JSFoo 2020

On JavaScript in the enterprise; JS for advanced developers and architects

Tickets Submit a session proposal

Social Engineering (The Dark Side Of Tech)

Submitted by CRUX CONCEPTION on Wednesday, 19 February 2020

Session type:: Hands-on workshops (4 hours duration) Status: Submitted


Retired Criminal Profiler & Hostage Negotiator, Crux Conception, has taken his years of training, education, and experience to develop a method, which will allow individuals within THE TECH COMMUNITY to utilize:

social, people, and observation skills, to detect potential THEFT and acts of COMPANY ESPIONAGE.

BY CONVERTING YOUR EVERYDAY SOCIAL AND OBSERVATIONAL SKILLS into simple criminal/psychological profiling techniques.

This lecture will display methods used by individuals to infiltrate social media accounts by using fake accounts and collecting data from unknowing account holders. (using altered photos, which will appear original and pass a “google photo search,” disseminating false or misleading information and more).

MY PRESENTATION WILL ENGAGE THE AUDIENCE: We will focus on their psychological motivations, to identify the emotional precursors. We will combined open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, SPYING, and THEFT of DATA.

The presentation will give participants innovative insights to conduct psychological field profile/assessments and verify potential risk factors. This presentation will outline the mental aspects of Data Breaching and possible prevention of Data Loss.

In today’s world of CYBER-RISK and CYBER-SECURITY, we sometimes forget about the individuals or dare I say SUSPECTS behind the BREACH, ATTACK, or THEFT. We neglect these individuals until it is too late, and the damage has been done.

Individuals such as:

EDWARD J. SNOWDEN The media hails him as a “whistleblower,” but MR. SNOWDEN stole DATA belonging to the NSA, and disseminated said data to individuals with unauthorized access.

•William Binney (NSA) •Jose Ignacio Lopez (GM) Chief of productions accused of corporate espionage. •Steven Louis Davis (Gillette) Pled guilty to theft of trade secrets.

•Patricia Dunn (Hewlett-Packard) Involved in a spying scandal.

•Ross Klein and Amar Lalvani (Starwood Hotels) downloaded confidential Starwood information to use later at Hilton.



•Security Systems Integrators
•IT and Cybersecurity Leaders
•Integration Engineers
•Product Developers and Manufacturers
•Senior Technology Business Executives
•Security Specifiers and Engineers
•Security Consultants
•CSOs/CISOs/Security Leadership
•Anyone responsible for the cybersecurity of integrated security systems!


•Performing assessments on a psychological and cybersecurity platform

•Enhanced abilities to evaluate security efficiency within his/her organizational structure

•We will use authentic mock scenarios regarding attack vectors and how to respond or set up a novel response system. This method pertains to the aftermath and the preparation to make a quick recovery and training for the aftershock.

20 Point Talk outline:

  1. Evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE.

2.How to profile random social media accounts of individuals, based on photographs, social media postings, likes, friends, and so forth (risk factors).

3.History of CORPORATE ESPIONAGE and incidents involving same.

4.The psychological concepts behind DATA BREACHES (within) and CORPORATE sector.

5.Criminal/Psychological profile to aid in determining potential corporate spies/thieves.

  1. We will discuss how the board of directors and its administration treat the protection of data, and the ability to warrant the risk of a breach of data.

7.Why we neglect these individuals until it is too late, and the damage has been done. Individuals such as:

•Edward J. Snowden
•William Binney (NSA)
•Jose Ignacio Lopez (GM)
•Steven Louis Davis (Gillette)
•Patricia Dunn (Hewlett-Packard)
•Ross Klein and Amar Lalvani (Starwood Hotels)

8.Hands-on role-playing scenarios

  1. How to detect psychological manipulation of people into performing actions or divulging confidential information.

  2. We will use open-discussions, media, and PowerPoints, to illustrate, cultural adaptation, borderline personality disorder, psychological autopsy, precursors to ESPIONAGE, and SPYING

  3. This presentation/workshop will demonstrate that with the proper preparation, one can evaluate an individual whose psychological profile dictates that they retain the potential to perform CORPORATE ESPIONAGE.

  4. Inform Executives/Administrators key signs to help reduce/prevent DATA loss using corporate espionage and theft.

  5. The psychological concepts behind DATA BREACHES (within) and CORPORATE ESPIONAGE will be discussed thoroughly.

  6. I will use role-playing scenarios to PROVE how “everyday people skills,” can be used to conduct a Criminal/Psychological profile to aid in determining potential corporate spies/thieves.

