Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by the National Initiative for Cybersecurity Education (NICE).
NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.
Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”
DHS solicited for 15 toolsets and 11 services for the newly established Continuous Diagnostic and Mitigation (CDM) program for a continuous monitoring system that utilizes “hardware asset management, software asset management, vulnerability management, configuration management, and anti-virus.”
In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”
Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.
Moving the nation’s focus toward a “digitally literate workforce” that depends on technology provided by the US government will become automatons that “use technology securely in order to prepare them for the digital world in which we live.”
General Keith Alexander, director of the NSA, adds to the propaganda surrounding Leon Panetta’s “cyber Pearl harbor” that we may be facing at any moment without the protection of the federal government. President Obama would prefer that the private sector and governmental agencies collaborate to develop cybersecurity standards that will manage the exchange of digital information “about looming cyberthreats or malicious software that can damage computer networks.”
Eric Rosenbach, deputy assistant secretary of Defense for Cyber Policy in the Department of Defense (DoD), believes that using the NSA to secure American digital infrastructure is “almost certainly not the right approach for the United States of America to have a foreign intelligence focus on domestic networks, doing something that throughout history has been a domestic function.”
Rosenbach would like to see DHS become the leader of domestic cybersecurity while the Federal Bureau of Investigations (FBI) is utilized as the US law enforcement agency.
The DHS Cyber Security Research and Development Center collaborates with private sector corporations to protect US cyber infrastructure “through partnerships between government and private industry, the venture capital community, and the research community.” Advancing cyber security, DHS is gaining funding from international partners for research and development.
LOGIC, a consortium of major oil and gas producers (such as BP, Chevron, Dutch Shell, and Total) is working the DHS Science and Technology and the Automation Federation (LOGIC’s host organization) to securitize energy infrastructure.
The Automation Federation is a global umbrella organization which infiltrates associations and societies that facilitate manufacturing and automation activities to pursue their agendas. Their focus revolves around:
• Food, pharmaceuticals, chemical and petroleum and paper
• Automotive, aerospace and rail
• Military defense
• Security, environmental control, energy management
• Robotics, electro-optics, cybersecurity
Automation “professionals” extend to nearly every aspect of the technological industry. They are supported by the United States Senate Committee on Appropriations, and backed up by HR 2847 which emphasizes “the importance of Automation to industry.”
Being distracted by Obama’s threats concerning cybersecurity, executive orders and the Congress voting down the Cybersecurity Act of 2012 has cost the American public dearly. Behind the scenes, the DHS has been posturing themselves to become the most intrusive Big Brother control agency connected to the federal government. Obama, in a leaked version of the yet manifested executive order regarding cybersecurity, Napolitano would be given sole power of oversight on the Web as well as top-secret intelligence reports only known to her to bases identification of cyberthreats and individual targets.
At this point, Napolitano will decide who is a cyberthreat – and that could mean anyone living in America or abroad is at risk.
Susanne Posel is the Chief Editor of Occupy Corporatism. Our alternative news site is dedicated to reporting the news as it actually happens; not as it is spun by the corporately funded mainstream media. You can find us on our Facebook page.
BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW
This article may be re-posted in full with attribution.
BE THE CHANGE! PLEASE SHARE THIS USING THE TOOLS BELOW
If you enjoy our work, please donate to keep our website going.