Quantcast
Channel: William Snyder – Crossroads Blog
Browsing all 60 articles
Browse latest View live

The Internet is NOT Borderless

Cyberspace is not some borderless new reality, separate and apart from the physical world.  It is not the death of distance. The statement in “A Declaration of the Independence of Cyberspace” that,...

View Article



NSTIC commits $2.5 million to build governance body | ZDNet

ZDNet reports on March 14, 2012, that the National Institute of Standards of Technology is offering grant money “to establish an independent steering committee led by the private sector that works in...

View Article

A new theory of digital identity – Risk – SC Magazine Australia

The March 14, 2012, edition of SC Magazine, Australian Edition, includes Part B of a two part series on “A New Theory of Digital Identity.”  Part A was entitled “Federated Identity: Easier said than...

View Article

Yet another reason to keep the lawyers out of cyberwar

One reason to believe the Stuxnet attack was made in the USA, Clarke says, “was that it very much had the feel to it of having been written by or governed by a team of Washington lawyers.” “What makes...

View Article

Cybersecurity: Selected Legal Issues – CRS

Someone has leaked a March 14, 2012, Congressional Research Service report entitled Cybersecurity: Selected Legal Issues. (Such leaks are a daily occurrence and likely done by a member of Congress, but...

View Article


A Clunky Cyberstrategy | Foreign Affairs

The May 4, 2012 edition of “This Week on Foreign Affairs.com features the article, A Clunky Cyberstrategy: Washington Preaches Internet Freedom But Practices Surveillance by Rebecca McKinnon....

View Article

Going on the offensive against cyberattacks – The Washington Post

On July 25, 2012, The Washington Post’s published an editorial entitled “Slipping through the ’Net” in its mobile edition or “Stockpiling arms against cyberattacks” in its regular online edition...

View Article

Cybersecurity at Risk – NYTimes.com

In an editorial entitled “Cybersecurity at Risk” published in the print edition on August 1, 2012,  the New York Times argues: The Lieberman-Collins bill should be voted by the Senate this week and...

View Article


Accepting Applications for Online Course Cyber Security Law and Policy

Course is October 1 to November 18, 2012 Once again, the Institute for National Security and Counter-Terrorism (INSCT) will be offering the online course "Cyber Security Law and Policy," which tackles...

View Article


The EFF is Wrong About Aaron Swartz, But Right About the CFAA

A newsletter today from the Electronic Frontier Foundation (EFF) proclaims, “Help us save the next Aaron Swartz.”  But, when you click through to their webpage, Fix the CFAA, most of the criticism is...

View Article

Rethinking Cybersecurity – A Comprehensive Approach | Center for Strategic...

James Lewis, who spoke on our campus (Syracuse University) last year, released the text of a speech he gave on September 20, 2011 entitled Rethinking Cybersecurity – A Comprehensive Approach.  While...

View Article

White House Notes Progress of NSTIC

In an October 14, 2011 entry on the White House Blog, Cybersecurity Coordinator Howard Schmidt reports that the Federal Chief Information Officer has just issued a memorandum requiring Executive...

View Article

Distance Learning Cyber Security Course Under Development at Syracuse University

Soon, students anywhere in the world will be able to enroll in a course entitled Cyber Security Law and Policy.  The course is currently under development by various offices of Syracuse University,...

View Article


Report: Russia and China are top thieves of U.S. technology – CNN

CNN is reporting on 11/3/11 that: "For the first time, the United States is publicly accusing China and Russia of being the top offenders in the theft of U.S. economic and technology information,...

View Article

Cyber Strategies From Around the World

Here is a collection of links to cyber strategies from around the world, assembled by the UK Foreign & Commonwealth Office: International links Australia White Paper on Cyber Budapest Convention on...

View Article


Cybersecurity in the Balance: Weighing the Risks of the PROTECT IP Act and...

On November 15, 2011, The Brookings Institution posted a useful analysis of two pending bills, Senate bill S.968, or the PROTECT IP Act, and the House bill H.R. 3261, the Stop Online Piracy Act.  I...

View Article

Federal Laws Relating to Cybersecurity, A 12/7/11 CRS Report

The Federation of American Scientists Project on Government Secrecy has posted a new report from the Congressional Research Service entitled, Federal Laws Relating to Cybersecurity: Discussion of...

View Article


Computer Crime and Intellectual Property Law internships

Law Intern Opportunities Opportunities are available in the Computer Crime and Intellectual Property Section of the U.S. Department of Justice for qualified candidates interested in summer law...

View Article

6-week ONLINE course, Cybersecurity Law & Policy – enrollments now open!

Announcing the opening of enrollment for a 6-week online course, Cybersecurity Law & Policy, that I will be teaching during February 13-March 30, 2012. Designed for mid-career professionals,...

View Article

Enrollment Open for Online Cyber Security Law and Policy Course

Follow this link for details of the course sponsored by the Institute for National Security & Counter Terrorism, and joint endeavor of the College of Law and of the Maxwell School for Citizenship...

View Article
Browsing all 60 articles
Browse latest View live




Latest Images