Archives

Posts Tagged ‘cyber-espionage’

Cyber roundup (9/17): Flame, more on cyber EO, and sequestration’s impact on cyber

Quick look at recent cyber news . . . *** Big news today about Flame, the espionage tool found trolling around the Middle East earlier this summer.  According to Wired’s Kim Zetter, the people behind Flame left “tantalizing clues,” including a 2006 development date, an attempted cleanup operation “to wipe the Flame malware from infected […]

No comments

Secretary of State Clinton remarks on China, cyberespionage

One of my dreams is to see the President of the United States publicly call out China on its pervasive cyber-espionage.  Probably won’t happen, and probably won’t change anything, but I’m still hoping for it.  In the meantime, I guess I’ll just have to settle for this. Picked up on this from a Lawfare blog […]

No comments

The big target in cyber war isn’t military anymore: GCN

On April 12th, 2012, William Jackson wrote for Government Computer News on intellectual property threat.  The article cited Toomas Hendrik, Estonia's president, as saying that cyberattacks cause the most damage through intellectual property (IP) theft.  In this sense, the Estonian president believes that "the military side of things" is getting too much attention when the […]

No comments

Apr 13th, 2012 Cyber Exploitation

Cybersecurity Legislation Should Force U.S. Government To Listen Less And Speak More: The Atlantic

On March 15th, 2012, Jason Healey wrote for The Atlantic on the NSA's role in defending the private sector against cyberattacks.  Noting that the private sector is on the front lines of a cyberwar, Healey believes that the private sector "needs the capabilities of the US government" in order to defend itself against Chinese backed […]

1 comment

Thoughts On The USCC’s New Report On Chinese Cyberattacks: CFR

On March 9th, 2012, Adam Segal wrote for the Council of Foreign Relations on the US-China Economic and Security Review Commission's recent report.  You can find that report here.  The report considered China's cyber-capabilities, the connection between the Chinese government and Chinese universities, and how the Chinese would likely target US logistic and transportation networks […]

No comments

NATO Doesn’t Yet Know How To Protect Its Networks: Wired

On Feb. 1st, 2012, Spencer Ackerman reported for Wired on NATO's view of cybersecurity.  The general impression is that NATO is unsure what to make of cyber-threats and cybersecurity in general.  For example, NATO is based on the idea of collective defense for its member nations; an attack on one is an attack on all.  However, […]

No comments

Feb 7th, 2012 deterrence

Newt Threatens China and Russia With Cyberwar: Wired

Ok, I know, rhetoric during primary season means little, but I couldn't help myself.   On Jan. 25th, 2012, Noah Schachtman reported for Wired on a series of controversial comments from Newt Gingrich, the new front-runner for the Republican nomination for president.  I picked up on this article because I've rarely heard Republican candidates talk […]

No comments

Jan 25th, 2012 Current Affairs

Embarrassing Hackers: Lawfare

I was reading a Lawfare book review written by Benjamin Wittes, and I came across an interesting idea.  The book itself is relevant (America the Vulnerable, by Joel Brenner) in that it explores cyber-espionage and the US' cyber vulnerabilities, and the review is a positive one.  However, it wasn't the book that interested me. In […]

No comments

China-Based Hacking Of 760 Companies Reflects Global Cyber War: Bloomberg

On Dec. 13th, 2011, Michael Riley and John Walcott wrote a fantastic article for Bloomberg Businessweek on the depths of Chinese cyber espionage against the US.  The article highlighted the lengths that the Chinese will go to in order to extract US information.  Specifically, the article mentioned how Chinese hackers went after a provider of […]

No comments

China’s Cyber Threat A High-Stakes Spy Game: NPR

On November 27th, 2011, NPR reported on the extent of ongoing Chinese cyber espionage.  The article explained that the Chinese engage in cyber-espionage to make up for a technological deficiency with the US.  The article also quoted one cyber expert as saying that espionage has an "immediate economic benefit: You don't have to pay for […]

No comments

Nov 29th, 2011 Cyber Exploitation

« Previous PageNext Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. She is the 2018-9 Editor in Chief of the Syracuse Law Review, as well as a member of the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories

RSS
Follow by Email
Facebook
LinkedIn