Archives

Archive for February, 2012

Survey Of RSA Conference

RSA's 2012 conference is going on right now; that conference is one of the biggest cybersecurity conferences around.  And yes, that's the same RSA that was hacked earlier this year.  A quick survey of everything that has come out of the conference so far: *** Stacy Cowley reported for CNN on the RSA conference.  According […]

No comments

Cyber Legislation Will Cost Businesses And Hurt Economy: Forbes

On Feb. 27th, 2012, Jody Westby wrote for Forbes on the possible effects that cyber legislation could have on the economy.  Boldy asserting that the recent Cybersecurity Act of 2012 (CSA) could be "one of the most expensive and intrusive pieces of legislation proposed since Sarbanes-Oxley", the author argued that the bill's signature critical infrastructure […]

No comments

Feb 28th, 2012 Criticism, Legislation

White House, NSA Weigh Cybersecurity, Personal Privacy: WashPo

On Feb. 27th, 2012, Ellen Nakashima wrote two extremely interesting articles for the Washington Post on the NSA's desire to monitor private networks.  The articles were split in two (the first titled White House, NSA weigh cybersecurity, personal privacy; the second titled When is a cyberattack a matter of defense?), but the content was similar.  […]

No comments

WikiLeaks Publishes Leaked Stratfor Emails: WashPo

On Feb. 27th, 2012, the Washington Post reported on WikiLeaks' latest document release: 5 million of Stratfor's company e-mails.  For those that don't remember, the hacker group Anonymous broke into Stratfor  and swiped those e-mails.  Stratfor is a private intelligence firm that engages in "global geopolitical analysis."  Interestingly, WikiLeaks has been criticized for releasing this […]

No comments

Feb 27th, 2012 wikileaks

Will A Standardized System For Verifying Web Identity Ever Catch On? CNN

On Feb. 15th, 2012, Mark Milian reported for CNN on web identity management.  Noting the weakness inherent to passwords, Milian mentioned one of our favorite identity management proposals: NSTIC (National Strategy for Trusted Indentities in Cyberspace).  Again, the idea behind NSTIC is that people can choose an entity (perhaps a company like Google, or Paypal) […]

No comments

Feb 26th, 2012 Identity Management

Former CIA/NSA Head Gen. Michael Hayden To Speak In Syracuse At SATSA’s Annual Conference, 3/31/12

No comments

Feb 24th, 2012 Uncategorized

Concerns About the Cyber Security Act Of 2012

Last week, Senate Democrats released their proposed cybersecurity legislation: The Cyber Security Act of 2012 (CSA).  You can get some background on the CSA here, but the basic idea is that DHS would regulate critical infrastructure.  Of course, the CSA immediately ran up against Republican opposition, with Sen. McCain promising to offer an alternative bill […]

No comments

Feb 24th, 2012 Criticism, Legislation, privacy

EU’s Highest Court To Rule On ACTA: BBC

On Feb. 22nd, 2012, Dave Lee reported for BBC on ACTA, the controversial international trade agreement that aims to protect intellectual property rights.  ACTA is, in a sense, an international version of SOPA/PIPA.  Like SOPA/PIPA, ACTA has encountered fierce resistance; protests, cyberattacks, and remorseful withdrawls have followed any representative who dared sign ACTA.  Many European […]

No comments

US FCC Urges Internet Companies To Safeguard Web: Reuters

On Feb. 22nd, 2012, Reuters reported on remarks made by FCC Chairman Julius Genachowski.  You can find those remarks here.  In his remarks, the Chairman said that ISPs have to focus on "three significant cyber threats – botnets, domain name fraud, and IP hijacking."  In doing so, ISPs (like AT&T, Verizon, Comcast, etc.) should do […]

No comments

Feb 23rd, 2012 privacy, regulation

Beware the Patriotic Geek: The Risk of Cyber Militias in Asia (CFR)

On Feb. 22nd, 2012, Adam Segal wrote for the Council on Foreign Relations regarding the phenomenon of patriotic hackers.  Patriotic hackers use their hacking abilities to help out their home countries, but they aren't necessarily employed by their home governments.  However, their home governments benefit from their hacking activities while maintaining plausible deniability (i.e. we […]

No comments

Feb 22nd, 2012 cyber attack, intermediaries

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories