BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//hack-lu-2024//speaker//QMTPZP
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-hack-lu-2024-QJAJJK@pretalx.com
DTSTART;TZID=CET:20241023T101500
DTEND;TZID=CET:20241023T104500
DESCRIPTION:Hacking humans with IoT? It is happening now and will only scal
 e. The rapid evolution of AI technologies\, mass development and productio
 n of IoT equipment which is interconnected and can be orchestrated on back
 end by massive AI platforms which are sourcing\, processing and cross-corr
 elating personal and sensitive data completely changes human vs computer p
 aradigm. No chip implant is needed to control a human\, unlike it may be c
 ommonly believed. As long as enough biometric and behavioral information i
 s collected on human beings\, they and their social contacts can be comple
 tely manipulated in predictable manner. The environment of connected socie
 ty is a perfect stage\, where the humans are exposing their harvestable bi
 ometric and behavior profiles\, by publishing content in social media or g
 iving up the IoT devices around the things which they are reluctant to sha
 re with their closest friends. This is the new battle ground where our dig
 ital identities are appearing and exposing our strengths and weaknesses at
  the same time.  Those identities can be created\, stolen\, or replicated 
 without our consent by criminals and state sponsored actors\, appear in th
 e places we are not aware\, and leveraged to target our digital presence a
 nd physical life. \n\nBy connecting the dots between generative AI\,  pred
 atory advertisement companies\, biometric data harvesting and Human - IoT 
 interactions – we demonstrate the significant expansion of the attack su
 rface against humans and social groups. Disinformation\, public opinion ma
 nipulation\, virtual kidnapping\, exploitation of human digital identities
  are the fruits of the same tree. The data collected and processed in the 
 IoT based smart environments is a gold mine for criminals and state sponso
 red actors to manipulate humans the way and at the scale which was impossi
 ble before.\n\nThe presentation is focusing on the attack scenarios and ca
 se studies of targeted individuals\, social groups that we either have obs
 erved or to observe in the wild\, including election campaigns in social m
 edia\, assets take over\, extortion. The consequences of attacks lead to b
 ehavior changes and actions in both\, physical and digital world including
  changing the decisions\, social engineering\, exfiltration of sensitive i
 nformation\, choosing most vulnerable targets to attack high security envi
 ronments\, swaying opinions\, affecting elections and other critical event
 s\, that may change the history. We will also cover both\, defense options
  and choke points related to the expanded attack surface.
DTSTAMP:20260308T043001Z
LOCATION:Europe - Main Room
SUMMARY:IoT hacks humans - unexpected angles of Human Process Compromise - 
 Vladimir Kropotov
URL:https://pretalx.com/hack-lu-2024/talk/QJAJJK/
END:VEVENT
END:VCALENDAR
