Okebiz Video Search



Title:DEF CON 23 - Ken Westin - Confessions of a Professional Cyber Stalker
Duration:40:44
Viewed:6,145
Published:11-12-2015
Source:Youtube

For several years I developed and utilized various technologies and methods to track criminals leading to at least two dozen convictions. In the process of recovering stolen devices, larger crimes would be uncovered including drugs, theft rings, stolen cars, even a violent car jacking. Much of the evidence in these cases would be collected by stolen devices themselves, such as network information, photos captured from laptops and cell phones, but often times there was additional data that would need to be gathered for a conviction. In this presentation I will walk through actual real cases and discuss in depth the technologies used and additional processes I went through utilizing open source data and other methods to target criminals. I will also discuss how these same tools and methods can be used against the innocent and steps users and developers can take to better protect privacy.

In this presentation here are a few examples of cases I worked on which I will reveal details of:

How a theft ring targeting Portland, Oregon schools was unveiled leading to multiple convictions
How I tracked and recovered $9K worth of stolen camera equipment sold multiple times a year after it was stolen based on data extracted from images online
How mobile phones stolen from a wireless store were tracked leading to the arrest of a theft ring, leading to the conviction of six people and the recovery of a stolen car
Embedding of custom designed trojan for thermal imaging devices for theft tracking and export controls
Tracking of a stolen flash drive to a university computer lab and correlation of security camera and student access ID cards
Tracking a stolen laptop across state lines and how I gathered mountains of evidence in another theft ring case
Several other cases….

Speaker Bio:
Ken is a security analyst and "creative technologist" with 15 years experience building and breaking things through the use/misuse of technology. His technology exploits and endeavors have been featured in Forbes, Good Morning America, Dateline, the New York Times and others. He has worked with law enforcement and journalists utilizing various technologies to unveil organized crime rings, recover stolen cars, even a car jacking amongst other crimes.

SHARE TO YOUR FRIENDS


Download Server 1


DOWNLOAD MP4

Download Server 2


DOWNLOAD MP4

Alternative Download :



SPONSORED
Loading...
RELATED VIDEOS
DEF CON 23 - Zoz - And That's How I Lost My Other Eye...Explorations in Data Destruction (Fixed) DEF CON 23 - Zoz - And That's How I Lost My Oth...
53:09 | 469,543
DEF CON 18 - Panel - Defcon Security Jam III: Now in 3-D? DEF CON 18 - Panel - Defcon Security Jam III: N...
42:53 | 516
DEF CON 22 - Weston Hecker - Burner Phone DDOS 2 dollars a day : 70 Calls a Minute DEF CON 22 - Weston Hecker - Burner Phone DDOS ...
41:41 | 23,568
Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference Bill Swearingen - HAKC THE POLICE - DEF CON 27 ...
41:18 | 459,543
DEF CON 26 - m010ch - Please Do Not Duplicate Attacking the Knox Box DEF CON 26 - m010ch - Please Do Not Duplicate A...
18:47 | 178,897
DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars DEFCON 17: That Awesome Time I Was Sued For Two...
31:28 | 607,215
FleX FM - FLEXclusive Cypher 23 (Nimo) FleX FM - FLEXclusive Cypher 23 (Nimo)
04:44 | 902,944
DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor DEF CON 22 - Metacortex and Grifter - Touring t...
48:17 | 337,919


coinpayu