Most of all, we want to inspire people to look outside of their OSINT-comfort zones and pursue their OSINT passions. So, I was trying to hurry and capture whatever I could for forensics right away, before something went down. For more information about Sourcelist, contact us. NICOLE: [MUSIC] Yeah, so, in my go-bag I have a whole bunch of other of things, including food and clothes and all of that that you just mentioned, but I have what we call a toaster. I also once that is running, I wanted to grab network traffic and so, I started Wireshark up and Im dumping network traffic to a USB also. jenny yoo used bridesmaid dresses. One day I got a call, sitting at my desk, from the Secret Service which I can tell you even as an officer is kind of daunting, right? Theres only one access. I reiterate; okay, youre logging in from your house to the police departments domain server to check your e-mail? Nicole is an international keynote speaker recognized in the fields of information security, policy, OSINT and cybercrime. Marshal. Sharing Her Expertise. These were cases that interested her the most. Support for this show comes from Exabeam. JACK: She knows she needs access to the computers in the building, and the best way to get into the computers is to have someone from IT help you with that. NICOLE: I wanted to make contact at that point. JACK: This threw a monkey wrench in all of her hunches and theories. Kerrie Nicole Beckwith is a resident of MI. Who is we all? A few days later, the manufacturer told us they analyzed the core dumps and said the reason for the crash was spurious emissions from space. Now, this can take a while to complete. Its good because the attorney general is taking a very hard and fast stance with that in saying if you cant control your networks and your systems, then were not allowing you access to ours because youre a security risk. Necessary cookies are absolutely essential for the website to function properly. Nicole Beckwith - Mind Hacks - Psychological profiling, and mental health in OSINT investigations 2,804 views Oct 19, 2020 83 Dislike Share Save conINT 1.9K subscribers I'm going to discuss the. She also conducts research on emerging products, services, protocols, and standards in support of security enhancement and development efforts. Having a system running Remote Desktop right on the internet just attracts a ton of people to try to abuse the system. by Filmmaker Staff in Festivals & Events, . She asks, do you think that company that manages the network is logged into this server? Hes saying no, he should be the only one with access to this server. They were like yeah, we keep seeing your name pop up on these cases and wed really like to talk to you. A) Theyre with you or with the city, or anybody you know. Could they see the initial access point? Log In. Nicole is right; this should not be allowed. https://twitter.com/NicoleBeckwith Sponsors Support for this show comes from IT Pro TV. A few minutes later, the router was back up and online and was working fine all on its own. JACK: [MUSIC] So, on your way to meet with the mayor, how are you going I mean, youve got a different couple ways of doing this. So, Im changing his password as well because I dont know if thats how they initially got in. It wasnt the best restore, but it allowed people to get up and working fairly quickly. Nicole B. She volunteers her time as a reserve police officer helping to augment the detective section, primarily working on missing persons, wanted fugitives, and digital forensic cases. She has worked with numerous local, state and federal law enforcement partners on criminal investigations including the FBIs public corruption unit and Homeland Security Investigations. So, in my opinion, it meant that well never know what caused this router to crash. Beckwith Electric advanced protection and control IEDs have incorporated state of the art cyber security features to prevent malicious attacks and comply with present as well as the upcoming NERC CIP requirements. Re: Fast track security. I said, do you what are your credentials to log in? National Collegiate Cyber Defense Competition #ccdc When you give someone full admin rights, it really opens up the attack surface. [MUSIC] I said wait, isnt that what happened the first time you guys were hit? What connections are active, and what activity are the users doing right now? So, Nicole packs up and leaves the mayors office with more questions now than before she arrived. JACK: But theyre still upset on how this [00:30:00] incident is being handled. Nicole Beckwith, a top cybersecurity expert, says it doesn't have to be this way. Dont touch a thing. You just needed the username and password to get into this thing or if you had an exploit for this version of Windows. But Nicole still had this mystery; who the hell logged into the police station from the mayors home? When can you be here? Sometimes, a movie feels like it's on the verge of something. FutureCon brought in a great selection of speakers, attendees and vendors, which made networking easy and fun," said Beckwith. [MUSIC] So, I made the request; they just basically said sure, whatever. I had a chance to attend a session, which were led by Nicole Beckwith, an investigator and digital forensic analyst for the Auditor of State and highly regarded expert on cybersecurity, policy, cyberterrorism, computer forensics, network investigations and network intrusion response. So, hes like yes, please. Then I always had a box of cables and adapters, tools just in case I needed to take the computer apart, so, you know, screwdrivers and stuff. Nicole Beckwith Aviation Quality Control Specialist/Aviation Security Auditor/Aviation Enthusiast/Safety Expert. Nicole Beckwith of the Ohio Auditor's Office helped investigate Jillian Sticka, the Xenia woman convicted of cyberstalking three people, including me. Im also trying to figure out where is the server actually located, which in this case was way back in the back of the building. [MUSIC] He looked at the environmental data before the crash. Take down remote access from this server. She is also Ohio's first certified female police sniper. NICOLE: Because your heart sinks when you see that. Joe has experience working with local, regional and national companies on Cybersecurity issues. In this episode she tells a story which involves all of these roles. The OSINT Curious Project is a source of quality, actionable, Open Source Intelligence news, original blogs, instructional videos, and a bi-weekly webcast/podcast. Follow these instructions on how to enable JavaScript. Austin J Beckwith, Christy Ann Beckwith, and three other persons are connected to this place. or. JACK: Dang, thats a pretty awesome-sounding go-bag, packed full of tools and items to help go onsite and quickly get to work. She is also Ohios first certified female police sniper. Its hard to narrow down all the packets to find just what you need. Used to identify individual clients behind a shared IP address and apply security settings on a per-client basis. Its crazy because even as a seasoned incident responder like Nicole, it can still affect you emotionally. She checks the status of her Volatility tool, and its almost done collecting what she needs. JACK: [MUSIC] She tries to figure out more about who was logged in as an admin at the same time as her. NICOLE: So, right now, as Im seeing the log-ins, I have to weigh in my head, do we leave them logged in and potentially allow them to do additional harm or do I immediately revoke them? Is it the secretary that just logged in? Nicole Shawyne Cassady Security Guard & Patrol Accepted Independent, LLC 1335 Jordans Pond Ln Charlotte, NC 28214-0000 Printed November 10, 2016 at 13:47:03 Page 2 of 11. When Im probing them for a little bit more details like hey, do you know what happened? They were just learning now that all this happened, that the printers went down, that there were unauthorized admins accessing the network, and that the Secret Service is there onsite doing an investigation. NICOLE: Correct, yeah. We really need to go have a conversation with the mayor so it gets out, figure out why hes logged into this computer at this time. NICOLE: So, during the conversation when Im asking if they need assistance, theyre explaining to me that IT has it. As a digital forensics investigator, its not often youre in this situation. A few days later, the manufacturer told us they analyzed the core dumps and said the reason for the crash was spurious emissions from space. Nicole Beckwithwears a lot of hats. Open Source Intelligence isn't just for civilians. We looked into this further and apparently there are cosmic rays that are constantly bombarding Earth, and sometimes they can come down, pass right through the roof, right on through the outer chassis of the router, and go right through the circuit board of the router which can cause a slight electromagnetic change in the circuitry, just enough to make a bit flip from a zero to a one or a one to a zero. Already listed? JACK: Nicole Beckwith started out with a strong interest in computers and IT. Writer and director of the new film 'Together Together' Nikole Beckwith spoke to Decider about the film's ending, its wonderful stars, and her advice to aspiring female filmmakers. I can see why theyre upset but professionally, theres no time for that. But she had all her listeners open and ready in case something did happen. Its a little bit messy, so a little bit concerned there. I dont ever want to be the only person there. JACK: Apparently what him and others were doing were logging into this server through Remote Desktop and then using this computer to log into their webmail to check e-mail? NICOLE: Right, so, I am not the beat-around-the-bush type of person. Like, its set up for every person? Nicole has dedicated her life to fighting online threats and combating cybercrime. JACK: Well, hang on, now; when I hear go-bag, I think seventy-two hours of food and water and some Band-Aids. Lives in Charleston, South Carolina. Ms. Beckwith works as an Advanced Security Engineer for the Kroger Technology Automation and Tools team. What the heck is that? Ms. Beckwith is a former state police officer, and federally sworn U.S. When Im initially responding, Im looking at the server, getting the log-in information from the lieutenant. 56 records for Nicole Beckwith. I have hoards of USB drives and CDs with all sorts of mobile triage and analysis software such as Paladin, Volatility, password cracking, mobile apps. See more awards . I immediately see another active logged-in account. It wasnt nice and I dont have to do that very often, but I stood in front of his computer until he locked it down. Admins have full control of everything. Nicole Beckwith wears a lot of hats. So, I just look at my boss and shake my head cause at that point, I dont really know what to say. The mayor of the city is who hacked into the computer and planted malware on it and was about to detonate it to take the police departments network down again? Recently Nicole developed two cybersecurity training programs, teaching more than 1600 officers how to respond to cybercrime and over 4400 government employees on information security best practices. How did it break? JACK: Well, thats something for her at least to look at. She's a programmer, incident responder, but also a cop and a task force officer with the Secret Service. So, I went in. Editing help this episode by the decompiled Damienne. [MUSIC] Hes like oh no, we all have the admin credentials; theyre all the same. [00:45:00] Theres just nothing there to help them be productive. This is a personal pet peeve of mine; I hate it when admin log-ins are shared, because when you have multiple people logged into one account, you have no idea which person is doing stuff. Cybercrime Radio: Nicole Beckwith on Cybersecurity and Mental Health