Monday, July 25, 2011

CYBER SECURITY TRAINING: 8 RESOURCES AND 2 TRAINING SEMINARS

In April 2009, at an undisclosed location in Cleveland, the Association For Intelligence Offiers (AFIO) members heard FBI Special Agent Figliuzzi discuss "Cyber Attack." Frank Figliuzzi earned his undergrad degree from Fairfield University CT, and a Juris Doctorate with honors from the Un. of Connecticut School of Law.

He joined the FBI in 1987 and was assigned to the Atlanta Division, working terrorism and foreign counterintelligence investigations. Later, his assignments with the FBI involved economic espionage and foreign sponsored theft of trade secrets. Agent Figliuzzi led the FBI's first squad devoted exclusively to crimes against children, and following 9/11, he was selected to head FBI Miami's new Counterterrorism Branch. He implemented the South Florida Joint Terrorism Task Force with 160 personnel from 34 agencies and served as on-scene commander during the nation's first anthrax murder in Boca Raton, Florida.

8 Great Cyber Resources!



In 2006, FBI Director Robert S. Mueller named C. Frank Figliuzzi the Special Agent in Charge of the Cleveland Field Office. Agent Figliuzzi discussed Cyber Terrorism at this private AFIO meeting. To gain more knowledge about this issue, click HERE.
A bit about Cyber terrorism: Through OSINT research, this writer feels that another type of Al-Qaeda attack coupled with a Cyber attack is being contemplated. A state actor (Syria? Iran? China? N. Korea?) may very well conduct the Cyber attack from afar while Al-Qaeda attacks on-the-ground with a WMD. A prearranged agreement would be made with the state actor and Al-Qaeda with the understanding that Al-Qaeda would assume all blame and consequences for both the Cyber and WMD attack. Suppose Al-Qaeda planned a biological attack in America's heartland and released the biological agent via airplane over a large mid-western city at 3a.m. Imagine it's winter time with subzero temperatures. The state actor simultaneously hits computer and telecommunication networks controlling critical infrastructures. Our electric and gas power systems would shut down, while traffic control systems and financial systems would be disabled.
It could be a multiple Cyber strike, coming directly "through the wires" by faraway hackers in the state actor country, along with a physical assault by Al-Qaeda suicide car bombers, and by sleeper cell "moles" working inside our critical infrastructure computer systems, thus having ready access to them.

In all the chaos, other Al-Qaeda cells could continue to disperse deadly biological agents in several metropolitan areas. Since the bio WMD deadly effects wouldn't occur for several days, our security forces would be focused on the Cyber attack.

Such an attack would horrify millions. Essential services would be cut off- electricity, telephone, natural gas, gasoline pumps, cash registers, ATM machines, Internet transactions, dam and flood control computerized systems, primary telecommunications trunk circuits connecting America's heartland with other regions, air traffic control systems resulting in the grounding of all air traffic and diverting of inbound traffic, e-commerce and credit card service...the list is endless!

Two Great Anti-Cyber Attack Seminars

OSINT NEWS Pick No. 1: Cyber Warfare Training Program introduces the fundamental components that comprise the cyber threat environment. You will learn the principles of cyber warfare, espionage and terrorism. This program is heavily weighted with current real-world cyber events and threat analysis.

Syllabus 1. Introduction and Overview 2. Setting the Cyber Security Stage - Vulnerability Analysis Model 3. Cyber Hacktivism - Social Media Case Study 4. Cyber Espionage - Cleared Insider Case Study 5. Cyber Terrorism - al-Qaeda's Case Study 6. Cyber Intelligence - Counter Cyber Intelligence Case Study 7. Cyber Weapons - Cyber Weapons Classification Study 8. eBombs, TEDs and Pulse Devices 9. Cyber Attack Process - July 4th Attack Case Study 10. Cyber Warfare Doctrine & Strategy - Hypothetical Attack Design & Analysis 11. International Issues (Investigations) - Attribution Case Study 12. GhostNet & Shadow - Case Study and Analysis 13. The Problems of the Near Future - Technology Scan Analysis 14. Group Assignment Presentations 15. Summary & Review 16. Examination

It is paramount that the military, intelligence agencies, government leaders, and the homeland security community develop an appropriate doctrine to systematically and appropriately counter the threat of cyber terrorism and cyber warfare. The program outlined above examines the current international and domestic issues as they might apply to acts of cyber aggression, and uses case study summaries of actual events in an effort to develop real-world insights. Of special interest to the military, intelligence, government leaders and homeland security communities, this program provides a common context for discussion, coordination and decision making. OSINT NEWS highly recommends this program- Get Trained!

Cyber Warfare Training Program: Click and View It!


 
OSINT NEWS Pick No. 2: Cyber Terrorism Response Training. The course addresses the needs of Office of Emergency Services and Emergency Responders as well as one for critical infrastructure providers. The seminar includes a 1-Day on sight delivery mode and a distance learning delivery mode as well. They've conducted pilot programs and here's the feedback and comments:

"Really amazing information incredible amount of knowledge"
 
"Enlightening - would like to know more about cyber defenses"

"I learned more than I thought. I am hoping I can get this at our local department since we have a nuclear plant water treatment facilities and neighboring department who need this"

This program examines the current international and domestic issues as they might apply to acts of cyber terrorism, and uses cyber terrorist attack summaries to evolve the student's thinking into real-world insights. Given the recent warnings of potential acts of cyber terrorism after Osama Bin Laden's death, it is important that the military homeland security community and emergency responders develop the skills needed to counter the threat of cyber terrorism. OSINT NEWS highly recommends this training- Get Trained!


Robert Morton, M.Ed., Ed.S. is a member of the Association For Intelligence Officers (AFIO) and writes about the U.S. Intelligence Community (IC). A portion of the Ad revenues from this site is donated to the AFIO. His ideas are his own and do not represent any organization he's a member of. We welcome your ideas and comments on OSINT. Contact us on the secure Bpath Mail Form.

No comments: