Click a link below to access the abstracts for that type of presentation:
Looking for a specific student or presentation title? Select the Control and F keys on a PC, or the Command and F keys on a Mac, to search this page.
Asynchronous Virtual Presentations
Adversarial networks engaged in Immigration Security in the Western U.S.: A Visual Analysis
Presenter(s): Paige Bruzdzinski
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering Immigration Security in the Western US is presented.
Adversarial networks engaged in Immigration Security: Transnational Criminal Organizations in the Western US: A visual analysis
Presenter(s): Aidan Rhatigan
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in countering Transnational criminal organizations in the Western US is presented.
Adversarial networks engaged in Migration and Watchlist Encounters in the Eastern US: A visual analysis
Presenter(s): Taylor Hall
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering migration and watchlist encounters in the Eastern US is presented.
Adversarial networks engaged in terrorism in the Western US: A visual analysis
Presenter(s): Russell Dietz
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering in the is presented.
CEHC 390 External Internship: NYS Missing Persons Clearinghouse
Presenter(s): Otto Spielberger
Showcase Advisor: Mayra Raxon
Abstract: Present on my internship and experiences at the NYS Missing Persons Clearinghouse
cybersecurity risk and compliance
Presenter(s): Ikram Ramdani
Showcase Advisor: Ariel Pinto
Abstract: will be relevant to these topics; Cybersecurity Risk Management, Governance, Risk, and Compliance (GRC), Cyber Resilience, Cybersecurity Economics, Risk Governance, Cybersecurity Frameworks and Standards, Cyber Incident Impact.
Drone Lab
Presenter(s): Adnan Khan
Showcase Advisor: Mayra Raxon
Abstract: This project highlights my experience in drone lab internship, where I learned about drones, robotics, and new technologies. During this internship, I worked with tools such as drones, Roomster, and Sphero robots, which helped me understand how modern technology advanced and it works. I also learned about artificial intelligence features in drones and robotics, such as cameras that can detect movement and follow objects.
Experiential Learning Experience
Presenter(s): Ashley Crandall
Showcase Advisor: Mayra Raxon
Abstract: This presentation will depict my experience while interning at NYS DHSES. I will describe what I learned, how it helped me grow in my field, and the skills that I am able to take with me throughout my future careers.
New York State's Radiological Emergency Preparedness Program (REPP)
Presenter(s): Brendan Cooper
Showcase Advisor: Mayra Raxon
Abstract: I will provide an overview of the work I have done as an intern for the Radiological Emergency Preparedness Program, part of New York State's Office of Emergency Management. I will detail the process of planning for radiological emergencies in New York, such as establishing emergency planning and evacuation zones, and describe how I assisted in producing training materials for first responders in communities around nuclear facilities as an intern.
Team Dynamics Training Tutorial
Presenter(s): Chelsea Ben Aoumeur
Showcase Advisor: Mayra Raxon
Abstract: Team Dynamics (TDX), the ticketing system used by the University at Albany’s Information Technology Service (ITS) Department is similar to most standard ticketing systems. However, through having an internship with ITS it has become clear that there could be simpler ways to teach onboarding student-workers how to classify common technology incidents and service requests into TDX. This project showcases a gamified single-player tutorial on common calls and scenarios that student-workers receive while interning at ITS and therefore can teach them how to use the basics of TDX. Via the training, the rate of time it takes student-workers to learn the tool may decrease.
Understanding Behind the Scenes of UAlbany Athletic Training
Presenter(s): Skylar Baur
Showcase Advisor: Mayra Raxon
Abstract: Looks into emergency action plans, weather plans, what to do when an athlete, ref or coach get hurt.
Demonstrations
NYSP Driving Simulator
Presenter(s): Matthew Ranaudo, Brandon Acevedo
Showcase Advisor: Eric Best
Abstract: With New York State ranking 50th in terms of the number of 18-year-olds holding a valid driver's license, this has turned into a problematic reality for recruitment in the New York State Police. As a result of this, through the program "BeamNG.Drive," the Mobile Sensor Lab has begun development on a virtual driving simulator to help give NYSP recruits driving experience before taking their Emergency Vehicle Operators Course (EVOC). This simulator is not meant to replace a recruit's time behind the wheel, but to help increase their confidence, familiarity, and driving capabilities.
Posters
Adversarial networks engaged in Critical Infrastructure Security: Disruptive and Destructive Attacks in the Western US: A visual analysis
Presenter(s): Travis Tomaselli
Showcase Advisor: Michael Young
Abstract: Each year, the Department of Homeland Security identifies high-priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks, a visual network analysis of activity and entities engaged in and countering Critical Infrastructures Disruptive and Destructive attacks in the Western US is presented.
Adversarial networks engaged in economic espionage and influence in the Eastern US: A visual analysis
Presenter(s): Tara O'Brien
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering economic espionage and influence in the Eastern US is presented.
Adversarial networks engaged in economic espionage in the Western US: A visual analysis
Presenter(s): Brenda Horan
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering economic espionage in the Western US is presented.
Adversarial networks engaged in Illegal Drugs in the Western US A visual analysis
Presenter(s): Timothy Smith
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent transnational criminal organizations, traffick illegal drugs like Fentanyl into the country through a multiude of different methods . To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering Illegal Drugs in the Western US is presented.
Adversarial networks engaged in Nation-State Influence and Transnational Repression in the Eastern U.S. : A visual analysis
Presenter(s): Abigail Jenkins
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations,
adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering Nation-State Influence and Transnational Repression in the Eastern U.S. is presented.
Adversarial networks engaged in terrorism in the Eastern US: A visual analysis
Presenter(s): Allison Mittnight
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering terrorism in the Eastern US is presented.
Adversarial networks engaged in terrorism in the Eastern US: A visual analysis
Presenter(s): Jesenia Mathew
Showcase Advisor: Michael Young
Abstract: Each year, the Department of Homeland Security identifies high-priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations,
adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks, a visual network analysis of activity and entities engaged in and countering terrorism in the Eastern US is presented.
Adversarial networks engaged in terrorism in the Western US: A visual analysis
Presenter(s): Olivia Miller
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering terrorism in the Western US is presented.
Adversarial networks engaged in Transnational Criminal Organizations in the Eastern US: A visual analysis
resenter(s): Brandon Acevedo
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actor's threats cooperate in adversarial networks. To promote understanding of these networks a visual network analysis of activity and entities engaged in and countering Transnational Criminal Organizations in the Eastern is presented.
Adversarial Networks Engaged in Transnational Repression & Terrorism in the Eastern US: A Visual Analysis
Presenter(s): Sam Brown
Showcase Advisor: Michael Young
Abstract: Each year, the Department of Homeland Security identifies high-priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors cooperate in adversarial networks. To promote understanding of these networks, a visual network analysis of activity and entities engaged in transnational repression & terrorism in the Eastern US is presented.
AI effect on EM
Presenter(s): Delwyn De Los Santos
Showcase Advisor: DeeDee Bennett Gayle
Abstract: Artificial intelligence (AI) is transforming emergency management by improving how disasters are predicted, monitored, and responded to. AI systems can analyze large amounts of data to forecast natural disasters, detect patterns, and support faster decision-making during emergencies. It also helps allocate resources more efficiently and improve communication with the public. Despite challenges like privacy and reliability concerns, AI enhances overall preparedness, response, and recovery efforts in emergency management operations.
Are drones and counter drones effective for portal patrol
Presenter(s): Joseph Paone
Showcase Advisor: DeeDee Bennett Gayle
Abstract: This presentation will be about how effective drones and counter drones are for boarder patrol use. Is it useful and is it really effective in the ways it says they are. We will look into the surveillance end, tracking , and many more.
Are Emergency Alerts Working? A SWOT Analysis of the Wireless Emergency Alerts System
Presenter(s): Matthew Johnson
Showcase Advisor: DeeDee Bennett Gayle
Abstract: In this presentation, I evaluate the use of Wireless Emergency Alerts in Emergency Management. This presentation uses a SWOT to analyze the strengths, weaknesses, opportunities, and threats of the WEA system. This is important because it analyzes how effective this system is and where improvements can be made. Also, doing a SWOT analysis like this leads to better decision making for crisis communication and public safety.
The Benefits of CTFs
Presenter(s): Sydney Lawrence
Showcase Advisor: Stephen Coulthart
Abstract: My presentation will include information on why Capture the Flag (CTF) competitions are beneficial in training future OSINT and cyber security analyst.
Beyond the Undocumented: Examining Immigrant Vulnerability and Resilience in Disaster Contexts
Presenter(s): Yvonne Dadson
Showcase Advisor: DeeDee Bennett Gayle
Abstract: This examines the vulnerability and resilience of immigrant populations to disasters in the United States through an interdisciplinary framework integrating disaster studies, migration studies, and social vulnerability theory. Employing a modified photovoice methodology, the study engages 30 immigrant participants who document their disaster experiences through photography and narrative, focusing on hurricanes, floods, and wildfires. Centering immigrant voices without requiring legal status disclosure, the study draws on purposive sampling across diverse countries of origin, socioeconomic positions, English proficiency levels, and disaster types. Three research questions guide the investigation: how immigrants perceive vulnerability and resilience; what factors influence their differential disaster risk; how they mobilize resources for recovery; and what recommendations they offer for improving disaster policies. The study advances theoretical understanding through an integrated conceptual framework capturing the interplay between structural vulnerability and immigrant agency, generating actionable evidence for culturally responsive disaster preparedness and more inclusive emergency management policies and practices.
Border Security from Above
Presenter(s): Jacinto Aviles
Showcase Advisor: DeeDee Bennett Gayle
Abstract: My presentation will be on the role of unmanned aerial vehicles (UAVs) being implemented on the U.S. border. By using current technological studies and government reports, I'll be examining the effectiveness of drones alongside the U.S. border and how they can aid Border Patrol in securing the border. I'll explore how UAVs can reduce blind spots, support Border Patrol operations, and enhance response times and the multitude of benefits Border Patrol can gain from UAVs. I'll also show the concerns that come with the use of UAVs, like breach of privacy, operational limitations, and cost. Overall, I'll highlight the positives and negatives that come with implementing UAVs at the U.S. border. My presentation will show how UAVs can shape the future of border security and the ethical concerns that'll come alongside it.
CEHC 391 Research Internship in Emergency Preparedness, Homeland Security & Cybersecurity
Presenter(s): Paul Thomas
Showcase Advisor: Samantha Penta
Abstract: This presentation examines the impacts of natural disasters on communities at a large scale. Also goes over technological disasters that have a more dangerous effect than natural disasters. In this internship, I discuss the community, how they respond, and whether they blame the government for poor planning and aid distribution. Also, later, I will work on collecting data analysis on Reddit and how social media can impact how people behave before and after disasters have occurred, and I will go over this after spring break.
Chicago Heat Wave 1995
Presenter(s): Tinashe Chinamasa
Showcase Advisor: Amber Silver
Abstract: CHICAGO HEAT WAVE 1995
This research examines the implications of the 1995 Chicago heat wave and the populations most affected by the disaster. The study analyzes which racial demographics experienced the highest mortality and explores possible reasons why certain groups were more vulnerable. It also investigates both the immediate and longer-term consequences of the heat wave beyond death, including health and social impacts on affected communities. In addition, the research evaluates whether an extreme heat event of similar magnitude could occur again. Finally, the study discusses how government responses evolved after the disaster and the measures that have since been implemented to reduce the number of deaths in the event of future heat waves.
Cyber Threats using Artificial Intelligence in Drones
Presenter(s): Surya Muthukrishnan
Showcase Advisor: Frederick Hintermister
Abstract: Artificial Intelligence (AI) is rapidly reshaping drone technology, expanding its capabilities while introducing significant cybersecurity risks. This project examines how cyber threat actors exploit vulnerabilities in AI‑enabled drones to target individuals, organizations, and critical infrastructure. It provides an overview of drone systems, explains how AI enhances navigation, surveillance, targeting, and autonomy, and analyzes the resulting ethical, privacy, and security challenges. The Russia–Ukraine war is highlighted as a real‑world example where AI‑driven drones have become a testing ground for advanced surveillance and weaponized systems. As drones evolve toward greater autonomy and reduced human oversight, the potential for misuse and uncontrolled escalation increases. The project concludes by evaluating current drone regulations and emphasizing the need for stronger, adaptive governance to mitigate cyber risks and prevent future AI‑enabled drone attacks.
Disasters as Destabilizers: An Examination of Dissensus and Instability Following Extreme Events
Presenter(s): Lexie Armann
Showcase Advisor: Samantha Penta
Abstract: This presentation focuses on how disasters can create dissensus and instability in communities, effecting the efficiency of recovery operations. Using a variety of data, including open source data, survey data, interviews, and posts from Reddit, we examine what behaviors manifest after a disaster, the conditions that facilitate it, and how event characteristics shape it.
Disaster Studies Lab
Presenter(s): Allison Mittnight
Showcase Advisor: Alex Greer
Abstract: This project focuses on how disasters can bring communities together or apart, and the sociological effect that it has on people. Community census and dis census along with government trust and mistrust are among the topics researched and studied. Online influences and forms are studied on their role in this overall feeling.
Disaster Studies: Unsatisfaction with disaster response
Presenter(s): Danny Sharka
Showcase Advisor: Alex Greer
Abstract: For this presentation, me and my CEHC 391 classmates will speak about the results of a disaster and analyze people's reactions to disaster response. We will be using websites such as Reddit to see how people feel about government response after disaster strikes. We will be touching on how this is a root of people distrusting the government and spreading their disdain towards them on social media. Well also analyze how people act after disaster strikes.
DJI Neo Light Sensor Drone
Presenter(s): Joseph Franz, Nicholas St. Ledger, Tyler Montanye
Showcase Advisor: Eric Best
Abstract: Our project demonstrates how a light sensor can be integrated with a DJI Neo drone to enhance environmental awareness and automated response. The system detects changes in light intensity and uses that data to trigger actions such as movement adjustments or data recording. By combining sensor technology with drone mobility, the project highlights how autonomous aerial systems can be used for applications like environmental monitoring, search and rescue, and smart data collection. This presentation explores how light-based sensing can expand the capabilities of small drones in real-world situations.
Detecting Threats In Real Time
Presenter(s): Adrianna Rodriguez
Showcase Advisor: DeeDee Bennett Gayle
Abstract: Alert and warning systems are an important part of modern emergency management and cybersecurity. The concept of emergency alerts is how simple alerts are more effective than ones that are more difficult to comprehend. Emergency alerts are usually always seen through message channels such as text messages, social media platforms, mobile alerts, etc. This is done to catch everyone’s attention. Since these channels seem to limit how much information can be posted at once, the importance of simple messages during emergencies is stressed throughout this technology.
Does the Future Belong to Human-Machine Collaboration? (AI Driven Predictive Analytics)
Presenter(s): Kayvo Charles
Showcase Advisor: DeeDee Bennett Gayle
Abstract: Will having AI run through simulation and giving real time solutions help save more lives than human decision making? The pros and Cons and what future does that leave humanity
Drone Glass Breaker
Presenter(s): Keven Zepeda, Ethan Suby
Showcase Advisor: Eric Best
Abstract: For my presentation, we will be discussing the process of working on a glass-breaking mechanism for the avatar 2. We will be describing the sketching and designing aspects of creating this glass breaker for the Police Department. We will also be demonstrating the different 3D printed prototypes and what struggles we faced when creating this glass breaker. We will also be going over the motors and electrical wiring that were used to make this into a spring-loaded glass breaker.
Economic Coercion and Market Manipulation in Sino American Rare Earth Mineral Trade
Presenter(s): Trevor Pettit
Showcase Advisor: Michael Young
Abstract: This project examines how federal stockpiling, foreign export controls, and geopolitical competition shape rare earth mineral price volatility and supply chain risk between the United States and China. Using weekly price tracking data from Chinese and American markets, the Pettit Mineral Index measures divergence across gallium, germanium, antimony, neodymium, terbium, and other critical inputs. Findings show that U.S. strategic investment and reserve expansion increase short term domestic prices while signaling long term supply independence. Chinese market responses demonstrate price sensitivity to demand shifts and policy changes. Network analysis maps how state actors, private firms, and allied partners interact through export controls, trade negotiations, and investment flows. Results indicate that mineral access functions as a coercive economic lever that directly affects Western United States advanced manufacturing, defense production, and industrial competitiveness. This study highlights how strategic mineral policy reshapes market equilibrium and geopolitical leverage.
Economic Manipulation and Financial Coercion the Eastern United States
Presenter(s): Sean McKenna
Showcase Advisor: Michael Young
Abstract: Each year the Department of Homeland Security identifies high priority threats to the United States of America in the annual Homeland Threat Assessment. One of the challenges of responding to these complex threats to our public safety, border security, critical infrastructure, and economy is how violent extremists, transnational criminal organizations, adversarial nation-states, and malicious cyber actors threats cooperate in adversarial networks. To promote understanding of these networks, a visual network analysis of activity and entities engaged in and countering economic manipulation and economic coercion in the Eastern US is presented.
Emergency Management Students in U.S. Academic Institutions: Demographics and Workforce Readiness
Presenter(s): Nisa Albert
Showcase Advisor: DeeDee Bennett Gayle
Abstract: This research investigated how students value the knowledge, skills, and abilities identified by previous research as important to the field of disaster management. This study surveyed students currently enrolled in emergency management programs across several states, assessing their demographics, student body, field interests, and workforce readiness. Unlike other fields of study, most students gained interest in emergency management as a major based on previous work or volunteer experience in the field. Using several pre-established models on core competency, systems theory, and interdisciplinarity of the field, the findings indicate that the age of the student may be a predictor for how they value the importance of politics and policy, decision-making, and geographic differences on the management of disasters. By understanding student motivations, learning preferences, and perceived competencies, educators can tailor their programs to better equip students with the comprehensive skill set needed to succeed in the emergency management field.
