Jump to content
Prof. Snyder's Courses

Professor_WCS

Moderators
  • Content count

    686
  • Joined

  • Last visited

  • Days Won

    2

Professor_WCS last won the day on October 12 2013

Professor_WCS had the most liked content!

About Professor_WCS

  • Rank
    Advanced Member

Recent Profile Visitors

243 profile views
  1. Video and prepared testimony of this week’s hearing, “Cyber Operations Today: Preparing for 21st Century Challenges in an Information-Enabled Society.” View the full article
  2. United States Cyber Command’s New Vision: What It Entails and Why It Matters (Lawfare): Yesterday, I posted a document from U.S. Cyber Command here. Dr. Richard J. Harknett wrote a piece assessing the document for Lawfare on Friday, in which he labels the strategy a significant evolution in both strategy and operations for cyber. Harknett lists […] View the full article
  3. Nine Iranians Charged With Conducting Massive Cyber Theft Campaign on Behalf of the Islamic Revolutionary Guard Corps Mabna Institute Hackers Penetrated Systems Belonging to Hundreds of Universities, Companies, and Other Victims to Steal Research, Academic and Proprietary Data, and Intellectual Property View the full article
  4. This blog usually does not cover legislative proposals because they too often never progress through the process. But as Steve Vladeck first pointed out via tweet earlier this evening, the latest spending bill includes a provision worth addressing here. The Clarifying Lawful Overseas Use of Data Act (CLOUD) Act, addressed the use of stored data […] View the full article
  5. A few weeks ago, I wrote a post on the difference between cyber and information warfare and U.S. policy in this sphere. The idea was sparked by a lecture from Gen. Michael Hayden this past fall at Syracuse University, when I realized that many people have likely conflated these two concepts. Cyber operations can be […] View the full article
  6. Below is a report from the East West Institute titled “Encryption Policy in Democratic Regimes: Finding Convergent Paths and Balanced Solutions.” The organization’s own press release states that the report “provides nine normative recommendations on encryption policy to ensure strong cybersecurity while enabling lawful law enforcement access to the plaintext of encrypted information in limited […] View the full article
  7. Russia cyber attack on Germany a ‘form of warfare’ (The Telegraph): A story last week discussed a recent and then still ongoing cyber attack against Germany. The report said that while government officials weren’t saying much, many expect there to be a lot more damage than those officials were initially letting on. The story suggested that the […] View the full article
  8. Below is a Congressional Research Service report released last week that provides some basic background regarding blockchain technology and related policy issues. View the full article
  9. Below is Cisco’s annual cyber report. An article with commentary on the report from Forbes can be found here. View the full article
  10. The Supply Chain Problem A few weeks ago, an article from Nextgov, a website dedicated to “how technology and innovation are transforming the way government agencies serve citizens and perform vital functions,” described recent efforts by DHS to address cyber security risks as they relate to supply chains. The article quotes Jeanette Manfra, the head of […] View the full article
  11. Below is a report released earlier this month from the Council of Economic Advisers, “The Cost of Malicious Cyber Activity to the U.S. Economy.” View the full article
×