Presented at
The Next HOPE (2010),
July 18, 2010, 10 a.m.
(60 minutes).
This presentation will touch upon broad aspects of forensics, encryption, and social engineering, and how they relate to the tracking of extremists.
Hat Trick has over seven years of experience in this very unique field, and has put together one of the world’s largest open source databases of extremist multimedia. Topics covered include common vulnerabilities of extremist sites, the unique behaviors of extremists, how to get terrorist IPs and passwords, and what to do with them when you’ve got them.
Mudsplatter will discuss the psychology of manipulation, and how to gain access to even the most secure networks using simple tricks of social engineering. Topics include how to lie with confidence, getting the paranoid to trust you, using trolling to your advantage, and some of the most common liabilities of social networking.
Presenters:
-
Hat Trick
Hat Trick has built and maintained a dedicated website dealing with obtaining information from terrorist networks. He has worked with information gathering of terrorist networks with http://www.liveleak.com, National Geographic in providing footage for Reign of Terror - Suicide Web, and for government agencies. He now serves as web application security consultant for a Fortune 20 financial institution.
-
Mudsplatter
Mudsplatter has served four years in the U.S. Air Force as a computer, network, crytography, and telephone switching tech. He has also served a year with the NSHC in South Korea, performing research and development as the senior master security engineer and lead security consultant and is currently the acting military liaison for NeoCatena Systems.
Links:
Similar Presentations: