by Payton | Sep 24, 2018 | General
As society enters a technology-based age, cybersecurity continues to be a pressing issue. Cyberattacks continue to threaten our national security on a daily basis. One of the most highly publicized cybersecurity breaches occurred in the 2016 elections. While we focused on Russia’s growing military power, they attacked us online and subsequently influenced the election outcome. However, while cybersecurity remains a constant threat, the United States has an overall shortage of workers who specialize in this field. According to a CompTIA report, there are 301,873 job openings in cybersecurity-related fields since April 2017. To overcome this vulnerability, the United States lawmakers have introduced a bipartisan bill in the House of Representatives that focuses on building up our cybersecurity networks.
The Bill
United States lawmakers recently introduced a bipartisan bill to the House of Representatives to combat the shortage in the cybersecurity workforce in all sectors of companies. Congresswoman Jacky Rosen (Dem., NV-03) initially presented the bill under the name of the Cyber Ready Workforce Act (H.R.6791). If passed, this bill would establish a grant program in the Department of Labor and focuses on developing and advancing cybersecurity-based jobs. Furthermore, in the bill’s text, it explicitly states that the Secretary of Labor will be able to award grants to workforce intermediaries to help in the implementation and expansion of cybersecurity apprenticeship programs. The apprenticeship program also is permitted to assist in:
- Career counseling
- Mentorship
- Transportation assistance
- Housing
- Childcare costs
Nevada
The Cyber Ready Workforce Act is based on a cybersecurity apprenticeship program that the state of Nevada recently implemented on May 15, 2018. This program focuses on high demand industries that struggle with finding qualified employees. These industries include information technology, hospitality, and advanced manufacturing. These apprenticeship programs provide opportunities to train and empower future employees and assist in economic mobility.
Support
The bill has gained a lot of support since being presented. It was co-sponsored by Congresswoman Elise Stefanik (Rep., NY-21), Congressman Seth Moulton (Dem., MA-06), and Congressman Dan Donovan (Rep., NY-11). Furthermore, it has gained the support of workforce and trade organizations such as The Learning Center and CompTIA.
For more information about cybersecurity, visit our website https://dynagrace.com/.
Resources: https://www.zdnet.com/article/us-lawmakers-introduce-bill-to-fight-cybersecurity-workforce-shortage/, https://www.securityweek.com/new-bill-aims-address-cybersecurity-workforce-shortage, http://gov.nv.gov/uploadedFiles/govnvgov/Content/OWINN/Press%20Release_May_New%20Apprenticeship%20Occupations%20Approved(6).pdf, https://www.reviewjournal.com/videos/first-cybersecurity-apprenticeship-program-coming-to-nevada/
Picture Resources: Featured Image: https://pixabay.com/en/supreme-court-building-supreme-court-1209701/, https://pixabay.com/en/letter-document-handwriting-paper-1840354/, https://pixabay.com/en/europe-gdpr-data-privacy-3256079/
by Payton | Sep 17, 2018 | General
Autistic individuals have greatly contributed to our society and have earned their places in our history books. One noteworthy individual is Albert Einstein. He developed the theory of relativity and is now known as the father of theoretical physics. Another extraordinary individual with autism is Alan Turing, the man who cracked the Nazi Enigma code. His contributions ultimately helped the Allies win World War II. These individuals, much like other individuals with autism, excelled because they were detail-oriented and could think outside the box. This illustrates that, when society gives a voice to people who think differently, the possibilities are endless. Furthermore, modern technology advancement found a surprising new area for autistic individuals to excel in: cybersecurity.
Autism
Autism is common spectrum disorder that is usually characterized by impaired social skills, communication, and repetitive behaviors. However, these individuals often possess unique strengths as well. A common societal prejudice is that autistic individuals have lower intelligence, which is supported by lower IQ tests. However, this is not necessarily true. Scientists have found that a lot of genes that code for autism also code for high intelligence.
Furthermore, autistic brains often are larger and have more synapses, or cell-to-cell communications, than the average person’s brain. Combined, these studies indicate that autism is a disease of higher intelligence. However, the lower IQ tests indicate imbalanced intelligence. This paradox means that these individuals are very, very smart in certain areas, but average or below average in others.
Autism in Cybersecurity
Overall, there is a massive labor shortage in cybersecurity, which has had profound effects on the nation as a whole. By 2019, the damage caused by cyber-attacks by terrorists and other hostile individuals is expected to exceed $2 trillion. Furthermore, businesses recently began recruiting autistic individuals to fill their cybersecurity shortage. According to recent studies, ¾ of cognitively-able autistic individuals score high in aptitudes and interests that strongly correlate to cybersecurity careers. With this in mind, innovative firms such as Microsoft, SAP, Freddie Mac, Gates Foundation, and Milken Institute are already hiring autistic individuals to oversee their cybersecurity, and the results are astonishing. These employees are not only filling the positions that safeguard our nation, but they are also excelling at it. According to interviews with these firms, autistic individuals surpass the general population in protecting our nation from cybersecurity threats because they are very detail-oriented, analytical, methodical, and integrous.
The extent that autistic individuals are outshining others in cybersecurity holds a lot of promise for the future. It goes to show that neuro-diversity in the workplace is essential.
For more information about cybersecurity, visit our website https://dynagrace.com/.
Resources: https://www.sciencedaily.com/releases/2017/11/171102131330.htm, https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4927579/, https://www.wired.com/2016/11/autistic-people-can-solve-cybersecurity-crisis/, https://www.forbes.com/sites/kateoflahertyuk/2018/09/10/how-employing-autistic-people-can-help-stop-cyber-attacks/#4f0ac3834b50, https://www.independent.co.uk/news/science/autism-link-cyber-crime-personality-trait-scientist-research-university-bath-dark-web-a7663086.html
Picture Resources: Featured Image: https://www.flickr.com/photos/157975988@N08/36532609156/in/photolist-XEgaVE-eYzBUV-eYLXWf-da6VGj-bAm3et-95e378-bAmvNM-mHPASR-dFUQ8a-5RXuPc-6bWCG7-bnrANd-agUxRV-Mcfxg-MqZtkS-7CCGzR-aFgPqa-e2HUhi-ekEDFz-3hEBrq-bAmsVk-eYzz16-8GaGvG-djDKQW-a4EHtH-AuCRZ-bnqXQf-4EimyY-8oMhie-eYLWpf-ctfWyG-eYzA52-72hnNm-4oxRxM-fNsTWN-aDCAfc-5vu3pQ-5tK1Fv-nVPuux-bA9Uxw-ekL4ob-ekKZ7s-XBZpYS-Hhzav-4Eimvw-ejXwWR-5tPmSd-8oQtF7-rzV1uV-6hgTHp, https://pixabay.com/en/europe-gdpr-data-privacy-3256079/, https://pixabay.com/en/autism-brain-dyscalculia-health-3616338/
by Payton | Sep 10, 2018 | General

Office of the Director of National Intelligence via Wikimedia
Reality Winner, 26, is an Air Force veteran who worked as a contractor for the National Security Agency (NSA). While working at NSA, she encountered a classified report with proof that Russians interfered with the 2016 presidential elections by penetrating a voting software supplier in Florida. Furthermore, the document provided proof that the government knew about it and withheld the information from the public. Winner printed off the report and left work that day with it tucked in her pantyhose. As soon as she arrived home, she mailed the document to The Intercept, an online media agency, which released a report on the secret document. Afterward, The Intercept contacted NSA and provided a copy of the report that appeared to have been folded up. Furthermore, the United States Intelligence Agencies later confirmed Russian interference.
Winner’s Sentencing
As a result of her crimes, Winner was found guilty on one account of espionage. Initially, she would have had to serve ten years in prison and a $250,000 fine. However, she accepted a plea deal, and the federal judge sentenced her to serve 63 months in prison instead. Her sentencing stands as the most severe punishment for leaking confidential information to media sources. Furthermore, it is the first espionage trial since Donald Trump took the presidential office, and it serves as an example of the Trump Administration’s goal to diminish disloyalty through information leaks.
Winner’s Motive
While her motive is not completely clear, Winner expressed extreme distaste for President Donald Trump via her social media. For example, after Trump won the election, she posted “Well. People suck. #ElectionNight.” She even went as far as calling him an “orange fascist” in other posts.
When confronted with proof that the Russians compromised the 2016 election, many people believe that she tried to act as a whistleblower to expose the extent of the government’s knowledge that they withheld from the public.
However, after the exposure, she was promptly arrested and tried as a would-be-terrorist with vindictive motives. Furthermore, her Facebook chat conversations with her sister support this hypothesis. In one such chat, Winner stated,
“Look I only say I hate America like three times a day.”
The Aftermath of the Trial
Despite her distaste for President Donald Trump, he posted multiple tweets expressing his discontent with her sentencing. In one such tweet, he said,
“Ex-NSA contractor to spend 63 months in jail over ‘classified’ information. Gee, this is ‘small potatoes’ compared to what Hillary Clinton did! So unfair Jeff, Double Standard.”
Furthermore, others have expressed discontent with her sentencing because they viewed her actions as that of a concerned whistleblower rather than a terrorist. One such person is the editor-in-chief of The Intercept. In an interview, he referred to her as a “conscience-driven whistleblower.” Other people believe that her harsh sentencing was solely to send a message to other individuals to prevent disloyalty and information breaches.
For more information about cybersecurity, visit our website https://dynagrace.com/.
Resources: https://www.politico.com/story/2018/08/23/reality-winner-sentencing-russia-hacking-report-794330, https://www.cnn.com/2018/08/23/politics/reality-winner-nsa-leaker-sentenced/index.html, https://www.cbsnews.com/news/reality-winner-former-nsa-contractor-deeply-regrets-leaking-classified-documents/, https://www.nytimes.com/2018/06/26/us/reality-winner-nsa-leak-guilty-plea.html
Picture Resources: Featured Image: https://pixabay.com/en/classified-background-blog-business-2651347/, https://en.wikipedia.org/w/index.php?title=File:ODNI_Statement_on_Declassified_Intelligence_Community_Assessment_of_Russian_Activities_and_Intentions_in_Recent_U.S._Elections.pdf&page=7, https://www.flickr.com/photos/gageskidmore/8567813820/in/photolist-e47hxW-9hLwdw-9DHdpK-eULu15-QmEXh-9x78vr-9Ci12c-e47hqo-e41GhK-e41ELr-e47mDU-e47iLE-9Ci1xg-bBBKx7-e41Jw8-e47hZm-axn74W-czGa9m-ackdJf-9EKCYM-83635z-9EKBAB-6Vwm1r-6gFez8-dXmUcV-8GEQ4F-dtRGkf-8eBtBn-884SZB-9zBcAv-9CkvqS-kNFjPw-2uTddH-g25GLQ-dnMPJZ-5nrmkz-bC8uho-7WprrH-ecutQQ-xQMNR-c9CadJ-g1XPzf-5nrmkt-duASTf-iziX4o-87XohL-eMX37d-rpJw2x-MJQCVD-MK39tW,
by Payton | Sep 3, 2018 | General
Cyberstalking is utilizing online resources to stalk somebody. It can include threats, false accusations, defamation, libel, identity theft, manipulation, slander, vandalism, and solicitation for sex. With our growing dependence on technology, cyberstalking has grown to be a major problem. The Data and Society Research Institute and the Center for Innovative Public Health published a study in 2016 representing 3,002 people and found that 8% had been cyberstalked at some point in their life. Furthermore, these individuals reported feeling afraid and unsafe due to the cyber-attacks. Additionally, the Pew Research Center found that, out of 4,248 adults, 7% have been stalked online. They also found that women are more likely to be victimized.
As cyberstalking continues to grow to be a bigger problem, the public must be aware of what it is and what to do when someone is victimized.
How to Avoid Cyberstalking?
One of the easiest ways to avoid cyberstalking is to be mindful of what you upload on social networking and remove any inappropriate content that has already been posted. This limits the amount of information available on the web. Furthermore, protecting your information on your devices is crucial. Be sure that your programs are password protected to prevent others from seeing any content. Also, be aware of password safety. When making a password, ensure that they are at least eight characters long and include upper case letters, lower case letters, numbers, and symbols. Most importantly, do not share your passwords with anybody else. This denies access to sensitive information and prevents people from posting crude, embarrassing, or disturbing things online on your behalf.
Furthermore, perpetrators can glean a lot of information off of photos posted on social media sites via metadata. Metadata can reveal where the photo was taken, the device it was taken on, as well as other information. This data usually comes from mobile phones, which can be turned off using the geotagging feature in the phone’s setting.
Additionally, many cyberstalkers use phishing emails or Trojan horses to gain access to your computer’s files and data. These continue to be a big threat online, so it’s crucial that you avoid them. Do not download any links or content from an unknown email address or website. Also, avoiding suspicious websites and using a security program improves your safety exponentially.
Cyberstalking Laws
Over the past few years, the use of technology in malicious ways has necessitated the states to pass laws to protect its citizens from cyberstalking. These laws stipulate imprisonment for anyone who utilizes technology to cause another person harm or emotional distress. Florida passed laws that incorporated cyberstalking into its stalking statute. According to Florida, cyberstalking is charged as a first-degree misdemeanor. However, it can be upgraded to a third-degree felony when threats are involved. California is another state that incorporated cyberstalking into its talking statue. In the state of California, cyberstalking is punishable by up to one year of jail or by a fine of $1,000. If the instance is severe enough, the perpetrator may have to serve time in jail and pay the $1,000 fine.
In contrast to California and Florida that incorporated cyberstalking into their existing laws, Washington created a new statute that specifically targets cyberstalking. In Washington, cyberstalking is charged as a misdemeanor. However, if the cyberstalker has a record of threatening or harassing the victim, then it is classified as a felony.
What to Do if You are a Victim?
