[00:00:05] >> Come back we're going to start off again talking with. 2 of our working groups this morning one about the cyber infrastructure working group and the social cybersecurity working group and then we're going to hear from an industry panel I have been involved in the hub and how that involvement could go forward and what opportunities we're looking at and really looking at data science as the translator ambassador role that it plays in the community right now of being a translator between disciplines and also bringing in taking Meeks to new places so we're interested and ways and how we can collaborate and how we can also set up good spaces for that collaboration ambassador role to take place so I'd like to introduce someone who's been doing that role for many years Fred Nile gap the who is the Yeah Yeah so who is that they're Ector of data intensive computing at the Office of Science cyber officer Vance cyber infrastructure for size and all the time it's had no response yet that doesn't mean you're there to. [00:01:18] Tax Texas advance computing center and now it's back on is largely revolves around the management and utilization of large in homogeneous scientific data centers and he has a background in doing a Empire work for 13 years as a role as a designer and developer for archives housed at the Space Telescope Science Institute which holds data for the Hubble Space Telescope Kepler James Webb Space Telescope missions He's also 20 years of Hubble space telescope data to create some of the most sensitive astronomical data products available for open research he's prior work. [00:02:01] At the project with the McDonnell Observatory in West Texas. But he started working to create systems to acquire and handle storage and distribution of data that was produced he now works with projects across many disciplines in bio and computing and looking at an artifice looking at water for success and they're building huge fantastic new systems TAC So they actually just got a word a new super computer that's coming online and it's going to be large scale blue water scale so he knows all the things about cyber infrastructure and how to manage data at scale for science and for other things I like to welcome. [00:02:46] Thank you for that wonderful introduction. I probably don't deserve all of it because nowadays I get to manage Powerpoint. Out of there OK. So now I am a recovering astronomer. And now I get to pretend that I understand biology civil engineering oceanography because you know if you understand the universe the rest of us just details. [00:03:14] So I'm here today to sort of 1st answer this question which is a question I think you know before we were going to attend a cyber infrastructure working group you probably ought understand what a cyber infrastructure is and it's one of these things that. A lot of folks explain it it's kind of like either you know you see it but it's more of that sorry I work at the Texas events competing center and we have a lot of machines I could spend you know 10 minutes on the site alone talking about architectures and complaining about vendors and all those sort of things but we were going to different pieces that support cyber infrastructure ranging from systems that are to for large storage and high overrates like Wrangler where we do. [00:04:03] Work with massive data sets that we are analyzing to compete on many of the other systems to long term storage to distribution of data but those are merely pieces of the cyber infrastructure because you know it's like. Just having a screwdriver does not make you a carpenter you need all the other pieces. [00:04:26] I want you to also go out and say you know cyber for structure has to do with a framework or software and you know we support a lot of different machine learning people earning their probably about another 20 things on here it's a more and more a NASCAR site every day but. [00:04:45] There are a lot of common pieces that people look at software that would describe a part of a c I but that really isn't about a CIA is it isn't about everybody deciding that we're all going to use our and exchange coded data in that format. And so it's more than that so it's always been a complicated problem and so I found this site I forgot about it this site actually goes back to back about 14 years to the previous incarnation of the N.S.A. system that supports a lot of the cyber infrastructure called exceed today it was back then called Terror good when good computing was thought to be the way forward and it really is you know this is a rip off of you know the blind men and the out of. [00:05:38] But this was sort of if you go and you talk to people all around the area you know 14 years ago everybody was thinking about it as being the component. Of all of this because that's sort of the that's the part that gets the headlines I would say more than anything else but really the infrastructure is the elephant it's the whole you know Tufts tale here plus a lot of other components in there that are needed to make any one of those pieces useful and so a system on itself sexten a lot of power but outside of that there are some people that can run on it better metal but a lot of it really is to build an infrastructure to make all of that and so really decide where for structure to me is much more about the orchestration of all of these parts which is going to lead to discovery. [00:06:27] And you know that's that's much more than just being able to say that you have you know bragging rights to the hopes of the number 5 system in the world at TAC you know without all the other pieces that doesn't matter. Also you know people I think this is where people get confused as well so I take so many many different forms and that can be anything from you know having common software and style and common practices and using a command line interface which has been sort of the traditional way for going back you know round up since we've had it coming online for castrating cyber infrastructure but these days more and more it's about making it so that it's approachable and the interface is work with people and so it's not just you know this is the goodness of the world will spoil it for those of us who who like to run on the command line and they want to make things so that it's intuitive and useful and accessible you know over things that you really should do and so it's a simulation of both of these parts of the simulation machine learning but of these tuned in a way by has been that it was talking about the data scientists and other folks. [00:07:43] Side with computer human interface people to do a little bit us to do it in data management and allow for collaboration to reduce not about things that we want to do with it all but failed practices and more so so really you know what is a cyber infrastructure it really is a stack of all 3 of these things. [00:08:03] And you need to have any of them present at some level whether that's through a piece of graduate students building up a micro I should say cyber for structure for the lab or to national facilities that are that are supporting things it's about bringing together people that understand how to make these things go of the systems which are often easy part and then different technologies but then a lot of a lot of work with people and often face to face to get these things going and attack we were fueled by tacos because Austin Texas loves a caucus so. [00:08:41] I'm here to sort of put out a shingle 1st. The working group that I'm leading which is big data hubs. For structure working group and what we do is we try to introduce people to different forms of cyber infrastructure to different approaches to cyber infrastructure and different uses of cyber for structure and these are sort of are there larger than put them on a bumper sticker So these are these are more sort of the things you'd hang on the right but these are the pieces of our charter to increase awareness of that cyber infrastructure and what big data are because those are those are topics that get confused and conflated between people in the from going to green at least what we're talking about often we can reason put things together across the national community and make things work up larger scales. [00:09:31] Helping to identify the gaps we don't have any answers and we're never going to have all the answers but we need to do is we need to talk to people who are using systems and who have data to find out what they need what they want and spend you know sometimes that is listening to them and building what they have what they are saying or meeting and sometimes it's about bringing other people in to show them what's being done in other fields where they are collaboration and cross-pollination can take and then recruiting and educating the communities and this I think is the big one because there's so much data out there and it's growing you know exponentially every year but bringing together people so that we can pair up. [00:10:13] Capacity capabilities and needs to go out and look for new research that can be done that people thought might not have been done before and of course funding opportunities to go behind that because you know unless we keep the lights on research doesn't happen. Monthly meetings and it's every Friday it's 1st Fridays at 4 pm So it's a nice way to start to finish off the end of the day and your 1st Friday before going out and enjoying that 1st weekend of the month or as my boss likes to say the only 2 more days to a month I would base it on Monday. [00:10:50] We're going to attend there's no this is not a working group in the sense of sign up for a working group and get assigned tasks this is this is fun this is you show up and now there's an e-mail here a link to the slides again. Later on but you know that kind of knowing he can put you on the invitation which basically gives you the this is an information so that you can join companies don't win here that we start off with about 30 minutes a discussion of the working group what's going on in the different areas of cyber infrastructure that are associated with the hubs looking for collaboration you know looking for problems just discussions amongst people who are attending a lot of the sort of needs matchmaking go on at this point and then we have the fun part and we move the from part to the M. so that we get the business done but the fun part of these lightning talks and we could have somebody come in from various different fields were communities were even state level institutions and give us a 20 minute talk about what they do about their data problems or what their solutions are and what they did they needed. [00:11:59] Vendors can come in and talk about some of the solutions that they have out there that are unique. And that being used in research today but people may not be aware of. I would guess one because this one I was involved in this in the city of Austin will complain about traffic but in the growing at such rates it's probably similar to it let's not as bad as Atlanta traffic not exist but. [00:12:27] The idea here is to be able to use the. With the city of Boston is working with the Center for Transportation Research at U.T. Austin to be able to use the videos that come out of the proceeds. And identify without keeping the video what's going on in the intersection so you actually catalog cars and people in buses and we sit here and stare at it long enough a bus comes about in the seat that certain purple there's somebody wander around the corner in a minute but the thing is then what you can do is you can save these time series of events at intersections and use these for doing you know with safety you know like is it really good for that bicycle be rolling down the middle of the road like that. [00:13:09] You know making maps like the one down below where you can see through the density of where people are walking and interacting and and look for problems without having to say about this video and being able to even use just be indexable database to go and sift through to look for some of these things. [00:13:26] So they did bad news and here's sort of an example of some of the things that they uncover that they really haven't thought about now I could have answered this question just because I live about a mile down this road. But they were looking at pedestrian traffic here they're putting in this new crossing pattern here and they want to make sure that it was in the right place and that it was going to make the intersection safer and they noticed this little prehensile tail coming off where somebody away were a lot of people seem to be jaywalking across the road that was a major road US and I did probably took this picture of you know at 6 am on a Sunday morning to get rid of all the cars. [00:14:06] And so it's normally packed but the one that would have clued me in as to what it was because I drive up and down it is that sign right there which is you got to a highway with no shoulders things going down the middle and a Subaru dealership off to the side where you said about this what is this that I'll be if you're driving down this road you find out that these big truck carriers come along and they have to go and do things and so this pedestrian was detected walking down and lowering the back in and he's almost hit twice this guy has to sort of out and then sort of back him. [00:14:42] To not hit him and make this left hand turn right after where he's stopping So this is evidence that I would use that they need to get the car lots off a better road in Austin. But this is the sort of thing that you can do with these things and so the city of Boston is working with us and working with folks for the Harbor we had some folks from I believe Massachusetts who gave sort of a state level view on some of these things the same time. [00:15:07] The same safe is another project that we have this is one that is being run out of the Civil Engineering Department at the University of Texas. I'm typing on my home stuff module just because I had the slides there's a lot of good stuff going on but this is part of the in Harry N.S.F. funded project which is a large scale facility. [00:15:26] A project put together sort of data all hazards measurements in southern engineering dealing with smarting from hurricanes earthquakes fires you know when things go horribly wrong. Things that all sorts of different levels from the material level where you might go and look at cracks in cement to wave tanks and other things that are measured to pulling in things that happened when I heard 2 incomes or when an earthquake comes modeling and simulation of all these things it's a complex problem and you want to build an environment that allows people to work together and that's what this design safe project is to do it was to build this and so working with Elon they've constructed this portal and this is a nice piece of cyber infrastructure because it allows people to bring in data and so you have sort of an area where all of your data resides. [00:16:19] And you can bring it into multiple places from so it's integrated into things like Box Dropbox all those good things but the nice thing is that you have projects where you can collaborate with people and when you're collaborating with people there's a folder that shared across the group of people that are that are doing things and you can have data that's distributed here and the Web decided to show how you can then act on this data but if you go up to research workbench up above and click on it there are some 20 or 30 different applications in here where you can take data and in the dice a good point and click sort of way. [00:16:54] Drop it into different applications whether it's large scale modeling that's going to be running on multiple nodes a stampede to we're just a simple our notebook where you want to go through and do some statistical analysis of the. You get all that and all that is captured and shared with people and then eventually is turned into what they'd have as publications coming out of here where you can put an abstract on all this but capture I will slow down the things that happen to the data and you get you know a digital object deal why. [00:17:25] Does the logic identifier because this is going to be a permanent record and this becomes then a scholarly record that goes with this data that people outside of the project come of trying to see and use and even reuse for their own research so really nice piece of cyber infrastructure there I was here just sort of to put up I was going try going through these but the sites where the Power Point were not entire point they were in P.D.F. and so it was hard to transport but how do folks in fact this week or last week I guess it was who came in I was from Italy from H.P. and they were talking about some of the cyber protection software and philosophies that they are going forward with the scripts project that they have. [00:18:08] Which was a very interesting the ability to you know limit roles and access to data which is becoming more and more important as more and more sensitive data is being analyzed whether it be for this or they all start with success for. The difference is when you get sued when you go to jail because of the fine but so a lot of work around that. [00:18:33] This is that came in from N.C. to tell us a little bit about Hydra share which is a community doing hydrology measurement across the country but then how they can use that piece of cyber infrastructure where they store all that data to advance other fields that have similar needs but are looking at just water. [00:18:54] We have our own top from showing glass from Google who came in and showed us a lot about the cloud offerings they have included a big table and the desire for some of the clodhopper. It is to work very closely with folks to bring good and evil do open data sets their hosted in the different cloud providers Jim came in and showed us he's just from the northeast big data hub he came in and showed us the cyber infrastructure that they have around agro informatics So you know how you deal with the fact that even crops these days are big data because they're all wired up and their measurements coming off of all of that. [00:19:34] And a bit of a Tyrian design works sort of. Going back to materials but this is at a different scale or a different different purpose this is about building things not finding out why they fell down. And so that's what Ben came in to talk to us about. [00:19:50] The commissioner from Massachusetts Department Public Health Care men and give us an ability to rest and talk about how data management data can be used to help address the opioid abuse at the Democrats going out of the country. Matthew lying to him and told us about food if I'm mad at the. [00:20:09] The underpinnings of the emerging I need to learn to copy and paste better but basically was telling us about you know how or who food information can be handled coming in from the fields and all the way into you know how we get better but if you draw the people and the last time which I was involved with with precinct Patrick who is one of the co-chairs West. [00:20:34] We get sort of a rundown of the work the we have been involved in collaborating with working tack with the state of Texas and thema and Christine was working getting data through to all sorts of folks through different channels but during the hurricane how do you that were already parked over Houston and dumped lots and lots of right around it you know right if we do and how could we build a better cyber infrastructure pieces to help support some of these natural disaster areas where you need to get information to the right people at the right time real time weather happening. [00:21:10] So again those are the sort of things that we talk about and there are a lot of fun we have that's virtual meeting every 1st Friday at 4 pm Eastern where anyone can attend there's Carl's e-mail again so take us to us there's an ass. You know listen you know you know fly on the rose find some graduate students and post-docs and undergraduate students who are interested in and data science and interested in in cyber infrastructure and how to put these pieces together. [00:21:42] That's you know I think the 1st thing to do but you know it would bring a problem or an idea so if you've got a proposal you're thinking of doing well or if you've got a dataset the can't handle or if you have an application that needs data you know tell us what you got and you know we can we can definitely help match people up and figure out how these things can be used and reused in different ways and if you're really going to both come to like me talk about all the great work that's going on across the hub you don't have to have a cyber infrastructure to do this you know post videos that somebody has done some analysis on traffic was fascinating talk in need of a cyber infrastructure so come for comfort the writing talks and leave was sort of I think that should be our motto that we can put on a bumper sticker and so with that sort of an introduction an overview of to what the working group is doing and I'll turn it over for any questions. [00:22:51] There are about 20 people on a car and sometimes depending on not on the car we can get up to 30 you know and. We have some regular offenders but not many it really is sort of come if you can because it is such an informal setting but we have a lot of I should say I shouldn't say repeat offenders we have people come back it's not that we get 20 new people every week that would be bad but we have a core constituency that shows up and we've had hundreds all told. [00:23:25] So but that people bring their friends you know and so it's it's regular turn it over and we do sort of roll call beginning for you folks so that we get to know each other. Well I mean there's me who knows I've got Power Point So I'm at the low point here. [00:23:54] But we've got other folks that come in and do these pieces we have a lot of folks that applications that are you know potential solutions for other folks that send us are about half the group of. People with potential solutions and we have people coming in I'd say you know every week there is every every month there's somebody coming in. [00:24:17] Who has a new data problem. That they just want to find out what's out there for the fight of one or 2 and those that knew each time at that level. I think we we do get some post-ops that come in but I'd really like to see them because we all know that your research happens when graduate students steal each other's notes or software or whatever you know the I'd really like to start get some of those folks in as well or maybe even spend some of that off for that but. [00:24:49] It's a good lively mix of people. But as I say probably half right now people who have some piece of something that they want to show off and and happy people adopt and then the other half of people adopting it from Iraq only think. Because everybody I see is in this in the window and you know as I introduced to all sorts of people here in this room that I have met before here everybody is much my dear the lineage. [00:25:21] So we don't want to have been person meetings I didn't mention that in here but we're going to try and have a bath that's going to be co-hosted with the. Folks who are doing the open storage network. And we're going to do sort of the cyber infrastructure working group at the. [00:25:38] Place meeting. Which is going to be in Chicago at the end of July so do a discussion on existing and other pieces of cyber structure and collaboration is a person which are always good I think you. Really are missing women in. How were. Things you know busy it's OK my wife who's taking time I guess. [00:26:08] Jump on this right here with us making our way here. Yes it is and that's why I would go to. That's the important part is the people you notice there are more people on that slide than there are and that is the high part which is why I was mentioning me in person because you and I sitting down for 15 minutes Well I've had a staff done a bagel this I hope productive and we hope to sort of do that as well and so the Hub's have been kind enough to help bring us together and bring centers together out of all of us. [00:26:58] Can I put on my TAC hat OK. So I know it's not so I put on my tack hat now we do a lot of training attack on these pieces we have online courses that we do many times here on everything from how dog into a system how do you support 0 to how to run how to how to write large scale M.P.I. codes. [00:27:20] And that's great but that's that's usually get in everybody's about that tall Power Point slides with some demos you make off and run and there's some information that comes out of that I have to level but the real the real interactions are at meetings and so that's why I you know try and come to as many of these as I can and get people talking. [00:27:43] At TAC we also have. I think about 8 different. Summer institutes we call them but they actually now that we have 8 you can actually do it all the summer ranging from everything from how to build a cluster to how to do data analytics we've done course some stand off in the Summer School Trust me. [00:28:05] Really it's about $110.00. But. Coming and working with people in person and doing that hands on is often also what what's needed There's also some some folks who are doing the science gateways which is part of the funded project out of the N.S.F. led by folks from San Diego UNTAC. [00:28:27] And they do a lot of workshops and then pieces for people who are trying to build cyber infrastructure and need the technology but a lot of this is collaboration of this level and these are also some of the topics that come up you know what meeting should we get together out next so that we can sit down and do these things that's the stepping back into this this well that's what this meeting is also about is getting people together in person. [00:28:59] We actually. Want to. Know your. Life. My. So as well the husband can answer that but I think the answer is they're acting more as facilitators on all of this so I'll act as one of the facilitated. We tack. About everything that we do it backs up it's just state that 1st and foremost from how we manage our clusters to the infrastructure that we use for running our portals and get. [00:29:42] The complexity is running most I would say more often than open source so you know the being open source is the modern The check is in the mail. It is open source but running it is hard I mean you know running running a system this and so we also collaborate with folks on building these pieces out attack so we've run probably somewhere north of 30 different gateways at this point all leveraging different architectures and then for success and we collaborate you know we have. [00:30:16] The funding coming from folks to help support all of this. We also have a lot of open source data and so one of the systems that we have is corral corral has over 200 different collections and their collections that we don't own collections of people are brought in but you know I think the data that's held in there for many of the different projects are available publicly so. [00:30:48] Thank you like I think again. That person is joining us via Web This is Kathleen Connelly who is the chair of the social cybersecurity working group. And here he represent the working group on social cybersecurity So the term social cybersecurity was actually coined by me and it came out in a paper sack which was published as part of the F C M's conference last year to check what social cybersecurity we've heard. [00:31:36] Is keeping the Internet 3 and open. So that people can operate and communicate the pulling of one individual upon another is it is both a science that is designed to characterize understand forecast cyber mediated changes in human behavior social cultural and political outcomes it is also an engineering that is designed to build a cyber infrastructure needed for society to persist in that the central character the cyber V.B.A. getting relation environment there changing. [00:32:17] Of the actual or him and that social side reform social cybersecurity is different from psychology. And they're concerned with people and the role of people in communicating. The lives plays a longer Well it is also not concert it's also an area that is very different. Because it is concerned with communication with information preservation social cybersecurity we've found is an emerging scientific area that is multi-disciplinary if it grants disciplinary. [00:33:04] What we're finding is that traditional cognition and social behavior up to be rethought and expanded in the area of the age. It is also in most to methodological area and it is a very wide area lying at the center of computational social science media and marketing Paul A. [00:33:36] Detailed study done collect information on who was publishing in this area what we found was that there were over 1000 articles so far and these articles that are concerning the. Social cybersecurity not just with the planning how social media is cool and is not concerned with privacy and there's over $1000.00 articles save the dated at the mansion risk and birth of Facebook and Twitter there are also over 2000 officers in the system. [00:34:17] They have been publishing in over $480.00 petty but 69 percent of those different like journals conferences cetera have been paid only a single article much of the work appears in books in chapters in books and so on the board in conferences in this area are F.T.P. program. Prints of the World Wide Web The indication system works science and at dances and social networks and minds doing a deep study of these individuals we look at which disciplines were most individuals then at this point in time most of the research has been produced in the area said social science information science and communication political science and computer science. [00:35:19] As does artificial intelligence. The disciplines that have the most articles again social science communication information science and the web science within this area if you look at the co-authorship network what you will see is a very interesting phenomenon and that is most individuals have published one article by themselves with one or 2 reactors However there is a strong central. [00:35:58] And the strong central core actually ties together several 100 researchers at the heart of this car core are myself and I go along as well as several other people from other university said Alice Andro from me and David says there most of the work that is done in this area is currently done in the in the south big data hub region and that Mortie data region the work in California has been working with peer machine learning techniques and not so much with the cybersecurity issue we had a meeting where we discussed what to cybersecurity challenges were from a research perspective this is the south big data hub meeting in to this there were 5 other meetings over the course of the last aired on the same issue this information was then used to inform the National Research Councils the cable survey the upside is then the cable survey there was now a chapter that was. [00:37:17] On Social cybersecurity capturing information on what needs to be. Funded research areas are important and so on the underlying challenges that we down including the 1st one is the rate of change. The cyber technologies themselves the legal and policy constraints and the globe information are changing so rapidly that solutions from 2 years ago were no longer applicable The 2nd challenge has to do with the technical policy and economic impact these factors are actually of influencing what science can be done the site needs to be done. [00:38:05] That and what is required because you do that. Technical changes on the part of the social media providers that your book and twitter. Are actually impacting the way. And who the scientists are that can get the social cybersecurity to present to doing challenges science and reporting its speed of adapt a scene that is unprecedented in American data controller management challenges the following The data itself is not free and open the data providers dictate who can put the science the data scientists have access to generally only if. [00:38:54] The biases are not known nor accounted for nor did it data providers wish to make it public now. By cigars the data is not preserved that means the replication is difficult if not impossible for example we did a study. But because most of those individuals in our study and then did the data no longer for anyone to replicate the study this means that the scientists we need to develop a new theory that would date the data is also not fully shared. [00:39:37] And reuse is limited you cannot require people in this area to share data because it is technically illegal data production is also time there. Data providers change what they store and what they collect so what you could black via Twitter 2 years ago is different than what you can collect now and if you are why though it changes practically every month the policies that we have in the U.S. government getting Europe. [00:40:11] And in other parts of the world are out of sync function and often it is not possible to collect the data that is needed to answer the policy question you need to answer to create new policies in other words we're living in the wild west in the social cybersecurity. [00:40:36] The next picture was simply showing you box and order and the point I wanted to make here is that all the wrong there are actually a lot people often think there's 10 to 20 percent but this really defines what this really depends on how you find a boss in some areas of media there are only in other areas there's close to 50 percent but the bots are concentrated around particular types of that given the ease and clothing response to natural disasters response to legal activities and any kind of government election type event social influence but can also many groups for example the therapy known by one of the A group of thought that all mention the gender bias or being it then community or what we call the chamber this therapy number because it looks like the group caught the attention of 2 of his algorithms which meant that things coming out of this group if they were attached to a larger group priority this group latched onto and boosted the well pile of the evil. [00:42:17] Who is known to be spreading information according to all time and was linked to by members of. This NG mom was himself a super spreader of information by retreating and responding to see my message or the bot positioned itself so that anything they damn later be tweeting or delayed to think they'd themselves put out to rest would be prioritized in the. [00:42:46] Group that surrounded the e-mail that topic group was concerned