<?xml version="1.0"?>
<News hasArchived="true" page="12" pageCount="17" pageSize="10" timestamp="Sun, 19 Apr 2026 19:55:57 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=12">
<NewsItem contentIssues="true" id="83516" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/83516">
<Title>talk: Why are memory-corruption bugs still a thing?, 10:30am Mon 4/8, ITE325</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/04/vulnerability-1024x461.png" alt="" style="max-width: 100%; height: auto;"><h3><strong>Why are memory-corruption bugs still a thing? </strong></h3>
    <h3><strong>The challenges of securing software at an assembly level</strong></h3>
    
    
    
    <p><strong>Doug Britton</strong><br><strong>CTO, RunSafe Security Inc.</strong></p>
    
    
    
    <p><strong>10:30-11:30 Monday, 8 April 2019, ITE346</strong><br></p>
    
    
    
    <p>Methods to chip away at the danger of memory-corruption bugs have been available for some time.  Why has the going-price of memory-corruption-based exploits not spiked?  If the methods were have a broad-based result in mitigating exploit vectors, there would be a reduction in supply, causing an increase in prices.  Also, there would be a reduction in the pool of people qualified to develop zero-days, allowing them to push the prices up.  The data suggest that prices have remained generally stable and attackers are able to move with impunity.  What are the challenges to large-scale adoption of memory-corruption based mitigation methods.  <br></p>
    
    
    
    <hr><p>Doug Britton serves as Chief Technology Officer and Director of <a href="https://runsafesecurity.com/" rel="nofollow external" class="bo">RunSafe Security</a>, Inc. Mr. Britton Co-founded Kaprica Security, Inc., in 2011 and serves as its Chief Executive Officer. Prior to his leadership role in Kaprica, Mr. Britton was a cyber-security focused research and development manager at Lockheed Martin. He has an MBA and MS from University of Maryland and a BS in Computer Science from the University of Illinois.<br></p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/04/talk-why-are-memory-corruption-bugs-still-a-thing-umbc-cybersecurity/" rel="nofollow external" class="bo">talk: Why are memory-corruption bugs still a thing?, 10:30am Mon 4/8, ITE325</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Why are memory-corruption bugs still a thing?    The challenges of securing software at an assembly level      Doug Britton CTO, RunSafe Security Inc.      10:30-11:30 Monday, 8 April 2019, ITE346...</Summary>
<Website>https://www.csee.umbc.edu/2019/04/talk-why-are-memory-corruption-bugs-still-a-thing-umbc-cybersecurity/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/83516/guest@my.umbc.edu/52431b447531c3ba39864f7200ff8c47/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 07 Apr 2019 11:00:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="83038" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/83038">
<Title>SFS cyberdefense scholarship applications due April 15&#65279;</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2014/03/CYBERCORPS.jpg" alt="" style="max-width: 100%; height: auto;"><h2><strong>SFS cyberdefense scholarship applications due Noon Monday, April 15</strong></h2>
    
    
    
    <p>The next application deadline for <a href="https://www.sfs.opm.gov/" rel="nofollow external" class="bo">SFS cyberdefense scholarships</a> at UMBC is 12:00 noon Monday, 15 April 2019, for possible scholarships beginning in the fall of 2019. See the <a href="https://cisa.umbc.edu/" rel="nofollow external" class="bo">Center for Information Security and Assurance</a> site for details and application forms.</p>
    
    
    
    <p>These major scholarships include tuition, generous stipend, and more, in return for government employment. Applicants must have at least junior status in fall 2019.  BS, MS, MPS, PhD in any cyber-related field may apply (CS, CE, EE, IS, Cyber, and possibly others).  SFS applicants must be citizens or lawful permanent residents capable of obtaining a secret clearance at federal, state, local, or tribal government. The annual stipends are $25,000 undergraduate and $34,000 graduate; in addition, each scholar will receive $6000 per year in professional development funds.</p>
    
    
    
    <p>The scholarships are highly competitive (e.g., the median GPA of current SFS scholars at UMBC is 3.8) and favor students who have excelled in upper-level technical courses and who have demonstrated a passion and talent for cybersecurity through relevant accomplishments.  We will consider applications from rising juniors and above with GPA over 3.0.  All SFS scholars at UMBC are expected to engage in cohort and research activities. UMBC is in the first year of a five -year, $5 million NSF grant, which will support 34 students. For more information, see the <a href="https://www.sfs.opm.gov/StudFAQ.aspx" rel="nofollow external" class="bo">SFS FAQ</a> page.</p>
    
    
    
    <p>Interested students should contact</p>
    
    
    
    <p>Dr. Alan T. Sherman<br>Professor of Computer Science<br>Director, UMBC Center for Information Security and Assurance (CISA)<br>*protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/03/umbc-cybersecurity-cybercorps-sfs-cyberdefense-scholarship-application-april-15-2019/" rel="nofollow external" class="bo">SFS cyberdefense scholarship applications due April 15</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>SFS cyberdefense scholarship applications due Noon Monday, April 15      The next application deadline for SFS cyberdefense scholarships at UMBC is 12:00 noon Monday, 15 April 2019, for possible...</Summary>
<Website>https://www.csee.umbc.edu/2019/03/umbc-cybersecurity-cybercorps-sfs-cyberdefense-scholarship-application-april-15-2019/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/83038/guest@my.umbc.edu/91500dc4a6263577fe4ed9a6f3498b60/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>education</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 21 Mar 2019 09:10:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="81984" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81984">
<Title>talk and demo: Exploiting IoT Vulnerabilities, 11:45-1:00pm Mon 2/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <h1><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/iotsecurity.png" alt="" style="max-width: 100%; height: auto;"></h1>
    <h1><strong>Exploiting IoT Vulnerabilities</strong></h1>
    <h3>Dr. Yatish Joshi, Senior Engineer, Cisco Systems</h3>
    <h4>11:45am-1:00pm Monday, 18 February 2019, ITE 325-B</h4>
    <p>The past decade has seen explosive growth in the use and deployment of IoT (Internet of Things) devices. According to Gartner there will be about 20.8 billion IoT devices in use by 2020. These devices are seeing wide spread adoption as they are cheap, easy to use and require little to no maintenance. In most cases, setup simply requires using a web or phone app to configure Wi-Fi credentials. Digital home assistants, security cameras, smart locks, home appliances, smart switches, toys, vacuum cleaners, thermostats, leakage sensors etc are examples of IoT devices that are widely used and deployed in home and enterprise environments.</p>
    <div><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/02/livedemo.png" alt="" style="max-width: 100%; height: auto;"></div>
    <p>The threat landscape is constantly evolving and threat actors are always on the prowl for new vulnerabilities they can exploit. With traditional attack methods yielding fewer exploits   due to the increased focus on security testing, frequent patches, increased user awareness, Threat actors have turned their attention on IoT devices and are exploiting inherent vulnerabilities in these devices. The vulnerabilities, always ON nature, and autonomous mode of operation allow attackers to spy on users, spoof data, or leverage them as botnet infrastructure to launch devastating attacks on third parties. Mirai, a well known IoT malware utilized hundreds and thousands of enslaved IoT devices to launch DDoS attacks on Dyn affecting access to Netflix, Twitter, Github and many other websites. With the release of the Mirai source code numerous variants of the malware are infecting IoT devices across the world and using them to carry out attacks.</p>
    <p>These attacks are made possible because the devices are manufactured without security in mind!. In this talk I will demonstrate how one can hack a widely available off-the-shelf IP Camera and router by exploiting the vulnerabilities present in these devices to get on the network, steal personal data, spy on a user, disrupt operation etc. We will also look at what can be done to mitigate the dangers posed by IOT devices.</p>
    <p>So attend hack &amp; defend!</p>
    <p>Dr. <a href="https://www.linkedin.com/in/yatish-joshi-aa064b13/" rel="nofollow external" class="bo">Yatish Joshi</a> is a software engineer in the Firepower division at Cisco Systems where he works on developing new features for Cisco’s security offerings. Yatish has a PhD in Computer Engineering from UMBC. Prior to Cisco Yatish worked as a lecturer at UMBC, and was a senior software engineer developing TV software at Samsung Electronics. When not working, he enjoys reading spy thrillers and fantasy novels.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/02/umbc-talk-exploiting-iot-vulnerabilities-security-internet-of-things/" rel="nofollow external" class="bo">talk and demo: Exploiting IoT Vulnerabilities, 11:45-1:00pm Mon 2/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Exploiting IoT Vulnerabilities   Dr. Yatish Joshi, Senior Engineer, Cisco Systems   11:45am-1:00pm Monday, 18 February 2019, ITE 325-B   The past decade has seen explosive growth in the use and...</Summary>
<Website>https://www.csee.umbc.edu/2019/02/umbc-talk-exploiting-iot-vulnerabilities-security-internet-of-things/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81984/guest@my.umbc.edu/9dfa6538945e4c821638d88994576150/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 08 Feb 2019 22:21:57 -0500</PostedAt>
<EditAt>Sun, 17 Feb 2019 16:00:57 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81612" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81612">
<Title>talk: Using Deep Learning in Identifying Network Intrusions, 10:30am Mon 2/11, UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/machine_room-1024x536.png" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h1>Using Deep Learning in Identifying Network Intrusions</h1>
    <h3>Dr. Rajeev Agrawal<br>
    Information Technology Laboratory<br>
    US Army Engineer Research and Development Center</h3>
    <h3>10:30-11:30 Monday, February 11, 2019, ITE325</h3>
    <p>Deep Learning algorithms have been very successful in computer vision, natural language processing, and speech recognition. However, there is a big challenge in applying it in cyber security domain due to non‐availability of ‘real’ cybersecurity data. Many researchers have tried using synthetic data such as KDD‐NSL or newer UNSW-NB15 network intrusion datasets, however, it is difficult to determine the performance of the proposed research on a dataset captured from an enterprise network. The DoD’s High Performance Computing Modernization Program (HPCMP) operates Defense Research Engineering network (DREN), which has multiple security software and hardware tools installed across the network. A variety of cybersecurity logs are captured using these tools. We use a TensorFlow based framework to analyze DREN’s Bro alert data generated under Cybersecurity Environment for Detection, Analysis and Reporting (CEDAR) project. These alerts are marked as bad or normal by the cybersecurity analysts and used as ground truths. This labeled data is used to measure the performance of our approach in identifying network intrusions. We are able to achieve high level accuracy by tuning hyper-parameters used in any deep learning approach. In this presentation, we will discuss the results of our approach which harnesses the power of HPC systems to train our proposed model.</p>
    <p><a href="https://www.linkedin.com/in/ragrawal2/" rel="nofollow external" class="bo"><strong>Dr. Rajeev Agrawal</strong></a> joined Cyber Engineering and Analysis branch (CEAB), Information Technology Laboratory in 2016. He is the Data Science lead of the High Performance Computing Architecture (HPC) for Cyber Situational Awareness (HACSAW) Project. The goal of this project is to analyze the cybersecurity data captured across Defense Research and Engineering Network (DREN). He is also a member of the HPC-based deep learning project team and exploring deep learning applicability in cybersecurity domain. Dr. Agrawal received his Ph.D. in Computer Science with minor in Engineering from Wayne State University in 2009. Prior to joining ITL, he was an Associate Professor in the Department of Computer Systems Technology at North Carolina A&amp;T State University.  Dr. Agrawal’s research interests include Deep Learning, Cyber Security, SCADA/ICS, Machine Learning and Pattern Recognition. He has published more than 80 technical papers and book chapters in refereed conferences and journals in these areas. He was selected a Data Science Fellow by the National Consortium of Data Science (NCDS) in 2014. His research has been funded by NSF, US Army, John Deere, ACM, RedHat, National Consortium of Data Science and Michigan State University.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/talk-using-deep-learning-in-identifying-network-intrusions-1030am-mon-2-11-umbc/" rel="nofollow external" class="bo">talk: Using Deep Learning in Identifying Network Intrusions, 10:30am Mon 2/11, UMBC</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Using Deep Learning in Identifying Network Intrusions   Dr. Rajeev Agrawal  Information Technology Laboratory  US Army Engineer Research and Development Center   10:30-11:30 Monday, February...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/talk-using-deep-learning-in-identifying-network-intrusions-1030am-mon-2-11-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81612/guest@my.umbc.edu/e67516e735d4bb31c91bfecf68c17168/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 24 Jan 2019 15:58:15 -0500</PostedAt>
<EditAt>Thu, 24 Jan 2019 15:58:15 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81499" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81499">
<Title>Maryland Data Science Conference, Fri. 1/25, UMBC (new date)</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <a href="https://www.csee.umbc.edu/wp-content/uploads/2019/01/mddsc-1.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/mddsc-1-1024x536.png" style="max-width: 100%; height: auto;"></a></p>
    <h1>MD Data Science Conference<br>
    <span>Friday, 25 January, PAH Concert Hall, UMBC</span></h1>
    <p><a href="https://minerkasch.com/" rel="nofollow external" class="bo">Miner &amp; Kasch</a>, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day <a href="https://conf.minerkasch.com/" rel="nofollow external" class="bo">Data Science Conference</a> at UMBC on Friday, January 25 in the <a href="https://artscalendar.umbc.edu/about/umbc-concert-hall/" rel="nofollow external" class="bo">Linehan Concert Hall</a> of the UMBC Performing Arts &amp; Humanities Building. A limited number of <strong>free tickets</strong> are available for current UMBC students. To attend, you need to <a href="https://www.eventbrite.com/e/maryland-data-science-conference-12519-tickets-54996061701" rel="nofollow external" class="bo">register here</a>.</p>
    <p>The event was originally scheduled for January 14, but had to be rescheduled due to inclement weather. If you had registered and obtained a ticket earlier, you will need to <a href="https://www.eventbrite.com/e/maryland-data-science-conference-12519-tickets-54996061701" rel="nofollow external" class="bo">re-register</a>.</p>
    <p>The event brings together local companies and professionals to share what new and exciting things they are doing with their data. It will be attended by business managers, startup founders, software engineers, data scientists, students, and other curious people that want to learn more about the cutting edge of data science, machine learning, and AI. See the <a href="https://conf.minerkasch.com/" rel="nofollow external" class="bo">conference website</a> for topics and speakers.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/maryland-data-science-conference-fri-1-25-umbc-new-date/" rel="nofollow external" class="bo">Maryland Data Science Conference, Fri. 1/25, UMBC (new date)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>MD Data Science Conference  Friday, 25 January, PAH Concert Hall, UMBC   Miner &amp; Kasch, a AI and data science consulting firm founded by two UMBC alumni, will hold a one-day Data Science...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/maryland-data-science-conference-fri-1-25-umbc-new-date/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81499/guest@my.umbc.edu/a7c10e8671c1c437df7c93a02b6663ae/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Fri, 18 Jan 2019 10:24:02 -0500</PostedAt>
<EditAt>Fri, 18 Jan 2019 10:24:02 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81375" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81375">
<Title>Countering Russian disinformation the Baltic nations&#8217; way</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2019/01/tv-1024x486.png" alt="" style="max-width: 100%; height: auto;">
    <p> </p>
    <h1>Countering Russian disinformation the Baltic nations’ way</h1>
    <h2><a href="https://theconversation.com/profiles/terry-thompson-660173" rel="nofollow external" class="bo">Terry Thompson</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></h2>
    <p>As the new Congress begins, it will soon discuss the <a href="https://comprop.oii.ox.ac.uk/research/ira-political-polarization/" rel="nofollow external" class="bo">comprehensive reports</a> to the U.S. Senate on the <a href="https://www.newknowledge.com/disinforeport" rel="nofollow external" class="bo">disinformation campaign</a> of half-truths, outright fabrications and misleading posts made by agents of the Russian government on social media in the run-up to the 2016 presidential election.</p>
    <p>After years of <a href="https://www.nytimes.com/2018/07/04/opinion/cyber-war-russia-china.html" rel="nofollow external" class="bo">anemic responses to Russian influence efforts</a>, official U.S. government policy now includes taking action to combat disinformation campaigns sponsored by Russia or other countries. In May 2018, the <a href="https://www.intelligence.senate.gov/publications/russia-inquiry" rel="nofollow external" class="bo">Senate Intelligence Committee endorsed</a> the concept of treating attacks on the nation’s election infrastructure as hostile acts to which the U.S. “will respond accordingly.” In June, the <a href="https://www.nytimes.com/2018/06/17/us/politics/cyber-command-trump.html" rel="nofollow external" class="bo">Pentagon unleashed U.S. Cyber Command</a> to respond to cyberattacks more aggressively, and the <a href="https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf" rel="nofollow external" class="bo">National Cyber Strategy</a> published in September 2018 clarified that “all instruments of national power are available to prevent, respond to, and deter malicious cyber activity against the United States.”</p>
    <p>There are already indications that <a href="https://www.nytimes.com/2018/10/23/us/politics/russian-hacking-usa-cyber-command.html" rel="nofollow external" class="bo">Cyber Command conducted operations</a> against Russian disinformation on social media, including warning specific Russians not to interfere with the 2018 elections. However, low-level cyberwarfare is not necessarily the best way. European countries, especially the Baltic states of Estonia, Latvia and Lithuania, have confronted Russian disinformation campaigns for decades. <a href="https://www.npr.org/2018/03/10/592566026/baltic-countries-on-countering-russian-disinformation" rel="nofollow external" class="bo">Their experience</a> may offer useful lessons as the U.S. joins the battle.</p>
    <div>
    <a href="https://images.theconversation.com/files/252765/original/file-20190107-32145-1iuqxhk.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/252765/original/file-20190107-32145-1iuqxhk.png?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=237&amp;fit=clip" alt="" style="max-width: 100%; height: auto;"></a><span>The Baltic Sea region of northern Europe. Estonia, Latvia and Lithuania are in light green in the center, west of Russia in blue. </span><span><a href="https://commons.wikimedia.org/wiki/File:Baltic_Sea.png" rel="nofollow external" class="bo">Stefan Ertmann/ Wikimedia Commons</a>, <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="nofollow external" class="bo">CC BY-SA</a></span>
    </div>
    <h2>The Baltic experience</h2>
    <p>Beginning in 1940 and continuing until they declared independence in the early 1990s, the Baltic countries were subjected to systematic <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">Russian gaslighting</a> designed to make people doubt their national history, culture and economic development.</p>
    <p>The Soviets rewrote history books to falsely emphasize Russian protection of the Baltic people from invading hordes in the Middle Ages, and to convey the impression that the cultural evolution of the three countries was enabled by their allegiance and close ties to Russia. Even their <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">national anthems were rewritten</a> to pay homage to Soviet influence.</p>
