{"id":1022,"date":"2013-03-27T02:20:55","date_gmt":"2013-03-27T02:20:55","guid":{"rendered":"http:\/\/shuyuanmaryho.com\/?p=1022"},"modified":"2013-03-27T13:39:06","modified_gmt":"2013-03-27T13:39:06","slug":"homeland-security-seeks-student-hackers-to-help-counter-cyberthreats","status":"publish","type":"post","link":"https:\/\/shuyuanmaryho.com\/?p=1022","title":{"rendered":"Homeland Security seeks student hackers to help counter cyberthreats"},"content":{"rendered":"<div class=\"fcbkbttn_buttons_block\" id=\"fcbkbttn_left\"><div class=\"fcbkbttn_button\">\n                            <a href=\"https:\/\/www.facebook.com\/\" target=\"_blank\">\n                                <img decoding=\"async\" src=\"https:\/\/shuyuanmaryho.com\/wp-content\/plugins\/facebook-button-plugin\/images\/standard-facebook-ico.png\" alt=\"Fb-Button\" \/>\n                            <\/a>\n                        <\/div><div class=\"fcbkbttn_like \"><fb:like href=\"https:\/\/shuyuanmaryho.com\/?p=1022\" action=\"like\" colorscheme=\"light\" layout=\"standard\"  width=\"450px\" size=\"small\"><\/fb:like><\/div><\/div><p>There are \u201cnew and rapidly growing threats\u201d of a cyberstrike to the US homeland \u2013 perils that will require hundreds of young, college-age hackers to counter an alarming number of daily incursions into the nation\u2019s electrical grid and financial networks, says Department of Homeland Security (DHS) head Janet Napolitano.<br \/>\nThis will be \u201chackers for good,\u201d and the DHS currently has a need for about 600 of them, Secretary Napolitano added in remarks Tuesday at a Monitor Breakfast.<\/p>\n<p>The need to develop a skilled cyber workforce has been a common \u2013 and formidable \u2013 challenge for a number of US government agencies, including DHS and the Pentagon, which is also struggling to build its own cyber workforce.<\/p>\n<p>That\u2019s because most skilled \u201ccyber warriors,\u201d as the US military calls them, often get recruited by private industry after their service commitments are up.<\/p>\n<p>\u201cThat\u2019s a big concern, to be honest,\u201d says Col. Kiley Weigle, commander of the Air Force\u2019s Cyber Training Unit. \u201cWe have not, in my opinion, fully cracked that nut yet.\u201d<\/p>\n<p>The Air Force set up an internship program for high school students, who were given security clearances to work in the service\u2019s Cyber Emergency Response Team unit.<\/p>\n<p>But sequestration, which for the Pentagon has come with requirements to cut the number of temporary employees on the payroll, has forced a cancellation of the high school training program for the Air Force.<\/p>\n<p>\u201cI can\u2019t do the internship program anymore,\u201d says Maj. Gen. Suzanne \u201cZan\u201d Vautrinot, commander of Air Force Network Operations at Lackland Air Force Base in Texas, who adds that the service is continuing to work to find ways to \u201cgive these kids experience so they can see our forensics.\u201d<\/p>\n<p>At DHS, young hackers \u2013 who have not yet entered the job market \u2013 potentially \u201chave a bunch of different skill sets\u201d to offer the country, Napolitano says.<\/p>\n<p>\u201cWe don\u2019t need PhDs in computer [science]\u201d for many of the jobs they will be called upon to do, she says.<\/p>\n<p>To that end, DHS is launching \u201ca whole host of internships and fellowships for young people to get,\u201d Napolitano adds, noting that the department recently had \u201cover 3,000 kids compete for 60 billets\u201d in one such program.<\/p>\n<p>More from the Christian Science Monitor @ http:\/\/www.csmonitor.com\/USA\/Politics\/monitor_breakfast\/2013\/0326\/Homeland-Security-seeks-student-hackers-to-help-counter-cyberthreats<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are \u201cnew and rapidly growing threats\u201d of a cyberstrike to the US homeland \u2013 perils that will require hundreds of young, college-age hackers to counter an alarming number of daily incursions into the nation\u2019s electrical grid and financial networks, &hellip; <a href=\"https:\/\/shuyuanmaryho.com\/?p=1022\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1022","post","type-post","status-publish","format-standard","hentry","category-the-latest-news-ideas-problems-strategies-and-tactics-in-securing-cyberspace-and-virtual-organizations-discussed-by-experts-in-industries-as-well-as-academia"],"_links":{"self":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1022"}],"version-history":[{"count":2,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1022\/revisions"}],"predecessor-version":[{"id":1028,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=\/wp\/v2\/posts\/1022\/revisions\/1028"}],"wp:attachment":[{"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shuyuanmaryho.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}