<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://ccybers.org/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-03-31 10:25:28 GMT -->
	<url>
		<loc>https://ccybers.org/</loc>
		<lastmod>2025-01-28T20:21:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/media/news/</loc>
		<lastmod>2022-12-02T19:31:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/partners/</loc>
		<lastmod>2022-12-07T18:12:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/expertise/</loc>
		<lastmod>2022-12-08T18:02:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/about/history/</loc>
		<lastmod>2022-12-07T22:38:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/about/staff/</loc>
		<lastmod>2025-12-15T15:10:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/media/</loc>
		<lastmod>2022-12-01T00:06:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/support/</loc>
		<lastmod>2022-10-03T17:33:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/events/</loc>
		<lastmod>2022-12-07T19:10:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/about/mission-and-objectives/</loc>
		<lastmod>2022-12-01T17:36:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research-hub/</loc>
		<lastmod>2022-10-02T03:51:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/donate/</loc>
		<lastmod>2022-10-27T16:09:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contact-us/</loc>
		<lastmod>2022-12-08T11:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/terms-of-use/</loc>
		<lastmod>2022-06-22T22:31:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/about/</loc>
		<lastmod>2022-11-30T21:59:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/privacy-policy/</loc>
		<lastmod>2022-06-22T19:57:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/jonathan-manik/</loc>
		<lastmod>2025-12-12T20:34:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/avinash-jairam/</loc>
		<lastmod>2025-06-30T17:27:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/sumita-das/</loc>
		<lastmod>2025-06-12T21:46:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/doxing-how-a-darknet-shop-created-the-blackmail-as-a-service-business-model/</loc>
		<lastmod>2025-06-12T21:35:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/development-of-a-nationally-recognized-cybercrime-investigations-laboratory-and-research-facility/</loc>
		<lastmod>2025-06-12T17:32:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/understanding-what-it-really-takes-to-control-your-data-a-critical-evaluation-of-faceapp/</loc>
		<lastmod>2025-06-12T16:35:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/an-examination-of-harm-reduction-strategies-in-oxycodone-and-adderall-buyer-feedback-on-alphabay/</loc>
		<lastmod>2025-06-12T16:19:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/countering-the-complex-multifaceted-nature-of-nude-and-sexually-explicit-deepfakes-an-augean-task/</loc>
		<lastmod>2025-06-12T21:15:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/deconstructing-a-form-of-hybrid-investment-fraud-examining-pig-butchering-in-the-united-states/</loc>
		<lastmod>2025-06-12T20:50:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/emily-ives/</loc>
		<lastmod>2025-10-03T00:02:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/lessons-learned-from-dread-darknet-communities-how-and-why-are-fraudsters-targeting-the-elderly-to-be-victims-or-accomplices/</loc>
		<lastmod>2025-06-10T20:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/hidden-hate-analysis-of-hate-speech-on-a-darknet-forum/</loc>
		<lastmod>2025-06-10T20:54:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/e-taylor/</loc>
		<lastmod>2025-06-12T21:47:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/noah-cohen/</loc>
		<lastmod>2025-06-12T21:48:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/katrina-perry/</loc>
		<lastmod>2025-10-03T00:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/digital-retail-fraud-trends-schemes-victimology-and-scope-training/</loc>
		<lastmod>2025-06-27T16:41:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-enabled-firearms-trafficking-and-digital-retail-fraud-trends-schemes-victimology-and-scope-training/</loc>
		<lastmod>2025-05-27T00:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-enabled-firearms-trafficking-training/</loc>
		<lastmod>2025-05-27T00:36:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/analyzing-gaming-consoles-and-underground-player-communities-for-clearnet-investigations-training/</loc>
		<lastmod>2025-05-27T00:33:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/communications-platforms-in-cybercrime-training/</loc>
		<lastmod>2025-05-27T00:30:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/1010/</loc>
		<lastmod>2025-03-07T17:31:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/investigating-crime-and-non-traditional-spaces-gaming-consoles-and-underground-illicit-forums-training/</loc>
		<lastmod>2025-02-27T18:45:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/darknet-markets-forums-and-investigations-training/</loc>
		<lastmod>2025-02-27T18:41:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/digital-retail-fraud-webinar/</loc>
		<lastmod>2025-02-27T18:37:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2025/01/iot-data-sheet/</loc>
		<lastmod>2025-01-29T19:22:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/virtual-kidnapping-unraveling-the-tactics-of-this-fraud-webinar/</loc>
		<lastmod>2025-01-28T17:50:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-enabled-firearm-trafficking-webinar/</loc>
		<lastmod>2025-01-28T17:03:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/investigating-crime-and-non-traditional-spaces-gaming-consoles-and-underground-illicit-forums-webinar/</loc>
		<lastmod>2025-01-22T20:50:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-organized-crime-training/</loc>
		<lastmod>2025-01-22T20:47:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-enabled-human-trafficking-training/</loc>
		<lastmod>2025-01-22T20:45:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cryptocurrency-investigations-training/</loc>
		<lastmod>2025-01-28T18:21:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/clearnet-investigations-of-cyber-enabled-fraud-training/</loc>
		<lastmod>2025-01-22T20:40:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/internet-of-things-iot-database-training/</loc>
		<lastmod>2025-06-27T16:43:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cybernabled-human-trafficking-webinar/</loc>
		<lastmod>2025-01-29T00:13:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/expert-group-meeting-egm-to-discuss-opportunities-for-operationalising-ai-and-new-technologies-in-the-criminal-justice-sector/</loc>
		<lastmod>2025-01-22T20:51:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2024/10/faculty-vacancy-announcement/</loc>
		<lastmod>2024-10-07T14:36:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-enabled-human-trafficking-training-august-1-2024/</loc>
		<lastmod>2025-01-28T18:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/keeping-pace-with-the-evolution-of-illicit-darknet-fentanyl-markets-using-a-mixed-methods-approach-to-identify-trust-signals-and-develop-a-vendor-trustworthiness-index/</loc>
		<lastmod>2025-06-10T20:54:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/the-bull-and-millionaire-mike-a-look-at-darknet-and-securities-fraud/</loc>
		<lastmod>2025-06-10T21:48:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2024/07/ccybers-is-on-instagram/</loc>
		<lastmod>2024-10-09T16:12:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/michelle-d-miranda/</loc>
		<lastmod>2025-10-02T23:50:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-enabled-human-trafficking-training-june-6-2024/</loc>
		<lastmod>2025-01-28T18:23:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/the-seci-model-and-darknet-markets-knowledge-creation-in-criminal-organizations-and-communities-of-practice/</loc>
		<lastmod>2025-06-10T20:53:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/decoding-hidden-darknet-networks-what-we-learned-about-the-illicit-fentanyl-trade-on-alphabay/</loc>
		<lastmod>2025-06-10T20:53:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/melanie-knieps/</loc>
		<lastmod>2025-06-12T21:51:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/bryce-barthuly/</loc>
		<lastmod>2025-10-02T23:40:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-enabled-human-trafficking-webinar/</loc>
		<lastmod>2025-01-28T17:49:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/malware-as-a-service/</loc>
		<lastmod>2024-01-23T20:14:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/communications-platforms-in-cybercrime/</loc>
		<lastmod>2023-12-07T15:37:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/united-states-secret-service-usss-career-tracks/</loc>
		<lastmod>2023-10-12T16:27:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/skopenow-a-comprehensive-open-source-intelligence-platform/</loc>
		<lastmod>2023-10-12T16:28:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-clearnet-investigations-of-cyber-enabled-fraud-training-course-3/</loc>
		<lastmod>2023-08-07T03:13:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-communications-platforms-used-in-cybercrime-training-course-3/</loc>
		<lastmod>2023-06-08T05:14:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cryptocurrency-investigations-for-criminal-justice-agents-training-course-4/</loc>
		<lastmod>2023-05-31T22:14:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cryptocurrency-investigations-for-criminal-justice-agents-training-course-2/</loc>
		<lastmod>2023-05-31T21:49:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-clearnet-investigations-of-cyber-enabled-fraud-training-course-2/</loc>
		<lastmod>2023-06-08T05:15:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-communications-platforms-used-in-cybercrime-training-course-2/</loc>
		<lastmod>2023-05-31T22:08:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-communications-platforms-used-in-cybercrime-training-course/</loc>
		<lastmod>2023-05-31T22:06:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/darknet-markets-forums-and-investigations/</loc>
		<lastmod>2023-05-31T21:46:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-clearnet-investigations-of-cyber-enabled-fraud-training-course/</loc>
		<lastmod>2023-05-31T21:47:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cyber-organized-crime-training-course-2/</loc>
		<lastmod>2023-05-31T21:58:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cryptocurrency-investigations-for-criminal-justice-agents-training-course-3/</loc>
		<lastmod>2023-05-31T21:46:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-malware-as-a-service-training-course-2/</loc>
		<lastmod>2023-05-31T21:50:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-malware-as-a-service-training-course/</loc>
		<lastmod>2023-05-31T21:49:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-training-course-on-clearnet-investigations-of-cyber-enabled-fraud/</loc>
		<lastmod>2023-05-31T21:49:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cyber-organized-crime-training-course/</loc>
		<lastmod>2023-05-31T21:55:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/darknet-markets-forums-and-investigations-training-course/</loc>
		<lastmod>2023-05-31T22:09:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/darknet-markets-forums-and-investigations-training-course-2/</loc>
		<lastmod>2023-05-31T21:48:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cryptocurrency-investigations-for-criminal-justice-agents-training-course/</loc>
		<lastmod>2023-05-31T21:48:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/the-broken-web-identifying-weaknesses-and-strengthening-internet-security/</loc>
		<lastmod>2022-12-08T10:57:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/prepare-yourself-for-the-digital-battlefield-skills-for-the-cyber-security-workforce/</loc>
		<lastmod>2022-12-08T10:48:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/examining-technological-proficiency-in-the-us-far-right/</loc>
		<lastmod>2022-12-08T10:20:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/center-hosts-cyber-security-professionals-from-east-asia-pacific-region/</loc>
		<lastmod>2022-12-08T10:21:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/applying-to-grad-school-what-do-you-need-what-should-you-look-for-in-a-phd-program-or-a-mastersprogram/</loc>
		<lastmod>2022-12-08T10:49:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/researchers-from-the-korean-institute-of-technology-visit-the-cybercrime-center/</loc>
		<lastmod>2022-12-08T10:50:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/digital-technologies-and-revenge-pornography-examining-australian-legal-intervention/</loc>
		<lastmod>2022-12-08T10:24:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/fuzzy-cybersecurity-talk/</loc>
		<lastmod>2022-12-08T10:25:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/how-the-use-of-the-computer-fraud-and-abuse-act-is-thwarting-research-in-online-discrimination/</loc>
		<lastmod>2022-12-08T10:20:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/assessing-the-utility-of-nibrs-data/</loc>
		<lastmod>2022-12-08T10:26:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/cyber-security-capstone-research-presentations/</loc>
		<lastmod>2022-12-08T10:27:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/frontiers-of-usable-security-developers-administratros-and-systems-security/</loc>
		<lastmod>2022-12-08T10:28:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/trusted-code-the-missing-link-of-true-information-security/</loc>
		<lastmod>2022-12-08T10:29:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/from-causal-inference-to-personalized-healthcare/</loc>
		<lastmod>2022-12-08T10:30:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/friend-or-foe-your-wearable-devices-reveal-your-personal-pin/</loc>
		<lastmod>2022-12-08T10:29:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/a-spectral-based-clustering-algorithm-for-catergorical-data-using-data-summeries-with-an-application-in-criminal-justice-data/</loc>
		<lastmod>2022-12-08T10:19:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/a-smart-contract-for-boardroom-voting-with-maximum-voter-privacy/</loc>
		<lastmod>2022-12-08T10:18:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/intergrating-virtualization-and-cloud-computing-in-information-technology-education-and-research/</loc>
		<lastmod>2022-12-08T10:17:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/addressing-the-digital-divide-in-security-measuring-and-intervening-in-user-security/</loc>
		<lastmod>2022-12-08T10:04:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/advances-in-cybersecurity-higher-education-building-real-world-experience-before-you-graduate/</loc>
		<lastmod>2022-12-08T10:16:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/understanding-bias-and-item-missing-data-in-nibrs/</loc>
		<lastmod>2022-12-08T10:24:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/behind-the-scenes-of-ransomware/</loc>
		<lastmod>2022-12-08T10:14:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/a-study-of-similarity-in-brain-data/</loc>
		<lastmod>2022-12-08T10:13:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/computing-multiple-exponentiations-in-discrete-log-and-rsa-groups-from-batch-verification-to-batch-delegation/</loc>
		<lastmod>2022-12-08T10:12:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/betrfs-a-right-optimized-write-optimized-file-system/</loc>
		<lastmod>2022-12-08T10:06:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/towards-enabling-a-blockchain-based-cybersecurity-information-exchange-platform/</loc>
		<lastmod>2022-12-08T10:03:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/657/</loc>
		<lastmod>2022-12-08T10:02:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/computing-multiple-exponentiations-in-discrete-log-and-rsa-groups/</loc>
		<lastmod>2022-12-08T10:03:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/a-study-of-interaction-digitalization-and-motivational-affordances-of-wearable-systems/</loc>
		<lastmod>2022-12-08T10:04:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/autonomous-walker-to-improve-the-gait-of-persons-with-parkinsons-disease/</loc>
		<lastmod>2022-12-08T10:00:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/the-internet-of-things-iot-data-collection-and-analytics/</loc>
		<lastmod>2022-12-08T09:58:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/attacks-against-layer-ii-in-lans/</loc>
		<lastmod>2022-12-08T09:57:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/integrating-and-analyzing-social-media-health-data/</loc>
		<lastmod>2022-12-08T10:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/the-state-of-blockchain-systems/</loc>
		<lastmod>2022-12-08T10:05:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/partner/the-national-white-collar-crime-center/</loc>
		<lastmod>2022-12-07T18:11:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/partner/the-national-cyber-forensics-and-training-alliance/</loc>
		<lastmod>2022-12-07T18:10:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/partner/the-bureau-of-justice-assistance/</loc>
		<lastmod>2022-12-07T18:10:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-on-what-the-next-big-threat-is-in-2015-january-7-2015/</loc>
		<lastmod>2022-12-07T19:56:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-on-credit-card-theft-by-organized-criminal-groups-to-i-team-nbc-news-new-york-february-7-2017/</loc>
		<lastmod>2022-12-07T19:57:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-on-romance-scams-targeting-widows-divorcees-and-seniors-december-1-2017-2/</loc>
		<lastmod>2022-12-07T19:57:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-to-nbc-new-york-on-child-sex-dolls-april-27-2018-2/</loc>
		<lastmod>2022-12-07T19:58:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-to-nbc-new-york-and-nbc-boston-on-romance-scams-2018-and-2019-2/</loc>
		<lastmod>2022-12-07T20:00:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-on-romance-scams-targeting-widows-divorcees-and-seniors-december-1-2017/</loc>
		<lastmod>2022-12-01T15:42:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-to-nbc-new-york-on-child-sex-dolls-april-27-2018/</loc>
		<lastmod>2022-12-01T15:40:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/12/center-director-provided-expert-opinion-to-nbc-new-york-and-nbc-boston-on-romance-scams-2018-and-2019/</loc>
		<lastmod>2022-12-01T15:38:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/center-director-provided-expert-opinion-on-identity-theft-to-yahoo-finance-october-1-2021/</loc>
		<lastmod>2022-12-05T15:04:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/center-director-cbs-news-interview-on-identity-theft-july-14-2014/</loc>
		<lastmod>2022-12-07T21:02:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/center-director-cbs-interview-medical-identity-theft-july-28-2014/</loc>
		<lastmod>2022-12-07T20:03:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/center-director-nbc-news-interview-august-8-2014/</loc>
		<lastmod>2022-12-07T21:04:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/center-director-interview-nbc-new-york-february-9-2017/</loc>
		<lastmod>2022-12-07T20:57:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/center-director-guest-on-cuny-tv-show-criminal-justice-matters-march-27-2017/</loc>
		<lastmod>2022-12-07T20:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/center-directors-channel-4-tv-interview-on-child-sex-dolls/</loc>
