national security

Enemies at the Gate: The New Fake News

by James Scott, Co-Founder and Sr. Fellow, Institute for Critical Infrastructure Technology (ICIT), Center for Cyber Influence Operations Studies (CCIOS) The Institute for Critical Infrastructure Technology (ICIT) is a non-partisan, non-profit 501c3 intent on facilitating meaningful dialogue amongst key stakeholders in government and public and private organizations as well as educating the public on Information .. read more

ICIT Analysis: “Facebook Poses a Massive Risk to National Security: But It’s Worse than You Think…”

Dragnet surveillance capitalists turned dragnet surveillance propagandists remain under-controlled to the point that they knowingly operate on a spectrum from criminally negligent to negligently criminal. While it is essential that negligent data brokers face the consequences for their nefarious activities, it is also vital that the underlying disease that founded the environment of their growth .. read more

ICIT Analysis: The CLOUD Act – Immediate Passage of the CLOUD Act Ensures Unambiguous Protection of Privacy and National Security

The CLOUD Act is meaningful bipartisan legislation that will empower U.S. law enforcement and authorities in countries that enter into agreements with the government to quickly access essential evidence stored in servers owned by companies that are based in the United States, provided that there is probable cause and warrant to access that information. With .. read more

ICIT Analysis: The Graham-Klobuchar Amendment Can Secure Election Infrastructure

Election integrity is a non-partisan issue that merits significant bipartisan support. Multiple players are capable of exploiting the vulnerabilities present in the often insecure, black-box proprietary code and unsecurable, antiquated legacy technology upon which U.S. election tabulation infrastructure relies. The Graham-Klobuchar Amendment aims at achieving Secure State Election Infrastructure through a Federal-State collaborative commission of .. read more

ICIT Brief: Metadata – The Most Potent Weapon in This Cyberwar: The New Cyber-Kinetic-Meta War

Metadata, or “data about data,” is collected and recorded to describe data, identify trends, administer algorithmic solutions, and model potential scenarios. When one understands how to make sense of seemingly random metadata or how to pair the data with other exfiltrated data pools, there are limitless possibilities for social engineering and cyber exploitation in attacks .. read more

ICIT Analysis:  Sowing the Seeds of U.S. Cyber Talent

K-12 students are the most prevalent and the most invaluable resource the U.S. can utilize in the development of a skilled and formidable cyber-workforce. As the United States grapples with a projected shortage of 1.5 million cybersecurity professionals by 2020, the “digital generation” provides a unique opportunity to address the cyber-talent shortage. In this analysis, .. read more

ICIT Analysis: Signature Based Malware Detection is Dead

Signature and behavioral based anti-malware are no match for next generation adversaries who utilize mutating hashes, sophisticated obfuscation mechanisms, self-propagating malware, and intelligent malware components. In this analysis, entitled “Signature Based Malware Detection is Dead,” the Institute for Critical Infrastructure Technology provides a thought-provoking analysis of the necessity for critical infrastructure sectors to adopt advanced .. read more

ICIT Analysis: The Wound Collectors – Profiling the Self Radicalized Lone-Wolf Terrorist

Acts of domestic terrorism in the West are escalating at an alarming rate. Lone wolf attacks and attackers have sparked public, political and law enforcement curiosity due to the, seemingly, random and independent action of a self-radicalized extremist with modest or no ties directly to the group in which they proclaim the action to be .. read more

American ISIS: Analysis of the Orlando Jihadist & Lone-wolf Attacks

ISIS lone wolves are being activated in towns and cities globally for the most potent cyber-physical combination of guerrilla attack ever to be introduced in modern warfare. This new enemy, fueled by extremist ideology, defies traditional profiling attributes such as race, sex, age, education, and nationality and can more easily evade detection by law enforcement. This .. read more