|Page (1) of 1 - 01/24/13||email article||print page|
Stephen Watt, a.k.a. The UNIX Terrorist, to Keynote Infiltrate Con, April 11-12 - First Public Talk Since Conviction in Worlds Largest Financial Cyber-Heist(January 24, 2013)
Miami Beach, FL (PRWEB) January 24, 2013
It was the biggest identity theft case in U.S. history - between 2005-2007, 170 million credit card numbers were stolen from Heartland Payment Systems, TJX and other national companies. The operation - known as Get Rich or Die Tryin - was led by convicted hacker Albert Gonzalez. But the U.S. Attorneys Office would later convict former rogue DefCon speaker and Wall Street programmer Stephen Watt of complicity in the crime for writing the packet-sniffing program blabla that was used by Gonzalez.
Now, after two years of incarceration in SeaTac Federal Detention Center, a $171.5 million restitution and still on probation, Stephen Watt a.k.a. The UNIX Terrorist will be giving his first public talk at this years Infiltrate offensive security conference in Miami Beach, April 11-12, 2013.
Were happy that Stephens lawyer was able to get him approval to keynote at this years conference, said Dave Aitel, CEO of Immunity Inc. and organizer of Infiltrate. Stephen has a formidable reputation as a programmer and an original thinker, and were looking forward to his talk on the criminal justice system as it pertains to com-puter crime. This talk is especially relevant given the recent death of Aaron Swartz, who also faced the same prosecutor as Stephen.
The title of Watts keynote presentation is, Turning Down an Offer You Cant Refuse.
My talk will be a journey through the legal system; essentially, what to expect if you dont snitch on your friends, said Watt. Im going to tell people the truth about what its like to be prosecuted under todays computer crime laws - from the overzealous tactics of prosecutors to the near-impossibility of thriving in a post-conviction life. Federal litigation exponentiates fines and sentences by stringing endless amounts of charges together. Most notably, in the case of file-sharing charges. So basically, this talk will cover everything from pretrial, to the courtroom, prison and probation.
On probation since February 2012, Watt is currently prohibited from using a non-Windows operating system on his government-monitored laptop. Hes also banned from using an iPhone or Android device. Im allowed to use a BlackBerry, but theyve told me theres just too much you can do on an iPhone, he said.
In spite of the severity of his punishment, Watt never benefited financially from his involvement with Gonzalez. While in prison, he also turned down a movie studio offer to option his life story for the big screen. Eric Eisner has since optioned the rights to Rolling Stones story on the group, Hackers Gone Wild: The Fast Times and Hard Fall of the Green Hat Gang.
Watt remains an opponent of computer vulnerability disclosure and the commercialization of exploit development. He has since developed a passion for discussing matters such as free speech, as well as prosecutorial and investigative tactics as they apply to cybercrime cases.
Stephen Watts keynote isnt the only noteworthy talk at this years Infiltrate. Here is a preliminary list of other talks at this years conference:
- Chris Eagle Keynote Speaker
- Esteban Guillardoy - Jurassic Jar: Their World. Our Rules.
- Miguel Turner - Exfiltrate: Efficient Blind SQLi
- Matias Soler - The Chameleon: A Cellphone-Based USB Impersonator
- Alberto Garcia - Enterprise Malware, There Is Always a Way. (DNS/DNSSEC)
- Sergey Gordeychik - Siemens Under the X-Ray
- Ling Chuan Lee and Lee Yee Chan - TTF Font Fuzzing and Vulnerability
- S.A. Ridley and Stephen Lawler - Advanced Exploitation Of Mobile/Embedded De-vices: The ARM Microprocessor
- Josh Thomas - NAND-Xplore -> Bad Blocks = Well Hidden
The conference will also include advanced training classes for professionals:
- Unethical Hacking - Immunitys most popular class focuses on teaching the fundamentals of Windows x86 exploitation by having students write exploits. This class attempts to teach a strategic approach to attack and penetration that goes beyond penetration testing to model how a real attacker targets your company. Its recommended students be familiar with x86 assembler, some reverse engineering, debugging and Windows memory management.
- Immunity Master Class - Fun with modern exploit development and vulnerability discovery techniques. Intermediate to advanced exploit development skills are recommended for students wishing to take the Master class.
- Web Hacking - A favorite among developers as well as infosec professionals, this class focuses on understanding common web hacking techniques by having students exploit vulnerable systems.
Now in its third year, Infiltrate (http://www.infiltratecon.com) is an exclusive offensive security conference for the infosec community, focused on advanced hacks, exploits and all things offensive. Organized by Dave Aitel and Immunity Inc., the conference is April 11-12, 2013 at the Fountainbleau Hotel in Miami Beach. Past speakers at Infiltrate include Charlie Miller, Andrew Cushman, Thomas Lim, Dan Rosenberg, Cesar Cerrudo and Jon Oberheide.
Read the full story at http://www.prweb.com/releases/2013/1/prweb10349836.htm.
Related Keywords:computer crime, computer crime, missile systems, political systems, computer crime, security, social security, national security, security measures, industrial accident, computing and information technology, satellite technology, wireless technology, industrial component, industrial production, science and technology, technology (general), identification technology, agricultural research and technology, computing and information technology, networking, satellite technology, wireless technology, science and technology, technology (general), identification technology, agricultural research and technology, computing and information technology, satellite technology, software, wireless technology, science and technology, technology (general), identification technology, agricultural research and technology, theft, fraud