Security Aug 9, 2019

Spy versus Spy who is watching who

“Over the last 2 years we’ve analyzed and reverse-engineered a plethora of IoT-enabled surveillance cameras and spy cameras analyzing their app behaviors, cloud storage, network communications, data-at-rest, and hardware. In this spy vs. spy presentation, we reveal the unforeseen dark side of using these devices and their full capabilities. Wired and wireless packet captures will be analyzed, as well as the use of open source tools for anomalous behavior analysis substantiating the risks surrounding these devices. We then outline methods for fortifying their deployment and minimizing unwanted eavesdroppers. Remember that spy camera you just plugged in, maybe the method by which someone else is spying on you. "

Bio: Michael T. Raggo, Chief Security Officer, 802 Secure has over 20 years of security research experience currently focusing on IoT threats impacting the enterprise. Michael is the author of “Mobile Data Loss: Threats & Countermeasures” and “Data Hiding” for Syngress Books. A former security trainer, Michael has briefed the FBI and Pentagon; and is a frequent presenter at security conferences including Black Hat, DEF CON, Gartner, RSA, HackCon, and SANS.

Chet Hosmer - Founder, Python Forensics, Inc. - Present Focus - collaborative development of open source investigative technologies using Python and other scripting languages. Research and Development of forensics, digital investigation and steganography for 20+ years. Public Speaker on emerging cyber threats including: National Public Radio’s Kojo Nnamdi show, ABC’s Primetime Thursday, and ABC News Australia. Frequent contributor to technical and news stories relating to cyber security and forensics with IEEE, The New York Times, The Washington Post, Government Computer News, Salon.com and Wired Magazine.