crafted by photobiz

MEDIA REQUESTS

Professor Adam Scott Wandt is available for media requests on the following topics:

• Digital Forensics and Cyber Security
• 3D Printing
• Drone Technology
• Computer and Network Hacking
• Federal and State Computer and Technology Law
• Advanced Emerging Technology
• Academic Technology


Professor Wandt has recently been interviewed in the following articles/segments: 

• Chan, M. (2019, February 12). Time Magazine: "Betrayals, a $100 Million Bribery and a Netflix Star: These Are the 7 Biggest Bombshells From El Chapo’s Trial." Retrieved from: http://time.com/5515745/el-chapo-trial-bombshells/

• DiPierro, A. (2018, December 5). The Palm Springs Desert Sun: "Coachella Valley Price Radio System Will Cut Access to Local Media, Including the Desert Sun." Retrieved from. https://www.desertsun.com/story/news/2018/12/05/palm-springs-area-police-radio-system-cutting-access-desert-sun-kesq-kmir-city-news/2210729002/

• Bruner, B. (2018, November 22). The Columbus Dispatch: "Social media expansion helps sheriff's office build trust, followers." Retrieved from https://www.dispatch.com/news/20181122/social-media-expansion-helps-sheriffs-office-build-trust-followers

• St. Amour, M. (2018, October 11). Times-Call Local News: "Longmont Police Scanners Go Silent for Unannounced "Pilot Project." Retrieved from http://www.timescall.com/longmont-local-news/ci_32198667/longmont-police-scanners-encrypted-channel

• Hobson, J. (2018, January 22). NPR Here & Now: "Snapchat 'Has Become A Haven' For Child Predators, Criminal Justice Scholar Says." Retrieved from https://www.wbur.org/hereandnow/2018/01/22/snapchat-child-predators

• Gavin, R. (2017, September 25). Times Union: "Google Technology Ruling Delays Oquendo Murder Case in Troy." Retrieved from https://www.timesunion.com/news/article/Google-technology-on-trial-in-Troy-12227442.php

• Wolfe, J. (2017, May 16). New York Today: How to Beat the Hackers.” The New York Times. Retrieved from https://www.nytimes.com/2017/05/16/nyregion/new-york-today-how-to-beat-the-hackers.html?smid=tw-share&_r=0

• Barchenger, S. (2017, March 19). The Tennessean (USA Network): Nashville Police to Search Jocques Clemmons' Social Media. Retrieved from http://www.tennessean.com/story/news/crime/2017/03/19/nashville-police-search-jocques-clemmons-social-media/98903932/

• Margulis, A. (2017, March 6). Citizen Times: "Police Get Social to Solve Crimes, Build Community Connections." Retrieved from https://www.citizen-times.com/story/news/local/2017/03/06/police-get-social-solve-crime-build-community-connections/98580614/

• Locke, C. (2016, October 18). Wired: "True Crime Podcasts Bring Closure - And Maybe Even Reform." Retrieved from https://www.wired.com/2016/10/true-crime-podcasts-effect/

• Cheng, P. (2016, August 4). NBC 4 I-Team: New York's 'Revenge Porn' Law Doesn't Protect People Who Took Photos Willingly. NBC 4 News. Retrieved from http://www.nbcnewyork.com/news/local/Revenge-Porn-Law-New-York-Doesnt-Protect-People-Who-Took-Photos-Willingly-389232302.html

• Denselow, W. (2016, July 29). CCVT News (America): My Panda: New app gives users security alerts. Retrieved from https://youtu.be/dfYKPCPVGU4

• Wandt, A., Webb, A. (2016, March 23). Bloomberg TV News: How FBI Could Hack Gunman’s iPhone Without Apple. Retrieved from https://www.bloomberg.com/news/videos/2016-03-23/how-fbi-could-hack-gunman-s-iphone-without-apple

• Smythe, C. (2016, March 16). Bloomberg Technology: How Apple Helped Me Crack iPhones Like Clockwork. Retrieved from https://www.bloomberg.com/news/articles/2016-03-16/how-apple-helped-me-crack-iphones-like-clockwork

• Sydell, L. (2016, February 19). NPR News (WNYC): Can A 1789 Law Apply To An iPhone? Retrieved from http://www.npr.org/sections/alltechconsidered/2016/02/19/467299024/can-a-1789-law-apply-to-an-iphone

• Thompson, M., Espinosa, E. (2015, JULY 18). KFI AM 640 Interview: Eddie Tipton Lottery Fraud Trial Interview. Retrieved from http://www.kfiam640.com/media/podcast-thompson-and-espinosa-thompsonespinosa/717-filming-before-helping-2pm-26207840/

• Quijano, E. (2015, JULY 15). CBS This Morning: Lotto worker on trial in $16.5 million fraud case. Retrieved from http://www.cbsnews.com/videos/lotto-worker-on-trial-in-16-5-million-fraud-case/

• Cheng, P-S. (2015, JULY 3). I-Team: New Devices Put Key Fob Car Owners at Risk for Theft. Retrieved from http://www.nbcnewyork.com/investigations/Key-Fob-Car-Theft-Investigation-Steal-Vehicle-Technology-Insurance-311494061.html

• Cheng, P-S. (2015, June 11). I-Team: New Cyberattacks Lock Out Hundreds of Thousands From Own Devices, Demand Ransom. Retrieved from http://www.nbcnewyork.com/investigations/Ransom-Cyber-Ware-I-Team-Computer-Mobile-Device-Hardware-Corrupt-Mail-Police-Attack-306682901.html

• Vigliotti, J. (2014, November 25). I-team: Hacker posts private live streams of hundreds in tri-state. WNBC4 New York. Retrieved from http://www.nbcnewyork.com/news/local/Live-Stream-Video-Feeds-Hacked-Security-Weak-Passwords-283441681.html

• Pegoraro, R. (2014, November 18). Why the cops hate the new apple and google phones. Yahoo Tech. Retrieved from https://www.yahoo.com/tech/well-encrypted-phones-on-vulnerable-cellular-networks-102917792869.html

• Rivoli, D. (2014, September 2). How to protect yourself online: Tips from experts. AM New York. Retrieved from http://www.amny.com/news/how-to-protect-yourself-online-tips-from-experts-1.9210332

• Rosenthal, L. (2014, September 1). Data security and your smartphone. NYS Assembly Newsletter. Retrieved from http://assembly.state.ny.us/member_files/067/20140828/index.pdf

• Cheng, P-S. (2014, August 26). Data safety tips for cellphone upgrades. WNBC4 New York. http://www.nbcnewyork.com/investigations/I-TEAM_-Data-Safety-When-Upgrading-Cell-Phones_New-York-272673091.html