Washington DC-Baltimore Area
11K followers 500+ connections

Join to view profile

Activity

Join now to see all activity

Publications

  • Addressing Cyber Instability

    Cyber Conflict Studies Association

    Compilation of CCSA research on cyber conflict.

    See publication
  • All Done Except the Coding: Implementing the International Strategy for Cyberspace

    Georgetown Journal

    In May of this year, the Obama Administration released its International Strategy for Cyberspace, which aims to enhance prosperity, security, and openness in the cyber domain. The authors argue that the strategy is necessary as the Internet continues to gain importance for both the public and private sectors, but that much needs to be done in order for it to be effective. Highlighting key decisions and actions that must still be made, the authors offer recommendations for implementing the…

    In May of this year, the Obama Administration released its International Strategy for Cyberspace, which aims to enhance prosperity, security, and openness in the cyber domain. The authors argue that the strategy is necessary as the Internet continues to gain importance for both the public and private sectors, but that much needs to be done in order for it to be effective. Highlighting key decisions and actions that must still be made, the authors offer recommendations for implementing the Administration’s plan successfully.

    Other authors
    See publication
  • Threats in the Age of Obama

    Nimble Books

    If you are on a mission to change the way government works, particularly in the national security arena, this is one a place where some independent and intellectually diverse thinking is to be found. In these essays, we offer our view of some of the more pressing threats the Obama administration will have to deal with in these early days of the 21st century.
    The essays in this volume are contributed by Daniel H. Abbott, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek…

    If you are on a mission to change the way government works, particularly in the national security arena, this is one a place where some independent and intellectually diverse thinking is to be found. In these essays, we offer our view of some of the more pressing threats the Obama administration will have to deal with in these early days of the 21st century.
    The essays in this volume are contributed by Daniel H. Abbott, Christopher Albon, Matt Armstrong, Matthew Burton, Molly Cernicek, Christopher Corpora, Shane Deichman, Adam Elkus, Matt Devost, Bob Gourley, Art Hutchinson, Tom Karako, Carolyn Leddy, Samuel Liles, Adrian Martin, Gunnar Peterson, Cheryl Rofer, Mark Safranski, Steve Schippert, Tim Stevens, and Shlok Vaidya.

    Other authors
    See publication
  • Hacking a Terror Network

    Syngress

    I was the technical editor of this book.

    Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in…

    I was the technical editor of this book.

    Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot.

    Other authors
    See publication
  • Cyber Adversary Characterization - Auditing the Hacker Mind

    Syngress

    Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

    Other authors
    See publication
  • Current and Emerging Threats to Information Technology Systems and Critical Infrastructures

    Global Business Briefing

    Essay written for the Global Business Briefing journal detailed a lot of the basis for threat assessments I was conducting for U.S. government and corporate clients

    See publication
  • Organizing for Information Warfare: The Truth is Out There!

    Terrorism Research Center

    Follow-up to the Toaster paper looked at unique organizational challenges associated with addressing the IW threat.

    Other authors
    See publication
  • Information Warfare

    Thunder's Mouth Press

    Hackers who break into companies' computers, steal or scramble data and plant "viruses" are only the most publicized threat to electronic security, according to this shocking and eye-opening report. It shows that the computer systems and information highways of U.S. businesses, government and the military are surprisingly vulnerable to theft, data manipulation and sabotage by "information warriors" such as corporate employees, business competitors, organized crime, drug cartels, terrorists, law…

    Hackers who break into companies' computers, steal or scramble data and plant "viruses" are only the most publicized threat to electronic security, according to this shocking and eye-opening report. It shows that the computer systems and information highways of U.S. businesses, government and the military are surprisingly vulnerable to theft, data manipulation and sabotage by "information warriors" such as corporate employees, business competitors, organized crime, drug cartels, terrorists, law enforcement officials, insurance companies and others. Schwartau, an information security specialist, tells of electromagnetic eavesdroppers who use a modified TV set to pick up computer screens' emissions; HERF (high-energy radio frequency) guns that can zap an entire computer network; and microchip manufacturers who insert cloned or counterfeit chips so that complex equipment will eventually crash. He outlines a national information policy (which he was asked to present to the Clinton administration), a blueprint to safeguard electronic privacy. Schwartau closes with a practical chapter for individuals or companies seeking to ward off snoops and electronic troublemakers.

