}?>
![]() |
![]() |
} function draw_right_margin() { global $color_tb, $color_bg, $color_nb, $color_bd; ?> | ![]() |
|
![]() |
|
![]() |
UPDATE: I'm speaking at DEFCON XXIII. Aug 7, 2015 @ 1:00pm, Bally's Las Vegas
Also, here is a handy printable DEFCON 23 schedule.
|
I've been fortunate in being able to speak at DEFCON seven times (including
the upcoming DEFCON XXIII). I've also covered DEFCON for Computer World Magazine.
|
DEFCON XXIII, Aug 2015 “Applied Intelligence: Using Information That's Not There”
Organizations continue to unknowingly leak trade secrets on the Internet. To those in the know,
these leaks are a valuable source of competitive intelligence. This talk describes how the speaker
collects competitive intelligence for his own online retail business. Specifically, you learn how
he combines, trends, and analyzes information within specific contexts to manufacture useful data
that is real, but technically doesn't exist on it's own. For example, you will learn about the trade
secrets that are hidden within sequential numbers, how he uses collected intelligence to procure inventory,
and how and why he gauges the ongoing health of his industry and that of his competitors. And on a related
note, you'll also learn how the federal government nearly exposed an entire generation to identity fraud.
|
DEFCON XXII, Aug 2014 “You're Leaking Trade Secrets”
Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade
secrets. While we hear a lot about personal privacy, little is said in regard to organizational privacy. Organizations, in fact, leak information
at a much greater rate than individuals, and usually do so with little fanfare. There are greater consequences for organizations when information
is leaked because the secrets often fall into the hands of competitors. This talk uses a variety of real world examples to show how trade secrets
are leaked online, and how organizational privacy is compromised by seemingly innocent use of The Internet.
|
DEFCON XXI, Las Vegas NV, Aug 2013 “How my Botnet Purchased Millions of Dollars in Cars, and Defeated the Russian Hackers”
This is the true story of a botnet that created a competitive advantage for a car dealership. This dealership found a website that offered returned lease vehicles—great cars for their inventory—but bad web design and heavy competition from other automotive dealerships made the website useless. In response, a botnet was developed to make automotive purchases with machine precision. With the bot, they could acquire any cars they wanted, without interference from competing dealerships. During its one-year life, this botnet autonomously acquired many millions of dollars in cars. Along the way, it successfully adjusted to competition from a similar bot developed by Russian hackers while maintaining a sufficiently low profile to “stay below the radar” of everyone involved.
|
DEFCON XVII, Las Vegas NV, Aug 2010 “Screen Scraper Tricks, Difficult Cases” ![]() Quoted from the DEFCON XV program |
![]() |
DEFCON XV, Las Vegas NV, Aug 2007
“The Executable Image Exploit”![]() This lecture described how to disguise computer programs as online images that may be used to gather specific metrics. I also talked about how these methods were used to help a Private Investigator track an online stalker. You can watch Michael Schrenk's DEFCON 15 talk here. |
![]() |
DEFCON XI, Las Vegas NV, Aug 2003 “Online Corporate Intelligence” In this presentation, I enlarged on the previous year's pretension to show how automation can improve Corporate Competitive Intelligence. Follow the link for details on Michael Schrenk's DEFCON XI Talk |
DEFCON X, Las Vegas NV, Aug 2002 “An Introduction to Writing Webbots and Spiders” ![]() From the DEFCON X program Follow the link for more information on Michael Schrenk's DEFCON 10 Talk. |
Computer World Magazine, Aug 1997 “Fear and Hacking in Las Vegas” Back in the '90s, I pioneered ways to transmit heart biometrics to physicians over the Internet via a standard browser and simple hardware. Because of the requirements of the medical industry, I became very interested in online security. At the same time, I became frustrated with the data security education available at the time. During this time I discovered that the hacker community was by far the best place to learn about security (it still is). I wanted to attend DEFCON 5, the world's largest hacker convention, but didn't want to offend the extremely conservative consulting firm that employed me. I found the solution to my problem by covering the story for Computer World Magazine. In the process, I got to work with a big-time photographer, Susan Werner, and had a great introduction to writing. (This was my first paying writing gig.) The article is no longer on the Computer World website, but you can read the archive of Fear and Hacking in Las Vegas on the DEFCON website. |
|