Archives

Archive for the ‘Cyberwar’ Category

“Military Cyber Operations” Congressional Hearing to be Held on 6/22/16

WASHINGTON – House Armed Services Committee Chairman Mac Thornberry (R-TX) released the following schedule featuring one (1) hearing the week of June 20-24, 2016. Wednesday, June 22, 2016 “Military Cyber Operations“ Full Committee (10:00 AM – 2118 Rayburn – OPEN) Witnesses: Mr. Thomas Atkin Acting Assistant Secretary of Defense for Homeland Defense and Global Security […]

No comments

Jun 20th, 2016 Cyber Command, Cyberwar

Cyber Operations: Improving the Military Cybersecurity Posture in an Uncertain Threat Environment

Cyber Operations: Improving the Military Cybersecurity Posture in an Uncertain Threat Environment — hearing before the Subcommittee on Emerging Threats and Vulnerabilities. The full report is available below.  

No comments

UK Nuclear Weapons Vulnerable to Cyberattacks?

Are the UK’s Trident Nuclear Weapons Vulnerable to Cyberattacks? (ITProPortal): A recent article by Mark Wilson which appeared in ItProPortal indicates that Des Browne, the former UK defense secretary believes that the Trident nuclear weapons are susceptible and could be rendered useless in a coordinated cyberattack.  The article also indicates that the US had previously […]

No comments

U.S. Cyber Command Moves Towards Lethal Cyber Weapons

U.S. Cyber Command $460 million Cyber Project In a follow-up to a recent round-up; according to NextGov, an upcoming $460 million project at U.S. Cyber Command will outsource a number of offensive cyber capabilities to the private sector.  NextGov reports that these new weapons that will be developed will give the U.S. military the ability […]

No comments

Cyber Round Up: PA Federal Court finds standing in class action, Cyberwar Ignites a New Arms Race, Obama Won’t Seek Access to Encrypted User Data

Pennsylvania Federal Court Finds Standing in Data Breach Class Action (Cyber Law Monitor): The U.S. District Court for the Eastern District of PA has found standing in a data breach class action, marking the first time this court has done so, according to this article.  The article indicates that this is similar to other courts […]

No comments

Cyber Round Up: Emerging Legalities in a post-Wyndham World, Creating a Culture of Cybersecurity, One for All and All for One, US Authorities name Chinese Firms Involved in Hacks

Important Lessons in Cybersecurity post-Wyndham (Security, Privacy and the Law): According to an article by Colin Zick, the Wyndham case has brought cybersecurity issues into the forefront.  Zick’s article states some very basic premises, namely that a firm has to be cognizant of, and in compliance with its own security and privacy policies.  The article […]

No comments

NATO Conference on Cyber Conflict materials now available.

The NATO Cooperative Cyber Defence Centre of Excellence in Estonia has now posted online many materials from its 2015 Conference on Cyber Conflict.  This year’s topic, “Architectures in Cyberspace,” asked what cyberspace is and will be in the coming years as well as how cyber security will develop.  Included are 17 documents of proceedings, and approximately […]

No comments

Actual U.S. DoD Cyber Strategy

We’ll have lots of analysis and commentary over time, no doubt, but we just want to make sure you all have a copy of the actual [U.S.] Department of Defense Cyber Strategy of April 2015 by posting it here: Of course, it is always better to read the actual source document for yourself before reading […]

1 comment

Iran’s Cyber Revenge

In 2010, the United States and Israel reportedly attacked Iran’s nuclear enrichment center using a computer worm that caused about 1,000 centrifuges to self-destruct.  From recent reports by cybersecurity firms Norse and Cylance*, it appears that Iranians have begun a cycle of cyber retaliation. Unlike nuclear technology, cyber tools provide Iran with a usable weapon with […]

No comments

@War Book Review: “The Internet Has Become a Battlefield”

The current consensus in the cybersecurity realm is that the government and private industry need to improve cooperation and information sharing.  Shane Harris examines the pros and cons of this approach in his book @War: The Rise of the Military-Internet Complex.  The book takes the reader on a historical journey behind America’s cybersecurity policies and through this journey […]

No comments

« Previous PageNext Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories