| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Stop wasting time looking for files and revisions. Connect your Gmail, DriveDropbox, and Slack accounts and in less than 2 minutes, Dokkio will automatically organize all your file attachments. Learn more and claim your free account.

View
 

FBI M-O-M-Matrix

Page history last edited by Bob-RJ Burkhart 9 years, 5 months ago

Return to: Kanza Emotive Energy Axis ... KELP Empowerment ... MetaEthics ... MindShifting

... Modern Social Change Theories ... NetImpact ... Omission Bias ... Peace Now

 

Combating Terrorism Center

 
CTC Sentinel. Volume 3-Issue 3 (March 2010) ...
LTC Reid Sawyer, CTC Director Christopher Heffelfinger, CTC-FBI Fellow ...

www.ctc.usma.edu/sentinel/ - Cached - Similar#95 in Terrorism

 

Feb 26, 2010 ... Ex-FBI agent Nada Prouty fights to restore reputation: Web of lies wrecked ...
and Terrorism-Related Statistics Chart 9/11/2001-3/18/2010, ...

counterterrorismblog.org/2010/02/west_point_ctc_sentinel_a_beac.php

 

Nada Prouty

Age: 40

Residence: Suburban Washington, D.C.

Background: Born in Lebanon, came to U.S. in 1989, got accounting degree from Detroit College of Business in 1993,

and master's degree from Bloomsburg University in 1997. Joined FBI in 1999 and CIA in 2003.

 


http://i.creativecommons.org/l/by-nc-sa/2.5/ca/88x31.png This Wiki is licensed CC-BY-NC-SA - Creative Commons

Attribution-Noncommercial-Share Alike 3.0 License. Authors, learn more about your rights.


 

fileBiographies.pdf 1.3 MB

FBI SWAT team. Previous assignments include Asian Organized Crime, Oklahoma City Bomb task force and Applicants.

Prior to working with the FBI, Special Agent Buechner was employed as a Network System Admin 

  • pageACCTTS-LLC
    Facilitated Hawaii FBI Infragard "Crisis & Consequences" exercise (Aug)

    Toured Hawaii County Emergency Operations Center (EOC) near Hilo Bay ...

    Prepared HICSS-34 mini-tutorial on "CyberCrime Fighting" perspectives…

  • pageSocialCapital
    11/30/2009 FBI Special Agent Robert Herndon / Former U.S. Senator Jim Talent on Bioterrorism

    As an FBI special agent Robert Herndon handled the nation's biggest agriculture price-fixing case, and the Robert Courtney…

  • commentChallenging Assumptions
    InfraGard and the FBI have developed a relationship of (swift) trust and credibility

    in the exchange of information concerning various terrorism, intelligence,

    criminal, and security matters. @ http://www.iwar.org.uk/

 

pageConspiracyTheory TrustBuster

ASIS, DIS, FBI ANSER Program's Minnesota Information Security Awareness Group (MISAC).

Rx: Adopt General Mills Corporate Social Responsibility (CSR) Global Sustainable Development Program Balanced Score Card …

  • pagedecision traps
    Minnesota FBI InfraGard Alliance Chapter’s “Red Team” in collaboration with

    Minnesota’s Federal Executive Board: http://www.doi.gov/febtc/ 1. Prevention: Must use TDML …

  • pageFifth Freedom
    Minnesota FBI InfraGard Chapter. Its meeting at Hamline University was rescheduled for the following month.
    My daughter, Malia, was traveling via Hiroshima, Japan, to perform at a global festival in Seoul, Korea.…

 

 

pageHyperPort-ESC

Minnesota FEB/FBI InfraGard Alliance Chapter(s) since implemented on an inter-regional scale!

Today's DHS-DoD Civil Defense/Federal Emergency Management Agency (FEMA) doesn't consistently exercise …
  • pagemindset
    9/11/2001, both FBI-NIPC & "DHS Sharks" co-opted our courseware.

    So, I began adapting RAND's "social network analysis" protocols to enable Memetics R&D prototypes

    with our Minnesota Futurists Chapter …
  • pageSNA*kes
    Facilitated Hawaii FBI Infragard "Crisis & Consequences" exercise (Aug) futurethought.pbworks.com/ACCTTS-LLC http://minnesotafuturist.pbworks.com http://gis.marc2.org/metrogreen/
  • pageStoryTech
    Protection via FBI Infragard Delphi method — developed by RAND for USAF Futures studies — Thought leadership
    mentoring Leadership development Oceanography — forecasting complex systems behavior Quality function …
  • pageVirtual Team Tactics
    today's FBI-sponsored InfraGard … MentorshipART adopting Virtual Team Tactics

    that reward "Swift Trust" Knowledge Management / Social Engineering (KM/SE) competence.


     

Netspionage_M-O-M-Matrix_4306.doc

 

Relationship

 

Profile

Motive

Opportunity

(Means)

Methods

Frequency
[H-M-L]

Impacts
[H-M-L]

Effective

Safeguards

Proven
Practices

Mandated
Controls

 

 

 

 

 

 

 

 

 

 

Insiders:

(In-laws?)

Clueless
User

None

Access &
Authorization

Error &
Omissions

High

 

Low-Med

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Contractor

Varies

 

Weak
Controls

Exploits  Lax
Controls

Unknown

Med-High

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Disgruntled
Stakeholder

Get Even

Insider
Insights

Exploits  Lax
Controls

Low-Med

High

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Gamers
(MUDD)

Have Fun

After Hours
Diversions

Compromises
Controls

Low

Med-High

 

 

 

 

 

 

 

 

 

 

 

 

 

Outsiders:

(Outlaws?)

Script
Kiddie

Intellectual
Curiosity

Spare Time
Lax Parents

Freeware

High

Low-Med

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Hacktivist

Political
Causes

See
Below

Various

Unknown

Med-High

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Coder / Pro
(Core Wars)

Peer
Recognition

Lax Software
Quality

Discovers
Loopholes

Low

High

(Day Zero)

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Comp Intel  & Economic

Espionage

 

Economic
Gain

 

 

 

Medium

 

High

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

State-Sponsored
Netspionage

Economic
& Political
Gains

 

 

Unknown


(
See Survey)

 

High

 

 

 

 

 

 

 

 

 

 

 

 

 

© 2001-2004  by ACCTTS,  LLC.  All Rights Reserved Worldwide.

 

 

Meta -> Security Incident Response Program Development 

 

[ACCTTS-SIRT Selection Support Benchmark] 

  Whitepapers:

 http://www.metasecuritygroup.com/& Launch Glossary of Terms Search   

 

Operational

Risk

Factors:

Type Digital
Disruption

Outage
Impacts?
[H-M-L]

 

Outage
Scope?

Time- Critical
Window?

 

Outage
Duration?

Protection

Policy

Pre-Reqs

Defined

SIRT

Roles

Key
Resp. &
Resources

Desired
Results

Metrics?

 

 

 

 

 

 

 

 

 

 

 

 

Anti-Social
Engineering

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Deletion

(Accidental)

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

 

Denial of Service

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

Destruction
(Intentional)

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

Errors &
Omissions

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Unauthorized Access

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

Unauthorized Disclosure

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

Unauthorized
Duplication

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

Unauthorized
Modification

 

 

 

 

 

 

 

 

 

  

 

 

 

 

 

 

 

 

 

Network Abuse
or Misuse

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

© 2001-2004 by ACCTTS,  LLC.  All Rights Reserved Worldwide.

Source-URL: http://www.acctts.com/WhatsAhead/MOMMatrix/Netspionage_M-O-M-Matrix_4306.htm  

 

 

Comments (1)

Bob-RJ Burkhart said

at 3:21 am on Apr 2, 2010

The site is intended to provide fresh information and various perspectives (sometimes opposing), as presented by the Contributing Experts and in the news articles, columns, and website links posted on the blog. Contributing Experts are responsible only for the content of their posts and links. The editor is responsible for sidebar content and design.
Source-URL: http://counterterrorismblog.org/about/

You don't have permission to comment on this page.