Ethics and negative Impact of AI facility
Presenter(s): Seth Johnson, Christian Loveless, Joshua Lee, Justin Catalan, Xiomara Williams
Showcase Advisor: Jonathan Crispino
Abstract: Generative AI and its impact on marginalized communities has increased over the course of the past several years, which has resulted in irreparable effects on the environment, whilst also multiplying the world’s need for water and energy. The rapidly increasing demand for high level AI systems, has caused a thriving domain of information and usage for the upper and middle class citizens while leaving those who are disadvantaged to suffer the consequences of corporations haphazardly uprooting communities. Practices such as energy caps, renewable energy mandates, and grid contribution requirements, among many other tried and tested methods have been shown in states such as Virginia and California to have been effective. Overall the problems that generative AI has produced such as increased energy demands and displacement as well as environmental emissions has been shown to be positively affected by stringent government oversight and conscientious management of privately owned AI.
Examining Peer to Peer Professional Support for PCP to Reduce Stigma and Improve Access to MOUD in Albany Ny
Presenter(s): Christopher Rivas
Showcase Advisor: Jill Cofield
Abstract: Stigma towards opioid use disorder remains a significant barrier to expanding MOUD access in primary care settings. The stigmatizing beliefs among health care providers can reduce willingness to prescribe MOUD and limit support for policies designed to increase treatment access. Stigma experienced by patients in primary care offices can become internalized, reducing the likelihood that patients will seek care in the future and worsening health outcomes for vulnerable populations. There are several factors contributing to stigmatizing attitudes including limited knowledge of addiction medication, enacted stigma within the healthcare system, and the broader social stigma towards individuals seeking MOUD treatment. The new efforts to increase MOUD education and develop peer to peer professional support networks can help overcome some of these systemic barriers and improve access to life saving MOUD care.
Facial Recognition is the Future
Presenter(s): Quinn Conlen
Showcase Advisor: DeeDee Bennett Gayle
Abstract: My presentation is focused on facial recognition and its uses for law enforcement. I'll be speaking about the background behind the first facial recognition system created along with strengths and weaknesses with the current facial recognition technology. Also, I will be discussing where we can go from here with all these advancements in technology constantly happening. Even though the system is not perfect yet there are many ways in which we can increase the effectiveness of it.
The Flint Water Crisis Causes, Consequences, and Policy Lessons
Presenter(s): Matthew Johnson
Showcase Advisor: Amber Silver
Abstract: In this case study analysis, the Flint water crisis is examined to understand the environmental, political and public health factors that contributed to the lead contamination of the Flint River drinking water that state officials switched to. This analysis talks about how the state officials made the decision to switch the drinking water supply from Detroit to the Flint River without the correct use of corrosion inhibitors that caused residents to be exposed to lead in their water and elevated blood lead levels. This case study dives into the role the government had, including local, state and federal levels, in identifying and responding to this crisis. Also, this case study analysis looks at how community members and researchers showed early warning signs. Finally, this analysis also explored the public health response and recovery efforts including the replacement of infrastructure, policy reforms and public education programs.
The Future of Wireless Emergency Alerts
Presenter(s): John Peartree
Showcase Advisor: DeeDee Bennett Gayle
Abstract: Device Based Geo Fencing looks to improve the precision of Wireless Emergency Alerts (WEAs) by targeting alerts more accurately to people within specific geographic areas. This technology is used by emergency management agencies, public safety officials, and government authorities responsible for issuing alerts. DBGF is implemented within the WEA system used across the United States through participating mobile services and smartphones. It is used during emergencies such as extreme weather, natural disasters, and public safety threats when precise communication is critical. The purpose of using geofences is to ensure that alerts are delivered only to individuals within the affected area. DBGF works by transmitting custom shaped alert areas through cellular broadcast messages, while smartphones use their built-in location services to determine whether they are inside the defined boundary before displaying the alert. By increasing location accuracy, geofencing enhances the effectiveness of emergency communication.
A Guide to Creating an Effective Sock Puppet
Presenter(s): Chelsea Ben Aoumeur
Showcase Advisor: Stephen Coulthart
Abstract: As per the research done in the Open Source Intelligence (OSINT) lab, research accounts, often referred to as “sock puppet” accounts, are fictitious accounts created on the internet for the purpose of masking the user's identity to support safer research practices. To effectively collect data using a sock puppet, there are interdisciplinary techniques drawn from theatre, game design, gameplay, creative writing, visual art, and storytelling that all contribute to this. This presentation will guide new OSINT researchers through creating realistic and effective sock puppets by applying the creative and design-based methods from the arts as previously stated. The goal of this presentation is to illustrate the mechanisms that make sock puppets believable in order to conduct research safely as an anonymous OSINT researcher.
