NOTACON 3: How to Survive a Federal Investigation
Speaker: Paul Timmins
Rather than just yet another boring speech about 802.11b and security, this will be a story about what happens when the world closes in on you, because of the above items. Detailed will be a good account of my arrest by the FBI, my interrogation, my court hearings, and what it's like to hear your name opening the 6 o'clock news. I intend to be quite humorous and sarcastic, but also quite serious. If this is a situation I can be in, it's a situation anyone can be in.
What to do if you're arrested
What to do if you're raided (and why a search warrant means EVERYTHING)
What to do when you're interrogated
What to do when you find yourself caught in the middle of a crime you want nothing to do with
What I could have done better
How to cope with the crushing feeling you get when you see: "The United States of America, vs (Your name here)"
Court precedents you should know about
Preparing to find out who your friends truly are
A deer in the headlights: Backing up the data you want to have when it's all over
Forfeiture, and what it means to you
The importance of competent legal representation
What to do before you go in to make your arrest and release easier
I will be able to hand out a limited number of copies of all my legal documents on CD-ROM. All items to date have been scanned and converted to PDF format. If attendance is high, the documents are also available on my website.
For more information visit: http://bit.ly/NOTACON_2006_information
To download the video visit: http://bit.ly/NOTACON_2006_videos
Видео NOTACON 3: How to Survive a Federal Investigation канала Christiaan008
Rather than just yet another boring speech about 802.11b and security, this will be a story about what happens when the world closes in on you, because of the above items. Detailed will be a good account of my arrest by the FBI, my interrogation, my court hearings, and what it's like to hear your name opening the 6 o'clock news. I intend to be quite humorous and sarcastic, but also quite serious. If this is a situation I can be in, it's a situation anyone can be in.
What to do if you're arrested
What to do if you're raided (and why a search warrant means EVERYTHING)
What to do when you're interrogated
What to do when you find yourself caught in the middle of a crime you want nothing to do with
What I could have done better
How to cope with the crushing feeling you get when you see: "The United States of America, vs (Your name here)"
Court precedents you should know about
Preparing to find out who your friends truly are
A deer in the headlights: Backing up the data you want to have when it's all over
Forfeiture, and what it means to you
The importance of competent legal representation
What to do before you go in to make your arrest and release easier
I will be able to hand out a limited number of copies of all my legal documents on CD-ROM. All items to date have been scanned and converted to PDF format. If attendance is high, the documents are also available on my website.
For more information visit: http://bit.ly/NOTACON_2006_information
To download the video visit: http://bit.ly/NOTACON_2006_videos
Видео NOTACON 3: How to Survive a Federal Investigation канала Christiaan008
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
DEFCON 17: "Smart" Parking Meter Implementations, Globalism, and YouDEFCON 15: Multipot: A More Potent Variant of Evil TwinBlack Hat USA 2010: Network Stream Debugging with Mallory 4/5DEFCON 19: Network Application Firewalls: Exploits and Defense ( w speaker)CIC Collaboration Project26C3: Blackbox JTAG Reverse Engineering 1/6Black Hat USA 2010: Code Reuse/Return Oriented Programming in PHP Application Exploits 1/527c3: International Cyber Jurisdiction (en)Black Hat USA 2010: Hacking Browser's DOM: Exploiting Ajax and RIA 3/6DEFCON 19: From Printer To Pwnd: Leveraging Multifunction Printers During Penetration TestingDEFCON 19: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP (w speaker)30C3: Making machines that make (EN)OWASP AppSecUSA 2012: The Same-Origin SagaOWASP AppSec 2010: OWASP Top 10 2010 1/3Black Hat USA 2010: Semiconductor Security Awareness, Today and Yesterday 6/6DEFCON 16: Forensics is ONLY for Private Investigators27c3: How the Internet sees you (en)DeepSec 2011: Extending Scapy by a GSM Air Interface and Validating the ImplementationCIC News 11-01-2014: Target Data Breach Affected 70M | Fake AV served to Dailymotion visitorsBlack Hat USA 2010: Hacking Browser's DOM: Exploiting Ajax and RIA 2/6CIC News 06-01-2014: NSA installing spyware | Hackers empty ATM | Botnet code creator jailed