Supervisory Special Agent Ryan Landers, Department of Homeland Security

Thursday, November 1, 2018 (11:00 – 12:00)

Homeland Security Investigations 

Biography: Supervisory Special Agent (SSA) Ryan Landers supervises the Cyber Crime Investigations Task Force (C2iTF) at the  U.S. Department of Homeland Security (DHS), Homeland Security Investigations (HSI) in the Philadelphia, Pennsylvania, office.  SSA Landers previously served as the Cyber Crime Advisor to the Assistant Secretary for Cyber Policy at DHS Headquarters in Washington, D.C.

The C2iTF is currently comprised of several federal, state, and local law enforcement agencies in a unified effort to combat the exploitation of the internet for criminal purposes.  The C2iTF’s primary responsibilities include the interdiction of Darknet supplied contraband, including fentanyl and other dangerous drugs from China and other international sources of supply; the disruption and dismantlement of transnational drug trafficking organizations, including cyber-enabled clandestine laboratories responsible for the manufacturing and distribution of drugs via the Darknet and Clearnet; the investigation of the misuse of Bitcoin and other cryptocurrencies to launder illicit drugs and other criminal proceeds; and other traditional cyber crimes, including cyberstalking, business email compromises, and the digital theft of export-controlled data and intellectual property.

SSA Landers has been a criminal investigator with several U.S. law enforcement agencies, including the U.S. Naval Criminal Investigative Service (NCIS), the U.S. Department of Justice, Office of the Inspector General (DOJ/OIG),, the U.S. Department of Homeland Security, and Homeland Security Investigations (DHS/HSI) for the last 17 years.  During SSA Landers’ career, he has conducted a broad scope of criminal investigations, including but not limited to rape, death, larceny,  narcotics, explosives, firearms, public corruption, money laundering, illegal exports, Darknet smuggling, and weapons of mass destruction.

Software Developer Joseph Grayauskie, Accolade, Inc.

Thursday, October 18, 2018 (11:00 – 12:00)

Service Oriented Architecture (SOA)

Biography: Joe graduated St. Joseph’s University in 2007 with a B.S. in Computer Science.  While a student at SJU, he was a member of the Men’s Soccer Team.  Upon graduation, he accepted a position at Accolade, Inc.  Joe is a Software Developer and currently resides with his wife and son in King of Prussia, Pennsylvania.

Marguerite Callahan, Lockheed Martin

Thursday March 30, 2017 (11:00 – 12:00)

The Software Development Process

Biography: With over 25 years in the IT industry, Marguerite has been at Lockheed Martin for 18 years and has been involved in many development efforts with increasing responsibility. Her current role as Lean-Agile Coach helps Lockheed Martin tackle the large software development projects in the age of technical accelerations, where everything is changing so you must allow for flexibility in the software development process but still meet all requirements.

Dr. Jie Wu, Associate Vice Provost, Chair and Laura H. Carnell Professor, IEEE Fellow, Temple University

Thursday February 23, 2017 (11:00 – 12:00)

Algorithmic Crowdsourcing and Applications in Big Data

Abstract: This talk gives a survey of crowdsourcing applications, with a focus on algorithmic solutions. The recent search for Malaysia flight 370 is used first as a motivational example. Fundamental issues in crowdsourcing, in particular, incentive mechanisms for paid crowdsourcing, and algorithms and theory for crowdsourced problem-solving, are then reviewed. Several applications of algorithmic crowdsourcing applications are discussed in detail, with a focus on big data. The talk also discusses several on-going projects on crowdsourcing at Temple University.

Dr. Wei Chang, Assistant Professor of Computer Science, SJU

Thursday November 3, 2016 (11:00 – 12:00)

The Sybil Attack and Its Prevention Techniques

Abstract: We are entering a distributed computing era, where various decisions are individually made at each entity based on the pervasive data from the other entities scattered all over the world. However, most distributed systems are vulnerable to Sybil attacks: by creating a large number of fake identities, an adversary can introduce a considerable amount of false opinions into a distributed system and subvert it. As a result, some entities may make unfair, or even false, decisions. For instance, in some distributed systems, critical resources are assigned based on voting results. If an adversary holds a considerable number of fake identities, he can easily change the overall decision, and unfairly gain more resources. It has been more than a decade since the first appearance of the Sybil attack. In this presentation, Dr. Chang will systematically show the evolution of the Sybil attack and its defense techniques.

Glenn Brunette, Oracle Corporation

Thursday October 20, 2016 (11:00 – 12:00)

The Internet of Things: The Gift of Fire Or a Modern Pandora’s Box?

Abstract: Technology has been woven into nearly every facet of our daily lives. With each passing year, the boundary between the physical world and cyberspace has continued to fade as everyday items have been infused with logic, power, and connectivity. Dubbed the “Internet of Things”, these devices have heralded a new age of innovation and capability, greatly expanding the “art of the possible”. Unfortunately, the capabilities enabled by these technologies are not always positive, expected, or welcome. In this presentation, the benefits and risks of the “Internet of Things” will be discussed. Specific examples will highlight technological challenges, as well as risks to security and privacy. Lastly, recommendations will be offered that illustrate ways in which we can learn from past mistakes.