BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CINA - ECPv6.16.2//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-WR-CALNAME:CINA
X-ORIGINAL-URL:https://cina.gmu.edu
X-WR-CALDESC:Events for CINA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250311T120000
DTEND;TZID=America/New_York:20250311T133000
DTSTAMP:20260517T092046
CREATED:20250113T183234Z
LAST-MODIFIED:20250227T203016Z
UID:8085-1741694400-1741699800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Colton Seale
DESCRIPTION:Interviewer Mindset  \nJoin us on Tuesday\, March 11 for the upcoming virtual CINA Distinguished Speaker Series event featuring Colton Seale\, Founder and Principal Consultant at Pyxis Academy\, as he delves into the art and science of Intelligence Interviewing and what he’s learned from his 20 years as an FBI Special Agent with the High-Value Detainee Interrogation Group and Counterterrorism Fly Team. \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nDrawing from extensive experience in FBI investigations\, counterterrorism operations\, and research with the High-Value Detainee Interrogation Group (HIG)\, this presentation explores the critical role of interviewer mindset in conducting effective interviews. While traditional interrogation methods often rely on rigid procedures and control\, modern evidence-based approaches emphasize the importance of three key components: self-awareness\, confidence\, and genuine curiosity. Through real-world examples ranging from domestic criminal cases to international terrorism investigations\, the talk demonstrates how developing the right mindset—one that combines thorough preparation with adaptability and emphasizes understanding over confrontation—leads to more successful outcomes in even the most challenging interviews. The presentation argues that effective interviewing is not just about mastering techniques\, but about developing an ethos that allows interviewers to creatively apply research-based methodologies while maintaining focus on gathering accurate information rather than simply seeking confessions. This approach not only yields better intelligence and evidence but also proves more effective in building cooperation and eliciting truthful information across all types of interviews. \n  \nSpeaker Biography: \nCEO of Pyxis Academy\, Colton equips corporate leaders with the skills to master difficult conversations and navigate challenging workplace situations. With over 20 years of experience as an FBI Special Agent\, he has developed a program that surpasses the usual way of intelligence training and collection\, based on science and research. \nColton’s passion is to share his knowledge and expertise with clients who want to improve their communication\, rapport\, and influence\, regardless of their domain. He has trained more than 8\,000 students across the U.S. Intelligence Community\, Military\, and Law Enforcement\, as well as in over 15 countries globally. Colton has also received multiple commendations and awards for his outstanding performance and achievements in the intelligence field\, including the FBI Director’s Award and the National Intelligence Community Citation.
URL:https://cina.gmu.edu/event/8085/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Information Session,Research Presentation,Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250129T120000
DTEND;TZID=America/New_York:20250129T133000
DTSTAMP:20260517T092046
CREATED:20250113T184108Z
LAST-MODIFIED:20250129T174838Z
UID:8088-1738152000-1738157400@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Abby Stylianou
DESCRIPTION:TraffickCam: Identifying Where Victims of Human Trafficking and Child Sexual Abuse are Photographed \nJoin us on Wednesday\, January 29 for the upcoming virtual CINA Distinguished Speaker Series event featuring Dr. Abby Stylianou\, Associate Professor of Computer Science at Saint Louis University\, and a Fellow of the Taylor Geospatial Institute as she discusses “TraffickCam: Identifying Where Victims of Human Trafficking and Child Sexual Abuse are Photographed.” \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nVictims of child sexual abuse and human trafficking are often photographed in hotel rooms. Identifying the hotels in these photographs is a top priority for investigators and prosecutors — they show where a victim has been and where their abused may move them or others in the future. In this talk\, Dr. Abby Stylianou will introduce TraffickCam\, platform for identifying the locations in these victim images. The platform includes a crowd-sourcing mobile application to collect images of hotel rooms from the traveling public that is currently used by over 250\,000 individuals who upload photos specifically to help combat trafficking. The data from this app\, combined with millions of publicly available images from travel websites\, support a first-in-the-world system for image search to identify hotels in trafficking imagery that is deployed at the National Center for Missing and Exploited Children (NCMEC). Dr. Stylianou will present the technical details behind this search system and the research that’s led to its current capabilities\, share lessons learned about real world investigative image search from years of working with the analysts at NCMEC\, and discuss the challenges and opportunities in this space in the current AI ecosystem. \n  \nSpeaker Biography:\nDr. Abby Stylianou is an Associate Professor of Computer Science at Saint Louis University\, and a Fellow of the Taylor Geospatial Institute. Dr. Stylianou’s research lies at the intersection of multimodal image retrieval\, fine grained visual categorization\, and explainable AI. In recent years\, Dr. Stylianou’s research has focused on building citizen science data collection applications and global scale image search tools\, specifically to support the National Center for Missing and Exploited Children’s investigations of child sexual abuse and human trafficking. Dr. Stylianou is generally excited about applications of computer vision and machine learning that have the potential to benefit society in some way. Beyond the work to help in investigations of child sexual abuse and human trafficking\, she has worked on developing systems for making measurements of the natural environment in time-lapse imagery to understand climate change\, observing how individuals interact with the world around them in outdoor webcam images to support better design of the built environment\, and developing new vision and machine learning algorithms and systems for agriculture and plant breeding to develop more sustainable\, more resilient\, and healthier crops. Dr. Stylianou is the Communications Officer for the IEEE Technical Community on Pattern Analysis and Machine Intelligence\, and regularly serves as Social Media Chair and Area Chair for a variety of premier computer vision conferences\, including CVPR\, ICCV\, ECCV and WACV.
URL:https://cina.gmu.edu/event/stylianou/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Information Session,Research Presentation,Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241009T120000
DTEND;TZID=America/New_York:20241009T133000
DTSTAMP:20260517T092046
CREATED:20240911T184435Z
LAST-MODIFIED:20240911T191215Z
UID:7919-1728475200-1728480600@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Donna Turner
DESCRIPTION:The Global Squeezing of the Fraud Balloon \nJoin us on Wednesday\, October 9 for the upcoming virtual CINA Distinguished Speaker Series event featuring Donna Turner\, former Bank of America C-Suite Executive. This event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nDoes history repeat itself in the context of fraud threats? Do the actions taken in other geographies impact the domestic fight against fraud positively or negatively? \nBy looking at the historical patterns of fraud threats globally\, are we able to project the expected impact domestically of any new or material change to the threat environment or the capability offering?  Understanding these all too often repeated patterns of threat and response from a global perspective will better prepare us to understand and prepare for the expected outcomes. Since these threats and countermeasures are all too often honed outside the US\, it is important to maintain a global perspective on both the threat and capability environment. Today’s dominant use case is the rapid development of centralized and orchestrated fraud risk management in certain geographies that enable data collection and exchange to more effectively manage the ecosystem of inputs and deliver more impactful outputs.  Absent a similar effort domestically\, what are the expected implications\, and what can be done absent the same to ensure readiness and execution. \n  \nSpeaker Biography: \nDonna Turner is an industry thought leader in payments\, product management\, fraud risk management\, and operations. Having spent more than 30 years in financial services with PNC & Bank of America\, she then served as Chief Operations Officer for Early Warning Systems\, the industry consortium behind the Zelle payments network. It is this deep and broad set of experiences that she brings to the table in the founding of Risk Insight Solutions\, an advisory firm aimed at assisting companies in developing sustainable growth\, addressing risk\, and delivering exceptional experiences. \nWhile in banking\, her experiences spanned large-scale\, global operations; product and P&L management; risk management; process engineering\, and enterprise fraud risk management. This compilation of experiences brought to life a passion for optimization\, where the delicate balance of customer experience\, operational expense\, and risk tolerance must be perpetually challenged and adjusted as customer expectations\, capabilities\, platforms\, risk\, and expense appetites all shift and evolve. \nAt Early Warning\, having joined before the launch of the Zelle network\, the joy was in bringing the network to life\, which meant cross-organization orchestration in concert with the design\, execution and often reimagining of function and processes to be agile\, scalable\, and provide exceptional service all within an established risk tolerance of reputation\, financial and operational risk. \nDonna was recognized as one of the ‘Most Influential Women in Payments’ and holds two patents in the fraud risk management arena. She has served as Chair of the Board for the Ada Jenkins Center and is currently on the board of directors for The Knoble. She currently serves as an Advisor in Residence for EY\, and as an independent advisor to companies in the payments and fraud risk management sectors. Her educational background spans undergrad at the University of Florida\, with certifications in Operational Management from the University of Michigan and Risk Management from Harvard University. \nDonna’s passion now lies in sharing her experience and insight to enable the success of others.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-donna-turner/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240924T110000
DTEND;TZID=America/New_York:20240924T121500
DTSTAMP:20260517T092046
CREATED:20240823T195909Z
LAST-MODIFIED:20240826T173200Z
UID:7908-1727175600-1727180100@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Michael Newman
DESCRIPTION:“Advancing Cybercrime Response: Insights from the Queensland Police Service and a Cybercrime Churchill Fellowship”\n  \nIn-Person Location: George Mason University\, Fairfax Campus\, Fenwick Library\, Room 2001\, 4400 University Drive\, Fairfax\, VA 22030. \nVirtual Location: MS Teams Webinar (link to join sent upon registration) \nJoin us on Tuesday\, September 24 for the upcoming hybrid CINA Distinguished Speaker Series event featuring Michael Newman\, an Intelligence Operations Manager\, Crime Intelligence Services\, State Intelligence Group of the Queensland Police Service\, as he discusses “Advancing cybercrime response: Insights from the Queensland Police Service and a Cybercrime Churchill Fellowship.” Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nAs technology evolves\, so does the threat of cybercrime. The Queensland Police Service (QPS) of Australia has dedicated increased efforts to tackle cyber threats\, safeguard communities\, and ensure digital safety. This hybrid event co-sponsored by the Criminal Investigations Network Analysis Center and the Center for Evidence-Based Crime Policy will explore QPS efforts in combating cybercrime\, highlighting successful strategies\, challenges faced\, and collaborative initiatives. Mike will also delve into the purpose and initial learnings from his prestigious Churchill Fellowship. Mike\, an experienced QPS officer\, has embarked on a global journey to investigate international policing agencies\, industry partnerships\, and academia’s role in supporting police responses to cybercrime. He aims to identify and shed light on best practices\, innovative approaches\, and the networks that strengthen our collective fight against cyber threats. \nJoin us as we uncover the synergy between QPS practical efforts and a cybercrime Churchill Fellowship exploration\, aimed at ultimately enhancing our ability to protect against this ever-increasing threat. \n  \nSpeaker Biography: \nMichael Newman has over 30 years of policing experience and is committed to improving community safety outcomes in an evidence-based manner. As a Commissioned Officer\, Mike has undertaken duties managing the Investigations and Intelligence Training Unit\, QPS Leadership Centre\, Evidence-Based Policing (EBP) Visiting Fellow at the University of Queensland (UQ)\, and Operations Manager\, Cybercrime Squad where he was responsible for cybercrime investigations and delivering the QPS Cybercrime Strategy to improve organizational capability. \nMike is currently an Intelligence Operations Manager\, Crime Intelligence Services\, State Intelligence Group\, and remains passionate about identifying policies\, procedures\, and the best intelligence and investigative practices used by police agencies worldwide to deal with cybercrime. Mike’s project will utilize both qualitative and quantitative research methods to explore the role international organizations\, industry\, and academia play in supporting a policing response to cybercrime. This will include interviews with experts\, including law enforcement\, cybersecurity experts\, and policymakers\, along with surveys of police agencies worldwide to gather data on their cybercrime practices and supporting networks. \nMike is a Doctoral Candidate with UQ researching gendered advancement within a large policing organization. Mike has a Master of Information Systems (Awarded with Distinction) from University of Southern Queensland (USQ)\, completed the Company Directors Course at the Australian Institute of Company Directors\, and a Bachelor of Information Technology (Awarded with Distinction) from USQ. Along with several Assistant Commissioner Certificates recognizing dedication to duty and professionalism\, Mike has been recognized for his EBP work with his induction into the Centre for Evidence-Based Crime Policy\, EBP Hall of Fame in 2018 and receiving the Outstanding Practitioner Award from the Division of Policing\, American Society of Criminology in 2021. In addition\, Mike is the Secretary for the Australia and New Zealand Society for Evidence-Based Policing and is also a Committee Member of the Australasian Council of Women in Policing.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-michael-newman/
LOCATION:Fenwick Library\, Room 2001\, George Mason University\, 4400 University Drive\, Fairfax\, VA\, 22030\, United States
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240620T120000
DTEND;TZID=America/New_York:20240620T133000
DTSTAMP:20260517T092046
CREATED:20240514T142820Z
LAST-MODIFIED:20240617T202312Z
UID:7860-1718884800-1718890200@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Dr. Robert Simon
DESCRIPTION:Join us on Thursday\, June 20 for the upcoming virtual CINA Distinguished Speaker Series event featuring Dr. Robert Simon\, Professor of Computer Science and a member of the C5I Center at George Mason University in Fairfax\, VA as he discusses his topic “You Cannot Always Hide: How to De-anonymize Bad Actors on the Internet.” \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. \nREGISTER NOW \nAbstract \nCriminal and malicious internet users employ a broad spectrum of privacy-preserving technologies (PPTs) to anonymize their identities. This talk presents a novel methodology and software toolkit that can be used to de-anonymize the identities of bad actors without needing to break PPT protective mechanisms such as encryption.  Using synthetic data for the purposes of developing and testing the technique\, we provide an overview of Internet-based PPT processes and then show how de-anonymization can be achieved by analyzing Internet-based “Pattern-of-Life” behaviors. Patterns-of-Life are observable out of necessary interactions with portions of the underlying Internet infrastructure. Our methods and toolkit can be used by a wide range of law enforcement and homeland security organizations operating in the cyber realm. \n  \nSpeaker Biography \nDr. Robert Simon is a Professor of Computer Science and a member of the C5I Center at George Mason University in Fairfax\, VA. He received a Ph.D. in Computer Science from the University of Pittsburgh and joined George Mason in 1996. His research interests include networking\, distributed systems\, and Information Assurance. His recent work has focused on topics in machine learning for cyber security\, wireless networks\, and embedded systems as well as tactical and delay tolerant networking. He has published over 100 peer-reviewed journal and conference papers and has received 8 best paper awards\, including ACM MSWIM and IEEE MILCOM. His research has been funded by the National Science Foundation\, the Department of Defense\, the Department of Homeland Security\, the Intelligence Community\, and private industry.
URL:https://cina.gmu.edu/event/7860/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240416T120000
DTEND;TZID=America/New_York:20240416T133000
DTSTAMP:20260517T092046
CREATED:20240227T183333Z
LAST-MODIFIED:20240228T235252Z
UID:7816-1713268800-1713274200@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Christian Meissner
DESCRIPTION:Mitigating Resistance by Developing Rapport and Trust in Investigative Interviews\nJoin us on Tuesday\, April 16 for the upcoming virtual CINA Distinguished Speaker Series event featuring Christian Meissner\, Professor and Director of Graduate Education in the Department of Psychology at Iowa State University as he discusses “Mitigating Resistance by Developing Rapport and Trust in Investigative Interviews.” \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nAbstract \nMore than a decade of research on interviews and interrogations has led to a model of science-based practice. Studies supporting the effectiveness of this model will be discussed including: (i) specific approaches for developing rapport and trust\, and (ii) a framework for understanding and mitigating the motivations that drive resistance behaviors by interview subjects. \n  \nSpeaker Biography \n \nChristian Meissner is currently Professor and Director of Graduate Education in the Department of Psychology at Iowa State University. He received a Ph.D. in Cognitive & Behavioral Science from Florida State University (2001) and conducts empirical studies on the psychological processes involved in developing rapport and trust\, understanding resistance motivations\, facilitating recollection\, and assessing credibility in investigative interviews. Dr. Meissner’s research has been funded by the National Science Foundation\, the U.S. Departments of Defense\, Justice\, and Homeland Security\, and the U.S. Intelligence Community. His scholarly and practice contributions have been recognized by such organizations such as the American Psychology-Law Society (Div. 41 of the American Psychological Association)\, the International Investigative Interviewing Research Group\, and the Federal Bureau of Investigation. He is an elected Fellow of the Association for Psychological Science\, the American Psychological Association\, and the Psychonomic Society.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-christian-meissner/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231206T120000
DTEND;TZID=America/New_York:20231206T133000
DTSTAMP:20260517T092046
CREATED:20231019T193827Z
LAST-MODIFIED:20231019T193827Z
UID:6416-1701864000-1701869400@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Rochelle Keyhan
DESCRIPTION:Join us on Wednesday\, December 6th\, for the virtual CINA Distinguished Speaker Series event featuring Rochelle Keyhan\, Chief Executive Officer of ⁠Collective Liberty and the 2018 Thomson Reuters Foundation Stop Slavery Hero as she discusses “Current Issues in Human Trafficking.” \n  \nREGISTER NOW \n  \nThe talk will take place from 12:00-12:45 p.m.\, with an interactive audience Q&A from 12:45-1:30 p.m.  \nCall-in details for the virtual meeting will be provided upon registration.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-rochelle-keyhan/
LOCATION:Virtual
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231107T120000
DTEND;TZID=America/New_York:20231107T133000
DTSTAMP:20260517T092046
CREATED:20231019T193031Z
LAST-MODIFIED:20240118T210134Z
UID:6414-1699358400-1699363800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Calvin Chrustie
DESCRIPTION:Join us on Tuesday\, November 7th\, for the virtual CINA Distinguished Speaker Series event featuring Calvin Chrustie\,  Senior Partner and Critical Risk Consultant at Critical Risk Team (CRT) as he discusses “Convergence Zone of Transnational Organized Crime Threats – Your Best Friend Canada“ \n  \nREGISTER NOW \n  \nThe talk will take place from 12:00-12:45 p.m.\, with an interactive audience Q&A from 12:45-1:30 p.m.  \nCall-in details for the virtual meeting will be provided upon registration.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-calvin-chrustie/
LOCATION:Virtual
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230607T130000
DTEND;TZID=America/New_York:20230607T140000
DTSTAMP:20260517T092046
CREATED:20230517T155912Z
LAST-MODIFIED:20230517T155912Z
UID:3316-1686142800-1686146400@cina.gmu.edu
SUMMARY:CINA Research Findings: “Understanding Booter and Stresser Services To Engage in Cybercrime"
DESCRIPTION:This webinar is open only to attendees from DHS\, federal government\, and state and local law enforcement. \nCall-in details for the virtual meeting will be provided upon registration. \nJoin us on Wednesday\, June 7th\, from 1 to 2 p.m. for a webinar on “Understanding Booter and Stresser Services To Engage in Cybercrime.” \nThe findings presented during this webinar are informed by work led by Dr. Thomas J. Holt (Michigan State University) and Dr. Olga Smirnova (East Carolina University) through an active CINA project\, “Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a Service.” \nThere are a range of services available in the cybercrime-as-a-service ecosystem.   While ransomware and stolen data generate headlines\, there are other services that remain popular and useful for cybercriminals.  In particular\, “stresser” or “booter” services have been in operation since the early 2010s to offer distributed reflective denial of service (DRDoS) attacks.  These services effectively knock resources offline\, and have been the subject of multiple coordinated international law enforcement actions against both providers and clients.  This presentation will provide an overview of the current state of booter and stresser operations using language from 44 booter and stresser operators. Attendees will learn the functionality of their operations\, the ways that they communicate with customers\, accept payments\, and minimize their risk of detection.  The implications for our understanding of illicit online markets\, and the decision-making processes of cybercriminals will be explored as well. \nREGISTER NOW \n  \nSpeaker Biography \nThomas J. Holt is a Professor in the School of Criminal Justice at Michigan State University specializing in cybercrime\, technology\, and deviance. His research focuses on computer hacking\, malware\, and the role that technology and the Internet play in facilitating all manner of crime and terror. Dr. Holt has been published in a variety of academic journals\, including British Journal of Criminology\, Crime and Delinquency\, Deviant Behavior\, and the Journal of Criminal Justice.  He is also a coauthor of the books Cybercrime and Digital Forensics: An Introduction (2015) and Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses (2016)\, both published through Routledge.
URL:https://cina.gmu.edu/event/cina-research-findings-understanding-booter-and-stresser-services-to-engage-in-cybercrime/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230419T120000
DTEND;TZID=America/New_York:20230419T133000
DTSTAMP:20260517T092046
CREATED:20230307T204100Z
LAST-MODIFIED:20230322T171808Z
UID:3207-1681905600-1681911000@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Joe Weiss: "Control System Cyber Security is More than Network Cyber Security"
DESCRIPTION:“Control System Cyber Security is More than Network Cyber Security”\nJoin us on Wednesday\, April 19 for the upcoming virtual CINA Distinguished Speaker Series event featuring Joe Weiss\, Managing Director at Applied Control Solutions\, LLC as he discusses “Control System Cyber Security is More than Network Cyber Security.” \nThis event will take place virtually via Zoom as well as via YouTube live stream. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nAbstract: \nDefense and critical infrastructures including electric grids\, water systems\, manufacturing\, transportation\, etc. rely on control systems. Control systems consist of engineering devices “owned” by engineering and Ethernet networks “owned” by network security. Networks have cyber security\, cyber forensic capabilities\, and network personnel have cyber security training and a cyber security ethic. The engineering devices have no cyber security\, cyber forensic capabilities\, and the engineers have no cyber security training nor cyber security ethic. The culture gap is the defensive network people do not understand the control systems and generally won’t reach out to the engineers and the engineers view cyber security as e-mail” and do not feel cyber affects them. Meanwhile\, the offensive cyber people realize attacking control system devices can cause great harm to physical equipment with no attribution or cyber detection. Applying inappropriate network cyber security technologies have impacted the operation of the control system field devices exacerbating the culture divide. There have been more than 17 million control system cyber incidents that have directly resulted in more than 34\,000 deaths and many region-wide electric outages. Despite the improvement in network security technologies\, sophisticated attackers can compromise IP networks as demonstrated by Solarwinds. Ransomware has shut down manufacturing facilities due to “an abundance of caution:” Industrial\, manufacturing\, and transportation facilities cannot be protected by addressing networks alone. Consequently\, technologies have been demonstrated that can provide an unhackable approach to control system devices which can help overcome the cultural divide while improving reliability\, productivity\, and process safety. \n  \nBiography: \n \nJoe Weiss is an expert on control system cyber security. In 2000\, he helped start the control system cyber security program for the electric utilities. He has published over 80 papers on instrumentation and control systems\, control system cyber security\, book chapters on cyber security for electric substations\, water/wastewater\, data centers\, and cyber policy\, and authored Protecting Industrial Control Systems from Electronic Threats. He has amassed a database of more than 17 million control system incidents. He is an ISA Fellow\, Managing Director of ISA99\, a Ponemon Institute Fellow\, and an IEEE Senior Member. He was featured in Richard Clarke’s book- Warning – Finding Cassandras to Stop Catastrophes. He has patents on instrumentation\, control systems\, and OT networks\, is a registered professional engineer and has CISM and CRISC certifications.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-joe-weiss-control-system-cyber-security-is-more-than-network-cyber-security/
LOCATION:Virtual
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230412T110000
DTEND;TZID=America/New_York:20230412T114500
DTSTAMP:20260517T092046
CREATED:20230322T145807Z
LAST-MODIFIED:20230322T171920Z
UID:3220-1681297200-1681299900@cina.gmu.edu
SUMMARY:CINA Research Findings Presentation: “Understanding Cryptomixing Services in Context of the Open and Dark Web”
DESCRIPTION:Join us on Wednesday\, April 12th\, from 11:00 – 11:45 a.m. for a webinar on “Understanding Cryptomixing Services in Context of the Open and Dark Web.” \nThe Internet has become a popular marketplace for the sale of illicit products\, including stolen personal information\, drugs\, and firearms. Many of these products are purchased using cryptocurrencies\, which is generally defined as forms of digital currency that are traceable through blockchain ledger technology. Cryptocurrencies are thought to be more secure than other forms of digital payment\, though law enforcement and financial service providers have found ways to investigate account holders and their transactions. Consequently\, several service providers have begun to offer cryptomixing services\, which effectively launders payments to circumvent detection and investigation tools. Few have explored the practices of cryptomixing services\, or the ways in which they are marketed on the Open and Dark Web. This inductive qualitative analysis will examine a sample of 18 cryptomixing services advertised on both the Open and Dark Web to better understand cryptomixing and its role in facilitating illicit transactions in various contexts. \nThe findings presented during this webinar are informed by work led by Dr. Thomas J. Holt (Michigan State University) through an active CINA project\, “Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a Service.” \nThis webinar is open only to attendees from DHS\, federal government\, and state and local law enforcement. \nCall-in details for the virtual meeting will be provided upon registration. \n  \nREGISTER NOW \n  \nSpeaker Biography \nThomas J. Holt is a Professor in the School of Criminal Justice at Michigan State University specializing in cybercrime\, technology\, and deviance. His research focuses on computer hacking\, malware\, and the role that technology and the Internet play in facilitating all manner of crime and terror. Dr. Holt has been published in a variety of academic journals\, including British Journal of Criminology\, Crime and Delinquency\, Deviant Behavior\, and the Journal of Criminal Justice.  He is also a coauthor of the books Cybercrime and Digital Forensics: An Introduction (2015) and Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses (2016)\, both published through Routledge.
URL:https://cina.gmu.edu/event/cina-research-findings-presentation-understanding-cryptomixing-services-in-context-of-the-open-and-dark-web/
LOCATION:Virtual
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230308T120000
DTEND;TZID=America/New_York:20230308T133000
DTSTAMP:20260517T092046
CREATED:20230222T194852Z
LAST-MODIFIED:20230307T184813Z
UID:3195-1678276800-1678282200@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Nic McKinley: "Using Transaction Data to Disrupt Illicit Commodity Markets"
DESCRIPTION:Disrupting Global Human Trafficking Networks\nJoin us on Wednesday\, March 8 for the upcoming virtual CINA Distinguished Speaker Series event featuring Nic McKinley\, Founder and Chief Executive Officer of DeliverFund as he discusses “Using Transaction Data to Disrupt Illicit Commodity Markets.” \nThis event will take place virtually via Zoom as well as via YouTube live stream. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nAbstract: \nIllicit markets for commodities involve transactional nodes that delineate the commercial interactions between participants. These nodes represent crucial opportunities for stakeholders such as law enforcement\, regulators\, and industry partners to gather and analyze data\, with the aim of thwarting the sale of illegal goods. Nic McKinleywill elaborate on this theme by drawing on the specific case of human trafficking. Through his presentation\, McKinley will underscore how proficient data collection and analysis can expedite the identification of pertinent information\, leading to more precise and expeditious intervention. \n  \nBiography: \n \nNic McKinley – As an Operative who served as a Country Chief for a Special Unit within the CIA\, Nic witnessed not only the epidemic of child trafficking within illicit markets\, but also the unrealized opportunity to apply his understanding and training to influence this global crisis. As Nic began to work with experts to better understand the problem in the United States\, he found it impossible to turn a blind eye. \nAs a result\, DeliverFund was officially established as a 501c3 in October 2014 and our counter human trafficking organization\, focused on ending sex slavery in the United States got to work. Nic spent 11 years in US Special Operations as an Air Force Pararescueman prior to being recruited to the Central Intelligence Agency. Due to his highly specialized training and experience in both special and intelligence operations\, Nic has a firm understanding about these illicit\, illegal markets and has the highest levels of training to effectively combat them.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-nic-mckinley/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230308T100000
DTEND;TZID=America/New_York:20230308T110000
DTSTAMP:20260517T092046
CREATED:20230302T203819Z
LAST-MODIFIED:20230302T203852Z
UID:3203-1678269600-1678273200@cina.gmu.edu
SUMMARY:CINA Research Findings Presentation: "Targeting Investment to Maximize Public Safety Along Residential Street Segments"
DESCRIPTION:Join us on Wednesday\, March 8th\, from 10:00 – 11:00 a.m. for the virtual presentation which will provide updates on research findings from an active CINA project\, “Innovative Spatiotemporal Pattern Detection: Examining Changes in Crime Hot Spots Across 6 U.S. Cities\,” led by Marie Tillyer (University of Texas San Antonio)\, Rebecca Walter\, and Arthur Acolin (University of Washington). \nThis event will take place virtually via Microsoft Teams Webinar. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \nThis presentation explores how neighborhood characteristics impact the effects of investment on crime at residential street segments by using data from six large U.S. cities (Chicago\, Los Angeles\, New York City\, Philadelphia\, San Antonio\, and Seattle) over an 11-year period (2008-2018) to better understand how investment strategies can be targeted to maximize public safety benefits.
URL:https://cina.gmu.edu/event/3203/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T120000
DTEND;TZID=America/New_York:20221207T133000
DTSTAMP:20260517T092046
CREATED:20221129T002140Z
LAST-MODIFIED:20221129T002140Z
UID:3128-1670414400-1670419800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: "Working with Law Enforcement and Brands to Hold Bad Actors Accountable and Protect Consumers" with Joe Wheatley
DESCRIPTION:Join us on Wednesday\, December 7 for the upcoming virtual CINA Distinguished Speaker Series event featuring Joe Wheatley\, Senior Corporate Counsel of the Amazon Counterfeit Crimes Unit where he will discuss “Working with Law Enforcement and Brands to Hold Bad Actors Accountable and Protect Consumers.” \nThis event will take place virtually via Zoom. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \n 
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-working-with-law-enforcement-and-brands-to-hold-bad-actors-accountable-and-protect-consumers-with-joe-wheatley/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Information Session,Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220831T120000
DTEND;TZID=America/New_York:20220831T133000
DTSTAMP:20260517T092046
CREATED:20220801T180933Z
LAST-MODIFIED:20220809T190609Z
UID:2883-1661947200-1661952600@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Gurvais Grigg - "Deconstructing Cybercrime Through Blockchain Forensics"
DESCRIPTION:Tune in on Wednesday\, August 31st at 12:00 p.m. when Gurvais Grigg\, Global Public Sector Chief Technology Officer at Chainanalysis\, Inc. will discuss “Deconstructing Cybercrime Through Blockchain Forensics”. \nThis presentation will outline trends in the illicit use of cryptocurrency and practical ways to incorporate this new asset class and solve cases. \nAbstract: Digital assets are impacting the 21st century financial landscape and global blockchain adoption is accelerating. Increasingly\, investigators are turning to blockchain analytics to solve complex financial crime cases and follow the money through cyberspace. To effectively meet this challenge\, today’s investigators are growing their crypto-literacy and equipping themselves with the right data and tools to accelerate their investigations. \nThe hybrid event which will take place virtually via Zoom as well as on the George Mason University\, Fairfax campus: Room 3301\, Exploratory Hall\, 10431 Rivanna River Way\, Fairfax\, VA 22030. The information to attend virtually will be sent to participants upon registering. \n  \nREGISTER NOW \n  \nSpeaker Biography: \nGurvais C. Grigg is a recognized technology executive and thought leader with 28 years of public and private sector investigative and financial experience. As the Global Public Sector CTO for Chainalysis\, Gurvais is responsible for connecting global governments with the cryptocurrency industry and data they need to manage risks and conduct effective investigations. He served 23 years as a Special Agent and executive for the FBI conducting and leading criminal and national security investigations and building state-of-the-art operational and technical capabilities to identify and track suspected terrorists\, spies\, and criminals and their finances. Gurvais is an Eagle Scout and the recipient of numerous awards including the Presidential Rank Award and the NESA Outstanding Eagle Scout Award.  He holds a bachelor’s degree in biochemistry with a minor in Spanish and a Masters in Homeland Security Management.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-gurvais-grigg-deconstructing-cybercrime-through-blockchain-forensics/
LOCATION:Room 3301\, Exploratory Hall\, Fairfax\, VA\, 10431 Rivanna River Way\, Fairfax\, Virginia\, 22030\, United States
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220217T120000
DTEND;TZID=America/New_York:20220217T133000
DTSTAMP:20260517T092046
CREATED:20211207T194546Z
LAST-MODIFIED:20220216T174640Z
UID:2770-1645099200-1645104600@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Jay Kennedy - "The Future of Counterfeiting"
DESCRIPTION:Tune in on Thursday\, February 17 at 12:00 p.m. when Jay Kennedy\, Assistant Professor at Michigan State University will discuss “The Future of Counterfeiting:\nShifting Patterns in Enforcement\, Opportunity Structures and Consumer Engagement”. \nIn this presentation Dr. Kennedy will discuss: \n\nThe value and importance of public-private collaboration in addressing counterfeiting risks for consumers\nThe shifting dynamics of e-commerce and social commerce and how consumers are responding;\nEmerging socio-technical changes that are impacting counterfeiting schemes and consumer complicity\nThe impact of global supply/manufacturing developments (supply chain shortages\, Free Trade Zones) on global counterfeiting schemes.\n\nDr. Kennedy is actively involved in research\, education\, and outreach efforts that focus on external partners including corporations\, industry associations\, and law enforcement agencies. \nThis event will be completely virtual. \n  \nREGISTER NOW \n  \nSpeaker Biography: \nDr. Jay P. Kennedy is an Assistant Professor at Michigan State University\, jointly appointed to the School of Criminal Justice and the Center for Anti-Counterfeiting and Product Protection where serves the Assistant Director of Research. He is a Faculty Affiliate with the Michigan State University Graduate School\, and an Affiliated Faculty member with the Institute for Public Policy and Social Research\, the Center for Business and Social Analytics\, and the Canadian Studies Center. Dr. Kennedy’s current research explores managerial and organizational responses to employee theft within small and medium enterprises and the sale of counterfeit goods on the Internet through social media and e-commerce. His work has been published in a number of outlets\, including Criminology and Public Policy\, American Behavioral Scientist\, Maritime Economics and Logistics\, Criminal Justice Review\, Journal of Crime and Justice\, Journal of Financial Crime\,Security Journal\, and Victims and Offenders. He is currently serving as an elected board member of the American Society of Criminology’s Division of White-Collar and Corporate Crime and is an editorial board member for the Journal of White-Collar and Corporate Crime and the International Journal of Cybercrime Intelligence and Cybersecurity.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-jay-kennedy-anti-counterfeiting-and-product-protection/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211112T113000
DTEND;TZID=America/New_York:20211112T130000
DTSTAMP:20260517T092046
CREATED:20210830T205237Z
LAST-MODIFIED:20211022T141848Z
UID:2726-1636716600-1636722000@cina.gmu.edu
SUMMARY:CINA Virtual Distinguished Speaker Series: Marie Tillyer “Place-Based Improvements for Public Safety: Public Regulation\, Private Investment\, and Changes in Crime at Micro-places Across 6 US Cities"
DESCRIPTION:Join us on Friday\, November 12 at 11:30 a.m. when Dr. Marie Tillyer\, Professor of Criminology & Criminal Justice at the University of Texas at San Antonio discusses place-based improvements for public safety: Public regulation\, private investment\, and changes in crime at micro-places across 6 US cities. This event will be completely virtual.\n  \nREGISTER NOW \n \nResearch on spatiotemporal crime patterns reveals that crime is concentrated at relatively few micro-places (e.g.\, addresses\, intersections\, street segments)\, it tends to be stable over time\, and changes at a small proportion of micro-places can have a considerable effect on a city’s overall crime level. These findings have prompted calls for targeted place-based interventions to efficiently allocate scarce prevention resources.  This presentation uses data from six unique urban landscapes (Chicago\, Los Angeles\, New York City\, Philadelphia\, San Antonio\, and Seattle) to explore spatiotemporal crime patterns.  Specifically\, we examine the relationship between two mechanisms for place-based improvements – public regulation in the form of municipal code enforcement and private investment in the form of building permits – and changes in crime at street segments over time.  The findings highlight how non-criminal justice policies\, such as incentivizing targeted private investment and prioritizing code enforcement at crime hot spots\, might be strategically implemented to enhance public safety. \n  \nSpeaker Biography: \nMarie Skubak Tillyer\, who serves as Principal Investigator on the project\, is a professor of criminology and criminal justice at the University of Texas at San Antonio. She has published over 40 peer reviewed journal articles\, with a focus on violence\, victimization\, and the spatial distribution of crime. She is co-author of School Zone: A Problem Analysis of Student Offending and Victimization (forthcoming\, Temple University Press)\, a place-focused analysis of crime involving adolescents in schools\, and current Co-Principal Investigator on a prospective\, longitudinal study funded by the National Institute of Justice examining the cumulative financial costs of victimization among college students at minority serving institutions.  In addition\, her past applied research has examined community supervision outcomes\, violence reduction\, crime analysis\, and human trafficking.  Much of her research is informed by an environmental criminological perspective that examines crime events and the immediate spatiotemporal circumstances in which they occur. Her collaborations with Drs. Walter and Acolin\, the project Co-Principal Investigators\, have led her to apply this perspective to studying crime across various geographical units\, including low-income housing developments\, businesses\, street blocks\, and street segments.
URL:https://cina.gmu.edu/event/cina-virtual-distinguished-speaker-series-marie-tillyer-open-source-data-and-predictive-modeling-for-high-density-crime-areas/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Research Presentation,Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211013T120000
DTEND;TZID=America/New_York:20211013T133000
DTSTAMP:20260517T092046
CREATED:20210830T193620Z
LAST-MODIFIED:20210921T184441Z
UID:2720-1634126400-1634131800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Gretchen Peters “How Organized Crime Weaponized Social Media"
DESCRIPTION:Tune in on Wednesday\, October 13 at 12:00 p.m. when Gretchen Peters\, Executive Director of The Center on Illicit Networks and Transnational Organized Crime who will speak about her organization’s work on the way organized crime has weaponized social media. In-person attendance is on a first come first serve basis. You must register in advance to attend.\n  \nREGISTER NOW \n \nThe in-person event will take place at the George Mason University\, Fairfax campus: Room 3301\, Exploratory Hall 4400 University Drive\, Fairfax\, VA 22030 \n  \nSpeaker Biography: \nGretchen Peters is the Executive Director of The Center on Illicit Networks and Transnational Organized Crime (CINTOC). She has served as a consultant to the U.S. Defense Department and U.S. law enforcement on transnational organized crime and co-chaired an OECD Task Force on fighting wildlife crime. Her expertise is in researching and mapping transnational organized crime networks\, working with U.S. Central Command and U.S. Special Operations Command among others. Gretchen authored the groundbreaking book\, Seeds of Terror\, about the Taliban’s role in the Afghan heroin trade. She has also written various chapters in leading academic books about the intersection of crime and conflict.
URL:https://cina.gmu.edu/event/cina-virtual-distinguished-speaker-series-gretchen-peters-how-organized-crime-weaponized-social-media/
LOCATION:George Mason University\, Fairfax Campus\, Exploratory Hall 4400 University Drive\, Fairfax\, VA\, 22030\, United States
CATEGORIES:Research Presentation,Seminar
END:VEVENT
END:VCALENDAR