		<lastmod>2022-12-07T20:56:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/interview-with-the-director-of-the-center-the-conversation-france/</loc>
		<lastmod>2022-12-01T00:48:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/when-a-smart-toaster-can-become-an-alibi/</loc>
		<lastmod>2022-12-01T00:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/2022/11/new-center-to-cybercrime-studies-website/</loc>
		<lastmod>2022-12-07T22:05:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/understanding-the-intersection-between-technology-and-kidnapping-a-typology-of-virtual-kidnapping-2/</loc>
		<lastmod>2023-07-08T04:19:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/discrimination-stigmatization-and-surveillance-covid-19-and-social-sorting-2/</loc>
		<lastmod>2022-12-01T03:44:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/state-of-ohio-v-ross-compton-internet-enabled-medical-device-data-introduced-as-evidence-of-arson-and-insurance-fraud/</loc>
		<lastmod>2022-12-01T03:40:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/enabling-mass-surveillance-data-aggregation-in-the-age-of-big-data-and-the-internet-of-things/</loc>
		<lastmod>2022-12-01T03:37:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/child-sex-dolls-and-robots-more-than-just-an-uncanny-valley/</loc>
		<lastmod>2022-12-01T17:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/womens-radicalization-to-religious-terrorism-an-examination-of-isis-cases-in-the-united-states/</loc>
		<lastmod>2022-12-01T03:23:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/online-child-sexual-abuse-material-prosecuting-across-jurisdictions/</loc>
		<lastmod>2022-12-01T03:14:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/corporate-liability-of-hotels-criminal-sanctions-for-online-sex-trafficking/</loc>
		<lastmod>2022-12-01T03:18:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/training-and-technical-assistance-program-clearnet-and-darknet-spaces/</loc>
		<lastmod>2025-12-29T17:14:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/research/iot-database/</loc>
		<lastmod>2025-06-30T17:28:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cryptocurrency-investigations-for-criminal-justice-agents-webinar/</loc>
		<lastmod>2022-12-01T17:14:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-darknet-markets-forums-and-investigations-webinar/</loc>
		<lastmod>2022-12-01T00:11:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-encrypted-communication-platforms-webinar/</loc>
		<lastmod>2022-12-01T00:11:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-cyber-organized-crime-webinar/</loc>
		<lastmod>2022-12-01T00:12:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/jjay-ncfta-clearnet-investigations-of-cyber-enabled-fraud-webinar/</loc>
		<lastmod>2022-12-01T00:08:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/matluba-khodjaeva/</loc>
		<lastmod>2022-11-30T21:34:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/wendy-obrien/</loc>
		<lastmod>2025-06-12T22:01:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/trends-in-cybercrime-and-information-security-enforcement/</loc>
		<lastmod>2022-10-09T18:52:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/maple-training/</loc>
		<lastmod>2022-10-09T18:34:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/academic-year-july-2006-june-2007-metal-memory-encryption/</loc>
		<lastmod>2022-10-09T18:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/digital-copier-security/</loc>
		<lastmod>2022-10-09T18:25:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/information-security-awareness/</loc>
		<lastmod>2022-10-09T18:22:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/the-right-and-wrong-in-corporate-investigations-lessons-from-the-hp-scandal-for-cyber-tracking/</loc>
		<lastmod>2022-10-09T18:20:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/space-transition-theory-of-cyber-crimes/</loc>
		<lastmod>2022-10-09T18:17:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/malware-as-a-service-webinar/</loc>
		<lastmod>2023-01-26T01:48:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/is-the-government-creating-sex-offenders/</loc>
		<lastmod>2022-12-01T00:14:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/stepping-stone-attack-attribution-in-non-cooperative-ip-networks/</loc>
		<lastmod>2022-10-09T18:10:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/event/ai-governance-and-risks-to-community/</loc>
		<lastmod>2022-12-07T19:50:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/shweta-jain/</loc>
		<lastmod>2025-06-12T22:02:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/kenji-logie/</loc>
		<lastmod>2025-10-02T23:51:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/jana-arsovska/</loc>
		<lastmod>2025-10-02T23:51:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://ccybers.org/contributors/marie-helen-maras/</loc>
		<lastmod>2025-06-12T21:10:05+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
