Archive for January, 2012

Law Firms The Victim Of Cyber-Espionage: Forbes & Bloomberg

For all you legal types, take notice. On Jan. 31st, 2012, Eric Savitz wrote an eye-opening article for Forbes on Chinese cyber-espionage against US law firms.  The article was set out in a question and answer transcript between Alan Paller (director of research for the SANS Institute) and the managing and IT partners of a […]

No comments

Iran Willing To Attack On U.S. Soil, U.S. Intelligence Reports Find: WP

On Jan 31, 2012, Greg Miller reported for the Washington Post on testimony given by James Clapper, the Director of National Intelligence.  You can find Director Clapper's prepared remarks here.  That testimony (which is going on today) is for a threat assessment hearing for the Senate Intelligence Committee. According to the article, Clapper cites the […]

No comments

Cybersecurity Legislation And Constitutional Rights: The Constitution Project

 The Constitution Project, a constitutional rights watchdog, recently posted a report titled Recommendations For The Implementation Of A Comprehensive And Constitutional Cybersecurity Policy.  The Constitution Project's Liberty and Security Committee wrote the report (which was dated Jan. 27th, 2012).  The report takes an in-depth look at constitutional privacy concerns with upcoming cybersecurity legislation. A quick […]

No comments

Senate Cybersecurity Bill Sparking Concerns About Government Control: The Hill

On Jan. 29th, 2012, Gautham Nagesh wrote for The Hill on comprehensive cybersecurity legislation.  Apparently one cybersecurity bill will make it to the Senate floor this week.  That bill has not been publicly released.   As for the bill, the article explained that its content gives DHS regulatory power over critical infrastructure.  These provisions, however, […]

No comments

Jan 30th, 2012 Legislation

10 Japanese Industrial Control Systems Infected: Daily Yomiuri

On Jan. 23rd, 2012, the Daily Yomirui reported on a computer infection that affected industrial control systems in Japanese vehicle and chemical plants.  Again, industrial control systems (ICS) are the computer systems that control the physical machinery of factories, utilities, etc.  If you can take control of an ICS through cyberattack, you can potentially cause […]

No comments

Jan 30th, 2012 cyber attack

How To Tackle Cybersecurity: Politico

On Jan. 29th, 2012, Politico ran an op-ed on cybersecurity legislation written by Senators Kay Bailey Hutchinson, Chuck Grassley, Saxby Chambliss, and Lisa Murkowski.  All of those Senators are Republican. Many representatives have said that Congress needs to pass cybersecurity legislation quickly.  President Obama recently called for cybersecurity legislation passage in his State of the […]


Jan 30th, 2012 Legislation


On Jan. 27th, 2012, Chloe Albanesius wrote for on the newest anti-piracy legislation: the Anti-Counterfeiting Trade Agreement, or ACTA.  ACTA is an international agreement that is "designed to extend existing intellectual property enforcement laws to the Internet."  It's somewhat unclear what powers ACTA would give to a signatory.  The article mentions that signatory countries […]

No comments

Call For Cyberwar ‘Peacekeepers’ Force, And Willing to Relax Criteria to Get Them: BBC

On Jan. 26th, 2012, Susan Watts reported for BBC on a new US recruitment surge for "cyber-warriors" and the possibility of a UN cyber-peacekeeping force. First, Watts wrote that the US military wants to recruit 10,000 new "cyber-warriors" to improve the US cyber-capability.  Interestingly, Watts claims that the US military will relax entrance criteria for […]

No comments

Jan 27th, 2012 Cyber Command

The Internet is NOT Borderless

Cyberspace is not some borderless new reality, separate and apart from the physical world.  It is not the death of distance. The statement in “A Declaration of the Independence of Cyberspace” that, “[o]urs is a world that is both everywhere and nowhere, but it is not where bodies live,” and that,  “[y]our legal concepts of […]

1 comment

China’s Cyber Thievery Is National Policy—And Must Be Challenged: WSJ

Wow.  Just wow.  On Jan. 27th, 2012, Mike McConnell, Michael Chertoff, and William Lynn co-authored an Op-Ed for the Wall Street Journal on Chinese cyber-espionage.  If you don't recognize the authors, it's a veritable all-star team of US national security figures:  Adm. McConnell was the former director of the NSA and director of national intelligence; […]

No comments

Next Page »


Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. She is the 2018-9 Editor in Chief of the Syracuse Law Review, as well as a member of the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography


Follow by Email