You can't make this stuff up.
Really makes one wonder if Rod Beckstrom "quit" as the head of Cyber Security, or was pressured to get out--because they needed to bring in the University itself [and supplant the NSA even] that directly researched Ptech (in the very words of the original Pre-911 Ptech former Chief Scientist, Dr. Hussein Ibrahim). America is going to get false flagged to death. What a coincidence that GMU also has a 30 page document regarding Avian Flu along with being a major player in "Critical Infrastructure Protection." Hey, if you work for the government and you're reading this, you better seriously wake the f**k up.http://www.csialliance.org/news/events/CSIA_GMU_Symposium.html
Cyber Security and the Law: Addressing Compliance, Complexity, and Confusion The Cyber Security Industry Alliance and The Critical Infrastructure Protection Program at George Mason University
School of Law present a three-part symposium on the emerging landscape of cyber security legislation and compliance. The frequency and complexity of legislation surrounding cyber security has exploded in the past two years.
As our lives and commerce become increasingly dependent on IT systems, the interaction of existing laws and proposed legislation becomes more and more complex. This symposium series explores the complex emerging framework of multi-level legal and technology compliance requirements.
SAVE THE DATES:
March 22 (State Level)
April 26 (Federal Level)
May 26 (International Level)
Space is limited
RSVP now to Amy Cobb, 703-993-8193 or firstname.lastname@example.org
The symposium series will be held at 6:15 pm on March 22; the April 26 session will be held at Holland & Knight LLP's offices at 2099 Pennsylvania, conveniently located near the Foggy Bottom Metro Stop (Orange & Blue Line); the final session of this three-part series will be held May 26 near Capitol Hill. A keynote speaker or panel will focus on a specific legislative and compliance arena each evening, with a wine and cheese discussion and reception to follow.
State-Level Cyber Security Compliance
Tuesday, March 22 (GMU Law School Main Atrium)
California's passage of Senate Bill 1386 places the burden on businesses, no matter where they are based or where they process information, to take "adequate measures" to protect the personal information of California residents. The national impact of this requirement could be profound. Similarly, a recent scan of a legislative tracking service showed that over twenty five state legislatures have proposed legislation that touches upon "spyware," each with potentially different definitions and exceptions. This session will hone in on state-level developments that may develop in conflict with other states and that may impact clients in various ways across state lines.
Invited speakers include…
David Albo and David Oblon of Albo & Oblon LLP. David Albo proposed Virginia's anti-spam law; David Oblon defended one of the first cases prosecuted under the law. Hear the two partners provide perspective on both sides of the issue, as well as the outline of other emerging state-level compliance issues from across the nation.
Federal-Level Cyber Security Compliance
Tuesday, April 26 (Holland & Knight LLP - 2099 Pennsylvania Ave, N.W.)
Sarbanes Oxley, HIPAA, and the Telecommunications Act of 1996 were all originally passed to deal with non-cyber security issues - yet each affects how data is transmitted, processed and compiled. The development of case law interpreting these statutes is also likely to determine how broadly federal law impacts cyber security. This session explores the federal landscape and the potential trajectory of judicial interpretation.
* Michael Sozan, office of Senator Bill Nelson (D-FL)
* Frank Cavaliere, office of Senator George Allen (R-VA)
* Rod Nydam, GMU
* Jessica Herrera, Minority House Homeland Committee
* Steve Devine, Majority House Homeland CommitteeInternational-Level Cyber Security Compliance
Thursday, May 26 (Capital Hill or Holland & Knight)
If state and federal law appear inconsistent, federal and international law are even more so. Tonight's session will set forth the existing pieces of the international cyber security puzzle, identifying places where diplomacy and concerted effort may be able to harmonize legal issues across borders.
Invited speakers include…
Jody Westby, Chair of the ABA's International Cybercrime Project
Space is limited RSVP now to Amy Cobb, 703-... or email@example.com
CLE credit may be available
Mr. Ibrahim Hussein
Vice President and Chief Scientist
BACKGROUNDMr. Hussein Ibrahim is the Vice President and Chief Scientist at Ptech Inc.
He has been with Ptech since its inception in 1994. Dr. Ibrahim has more than 20 years of experience in enterprise architecture and business consulting. He oversees the innovation and creation of new domain specific add-on solutions. In this capacity, he acts as lead consultant, advising customers in the modeling of technology and human capabilities aspects of an integrated eBusiness architecture. ... Dr. Ibrahim taught computer science at Columbia University, where he also led a research team in a computer vision research project funded by the United States Department of Defense. Dr. Ibrahim completed his undergraduate work in Computer Engineering at Ain-Shams University, and received his Master's and Doctorate degrees in Computer Science from Columbia University. Dr. Ibrahim has had many articles on computer science published in leading professional magazines.
________________________________________________________________________http://www.carl-nelson.com/government2002.htm"A Boston SBIR firm was raided by the anti-terror police. Ptech had one Phase 1 SBIR from USAF for Advanced C2 Process Modeling and Requirements Analysis Technology.
An anonymous USG official said, We're investigating whether a businessman on the list of alleged or potential terrorist financiers is a part-owner of the firm, The question is whether there is a potential for U.S. government computer systems being compromised For example, does the software company have the ability to access computer systems using knowledge of the software? "
Mirza | GMU C4ISR Ptech-Future Combat Systems (FCS) GENOCIDE | Police Statehttp://forum.prisonplanet.com/index.php?topic=91752.msg531682#msg531682
Vaccine Prioritization During an Influenza Pandemichttp://cipp.gmu.edu/archive/PandemicMonograph_1007.pdf
160 Federal Street
Boston, MA 02110
Topic#: (800) 747-5608Hussein Ibrahim
Title: Advanced C2 Process Modeling
and Requirements Analysis Technology
Abstract: This effort will demonstrate the ability to develop an innovative C2 investment decision support system. The objective system springs from a completely original conceptualization of the problem. It will support "product and process modeling of integrated operational and system architectures" and will produce results that can be used within the Air Force spiral development process, C2 management philosophy, and PPBS. This system will improve access to mathematically rigorous, token-based architecture by orders of magnitude. Ptech and George Mason University's System Architectures Laboratory
will integrate object oriented C2 architecture modeling and a Discrete Event System model to construct a software system that can: - Synthesize Colored Petri Nets from a set of object oriented products. We will develop and employ a file-based interface between Ptech's FrameWork modeling environment and Design/CPN.- Verify the logical soundness and behaviors of architectures by executing the models and using token-based, state space and behavioral analysis techniques against an agreed set of measures. -Report results in a variety of agreed graphical and textual formats. This Phase I effort includes early proof-of-concept demonstrations to enable the Team to gain favorable position for development funding or approval for FAST TRACK funding.