A Guide to Tracking Conflict by Producing GEOINT Using Open-source Geospatial Data in Ukraine
Presenter(s): Sean McKenna
Showcase Advisor: Stephen Coulthart
Abstract: Open-source Geospatial information includes information that this available to the public and displays imagery of the earth’s surface. This project will serve as a guide to tracking conflict and producing Geospatial intelligence using publicly available geospatial Information through temporal remote sensing methods. This project will use the war Ukraine to teach students to examine temporal geospatial data to identify indicators of conflict, tracking the war as it goes on.
Hurricane Andrew
Presenter(s): David Green
Showcase Advisor: Amber Silver
Abstract: Hurricane Andrew (1992) was a catastrophic storm that set records for property damage and had some of the strongest sustained winds for a hurricane in the US. This case study examines the response to the hurricane by governments and the citizens of the affected area, which was primarily Dade County, Florida. The study mainly examines the outcomes of the people who were most affected by the storm, with respect to their housing, examining damages that occurred and the recovery effort, and the health of the people, including mental health effects on both the adults and children.
NATO’s Threat Assessment of Hybrid Warfare
Presenter(s): Victoria Tobes
Showcase Advisor: Peter Prieto
Abstract: Hybrid warfare and its tactics have become an increased concern in the security domain of major countries since at least 2005. My research is based on NATO's 2024 threat assessment of hybrid warfare and how to mitigate the hazards. As technological capacities have increased in the last decade, so have the types and complexities of threats. NATO defines hybrid warfare as militant and non-militant covert or overt tactics in a target country or area encompassing the manipulation of politics, diplomacy, information, the economy, technology, the military and society, as well as dimensions like culture, psychology, legitimacy and morale. The risk and threat assessment NATO created is primarily geared toward providing a basis of understanding hybrid warfare in its varied definitions and forms. This new form of warfare necessitates learning within the security community and is provided within NATO’s risk and threat assessment.
A New Way Of Training
Presenter(s): Noah Cluett
Showcase Advisor: DeeDee Bennett Gayle
Abstract: In my presentation, I would like to present how virtual reality (VR) as a technology can be used and implemented, for training for agencies such as Police and Fire Fighters etc. And how it is a very good alternative for the agencies that do not have much funding and or access to state of the art facilities. Because some agencies especially more rural agencies do not have access to things that bigger cities might have, which all agencies should have a high standard of preparedness.
Perceptions of Government Legitimacy in Disaster Management: Evidence from Reddit Discussions of Hurricane Helene
Presenter(s): Aidan Covert
Showcase Advisor: Samantha Penta
Abstract: During a disaster, government response is essential to help those affected return to a state of normalcy. Poor response by government agencies can lead those affected to form dissensus toward the government. Social media has become a common tool for those affected by disasters to voice their displeasure toward the governments response. The research presented analyzes how people respond to government action on social media. In specific how people utilized reddit to criticize government response in the wake of Hurricane Helene.
The Price For Power: Big Data And National Security
Presenter(s): Peter Hopper
Showcase Advisor: DeeDee Bennett Gayle
Abstract: The Idea of "National Security" is one as old as humankind, but it has evolved far beyond what it used to be. In addition to defending physical borders, we must now defend virtual ones as well. Technology is ever evolving, and all the benefits that come with it also come with substantial risks. "Big Data" is as it sounds: A mass collection of data from a variety of different sources that can be used for a variety of different things, from AI to predictive intelligence; it's a powerful asset, but one that can be exploited. As helpful as Big Data is, it can be stolen and weaponized, and this begs the question: Do the benefits of Big Data completely outweigh the potential costs if it falls into the wrong hands?
Research Experience as an Intern at New York State Division of Homeland Security and Emergency Services
Presenter(s): Abigail Jenkins
Showcase Advisor: Mayra Raxon
Abstract: I will be presenting about research I did as an intern in the Policy and Research Unit at DHSES. I completed different areas of research, including severe weather impacting New York State, previously eliminated diseases, and cyber security threats.
The Role of Artificial Intelligence in Modern Homeland Security
Presenter(s): Justin Thomas-Petit
Showcase Advisor: DeeDee Bennett Gayle
Abstract: Artificial Intelligence (AI) is becoming an important tool in modern homeland security. Governments and security agencies use Al technologies to improve their ability to detect threats, analyze large amounts of data, and respond quickly to emergencies. Al systems can assist in areas such as border security, surveillance, cybersecurity, disaster response, and threat prediction. By using machine learning, facial recognition, and data analytics, security organizations can identify suspicious activities and potential risks more efficiently than traditional methods.
However, the use of Al in homeland security also raises concerns about privacy, data protection, and ethical use of technology.This presentation explores how Al is being used in homeland security, its benefits for national safety, and the challenges that must be addressed for responsible implementation. Al has the potential to significantly strengthen homeland security while shaping the future of national defense and public safety.
The Role of Virtual Reality in Training the Next Generation First Responders
Presenter(s): Ethan Pellerin
Showcase Advisor: DeeDee Bennett Gayle
Abstract: Virtual Reality is becoming an increasingly valuable tool for Emergency Management, specifically for First Responders. Traditional training takes significant time, exposes personnel to hazards while still needing to keep them safe, and consumes resources. Virtual Reality allows for a better alternative by allowing trainees to train in realistic scenarios all without the risk involved. As Virtual Reality continues to progress in development, and replace traditional training methods it will help improve the preparedness of the next generation of First Responders by safely exposing them to more situations that they may not be able to see until they are well with-in their careers. By continuing to integrate Virtual Reality more into training and Emergency Management it can better prepare personnel for what they may come across in the field.
Social Media as a Real Time Alert System
Presenter(s): Henry Meisner
Showcase Advisor: DeeDee Bennett Gayle
Abstract: Social media has become a very important tool for communication during emergencies. Apps like Twitter and Facebook can help emergency management organizations and agencies share information with the public. My presentation will look at how social media can function as a real-time emergency alert system during disasters. Older communication methods like radio and television take a lot longer to reach the public and are very limited. Social media, on the other hand, allows authorities to post updates, warnings, evacuation instructions, and safety notices. Another benefit is that the public can interact with it. For example, ask questions, respond, and share information. This research will show how management organizations can use social media to provide rapid alerts. It will also examine the benefits and challenges of using social media as an alert system.
Synthetic Three-Dimensional Canines
Presenter(s): Patrick Mahar
Showcase Advisor: Eric Best
Abstract: We've developed accurate 3D images of canines to create synthetic data for artificial intelligence training. This poster will detail the process iteration of applying high-resolution image textures to mesh surfaces to simulate canine noses for artificial intelligence classification.
Taiwan and Philippines: An Overview of Their Semiconductor Ecosystem and the Importance of Research Security in Protecting the Semiconductor Supply Chain
Presenter(s): Sean McKenna, Ashleigh Rushford
Showcase Advisor: Doug Clifford
Abstract: The eastern hemisphere has become one of the biggest markets for semiconductor production. This progress also increases vulnerability because these cutting‑edge technologies hold significant commercial and economic value, making them prime targets for misuse or intellectual theft by competing researchers, companies, and nation‑states. Growing global competition in the semiconductor supply chain heightens efforts to obtain these emerging technologies. In this case study, we will be observing the research sectors in the Philippines and Taiwan, two significant players in the global semiconductor industry in terms of their research capabilities in their upgrading, manufacturing, assembly, testing, and packaging sectors. Both countries are building their research capacity through academic and industry collaborations, education, training, and workforce development initiatives to remain leaders on the global stage in the long term. This project will provide an overview of their semiconductor ecosystem and emphasize the importance of research security in protecting the semiconductor supply chain.
Trace the Displaced: Utilization of Open-Source Intelligence Techniques in Family Reunification for Ukrainian War Refugees
Presenter(s): Dylan Repertorio
Showcase Advisor: Stephen Coulthart
Abstract: Usage of open-source intelligence (OSINT) in investigations has grown exponentially over the past two decades, and has particularly grown since 2022 and the beginning of the war against Ukraine. Over 9.6 million Ukrainians have been internally (3.7 million) and externally (5.9 million) displaced, with women and children making up 76% of refugees who have fled the country and left their families behind. 90,000+ military personnel, children, and civilians are missing as of 02/23/2026. Prior missing persons cases and family reunification efforts have demonstrated success with located individuals via OSINT tradecraft. Relevant and applicable OSINT techniques include photo geolocation, social media monitoring, facial/reverse image searching, and more. This project will explore various OSINT techniques and their uses, and how they can be applied in the context of family reunification efforts of Ukrainian War Refugees.
