Category

Cybercrime

Category

Security breaches in the business world have become commonplace and can have a catastrophic impact on the organization’s people, data, and brand reputation.

True security can only be realized through a comprehensive active approach that incorporates resources throughout the organization. There simply is not a silver bullet that can provide adequate security. However, a company can work to protect itself by incorporating proactive security measures that involve the entire organizational hierarchy.

In July 2015, hackers accessed account information of millions of users of the Ashley Madison, Cougar Life, and Established Men websites. These websites facilitate extramarital affairs as well as romantic and sexual encounters. While this stolen information could result in identity theft and fraud, it may have longer-lasting effects for the criminal justice community. AMU’s Dr. Chuck Russo writes about how this hack could impact current and future law enforcement professionals.

In June, AMU faculty joined a group of maritime and cybersecurity professionals to help the U.S. Coast Guard identify research topics needed to protect the nation’s ports and maritime environment from cyber attacks. Read more from AMU’s Dr. Joe DiRenzo about his experience at the Maritime Cyber Research Summit (MCRS) and the six research topics that were identified during the summit.

The ability of the intelligence community (IC) to protect the nation is largely the product of strong teamwork. Team decision-making improves the effectiveness of intelligence practices that depend on team members sharing information, brainstorming ideas, addressing conflict, and reaching a compromise as a unit.

While individuals can be trained as analysts to forecast events, team decision-making yields more accurate results than the work of individual forecasters, an outcome AMU professor Valerie Davis can affirm based upon her 30 years of intelligence experience. Learn more about how teamwork contributes to the intelligence cycle.

By William Tucker
Chief Correspondent for In Homeland Security

In essence, the public nor the government overreacted to Wednesday’s cyber anomalies when there was, and still is, talk of an attack. As with man-made or natural disasters it’s not uncommon to see the same agencies playing the role of first responder. Regardless of the cause of the incident, many of the same issues will be present, but the biggest difference between the two will be the collection of evidence, how that evidence is used, and what it’s used for.