Archives

Archive for the ‘Cyber Exploitation’ Category

US Control Systems Have Been Hacked By Nation States – NSA Director Warns “This Is Not Theoretical”

“The cyber threat is real, this is not theoretical.” – National Security Agency Director Admiral Michael Rogers. At a hearing in Washington today of the House Intelligence Committee, National Security Agency Director Admiral Michael Rogers discussed the nation’s cyber vulnerabilities.  Roger set out the three missions of the US Cyber Command: defend DOD’s network, generate […]

Comments Off on US Control Systems Have Been Hacked By Nation States – NSA Director Warns “This Is Not Theoretical”

New Tech Designed to Protect Infrastructure Against Hackers

With reports of breaches of the nations’ critical infrastructure on the rise, Sierra Nevada Corp. (“SNC”), a systems integrator and electronic systems provider, has partnered with the City of Fort Morgan in Colorado to protect the city’s infrastructure from cyber-attacks.  The Binary Armor® SCADA protection system was integrated into the city’s electrical network, and is […]

Comments Off on New Tech Designed to Protect Infrastructure Against Hackers

TIME: An ISIS Cyberattack Against the United States is Unlikely

Is the exposure of the Islamic State of Iraq and Greater Syria (ISIS) throughout various social media websites a sign that ISIS is technologically capable of launching a major cyberattack against the United States? According to a recent article by Time Magazine Online, the answer is no. While the article acknowledges ISIS’s recruitment campaign over social media networks like […]

Comments Off on TIME: An ISIS Cyberattack Against the United States is Unlikely

Ninth Circuit Applies Exclusionary Rule to Violation of Posse Comitatus Act, Potential Effect on NSA Related Cyber Prosecutions

The Ninth Circuit, in United States v. Dreyer, a divided Court of Appeals case, recently concluded that suppression of evidence pursuant to the exclusionary rule was an appropriate remedy when the actions of a civilian agent of the Naval Criminal Investigative Service (NCIS) violated the Posse Comitatus Act  by turning over criminal data to prosecutors revealed […]

Comments Off on Ninth Circuit Applies Exclusionary Rule to Violation of Posse Comitatus Act, Potential Effect on NSA Related Cyber Prosecutions

Cyber Round Up: Iran Cyber Attacks on Israel; Cybersecurity Companies Taking Advantage of Consumers; Retailers Cybersecurity Responsibilities; Scamming the Scammers; The New Yorker on Anonymous

Prime Minister Binyamin Netanyahu states Iran is behind cyber attacks against Israel, read the story by The Jerusalem Post here. Are cybersecurity companies focused on protected consumer’s computers, or scaring them into buying more protection? Scientific American reports on the lack of oversight of cybersecurity companies and their tendency to exaggerate threats to increase profits. USA TODAY […]

Comments Off on Cyber Round Up: Iran Cyber Attacks on Israel; Cybersecurity Companies Taking Advantage of Consumers; Retailers Cybersecurity Responsibilities; Scamming the Scammers; The New Yorker on Anonymous

The Heartbleed Bug and the Political Implications of Vulnerability Management

Today, the Canadian Broadcasting Corporation (CBC) recounted the happenings around the Heartbleed Bug, a pervasively occurring vulnerability of the widespread OpenSSL cryptographic software that was revealed by Google and a Finnish security firm on Monday. Along with the public notification, the information website heartbleed.com was established, explaining that “[t]he Heartbleed bug allows anyone on the Internet […]

1 comment

Exploit Sales: The Unnoticed Side of the Trade in Surveillance Technologies

The Issue Last week, London-based surveillance watchdog Privacy International raised awareness of governments’ and private spyware suppliers’ engagement in an unregulated market that supplies them with intelligence on security flaws of widely-used software. Such exclusive knowledge about generally unknown vulnerabilities is a crucial part of any cyber eavesdropping operation. It allows the operator to access […]

Comments Off on Exploit Sales: The Unnoticed Side of the Trade in Surveillance Technologies

New Material for the Critical Infrastructures Debate: China Estimated to Target Hollywood

On Wednesday, the LA Times reported on information security company Mandiant’s outlook, due to which Hollywood may become the next target for Chinese state-sponsored hacking. Due to the news outlet, the cited report (according to my research not yet released) identified at least one hack into a major entertainment company, which it traced back to the People’s Liberation Army […]

Comments Off on New Material for the Critical Infrastructures Debate: China Estimated to Target Hollywood

Cyber Insurances And Their Potential To Get Security More Standardized

In the wake of the recent high profile data breaches, most prominently the attack on the Target Corporation, it is my impression that insurance companies may evolve as an effective driver of securing cyberspace. While the National Institute for Standards and Technology’s (NIST) cyber security framework encourages organizations non-bindingly to consider and prioritize risks from cyber, proposals […]

Comments Off on Cyber Insurances And Their Potential To Get Security More Standardized

Of Fridges and Pacemakers: The Pervasive Vulnerabilities of the Internet of Things (2/2)

Yesterday’s blog post raised awareness on the insecurities of the Internet of Things (IoT). Widespread vulnerabilities make all kinds of “smart” devices an easily accessible and controllable target for hackers and cyber criminals. Several examples of cyber attacks on such embedded systems have been mentioned to substantiate security expert Bruce Schneier’s problem statement. With today’s […]

Comments Off on Of Fridges and Pacemakers: The Pervasive Vulnerabilities of the Internet of Things (2/2)

« Previous PageNext Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories