Archives

Archive for February, 2013

FBI Dir. Mueller Speaks at RSA Cyber Security Conference

FBI Director Robert Mueller spoke today, 2/28/13, at the RSA conference.  He spoke about: What are the lanes in the road for federal agencies that handle cyber security? The crucial role of the private sector, and Obstacles to collaboration between the private sector and government. The complete text of his remarks as released by the […]

No comments

Feb 28th, 2013 Uncategorized

China claims no soliders engage in “cyber war,” accuse U.S.: Global Times/WSJ

The Global Times, which previously brought us this asinine op-ed, reported that “China does not have any soldiers engaging in cyber warfare,” according to a PLA spokesman.  The same spokesman claimed that “[t]he Chinese military has never backed any hacking activities.”  While it may be true that the PLA doesn’t have any soldiers actively engaged […]

No comments

Active Cyber Defense: A Framework for Policymakers (CNAS)

Hat tip to FCW’s Emily Cole.  A few days ago, the Center for a New American Security (CNAS) released a report written by Irving Lachow titled Active Cyber Defense: A Framework for Policymakers.  The report is a very useful and readable summary on the technical/legal issues behind private sector active defense.  Mr. Lachow’s closing thoughts: […]

No comments

Feb 26th, 2013 deterrence

What China’s hackers get wrong about Washington: WashPo

Erza Klein wrote an interesting article for The Washington Post that covered Chinese hackers’ efforts to understand American politics.  Noting a previous WashPo article that explained Chinese cyberspies had penetrated “powerful Washington institutions,” Klein questions why the Chinese are going after law firms, newspapers, and think-tanks.  As for law firms, it was my understanding that […]

No comments

Feb 25th, 2013 Cyber Exploitation, warfare

A New Cold War, in Cyberspace, Tests U.S. Ties to China: NYT

Man, I love Sunday nights, the NYT or WashPo always drops something good around 9-10pm. For tonight’s article, David Sanger writes for The New York Times on the China-U.S. relationship and how the USG might respond to pervasive Chinese cyberexploitation.  A few interesting tidbits: USG released a list of malicious computer addresses, but declined to […]

No comments

Feb 24th, 2013 Cyber Exploitation

Cyber Roundup (2/23): Brace yourself . . . cyberexploitation stories are coming.

I step away from the blog for two days and there is an avalanche of stories on Chinese cyberexploitation, Mandiant, and the USG response. In case you missed it (I doubt it), here’s the NYT story that started it all.  That Mandiant story has generated a huge media response that I just don’t get.  We’ve […]

No comments

White House Strategy On Mitigating The Theft Of U.S. Trade Secrets

Via the White House website: Today, I am pleased to announce the Administration’s Strategy on Mitigating the Theft of U.S. Trade Secrets. Trade secret theft can cripple a company’s competitive advantage in foreign markets, diminish export prospects around the globe, and put American jobs in jeopardy. The President is committed to preventing the theft of corporate […]

No comments

More on Mandiant, PLA Unit 61398, USG response to cyberexploitation

I’m sure you’ve already heard the news, but just in case you haven’t, the NYT reported that Mandiant (a cybersecurity/incident response firm) tracked certain cyber intrusions back to a PLA Unit in Shanghai.  You can find the Mandiant report here, it is absolutely worth reading. News that PLA-related Chinese hacker units have broken into US […]

No comments

Feb 20th, 2013 Cyber Exploitation

Upcoming Live Webcast From Brookings on Cyber Security v. Trade

The Brookings Institution announced in a post on their website that they will examine government restrictions in cyber and question, “[h]ow are these restrictions being used to prevent cybercrime or protect intellectual property, are they effective, and are there unintended consequences to these regulations? The February 26, 2013, will be webcast live from 2:00 PM […]

No comments

Feb 19th, 2013 regulation

Video from NY Times Chinese Army Hacking Report

To accompany the post, Chinese Army Unit Is Seen as Tied To Hacking Against U.S.: NYT , here is video of an interview and demonstration with Kevin Mandia, CEO of the company whose report prompted the NY Times article. David E. Sanger talks with Kevin Mandia, an Internet security expert, about new research linking cyberattacks […]

No comments

Feb 19th, 2013 Cyber Exploitation

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories