The modern era is one of connectivity. Connections in cyberspace allow us to remotely and collaboratively conduct efficient business, control physical infrastructure, and access vast amounts of information.
The unfortunate side-effect of this connectivity is that it also allows malicious actors to disrupt, disable, and threaten the networked products and services upon which we rely. Cyberspace allows for the movement of traditional crimes into a virtual world, where they are more difficult to identify, investigate, and stop. Of particular concern is the cyber threat to critical infrastructure. As information systems become increasingly connected to physical infrastructure operations, there exists an amplified potential for large-scale, high-consequence attacks that could cripple the services upon which the economy and daily lives of Americans depend.
CTM programs in cyber threat awareness and consequence management focus on understanding the hazards posed by cyber connectivity, as well as the impacts of interdependency, the value of information, and the processes and partnerships by which identified threats can be mitigated. These programs are conducted in partnership with cyber advocacy organizations and subject matter experts from law enforcement and academia to ensure the most timely and relevant threat scenarios are examined.
February 2013 in San Diego, California
Participants in a breakout group of the Cyber Attack Detection and Response Tabletop Exercise discuss the capabilities of a small business to respond to and recover from the impacts of a simulated cyber attack during the 2013 Cyber Security Threat Awareness, Response, and Recovery Program.
Photo Credit: Joseph Graf, JP Graf Photography
May 2016 off the coast of San Diego, California
Members of the U.S. Coast Guard’s Maritime Safety and Security Team-San Diego conduct a search of the R/V Sikuliaq in response to a simulated terrorist threat during the Coastal Trident 2016 Regional Port and Maritime Security Program.
Photo Credit: John Cudal, John Cudal Photography
June 2013 in Port Hueneme, California
Personnel from the FBI’s Evidence Response Team catalog evidence obtained during the investigation of a simulated terrorist threat aboard a vessel in the Port of Hueneme during the Coastal Trident 2013 Regional Port and Maritime Security Program.
Photo Credit: Brendan Applegate, Center for Asymmetric Warfare
July 2010 in Los Angeles, California
Exercise control staff at the Los Angeles County Emergency Operations Center monitor the progress of operations conducted in response to the simulated detonation of an improvised nuclear device via remote networked sensors during Operation Golden Phoenix 2010.
Photo Credit: Kurt Tauchert, Collective Media Productions
Aerial Missions Unit
Vulnerability Assessment
Port and Maritime Security
Technology Experimentation and Implementation
If you would like to contact us regarding research opportunities, current and upcoming programs, or general information, we welcome your inquiries.