Anonymous ID: c0aa97 July 8, 2018, 12:16 p.m. No.2082507   🗄️.is 🔗kun

>>2082429

 

Search process + From tineye.com went to IBM archives.

 

https://www-03.ibm.com/ibm/history/exhibits/vintage/vintage_4506VV2081.html

 

Students entering the IBM Schoolhouse in Endicott, N.Y., were reminded every day to read, listen, discuss, observe and think – the five steps to knowledge. This view shows the schoolhouse steps in 1956. (VV2081)

Anonymous ID: c0aa97 July 8, 2018, 12:29 p.m. No.2082626   🗄️.is 🔗kun   >>2639

>>2082573

The NICCS Defense Cyber Investigation Training Academy is located in Linthicum.

 

NATIONAL INITIATIVE FOR CYBERSECURITY CAREERS AND STUDIES

 

https://niccs.us-cert.gov/training/search/defense-cyber-investigation-training-academy

Anonymous ID: c0aa97 July 8, 2018, 12:40 p.m. No.2082721   🗄️.is 🔗kun   >>2744

>>2082639

Background on Operation Gladiator Phoenix

 

U.S. Army Ponders Cyber Operations

October 15, 2009

 

https://www.afcea.org/content/us-army-ponders-cyber-operations

 

FTA:

 

Brig. Gen. Steven W. Smith, USA, chief cyber officer, Army Chief Information Officer (CIO)/G-6, noted that the Army is participating in several key initiatives such as the Comprehensive National Cyber Initiative (CNCI), the Defense Department Information Assurance Campaign Plan (DOD IACP), the standing up of the U.S. Cyber Command (CYBERCOM) and operation Gladiator Phoenix. Regarding the Army’s direct role in cyberspace, the general emphasized that the service’s mission is to integrate efforts across the Army staff to provide policy, oversight and guidance for any cyberspace operations.

 

Operation Gladiator Phoenix will be a major exercise in which 71 percent of the activity will be oriented toward network defense. The remaining 30 percent of the event’s efforts will focus on sustaining exploitation and cyberattack capabilities. The goal of the DOD IACP is to help commands prioritize how they spend money on information assurance. The general adds that the effort has some 20 end-states. Several of these goals are accountability from the top, layered network defense, strong external perimeters, the capability to keep secrets and developing partnerships with industry.