SlideShare a Scribd company logo
Don’t Panic! Big Data Analytics vs. Law Enforcement.
Who can Solve it Faster?
There has been a murder…
www.hackerhalted.com 2
On this street
www.hackerhalted.com 3
At this time:
www.hackerhalted.com 4
A body is
discovered.
www.hackerhalted.com 5
White male, age 38
A woman discovers the body at 1:50AM
after her shift ends at Tonio’s restaurant.
She immediately calls the police.
www.hackerhalted.com 6
Police arrive at
1:53AM.
The officers
cordon off the
area and check
for clues.
www.hackerhalted.com 7
www.hackerhalted.com 8
Detective looks up and
sees a security camera
on the corner building…
Time of death –recent
Type – knife wound
Wallet is intact – license,
credit cards, photos, and
cash
Witnesses – no one is
around besides the
woman who called
Side street
• Detective finally gets access to
the owner of the building and
gets a copy of the footage; they
discover limited traffic but at
1:38AM they catch a partial
image of a white male in a blue
hooded sweatshirt, face
unrecognizable.
www.hackerhalted.com 9
Evidence
Investigation
• Determine victim’s identity
• Make/model of victim’s car
• Time of death
• Suspected method
• Physical evidence
• Begin witness canvassing
• Victim’s entire geo coordinate information
• Pattern of life
• Social life
• Work life
• Shopping, interests, politics, health
• Predictive, accurate measures of behavior
www.hackerhalted.com 10
Detectives Big Data
Investigation
• Interview witnesses
• Talk to victim’s family, friends, co-workers
• Look through social media
• Profile on victim
• Profile of suspects
• Process evidence
• Facts
• No useable DNA
• Facial recognition not useable
• No grudges or beef
• Knife was not victim’s
• No witnesses saw anything
• Location of all other people nearby at the
time of the incident
• Pattern of life on every one of those
people
• Google locations
• GPS locations / frequent places
• Social media data collection
• Vehicle identification
• Family history
• Behavioral tendencies
• Smart home sensor data
• Ambient noise recordings
• Buying and purchase history based on tailored
ad content
www.hackerhalted.com 11
Detectives Big Data
Putting the Two Together
Based on ISP records and social
media post location, detectives were
able to retrieve the names of
everyone with in a 1 km radius, 10
minutes before and after the crime
took place.
11 individuals were identified
• 8 individuals were Female
• 3 individuals were male
• Target recon conducted on the 3 males
identified
www.hackerhalted.com 12
Story Wrap-Up
The Suspect
• Acted out of anger / Road rage
• Victim parked too close to suspect’s car
• No connection to the victims life
• Law enforcement can not find any direct link from the suspect to the
victim and will need to use data analytic tools to help solve this
crime.
• Data Analysts and Targeters used data driven OSINT to build a
profile and a pattern of life for the suspect.
www.hackerhalted.com 13
Thank you.
Tyler Cohen Wood
Executive Director Cyber Workforce Development
CyberVista
Tyler.CohenWood@cybervista.net
Twitter: @TylerCohenWood
LinkedIn: linkedin.com/in/tylercohen78
Matt Salmon
Technical Cybersecurity Manager
CyberVista
Matt.Salmon@cybervista.net
LinkedIn: linkedin.com/in/matthew-salmon-129155a4
www.hackerhalted.com 14

More Related Content

Similar to Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement

Brandon Brown Seth Rich Conspiracy Final Project.pptx
Brandon Brown Seth Rich Conspiracy Final Project.pptxBrandon Brown Seth Rich Conspiracy Final Project.pptx
Brandon Brown Seth Rich Conspiracy Final Project.pptx
Brandon370226
 
Unit 20 Audio-visual Synopsis
Unit 20 Audio-visual Synopsis Unit 20 Audio-visual Synopsis
Unit 20 Audio-visual Synopsis
selbye
 
The lindbergh baby kidnapping
The lindbergh baby kidnappingThe lindbergh baby kidnapping
The lindbergh baby kidnapping
morgen345
 
Unit 20, audio visual Synopsis
Unit 20, audio visual SynopsisUnit 20, audio visual Synopsis
Unit 20, audio visual Synopsis
selbye
 
