BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//CINA - ECPv6.15.20//NONSGML v1.0//EN
CALSCALE:GREGORIAN
METHOD:PUBLISH
X-ORIGINAL-URL:https://cina.gmu.edu
X-WR-CALDESC:Events for CINA
REFRESH-INTERVAL;VALUE=DURATION:PT1H
X-Robots-Tag:noindex
X-PUBLISHED-TTL:PT1H
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20200308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20201101T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20210314T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20211107T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20220313T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20221106T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20230312T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20231105T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20240310T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20241103T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20250309T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20251102T060000
END:STANDARD
BEGIN:DAYLIGHT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
TZNAME:EDT
DTSTART:20260308T070000
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
TZNAME:EST
DTSTART:20261101T060000
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250326T130000
DTEND;TZID=America/New_York:20250326T143000
DTSTAMP:20260426T193520
CREATED:20250227T211418Z
LAST-MODIFIED:20250319T200222Z
UID:8132-1742994000-1742999400@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: "Exploring Evidence-based Cybercrime Research with Dr. David Maimon"
DESCRIPTION:In-Person Location: George Mason University\, Fairfax Campus\, Fenwick Library\, Room 2001\, 4400 University Drive\, Fairfax\, VA 22030. \nVirtual Location: MS Teams Webinar (link to join sent upon registration) \nJoin us on Wednesday\, March 26 for the upcoming hybrid CINA Distinguished Speaker Series event as The Sycamore Institute Podcast Host Ethan Burk interviews Dr. David Maimon of Georgia State University about the past\, present\, and future of cybercrime research and what current students can do to prepare for careers in cybercrime investigations. As part of the Distinguished Speaker Series\, CINA has collaborated with The Sycamore Institute Podcast and Sentilink to create a special in-person event at George Mason University. Faculty\, students\, industry\, and government attendees are welcome. \nREGISTER NOW \n  \nAbstract \nDrawing from extensive experience in FBI investigations\, counterterrorism operations\, and research with the High-Value Detainee Interrogation Group (HIG)\, this presentation explores the critical role of interviewer mindset in conducting effective interviews. While traditional interrogation methods often rely on rigid procedures and control\, modern evidence-based approaches emphasize the importance of three key components: self-awareness\, confidence\, and genuine curiosity. Through real-world examples ranging from domestic criminal cases to international terrorism investigations\, the talk demonstrates how developing the right mindset—one that combines thorough preparation with adaptability and emphasizes understanding over confrontation—leads to more successful outcomes in even the most challenging interviews. The presentation argues that effective interviewing is not just about mastering techniques\, but about developing an ethos that allows interviewers to creatively apply research-based methodologies while maintaining focus on gathering accurate information rather than simply seeking confessions. This approach not only yields better intelligence and evidence but also proves more effective in building cooperation and eliciting truthful information across all types of interviews. \n  \nSpeaker Biographies: \nDavid Maimon\, a professor and Next Generation Scholar in the Andrew Young School of Policy Studies’ Department of Criminal Justice & Criminology\, directs the Evidence-based Cybersecurity Research Group at Georgia State University. He is also a research associate with the HUJI Cyber-Security Research Center at The Hebrew University in Jerusalem. His research interests include theories of human behaviors\, cyber-enabled and cyber-dependent crimes\, and experimental research methods. His current research focuses on computer hacking and the progression of system trespassing events\, computer networks vulnerabilities to cyberattacks\, and the decision-making process in cyber space. He is also researching intellectual property and cyber fraud. Maimon’s research has been funded by research grants from both governmental and private agencies from both the U.S. and abroad. He received the Young Scholar Award from the White-Collar Crime Research Consortium of the National White-Collar Crime Center for his cybercrime research in 2015\, the Philip Merrill Presidential Scholars Faculty Mentor Award from the University of Maryland\, and the Best Publication Award in Mental Health from the American Sociological Association. Maimon received his Ph.D. in Sociology from the Ohio State University in 2009. \n  \n \nEthan Burk is an Undergraduate Student at George Mason University (GMU) majoring in Business with a minor in Intelligence Studies and serves as the National Podcast Director for The Sycamore Institute as well as a project manager for the student organization Tech 4 Good. Known for his articles on modern cybercrime as a Sycamore Institute Writing Fellow and as a specialist writer for George Mason University’s newspaper\, Fourth Estate\, Ethan has worked as a research assistant at William and Mary’s Behavioral Research Lab and as a criminal analyst intern at Homeland Security Investigation’s Cyber Crime Center. Ethan hopes to use both his business/management insights\, and his experiences in federal law enforcement to create new tactics\, policies\, and strategies for combatting transnational organized crime on the dark web.
URL:https://cina.gmu.edu/event/8132/
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250311T120000
DTEND;TZID=America/New_York:20250311T133000
DTSTAMP:20260426T193520
CREATED:20250113T183234Z
LAST-MODIFIED:20250227T203016Z
UID:8085-1741694400-1741699800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Colton Seale
DESCRIPTION:Interviewer Mindset  \nJoin us on Tuesday\, March 11 for the upcoming virtual CINA Distinguished Speaker Series event featuring Colton Seale\, Founder and Principal Consultant at Pyxis Academy\, as he delves into the art and science of Intelligence Interviewing and what he’s learned from his 20 years as an FBI Special Agent with the High-Value Detainee Interrogation Group and Counterterrorism Fly Team. \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nDrawing from extensive experience in FBI investigations\, counterterrorism operations\, and research with the High-Value Detainee Interrogation Group (HIG)\, this presentation explores the critical role of interviewer mindset in conducting effective interviews. While traditional interrogation methods often rely on rigid procedures and control\, modern evidence-based approaches emphasize the importance of three key components: self-awareness\, confidence\, and genuine curiosity. Through real-world examples ranging from domestic criminal cases to international terrorism investigations\, the talk demonstrates how developing the right mindset—one that combines thorough preparation with adaptability and emphasizes understanding over confrontation—leads to more successful outcomes in even the most challenging interviews. The presentation argues that effective interviewing is not just about mastering techniques\, but about developing an ethos that allows interviewers to creatively apply research-based methodologies while maintaining focus on gathering accurate information rather than simply seeking confessions. This approach not only yields better intelligence and evidence but also proves more effective in building cooperation and eliciting truthful information across all types of interviews. \n  \nSpeaker Biography: \nCEO of Pyxis Academy\, Colton equips corporate leaders with the skills to master difficult conversations and navigate challenging workplace situations. With over 20 years of experience as an FBI Special Agent\, he has developed a program that surpasses the usual way of intelligence training and collection\, based on science and research. \nColton’s passion is to share his knowledge and expertise with clients who want to improve their communication\, rapport\, and influence\, regardless of their domain. He has trained more than 8\,000 students across the U.S. Intelligence Community\, Military\, and Law Enforcement\, as well as in over 15 countries globally. Colton has also received multiple commendations and awards for his outstanding performance and achievements in the intelligence field\, including the FBI Director’s Award and the National Intelligence Community Citation.
URL:https://cina.gmu.edu/event/8085/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Information Session,Research Presentation,Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20250129T120000
DTEND;TZID=America/New_York:20250129T133000
DTSTAMP:20260426T193520
CREATED:20250113T184108Z
LAST-MODIFIED:20250129T174838Z
UID:8088-1738152000-1738157400@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Abby Stylianou
DESCRIPTION:TraffickCam: Identifying Where Victims of Human Trafficking and Child Sexual Abuse are Photographed \nJoin us on Wednesday\, January 29 for the upcoming virtual CINA Distinguished Speaker Series event featuring Dr. Abby Stylianou\, Associate Professor of Computer Science at Saint Louis University\, and a Fellow of the Taylor Geospatial Institute as she discusses “TraffickCam: Identifying Where Victims of Human Trafficking and Child Sexual Abuse are Photographed.” \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nVictims of child sexual abuse and human trafficking are often photographed in hotel rooms. Identifying the hotels in these photographs is a top priority for investigators and prosecutors — they show where a victim has been and where their abused may move them or others in the future. In this talk\, Dr. Abby Stylianou will introduce TraffickCam\, platform for identifying the locations in these victim images. The platform includes a crowd-sourcing mobile application to collect images of hotel rooms from the traveling public that is currently used by over 250\,000 individuals who upload photos specifically to help combat trafficking. The data from this app\, combined with millions of publicly available images from travel websites\, support a first-in-the-world system for image search to identify hotels in trafficking imagery that is deployed at the National Center for Missing and Exploited Children (NCMEC). Dr. Stylianou will present the technical details behind this search system and the research that’s led to its current capabilities\, share lessons learned about real world investigative image search from years of working with the analysts at NCMEC\, and discuss the challenges and opportunities in this space in the current AI ecosystem. \n  \nSpeaker Biography:\nDr. Abby Stylianou is an Associate Professor of Computer Science at Saint Louis University\, and a Fellow of the Taylor Geospatial Institute. Dr. Stylianou’s research lies at the intersection of multimodal image retrieval\, fine grained visual categorization\, and explainable AI. In recent years\, Dr. Stylianou’s research has focused on building citizen science data collection applications and global scale image search tools\, specifically to support the National Center for Missing and Exploited Children’s investigations of child sexual abuse and human trafficking. Dr. Stylianou is generally excited about applications of computer vision and machine learning that have the potential to benefit society in some way. Beyond the work to help in investigations of child sexual abuse and human trafficking\, she has worked on developing systems for making measurements of the natural environment in time-lapse imagery to understand climate change\, observing how individuals interact with the world around them in outdoor webcam images to support better design of the built environment\, and developing new vision and machine learning algorithms and systems for agriculture and plant breeding to develop more sustainable\, more resilient\, and healthier crops. Dr. Stylianou is the Communications Officer for the IEEE Technical Community on Pattern Analysis and Machine Intelligence\, and regularly serves as Social Media Chair and Area Chair for a variety of premier computer vision conferences\, including CVPR\, ICCV\, ECCV and WACV.
URL:https://cina.gmu.edu/event/stylianou/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Information Session,Research Presentation,Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241024T150000
DTEND;TZID=America/New_York:20241024T160000
DTSTAMP:20260426T193520
CREATED:20241009T203055Z
LAST-MODIFIED:20241213T173841Z
UID:7989-1729782000-1729785600@cina.gmu.edu
SUMMARY:DHS CINA – Technology Transfer Presentations
DESCRIPTION:DHS CINA – Technology Transfer Presentations\n\n\nJoin us on Thursday\, October 24 for the upcoming webinar DHS CINA – Technology Transfer Presentations. This event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. Faculty\, students\, industry\, and government attendees are welcome. \nThis DHS CINA Technology Transfer presentation will focus on providing the layperson a clearer picture of how to protect intellectual property (IP) while conducting research\, a better understanding of how to use non-disclosure agreements (NDAs) in conducting day-to-day research\, and putting these topics together into a successful technology transfer roadmap. \nTopics discussed will include: \n\nProtecting Intellectual Property (IP)\nUnderstanding non-disclosure agreements (NDA)\nA successful technology transfer roadmap! \n\n  \nREGISTER NOW \n 
URL:https://cina.gmu.edu/event/7989/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Information Session
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20241009T120000
DTEND;TZID=America/New_York:20241009T133000
DTSTAMP:20260426T193520
CREATED:20240911T184435Z
LAST-MODIFIED:20240911T191215Z
UID:7919-1728475200-1728480600@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Donna Turner
DESCRIPTION:The Global Squeezing of the Fraud Balloon \nJoin us on Wednesday\, October 9 for the upcoming virtual CINA Distinguished Speaker Series event featuring Donna Turner\, former Bank of America C-Suite Executive. This event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nDoes history repeat itself in the context of fraud threats? Do the actions taken in other geographies impact the domestic fight against fraud positively or negatively? \nBy looking at the historical patterns of fraud threats globally\, are we able to project the expected impact domestically of any new or material change to the threat environment or the capability offering?  Understanding these all too often repeated patterns of threat and response from a global perspective will better prepare us to understand and prepare for the expected outcomes. Since these threats and countermeasures are all too often honed outside the US\, it is important to maintain a global perspective on both the threat and capability environment. Today’s dominant use case is the rapid development of centralized and orchestrated fraud risk management in certain geographies that enable data collection and exchange to more effectively manage the ecosystem of inputs and deliver more impactful outputs.  Absent a similar effort domestically\, what are the expected implications\, and what can be done absent the same to ensure readiness and execution. \n  \nSpeaker Biography: \nDonna Turner is an industry thought leader in payments\, product management\, fraud risk management\, and operations. Having spent more than 30 years in financial services with PNC & Bank of America\, she then served as Chief Operations Officer for Early Warning Systems\, the industry consortium behind the Zelle payments network. It is this deep and broad set of experiences that she brings to the table in the founding of Risk Insight Solutions\, an advisory firm aimed at assisting companies in developing sustainable growth\, addressing risk\, and delivering exceptional experiences. \nWhile in banking\, her experiences spanned large-scale\, global operations; product and P&L management; risk management; process engineering\, and enterprise fraud risk management. This compilation of experiences brought to life a passion for optimization\, where the delicate balance of customer experience\, operational expense\, and risk tolerance must be perpetually challenged and adjusted as customer expectations\, capabilities\, platforms\, risk\, and expense appetites all shift and evolve. \nAt Early Warning\, having joined before the launch of the Zelle network\, the joy was in bringing the network to life\, which meant cross-organization orchestration in concert with the design\, execution and often reimagining of function and processes to be agile\, scalable\, and provide exceptional service all within an established risk tolerance of reputation\, financial and operational risk. \nDonna was recognized as one of the ‘Most Influential Women in Payments’ and holds two patents in the fraud risk management arena. She has served as Chair of the Board for the Ada Jenkins Center and is currently on the board of directors for The Knoble. She currently serves as an Advisor in Residence for EY\, and as an independent advisor to companies in the payments and fraud risk management sectors. Her educational background spans undergrad at the University of Florida\, with certifications in Operational Management from the University of Michigan and Risk Management from Harvard University. \nDonna’s passion now lies in sharing her experience and insight to enable the success of others.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-donna-turner/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240924T110000
DTEND;TZID=America/New_York:20240924T121500
DTSTAMP:20260426T193520
CREATED:20240823T195909Z
LAST-MODIFIED:20240826T173200Z
UID:7908-1727175600-1727180100@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Michael Newman
DESCRIPTION:“Advancing Cybercrime Response: Insights from the Queensland Police Service and a Cybercrime Churchill Fellowship”\n  \nIn-Person Location: George Mason University\, Fairfax Campus\, Fenwick Library\, Room 2001\, 4400 University Drive\, Fairfax\, VA 22030. \nVirtual Location: MS Teams Webinar (link to join sent upon registration) \nJoin us on Tuesday\, September 24 for the upcoming hybrid CINA Distinguished Speaker Series event featuring Michael Newman\, an Intelligence Operations Manager\, Crime Intelligence Services\, State Intelligence Group of the Queensland Police Service\, as he discusses “Advancing cybercrime response: Insights from the Queensland Police Service and a Cybercrime Churchill Fellowship.” Faculty\, students\, industry\, and government attendees are welcome. \n  \nREGISTER NOW \n  \nAbstract \nAs technology evolves\, so does the threat of cybercrime. The Queensland Police Service (QPS) of Australia has dedicated increased efforts to tackle cyber threats\, safeguard communities\, and ensure digital safety. This hybrid event co-sponsored by the Criminal Investigations Network Analysis Center and the Center for Evidence-Based Crime Policy will explore QPS efforts in combating cybercrime\, highlighting successful strategies\, challenges faced\, and collaborative initiatives. Mike will also delve into the purpose and initial learnings from his prestigious Churchill Fellowship. Mike\, an experienced QPS officer\, has embarked on a global journey to investigate international policing agencies\, industry partnerships\, and academia’s role in supporting police responses to cybercrime. He aims to identify and shed light on best practices\, innovative approaches\, and the networks that strengthen our collective fight against cyber threats. \nJoin us as we uncover the synergy between QPS practical efforts and a cybercrime Churchill Fellowship exploration\, aimed at ultimately enhancing our ability to protect against this ever-increasing threat. \n  \nSpeaker Biography: \nMichael Newman has over 30 years of policing experience and is committed to improving community safety outcomes in an evidence-based manner. As a Commissioned Officer\, Mike has undertaken duties managing the Investigations and Intelligence Training Unit\, QPS Leadership Centre\, Evidence-Based Policing (EBP) Visiting Fellow at the University of Queensland (UQ)\, and Operations Manager\, Cybercrime Squad where he was responsible for cybercrime investigations and delivering the QPS Cybercrime Strategy to improve organizational capability. \nMike is currently an Intelligence Operations Manager\, Crime Intelligence Services\, State Intelligence Group\, and remains passionate about identifying policies\, procedures\, and the best intelligence and investigative practices used by police agencies worldwide to deal with cybercrime. Mike’s project will utilize both qualitative and quantitative research methods to explore the role international organizations\, industry\, and academia play in supporting a policing response to cybercrime. This will include interviews with experts\, including law enforcement\, cybersecurity experts\, and policymakers\, along with surveys of police agencies worldwide to gather data on their cybercrime practices and supporting networks. \nMike is a Doctoral Candidate with UQ researching gendered advancement within a large policing organization. Mike has a Master of Information Systems (Awarded with Distinction) from University of Southern Queensland (USQ)\, completed the Company Directors Course at the Australian Institute of Company Directors\, and a Bachelor of Information Technology (Awarded with Distinction) from USQ. Along with several Assistant Commissioner Certificates recognizing dedication to duty and professionalism\, Mike has been recognized for his EBP work with his induction into the Centre for Evidence-Based Crime Policy\, EBP Hall of Fame in 2018 and receiving the Outstanding Practitioner Award from the Division of Policing\, American Society of Criminology in 2021. In addition\, Mike is the Secretary for the Australia and New Zealand Society for Evidence-Based Policing and is also a Committee Member of the Australasian Council of Women in Policing.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-michael-newman/
LOCATION:Fenwick Library\, Room 2001\, George Mason University\, 4400 University Drive\, Fairfax\, VA\, 22030\, United States
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240620T120000
DTEND;TZID=America/New_York:20240620T133000
DTSTAMP:20260426T193520
CREATED:20240514T142820Z
LAST-MODIFIED:20240617T202312Z
UID:7860-1718884800-1718890200@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Dr. Robert Simon
DESCRIPTION:Join us on Thursday\, June 20 for the upcoming virtual CINA Distinguished Speaker Series event featuring Dr. Robert Simon\, Professor of Computer Science and a member of the C5I Center at George Mason University in Fairfax\, VA as he discusses his topic “You Cannot Always Hide: How to De-anonymize Bad Actors on the Internet.” \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registration. \nREGISTER NOW \nAbstract \nCriminal and malicious internet users employ a broad spectrum of privacy-preserving technologies (PPTs) to anonymize their identities. This talk presents a novel methodology and software toolkit that can be used to de-anonymize the identities of bad actors without needing to break PPT protective mechanisms such as encryption.  Using synthetic data for the purposes of developing and testing the technique\, we provide an overview of Internet-based PPT processes and then show how de-anonymization can be achieved by analyzing Internet-based “Pattern-of-Life” behaviors. Patterns-of-Life are observable out of necessary interactions with portions of the underlying Internet infrastructure. Our methods and toolkit can be used by a wide range of law enforcement and homeland security organizations operating in the cyber realm. \n  \nSpeaker Biography \nDr. Robert Simon is a Professor of Computer Science and a member of the C5I Center at George Mason University in Fairfax\, VA. He received a Ph.D. in Computer Science from the University of Pittsburgh and joined George Mason in 1996. His research interests include networking\, distributed systems\, and Information Assurance. His recent work has focused on topics in machine learning for cyber security\, wireless networks\, and embedded systems as well as tactical and delay tolerant networking. He has published over 100 peer-reviewed journal and conference papers and has received 8 best paper awards\, including ACM MSWIM and IEEE MILCOM. His research has been funded by the National Science Foundation\, the Department of Defense\, the Department of Homeland Security\, the Intelligence Community\, and private industry.
URL:https://cina.gmu.edu/event/7860/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20240416T120000
DTEND;TZID=America/New_York:20240416T133000
DTSTAMP:20260426T193520
CREATED:20240227T183333Z
LAST-MODIFIED:20240228T235252Z
UID:7816-1713268800-1713274200@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Christian Meissner
DESCRIPTION:Mitigating Resistance by Developing Rapport and Trust in Investigative Interviews\nJoin us on Tuesday\, April 16 for the upcoming virtual CINA Distinguished Speaker Series event featuring Christian Meissner\, Professor and Director of Graduate Education in the Department of Psychology at Iowa State University as he discusses “Mitigating Resistance by Developing Rapport and Trust in Investigative Interviews.” \nThis event will take place virtually via MS Teams. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nAbstract \nMore than a decade of research on interviews and interrogations has led to a model of science-based practice. Studies supporting the effectiveness of this model will be discussed including: (i) specific approaches for developing rapport and trust\, and (ii) a framework for understanding and mitigating the motivations that drive resistance behaviors by interview subjects. \n  \nSpeaker Biography \n \nChristian Meissner is currently Professor and Director of Graduate Education in the Department of Psychology at Iowa State University. He received a Ph.D. in Cognitive & Behavioral Science from Florida State University (2001) and conducts empirical studies on the psychological processes involved in developing rapport and trust\, understanding resistance motivations\, facilitating recollection\, and assessing credibility in investigative interviews. Dr. Meissner’s research has been funded by the National Science Foundation\, the U.S. Departments of Defense\, Justice\, and Homeland Security\, and the U.S. Intelligence Community. His scholarly and practice contributions have been recognized by such organizations such as the American Psychology-Law Society (Div. 41 of the American Psychological Association)\, the International Investigative Interviewing Research Group\, and the Federal Bureau of Investigation. He is an elected Fellow of the Association for Psychological Science\, the American Psychological Association\, and the Psychonomic Society.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-christian-meissner/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231206T120000
DTEND;TZID=America/New_York:20231206T133000
DTSTAMP:20260426T193520
CREATED:20231019T193827Z
LAST-MODIFIED:20231019T193827Z
UID:6416-1701864000-1701869400@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Rochelle Keyhan
DESCRIPTION:Join us on Wednesday\, December 6th\, for the virtual CINA Distinguished Speaker Series event featuring Rochelle Keyhan\, Chief Executive Officer of ⁠Collective Liberty and the 2018 Thomson Reuters Foundation Stop Slavery Hero as she discusses “Current Issues in Human Trafficking.” \n  \nREGISTER NOW \n  \nThe talk will take place from 12:00-12:45 p.m.\, with an interactive audience Q&A from 12:45-1:30 p.m.  \nCall-in details for the virtual meeting will be provided upon registration.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-rochelle-keyhan/
LOCATION:Virtual
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20231107T120000
DTEND;TZID=America/New_York:20231107T133000
DTSTAMP:20260426T193520
CREATED:20231019T193031Z
LAST-MODIFIED:20240118T210134Z
UID:6414-1699358400-1699363800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Calvin Chrustie
DESCRIPTION:Join us on Tuesday\, November 7th\, for the virtual CINA Distinguished Speaker Series event featuring Calvin Chrustie\,  Senior Partner and Critical Risk Consultant at Critical Risk Team (CRT) as he discusses “Convergence Zone of Transnational Organized Crime Threats – Your Best Friend Canada“ \n  \nREGISTER NOW \n  \nThe talk will take place from 12:00-12:45 p.m.\, with an interactive audience Q&A from 12:45-1:30 p.m.  \nCall-in details for the virtual meeting will be provided upon registration.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-calvin-chrustie/
LOCATION:Virtual
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230928T120000
DTEND;TZID=America/New_York:20230928T133000
DTSTAMP:20260426T193520
CREATED:20230908T153632Z
LAST-MODIFIED:20230908T153905Z
UID:5419-1695902400-1695907800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Nick Nikiforakis: "Bridgespotting: How Web3 Attackers Target Web2 Cryptocurrency Users"
DESCRIPTION:Join us on Thursday\, September 28th\, for the virtual CINA Distinguished Speaker Series event featuring Nick Nikiforakis\, Associate Professor in the Department of Computer Science at Stony Brook University as he discusses “Bridgespotting: How Web3 Attackers Target Web2 Cryptocurrency Users.” \n  \nREGISTER NOW \n  \nThe talk will take place from 12:00-12:45 p.m.\, with an interactive audience Q&A from 12:45-1:30 p.m.  \nCall-in details for the virtual meeting will be provided upon registration. \nPresentation Abstract \nAs cryptocurrencies increase in popularity and users obtain and manage their own assets\, attackers are pivoting from just abusing cryptocurrencies as a payment mechanism\, to stealing crypto assets from end users. Since only a small fraction of users own crypto assets\, attackers must somehow identify these users among the crowd\, in order to target them. \nIn this presentation\, we will introduce the concept of Web2-to-Web3 bridges\, i.e.\, ways that attackers discover users on the traditional web in order to attack their cryptocurrency (i.e. Web3) assets. First\, we will cover one of the most popular social-engineering attacks involving fake crypto giveaway events and describe our system for automatically discovering these attacks in the wild. We will review patterns and characteristics of more than 10K giveaway scams that our tool discovered over a period of 6 months and trace these scams back to attacker wallets and millions of dollars worth of stolen funds. Second\, we will present a different bridge targeting users who are interested in personal-finance content. We will show how attackers are relying on automation to bait users on large video platforms before moving them over to an instant-messaging medium where they eventually try to steal their crypto assets. Throughout the talk\, we will describe how automation\, network-security mechanisms\, and public APIs can be combined to produce accurate and automated solutions that can identify Web3 attacks\, giving a chance to defenders to disrupt these bridges before user assets are irrevocably lost. \n  \nSpeaker Bio \nDr. Nick Nikiforakis (PhD’13) is an Associate Professor in the Department of Computer Science at Stony Brook University. He leads the PragSec Lab\, where his students conduct research in cyber security\, with a focus on web security\, web privacy\, DNS security\, attack-surface reduction\, and deception-based security. He is the author of more than 80 peer-reviewed academic publications and his work is often discussed in the popular press. He is the recipient of the National Science Foundation CAREER award (2020)\, the Office of Naval Research Young Investigator Award (2020)\, as well as a range of other security-related and privacy-related awards by federal funding agencies.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-nick-nikiforakis-bridgespotting-how-web3-attackers-target-web2-cryptocurrency-users/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230607T130000
DTEND;TZID=America/New_York:20230607T140000
DTSTAMP:20260426T193520
CREATED:20230517T155912Z
LAST-MODIFIED:20230517T155912Z
UID:3316-1686142800-1686146400@cina.gmu.edu
SUMMARY:CINA Research Findings: “Understanding Booter and Stresser Services To Engage in Cybercrime"
DESCRIPTION:This webinar is open only to attendees from DHS\, federal government\, and state and local law enforcement. \nCall-in details for the virtual meeting will be provided upon registration. \nJoin us on Wednesday\, June 7th\, from 1 to 2 p.m. for a webinar on “Understanding Booter and Stresser Services To Engage in Cybercrime.” \nThe findings presented during this webinar are informed by work led by Dr. Thomas J. Holt (Michigan State University) and Dr. Olga Smirnova (East Carolina University) through an active CINA project\, “Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a Service.” \nThere are a range of services available in the cybercrime-as-a-service ecosystem.   While ransomware and stolen data generate headlines\, there are other services that remain popular and useful for cybercriminals.  In particular\, “stresser” or “booter” services have been in operation since the early 2010s to offer distributed reflective denial of service (DRDoS) attacks.  These services effectively knock resources offline\, and have been the subject of multiple coordinated international law enforcement actions against both providers and clients.  This presentation will provide an overview of the current state of booter and stresser operations using language from 44 booter and stresser operators. Attendees will learn the functionality of their operations\, the ways that they communicate with customers\, accept payments\, and minimize their risk of detection.  The implications for our understanding of illicit online markets\, and the decision-making processes of cybercriminals will be explored as well. \nREGISTER NOW \n  \nSpeaker Biography \nThomas J. Holt is a Professor in the School of Criminal Justice at Michigan State University specializing in cybercrime\, technology\, and deviance. His research focuses on computer hacking\, malware\, and the role that technology and the Internet play in facilitating all manner of crime and terror. Dr. Holt has been published in a variety of academic journals\, including British Journal of Criminology\, Crime and Delinquency\, Deviant Behavior\, and the Journal of Criminal Justice.  He is also a coauthor of the books Cybercrime and Digital Forensics: An Introduction (2015) and Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses (2016)\, both published through Routledge.
URL:https://cina.gmu.edu/event/cina-research-findings-understanding-booter-and-stresser-services-to-engage-in-cybercrime/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230419T120000
DTEND;TZID=America/New_York:20230419T133000
DTSTAMP:20260426T193520
CREATED:20230307T204100Z
LAST-MODIFIED:20230322T171808Z
UID:3207-1681905600-1681911000@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Joe Weiss: "Control System Cyber Security is More than Network Cyber Security"
DESCRIPTION:“Control System Cyber Security is More than Network Cyber Security”\nJoin us on Wednesday\, April 19 for the upcoming virtual CINA Distinguished Speaker Series event featuring Joe Weiss\, Managing Director at Applied Control Solutions\, LLC as he discusses “Control System Cyber Security is More than Network Cyber Security.” \nThis event will take place virtually via Zoom as well as via YouTube live stream. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nAbstract: \nDefense and critical infrastructures including electric grids\, water systems\, manufacturing\, transportation\, etc. rely on control systems. Control systems consist of engineering devices “owned” by engineering and Ethernet networks “owned” by network security. Networks have cyber security\, cyber forensic capabilities\, and network personnel have cyber security training and a cyber security ethic. The engineering devices have no cyber security\, cyber forensic capabilities\, and the engineers have no cyber security training nor cyber security ethic. The culture gap is the defensive network people do not understand the control systems and generally won’t reach out to the engineers and the engineers view cyber security as e-mail” and do not feel cyber affects them. Meanwhile\, the offensive cyber people realize attacking control system devices can cause great harm to physical equipment with no attribution or cyber detection. Applying inappropriate network cyber security technologies have impacted the operation of the control system field devices exacerbating the culture divide. There have been more than 17 million control system cyber incidents that have directly resulted in more than 34\,000 deaths and many region-wide electric outages. Despite the improvement in network security technologies\, sophisticated attackers can compromise IP networks as demonstrated by Solarwinds. Ransomware has shut down manufacturing facilities due to “an abundance of caution:” Industrial\, manufacturing\, and transportation facilities cannot be protected by addressing networks alone. Consequently\, technologies have been demonstrated that can provide an unhackable approach to control system devices which can help overcome the cultural divide while improving reliability\, productivity\, and process safety. \n  \nBiography: \n \nJoe Weiss is an expert on control system cyber security. In 2000\, he helped start the control system cyber security program for the electric utilities. He has published over 80 papers on instrumentation and control systems\, control system cyber security\, book chapters on cyber security for electric substations\, water/wastewater\, data centers\, and cyber policy\, and authored Protecting Industrial Control Systems from Electronic Threats. He has amassed a database of more than 17 million control system incidents. He is an ISA Fellow\, Managing Director of ISA99\, a Ponemon Institute Fellow\, and an IEEE Senior Member. He was featured in Richard Clarke’s book- Warning – Finding Cassandras to Stop Catastrophes. He has patents on instrumentation\, control systems\, and OT networks\, is a registered professional engineer and has CISM and CRISC certifications.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-joe-weiss-control-system-cyber-security-is-more-than-network-cyber-security/
LOCATION:Virtual
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230412T110000
DTEND;TZID=America/New_York:20230412T114500
DTSTAMP:20260426T193520
CREATED:20230322T145807Z
LAST-MODIFIED:20230322T171920Z
UID:3220-1681297200-1681299900@cina.gmu.edu
SUMMARY:CINA Research Findings Presentation: “Understanding Cryptomixing Services in Context of the Open and Dark Web”
DESCRIPTION:Join us on Wednesday\, April 12th\, from 11:00 – 11:45 a.m. for a webinar on “Understanding Cryptomixing Services in Context of the Open and Dark Web.” \nThe Internet has become a popular marketplace for the sale of illicit products\, including stolen personal information\, drugs\, and firearms. Many of these products are purchased using cryptocurrencies\, which is generally defined as forms of digital currency that are traceable through blockchain ledger technology. Cryptocurrencies are thought to be more secure than other forms of digital payment\, though law enforcement and financial service providers have found ways to investigate account holders and their transactions. Consequently\, several service providers have begun to offer cryptomixing services\, which effectively launders payments to circumvent detection and investigation tools. Few have explored the practices of cryptomixing services\, or the ways in which they are marketed on the Open and Dark Web. This inductive qualitative analysis will examine a sample of 18 cryptomixing services advertised on both the Open and Dark Web to better understand cryptomixing and its role in facilitating illicit transactions in various contexts. \nThe findings presented during this webinar are informed by work led by Dr. Thomas J. Holt (Michigan State University) through an active CINA project\, “Understanding the Economy and Social Organization of the Underground Market for Cybercrime as a Service.” \nThis webinar is open only to attendees from DHS\, federal government\, and state and local law enforcement. \nCall-in details for the virtual meeting will be provided upon registration. \n  \nREGISTER NOW \n  \nSpeaker Biography \nThomas J. Holt is a Professor in the School of Criminal Justice at Michigan State University specializing in cybercrime\, technology\, and deviance. His research focuses on computer hacking\, malware\, and the role that technology and the Internet play in facilitating all manner of crime and terror. Dr. Holt has been published in a variety of academic journals\, including British Journal of Criminology\, Crime and Delinquency\, Deviant Behavior\, and the Journal of Criminal Justice.  He is also a coauthor of the books Cybercrime and Digital Forensics: An Introduction (2015) and Cybercrime in Progress: Theory and Prevention of Technology-Enabled Offenses (2016)\, both published through Routledge.