    <p>Soviet leaders devalued Baltic currencies and manipulated economic data to <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">falsely suggest that Soviet occupation</a> was boosting the Baltic economies. Further, Soviet authorities settled ethnic Russians in the Baltic countries, and <a href="https://www.worldcat.org/title/ideology-and-policy-the-political-uses-of-doctrine-in-the-soviet-union/oclc/16951330" rel="nofollow external" class="bo">made Russian the primary language</a> used in schools.</p>
    <p>Since the fall of the Soviet Union and the independence of the Baltic countries, the Russian Federation has continued to deliver disinformation to the region, making extensive use of <a href="https://www.stratcomcoe.org/virtual-russian-world-baltics" rel="nofollow external" class="bo">Russian-language social media</a>. Some themes characterize the Baltic people as ungrateful for Soviet investment and aid after World War II. Another common message <a href="https://www.stratcomcoe.org/gatis-krumins-soviet-economic-gaslighting-latvia-and-baltic-states" rel="nofollow external" class="bo">criticizes Baltic historians</a> for “falsification of history” when really they are describing the real nature of the Soviet occupation.</p>
    <h2>A massive Russian attack</h2>
    <p>After independence, and as the internet grew, Estonia led the way in <a href="https://www.economist.com/the-economist-explains/2013/07/30/how-did-estonia-become-a-leader-in-technology" rel="nofollow external" class="bo">applying technology to accelerate economic development</a>. The country created systems for a wide range of government and commercial services, including voting, banking and filing tax returns electronically. Today, Estonia’s innovative <a href="https://www.economist.com/europe/2017/07/06/estonia-is-trying-to-convert-the-eu-to-its-digital-creed" rel="nofollow external" class="bo">e-residency system</a> is being adopted in many other countries.</p>
    <p>These advances made the Baltics a prime target for cyberattacks. In the spring of 2007, the Russians struck. When Estonia <a href="http://www.spiegel.de/international/europe/deadly-riots-in-tallinn-soviet-memorial-causes-rift-between-estonia-and-russia-a-479809.html" rel="nofollow external" class="bo">moved a monument memorializing Soviet soldiers</a> from downtown Tallinn, the country’s capital, to a military cemetery a couple of miles away, it provoked the ire of ethnic Russians living in Estonia as well as the Russian government.</p>
    <a href="https://images.theconversation.com/files/252754/original/file-20190107-32139-gz1jgy.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/252754/original/file-20190107-32139-gz1jgy.jpg" style="max-width: 100%; height: auto;"></a><span>The relocation of the Bronze Soldier of Tallinn sparked a Russian cyberattack on Estonia in 2007.</span><br>
    <span><a href="https://www.flickr.com/photos/99437479@N00/680737463" rel="nofollow external" class="bo">Keith Ruffles/Wikimedia Commons</a>, <a href="http://creativecommons.org/licenses/by/4.0/" rel="nofollow external" class="bo">CC BY</a></span>
    <p>For three weeks, Estonian government, financial and media computer systems were <a href="https://www.wired.com/2007/08/ff-estonia/" rel="nofollow external" class="bo">bombarded with enormous amounts of internet traffic</a> in a “distributed denial of service” attack. In these situations, an attacker sends overwhelming amounts of data to the targeted internet servers, clogging them up with traffic and either slowing them down or knocking them offline entirely. Despite concerns about the first “cyber war,” however, these attacks resulted in <a href="https://www.cfr.org/book/hacked-world-order" rel="nofollow external" class="bo">little damage</a>. Although Estonia was cut off from the global internet temporarily, the country’s economy suffered no lasting harm.</p>
    <p>These attacks could have severely damaged the country’s financial system or power grid. But <a href="https://ccdcoe.org/sites/default/files/multimedia/pdf/CDU_Analysis.pdf" rel="nofollow external" class="bo">Estonia was prepared</a>. The country’s history with Russian disinformation had led Estonia to expect Russian attacks on computer and information systems. In anticipation, the government spearheaded partnerships with banks, internet service providers and other organizations to coordinate responses to cyberattacks. In 2006, Estonia was one of the first countries to create a <a href="https://www.ria.ee/en/cyber-security/cert-ee.html" rel="nofollow external" class="bo">Computer Emergency Response Team</a> to manage security incidents.</p>
    <h2>The Baltic response</h2>
    <p>After the 2007 attack, the Baltic countries <a href="https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/" rel="nofollow external" class="bo">upped their game even more</a>. For example, Estonia created the Cyber Defense League, an army of volunteer specialists in information technology. These <a href="https://ccdcoe.org/sites/default/files/multimedia/pdf/CDU_Analysis.pdf" rel="nofollow external" class="bo">experts focus on</a> sharing threat information, preparing society for responding to cyber incidents and participating in international cyber defense activities.</p>
    <p>Internationally, Estonia gained approval in 2008 to establish NATO’s <a href="https://ccdcoe.org/history.html" rel="nofollow external" class="bo">Cooperative Cyber Defense Center of Excellence</a> in Tallinn. Its comprehensive research into global cyber activities helps identify best practices in cyber defense and training for NATO members.</p>
    <p>In 2014, Riga, the capital of neighboring Latvia, became home to another NATO organization combating Russian influence, the <a href="https://www.stratcomcoe.org/" rel="nofollow external" class="bo">Strategic Communications Center of Excellence</a>. It publishes reports on Russian disinformation activities, such as the May 2018 study of the “<a href="https://www.stratcomcoe.org/virtual-russian-world-baltics" rel="nofollow external" class="bo">Virtual Russian World in the Baltics</a>.” That report analyzes Russian social media activities targeting Baltic nations with a “toxic mix of disinformation and propaganda.” It also provides insight into identifying and detecting Russian disinformation campaigns.</p>
    <p>“<a href="https://www.dw.com/en/baltics-battle-russia-in-online-disinformation-war/a-40828834" rel="nofollow external" class="bo">Baltic elves</a>” – volunteers who monitor the internet for Russian disinformation – became active in 2015 after the <a href="https://www.dw.com/en/poroshenko-calls-maidan-a-victorious-battle-in-war-for-independence/a-18271774" rel="nofollow external" class="bo">Maidan Square events</a> in the Ukraine. And the Baltic nations have <a href="https://www.fpri.org/article/2017/07/fighting-disinformation-baltic-states/" rel="nofollow external" class="bo">fined or suspended media channels</a> that display bias.</p>
    <p>The Baltic countries also rely on a European Union agency formed in 2015 <a href="https://eeas.europa.eu/headquarters/headquarters-Homepage/2116/questions-and-answers-about-east-stratcom-task-force_en" rel="nofollow external" class="bo">to combat Russian disinformation campaigns</a> directed against the EU. The agency identifies disinformation efforts and publicizes accurate information that the Russians are seeking to undermine. A new effort will <a href="https://www.baltictimes.com/estonia_welcomes_eu_action_plan_for_tackling_disinformation/" rel="nofollow external" class="bo">issue rapid alerts to the public</a> when potential disinformation is directed against the 2019 European Parliament elections.</p>
    <h2>Will the ‘Baltic model’ work in the US?</h2>
    <p>Because of their political acknowledgment of threats and actions taken by their governments to fight disinformation, a 2018 study rated Estonia, Latvia and Lithuania the three European Union members <a href="https://www.europeanvalues.net/vyzkum/prague-manual/" rel="nofollow external" class="bo">best at responding to Russian disinformation</a>.</p>
    <div class="embed-container"><iframe src="https://www.youtube.com/embed/xSIkkza9TVI?wmode=transparent&amp;start=0" frameborder="0" webkitAllowFullScreen="webkitAllowFullScreen" mozallowfullscreen="mozallowfullscreen" allowFullScreen="allowFullScreen">[Video]</iframe></div><span>A look inside Russia’s propaganda machine.</span>
    <p>Some former U.S. officials have suggested <a href="https://www.washingtonpost.com/opinions/four-steps-to-fight-foreign-interference-in-us-elections/2018/02/14/fb99b7a0-11c1-11e8-8ea1-c1d91fcec3fe_story.html" rel="nofollow external" class="bo">adopting similar practices</a>, including publicizing disinformation efforts and evidence tying them to Russia. The <a href="https://www.intelligence.senate.gov/publications/russia-inquiry" rel="nofollow external" class="bo">Senate Intelligence Committee</a> has called for that too, as has <a href="https://www.atlanticcouncil.org/publications/reports/the-kremlins-trojan-horses-3-0" rel="nofollow external" class="bo">the Atlantic Council, an independent think tank</a> that focuses on international affairs.</p>
    <p>The U.S. could also mobilize volunteers to <a href="https://warontherocks.com/2018/01/estonias-approach-cyber-defense-feasible-united-states/" rel="nofollow external" class="bo">boost citizens’ and businesses’ cyberdefenses</a> and teach people to identify and combat disinformation.</p>
    <p>Disinformation is a <a href="https://www.fpri.org/article/2015/10/russian-propaganda-disinformation-and-estonias-experience/" rel="nofollow external" class="bo">key part of Russia’s overall effort</a> to undermine Western governments. As a result, the battle is ever-changing, with Russians constantly trying new angles of attack and target countries like the Baltic nations identifying and thwarting those efforts. The most effective responses will involve coordination between <a href="https://www.stratcomcoe.org/government-responses-malicious-use-social-media" rel="nofollow external" class="bo">governments</a>, <a href="https://www.stratcomcoe.org/industry-responses-malicious-use-social-media" rel="nofollow external" class="bo">commercial technology companies</a> and the <a href="https://www.stratcomcoe.org/role-communicators-countering-malicious-use-social-media" rel="nofollow external" class="bo">news industry and social media platforms</a> to identify and address disinformation.</p>
    <p>A similar approach may work in the U.S., though it would require far more collaboration than has existed so far. But backed by the new government motivation to <a href="https://www.whitehouse.gov/wp-content/uploads/2018/09/National-Cyber-Strategy.pdf" rel="nofollow external" class="bo">strike back when provoked</a>, the methods used in the Baltic states and across Europe could provide a powerful new <a href="https://theconversation.com/cybersecuritys-next-phase-cyber-deterrence-67090" rel="nofollow external" class="bo">deterrent against Russian influence</a> in the West.<a href="https://theconversation.com/profiles/terry-thompson-660173" rel="nofollow external" class="bo">Terry Thompson</a>, Adjunct Instructor in Cybersecurity, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/countering-russian-disinformation-the-baltic-nations-way-109366" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2019/01/countering-russian-disinformation-the-baltic-nations-way/" rel="nofollow external" class="bo">Countering Russian disinformation the Baltic nations’ way</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    Countering Russian disinformation the Baltic nations’ way   Terry Thompson, University of Maryland, Baltimore County   As the new Congress begins, it will soon discuss the comprehensive...</Summary>
<Website>https://www.csee.umbc.edu/2019/01/countering-russian-disinformation-the-baltic-nations-way/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81375/guest@my.umbc.edu/a350d593836de7c81b20d53551d95590/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>4</PawCount>
<CommentCount>1</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 10 Jan 2019 22:25:39 -0500</PostedAt>
<EditAt>Thu, 10 Jan 2019 22:25:39 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81075" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/81075">
<Title>Workshop on Usable Security, 10-4 Tue 12/18</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/04/keys.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <p> </p>
    <h4>The UMBC Cyber Defense Lab</h4>
    <h1>Workshop on Usable Security</h1>
    <h3>Nikola K. Blanchard<br>
    10am-4pm, Tuesday, 18 December, 2018, ITE 228, UMBC</h3>
    <p> </p>
    <p>We invite people interested in cybersecurity to join us for research conversations with Nikola Blanchard, an expert in usable security. Visitors are welcome to participate in any or all of the workshop.</p>
    <p>How do we make better codes and passwords? As security constraints increased at the expense of usability, we saw no real improvement in practical performance. This session will introduce some basic notions of usability of security (with applications to voting technology), and the first mental-only password management algorithm. Participants will then be presented with the problem of evaluating such algorithms, and will have a brainstorming activity on designing alternative methods.</p>
    <p><strong>Biographical Sketch.</strong> After an initial training in mathematics and informatics at ENS Paris, <a href="http://www.koliaza.com/" rel="nofollow external" class="bo">Nikola K. Blanchard</a> started a PhD at IRIF, supervised by Nicolas Schabanel and Ted Selker. In 2015, they joined the Random Sample Voting Project to develop voting protocols, prevent vote selling and improve the deployment of new voting technologies, organizing multiple test elections. They recently started doing research on usability of security with Ted Selker, initially for secure voting technologies but expanding into the field of password research. As e-democracy research requires not just security or usability but also political science, they joined the Chôros think tank and teamed up with Géza Tessényi to co-found the Public Opinion Platform, adding the deliberation aspect needed for any e-democracy project. They are currently in the process of publishing a book on the use of randomness in political institutions.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>Biweekly Cyber Defense Lab meetings will resume in the spring term, 12noon-1pm on Fridays</p>
    <p>This event is supported in part by the National Science Foundation under <a href="https://www.nsf.gov/awardsearch/showAward?AWD_ID=1241576" rel="nofollow external" class="bo">SFS Grant 1241576</a></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/12/workshop-usable-security-umbc/" rel="nofollow external" class="bo">Workshop on Usable Security, 10-4 Tue 12/18</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    The UMBC Cyber Defense Lab   Workshop on Usable Security   Nikola K. Blanchard  10am-4pm, Tuesday, 18 December, 2018, ITE 228, UMBC       We invite people interested in cybersecurity to join...</Summary>
<Website>https://www.csee.umbc.edu/2018/12/workshop-usable-security-umbc/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81075/guest@my.umbc.edu/e29f7a9b6410944c8642db1ebc0bd356/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>events</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 17 Dec 2018 09:31:39 -0500</PostedAt>
<EditAt>Mon, 17 Dec 2018 09:31:39 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80330" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80330">
<Title>talk: Challenges of Smart Cities Cybersecurity and Privacy with Blockchain, 11am Thr 11/15</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/blockchain.jpg" alt="" style="max-width: 100%; height: auto;"></p><strong>
    <h1>The Challenges of Smart Cities Cybersecurity and Privacy with Blockchain</h1>
    </strong><p></p>
    <h3>Dr. Jacob Mendel, Tel Aviv University</h3>
    <h3>11:00am Thursday, 15 November 2018, ITE 459, UMBC</h3>
    <p>The last decades have witnessed unprecedented population and urbanization growth with the implication that today, for the first time in human history, more than half of the world’s population lives in cities. The consequences of the cybersecurity threats of this urbanization trend along with the notion of smart cities are the main subject of this session. The smart city (system of systems) integrates Big-data and the Internet of Things (IoT) to optimize the operation cost, efficiency and to provide a better services to the residents. Smart cities worldwide are checking blockchain as the foundation for urban living. Using blockchain technology in smart city can create a marketplace for Smart Grid.</p>
    <p>The increased complexity of smart cities (system of systems), globally connected, economic and political systems has increased the cybersecurity vulnerability. The cybersecurity threats get magnified by the city big-data and its dependency on the technology. The cybersecurity challenges that smart cities faces demand for research and investment in physical security and economic security. In this session we will highlight various cybersecurity and blockchain parameters of a smart city, existing cybersecurity challenges and possible solutions.</p>
    <p><a href="https://www.linkedin.com/in/dr-jacob-mendel-83650062/" rel="nofollow external" class="bo">Dr. Jacob Mandel</a> is The Moshe Hogeg Blockchain Research Institute managing director at the Tel Aviv University, and former the General Manager Cyber Security COE at Intel. He is a serial cyber security entrepreneur; He has been the CEO and Co-Founder of SCsquare Ltd., where he founded a business enabler for cybersecurity technologies. Dr. Jacob holds 16 approved patents in the area of cybersecurity. His career in cybersecurity over the past 20 years is a unique mixture of broad practical experience and research expertise. His practice included extensive involvement in cybersecurity offensive projects (software and hardware), business development and product management. Proven worldwide track records in secure operating systems, digital rights management, security certification (CC, FIPS), penetration test, reverses engineering, Machine Learning, Blockchain, IoT security and Smart Grid cybersecurity.</p>
    <p>His current main research interest is on The Economic Perspective on Smart Grid Cybersecurity and Blockchain technology with a special focus on malware attacks, privacy issues and business continuation. He holds a PhD in Economics from Poznan University of Economics and Business, Poland and Masters of Business Administration (MBA) degree from Ben-Gurion University of the Negev, Israel.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/talk-challenges-of-smart-cities-cybersecurity-and-privacy-with-blockchain-11am-thr-11-15/" rel="nofollow external" class="bo">talk: Challenges of Smart Cities Cybersecurity and Privacy with Blockchain, 11am Thr 11/15</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The Challenges of Smart Cities Cybersecurity and Privacy with Blockchain     Dr. Jacob Mendel, Tel Aviv University   11:00am Thursday, 15 November 2018, ITE 459, UMBC   The last decades have...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/talk-challenges-of-smart-cities-cybersecurity-and-privacy-with-blockchain-11am-thr-11-15/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80330/guest@my.umbc.edu/2a2bf81bd171488351077035c9b9804a/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 13 Nov 2018 08:15:00 -0500</PostedAt>
<EditAt>Tue, 13 Nov 2018 08:15:00 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80259" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80259">
<Title>UMBC&#8217;s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <h1><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/11/Sherman-Forno-NSF-5116-1920x768.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/Sherman-Forno-NSF-5116-1920x768-1024x410.jpg" alt="" style="max-width: 100%; height: auto;"></a></h1>
    <p></p><strong>
    <h1>UMBC’s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education</h1>
    </strong><p><br>
    The National Science Foundation recently awarded <strong>Alan Sherman</strong>, professor of computer science and electrical engineering (CSEE), and his colleagues, two grants totaling over five million dollars to support students and research at UMBC.</p>
    <p><strong>Tools to assess learning</strong></p>
    <p>One of the two NSF grants asks the question, what is the most effective way to teach cybersecurity—with competitions, games, hands-on experiences, or other techniques? Through this award, Sherman and colleagues will focus on developing evidence-based tools to assess the effectiveness of various approaches to teaching cybersecurity.</p>
    <p>Sherman is working with <strong>Dhananjay Phatak</strong>, associate professor of CSEE; <strong>Linda Oliva</strong>, assistant professor of education; and collaborators at the University of Illinois at Urbana-Champaign to create two educational Cybersecurity Assessment Tools (CATS) that assesses a student’s conceptual understanding of cybersecurity. The first tool will be a concept inventory for students in any first course in cybersecurity. The second will be for students graduating from college who will be entering a career in cybersecurity.</p>
    <p><strong>Training future cybersecurity professionals</strong></p>
    <p>Sherman was awarded more than $4.9 million over five years through NSF’s CyberCorps: Scholarship for Service (SFS) program. The program is designed to increase the number of cybersecurity professionals that are trained to enter careers in government, focused on protecting the nation’s information, communications, and computer systems. <strong>Rick Forno</strong>, assistant director of UMBC’s Center for Cybersecurity, is co-PI on the new SFS program grant, as well as UMBC’s prior SFS awards.</p>
    <p>This funding will allow Sherman to extend the work that he began with support from his previous NSF CyberCorps grant, which ends in August 2019. The Scholarship for Service program at UMBC will support 34 students who are pursuing degrees at the undergraduate and graduate levels in computer science, computer engineering, information systems, cybersecurity, and other cyber-related programs.</p>
    <p>The grant funding will also allow Sherman to develop stronger connections with two community colleges in Maryland. Each year, one student graduating from Montgomery College and one student graduating from Prince George’s Community College will be selected to participate in the program beginning in their last year at community college, and continuing through their transfer to UMBC to complete their four-year degree. This collaboration will continue to strengthen the talent pipeline and increase the number of cybersecurity professionals who pursue public service careers.</p>
    <p><strong>The scholar experience</strong></p>
    <p>The SFS program and other cybersecurity education initiative help students develop their abilities to be prudent, thoughtful, and strategic in “managing trust and information in an adversarial cyber world.” Sherman explains, “Students must also pay careful attention to details and master relevant technical knowledge and skills, such as cryptology, network protocols, system design, and secure programming.”</p>
    <p>Each student who receives a scholarship completes a summer internship with a government agency at the local, state, federal, or tribal level. Each recipient is also required to complete government service in a cybersecurity-related position in their field after graduation.</p>
    <p>Based on a cohort model, the UMBC program encourages the SFS scholars to learn from each other and to engage in cybersecurity research on campus, such as through Sherman’s Cyber Defense Lab. Each January, the scholars complete a week-long collaborative research project in which they analyze a specific aspect of the security of UMBC’s computer system.</p>
    <p>“As we enter the next five years of this grant, UMBC’s SFS program remains a unique, robust opportunity for students to explore the wide range of possibilities in the cybersecurity discipline,” explains Forno. “It allows them to fully prepare for and commit themselves to entering the federal cyber workforce, and make a difference on Day One no matter where they begin their careers in the service of our nation.”</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/umbcs-alan-sherman-and-colleagues-receive-over-5m-in-nsf-support-for-cybersecurity-education/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image: Rick Forno, left, and Alan Sherman. Photo by Marlayna Demond ’11 for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/umbc-alan-sherman-award-nsf-cybersecurity-education-cybercorps-scholarship-service/" rel="nofollow external" class="bo">UMBC’s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>UMBC’s Alan Sherman and colleagues receive over $5M in NSF support for cybersecurity education     The National Science Foundation recently awarded Alan Sherman, professor of computer science and...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/umbc-alan-sherman-award-nsf-cybersecurity-education-cybercorps-scholarship-service/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80259/guest@my.umbc.edu/8ca7c108e9ea38d599ae2d46386b7a36/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>research-awards</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 11 Nov 2018 09:06:35 -0500</PostedAt>
<EditAt>Sun, 11 Nov 2018 09:06:35 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="80129" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80129">
<Title>Richard Forno: Threats remain to US voting system &#8211; and voters&#8217; perceptions of reality</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    </p>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/file-20181106-74772-egm5dt_slider.jpg" style="max-width: 100%; height: auto;">As Americans go to the polls, the voting process and the information environment are still not secure. <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Election-2018-Georgia/c0c2653a5cff44eeb562ada74c3d17bc/3/0" rel="nofollow external" class="bo">AP Photo/David Goldman</a></span>
    <h1><strong>Threats remain to US voting system – and voters’ perceptions of reality</strong></h1>
    <p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>As the 2018 midterms proceed, there are still significant risks to the integrity of the voting system – and information warfare continues to try to influence the American public’s choices when they cast their ballots.</p>
    <p>On the day of the election, there were a number of <a href="https://www.propublica.org/article/oops-we-forgot-to-plug-in-the-voting-machine" rel="nofollow external" class="bo">early hitches in voting at individual polling places</a>, such as <a href="https://bklyner.com/sloppy-start-on-election-day/" rel="nofollow external" class="bo">polling places opening late</a> and vote-counting machines not plugged in. But there seem not – at least not yet – to be major <a href="https://www.propublica.org/electionland/" rel="nofollow external" class="bo">problems across the country</a>.</p>
    <p>However, not all the election-related news and information voters have been encountering in recent days and weeks is accurate, and some of it is deliberately misleading. As this election’s results come back, they will reveal whether the misinformation and propaganda campaigns conducted alongside the political ones were effective.</p>
    <h2>Securing election systems</h2>
    <p>America’s electoral process remains highly fragmented, because of the country’s cherished tradition of decentralized government and local control. While this may leave some individual communities’ voting equipment potentially vulnerable to attack, the nation’s voting process overall may be more trustworthy as a result of this fragmentation. With no unified government agency or office to provide, administer and protect election technologies, there’s not one central national element that could fail or be attacked.</p>
    <p>Across the country, though, many districts’ voters will cast ballots with the <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">help of machines</a> that have <a href="https://theconversation.com/americas-aging-voting-machines-managed-to-survive-another-election-68100" rel="nofollow external" class="bo">long-standing</a> <a href="https://theconversation.com/aging-voting-machines-threaten-election-integrity-54523" rel="nofollow external" class="bo">security concerns</a>. Fortunately, <a href="https://www.axios.com/five-states-without-paper-trail-of-votes-32801015-4ba1-4b41-80ca-ebab2cdda087.html" rel="nofollow external" class="bo">45 states</a> keep a paper record of each vote cast – whether for fear of threats to voting integrity or just <a href="https://www.the-parallax.com/2018/11/03/funding-secure-voting/" rel="nofollow external" class="bo">budget constraints preventing purchase</a> of newer gear. But that means <a href="http://www.pewresearch.org/fact-tank/2016/11/08/on-election-day-most-voters-use-electronic-or-optical-scan-ballots/" rel="nofollow external" class="bo">five states</a> – Louisiana, Georgia, South Carolina, New Jersey and Delaware – don’t keep paper records of their voters’ choices.</p>
    <p><a href="https://www.politico.com/newsletters/morning-cybersecurity/2018/07/12/voting-machine-vendors-under-pressure-277054" rel="nofollow external" class="bo">Voting machine vendors have been reluctant</a> to appear before Congress to explain their systems’ security practices – <a href="https://www.usatoday.com/story/tech/2017/07/30/hackers-defcon-conference-exploit-vulnerabilities-voting-machines/523639001/" rel="nofollow external" class="bo">and shortcomings</a>. However, <a href="https://fcw.com/articles/2018/10/02/nielsen-election-cyber-dhs.aspx" rel="nofollow external" class="bo">federal agencies have helped some states</a> reduce the likelihood of voting machines being hacked or physically tampered with.</p>
    <h2>Beyond voting machines</h2>
    <p>Election security is about much more than voting machines and vote-counting systems, though they are the most visible technologies at work on Election Day. State systems that track voter registrations, or allow users to register online, are enticing targets for hackers, too. Security firm Carbon Black reported that <a href="https://www.forbes.com/sites/daveywinder/2018/10/30/81-5m-voter-records-for-sale-on-dark-web-ahead-of-midterm-elections/" rel="nofollow external" class="bo">81 million voter records from 20 states</a> are available in online forums. This data, obtained by hacking various official and corporate databases, could be used to facilitate voter fraud or sow confusion at polling places on Election Day: How would you feel if you were told that someone using your name and address had already voted?</p>
    <p>There are security concerns even in states like Oregon, where everyone votes on paper and mails in their ballots in advance of Election Day. That <a href="https://lmtribune.com/northwest/phishing-attempts-on-oregon-election-officials-increase/article_938cbf55-cc7d-532b-8f6c-f27bf0150040.html" rel="nofollow external" class="bo">state’s election officials were targeted by hackers</a> seeking to gain access to <a href="https://arstechnica.com/tech-policy/2018/11/file-sharing-software-on-state-election-servers-could-expose-them-to-intruders/" rel="nofollow external" class="bo">state email and database systems</a>. With that access, attackers might be able to digitally impersonate a government official to send false or confusing emails, press releases or other notifications to citizens, journalists or poll workers.</p>
    <p>Also at risk are public-facing official websites that carry election information. Merely changing the reported location of polling places or voting hours could prevent some people from voting. Also vulnerable are states’ methods of announcing preliminary election results. At a major internet security conference in August, children were able to compromise replicas of several states’ election-reporting systems. The most remarkable was that in just 10 minutes, an <a href="https://www.pbs.org/newshour/nation/an-11-year-old-changed-election-results-on-a-replica-florida-state-website-in-under-10-minutes" rel="nofollow external" class="bo">11-year-old boy cracked the security</a> on a copy of the Florida secretary of state’s website and was able to change the publicly announced vote totals for candidates. That could be enough to cast doubt on whatever was later reported as the official results – and the integrity of the system itself.</p>
    <h2>Managing information on social media</h2>
    <p>A more difficult threat to defend against is <a href="https://theconversation.com/how-the-russian-government-used-disinformation-and-cyber-warfare-in-2016-election-an-ethical-hacker-explains-99989" rel="nofollow external" class="bo">information warfare</a>, which doesn’t attack voting machines or election officials’ computers. Rather, it <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">targets voters’ perceptions and decisions</a>, seeking to influence how they vote.</p>
