Archives

Archive for February, 2014

New Momentum for Electronic Communications Privacy Act Reform

Yesterday, the Electronic Frontier Foundation (EFF), one of the most prominent non-profit digital rights organizations, released a statement on their website, calling for support of the Email Privacy Act. The bill seeks to amend the Electronic Communications Privacy Act of 1986 (ECPA), primarily by the requirement of a probable cause warrant for any governmental access to users’ […]

No comments

Cyber Insurances And Their Potential To Get Security More Standardized

In the wake of the recent high profile data breaches, most prominently the attack on the Target Corporation, it is my impression that insurance companies may evolve as an effective driver of securing cyberspace. While the National Institute for Standards and Technology’s (NIST) cyber security framework encourages organizations non-bindingly to consider and prioritize risks from cyber, proposals […]

No comments

Maryland Expands its Cybersecurity Dominance

CBS reports that recently Maryland Governor Martin O’Malley and Senator Barbara Mikulusk (D. Maryland) came together in the Maryland statehouse and created a partnership by bringing together federal, state and private industry actors to expand the National Cybersecurity Center of Excellence and move it into a permanent home. The National Cybersecurity Center of Excellence was established in […]

No comments

Cyber-Offensive Considerations in Syria

According to a report published by the New York Times yesterday, when the civil uprising in Syria turned violent in the spring of 2011, key government agencies, such as the National Security Agency (NSA), produced a plan for cyberstrike against the Assad regime that would “essentially turn the lights out for Assad.” However, President Obama has […]

No comments

Apple Software Flaw Exposes Mobile Devices to Hack

On Friday, Apple Inc. Software announced it had uncovered a critical flaw in its mobile device software that may allow hackers to intercept communications that would otherwise be encrypted, Reuters reports. “It’s as bad as you could imagine, that’s all I can say,” commented cryptology professor Matthew Green of Johns Hopkins University. As CNN reported, […]

No comments

Cyber Roundup: AT&T Releases the Numbers; Important Federal Court Rulings this Week; Clapper Says Surveillance Debacle Could Have Been Avoided

Last week, AT&T released the rough numbers reflecting the frequency with which the U.S. government (USG) has secretly demanded the phone records of AT&T consumers, Wired reports.  Furthermore, according to the Wall Street Journal, such requests amount to at least 35,000 records between January and June of 2013. The New York Times reports that the […]

No comments

WSJ: “How Cybersecurity Laws Are Outdated”

This video of Mike McConnell, former DNI and director of the NSA, was posted last week by the Wall Street Journal.  In it, John Bussey, assistant managing editor and executive business editor of WSJ, talked to McConnell about cybersecurity and the importance of information sharing.   Here’s the link.

No comments

Feb 20th, 2014 Current Affairs, Law, NSA

Army Field Manual Cyber Electromagnetic Activities now available

The U.S. Army Field Manual No. 3-38 Cyber Electromagnetic Activities dated 12 February 2014 is now available for download from the American Federation of Scientists.

1 comment

Of Fridges and Pacemakers: The Pervasive Vulnerabilities of the Internet of Things (2/2)

Yesterday’s blog post raised awareness on the insecurities of the Internet of Things (IoT). Widespread vulnerabilities make all kinds of “smart” devices an easily accessible and controllable target for hackers and cyber criminals. Several examples of cyber attacks on such embedded systems have been mentioned to substantiate security expert Bruce Schneier’s problem statement. With today’s […]

No comments

Of Fridges and Pacemakers: The Pervasive Vulnerabilities of the Internet of Things (1/2)

  The Problem In January, the Wired magazine published an essay, in which cyber security guru Bruce Schneier warned about the security risks of the Internet of Things (IoT).  “Riddled with vulnerabilities,” information technology (IT) embedded in all kinds of appliances at home, in the public, in cars, or even in our bodies allows hackers to […]

1 comment

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories