Michael Rogers discussed the nation’s cyber vulnerabilities.  Roger set out the three missions of the US Cyber Command: defend DOD’s network, generate […]

Comments Off on US Control Systems Have Been Hacked By Nation States – NSA Director Warns “This Is Not Theoretical”

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories