Saturday, March 31, 2018

Students get inside look at Apple’s “phone of the future” - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/3406

Apple’s iPhone-X, launched in October 2017, was conspicuously designed with the future in mind. By ditching the familiar home button and adding Face ID recognition, it embraces an immersive technological future in which less and less separates us from our devices – which, increasingly, know who we are and will carry out tasks for us with a voice command, and perhaps someday even a thought.

On March 23, students at Capitol were treated to an up-close tour of the technological wizardry driving the new iPhone. Dr. Bill Cardoso of Creative Electron presented a live teardown of the iPhone-X before an enthusiastic audience, in an event sponsored by Surface Mount Technology Association.

For students at a technology-focused university, the event served as a striking reminder that the subjects they are studying continue to yield transformative innovations – breakthroughs that rea reshaping the way humans live, work, and interact.

“At Capitol, we’re always looking for ways in which our students can see the practical applications of what they’re learning in the classroom – to see what they’re going to be doing five, ten, or fifteen years down the road,” said Sarah Alspaw, director of career development and student success.
Students who attended the teardown presentation said they had been intensely curious to learn more about the inner workings of a device that millions of people use daily.

Computing engineering major Zalika Dixon says she was struck by “the way the circuits were laid out inside the iPhone and the incredibly small spacing between the components. I didn’t realize how complex these phones have become.”

“I had an Iphone growing up and never had the chance to break it down, though I always wanted to,” said  James Tribiano, who also studies computer engineering. “It was great to see him separate each little component and explain its function – this is where the camera connects, this is how the mother and daughter board connect, and so on. I’m really glad I came out and saw this.”

“You use the phone and get the results from the hardware inside,” said Quinto Palmer, a student in the electrical engineering program. “This was a chance to see all those intricate parts and learn how they all come together.”

The Surface Mount Technology Association is an international network centered on electronic assembly technologies, with chapters across the United States and in several countries worldwide. The association provides a venue to share experience and knowhow, develop their skills, and make professional contacts. For students, it can be a valuable source of job leads.

Student SMTA chapters include Binghamton University, NC State, Rochester Institute of Technology, University of Maryland, and University of Texas at Arlington. A Capitol Technology University is in the process of formation.

“Capitol has several degree programs that are aligned with the SMTA’s areas of interest,” Alspaw said. “These include our newly launched undergraduate programs in mechatronics engineering and mechatronics and robotics engineering technology, as well as our existing electrical engineering programs at both the undergraduate and graduate levels.”

“Helping our students chart their career paths is a high priority for us at Capitol, and initiatives such our partnership with SMTA are one way we do that,” Alspaw said.

www.CapTechU.edu

How to Become a Cyber Analyst in An Industry on the Rise - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/blog/how-to-become-a-cyber-analyst

With growing interest in the use of new tools and approaches to close off vulnerabilities in the multitude of IP-enabled devices Americans use at home and at work, now is an ideal time to gain the skills needed to become a qualified cyber analyst.

Forecasts for the cyber analytics industry are bullish, as sophisticated tools and software emerge that can help analysts pinpoint vulnerabilities and close off attack vectors using a data-driven approach.

“With the Internet of Things, we’re seeing the security challenge escalate exponentially, to the point where long-established cybersecurity tools and techniques no longer suffice,” says Dr. William Butler, chair of the cybersecurity program at Capitol Technology University. “The data-driven, analytical approach offers cybersecurity professionals some additional, very powerful tools to include in their toolkit.”

Below are some essentials you need to know concerning the rapidly emerging cyber analytics career field.

What is cyber analytics?
According to the Ponemon Institute, cyber analytics “applies big data tools and techniques to capture, process and refine network work activity data, applies algorithms for near real-time review of every network node, and employs visualization tools to easily identify anomalous behavior required for fast response and investigation. Cyber analytics allow Security Operation Centers (SOCs)/Network Operation Centers (NOCs) and network analysts to more easily recognize patterns of activity that represent network threats.

Why is it significant?
In a nutshell: cybersecurity threats have escalated in volume and sophistication, while the number of internet-connected devices continues to burgeon – with some estimates forecasting 50 billion such devices by 2020. The number of trained cybersecurity professionals is too small to keep up, and the standard tools and techniques are often no match for sophisticated adversaries working round the clock.

“There are not enough cyber specialists in organizations to deal with the number of threats today, and the imbalance will likely become much worse,” reports Deloitte Insights.  “Cybersecurity is too often reactive to hacks and breaches, with actions only taken after (sometimes long after) a problem has occurred. The technology most commonly used to address cyberattacks employs ‘threat signatures’ based on patterns of previous attacks. But these approaches are of limited value in preventing new types of attacks.”

How much does a cyber analyst make?
An Indeed.com search for jobs in the Washington, D.C. area with the keyword “cyber analytics” brings up hundreds of positions, with salaries ranging from $95,000 to $135,000.

What companies are looking to hire cyber analysts?
A search for the job title “cyber analyst” brings up openings from major corporations and government contractors, including Boeing, General Dynamics Information Technology, Lockheed Martin, ManTech International, Mitre, and SAIC, as well as numerous smaller businesses and start-ups.

What companies produce cyber analytics products and tools?
Sqrrl, co-founded in 2012 by former US cybersecurity policy director Ely Kahn, is known for its visual cyber threat hunting platform, which combines analytics, machine learning, and risk scoring. The platform generates a behavior graph that allows users to track security holes and detect previously unknown threats. In 2018, the company was acquired by Amazon Web Services. Other companies in the arena include Carbon  Black, DB Networks, EndgameFireEye, and Novetta.

SAS, the longtime leader in business analytics, launched its cybersecurity platform in 2015. The product “correlates and analyzes billions of daily network transactions with business contextual information across organizations such as asset data, functional business role, and existing security alerts,” writes IT journalist Nestor E. Arellano. Users can then gain an ongoing, real-time view of security risks.

How can I gain the knowledge and qualifications needed to become a cyber analyst?
Capitol Technology University, a longtime leader in cybersecurity education and a DHS and NSA-designated Center for Academic Excellence, is one of the first universities in the nation to offer degrees in cyber analytics, with programs available at the undergraduate and master’s levels. Interested in learning more? Contact Capitol’s admissions department at admissions@captechu.edu.

www.CapTechU.edu

Tuesday, March 27, 2018

Capitol Partners with Industry Leader Textron Systems for New Unmanned Systems Programs - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/Textron

This coming fall, Capitol is set to launch two new unmanned systems programs: an undergraduate program in Unmanned and Autonomous Systems, and a master’s program in Unmanned and Autonomous Systems Policy and Risk Management.

To give our students the hands on experience they need, Capitol has partnered with Textron Systems, part of multi-industry company Textron and a manufacturer and operator of numerous unmanned systems. Recently, Textron Systems representatives Adam Leachman and Steve Lister visited Capitol during our undergraduate career fair to meet our students and demonstrate some of their unmanned technology. They spoke with Capitol's Meghan Young about the company, industry developments, and career paths for students.

MY: Can you tell me a little more about Textron as a company?

Leachman: Textron as a whole is a conglomerate of many different companies, including well-known brands like Cessna and Bell Flight. Textron Systems, which is the company that I primarily work for, has been involved with unmanned systems for several decades.

MY: How will Textron Systems be evolving in the future?

Leachman: We’re evolving in many different areas as far as unmanned systems. The newest venture that we’ve been involved with is  an unmanned maritime craft or surface vehicle called the CUSV™. We are also always furthering our unmanned systems aircraft systems with platforms such as NIGHTWARDEN™ Tactical Unmanned Aircraft System (UAS), Aerosonde® Small UAS and Aerosonde HQ. In addition to Textron Systems’ unmanned products, the company also designs and manufactures marine craft, armored vehicles, precision guided weapons, as well as a wide range of other products. The company is always looking to evolve its products to ensure it meets its customers’ future needs.

MY: What kind of academic prep would you like to see in students who come to work for Textron Systems?

Leachman: What we like to see in Aerosonde training is somebody with a networking background, aviation background, and/or basic knowledge of aviation. You don’t need to be a private pilot to fly these systems, but you must have knowledge of aerodynamics, weather, and networking is really key to these systems. It’s less about being a pilot and flying the system as it is managing the system from a software standpoint.

MY: For our unmanned systems undergraduate level they’re talking about requiring that students get that first level certificate as part of the program. Would that help them in terms of getting a job?

Leachman: The course will give the student the information they need to pass the FAA part 107 knowledge test. After passing the test they will be able to fly small UASin a commercial capacity.

MY: Would a second level certification, which will be offered as optional through our program, be more beneficial to students?

Leachman: Students with a second level certification, have a distinct advantage over other applicants when applying for a position. These students come to us with an unmanned systems degree, but also have experience flying a larger platform such as the Textron Systems’ Aerosonde.

MY: So what kind of soft skills are you looking for potential employees to have?

Leachman: Personal skills are very important in our industry as often we deal with military customers on a regular basis. So, the ability to act professionally under pressure is important to us.

MY: What kind of positions are you hiring for currently?

Leachman: We are hiring for many different positions right now. Everything including engineers, aircraft designers, pilots of UAVs, designers for UAVs, system programmers, and system engineers.

MY: Could someone who didn’t go through one of our unmanned systems programs – a 
cybersecurity or astronautical engineer, say – could they find a job with Textron Systems?

Leachman: Yes, absolutely.

MY: What are the opportunities for upward mobility at Textron Systems like?

Leachman: For instance, myself and Steve we both started off as Aerosonde instructors – operators – and now we’ve progressed into the management chain. So, in approximately five years, we went from basic Aerosonde operators, which is what somebody in this degree program would start as, to managers.

Lister: One of our colleagues utilized Textron’s tuition reimbursement benefit and went back to school for a master’s degree. Once you have that degree, the company immediately utilizes your new skills. Textron likes to hire entry level talent, develop and grow that talent, then provide opportunity and promote from within the organization.

MY: Why would you recommend that our students come to work for Textron Systems?

Leachman: Opportunities. Textron Systems really takes care of their employees. There are opportunities for professional development within the company, as well as opportunities such as the tuition reimbursement program to continue your learning.

Lister: One of the good things that I like is that, if you ever conquer your area and you’re looking for a new opportunity or career move, they can help you find that next step in your career within Textron Systems or within the larger Textron enterprise. Textron has a number of development programs where you can rotate between roles and business units.  This allows you to gain experience within different areas and pick which one is right for you.

Textron Systems businesses develop and integrate products, services and support for customer missions including defense, homeland security, aerospace, and infrastructure protection. To learn more about Textron Systems, please visit their website at https://www.textronsystems.com.
CUSV, NIGHTWARDEN and AEROSONDE are either trademarks or registered trademarks of AAI Corporation, an operating unit of Textron Systems.

Astronautical Engineering Soft Skills – What it Takes to Build a Career in the AeroSpace Industry - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/blog/astronautical-engineering-soft-skills-in-aerospace-industry

You’ve put in the work to become an astronautical engineer. You’ve learned the math, the physics, the orbital mechanics. You have the engineering skills! You’re a wizard with a soldering gun.

But do you have the soft skills aerospace companies in the industry are looking for?
Capitol strives to prepare our students with not just the academic knowledge they need, but also the interpersonal skills needed to succeed in the workplace. According to Sarah Alspaw, Director of Career Development and Student Success, “soft skills are something on which you cannot take a test. It all boils down to emotional intelligence.”

There are many different valuable soft skills to have, but here are some that the aerospace industry is definitely looking for:

Communication – NASA notes that “superior communication” is one of the skills that they are looking for in their people, and they are not alone. Your work may not require you to give daily speeches, but the ability to clearly communicate ideas and thoughts to your coworkers and customers is a critical skill that many companies desire in their employees. Communication is especially important in the aerospace industry, as employees often work in teams.

Collaboration – It’s unlikely that you will be building the space technology of tomorrow alone. Even in our astronautical engineering program at Capitol, students work together on major projects like the recent Cactus-1 CubeSat project, or Project Aether. Using your communications skills to not just talk to, but listen to your team mates is a critical skill to have on any aerospace project or, especially, mission.

Leadership – Being able to take the lead can sometimes be challenging, but when working on missions where failure could mean years of expensive and meticulous work down the drain, everybody has to be able to step up when called upon. Be confident in what you know, and be willing to step out of your comfort zone if it means the success of the team or mission.

Innovation and Creativity – You’re an engineer! You could’ve chosen an alternate scientific pursuit which would’ve required less flexibility and on-your-feet problem solving, but that’s not what you love. Don’t be afraid to voice your ideas. Everyone is different, and even the same type of engineering can be learned by different people in different ways. Don’t be afraid to contribute. Millennium Space Systems says that they are specifically seeking employees who “solve problems creatively.”

Open Mindedness – As Elon Musk once said, you should, “constantly think about how you could be doing things better, and keep questioning yourself.” If you aren’t pushing the boundaries of what has previously been thought of as possible, then you might not belong in the aerospace industry. Keep in mind that there’s a lot of team work and everyone is different. Being open to the ideas that others share is an important part of striving for innovation.

Self-Motivation/Management – Employers want someone who can both work well in a team as well as independently. Be responsible for your work, and take it one step further by suggesting ways you could contribute more. Did you notice while working on something that there was a way you could improve a process? Bring it up and offer to take it on yourself. Employers appreciate someone who is a self-starter.

For more help cultivating your soft skills, or for help with finding the right career path for you, make an appointment with Career Services at careers@captechu.edu.

Monday, March 26, 2018

What is intelligence? - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/What%20Is%20Intelligence

By Jason M. Pittman, Sc. D.
March 26, 2018

In our last post, we discussed why the field of synthetic intelligence is essential to the future of our species. Before we move along too far, I think it is crucial to outline just what we mean by intelligence or being intelligent. In doing so, we can address fundamental questions such as what is intelligence, how do we measure intelligence, and also are we the only intelligent life.

Intelligence can be a controversial topic. Paradoxically, although we often talk openly about possessing intelligence, or about others possessing more or less intelligence than us, we are often hesitant to discuss ways of measuring intelligence.

In the present discussion, we are not concerned with how intelligent an organism is. Our concern is with a given organism's capacity for certain qualities, in relation to its environment. That’s a funny quality of intelligence; intelligence must be acted out in the situation for us to know that intelligence exists.

In keeping with my prior claims, I suggest that intelligence is not imitation. Further, intelligence is not the result of computation but can perform computation. Indeed, artificial intelligence agents fall short in this regard; such systems are imitative. For example, machine learning is a computational function -- beautiful and complex but not indicative of intelligence. No matter how real a video game agent may appear, the game agent’s behavior is merely a programmed simulation, a hoax.

The question remains, then: what is intelligence? As far as we can tell, intelligence is considered to be present when an organism can (a) learn; (b) reason about what is learned; and (c) enlist learning and reasoning as a means to solve problems.

How do we measure intelligence?
First, don't say an IQ test. Second, don't say an IQ test. Remember, we're concerned with determining the presence of intelligence. An IQ test quantifies the amount of intelligence present so to speak. We ought to be careful about putting the cart after the horse if we want to make progress.

Now, intelligence has another odd quality in that it is not directly observable. While many traits --  hair color, cellular activity, language, and so forth -- are directly observable by us in others, intelligence remains trapped exclusively within. However, we have become exceedingly proficient at measuring the expression of human intelligence in manners consistent with indirect observation. Think about how we observe distant celestial objects; not directly but through inference based on surrounding evidence. Still, our proficiency has limitations.

Foremost, the instrumentation we employ for humans does not generalize to non-humans. G factor, as a psychometric instrumentation, is an example. While g factor works for humans and some other mammals, there is no reliable, equivalent instrumentation outside of those mammalian models. Does that mean we are the only intelligent life?

Are we the only intelligent life?
The simple answer is, no. However, affirming a non-human intelligence is difficult in that there is an anthropocentric bias in play. Because we appear to be the only intelligent life form, we assume we are in fact the only intelligent life form. Such is far from the truth, however.

We, of course, know that some primates other than homo sapiens exhibit intelligence. As well, there are higher order mammals such as dolphins and whales that also appear to be intelligent. The recognition of intelligence in these organisms is straightforward because their intelligence mirrors ours. More troublesome is intelligence that differs drastically.

Plants are an example. Plants appear to be closer in intellect formation to swarm intelligence in some ways, to multicellular life in others. Further, plants exist on an entirely different time scale than humans. Colonizing organisms -- bees and ants are great examples -- display intelligence as a collective. Also, life, as we perceive such, is carbon-based. In contrast, we know that other elements such as siliconcan potentially form the necessary molecular basis for life.

Thus, building a synthetic intelligence is a tricky problem. Starting with higher order intelligence is misguided at best, perhaps impossible. In part, I suggest that is why artificial intelligence is not the path forward if we are sincerely interested in creating intelligence rather than imitating intelligence. Existing, alternative forms of intelligence, such as what we can indirectly observe in plant life, perhaps is a more tenable endeavor.

Yes, let’s start there. Along the way, we can explore by-product of intelligence that may be a new way to measure more complex forms of intelligence such as synthesized animal intelligence: agency. Tune in for the next post in two weeks to find out how I think agency is a novel measure!

Friday, March 23, 2018

Essay-writing can translate into scholarship money - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/scholarship%20essay%20writing

If you're a college student or a graduating high school senior, you've had a significant amount of experience with writing papers and essays.

You've done it for classes. You may have written one for the SAT. Having come this far on your educational path, you're no stranger to expressing your ideas via the written word.

Now, put those pro essay-writing skills you've built over the years to use, and you could earn scholarships that help ease the burden of paying for college.
Dozens of scholarships are offered each year to graduating high school seniors as well as current undergraduates and graduates. Most require submission of a short (500 to 1,000-word) essay as part of the application process.

Below are some of the opportinities available in the coming months. Interested in applying? Contact the financial aid office at Capitol for suggestions and recommendations concerning the process. Some scholarships require certification by the school and/or recommendation letters.

Delaware-District of Colunbia-Maryland ASFAA, Inc. Scholarship -- opportunity expires soon!
To be eligible for this scholarship. you must be attending an eligible DE-DC-MD institution and demonstrate financial need as defined by the FAFSA and your institution. Minimum 2,5 GPA required. As part of the application process, candidates are asked to write a brief essay -- no more than one typed page in length -- explaining why you feel you would be a good candidate for the scholarship. You must also submit one letter of recommendation from an academic counselor or professor with your application. If interested in appying, contact the Financial Aid office -- each school is allowed to certify one eligible candidate. Applicaion deadline is April 5, 2018. For more details please visit: https://dedcmdasfaa.org/docs/forms/pdf/scholarshipapp.pdf

Building Cybersecurity Diversity (BCD) Scholarship -- opportunity expires soon!
Winners of the BCD scholarship, offered by the Financial Services Information Sharing and Analysis Center (FS-ISAC) receive $5,000 and an all-expense-paid trip to the FS-ISAC fall summit on November 11-14 in Chicago. This diversity-oriented scholarship is open to female applicants who will be at least 21 years old by November 11, 2018, and able to attend the summit. Applicatnts must be be pursuing a technology or security-related education, enrolled in college or other recognized program of study, and be authorized to work in the United States. An essay is not required for this scholarshop. Apply by April 15. 2018. For more information please visit:  https://fs22.formsite.com/FS-ISAC/form182/index.html

Fundbox Small Business Funding Scholarship
College and university students (including graduate students), as well as high school students who will attend college in 2018-19, are eligible for the newly-launched FundBox Future Small Business Owner Scholarship. First, second, and third-place scholarship awards will be offered ($2,000, $1,000, $500 respectively). To apply, write an essay of  1,000 words or less in which you describe how you'll use your knowledge and skill sets to create a small business (or big business) that would help impact society in a positive manner. Application deadline is May 31, 2018. For more details please visit:  https://fundbox.com/scholarship/

Go For the Gold Engineering Study Scholarship
Industrial Access, Inc. offers a $3,000 scholarship to one high school student that is or will be enrolled in an engineering school or field of study. You must have a 3.0 or higher GPA/QPA to apply, participate in volunteer work or community service, be in (or entering) your senior year of high school, and have been accepted at, or enrolled in, an accredited engineering school or program within the United States, including Capitol Technology University. Scholarship is available to US citizens and permanent residents only. Application deadline is April 30, 2018. For more details please visit:  http://www.industrialaccess.com/

Lawyers of Distinction Scholarship
College students who are not yet in their final year of studies, as well as high school seniors who have been accepted by a collge or university. are eligible for this $1000 scholarship. To apply, write a 500-word essay answering the question “What is one law that you think should be put in place that doesn’t currently exist?“. Make sure to tell us how it would benefit society. Application deadline is February 28, 2019. Winners will be notified in March 2019. For more details please visit:  http://www.lawyersofdistinctionscholarship.com/

The Fons Scholarship
Students enrolled in an accredited college or university in the United States are eligible to apply for the $1000 Fons Scholarship.  To apply, you'll need to write a 1000 word essay which answers the following questions:
  • Payment apps have risen in popularity in recent years, why do you think that is?
  • Can you identify why having a payments system which integrates scheduling helps a business/ professional as well as its customers/clients? How do you think payment apps will be used in the future?
Application deadline is August 1, 2018. For more details please visit: https://fons.com/scholarship

Students Affected by Cancer Scholarship
Ambient Edge, a top-rated air conditioning, heating & plumbing company serving Las Vegas and surrounding communities in Nevada and Arizona, offers a $1,000 scholarship for high-achieving students who have dealt with—or are still dealing with—cancer in any form. The scholarship will grant $1,000 to one talented, hard-working student to help them reach their dreams.To be eligible, you must be either a current or former cancer patient, or have stood by a loved one who was diagnosed with cancer. Scholarship is open to undergraduate and graduate students. as well as incoming first-year students; to be eligible, you must have a GPA of 3.0 or higher.ent/former cancer patient, or have stood by a loved one who was diagnosed with cancer.
As part of the application process, candidates are asked to write 500-1000 word essay on the following topic:

How did your experience with cancer change the way you look at your own life or the world around you? Did it affect your goals, or change the way you want to live your life? And how are you living up to that or pursuing those goals today? Tell us how your personal experience has shaped your broader approach to life, the people around you, and/or your career goals.
Submit a copy of your transcript, along with your application and essay (see below) by email at wecare@ambientedge.com. Deadline for Applications: December 31, 2018. For more details please visit:  https://www.ambientedge.com/2018-students-affected-by-cancer-scholarship/

Blake Rubin Scholarship
The Blake Rubin Scholarship is available to undergraduate, graduate and post-graduate students who are not in their final year of study, as well as to high school seniors who are going on to college. Amount is $1000. Write an essay answering the question, “Who is your role model in life and why?” in 500 words or less. Submision deadline is January 31, 2019. For more details please visit:  http://blakerubinscholarship.com/

Kalu Yala Scholarship
Write a 500-word essay on the topic "The Main Benefits of Studying Abroad," and you could be awarded the $1000 Kalu Yala scholarship, designed to help support future entrepreneurs and business people. Submission deadilne is December 31, 2018. The scholarship is not exclusive for Kalu Yala students or alumni -- students at other institutions can apply for this scholarship and use the funds at any college or university. Scholarship is open to undergraduate, graduate, or post-graduate students who are not in their final year of study, as well as to high school seniors who have been accepted into a college or university. For more details please visit:  http://kaluyalascholarship.com/

Wednesday, March 21, 2018

An Interview With Cybersecurity Program Alumni Hector Santiago, DSc - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/blog/telecommunications-cybersecurity-program-alum

Dr. Hector Santiago earned his doctorate in cybersecurity in 2014, with a dissertation that built on his telecommunications background and explored new approaches to analyzing cyber attacks. It was not his first time at Capitol; Dr. Santiago also holds a master’s degree from the university in telecommunications and information systems management. Among many other professional accomplishments, Dr. Santiago devised a non-forensic attribution methodology (NFAM) which is used by the Department of Homeland Security (DHS) to track down anonymous cyber adversaries. He also played a key role in building the database used by the DHS for identifying cyber threats to federal agencies.

In addition to his government service as part of the DHS, Dr Santiago is also a regular contributor to Homeland Security Today.

How did you first become involved in the cybersecurity field?

I was enlisted for nine years in the Army as a signals intelligence professional. As a result, I became very familiar with signals intelligence and telecommunications, and decided this was what I wanted to do after retiring from the military and transitioning to a civilian career. And it seemed to me that the smartest choice was for my career to take on more of a cybersecurity aspect.

Telecommunications is about how things are supposed to work – how devices are supposed to talk to each other, for instance. A telecommunications professional focuses on the expected outcomes. Cybersecurity is about how malicious actors can manipulate systems and devices to get an unintended outcome. These two areas – cybersecurity and telecommunications – are both continually evolving, but at different speeds. So, for instance, a rapid increase in processing speed, allowing a decrease in latency with regard to data transmission, might also constitute a variable which adversaries can use to their advantage.

In telecommunications, the guiding principle often amounts to “as long as everything works the way we expect it to work, things are fine.” The cybersecurity perspective is “no, at that same moment someone is doing something with your device that you did not intend and will harm you in ways you cannot possibly imagine.”

What do you find most interesting about the cybersecurity field?

Intelligence about cybersecurity supports a lot of policy making. Cyber is a hot button topic right  now, with policy being put forward at the highest levels based on the work done by analysts. I go to work every day with the knowledge that a project I’m involved with may well help shape national policy, and that’s exciting and rewarding.

What are some of the top-priority concerns with regard to cybersecurity?

One of the overarching concerns is the tradeoff between convenience and security. Everyone wants things to be as convenient as possible. We want to be able to access our information immediately. For example, a growing number of people like the idea of a cashless society, where you can just wave your phone – or maybe, someday, your hand – and be able to pay your restaurant bill or buy groceries. We see the benefits of having a chip in you that, for instance, will provide first responders with your HIPAA data if you suffer an accident or sudden medical condition. But we tend to forget about the security aspect.  It always seems to be an afterthought in the rush to get these exciting innovations out there. As a result, we are caught off guard by attacks which actually should not have been a surprise.

I mentioned the idea of a cashless society. This has implications that are far more radical than people often acknowledge. Wealth may no longer be attached to something tangible which we can retrieve if the grid goes down. Your wealth will be continually on the grid. If something happens to the grid, you won’t necessarily be able to reacquire it. In a cashless society, wealth consists of servers telling other servers what you are worth. Once we consider these implications, we may be inclined to rethink the priority we place on convenience.

What were your reasons for wanting to undertake a doctoral degree in cybersecurity?

I had a yearning to teach and to mentor others. A doctoral degree opens up the opportunity to teach classes and even become a faculty member at a college.  It also gave me the opportunity to refine my skill set in my chosen field. My research focused on telecommunications infrastructure as a precursor to malicious attacks. Typically, when people examine how malicious attacks come about, they look at behavior. I looked at infrastructure; I was able to identify certain types of infrastructure that are preferred by malicious actors.

Why did you choose Capitol for your doctoral degree?

I was familiar with the school, having already completed a master’s degree at Capitol, and I also knew that the cybersecurity program is highly regarded. It is a DHS and NSA-designated Center for Academic Excellence. Also, the program is online, offering me the flexibility that I needed at the time. Dr. Helen Barker was also a critical influencer in my decision to take on my doctoral level challenge.

What did you find most rewarding about the doctoral experience at Capitol?

The critical thinking and exposure to the scientific method involved in earning the Doctorate of Science degree – it’s like nothing else I’d experienced. Doctoral work was the first time I had to do a deeper dive into certain things to make sure that the work could withstand the utmost scrutiny. At the baccalaureate level, you may be basically writing book reports. At the master’s level, you’re hopefully undertaking something more rigorous. But at the doctoral level – and particularly in the doctoral programs at Capitol – students are challenged to go way beyond that and make serious contributions to their fields of study. It’s not an easy undertaking, but it’s well worth it; I’m incredibly proud of the caliber of the work I did as a student in the doctoral program. I take that professional ethic I refined at Capitol with me into work every day.

Tuesday, March 20, 2018

Capitol doctoral student investigates organizational dynamics - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/Roxanne%20Robinson%20DSM

In a business or organization, motivated employees are an asset.

Employees who develop rivalries and try to undermine each other -- not so much.

A 25-year veteran of the commercial real estate industry, Capitol doctoral student Roxanne Robinson has long been intrigued by the way company culture can impact the well-being of a business. Too often, she says, negative dynamics in the workplace produces a steep toll, whether in the form of high turnover, missed deliverables, or lost productivity.

"I've observed over the years that in almost every organization there is some degree of rivalry or competitiveness that is not positive, does not result in more productive personnel, and does not help the organization," says Robinson, who is earning her Ph.D. in Management and Decision Sciences at Capitol. "My research sets out to analyze how this kind of behavior influences companies and diverts them from their strategic objectives."

"Not only that, but I aim to put a dollar amount to it," Robinson adds.

Being able to quantify the impact is important, she says, because businesses often don't act unless they can see how the bottom line is affected. "These kind of negative organizational dynamics are widespread and fairly well-known, but not much has been done to mitigate them. By focusing on a specific industry -- commercial real estate -- and providing real numbers, I hope my research will help management understand the problem clearly and take steps to address it."

The Ph.D. program is not Robinson's first experience with Capitol; she also earned her M.B.A. and Certificate in Acquisition Management at the school. While many choices in online graduate education are available, she says Capitol's approach is the best fit.

"I like the way Capitol does online education. I'm able to have a closer relationship with my professors as well as my cohort. I like the size of the school -- you're not lost here and when you have questions they can be answered quickly, as opposed to going through the kind of bureaucratic process you often encounter at a larger-sized institution. Capitol pays attention to students," she says.

Capitol currently offers three online doctorate programs: a PhD in Business Analytics and Decision Sciences, a DSc degree in Cybersecurity and a Ph.D. in Technology. Online delivery makes doctoral studies more feasible for professionals like Robinson, who must balance their academic work against the demands of a busy career.

"I've always wanted to earn a Ph.D.," Robinson says. "Among other things, it's a way of diversifying my professional profile and be marketable across a number of areas. With this degree, I hope to move up into management. If not, I look forward to going into teaching or school administration because I will have the business credentials that allow me to do so."

"Job security in today's economy requires this kind of diversification," she says. "You need to be able to position yourself for a variety of possible opportunities. A doctoral degree will help me do just that."

Monday, March 19, 2018

Hamming Around at Capitol - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/node/3281

By Dr. Alex "Sandy" Antunes, KB3VNB

One student separates from the group to walk around the hill, causing the others yell out.  "Did you lose signal?"  The answer is yes, so they quickly rejoin.  "It has to be on the north side of Campus", they agree, and begin walking with strange dowsing-rod like tubes of metal in their hands.  In less than an hour, they succeed.

Are these just students with cell phones looking for 4 bars so they can text?  Not quite-- instead, a 60-year old American hobby has become revitalized through active students exploring radio communications.

In an era when we suspect most millennials don't exactly care what a radio station is, Capitol is experiencing a resurgence of amateur radio licenses (or 'Ham' licenses) and its related amateur satellite (AMSAT) usage.  This is the art and science of using off-the-shelf radio gear to communicate worldwide with other radio amateurs, not via internet or digitally, but through basic principles like power, antenna size, and a fair dose of understanding just how radio waves work.

Capitol has started up radio/wireless activities -- students Sean Dabbs and J.C. Culp re-started the Capitol Amateur Radio Club (CARC), AE students are tasked with a 'fox hunt' to search for a hidden transmitter, student pairs tackle r/c car races where each car's control radio interferes with the others.  Ham radio is partially integrated into the EE & AE curriculum.  In AE-455/Satellite Comm, taking the FCC amateur license is an option as an opt-out replacement for one of the required exams.  But the real motives behind active amateur radio are skill building -- and job hunting.
Capitol call signs: CARC KB3KJI, Robert Herschbach KB4ZGU, Sandy Antunes KB3VNB, Alex Petrov KC3FDV, Aaron Bush KL2XF, Carl Hansen KC3BXO, James Culp KC3FSG, Electra Sherlock KC3DNO, Zach Richard KB3TXV, Keegan Moore KB3TXQ, Ryan Schrenk KC3JNH, David Mileto KB3KHS, Igor Vegner KC3HIC, Victor Chaves KC3HIB, Gabriel Piazzalunga KC3HHU, Neil Caulfield KC3GMK, Sean Dabbs KC3HPK, Joshua Hernandez KC3JTY, Mark Horvath KD2ODG, Chris Murray KC3KJH, Sofoniyas Demelashe KC3KLP, Jacob Gregory KC3KJP, Ralph Stormer KC3KBL.  For more info on amateur radio, visit ARRL
Call it applied electronics or analog hacking, it's an area where students learn a little physics and a lot of applied 'getting it to work'-- and an area that has surprising career opportunities. "If a student lists their call sign on their resume, they're getting at least an interview," said one hiring manager at Capitol's Career Fair.  Corporate visitors to the Fusion Lab show surprise at Capitol's list of students with call signs -- a skill set and rating they thought was a lost art.  Capitol even offers a little-known scholarship open only to student Hams.

The core FCC exam itself is 1/3rd basic second-semester Physics, 1/3rd common sense like 'don't fix an outdoor antenna during a thunderstorm', and 1/3rd jargon that you can study up on online. The Capitol library carries the ARRL (Amateur Radio Relay League) license test-prep books, and the exam is offered for free on the 3rd Saturday of the month by the Laurel Amateur Radio Club (LARC).

Once they earn their free license, students can talk world-wide with other amateurs, help rescue services in natural disasters, and connect with other Hams for fun and professionally.  You can even talk to astronauts on the International Space Station.  Capitol students are yet again in the forefront of hands-on learning through amateur radio, a 'lost art' that is more accessible than ever.  All they have to do is be ready to step up to the radio.

Friday, March 16, 2018

It’s science, not magic: Capitol researchers harness brainpower to control devices - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/BMI%20workshop

Being able to use your thoughts – no mouse or joystick required – to control computerized devices may once have sounded like sci-fi fantasy, but a research team at Capitol is working on projects that demonstrate such capabilities are very real.
Stock photo of an EEG headset
Drs. Jason M. Pittman and Garima Bajwa are co-leading the Brain-Machine Interface program at Capitol, with a lab on campus providing space and equipment for experimentation. Currently on the agenda: enabling humans to fly drones using just their thoughts.

“You think ‘drone go up, drone go down, drone go left, drone go right – there’s no joystick,” Pittman explained. “You fly it and think it. We have a team of four students who are working with Dr. Bajwa on this.”

In addition to the Capitol community, opportunities are available for students at area community colleges to visit the university and see this technology in action. Capitol will be holding a special BMI workshop on Saturday (March 24) for community college and high school students.

“We’ll have activities for them that involve interacting with the drone, or using your brain to interact with a piece of software and control an object moving on a screen – like playing a game of Pong using only your thoughts,” Pittman said. “It’s some pretty cool stuff.”

And the potential applications are boundless. Human activities are increasingly linked to a variety of computerized, networked devices that, together, constitute what many refer to as the Internet of Things. Tools like the “personal assistants” Alexa or Siri allow humans to control these devices with voice commands.

The technology being explored at Capitol takes the process a step further – one day, Pittman says, we may not need to utter a voiced command to control our devices. They will respond to our thoughts.

“It’s exciting and scary,” he says. “Exciting because of the benefits – for instance, people with certain kinds of disabilities or impairments will have access in a way that they didn’t have before. Scary because of the security aspect. A nefarious actor could theoretically get between you and your devices. The lights turn on, leaving you to wonder ‘did I think that?’” There is the potential to mess seriously with people’s minds and sense of agency.”

As a cybersecurity expert, it’s part of Pittman’s job to consider such risks and devise ways of mitigating them. For now, though, the BMI workshop’s main focus is to explore the technological possibilities – in ways that are educational and excitement.
“We’re having a blast,” Pittman says. “And we hope area students will join us on the 24th to join in the fun.”

Interested in exploring BMIs? Register here for an upcoming workshop or send an email to cybersat@captechu.edu.

Thursday, March 15, 2018

What do All Those Acronyms Mean?! Understanding Unmanned Systems - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/Unmanned%20acronyms

UAVs, ROVs, UUSs, RPAs: How do unmanned systems experts keep it all straight? The scope of unmanned systems is greater than just the word “drone.” Defining the difference and the language surrounding unmanned systems is important for anyone serious about operating one.
Photo of Richard BakerAccording to Capitol Technology University's Dr. Richard Baker, an unmanned system is defined as, “any electromechanical system which has the ability to carry out a predetermined or described task, or a portion of that task, and do it automatically with limited or no human intervention.”

Unmanned systems can operate in a variety of different atmospheres and perform tasks ranging from agricultural work to planet exploration. “They can be used in the air, on the ground, in the water or below the water, or in space to do many kinds of things. But these are basically mobile guided vehicles that put a sensor someplace or deliver a package,” says Dr. Baker.

“They can be operated in a few different ways as well,” he continues, “An unmanned vehicle, which doesn’t contain a person, can be what we call teleoperated, which means that they are operated remotely by either a radio frequency or a tether, a cable. They can be autonomous, run on their own; they’re programmed to do what they’re doing. And they typically deploy a payload which can either be a sensor or an actuator. Actuator being like, you’ve seen the robots with little fingers or tongs that pick up things.”

Unmanned systems are typically deployed to do things that people either can’t do or shouldn’t do. “Putting an unmanned system in a dangerous position, or someplace that we can substitute it for people doing something that’s a repetitive or dull job is ideal. Using unmanned systems to do things that are dirty because it’s a hazardous environment is another good use of them. A nuclear power plant, or that sort of thing is where a robot would be good,” says Dr. Baker.

But now that what they are and why they are makes sense, what about all of those acronyms? Well here is a list of the terms you might hear the most often, and it’s simpler than it seems. Just take the first letter of each word in the system to get the acronym:

AUV – autonomous unmanned vehicles
UAVs - unmanned aerial vehicles
UAS - unmanned aircraft system
RPA - remotely piloted aircraft
UGS/ UGVs - unmanned ground systems, unmanned ground vehicles
USS - unmanned surface systems
UMS - unmanned marine systems
UUS/UUV - unmanned underwater system, unmanned underwater vehicle
ROVs - remotely operated vehicles, Dr. Baker notes that, “the ones under the water are usually referred to as ROVs.”

“They’ve been called drones,” says Dr. Baker, “but when you think drones, people usually think of either the military drones which are doing airstrikes that they’ve seen in the news, or the ones in your backyard flying around and surprising your neighbors.”

The term unmanned system defines a broader idea than the term drone currently does. We need to start thinking of them as more than just military equipment or miniature quadcopters used as toys, and see them as they are: vehicles capable of advancing our society into a safer, smarter future.

Capitol’s unmanned and autonomous systems programs are set to begin this Fall of 2018. To learn more about our programs, check out: Unmanned and Autonomous Systems and Unmanned and Autonomous Systems Policy and Risk Management.

Tuesday, March 13, 2018

What is Synthetic Intelligence? - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/What%20is%20synthetic%20intelligence

By Jason M. Pittman, Sc. D.
March 13, 2018

The popularity of artificial intelligence has grown to epic proportions. In recent years, we have witnessed the rise of advanced consumer-focused AI through products such as Alexa, Siri, and Telsa autopilot. Businesses, too, have embraced AI. Machine learning is exploding as an application of narrow AI, used to comb through vast amounts of data to better develop and market product. Further still, historically complex games such as Go have been conquered by learning computers.

While these advances are momentous points in human development, the public has been told a lie. We have been duped into viewing these systems as thinking machines.

A thinking machine, a machine with intelligence, cannot be artificial. Artificial intelligence is a simulated intelligence; a cantrip cast upon the public to hide the complex programming behind our virtual assistants, our auto-piloting vehicles, and our game NPC behavior. Certainly, none of us considers these constructs to truly be capable of thought. Thus, a simulation of thinking is not, strictly speaking, thinking.

However, a genuine non-human intelligence may not be out of reach if we begin to seriously consider synthetic intelligence. Moreover, the race to create human-like intelligence is folly. Creating intelligence after all is an almost unspeakably difficult problem. Thus, starting with the most complex form may be ill-advised in the context of developing understanding of intelligence models and making honest progress on the problem.

The use of synthetic in the phrase synthetic intelligence does not, as some take it, mean fake. Rather, the use of synthetic implies a synthesis of foundational elements into something that is very much like something else. In fact, the synthesized object often is superior to natural form. Here I purposefully use natural rather than original despite the latter being the term that would be most natural for us to use. Such synthesis typically manifests through some external mechanism that is casually directed. That is, there is the intent to produce the synthesized object through the synthesis process. Moreover, synthesis results in an object that is just as, if not, more real than the original.

Diamonds are an easy example. Synthesized diamonds are still compressed carbon albeit in a laboratory setting as opposed to the earth. Such objects are no less than real than natural diamonds pulled from the ground. Further, synthetic diamonds are flawless in their diamondness; something that natural diamonds rarely achieve.

We are obsessed with imitating human form and intelligence. This is anthropocentrism and egocentrism of the highest order. Amongst animal life, we are but one species within a group of roughly half a dozen that exhibit normative signs of intelligence. Yet, animal life is not the pinnacle of intelligence. For example, there is increasing evidence that plants may possess a form of consciousness. Fungi represent a form of life that is complex and may harbor intelligence. These are just carbon-based lifeforms that exist in our immediate reality. Certainly, there could be other lifeforms or non-carbon-based life yet undiscovered.c

So, why are we content to dabble in mere imitations of intelligence? Why aren’t we exploring the means to synthesize intelligence with goal of not producing a sham mirror of us but rather a unique synthesized mind?

Let this serve as a call to action then. The explosion of interest in, and development of, artificial intelligence is ultimately a dead end. The work will be useful in exposing some, maybe most, of the underlying mechanisms related to consciousness. However, artificial intelligence, by definition, will not produce a mind we can denote as intelligent. Rather, the best we will get is an imitated intelligence, a fake.

Comparatively, if we capture the momentum and refocus slightly so that we revise artificial to be synthetic there is a higher probability of success. Then, the question becomes what is intelligence and how can we synthesize such? Read the next post in two weeks to find out what I believe to be an answer!

Dr. Jason M. Pittman's career has included many roles: network engineer, security architect, software developer, and professor and mentor.  He has worked at companies ranging from tech startups to large corporations, in addition to stints at film studios and a tattoo parlor. He is currently professor of cybersecurity at Capitol Technology University, and has also taught at Cal Poly Pomona.

"I am fascinated by all things human and tech," Dr. Pittman writes. "I see the stars as our inevitable destination and work to do my part in helping our species get there." Learn more about Dr. Pittman at http://www.jasonmpittman.com/

The future is here: learn about brain-machine interfaces at Capitol workshop - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/BMI

Upcoming Dates: March 24, April 21 & 28

Imagine being able to operate your computer without needing a mouse or a keyboard, by controlling it directly with your brain.

Imagine using your thoughts to adjust the temperature settings in your home, change channels on your smart TV, play the new Taylor Swift single, or turn on the lights.
A futuristic woman with optical enhancement
Sound like sci-fi fantasy? Once, it would have been. Now it is becoming reality, as a result of brain machine interfaces (BMI) – an emerging field of technological research that is generating intense interest. Capitol Technology University, home to one of the nation’s most highly regarded cybersecurity programs, will be providing an opportunity for young people to learn about brain machine interfaces and even to try them out for themselves.

The university’s popular Cyber Saturday program – aimed at community college students – will focus on BMIs during sessions in February, March, and April. Click here to register or e-mail cybersat@captechu.edu for more information.

“We’re going to introduce brain machine interfaces to students and have them engage in a variety of activities – controlling computers, playing games, and operating various devices,” explained cybersecurity professor Dr. Jason M. Pittman, who is spearheading the initiative together with Dr. Garima Bajwa of the engineering department. “We’ll also be teaching them about the cybersecurity aspects that come with this new technology.”
The program is part of a federal grant Capitol has received to conduct research into brain machine interfaces – and into the host of potential security issues that they raise.

Linking brains to computers can bring about enormous benefits and conveniences, but also opens up new avenues for criminal or malevolent behavior, he said. Malware could potentially be employed that gives adversaries direct access to their victims’ thoughts.

“Imagine the Equifax breach, but in the context of your thoughts,” he said. “Someone’s not breaching a company to steal data that’s on the hard drive. Rather, someone’s seeking to backchannel an EEG device so they can read your thoughts while you are thinking them.

Dr. Bajwa and Dr. Pittman hope to help mitigate these risks through their research, which is focused on authentication -- that is, on ensuring that BMI-controlled devices can only be controlled by the intended user, and that the user’s thoughts are controlling only the intended devices.

“A new paradigm is emerging for how we interact with machines, and along with it comes a new paradigm for criminal action,” Pittman said. “With this capacity-building grant, Capitol is helping to map out this new and largely uncharted territory.”

Interested in exploring BMIs? Register here for an upcoming workshop.

Monday, March 12, 2018

Creative Juices club to highlight Capitol artists with April event - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/creative%20juices

Capitol Technology University may be a STEM-focused school, but that doesn’t mean artistic talent is in short supply.

Many students enrolled in the university’s engineering, technology, and business programs also have an active interest in music, the visual arts, poetry, and other creative genres.

A new club at Capitol, Creative Juices, aims to provide a venue to showcase these students’ activities. On April 12, the club will be hosting an art exhibition at Puente Library that will be followed by a dinner in the Student Center and a rock band performance in Gudelsky Auditorium.

“The event is an art exhibition, and we’re doing it so we can better represent the artists here at Capitol. There are a lot of artists at the university – musicians, poets, photographers, digital and graphic artists -- and we want to show them that they have friends here on campus,” said Barron Botts, the club’s founder and president.

Barron, a sophomore in the computer science program, established Creative Juices last year after seeing that no other art clubs existed on campus.

Artistic endeavors can provide an essential counterbalance to homework, lectures, and labs. “When I was in high school, poetry was one of the few things that kept my interest going while I was busy scarfing down information for classes,” he said. “When I got to Capitol, I didn’t want to be in a situation where I just went to class every day and came back home to do my homework, with nothing to go out and do.”

This year, in addition to leading the Creative Juices club, Barron is also enrolled in an engineering poetry class taught by adjunct professor John Washington, an accomplished poet who is also Capitol’s assistant director of advising and student success.

“It makes us realize that there’s another perspective to engineering and technology,” Barron said.

Interested in finding out more about the April 12 art exhibit or the Creative Juices club? E-mail Barron at btbotts@captechu.edu
Photo (from left): Jalyn DeJesus, Jacob Rush, Barron Botts, Joshua Ferguson, and Jorge Rodriguez. Creative Juices poster designed by Johnathan Botts.

Saturday, March 10, 2018

Easttom: in cyber war, malware is “the weapon of choice” - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/easttom

Prior to beginning his doctoral degree at Capitol, consultant and IT professional Chuck Easttom had already made significant contributions to the fields of cybersecurity and computer science. He is the author of 26 books on programming, digital forensics, cyber security, and penetration testing.  Several of those books are used as textbooks at various universities. He holds more than 40 industry certifications and has served as a subject matter expert for CompTIA certification exams in the creation of the CompTIA Security+, Server+, and Linux+ certifications. He was also on the Certified Ethical Hacker version 8 test revision team and created the OSForensics Certified Examiner course and test.

Easttom is a regular speaker at computer science and security conferences including Defcon, SecureWorld, ISC2 Security Congress, IEEE conferences, AAFS, and many others.  He has already published dozens of peer reviewed papers and articles in trade journals like 2600 Hacker.  Additionally Chuck Easttom is an inventor with 13 computer science patents so far.

Most recently, Easttom was invited to present a paper on weaponized malware at the 13thInternational Conference on Cyber Warfare and Security, held from March 8 to 9 at National Defense University. In addition to the paper, Easttom is presenting a poster at the event.

What research did you present at the ICCWS?

The paper is, in effect, a how-to on weaponized malware, and puts forward the argument that we should use weaponized malware. Cyber warfare is here, it occurs, malware is the weapon of choice in this domain, so let’s look at how to use it effectively.

The paper also aims to set up a different type of malware taxonomy. Instead of looking at malware based on the damage it causes, we look at it based on which one would be best selected for particular cyber warfare missions.

In addition to the paper, I presented a poster on a proposed taxonomy based on the McCumber Cube, which is one of the important conceptual models used in the cybersecurity field. The McCumber Cube provides a view that goes beyond the oft-cited triad of confidentiality, integrity, and availability; it allows us, for instance, to apply these three parameters to data at rest, data in motion, and data in processing.  So we get multiple dimensions. What I’m proposing is a taxonomy for all types of attacks – malware, denial of service, or any other type of attack – based on which of the McCumber Cube dimensions they affect. I have a paper in the works on this topic.

What are some of the objections raised against use of weaponized malware, and how would you answer these objections?

The first is the general ethical issue of using cyber, in any way, as part of an offensive methodology. However, it is simply a fact that countries have cyber conflicts. That’s the reality. From my perspective, weaponizing malware isn’t different from developing any other type of weapon. Scientists work on developing missiles, guns, and other things. Why would a cyber weapon be any different? What I find odd in these ethical discussions is that the same people who voice outrage at the fact that the United States or one of our allies might attack computers in Iran don’t seem as outraged when we send in a plane and drop bombs. Now, if you’re angry at me, would it be better from my perspective for you to drop a bomb on my house or target me with a computer virus. Maybe others will disagree, but I vote for the virus!

That brings us to the second objection. Carl Sagan famously opined that no scientist should be involved in any sort of weapons research. While Sagan is a great hero of mine, I can’t agree with that. We live in a world where bad things happen and there are bad people. That means weapons are required, including cyber weapons.

One of the things I do discuss in my paper, though, is how to minimize collateral damage. I’ve already published research on how to target malware so that it looks at the machine it is on and determines whether it has found one of its targets; if not, it would self-destruct. That’s something we’re not doing that I think we should.

The Stuxnet virus offers a case in point. Experts agree that Stuxnet was designed to target Iranian nuclear refinement. In the process of reaching its target, though, it affected a whole lot of machines that had nothing to do with Iran or its nuclear program. And that’s a problem. Even if we agree that it’s okay to attack Machine X, it’s not okay to attack every machine that might connect to X.

