Archives

Archive for the ‘IT security’ Category

Cyber Round Up: How Israel Became Cyber Leader; Private Sector Shouldn’t Rely on Feds; Cyber is About a Culture Change, Not Tech

How Israel became a leader in cybersecurity and surveillance (Miami Herald):  Israel has become one of the world’s best countries in cyber security despite its small size, a recent article says.   Second only to the U.S. in cyber capabilities, the article explains how Israel’s cyber strength has developed through an elite unit in the Israeli […]

Comments Off on Cyber Round Up: How Israel Became Cyber Leader; Private Sector Shouldn’t Rely on Feds; Cyber is About a Culture Change, Not Tech

Cyber Round Up: Internet Insecure because Flaw in Language, EU Adopts Net Neutrality Legislation, CISA Passes Senate

Internet Insecure because Flaw in Language (Wall Street Journal):  The core issue behind the security of the internet, or in this case, the lack of security of the internet is caused by a flaw in the language used to move digital information to and from its destination, according to the Wall Street Journal.  According to […]

Comments Off on Cyber Round Up: Internet Insecure because Flaw in Language, EU Adopts Net Neutrality Legislation, CISA Passes Senate

Cyber Round Up: U.S.-China IP Theft Agreement, Clapper Skeptical of U.S.-China Cyber Agreement, U.S. Agencies Still have Weak Cybersecurity — GAO

U.S.-China Sign IP Theft Agreement (ICE.gov):  The director of the U.S. National Intellectual Property Rights Coordination Center (“IPR Center”) and the director general of China’s General Administration of China Customs (“GACC”) signed an intellectual property rights addendum to a memorandum of understanding (“MOU”) that was signed by the two nations in 2011, according to an ICE press […]

Comments Off on Cyber Round Up: U.S.-China IP Theft Agreement, Clapper Skeptical of U.S.-China Cyber Agreement, U.S. Agencies Still have Weak Cybersecurity — GAO

UN Group Releases Report on the International Security of Information and Communications Technologies

The 2015 Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security released its report containing recommendations to address threats that stem from the use of information and communications technologies (“ICTs”) by both states and non-states.  The group was composed of governmental experts from the United States, […]

1 comment

A New Attribution Problem: Cyber Attack or Malfunction?

“The thinking was that the Iranians would blame bad parts, or bad engineering, or just incompetence.” – Architect of Stuxnet Cyber Attack. According to an article by JustSecurity, confusion about whether an incident is an accident or a cyber attack may be a common problem going forward.  The article opens with a reference to a Bloomberg news […]

Comments Off on A New Attribution Problem: Cyber Attack or Malfunction?

The Heartbleed Bug and the Political Implications of Vulnerability Management

Today, the Canadian Broadcasting Corporation (CBC) recounted the happenings around the Heartbleed Bug, a pervasively occurring vulnerability of the widespread OpenSSL cryptographic software that was revealed by Google and a Finnish security firm on Monday. Along with the public notification, the information website heartbleed.com was established, explaining that “[t]he Heartbleed bug allows anyone on the Internet […]

1 comment

Cyber Round Up: DOJ Pushes for Increased Hacking Abilities; Google Appeals Turkish YouTube Blackout; Microsoft Ends “Snooping” Practices

The DOJ is advocating for less stringent standards to obtain warrants to hack the computers of criminal suspects, the Wall Street Journal Blog reports.  “The Justice Department effort is raising questions among some technology advocates, who say the government should focus on fixing the holes in computer software that allow such hacking rather than exploiting them.”  […]

Comments Off on Cyber Round Up: DOJ Pushes for Increased Hacking Abilities; Google Appeals Turkish YouTube Blackout; Microsoft Ends “Snooping” Practices

“Strategic Cyber Intelligence”: The “how?” of cyberattack versus the “why?”

Are cybersecurity efforts focusing too much on the “how” and not enough on the “why”?  That’s the position of “Strategic Cyber Intelligence,” a report published by the nonprofit organization Intelligence and National Security Alliance, which is comprised of “current and former high-ranking intelligence, military and government agency leaders, analysts, and experts from industry and academia.” By […]

Comments Off on “Strategic Cyber Intelligence”: The “how?” of cyberattack versus the “why?”

CERT-UK Launched

Yesterday, the UK launched its Computer Emergency Response Team (CERT-UK), BBC News reports, a move in cyber defense strategy that has recently been seen in countries throughout the world. CERT-UK will operate as a coordinator and information-sharer rather than a law enforcement body to handle cyber incidents of national significance, including threats aimed at banks, […]

Comments Off on CERT-UK Launched

Cyber Round Up: Scalia, the 4th Amendment, and Cyberspace; NATO’s sites hacked; NSA’s phone call recording program

Last week, NATO reported that several of its public websites had been hacked.  An article on the incident by Reuters explains that the attack appeared to be linked to the growing tensions in Crimea.  However, the article continues, most services have since been restored.  One NATO official commented on the incident by saying: It doesn’t […]

2 comments

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories