Posts Tagged ‘hackback’

A Typology for Evaluating Active Cyber Defenses: Lawfare

For your consideration, Paul Rosenzweig wrote a very good post for Lawfare considering active defense/hackback and a possible typology for active cyber defense. In his cybersecurity law & policy courses, one of Prof. Snyder’s favorite lines is that we need to get the lawyers and the techies in the same room and we need to […]

No comments

Apr 16th, 2013 Cyber Exploitation

DOJ on hackback, APT1, and does CISPA enable hackback?: The Volokh Conspiracy/EFF

Per usual, Stewart Baker wrote a wonderful article for The Volokh Conspiracy recounting a Luxembourger’s actual hackback against Mandiant’s famed APT1, or what is most likely PLA Unit 61398.  In doing so, Baker came out forcefuly and persusaively against the DOJ’s stand on hackback/active defense/mitigative counterstriking.  That stance is that hackback (but perhaps not active […]

1 comment

Apr 14th, 2013 EFF, Legislation

Debate Brewing Over Whether Companies Should Strike Back at Their Cyber Attackers: Bloomberg BNA

I don’t have time to do any sort of summary, but I wanted to call your attention to a very good article written by Alexei Alexis for Bloomberg BNA on active defense/hackback/counterstriking/whatever you want to call it. Interestingly, the article suggested that ABA guidance on this issue may be on the way. Furthermore, “the House Judiciary […]

No comments

Apr 11th, 2013 Uncategorized

Hackback Sunday: Skating on Stilts/cyberdialogue

On 3/1, Adam Segal (of CFR fame) wrote a very useful blog post for cyberdialogue covering hackback, signaling, and state-society relations.  The article provides a broad overview of the issues with hackback, so I urge you to take a look, but I want to focus on a few specific sections.  Notably: If [hackback] is to […]


Mar 3rd, 2013 deterrence

Active Cyber Defense: A Framework for Policymakers (CNAS)

Hat tip to FCW’s Emily Cole.  A few days ago, the Center for a New American Security (CNAS) released a report written by Irving Lachow titled Active Cyber Defense: A Framework for Policymakers.  The report is a very useful and readable summary on the technical/legal issues behind private sector active defense.  Mr. Lachow’s closing thoughts: […]

No comments

Feb 26th, 2013 deterrence

How much Leeway is there in the CFAA and International Law for Offensive Actions in Cyberspace? Spooks & Suits

Continuing Taia Global’s Spooks & Suits conference is a panel discussion I’ve been looking forward to for a while: “How much Leeway is there in the CFAA and International Law for Offensive Actions in Cyberspace.”  Dr. Catherine Lotrionte is moderating, with Stewart Baker, Frank Cilluffo, and Marco Obiso comprising the panel.  Unfortunately I had to […]

1 comment

Hackback & Active Defense: Threatpost

Just a heads up, two useful articles by Michael Mimoso for threatpost (Kaspersky Lab).  One article was on hackback, and the other article was on active defense.  Please follow and like us:

No comments

Jan 24th, 2013 Cyber Exploitation

The Nuclear Option: Offensive Cybersecurity (InformationWeek)

On 1/21, InformationWeek put out a very interesting newsletter on hackback/counterstriking/private sector active defense/offensive cybersecurity.  The newsletter requires you to register (it’s free).  You can find two articles from the newsletter listed below, but they are only previews. InformationWeek posted a portion of Gadi Evron’s article Offensive Cybersecurity: Theory And Reality.  Even though this was […]

No comments

Rep. Mike Rogers: Cool it with private sector offensive cyber ops (Foreign Policy)

Foreign Policy’s John Reed reported on interesting statements made by Rep. Mike Rogers and others at The George Washington University’s Cybersecurity Initiative event.  You can find video of the event here, via C-SPAN.  Reed’s article notes that Rogers said: It’s best not to go punch your neighbor in the face before you hit the weight […]

No comments

Dec 15th, 2012 Cyber Exploitation

No, Executing Offensive Actions Against Our Adversaries Really Does Have High Risk: Honeynet Project

I saw this in a tweet from Jim Denaro (@CipherLaw), so all credit to him for seeing this first. David Dittrich wrote a quite lengthy blog post for The Honeynet Project generally attacking the concept of hackback/private sector active defense, and in particular, a CSO Online blog post by Jeff Bardin.  Dittrich showed up in […]

No comments

Dec 14th, 2012 Criticism

« Previous PageNext Page »


Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. She is the 2018-9 Editor in Chief of the Syracuse Law Review, as well as a member of the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography


Follow by Email