Archives

Archive for the ‘Official Policy’ Category

“Securing Cyber Assets” Draft Report Released by National Infrastructure Advisory Council

The President’s National Infrastructure Advisory Council (NIAC), composed of senior executives from industry and State and local government who own and operate the critical infrastructure, issued an August 2017 report entitled, “Securing Cyber Assets: Addressing Urgent Cyber Threats to Critical Infrastructure.”  Noting that “[c]yber is the sole arena where private companies are the front line […]

No comments

NIST Request for Comments on Internet of Things

From the National Institute of Standards and Technology, dated 8/15/17: SP 800-53 Rev. 5 DRAFT Security and Privacy Controls for Federal Information Systems and Organizations As we push computers to “the edge” building an increasingly complex world of interconnected information systems and devices, security and privacy continue to dominate the national dialog. There is an […]

1 comment

UK Cyber Strategy: Full Report

Attached is the official version of the UK’s National Cyber Strategy that was mentioned in this morning’s Round Up.

No comments

UK launches new cyber strategy; Treasury releases cyber guidelines; Dyn attack poses legal trouble

UK Government launches new National Cyber Security Strategy today (SC Magazine):  The UK will announce a new national cyber strategy later today, according to reports.   An article says that Chancellor Phillip Hammond will outline a  £1.9 billion plan to become “the safest place in the world” to do business.  This nearly doubles the previous strategy, the […]

No comments

America’s strategy for cyberspace: Is it working? – A Talk by Michael Hayden

“We just haven’t settled on the big concepts yet,” was former CIA and NSA director Michael Hayden’s message about cyber security  to the American Enterprise Institute on October 27, 2015.  His talk was organized around an op-ed that appeared the same day on RealClearDefense and four key points. Number one, that the private sector bears […]

No comments

Kerry on U.S. International Cybersecurity Policy: Full video

“The United States considers the promotion of an open and secure internet to be a key component of our foreign policy,” said Secretary of State John Kerry on May 18, 2015, in South Korea. Although the July 2011 Department of Defense Strategy for Operating in Cyberspace has already been replaced by The DoD Cyber Strategy, […]

No comments

Actual U.S. DoD Cyber Strategy

We’ll have lots of analysis and commentary over time, no doubt, but we just want to make sure you all have a copy of the actual [U.S.] Department of Defense Cyber Strategy of April 2015 by posting it here: Of course, it is always better to read the actual source document for yourself before reading […]

1 comment

Draft AUMF from White House

On February 11, 2015, the President of the United States sent a letter to Congress “submitting a draft AUMF that would authorize the continued use of military force to degrade and defeat ISIL.”  Recall that past Authorizations for Military Force (AUMF) have been cited by the White House as authority for electronic surveillance as “signals […]

No comments

Cyber Round Up: White House Breach Linked to Russian Government; New Law Against Cyber Squatting in Nigeria; DHS Probes Cybersecurity Dangers in Medical Devices; New Report Links Cyber Espionage Group to Chinese Intelligence; Justice Official Speaks on Government-Business Cooperation to Improve Cybersecurity

The Washington Post reports that hackers thought to be working for the Russian government breached the unclassified White House computer networks in recent weeks resulting in temporary disruptions to some services while cybersecurity teams worked to contain the intrusion.  However, the article also states that the intruders did not damage any of the systems and […]

No comments

Offensive Cyber Operations in US Military Doctrine

The term “offensive cyberspace operations (OCO)” has been added to the official Department of Defense lexicon, and the term is discussed in depth in a newly discovered Department of Defense doctrinal publication by the Joint Chiefs as Staff.  How is this term defined and when should the military resort to offensive cyberspace operations? See below for excerpts […]

No comments

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories