Archives

Archive for October, 2010

“Reconceptualizing Security” by Bruce Schneier

Bruce Schneier did a TED talk on human misperceptions of security.  The principles he explains are covered by the Homeland Security course here at S.U., and I believe are worth mention in our Cyber Security Law & Policy course, as well.  The video is embedded, below.  This would also be a good opportunity to check out […]

No comments

Oct 31st, 2010 education, future

The Digital Disruption | Foreign Affairs

The new November/December issue of Foreign Affairs has an article by Eric Schmidt, the Chair and CEO of Google.  He is typically colorful and controversial, and the article is interesting.  For example, in the very first paragraph he predicts: "Governments will be caught off-guard when large numbers of their citizens, armed with virtually nothing but […]

No comments

Why Crossroads?

A 2009 report of the American Bar Association concluded: What will be the enduring image of this cyber era?  Will it be one of a darkened city, whose electric grid has failed?  Will it be a picture from Second Life or the image of a computing cloud?  Or will it be a picture of cybercriminals […]

Comments Off on Why Crossroads?

Oct 27th, 2010 Uncategorized

Plan to Store Briton’s Phone and Internet Data Revived

The Guardian reports, in an article dated October 20, 2010 and written by Charles Arthur, that the Liberal Democrats, now in charge of Briton's government, are moving to "revive a plan to store every email, webpage visit and phone call made in the UK."  Interestingly, moving away from massive information storage efforts was a pledge […]

No comments

The Online Threat: Should We Be Worried About A Cyber War?

In an article dated November 1, 2010, Seymour M. Hersh of The New Yorker, explains how the spring 2001 incident involving an American EP-3E Aries II reconnaissance aircraft and the Chinese military has spiraled into today's debate on cybersecurity.  At the time, the Pentagon reassured reporters that the crew had followed mandated protocols aimed at […]

No comments

SecureIDNews | Liability, legislation around online ID

If private corporations are to issue identity credentials there will need to be some type of legislation passed spelling out the liability issues, says Tom Smedinghoff, a partner at the law firm of Wildman Harrold and chairman of the American Bar Association Task Force exploring the legal issues around identification. via www.secureidnews.com Further, says Smedinghoff […]

No comments

Air Force manual describes shadowy cyberwar world – Wash. Post

Reports the Washington Post: DENVER — A new Air Force manual for cyberwarfare describes a shadowy, fast-changing world where anonymous enemies can carry out devastating attacks in seconds and where conventional ideas about time and space don't apply. Much of the 62-page manual is a dry compendium of definitions, acronyms and explanations of who reports […]

No comments

White House Council Launches Interagency Subcommittee on Privacy & Internet Policy

White House Council Launches Interagency Subcommittee on Privacy & Internet Policy Submitted on October 24, 2010 – 10:00am Categories: Office of the Secretary As part of the Obama Administration’s commitment to promoting the vast economic opportunity of the Internet and protecting individual privacy, the National Science and Technology Council has launched a new Subcommittee on Privacy […]

1 comment

All comments received by the DoC on Cybersecurity, Innovation and the Internet Economy

Here are links to all of the comments received by the Department of Commerce to its notice of inquiry concerning cybersecurity, innovation, and the Internet economy.  One of several questions reaised by the notice of inquiry concerned the National Strategy for Trusted Identities in Cyberspace.  Our response is included in this list. Comments received in […]

No comments

Public Health Care Model for Internet Security – U.S., Australia, & Microsoft all consider

In an earlier post on October 8th, we discussed Microsoft Vice President Scott Charney's proposal to use the public health care system as a model for Internet security.  That post highlighted the international nature of Charney's proposal.  The news media and this post, however, highlight its references to the public health care system. The Wall […]

No comments

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories