Hal Berghel, PhD
Howard R. Hughes College of Engineering
University of Nevada, Las Vegas
4505 Maryland Parkway
Las Vegas, NV 89154-4019
DVP term expires December 2016
Hal Berghel is currently Professor of Computer Science at the University of Nevada, Las Vegas where he has previously served as Director of both the Schools of Computer Science and Informatics, and as Associate Dean of the College of Engineering. He created and directed the first CyberSecurity degree programs (Bachelors, Masters and PhD) in Nevada in 2005. This program became an NSA Center for Academic Excellence two years later. He was the founding Director of the Identity Theft and Financial Fraud Research and Operations Center and CyberSecurity Research Center. His research interests are wide-ranging within the binary and digital ecosystem, ranging from logic programming and expert systems, relational database design, algorithms for non-resolution based inferencing, approximate string matching, digital watermarking and steganography, and digital security and privacy. Since the mid-1990's he has applied his work in digital security to law enforcement and intelligence gathering, particularly with respect to digital crime, digital money laundering, information warfare and trusted identities. His research has been supported by both industry and government for over thirty years. His most recent work in secure credentialling technology was funded by the Department of Justice. In addition to his academic positions, Berghel is also a popular columnist, author, frequent, talk show guest, inventor, and keynote speaker. For nearly fifteen years he wrote the popular Digital Village column for the Communications of the ACM, and has written the Out-of-Band column for IEEE Computer since 2011.
Berghel is a Fellow of both the Institute for Electrical and Electronics Engineers and the Association for Computing Machinery, and serves both societies as a Distinguished Visitor and Distinguished Lecturer, respectively. He has received the ACM Outstanding Lecturer of the Year Award four times and was recognized for Lifetime Achievement in 2004. He has also received both the ACM Outstanding Contribution and Distinguished Service awards. He is also the founder and owner of Berghel.Net, a consultancy serving government, business and industry. Berghel is a member of the Nevada Technology Crimes Advisory Board and Chairs the Nevada Privacy Subcommittee.
The Digital Assault on Privacy
George Orwell and Aldous Huxley are frequently mentioned in the context of the recent spate of surveillance leaks from the NSA. While both Orwell and Huxley feared big government and big controls, they feared it for different reasons. This difference will set the tone for this talk.
We will begin with the history of the U.S. involvement in surveillance, from the early analog days to the latest digital technologies. We'll explain the motivations, technologies and civil libertarian consequences of some noteworthy surveillance programs like Echelon, Carnivore, Narusinsight, Magic Lantern, ThinThread, Trailblazer, Stellar Wind/Ragtime, and TAO (Tailored Access Operations) to name but a few. The speaker will also cover corporate surveillance by high tech companies and cyber intelligence mercenaries. The speaker will conclude with speculation on future directions for government and private surveillance programs the privacy implications that will arise therefrom. (50 slides; 45-50 minutes plus Q&A: categories: digital security and privacy, privacy legislation, privacy safeguards, personally identifiable information,)
The Modern Surveillance State
This talk will provide a partial answer to the question "How did we get to the modern surveillance state?" We'll show that this was the confluence of a variety of ideological, political, technological, and corporate interests, dating back to the turn of the last century. Critical events included the rapid evolution of the military-industrial complex, the race toward privatization of government intelligence services that gave rise to the corporate "pure plays" that feed almost entirely from the federal trough, an iron triangle that ensures that the alliances between for-profit corporations and the government agencies they serve remain tightly coupled, and a reactive, over-zealous Executive Branch that's too willing to eschew civil liberties to achieve a false sense of security. This talk will argue that the modern surveillance state actually makes us less secure than we could be with constitutionally-compatible, more cost-effective programs digital programs that are technologically within our grasp. Note: expansion of speaker's two columns in the February, 2014 LINK and June, 2014 LINK issues of IEEE Computer. (50 slides; 45-50 minutes plus Q&A: categories: digital security and privacy, digital surveillance, intelligence services)
Technology and Survivable Journalism
To paraphrase media theorist Neil Postman, George Orwell feared the end of a free press while Aldous Huxley feared that there would be no one who would want to read. This characterizes one dimension of the Orwell/Huxley dystopia predicted by 1984 and Brave New World. In this talk, I'll attempt to place one dimension of this dystopia in a technological framework.
The received view of modern journalism goes something like this: recent technology advances are rendering traditional print media-based journalism impotent and as a consequence future jobs in journalism will require increased technical and IT skills. On this account, computing technology will come to the rescue of journalism as it becomes net-centric. Far from helping journalism out of the hole, I'll show that unless we change the course that we're heading, technology may actually make the hole deeper.
Journalism since Watergate has become more dramaturgic, orchestrated, undifferentiated, and uninspired. Independent newspaper publishers and media outlets are harder to find these days. And as time has shown, investigative journalism is not the ideal manservant to global corporate interests. Investigative journalism is losing out to agenda-based and stakeholder-friendly reporting. That worries me - but not nearly as much as the threat to the journalists, themselves. To illustrate, consider that the only individual to go to jail over the recent outing of CIA operative Valerie Plame was a NY Times reporter who covered the story - for failing to disclose her sources!
In this talk I'll outline ways in which computing technology may be used by and for journalists to protect themselves from persecution and prosecution in journalistically hostile environments. note: related to the speaker's column of the same name in the May, 2013 issue of IEEE Computer LINK
The Future of Digital Money Laundering
This talk investigates several types of digital money laundering, characterised by source (failed states, state-aware, keptocratic states, terrorists, extremists, and individuals), means (credit- and debit-card exploits, international funds transfers, klepto-banks, "gift-card" exploits), and purpose (terrorism, narco-trafficking, electronic crime, internet fraud). These catagories are introduced by their identifying events-of-interest. Iimplications on shadow economies, degrees of sophistication, and case studies are discussed. Each crime will be explicitly linked geographically and politically to sources, and may include discussion of actual cases. Several micro- and macro-level mitigation strategies will be discussed. (100 slides; 45-50 minutes plus Q&A. categories: money laundering, digital crime, digital fraud, narco-trafficking, terrorism, internet fraud. Note: based on speaker's column of the same name in the August, 2014 IEEE Computer LINK. No part of this presentation may be recorded!)
Crime.Com: post-modern criminal behavior
This talk begins with an overview of the role of crime in general, and digital crime in particular, in the shadow economies of the world. It illustrates this via a sequence of specific criminal activities that have been studied by the author.This talk will explain the latest digital crime scene in terms of sources, modus operandi, and the digital techniques involved. Examples will be drawn from actual case files and published media reports, and the techniques will be explained and in some cases actually demonstrated. Exploits include: bank card skimming, ATM hacking, digital gas pump hijacking, phishing scams, bank card brokering and internet dumpsites, hotel room invasions, physical counterfeiting, digital counterfeiting and some brute-force techniques as well. If your organization is interested in the latest digital exploits of the denizens of digital darkness, this talk is for you. (100 slides; 45-50 minutes plus Q&A. categories: digital crime, electronic crime, shadow economies, computer crime, hacking, bank fraud, Internet fraud. No part of this presentation may be recorded!)
note: Speaker will bring media to the venue on a USB memory stick and will require digital projection connected to a current Windows computer with Microsoft Office).