<?xml version="1.0"?>
<News hasArchived="true" page="16" pageCount="19" pageSize="10" timestamp="Mon, 27 Apr 2026 14:21:25 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?mode=activity&amp;page=16">
<NewsItem contentIssues="true" id="77689" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77689">
<Title>Weaponized information seeks a new target in cyberspace: Users&#8217; minds</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/file-20180727-106514-17lwvm6.jpg" alt="" style="max-width: 100%; height: auto;">Cyberattacks target Americans’ thinking.<span> <a href="https://www.shutterstock.com/image-vector/young-man-grabs-his-hands-head-447182740" rel="nofollow external" class="bo">Fancy Tapis/Shutterstock.com</a></span><p> </p>
    <h1><strong>Weaponized information seeks a new target in cyberspace: Users’ minds</strong></h1>
    <h4><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></h4>
    <p>The Russian attacks on the 2016 U.S. presidential election and <a href="https://www.nytimes.com/interactive/2018/07/16/us/elections/russian-interference-statements-comments.html" rel="nofollow external" class="bo">the country’s continuing election-related hacking</a> have happened across all three dimensions of cyberspace – physical, informational and cognitive. The first two are well-known: For years, hackers have exploited hardware and software flaws to gain unauthorized access to computers and networks – and <a href="http://thehill.com/policy/cybersecurity/372816-russia-successfully-penetrated-voter-rolls-in-some-states-report" rel="nofollow external" class="bo">stolen information</a> they’ve found. The third dimension, however, is a newer target – and a more concerning one.</p>
    <p>This <a href="http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-02.pdf" rel="nofollow external" class="bo">three-dimensional view of cyberspace</a> comes from my late mentor, Professor Dan Kuehl of the National Defense University, who expressed concern about traditional hacking activities and what they meant for national security. But he also foresaw the potential – now clear to the public at large – that those tools could be used to <a href="http://comprop.oii.ox.ac.uk/research/cybertroops2018/" rel="nofollow external" class="bo">target people’s perceptions and thought processes,</a> too. That’s what the Russians allegedly did, according to federal indictments issued in February and July, laying out evidence that <a href="https://www.justice.gov/file/1035477/download" rel="nofollow external" class="bo">Russian civilians</a> and <a href="https://www.justice.gov/file/1080281/download" rel="nofollow external" class="bo">military personnel</a> used online tools to <a href="https://www.newyorker.com/news/news-desk/what-muellers-indictment-reveals-about-russias-internet-research-agency" rel="nofollow external" class="bo">influence Americans’ political views</a> – and, potentially, their votes. They may be <a href="https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator" rel="nofollow external" class="bo">setting up to do it again</a> for the <a href="https://www.npr.org/2018/07/28/633056819/russian-hackers-targeted-the-most-vulnerable-part-of-u-s-elections-again" rel="nofollow external" class="bo">2018 midterm elections</a>.</p>
    <p>Some observers suggest that using internet tools for espionage and as fuel for disinformation campaigns is a new form of “<a href="https://www.bbc.com/news/world-europe-29903395" rel="nofollow external" class="bo">hybrid warfare</a>.” Their idea is that the lines are blurring between the traditional kinetic warfare of bombs, missiles and guns, and the unconventional, stealthy warfare long practiced against foreigners’ “<a href="https://www.jpost.com/Israel-News/Winning-over-hearts-and-minds-The-benefits-of-Israeli-aid-to-Syria-561191" rel="nofollow external" class="bo">hearts and minds</a>” by intelligence and special forces capabilities.</p>
    <p>However, I believe this isn’t a new form of war at all: Rather, it is the same old strategies <a href="https://freebeacon.com/national-security/americas-adversaries-weaponizing-information-nsa-director-warns/" rel="nofollow external" class="bo">taking advantage of the latest available technologies</a>. Just as online marketing companies use sponsored content and search engine manipulation to distribute biased information to the public, governments are using internet-based tools to pursue their agendas. In other words, they’re hacking a different kind of system through <a href="https://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411" rel="nofollow external" class="bo">social engineering</a> on a grand scale.</p>
    <p> </p>
    <a href="https://images.theconversation.com/files/229635/original/file-20180727-106502-1xisbgf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/229635/original/file-20180727-106502-1xisbgf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="" style="max-width: 100%; height: auto;"></a><span>Americans are used to seeing Russian propaganda that looks like this.</span> <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Britain-Russian-Art-Exhibition/72e17ee8492c4a6da4588bd1d7fa1a29/123/0" rel="nofollow external" class="bo">AP Photo/Kirsty Wigglesworth</a></span><p> </p>
    <h2>Old goals, new techniques</h2>
    <p>More than 2,400 years ago, the Chinese military strategist and philosopher Sun Tzu made it an axiom of war that it’s best to “<a href="https://en.wikiquote.org/wiki/Sun_Tzu#Chapter_III_%C2%B7_Strategic_Attack" rel="nofollow external" class="bo">subdue the enemy without fighting</a>.” Using information – or disinformation, or propaganda – as a weapon can be one way to destabilize a population and disable the target country. In 1984 a former KGB agent who defected to the West discussed this as a long-term process and <a href="https://bigthink.com/paul-ratner/34-years-ago-a-kgb-defector-described-america-today.amp" rel="nofollow external" class="bo">more or less predicted</a> what’s <a href="https://securingdemocracy.gmfus.org/so-what-did-we-learn-looking-back-on-four-years-of-russias-cyber-enabled-active-measures/" rel="nofollow external" class="bo">happening in the U.S.</a> now.</p>