You’re already a cybersecurity expert who has authored many books and publications. What motivated you to undertake a doctoral degree, and why did you choose Capitol?

We all have gaps in our knowledge. No matter how much expertise you may have, there are going to be areas where you can afford to strengthen your understanding. It’s not uncommon to encounter people – a colleague, say, or even a professor – who know less than you in terms of the overall field, but may have one particular piece that you don’t have.  We have to be ready to put our egos to one side and be willing to close those gaps.

Another reason is more personal. As a child, being something of a geek, I always imagined I would have a doctorate by the time I was 25. Life got in the way and I’m well past 25. My wife told me I would never be happy until I achieve that milestone, and she’s probably right. Not having a doctorate hasn’t hurt my career; I’m a frequent public speaker, often at events where I’m the only speaker without a doctoral degree, and have published several books. But it’s a matter of self-fulfillment.

Capitol jumped out for a couple of reasons. Online education has exploded in recent years, but quite a few of the schools involved – especially the for-profit schools – have what I would consider to be very weak programs. In some cases, they exist mainly for one purpose -- to take your money. Capitol is not an online for-profit school; it’s a bonafide university. The undergraduate engineering programs are ABET-accredited; the school has contacts with NASA, and it’s a DHS and NSA-designated Center for Excellence in cybersecurity. It’s a strong university that happens to offer the opportunity to take courses online.

I also like the fact that Capitol is focused. There aren’t 500 different majors you can take. If you want to major in medieval European history, Capitol isn’t the school for you. Capitol does business, engineering, and technology. I like being at an institution that has this kind of focus.

Friday, March 2, 2018

For transitioning military: launch a career as an Amazon Web Services Cloud Support Associate through a free training program! - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/Amazon%20Web%20Services%20training

For soldiers transitioning into civilian life, charting the next phase of their careers can be a daunting challenge. A recently launched Maryland initiative, called Military Corps Career Connect (C3), is designed to make the path forward easier to navigate.

The program provides a set of career services that enable transitioning active duty service members, active duty spouses, and recently separated (non-retiree) veterans to move into a number of different professions.
Stock photo of a soldier
As part of the C3 program, Capitol Technology University is proud to be partnering with the Prince George's County Economic Development Corporation in offering a 16-week Amazon Web Services Cloud Support training course.
C3 logo

Enroll in this course and you will gain the skills you need to join one of the globe’s leading change-makers and use groundbreaking technologies and help organizations and individuals migrate their computer applications into the Cloud. The program is free  to accepted students, with costs covered by the C3 grant.

C3 will also cover the cost of your Security+, Linux, and AWS Certification Exam if you are accepted into the program. On successfully completing the course, you will interview to be hired as an Amazon Web Services Cloud Support Associate at a location in Herndon, Va.

Who is eligible? This opportunity is open to a) transitioning service members separating in the next 12 months who hold at least a Top Secret Clearance; b) veterans who have separated from military service in the past 48 months (excluding retirees), with at least a Top Secret Clearance; and spouses (with at least a Top Secret Clearance) of active duty service members who have relocated in the past 48 months.  

All participants must have at least a Top Secret Clearance.
Prerequisites: You must provide C3 eligibility documentation, submit a current resume, complete two or more online assessments to determine computer knowledge and skills, and have a Top Secret Clearance.
PGCEDC logoCourse Content and Schedule: Course time, in this 16-week program, will be divided between instructor-led sessions, hands-on lab work, and work with AWS engineers on case studies. Classes will be held Tuesday through Friday from 5:30 pm to 9:30 pm at Capitol Technology University in Laurel, MD. Start date is March 6, 2018 (subject to change).
C3 Covers: training costs; Security+, Linux and AWS Certification Exam Costs.

Want to learn more about this exciting opportunity to be at the forefront of technological innovation while building your new civilian career? Contact Denise Horsey, C3 Veteran Navigator, at dhorsey@co.pg.md.us or call 301-618-8407.

Following the Network Event Trail: Defeating Cyber Attacks Through Analytics - Capitol Technology University (Since 1927 Located Near Washington D.C.)

Direct Link: https://www.captechu.edu/blog/cyber-analytics-tools-to-predict-data-breaches

With cyberattacks increasing in volume and sophistication, interest in the use of cyber analytics tools in order to predict future breaches and attacks is on the rise.

That includes analyzing the clues left by prior attacks – the network event trail – for patterns that can help in identifying potential attempts at a breach.

“Every breach creates anomalies in the network, like a thief leaving DNA evidence at the scene of a crime,” says Dr. William Butler, chair of Capitol Technology University’s cybersecurity program. “A skilled analyst can use this information to identify patterns of attack. Algorithms can then be developed that look for these patterns and red flag them to cybersecurity teams.”

Being able to accurately flag anomalies is important, in part, because of the sheer volume of network data coming in. Cybersecurity professionals have access to petabytes worth of information – log files, packet inspection systems, records of websites accessed – but often lack a reliable way to distinguish the signal from the noise.

As a result, the fight against hackers is turning into an uphill battle, the SANS Institute reported in a recent paper.

 “Attackers are taking advantage of the fact that organizations are not finding the indicators of compromise within their environments soon enough, nor are they responding to these incidents and removing them quickly enough,” the paper’s author, Dave Shackleford, noted.

According to the Ponemon 2017 Cost of a Data Breach Study, U.S. companies took an average of 206 days to detect a data breach. Mandiant’s M-Trends 2017 report noted that 53% of breaches were discovered by an external source and not the company’s staff.

The good news: cyber analytics holds out the promise of fine-tuning the search and more precisely identifying the likely vectors of attack – thus enabling cybersecurity teams to make surer decisions about their organizations’ cybersecurity postures.

“We’re seeing heightened interest in analytical techniques as the cybersecurity profession seeks to keep a step ahead of adversaries,” Butler said.

The increased interest, in part, reflects a realization that breaches cannot be prevented entirely – given the number of adversaries, attack surfaces, and potential vulnerabilities, sooner or later an adversary will get through.
Dr. Chantre', Assistant Professor of Cybersecurity and Cyber Analytics"It is important to remember that cybersecurity is not necessarily about, having tools that keep us from getting attacked. In a perfect world that is what we want, but it's not likely,” said Dr. Mary Margaret ChantrĂ©, assistant professor in the cyber security and cyber analytics programs.

“Cybersecurity is about the ability to be resilient to attacks and recovery quickly. A cyber analyst looks at mistakes made in the past and tries to avoid them in the present so he/she can predict possible future attacks. This type of situational awareness helps minimize risk," ChantrĂ© said.

In examining threats, cyber analysts not only use traditional methods of statistical analysis – identifying a normal distribution pattern and then recording signification deviation – but also machine learning and algorithmic-based techniques, such as clustering and density estimation.

“It’s a very exciting time to be doing analytics,” Butler said, “both because of the advances in methodology and also the availability of software that can handle data at quantities far beyond the capabilities of an individual human.”

With the rising interest in analytics comes a need for training and education – and Capitol Technology University is meeting the need with undergraduate and graduate programs. The university is one of the first worldwide to launch a cyber analytics degree. In addition to a bachelor of science in cyber analytics, Capitol also offers an online master’s in the field.

Capitol has long been a leader in cybersecurity education, earning three successive Center for Excellence designations from the Department of Homeland Security and the National Security Agency.

“With more and more cyber analysts working side by side with cybersecurity professionals, the two fields are a natural fit.”