5. Works Cited
About the Coast Guard Auxiliary and District 11 Southern Region. (n.d.). Retrieved 10 5, 2018, from US Coast Guard Auxiliary District 11 Southern Region: http://www.d11s.org/modules/narrative.mod.php?story=ABOUT
Alyson, J. (2018, 6 29). What Are the Army's Minimum Physical Requirements to Join? Retrieved from Chron: https://work.chron.com/armys-minimum-physical-requirements-join-13518.html
Bate, L. K. (2017, 5 17). The Cyber Workforce Gap: A National Security Liability? . Retrieved from War on the Rocks: https://warontherocks.com/2017/05/the-cyber-workforce-gap-a-national-security-liability/
Beckhusen, J. (2016, 8 16). Occupations in Information Technology. Retrieved from United States Census Bureau: https://www.census.gov/library/publications/2016/acs/acs-35.html
Braw, E. (2018, 3 15). There Are More and More Threats that Militaries Can’t Stop. People’s Forces Can Help. Retrieved from Defense One: https://www.defenseone.com/ideas/2018/03/norway-peoples-force-preps-threats-military-cant-stop/146705/?oref=d-river
Christy, G. (2016, 12 12). ‘Corsair Fleet’ – The Brave American Civilian Crews Who Took On WW2 Submarines To Protect The Coast. Retrieved from War History Online: https://www.warhistoryonline.com/world-war-ii/when-a-ragtag-group-of-foolhardy-men-took-on-u-boats-with-sailing_ship-x.html
Congresswoman Claudia Tenney Leads the Way in Fighting for the Civil Air Patrol. (2017, 4 6). Retrieved from US Representative Claudia Tenney: https://tenney.house.gov/news/documentsingle.aspx?DocumentID=16
Cybersecurity experts warn of growing workforce shortage. (2016, 6 28). Retrieved from US Chamber of Commerce: https://www.uschamber.com/article/cybersecurity-experts-warn-growing-workforce-shortage
Cybersecurity Supply/Demand Heat Map. (n.d.). Retrieved 10 5, 2018, from CyberSeek: http://cyberseek.org/heatmap.html
Diamant, A. (2018, 4 11). Ransomware attack cost city $2.7 million, records show. Retrieved from WSB-TV 2 Altlanta: https://www.wsbtv.com/news/local/atlanta/ransomware-attack-cost-city-27-million-records-show/730813530
Golson, J. (2015, 1 15). Of Course We Shoud Give Vounteer Firefighters a Tax Break. Retrieved from Wired: https://www.wired.com/2015/01/course-give-volunteer-firefighters-tax-break/
Greenberg, P. (2018, 7 27). Statewide Chief Information Security Officers. Retrieved from National Conference of State Legislatures: http://www.ncsl.org/research/telecommunications-and-information-technology/state-statutes-creating-chief-information-security-officer-ciso-positions-in-state-government.aspx
H.B. 4508 Cyber Civilian Corps Program. (2017, 9 7). Retrieved from Michigan Legisature: https://www.legislature.mi.gov/documents/2017-2018/billanalysis/Senate/pdf/2017-SFA-4508-L.pdf
Hatmaker, T. (2018, 6 6). The damage from Atlanta’s huge cyberattack is even worse than the city first thought. Retrieved from TechCrunch: https://techcrunch.com/2018/06/06/atlanta-cyberattack-atlanta-information-management/
Haynes, H. J., & Stein, G. P. (2017, 4). U.S. fire department profile. Retrieved from National Fire Protection Association: https://www.nfpa.org/News-and-Research/Fire-statistics-and-reports/Fire-statistics/The-fire-service/Administration/US-fire-department-profile
Hutcherson, K. (2018, 3 28). Six days after a ransomware cyberattack, Atlanta officials are filling out forms by hand. Retrieved from CNN: https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html
Issues for Firefighters. (2018, 8 14). Retrieved from IRS: https://www.irs.gov/government-entities/federal-state-local-governments/issues-for-firefighters
Join the Coast Guard Auxiliary. (n.d.). Retrieved 10 5, 2018, from Flotilla 5-3 Cincinatti, Ohio: http://a0820503.uscgaux.info/join.htm
Konkel, F. (2017, 4 18). 18F for Cybersecurity? Tech Think Tank Wants Congress to Consider It. Retrieved from Nextgov: https://www.nextgov.com/cybersecurity/2017/04/18f-cybersecurity-tech-think-tank-wants-congress-consider-it/137104/
Krebs, C., & Manfra, J. (2017, 10 3). Stateent for the Record Regarding Cybersecurity. Retrieved from US House of Representatives: https://docs.house.gov/meetings/HM/HM08/20171003/106448/HHRG-115-HM08-Wstate-KrebsC-20171003.pdf
Lohrmann, D. (2018, 3 10). Cyber Range: Who, What, When, Where, How and Why? Retrieved from Government Technology: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/cyber-range-who-what-when-where-how-and-why.html
Michaels, J. (2018, 1 10). Physically fit recruits for Army are hard to find. Especially in these states. Retrieved from USA Today: https://www.usatoday.com/story/news/world/2018/01/10/physically-fit-recruits-army-hard-find-especially-these-states/1016030001/
Michigan Cyber Civilian Corps. (n.d.). Retrieved 10 5, 2018, from Michigan.gov: https://www.michigan.gov/som/0,4669,7-192-78403_78404_78419—,00.html
Nash, K. S., Castellanos, S., & Janofsky, A. (2018, 6 27). One Year After NotPetya Cyberattack, Firms Wrestle With Recovery Costs. Retrieved from Wall Street Journal: https://www.wsj.com/articles/one-year-after-notpetya-companies-still-wrestle-with-financial-impacts-1530095906
Newman, L. H. (2018, 3 30). The Ransomware That Hobbled Atlanta Will Strike Again. Retrieved from Wired: https://www.wired.com/story/atlanta-ransomware-samsam-will-strike-again/
O'Neill, P. H. (2018, 2 1). Pentagon's network defense headquarters is fully operational. Retrieved from CyberScoop: https://www.cyberscoop.com/dod-network-cyber-command-fully-operational/
Public Law 107–296 An Act to Establish the Department of Homeland Security and for Other Purposes. (2002, 11 25). Retrieved from Government Publishing Office: https://www.gpo.gov/fdsys/pkg/PLAW-107publ296/pdf/PLAW-107publ296.pdf
PUBLIC LAW 113–66 – National Defense Authorization Act for Fiscal Year 2014. (2013, 12 26). Retrieved from US Congress: https://www.congress.gov/113/plaws/publ66/PLAW-113publ66.pdf
Ruiz, M. M. (2018, 1 9). Is Estonia’s Approach to Cyber Defense Feasible in the United States? Retrieved from War on the Rocks: https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/
Singer, P. W. (2018, 1 30). The 2018 State of the Digital Union: The Seven Deady Sins of Cybersecurity We Must Face. Retrieved from War On the Rocks: https://warontherocks.com/2018/01/2018-state-digital-union-seven-deadly-sins-cyber-security-must-face/
Smith, G. (2012, 11 23). The Nerd Reserves: Sandy Recovery Renews Call For Tech National Guard. Retrieved from Huffington Post: https://www.huffingtonpost.com/2012/11/23/tech-national-guard_n_2168374.html
Stateline. (2017, 8 4). Michigan's Volunteer-Based Cybersecurity Strategy Catches On. Retrieved from Governing: http://www.governing.com/topics/mgmt/sl-cybersecurity-volunteers.html
Subramanian, S., & Robinson, D. (2016). 2016 Deloitte-NASCIO Cybersecurity Study. NASCIO and Deloitte. Deloitte Unversity Press. Retrieved from https://www.nascio.org/Portals/0/Publications/Documents/2016/2016-Deloitte-NASCIO-Cybersecurity-Study.pdf
The Estonian Defence League Act. (2013, 2 28). Retrieved from Riigi Teataja: https://www.riigiteataja.ee/en/eli/525112013006/consolide
The Net. (n.d.). Retrieved 10 5, 2018, from IMDB: https://www.imdb.com/title/tt0113957/plotsummary
US CERT About Us. (n.d.). Retrieved from US Department of Homeland Security: https://www.us-cert.gov/about-us
US Government Accountability Office. (2018). Cybersecurity Workforce. Retrieved from https://www.gao.gov/assets/690/689880.pdf