Storing Terabytes of TS Documents at Home Is Not A Good Idea!!

Many ATI instructors and course attendees have US government clearances. Clearly Storing Terabytes of TS Documents at Home Is Not A Good Idea!! “The digital media contained many terabytes of information that must be reviewed by appropriate authorities,” according to the motion. In it, a footnote describes a terabyte as equivalent to 500 hours of […]
Many ATI instructors and course attendees have US government clearances. Clearly Storing Terabytes of TS Documents at Home Is Not A Good Idea!! “The digital media contained many terabytes of information that must be reviewed by appropriate authorities,” according to the motion. In it, a footnote describes a terabyte as equivalent to 500 hours of digital video, 200,000 image files or 1 million electronic books. See the reference links below for more information. http://www.databreachtoday.com/nsa-contractor-accused-taking-top-secret-documents-a-9438 ATI has Cyber Security courses. See the outlines at https://aticourses.com/schedule.htm#communications This is Hal Marin’s LinkedIn profile. I would not recommend asking to connect on LI with him unless you are an investigative journalist. He only had 70 LI connections. I am glad that I am not one of them. He is a local UMBC PhD student since 2007-2017. Clearly completing a PhD dissertation was not a high priority for this character. The profile was still available on 10/06/2016. https://www.linkedin.com/in/hal-martin-a2b51921 I have excerpted some in case it is taken down in the next few days. Technical Advisor & Investigator on Offensive Cyber issues Contractor and Consultant July 2015 – Present (1 year 4 months)OSD – CYBER Cyber (CNO) Engineering Advisor – Supporting OSD Leadership in pursuit of program oversight, management excellence, and optimal outcomes on issues for various Cyber related Initiatives across DoD and the IC. Committed to Excellence in Defense of the Nation. Contractor and Consutant Various 1996 – Present (20 years) Community This account is for personal business and research; it does not represent any employer’s viewpoint, previous or current. I am presently with a very good firm of top-notch people. ISSE Various Consultants and Contractors 2001 – 2014 (13 years)Maryland and Northern Virginia CNO – CND/CNE/CNA across the Community. U.S. Naval Officer U.S.Navy

What is the Future of Cyber Security?

Author Bio: Jack is interested in everything to do with technology and has recently purchased secure web hosting with JaguarPC so he can launch his own analysis and opinion website related to the industry. In his spare time, Jack enjoys painting. As far back as the 1990s, technology analysts were saying that wars of the […]
Author Bio: Jack is interested in everything to do with technology and has recently purchased secure web hosting with JaguarPC so he can launch his own analysis and opinion website related to the industry. In his spare time, Jack enjoys painting. As far back as the 1990s, technology analysts were saying that wars of the future wouldn’t be fought with tanks on the battlefield. Instead, war would rely on technology experts being able to hack computer systems and access and extract data for analysis by individuals in various fields. While there are still plenty of examples today of ‘traditional’ wars being fought around the world, there is no question that the level of cybercrime has increased. Increased Problems There are many reasons why cybercrime occurs. The most common appears to be when cybercriminals deliberately target a specific organisation with the objective of stealing data or accessing personal details with a view to committing fraud of some type. However, cybercrime, or a cyber-attack, might be committed by an individual or a group who mean to expose how flawed a system is. These people aren’t hacking to necessarily cause harm, but to raise awareness and say “This is what would happen if…” although critics of this approach often scald such initiatives, as they are perceived to be an open invitation to criminals. Cyber Security Priorities Because of these issues, cyber security is an increasingly large priority both for governments and for companies around the world. At the beginning of 2013, we saw high profile hacking cases involving the New York Times, while Google have also been a target and, in recent days, Adobe have admitted that details of nearly three million customers have potentially been compromised. The Chinese Government have also publicly admitted in recent weeks that they have been victims of a cyber-attack, while it is thought Western governments “legally” target so-called rogue states like Iran and North Korea to get information about potential nuclear development, among other things. When names such as these are being targeted, it is clear the size of the problem is gargantuan. The important thing with cyber security is that it is seen as a continuous priority and that it is accepted that the job is never done. As soon as an update is released or a website or database protected and made more robust, there is someone somewhere trying to break it, and history tells us that eventually they will do.   Small Business Risks In recent months, analysts have been pointing out the dangers of not having adequate cyber security to small businesses. Although a small business might not have the depth of data a large corporation or a government will hold, they could be seen as an easy target, particularly if security is seen as lax by criminals and they’re able to get all the information they need almost unnoticed. The lesson for all webmasters to heed is that, if it can happen to Google and Adobe, for example, it can happen to them. An attitude of “I have nothing to offer so I’m not at risk” is a dangerous one to have. Even a large company would struggle to maintain its reputation if it was compromised to the extent that large-scale fraud was carried out based on data gleaned from them, so how would a small one survive? The importance of cyber security is clear, what matters now is that everyone acts on it and ensures they’re in the best position not to be compromised.
Sign Up For ATI Courses eNewsletter

DOD cyber defense plan: secure internet OR government controlled internet?

It is not a secret to anybody that the next new war will be fought (or possibly is being fought) through internet.  Previously the U.S. had determined that cyberattacks could be considered an act of war.  It was disclosed, that in March one of the leading defense contractors was hacked by a foreign intruder who was […]
It is not a secret to anybody that the next new war will be fought (or possibly is being fought) through internet.  Previously the U.S. had determined that cyberattacks could be considered an act of war.  It was disclosed, that in March one of the leading defense contractors was hacked by a foreign intruder who was able to get away with 24,000 files containing information on the newly developed weapons systems.  Read more here   It is obvious that something needs to be done to defend our cyber borders. Nearly $500 million were allocated to DARPA (Defense Advanced Research Projects Agency) to increase the number of cyber-aligned resources. Last week DOD presented its new plan to secure our cyber space. However, the problem will not be easily solved and the issue is highly controversial. Why?  Because to SECURE anything means to CONTROL it. In this case, we are talking about controlling the INTERNET– a worldwide interconnection of computer networks that facilitate the exchange of information among users! A lot of people out there say that if we can’t control our borders how can we possibly “secure” the internet.  Yet others consider the plan to be an intrusion on user’s privacy.   However, if the plan is not put in place here are just a few possible threats we are facing: Espionage and national security breaches Sabotage of military operations Sabotage of the national electrical grid What do you think?  Please comment below…
Sign Up For ATI Courses eNewsletter