<?xml version="1.0"?>
<News hasArchived="true" page="13" pageCount="17" pageSize="10" timestamp="Sun, 19 Apr 2026 00:00:43 -0400" url="https://beta.my.umbc.edu/groups/cybersecurity/posts.xml?page=13">
<NewsItem contentIssues="true" id="80114" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/80114">
<Title>talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><br>
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/11/data_privacy_2018.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h1>Legal Aspects of Privacy and Data Protection</h1>
    <h3>Razvan Miutescu<br>
    Privacy Counsel, Whiteford, Taylor &amp; Preston</h3>
    <h3>12:00–1:00pm Friday, 9 November 2018, ITE 227, UMBC</h3>
    <p>Privacy and data security continue to be topics of interest for organizations of all sizes. In addition to being concerned about cyber crimes and data breaches occurring more frequently and with higher operational impact, consumers and regulators around the world are focusing on privacy. Individuals are becoming increasingly aware of the value and the use of the information that identifies them or analyzes their conduct and behavior. Privacy laws around the world are becoming stricter. The European Union’s <a href="https://en.wikipedia.org/wiki/General_Data_Protection_Regulation" rel="nofollow external" class="bo">General Data Protection Regulation</a> (GDPR) is viewed as a flagship law that imposes data protection requirements well beyond the borders of the European Economic Area. California recently passed its Consumer Privacy Act, which borrows concepts from the GDPR, leaving no doubt that privacy laws in the United States are also on track to become more complex. In this context, we will discuss practical legal approaches to an organization’s privacy and data security program.</p>
    <p><a href="https://www.wtplaw.com/professionals/razvan-e-miutescu" rel="nofollow external" class="bo">Razvan Miutescu</a> is a technology and information governance attorney with Whiteford, Taylor &amp; Preston. His practice focuses on privacy and data security, information technology transactions and licensing, intellectual property, and data management, including data broker transactions, cloud services, distributed ledgers/blockchain, and related regulatory and compliance matters. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The <a href="https://cisa.umbc.edu/cdl/" rel="nofollow external" class="bo">UMBC Cyber Defense Lab</a> meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/" rel="nofollow external" class="bo">talk: Legal Aspects of Privacy and Data Protection, 12-1 Fri 11/9</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents   Legal Aspects of Privacy and Data Protection   Razvan Miutescu  Privacy Counsel, Whiteford, Taylor &amp; Preston   12:00–1:00pm Friday, 9 November 2018, ITE...</Summary>
<Website>https://www.csee.umbc.edu/2018/11/talk-legal-aspects-of-privacy-and-data-protection-12-1-fri-11-9/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80114/guest@my.umbc.edu/e8a22fb19468481f39cdcfa024b0c615/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 12:26:47 -0500</PostedAt>
<EditAt>Tue, 06 Nov 2018 12:26:47 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="79464" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/79464">
<Title>Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, &#8230;)</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><img src="https://www.csee.umbc.edu/wp-content/uploads/2017/10/header.png" style="max-width: 100%; height: auto;"></p>
    <h1>Professional Graduate Programs Open House, Sat. 10/20</h1>
    <p>The <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">Fall Open House</a> for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB from 9:30-11:30am. Students interested in exploring and/or pursuing these graduate programs (degrees and/or certificates) or just want to learn more about these fields are encouraged to register and attend. CSEE students interested in pursuing a BS/MPS option for selected programs (such as CYBR or Data Science) are especially welcome.</p>
    <p>Programs represented include</p>
    <ul><li>
    <ul><li><strong><a href="http://www.umbc.edu/cyber/" rel="nofollow external" class="bo">Cybersecurity</a></strong></li>
    <li><strong><a href="http://datascience.umbc.edu/" rel="nofollow external" class="bo">Data Science</a></strong></li>
    <li><strong><a href="http://www.umbc.edu/hit/" rel="nofollow external" class="bo">Health Information Technology</a></strong></li>
    <li><a href="http://www.umbc.edu/engm/" rel="nofollow external" class="bo">Engineering Management</a></li>
    <li><a href="http://www.umbc.edu/se/" rel="nofollow external" class="bo">Systems Engineering</a></li>
    <li><a href="http://www.umbc.edu/isd/" rel="nofollow external" class="bo">Instructional Systems Development</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/ipdm/" rel="nofollow external" class="bo">Integrated Product Development &amp; Manufacturing</a></li>
    <li><a href="https://gradschool.umbc.edu/admissions/programs/techm/" rel="nofollow external" class="bo">Technical Management</a></li>
    </ul></li>
    </ul><p>Faculty program directors will be presenting in individual breakout sessions and relevant support staff will be on-hand to provide administrative overviews, answer questions, and mingle. Refreshments will be provided.</p>
    <p>If you are interested, please RSVP at <a href="https://openhouse.umbc.edu/" rel="nofollow external" class="bo">https://openhouse.umbc.edu/</a>. If you have questions contact: *protected email*</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/" rel="nofollow external" class="bo">Professional Graduate Programs Open House, Sat. 10/20 (CYBR, DATA, …)</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Professional Graduate Programs Open House, Sat. 10/20   The Fall Open House for UMBC’s Professional Programs (Main Campus offerings) takes place on Saturday, October 20 in the first floor of PAHB...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/professional-graduate-programs-open-house-sat-10-20-cybr-data/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79464/guest@my.umbc.edu/a7478305bcb2d96e34dc23e14d28a5dd/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>engineering-management</Tag>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>systems-engineering</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 15 Oct 2018 13:41:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="79388" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/79388">
<Title>UMBC students win top prize at Maryland Cyber Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/10/MDCC_DSC_0420.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/10/MDCC_DSC_0420-1024x507.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p>Busy teams of students clustered around laptops in a room overlooking Baltimore’s Inner Harbor on Tuesday, focused on solving as many challenges as possible during a “capture-the-flag” style competition. After hours of intense competition in cyberspace, UMBC’s team emerged victorious, named champions of the college division of the <a href="https://www.fbcinc.com/e/cybermdconference/challenge.aspx" rel="nofollow external" class="bo">2018 Maryland Cyber Challenge</a>.</p>
    <p>Started in 2011, the competition is part of the annual <a href="https://www.fbcinc.com/e/cybermdconference/" rel="nofollow external" class="bo">CyberMaryland Conference</a>. UMBC’s team included <strong>Niara Richards</strong> ‘22, computer science; <strong>Nithya Prakash</strong> ‘22, information systems; <strong>Josh Mpere</strong> ‘19, computer science; <strong>Seamus Burke</strong> ‘20 computer science; and <strong>Swathi Krithivasan</strong> ‘22, computer science. They worked together to test their skills in a series of real-world cybersecurity challenges over the course of two virtual qualifying rounds and then the final competition, beating talented teams from the U.S. Air Force Academy and University of Maryland, University College.</p>
    <p>“It was my first time competing in the Maryland Cyber Challenge, although I have a pretty extensive competition background,” said Burke. “I am especially proud of my freshman teammates who put in a ton of effort, solved challenges, and didn’t get discouraged when the challenges got more difficult.”</p>
    <p>Burke is a Center for Women in Technology (CWIT) Scholar and Mpere is a Cyber affiliate. Richards, Prakash, and Krithivasan all participate in UMBC’s Cyber Scholars Program, which works to prepare the next generation of cybersecurity professionals.</p>
    <p>All five members of the winning team will receive a monetary award and an offer to complete a summer internship to continue growing their experience and skills. Additionally, the university will receive new technologies (including software) to support more UMBC students in developing their cybersecurity skills.</p>
    <p>“The competition was a fantastic experience and gave me a lot of exposure into topics that I otherwise would not have gained, especially as a freshman,” said Krithivasan. “We had a mix of both upper and underclassmen on our team, which really enabled us to learn and grow from working with each other.”</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/umbc-students-win-top-prize-at-maryland-cyber-challenge/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image: Nithya Prakash, Swathi Krithivasan, and Josh Mpere being recognized at the award ceremony. Photo by Mike Lackner, computer science and informatics, and technology instructor at Loyola Blakefield High School.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/umbc-students-win-top-prize-at-maryland-cyber-challenge/" rel="nofollow external" class="bo">UMBC students win top prize at Maryland Cyber Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Busy teams of students clustered around laptops in a room overlooking Baltimore’s Inner Harbor on Tuesday, focused on solving as many challenges as possible during a “capture-the-flag” style...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/umbc-students-win-top-prize-at-maryland-cyber-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79388/guest@my.umbc.edu/d789866d76ec70b6432ec000f86da455/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>students</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 11 Oct 2018 14:10:39 -0400</PostedAt>
<EditAt>Thu, 11 Oct 2018 14:10:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="79376" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/79376">
<Title>talk: Results of a student study of UMBC computer systems security</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/02/cybersecurity-1024x536.jpg" alt="" style="max-width: 100%; height: auto;"></a></h3>
    <h3>The UMBC Cyber Defense Lab presents</h3>
    <p> </p>
    <h1>Results from the January 2018 SFS Research Study at UMBC</h1>
    <h2>Enis Golaszewski, CSEE, UMBC</h2>
    <h3>12:00-1:00pm Friday, 12 October 2018, ITE 227</h3>
    <p>January 22-26, 2018, UMBC SFS scholars worked collaboratively to analyze the security of a targeted aspect of the UMBC computer system. The focus of this year’s study was the WebAdmin module that enables users to perform various functions on their accounts, including changing the password. Students identified vulnerabilities involving failure to sanitize user input properly and suggested mitigations. Participants comprised BS, MS, MPS, and PhD students studying computer science, computer engineering, information systems, and cybersecurity, including SFS scholars who transferred from Montgomery College (MC) and Prince George’s Community College (PGCC) to complete their four-year degrees at UMBC. We hope that other universities can benefit from our motivational and educational strategy of cooperating with the university’s IT staff to engage students in active project-based learning centering on focused questions about the university computer system.</p>
    <p>Enis Golaszewski is a PhD student and SFS scholar in computer science working with Dr. Sherman on blockchain, protocol analysis, and the security of software-defined networks.</p>
    <p>This project was supported in part by the National Science Foundation under SFS grant 1241576.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/10/talk-results-of-a-student-study-of-umbc-computer-systems-security/" rel="nofollow external" class="bo">talk: Results of a student study of UMBC computer systems security</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents       Results from the January 2018 SFS Research Study at UMBC   Enis Golaszewski, CSEE, UMBC   12:00-1:00pm Friday, 12 October 2018, ITE 227   January 22-26,...</Summary>
<Website>https://www.csee.umbc.edu/2018/10/talk-results-of-a-student-study-of-umbc-computer-systems-security/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79376/guest@my.umbc.edu/6d0ccf28223fa07d9b9e974e1d9d28cb/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 11 Oct 2018 10:25:13 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78988" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78988">
<Title>MD-AI Meetup holds 1st event at UMBC 6-8pm Wed 10/3, 7th floor library</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/md-ai_fb.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/md-ai_fb-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a><br></p>
    <h1>MD-AI Meetup holds 1st event at UMBC<br>
    6-8pm Wed 10/3, 7th floor library</h1>
    <p> </p>
    
    <p>A new Maryland-based meetup interest group has been established for Artificial Intelligence (<a href="https://www.meetup.com/Maryland-AI/" rel="nofollow external" class="bo">MD-AI Meetup</a>) and will have its first meeting at UMBC this coming Wednesday (Oct 3) from 6:00-8:00pm in the 7th floor of the library.  The first meeting will feature a talk by UMCP Professor <a href="http://users.umiacs.umd.edu/~resnik/" rel="nofollow external" class="bo">Phil Resnik</a> on the state of NLP and an AI research agenda.  Refreshments will be provided.  The meetup is organized by <a href="http://altaplana.com/grimes.html" rel="nofollow external" class="bo">Seth Grimes</a> and supported by <a href="http://tedco.md/" rel="nofollow external" class="bo">TEDCO</a>, local AI startup <a href="http://redshred.com/" rel="nofollow external" class="bo">RedShred</a>, and the <a href="http://www.mdtechcouncil.com/" rel="nofollow external" class="bo">Maryland Tech Council</a>.</p>
    
    <p>If you are interested in attending this and possibly future meetings (which will probably be monthly), go to the <a href="https://www.meetup.com/Maryland-AI/" rel="nofollow external" class="bo">Meetup<span> site</span></a> and join (it’s free) and RSVP to attend this meeting (<span>if there’s still room)</span>.  If you join the meetup and RSVP, you can see who’s registered to attend.</p>
    <p>These meetups are good opportunities to meet and network with people in the area who share interests. It’s a great opportunity for students who are will be looking for internships or jobs in the coming year.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/md-ai-meetup-holds-1st-event-at-umbc-6-8pm-wed-10-3-7th-floor-library/" rel="nofollow external" class="bo">MD-AI Meetup holds 1st event at UMBC 6-8pm Wed 10/3, 7th floor library</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>MD-AI Meetup holds 1st event at UMBC  6-8pm Wed 10/3, 7th floor library        A new Maryland-based meetup interest group has been established for Artificial Intelligence (MD-AI Meetup) and will...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/md-ai-meetup-holds-1st-event-at-umbc-6-8pm-wed-10-3-7th-floor-library/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78988/guest@my.umbc.edu/9f971bc6300fd641f11e4a00be96e2fb/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>events</Tag>
<Tag>nlp</Tag>
<Tag>robotics</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sat, 29 Sep 2018 23:50:53 -0400</PostedAt>
<EditAt>Sat, 29 Sep 2018 23:50:53 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="78945" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78945">
<Title>Machine learning and AI for cybersecurity: a technical chat with DISA</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/text_cyber.jpg" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/text_cyber.jpg" alt="" style="max-width: 100%; height: auto;"></a></p>
    <h3>The UMBC Cyber Defense Lab</h3>
    <p> </p>
    <h1>Machine Learning and Artificial Intelligence: A Technical Chat with the Defense Information Systems Agency</h1>
    <h3>James Curry<br>
    Lead Engineer–DoD Cyber Security Range<br>
    Defense Information Systems Agency (DISA)</h3>
    <h3>12:00–1:00pm Friday, 28 September 2018, ITE 227, UMBC</h3>
    <p>A broad reaching brief on the scope and scale of the DISA Mission, followed by a dive into DISA’s efforts to develop Machine Learning and Artificial Intelligence to help defend the nation’s cyber infrastructure. Attendees are highly encouraged to ask questions.</p>
    <p>James Curry is the Lead Engineer of the DoD Cyber Security Range (CSR). The CSR’s mission is to replicate the DoD Information Network (DODIN) environment at lab scale, while maintaining high-fidelity realism. As Lead Engineer, Mr. Curry led the design, acquisition, and implementation of two first-of-its-kind technologies: a Virtual Internet Access Point (vIAP) and a Virtual Joint Regional Security Stack (vJRSS). These technologies enable the DoD Workforce to train in an IaaS-on-demand environment that realistically matches DISA’s core infrastructure. Mr. Curry is a Scholarship for Service (SFS) recipient (2008-2009) and received his masters and bachelors of science in computer science from New Mexico Tech. Email: *protected email*</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>The UMBC Cyber Defense Lab meets biweekly Fridays. All meetings are open to the public. Upcoming meetings for Fall 2018 include the following.</p>
    <ul><li>Oct 12 Enis Golaszewski, The 2018 UMBC SFS study</li>
    <li>Oct 26 Enis Golaszewski, Using tools in the formal analysis of cryptographic protocols</li>
    <li>Nov 9 Razvan Mintesu, Legal aspects privacy</li>
    <li>Dec 7 Tim Finin, A knowledge graph for cyber threat intelligence</li>
    </ul>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/machine-learning-and-ai-for-cybersecurity-a-technical-chat-with-disa/" rel="nofollow external" class="bo">Machine learning and AI for cybersecurity: a technical chat with DISA</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab       Machine Learning and Artificial Intelligence: A Technical Chat with the Defense Information Systems Agency   James Curry  Lead Engineer–DoD Cyber Security Range...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/machine-learning-and-ai-for-cybersecurity-a-technical-chat-with-disa/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78945/guest@my.umbc.edu/1d7e79c959c784379822047cd7dd1737/api/pixel</TrackingUrl>
<Tag>ai</Tag>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>machine-learning</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 27 Sep 2018 12:49:08 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78824" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78824">
<Title>Learn cybersecurity skills in NSA&#8217;s Codebreaker Challenge</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p> </p>
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/nsa_cbc_2018-1024x461.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge</h1>
    <p> </p>
    <p>NSA’s sixth annual <a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">Codebreaker Challenge</a> is a hands-on, cybersecurity engineering challenge in which students work to complete mission-focused objectives and push their university to the top of the competition leaderboard.</p>
    <p>The 2018 scenario involves ransomware and blockchain. A new strain of ransomware has managed to penetrate several critical government networks and NSA has been called upon to assist in remediating the infection to prevent massive data losses. For each infected machine, an encrypted copy of the key needed to decrypt the ransomed files has been stored in a smart contract on the <a href="http://www.ethdocs.org/en/latest/" rel="nofollow external" class="bo">Ethereum blockchain</a> and is set to only be unlocked upon receipt of the ransom payment. Your mission is to ultimately (1) find a way to unlock the ransomware without giving in to the attacker’s demands and (2) figure out a way to recover all of the funds already paid by other victims. Are YOU up to the challenge?</p>
    <p>UMBC students did well, both individually and as a group, in previous challenges.  Let’s make it to the top of the leaderboard this year.</p>
    <ul><li>The challenge is hosted at <a href="https://codebreaker.Ltsnet.net" rel="nofollow external" class="bo">https://codebreaker.Ltsnet.net</a></li>
    <li>The challenge end on December 31st</li>
    <li>Students register for the challenge at<a href="https://codebreaker.ltsnet.net/home" rel="nofollow external" class="bo">2017 Codebreaker Challenge</a> using their umbc.edu email addresses</li>
    <li>The challenge website has <a href="https://codebreaker.ltsnet.net/resources" rel="nofollow external" class="bo">nine lectures</a> on reverse engineering, so students with little coding or cybersecurity experience can participate</li>
    </ul><p>Feedback from previous iterations of the challenge showed that students were able to learn a great deal from participating. Each student receives a slightly different set of challenge binaries and associated files, so that one student’s solution won’t work for someone else. The binaries are similar enough so that students can work together to understand the problems and develop approaches to solutions and hen implement them independently and register their results.</p>
    <p>The 2018 challenge consists of a series of tasks that are worth a varying amount of points based upon their difficulty. In previous years, tasks had to be solved in order to unlock the next task and rankings were based upon the quantity of solvers that progressed the furthest from each school. This way of ranking heavily weighted progression above participation and did not allow for skipping ahead if a particular task became a stumbling block. So to address these issues, all tasks will be available immediately upon registration and can be solved in any order. The point value associated with each task is based on relative difficulty and schools will be ranked according to total number of points accumulated by their students. It is still recommended to solve tasks in order since the tasks flow with the storyline, but that is no longer a requirement.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/" rel="nofollow external" class="bo">Learn cybersecurity skills in NSA’s Codebreaker Challenge</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>           Get hands-on cybersecurity and blockchain skills in NSA’s Codebreaker Challenge       NSA’s sixth annual Codebreaker Challenge is a hands-on, cybersecurity engineering challenge in...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/learn-cybersecurity-skills-in-nsas-codebreaker-challenge/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78824/guest@my.umbc.edu/b5c63a73e1d311c9178ad83678684ddf/api/pixel</TrackingUrl>
<Tag>csee</Tag>
<Tag>cybersecurity</Tag>
<Tag>students</Tag>
<Tag>uncategorized</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 23 Sep 2018 09:45:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78459" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78459">
<Title>talk: Phishing in an Academic Community, a Study of User Susceptibility and Behavior</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <h3><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/phishing.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/phishing-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></h3>
    <h3>The UMBC Cyber Defense Lab</h3>
    <h1><strong>Phishing in an Academic Community:<br>
    a Study of User Susceptibility and Behavior</strong></h1>
    <h2><strong>Alejandra Diaz<br></strong><strong>University of Maryland, Baltimore County</strong></h2>
    <h3><strong>12:00–1:00pm, Friday, 14 September 2018, ITE 227</strong></h3>
    <h3><strong>(joint work with Alan T. Sherman Anupam Joshi)</strong></h3>
    <p>We present an observational study on the relationship between demographic factors and phishing susceptibility at the University of Maryland, Baltimore County (UMBC). From March through May 2018, we performed three experiments that delivered phishing attacks to 450 randomly-selected students on three different days (1,350 students total) to examine user click rates and demographics within UMBC’s undergraduate student population. The participants were initially unaware of the study. We deployed the Billing Problem, Contest Winner, and Expiration Date phishing tactics. Experiment 1 impersonated banking authorities; Experiment 2 enticed users with monetary rewards; and Experiment 3 threatened users with account cancellation.</p>
    <p>We found correlations resulting in lowered susceptibility based on college affiliation, academic year progression, cyber training, involvement in cyber clubs or cyber scholarship programs, amount of time spent on the computer, and age demographics. We found no significant correlation between gender and susceptibility. Contrary to our expectations, we observed an inverse correlation between phishing awareness and student resistance to clicking a phishing link. Students who identified themselves as understanding the definition of phishing had a higher susceptibility rate than did their peers who were merely aware of phishing attacks, with both groups of students having a higher susceptibility rate than those with no knowledge whatsoever. Overall, approximately 70% of the students who opened a phishing email clicked on it.</p>
    <p>Alejandra Diaz (*protected email*) is a cyber software engineer at Northrop Grumman. She earned her BS in computer science from UMBC with a concentration in cybersecurity in May 2017, and her MS in computer science in August 2018. As a Cyber Scholar and a Society of Women Studying Information Security Scholar, she has a special interest in the human aspects of cybersecurity.</p>
    <p>Host: Alan T. Sherman, *protected email*</p>
    <p>Support for this research was provided in part by the National Science Foundation under SFS grant 1241576, the U.S. Department of Defense under CAE grant H988230-17-1-0349, and IBM.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/talk-phishing-in-an-academic-community-a-study-of-user-susceptibility-and-behavior/" rel="nofollow external" class="bo">talk: Phishing in an Academic Community, a Study of User Susceptibility and Behavior</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab   Phishing in an Academic Community:  a Study of User Susceptibility and Behavior   Alejandra Diaz University of Maryland, Baltimore County   12:00–1:00pm, Friday, 14...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/talk-phishing-in-an-academic-community-a-study-of-user-susceptibility-and-behavior/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78459/guest@my.umbc.edu/239c541864336c1f8378903a30fe9277/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Tag>talks</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 09 Sep 2018 13:40:05 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="78345" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/78345">
<Title>NSA highlights strong partnership with UMBC through Featured School campaign</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <p><a href="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped.png" rel="nofollow external" class="bo"><img src="https://www.csee.umbc.edu/wp-content/uploads/2018/09/Spring-campus18_cropped-1024x536.png" alt="" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <h1>NSA highlights strong partnership with UMBC in Featured School campaign</h1>
    <p>Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has led to research, internship, and career opportunities for faculty, students, and alumni. UMBC is the first institution to be highlighted in NSA’s Featured School Series, which launched on September 4.</p>
    <p>“UMBC’s long-standing partnership with NSA has provided valuable experiences for our students, faculty, and alumni to pursue internships, careers, and collaborative research opportunities,” said President Freeman Hrabowski. “Through this work we are helping to address the need for well-trained cyber professionals by creating a network of talented people to protect the state, nation, and world.”</p>
    <p>More than 1100 NSA employees are UMBC alumni, including <strong>Darniet Jennings </strong>‘98, M.S. ‘99, Ph.D. ‘03, information systems management. Jennings continued his dissertation research when he took a job at NSA, where he developed a system to manage big data effectively, which was patented in 2010.</p>
    <div>
    <a href="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" rel="nofollow external" class="bo"><img src="https://news.umbc.edu/wp-content/uploads/2018/08/200993_UMBC_Infographic_print_MHanks_8.29.18.jpg" alt="" width="100%;float:right;border: 2px solid; padding: 4px;" style="max-width: 100%; height: auto;"></a></div>
    <p>The opportunities at NSA include careers in a broad range of disciplines including cybersecurity, engineering, computer science, language, and biological and chemical sciences. <strong>Regina Hambleton</strong> ‘87, mathematics, has held a number of positions at NSA and is currently the Agency’s deputy director of Engagement and Policy. She began working at NSA while she was a student at UMBC, and participated in a program that allowed her to spend a semester at UMBC taking courses followed by a semester working at NSA.</p>
    <p>The partnership between NSA and UMBC also helps prepare an increasing number of graduates for careers in cybersecurity-related fields, to protect the nation from cyber threats.</p>
    <p><strong>Charles Nicholas</strong>, professor of computer science and electrical engineering, is also highlighted in the Featured School Series campaign. He has spent two sabbaticals at NSA during his time at UMBC, and has mentored students who completed NSA internships, in addition to students who went on to pursue careers at NSA. Nicholas is interested in the intersection of cybersecurity and data science, and the tools that are used to compare malware specimens.</p>
    <p>“There are so many opportunities in the intelligence community, including at NSA,” Nicholas says. “It is important for students interested in those careers to develop technical ability, as well as critical and creative thinking, and I enjoy the chance to help them grow those skills.”</p>
    <p>For more information about the partnership, and a few UMBC alumni who work at NSA, visit the <a href="https://www.nsa.gov/resources/students-educators/featured-schools/umbc.shtml" rel="nofollow external" class="bo">UMBC page on the NSA website</a>.</p>
    <p><em>Adapted from a <a href="https://news.umbc.edu/national-security-agency-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">UMBC News article</a> by Megan Hanks. Banner image by Marlayna Demond for UMBC.</em></p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/" rel="nofollow external" class="bo">NSA highlights strong partnership with UMBC through Featured School campaign</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>    NSA highlights strong partnership with UMBC in Featured School campaign   Over the past two decades, UMBC and the National Security Agency (NSA) have developed a strong relationship, which has...</Summary>
<Website>https://www.csee.umbc.edu/2018/09/nsa-highlights-strong-partnership-with-umbc-through-featured-school-campaign/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/78345/guest@my.umbc.edu/937bbb0918436a7c5bf367c07f1e6516/api/pixel</TrackingUrl>
<Tag>computer-engineering</Tag>
<Tag>computer-science</Tag>
<Tag>cybersecurity</Tag>
<Tag>data-science</Tag>
<Tag>electrical-engineering</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 05 Sep 2018 09:12:55 -0400</PostedAt>
<EditAt>Wed, 05 Sep 2018 09:12:55 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="77689" important="false" status="posted" url="https://beta.my.umbc.edu/groups/cybersecurity/posts/77689">
<Title>Weaponized information seeks a new target in cyberspace: Users&#8217; minds</Title>
<Body>
<![CDATA[
    <div class="html-content">
    <img src="https://www.csee.umbc.edu/wp-content/uploads/2018/07/file-20180727-106514-17lwvm6.jpg" alt="" style="max-width: 100%; height: auto;">Cyberattacks target Americans’ thinking.<span> <a href="https://www.shutterstock.com/image-vector/young-man-grabs-his-hands-head-447182740" rel="nofollow external" class="bo">Fancy Tapis/Shutterstock.com</a></span><p> </p>
    <h1><strong>Weaponized information seeks a new target in cyberspace: Users’ minds</strong></h1>
    <h4><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></h4>
    <p>The Russian attacks on the 2016 U.S. presidential election and <a href="https://www.nytimes.com/interactive/2018/07/16/us/elections/russian-interference-statements-comments.html" rel="nofollow external" class="bo">the country’s continuing election-related hacking</a> have happened across all three dimensions of cyberspace – physical, informational and cognitive. The first two are well-known: For years, hackers have exploited hardware and software flaws to gain unauthorized access to computers and networks – and <a href="http://thehill.com/policy/cybersecurity/372816-russia-successfully-penetrated-voter-rolls-in-some-states-report" rel="nofollow external" class="bo">stolen information</a> they’ve found. The third dimension, however, is a newer target – and a more concerning one.</p>
    <p>This <a href="http://ctnsp.dodlive.mil/files/2014/03/Cyberpower-I-Chap-02.pdf" rel="nofollow external" class="bo">three-dimensional view of cyberspace</a> comes from my late mentor, Professor Dan Kuehl of the National Defense University, who expressed concern about traditional hacking activities and what they meant for national security. But he also foresaw the potential – now clear to the public at large – that those tools could be used to <a href="http://comprop.oii.ox.ac.uk/research/cybertroops2018/" rel="nofollow external" class="bo">target people’s perceptions and thought processes,</a> too. That’s what the Russians allegedly did, according to federal indictments issued in February and July, laying out evidence that <a href="https://www.justice.gov/file/1035477/download" rel="nofollow external" class="bo">Russian civilians</a> and <a href="https://www.justice.gov/file/1080281/download" rel="nofollow external" class="bo">military personnel</a> used online tools to <a href="https://www.newyorker.com/news/news-desk/what-muellers-indictment-reveals-about-russias-internet-research-agency" rel="nofollow external" class="bo">influence Americans’ political views</a> – and, potentially, their votes. They may be <a href="https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator" rel="nofollow external" class="bo">setting up to do it again</a> for the <a href="https://www.npr.org/2018/07/28/633056819/russian-hackers-targeted-the-most-vulnerable-part-of-u-s-elections-again" rel="nofollow external" class="bo">2018 midterm elections</a>.</p>
    <p>Some observers suggest that using internet tools for espionage and as fuel for disinformation campaigns is a new form of “<a href="https://www.bbc.com/news/world-europe-29903395" rel="nofollow external" class="bo">hybrid warfare</a>.” Their idea is that the lines are blurring between the traditional kinetic warfare of bombs, missiles and guns, and the unconventional, stealthy warfare long practiced against foreigners’ “<a href="https://www.jpost.com/Israel-News/Winning-over-hearts-and-minds-The-benefits-of-Israeli-aid-to-Syria-561191" rel="nofollow external" class="bo">hearts and minds</a>” by intelligence and special forces capabilities.</p>
    <p>However, I believe this isn’t a new form of war at all: Rather, it is the same old strategies <a href="https://freebeacon.com/national-security/americas-adversaries-weaponizing-information-nsa-director-warns/" rel="nofollow external" class="bo">taking advantage of the latest available technologies</a>. Just as online marketing companies use sponsored content and search engine manipulation to distribute biased information to the public, governments are using internet-based tools to pursue their agendas. In other words, they’re hacking a different kind of system through <a href="https://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411" rel="nofollow external" class="bo">social engineering</a> on a grand scale.</p>
    <p> </p>
    <a href="https://images.theconversation.com/files/229635/original/file-20180727-106502-1xisbgf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=1000&amp;fit=clip" rel="nofollow external" class="bo"><img src="https://images.theconversation.com/files/229635/original/file-20180727-106502-1xisbgf.jpg?ixlib=rb-1.1.0&amp;q=45&amp;auto=format&amp;w=754&amp;fit=clip" alt="" style="max-width: 100%; height: auto;"></a><span>Americans are used to seeing Russian propaganda that looks like this.</span> <span><a href="http://www.apimages.com/metadata/Index/APTOPIX-Britain-Russian-Art-Exhibition/72e17ee8492c4a6da4588bd1d7fa1a29/123/0" rel="nofollow external" class="bo">AP Photo/Kirsty Wigglesworth</a></span><p> </p>
    <h2>Old goals, new techniques</h2>
    <p>More than 2,400 years ago, the Chinese military strategist and philosopher Sun Tzu made it an axiom of war that it’s best to “<a href="https://en.wikiquote.org/wiki/Sun_Tzu#Chapter_III_%C2%B7_Strategic_Attack" rel="nofollow external" class="bo">subdue the enemy without fighting</a>.” Using information – or disinformation, or propaganda – as a weapon can be one way to destabilize a population and disable the target country. In 1984 a former KGB agent who defected to the West discussed this as a long-term process and <a href="https://bigthink.com/paul-ratner/34-years-ago-a-kgb-defector-described-america-today.amp" rel="nofollow external" class="bo">more or less predicted</a> what’s <a href="https://securingdemocracy.gmfus.org/so-what-did-we-learn-looking-back-on-four-years-of-russias-cyber-enabled-active-measures/" rel="nofollow external" class="bo">happening in the U.S.</a> now.</p>
    <p>The Russians created false social media accounts to simulate political activists – such as <a href="https://www.cnn.com/2018/02/16/politics/who-is-ten-gop/index.html" rel="nofollow external" class="bo">@TEN_GOP</a>, which purported to be associated with the Tennessee Republican Party. Just that one account attracted more than 100,000 followers. The goal was to distribute propaganda, such as captioned photos, posters or short animated graphics, purposely designed to enrage and engage these accounts’ followers. Those people would then <a href="https://www.technologyreview.com/s/611332/this-is-where-internet-memes-come-from/" rel="nofollow external" class="bo">pass the information along</a> through their own personal social networks.</p>
    <p>Starting from seeds planted by Russian fakers, including some who claimed to be U.S. citizens, those ideas grew and flourished through amplification by real people. Unfortunately, whether originating from Russia or elsewhere, fake information and conspiracy theories can <a href="https://www.vox.com/world/2018/6/6/17433876/trump-spygate-fox-twitter" rel="nofollow external" class="bo">form the basis for discussion</a> at major partisan media outlets.</p>
    <p>As ideas with niche online beginnings moved into the traditional mass media landscape, they serve to keep controversies alive by sustaining divisive arguments on both sides. For instance, one Russian troll factory had its online personas host <a href="https://www.nationalreview.com/2018/03/mueller-investigation-indictments-russian-organized-rallies-not-influential" rel="nofollow external" class="bo">rallies both for and against each of the major candidates</a> in the 2016 presidential election. Though the rallies never took place, the online buzz about them helped inflame divisions in society.</p>
    <p>The trolls also set up Twitter accounts purportedly representing local news organizations – including defunct ones – to take advantage of <a href="https://medium.com/trust-media-and-democracy/local-news-is-a-building-block-to-rebuild-trust-fab8752f3659" rel="nofollow external" class="bo">Americans’ greater trust of local news sources</a> than national ones. These accounts operated for several years – <a href="https://www.npr.org/2018/07/12/628085238/russian-influence-campaign-sought-to-exploit-americans-trust-in-local-news" rel="nofollow external" class="bo">one for the Chicago Daily News</a>, closed since 1978, was created in May 2014 and collected 20,000 followers – passing along legitimate local news stories, likely seeking to win followers’ trust ahead of future disinformation campaigns. Shut down before they could fulfill that end, these accounts cleverly aimed to exploit the fact that many Americans’ political views <a href="http://www.journalism.org/2018/06/18/distinguishing-between-factual-and-opinion-statements-in-the-news/" rel="nofollow external" class="bo">cloud their ability to separate fact from opinion</a> in the news.</p>
    <p>These sorts of activities are functions of traditional espionage: Foment discord and then sit back while the target population becomes distracted arguing among themselves.</p>
    <h2>Fighting digital disinformation is hard</h2>
    <p>Analyzing, let alone countering, this type of provocative behavior can be difficult. Russia isn’t alone, either: The U.S. tries to influence foreign audiences and global opinions, including through <a href="https://www.voanews.com/" rel="nofollow external" class="bo">Voice of America online and radio services</a> and intelligence services’ activities. And it’s not just governments that get involved. Companies, advocacy groups and others also can conduct disinformation campaigns.</p>
    <p>Unfortunately, laws and regulations are ineffective remedies. Further, social media companies have been fairly slow to respond to this phenomenon. Twitter reportedly <a href="https://www.reuters.com/article/us-twitter-inc-suspensions/twitter-suspends-over-70-million-accounts-in-two-months-washington-post-idUSKBN1JW2XN" rel="nofollow external" class="bo">suspended more than 70 million fake accounts</a> earlier this summer. That included <a href="https://www.npr.org/2018/07/12/628085238/russian-influence-campaign-sought-to-exploit-americans-trust-in-local-news" rel="nofollow external" class="bo">nearly 50 social media accounts</a> like the fake Chicago Daily News one.</p>
    <p>Facebook, too, says it is <a href="https://www.cnet.com/news/facebook-says-misinformation-is-a-problem-but-wont-say-how-big/" rel="nofollow external" class="bo">working to reduce the spread of “fake news” on its platform</a>. Yet both companies make their money from users’ activity on their sites – so they are conflicted, trying to <a href="https://www.theguardian.com/commentisfree/2018/jul/20/facebook-pledge-to-eliminate-false-information-is-itself-fake-news" rel="nofollow external" class="bo">stifle misleading content while also boosting users’ involvement</a>.</p>
    <h2>Real defense happens in the brain</h2>
    <p>The best protection against threats to the cognitive dimension of cyberspace depends on users’ own actions and knowledge. <a href="https://www.gutenberg.org/files/852/852-h/852-h.htm" rel="nofollow external" class="bo">Objectively educated, rational citizens</a> should serve as the foundation of a strong democratic society. But that defense fails if people don’t have the skills – or worse, don’t use them – to <a href="https://theconversation.com/here-are-some-more-reasons-why-liberal-arts-matter-49638" rel="nofollow external" class="bo">think critically about what they’re seeing</a> and examine claims of fact before accepting them as true.</p>
    <p>American voters <a href="https://www.cnn.com/2018/07/25/politics/russia-interference-poll/index.html" rel="nofollow external" class="bo">expect ongoing Russian interference in U.S. elections</a>. In fact, it <a href="https://www.npr.org/2018/07/28/633056819/russian-hackers-targeted-the-most-vulnerable-part-of-u-s-elections-again" rel="nofollow external" class="bo">appears to have</a> <a href="https://www.thedailybeast.com/russian-hackers-new-target-a-vulnerable-democratic-senator" rel="nofollow external" class="bo">already begun</a>. To help combat that influence, the U.S. Justice Department <a href="http://time.com/5343817/justice-department-election-meddling-plan/" rel="nofollow external" class="bo">plans to alert the public</a> when its investigations discover foreign espionage, hacking and disinformation relating to the upcoming 2018 midterm elections. And the National Security Agency has created a <a href="https://www.bloomberg.com/news/articles/2018-07-22/u-s-cyber-commander-tackles-russian-threat-with-new-task-force" rel="nofollow external" class="bo">task force to counter Russian hacking</a> of election systems and major political parties’ computer networks.</p>
    <p>These efforts are a good start, but the real solution will begin when people start realizing they’re being subjected to this sort of cognitive attack and that it’s not <a href="http://thehill.com/business-a-lobbying/398285-trump-obama-didnt-warn-about-russia-before-election-because-its-a-hoax" rel="nofollow external" class="bo">all just a hoax</a>.</p>
    <hr><p><a href="https://theconversation.com/profiles/richard-forno-173226" rel="nofollow external" class="bo">Richard Forno</a>, Senior Lecturer, Cybersecurity &amp; Internet Researcher, <em><a href="http://theconversation.com/institutions/university-of-maryland-baltimore-county-1667" rel="nofollow external" class="bo">University of Maryland, Baltimore County</a></em></p>
    <p>This article was originally published on <a href="http://theconversation.com" rel="nofollow external" class="bo">The Conversation</a>. Read the <a href="https://theconversation.com/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds-100069" rel="nofollow external" class="bo">original article</a>.</p>
    <p>The post <a href="https://www.csee.umbc.edu/2018/07/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds/" rel="nofollow external" class="bo">Weaponized information seeks a new target in cyberspace: Users’ minds</a> appeared first on <a href="https://www.csee.umbc.edu" rel="nofollow external" class="bo">Department of Computer Science and Electrical Engineering</a>.</p></div>
]]>
</Body>
<Summary>Cyberattacks target Americans’ thinking. Fancy Tapis/Shutterstock.com     Weaponized information seeks a new target in cyberspace: Users’ minds   Richard Forno, University of Maryland, Baltimore...</Summary>
<Website>https://www.csee.umbc.edu/2018/07/weaponized-information-seeks-a-new-target-in-cyberspace-users-minds/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/77689/guest@my.umbc.edu/709dac98bc2f0a20d6174007b3532da6/api/pixel</TrackingUrl>
<Tag>cybersecurity</Tag>
<Tag>news</Tag>
<Group token="cybersecurity">UMBC Cybersecurity Institute Group</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/cybersecurity</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/original.png?1734891477</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xlarge.png?1734891477</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/large.png?1734891477</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/medium.png?1734891477</AvatarUrl>
<AvatarUrl size="small">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/small.png?1734891477</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xsmall.png?1734891477</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/485/196da6a7ec6f4c31eab2e474c17a9ab7/xxsmall.png?1734891477</AvatarUrl>
<Sponsor>UMBC Center for Cybersecurity</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 30 Jul 2018 08:47:53 -0400</PostedAt>
</NewsItem>

</News>
