Welcome to New America, redesigned for what’s next.

A special message from New America’s CEO and President on our new look.

Read the Note

5. Works Cited

About the Coast Guard Auxiliary and District 11 Southern Region. (n.d.). Retrieved 10 5, 2018, from US Coast Guard Auxiliary District 11 Southern Region: http://www.d11s.org/modules/narrative.mod.php?story=ABOUT

Alyson, J. (2018, 6 29). What Are the Army's Minimum Physical Requirements to Join? Retrieved from Chron: https://work.chron.com/armys-minimum-physical-requirements-join-13518.html

Bate, L. K. (2017, 5 17). The Cyber Workforce Gap: A National Security Liability? . Retrieved from War on the Rocks: https://warontherocks.com/2017/05/the-cyber-workforce-gap-a-national-security-liability/

Beckhusen, J. (2016, 8 16). Occupations in Information Technology. Retrieved from United States Census Bureau: https://www.census.gov/library/publications/2016/acs/acs-35.html

Braw, E. (2018, 3 15). There Are More and More Threats that Militaries Can’t Stop. People’s Forces Can Help. Retrieved from Defense One: https://www.defenseone.com/ideas/2018/03/norway-peoples-force-preps-threats-military-cant-stop/146705/?oref=d-river

Christy, G. (2016, 12 12). ‘Corsair Fleet’ – The Brave American Civilian Crews Who Took On WW2 Submarines To Protect The Coast. Retrieved from War History Online: https://www.warhistoryonline.com/world-war-ii/when-a-ragtag-group-of-foolhardy-men-took-on-u-boats-with-sailing_ship-x.html

Congresswoman Claudia Tenney Leads the Way in Fighting for the Civil Air Patrol. (2017, 4 6). Retrieved from US Representative Claudia Tenney: https://tenney.house.gov/news/documentsingle.aspx?DocumentID=16

Cybersecurity experts warn of growing workforce shortage. (2016, 6 28). Retrieved from US Chamber of Commerce: https://www.uschamber.com/article/cybersecurity-experts-warn-growing-workforce-shortage

Cybersecurity Supply/Demand Heat Map. (n.d.). Retrieved 10 5, 2018, from CyberSeek: http://cyberseek.org/heatmap.html

Diamant, A. (2018, 4 11). Ransomware attack cost city $2.7 million, records show. Retrieved from WSB-TV 2 Altlanta: https://www.wsbtv.com/news/local/atlanta/ransomware-attack-cost-city-27-million-records-show/730813530

Golson, J. (2015, 1 15). Of Course We Shoud Give Vounteer Firefighters a Tax Break. Retrieved from Wired: https://www.wired.com/2015/01/course-give-volunteer-firefighters-tax-break/

Greenberg, P. (2018, 7 27). Statewide Chief Information Security Officers. Retrieved from National Conference of State Legislatures: http://www.ncsl.org/research/telecommunications-and-information-technology/state-statutes-creating-chief-information-security-officer-ciso-positions-in-state-government.aspx

H.B. 4508 Cyber Civilian Corps Program. (2017, 9 7). Retrieved from Michigan Legisature: https://www.legislature.mi.gov/documents/2017-2018/billanalysis/Senate/pdf/2017-SFA-4508-L.pdf

Hatmaker, T. (2018, 6 6). The damage from Atlanta’s huge cyberattack is even worse than the city first thought. Retrieved from TechCrunch: https://techcrunch.com/2018/06/06/atlanta-cyberattack-atlanta-information-management/

Haynes, H. J., & Stein, G. P. (2017, 4). U.S. fire department profile. Retrieved from National Fire Protection Association: https://www.nfpa.org/News-and-Research/Fire-statistics-and-reports/Fire-statistics/The-fire-service/Administration/US-fire-department-profile

Hutcherson, K. (2018, 3 28). Six days after a ransomware cyberattack, Atlanta officials are filling out forms by hand. Retrieved from CNN: https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html

Issues for Firefighters. (2018, 8 14). Retrieved from IRS: https://www.irs.gov/government-entities/federal-state-local-governments/issues-for-firefighters

Join the Coast Guard Auxiliary. (n.d.). Retrieved 10 5, 2018, from Flotilla 5-3 Cincinatti, Ohio: http://a0820503.uscgaux.info/join.htm

Konkel, F. (2017, 4 18). 18F for Cybersecurity? Tech Think Tank Wants Congress to Consider It. Retrieved from Nextgov: https://www.nextgov.com/cybersecurity/2017/04/18f-cybersecurity-tech-think-tank-wants-congress-consider-it/137104/

Krebs, C., & Manfra, J. (2017, 10 3). Stateent for the Record Regarding Cybersecurity. Retrieved from US House of Representatives: https://docs.house.gov/meetings/HM/HM08/20171003/106448/HHRG-115-HM08-Wstate-KrebsC-20171003.pdf

Lohrmann, D. (2018, 3 10). Cyber Range: Who, What, When, Where, How and Why? Retrieved from Government Technology: http://www.govtech.com/blogs/lohrmann-on-cybersecurity/cyber-range-who-what-when-where-how-and-why.html

Michaels, J. (2018, 1 10). Physically fit recruits for Army are hard to find. Especially in these states. Retrieved from USA Today: https://www.usatoday.com/story/news/world/2018/01/10/physically-fit-recruits-army-hard-find-especially-these-states/1016030001/

Michigan Cyber Civilian Corps. (n.d.). Retrieved 10 5, 2018, from Michigan.gov: https://www.michigan.gov/som/0,4669,7-192-78403_78404_78419—,00.html

Nash, K. S., Castellanos, S., & Janofsky, A. (2018, 6 27). One Year After NotPetya Cyberattack, Firms Wrestle With Recovery Costs. Retrieved from Wall Street Journal: https://www.wsj.com/articles/one-year-after-notpetya-companies-still-wrestle-with-financial-impacts-1530095906

Newman, L. H. (2018, 3 30). The Ransomware That Hobbled Atlanta Will Strike Again. Retrieved from Wired: https://www.wired.com/story/atlanta-ransomware-samsam-will-strike-again/

O'Neill, P. H. (2018, 2 1). Pentagon's network defense headquarters is fully operational. Retrieved from CyberScoop: https://www.cyberscoop.com/dod-network-cyber-command-fully-operational/

Public Law 107–296 An Act to Establish the Department of Homeland Security and for Other Purposes. (2002, 11 25). Retrieved from Government Publishing Office: https://www.gpo.gov/fdsys/pkg/PLAW-107publ296/pdf/PLAW-107publ296.pdf

PUBLIC LAW 113–66 – National Defense Authorization Act for Fiscal Year 2014. (2013, 12 26). Retrieved from US Congress: https://www.congress.gov/113/plaws/publ66/PLAW-113publ66.pdf

Ruiz, M. M. (2018, 1 9). Is Estonia’s Approach to Cyber Defense Feasible in the United States? Retrieved from War on the Rocks: https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/

Singer, P. W. (2018, 1 30). The 2018 State of the Digital Union: The Seven Deady Sins of Cybersecurity We Must Face. Retrieved from War On the Rocks: https://warontherocks.com/2018/01/2018-state-digital-union-seven-deadly-sins-cyber-security-must-face/

Smith, G. (2012, 11 23). The Nerd Reserves: Sandy Recovery Renews Call For Tech National Guard. Retrieved from Huffington Post: https://www.huffingtonpost.com/2012/11/23/tech-national-guard_n_2168374.html

Stateline. (2017, 8 4). Michigan's Volunteer-Based Cybersecurity Strategy Catches On. Retrieved from Governing: http://www.governing.com/topics/mgmt/sl-cybersecurity-volunteers.html

Subramanian, S., & Robinson, D. (2016). 2016 Deloitte-NASCIO Cybersecurity Study. NASCIO and Deloitte. Deloitte Unversity Press. Retrieved from https://www.nascio.org/Portals/0/Publications/Documents/2016/2016-Deloitte-NASCIO-Cybersecurity-Study.pdf

The Estonian Defence League Act. (2013, 2 28). Retrieved from Riigi Teataja: https://www.riigiteataja.ee/en/eli/525112013006/consolide

The Net. (n.d.). Retrieved 10 5, 2018, from IMDB: https://www.imdb.com/title/tt0113957/plotsummary

US CERT About Us. (n.d.). Retrieved from US Department of Homeland Security: https://www.us-cert.gov/about-us

US Government Accountability Office. (2018). Cybersecurity Workforce. Retrieved from https://www.gao.gov/assets/690/689880.pdf

Table of Contents

Close