Commander Jim Feldkamp, USN Ret., Feldkamp was a US Naval Flight Officer, Counter-Measures Officer (ECMO), and Navigator for the EA-6B – the U.S. Navy’s carrier-based electronic attack aircraft. He flew off the USS Midway in Operation Desert Shield and Desert Storm in 1991.
Affiliating with the U.S. Naval Reserves became a Special Agent for the Federal Bureau of Investigation (FBI) at Norfolk, Virginia. Feldkamp was a founding member of the Joint Counter-Terrorism Task Force and, as a collateral duty, was one of three pilots in the Norfolk office that conducted aerial physical surveillance of suspects in criminal and terrorist cases. In 2004 he resigned from the FBI to become the Republican nominee for Oregon’s District 4 Congressional seat during both the 2004 and 2006 election cycles.
In 2007 Jim was recalled to active Navy reserve duty to help establish the precursor office of NMIO and was responsible for the coordination of all domestic and international information-sharing of non-classified information among U.S. federal government agencies, foreign governments, and the international maritime shipping industry to increase maritime security and maritime domain awareness.
Jim Feldkamp is currently a Subject Matter Expert at Georgetown University, developing a course on “Terrorism and Unconventional Threats.” Previously, he was an adjunct professor at George Mason University, and George Washington University, teaching undergraduate courses in domestic and international terrorism. He has authored/edited a university textbook through Cognella Academic Publishing on the "Theory and Politics of Terrorism."
Learn MoreAs cybersecurity threats become increasingly sophisticated, businesses must proactively protect their data and systems. One such measure is penetration testing, which involves simulating a cyber attack on a company’s network or applications to identify vulnerabilities. This article will explore the benefits of penetration testing for businesses. Identifying Vulnerabilities The primary benefit of penetration testing is […]
CISA focuses on cyber security and infrastructure resilience. This includes protecting technology assets that enable businesses and governments to operate. Cyber threats can be physical and cyber, so it’s important to consider both when developing your security strategy. CISA works to prevent attacks and minimize the damage of malware infiltration by providing cyber situational awareness […]
Teaching strategies are critical for educators to effectively impart knowledge and skills to students. Different strategies work for different students, so it’s essential for educators to be well-versed in various teaching techniques to ensure that every student can learn effectively. In this article, we’ll explore some examples of teaching strategies that educators can use to […]
With the proliferation of technology, cybersecurity has become an important topic for individuals and organizations alike. Cyber news is constantly evolving as new threats arise, and it is important to stay up-to-date on the latest developments in this field. In this article, we will discuss some of the best sources for the latest cybersecurity news. […]