Archives

Posts Tagged ‘Chinese cyber-espionage’

Cyber Round Up: Obama Administration and Smartphone Encryption, Forcing Suspects to Reveal Phone Passwords is Unconstitutional, China Cybersecurity Agreement Will Leave U.S. Companies Vulnerable

The Obama Administration Explored ways to Bypass Smartphone Encyryption (The Washington Post):  An Obama administration task force explored available options to allow law enforcement to access encrypted communications, according to the article.  The Washington Post reported that the task force developed a set of principles to guide the use of, and access to encrypted information […]

Comments Off on Cyber Round Up: Obama Administration and Smartphone Encryption, Forcing Suspects to Reveal Phone Passwords is Unconstitutional, China Cybersecurity Agreement Will Leave U.S. Companies Vulnerable

OPM Data Breach Possibly part of Larger Advanced Persistent Threat (APT)

Forbes reports that it now appears that the Office of Personnel and Management (OPM) data breach may have been part of a larger cyber strategy.  Whereas the original OPM data breach resulted in the compromise of over 21M comprehensive personnel files that contained extensive personally identifiable information (PII) that was stored within 120+ page SF-86 […]

Comments Off on OPM Data Breach Possibly part of Larger Advanced Persistent Threat (APT)

Cyber Round Up: Cyber Attack Simulations Promote Cybersecurity; Former NSA Official Views Recent White House Cyber Breach as Sign of Future Attacks; Chinese Officials Push for Tougher Enforcement of Cyber Governance; Navy’s Task Force Cyber Awakening; China Linked to Cyber Attacks on Hong Kong Protestors

The new strategy to bulk up cyber security: cyber attack simulations.  SCMagazine reports that cyber attack simulations can help organizations and industries stay, if not a step ahead, then on top of cyber threats and build a resilience.  Read the full article here. Joel Brenner, the former Inspector General for the National Security Agency (NSA), warned […]

Comments Off on Cyber Round Up: Cyber Attack Simulations Promote Cybersecurity; Former NSA Official Views Recent White House Cyber Breach as Sign of Future Attacks; Chinese Officials Push for Tougher Enforcement of Cyber Governance; Navy’s Task Force Cyber Awakening; China Linked to Cyber Attacks on Hong Kong Protestors

Cyber Round Up: White House Breach Linked to Russian Government; New Law Against Cyber Squatting in Nigeria; DHS Probes Cybersecurity Dangers in Medical Devices; New Report Links Cyber Espionage Group to Chinese Intelligence; Justice Official Speaks on Government-Business Cooperation to Improve Cybersecurity

The Washington Post reports that hackers thought to be working for the Russian government breached the unclassified White House computer networks in recent weeks resulting in temporary disruptions to some services while cybersecurity teams worked to contain the intrusion.  However, the article also states that the intruders did not damage any of the systems and […]

Comments Off on Cyber Round Up: White House Breach Linked to Russian Government; New Law Against Cyber Squatting in Nigeria; DHS Probes Cybersecurity Dangers in Medical Devices; New Report Links Cyber Espionage Group to Chinese Intelligence; Justice Official Speaks on Government-Business Cooperation to Improve Cybersecurity

Cyber Round Up: Researchers Aimed at Plugging Cybersecurity Holes in UK’s Power Stations; France’s New Cybersecurity Law; China’s Cyberwar on Hong Kong Protestors; Rising Cyber Threats in Software Used in Nuclear Power Plants; Japan Launches Cybersecurity Talks

ZDNET reports that a team of experts will be looking at how to plug security holes in the vital systems that run the UK’s power stations, rail networks and manufacturing plants.  According to the report, the researchers aim to improve operational decision making and lay the groundwork for a new, cyber-threat-resilient control architecture for the grid. […]

Comments Off on Cyber Round Up: Researchers Aimed at Plugging Cybersecurity Holes in UK’s Power Stations; France’s New Cybersecurity Law; China’s Cyberwar on Hong Kong Protestors; Rising Cyber Threats in Software Used in Nuclear Power Plants; Japan Launches Cybersecurity Talks

Chinese Hackers Suspected in Cyber Attack On CFR: The Washington Free Beacon

The Washington Free Beacon’s Bill Gertz reports that “computer hackers traced to China carried out an advanced cyberespionage attack against” the website of the Council on Foreign Relations (CFR).  According to Gertz, the hackers used a “water-hole” style attack in which they infected a server hosting the website, thereby allowing the hackers to target CFR […]

Comments Off on Chinese Hackers Suspected in Cyber Attack On CFR: The Washington Free Beacon

Dec 27th, 2012 Cyber Exploitation

U.S. spy agencies to detail cyber-attacks from abroad: LA Times

On 12/6, Ken Dilanian reported for The LA Times on an upcoming U.S. intel community National Intelligence Estimate of “cyber-spying against American targets from abroad, including an attempt to calculate U.S. financial losses from hacker attacks based in China . . ..”  Moreover, Dilanian reports that the NIE will attempt to explain how large a […]

Comments Off on U.S. spy agencies to detail cyber-attacks from abroad: LA Times

Dec 8th, 2012 Cyber Exploitation

Secretary of State Clinton remarks on China, cyberespionage

One of my dreams is to see the President of the United States publicly call out China on its pervasive cyber-espionage.  Probably won’t happen, and probably won’t change anything, but I’m still hoping for it.  In the meantime, I guess I’ll just have to settle for this. Picked up on this from a Lawfare blog […]

Comments Off on Secretary of State Clinton remarks on China, cyberespionage

Justice Department trains prosecutors to combat cyber espionage: WashPo

This is now a few months old, but it’s worth repeating.  On July 25th, 2012, Sari Horwitz reported for The Washington Post on a new DOJ program to combat cyber espionage: Under the reorganization, teams of specialized lawyers within NSD in Washington will work with other agencies, the military and companies facing cyber intrusions. They […]

1 comment

5 Secrets Anonymous Should Steal From China: Foreign Policy

On 4/20, Adam Segal wrote for Foreign Policy and recommended new levels of mischief for the hacker group Anonymous.  Opening with a great line–"Let's get real, script kiddies: It's time to stop defacing websites and start going after the good stuff"–Segal noted Anonymous' recent attacks on some low-level Chinese websites and suggested that Anon could […]

Comments Off on 5 Secrets Anonymous Should Steal From China: Foreign Policy

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Christopher w. FolkChristopher W. Folk

is a second year student at SU College of Law. Christopher is a non-traditional student, returning to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering and in addition to being a full-time student, Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Ryan D. White

Ryan D. WhiteRyan is currently a second year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic.Full biography

Anna Maria Castillo

is a third year law student at Syracuse College of Law. She is also pursuing a Master of Arts in International Relations at Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She currently serves as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a third year student at Syracuse College of Law. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She is a member of the Syracuse National Trial Team and was recently awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She has served as a law clerk in the United States Attorney's Office for the Western District of New York and the Public Defender Service for the District of Columbia and as an extern in the United States District Court for the Western District of Washington. Full biography

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories