Archive for November, 2011

Cybersecurity Bill Promotes Sharing Of Threat Data: Washington Post

On Nov. 30th, 2011, Ellen Nakashima reported for the Washington Post on how leaders of the House Intelligence Committee have introduced new cybersecurity legislation.  The bill, called the Cyber Intelligence Sharing and Protection Act (CISPA), would "foster the sharing of online information between the private sector and the government."  To do so, the legislation exempts […]

No comments

Nov 30th, 2011 Legislation

Hackers Getting Hacked: San Francisco Chronicle

On Nov. 30th, 2011, James Temple reported for the San Francisco Chronicle on how companies are hacking the hackers.  The article describes one Fortune 500 company that used counter-espionage software; the software slowed a cyberattack in progress, sent the hackers to a "virtual tar pit", and then blocked the offending computers from the company's website […]

No comments

Nov 30th, 2011 deterrence, technology

Can Hackers Set Fire To Your Printer? LA Times

On November 29th, Deborah Netburn reported for the LA Times on claims that hackers can set fire to your printer.  The article cited an MSNBC article, which in turn had cited a Columbia University study that found HP printers "are completely open and available to be exploited" and could allow hackers to steal personal information, […]

No comments

FBI Says Hackers Accessed SCADA Systems: Information Age

This one just won't die.  We've heard that hackers accessed a Springfield water plant.  Then DHS/FBI concluded that the failure of a water pump in Springfield was not a cyberattack.  Now, Hal Hodson is reporting for Information Age that the FBI has confirmed that hackers accessed SCADA systems controlling critical infrastructure in three cities.  Specifically, […]

No comments

China’s Cyber Threat A High-Stakes Spy Game: NPR

On November 27th, 2011, NPR reported on the extent of ongoing Chinese cyber espionage.  The article explained that the Chinese engage in cyber-espionage to make up for a technological deficiency with the US.  The article also quoted one cyber expert as saying that espionage has an "immediate economic benefit: You don't have to pay for […]

No comments

Nov 29th, 2011 Cyber Exploitation

Cybersecurity Requires Patches, Not A Vast Bill: Bloomberg Businessweek

On Nov. 28th, 2011, Susan Crawford wrote a very persuasive opinion article for Bloomberg Businessweek.  In the article, Crawford argued that the best way to address US cybersecurity concerns is through agile, reactive "patches" as opposed to restrictive, rigid cybersecurity legislation.  Unfortunately, Crawford believes that the Obama administration's omnibus cybersecurity bill is top-heavy, and would […]

No comments

Nov 28th, 2011 Current Affairs, Legislation

The British Cybersecurity Hub:

Going back to the recently released British cybersecurity strategy, I really love the idea of this "hub."  Again, the hub is basically an information-sharing initiative between the British government and British companies.  Stuart Sumner wrote for on what this hub will entail.  The article quoted a British cyber expert who said that the hub […]

No comments

Nov 28th, 2011 Current Affairs

President Obama’s Doctrine Of Silence: NYT

On Nov. 28th, 2011, Roger Cohen wrote an op-ed for the New York Times on the Obama administration's "doctrine of silence."  To Cohen, the doctrine of silence (as opposed to President Bush's decidedly…loud war on terror) is the Obama administration's shift to covert operations in areas like Pakistan and Iran.  The doctrine is silent because, […]

No comments

Nov 28th, 2011 warfare

New York Times, Los Angeles Times Stand Against SOPA/PIPA

Add the New York Times and the Los Angeles Times to the growing list of publications that oppose SOPA/PIPA.  In two opinion pieces, both papers came out against the legislation through an official editorial (as opposed to the stance of just one columnist). The New York Times official editorial, published Nov. 26th, 2011, noted that […]

No comments

Nov 28th, 2011 Legislation

More On The UK Cybersecurity Plan

Just a few more points on the UK cybersecurity plan: ZDNet reported that the strategy would allow the UK government to launch "Stuxnet-like attacks" against the "specific nuclear operations or programmes" of rogue states.  The Financial Times reported that the strategy calls for the GCHQ, the British equivalent of the NSA, to sell some of […]

No comments

Nov 27th, 2011 Official Policy

Next Page »


Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. She is the 2018-9 Editor in Chief of the Syracuse Law Review, as well as a member of the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography


Follow by Email