{"id":2419,"date":"2014-10-07T11:07:09","date_gmt":"2014-10-07T15:07:09","guid":{"rendered":"https:\/\/web.uri.edu\/hc\/?p=2419"},"modified":"2020-02-21T16:23:27","modified_gmt":"2020-02-21T21:23:27","slug":"gregory-conti","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/hc\/2014-event\/gregory-conti\/","title":{"rendered":"Gregory Conti"},"content":{"rendered":"<p><em>Slippery Slope of Doom: What Could Possibly Go Wrong with Our Instrumented World?<\/em><\/p>\n<p>Colonel Gregory Conti<\/strong> is an associate professor in the Department of Electrical Engineering and Computer Science at the United States Military Academy, West Point, and director of the academy&#8217;s Cyber Research Center. He has served as a senior advisor in the U.S. Cyber Command Commander&#8217;s Action Group (CAG) as officer in charge of a deployed U.S. Cyber Command expeditionary cyber support element, and as a co-developer of the U.S. Cyber Command&#8217;s joint advanced cyber warfare course.<\/p>\n<p>An active researcher in the area of cybersecurity and privacy, Conti has authored numerous articles and spoken at many professional and hacker conferences including Black Hat and Defcon, and the NATO Conference on Cyber Conflict. He is the author of two books including <em>Googling Security<\/em>, which discusses user data collection by Google and the \u2018data leakage\u2019 that occurs as we interact with various websites in the course of our daily lives. Conti will be speaking about security vulnerabilities and privacy issues in an increasingly instrumented world.<\/p>\n<p><strong>About this Lecture<\/strong><\/p>\n<p>An eye-opening and comprehensive view of our increasingly instrumented world, from inside our bodies, to tech on our bodies, in our homes, vehicles, and communities. Adversaries ranging from lone malicious hackers to nation-states to trusted insiders will exploit ever-present vulnerabilities and ultimately those we seek to defend. When analyzing the threat we should not ignore companies whose business model of free products and services result in compelling honeypots that harvest personal and organizational information to the maximum extent the market will bear. Are we doomed? Perhaps not. Conti&#8217;s talk will explore this emerging threat environment, present possible solutions, and argue that we should always look askance at new technologies\u2014by understanding their true capabilities for misuse and not just what marketing literature or a friendly corporate mascot proclaims.<\/p>\n\n<!-- iframe plugin v.6.0 wordpress.org\/plugins\/iframe\/ -->\n<iframe loading=\"lazy\" src=\"https:\/\/new.livestream.com\/accounts\/4896157\/events\/3354678\/player?width=560&#038;height=315&#038;autoPlay=true&#038;mute=false\" width=\"560\" height=\"315\" frameborder=\"0\" scrolling=\"no\" class=\"iframe-class\"><\/iframe>\n\n<p>&nbsp;<\/p>\n<p><strong>Featured Book<br \/>\n<\/strong><\/p>\n<p><a href=\"http:\/\/www.pearsonhighered.com\/educator\/product\/Googling-Security-How-Much-Does-Google-Know-About-You\/9780321518668.page\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/web.uri.edu\/wp-content\/uploads\/sites\/935\/GOOGLING_SECURITY.jpg\" alt=\"Googling Security\" width=\"100\" height=\"132\" \/><\/a><\/p>\n<p><strong>Helpful Links<\/strong><\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=yUvOGsZyGrM\" target=\"_blank\" rel=\"noopener noreferrer\">Could Googling Take Down a President?<\/a><br \/>\n<em>Talk at Defcon on how information goes from query to blackmail<\/em><br \/>\n<a href=\"http:\/\/www.rumint.org\/gregconti\/publications\/20080101_Googling_CACM.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Article<\/a><br \/>\n01 January 2008<\/p>\n<p><a href=\"http:\/\/www.rumint.org\/gregconti\/publications\/200705_IEEE_SP_CostofFreeWebTools.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">The Cost of Free Web Tools<\/a><br \/>\n<em>Article on what we pay in exchange for access to free services<\/em><br \/>\nJune 2007<\/p>\n<p><a href=\"http:\/\/www.rumint.org\/gregconti\/publications\/201405_WinWin_final.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy and Security<\/a><br \/>\n<em>Paper arguing that privacy and security need not be mutually exclusive<\/em><br \/>\nJune 2014<\/p>\n<p><a href=\"http:\/\/www.rumint.org\/gregconti\/publications\/201306_CountermeasuresFinal.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Surveillance Countermeasures<\/a><br \/>\n<em>A taxonomy with examples that have been successfully employed<\/em><br \/>\nJune 2013<\/p>\n","protected":false},"excerpt":{"rendered":"<p><em>Slippery Slope of Doom: What Could Possibly Go Wrong with Our Instrumented World?<\/em><\/p>\n","protected":false},"author":691,"featured_media":2444,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[],"class_list":["post-2419","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2014-event"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts\/2419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/users\/691"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/comments?post=2419"}],"version-history":[{"count":1,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts\/2419\/revisions"}],"predecessor-version":[{"id":6054,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts\/2419\/revisions\/6054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/media\/2444"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/media?parent=2419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/categories?post=2419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/tags?post=2419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}