    See publication
  • Information Terrorism: Can You Trust Your Toaster?

    Terrorism & Political Violence

    This paper on cyberterrorism received the prestigious Sun Tzu award from the National Defense University and has been reprinted in numerous books and academic journals including the peer reviewed Terrorism and Political Violence journal.

    Other authors
    See publication
  • National Security in the Information Age

    University of Vermont

    1995 thesis on information warfare and national security has been published internationally and referenced in numerous international government reports.

    See publication
Join now to see all publications

Patents

  • System and method for detecting potential threats by monitoring user and system behavior associated with computer and network activity.

    Issued US 13/829,613

    A system and method is provided to monitor user and system behavior associated with computer and network activity to determine deviations from normal behavior that represent a potential cyber threat or cyber malicious activity. The system and method uses a multi-factor behavioral and activity analysis approach to determine when a trusted insider might be exhibiting threatening behavior or when a user's computer or network credentials have been compromised and are in use by a third-party. As a…

    A system and method is provided to monitor user and system behavior associated with computer and network activity to determine deviations from normal behavior that represent a potential cyber threat or cyber malicious activity. The system and method uses a multi-factor behavioral and activity analysis approach to determine when a trusted insider might be exhibiting threatening behavior or when a user's computer or network credentials have been compromised and are in use by a third-party. As a result, changes in insider behavior that could be indicative of malicious intent can be detected, or an external entity masquerading as a legitimate user can be detected.

    See patent

Projects

  • Chairman of the Joint Chiefs 2020 Vision Red Team

  • Central Intelligence Agency Counter-Terrorist Center Invitational Roundtable on "Information Systems Terrorism"

  • DDR/E Joint Warfighting Science and Technology Plan, Information Warfare Plan

  • NIST Invitational Working Group on Computer Vulnerability Data Sharing

  • Department of Defense Office of Net Assessment, Information Warfare Analysis Group

    -

  • Mirror Image Training to Combat Terrorism

    -

    TRC developed the renowned Mirror Image training program in 2001 to allow military, intelligence, security and first responder personnel to better understand the international terrorist threat. Participants were subjected to an intense immersion program where they were trained to think and act like the adversary and adopt their tactics, techniques, and procedures. TRC Mirror Image training became a U.S. Army Foundry course, was featured in major news media, and became the most popular training…

    TRC developed the renowned Mirror Image training program in 2001 to allow military, intelligence, security and first responder personnel to better understand the international terrorist threat. Participants were subjected to an intense immersion program where they were trained to think and act like the adversary and adopt their tactics, techniques, and procedures. TRC Mirror Image training became a U.S. Army Foundry course, was featured in major news media, and became the most popular training course the TRC ever developed.

    See project
  • Project Pediatric Preparedness

    -

    This project explained these unique needs and gaps, and provided a foundation for homeland security planning for pediatric victims of terrorism. The final report described the minimum capabilities essential for emergency response to pediatric victims. The report laid out fifteen Functional Areas for pediatric response – general areas describing functions, tasks, and missions of emergency response.

  • Responder Knowledge Base

    -

    As President of TRC, conceived, prototyped, designed, built and operated the RKB over a period of six years. The RKB provided emergency responders, purchasers, and planners with a trusted, integrated, online source of information on products, standards, certifications, grants, and other equipment-related information.

  • Terrorism Early Warning Group (TEWG) Project

    -

    Having worked with the Los Angeles Terrorism Early Warning Group since 1997, the TRC and L.A.S.D submitted a grant application to the Memorial Institute for the Prevention of Terrorism to expand the TEW to six high threat cities in the U.S. After the September 11 attacks and the formation of the Department of Homeland Security, the TEW program was migrated to DHS and expanded to cover 56 high threat urban areas. The TRC worked with these 56 cities to develop early warning and intelligence…

    Having worked with the Los Angeles Terrorism Early Warning Group since 1997, the TRC and L.A.S.D submitted a grant application to the Memorial Institute for the Prevention of Terrorism to expand the TEW to six high threat cities in the U.S. After the September 11 attacks and the formation of the Department of Homeland Security, the TEW program was migrated to DHS and expanded to cover 56 high threat urban areas. The TRC worked with these 56 cities to develop early warning and intelligence centers that became the precursor the national Fusion Center network.