    <p>The Russians created false social media accounts to simulate political activists – such as <a href="https://www.cnn.com/2018/02/16/politics/who-is-ten-gop/index.html" rel="nofollow external" class="bo">@TEN_GOP</a>, which purported to be associated with the Tennessee Republican Party. Just that one account attracted more than 100,000 followers. The goal was to distribute propaganda, such as captioned photos, posters or short animated graphics, purposely designed to enrage and engage these accounts’ followers. Those people would then <a href="https://www.technologyreview.com/s/611332/this-is-where-internet-memes-come-from/" rel="nofollow external" class="bo">pass the information along</a> through their own personal social networks.</p>
    <p>Starting from seeds planted by Russian fakers, including some who claimed to be U.S. citizens, those ideas grew and flourished through amplification by real people. Unfortunately, whether originating from Russia or elsewhere, fake information and conspiracy theories can <a href="https://www.vox.com/world/2018/6/6/17433876/trump-spygate-fox-twitter" rel="nofollow external" class="bo">form the basis for discussion</a> at major partisan media outlets.</p>
    <p>As ideas with niche online beginnings moved into the traditional mass media landscape, they serve to keep controversies alive by sustaining divisive arguments on both sides. For instance, one Russian troll factory had its online personas host <a href="https://www.nationalreview.com/2018/03/mueller-investigation-indictments-russian-organized-rallies-not-influential" rel="nofollow external" class="bo">rallies both for and against each of the major candidates</a> in the 2016 presidential election. Though the rallies never took place, the online buzz about them helped inflame divisions in society.</p>
    <p>The trolls also set up Twitter accounts purportedly representing local news organizations – including defunct ones – to take advantage of <a href="https://medium.com/trust-media-and-democracy/local-news-is-a-building-block-to-rebuild-trust-fab8752f3659" rel="nofollow external" class="bo">Americans’ greater trust of local news sources</a> than national ones. These accounts operated for several years – <a href="https://www.npr.org/2018/07/12/628085238/russian-influence-campaign-sought-to-exploit-americans-trust-in-local-news" rel="nofollow external" class="bo">one for the Chicago Daily News</a>, closed since 1978, was created in May 2014 and collected 20,000 followers – passing along legitimate local news stories, likely seeking to win followers’ trust ahead of future disinformation campaigns. Shut down before they could fulfill that end, these accounts cleverly aimed to exploit the fact that many Americans’ political views <a href="http://www.journalism.org/2018/06/18/distinguishing-between-factual-and-opinion-statements-in-the-news/" rel="nofollow external" class="bo">cloud their ability to separate fact from opinion</a> in the news.</p>
    <p>These sorts of activities are functions of traditional espionage: Foment discord and then sit back while the target population becomes distracted arguing among themselves.</p>
    <h2>Fighting digital disinformation is hard</h2>
    <p>Analyzing, let alone countering, this type of provocative behavior can be difficult. Russia isn’t alone, either: The U.S. tries to influence foreign audiences and global opinions, including through <a href="https://www.voanews.com/" rel="nofollow external" class="bo">Voice of America online and radio services</a> and intelligence services’ activities. And it’s not just governments that get involved. Companies, advocacy groups and others also can conduct disinformation campaigns.</p>
    <p>Unfortunately, laws and regulations are ineffective remedies. Further, social media companies have been fairly slow to respond to this phenomenon. Twitter reportedly <a href="https://www.reuters.com/article/us-twitter-inc-suspensions/twitter-suspends-over-70-million-accounts-in-two-months-washington-post-idUSKBN1JW2XN" rel="nofollow external" class="bo">suspended more than 70 million fake accounts</a> earlier this summer. That included <a href="https://www.npr.org/2018/07/12/628085238/russian-influence-campaign-sought-to-exploit-americans-trust-in-local-news" rel="nofollow external" class="bo">nearly 50 social media accounts</a> like the fake Chicago Daily News one.</p>
    <p>Facebook, too, says it is <a href="https://www.cnet.com/news/facebook-says-misinformation-is-a-problem-but-wont-say-how-big/" rel="nofollow external" class="bo">working to reduce the spread of “fake news” on its platform</a>. Yet both companies make their money from users’ activity on their sites – so they are conflicted, trying to <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">stifle misleading content while also boosting users’ involvement</a>.</p>
    <h2>Real defense happens in the brain</h2>
    <p>The best protection against threats to the cognitive dimension of cyberspace depends on users’ own actions and knowledge. <a href="https://www.gutenberg.org/files/852/852-h/852-h.htm" rel="nofollow external" class="bo">Objectively educated, rational citizens</a> should serve as the foundation of a strong democratic society. But that defense fails if people don’t have the skills – or worse, don’t use them – to <a href="https://theconversation.com/here-are-some-more-reasons-why-liberal-arts-matter-49638" rel="nofollow external" class="bo">think critically about what they’re seeing</a> and examine claims of fact before accepting them as true.</p>