URL:https://cina.gmu.edu/event/cina-research-findings-presentation-understanding-cryptomixing-services-in-context-of-the-open-and-dark-web/
LOCATION:Virtual
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230308T120000
DTEND;TZID=America/New_York:20230308T133000
DTSTAMP:20260426T193520
CREATED:20230222T194852Z
LAST-MODIFIED:20230307T184813Z
UID:3195-1678276800-1678282200@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Nic McKinley: "Using Transaction Data to Disrupt Illicit Commodity Markets"
DESCRIPTION:Disrupting Global Human Trafficking Networks\nJoin us on Wednesday\, March 8 for the upcoming virtual CINA Distinguished Speaker Series event featuring Nic McKinley\, Founder and Chief Executive Officer of DeliverFund as he discusses “Using Transaction Data to Disrupt Illicit Commodity Markets.” \nThis event will take place virtually via Zoom as well as via YouTube live stream. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nAbstract: \nIllicit markets for commodities involve transactional nodes that delineate the commercial interactions between participants. These nodes represent crucial opportunities for stakeholders such as law enforcement\, regulators\, and industry partners to gather and analyze data\, with the aim of thwarting the sale of illegal goods. Nic McKinleywill elaborate on this theme by drawing on the specific case of human trafficking. Through his presentation\, McKinley will underscore how proficient data collection and analysis can expedite the identification of pertinent information\, leading to more precise and expeditious intervention. \n  \nBiography: \n \nNic McKinley – As an Operative who served as a Country Chief for a Special Unit within the CIA\, Nic witnessed not only the epidemic of child trafficking within illicit markets\, but also the unrealized opportunity to apply his understanding and training to influence this global crisis. As Nic began to work with experts to better understand the problem in the United States\, he found it impossible to turn a blind eye. \nAs a result\, DeliverFund was officially established as a 501c3 in October 2014 and our counter human trafficking organization\, focused on ending sex slavery in the United States got to work. Nic spent 11 years in US Special Operations as an Air Force Pararescueman prior to being recruited to the Central Intelligence Agency. Due to his highly specialized training and experience in both special and intelligence operations\, Nic has a firm understanding about these illicit\, illegal markets and has the highest levels of training to effectively combat them.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-nic-mckinley/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230308T100000
DTEND;TZID=America/New_York:20230308T110000
DTSTAMP:20260426T193520
CREATED:20230302T203819Z
LAST-MODIFIED:20230302T203852Z
UID:3203-1678269600-1678273200@cina.gmu.edu
SUMMARY:CINA Research Findings Presentation: "Targeting Investment to Maximize Public Safety Along Residential Street Segments"
DESCRIPTION:Join us on Wednesday\, March 8th\, from 10:00 – 11:00 a.m. for the virtual presentation which will provide updates on research findings from an active CINA project\, “Innovative Spatiotemporal Pattern Detection: Examining Changes in Crime Hot Spots Across 6 U.S. Cities\,” led by Marie Tillyer (University of Texas San Antonio)\, Rebecca Walter\, and Arthur Acolin (University of Washington). \nThis event will take place virtually via Microsoft Teams Webinar. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \nThis presentation explores how neighborhood characteristics impact the effects of investment on crime at residential street segments by using data from six large U.S. cities (Chicago\, Los Angeles\, New York City\, Philadelphia\, San Antonio\, and Seattle) over an 11-year period (2008-2018) to better understand how investment strategies can be targeted to maximize public safety benefits.
URL:https://cina.gmu.edu/event/3203/
LOCATION:Virtual\, Microsoft Teams
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20230223T120000
DTEND;TZID=America/New_York:20230223T133000
DTSTAMP:20260426T193520
CREATED:20230209T181255Z
LAST-MODIFIED:20230209T181255Z
UID:3182-1677153600-1677159000@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series with Lauryn DeGreeff
DESCRIPTION:Emerging Threats – Characterization and Detection of Homemade Explosives and Synthetic Opioids by Instrument and Canines\nJoin us on Thursday\, February 23 for the upcoming virtual CINA Distinguished Speaker Series event featuring Lauryn DeGreeff\, Associate Professor of Chemistry with the Global Forensic and Justice Center at Florida International University as she discusses “Emerging Threats – Characterization and Detection of Homemade Explosives and Synthetic Opioids by Instrument and Canines.” \nThis event will take place virtually via Zoom. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nAbstract \nExplosive and drug detection canines are deployed to battle threats at home and abroad.  They are utilized in the detection of explosive devices and dangerous drugs that threaten civilian and military personnel lives\, as well as first responders and transportation security. The threats of the past\, nitro-containing high explosives such as TNT and C4\, or low explosives\, such as smokeless and black powders\, and heroin\, cocaine\, ecstasy etc. are still a danger to human life\, but as the threat landscape changes\, it is imperative that our scientific research and resulting field detectors focus on the most relevant threat materials\, such as binary mixtures and peroxide-based homemade explosives (HMEs) and synthetic opioids. Explosives and drug detection capabilities have been slow to evolve with these changing threats. Considerations\, including odor profiles\, stability and degradation\, and training aids related to canine detection of HMEs and fentanyl-related opioids will be discussed. \n  \nSpeaker Biography \nLauryn DeGreeff is an Associate Professor of Chemistry with the Global Forensic and Justice Center at Florida International University since August 2021\, where she conducts research on in the field of vapor analysis as it relates to detection by canine and instruments. Dr. DeGreeff graduated from FIU with a Ph.D. in Forensic Chemistry in 2010. Prior to returning to FIU\, Dr. DeGreeff conducted a fellowship at the Federal Bureau of Investigation\, Counterterrorism and Forensic Science Research Unit. After\, she spent ten years as a researcher and principal investigator with the Chemistry Division at the U.S. Naval Research Laboratory in Washington DC. She takes a chemistry-based approach to studying olfaction for the purpose of informing field vapor sampling practices. Her research focuses on trace vapor sampling\, characterization\, and generation in support of canine and other field detection approaches. Dr. DeGreeff regularly lectures on the dynamics of odor for the operational community and at national and international scientific conferences. She has also authored many peer-reviewed manuscripts\, holds four pending and completed patents\, and is the editor of the book entitled Canines: The Original Biosensor\, released in 2022.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-with-lauryn-degreeff/
LOCATION:Virtual
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221207T120000
DTEND;TZID=America/New_York:20221207T133000
DTSTAMP:20260426T193520
CREATED:20221129T002140Z
LAST-MODIFIED:20221129T002140Z
UID:3128-1670414400-1670419800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: "Working with Law Enforcement and Brands to Hold Bad Actors Accountable and Protect Consumers" with Joe Wheatley
DESCRIPTION:Join us on Wednesday\, December 7 for the upcoming virtual CINA Distinguished Speaker Series event featuring Joe Wheatley\, Senior Corporate Counsel of the Amazon Counterfeit Crimes Unit where he will discuss “Working with Law Enforcement and Brands to Hold Bad Actors Accountable and Protect Consumers.” \nThis event will take place virtually via Zoom. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \n 
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-working-with-law-enforcement-and-brands-to-hold-bad-actors-accountable-and-protect-consumers-with-joe-wheatley/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Information Session,Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20221012T090000
DTEND;TZID=America/New_York:20221012T170000
DTSTAMP:20260426T193520
CREATED:20220816T195035Z
LAST-MODIFIED:20221005T193807Z
UID:2903-1665565200-1665594000@cina.gmu.edu
SUMMARY:CINA Annual Meeting 2022
DESCRIPTION:The Criminal Investigations and Network Analysis Center (CINA) invites you to the 2022 CINA Annual Meeting on Wednesday\, October 12\, 2022 from 9 a.m. – 5 p.m. EDT at the George Mason University Fairfax campus. The meeting will provide thought leadership and foster the emergence of novel solutions to support the Homeland Security Enterprise in its fight against networked criminal activities. \nThis in-person event will include networking opportunities for attendees to meet with individual CINA project teams. \nREGISTER NOW \n 
