Archives
Enrollment Open for Online Cyber Security Law and Policy Course
Follow this link for details of the course sponsored by the Institute for National Security & Counter Terrorism, and joint endeavor of the College of Law and of the Maxwell School for Citizenship and Public Affairs at Syracuse University, designated a National Center of Academic Excellence by the National Security Agency. Please follow and like […]
6-week ONLINE course, Cybersecurity Law & Policy – enrollments now open!
Announcing the opening of enrollment for a 6-week online course, Cybersecurity Law & Policy, that I will be teaching during February 13-March 30, 2012. Designed for mid-career professionals, participants will gain perspective on the current threats to national security from cyberspace and the challenges and complexities of addressing law and policy deficiencies.
Computer Crime and Intellectual Property Law internships
Law Intern Opportunities Opportunities are available in the Computer Crime and Intellectual Property Section of the U.S. Department of Justice for qualified candidates interested in summer law internships or academic semester law internships (sometimes called "externships"). Law interns work directly with attorneys on cutting edge legal issues relating to computer crime and intellectual property crime. […]
Federal Laws Relating to Cybersecurity, A 12/7/11 CRS Report
The Federation of American Scientists Project on Government Secrecy has posted a new report from the Congressional Research Service entitled, Federal Laws Relating to Cybersecurity: Discussion of Proposed Revisions. The report, dated December 7, 2011, includes materials on: Posse Comitatus Act of 1879 Antitrust Laws and Section 5 of the Federal Trade Commission Act National […]
Cybersecurity in the Balance: Weighing the Risks of the PROTECT IP Act and the Stop Online Piracy Act – Brookings Institution
On November 15, 2011, The Brookings Institution posted a useful analysis of two pending bills, Senate bill S.968, or the PROTECT IP Act, and the House bill H.R. 3261, the Stop Online Piracy Act. I will probably add this to next week’s assignment for Syracuse University’s Cyber Security Law & Policy course. I’d like to […]
Cyber Strategies From Around the World
Here is a collection of links to cyber strategies from around the world, assembled by the UK Foreign & Commonwealth Office: International links Australia White Paper on Cyber Budapest Convention on Cybercrime Canadian Cyber Security Strategy Estonian Cyber Security Strategy European Network and Information Security Agency (ENISA) French Cyber Security Strategy G8 24/7 Initiative information […]
Report: Russia and China are top thieves of U.S. technology – CNN
CNN is reporting on 11/3/11 that: "For the first time, the United States is publicly accusing China and Russia of being the top offenders in the theft of U.S. economic and technology information, according to an intelligence report released Thursday." The actual report was released by the United States National Counterintelligence Executive and can be […]
Distance Learning Cyber Security Course Under Development at Syracuse University
Soon, students anywhere in the world will be able to enroll in a course entitled Cyber Security Law and Policy. The course is currently under development by various offices of Syracuse University, including the Institute for National Security and Counter-terrorism (INSCT) – a joint venture of the Maxwell School of Citizenship and Public Affairs and […]
White House Notes Progress of NSTIC
In an October 14, 2011 entry on the White House Blog, Cybersecurity Coordinator Howard Schmidt reports that the Federal Chief Information Officer has just issued a memorandum requiring Executive departments and agencies to “accept approved externally-issued credentials” as they upgrade certain websites. Of particular note is the information that “Equifax, Google, PayPal, Symantec and Wave […]
Rethinking Cybersecurity – A Comprehensive Approach | Center for Strategic and International Studies
James Lewis, who spoke on our campus (Syracuse University) last year, released the text of a speech he gave on September 20, 2011 entitled Rethinking Cybersecurity – A Comprehensive Approach. While there certainly are some points with which I disagree, his analysis and recommended approach are an important contribution. He offers an interesting analogy of […]