    <p>Long before the 2016 U.S. presidential election, information warfare was influencing elections around the world, including in <a href="https://www.washingtonpost.com/business/economy/russian-disinformation-on-facebook-targeted-ukraine-well-before-the-2016-us-election/2018/10/28/cc38079a-d8aa-11e8-a10f-b51546b10756_story.html" rel="nofollow external" class="bo">Ukraine</a>, <a href="https://www.nytimes.com/2018/10/15/technology/myanmar-facebook-genocide.html" rel="nofollow external" class="bo">Myanmar</a> and <a href="https://www.wired.co.uk/article/egypt-fake-news-facebook-oppress-women" rel="nofollow external" class="bo">Egypt</a>. But after 2016, <a href="https://www.theverge.com/2018/11/5/18056610/facebook-mark-warner-congress-cambridge-analytica" rel="nofollow external" class="bo">Facebook and Twitter came under intense scrutiny</a> for their role in providing digital environments that facilitated the spread of misinformation to sow discontent, and special counsel Robert Mueller began <a href="https://theconversation.com/if-the-12-indicted-russians-never-face-trial-in-the-us-can-anything-be-gained-99997" rel="nofollow external" class="bo">investigating Russians’ influence efforts</a>.</p>
    <p>In the run-up to the 2018 midterms, Russians and others were still hard at work trying to influence Americans to vote in ways that help foreign interests. In October, the U.S. Department of Justice charged a Russian woman with <a href="https://thehill.com/policy/national-security/412287-russian-woman-charged-with-interfering-in-midterm-elections" rel="nofollow external" class="bo">creating thousands of fake social media accounts</a> allegedly representing American citizens to “<a href="https://www.justice.gov/opa/pr/russian-national-charged-interfering-us-political-system" rel="nofollow external" class="bo">create and amplify divisive social media and political content</a>” before the election.</p>
    <p>This year, though, unlike two years ago, <a href="https://www.nytimes.com/2018/10/20/us/politics/2018-digital-misinformation-roundup.html" rel="nofollow external" class="bo">social media companies are taking action</a>. Twitter and Facebook have both <a href="https://theconversation.com/why-do-so-many-people-fall-for-fake-profiles-online-102754" rel="nofollow external" class="bo">deleted thousands of accounts</a> <a href="https://theconversation.com/hate-speech-is-still-easy-to-find-on-social-media-106020" rel="nofollow external" class="bo">they identified</a> as engaging in <a href="https://theconversation.com/even-a-few-bots-can-shift-public-opinion-in-big-ways-104377" rel="nofollow external" class="bo">propaganda and influence-peddling</a>. And they have <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">made other efforts</a> to <a href="https://www.wired.com/story/inside-facebooks-plan-to-safeguard-2018-election/" rel="nofollow external" class="bo">identify and fight falsehoods</a> on their platforms, too.</p>
    <p>Nevertheless, online misinformation continues to thrive. <a href="https://www.knightfoundation.org/reports/disinformation-fake-news-and-influence-campaigns-on-twitter" rel="nofollow external" class="bo">More than 80 percent</a> of the Twitter accounts that often shared links to false and misleading information in 2016 are still active today. And the <a href="https://theconversation.com/unlike-in-2016-there-was-no-spike-in-misinformation-this-election-cycle-105946" rel="nofollow external" class="bo">amount of online misinformation</a> is <a href="https://comprop.oii.ox.ac.uk/research/midterms2018/" rel="nofollow external" class="bo">higher than it was</a> two years ago.</p>
    <h2>Investigating alleged wrongdoing</h2>
    <p>U.S. intelligence and police agencies are concerned about the <a href="https://thehill.com/policy/cybersecurity/412863-officials-prepare-for-potential-false-claims-of-election-interference" rel="nofollow external" class="bo">potential effects of misinformation</a> on the American electorate. But large proportions of the country don’t <a href="https://www.newsmax.com/ronpaul/state-deep-trump-mueller/2018/07/16/id/872012/" rel="nofollow external" class="bo">trust those organizations</a> to be <a href="https://arstechnica.com/tech-policy/2018/11/with-no-evidence-georgias-top-voting-official-accuses-dems-of-cyberattack/" rel="nofollow external" class="bo">politically independent</a>. It doesn’t help that the White House continues to <a href="https://www.washingtonpost.com/politics/without-evidence-trump-and-sessions-warn-of-voter-fraud-in-tuesdays-elections/2018/11/05/e9564788-e115-11e8-8f5f-a55347f48762_story.html" rel="nofollow external" class="bo">claim, without evidence</a>, that <a href="https://www.cnn.com/2018/10/22/politics/donald-trump-voter-fraud/index.html" rel="nofollow external" class="bo">voter fraud</a> is a significant problem.</p>
    <p>Mainstream news organizations can find themselves under scrutiny too, either for <a href="https://www.washingtonpost.com/outlook/2018/10/24/russians-didnt-swing-election-trump-fox-news-might-have/" rel="nofollow external" class="bo">reporting falsehoods</a> that <a href="https://www.pbs.org/newshour/arts/after-a-week-of-russian-propaganda-i-was-questioning-everything" rel="nofollow external" class="bo">appear to gain traction online</a> or for failing to <a href="https://www.poynter.org/news/guide-anti-misinformation-actions-around-world" rel="nofollow external" class="bo">filter out or properly identify inaccurate information</a> for their readers.</p>
    <h2>Looking ahead</h2>
    <p>Protecting democracy is a huge challenge. I’ve written before that it involves <a href="https://theconversation.com/this-election-was-not-hacked-but-it-was-attacked-67511" rel="nofollow external" class="bo">more than technical solutions</a> to computer problems. The U.S. government, and the people it serves, must find the desire and the drive to establish secure and trustworthy procedures for running elections across the country. Education is also key, teaching people from an early age how to recognize propaganda and misinformation, and think critically about the information they encounter. Facts are not subject to alternative views; without widespread agreement on common objective realities, society and government cannot function well.</p>
    <p>Technology continues to evolve, presenting challenges to individuals and society alike. Emerging “<a href="https://theconversation.com/detecting-deepfake-videos-in-the-blink-of-an-eye-101072" rel="nofollow external" class="bo">deepfake</a>” technology is already helping <a href="https://www.lawfareblog.com/deep-fakes-looming-crisis-national-security-democracy-and-privacy" rel="nofollow external" class="bo">create convincing videos of people appearing to say</a> and do things they never said or did. In addition, intelligent social media <a href="https://www.theverge.com/2018/10/15/17980026/social-media-bot-human-difference-ai-study" rel="nofollow external" class="bo">bots are becoming more human-like</a>, making identifying and blocking them much more difficult. That’s just some of the challenges that democracies will face in the future.</p>
    <p>Many of these problems will not have a clearly defined fix, because they involve a nuanced balancing of individual rights and social necessities. Real and lasting solutions must come from civil discourse by rational and objectively informed people who have, above all, the actual honest desire to do it right.<a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article is republished from <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a> under a Creative Commons license. Read the <a href="https://theconversation.com/threats-remain-to-us-voting-system-and-voters-perceptions-of-reality-105545" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/" rel="nofollow external" class="bo">Richard Forno: Threats remain to US voting system – and voters’ perceptions of reality</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>As Americans go to the polls, the voting process and the information environment are still not secure. AP Photo/David Goldman  Threats remain to US voting system – and voters’ perceptions of...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/richard-forno-threats-remain-to-us-voting-system-and-voters-perceptions-of-reality/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80129/guest@my.umbc.edu/cfde4542edba58ca31cbea1ce67bb24d/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 15:03:32 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 15:03:32 -0500</EditAt>
</NewsItem>

</News>