URL:https://cina.gmu.edu/event/cina-annual-meeting-2022/
LOCATION:1201 Merten Hall\, 4441 George Mason Blvd\, Fairfax\, VA 22030\, 4441 George Mason Boulevard\, Fairfax\, Virginia\, 22030\, United States
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220922T120000
DTEND;TZID=America/New_York:20220922T133000
DTSTAMP:20260426T193520
CREATED:20220801T181615Z
LAST-MODIFIED:20221109T181726Z
UID:2889-1663848000-1663853400@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Arun Ross – “Privacy in the era of automated face recognition”
DESCRIPTION:Tune in on Thursday\, September 22nd at 12:00 p.m. when Arun Ross\, Professor in the Department of Computer Science and Engineering at Michigan State University and the Director of the i-PRoBe Lab will talk about privacy implications of automated face recognition (AFR) technology. Ross will describe the auxiliary information that can be extracted from face images and the ability to link disparate face images using AFR\, thereby divulging the identity of individuals in applications where anonymity is expected. The purpose of this talk is to help explore the boundaries of this powerful technology as it intersects with societal expectations and perceptions on one hand\, and the need for reliable human identification technology on the other hand.  \nThis event will take place virtually via Zoom. The information to attend virtually will be sent to participants upon registering. \nREGISTER NOW \n  \nSpeaker Biography: \nArun Ross is a Professor in the Department of Computer Science and Engineering at Michigan State University (MSU) and the Director of the i-PRoBe Lab. He received the B.E. (Hons.) degree in Computer Science from the Birla Institute of Technology and Science\, Pilani\, India\, and the M.S. and Ph.D. degrees in Computer Science and Engineering from Michigan State University. He is the coauthor of the textbook “Introduction to Biometrics” and the monograph “Handbook of Multibiometrics\,” and the co-editor of “Handbook of Biometrics”.
URL:https://cina.gmu.edu/event/2889/
CATEGORIES:Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220831T120000
DTEND;TZID=America/New_York:20220831T133000
DTSTAMP:20260426T193520
CREATED:20220801T180933Z
LAST-MODIFIED:20220809T190609Z
UID:2883-1661947200-1661952600@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Gurvais Grigg - "Deconstructing Cybercrime Through Blockchain Forensics"
DESCRIPTION:Tune in on Wednesday\, August 31st at 12:00 p.m. when Gurvais Grigg\, Global Public Sector Chief Technology Officer at Chainanalysis\, Inc. will discuss “Deconstructing Cybercrime Through Blockchain Forensics”. \nThis presentation will outline trends in the illicit use of cryptocurrency and practical ways to incorporate this new asset class and solve cases. \nAbstract: Digital assets are impacting the 21st century financial landscape and global blockchain adoption is accelerating. Increasingly\, investigators are turning to blockchain analytics to solve complex financial crime cases and follow the money through cyberspace. To effectively meet this challenge\, today’s investigators are growing their crypto-literacy and equipping themselves with the right data and tools to accelerate their investigations. \nThe hybrid event which will take place virtually via Zoom as well as on the George Mason University\, Fairfax campus: Room 3301\, Exploratory Hall\, 10431 Rivanna River Way\, Fairfax\, VA 22030. The information to attend virtually will be sent to participants upon registering. \n  \nREGISTER NOW \n  \nSpeaker Biography: \nGurvais C. Grigg is a recognized technology executive and thought leader with 28 years of public and private sector investigative and financial experience. As the Global Public Sector CTO for Chainalysis\, Gurvais is responsible for connecting global governments with the cryptocurrency industry and data they need to manage risks and conduct effective investigations. He served 23 years as a Special Agent and executive for the FBI conducting and leading criminal and national security investigations and building state-of-the-art operational and technical capabilities to identify and track suspected terrorists\, spies\, and criminals and their finances. Gurvais is an Eagle Scout and the recipient of numerous awards including the Presidential Rank Award and the NESA Outstanding Eagle Scout Award.  He holds a bachelor’s degree in biochemistry with a minor in Spanish and a Masters in Homeland Security Management.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-gurvais-grigg-deconstructing-cybercrime-through-blockchain-forensics/
LOCATION:Room 3301\, Exploratory Hall\, Fairfax\, VA\, 10431 Rivanna River Way\, Fairfax\, Virginia\, 22030\, United States
CATEGORIES:Research Presentation
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20220827
DTEND;VALUE=DATE:20221106
DTSTAMP:20260426T193520
CREATED:20220809T171901Z
LAST-MODIFIED:20220810T164412Z
UID:2896-1661558400-1667692799@cina.gmu.edu
SUMMARY:Bring Down Counterfeiting 2022: Policy Hackathon
DESCRIPTION:Event Overview  \nRegistration is now open for the Bring Down Counterfeiting 2022: Policy Hackathon. \nThis event is sponsored by George Mason University’s Terrorism\, Transnational Crime and Corruption Center (TraCCC)\, Amazon\, the Criminal Investigations Network and Analysis Center\, and the National Crime Prevention Council. It is open to innovators of all abilities and skill sets.  \n  \nREGISTER NOW \n  \nThe Hackathon will focus on policies and solutions to combat counterfeit products on e-commerce sites and the criminals that benefit from it. Counterfeiting is an industry-wide\, global issue\, that affects all retail channels. \nThose interested in public policy/governance\, international trade\, law enforcement and transnational crime\, computer science\, data science/analysis\, and AI/ML are encouraged to attend this event. \nTeams will compete for more than $20\,000 in prizes. Those that make it to the final round will be evaluated by an expert panel of judges. Bring a team or register on your own. Register today to attend the hackathon kick-off event on August 27\, 2022. Hackathon registration closes on October 7\, 2022. \nObjective \nThe goal of this policy hackathon is to provide input for a technology-focused follow up challenge. Participants will have the opportunity to interact with experts and mentors from law enforcement\, tech and retail industries\, academia\, government and\, of course\, Amazon. \nTo learn more and get event details visit: https://expeditionhacks.com/counterfeiting/?mc_cid=de39da8ea1&mc_eid=bcdb507c23
URL:https://cina.gmu.edu/event/bring-down-counterfeiting-2022-policy-hackathon/
LOCATION:Virtual (Slack)
CATEGORIES:Hackathon
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220816T080000
DTEND;TZID=America/New_York:20220816T170000
DTSTAMP:20260426T193520
CREATED:20220816T180434Z
LAST-MODIFIED:20220816T201709Z
UID:2902-1660636800-1660669200@cina.gmu.edu
SUMMARY:CINA Information Session
DESCRIPTION:Join us on Wednesday\, September 7 at 2:00 p.m. EDT for an information session led by CINA Director Jim Jones. The session will offer insight into CINA’s ongoing research and its benefits to DHS and the university\, including past and future events\, outreach activities\, and collaborative opportunities.  \nThis is a hybrid event which will take place virtually via Zoom as well as on the George Mason University\, Fairfax campus: Room 3301\, Exploratory Hall\, 10431 Rivanna River Way\, Fairfax\, VA 22030. The information to attend virtually will be sent to participants upon registering. \n  \nREGISTER NOW \n  \n 
URL:https://cina.gmu.edu/event/cina-information-session-2/
CATEGORIES:Information Session
END:VEVENT
BEGIN:VEVENT
DTSTART;VALUE=DATE:20220225
DTEND;VALUE=DATE:20220228
DTSTAMP:20260426T193520
CREATED:20220124T175011Z
LAST-MODIFIED:20220131T174553Z
UID:2781-1645747200-1646006399@cina.gmu.edu
SUMMARY:COE Design Challenge Hackathon:  Countering Emerging Threats to Critical Infrastructure
DESCRIPTION:Event Overview  \nRegistration is now open for the first joint DHS Center of Excellence (COE) design challenge hackathon. CINA is partnering with the Center for Accelerating Operational Efficiency (CAOE) at Arizona State University who is leading this three-day virtual event. During the event students will work in teams to solve real-life problem scenarios related to infrastructure risks and emerging threats. Participants will receive mentoring assistance available from critical infrastructure experts representing academia\, industry\, and the U.S. Department of Homeland Security. \nCINA seeks to sponsor innovative students with an interest in solving homeland security challenges from our COE partner universities. Mason students and CINA MSI partner universities will collaborate with teams from: Arizona State University (CAOE)\, University of Illinois at Urbana-Champaign (CIRI)\, Stevens Institute of Technology (MSC) and University of Nebraska at Omaha (NCITE) are invited to participate. \n  \nREGISTER NOW \n  \nObjective \nThe goal of the design challenge hackathon is to support the educational mission of the COEs\, exposing more students to real-world homeland security issues in an effort to increase interest in pursuing careers at DHS and across the homeland security enterprise. \n  \nTo learn more and get event details visit: https://caoe.asu.edu/news/design-challenge-hackathon-critical-infrastructure-now-open-student-registration-february-25
URL:https://cina.gmu.edu/event/coehackfeb2022/
LOCATION:Virtual
CATEGORIES:Hackathon
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220217T120000
DTEND;TZID=America/New_York:20220217T133000
DTSTAMP:20260426T193520
CREATED:20211207T194546Z
LAST-MODIFIED:20220216T174640Z
UID:2770-1645099200-1645104600@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Jay Kennedy - "The Future of Counterfeiting"
DESCRIPTION:Tune in on Thursday\, February 17 at 12:00 p.m. when Jay Kennedy\, Assistant Professor at Michigan State University will discuss “The Future of Counterfeiting:\nShifting Patterns in Enforcement\, Opportunity Structures and Consumer Engagement”. \nIn this presentation Dr. Kennedy will discuss: \n\nThe value and importance of public-private collaboration in addressing counterfeiting risks for consumers\nThe shifting dynamics of e-commerce and social commerce and how consumers are responding;\nEmerging socio-technical changes that are impacting counterfeiting schemes and consumer complicity\nThe impact of global supply/manufacturing developments (supply chain shortages\, Free Trade Zones) on global counterfeiting schemes.\n\nDr. Kennedy is actively involved in research\, education\, and outreach efforts that focus on external partners including corporations\, industry associations\, and law enforcement agencies. \nThis event will be completely virtual. \n  \nREGISTER NOW \n  \nSpeaker Biography: \nDr. Jay P. Kennedy is an Assistant Professor at Michigan State University\, jointly appointed to the School of Criminal Justice and the Center for Anti-Counterfeiting and Product Protection where serves the Assistant Director of Research. He is a Faculty Affiliate with the Michigan State University Graduate School\, and an Affiliated Faculty member with the Institute for Public Policy and Social Research\, the Center for Business and Social Analytics\, and the Canadian Studies Center. Dr. Kennedy’s current research explores managerial and organizational responses to employee theft within small and medium enterprises and the sale of counterfeit goods on the Internet through social media and e-commerce. His work has been published in a number of outlets\, including Criminology and Public Policy\, American Behavioral Scientist\, Maritime Economics and Logistics\, Criminal Justice Review\, Journal of Crime and Justice\, Journal of Financial Crime\,Security Journal\, and Victims and Offenders. He is currently serving as an elected board member of the American Society of Criminology’s Division of White-Collar and Corporate Crime and is an editorial board member for the Journal of White-Collar and Corporate Crime and the International Journal of Cybercrime Intelligence and Cybersecurity.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-jay-kennedy-anti-counterfeiting-and-product-protection/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20220111T120000
DTEND;TZID=America/New_York:20220111T133000
DTSTAMP:20260426T193520
CREATED:20210921T181727Z
LAST-MODIFIED:20211217T182815Z
UID:2740-1641902400-1641907800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Lindsey Roberson\, Human Trafficking Institute
DESCRIPTION:Tune in on Tuesday\, January 11 at 12:00 p.m. when Lindsey Roberson\, Executive Director of Legal Engagement at the Human Trafficking Institute speaks about her organization’s work in developing and advocating for innovative and data-driven strategies for combatting human trafficking based on proven victim-centered enforcement models. \nThis is a completely virtual event. \nREGISTER NOW \n  \nSpeaker Biography: \nLindsey Roberson oversees HTI’s Country Programs prosecution efforts in Uganda and Belize\, where she focuses on increasing the specialized knowledge of prosecutors and other criminal justice practitioners handling human trafficking cases. Lindsey also leads HTI’s Thought Leadership team\, which develops and advocates for innovative and data-driven strategies for combatting human trafficking based on proven victim-centered enforcement models. Lindsey is an experienced federal and state prosecutor\, with over a decade of anti-trafficking litigation experience. Most recently she served as a trial attorney for the U.S. Department of Justice’s Human Trafficking Prosecution Unit\, a component of the Criminal Section of the Civil Rights Division which focuses on enforcing the federal laws that prohibit forced labor and sex trafficking in the United States. Before her work as a federal prosecutor\, Lindsey served as an assistant district attorney in North Carolina\, where she prosecuted some of the first sex trafficking cases to conviction and drafted the state’s Safe Harbor Act for Victims of Sex Trafficking. Lindsey is a graduate of the University of North Carolina at Chapel Hill’s School of Law and served as a law clerk to the Honorable James C. Fox for the Eastern District of North Carolina following graduation.
URL:https://cina.gmu.edu/event/cina-distinguished-speaker-series-lindsey-roberson-human-trafficking-institute/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211112T113000
DTEND;TZID=America/New_York:20211112T130000
DTSTAMP:20260426T193520
CREATED:20210830T205237Z
LAST-MODIFIED:20211022T141848Z
UID:2726-1636716600-1636722000@cina.gmu.edu
SUMMARY:CINA Virtual Distinguished Speaker Series: Marie Tillyer “Place-Based Improvements for Public Safety: Public Regulation\, Private Investment\, and Changes in Crime at Micro-places Across 6 US Cities"
DESCRIPTION:Join us on Friday\, November 12 at 11:30 a.m. when Dr. Marie Tillyer\, Professor of Criminology & Criminal Justice at the University of Texas at San Antonio discusses place-based improvements for public safety: Public regulation\, private investment\, and changes in crime at micro-places across 6 US cities. This event will be completely virtual.\n  \nREGISTER NOW \n \nResearch on spatiotemporal crime patterns reveals that crime is concentrated at relatively few micro-places (e.g.\, addresses\, intersections\, street segments)\, it tends to be stable over time\, and changes at a small proportion of micro-places can have a considerable effect on a city’s overall crime level. These findings have prompted calls for targeted place-based interventions to efficiently allocate scarce prevention resources.  This presentation uses data from six unique urban landscapes (Chicago\, Los Angeles\, New York City\, Philadelphia\, San Antonio\, and Seattle) to explore spatiotemporal crime patterns.  Specifically\, we examine the relationship between two mechanisms for place-based improvements – public regulation in the form of municipal code enforcement and private investment in the form of building permits – and changes in crime at street segments over time.  The findings highlight how non-criminal justice policies\, such as incentivizing targeted private investment and prioritizing code enforcement at crime hot spots\, might be strategically implemented to enhance public safety. \n  \nSpeaker Biography: \nMarie Skubak Tillyer\, who serves as Principal Investigator on the project\, is a professor of criminology and criminal justice at the University of Texas at San Antonio. She has published over 40 peer reviewed journal articles\, with a focus on violence\, victimization\, and the spatial distribution of crime. She is co-author of School Zone: A Problem Analysis of Student Offending and Victimization (forthcoming\, Temple University Press)\, a place-focused analysis of crime involving adolescents in schools\, and current Co-Principal Investigator on a prospective\, longitudinal study funded by the National Institute of Justice examining the cumulative financial costs of victimization among college students at minority serving institutions.  In addition\, her past applied research has examined community supervision outcomes\, violence reduction\, crime analysis\, and human trafficking.  Much of her research is informed by an environmental criminological perspective that examines crime events and the immediate spatiotemporal circumstances in which they occur. Her collaborations with Drs. Walter and Acolin\, the project Co-Principal Investigators\, have led her to apply this perspective to studying crime across various geographical units\, including low-income housing developments\, businesses\, street blocks\, and street segments.
URL:https://cina.gmu.edu/event/cina-virtual-distinguished-speaker-series-marie-tillyer-open-source-data-and-predictive-modeling-for-high-density-crime-areas/
LOCATION:Virtual (Zoom Meeting)
CATEGORIES:Research Presentation,Seminar,Webinar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20211013T120000
DTEND;TZID=America/New_York:20211013T133000
DTSTAMP:20260426T193520
CREATED:20210830T193620Z
LAST-MODIFIED:20210921T184441Z
UID:2720-1634126400-1634131800@cina.gmu.edu
SUMMARY:CINA Distinguished Speaker Series: Gretchen Peters “How Organized Crime Weaponized Social Media"
DESCRIPTION:Tune in on Wednesday\, October 13 at 12:00 p.m. when Gretchen Peters\, Executive Director of The Center on Illicit Networks and Transnational Organized Crime who will speak about her organization’s work on the way organized crime has weaponized social media. In-person attendance is on a first come first serve basis. You must register in advance to attend.\n  \nREGISTER NOW \n \nThe in-person event will take place at the George Mason University\, Fairfax campus: Room 3301\, Exploratory Hall 4400 University Drive\, Fairfax\, VA 22030 \n  \nSpeaker Biography: \nGretchen Peters is the Executive Director of The Center on Illicit Networks and Transnational Organized Crime (CINTOC). She has served as a consultant to the U.S. Defense Department and U.S. law enforcement on transnational organized crime and co-chaired an OECD Task Force on fighting wildlife crime. Her expertise is in researching and mapping transnational organized crime networks\, working with U.S. Central Command and U.S. Special Operations Command among others. Gretchen authored the groundbreaking book\, Seeds of Terror\, about the Taliban’s role in the Afghan heroin trade. She has also written various chapters in leading academic books about the intersection of crime and conflict.
URL:https://cina.gmu.edu/event/cina-virtual-distinguished-speaker-series-gretchen-peters-how-organized-crime-weaponized-social-media/
LOCATION:George Mason University\, Fairfax Campus\, Exploratory Hall 4400 University Drive\, Fairfax\, VA\, 22030\, United States
CATEGORIES:Research Presentation,Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210414T120000
DTEND;TZID=America/New_York:20210414T133000
DTSTAMP:20260426T193520
CREATED:20210112T184956Z
LAST-MODIFIED:20210205T213701Z
UID:2400-1618401600-1618407000@cina.gmu.edu
SUMMARY:CINA Virtual Distinguished Speaker Series: Jeffrey Hardy "Illicit Trade in the Forms of Trademark Counterfeiting and Copyright Piracy"
DESCRIPTION:From smuggling\, counterfeiting and tax evasion\, to the trafficking of humans and wildlife\, illicit trade holds back progress\, increases costs and pushes the goals further away. While data on this clandestine activity has previously been scarce\, there is mounting evidence of the economic\, social and environmental losses it can cause.  \n  \nREGISTER NOW \n  \nSpeaker Biography: \nJeffrey Hardy is the Director-General of the Transnational Alliance to Combat Illicit Trade\, where he manages a unique multi-sector business approach to combatting illicit trade. Before joining TRACIT\, he served as the Director of the International Chamber of Commerce’s Business Action to Stop Counterfeiting and Piracy (BASCAP)\, where he united the global business community to fight illicit trade in the forms of trademark counterfeiting and copyright piracy. From 2010-2017\, he also served as Director of the ICC G20 CEO Advisory Group\, where he coordinated international business priorities on the G20 policy agenda related to trade\, investment and anti-corruption. Jeff has long been an advocate for open and fair trade\, and to achieve these goals he mobilizes expertise from companies and business organizations. \nAs President of IDA Consulting\, Jeff has worked with dozens of international trade associations to help them more effectively navigate key policy arenas and gain from emerging legislative and regulatory regimes. \nFrom 1985 to 1998\, Jeff worked for the U.S. Department of Energy\, where he held positions as International Energy Economist and Director of the U.S. Clean Cities program. He holds a Master of Public Administration and Policy from George Mason University\, a Bachelor of Science in Economics from Illinois State University and an Honorary Degree for Energy Policy from the Oxford College of Petroleum Studies. In 1992\, he was awarded the U.S. Secretary of Energy’s Silver Medal for his meritorious service during the Gulf War. \nContact: \nJeff.Hardy@TRACIT.org \n+1.239.935.9839
URL:https://cina.gmu.edu/event/cina-virtual-distinguished-speaker-series-jeffrey-hardy-illicit-trade-in-the-forms-of-trademark-counterfeiting-and-copyright-piracy/
LOCATION:Virtual
CATEGORIES:Seminar
END:VEVENT
BEGIN:VEVENT
DTSTART;TZID=America/New_York:20210325T103000
DTEND;TZID=America/New_York:20210325T143000
DTSTAMP:20260426T193520
CREATED:20210301T214533Z
LAST-MODIFIED:20210308T170302Z
UID:2449-1616668200-1616682600@cina.gmu.edu
SUMMARY:Cyber Extremism and Violence in a Hyperconnected World
DESCRIPTION:Cyberspace content and interactions have emerged as a breeding ground for the spread\, or even birth of extremism and violence. From the large-scale spreading of authority-undermining or divisive misinformation\, to the recruitment of terrorists or gang members\, to the planning of extremist activities\, we are increasingly observing the growth of a cyberphysical nexus of extremism. Within this dynamic connection\, extremist ideas spill over from cyberspace to the real world\, leading to violence and increasingly complex threats to homeland security.\n  \nREGISTER NOW \n \nIn this event we bring together leading academic experts to discuss this catalyst of extremism and violence\, aiming at advancing our ability to identify and monitor such activities across the cyberphysical spectrum. Panel discussions are followed by breakout sessions to identify relevant research priorities. \nView the agenda \n  \nKeynote Speaker\n \n  \nJohn Picarelli\, Director\, Office for Targeted Violence and Terrorism Prevention at U.S. Department of Homeland Security \n\n\nModerators\n \n  \n  \nWilliam Braniff\, Director\, National Consortium for the Study of Terrorism and Responses to Terrorism (START)\, University of Maryland \n  \n \n  \n\nGina Scott Ligon\, Program Director\, National Counterterrorism Innovation\, Technology\, and Education Center (NCITE)\, University of Nebraska Omaha \n\n  \n  \n\n \n\n  \n  \n\nAnthony Stefanidis\, Professor of Computer Science\, College of William & Mary \n\n\n  \nSpeakers\n \n  \n  \nAudrey Alexander\, Instructor\, Combating Terrorism Center\, West Point \n  \n  \n \n  \nTerry Gudaitis\, Director of the Intelligence Studies Program\, Department of Criminology\, Law and Society\, George Mason University \n  \n  \n \n  \n  \nNicolás Velasquez Hernandez\, Post-Doctoral Research Scientist\, Institute for Data\, Democracy & Politics\, George Washington University \n  \n\n\n  \nSeamus Hughes\, Deputy Director\, Program on Extremism\, George Washington University \n  \n  \n \n  \n  \nSheehan Kane\, Researcher/Data Collection Manager\, National Consortium for the Study of Terrorism and Responses to Terrorism (START)\, University of Maryland \n  \n \n  \n  \nJillian Peterson\, Associate Professor – Criminal Justice\, Hamline University \n 
URL:https://cina.gmu.edu/event/cyber-extremism-and-violence-in-a-hyperconnected-world/
LOCATION:Virtual (WebEx)
CATEGORIES:Seminar
END:VEVENT
END:VCALENDAR