1 day ago
Behind Enemy Lines: Collaborating with Blackhats | Joshua Smith
Behind Enemy Lines: Collaborating with Blackhats
Presenter: Joshua Smith
00:00 – Intro: The Reality of Online Child Exploitation
03:12 – Why Traditional Investigations Fall Short
06:28 – Enter the Blackhats: An Unconventional Approach
09:47 – How These Collaborations Actually Work
13:05 – Accessing Hidden Communities & Criminal Ecosystems
16:22 – Ethical Dilemmas & Moral Boundaries
19:41 – Real-World Case Study: Distribution Ring Investigation
23:58 – Outcomes: Evidence, Identification & Arrests
27:10 – Risks, Tradeoffs & Hard Decisions
30:05 – Final Thoughts: Awareness vs Endorsement
How can unconventional partnerships help protect children online?
Online predators continue to evolve, often operating in spaces where traditional investigative methods struggle to keep up. In some cases, protecting children requires approaches that challenge conventional boundaries.
What is this talk about?
In this session, I explore the unconventional and often controversial process of working with blackhat hackers to support investigations into online child exploitation. These collaborations leverage deep technical expertise in cybercrime to uncover hidden threats, identify predatory behavior, and collect critical evidence.
Why work with individuals involved in cybercrime?
Some of the most effective insights into criminal ecosystems come from those who understand them intimately. By collaborating with individuals who possess firsthand knowledge of underground platforms, tooling, and tactics, investigators can gain visibility into spaces that are otherwise difficult to access.
What ethical challenges does this approach raise?
These partnerships are not without serious ethical concerns. The session addresses the fine line between ethical responsibility and effective intervention, examining how investigators balance moral boundaries while pursuing the protection of vulnerable victims.
What real world case is discussed?
The talk outlines a recent case involving a distribution ring, demonstrating how these unconventional collaborations played a pivotal role in launching investigations, gathering evidence, and ultimately capturing predators.
Why do traditional methods sometimes fall short?
Predators often exploit anonymity, encrypted platforms, and closed communities. This session explains why standard investigative techniques may struggle in these environments and how alternative approaches can provide critical breakthroughs.
Who is this talk for?
Attendees will gain insight into how complex, ethically challenging collaborations can be leveraged to safeguard children online. This talk is intended for security professionals, investigators, and defenders seeking to understand the realities of modern cyber-enabled crime and the difficult decisions involved in combating it.
What is the goal of this session?
The purpose is awareness, not endorsement of unethical behavior. This talk highlights the realities of modern investigations and the difficult choices sometimes required to protect children from harm.
#cybersecurity #childsafety #onlinepredators #infosec #cybercrime #digitalinvestigations #defensivesecurity #ethicalhacking #threatintel #lawenforcement
Sign Up for the next WWHF
Want more hands-on cybersecurity training? Register for this year’s Wild West Hackin Fest and get access to workshops, live labs, and sessions taught by industry practitioners. Secure your spot and level up your defensive and offensive skills at one of the most respected community focused security conferences. https://wildwesthackinfest.com/register/
Black Hills Infosec Socials
Twitter: https://twitter.com/BHinfoSecurity
Mastodon: https://infosec.exchange/@blackhillsinfosec
LinkedIn: https://www.linkedin.com/company/antisyphon-training
Discord: https://discord.gg/ffzdt3WUDe
Black Hills Infosec Shirts & Hoodies
https://spearphish-general-store.myshopify.com/collections/bhis-shirt-collections
Black Hills Infosec Services
Active SOC: https://www.blackhillsinfosec.com/services/active-soc/
Penetration Testing: https://www.blackhillsinfosec.com/services/
Incident Response: https://www.blackhillsinfosec.com/services/incident-response/
Backdoors & Breaches - Incident Response Card Game
Backdoors & Breaches: https://www.backdoorsandbreaches.com/
Play B&B Online: https://play.backdoorsandbreaches.com/
Antisyphon Training
Pay What You Can: https://www.antisyphontraining.com/pay-what-you-can/
Live Training: https://www.antisyphontraining.com/course-catalog/
On Demand Training: https://www.antisyphontraining.com/on-demand-course-catalog/
Antisyphon Discord: https://discord.gg/antisyphon
Antisyphon Mastodon: https://infosec.exchange/@Antisy_Training
Educational Infosec Content
Black Hills Infosec Blogs: https://www.blackhillsinfosec.com/blog/
Antisyphon Training YouTube: https://www.youtube.com/antisyphontraining
Active Countermeasures YouTube: https://youtube.com/activecountermeasures
Threat Hunter Community Discord: https://discord.gg/threathunter
Originally from From WWHF: Behind Enemy Lines: Collaborating with Blackhats | Joshua Smith ( :-{ı▓ #WWHF #BHIS #cyberresearch
0
0
0
0