When Devices Rat Us Out

BSidesLV 2012

Presented by: Ken Westin
Date: Wednesday July 25, 2012
Time: 12:00 - 12:50
Location: Track 3
Track: Underground

Over the past 5 years I have been involved in developing advanced tracking technologies to assist in the recovery of stolen laptops, phones, cameras, flash drives and more: http://www.gadgettrak.com/recoveries/ We have built software that gets location of devices without GPS, uses cameras to capture photos of suspects and technology that indexes the web to extract serial numbers from photos online in search of stolen cameras.Through this process I have worked closely with law enforcement in the recover processes as well as provided training to law enforcement agencies on tracking technology and how to use it in their cases. While working with law enforcement I have learned a great deal regarding processes they go through to get data on suspects from companies, technologies they use and what is on the horizon in terms of surveillance technology and how the data we freely give to companies can be used against us.

In my presentation I will be discussing many of the recoveries that I have been involved with, the technologies that were used as well as additional evidence we provided to police via social media networks and other data mining efforts. Many of our cases have not only led to the recovery of stolen devices but also larger crimes such as larger theft rings, a violent car jacking, drugs, identity theft and the recovery of a stolen car. I will also discuss how the same technologies and data mining can be used against you, the data that law enforcement has access to and the processes they go through to get it. I will also discuss newer technologies that are being introduced such as license plate readers, facial recognition software and other tools law enforcement are starting to bring into their arsenal. I would like the presentation to be a discussion regarding how new technology can be used for good and evil and what checks the government should have in place to warrant their use.


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats