Jump to content
Prof. Snyder's Courses

All Activity

This stream auto-updates     

  1. Last week
  2. This blog usually does not cover legislative proposals because they too often never progress through the process. But as Steve Vladeck first pointed out via tweet earlier this evening, the latest spending bill includes a provision worth addressing here. The Clarifying Lawful Overseas Use of Data Act (CLOUD) Act, addressed the use of stored data […] View the full article
  3. Earlier
  4. A few weeks ago, I wrote a post on the difference between cyber and information warfare and U.S. policy in this sphere. The idea was sparked by a lecture from Gen. Michael Hayden this past fall at Syracuse University, when I realized that many people have likely conflated these two concepts. Cyber operations can be […] View the full article
  5. Below is a report from the East West Institute titled “Encryption Policy in Democratic Regimes: Finding Convergent Paths and Balanced Solutions.” The organization’s own press release states that the report “provides nine normative recommendations on encryption policy to ensure strong cybersecurity while enabling lawful law enforcement access to the plaintext of encrypted information in limited […] View the full article
  6. Russia cyber attack on Germany a ‘form of warfare’ (The Telegraph): A story last week discussed a recent and then still ongoing cyber attack against Germany. The report said that while government officials weren’t saying much, many expect there to be a lot more damage than those officials were initially letting on. The story suggested that the […] View the full article
  7. Below is a Congressional Research Service report released last week that provides some basic background regarding blockchain technology and related policy issues. View the full article
  8. Below is Cisco’s annual cyber report. An article with commentary on the report from Forbes can be found here. View the full article
  9. The Supply Chain Problem A few weeks ago, an article from Nextgov, a website dedicated to “how technology and innovation are transforming the way government agencies serve citizens and perform vital functions,” described recent efforts by DHS to address cyber security risks as they relate to supply chains. The article quotes Jeanette Manfra, the head of […] View the full article
  10. Below is a report released earlier this month from the Council of Economic Advisers, “The Cost of Malicious Cyber Activity to the U.S. Economy.” View the full article
  11. APT37 (Reaper): The Overlooked North Korean Actor (FireEye): While everyone’s attention is on North Korea’s development of nuclear capabilities, a recent report says there is an overlooked cyber threat there, too. The report from FireEye calls the group APT37 (Reaper) and says its capabilities have grown in both scope and sophistication. Moreover, the report says with […] View the full article
  12. The SEC updated its guidance for how public companies should handle not only actual cyber incidents, but also the risk of such events. Two quotes below summarize the basics of the new guidance, while the full statement from the SEC is attached at the bottom of this post. Also attached is the 2011 guidance, which […] View the full article
  13. Evaluating the U.K.’s ‘Active Cyber Defence’ Program (Lawfare): A post last week on Lawfare recaps the U.K.’s cyber defense program a year after its implementation. The article summarizes the U.K.’s National Cyber Security Centre’s own report while explaining aspects that could be useful for the U.S. The three main themes of the program, according to the […] View the full article
  14. “All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.” ― Sun Tzu, The Art of War […] View the full article
  15. Below is a Statement for the Record given by Director of National Intelligence Daniel R. Coats to Congress on February 13, 2018 regarding the U.S. intelligence community’s worldwide threat assessment, including a section dedicated to cyber security. View the full article
  16. Trump requests $3.3B for DHS cyber unit in 2019 (The Hill): President Trump’s latest request to Congress includes massive allocations for DHS and cybersecurity, a recent article explains. The report says that the $3.3 billion is largely consistent with last year’s numbers. The article provides some breakdown of that $3.3B, including $700 million for the National […] View the full article
  17. Last week, for the second year in a row, Syracuse University topped the list of best cybersecurity programs in the country for veterans and military connected students. The list is compiled by Military Times, and more about how it is complied can be found here. The article explains SU’s commitment to providing online cybersecurity degrees. It also […] View the full article
  18. Several recent reports, including one from The Hill, summarize recent news from the Department of Justice regarding its takedown of a major international cyber crime ring. 36 total individuals were were charged, 13 of which have already been arrested the article says. Five of those thirteen were Americans. The operation was known as “Infraud” and […] View the full article
  19. Trust, Confidence, and the Future of Warfare (War on the Rocks): A lengthy article written earlier this week takes a look at the technological concerns related to increased reliance on semi autonomous weapons systems such as drones. The article is one of a few that look at the issue, and notes the increased role that autonomous […] View the full article
  20. Israel accounts for 16 percent of global cybersecurity investment, second only to U.S. (CyberScoop): In 2017, Israel’s cybersecurity industry raised $814.5 million, a 28 percent increase from 2016, according to a recent article. CyberScoop explains Israel’s cybersecurity is strong for the size of the country because of Israel’s mandatory military service, support from the Israeli government, […] View the full article
  21. Included below is the Summary of the 2018 National Defense Strategy. An article last week commented on the cyber-related issues in the document, including the fact that it does not mention an elevated role for Cyber Command. That article can be read here. View the full article
  22. Pentagon reviewing security after fitness apps show locations (Reuters): The Pentagon has been forced to review security protocols after news broke that a number of fitness devices are capable of revealing patterns of movement at military facilities around the world, according to recent reports. The article explains that a student in Australia stumbled on the news. […] View the full article
  23. Below is a draft of NIST’s Interagency Report 8202, “Blockchain Technology Overview.” View the full article
  24. Forget Viruses or Spyware—Your Biggest Cyberthreat Is Greedy Cryptocurrency Miners (MIT Tech Review): Software programs used to mine cryptocurrency are now some of the most prevalent forms of malware on the Internet, a recent article says. A separate article supports this argument, as it reports that that from 372 Initial Coin Offerings (ICOs) “roughly $400 million of the […] View the full article
  25. A New Breed of Cyberattack Uses Remote-Control Malware to Sabotage Industrial Safety Systems (MIT Tech Review): A brief post on the MIT Technology Review’s website highlights a growing cyber threat to infrastructure. The article uses an example from last month where malware known as Triton was used against an oil facility in Saudi Arabia as an example. The article […] View the full article
  26. Pentagon considers nuclear response to retaliate for large cyber attacks (CSO Online): A draft version of the Pentagon’s 2018 Nuclear Posture Review states that the use of nuclear weapons should only be contemplated in “extreme circumstances,” according to a recent article. That article also points out that a large scale cyber attack could create “extreme circumstances.” […] View the full article
  27. Earlier this month, FBI Director Christopher Wray addressed the FBI International Conference on Cyber Security at Fordham University. The full text of his remarks, titled “Raising Our Game: Cyber Security in an Age of Digital Transformation” are included below and can be found here. View the full article
  1. Load more activity