Calvert Bowen Iii

 CalvertL. Bowen Iii

Calvert L. Bowen Iii

  • Courses1
  • Reviews3

Biography

University of Maryland Baltimore County - Computer Science

Army Communications and Networks Program Manager
Information Technology & Services
Calvert (Triiip)
Bowen
Laurel, Maryland
Program Manager, Systems Engineer and Technical Advisor with expertise in the implementation of emerging technologies supporting cyber operations, information sharing, and situational awareness across the Federal Government.

Retired Army veteran with 26 years of military experience in cyber, information systems, operational, and leadership positions at various levels of the Army and Joint organizations.

Specialties: Project Management, Interagency Coordination, Situational Awareness, Information Sharing, Strategic and Operational Planning, Cyber and Network Security with Chief Information Security Officer Certification, Training Assessment and Exercise Development


Experience

  • Bowen Leadership Group

    President and CEO

    The Bowen Leadership Group seeks to recognize a select number of high school students in the Howard County, Maryland area who show promise as one of Tomorrow's leaders in the community.

    Established in July, 2014, the Bowen Leadership Group awards three $500 scholarships each spring. Recipients are selected by a Scholarship Committee chaired by 50-year Administrator/Teacher (and Bowen Leadership Group Chief Operating Officer), Rosalie Bowen.

  • University of Maryland Baltimore County

    Adjunct Professor

    Adjunct Professor teaching CMSC 304 - Social and Ethical Issues in Information Technology within the Computer Science and Electrical Engineering Department at UMBC.

    CMSC 304 is a survey course that reviews social issues and the ethical impact of information technology throughout the world. The course examines the policy issues that relate to the use of information technology, such as persona, privacy, rights of access, security, transborder information flow and confidentiality.

  • The Johns Hopkins University Applied Physics Laboratory

    Technical Advisor

    Technical Advisor to the Commander, US Army Cyber Command with a focus on the implementation of cloud technologies in support of full spectrum cyber operations.

  • The Johns Hopkins University Applied Physics Laboratory

    Army Communications and Networks Program Manager

    Calvert worked at The Johns Hopkins University Applied Physics Laboratory as a Army Communications and Networks Program Manager

  • Howard County Public School System

    Cybersecurity Advisory Board Member

    Volunteer Member for the Howard County Public Schools Cybersecurity Advisory Board. The Advisory Board works closely with Howard County teachers, counselors, and administration to encourage middle school and high school students to participate in the Cybersecurity Academy - Networking(http://www2.hcpss.org/cte/cte_interactive/computernetworking/computernetworking.html) and PC Systems (http://www2.hcpss.org/cte/cte_interactive/pcsystems/pcsystems.html) curricula offered at the Applications and Research Laboratory (www.arl.hcpss.org).

  • United States Cyber Command

    Project Manager/Executive and Operational Planner

    Executed special projects as assigned by the CYBERCOM Director of Operations (J3) focused on situational awareness (SA), common operational picture (COP), command and control (C2), and integrated indications and warnings (I&W) systems.

  • The First Tee

    Level 1 certified coach for the First Tee of Howard County at Fairway Hills Golf Club in Columbia, Maryland. Use the game of golf to explore and model the First Tee's core values and healthy habits for youth between the ages of 5 and 13. I have served as an Assistant Coach for the Target (5-6 year olds), PLAYer (7 and up), PAR (9 and up), and BIRDIE (11 and up), and as the Lead Coach for PLAYer courses. Level 1 certification was achieved in October 2015.

Education

  • Virginia Tech

    Computer Engineering
    Research in location privacy and context-aware solutions and applications as well as cyber security and SCADA systems. Multiple peer-reviewed publications and co-author of a textbook chapter on location-based systems (LBS).

  • George Mason University

    MS

    Computer Based Systems Engineering

  • University of Hawaii at Manoa

    MBA

    Business Administration and Management, General

Publications

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • A Survey of Location Privacy and an Approach for Solitary Users

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS '07)

    Location-based systems (LBS) continue to grow in popularity as applications are developed to use an estimate of a user's location. Location estimates can be created using a variety of information including true location sources and network information. Regardless of the source or type of location information, aggregating all available information may produce a more accurate estimate of a user's location. A user cannot manage the use of location and network information once it has been sent to the LBS, and must assume that an observer has access to this information and can use it to estimate the user's location. Anyone with access to this information can use the same algorithm to estimate the user's location. This creates an issue of location privacy that must be addressed. This survey frames the problem of location privacy through related work and presents an alternate approach to preserving a user's privacy for consideration

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • A Survey of Location Privacy and an Approach for Solitary Users

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS '07)

    Location-based systems (LBS) continue to grow in popularity as applications are developed to use an estimate of a user's location. Location estimates can be created using a variety of information including true location sources and network information. Regardless of the source or type of location information, aggregating all available information may produce a more accurate estimate of a user's location. A user cannot manage the use of location and network information once it has been sent to the LBS, and must assume that an observer has access to this information and can use it to estimate the user's location. Anyone with access to this information can use the same algorithm to estimate the user's location. This creates an issue of location privacy that must be addressed. This survey frames the problem of location privacy through related work and presents an alternate approach to preserving a user's privacy for consideration

  • Operational Data Classes for Establishing Situational Awareness in Cyberspace

    The 6th International Conference on Cyber Conflict

    The United States, including the Department of Defense, relies heavily on information systems and networking technologies to efficiently conduct a wide variety of missions across the globe. With the ever-increasing rate of cyber attacks, this dependency places the nation at risk of a loss of confidentiality, integrity, and availability of its critical information resources; degrading its ability to complete the mission. In this paper, we introduce the operational data classes for establishing situational awareness in cyberspace. A system effectively using our key information components will be able to provide the nation’s leadership timely and accurate information to gain an understanding of the operational cyber environment to enable strategic, operational, and tactical decision-making. In doing so, we present, define and provide examples of our key classes of operational data for cyber situational awareness and present a hypothetical case study demonstrating how they must be consolidated to provide a clear and relevant picture to a commander. In addition, current organizational and technical challenges are discussed, and areas for future research are addressed.

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • A Survey of Location Privacy and an Approach for Solitary Users

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS '07)

    Location-based systems (LBS) continue to grow in popularity as applications are developed to use an estimate of a user's location. Location estimates can be created using a variety of information including true location sources and network information. Regardless of the source or type of location information, aggregating all available information may produce a more accurate estimate of a user's location. A user cannot manage the use of location and network information once it has been sent to the LBS, and must assume that an observer has access to this information and can use it to estimate the user's location. Anyone with access to this information can use the same algorithm to estimate the user's location. This creates an issue of location privacy that must be addressed. This survey frames the problem of location privacy through related work and presents an alternate approach to preserving a user's privacy for consideration

  • Operational Data Classes for Establishing Situational Awareness in Cyberspace

    The 6th International Conference on Cyber Conflict

    The United States, including the Department of Defense, relies heavily on information systems and networking technologies to efficiently conduct a wide variety of missions across the globe. With the ever-increasing rate of cyber attacks, this dependency places the nation at risk of a loss of confidentiality, integrity, and availability of its critical information resources; degrading its ability to complete the mission. In this paper, we introduce the operational data classes for establishing situational awareness in cyberspace. A system effectively using our key information components will be able to provide the nation’s leadership timely and accurate information to gain an understanding of the operational cyber environment to enable strategic, operational, and tactical decision-making. In doing so, we present, define and provide examples of our key classes of operational data for cyber situational awareness and present a hypothetical case study demonstrating how they must be consolidated to provide a clear and relevant picture to a commander. In addition, current organizational and technical challenges are discussed, and areas for future research are addressed.

  • Next Generation SCADA Security: Best Practices and Client Puzzles

    Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (IAW '05)

    Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • A Survey of Location Privacy and an Approach for Solitary Users

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS '07)

    Location-based systems (LBS) continue to grow in popularity as applications are developed to use an estimate of a user's location. Location estimates can be created using a variety of information including true location sources and network information. Regardless of the source or type of location information, aggregating all available information may produce a more accurate estimate of a user's location. A user cannot manage the use of location and network information once it has been sent to the LBS, and must assume that an observer has access to this information and can use it to estimate the user's location. Anyone with access to this information can use the same algorithm to estimate the user's location. This creates an issue of location privacy that must be addressed. This survey frames the problem of location privacy through related work and presents an alternate approach to preserving a user's privacy for consideration

  • Operational Data Classes for Establishing Situational Awareness in Cyberspace

    The 6th International Conference on Cyber Conflict

    The United States, including the Department of Defense, relies heavily on information systems and networking technologies to efficiently conduct a wide variety of missions across the globe. With the ever-increasing rate of cyber attacks, this dependency places the nation at risk of a loss of confidentiality, integrity, and availability of its critical information resources; degrading its ability to complete the mission. In this paper, we introduce the operational data classes for establishing situational awareness in cyberspace. A system effectively using our key information components will be able to provide the nation’s leadership timely and accurate information to gain an understanding of the operational cyber environment to enable strategic, operational, and tactical decision-making. In doing so, we present, define and provide examples of our key classes of operational data for cyber situational awareness and present a hypothetical case study demonstrating how they must be consolidated to provide a clear and relevant picture to a commander. In addition, current organizational and technical challenges are discussed, and areas for future research are addressed.

  • Next Generation SCADA Security: Best Practices and Client Puzzles

    Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (IAW '05)

    Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.

  • Protecting Privacy in Location-Based Applications (Chapter 9 in Location-Based Services Handbook)

    CRC Press

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • A Survey of Location Privacy and an Approach for Solitary Users

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS '07)

    Location-based systems (LBS) continue to grow in popularity as applications are developed to use an estimate of a user's location. Location estimates can be created using a variety of information including true location sources and network information. Regardless of the source or type of location information, aggregating all available information may produce a more accurate estimate of a user's location. A user cannot manage the use of location and network information once it has been sent to the LBS, and must assume that an observer has access to this information and can use it to estimate the user's location. Anyone with access to this information can use the same algorithm to estimate the user's location. This creates an issue of location privacy that must be addressed. This survey frames the problem of location privacy through related work and presents an alternate approach to preserving a user's privacy for consideration

  • Operational Data Classes for Establishing Situational Awareness in Cyberspace

    The 6th International Conference on Cyber Conflict

    The United States, including the Department of Defense, relies heavily on information systems and networking technologies to efficiently conduct a wide variety of missions across the globe. With the ever-increasing rate of cyber attacks, this dependency places the nation at risk of a loss of confidentiality, integrity, and availability of its critical information resources; degrading its ability to complete the mission. In this paper, we introduce the operational data classes for establishing situational awareness in cyberspace. A system effectively using our key information components will be able to provide the nation’s leadership timely and accurate information to gain an understanding of the operational cyber environment to enable strategic, operational, and tactical decision-making. In doing so, we present, define and provide examples of our key classes of operational data for cyber situational awareness and present a hypothetical case study demonstrating how they must be consolidated to provide a clear and relevant picture to a commander. In addition, current organizational and technical challenges are discussed, and areas for future research are addressed.

  • Next Generation SCADA Security: Best Practices and Client Puzzles

    Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (IAW '05)

    Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.

  • Protecting Privacy in Location-Based Applications (Chapter 9 in Location-Based Services Handbook)

    CRC Press

  • Location Privacy for Users of Wireless Devices Through Cloaking

    Proceedings of the 41st Hawaii International Conference of System Sciences (HICSS 41)

    The continued growth in online services that provide users with content based on location presents a unique privacy concern for the user. Since the user cannot control the use of the data included in his network transactions once they leave the device, nor can he control the response from the location-based system (LBS), he must assume that information is available to an unknown observer who could use the information to estimate the user's location. This paper presents a cloaking system that preserves a user's location privacy by submitting multiple requests from disparate false locations to the LBS in rapid succession in order to confuse the observer and meet the user's pre-determined location privacy threshold.

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • A Survey of Location Privacy and an Approach for Solitary Users

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS '07)

    Location-based systems (LBS) continue to grow in popularity as applications are developed to use an estimate of a user's location. Location estimates can be created using a variety of information including true location sources and network information. Regardless of the source or type of location information, aggregating all available information may produce a more accurate estimate of a user's location. A user cannot manage the use of location and network information once it has been sent to the LBS, and must assume that an observer has access to this information and can use it to estimate the user's location. Anyone with access to this information can use the same algorithm to estimate the user's location. This creates an issue of location privacy that must be addressed. This survey frames the problem of location privacy through related work and presents an alternate approach to preserving a user's privacy for consideration

  • Operational Data Classes for Establishing Situational Awareness in Cyberspace

    The 6th International Conference on Cyber Conflict

    The United States, including the Department of Defense, relies heavily on information systems and networking technologies to efficiently conduct a wide variety of missions across the globe. With the ever-increasing rate of cyber attacks, this dependency places the nation at risk of a loss of confidentiality, integrity, and availability of its critical information resources; degrading its ability to complete the mission. In this paper, we introduce the operational data classes for establishing situational awareness in cyberspace. A system effectively using our key information components will be able to provide the nation’s leadership timely and accurate information to gain an understanding of the operational cyber environment to enable strategic, operational, and tactical decision-making. In doing so, we present, define and provide examples of our key classes of operational data for cyber situational awareness and present a hypothetical case study demonstrating how they must be consolidated to provide a clear and relevant picture to a commander. In addition, current organizational and technical challenges are discussed, and areas for future research are addressed.

  • Next Generation SCADA Security: Best Practices and Client Puzzles

    Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (IAW '05)

    Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.

  • Protecting Privacy in Location-Based Applications (Chapter 9 in Location-Based Services Handbook)

    CRC Press

  • Location Privacy for Users of Wireless Devices Through Cloaking

    Proceedings of the 41st Hawaii International Conference of System Sciences (HICSS 41)

    The continued growth in online services that provide users with content based on location presents a unique privacy concern for the user. Since the user cannot control the use of the data included in his network transactions once they leave the device, nor can he control the response from the location-based system (LBS), he must assume that information is available to an unknown observer who could use the information to estimate the user's location. This paper presents a cloaking system that preserves a user's location privacy by submitting multiple requests from disparate false locations to the LBS in rapid succession in order to confuse the observer and meet the user's pre-determined location privacy threshold.

  • Using Wireless Networks to Assist Navigation for Individuals with Disabilities

    Proceedings of the California State University, Northridge Center on Disabilities' 21st Annual International Technology and Persons with Disabilities Conference

    Using wireless networks to assist navigation by determining a user’s location and alerting the user of his proximity to accessible building entrances and facilities.

  • Preserving User Location Privacy Based on Web Queries and LBS Responses

    Proceedings of the IEEE SMC Information Assurance and Security Workshop (IAW '07)

    There is continued growth in online services that provide users with content based on location. These location based services (LBS) all require a location declaration by the user (or his electronic device). A typical example is a web query for services within an area in which the user is interested. Since the user cannot control the use of the data included in his query once it leaves the device or the response, he must assume that information is available to an unknown observer, thereby creating the potential for the user's location privacy to be compromised. This paper introduces the concept of a location privacy threshold which has two components: distance from the true location and probability that an observer would select the user's true location from a set of bogus locations. To preserve the user's location privacy, his location can be cloaked by adding additional web queries for the same information in areas near his designated location. A minimum spanning tree algorithm is used to identify clusters of potential user locations and determine whether the queries and replies provide enough uncertainty in the user's location to meet his predetermined privacy threshold.

  • A Survey of Location Privacy and an Approach for Solitary Users

    Proceedings of the 40th Annual Hawaii International Conference on System Sciences (HICSS '07)

    Location-based systems (LBS) continue to grow in popularity as applications are developed to use an estimate of a user's location. Location estimates can be created using a variety of information including true location sources and network information. Regardless of the source or type of location information, aggregating all available information may produce a more accurate estimate of a user's location. A user cannot manage the use of location and network information once it has been sent to the LBS, and must assume that an observer has access to this information and can use it to estimate the user's location. Anyone with access to this information can use the same algorithm to estimate the user's location. This creates an issue of location privacy that must be addressed. This survey frames the problem of location privacy through related work and presents an alternate approach to preserving a user's privacy for consideration

  • Operational Data Classes for Establishing Situational Awareness in Cyberspace

    The 6th International Conference on Cyber Conflict

    The United States, including the Department of Defense, relies heavily on information systems and networking technologies to efficiently conduct a wide variety of missions across the globe. With the ever-increasing rate of cyber attacks, this dependency places the nation at risk of a loss of confidentiality, integrity, and availability of its critical information resources; degrading its ability to complete the mission. In this paper, we introduce the operational data classes for establishing situational awareness in cyberspace. A system effectively using our key information components will be able to provide the nation’s leadership timely and accurate information to gain an understanding of the operational cyber environment to enable strategic, operational, and tactical decision-making. In doing so, we present, define and provide examples of our key classes of operational data for cyber situational awareness and present a hypothetical case study demonstrating how they must be consolidated to provide a clear and relevant picture to a commander. In addition, current organizational and technical challenges are discussed, and areas for future research are addressed.

  • Next Generation SCADA Security: Best Practices and Client Puzzles

    Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop (IAW '05)

    Supervisory control and data acquisition (SCADA) systems are found throughout the public utility industry. As part of our national critical infrastructure, SCADA systems are used to monitor, control and manage spatially separated utility sites. SCADA systems are mirroring the rapid changes occurring in the larger information technology (IT) and networking industry by becoming more flexible and at the same time more interconnected. These primitive systems are being upgraded using commercial-off-the-shelf (COTS) hardware and software, and are being migrated to standard data formats and network protocols, particularly transport control protocol (TCP) for end-to-end control. Throughout this transition, SCADA system networks must be well defended and maintain the level of service required by their customers.

  • Protecting Privacy in Location-Based Applications (Chapter 9 in Location-Based Services Handbook)

    CRC Press

  • Location Privacy for Users of Wireless Devices Through Cloaking

    Proceedings of the 41st Hawaii International Conference of System Sciences (HICSS 41)

    The continued growth in online services that provide users with content based on location presents a unique privacy concern for the user. Since the user cannot control the use of the data included in his network transactions once they leave the device, nor can he control the response from the location-based system (LBS), he must assume that information is available to an unknown observer who could use the information to estimate the user's location. This paper presents a cloaking system that preserves a user's location privacy by submitting multiple requests from disparate false locations to the LBS in rapid succession in order to confuse the observer and meet the user's pre-determined location privacy threshold.

  • Using Wireless Networks to Assist Navigation for Individuals with Disabilities

    Proceedings of the California State University, Northridge Center on Disabilities' 21st Annual International Technology and Persons with Disabilities Conference

    Using wireless networks to assist navigation by determining a user’s location and alerting the user of his proximity to accessible building entrances and facilities.

CMSC 304

3.2(3)