Storing Terabytes of TS Documents at Home Is Not A Good Idea!!

Many ATI instructors and course attendees have US government clearances. Clearly Storing Terabytes of TS Documents at Home Is Not A Good Idea!! “The digital media contained many terabytes of information that must be reviewed by appropriate authorities,” according to the motion. In it, a footnote describes a terabyte as equivalent to 500 hours of […]
Many ATI instructors and course attendees have US government clearances. Clearly Storing Terabytes of TS Documents at Home Is Not A Good Idea!! “The digital media contained many terabytes of information that must be reviewed by appropriate authorities,” according to the motion. In it, a footnote describes a terabyte as equivalent to 500 hours of digital video, 200,000 image files or 1 million electronic books. See the reference links below for more information. http://www.databreachtoday.com/nsa-contractor-accused-taking-top-secret-documents-a-9438 ATI has Cyber Security courses. See the outlines at http://www.aticourses.com/schedule.htm#communications This is Hal Marin’s LinkedIn profile. I would not recommend asking to connect on LI with him unless you are an investigative journalist. He only had 70 LI connections. I am glad that I am not one of them. He is a local UMBC PhD student since 2007-2017. Clearly completing a PhD dissertation was not a high priority for this character. The profile was still available on 10/06/2016. https://www.linkedin.com/in/hal-martin-a2b51921 I have excerpted some in case it is taken down in the next few days. Technical Advisor & Investigator on Offensive Cyber issues Contractor and Consultant July 2015 – Present (1 year 4 months)OSD – CYBER Cyber (CNO) Engineering Advisor – Supporting OSD Leadership in pursuit of program oversight, management excellence, and optimal outcomes on issues for various Cyber related Initiatives across DoD and the IC. Committed to Excellence in Defense of the Nation. Contractor and Consutant Various 1996 – Present (20 years) Community This account is for personal business and research; it does not represent any employer’s viewpoint, previous or current. I am presently with a very good firm of top-notch people. ISSE Various Consultants and Contractors 2001 – 2014 (13 years)Maryland and Northern Virginia CNO – CND/CNE/CNA across the Community. U.S. Naval Officer U.S.Navy

Heartbleed Used by Identity Thieves in Phishing Scam

As many security experts predicated, scammers are exploiting the news of the Heartbleed Internet-security bug, sending unsuspecting citizens email messages asking them to log into sensitive accounts. Researchers at security giant Symantec noticed one such message, which purported to come from a well-known insurance company that caters to U.S. military veterans and their families. The message is […]
As many security experts predicated, scammers are exploiting the news of the Heartbleed Internet-security bug, sending unsuspecting citizens email messages asking them to log into sensitive accounts. Researchers at security giant Symantec noticed one such message, which purported to come from a well-known insurance company that caters to U.S. military veterans and their families. The message is part of a phishing scam trying to steal website login credentials in order to gain access to sensitive personal information. MORE: Heartbleed Bug: Information, Advice and Resources “We wanted to make you aware of ‘Heartbleed’ Internet bug affecting many servers,” reads the Heartbleed phishing message in official-sounding but somewhat stilted English. “A security patch was implemented for [the company website] earlier this week, and although we have no indication that our security certificates have been compromised, we have obtained new certificates for [the website].” So far, so good. Heartbleed did indeed affect millions of Web and email servers, and in order to properly patch them, administrators would have to reissue security certificates that may have been compromised. But then the email goes off the rails.
Sign Up For ATI Courses eNewsletter

A Hot Market Is Growing For Trained Cyber Security Experts.

A recent analysis by Burning Glass Technologies showed that cyber security jobs are hard to fill in the Washington D.C. area and on average earn $93,028 for a cyber job compared to $77,642 for average salary for all IT job postings, a difference of $15,386 annually. Nice work and pay if you are qualified. There […]
A recent analysis by Burning Glass Technologies showed that cyber security jobs are hard to fill in the Washington D.C. area and on average earn $93,028 for a cyber job compared to $77,642 for average salary for all IT job postings, a difference of $15,386 annually. Nice work and pay if you are qualified. There were 209,749 postings for cyber security-related jobs nationally. Cyber security jobs account for nearly 10% of all IT jobs. Cybersecurity postings have grown 74% from 2007-2013. This growth rate is over 2x faster than all IT jobs. Read the original report at here.  Also, here is the report on Cyber Security Jobs Learn more about the cyber world and technology at
Cyber Warfare – Global Trends Apr 23-25, 2014 Columbia, MD
Cyber Warfare – Global Trends Jun 10-12, 2014 Live Virtual
There are a number of cyber courses available from ATIcourses to give you the training required to pass a cyber related certification test on our schedule.


Sign Up For ATI Courses eNewsletter

What is the Future of Cyber Security?

