Archives

Posts Tagged ‘Pentagon’

Cyber Round Up: Who is China Really Hacking?; Pentagon Cyber Team Takes Major Operational Step; What a real cyber war would look like

Cyber warfare: Who is China hacking? (CNN):  An article from CNN analyzed the shifts in Chinese cyber warfare strategy.  As mentioned in the recent Presidential debate, China is always on the radar as a potential cyber adversary, the article notes.   The article quotes an official from FireEye as describing China’s cyber capacities as essentially another […]

No comments

U.S. Accelerating Cyberweapon Research: WashPo

On March 18th, 2012, Ellen Nakashima reported for the Washington Post on the Pentagon's efforts to acquire and develop cyberweapons.  Notably, the article explained how the Pentagon has gone gangbusters with regard to cybersecurity spending.  So far, the Pentagon has spent roughly $3.4 billion on offensive and defensive cybersecurity this year.  Moreover, DARPA received $500 […]

No comments

Going On The Offensive

On November 15th, 2011, Ellen Nakashima reported for the Washington Post how the DoD has clarified its policy on offensive cyber operations.  Specifically, the article notes that the Pentagon, "if directed by the president, will launch offensive cyber operations in response to hostile acts."  Furthermore, "hostile acts may include significant cyber attacks directed against the […]

No comments

Pentagon Battle Concept Has Cold War Posture On China: The Washington Times

On November 9th, 2011, Bill Gertz reported for the Washington Times how the Pentagon has revealed a new battle concept that is aimed at countering Chinese military efforts to deny access near its territory and cyberspace.  Named "Air Sea Battle", the concept takes a very Cold War style military posture towards China.  One Obama administration […]

No comments

Nov 11th, 2011 cyber attack, warfare

Waiting For The Cyberbarbarians: Foreign Policy

On October 21st, 2011, Robert Haddick wrote for Foreign Policy on how the issue of cyberwarfare has caused confusion amongst US policymakers.  Noting how former JCS Chairman Adm. Mike Mullen mentioned cyberattacks in the same vein as nuclear weapons, Haddick argued that US policymakers' lack of progress on formulating cyberattack doctrine is dangerous.  The article […]

No comments

Oct 30th, 2011 Criticism, cyber attack, warfare

White House Orders New Computer Security Rules: NYT

On Ocotober 6th, 2011, Eric Schmitt reported for the New York Times on how President Obama issued an executive order to replace the flawed patchwork of government computer security safeguards.  The order was the culmination of a seven-month governmentwide review of how government agencies handle classified information and how to reduce the risk of breaches. […]

No comments

The ‘Worm’ That Could Bring Down The Internet: NPR

On September 27th, 2011, NPR reported on how the massive computer worm called Conficker has been spreading throughout the world.  According to writer Mark Bowden, Conficker penetrates the core of a computer's operating system and turns control of the computer over to a remote operator.  Conficker takes all of these infected computers and networks them […]

No comments

Pentagon extends cyberattack defense program: CBS News

On September 26th, 2011, CBS News reported on how the Pentagon is extending a pilot program to protect US defense contractors against cyberattack.  The program, which could serve as a model for other government agencies and critical infrastructure, seeks to harden the networks of defense contractors against attack.  To do so, the program has embraced […]

No comments

Expert: Pentagon Cybersecurity Changes “very basic, very late”

CNN reports, in an article by Ashley Fantz dated December 2, 2010, that following the summer release of thousands of pages of classified U.S. intelligence by the website WikiLeaks.org, the Pentagon responded with a pledge to "fix loopholes in its computer systems."  Several months later, progress is "'ridiculous.'"   According to Pentagon spokesman Bryan Whitman, […]

No comments

The Pentagon’s New Cyber Warriors

In a special report, dated October 5, 2010, Jim Wolf of Reuters reports that the U.S. military "is preparing for digital combat even more extensively that has been made public."  Based on "dozens of interviews with military officers, government officials and outside experts," the report states that one of the Pentagon's primary (and more controversial) […]

No comments

Next Page »

Authors

Untitled Document
Professor William Snyder

Professor William C. Snyderis a member of the faculty of the Institute for National Security and Counter-terrorism at Syracuse University after fifteen years with the United States Department of Justice.

Ryan D. White

Ryan D. WhiteRyan is currently a third year law student at Syracuse University College of Law, and is also pursuing a Master of Public Administration degree from Syracuse’s Maxwell School of Citizenship and Public Affairs. Ryan spent time with Homeland Security Investigations while pursuing his undergraduate degree at Wesleyan University, and spent his first summer of law school as clerk for the U.S. Attorney’s Office in the Western District of New York. He is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and participates in the Veteran’s Legal Clinic. Full biography

Shelby E. Mann

Ryan D. WhiteShelby is a second year law student at the Syracuse University College of Law. During her final year at the University of Missouri, she served as a full-time news producer for ABC 17 News. Shelby spent her first summer of law school at the Shelby County District Attorney General's Office in Memphis, Tenn., in the Public Corruption and Economic Crimes Unit. She is a member of Syracuse Law Review, the Journal on Terrorism and Security Analysis, and the senior editor for the Syrian Accountability Project. Full biography

Christopher w. FolkChristopher W. Folk

is a 2017 graduate of SU College of Law. A non-traditional student, Christopher returned to academia after spending nearly twenty years in the high tech industry. Christopher served in the Marine Corps, graduated from Cornell University with a B.S. In Applied Economics and Business Management, attended Northeastern University’s High-Tech MBA Program and received a M.S. In Computer Information Systems. Christopher previously worked in Software Engineering. Christopher is currently serving his second term as Town Justice for the Town of Waterloo. Christopher externed with a Cybersecurity firm in the Washington, D.C. area between his first and second year at SU College of Law. Full biography

Anna Maria Castillo

Anna Maria Castillois 2016 graduate of Syracuse College of Law. She also holds a Master of Arts in International Relations from Syracuse University's Maxwell School of Citizenship and Public Affairs. She has interned at a London-based think-tank that specializes in transnational terrorism and global security and at the legal department of a defense contractor. She served as an executive editor in the Syracuse Law Review. Full biography

Jennifer A. CamilloJennifer A. Camillo

is a 2015 graduate of Syracuse College of Law and is a prosecutor. She has served as a law clerk in the United States Attorney’s Office for the Northern District of New York and the Cayuga County District Attorney’s Office and as an extern in the Oneida County District Attorney’s Office. She was a member of the Syracuse National Trial Team and was awarded the Tiffany Cup by the New York Bar Association for her trial advocacy achievements.

Tara J. PistoreseTara J. Pistorese

holds Juris Doctor and Masters of Public Administration degrees from Syracuse University's Maxwell School of Citizenship and Public Affairs and its College of Law. She wrote for this blog when a student. She is now a member of the U.S. Army Judge Advocate General's Corps.

Benjamin Zaiser

is both a scholar and a Federal Agent of the Federal Criminal Police Office of Germany. (Opinions expressed here are his own and not any part of official duty.) Full biography

Categories