    <p>American voters <a href="https://www.cnn.com/2018/07/25/politics/russia-interference-poll/index.html" rel="nofollow external" class="bo">expect ongoing Russian interference in U.S. elections</a>. In fact, it <a href="https://www.npr.org/2018/07/28/633056819/russian-hackers-targeted-the-most-vulnerable-part-of-u-s-elections-again" rel="nofollow external" class="bo">appears to have</a> <a href="https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator" rel="nofollow external" class="bo">already begun</a>. To help combat that influence, the U.S. Justice Department <a href="http://time.com/5343817/justice-department-election-meddling-plan/" rel="nofollow external" class="bo">plans to alert the public</a> when its investigations discover foreign espionage, hacking and disinformation relating to the upcoming 2018 midterm elections. And the National Security Agency has created a <a href="https://www.bloomberg.com/news/articles/2018-07-22/u-s-cyber-commander-tackles-russian-threat-with-new-task-force" rel="nofollow external" class="bo">task force to counter Russian hacking</a> of election systems and major political parties’ computer networks.</p>
    <p>These efforts are a good start, but the real solution will begin when people start realizing they’re being subjected to this sort of cognitive attack and that it’s not <a href="http://thehill.com/business-a-lobbying/398285-trump-obama-didnt-warn-about-russia-before-election-because-its-a-hoax" rel="nofollow external" class="bo">all just a hoax</a>.</p>
    <hr><p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article was originally published on <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a>. Read the <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds/" rel="nofollow external" class="bo">Weaponized information seeks a new target in cyberspace: Users’ minds</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Cyberattacks target Americans’ thinking. Fancy Tapis/Shutterstock.com     Weaponized information seeks a new target in cyberspace: Users’ minds   Richard Forno, University of Maryland, Baltimore...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77689/guest@my.umbc.edu/709dac98bc2f0a20d6174007b3532da6/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 30 Jul 2018 08:47:53 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="77651" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77651">
<Title>UMBC&#8217;s Sherman receives $5.4m in funding for&#160;cybersecurity research and scholarships</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/07/umbc_icew_2014.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/umbc_icew_2014-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1>UMBC receives $5.4m in funding for new cybersecurity projects</h1>
    <h3><strong>NSF and NSA Fund Three Cybersecurity Projects by Prof. Alan Sherman </strong></h3>
    <p>Professor <a href="https://www.csee.umbc.edu/~sherman/" rel="nofollow external" class="bo">Alan Sherman</a> and colleagues were recently awarded more than $5.4 million dollars in three new grants to support cybersecurity research and education at UMBC, including two from the National Science Foundation (NSF) and one from the National Security Agency (NSA).  Dr. Sherman leads UMBC’s <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">Center for Information Security and Assurance</a> which was responsible for UMBC’s designation as a National Center of Academic Excellence in Cybersecurity Research and Education.</p>
    <div><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/SFS-CyberCorps-copy.jpg" alt="" style="max-width: 100%; height: auto;"></div>
    <p>This summer, NSF funded Sherman’s second <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1241576&amp;HistoricalAwards=false" rel="nofollow external" class="bo">CyberCorps Scholarship for Service</a> (SFS) grant (<a href="https://cybersecurity.umbc.edu/richard-forno/" rel="nofollow external" class="bo">Richard Forno</a>, CoPI) that will fund 34 cybersecurity scholars over five years and support research at UMBC and in the Cyber Defense Lab (CDL). The $5 million award supports scholarships for BS, MS, MPS, and PhD students to study cybersecurity through UMBC degree programs in computer science, computer engineering, cyber, or information systems. SFS scholars receive tuition, books, health benefits, professional expenses, and an annual stipend ($22,500 for undergraduates, $34,000 for graduate students). In return, each scholar must engage in a summer internship and work for government (federal, state, local, or tribal) for one year for each year of support. The program is highly competitive and many of the graduates now work for the NSA.</p>
    <p>A novel aspect of UMBC’s SFS program is that it builds connections with two nearby community colleges—Montgomery College (MC) and Prince Georges Community College (PGCC). Each year, one student from each of these schools is selected for a scholarship. Upon graduation from community college, the student transfers to UMBC to complete their four-year degree. In doing so, UMBC taps into a significant pool of talent and increases the number of cybersecurity professionals who will enter government service. Each January, all SFS scholars from UMBC, MC, and PGCC engage in a one-week research study. Working collaboratively, they analyze a targeted aspect of the security of the UMBC computer system. The students enjoy the hands-on experience while helping to improve UMBC’s computer security. Students interested in applying for an SFS scholarship should consult the <a href="https://cisa.umbc.edu/sfs/" rel="nofollow external" class="bo">CISA SFS page</a> and contact <a href="https://www.csee.umbc.edu/~sherman/" rel="nofollow external" class="bo">Professor Sherman</a>. The next application deadline is November 15.</p>
    <p>With $310,000 of support from NSF, Sherman and his CoPIs, Drs. <a href="https://cybersecurity.umbc.edu/training/faculty/dhananjay-phatak/" rel="nofollow external" class="bo">Dhananjay Phatak</a> and <a href="https://userpages.umbc.edu/~oliva/" rel="nofollow external" class="bo">Linda Oliva</a>, are developing educational <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1819521" rel="nofollow external" class="bo">Cybersecurity Assessment Tools (CATS)</a> to measure student understanding of cybersecurity concepts. In particular, they are developing and validating two concept inventories: one for any first course in cybersecurity, and one for college graduates beginning a career in cybersecurity. These inventories will provide science-based criteria by which different approaches to cybersecurity education can be assessed (e.g., competition, gaming, hands-on exercises, and traditional classroom). This project is collaborative with the University of Illinois at Urbana-Champaign.</p>
    <p>With $97,000 of support from NSA, Sherman is developing a virtual <em>Protocol Analysis Lab</em> that uses state-of-the-art tools to analyze cryptographic protocols for structural weaknesses. Protocols are the structured communications that take place when computers interact with each other, as for example happens when a browser visits a web page. Experience has shown that protocols are so complicated to analyze that there is tremendous value in studying them using formal methods. Sherman and his graduate students are making it easier to use existing tools including CPSA, Maude NPA, and Tamerin, applying them to analyze particular protocols, and developing associated educational materials.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/nsf-and-nsa-fund-three-cybersecurity-projects-by-prof-alan-sherman/" rel="nofollow external" class="bo">UMBC’s Sherman receives $5.4m in funding for cybersecurity research and scholarships</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC receives $5.4m in funding for new cybersecurity projects   NSF and NSA Fund Three Cybersecurity Projects by Prof. Alan Sherman    Professor Alan Sherman and colleagues were recently awarded...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/nsf-and-nsa-fund-three-cybersecurity-projects-by-prof-alan-sherman/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77651/guest@my.umbc.edu/9b6126873c3cb88cd9ccd6c5510f4393/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 25 Jul 2018 22:15:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="77610" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77610">
<Title>2018 Maryland Cyber Challenge registration opens for student teams</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2015/09/students_computers.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <p>   </p>
    <h1><strong>2018 Maryland Cyber Challenge seeks student teams</strong></h1>
    <p>   </p>
    <p>The 2018 <a href="https://www.fbcinc.com/e/cybermdconference/challenge.aspx" rel="nofollow external" class="bo">Maryland Cyber Challenge</a> seeks teams willing to test a range of skills simulating real-word cyber scenarios. Teams will climb a ladder of challenges demonstrating an ability to work together, understand both simple and complex vulnerabilities, defensive operations and gamified offensive operations.</p>
    <p>Registration is now open. An initial orientation session start the week of August 13 and qualification Round 1 will be September 8-9..</p>
    <p>The finals will take place live at <a href="https://www.fbcinc.com/e/CyberMDConference/" rel="nofollow external" class="bo">CyberMaryland 2018</a> in Baltimore on October 10. Prizes (TBA) will be presented LIVE by during a closing session at CyberMaryland.</p>
    <p>Get more information and register <a href="https://www.fbcinc.com/e/cybermdconference/challenge.aspx" rel="nofollow external" class="bo">here</a></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/2018-maryland-cyber-challenge-registration-opens/" rel="nofollow external" class="bo">2018 Maryland Cyber Challenge registration opens for student teams</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>     2018 Maryland Cyber Challenge seeks student teams         The 2018 Maryland Cyber Challenge seeks teams willing to test a range of skills simulating real-word cyber scenarios. Teams will...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/2018-maryland-cyber-challenge-registration-opens/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77610/guest@my.umbc.edu/48f1c9587f34d74433fab384c7e2f6b7/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 23 Jul 2018 21:37:30 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="77606" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77606">
<Title>talk: Robot Governance &#8211; Institutions and Issues, 10:30 Tue 7/24, ITR346</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/toy-robot-1024x461.jpg" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1><strong>Robot Governance – Institutions and Issues</strong></h1>
    <p> </p>
    <h3>Dr. Aaron Mannes, ISHPI Information Technologies</h3>
    <h3>10:30-11:30 Tuesday, 24 July 2018, ITE 346</h3>
    <p> </p>
    <p>Inexpensive sensors and information storage and processing have enabled the large-scale production of robots: autonomous systems capable of acting on the world. These systems represent an enormous technological and economic opportunity that will change society in countless and unpredictable ways. They will also bring new policy challenges. This presentation examines the missions the government will need to undertake to address the challenges raised by this new technology, identifies critical gaps the government faces in carrying out these missions, and discusses institutional options to address these gaps.</p>
    <p> </p>
    <hr><p> </p>
    <p>Dr. Aaron Mannes is the Senior Policy Advisor at ISHPI Information Technologies, where he supports the Apex Data Analytics Engine (DA-E) at the Department of Homeland Security Science and Technology Directorate. In supporting DA-E, Dr. Mannes collaborates on big data projects that support the Homeland Security Enterprise and researches technology policy. He started at DHS as an American Association for the Advancement of Science Policy Fellow in September 2015. From 2004 to 2015, Dr. Mannes was a researcher at the University of Maryland Institute for Advanced Computer Studies (UMIACS) where he was the subject matter expert on terrorism and international affairs collaborating with a team of inter-disciplinary scientists to build computational tools to support decision-makers facing 21st century security and development problems. Dr. Mannes earned his Ph.D. at the University of Maryland’s School of Public Policy in 2014. His dissertation topic was the evolving national security role of the vice president.</p>
    <p>Dr. Mannes is the author or co-author of four books on terrorism and has written scores of articles, papers, and book chapters on an array of topics including Middle East affairs, terrorism, technology, and other international security issues for popular and scholarly publications including Politico, Policy Review, The Wall Street Journal, Foreign Policy, The Journal of International Security Affairs, The Huffington Post, The National Interest, The Jerusalem Post, and The Guardian.</p>
    <p>This research was conducted with the support of the Apex Data Analytics Engine in the Department of Homeland Security (DHS) Science and Technology Directorate (S&amp;T). In no way should anything stated in this seminar be construed as representing the official position of DHS S&amp;T or any other component of DHS. Opinions and findings expressed in this seminar, as well as any errors and omissions, are the responsibility of the presenter alone.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/talk-robot-governance-institutions-and-issues-1030-tue-7-24-itr346/" rel="nofollow external" class="bo">talk: Robot Governance – Institutions and Issues, 10:30 Tue 7/24, ITR346</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Robot Governance – Institutions and Issues       Dr. Aaron Mannes, ISHPI Information Technologies   10:30-11:30 Tuesday, 24 July 2018, ITE 346       Inexpensive sensors and information storage...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/talk-robot-governance-institutions-and-issues-1030-tue-7-24-itr346/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77606/guest@my.umbc.edu/eb929b4718ba6f9af0b285ec85f5cf78/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 23 Jul 2018 17:27:32 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="77494" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77494">
<Title>UMBC&#8217;s cybersecurity research partnership featured in WBAL-TV piece</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p>Baltimore’s WBAL-TV ran a short <a href="http://www.wbaltv.com/article/umbc-joining-forces-with-japan-london-to-research-cyber-security/22132940" rel="nofollow external" class="bo">news item</a> on UMBC’s new partnership with Keio Research Institute (KRIS) in Japan, and Royal Holloway University of London (RHUL) in the UK to investigate the use of common system simulation tools for modeling critical national infrastructure. This partnership is part of a broader international collaboration, the International Cybersecurity Center of Excellence (INCS-COE). It will also involve Hitachi, an international operator in power systems, telecommunication, railways, and other core infrastructure areas.</p>
    <p> </p>
    <p><div class="embed-container"><iframe src="https://www.youtube.com/embed/G8jHzU7v55o" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div></p>
    <p>Because cybersecurity attacks may not be limited to national borders, this collaboration argues that defense against such attacks should not be siloed either.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/umbcs-cybersecurity-research-partnership-featured-wbal-tv-piece-video/" rel="nofollow external" class="bo">UMBC’s cybersecurity research partnership featured in WBAL-TV piece</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Baltimore’s WBAL-TV ran a short news item on UMBC’s new partnership with Keio Research Institute (KRIS) in Japan, and Royal Holloway University of London (RHUL) in the UK to investigate the use of...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/umbcs-cybersecurity-research-partnership-featured-wbal-tv-piece-video/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77494/guest@my.umbc.edu/fe756a5bcc55a77a197df1d4d836f4f7/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 15 Jul 2018 14:49:25 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="77417" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77417">
<Title>UMBC launches cybersecurity research collaboration with Japanese and UK partners</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <a href="https://www.csee.umbc.edu/wp-content/uploads/2018/07/UMBCKRISRHUL.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/UMBCKRISRHUL-1024x536.jpg" style="max-width: 100%; height: auto;"></a>University leaders, including Karl V. Steiner, third from right, signed the three-nation agreement in a ceremony at the sixth International Cybersecurity Symposium in Japan. Photo courtesy of Karl V. Steiner<p> </p>
    <h1><strong>UMBC launches infrastructure-focused cybersecurity research collaboration with Japanese and UK partners</strong></h1>
    <p>UMBC is one of three leading academic institutions collaborating on a new research initiative focused on cybersecurity for critical national infrastructures, including information technology, public transit, and financial services. University leaders signed the three-nation agreement in a ceremony at the sixth International Cybersecurity Symposium in Japan.</p>
    <p><span>UMBC, Keio Research Institute (KRIS) in Japan, and Royal Holloway University of London (RHUL) in the UK will partner to investigate the use of common system simulation tools for modeling critical national infrastructure. This partnership is part of a broader international collaboration, the International Cybersecurity Center of Excellence (INCS-COE). It will also involve Hitachi, an international operator in power systems, telecommunication, railways, and other core infrastructure areas.</span></p>
    <p><span>Because cybersecurity attacks may not be limited to national borders, this collaboration argues that defense against such attacks should not be siloed either.</span></p>
    <p><span>“Cybersecurity can no longer be treated as a national issue,” emphasizes </span><strong>Karl V. Steiner</strong><span>, vice president for research at UMBC. “Long-term and productive international collaborations are needed to make significant progress.”</span></p>
    <p><span>Jun Murai, professor of environment and information studies at Keio University, notes, “We look forward to working with our research colleagues in the UK and U.S. to help address the increasingly challenging cyber threats to the security of our respective critical national infrastructures.”</span></p>
    <p><span>Working with a common toolset will enable mixed nationality teams to run simulations together. This will help cybersecurity experts learn how to more effectively address human factors, including cultural differences, in predicting how attacks and responses to those attacks might play out across different geographies.</span></p>
    <p><span>“We are excited to participate in this new research collaboration with our colleagues in Japan and the UK to help us better understand and address some of the key cybersecurity challenges that our nations face from increasingly aggressive international adversaries,” says </span><strong>Anupam Joshi</strong><span>, director of UMBC’s Center for Cybersecurity.</span></p>
    <p><span>The partners in this research see the modeling of system security as increasingly vital for industry and government, for both training purposes and vulnerability analysis.</span></p>
    <p>“This initiative creates many future opportunities including, for example, the opportunity to address the impact on critical national infrastructure security of the exponential growth of the internet of things, and for potential exchanges of expert staff and students,” explains Keith Mayes, head of the Information Security Group (ISG) at Royal Holloway University.</p>
    <p><span>Steiner shares Mayes’s excitement about expanding opportunities for both established and emerging researchers in this growing field. Thanks to leading academic programs in cybersecurity, the bwtech@UMBC Cyber Incubator, and UMBC’s internationally-known Center for Cybersecurity, he says, “UMBC is uniquely positioned in Maryland to become a major global force for research in cybersecurity.”</span></p>
    <p><span>“This partnership,” says Steiner, “builds important connections to move this essential work forward.”</span></p>
    <p>Adapted from a <a href="https://news.umbc.edu/umbc-launches-infrastructure-focused-cybersecurity-research-collaboration-with-japanese-and-uk-partners/" rel="nofollow external" class="bo">UMBC News article</a> written by Megan Hanks. Photo by Marlayna Demond ’11 for UMBC.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/umbc-cybersecurity-research-collaboration-japanese-uk-partners/" rel="nofollow external" class="bo">UMBC launches cybersecurity research collaboration with Japanese and UK partners</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>University leaders, including Karl V. Steiner, third from right, signed the three-nation agreement in a ceremony at the sixth International Cybersecurity Symposium in Japan. Photo courtesy of Karl...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/umbc-cybersecurity-research-collaboration-japanese-uk-partners/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77417/guest@my.umbc.edu/fb69bb7ce9baa05f22981b1dd26cee4d/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>research</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 08 Jul 2018 09:06:00 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="76762" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/76762">
<Title>UMBC Scholarship for Service Cybersecurity Spring Meeting, Fri 25 May 2018</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/05/cyber.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/05/cyber-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></h1>
    <h1><strong>UMBC SFS Cybersecurity Spring Meeting</strong></h1>
    <h3>Student Project Reports and</h3>
    <h3>Cybersecurity from the view of NSA’s Cybersecurity Threat Operations Center<br>
    Dave Hogue, Technical Director of NSA’s Cybersecurity Threat Operations Center (NCTOC)</h3>
    <h3>11am-3pm, Friday, 25 May 2018, ITE 456, UMBC</h3>
    <h4>Open to the public</h4>
    <p>Scholarship for Service (SFS) students will present their cybersecurity research from spring 2018. Eight SFS students from Montgomery College (MC) and Prince George’s Community College (PGCC) will present their results solving IT security problems for their universities and county governments. In spring 2018, these students worked collaboratively in a special applied research course at their school to help their schools and county governments. In fall 2018, these students will transfer to UMBC to complete their four-year degrees. This activity is part of a pioneering program centered at UMBC to extend SFS scholarships to community college students. In January 2018, all SFS scholars at UMBC, PGCC, and MC worked collaboratively to analyze the security of UMBC’s WebAdmin system.</p>
    <p>David Hogue will talk about cybersecurity from the view of NSA’s Cybersecurity Threat Operations Center, including the key threats, techniques, and challenges posed by the sophisticated threat actors that NCTOC is charged to defend against.</p>
    <p><strong>11:00am Introductions</strong></p>
    <p>Alan T. Sherman (UMBC)<br>
    Casey W. O’Brien (PGCC)<br>
    David Kuijt (MC)</p>
    <p><strong>11:30am-1:00pm Student Project Reports</strong></p>
    <p>PGCC students<br>
    MC students<br>
    UMBC – Mohammad Khan, UMBC parking system<br>
    UMBC – Enis Golaszewski, winter research study on UMBC’s WebAdmin</p>
    <p><strong>1:00pm-2:00pm Lunch</strong></p>
    <p><strong>2:00pm-3:00pm Dave Hogue, Technical Director, NSA Cybersecurity Threat Operations Center (NCTOC)</strong></p>
    <p>Cybersecurity from the view of NSA’s Cybersecurity Threat Operations Center: Key threats, techniques, and challenges posed by the sophisticated threat actors that NCTOC is charged to defend against.</p>
    <p><strong>3:00pm Adjourn</strong></p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p><a href="https://www.csee.umbc.edu/~sherman/" rel="nofollow external" class="bo">Alan T. Sherman</a> is a professor of computer science and Director of the <a href="http://www.cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC Center for Information Security and Assurance</a> (CISA), which center is responsible for UMBC’s designation as a National Center of Academic Excellence in Cyber Defense Education and Cyber Defense Research.</p>
    <p>Casey W. O’Brien is Executive Director and Principal Investigator of the National CyberWatch Center, Prince George’s Community College.</p>
    <p>David Kuijt is an associate professor at Montgomery College, Rockville.</p>
    <p>Joe Roundy is the Cybersecurity Program Manager at Montgomery College, Germantown.</p>
    <p><em>Support for this event is provided in part by the National Science Foundation under SFS Grant 1241576.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/05/umbc-sfs-cybersecurity-spring-meeting-pgcc-mc-scholarship-for-service/" rel="nofollow external" class="bo">UMBC Scholarship for Service Cybersecurity Spring Meeting, Fri 25 May 2018</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC SFS Cybersecurity Spring Meeting   Student Project Reports and   Cybersecurity from the view of NSA’s Cybersecurity Threat Operations Center  Dave Hogue, Technical Director of NSA’s...</Summary>
<Website>https://www.csee.umbc.edu/2018/05/umbc-sfs-cybersecurity-spring-meeting-pgcc-mc-scholarship-for-service/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/76762/guest@my.umbc.edu/218aa497e4d4aea0b348078c715df948/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 19 May 2018 09:01:11 -0400</PostedAt>
<EditAt>Sat, 19 May 2018 09:01:11 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="76642" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/76642">
<Title>talk: Big Data, Security and Privacy, 11am Wed 5/16</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/05/Bhavani-Thuraisingham.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/05/Bhavani-Thuraisingham-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h1><strong>Big Data, Security and Privacy</strong></h1>
    <h3>Prof. Bhavani Thuraisingham, University of Texas at Dallas<br>
    11:00-12:00 Wednesday, 16 May 2018, ITE 459, UMBC</h3>
    <p>The collection, storage, manipulation and retention of massive amounts of data have resulted in serious security and privacy considerations. Various regulations are being proposed to handle big data so that the privacy of the individuals is not violated. For example, even if personally identifiable information is removed from the data, when data is combined with other data, an individual can be identified. This is essentially the inference and aggregation problem that data security researchers have been exploring for the past four decades. This problem is exacerbated with the management of big data as different sources of data now exist that are related to various individuals.</p>
    <p>While collecting massive amounts of data causes security and privacy concerns, big data analytics applications in cyber security is exploding. For example, an organization can outsource activities such as identity management, email filtering and intrusion detection to the cloud. This is because massive amounts of data are being collected for such applications and this data has to be analyzed. The question is, how can the developments in big data management and analytics techniques be used to solve security problems? These problems include malware detection, insider threat detection, and intrusion detection.</p>
    <p>To address the challenges of big data security and privacy as well as big data analytics for cyber security applications, we organized a workshop sponsored by the National Science Foundation in September 2014 and presented the results in 2015 at an inter-agency workshop in Washington DC. Since then several developments have been reported on big data security and privacy as well as on big data analytics of cyber security. This presenting will summarize the findings of the workshop and discuss the developments and directions.</p>
    <hr><p><a href="https://www.utdallas.edu/~bhavani.thuraisingham/" rel="nofollow external" class="bo">Dr. Bhavani Thuraisingham</a> is the Louis A. Beecherl, Jr. Distinguished Professor in the Erik Jonsson School of Engineering and Computer Science at The University of Texas at Dallas (UTD) and the Executive Director of UTD’s Cyber Security Research and Education Institute since October 2004. She is also a Senior Research Fellow at Kings College, University of London (2015-2018) and a New America Cyber Security Policy Fellow (2017-2018). Her current research is on integrating cyber security and data science. Prior to joining UTD she worked at the MITRE Corporation for 16 years including a three-year stint as a Program Director at the NSF. She initiated the Data and Applications Security program at NSF and was a member of the Cyber Trust theme. While at MITRE she was a department head and was also a technical advisor to the DoD, the NSA, the CIA, and the IRS. Prior to that, she worked for the commercial industry for six years including at Honeywell, Inc. She is the recipient of numerous awards including the IEEE CS 1997 Technical Achievement Award, the IEEE ISI 2010 Research Leadership Award, ACM SIGSAC 2010 Outstanding Contributions Award, SDPS 2012 Transformative Achievement Gold Medal, 2013 IBM Faculty Award, ACM CODASPY 2017 Innovative and Lasting Research Contributions Award, IEEE CS Services Computing 2017 Research Innovation Award, and Dallas Business Journal 2017 Women in Technology Award. She is a 2003 Fellow of the IEEE and the AAAS and a 2005 Fellow of the British Computer Society. She has published over 120 journal articles, 250 conference papers, 15 books, has delivered over 130 keynote and featured addresses, and is the inventor of six US patents. She has chaired/co-chaired top tier conferences including the Women in Cyber Security (WiCyS) 2016, ACM CCS 2017, and is serving as the Program co-Chair for IEEE ICDM 2018. She also delivered a featured address at the Women in Data Science (WiDS) conference in 2018. She received her PhD at the University of Wales, Swansea, UK, and the earned higher doctorate (D. Eng) from the University of Bristol, England, UK for her published research in secure data management.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/05/talk-umbc-bhavani-thuraisingham-big-data-security-privacy-utd/" rel="nofollow external" class="bo">talk: Big Data, Security and Privacy, 11am Wed 5/16</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Big Data, Security and Privacy   Prof. Bhavani Thuraisingham, University of Texas at Dallas  11:00-12:00 Wednesday, 16 May 2018, ITE 459, UMBC   The collection, storage, manipulation and retention...</Summary>
