Jump to content
Prof. Snyder's Courses


  • Content count

  • Joined

  • Last visited

  • Days Won


Professor_WCS last won the day on October 12 2013

Professor_WCS had the most liked content!

About Professor_WCS

  • Rank
    Advanced Member

Recent Profile Visitors

377 profile views
  1. Below is a primer from the Congressional Research Service on the CLOUD Act. Earlier this week, a post on Lawfare set forth some suggestions for how to implement the legislation. View the full article
  2. Congress wants answers on FBI’s ‘going dark’ problem in wake of DOJ IG report (CyberScoop): Some members of Congress are challenging the FBI over its handling of the encryption battle with Apple, a recent article says. Several lawmakers wrote a letter to FBI Director Chris Wray stating their concerns over both the San Bernardino incident and […] View the full article
  3. A Special Inquiry Regarding the Accuracy of FBI Statements Concerning its Capabilities to Exploit an iPhone Seized During the San Bernardino Terror Attack Investigation View the full article
  4. DHS Might Provide Cyber Services Directly To Industry Under New Strategy (Nextgov): With a new DHS cyber strategy set to be released in the coming weeks, reports suggest that the agency could be taking on a new role in the cyber realm. DHS Secretary Kirstjen Nielsen described the new system as “security as a service” and […] View the full article
  5. The Encryption Debate Isn’t About Stopping Terrorists, It’s About Solving Crime (Lawfare): A post last week on Lawfare added to the ongoing debate over encryption but with a different focus. The author said that regardless of any flaws with third party (which means government, according to the author) access, the biggest problem remains traditional crime, not […] View the full article
  6. Video and prepared testimony of this week’s hearing, “Cyber Operations Today: Preparing for 21st Century Challenges in an Information-Enabled Society.” View the full article
  7. United States Cyber Command’s New Vision: What It Entails and Why It Matters (Lawfare): Yesterday, I posted a document from U.S. Cyber Command here. Dr. Richard J. Harknett wrote a piece assessing the document for Lawfare on Friday, in which he labels the strategy a significant evolution in both strategy and operations for cyber. Harknett lists […] View the full article
  8. Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps Mabna Institute Hackers Penetrated Systems Belonging to Hundreds of Universities, Companies, and Other Victims to Steal Research, Academic and Proprietary Data, and Intellectual Property View the full article
  9. This blog usually does not cover legislative proposals because they too often never progress through the process. But as Steve Vladeck first pointed out via tweet earlier this evening, the latest spending bill includes a provision worth addressing here. The Clarifying Lawful Overseas Use of Data Act (CLOUD) Act, addressed the use of stored data […] View the full article
  10. A few weeks ago, I wrote a post on the difference between cyber and information warfare and U.S. policy in this sphere. The idea was sparked by a lecture from Gen. Michael Hayden this past fall at Syracuse University, when I realized that many people have likely conflated these two concepts. Cyber operations can be […] View the full article