Author Bio: Jack is interested in everything to do with technology and has recently purchased secure web hosting with JaguarPC so he can launch his own analysis and opinion website related to the industry. In his spare time, Jack enjoys painting. As far back as the 1990s, technology analysts were saying that wars of the […]
Author Bio: Jack is interested in everything to do with technology and has recently purchased secure web hosting with JaguarPC so he can launch his own analysis and opinion website related to the industry. In his spare time, Jack enjoys painting. As far back as the 1990s, technology analysts were saying that wars of the future wouldn’t be fought with tanks on the battlefield. Instead, war would rely on technology experts being able to hack computer systems and access and extract data for analysis by individuals in various fields. While there are still plenty of examples today of ‘traditional’ wars being fought around the world, there is no question that the level of cybercrime has increased. Increased Problems There are many reasons why cybercrime occurs. The most common appears to be when cybercriminals deliberately target a specific organisation with the objective of stealing data or accessing personal details with a view to committing fraud of some type. However, cybercrime, or a cyber-attack, might be committed by an individual or a group who mean to expose how flawed a system is. These people aren’t hacking to necessarily cause harm, but to raise awareness and say “This is what would happen if…” although critics of this approach often scald such initiatives, as they are perceived to be an open invitation to criminals. Cyber Security Priorities Because of these issues, cyber security is an increasingly large priority both for governments and for companies around the world. At the beginning of 2013, we saw high profile hacking cases involving the New York Times, while Google have also been a target and, in recent days, Adobe have admitted that details of nearly three million customers have potentially been compromised. The Chinese Government have also publicly admitted in recent weeks that they have been victims of a cyber-attack, while it is thought Western governments “legally” target so-called rogue states like Iran and North Korea to get information about potential nuclear development, among other things. When names such as these are being targeted, it is clear the size of the problem is gargantuan. The important thing with cyber security is that it is seen as a continuous priority and that it is accepted that the job is never done. As soon as an update is released or a website or database protected and made more robust, there is someone somewhere trying to break it, and history tells us that eventually they will do.   Small Business Risks In recent months, analysts have been pointing out the dangers of not having adequate cyber security to small businesses. Although a small business might not have the depth of data a large corporation or a government will hold, they could be seen as an easy target, particularly if security is seen as lax by criminals and they’re able to get all the information they need almost unnoticed. The lesson for all webmasters to heed is that, if it can happen to Google and Adobe, for example, it can happen to them. An attitude of “I have nothing to offer so I’m not at risk” is a dangerous one to have. Even a large company would struggle to maintain its reputation if it was compromised to the extent that large-scale fraud was carried out based on data gleaned from them, so how would a small one survive? The importance of cyber security is clear, what matters now is that everyone acts on it and ensures they’re in the best position not to be compromised.
Sign Up For ATI Courses eNewsletter

Cyber Security: Your Priority in 2013

Applied Technology Institute (ATI Courses) offers Cyber Warfare – Global Trends course which will be offered on June 18-20, 2013 in Columbia, MD.  This course is highly relevant according to the 6th annual Deloitte Cyber Security Survey. Why? Consider this: Recently, there was a hack and theft of more than 250,000 Twitter user passwords Hackers recently got into […]
Applied Technology Institute (ATI Courses) offers Cyber Warfare – Global Trends course which will be offered on June 18-20, 2013 in Columbia, MD.  This course is highly relevant according to the 6th annual Deloitte Cyber Security Survey. Why? Consider this:
  • Recently, there was a hack and theft of more than 250,000 Twitter user passwords
  • Hackers recently got into Facebook. However, they did not steal any information belonging to the social media site’s 1 billion worldwide users. What happened was that some employees visited a mobile software developer’s site which led to malware getting installed their laptops.
Everyone is trying to prevent cyber-attacks including heads of state. Nonetheless, a recent study by consulting firm Deloitte’s sixth annual Cyber Security Survey suggests that any organisation is at risk of a security breach. Citing the fact that most passwords can be cracked in five hours, a statement made by a Deloitte technology risk leader says that every business has to assume a breach will occur. As a result, detection and response planning procedures are an absolute necessity. Among areas cited as threats were:
  • Third-party breaches: 59 percent of the study participants experienced security breaches in 2012.
  • BYOD (Bring Your Own Device): 74 percent of study respondents cited this as one of their biggest risks but only 52% had BYOD security policies in place.
  • Hacktivisim: Hacktivisim was mentioned in the survey for the first time with 63% of the respondents noting it as a major concern.
Just 40 percent of the respondents stated that they collect data about cyber-attacks that specifically target their industry, brand, organisation or customers. Register for ATI’s Cyber Warfare – Global Trends today and learn how to protect yourself and your organization against future cyber attacks! There may be no such thing as hacker-proof, but there’s a chance to reduce your cyber beacon, be less inviting to attack, and proactively establish measures around your most valued assets.


Sign Up For ATI Courses eNewsletter

DOD cyber defense plan: secure internet OR government controlled internet?

