The Internet is NOT Borderless
Cyberspace is not some borderless new reality, separate and apart from the physical world. It is not the death of distance. The statement in “A Declaration of the Independence of Cyberspace” that,...
View ArticleNSTIC commits $2.5 million to build governance body | ZDNet
ZDNet reports on March 14, 2012, that the National Institute of Standards of Technology is offering grant money “to establish an independent steering committee led by the private sector that works in...
View ArticleA new theory of digital identity – Risk – SC Magazine Australia
The March 14, 2012, edition of SC Magazine, Australian Edition, includes Part B of a two part series on “A New Theory of Digital Identity.” Part A was entitled “Federated Identity: Easier said than...
View ArticleYet another reason to keep the lawyers out of cyberwar
One reason to believe the Stuxnet attack was made in the USA, Clarke says, “was that it very much had the feel to it of having been written by or governed by a team of Washington lawyers.” “What makes...
View ArticleCybersecurity: Selected Legal Issues – CRS
Someone has leaked a March 14, 2012, Congressional Research Service report entitled Cybersecurity: Selected Legal Issues. (Such leaks are a daily occurrence and likely done by a member of Congress, but...
View ArticleA Clunky Cyberstrategy | Foreign Affairs
The May 4, 2012 edition of “This Week on Foreign Affairs.com features the article, A Clunky Cyberstrategy: Washington Preaches Internet Freedom But Practices Surveillance by Rebecca McKinnon....
View ArticleGoing on the offensive against cyberattacks – The Washington Post
On July 25, 2012, The Washington Post’s published an editorial entitled “Slipping through the ’Net” in its mobile edition or “Stockpiling arms against cyberattacks” in its regular online edition...
View ArticleCybersecurity at Risk – NYTimes.com
In an editorial entitled “Cybersecurity at Risk” published in the print edition on August 1, 2012, the New York Times argues: The Lieberman-Collins bill should be voted by the Senate this week and...
View ArticleAccepting Applications for Online Course Cyber Security Law and Policy
Course is October 1 to November 18, 2012 Once again, the Institute for National Security and Counter-Terrorism (INSCT) will be offering the online course "Cyber Security Law and Policy," which tackles...
View ArticleThe EFF is Wrong About Aaron Swartz, But Right About the CFAA
A newsletter today from the Electronic Frontier Foundation (EFF) proclaims, “Help us save the next Aaron Swartz.” But, when you click through to their webpage, Fix the CFAA, most of the criticism is...
View ArticleRethinking Cybersecurity – A Comprehensive Approach | Center for Strategic...
James Lewis, who spoke on our campus (Syracuse University) last year, released the text of a speech he gave on September 20, 2011 entitled Rethinking Cybersecurity – A Comprehensive Approach. While...
View ArticleWhite House Notes Progress of NSTIC
In an October 14, 2011 entry on the White House Blog, Cybersecurity Coordinator Howard Schmidt reports that the Federal Chief Information Officer has just issued a memorandum requiring Executive...
View ArticleDistance Learning Cyber Security Course Under Development at Syracuse University
Soon, students anywhere in the world will be able to enroll in a course entitled Cyber Security Law and Policy. The course is currently under development by various offices of Syracuse University,...
View ArticleReport: Russia and China are top thieves of U.S. technology – CNN
CNN is reporting on 11/3/11 that: "For the first time, the United States is publicly accusing China and Russia of being the top offenders in the theft of U.S. economic and technology information,...
View ArticleCyber Strategies From Around the World
Here is a collection of links to cyber strategies from around the world, assembled by the UK Foreign & Commonwealth Office: International links Australia White Paper on Cyber Budapest Convention on...
View ArticleCybersecurity in the Balance: Weighing the Risks of the PROTECT IP Act and...
On November 15, 2011, The Brookings Institution posted a useful analysis of two pending bills, Senate bill S.968, or the PROTECT IP Act, and the House bill H.R. 3261, the Stop Online Piracy Act. I...
View ArticleFederal Laws Relating to Cybersecurity, A 12/7/11 CRS Report
The Federation of American Scientists Project on Government Secrecy has posted a new report from the Congressional Research Service entitled, Federal Laws Relating to Cybersecurity: Discussion of...
View ArticleComputer Crime and Intellectual Property Law internships
Law Intern Opportunities Opportunities are available in the Computer Crime and Intellectual Property Section of the U.S. Department of Justice for qualified candidates interested in summer law...
View Article6-week ONLINE course, Cybersecurity Law & Policy – enrollments now open!
Announcing the opening of enrollment for a 6-week online course, Cybersecurity Law & Policy, that I will be teaching during February 13-March 30, 2012. Designed for mid-career professionals,...
View ArticleEnrollment Open for Online Cyber Security Law and Policy Course
Follow this link for details of the course sponsored by the Institute for National Security & Counter Terrorism, and joint endeavor of the College of Law and of the Maxwell School for Citizenship...
View Article
More Pages to Explore .....