Jump to content
Prof. Snyder's Courses

Professor_WCS

Moderators
  • Content count

    667
  • Joined

  • Last visited

  • Days Won

    2

Everything posted by Professor_WCS

  1. Below is a Statement for the Record given by Director of National Intelligence Daniel R. Coats to Congress on February 13, 2018 regarding the U.S. intelligence community’s worldwide threat assessment, including a section dedicated to cyber security. View the full article
  2. Trump requests $3.3B for DHS cyber unit in 2019 (The Hill): President Trump’s latest request to Congress includes massive allocations for DHS and cybersecurity, a recent article explains. The report says that the $3.3 billion is largely consistent with last year’s numbers. The article provides some breakdown of that $3.3B, including $700 million for the National […] View the full article
  3. Last week, for the second year in a row, Syracuse University topped the list of best cybersecurity programs in the country for veterans and military connected students. The list is compiled by Military Times, and more about how it is complied can be found here. The article explains SU’s commitment to providing online cybersecurity degrees. It also […] View the full article
  4. Several recent reports, including one from The Hill, summarize recent news from the Department of Justice regarding its takedown of a major international cyber crime ring. 36 total individuals were were charged, 13 of which have already been arrested the article says. Five of those thirteen were Americans. The operation was known as “Infraud” and […] View the full article
  5. Trust, Confidence, and the Future of Warfare (War on the Rocks): A lengthy article written earlier this week takes a look at the technological concerns related to increased reliance on semi autonomous weapons systems such as drones. The article is one of a few that look at the issue, and notes the increased role that autonomous […] View the full article
  6. Israel accounts for 16 percent of global cybersecurity investment, second only to U.S. (CyberScoop): In 2017, Israel’s cybersecurity industry raised $814.5 million, a 28 percent increase from 2016, according to a recent article. CyberScoop explains Israel’s cybersecurity is strong for the size of the country because of Israel’s mandatory military service, support from the Israeli government, […] View the full article
  7. Included below is the Summary of the 2018 National Defense Strategy. An article last week commented on the cyber-related issues in the document, including the fact that it does not mention an elevated role for Cyber Command. That article can be read here. View the full article
  8. Pentagon reviewing security after fitness apps show locations (Reuters): The Pentagon has been forced to review security protocols after news broke that a number of fitness devices are capable of revealing patterns of movement at military facilities around the world, according to recent reports. The article explains that a student in Australia stumbled on the news. […] View the full article
  9. Below is a draft of NIST’s Interagency Report 8202, “Blockchain Technology Overview.” View the full article
  10. Forget Viruses or Spyware—Your Biggest Cyberthreat Is Greedy Cryptocurrency Miners (MIT Tech Review): Software programs used to mine cryptocurrency are now some of the most prevalent forms of malware on the Internet, a recent article says. A separate article supports this argument, as it reports that that from 372 Initial Coin Offerings (ICOs) “roughly $400 million of the […] View the full article
  11. A New Breed of Cyberattack Uses Remote-Control Malware to Sabotage Industrial Safety Systems (MIT Tech Review): A brief post on the MIT Technology Review’s website highlights a growing cyber threat to infrastructure. The article uses an example from last month where malware known as Triton was used against an oil facility in Saudi Arabia as an example. The article […] View the full article
  12. Pentagon considers nuclear response to retaliate for large cyber attacks (CSO Online): A draft version of the Pentagon’s 2018 Nuclear Posture Review states that the use of nuclear weapons should only be contemplated in “extreme circumstances,” according to a recent article. That article also points out that a large scale cyber attack could create “extreme circumstances.” […] View the full article
  13. Earlier this month, FBI Director Christopher Wray addressed the FBI International Conference on Cyber Security at Fordham University. The full text of his remarks, titled “Raising Our Game: Cyber Security in an Age of Digital Transformation” are included below and can be found here. View the full article
  14. Cybersecurity Showdown: Why the Military Is Preparing for a New Kind of War (The National Interest): President Trump just signed the 2018 National Defense Authorization Act (NDAA) into law, according to a recent article. This year’s NDAA includes provisions in “Cyberspace-Related Matters” (Title XVI, Subsection C) requiring the White House and the Department of Defense to […] View the full article
  15. Anatomy of an ethical hacker: What it takes to operate on the frontlines of cybersecurity (Tech World): A recent article attempts to distinguish ethical hackers from any negative connotations that may be associated with the word. Hackers are not “anti social and geeky,” the article explains, but instead are “social, curious, adaptable and motivated”by a number […] View the full article
  16. CSIS has a podcast addressing Russia’s 2016 election meddling and how it fits into their broader scheme of information warfare. The podcast can be heard on their website here, which also includes this description: “In 2016, a rival foreign power, Vladimir Putin’s Russia, launched an attack on the United States of America. What we now […] View the full article
  17. Syracuse University College of Law invites applicants for a tenured faculty position as Institute for National Security and Counterterrorism (INSCT) Director beginning Fall 2018. Founded in 2003 as a collaboration between the College of Law and the Maxwell School of Citizenship and Public Affairs, INSCT is an internationally renowned university institute with an established history […] View the full article
  18. Kaspersky Lab asks court to overturn U.S. government software ban (Reuters): The major Russian software company has resorted to legal measures in response to recent bans on its use by federal agencies, reports say. Although sales to U.S. government agencies comprise only .03% of its U.S. sales, the damage to Kaspersky’s reputation and trickle down effect […] View the full article
  19. Yesterday, President Trump released his National Security Strategy with the theme “America First.” The strategy consists of four main pillars: I. Protect the American People, The Homeland, and The American Way of Life; II. Promote American Prosperity; III. Preserve Peace Through Strength; IV. Advance American Influence. Each of those pillars contained policy objectives and specific […] View the full article
  20. Today, the White House released the National Security Strategy of the United States of America. Here are its primary statements about cyberspace: Cyberspace Malicious state and non-state actors use cyberattacks for extortion, information warfare, disinformation, and more. Such attacks have the capability to harm large numbers of people and institutions with comparatively minimal investment and […] View the full article
  21. Following the Developing Iranian Cyberthreat (Fifth Domain): Russia and China always come to mind when thinking of U.S. adversaries in cyberspace, but don’t forget about Iran, a recent article says. Iran both recruits hackers to work for the government and encourages them to operate independently, the author explains. The article walks through Iran’s development as a […] View the full article
  22. The following series of articles discuss developments in the Shadow Brokers and Vault cases, including the lack of arrests. The third and latest one via Lawfare directly responds to comments in the first two. Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core (N.Y. Times, November 12, 2017) CIA and NSA codes are […] View the full article
  23. Trump signs bill to modernize government IT and cybersecurity (Tech Republic): Part of the 2018 National Defense Authorization Act that President Trump signed on Tuesday includes the Modernizing Government Technology (MGT) Act, a recent article says. The purpose of that act is evident from its name, as the U.S. currently spends $80 billion a year on […] View the full article
  24. Former Director of the NSA and CIA General Michael Hayden recently released his memoir, Playing to the Edge: American Intelligence in the Age of Terror. The piece below was written in response to Hayden’s book and is an interesting read. Hayden, NSA, and the Road to 9/11 View the full article
  25. A brand-new cybersecurity watchdog just shut down a $15 million cryptocurrency scam (Business Insider): The SEC’s recently created cyber unit saw some of its first major action, recent reports say. The group shut down a scam in which groups were requesting money for bitcoin and promising over 1,000% returns. The unit was created earlier this fall […] View the full article
×