Hub Aircasters – GMU Cyber Security https://gmucyber.onair.cc George Mason University Sat, 14 Mar 2026 00:29:49 +0000 en-US hourly 1 Connor Wadlin https://gmucyber.onair.cc/connor-wadlin/ https://gmucyber.onair.cc/connor-wadlin/#respond Mon, 29 Dec 2025 18:56:10 +0000 http://gmucyber.onair.cc/?p=7475

I’m Connor Wadlin, a Cybersecurity specialist with a keen eye on the world around me! As an Engineer, my focus is on improving the lives of everyone, not just the rich and powerful.

At onAir, I am the Hub Coordinator for Cybersecurity. That means I do a little bit of everything, from curating posts, hosting my own onAircast series titled "Cybersecurity @GMU", and helping others do the same. My focus is on providing the BEST platform for people to learn, discuss, and engage around Cybersecurity so that we can ALL live happier, safer, and more fulfilling lives together!

I’m happy you’re here, so thank you for taking some time out of your day to learn ?

OnAir Post: Connor Wadlin

]]>
Summary

I’m Connor Wadlin, a Cybersecurity specialist with a keen eye on the world around me! As an Engineer, my focus is on improving the lives of everyone, not just the rich and powerful.

At onAir, I am the Hub Coordinator for Cybersecurity. That means I do a little bit of everything, from curating posts, hosting my own onAircast series titled “Cybersecurity @GMU”, and helping others do the same. My focus is on providing the BEST platform for people to learn, discuss, and engage around Cybersecurity so that we can ALL live happier, safer, and more fulfilling lives together!

I’m happy you’re here, so thank you for taking some time out of your day to learn ?

OnAir Post: Connor Wadlin

News

Cybersecurity student hopes to use his powers for good
Mason News, Shayla BrownAugust 25, 2025

When George Mason University cyber security engineering major Connor Wadlin learned about ransomware attacks on organizations, such as the one on the Health Service Executive in Ireland, in his CYSE 445 System Security and Resilience class, it confirmed his commitment to dedicating his educational and professional career to protecting and preserving human lives.

“There’s nothing more important than protecting and defending others. As an engineer, I’m driven to get important work done by thinking about complex problems and finding suitable solutions,” said Wadlin, who is from Leesburg, Virginia.

Since winter 2024, the Honors College student has been interning at the Commonwealth Cyber Initiative(CCI) Northern Virginia Node, George Mason’s branch of the statewide network dedicated of excellence in cybersecurity research. CCI’s mission includes workforce development through training the next generation of cybersecurity experts.

“It’s a super exciting job because I get to work with AprilTags, which are on objects that the drone’s camera then sees and scans. Instead of sharing data, the tags utilize location information for navigation, tracking objects, or pathing purposes,” he said.

Wadlin is also simulating drone flight with the Microsoft tool Air Sim, a project he presented at the CCI Symposium in April. “I created a model with a 98% accuracy, really high F1 score—higher than what we could find on the market—detecting collisions so the drones would be able to respond to anomalous factors such as objects that get too close, environmental variables, cyber-attacks, and more,” he explained.

Wadlin learned about many of the tools he’s currently using for CCI in his classes with College of Engineering and Computing professors, such as his mentor Mohamed Gebril, an associate professor in the Department of Cyber Security Engineering. 

“George Mason supports people where they are to get them where they want to be,” Wadlin said.  

The skills Wadlin has acquired during his time at George Mason and in his work with CCI have enable him to help other students in their studies.  

Connor is a very skilled student and has been able to develop different programs, as well as 12 labs for sophomore- and freshman-level students at George Mason. He even assists the students during our workshops,” said Gebril. 

Wadlin is participating in George Mason’s Bachelor’s to Accelerated Master’s Program and will to pursuing a master’s degree also in cyber security. Gebril said he’s looking forward to having Wadlin in his classes again as a graduate student. 

“It will be a smooth transition from the undergraduate to the graduate level because the curriculum aligns well with the CCI mission, which is to equip our students with the tools to conduct research activity and develop cuttingedge technology,” said Gebril. 

Wadlin’s team is also working to develop a firstofitskind cyber drone race that incorporates cybersecurity challenges and artificial intelligence for undergraduate students.  

Wadlin was diagnosed with autism at 19 and sees this diagnosis as working to his advantage by allowing him to see things from different perspectives and approach problems with his own unique ideas. 

“As an engineer, you have to ask yourself ‘how is this making the world a better place?’ That’s always got to be the end goal,” said Wadlin. 

About

Who am I?

Simple Answer: I’m Connor Wadlin, a guy with very curly hair and who loves to talk too much.

Longer Answer: I’m a Northern Virginia resident who’s lived here all my life. I was born in Alexandria, lived in Purcellville until third grade, and then lived in Leesburg ever since.

Since I was just a kid, I’ve always been obsessed with technology and its interplay with the world around me. Whether it was figuring out the mechanics of riding a bike, how computers are used in everything we do, or even how coral is used in toothpaste, I was fascinated from the start.

I also love to learn about other parts of the world, which naturally led me to learn a lot about Geography, Culture, and Politics. When I’m not in the office working on my research or the Cyber onAir hub, I’m often discussing the issues of the day and what can be done.

Over the past years, I’ve spent a lot of my time working towards the betterment of humanity through my political organizing. Both on and off campus, you can find me standing hand-in-hand with some of the bravest and kindest people in the world, fighting for human rights and dignity for all!

Education and Work

Currently, I am a Senior at George Mason University, where I am majoring in Cybersecurity Engineering.

As a member of George Mason University’s Accelerated Master’s program in Cybersecurity Engineering, I have been completing my Bachelor’s Degree while pursuing my Master’s simultaneously. I am on track to graduate next semester and then return to complete my Master’s, where I am pursuing a specialization in Artificial Intelligence.

I have previously worked in a lab at the University utilizing drone technology and AI to automatically detect flight errors and alert users. I presented both my team’s work as well as my individual work at the CCI conference last year, which you can view here.

Currently, I lead a team of Cybersecurity specialists creating educational and engaging challenges for University students around UAS and cyber-physical systems (object detection, autonomous flight, jamming defense, package delivery, etc). We plan on going to the CCI conference this year, so I greatly look forward to presenting both my team’s work and my work once again!

As a UAS researcher at George Mason, I was given the unique opportunity to teach high school kids from my County how to build, operate, and have fun with drones during the 2025 CyberSlam event we hosted in the HUB Ballroom. Students were required to assemble a drone, connect to it using their controller, and fly the drone through a course as fast as possible. It was a ton of fun for everyone involved, and we were commended for having one of the best events of the whole CyberSlam! You can read more about it from the George Mason article and Loudoun County article provided.

After I graduate with my Master’s in Cybersecurity Engineering, I plan on pursuing a full-time position at onAir Networks or doing Cybersecurity professionally for a hospital. It has always been a dream of mine to help those in need through my passion for technology, so either avenue would be my dream job!

I am an amazing team leader as well as a public speaker due to my years of soft-skill training. I excel whenever I am working within a group, and can effectively delegate tasks based on good communication and trust! I try and make whatever task we’re doing fun and light-hearted, helping to build a more inclusive and friendly atmosphere wherever I go.

The Politics of Cybersecurity

Ever since the 2017 Far-Right riot in Charlottesville, I have really taken an interest in politics. Whether it is understanding the current fascist moment we live in, working to fight against the ongoing genocides in Palestine and Sudan, and educating others on what to do, I’ve done it all.

A lot of people don’t understand why a Cybersecurity Engineer would care so much about politics, but this field is inherently political. I fell in love with Cybersecurity to protect grandparents from scammers, keep myself and loved ones safe from danger on the internet, and to stop people’s pacemakers from being hacked and shut off, not to work for a defense contractor or the government and assist in the killing of children.

I find it unconscionable that people would pursue a degree meant to protect people, yet turn a blind eye to all of the death and destruction they helped cause. Whether it is friends I know going to work at Raytheon, General Dynamics, Northrop Grumman, Boeing, Peraton, Elbit, or others for fat stacks of blood money, to George Mason University’s active suppression of anti-genocide and pro-human rights organizers on campus, it all sickens me to my core.

This is of course dwarfed by the inhumane level of cruelty on display every day from the United States government, its military, and its attack dog Israel in the Middle East who has been colonizing and ethnically-cleansing the land and who is committing genocide as you read this against the men, women, and children of Palestine.

This platform is for everyone to learn, discuss, and engage about any topic for the benefit of humanity, so for as long as I am here, that focus will NEVER be abandoned.

– – – – – – – – – – – – – – – – –

Formal Work Experience

Program Development Assistant
Commonwealth Cyber Initiative (CCI) · Part-time
Sep 2025 – Present
Fairfax County, Virginia, United States · Hybrid

Led a team of Cybersecurity specialists to create a variety of educational and engaging UAS and Cyber activities. Led development on the autonomous flight challenge and object detection challenge. Assisted fellow researchers on the anti-jamming challenge and package delivery challenge.

Program Development Associate

Commonwealth Cyber Initiative (CCI) · Part-time
Dec 2024 – Sep 2025 · 10 mos
Fairfax County, Virginia, United States · Hybrid

Helped develop a virtual flight environment for drone testing, real-time logging, and data collection within Splunk, writing a variety of technical reports for students to follow, adapting drone technology to handle LLM anomaly detection, and so much more!

Cybersecurity Hub Coordinator
onAir Networks · Part-time
Sep 2025 – Present
Fairfax County, Virginia, United States · Hybrid

I am the Chief Cybersecurity Hub Coordinator, where I run, organize, communicate, and ultimately structure the Cybersecurity onAir Hub. I meet with professionals in the field to discuss Cybersecurity at GMU on my personal Aircast series, provide new avenues to expand the hub into new Cybersecurity domains, and coordinate with stakeholders to ensure information is free, available, and accessible for everyone!

My Education At A Glance

George Mason University – College of Engineering and Computing
Master’s degree, Cybersecurity Engineering, Concentration in Artificial Intelligence
Nov 2024 – May 2026

Was accepted into George Mason University’s Accelerated Master’s Program on 11/26/2024 by the College of Engineering and Computing. Began taking Accelerated Master’s classes in Senior year, pacing me to be very competitive within the industry!

George Mason University – College of Engineering and Computing
Bachelor’s degree, Cybersecurity Engineering
Aug 2022 –  May 2026
Grade: 3.71 GPA

Was accepted into the Honor’s College and began pursuing a degree in Cybersecurity Engineering

Loudoun County High School
Advanced Diploma
Aug 2019 – May 2022
Grade: 4.39 GPA

Activities and societies: National Honors Society, German Club, Aviation Club, Gender and Sexuality Alliance

Earned Awards including: Presidential Education Award (2018), Academic Letter from all A’s performance throughout all four years, Outstanding Student Award for Algebra 2, and Outstanding Student Award for German 5.

Listed Skills

  • Algebra
  • Amazon Web Services (AWS)
  • American History
  • Analytical Skills
  • Applied Machine Learning
  • Apriltag
  • Autonomous Flight
  • Biology
  • Communication
  • Compassion
  • Computing
  • Creative Writing
  • Critical Thinking
  • Cross-Cultural Communication Skills
  • Cultural Awareness
  • Cyber Security
  • Cybersecurity
  • Cyber Security Education
  • Cyber Security Podcasting
  • Drone Building
  • Drone Piloting
  • Drones
  • Elastic Stack (ELK)
  • Front-end Coding
  • German
  • HTML
  • Interpersonal Skills
  • JavaScript
  • Leadership
  • Literature
  • Machine Learning
  • Management
  • Mathematics
  • Multicultural Education
  • Non-profit Management
  • Nonprofit Leadership
  • Nonprofit Organizations
  • Object Detection
  • Organizational Development
  • Organizational Leadership
  • Organization Skills
  • Podcasting
  • Presentations
  • Problem Solving
  • Project Management
  • Python (Programming Language)
  • QR
  • Self-confidence
  • Social Media
  • Soft Skills
  • Splunk
  • Splunk Enterprise
  • Team Management
  • Team Organization
  • Teamwork
  • Technical Documentation
  • Video Podcasts
  • Web Development
  • World History
  • Written Communication
  • Zoom

Posts and Activity

Thanking GMU Honors College

I would like to thank the George Mason University Honors College Instagram for highlighting the amazing work my team and I have been doing through the Commonwealth Cyber Initiative (CCI)!

Our work with UAS for Cybersecurity has yielded tremendous results so far. From autonomous flight through encrypted courses, object detection and response, and even anti-jamming capabilities, we have made great strides in the field!

I greatly look forward to presenting our work at the next CCI conference in the summer, and to teams of students getting involved in solving our challenges. Thank you, Dr. Mohamed Gebril of George Mason University – College of Engineering and Computing, Joshua French, and Logan Breckenridge, for your amazing work on this project!

Here’s a link to the Instagram story for all interested

Here’s a link to the original story published by Shayla Brown for George Mason University:

Thanking GMU Office of Branding

I just read the amazing article published by George Mason University about my research with the Commonwealth Cyber Initiative (CCI)! I am leading a team working on cutting-edge technology, utilizing UAVs for autonomous flight and computer vision within a fun and interactive course.

I want to thank Shayla Brown, journalist for the Office of University Branding, for all the work she put into making this article a reality. Shayla Brown, from start to end, was in constant contact to ensure that everything was correct, really highlighting her attention to detail.

I would also like to thank Ron Aira, professional photographer for the Office of University Branding, for the spectacular shots! I especially like the side profile photo, as it really encapsulates the feeling of being an Engineer; always looking forward to the next great thing!

I, of course, would like to thank my mentor, Mohamed Gebril, Associate Professor of Cyber Security Engineering at George Mason University – College of Engineering and Computing. He has helped guide me along this journey, allowing me to reach even greater heights than I thought imaginable!

Finally, I would like to thank Jordan Mason, PMP of the Commonwealth Cyber Initiative Northern Virginia node, and my team, Joshua French and Logan Breckenridge. Together, we are able to build and create more amazing advancements than I thought even a few months ago!

CCI Conference 2025

What a great event! Thank you so much to the Commonwealth Cyber Initiative (CCI) for hosting the team from George Mason University in the Omni Richmond Hotel.

It was such a blast, from the talk I hosted about my groundbreaking Fuzzy Logic model (which beat out every other model we tested it against) and our group research utilizing Splunk and ElasticSearch with drone telemetry data for EDR utilizing AI and ML models, to the amazing talk done by Prisma AIRS by Palo Alto Networks and the student panel. Our team here at GMU is very excited to come next year and show off all of the great work we’re up to, so we hope to see you all there!

Here are some of the amazing photos taken by our professional GMU photographer during my talk and after our group poster session.

Excited for CCI Conference 2025

Thanks to the amazing research we’ve been doing at George Mason University under Dr. Mohammed Gebril, I have been invited to speak at the Commonwealth Cyber Initiative (CCI)‘s Symposium! My research has been focused on utilizing Artificial Intelligence and Machine Learning Algorithms for Endpoint Detection and Response with drone telemetry data.

This research is vital as drones become more widely applicable both within the industry and in everyday life, as it provides a method of ensuring anomalous flight behaviors are logged, caught, and responded to before anyone gets hurt! Impressively, we have developed a very sophisticated model that outperforms other AI/ML tools on the market, which I will be covering in my talk on April 15th.

I would like to thank the Commonwealth Cyber Initiative (CCI) for providing us both the ability to do this research and the opportunity to present it! It has been an honor and a pleasure to work alongside William Leppert, Stephen Antezana, Abi Austin, and Sneha Apsangi for this research. While there is always more to do when trekking the path of progress, I’m very proud of the work we have done as a team and I would love to continue this research ? !

GMU CyberSlam 2025

Today’s event was a blast! Helping out High School students build and fly drones around was so much fun. The kids really learned a lot too, so overall a great use of time and resources!

Link to original post

GMU Innovation Week Presentation

I’m so excited that the team will get to present our work on the 19th! We’ve made amazing progress with our drone telemetry analysis. It will be amazing to see what everyone else has been up to as well!

Thank you everyone who has worked so hard to get this done! Team Members: William Leppert, Stephen Antezana, Abi Austin, and Sneha Apsangi.

Original Post Link

Projects and Work

CYSE 587 Team C Coordinator

During the Fall 2025 semester, I was the co-leader of Team C, where we worked to protect privacy within UAS technology. Our project was called “Protecting Individual Privacy from Intrusive Drone Surveillance”, which you can read more about here!

As the co-leader of the team, I was responsible for coordinating the other co-lead to plan meetings, schedule deliverables, and meet with team members to make the best project possible! Below are some of the tasks I was responsible for and what I did during the semester.

  • Did in-depth STRIDE (security) and LINDDUN (privacy) analyses of our solution to ensure we caught and addressed as many potential concerns as possible
  • Made many different models illustrating our system and attack vectors, utilizing both DFDs and MITRE Attack Flows
  • Tightened up the shark tank presentation, where I added supporting graphics, more engaging slide designs, and external content such as the sources linked in the presentation
  • Recorded and presented sections of the presentation, specifically around the threat space our solution was working within
  • Helped organize team files within our Microsoft Teams workspace
  • Coordinated with members and helped out with minor tasks, such as helping to set up our AirSim environment for the demo and testing
  • Kept track of action items and work progress on our Microsoft Loop during meetings

CYSE 492-493 Senior Design Project Manager

For my senior design, I am working with a very strong team of fellow senior Cybersecurity students. We are building an AI-Enhanced Scenario Generator for the game “Backdoors & Breaches”, for the purpose of training students and employees through a more fun, engaging, and tailored experience.

The use case is for a teacher or employer to feed our model organizational information, such as the server infrastructure or how their computer network is laid out, so that the model can generate realistic and organizationally-specific scenarios for students and employees to train with.

Currently, we are almost done with the tool itself and are going to work on testing it through a study we’ve designed to be implemented within classes next semester. We will see how students engage with the AI-generated scenarios versus scenarios we make and no scenarios within the game. With this data, we will be able to see the efficacy of the tool, allowing us to make any final tweaks before we present our final work!

In this project, I have two main roles. My first role is to lead the team to success by providing the organizational, structural, and technical support all team members need for their tasks. This means I ensure everyone knows when our meetings are, what is required of them for the meetings, what they should work on and the priority of different tasks, as well as helping out with the tasks themselves.

On the organizational and structural side, I manage our group Discord so we can all communicate clearly and know what to do. I run the calendar, announce meeting times, and make sure everyone has what they need to succeed.

On the technical side, I’ve helped during the early stages research ideas our sponsor and mentor brought up to see how they could best be utilized within the project. This includes our RAG database, which our back-end model utilizes to pull data for the scenarios it generates. I also helped set up the validation study as well as iterate on our UI for the front-end.

My other role is to coordinate between the team, our mentor, and our sponsor. This means I not only set up the meetings, but I also run them. I show off our slides, explain important breakthroughs, what we’re working on, and tie all of this back to our overarching project plan. I also actively listen to feedback, so the team can experiment with different ideas and methods.

I have really enjoyed the first half of the project, and look forward to bringing it home during our final semester! It has been a blast working with my friends, and I am very excited to show off our tool once it is complete.

SYST 230 PaperTrail Encryption Method

During my Systems 230 class with Dr. Amissah, my team developed an application that allows users to physically store cryptographically-secure information. We called our application “PaperTrail”, and it was one of the most interesting projects I had worked on.

The base concept was simple, we wanted a way to securely store information that had a level of physicality to it so it couldn’t be wiped or otherwise lost from digital means. We tried a variety of different ideas, until coming up with the final iteration.

Our system was quite simple, only having two functions, encryption and decryption. For encryption, the user would provide the file they would want to encrypt as well as a key used for the encryption. Our system was able to take in a variety of file types, including common image and text files, and encrypt them using a strong encryption scheme. Once encrypted, the program would provide rows and columns of QR codes, each including some small portion of the information in its encrypted state. This could be printed out and stored, making it easier to keep track of.

To decrypt, the user would have to have the key used during the encryption as well as the QR codes. The program would take the provided key and attempt to scan the QR codes, decrypting back into the original file ONLY when provided the correct key. From our testing, we were able to successfully encrypt and decrypt image and text files of varying sizes with trivial data loss.

We presented our work to Dr. Amissah and the rest of our class, where we got top marks due to the innovative nature, strong results, and sleek design of our solution. You can view the GitHub here, where you can download the tool and play with it yourself.

Here is our final project report that goes into further detail about our application:

Download (PDF, Unknown)

ENG 107 Helmet Project

During my freshman year at George Mason University, I was lucky to have a class with Dr. Peixoto around the fundamentals of Engineering. While we had many different projects in the class, from making tools out of trash to inventions that would help us from our day-to-day, my favorite one was the team design project.

Each team consisted of around five students, and had to design, prototype, iterate, and ultimately deliver a fully engineered solution to a problem the team selected. Since the people on my team were big into urban adventuring and exploring the great outdoors, we sought to make the ultimate safety helmet.

Our helmet contained a variety of useful features, including a GPS tracker managed through an app, multiple different lights, and plenty of cushioning to protect from damage. Each member of the team focused on a different aspect of the helmet, ultimately delivering on our goal.

In the end, one of the team members kept the helmet and reportedly used it, saying that the multiple lights was actually super helpful. Not only did it have a three-mode front light, but also had lights around the sides and back to help others find them easier. This in combination with the GPS tracker kept them safe while exploring, allowing them to enjoy without fear of injury.

Below is a photo of the helmet taken by the group member responsible for the electrical wiring of the lights:

– – – – – – – – – – – – – – – – –

GMU Drone Research

Since December 2024, I have been working for George Mason University through the Commonwealth Cyber Initiative (CCI). My research has centered around drone technology, specifically around anomaly detection and automated flight behaviors.

My first project involved creating a machine-learning model that would more accurately detect anomalous flight behaviors when compared against traditional models. I utilized AirSim, a virtual flight environment developed by Microsoft and widely used in industry, and some custom Python scripts to gather ~20,000 virtual drone telemetry packets into my custom Splunk environment. I then used these packets as the baseline for my model, helping it to delineate between nominal and anomalous flight readings.

I presented my work at the CCI 2025 conference at the Omni hotel in Richmond, Virginia to a packed room. My individual research tied into the broader research my group was doing, helping to make our poster even better as well!

After that, I moved onto a new project focused around teaching cybersecurity students. The goal was to develop a series of fun challenges, each involving drones and a complex cybersecurity topic. The challenges ranged from automated flight through encrypted gates to object detection and response. This project is still in the works, but my team and I are very excited to have students from universities all around Northern Virginia compete for the ultimate prize!

I plan to present my work on these challenges at the CCI 2026 conference. More information will come out as the date gets closer, but I look forward to seeing everyone there!

OnAir Cyber Network Coordinator

Cyber OnAir Coordination

As the coordinator for the entire Cyber onAir Network of Hubs, I fulfil may roles. I am responsible for ensuring that everything Cybersecurity on the platform goes smoothly, from the overarching structure all the way down to curation and moderation guidelines.

At the network level, I lead the way when it comes to establishing new hubs, making deals with sponsors, and networking with organizations. Currently, I am looking for a lead university and lead association to support these endeavors. If your organization is interested, please reach out to me using my email.

I work with the hub advisory board, other coordinators, our curators, and the broader Cyber onAir team to ensure consistency and quality across the network. It is vital to me that our values are being upheld all the way through, as we do not compromise on our principles or morals.

Network Coordination

In regard to the Cyber hub itself, I help out wherever I am needed. Whether it is on the curation side or the aircasting side, I do it all! My main responsibility is to ensure smooth sailing at all times, so I work very closely with everyone else on the team to keep the platform open and accessible.

During the infancy of the hub, I spent a lot of time making posts, making hubs, recording aircasts, and teaching members of the team to do the same. As the platform grows, I spend more time onboarding new members, ultimately building a strong team to support day-to-day operations!

Currently, I am working to expand the team for the hub, as the main bottleneck is hours in the day. If you are someone who is passionate about providing others information and opportunities, isn’t afraid to ask questions, and is willing to sit down and talk with people regularly, please reach out to me!

Curation Coordination

I care very deeply about providing information as freely and openly as possible, as I believe information is a human right. As such, I work with my team of curators to aggregate the best content from other hubs and highlight it here, as well as from the internet, professionals, and other media sources. We spend a great deal of time reaching out to researchers, industry professionals, and other highly-knowledgeable people to bring the best content to the platform, so that everyone can be better informed!

The greatest thing about the Cyber hub is its ability to adapt, just like the field of cybersecurity. The constant game of cat and mouse has always intrigued me, so being able to capture the constantly evolving nature through our posts keeps us on our feet! It is thanks to the diligent work of our curators that this platform is as informative as it can be.

OnAircast Coordination

When it comes to aircasts for the Cyber Network of Hubs, I do quite a lot. I diligently work with our team of aircasters to develop and run the most informative livestreamed cybersecurity content on the internet.

We are constantly looking for new series ideas, members of the team, panelists, and guests, so please reach out if you are interested!

Currently, we are focused around George Mason University and its departments that talk about cybersecurity, but we plan to expand out massively in the future!

Cybersecurity@GMU

This is my personal aircast series, where I cover everything within the GMU CYSE department. Here are some ideas I have for the series, so please reach out if you are interested in talking!

  • Speak to student and staff researchers about their work, its implications, and how it benefits the lives of others
  • Discuss with professors about a class they teach, the topic’s significance, and how this information better prepares students for the real-world
  • Gather a panel of CYSE administrators, students, and staff to discuss the current curriculum, how the field is evolving, and how the University is going to beat the curve
  • Find out more from the top brass of the department how big decisions are made, how people can make their voices heard, and how the department adapts to fit the expectations of the real-world
]]>
https://gmucyber.onair.cc/connor-wadlin/feed/ 0
Saanvi Munigela https://gmucyber.onair.cc/saanvi-munigela/ https://gmucyber.onair.cc/saanvi-munigela/#respond Sun, 02 Nov 2025 22:52:07 +0000 http://gmucyber.onair.cc/?p=7561

Hi there! My name is Saanvi and I am currently a Junior majoring in computer science at George Mason University. I am also Aircasting Director for the Cyber onAir network of hubs. The top hub is at cyber.onair.cc.

I am passionate about exploring the intersection of technology, ethics, and societal impact. My work spans research in AI ethics, responsible AI governance, and the practical applications of machine learning, all grounded in a commitment to leveraging technology for humanity’s highest needs.

My current areas of focus are on:
– preparing for the CompTIA Security+
– researching and studying Gen AI risk mitigations as well as exploring the intersection between AI and Cybersecurity (Galexor AI)
– building a GRC portfolio: security fundamentals, CIA triad, NIST CSF basics, policy writing, risk register basics, Excel/Google Sheets for tracking, familiarity with regulations (starting with HIPAA or SOC 2)
– upskilling on Linux and programming.

My dream job involves doing what AI cannot — that is provide context, judgement, and ethical leadership.

Always eager to connect with professionals, collaborators, and innovators who share a vision for responsible technological advancement!

 

OnAir Post: Saanvi Munigela

]]>
Summary

Hi there! My name is Saanvi and I am currently a Junior majoring in computer science at George Mason University. I am also Aircasting Director for the Cyber onAir network of hubs. The top hub is at cyber.onair.cc.

I am passionate about exploring the intersection of technology, ethics, and societal impact. My work spans research in AI ethics, responsible AI governance, and the practical applications of machine learning, all grounded in a commitment to leveraging technology for humanity’s highest needs.

My current areas of focus are on:
– preparing for the CompTIA Security+
– researching and studying Gen AI risk mitigations as well as exploring the intersection between AI and Cybersecurity (Galexor AI)
– building a GRC portfolio: security fundamentals, CIA triad, NIST CSF basics, policy writing, risk register basics, Excel/Google Sheets for tracking, familiarity with regulations (starting with HIPAA or SOC 2)
– upskilling on Linux and programming.

My dream job involves doing what AI cannot — that is provide context, judgement, and ethical leadership.

Always eager to connect with professionals, collaborators, and innovators who share a vision for responsible technological advancement!

 

OnAir Post: Saanvi Munigela

About

 

Passionate about exploring the intersection of technology, ethics, and societal impact. My work spans research in AI ethics, responsible AI governance, and the practical applications of machine learning, all grounded in a commitment to leveraging technology for humanity’s highest needs.

Current areas of focus:
– preparing for the CompTIA Security+
– researching and studying Gen AI risk mitigations as well as exploring the intersection between AI and Cybersecurity (Galexor AI)
– building a GRC portfolio: security fundamentals, CIA triad, NIST CSF basics, policy writing, risk register basics, Excel/Google Sheets for tracking, familiarity with regulations (starting with HIPAA or SOC 2)
-upskilling on Linux and programming.

Experiences:

  • Childcare Worker at the International Sahaja Public School in Canajoharie, New York.
  • Aircasting Director for the Cyber onAir network of hubs. The top hub is at cyber.onair.cc.
  • Contributed to groundbreaking research on detecting deceptive interactions in Large Language Models (LLMs) under the guidance of leading experts at GMU. This research focuses on embedding space analysis to enhance the safety and robustness of AI systems.
  • Founder @InternConnect, a career incubator service for CS and STEM majors in the DMV region that strives to build a platform that bridges the gap between college and real-world applications.
  • Technical expertise includes AI/ML development, UI/UX design, and software engineering, complemented by a deep interest in creating explainable, ethical, and impactful technological solutions.

My dream job involves doing what AI cannot — that is provide context, judgement, and ethical leadership.

Always eager to connect with professionals, collaborators, and innovators who share a vision for responsible technological advancement.

Education

  • George Mason University – College of Engineering and Computing
    • Bachelor of Science – BS, Computer Science
      Grade: Junior
  • Northern Virginia Community College
    • Dual Enrolled
      2022 – 2023
  • Battlefield High School
    • 2022 – 2023

Skills

  • 8.00 CPE hours in “Information Technology – Technical.
    Certificate of Attendance: Future Tech DC
  • Find a Hiring Manager
  • Communication
  • Project Management
  • Entrepreneurship: Student Innovator Mastermind
  • Organization Skills
  • Problem Solving
  • Java
  • Python (Programming Language)Python (Programming Language)
  • Oracle Database
  • Database Design
  • PL/SQL
  • SQL
  • HTML
  • Cascading Style Sheets (CSS)
  • User Experience Design (UED)
  • UI/UX

Contact

Email: OnAir Member

Web Links

Interviews with Women in Cybersecurity

Sara Hayajneh

March 19th 1:30PM 2026

Shawn Purvis

Liza Durant

Interviews on AI & Cybersecurity

Coming soon…!

AI Cybersecurity Research

I am researching and studying Gen AI risk mitigations as well as exploring the intersection between AI and Cybersecurity (I did this also at my previous internship at Galexor AI).

Literature Review on AI and Ethics

The rapid evolution of Artificial Intelligence to the current state of the world has introduced profound technological, social, and ethical challenges, revealing inevitable debate over how to best manage its risks. AI tools have been used for societal control, mass surveillance, and discrimination. Predictive policing and automated decision-making systems in public sectors have undermined human rights. Facial recognition technology has targeted racialized communities, and fraud detection algorithms have disproportionately affected ethnic minorities (Amnesty, 2024, para 1). From a personal level to the entire globe, AI poses a threat.

While there are enormous benefits, the threats posed by AI outweigh any number of benefits because there may not be a world to consume those very benefits if the threats aren’t considered with appropriate seriousness. By far, laws and regulations were always made keeping in mind the limited capabilities of humans. However, after the creation of AI, unlimited capabilities came into view, and the question that comes into picture is whether these laws and regulations formed by governmental agencies can offer sufficient protection to the near future world. And if not, are there alternative solutions?

Study in this intersection of philosophy and technology has recently gained popularity and is being encouraged to explore. The Stanford Encyclopedia of Philosophy determines that a thorough study of the philosophy and ethics of AI and robotics is imperative in order to keep pace with the rapid evolution of these fields. And it has become more crucial than ever to address the ethical challenges posed by artificial intelligence in order to ensure that these technologies benefit society and minimize any potential harm (Muller, 2020). This literature review will do exactly that and try to explore whether laws and regulations can effectively mitigate the threats posed by the growing capabilities of AI, and if not, what alternative solutions are necessary to ensure a safer future.

Literature Review

Regulatory Challenges

It has been seen that the importance of regulating AI is extremely crucial for today’s world and moving forward. However, although this determination has been made, many challenges remain along the way. The first of these is the velocity with which AI is developing. The pace of AI is rapid, advancements outstrip the federal government’s existing expertise and authority, and regulatory statutes and structures designed for industrial-era technologies are inadequate for the fastchanging landscape of AI (Wheeler, 2024, para 5). This velocity makes it challenging for regulators to keep up with the latest developments and ensure that regulations remain relevant and effective.

According to the U.S. Artificial Intelligence Policy, “Despite the strong bipartisan interest in AI regulation — as well as support from leaders of major technology companies, and the general public — passing comprehensive AI legislation remains a challenge” (U.S. Artificial, 2023, para 4). Although over 36 hearings and 30 AI-focused bills have been introduced in congress, the article claims no consensus was able to be made because of the lack of agreement between different groups and their own versions of AI legislation (U.S. Artificial, 2023, para 3, 4). In addition, the Royal Society’s article on Governing Artificial Intelligence explains how many regulations such as the General Data Protection Regulation, do not wholly deal with the challenges presented by machine learning and algorithmic systems of the robots in the EU (Nguyen et al., 2018, Intro para 9).

Let alone the limitations of regulation, there is a lot of complexity in what and how to regulate. The fact is that “AI” is a vague term encompassing numerous technological applications, and AI systems are developed and deployed across multiple sectors, involving numerous stakeholders. Therefore, the impact of AI depends on its context, requiring regulation to consider both upstream and downstream harms (Amnesty Tech, 2024).

Beyond all this, lies the bigger question of determining who should regulate. The question of who should be responsible for regulating AI is complex because different stakeholders such as federal agencies, state governments, and international bodies, have varying levels of expertise and authority (Wheeler, 2024). The lack of a clear regulatory framework and the potential for conflicting regulations across different jurisdictions further complicates the issue. The numerous scenarios listed above are a few of the many obstacles faced in effective AI regulation. Next, ethical frameworks will be explored and the dynamics it plays in the role of regulating AI.