It is not a secret to anybody that the next new war will be fought (or possibly is being fought) through internet.  Previously the U.S. had determined that cyberattacks could be considered an act of war.  It was disclosed, that in March one of the leading defense contractors was hacked by a foreign intruder who was […]
It is not a secret to anybody that the next new war will be fought (or possibly is being fought) through internet.  Previously the U.S. had determined that cyberattacks could be considered an act of war.  It was disclosed, that in March one of the leading defense contractors was hacked by a foreign intruder who was able to get away with 24,000 files containing information on the newly developed weapons systems.  Read more here   It is obvious that something needs to be done to defend our cyber borders. Nearly $500 million were allocated to DARPA (Defense Advanced Research Projects Agency) to increase the number of cyber-aligned resources. Last week DOD presented its new plan to secure our cyber space. However, the problem will not be easily solved and the issue is highly controversial. Why?  Because to SECURE anything means to CONTROL it. In this case, we are talking about controlling the INTERNET– a worldwide interconnection of computer networks that facilitate the exchange of information among users! A lot of people out there say that if we can’t control our borders how can we possibly “secure” the internet.  Yet others consider the plan to be an intrusion on user’s privacy.   However, if the plan is not put in place here are just a few possible threats we are facing: Espionage and national security breaches Sabotage of military operations Sabotage of the national electrical grid What do you think?  Please comment below…
Sign Up For ATI Courses eNewsletter

Applied Technology Introduces New Cyber Warfare Short Course

(Riva, MD; September 2009) The Applied Technology Institute (ATI) announces a new two-day professional development short course, Theory and Fundamentals of Cyber Warfare, offered to the public on Jan 19-20, 2010 in Beltsville, Maryland. The course is offered in response to the growing need for businesses and military facilities to quickly gain an understanding of […]
(Riva, MD; September 2009) The Applied Technology Institute (ATI) announces a new two-day professional development short course, Theory and Fundamentals of Cyber Warfare, offered to the public on Jan 19-20, 2010 in Beltsville, Maryland. The course is offered in response to the growing need for businesses and military facilities to quickly gain an understanding of cyber threats and institute cyber security defenses. It is targeted especially to DoD analysts, specialists and engineers in security related facilities in the Washington, DC, Virginia and Maryland metro area, which has the largest concentration of DoD national security related facilities in the United States. Those facilities, along with the research and development contractors they work with, are building their resources to tackle the growing need for cyber security experts.

Cyber Warfare is all over news headlines. World leaders, including the United States, Russia, South Korea and Great Britain, are scrambling to organize against the rapidly increasing varieties of threats such as spyware and malware, spoofing, phishing and botnets that are having devastating effects around the world. Digital intelligence experts have labeled these escalating cyber threats as a “Global Cyber Cold War”.

The instructor for ATI’s new Theory and Fundamentals of Cyber Warfare course is Albert Kinney, who brings more than 20 years of experience in research and operational cyberspace mission areas including the initial development and first operational employment of the Naval Cyber Attack Team. Kinney says, “ I designed the course to focus on providing a top-down view of both the challenges and opportunities encountered in this new warfare domain. Attendees will gain insight to emerging requirements and trends affecting the implementation of cyber warfare systems, policy, and operations that will inform your strategy and focus your efforts in cyberspace.”

Maryland Governor, Martin O’Malley, was recently interviewed on 103.5 FM WTOP radio identifying Maryland as the next, “silicon valley” of cyber security. “Cyberspace has emerged as a mainstream warfare domain on par with air, land, sea, and space domains. This advancement to a bona fide battle space arises from the de facto behaviors of entities ranging from international superpowers to improvised non-state organizations. As a result, government and military organizations are developing new doctrines, establishing domain-focused operational hierarchies, and acquiring new systems capabilities to maintain cyberspace as a viable resource serving the national interest,” Kinney explains.

The topic of cyber security first gained momentum when President Obama announced in May that his administration will pursue a plan to secure America’s digital infrastructure and that, “Protecting this infrastructure will be a national security priority.” The President’s plan will involve nearly all sectors of local and national government and military.

Prospective attendees can view the full Theory and Fundamentals of Cyber Warfare course description by clicking on: http://www.aticourses.com/theory_fundamentals_cyber_warfare.html

The Applied Technology Institute (ATI) specializes in professional development seminars in the technical areas of space, communications, defense, sonar, radar, and signal processing. For over twenty-five years, ATI has presented leading-edge technical training to defense and NASA facilities, as well as DoD and aerospace contractors. ATI courses provide a clear understanding of the fundamental principles and a working knowledge of current technology and applications. ATI has the unique capability to schedule and deliver courses in a matter of weeks. They offer customized on-site training at your facility anywhere in the United States, as well as internationally and over 200 annual public courses in dozens of locations. World-class design experts lead courses. To register or for an on-site quote, call (888) 501-2100, or visit them on the web at www.ATIcourses.com.