Presentation on theme: "LOST DATA RESULTS IN LOST. ….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and."— Presentation transcript:
LOST DATA RESULTS IN LOST
….the resources of the Office of Research support a vigorous effort to increase our relevance in the world of discovery and innovation. UNMs Research Mission – Untapped Potential (May 16, 2012) In this new vision of economic development, business leaders must work with government and with the university to find new solutions. The new world is one of public/private partnerships, and in that world, the most successful outcomes will include UNM. One unique resource we have here in New Mexico is our access to National Laboratories, Los Alamos, Sandia and the Air Force Research Lab. Down I-25, we have the White Sands Test Facility and White Sands Missile Range. These facilities offer us significant opportunities for scientific partnerships. Their proximity also distinguishes us from other research universities. The Installation Address of Robert G. Frank, 21st President of the University of New Mexico (November 18, 2012)
FSO RESPONSIBILITIES Classified Contracts Security Clearances Information Protection (Intellectual Property, Trade Secrets, Classified, Export Controlled) They dont only want classified. Unclassified information helps them fill in pieces to the puzzle Counterintelligence Briefings Travel Briefings Visit Requests Security Training Ensure your personal information stays personal
UNIVERSITIES ARE A TOP TARGET TO STEAL U.S. TECHNOLOGY Technology Semiconductors Lasers, Sensors, & Optics Robotics UAVs (Unmanned Aerial Vehicles) Information Systems Navigation Systems Aeronautics Marine and Space Systems Cryptography Areas of Concern Electrical and Computer Engineering Chemical and Nuclear Engineering Manufacturing Engineering Computer Science Physics and Astronomy Biology Earth and Planetary Sciences Mathematics
Your Ideas = Your Future Losing your research not only has national security implications, but ruins your potential to patent and publish.
ONLINE THEFT OF INTELLECTUAL PROPERTY The greatest transfer of wealth in history is happening and it's happening quietly right now" Cyber Command Chief General Keith Alexder
250,000 Twitter Accounts Hacked CNN reports that the Twitter attack follows major security breaches at the New York Times and the Wall Street Journal. Both of those attacks were attributed to Chinese hackers. compromised-usa-university-computers-attack-us
Cyber Warfare Defense Secretary Leon Panetta and other senior DoD officials have called cyber-attacks one of the greatest threats to Americas national security, and an area in which the U.S. military is the farthest behind. It is becoming increasingly clear that countries like China and Russia have no misgivings about using cyber warfare as a highly effective and inexpensive means to obtain information and improve their national superiority. Most people in the U.S. are oblivious to the threat of cyber-attacks and therefore create opportunities for cyber spying and hacking, using weak passwords to protect confidential information and opening documents without knowing the sender. CYBER CRIME COST CONSUMERS $110 BILLION LAST YEAR! 6 BILLION scams sent out monthly! Remember: YOU HAVE TO DO SOMETHING TO BE ATTACKED
INDUSTRIAL VS FOREIGN SPIES
ARE THESE MORE IMPORTANT…
THAN THESE? KEEP AMERICAS SECRETS
International Travel Concerns If at all possible dont take laptops and smartphones Only take data that is necessary for your trip If you plug thumb drive into another computer overseas, throw it away Do not install software updates requested by any public Wi-Fi or your hotel internet If laptop is stolen report it to local Police and UNM Ensure IT Dept. examines laptop before plugging back into university network Beware of thumb drives Reasonable suspicion is not needed for customs officials to search a laptop computer or other personal electronic storage devices at the border.
SECURITY TIP OF THE DAY Virus can infect the computer you are using Hacker can obtain every document stored on the computer/network - Research - Personal information -
OTHER TRAINING OFFERED Cyber Security – Phishing: How Not To Become a Victim of Fraud Social Networking Security Laptop and Cell phone Security International Travel Security Workplace Violence
CONTACT: DEB KUIDIS MANAGER OF INDUSTRIAL SECURITY /FSO 1717 ROMA, RM