Honors & Awards

  • Sun Tzu Art of War Research Award

    National Defense University

Organizations

  • Mach 37

    Mentor

    - Present

    MACH37™ is America’s premier market-centric cybersecurity accelerator. The Accelerator is designed to facilitate the creation of the next generation of cybersecurity product companies. MACH37™'s unique program design places heavy emphasis on the validation of product ideas and the development of relationships that produce an initial customer base and investment capital.

  • Black Hat

    Review Board

    - Present
  • Cyber Conflict Studies Association

    Founding Board Member

    - Present

    CCSA is a 501(c)3 non-profit organization dedicated to promoting and leading a diversified research agenda in the field of cyber conflict. CCSA's vision is to be the premier thought leader in the field by fostering dialogue, leading research, and developing academic programs focused on the implications of cyber conflict. To achieve this, CCSA promotes and leads international intellectual development efforts to advance the field of cyber conflict research. These activities include workshops…

    CCSA is a 501(c)3 non-profit organization dedicated to promoting and leading a diversified research agenda in the field of cyber conflict. CCSA's vision is to be the premier thought leader in the field by fostering dialogue, leading research, and developing academic programs focused on the implications of cyber conflict. To achieve this, CCSA promotes and leads international intellectual development efforts to advance the field of cyber conflict research. These activities include workshops that bring together professionals from industry, academia and government to discuss strategic issues surrounding cyber conflict and the publication of insightful research articles and position papers in its Journal of Cyber Conflict Studies. CCSA also plays an important role in our national cyber-readiness strategy, serving as a resource for national security decision-makers and helping to frame and promote national cyber conflict policy.

  • Airline Pilots Association

    Security Advisory Board

    -
  • Terrorism Early Warning Group

    Member | Principal of TEW Expansion Project

    -

    The Los Angeles Terrorism Early Warning Group (TEW) held its first formal meeting in October 1996— a full five years before radical jihadist terrorism lashed out against the United States. In light of the interagency intelligence failures that led to 9/11, the TEW’s founding seems prescient. At that time the problem of transnational “Fourth Generation” insurgents and criminals waging “netwar” was only the concern of a few maverick security analysts. Even the military was largely pre-occupied…

    The Los Angeles Terrorism Early Warning Group (TEW) held its first formal meeting in October 1996— a full five years before radical jihadist terrorism lashed out against the United States. In light of the interagency intelligence failures that led to 9/11, the TEW’s founding seems prescient. At that time the problem of transnational “Fourth Generation” insurgents and criminals waging “netwar” was only the concern of a few maverick security analysts. Even the military was largely pre-occupied with building a “NetworkCentric” force to deploy against competitor states such as China and Russia. The rise of dangerous nonstate forces went largely unnoticed—until the world woke up one September morning to two burning towers. Fortunately, the Los Angeles TEW were lucky enough to capitalize on the talents of an international community of military and law enforcement personnel, intelligence and policy analysts, and leaders from the business and medical worlds interested in networking to stop terrorism. This eclectic group formed a group brain, sort of a “Wikipedia” of counter-terrorism.

  • Defense Science Board

    Critical Homeland Infrastructure Protection Task Force

    -

    The Task Force was established to assess the best practices for protecting US homeland installations and recommend various approaches to enhancing security and protection of these facilities.

  • Coalition Vulnerability Assessment Team (CVAT)

    Team Co-founder and Lead

    -

    Created and ran the first Coalition Vulnerability Assessment Team that engaged in red team operations against command and control systems during classified military exercises. Included targeting of systems in the U.S., U.K., Australia, New Zealand, Canada, and select NATO countries. This team was the first to target systems on board an aircraft carrier and nuclear submarine while they were at sea.

  • President’s National Security Telecommunications Advisory Committee, Network Security Group, Intrusion Detection Subgroup

    -

Recommendations received

More activity by Matthew

View Matthew’s full profile

  • See who you know in common
  • Get introduced
  • Contact Matthew directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses