Archive for October, 2012

Cyber roundup (10/31): Update on SC breach, FBI attribution emphasis draws criticism, WashPo cyber conference, private firms hiring U.S. information warfare experts for hackback, and more . . .

Happy Halloween!  Here’s a quick survey of some recent cyber news . . . *** Tim Smith, for, on that breach of South Carolina’s Department of Revenue.  According to Smith, that breach saw “3.6 million Social Security numbers and 387,000 mostly encrypted credit or debit card numbers” compromised.  Moreover, it appears that the hacker […]

No comments

Cyber roundup (10/30): Georgia outs Russia-based hacker, FBI working on attribution, DOD and BYOD, and cyber triage

Quick survey of recent cyber news . . . *** Fascinating article from Computerworld’s Jeremy Kirk.  Apparently the Georgian government outed a Russian hacker with ties to the Russian government by hacking back into his computer, taking his photograph, and releasing that photograph.  Kirk documented the entire incident: a very talented Russian hacker kept breaking […]

No comments

Suits and Spooks DC 2013 conference talks hackback, private sector active defense

Never really heard of them before, but trolling around on Twitter, I came across AIA Global Inc’s Suits and Spooks DC 2013 conference.  I posted it here because the conference sounds fascinating.  Take a look at the topic: “Offense As Defense” Some of the most important discussions that will take place in 2013 will be […]

No comments

NSTIC Update: FierceGovernmentIT/Nextgov

On 10/22, Molly Bernhart Walker wrote for FiereceGovernmentIT on NSTIC and the Centers for Medicare and Medicaid Services (“CMS”).  According to the article, CMS is interested in relying on NSTIC’s federated identity management program as a relying party rather than a credential provider.  The article also mentioned that the Office of Management and Budget “is […]

No comments

Oct 29th, 2012 Identity Management, NS-TIC

U.S. Army building cyber into its combat exercises: Foreign Policy

John Reed, for Foreign Policy’s Killer Apps blog, on how the U.S. Army is integrating cyber capabilities into its combat exercises.  According to Reed, reps from U.S. Army CyberComm embedded with Army units in a war games scenario against a near peer nation with an advanced military.  Over the course of the exercise, Army commanders […]

No comments

Should we lie online? infosecurity

On 10/26, infosecurity reported on a suggestion from the head of security for one of Europe’s largest public services networks: lie.  Lie to Facebook.  Lie to Twitter.  Lie to all social sites.  According to the article,  Andy Smith of the Cabinet Office suggested that users should “only provide their true personal details to trusted websites […]

No comments

Oct 28th, 2012 anonymity, NS-TIC, privacy

The Unexpected Importance of Geography in a Digital World – The Economist

The October 29, 2012 issue of The Economist has a lengthy special report on technology and geography entitled, “Location, Location, Location.”  Parts of it, I believe, are behind the subsrcibers’ only paywall, but at least parts are available to all.  For my students, I would call this an excellent update to Jack Goldsmith’s book Who […]

No comments

Oct 28th, 2012 anonymity, future, regulation

Cybersecurity bill likely dead: The Hill

Jennifer Martinez reported for The Hill on cybersecurity legislation.  There has been some renewed optimism that cybersecurity legislation might see passage before the end of the term.  DefSec Panetta urged it.  Sen. Harry Reid pushed for it.  Unfortunately, it doesn’t look like it’s going to happen.  Martinez explained that a packed legislative docket, lack of […]

No comments

Oct 27th, 2012 Legislation

Taxpayer data exposed in cyber attack on South Carolina: Reuters

On 10/27, Harriet McLeod reported for Reuters on a cyberattack against South Carolina’s Department of Revenue.  According to the article, that cyberattack potentially exposed “3.6 million Social Security numbers and 387,000 credit and debit card numbers used by state taxpayers,” with 16,000 of those credit card numbers unencrypted.  Most of the credit card numbers were […]

No comments

Oct 27th, 2012 Cyber Exploitation

When is a cyberattack an act of war? WashPo

On 10/26, Ellen Nakashima wrote a great article for The Washington Post on the ambiguity behind cyberwar.  Noting DefSec Panetta’s recent comments, Nakashima asked a series of questions: “[W]hat does an act of war look like in cyberspace?”  How will the U.S. respond?  What will the U.S. do if a cyberattack falls short of that […]

No comments

Next Page »


Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. She is the 2018-9 Editor in Chief of the Syracuse Law Review, as well as a member of the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography


Follow by Email