There is a vast amount of information that exist in the modern world. More so than has ever existed in any society at any time in the history of mankind. Companies, individual, organizations, and nations keep adding to this massive sea of data. Wouldn’t you like to get your hands on some of it? This presentation will show you how to do just that very thing with no tools. Simply using the right browser, search commands and Boolean logic. You will learn how to navigate and surf this ocean of information and find repositories that others a have placed online. Repositories a.k.a. loot which they believe to be safe from others but, in fact they are not. You will learn a few simple techniques that allow you to find their loot and take it for yourself or others. The techniques to accomplish this are not new, in fact they are very old by Information Technology time. However they are as relevant today as they were more than thirteen years ago when people first started to compile them. The techniques will enable you to sift through the haystack of information that you normally get when web searching to find the specific needles that you seek. These techniques will optimize your search time and provide a greater focus of the desired target than you have ever had before. All accomplished from a "search engine" you use every day.
A senior security systems engineer with 25+ years’ experience currently employed at a fortune sixty company in the Washington DC area. Day job, responsible for world-wide evaluation, certification, penetration and integrity testing of a variety of current and emerging technologies, networks, architectures, and devices. Night hobbies - monitors major trade shows like CES in Las Vegas for the train-wreck factor as new technology seems to be developed and deployed with some if not most of the existing vulnerabilities, bugs, and issues of today. Some issues dating back more than twenty years ago that should have been resolved. When not stifled by my company’s legal team I have been permitted to speak on certain subjects to the security community on issues that I see in technology. I'm an active member of the Northern Virginia Hackers association (NoVaH) a collective of security professionals, hackers, authors, makers, and tool developers.