Transnational Criminal Organizations in the Western United States: Convergence, Adaptation, and Regional Security Risks
Presenter(s): Catherine Wasula
Showcase Advisor: Michael Young
Abstract: Each year, the Department of Homeland Security identifies high-priority threats to the United States of America (U.S.) in the annual Homeland Threat Assessment. Among the most persistent of these threats are transnational criminal organizations (TCOs), which exploit border vulnerabilities, financial institutions, and individuals inside and outside of the U.S., to expand operations in the Western U.S. The primary challenges in countering these threats are understanding how TCOs collaborate with domestic actors, utilize digital platforms, adapt to law enforcement disruption, and converge multiple threats into a streamlined operation. To promote greater insight into these adversarial networks, this project presents a visual network analysis of entities engaged in and countering transnational criminal activity in the Western U.S. and on the border. The analysis highlights key actors, logistical linkages, and points of intersection and intervention, offering a clearer depiction of operational convergence and regional and national security implications.
Understanding the Station Nightclub fire
Presenter(s): Karimah Muhammad
Showcase Advisor: Amber Silver
Abstract: This case study examines the 2003 Station Nightclub fire in Rhode Island, one of the deadliest nightclub fires in U.S. history. The fire started when indoor pyrotechnics used during a concert ignited highly flammable polyurethane foam on the walls and ceiling near the stage. Flames and toxic smoke spread quickly, leaving people inside the building with little time to escape. I examined how building materials, the lack of a sprinkler system, and limited exit access contributed to the severity of the disaster. I also explore how human behavior affected evacuation, including delays in recognizing the danger and the tendency for many people to move toward the familiar front entrance instead of other exits. Research from fire investigations, computer modeling, and witness statements helps explain how the disaster unfolded. The case study also discusses how the fire led to stronger fire safety regulations, improved building codes, and better emergency planning.
The Use of UAVs in border security in the U.S.
Presenter(s): Quinn Devine
Showcase Advisor: DeeDee Bennett Gayle
Abstract: The borders of the United States are under constant test. Whether it be human trafficking, drug smuggling, or other issues, we struggle to monitor the entire border. Recently, Unmanned Aerial Systems (UAS's) and Unmanned Aerial Vehicles (UAV's) have shown promise in helping observe the borders, providing powerful detection and surveillance capacities.
The US’s Vision of Tomorrow
Presenter(s): Sumner King-Barra
Showcase Advisor: DeeDee Bennett Gayle
Abstract: In this presentation I will delve into the potential for the Eagle Eye helmets and what it means not just for the future of the military industrial complex but the US as a whole.
When Your Clone Logs in Before You do
Presenter(s): Faria Yassem
Showcase Advisor: DeeDee Bennett Gayle
Abstract: AI is increasingly exploited for identity theft both online and offline, making impersonation more convincing. Criminals use deepfake voices and videos to imitate real individuals, deceiving families, banks, and employers. AI also enables highly personalized phishing schemes, automated bots for gathering personal data, and the creation of synthetic identities blending real and fake information. In physical settings, AI assists in producing hyper-realistic 3D-printed masks, cloned voices, and tools that help criminals bypass facial recognition or access secure areas. Concurrently, AI advances prosthetics with myoelectric limbs, brain–computer interfaces, and custom 3D-printed designs that mimic natural movements. While these aren’t biological clones, they replicate human abilities so precisely that they approach a form of replication. Overall, these innovations highlight AI’s dual role: it can pose threats to identity but also restore autonomy and function.
Slideshows
Benefits and Risks of AI in Emergent Situations
Presenter(s): Will Bland
Showcase Advisor: DeeDee Bennett Gayle
Abstract: With the increasing use of Artificial Intelligence among the general public for all aspects of their life, the benefits and risks of using AI when facing an emergent situation is a field currently under extensive research. This presentation and poster will summarize the understood risks of the public using AI to understand and make decisions during emergent situations. The analysis will be based on literature reviews and a content analysis of these texts for insights will be performed. A discourse analysis may also be necessary to understand the biases of the authors towards or against AI.
Presentation Format: Slideshow
Indian Ocean Tsunami (2004) Case Study
Presenter(s): Crystal Pulliken
Showcase Advisor: Amber Silver
Abstract: In this case study analysis, the 2004 Indian Ocean tsunami is examined to understand what factors contributed to the scale of destruction and the outcomes of the disaster. The tsunami was triggered by a 9.0 magnitude undersea earthquake off the coast of Sumatra, Indonesia, on December 26, 2004, and affected several countries in South and Southeast Asia, including Indonesia, Sri Lanka, India, and Thailand. As part of this case study, I examine environmental and structural factors that increase vulnerability, such as the lack of an early warning system, coastal environmental degradation, and weak building construction in many affected areas. I also analyze how governments and international organizations responded in both the immediate aftermath and the long-term recovery process. Additionally this case study discusses the broader impacts of the disaster, including displacement, economic damage, and the challenges communities faced while rebuilding, as well as the improvements made to disaster preparedness afterward.