Thursday, November 1, 2018 (11:00 – 12:00)
Homeland Security Investigations
Biography: Supervisory Special Agent (SSA) Ryan Landers supervises the Cyber Crime Investigations Task Force (C2iTF) at the U.S. Department of Homeland Security (DHS), Homeland Security Investigations (HSI) in the Philadelphia, Pennsylvania, office. SSA Landers previously served as the Cyber Crime Advisor to the Assistant Secretary for Cyber Policy at DHS Headquarters in Washington, D.C.
The C2iTF is currently comprised of several federal, state, and local law enforcement agencies in a unified effort to combat the exploitation of the internet for criminal purposes. The C2iTF’s primary responsibilities include the interdiction of Darknet supplied contraband, including fentanyl and other dangerous drugs from China and other international sources of supply; the disruption and dismantlement of transnational drug trafficking organizations, including cyber-enabled clandestine laboratories responsible for the manufacturing and distribution of drugs via the Darknet and Clearnet; the investigation of the misuse of Bitcoin and other cryptocurrencies to launder illicit drugs and other criminal proceeds; and other traditional cyber crimes, including cyberstalking, business email compromises, and the digital theft of export-controlled data and intellectual property.
SSA Landers has been a criminal investigator with several U.S. law enforcement agencies, including the U.S. Naval Criminal Investigative Service (NCIS), the U.S. Department of Justice, Office of the Inspector General (DOJ/OIG),, the U.S. Department of Homeland Security, and Homeland Security Investigations (DHS/HSI) for the last 17 years. During SSA Landers’ career, he has conducted a broad scope of criminal investigations, including but not limited to rape, death, larceny, narcotics, explosives, firearms, public corruption, money laundering, illegal exports, Darknet smuggling, and weapons of mass destruction.
Thursday, October 18, 2018 (11:00 – 12:00)
Service Oriented Architecture (SOA)
Biography: Joe graduated St. Joseph’s University in 2007 with a B.S. in Computer Science. While a student at SJU, he was a member of the Men’s Soccer Team. Upon graduation, he accepted a position at Accolade, Inc. Joe is a Software Developer and currently resides with his wife and son in King of Prussia, Pennsylvania.
During the summer of 2016, I was given the opportunity to become the Enterprise Portfolio Management (EPM) Intern at QVC’s headquarters. It was an eleven-week internship and I had to make sure that I met the expectations of both the EPM organization and QVC’s internship program competition. During the internship, I demonstrated competencies in leadership, building relationships, communication, and producing quality results on schedule that met stakeholders’ requirements. My primary goal was to build a website for QVC’s Enterprise Portfolio Planning & Prioritization Process. This process provides QVC’s employees with a way to submit their project idea to QVC’s leadership and ask for their approval to start their project. They could say “yes”, “no”, or “maybe later”. Through Share Point, I created a workflow to make it easy for anyone at QVC to submit a request to start a project.
During the summer of 2015, I was a member of the Blue Golf Software Development team. At Blue Golf, I acted in the capacity of software developer, business analyst, and software tester. Along with my vast work experiences, I brought formal knowledge in software development and database management to BlueGolf. I was able to leverage existing strengths and gain experience, particularly in software development. I obtained practical skills in both structured and object oriented programing languages.
In my testing role, which involved finding bugs in java programs, I also proposed recommendations for enhancing the functionality of those programs, as well as the design of the application interface. As time progressed, I became a reliable member of the software development team and the opportunities to become more hands-on in developing in Java increased. One of the areas in which I excelled is business process analysis. I gathered requirements from the staff and developed solutions to meet those requirements. Working at BlueGolf as an intern has been an enriching experience. Some of the lessons I have learned include: navigating various areas in a software development company, brainstorming and implementing solutions to programing issues with colleagues.
Thursday March 30, 2017 (11:00 – 12:00)
The Software Development Process
Biography: With over 25 years in the IT industry, Marguerite has been at Lockheed Martin for 18 years and has been involved in many development efforts with increasing responsibility. Her current role as Lean-Agile Coach helps Lockheed Martin tackle the large software development projects in the age of technical accelerations, where everything is changing so you must allow for flexibility in the software development process but still meet all requirements.
Thursday February 23, 2017 (11:00 – 12:00)
Algorithmic Crowdsourcing and Applications in Big Data
Abstract: This talk gives a survey of crowdsourcing applications, with a focus on algorithmic solutions. The recent search for Malaysia flight 370 is used first as a motivational example. Fundamental issues in crowdsourcing, in particular, incentive mechanisms for paid crowdsourcing, and algorithms and theory for crowdsourced problem-solving, are then reviewed. Several applications of algorithmic crowdsourcing applications are discussed in detail, with a focus on big data. The talk also discusses several on-going projects on crowdsourcing at Temple University.
Thursday November 3, 2016 (11:00 – 12:00)
The Sybil Attack and Its Prevention Techniques
Abstract: We are entering a distributed computing era, where various decisions are individually made at each entity based on the pervasive data from the other entities scattered all over the world. However, most distributed systems are vulnerable to Sybil attacks: by creating a large number of fake identities, an adversary can introduce a considerable amount of false opinions into a distributed system and subvert it. As a result, some entities may make unfair, or even false, decisions. For instance, in some distributed systems, critical resources are assigned based on voting results. If an adversary holds a considerable number of fake identities, he can easily change the overall decision, and unfairly gain more resources. It has been more than a decade since the first appearance of the Sybil attack. In this presentation, Dr. Chang will systematically show the evolution of the Sybil attack and its defense techniques.
Thursday October 20, 2016 (11:00 – 12:00)
The Internet of Things: The Gift of Fire Or a Modern Pandora’s Box?
Abstract: Technology has been woven into nearly every facet of our daily lives. With each passing year, the boundary between the physical world and cyberspace has continued to fade as everyday items have been infused with logic, power, and connectivity. Dubbed the “Internet of Things”, these devices have heralded a new age of innovation and capability, greatly expanding the “art of the possible”. Unfortunately, the capabilities enabled by these technologies are not always positive, expected, or welcome. In this presentation, the benefits and risks of the “Internet of Things” will be discussed. Specific examples will highlight technological challenges, as well as risks to security and privacy. Lastly, recommendations will be offered that illustrate ways in which we can learn from past mistakes.