

{"id":2103,"date":"2025-01-09T09:42:13","date_gmt":"2025-01-09T14:42:13","guid":{"rendered":"https:\/\/sites.temple.edu\/socialengineering\/?page_id=2103"},"modified":"2026-03-07T09:58:38","modified_gmt":"2026-03-07T14:58:38","slug":"theme","status":"publish","type":"page","link":"https:\/\/sites.temple.edu\/socialengineering\/theme\/","title":{"rendered":"Theme"},"content":{"rendered":"<p>We are excited to share that we are partnering with <a href=\"https:\/\/www.meetup.com\/owasp-philadelphia-chapter\/\" target=\"_blank\" rel=\"noopener\">OWASP Philly<\/a> for our 2026 event!<\/p>\n<p>The theme for the 2026 competition is \u201cAI-Enhanced Social Engineering Attacks on a Community-Based Pharmacy\u201d.<\/p>\n<p><strong>GUIDELINES FOR USING AI TOOLS IN THE COMPETITION<\/strong><\/p>\n<p>During the live event, participants will be required to identify and utilize AI tools of their choice, such as text generators, or image generators. It\u2019s crucial to begin researching and familiarizing yourself with these tools ahead of time.<\/p>\n<h3 data-start=\"126\" data-end=\"158\">Approved Tools &amp; Resources<\/h3>\n<p data-start=\"159\" data-end=\"487\">To ensure fairness, accessibility, and participant safety, all teams are required to use tools that are <strong data-start=\"263\" data-end=\"283\">freely available<\/strong> and <strong data-start=\"288\" data-end=\"305\">non-localized<\/strong> (i.e., AI models accessed through the internet rather than ones installed and run on a personal computer). Teams should assume that <strong data-start=\"1380\" data-end=\"1518\">tools requiring paid subscriptions, enterprise licenses, or temporary free trials are not permitted unless explicitly stated otherwise; <\/strong>teams should plan to rely on <strong data-start=\"1380\" data-end=\"1518\">freely available OSINT and AI tools that are accessible to all participants<\/strong>. Teams may choose from any platform that meets these criteria, provided the tool serves the following functions.<\/p>\n<p data-start=\"159\" data-end=\"487\"><strong data-start=\"491\" data-end=\"511\">Text Generation:<\/strong> Tools that can generate written content to assist with creating personas, pretexts, phishing messages, or vishing scripts.<br \/>\n<strong data-start=\"639\" data-end=\"660\">Image Generation:<\/strong> Tools that can produce or supply realistic human-like images for personas.<br \/>\n<strong data-start=\"740\" data-end=\"778\">Text-to-Speech (for voice generation):<\/strong> Tools that can create or modify artificial voices for vishing calls. <strong>Note: Only synthetic voices may be used.<\/strong><\/p>\n<h3 data-start=\"1025\" data-end=\"1043\">Requirements<\/h3>\n<ul>\n<li data-start=\"1046\" data-end=\"1113\">Tools must be <strong data-start=\"1060\" data-end=\"1078\">free to access<\/strong> (no paid subscription required).<\/li>\n<li data-start=\"1046\" data-end=\"1113\">Tools must be <strong data-start=\"1130\" data-end=\"1147\">non-localized<\/strong> (AI models accessed through the internet rather than ones installed and run on a personal computer). To promote transparency, teams may only use <strong data-start=\"486\" data-end=\"554\">non-localized tools that provide sharable URLs of their sessions. <\/strong>These URLs must be included as part of the final deliverables so that judges can review the prompts, responses, and workflow.<\/li>\n<li data-start=\"1046\" data-end=\"1113\"><strong data-start=\"379\" data-end=\"473\">Personal or localized LLMs (models installed and run on private devices) are not permitted<\/strong>, as they may vary in size, customization, or hardware requirements, which could create an uneven playing field. <em>Teams found using personal or localized LLMs will be disqualified.<\/em><\/li>\n<li data-start=\"1046\" data-end=\"1113\">Tools must not require students to submit their own voice or other PII.<\/li>\n<li>All submissions must include documentation of the tools used and how they were applied in your workflow.<\/li>\n<li data-start=\"1046\" data-end=\"1113\">Students are <strong data-start=\"1269\" data-end=\"1322\">not permitted to impersonate any real individuals<\/strong> (living or deceased).<\/li>\n<li data-start=\"1046\" data-end=\"1113\">Students are <strong data-start=\"1362\" data-end=\"1426\">not permitted to represent or impersonate real organizations<\/strong>, whether currently active or defunct.<\/li>\n<\/ul>\n<p><em>DeepSeek is not allowed for this competition<\/em>.<\/p>\n<h3><strong>Privacy is a key consideration<\/strong><\/h3>\n<ul>\n<li>Participants are <strong>prohibited<\/strong> <strong>from entering, uploading, or using any sensitive, confidential, or personally identifiable information [including voice]<\/strong>\u00a0<strong>(their own &#8211; or someone else&#8217;s) <\/strong>in any way in this competition.<\/li>\n<li><strong>Temple University, the CARE Lab, and the Advisory Board are not liable<\/strong> for the participants\u2019 actions.<\/li>\n<li>Remember that <strong>you are representing your institution<\/strong>, so ensure that you play by its rules.<\/li>\n<\/ul>\n<p><strong>IMPORTANT NOTES<\/strong><\/p>\n<ol>\n<li>The advisor\/mentor can be full-time faculty, full-time staff or full-time graduate student. Advisors\/mentors who have part-time status (adjuncts, members from industry\/government\/nonprofit etc.) are not permitted. If you are a graduate student team, your advisor\/mentor must be faculty or staff. Each team can only have ONE advisor\/mentor.<\/li>\n<li>Participation will require parental permission (if under age 18).<\/li>\n<li>All selected participants must sign two waivers. The <span style=\"text-decoration: underline\"><strong>first waiver<\/strong><\/span> ensures that students do not cheat, use external\/professional assistance, and use AI responsibly. This waiver must be completed during the application process.<\/li>\n<li>Zoom calls will be recorded, and those that are excellent will be shared on our website and\/or at conference presentations! Each member of selected teams must also complete a <span style=\"text-decoration: underline\"><strong>second waiver<\/strong><\/span> which includes an audio-visual release to compete. This allows organizers to use images, audio, text, and video generated during the competition for event promotion and dissemination via conferences, publications, and podcasts. This waiver must be completed by each member of selected teams before the competition begins.<\/li>\n<li>Each member of selected teams will be required to complete a pre-event and post-event survey.<\/li>\n<li>Students are encouraged to check the <a href=\"https:\/\/sites.temple.edu\/socialengineering\/faqs\/\"><strong>FAQ page<\/strong><\/a>, especially #14 \u201cHow do I prepare?\u201d to access resources that they may find useful.<\/li>\n<li>The orientation session will cover competition structure, schedule, rules, ethics, and waivers. The organizers will also answer any questions that teams may have.<\/li>\n<\/ol>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2629\" src=\"https:\/\/sites.temple.edu\/socialengineering\/files\/2026\/02\/2026_SECTF_Banner_Logos.png\" alt=\"\" width=\"4278\" height=\"553\" \/><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are excited to share that we are partnering with OWASP Philly for our 2026 event! The theme for the 2026 competition is \u201cAI-Enhanced Social&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/sites.temple.edu\/socialengineering\/theme\/\">Continue reading<span class=\"screen-reader-text\">Theme<\/span><\/a><\/div>\n","protected":false},"author":2224,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/full-width.php","meta":{"footnotes":""},"class_list":["post-2103","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/2103","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/users\/2224"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/comments?post=2103"}],"version-history":[{"count":46,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/2103\/revisions"}],"predecessor-version":[{"id":2960,"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/pages\/2103\/revisions\/2960"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/socialengineering\/wp-json\/wp\/v2\/media?parent=2103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}