Ethical frameworks

Ethical frameworks and efforts of implementing structural limitations on AI for the benevolence of human beings are currently taking place, and a lot more is being encouraged toward this type of regulation. The UK hosted an AI Safety Summit in November 2023, bringing together global leaders, industry players and civil society to discuss AI risks, and they were able to execute the EU AI Act (Amnesty, 2024, para 5). While this was a step forward, there remain complaints that it still falls short in ensuring human rights protections, particularly for marginalized groups.

According to the 2024 article 14 Dangers of Artificial Intelligence by Built In, it is extremely important to address liability and intellectual property rights in the development of new legal frameworks (Thomas). But it has been difficult for lawmakers to ensure responsible development of AI products because of their deep and difficult to understand AI learning models and the secrecy surrounding biased/unsafe decisions is now resulting in a lack of transparency (Thomas, 2024). When one looks at ethical challenges, there are various overarching ethical dimensions that must be addressed. Beneficence, non-maleficence, autonomy, justice, and explicability are dimensions similar to those found in bioethics, with explicability being a new dimension specific to AI (Serafimova, 2020). Let alone the specifics, dimensions such as transparency, justice and fairness, non-maleficence, responsibility, and privacy are also emphasized (Serafimova, 2020). This just shows the complexity of the situation, how much is at stake, and how much is to be accounted for.

At the end of the day when is all is said and done, founder of Artificial General Intelligence and lead researcher of the Machine Learning Institute, Eliezer Yudkowsky argues current efforts to address AI safety are insufficient, as they focus largely on technical fixes and incremental improvements than existential risks posed by complex systems; he altogether criticizes the reliance on “safety” measures that do not fundamentally alter the trajectory of AI development (2023). The article references that an open letter was signed by thousands of AI researchers and industry leaders, calling for a pause in the development of advanced AI systems until safety measures can be adequately implemented, yet Yudkowsky believes it is merely a first step and that more radical changes are of great necessity in order to prevent downfall of the human race (2023). In closing, ethical frameworks have been doing their best in the game of regulation, however it ultimately proves to be inadequate, and there remains no guarantee that threats posed by the growing capabilities of AI can effectively be mitigated.

Collaboration and Transparency

Naturally, this leads one to contemplate what alternative solutions exist and how they can ensure a safer future. One of the first steps has been found to be collaboration and transparency. Yudkowsky advocates for greater collaboration among AI researchers, industry leaders, and policymakers to address the risks of AI (2023). He also calls for more transparency in AI development to ensure that the public can understand and engage with the issues at stake (Yudkowsky, 2023). Raising awareness is one of the most important steps to change, and this has been seen throughout various movements in history as well. Collaboration and transparency, when exemplified on many levels, can help bring about this change.

It has also been examined that the Behavioral Science field offers suggestions on how to develop a sustainable and enriching relationship between humans and intelligent machines, including understanding human behavior, preferences, and needs to ensure that AI systems are designed to enhance human properties and experiences (Fenwick, 2022). Their solution is that Humanizing AI will not only make intelligent machines more efficient but will also make their application more ethical and human-centric (Fenwick, 2022). While the approach aims to enhance human experiences and create a more symbiotic relationship between humans and machines, there is more said that can be done easily in this field. Moving on, the importance of global unity and succession will be explored.

Global Cooperation

One of the most important solutions as well as worries is that of global cooperation. The Stanford Encyclopedia of Philosophy not only discusses the need for AI governance frameworks to ensure that AI technologies are developed and used ethically, but also highlights the importance of international cooperation in the very development of these ethical guidelines and regulations (Muller, 2020). During the formation of the EU AI Act and other global initiatives, there was a great emphasis on the need of harmonizing AI standards and regulations to facilitate international trade and collaboration (U.S. Artificial, 2023). This article touches on the importance of international cooperation in AI regulation.

Despite the standalone importance of global cooperation, various issues are arising that make it more of an exigency. According to the 14 Dangers of Artificial Intelligence by Mike Thomas, the development of autonomous weapons that operate without human oversight poses significant threats and potential for rogue states or non-state actors to misuse AI-driven weaponry (2024). Because he concludes that through autonomous weapons powered by AI, a global arms race is inevitable, a calamity this large-scale is no longer the problem of a single state, country, or continent, but the whole world. Therefore, global cooperation becomes an absolute necessity in preventing autonomous weaponry.

Thomas also describes a huge environmental harm. The essence is that AI relies on energy-intensive computations, contributing to increased carbon emissions and water consumption, and training algorithms on large datasets while running complex models requires vast amounts of energy (Thomas, 2024). Global warming and climate change has always been a global issue and therefore no matter where in the world resources are being exhausted, the impact is on the whole. While a lot of these may just seem like issues, realizing that these are global issues that require global cooperation is of utmost importance. So again, we come to say that there must be international unison.

In the 2022 article ‘The importance of humanizing AI,’ various challenges are brought up. One of the major challenges in AI is the lack of consideration for human enhancement as a cornerstone for its operationalization, and there is no universally accepted approach that guides best practices in this field (Fenwick, 2022). This clearly portrays the urgency of international cooperation in today’s time. The world coming together and making unified decisions can be one of the greatest assets in solving the problems created by advancing AI.

Responsible AI

Moving forward, an important solution is monitoring the way we put AI to use. Through something called ‘responsible AI,’ AI can be geared toward the benevolence of human beings, instead of falling prey to destructive methods. Its main purpose is to benefit society and prioritize transparency and justice while minimizing any harm. According to ‘What Is Responsible AI,’ by Built-In, “Responsible AI is a set of practices used to make sure artificial intelligence is developed and applied in an ethical and legal way” (Glover). Responsible AI will guide the effect that AI has on society.

This has come to be very critical, because over-reliance on AI systems may lead to a loss of creativity, critical thinking skills, and human intuition. So, balancing AI-assisted decision-making with human input is crucial to preserve cognitive abilities (Thomas, 2024, para 11). “Balancing high-tech innovation with human centered thinking is an ideal method for producing responsible AI technology and ensuring the future of AI remains hopeful for the next generation” (Thomas, 2024). While there are many risks, what this article does is explain to us that AI is also a huge tool that can be useful to us enormously when geared in the right direction and aligned with human values.