Zodiac
ZodiacZodiac
Grim Sleeper
Grim SleeperGrim Sleeper
Grim Sleeper
bjacksonp1
 
The grim sleeper nyree williams
The grim sleeper nyree williamsThe grim sleeper nyree williams
The grim sleeper nyree williams
NyreeWilliams
 
ETHICS08 - Sarah's Law and the Implications of Technology Legislation
ETHICS08 - Sarah's Law and the Implications of Technology LegislationETHICS08 - Sarah's Law and the Implications of Technology Legislation
ETHICS08 - Sarah's Law and the Implications of Technology Legislation
Michael Heron
 
E3a1 offender profiling
E3a1 offender profilingE3a1 offender profiling
E3a1 offender profiling
Aarono1979
 
Forensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdfForensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdf
phweb
 

Similar to Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement (10)

Brandon Brown Seth Rich Conspiracy Final Project.pptx
Brandon Brown Seth Rich Conspiracy Final Project.pptxBrandon Brown Seth Rich Conspiracy Final Project.pptx
Brandon Brown Seth Rich Conspiracy Final Project.pptx
 
Unit 20 Audio-visual Synopsis
Unit 20 Audio-visual Synopsis Unit 20 Audio-visual Synopsis
Unit 20 Audio-visual Synopsis
 
The lindbergh baby kidnapping
The lindbergh baby kidnappingThe lindbergh baby kidnapping
The lindbergh baby kidnapping
 
Unit 20, audio visual Synopsis
Unit 20, audio visual SynopsisUnit 20, audio visual Synopsis
Unit 20, audio visual Synopsis
 
Zodiac
ZodiacZodiac
Zodiac
 
Grim Sleeper
Grim SleeperGrim Sleeper
Grim Sleeper
 
The grim sleeper nyree williams
The grim sleeper nyree williamsThe grim sleeper nyree williams
The grim sleeper nyree williams
 
ETHICS08 - Sarah's Law and the Implications of Technology Legislation
ETHICS08 - Sarah's Law and the Implications of Technology LegislationETHICS08 - Sarah's Law and the Implications of Technology Legislation
ETHICS08 - Sarah's Law and the Implications of Technology Legislation
 
E3a1 offender profiling
E3a1 offender profilingE3a1 offender profiling
E3a1 offender profiling
 
Forensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdfForensic psychology powerpoint.pdf
Forensic psychology powerpoint.pdf
 

More from EC-Council

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
EC-Council
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
EC-Council
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
EC-Council
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
EC-Council
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
EC-Council
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
EC-Council
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
EC-Council
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
EC-Council
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
EC-Council
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
EC-Council
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
EC-Council
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
EC-Council
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
EC-Council
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
EC-Council
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
EC-Council
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
EC-Council
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
EC-Council
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
EC-Council
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
EC-Council
 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
EC-Council
 

More from EC-Council (20)

CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber WorldCyberOm - Hacking the Wellness Code in a Chaotic Cyber World
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
 
Cloud Security Architecture - a different approach
Cloud Security Architecture - a different approachCloud Security Architecture - a different approach
Cloud Security Architecture - a different approach
 
Phases of Incident Response
Phases of Incident ResponsePhases of Incident Response
Phases of Incident Response
 
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 Weaponizing OSINT – Hacker Halted 2019 – Michael James  Weaponizing OSINT – Hacker Halted 2019 – Michael James
Weaponizing OSINT – Hacker Halted 2019 – Michael James
 
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith TurpinHacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff SilverCloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
 
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel NaderBreaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
 
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian HilemanAre your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
 
War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019War Game: Ransomware – Global CISO Forum 2019
War Game: Ransomware – Global CISO Forum 2019
 
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
 
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...Introduction to FAIR Risk Methodology – Global CISO Forum 2019  –  Donna Gall...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
 
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes WidnerAlexa is a snitch! Hacker Halted 2019 - Wes Widner
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
 