Victims of cyberstalking may not know they are being stalked. However, if you believe someone is cyberstalking you, get in touch with your neighborhood police, and they can assist you. It’s a crime to take explicit photos or videos of another individual and distribute them in a sense that is meant to cause emotional distress. Furthermore, the victim doesn’t have to show that the stalker had the intent to execute the threat. If you’re a casualty of cyberstalking, attempt to gather as much physical evidence as feasible and document each contact. Take screenshots and save text messages and chats. Do not alter them in any way, and it is extremely helpful to keep a printed version as well as an electronic version. Alongside evidence, it is useful to document the time and date as soon as the perpetrator begins cyberstalking you. In this documentation, be sure to include all written and verbal threats as well. Many police have departments that specialize in cybercrime.
Another way to stop cyberstalking is to contact the perpetrator’s Internet service provider. They can block the user from using services to harass you. They can also discontinue their Internet service and will put them on a record for harassment that is extensively monitored.
Cyberstalking is a rather under-reported crime, and it is a serious crime, and the psychological torment it is extremely real. If you feel like you are in danger, the best thing to do is speak up and report it to the police, family, and friends.
For more information about cybersecurity, visit our website https://dynagrace.com/.
References: https://cyberbullying.org/cyberstalking, https://us.norton.com/internetsecurity-how-to-how-to-protect-yourself-from-cyberstalkers.html, http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-crimes/cyber-stalking.html
Picture Resources: Featured Image: https://www.flickr.com/photos/149721024@N03/29509413868/, https://pixabay.com/en/europe-gdpr-data-privacy-3256079/, https://pixabay.com/en/desperate-sad-depressed-feet-hands-2293377/
by Payton | Aug 27, 2018 | General
The Internet is an amazing thing that allows us to search for new information and keep in contact with friends and family. However, the Internet also has a dark side. It allows for unwanted people to access private information and it provides direct means in which they can contact you. These are examples of cyberstalking. Cyberstalking, or cyber-harassment, is employing electronic communications tools to stalk a person on the web. This includes harassment, humiliating, exerting financial control, isolating, and instilling fear into the victim. Cyberstalking is a growing issue that is vastly underreported even though it can have disastrous effects on its victims.
Why is Cyberstalking a Growing Problem?
Nowadays, our world revolves around electronics and social media. Everywhere we go, we always have access to the Internet and social media through cell phones, tablets, and other smart devices. Furthermore, we post everything from our vacations, friends, family, addresses, business location, phone number, and email on social media. This makes it simple for a seasoned online user to locate enough of a victim’s individual information. It is also quite easy to glean info about the victim’s geographical area, the places you like to go to in your region and the people that you care about from posts and pictures. Due to this ease, the Internet is frequently the very first place a stalker goes to gain contact with victims.
One of the major reasons why perpetrators resort to online methods is because of the instant gratification. The Internet allows the perpetrator easy access to information, and it makes it exceptionally harder for them to be caught by law enforcement. Online methods also allow the perpetrator to have access to victims regardless of their geographical distance. This allows them to threaten anyone from anywhere in the world.
Types of Cyberstalking
Cyberbullying
Cyberbullying is a problem that continues to grow with our obsessive use of technology. It is any behavior that occurs online that instills fear and distress to the point that an individual fears for their safety. Through this, the victim may feel distressed and like their right to privacy has been violated. Some common examples include using someone’s private information to instill fear in the victim, harassing a victim with hundreds of messages a day to inform them that they are being watched, or using their social media to track their whereabouts.
Catfishing

Left: singer/ dancer “Megan Faccio”; Right: Angela Wesselman-Pierce, who created the fake profile from Raquelita96 via Wikimedia
Catfishing occurs when someone poses as another person online. Often, these fake accounts use fake names, photos, and social media links. Additionally, some perpetrators will copy a profile of another individual in order to verify their identity. Catfishers commonly use these accounts to pose as fake love interests or as means to contact other online users to send spam. In more malicious circumstances, they may use the accounts to cyberbully another person.
Statistics
- Most victims are 18-29 years old
- 60% of all cyberstalking victims are female
- Most victims are caucasian
- Most victims are single
- 56% of cyberstalkers are male
- Most cyberstalking instances begin on Facebook or email
- 70% of cyberstalking attack consist of a victim and cyberstalkers that live in different states
- 50% of perpetrators had past romantic relationships with the victim
- 15% of perpetrators are the victim’s online acquaintance
For more information about cybersecurity, visit our website https://dynagrace.com/.
References: https://cyberbullying.org/cyberstalking, https://us.norton.com/internetsecurity-how-to-how-to-protect-yourself-from-cyberstalkers.html, http://www.mass.gov/ago/public-safety/cyber-crime-and-internet-safety/cyber-crimes/cyber-stalking.html
Pictures: Featured Image: https://pixabay.com/en/anonymous-hacktivist-hacker-2755365/, https://pixabay.com/en/cyber-security-hacker-online-3410923/, https://www.flickr.com/photos/51234626@N02/4726453297/, https://www.mediawiki.org/wiki/File:Catfish_example.jpg