Similarly, Yudkowsky’s article on Pausing AI Developments highlights the potential existential risks associated with AI, such as the possibility of AI systems becoming uncontrollable or acting in ways that are detrimental to humanity. He warns that if AI systems are not designed with a deep understanding of human values, they could pose a threat to human existence (Yudkowsky, 2023). While this is a stronger viewpoint, it shows how important it is to work toward this direction. And responsible AI acts as a first step in doing just that.

Conclusion

In conclusion, the evolution of Artificial Intelligence brings both unprecedented benefits and serious risks that demand immediate, comprehensive attention. Current regulatory frameworks struggle to keep pace with AI’s rapid advancement, and ethical frameworks (while valuable) are limited in effectively addressing the full scope of AI’s potential dangers. This literature review highlights the necessity of combining legal, ethical, and technical efforts to mitigate AI risks.

Given the inadequacies of existing regulations, alternative solutions such as global cooperation, transparency in AI development, and a strong emphasis on “responsible AI” are essential to ensure that AI technologies are aligned with human values. The complexity and scale of AI’s impact call for a unified, global approach where nations and organizations work collaboratively to address threats such as autonomous weaponry, environmental impacts, and ethical concerns.

Something to consider though is, even then, aligning AI systems to human values remains a challenge. An article by Nature News highlights that even if AI can make decisions based on ethical principles, it doesn’t necessarily mean they can act as autonomous moral agents like humans, and this opens the door to a whole new world of problems including the “Moral Lag Problem,” which refers to the gap between what humans should be morally and what they actually are (Serafimova, 2020). This problem complicates the creation of moral AI because it’s hard to avoid projecting human moral imperfections onto machines (Serafimova, 2020). So, to boil it down, the epitome of the advent of AI lies in perfecting human nature and morality, which can only be attained through the mass inner-transformation of human beings or what some may call enlightenment. Ultimately, this is what must be sought as the permanent and long-lasting solution to all the problems discussed above.

In conclusion, laws and regulations fail to effectively mitigate the threats posed by the growing capabilities of AI, and while alternative solutions such as balancing technological innovation with ethical responsibility and global cooperation are necessary to foster a safer, more sustainable future, the final destination/solution addressing the root of all problems lies in discovering the path to human transformation.

References

Amnesty Tech. (2024, January 16). The Urgent but Difficult Task of Regulating Artificial Intelligence. Amnesty International. https://www.amnesty.org/en/latest/campaigns/2024/01/the-urgent-but-difficulttask-of-regulating-artificial-intelligence/

Fenwick, A., & Molnar, G. (2022). The importance of humanizing AI: using a behavioral lens to bridge the gaps between humans and machines. Discover Artificial Intelligence, 2(1), 14. https://doi.org/10.1007/s44163-022-00030-8

Glover, E. (n.d.). What Is Responsible AI? Built In. Retrieved November 9, 2024, from https://builtin.com/artificial-intelligence/what-is-responsible-ai

Müller, V. C. (2023). Ethics of Artificial Intelligence and Robotics. In E. N. Zalta & U. Nodelman (Eds.), The Stanford Encyclopedia of Philosophy (Fall 2023). Metaphysics Research Lab, Stanford University. https://plato.stanford.edu/archives/fall2023/entries/ethics-ai/

Nguyen, A., Ngo, H. N., Hong, Y., Dang, B., & Nguyen, B.-P. T. (2023). Ethical principles for artificial intelligence in education. Education and Information Technologies, 28(4), 4221–4241. https://doi.org/10.1007/s10639-022-11316-w

Serafimova, S. (2020). Whose morality? Which rationality? Challenging artificial intelligence as a remedy for the lack of moral enhancement. Humanities and Social Sciences Communications, 7(1), 1–10. https://doi.org/10.1057/s41599-020- 00614–8

Thomas, M. (n.d.). 14 Dangers of Artificial Intelligence (AI). Built In. Retrieved November 9, 2024, from https://builtin.com/artificial-intelligence/risks-ofartificial-intelligence

U.S. Artificial Intelligence Policy: Legislative and Regulatory Developments. (n.d.). Retrieved November 9, 2024, from https://www.cov.com/en/news-and-insights/insights/2023/10/us-artificialintelligence-policy-legislative-and-regulatory-developments

Wheeler, T. (n.d.). The three challenges of AI regulation. Brookings. Retrieved November 9, 2024, from https://www.brookings.edu/articles/the-threechallenges-of-ai-regulation/

Yudkowsky, E. (2023, March 29). The Open Letter on AI Doesn’t Go Far Enough. TIME. https://time.com/6266923/ai-eliezer-yudkowsky-open-letter-not-enough/

]]>
https://gmucyber.onair.cc/saanvi-munigela/feed/ 0
Simeon Omorodion https://gmucyber.onair.cc/simeon-omorodion/ https://gmucyber.onair.cc/simeon-omorodion/#respond Wed, 08 Oct 2025 20:51:12 +0000 http://gmucyber.onair.cc/?p=7562

こんにちは, Hi! I am currently expanding my skills in Information Technology and rapidly learning Japanese as it’s my favorite foreign language.

Throughout, my tenure in Mason, I learned how to model Databases, program in Java, and even study abroad in Japan as an international student! With these skills, I feel empowered to tackle global technological challenges.

OnAir Post: Simeon Omorodion

]]>
Summary

こんにちは, Hi! I am currently expanding my skills in Information Technology and rapidly learning Japanese as it’s my favorite foreign language.

Throughout, my tenure in Mason, I learned how to model Databases, program in Java, and even study abroad in Japan as an international student! With these skills, I feel empowered to tackle global technological challenges.

OnAir Post: Simeon Omorodion

About

Web Links

]]>
https://gmucyber.onair.cc/simeon-omorodion/feed/ 0