• Profile Photo

    Adam's Antics

    As you may know, I am co-chair of the New York City Bar Association’s committee on Technology, Cyber and Privacy Law. At our December meeting we discussed a new free technology on the Internet by OpenAI called C […]

  • Profile Photo
  • Profile Photo

    Adam Scott Wandt's profile was updated
  • Profile Photo

    Adam Scott Wandt changed their profile picture
  • Profile Photo

    Adam's Antics

    It is clear to me that women face unique problems in the workplace that their male counterparts do not have. One of these problems is known as the gender wage gap. Most estimates show women only earning about 85% […]

  • Profile Photo

    Tony's Thoughts

    Adam Scott Wandt commented on the post, Facebook Under Scrutiny for Breaches by Political Data Firm Cambridge Analytica!

    I guess my spell check does not work in this browser for some reason 🙂
    Sorry

  • Profile Photo

    Tony's Thoughts

    Adam Scott Wandt commented on the post, Facebook Under Scrutiny for Breaches by Political Data Firm Cambridge Analytica!

    This is not complicated at all. Facebook comprised the security of its users for the convenience of their Facebook Login abilities.

    These issues are not new for Facebook. In 2006 I created a Facebook app […]

  • Profile Photo

    Adam's Antics

    It’s not often a Braking News Alert brings me to tears. But at 11:50 last night, a BBC Alert announcing the death of Dr. Stephen Hawking did just that. Dr. Hawking has been a central figure in my life. Someone I […]

  • Profile Photo

    Adam's Antics

    Tuesday afternoon: media declares major NYC area snowstorm for Wednesday

    Tuesday 9:17pm: I post a message to my courses Slack channel advising students that Wednesday’s 6PM class will be moved online to a […]

  • Profile Photo Profile Photo
  • Profile Photo Profile Photo
  • Profile Photo

    Academic Technology in Higher Education

    I am interviewing for a new part-time NETWORK ADMINISTRATOR AND TECHNOLOGIST to work within and manage the TARDIS lab. The lab’s primarily serves the the MPA program. The specifics about the pos […]

  • Profile Photo

    Academic Technology in Higher Education

    LAST CHANCE TO REGISTER:

    ONLINE EDUCATION: Successes, Challenges, and Best Practices

    2nd Annual All Day CUNY-wide Conference

    April 8, 2016, 9AM – 5PM

    John Jay College of Criminal Justice 5 […]

  • Profile Photo

    Adam's Antics

     

    If a corporation is a person – Why can’t it vote? Simple: it’s an immature underage person. #adamsantics

  • Profile Photo

    Adam's Antics

    Adam Scott Wandt commented on the post, Disk Speed Test: Promise Pegasus R6 (RAID 5)

    Alec makes some very good points. However; that is why I always keep multiple RAID units that sync between themselves on a pre determined basis after verifying integrity. #smartdataprotection

  • Profile Photo

    Adam's Antics

    ghost_gunner

     

    I have spent the past few years researching the emerging field of 3D Printing. I presented on the topic at a NYS legislative committee roundtable. I warned at the annual meetings of both Academy of Criminal Justice Science and the American Society of Criminology that within the next 1-3 years, a viable metallic printing solution will become available. I predicted that once it does, chaos will follow. The ability to print full metallic small weapons and parts of larger weapons from home is a very dangerous ability for anyone to have. These weapons would not have serial numbers and would be untraceable.

    I have been warning about it for 3 years… and now that has finally arrived.

    Dubbed the “Ghost Gunner” this $1,200 device takes solid aluminum blocks and using a technology called computer-numerically-controlled milling, gradually grinds away at a solid block of aluminum until only the design is left. The process is completely computer controlled. The user just inputs the design (weapons schematics are available online) inserts a block of Aluminum and “hits” go. Many hours later a gun part made of solid aluminum emerges.

    This technology has been used for years in iPhone and other electronics manufacturing. However, for the first time, the technology is being made affordable enough for home use.

    (Wired Ran a Story on This Yesterday)

    Here is where you can buy your very own “Ghost Gunner.”

    Computer-numerically-controlled mills can make very dangerous objects. Now that they are being sold for home use manufacturing weapons without serial numbers has become easy. It is my belief that this type of technology is dangerous and should be regulated at both the Federal and State level.

    One option could be to require federal registration for sale or ownership. Another policy option could require licensure for these devices.

    I believe Congress and the States should pass legislation categorizing this device and institute legislation to keep these devices from being misused on a large scale.

    There is not much time before thousands of these printers will be shipped around America.
    I believe one was used to print this 80% Lower AR Receiver. Note: “315 In Stock.”
    A possible scenario to leave you with: a criminal prints out a functioning small firearm and uses it to kill someone. The criminal can just put the firearm back in the machine that created it. The machine could then turn the murder weapon to dust.
    Adam Scott Wandt, J.D., M.P.A., is an Assistant Professor of Public Policy at John Jay College of Criminal Justice, where he serves on both the Graduate faculty of the Digital Forensics and Cyber Security program and the Masters of Public Administration in Inspection and Oversight program. Professor Wandt is an Attorney and Counselor-at-Law in the State of New York.
    Media requests on this issue should be sent to the attention of apiyapinansook@jjay.cuny.edu with “Ghost Gunner” clearly identified in the subject line.

    Professor Wandt On Twitter: @Prof_Wandt

  • Profile Photo

    Adam's Antics

    iPhone 6 vs iPhone 6 Plus

    Being that my last blog was of such a serious nature… I am delighted to be blogging on something much more uplifting: The release of the iPhone 6 and iPhone 6 Plus.

    I have made several different videos of varying depths:  unboxing, examining, discussing, and comparing these phones.

    Full 45 Minute  (Six and Six Plus): Unboxing, Setup and Fist Impressions 

    Short 5 Minute (Six and Six Plus): Unboxing Only  

    The iPhone 1-6 Showdown

  • Profile Photo

    Adam's Antics

    The-Dark-Knight_Lucius-Fox-620x287

    As a Professor, attorney, and technologist, I deliver many academic lectures at John Jay College of Criminal Justice, lecture at conferences to professional organizations, and train law enforcement around the country. In 2012, I began warning of FinFisher, a German-based company (previously U.K.-based) that produces and sells computer intrusion systems, including remote monitoring solutions, and had recently developed the ultimate spyware for smartphones and computers.

    Back then, details of FinFisher and its software were not publicly available. The company is secretive as its clients are government intelligence agencies. Some of FinFisher’s clients include nations with poor records on human rights, personal liberties, and privacy, including Mongolia, Pakistan, Vietnam, Nigeria, and Singapore. FinFisher has also reportedly sold software to intelligence communities in South Africa, Australia, Belgium, Slovakia, and the Netherlands.

    In 2012, there was little information publicly available as to the full capabilities and reach of FinFisher’s software products. However, since then, information has slowly leaked out through WikiLeaks and other reputable sources. Today, FinFisher is known to produce the most powerful commercial weaponized surveillance malware software packages on the planet.

    Two products of significance are FinSpy PC (computer spyware) and FinFisher Relay (smartphone spyware), which when installed grant the ability to intercept all files/documents and communications, such as those over Skype, email, and even video and audio through the webcam and microphone. These two software products can be remotely “pushed” (installed without the user’s knowledge or actions via a Trojan Horse or other method) to any computer or smartphone. This includes OS X, Windows and Linux computers, as well as Android, iOS, BlackBerry, Symbian, and Windows mobile devices. Users of these devices do not have to be anywhere near the vicinity of the person installing the malware. Furthermore, it is nearly impossible to identify that the malware has been installed without conducting a deep forensic analysis.

    Disturbingly, researchers at citizenlab.org published evidence and reports showing the use of FinSpy PC and FinFisher Relay against journalists, activists, and political non-desirables around the world by government intelligence agencies. But at least the software was only available to international government intelligence agencies and generally kept out of the hands of cyber criminals… until now.

    In 2013, during a presentation to the United States Association of Inspectors’ General, I warned that it was only a matter of time until FinFisher’s software would leak out on the web, becoming accessible to cyber criminals and others with malicious intent.

    That day has arrived.

    Yesterday, on September 15, 2014, Julian Assange, WikiLeaks Editor-in-Chief, allowed both FinSpy PC and FinFisher Relay to be openly published on WikiLeaks.org. In other words, as of yesterday, millions of cyber criminals around the world have access to a weaponized surveillance malware package that can be installed with very little effort, giving access to almost all the data on a user’s computer or smartphone.

    Within minutes of the site going live, I received a barrage of communications via phone, email, Twitter, and text message from students, law enforcement, and researchers around the world. Most people just wanted to talk about the release of the software, while others asked how long it would take me to download and analyze the software.

    Before lunchtime, my lab at John Jay College of Criminal Justice (The Advanced Research Domain for Information Security in Public Policy) had downloaded all available software and documentation. While my team and I obviously cannot deploy the software “in the wild,” we are able to analyze its code to determine exactly how virulent the software really is. We will be devoting a significant amount to time in the near future to analyze this threat and report our findings.

    There is a glimpse of bright light shining through the murky water… Julian Assange and WikiLeaks did not release this software for cyber criminals to obtain and use, although it will be an unintended result. Their primary goal was to allow security researchers to analyze the code to come up with methods to protect us all (the public). While we are all at risk today, you can be sure that future software updates from Apple, Google, and Microsoft will contain significant security improvements rendering this software obsolete. That is, of course, until FinFisher updates the code within their products, and the cycle starts over again…

    Adam Scott Wandt, J.D., M.P.A., is an Assistant Professor of Public Policy at John Jay College of Criminal Justice, where he serves on both the Graduate faculty of the Digital Forensics and Cyber Security program and the Masters of Public Administration in Inspection and Oversight program. Professor Wandt is an Attorney and Counselor-at-Law in the State of New York.

    Media requests on this issue should be sent to the attention of apiyapinansook@jjay.cuny.edu with FinFisher clearly identified in the subject line.

    Professor Wandt On Twitter: @Prof_Wandt

  • Profile Photo

    Academic Technology in Higher Education

    Adam Scott Wandt commented on the post, CUNYFirst: In Last Place

    City University of New York
    Requests proposals by 3 p.m. on Sept. 12 to migrate the hosting for the CUNYfirst financial, human resources, campus solutions and ancillary operations applications to a new […]

  • Profile Photo

    Academic Technology in Higher Education

    Thumbnail

     

    It’s the first day of the semester and once again CUNYFirst is down. (For the second day in a row). Since I am constantly hearing that CUNYFirst cost around $1Billion to fully implement… I must ask […]

  • Load More