Oct 14, 2021: - 2021 NY Metro Joint Cyber Security Conference - NOWHERE TO HIDE Talk

Updated: Oct 27



The 2021 NY Metro Joint Cyber Security Conference will take place virtually on October 14th. It will be celebrating its 8th year featuring keynotes, panels and sessions aimed at educating everyone on the various aspects of information security and technology.


https://www.infosecurity.nyc/index.html

https://www.youtube.com/watch?v=2qKYOcNPI1Q



Nowhere to Hide: How the FBI, Media, and Public Identified the January 6, 2021 U.S. Capitol Rioters

Daniel Farber Huang, CEO, EchoStream Group


In this engaging presentation the audience will learn about the FBI's wide range of investigative techniques - some using cutting-edge technology and others using old fashioned, knocking-on-doors detective work - used to pursue the hundreds of thousands of leads received from the general public related to the assault on the U.S. Capitol. This presentation is filled with real world tactics drawn from hundreds of formal investigations conducted by the FBI in the weeks immediately following January 6, 2021. In this information-abundant talk, we will examine case studies, specific resources and practical techniques to equip both beginner and seasoned OSINT investigators with the right tools for their OSINT toolboxes.


We will analyze the FBI's investigations of suspects, including the tactics, techniques, and procedures used by law enforcement, the media, and public sleuths to track down, identify, and - most importantly - verify the identities of suspected rioters. Learn how the FBI sifted through hundreds of thousands of leads, false positives, dead ends, as well as numerous unexpected leads to perform their investigations.


Effective OSINT research requires a combination of technical knowledge to find the Who, What, When, Where, and How threads of data and information as well as taking into account unpredictable human nature (the Why). OSINT is both science and art. "Nowhere to Hide" provides practical, actionable information to help both novice and expert investigators, researchers, advocates, and journalists navigate and penetrate OSINT resources to find the information and evidence they seek.

Key Takeaways:

  • Learning about the wide range of innovative OSINT techniques agents used to successfully identify the hundreds of rioters involved in the Capitol breach.

  • Understanding the breadth of open source websites and resources available to researchers to conduct effective investigations.

  • Learning to analyze and verify (or reject) the disparate breadcrumbs of information collected during an investigation to develop an accurate profile of suspects.