2019 Threat Assessment Series: Enemies in Cyberspace - Cyberterrorism And Terrorists' Use Of The Internet

The New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) assesses that cyber threat actors pose a moderate threat to New Jersey. The continued growth of IP-enabled devices for both personal and business uses will result in an increased attack surface for threat actors to target, impacting attached physical systems.

Tune in to the final installment of our 2019 Threat Assessment series as the NJCCIC analysts delve deeper into the cyber threats facing the State of New Jersey and its citizens.

Hacking Your Holiday: How to Protect Yourself From Cyber Criminals This Holiday Season

During the holiday season, it is important to maintain awareness of the many threats posed by cyber criminals while shopping online and in stores. The National Retail Federation estimates that Americans will exceed last year’s holiday spending to total between $717-720 billion between November and December. As the popularity of online shopping continues to increase, so does the number of potential unsuspecting victims for cyber criminals to exploit. Scammers may target victims through a variety of methods, including via phone calls, text messages, emails, compromised websites, or unsecured Wi-Fi networks.

This week, one of our cyber threat analysts at the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) discusses proactive steps to reduce your risk and make it harder for cyber criminals to succeed this holiday season. 

2018 Threat Assessment Series: Enemies in Cyberspace - Cyberterrorism and Terrorists' Use of the Internet

According to our 2018 NJ Terrorism Threat Assessment and our partners at the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC), terrorists will increasingly use encryption, the dark web, and cryptocurrencies for recruitment and to spread propaganda. They will also use those items to encourage lone-wolf attacks, facilitate their operations, and acquire weapons to conduct physical attacks against targets. As such, we have seen social media companies remove extremist content and suspend accounts, forcing extremists to move their Internet activities to less active platforms, limiting their potential influence.

Join us as analysts from our office and the NJCCIC provide insight into terrorist groups’ current cyber capabilities and their predictions of what their future cyber operations may look like. Additionally, the analysts discuss the challenges for social media and web hosting companies in policing terrorists’ content on their sites.

Episode 47: Staying Cyber Safe This Holiday Season

According to the National Retail Federation (NRF), American consumers are expected to spend an average of $967 during the 2017 holiday shopping season. This is an approximate 3.5 percent increase from last year’s projections, and a majority of these purchases are expected to take place online. The NRF Consumer Survey found that online shopping is the preferred method of purchase this year for the first time in the survey’s history. Last year, Adobe reported that approximately $5.27 billion was spent in online sales between Thanksgiving Day and Black Friday, with $1.2 billion spent in purchases made through the use of mobile devices.

As the popularity of online shopping continues to increase, so does the number of potential unsuspecting victims for cyber criminals to exploit. This week, one of our cyber threat analysts at the New Jersey Cybersecurity Communications and Integration Cell (NJCCIC) discusses proactive steps to reduce your risk and make it harder for cyber criminals to succeed this holiday season. 

Episode 41: Cybersecurity in the Workplace is Everyone’s Business

October is National Cyber Security Awareness Month, which is an annual campaign to raise awareness about the importance of cybersecurity. The Internet touches almost all aspects of everyone’s daily life, whether we realize it or not. National Cyber Security Awareness Month (NCSAM) is designed to engage and educate public and private sector partners through events and initiatives to raise awareness about the importance of cybersecurity, provide them with tools and resources needed to stay safe online, and increase the resiliency of the Nation in the event of a cyber incident.

In the second week of NCSAM, we focus on cybersecurity in the workplace. Creating a culture of cybersecurity is critical for all organizations and must be a shared responsibility among all employees. Join one of our cyber intelligence analysts as she discusses how organizations can protect against the most common cyber threats and the resources available to help strengthen cyber resilience.

Domestic Terrorism Conference Series: Outlining Russian Influence Operations with Clint Watts

In May 2017, NJOHSP hosted over 250 federal, state, and local intelligence and law enforcement, academic, and private sector partners for the 2nd Annual Domestic Terrorism Conference. The event provided a forum to discuss the threat of extremists and groups aligned with race-based, single-issue, anti-government, and religious ideologies in the United States. Over the next several weeks, you will hear from some of the experts who shared their research and insights at the conference. In today’s episode, Clint Watts joins Intelligence. Unclassified. once again to discuss his recent testimony before Congress concerning Russia’s strategy to disrupt the United States and the active measures being used by Russia to distribute political, financial, and social messages.

Episode 24: From JerseyNet to FirstNet - A Force Multiplier for Public Safety

Join Director of Policy and Planning Eric Tysarczyk and Former Governor of Vermont Jim Douglas, a member of the FirstNet Board, as they explore the FirstNet network, what is it, how it impacts New Jersey, specifically our own proof of concept network, JerseyNet, and state plans for the next step in rolling out FirstNet’s high-speed network for the millions of public safety users in all 56 states and US territories.

Episode 11: ISIS Expands Weaponized Drone Program

An NJOHSP review of terrorist attacks and plots in the United States since 2015 reveals HVEs have primarily used simple weapons such as firearms, vehicles, and knives, although we cannot rule out the possibility HVEs will learn how to construct and weaponize UAVs based on future ISIS propaganda. In this episode, Analysis Bureau Chief Dean Baratta asks Intelligence Analyst Travis to delve further into his insights regarding weaponized drones being utilized by ISIS.

Episode 1: Welcome to Season 2! - GRIZZLY STEPPE and Cybersecurity Efforts in New Jersey

Today, as we welcome you back to Season 2 of Intelligence. Unclassified., Rosemary Martorana is joined by NJ's Chief Technology Officer Dave Wienstein, NJOHSP's Director of Cybersecurity Steven Branigan, and NJCCIC Director Mike Geraghty who discuss what GRIZZLY STEPPE actually is and what efforts are being put forth in New Jersey to secure our digital footprint. 

Episode 49: JerseyNet for Dedicated First Responder Communications

JerseyNet is the nation’s first deployable wireless communications network dedicated for use by public safety agencies. Created to address the challenges of providing public safety officials with uninterrupted service during emergencies, JerseyNet is part of a nationwide interoperable communications movement working to connect first responders across different agencies, regions, and technologies. Join Principal Planner Alex Newman as he and Interoperable Communications Chief Steve Talpas discuss this innovative and valuable asset for New Jersey first responders.

Episode 45: Ransomware - Holding Your Computer Hostage

Ransomware is a type of malicious software (malware) that attempts to extort money from victims by restricting access to a computer system or files. The most prevalent form of this profit-motivated malware, referred to as crypto-ransomware due to the use of encryption algorithms, is on the rise as many new variants are being developed by hackers and international cybercrime groups. One of our cyber threat analysts joins us once again to explore the dangers of ransomware and how individuals and businesses can avoid being victims. 

Episode 44: Bots and Botnets - The Zombies Among Us

Since today is Halloween, this podcast is dedicated to the topic of zombies! A cyber threat intelligence analyst at the NJCCIC talks about zombie computer armies, also known as botnets, and how they might impact your daily digital life. She also discusses the DDoS attack that took down a large portion of the internet on Friday, October 21. For more information about this or any other cybersecurity topic, please visit

Homeland Security Advisors Series: Part VII - Cybersecurity with Director Mark Ghilarducci (California)

Homeland security advisors (HSAs) are the sole representative for the governor to the US Department of Homeland Security. Although there is no one model for the HSA position, all HSAs are responsible for implementing the state’s homeland security mission, receiving classified threat information, and act on behalf of the governor in the event of a disaster or emergency. In the final segment of the Homeland Security Advisors Series, Director Mark Ghilarducci of California reveals the keys to the state’s success in cybersecurity efforts.