<Website>https://www.csee.umbc.edu/2018/05/talk-umbc-bhavani-thuraisingham-big-data-security-privacy-utd/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/76642/guest@my.umbc.edu/973c2409255673a40cf2a563d30a3181/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 15 May 2018 08:44:32 -0400</PostedAt>
<EditAt>Thu, 03 May 2018 08:44:32 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="76057" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/76057">
<Title>talk: SPARCLE: Practical Homomorphic Encryption, 12pm Fri 4/27</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/04/keys.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/04/keys.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p><strong>UMBC Cyber Defense Lab</strong></p>
    <h1><strong>SPARCLE: Practical Homomorphic Encryption</strong></h1>
    <h2><strong>Russ Fink</strong></h2>
    <h3><strong> Senior Scientist</strong><br><strong> Johns Hopkins University / Applied Physics Laboratory</strong></h3>
    <h3><strong>12:00–1:00pm Friday, April 27, 2018, ITE 237, UMBC</strong></h3>
    <p>In the newly coined Privacy Age, researchers are building systems with homomorphic algorithms that enable “never decrypt” operations on sensitive data in applications such as computational private information retrieval (cPIR). The trouble is, the leading algorithms incur significant computational and space challenges, relegating them mainly to large cloud computing platforms. We have invented a special-purpose, ring-homomorphic (aka, “fully homomorphic”) algorithm that, owing to some specializing assumptions, trades general-purpose cryptographic utility for linear performance in speed and space.</p>
    <p>We will present the cryptosystem and discuss several current challenges. We will also throw in a fun, simple, tactile concept demonstration of PIR for those just generally curious about what all this is, hopefully demystifying how you can enable a server to search for something without knowing what it’s looking for, and without knowing what (if any) results it found.</p>
    <p>Russ Fink (UMBC ’10) is a senior scientist at the Johns Hopkins University / Applied Physics Laboratory. His current research interests include private information retrieval, applied cryptography, and cyber security.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/04/umbc-cybersecurity-talk-sparcle-practical-homomorphic-encryption-12pm-fri-4-27/" rel="nofollow external" class="bo">talk: SPARCLE: Practical Homomorphic Encryption, 12pm Fri 4/27</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC Cyber Defense Lab   SPARCLE: Practical Homomorphic Encryption   Russ Fink    Senior Scientist  Johns Hopkins University / Applied Physics Laboratory   12:00–1:00pm Friday, April 27, 2018, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2018/04/umbc-cybersecurity-talk-sparcle-practical-homomorphic-encryption-12pm-fri-4-27/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/76057/guest@my.umbc.edu/ddd021406cf0d2d9753550e1189845d6/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 25 Apr 2018 14:09:26 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="75929" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/75929">
<Title>SFS cyberdefense scholarship applications due April 27</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2014/03/CYBERCORPS.jpg" style="max-width: 100%; height: auto;"></p>
    <h1><strong>SFS cyberdefense scholarship applications due April 27</strong></h1>
    <p>The next application deadline for SFS cyberdefense scholarships to UMBC is 12noon Friday April 27, 2018, for possible scholarships beginning fall 2018. See <a href="http://www.cisa.umbc.edu">www.cisa.umbc.edu</a> for details and application forms.</p>
    <p>These major scholarships include tuition, generous stipend, and more, in return for government employment. Applicants must have at least junior status in fall 2018. BS, MS, MPS, PhD in any cyber-related field may apply (CS, CE, EE, IS, Cyber). SFS applicants must be citizens or lawful permanent residents capable of obtaining a secret clearance at federal, state, local, or tribal government. The annual stipends are $22,500 undergraduate and $34,000 graduate.</p>
    <p>These scholarships are highly competitive (e.g., the median GPA of current SFS scholars at UMBC is 3.8) and favor students who have excelled in upper-level technical courses and who have demonstrated a passion and talent for cybersecurity through relevant accomplishments. We will consider applications from rising juniors and above with GPA over 3.0. All SFS scholars at UMBC are expected to engage in cohort and research activities. For more information, see the <a href="https://www.sfs.opm.gov/StudFAQ.aspx" rel="nofollow external" class="bo">SFS FAQ</a> page.</p>
    <p>Interested students should contact</p>
    <p>Dr. Alan T. Sherman<br>
    Professor of Computer Science<br>
    Director, UMBC Center for Information Security and Assurance (CISA)<br>
    *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/04/sfs-cyberdefense-scholarship-applications-due-april-27-umbc-cybersecurity/" rel="nofollow external" class="bo">SFS cyberdefense scholarship applications due April 27</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>SFS cyberdefense scholarship applications due April 27   The next application deadline for SFS cyberdefense scholarships to UMBC is 12noon Friday April 27, 2018, for possible scholarships...</Summary>
<Website>https://www.csee.umbc.edu/2018/04/sfs-cyberdefense-scholarship-applications-due-april-27-umbc-cybersecurity/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/75929/guest@my.umbc.edu/adfacb3149561d58afd7e0eb48ca7292/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>sfs</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 21 Apr 2018 11:51:35 -0400</PostedAt>
</NewsItem>

</News>