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
 
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
 
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
 
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
 
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 

Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement

  • 1. Don’t Panic! Big Data Analytics vs. Law Enforcement. Who can Solve it Faster?
  • 2. There has been a murder… www.hackerhalted.com 2
  • 4. At this time: www.hackerhalted.com 4 A body is discovered.
  • 6. A woman discovers the body at 1:50AM after her shift ends at Tonio’s restaurant. She immediately calls the police. www.hackerhalted.com 6
  • 7. Police arrive at 1:53AM. The officers cordon off the area and check for clues. www.hackerhalted.com 7
  • 8. www.hackerhalted.com 8 Detective looks up and sees a security camera on the corner building… Time of death –recent Type – knife wound Wallet is intact – license, credit cards, photos, and cash Witnesses – no one is around besides the woman who called Side street
  • 9. • Detective finally gets access to the owner of the building and gets a copy of the footage; they discover limited traffic but at 1:38AM they catch a partial image of a white male in a blue hooded sweatshirt, face unrecognizable. www.hackerhalted.com 9 Evidence
  • 10. Investigation • Determine victim’s identity • Make/model of victim’s car • Time of death • Suspected method • Physical evidence • Begin witness canvassing • Victim’s entire geo coordinate information • Pattern of life • Social life • Work life • Shopping, interests, politics, health • Predictive, accurate measures of behavior www.hackerhalted.com 10 Detectives Big Data
  • 11. Investigation • Interview witnesses • Talk to victim’s family, friends, co-workers • Look through social media • Profile on victim • Profile of suspects • Process evidence • Facts • No useable DNA • Facial recognition not useable • No grudges or beef • Knife was not victim’s • No witnesses saw anything • Location of all other people nearby at the time of the incident • Pattern of life on every one of those people • Google locations • GPS locations / frequent places • Social media data collection • Vehicle identification • Family history • Behavioral tendencies • Smart home sensor data • Ambient noise recordings • Buying and purchase history based on tailored ad content www.hackerhalted.com 11 Detectives Big Data
  • 12. Putting the Two Together Based on ISP records and social media post location, detectives were able to retrieve the names of everyone with in a 1 km radius, 10 minutes before and after the crime took place. 11 individuals were identified • 8 individuals were Female • 3 individuals were male • Target recon conducted on the 3 males identified www.hackerhalted.com 12
  • 13. Story Wrap-Up The Suspect • Acted out of anger / Road rage • Victim parked too close to suspect’s car • No connection to the victims life • Law enforcement can not find any direct link from the suspect to the victim and will need to use data analytic tools to help solve this crime. • Data Analysts and Targeters used data driven OSINT to build a profile and a pattern of life for the suspect. www.hackerhalted.com 13
  • 14. Thank you. Tyler Cohen Wood Executive Director Cyber Workforce Development CyberVista Tyler.CohenWood@cybervista.net Twitter: @TylerCohenWood LinkedIn: linkedin.com/in/tylercohen78 Matt Salmon Technical Cybersecurity Manager CyberVista Matt.Salmon@cybervista.net LinkedIn: linkedin.com/in/matthew-salmon-129155a4 www.hackerhalted.com 14

Editor's Notes

  1. It’s not just each separate detail, it’s how the details are put together to portray a frighteningly accurate picture of a person’s entire life including things they might not even know about themselves. Think of it like a private detective following, cataloging every move you’ve ever made and questioning every person you’ve ever contacted to put together your life profile. Driving history, speeding, all locations Friends, family Explain detail and depth on each topic Exact genetic profile Work history Pattern of typing, walking Hobbies, drinking/eating patterns Exercise Shopping—likely to buy ALL LOCATIONS Type of person Home address Dating apps Uber patent Personal assistant devices recording all speech Android and app permission creep Posting Facial recognition Photo metadata
  2. Detectives—show image to friends, family Look through social media for clues
  3. Talking points to tell story: By querying Waze, frequent speeder, drives erratically Frequently posts on social media about idiot drivers Recently fired—LinkedIn shows job histories lasting no more than 3 months Posted a photo of the victim’s car who parked so close to him, showing his car and victim’s car Recent credit card purchases – bought a fixed blade camping knife Last thing they got, Alexa—recorded him talking about the incident
  4. OSINT hasn’t just solved one crime. It has solved dozens over the years.