with ISIS and the problems in Syria the mom does not need to know this is going on once a year once the bot was positioned so that it messages were prioritized all the people in the group it started tweeting about this so I. [00:43:11] Was collecting donations for the children area this site was a money laundering site right. Bots are out there can back being social media not just by the narrative like most people thing not just by attacking our psychology by building and forming different information from Monkey individuals we've developed a technology called then which is a theoretical approach for identifying information by movers if this goes beyond the traditional. [00:43:51] More bare dismissed just or distracting to a to include actual. Technique for building and breaking that network as well as building and breaking that there isn't a classic one that is used in the rest it's a bridge technology which actually binds 2 groups that are disassociated. Connect them by tricking the social media providers into prioritize each other group that then creates linkages with the action so the real world. [00:44:31] We've seen many examples of this and have a sample some of the fun ones of course have to do with entertainment such as the Black Panther movie or the Captain Marvel in both these cases distemper mation came in and was started by human beings not started by bought bought supported the spread of the descent from a ship when they were at that given spreading game is when they were linked to. [00:45:06] That had strong offline presences as well so in that case they were able to push the challenge misinformation in the breakup after bible met and in the case of the god Panther they were able to actually push misinformation linking the Black Panther movie to the all right we're also in this group but binding to which this information can be countered. [00:45:44] By different kind of social media strategy among the activities that we have been engaging in is their group originally started with the name cyber and hair and was recently remains a social site security after the Cato survey came out it has monthly seminar series that includes members of academia. [00:46:11] Or print and government people come listen to in 2018 weeks sponsored some ph from the South Africa south. As I noted earlier at the P.P.M. has become a key conference in this area and it has an annual disinformation challenge we've been promoting individuals to engage in that challenge this year and we're planning to have a 2nd meeting at that conference this as a 21 team meeting. [00:46:47] The group there's a website it was developed by a group of the South data have had to find new. This is a clearing house with pointed people organization than papers sources and data. It does not hold any of the information they provide pointers because of the technical technical and legal issues and holding data at the the big Rams meeting and 2019 people have the distemper mation challenge and the reception on July 11th. [00:47:28] The end in eating contest information partially sponsored by as the South big data hub and its face to face meeting on July 12th. There's also increasing synergy several members of the company big participating in the N.S.F. workshop on probation I was a member of that the Cato survey and we also have our 1st session issue coming out on social cybersecurity that multiple contributed to there will be a 2nd one is the use of me here the types of tools that have come out that we point to as a group these are not all generated by this and none of these was supported directly but our you can find members of the. [00:48:25] Include bot hunter but Thomas are you to track their blog trackers tweet tracker or a pro at that map or that we're adding some new things called name hunters and several other dance trackers and so on among the approaches that people have found to be very effective and that we've had during these meetings to meeting loog that Chinese employer can be better understood looking for what is being censored because they remote into indirect being and you can't do direct attribution that linguistic cues and they are often useful to identify emotional behavior. [00:49:17] New techniques for sentiment at that washing machine learning techniques for fake news. Like the hot 100 cetera at. The days of the way in which this information spreads into. New techniques and cyber brands. Lots and lots of network science including dynamic network analysis. And in fact network analysis along with machine learning are the. [00:49:50] Methods used in this area and we've also had your readings on class nation work fair journalistic. And organizational practice. We're very interested in collaborating working with other groups and I think you also think that the I strongly suggest if you're interested please contact myself Katherine parley and my email is Kathleen dot currently at C.S. dot CMU dot edu We will also be putting up an event time with Dan and I hope is and maybe a possible be able to join us on July 12th in Washington D.C. P.P. Brand thank you. [00:50:56] Thank you Kathleen. So this hoping that people will be interested also please email Kathleen or call in the back to get on the list for the social cybersecurity if you're interested in any of the work around people income communications as Kathleen if we have some or maybe one question and then we're going to also ask the panelists to come up but this is a monthly meeting that's also in the. [00:51:24] Mail mostly newsletters so it'll be advertised to those who sign up for the mailing list or at South Big Data dot org. Anyone have a question for Kathleen OK. So then we'll start with the panel that people sign up and email you directly thank you so much Kathleen for all the information about the group and about social cybersecurity welcome.