Archives

Archive for May, 2010

NATO 2020: Assured Security; Dynamic Engagement

On February 17, 2010, NATO released analysis and recommendations of a group of experts on a new security strategy for NATO.  You can download the entire report here.  Although cyber war is only one aspect of cyber security and not the main focus of our course, it is useful to recognize the emphasis placed on […]

No comments

Bleg: Internet Governance: Infrastructure and Institutions

Has anyone read Internet Governance: Infrastructure and Institutions by Lee A. Bygrave (Editor), Jon Bing (Editor), just out on March 25, 2009, from Oxford Press?  It sounds relevant to my fall course, and Oxford has done some other good ones in this area (like Jack Goldsmith's Who Controls the Internet?).  But, without a review copy available, […]

No comments

May 31st, 2010 Books, regulation

Cyber War: The Next Threat To National Security And What To Do About It, by Richard A. Clarke

The time has finally come for me to wade into the controversy of Richard Clarke's latest book Cyber War: The Next Threat To National Security And What To Do About It. First, for full disclosure.  I met Richard Clarke, and he was very generous to we with his time and advice.  He is very smart, […]

1 comment

Bolster U.S. Cyber Defenses – Defense News Opinion Column

Today (5/31) over at defensenews.com, commissioner of the U.S.-China Economic and Security Review Commission and a member of the House Armed Services Committee jointly call for more cyber security, especially inthe supply chain.  “It doesn’t make much sense to have a computer system built with chips and run on software created in the country that […]

No comments

May 31st, 2010 Uncategorized

New U.S. National Security Strategy Includes to “Secure Cyberspace.”

The new National Security Strategy of the United States, dated May 2010 and released by the White House last week, is divided into two substantive sections: I) Strategic Approach and II) Advancing Our Interests.  The latter is divided into four subsections: a) security; b) prosperity; c) values; and d) international order.  The security subsections covers […]

No comments

If you like the BP spill, you’ll love cyberwar

Over on the Volokh Conspiracy blog at this link, Stuart Baker argues: "If you like the BP spill, you’ll love cyberwar."  Hs point is that: "So when an attack occurs, if it’s successful, some of those defenses will fail.  Some citizens will spend days, weeks, maybe months, without power or phones or water or access […]

No comments

Why Crossroads?

[This introduction stays on top of the home page.] A 2009 report of the American Bar Association concluded: What will be the enduring image of this cyber era?  Will it be one of a darkened city, whose electric grid has failed?  Will it be a picture from Second Life or the image of a computing cloud?  […]

Comments Off on Why Crossroads?

May 28th, 2010 Uncategorized

About the Course

A 2009 report of the American Bar Association concluded: What will be the enduring image of this cyber era?  Will it be one of a darkened city, whose electric grid has failed?  Will it be a picture from Second Life or the image of a computing cloud?  Or will it be a picture of cybercriminals […]

Comments Off on About the Course

May 28th, 2010 Uncategorized

5 reasons why the proposed ID scheme for Internet users is a bad idea | ZDNet

From a ZDNet blog: "Imagine waking up in a world, where you would need to use two-factor authentication/biometric based ID, in order to do anything online. Here are five reasons why I think this is a bad idea." 5 reasons why the proposed ID scheme for Internet users is a bad idea | ZDNet. Hat […]

No comments

White House: The Comprehensive National Cybersecurity Initiative

The Comprehensive National Cybersecurity Initiative download as pdf Full Cyberspace Policy Review as pdf, here. President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter. Shortly after […]

No comments

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories