Sovereignthink

Upholding Individual, State then National Sovereignty against the Enforcement of Global Governence and Tyranny

Engineering a Generation of Domestic CyberSecurity State Policey Enforcement

with 41 comments


Engineering a Generation of Domestic CyberSecurity Officers – The UN Generation of a Digital Police State

Times are hard and jobs are Still Vanishing, While The Prison/Corrections Systems and Federal/Government Enforcement Might be the King of the Blue Collar Growth Industry… Cybersecurity is The White Collar Growth Industry

United States Cyber Challenge

Based on their Own Federal policy institute commission’s findings; on CyberSecurity Regarding the Human Capital Resource Issue, The Center for Strategic & International Studies created the program called the United States Cyber Challenge.

Be the Next Cybersecurity Top Gun, The Next CSI, Jack Bower, NCIS, BONES, or Federal CyberSpy

  • Earn Respect Among Your Peers
  • Get Noticed by a Nationwide Cybersecurity Community
  • Help the U.S. Beat the Bad Guys, Defend, Survive, Win

 

The U.S. Cyber Challenge has become a nationwide effort to fill a demand for professionals not only in government but also for Public/Private Corporations.

Target Youth – Engineering a Generation for the New World Policey State

Strategic National Domestic Security Education Training Programs Under U.S. Cyber Challenge

Through Early Student Cognitive Training and Threat Awareness Programs 

Students Gain Preparedness Training for Identification in Cybersecurity Warfare and Domestic Threats;

-CyberSecurity Threats, Domestic Extremist, Controversial or Violent Political Hate Speech (Cyber Attacks, Hacking, Domestic Threats, Inciting Riot or Rebellion, Belligerent, Anti Government, Anti Federal Enforcement, Anti Taxation, Anti Federal Regulation, Anti Bankers, States Revolt etc.)

Suspicious Criminal BehaviorIdentify, Record and Report

NSTIC TrustMark IDentity Ecosystem Registration, Participation and ‘Envision It’ Awareness

Active Opperations

  1. READY Training Program
  2. If You See Something Say Something
  3. Stop Think Connect
  4. School Community Security Service Activity Programs (With Internet Integration through SnapScouts, AppCatcher, etc)
  5. Student Department of Communications and Advertising contest attracting high school teams from around the country (children created marketing with Federally Established themes and criteria)

 

Cybersecurity Human Resource Occupational Training Programs

  1. National Security Student Civilian Task Force Alliance
  2. High School CyberSecurity Brigades Hands on Training in
  1. Cyber Foundation – National 2011 Digital Forensics Challenge
  2. University Platform Creation and Research
  • The Information Systems and Internet Security (ISIS) Laboratory is a NSF-funded lab consisting of heterogeneous platforms and multiple interconnected networks to facilitate hands-on experimentation and project work related to information security.
  1. Cybersecurity Boot Camps
  • Air Force
  • Commerce
  • DHS
  • NSA
  • Public/Private Foundations
  • DoD

(DOD’s U.S. Cyber Command is expected to hire at least 5,000 new cybersecurity workers alone.)

Promoting Occupational Training for the New Generation of Domestic CyberSecurity Employees, Officers and Agents

       #1 Information Security Crime Investigator/Forensics Expert

       #2 System, Network, and/or Web Penetration Tester

       #3 Forensic Analyst

       #4 Incident Responder

       #5 Security Architect

       #6 Malware Analyst

       #7 Network Security Engineer

       #8 Security Analyst

       #9 Computer Crime Investigator

       #10 CISO/ISO or Director of Security

       #11 Application Penetration Tester

       #12 Security Operations Center Analyst

       #13 Prosecutor Specializing in Information Security Crime

       #14 Technical Director and Deputy CISO

       #15 Intrusion Analyst

       #16 Vulnerability Researcher/ Exploit Developer

       #17 Security Auditor

       #18 Security-savvy Software Developer

       #19 Security Maven in an Application Developer Organization

       #20 Disaster Recovery/Business Continuity Analyst/Manager

Congressional Laws – Cybersecurity Act of 2010  – Cybersecurity Student Occupational Training and Career Outreach

Federal Cyber ScholarshipForService Program (Section 102)

This section would create in statute the Scholarship‐For‐Service program at the National Science Foundation, which is focused on recruiting students into a cybersecurity curriculum program. Upon graduation, these students would enter public service, joining an agency or department and leveraging the skills they’ve learned. This section would increase the number of students from 300 to 1000 annually.

Cybersecurity Competition and Challenge (Section 103)

This section would authorize the NIST Director to establish cybersecurity competitions and challenges to attract, identify, and recruit talented individuals to the cybersecurity field.

Cybersecurity Workforce Plan (Section 104)

This section would require the head of each federal agency to annually complete a cybersecurity workforce plan that details recruitment, hiring, and training of cybersecurity employees and contractors. Each agency would make their hiring projections publicly available on their website.

Measures of Cybersecurity Hiring Effectiveness (Section 105)

This section would require each federal agency to measure cybersecurity hiring effectiveness with respect to recruiting and hiring, from the perspective of hiring managers, applicants, and new hires. This information would be reported annually to Congress and the public.

Advanced Cognitive Training in Threat Awareness Programs

The National Youth Leadership Forum (NYLF)

Forums are offered in a variety of topics and career fields, including national security.

The Remarkable Practice of Keeping America Safe

From FBI Headquarters to the Pentagon, foreign embassies to the Capitol Building, the National Youth Leadership Forum on National Security (NYLF/NS): Exploring American Diplomacy, Intelligence and Defense provides students with a detailed and thorough introduction to the diplomatic, security and national defense issues facing America in the 21st century.

  • Students face off in security simulations, taking into consideration important aspects of foreign policy, national security goals and long-term strategy. This six-day program introduces students to challenging careers in defense, intelligence, the diplomatic corps and more.
  • National Security scholars bring current affairs to life through peer debates, acquire new skills for decision making, critical thinking and leadership, and gain a new appreciation of the work that goes on behind the scenes every day to keep our country safe.
  • Forum on National Security students are special guests at super-sensitive sites where critical decisions are made, and speak to the people who make them.
  • The government’s leading academic institutions open their doors to our attending scholars, where they are introduced to diplomacy, international affairs and military strategy.
  • Students participate in thought-provoking question and answer sessions with highly respected, internationally recognized civilian policy makers and senior military officers, who provide rich insights into current issues and discuss the strategies that helped them succeed.

-sovereignthink

http://www.Thedailybell.com/1724/Ron-Paul-The-Fed-and-Job-Creation.html

41 Responses

Subscribe to comments with RSS.

  1. THANK YOU for bringing this to my attention, my family will benefit a lot.

    Shayna

    2013/04/13 at 7:03 am

  2. Thanks for good info 🙂

    Agripina Futrell

    2012/05/16 at 9:04 am

  3. Youre so cool! I dont suppose Ive read anything like this before. So nice to find someone with some original thoughts on this subject. realy thank you for beginning this up. this web site is something that is needed on the net, someone with somewhat originality. helpful job for bringing something new to the web!

    Anonymous

    2012/02/01 at 4:52 am

  4. You have certainly nailed this 1!

    Anonymous

    2012/02/01 at 4:45 am

  5. Just added this blog to my favorites. I enjoy reading your blogs and hope you keep them coming!

    Anonymous

    2012/01/31 at 12:36 pm

  6. My partner and I stumbled over here coming from a different website and thought I should check things out. I like what I see so now i’m following you. Look forward to exploring your web page yet again.

    Anonymous

    2012/01/30 at 5:10 pm

  7. Its like you read my mind! You appear to understand a lot about this, such as you wrote the book in it or something. I think that you just could do with a few % to pressure the message house a bit, but instead of that, this is magnificent blog. A fantastic read. I’ll definitely be back.

    Anonymous

    2012/01/28 at 6:30 pm

  8. I’m not that much of a internet reader to be honest but your sites really nice, keep it up! I’ll go ahead and bookmark your website to come back later. All the best

    Anonymous

    2012/01/26 at 6:34 pm

  9. […] gave us the PATRIOT act, the Department ‘Homeland’ and war around the […]

  10. […] What kind of adult have your raised? […]

  11. You are a very capable person!

    Anonymous

    2012/01/13 at 9:44 am

  12. I am genuinely glad to read this website posts which carries plenty of valuable data, thanks for providing such information.

    Anonymous

    2012/01/13 at 7:04 am

  13. […] Engineering a Generation of Domestic CyberSecurity State Policey Enforcement […]

  14. very nice post, i certainly love this website, keep on it

    Anonymous

    2011/12/27 at 6:10 am

  15. Glad I found your blog

    Anonymous

    2011/12/27 at 4:26 am

  16. A number your articles and other content engenders some debate on various points, nevertheless i think you’ve all this calculated. Your website content continuously is interesting in addition to informative.

    Anonymous

    2011/12/22 at 8:13 am

  17. Awesome writing style!

    Anonymous

    2011/12/22 at 3:26 am

  18. Nice one for keeping us informed with these news!

    Anonymous

    2011/12/21 at 9:52 pm

  19. […] 10. What is this new army of secret police we now face? […]

  20. […] 11. What is this new army of secret police we now face? […]

  21. […] 11. What is this new army of secret police we now face? […]

  22. […] 5.      Engineering a Generation of Domestic CyberSecurity State Policey Enforcement […]

  23. […] This has been reached with total government and private market integration since 1900. The Modern incarnation is that of complete mobile phone movement recording and storage, auto filtering and filing all electronic communications, all purchases and transactions, monitored in home activity and energy usages, Centralized Circuit (C.C.) Fusion Center integrated Cameras and monitoring systems with bio, plate, behavioral monitoring systems, expanded enhancements into private/municipal surveillance grids, as well as network accessible IP cameras in the Hands of Every, Thought Crime, Suspicious Activity and MALINTENT Reporting, Child …. […]

  24. […] This has been reached with total government and private market integration since 1900. The Modern incarnation is that of complete mobile phone movement recording and storage, auto filtering and filing all electronic communications, all purchases and transactions, monitored in home activity and energy usages, Centralized Circuit (C.C.) Fusion Center integrated Cameras and monitoring systems with bio, plate, behavioral monitoring systems, expanded enhancements into private/municipal surveillance grids, as well as network accessible IP cameras in the Hands of Every, Thought Crime, Suspicious Activity and MALINTENT Reporting, Child …. […]

  25. […] Engineering a Generation of Domestic CyberSecurity State Policey Enforcement […]

  26. […] 5.      Engineering a Generation of Domestic CyberSecurity State Policey Enforcement […]

  27. The content on this publish is really a single of the top material that I’ve ever occur across. I love your article, I’ll appear back to verify for new posts.

    ip camera review

    2011/02/11 at 6:49 pm

    • thanks Makinen230

      Personal IP security is a great new feature for the individual.

      The potential for ISP abuse of IP based systems for in home and private surveillance of society is a 1984 Orwellian Tele-Screen world.

      In the U.S. School children have been watched and convicted based on Government Educational Authority Officers use of IP camera spying in Students home.

      Create Criminal Law for any abuse in sharing or stealing feeds in your local and national systems of Law.

      Protect your Life and Liberty.

      -sovereignthink

      sovereignthink

      2011/02/12 at 12:16 am

  28. This really answered my downside, thank you!

    2011 Mustang

    2011/02/10 at 11:06 am

  29. I’m having a difficult time viewing this website from my iPhone. Just wanted to let you know.

  30. This is really fascinating, You’re an exceptionally knowledgeable writer. I’ve registered with your feed and also count on viewing a great deal more of your remarkable write-up. At the same time, We’ve shared your web site in our social networking sites. Does your blog have a contact page? I’m having problems locating it but, I want to post you a communication. I’ve got some ideas for use in your web log there’s a chance you’re truly interested in hearing. In either case, tremendous site and i also look forward to viewing it spread out over the years.

    Despina Garcelon

    2011/02/07 at 4:46 pm

  31. I hope someday to make a site similar to this one. Its quite intriguing!

    Smoking Side Effects

    2011/01/30 at 5:32 am

  32. […] are the Resistance to Global Governance, Planned Society and Population Control aka […]

  33. […] 2011/01/18/engineering-cyber-police-state-generation/ […]

  34. […] Engineering a Generation of Domestic CyberSecurity State Policey Enforcement […]

  35. Thank you..really informative!!

    softstars

    2011/01/19 at 7:35 am

  36. […] the Dots; The Patriot Act, FIMA, DHS, Infra-Guard, TSA, NSTIC and TrustMark Citizenship Engineering a Generation of Domestic CyberSecurity State Policey Enforcement » LikeBe the first to like this […]


Leave a reply to Anonymous Cancel reply