* 1. What is your major/minor?

* 2. When do you expect to graduate from UMD?

* 3. Have you been previously affiliated with the National Consortium for the Study of Terrorism and Responses to Terrorism (START)? If so, how?

* 4. Have you been previously affiliated with the Maryland Cybersecurity Center (MC2)? If so, how?

* 5. How interested would you be in an undergraduate minor in Human Behavior and Cybersecurity?

Program description: The Undergraduate Minor in Human Behavior and Cybersecurity is a cross-disciplinary program housed in the College of Behavioral and Social Sciences Terrorism Studies Program (BSST). Students in the program will explore the origins and motivations of digital criminals/digital terrorists based on theoretical understandings of individual and group behavior and on available empirical data. Students will also explore the impacts of cyber attacks and the threat of cyber attacks on a wide range of communities, as well as strategies for cyber attack preparedness and mitigation. The minor will educate the next generation of digital analysts, including students who plan to pursue graduate study related to cybersecurity and digital criminology/digital terrorism as well as employment in fields of cybersecurity and homeland security within federal, state, local, non-profit, and/or corporate sectors.

* 6. How interested would you be in a course on Human Actors and Cyber Attacks?

Course description: This course will explore the human actors behind cybercrime, cyberterrorism, and hacktivism. Drawing from scholarship in criminology, psychology, law, public policy, and political science, the course explores the nature of these activities and the motivations driving individuals and groups who engage in them. The course will explore cyber cultures and deviant cyber behavior through the lens of historical and contemporary attacks, exploring such attack goals and impacts as: financial gain; information-sharing/exposure; recruitment and capacity-building; political protest; and physical destruction. The course will end by looking at local, regional, national, and international responses to cyber attacks.

* 7. How interested would you be in a course on Information Security? (Please note: this course does not require any prerequisite knowledge.)

Course description: The materials presented are divided into three major components: overview, detailed concepts and implementation techniques. The topics to be covered are: general security concerns and concepts from both a technical and management point of view, principles of security, architectures, access control and multi-level security, trojan horses, covert channels, trap doors, hardware security mechanisms, security models, security kernels, formal specifications and verification, networks and distribution systems and risk analysis. Please note that there are no prerequisites for this course.

* 8. How interested would you be in a course on Digital Threats, Intelligence, and Policy?

Course description: This course provides students with an opportunity to conduct intelligence- and policy-related research relating to digital crime and terrorism, and to present their findings in multiple forms. Students will work in a role-playing capacity, taking on an assigned group role for the entirety of the semester from among the following options: Department of Homeland Security, Department of Defense, Federal Bureau of Investigation, Central Intelligence Agency, and (global intelligence firm) Stratfor. Students will work in their groups to produce 3 intelligence briefings on threats relevant to their respective organizations and from, respectively: North/South American actors; European actors; and Asian actors. They will then develop group policy memos based on each intelligence briefing, in which they request funds to develop a new cyber defense project appropriate to their organizations. Finally, students will present their policy memos as oral policy briefings. The course will allow students to cover simple-unstructured attacks (the capability to conduct basic attacks against individual systems); advanced-structured attacks (the capability to conduct more sophisticated attacks against multiple systems or networks); and complex-coordinated attacks (the capability for coordinated attacks able to cause mass disruption). Students will have the opportunity to research, write on, and present such incidents and programs as the following: the Electronic Disturbance Theater’s Web sit-ins in support of Mexico’s Zapatista movement; ethnic Tamil guerrillas’ overwhelming of the Sri Lankan embassies with email; unknown actors’ efforts to block the Estonian government’s websites; unknown actors’ denial-of-service attacks against NATO systems during the Kosovo conflict; the group Anonymous’s cyberattacks on Mastercard, Paypal and other sites in support of arrested Wikileaks founder Julian Assange; the United States’s first cyberwar game, “Eligible Receiver,” which simulated North Korean hackers; the Department of Homeland Security’s establishment of the National CyberSecurity Division; the Department of Defense’s acknowledgment of cyber threats as a new “domain of war;” and Estonia’s creation of the “Cyber Defense League,” a group of volunteer scientists that operate under military command during wartime.

* 9. May we contact you to participate in a focus group on this subject? If so, please enter your email address.

* 10. If you are interested in registering to win the FREE swag package, please enter your email address.

T