Upcoming Events
No upcoming events found
Past Events
Cyber-enabled Human Trafficking Training (August 1, 2024)
Course Description: Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified advertisement sites, and communication platforms. This course introduces participants to cyber-enabled human trafficking, particularly sex trafficking, the online platforms used to
Cyber-enabled Human Trafficking Training (June 6, 2024)
The course is only open to U.S. state, local, tribal, and territorial law enforcement agencies, prosecutors, and judges. Course Description: Human beings are recruited, advertised, traded, bought, sold, and even rented on websites, chat rooms, social media platforms, online classified
Cyber-enabled human trafficking Webinar
This webinar introduces participants to cyber-enabled human trafficking, particularly sex trafficking, the online platforms used to facilitate cyber-enabled sex trafficking, and the methods traffickers use to lure and exploit trafficking victims.
Malware as a Service (MaaS) Training (January 29-30, 2024)
This course covers one type of “crime as a service” (CaaS) offered on clearnet and darknet spaces, namely malware as a service (MaaS).
Communications Platforms in Cybercrime Synchronous Training Course
Cybercriminals in clearnet and darknet spaces often use tools like encrypted communication platforms in the commission of cybercrimes. This course introduces participants to various communication platforms and their use by online threat actors. Participants will gain technical knowledge of encrypted
United States Secret Service (USSS) Career Tracks
Two special agents from the USSS will be presenting on interview strategies, the application process, and the many different career tracks within the Secret Service, including those involving cybersecurity. One of the USSS’s key responsibilities is protecting the nation’s financial
Skopenow: A comprehensive open-source intelligence platform
Rob Douglas (rob@skopenow.com) is the CEO and Co-Founder of Skopenow, Inc. His mission is to modernize investigations by providing scalable open-source intelligence to all industries. A thought leader and frequent speaker at industry events, Rob’s day-to-day includes partnering closely with
JJAY-NCFTA Clearnet Investigations of Cyber-Enabled Fraud Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Clearnet Investigations of Cyber Enabled Fraud.” Contact Information: julia.gray@jjay.cuny.edu Course Dates: August 23-24, 2023
JJAY-NCFTA Clearnet Investigations of Cyber-Enabled Fraud Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Clearnet Investigations of Cyber-Enabled Fraud.” Course Date: June 27-28, 2023 Course Time: 10 a.m.
JJAY-NCFTA Communications Platforms Used in Cybercrime Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Communications Platforms Used in Cybercrime.” Course Date: June 21-22, 2023 Course Time: 10 a.m.
JJAY-NCFTA Cryptocurrency Investigations for Criminal Justice Agents Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Cryptocurrency Investigations for Criminal Justice Agents.” Course Date: June 20-21, 2023 Course Time: 10
JJAY-NCFTA Darknet Markets, Forums, and Investigations Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Darknet Markets, Forums, and Investigations.” Course Dates: May 30-31, 2023 Course Time: 10am-3pm with
JJAY-NCFTA Communications Platforms Used in Cybercrime Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Communications Platforms Used in Cybercrime.” Course Date: May 22 -23, 2023 Course Time:
JJAY-NCFTA Communications Platforms Used in Cybercrime Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Communications Platforms Used in Cybercrime.” Course Date: May 22 -23, 2023 Course Time: 10
JJAY-NCFTA Cryptocurrency Investigations for Criminal Justice Agents Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Cryptocurrency Investigations for Criminal Justice Agents.” Course Date: April 24-25, 2023 Course Time: 10
JJAY-NCFTA Clearnet Investigations of Cyber-Enabled Fraud Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Clearnet Investigations of Cyber-Enabled Fraud.” Course Date: April 13-14, 2023. Course Time: 10 a.m.
JJAY-NCFTA Malware-as-a-Service Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Malware-as-a-Service.” Course Dates: April 10-11, 2023 Course Time: 10 a.m. to 4 p.m. EST
JJAY-NCFTA Cyber Organized Crime Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Cyber Organized Crime.” Course Dates: March 21-22, 2023 Course Time: 10 a.m. to 4
JJAY-NCFTA Malware-as-a-Service Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Malware-as-a-Service.” Course Dates: April 3-4, 2023. Course Time: 10 a.m. to 4 p.m. EST
JJAY-NCFTA Clearnet Investigations of Cyber-Enabled Fraud Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Clearnet Investigations of Cyber-Enabled Fraud.” Course Date: March 30-31, 2023 Course Time: 10 a.m.
JJAY-NCFTA Cryptocurrency Investigations for Criminal Justice Agents Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Cryptocurrency Investigations for Criminal Justice Agents.” Course Date: March 23-24, 2023 Course Time: 10
JJAY-NCFTA Cyber Organized Crime Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Cyber Organized Crime.” Course Dates: March 21-22, 2023 Course Time: 10 a.m. to 4
JJAY-NCFTA Darknet Markets, Forums, and Investigations Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Darknet Markets, Forums, and Investigations.” Course Dates: March 20-21, 2023 Course Time: 10am-4pm with
JJAY-NCFTA Cryptocurrency Investigations for Criminal Justice Agents Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Cryptocurrency Investigations for Criminal Justice Agents.” Course Date: March 8-9, 2023 Course Time: 10
JJAY-NCFTA Darknet Markets, Forums, and Investigations Training Course
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber-Forensics and Training Alliance (NCFTA) are offering a training course on “Darknet Markets, Forums, and Investigations.” Course Dates: March 8-9, 2023 Course Time: 10am-4pm with
JJAY-NCFTA Clearnet Investigations of Cyber-Enabled Fraud Webinar
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber Forensics and Training Alliance are offering a webinar on “Clearnet Investigations of Cyber-Enabled Fraud.”
JJAY-NCFTA Malware-as-a-Service Webinar
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber Forensics and Training Alliance are offering a webinar on “Malware-as-a-Service.”
JJAY-NCFTA Cyber Organized Crime Webinar
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber Forensics and Training Alliance are offering a webinar on “Cyber Organized Crime.”
JJAY-NCFTA Encrypted Communication Platforms Webinar
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber Forensics and Training Alliance are offering a webinar on “Encrypted Communication Platforms.”
JJAY-NCFTA Darknet Markets, Forums, and Investigations Webinar
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber Forensics and Training Alliance are offering a webinar on “Darknet Markets, Forums, and Investigations.”
JJAY-NCFTA Cryptocurrency Investigations for Criminal Justice Agents Webinar
The Center for Cybercrime Studies at John Jay College of Criminal Justice and the National Cyber Forensics and Training Alliance are offering a webinar on “Cryptocurrency Investigations for Criminal Justice Agents.”
AI, Governance and Risks to Community
A series of discussions to explore the current and potential implications of the development of AI.
Integrating and Analyzing Social Media Health Data
This talk will present a Social Health Record Integration and Analytics Framework to leverage Social Health Records for gaining insights into population-level and individual level healthcare practices and behaviors.
The State of Blockchain Systems
Consensys is a Brooklyn based startup that has made large contributions to smart contract programming on the Ethereum platform. Evin McMullen is involved with a subsidiary project called Linea which focuses on secure distributed storage of private information such as
The Internet of Things (IoT) Data Collection and Analytics
May 2 IOT Agenda PDF
Addressing the Digital Divide in Security: Measuring and Intervening in User Security
Speaker: Elissa Redmiles, University of Maryland
Autonomous Walker to Improve the Gait of Persons with Parkinson's Disease
This talk will focus on the design of an autonomous walker that provides touch and speed cues to a user to improve their gait performance.
A Study of Interaction, Digitalization and Motivational Affordances of Wearable Systems
This Talk discussed how the application of Activity Theory and affordances to examine wearable systems.
Computing Multiple Exponentiations in Discrete Log and RSA Groups
Speaker: Matluba Khodjaeva, John Jay College
A Fast Quantum Algorithm for Solving Multivariate Quadratic Equations
This talk presents a new algorithm which combines Gröbner Basis techniques with Grover’s quantum algorithm and achieves an advantage over brute force, and all other algorithms for solving a system of m equations in n unknowns
Towards Enabling a Blockchain Based Cybersecurity Information Exchange Platform
This talk will address CYBersecurity information EXchange (CYBEX) framework ability to facilitate cyber-threat intelligence (CTI) sharing among the participants (firms) to abate the impacts of cyber-attacks.
BetrFS: A Right Optimized Write Optimized File System
Speaker: Jun Yuan, Research Assoicate, Dept. of Computer Science, SUNY Stony Brook
Computing Multiple Exponentiations in Discrete Log and RSA Groups: From Batch Verification to Batch Delegation
This talk will present the first practical and provable solutions to this batch delegation problem for groups commonly used in cryptography, based on discrete logarithm and RSA hardness assumptions
A Study of Similarity in Brain Data
This study addresses the possibility that data traveling through the neuronal network in the human brain is self-similar.
Behind the Scenes of Ransomware
Speaker: Kin Wong, Digital Forensics & Cybersecurity Graduate, Security Analyst
Understanding Bias and Item Missing Data in NIBRS
Speaker: Douglas Salane
Advances in Cybersecurity Higher Education: Building real world experience before you graduate
Speaker: Christopher May, Technical Director, Cyber Workforce Development, CERT Cybersecurity Division, Software Engineering Institute, Carnegie Mellon University
Intergrating Virtualization and Cloud Computing in Information Technology Education and Research
Speaker: Peng Li, East Carolina University
A Smart Contract for Boardroom Voting with Maximum Voter Privacy
Speaker: Patrick McCorry, University of Newcastle, UK
A Spectral-based Clustering Algorithm for Catergorical Data Using Data Summeries with an Application in Criminal Justice Data
Speaker: Dr Eman Abdu, John Jay College of Criminal Justice
Friend or Foe? Your Wearable Devices Reveal Your Personal PIN
Speaker: Xianon Guo, Stevens Institute of Technology
From Causal Inference to Personalized Healthcare
Speaker: Yuxiao Huang, Rochester Institute of Technology
Trusted Code: The Missing Link of True Information Security
Speaker: Syed Waga Jafri, John Jay College
Frontiers of Usable Security - Developers, Administrators and Systems Security
Speaker: Matthew Smith, Rheinische Freidrich-Wilhelms-Universitat, Bonn, Germany
Cybersecurity Capstone Research Presentations
Moderator: Sven Dietich, Associate Professor, John Jay College of Criminal Justice
Assessing the Utility of NIBRS Data
Speakers Eman Abdu, Adjunct Associate Professor, John Jay College of Criminal Justice Douglas Salane, Professor and Director, Center for Cybercrime Studies, John Jay College of Criminal Justice Peter Shenkin, Professor, John Jay College of criminal Justice
Fuzzy Cybersecurity Talk
Speakers: Loren Maggiore, NYC student and fuzzing extraordinaire at Trail of Bits
Digital Technologies and Revenge Pornography: Examining Australian Legal Intervention
Speakers Dr. Asher Flynn, Senior Lecturer in Criminology, School of Social Sciences, Monash University (Victoria, Australia) Dr. Tyrone Kirchengast, Senior Lecturer, School of Law, University of New South Wales (Australia) Dr. Thomas Crofts, Associate Professor and Director, Sydney Institute of
Researchers from the Korean Institute of Technology Visit the Cybercrime Center
Speakers Dr. Seyon Jung, Research Fellow, Korean Institute of Criminology Dr. JeyHeyan Soung, Research Fellow, Korean Institute of Criminology (Australia) Dr. Hyuan Wook Chun, Deputy Director of Planning and Coordination, Korean Institute of Criminology
Applying to Grad School: What do you need? What should you look for in a PhD Program or a master'sprogram?
Speakers: Dr, Robert Haralick, Distinguished Professor, Executive Office, Ph.D. Program in Computer Science, CUNY Graduate Center
Center Hosts Cyber Security Professionals from East Asia/Pacific Region
Speakers: Professors Doug Salane and Adina Schwartz
How the Use of the Computer Fraud and Abuse Act Is Thwarting Research in Online Discrimination
Speakers: Esaha Bhandari, Staff Attorney, ACLU Speech, Privacy and Technology Project
Examining Technological Proficiency in the U.S. Far Right
Speakers: Tom Holt, Associate Professor, Michigan State University – School of Criminal Justice
Prepare Yourself for the Digital Battlefield: Skills for the Cyber Security Workforce
Speaker: Chris May, Technical Manager Workforce Development CERT, Software Engineering Institute Carnegie Mellon University
The Broken Web: Identifying Weaknesses and Strengthening Internet Security
Speaker: Steve Antoniewicz, VP of Security Solutions, Net2S, Inc. Steve_Antoniewicz Steve_Antoniewicz_slides
Trends in Cybercrime and Information Security Enforcement
Speakers: Alex Southwell, Esquire Gibson, Dunn & Crutcher – Intellectual Property, Crisis Management, Business crimes and Investigations Division
Maple Training
Speakers: Robert Lopez, Professor Emeritus, Rose Helman Institute Maplesoft Inc.
Academic Year July 2006-June 2007 "Metal - Memory Encryption"
Speakers: Jamie Levy, Graduate Student, Forensic Science M.S. Degree Program.
Digital Copier Security
Speakers: Paul DeMatteis, Dept. of Continuing Education and Professional Studies; Alan Brill*, Senior Managing Director, Kroll & Associates; Ed McLaughlin, President, Sharp Document Solutions Company of America.
Information Security Awareness
Speaker: William Dinnigan, CISSP * Director of Information Security Awarnes, New York Stock Exchange Euronext. Bill has the task of securing the trading systems of the New York Stock Exchange.
The Right and Wrong in Corporate Investigations: Lessons from the HP Scandal for Cyber-tracking
Speaker: Joel R. Reidenberg, Professor of Law, Fordham University School of Law, founding director of the Center on Law and Information Policy Fordham University School of Law. He is a legal authority on information technology law and policy.
Space Transition Theory of Cyber Crimes
Speakers: Dr. K.Jaishankar, Lecturer, Department of Criminology & Criminal Justice, Manonmaniam Sundaranar University,Tirunelveli, Tamil Nadu, India
Is the Government Creating Sex Offenders?
Speaker: Colleen Cassidy, Appellate Attorney, Federal Defenders, Inc.
Stepping Stone Attack Attribution in non-Cooperative IP Networks
Speaker: Youn Guan, Professor, Dept. of Electrical and Computer Engineering, Iowa State University.