Archives

Archive for the ‘warfare’ Category

Actual U.S. DoD Cyber Strategy

We’ll have lots of analysis and commentary over time, no doubt, but we just want to make sure you all have a copy of the actual [U.S.] Department of Defense Cyber Strategy of April 2015 by posting it here: Of course, it is always better to read the actual source document for yourself before reading […]

1 comment

Draft AUMF from White House

On February 11, 2015, the President of the United States sent a letter to Congress “submitting a draft AUMF that would authorize the continued use of military force to degrade and defeat ISIL.”  Recall that past Authorizations for Military Force (AUMF) have been cited by the White House as authority for electronic surveillance as “signals […]

No comments

INCYDER, Comprehensive Tool for Cyber Security Research

From NATO Cooperative Cyber Defence Centre of Excellence: The brand new web-based INCYDER (International Cyber Developments Review) database is now open to public for free. The portal, developed and hosted by the NATO Cooperative Cyber Defence Centre of Excellence, combines a thorough database of relevant legal and policy documents adopted by international organisations active in […]

No comments

Our Legal Analysis of U.S. Response to Sony Attack

Hollywood and the entertainment industry are not critical infrastructure. The cyber attack on Sony’s computer networks and data is not, yet, a matter of national security. The attack is also not a use of force or an armed attack, the prerequisites for use of military force in self defense under international law. Thus, talk of […]

No comments

The Hidden War in Cyberspace

When sound was added to film between World War I and World War II, newsreels playing in movie theaters vividly portrayed the sights and sounds of American foreign battlefields, combat-footage, and invasions. We’ve become accustomed to relying on these images and videos in our television and print news media, to stay informed on war-related current […]

No comments

NATO’s Cyber Declaration: More Bark than Bite?

Is NATO’s new definition of what constitutes an armed attack under Article V more bark than bite? That is the view of certain cybersecurity experts, according to a CNBC Report. The report highlights three main obstacles, discussed by those experts.  For more information on NATO’s declaration, read this recent post. The first obstacle, according to […]

1 comment

Remarks at Gen. Alexander Retirement

Remarks at the March 28, 2014, retirement ceremony for GEN Keith Alexander, Commander, U.S. Cyber Command, Director, National Security Agency/Chief, Central Security Service provide further insight into the U.S. military’s thinking about cyber security. Highlights of Secretary of Defense Chuck Hagel remarks include: “President Obama’s reforms, including his announcement yesterday on government retention of telephone […]

No comments

Air Force Engaged in Offensive Cyber Operation

Last week, Secrecy News reported on a secret execute order (EXORD) that the Chairman of the Joint Chiefs of Staff (CJCS) issued to authorize and launch a military operation conducted by the Air Force (AF) in cyberspace. Further details of the classified EXORD of last June and on the operation remain undisclosed.  It become known as a […]

No comments

Iran’s Boosted Cyber Capabilities

In a hearing of the House Committee on Foreign Affairs on “Iran’s Support for Terrorism Worldwide,” former chairman of the House’s Permanent Select Committee on Intelligence gave a statement that included the “increasing sophistication of Iran’s cyber program and capability to conduct cyber warfare.” The testimony on last Tuesday followed reports in February on Iranian hackers, who penetrated the Navy […]

No comments

Crimea Crisis: Operational Complexities in a (Non-) Present Cyberwar

As the situation on the Crimean peninsula remains tense, media reports on cyber incidents disrupting Crimean information and communication networks are increasingly discussing the likelihood of a virtual escalation of the crisis, and the hypotheticals of a cyberwar between Russia and the Ukraine. While the following articles provide different assessments of the cyber-strategical status quo, […]

No comments

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories