Loading...
You are here:  Home  >  'cybersecurity'
Latest

Issues with Designating Election Infrastructure as Critical Infrastructure

By   /  October 15, 2016  /  Cyber-terrorism/Finance/Other, National Security Law  /  Comments Off on Issues with Designating Election Infrastructure as Critical Infrastructure

By Daniel Patrick Shaffer Critical Infrastructure and the Power of the Executive Branch Department of Homeland Security Secretary Jeh Johnson recently proposed the idea of designating election infrastructure as “critical infrastructure.” Critical infrastructure includes pieces of infrastructure that are so vital to the United States, that their destruction would have a crippling effect on our […]

Read More →
Latest

Cyber Security Threats Offer New Legal Challenge to Holding Spies Responsible for Espionage

By   /  January 6, 2016  /  IP, News, Trending Topics  /  No Comments

In December 2014, naturalized US citizen Mostafa Ahmed Awwad was arrested by the FBI for attempting to sell blueprints of the US Navy’s brand-new nuclear-powered aircraft carrier, the USS Gerald R. Ford.[1] Awwad, a former Egyptian citizen and engineer in the Nuclear Engineering and Planning Department of the massive Norfolk Naval Shipyard, had a Secret […]

Read More →
Latest

GameOver ZeuS: Combatting the Global Threat of CyberCrime

By   /  February 6, 2015  /  Cyber-terrorism/Finance/Other, International, National Security Law  /  No Comments

Although cybercrime is no longer a new threat to global security, it has remained an important and growing concern for both domestic and international law enforcement agencies. The very nature of cybercrime requires American law enforcement agencies to reach out to their international counterparts to work together in tracking down criminals. This need for international […]

Read More →
Latest

What happened to NSA reform and where does it go from here?

By   /  November 11, 2014  /  National Security Law, Pending Cases, Trending Topics  /  No Comments

Over eighteen months have passed since Edward Snowden first disclosed the extent of the National Security Agency’s (NSA) surveillance programs. [1] Snowden revealed two main programs: the business records program that includes phone history collections, and the PRISM program that collects information about electronic communications. The business records program operates under Section 215 of the […]

Read More →
Latest

Cyber Attacks and the Law of War: Decoding the Pentagon’s Response

By   /  August 29, 2012  /  Trending Topics  /  No Comments

The Pentagon recently stated it intends to treat sufficiently destructive cyber attacks as acts of war, subject to armed retaliation. In its report to the Congress, the Department of Defense (DoD) stated the use of armed force was on the extreme end of a continuum of policy choices rather than a default response. Yet the […]

Read More →