BEGIN:VCALENDAR
VERSION:2.0
PRODID:IEEE vTools.Events//EN
CALSCALE:GREGORIAN
BEGIN:VTIMEZONE
TZID:America/New_York
BEGIN:DAYLIGHT
DTSTART:20220313T030000
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
END:DAYLIGHT
BEGIN:STANDARD
DTSTART:20221106T010000
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
DTSTAMP:20221005T221824Z
UID:1D37C346-0A89-4E82-B64D-CEB8C2DF55F1
DTSTART;TZID=America/New_York:20221005T120000
DTEND;TZID=America/New_York:20221005T130000
DESCRIPTION:Joseph discusses the existential WWII enigma code interception 
 and decryption methods along with the heros and heroines who worked around
  the clock to save the allied nations. The cold war\, following WWII\, int
 roduced additional risks and new challenges and illustrates wireless secur
 ity failures and new wireless packet intercept and a list of encryption me
 thods with inherent defects. Finally\, wireless risks present in 2022 are 
 shown as security aircraft\, ship\, automotive\, and military cases aircra
 ft\, and ship examples. State-of-the-art 5G Cellular security technology a
 nd the identified risks of base-station&#39;s dynamically changing protocols\,
  hardware BTS trojans\, and mobile UAV-identified cellid and location inte
 rception challenges are highlighted. Originally presented at a Rutgers IEE
 E dinner\, a professor mentioned she found this presentation informative\,
  but she would not sleep that evening!\n\nSpeaker(s): Joseph Jessen\, \n\n
 Room: 102\, Bldg: Armstrong Hall\, 2000 Pennington Road\, Ewing\, New Jers
 ey\, United States\, 08638
LOCATION:Room: 102\, Bldg: Armstrong Hall\, 2000 Pennington Road\, Ewing\, 
 New Jersey\, United States\, 08638
ORGANIZER:potomis1@tcnj.edu
SEQUENCE:0
SUMMARY:WIRELESS SECURITY RISKS\; HISTORICAL WWII DECRYPTION THROUGH 5G CEL
 LULAR TECHNOLOGY
URL;VALUE=URI:https://events.vtools.ieee.org/m/326446
X-ALT-DESC:Description: &lt;br /&gt;&lt;p&gt;&lt;span style=&quot;font-weight: 400\;&quot;&gt;Joseph di
 scusses the existential WWII enigma code interception and decryption metho
 ds along with the heros and heroines who worked around the clock to save t
 he allied nations. The cold war\, following WWII\, introduced additional r
 isks and new challenges and illustrates wireless security failures and new
  wireless packet intercept and a list of encryption methods with inherent 
 defects. Finally\, wireless risks present in 2022 are shown as security ai
 rcraft\, ship\, automotive\, and military cases aircraft\, and ship exampl
 es. State-of-the-art 5G Cellular security technology and the identified ri
 sks of base-station&#39;s dynamically changing protocols\, hardware BTS trojan
 s\, and mobile UAV-identified cellid and location interception challenges 
 are highlighted. Originally presented at a Rutgers IEEE dinner\, a profess
 or mentioned she found this presentation informative\, but she would not s
 leep that evening!&lt;/span&gt;&lt;/p&gt;
END:VEVENT
END:VCALENDAR