  7. We will focus on people reading skills and identifying FACIAL micro-expressions.

  8. I will ask PARTICIPANTS to apply what they have learned by identifying potential RISKS. To randomly profile social media accounts of individuals, based on photographs, social media postings, likes, friends, and so forth.

  9. Not only have past participants found this method fun, but they have also found it to be reliable and proven reliable. I utilize this method throughout my profiles of gang members, narcotics traffickers, white-collar criminals, terrorists, fake social media accounts, and more.

  10. Will show how the protection of a company’s data is not just an issue for the IT department. Data security is a crucial element of a corporation’s security mainframe, necessitating executive surveillance. The breach of data has immediate licit consequences, which executives must comprehend.

  11. The topic of data security must be addressed in every board meeting and should be equipped with the tools to obtain proficiency. These tools will allow board members to encounter with matters surrounding data security.

  12. My goal is to offer attendees an additional preventive measure by exposing the abilities they have within. The purpose of this segment is to make individuals aware of the influences that they have, using one’s observational skills to detect the behavior of potential attackers.


I will need. a projector,16:9 prompt-screen, and microphone (lapel mic) if possible.

Speaker bio

Crux resides in Fort Wayne, Indiana, and has over 20 years of Law Enforcement (LEO), Criminal Profiling and teaching experience.

Law Enforcement experience:

•Homicide Detective
•Criminal Profiler
•Gang Unit Specialist Detective
•Hostage Negotiator
•Crisis Intervention Team (CIT) Officer
•School Resources Officer (SRO)
•Five years as a Special Agent with the DEPARTMENT OF HOMELAND (DHS)

Crux, now retired, worked as a Homicide Detective, Criminal Profiler and Hostage Negotiator with the Fort Wayne (Indiana) Police Dept.

Teaching experience:
Currently, Crux is an Adjunct Professor:

•Business Psychology
•Social Media Psychology
•Criminal Profiling
•Criminal Behavior
•Computer Psychology
•Sociology (Group Dynamics)


•Bachelor of Science degree; Criminology (Ball State University, 1994).

•Master’s degree; Forensic Psychology (Walden University, 2012).

•Currently, a Ph.D. Candidate (Forensic Psychology), at Walden University

Note: Crux has or will be presenting at the following conferences:


•Fort Wayne Rescue Ministries, August 08, 2018, Fort Wayne, IN.

•FVK Cuestas & Associates, Fort Wayne, Indiana, September 5, 2018, Fort Wayne, IN.

•Hydro Credit Summit, October 9, 2018, Bridgeville, PA,

•Scleroderma Foundation Ohio Chapter, October 12, 2018, Columbus, OH.

•Texas Cyber Summit, October 14th, 2018, San Antonio TX.

•Crisis Communications Conference, October 16 – 18, 2018, Chicago, IL.

•PHP WORLD 2018 CONFERENCE November 14-15, 2018 Washington, D.C.

•STRETCH 2018 Leadership and Management conference, December 06, 2018, December 07, 2018, Budapest, Hungary

•BIFROST Leadership Conference, April 17, 2019, Toronto, ON

•Pennsylvania Commission on Crime and Delinquency/Statewide Crisis Intervention (CIT) Meeting, March 25-26, 2019, State College, PA

•2019 CNM Symposium/Clinical Nutrition Management, May 2-4, 2019, Atlanta, GA.

•Salt Lake City DevOps Days 2019, May 14-15, 2019, Salt Lake City Utah

•DevOps Days Kyiv 2019, May 17-18, 2019, Kyiv, Ukraine

•ITCAMP Community Conference for IT Professionals, June 6-7, 2019, Cluj-Napoca, Romania

•Veracity Professional Men’s Workforce Summit, June 13th, 2019, Herndon, VA.

•DevOpsDays Amsterdam, June 26-28, 2019, Amsterdam, Netherlands

•JCONF DOMINICANA, Saturday, June 29, 2019. PUCMM, Santiago de los Caballeros. Dominican Republic.

•RubyCon Kenya, 2019, July 25-27th, 2019, Nairobi, Kenya

•DevOpsDays Dallas 2019, Aug 20 - 21, 2019, Plano, TX

•WordCamp Ann Arbor 2019, August 24-25, 2019, Ann Arbor, Michigan

•Web Summer Camp 2019, August 28-30th, 2019, Rovinj Croatia

•IoT Bulgaria Summit 2019, Sofia, Bulgaria, September 14, 2019

•Devfest Santo Domingo, September 20-21, 2019, Santo Domingo, Dominican Republic

•DevOpsDays Buffalo 2019, September 26-27th, 2019, Buffalo, NY

•Scenic City Summit 2019, October 03-04, 2019, Chattanooga TN

•Global CISO Forum 2019, October 10-11, 2019, Atlanta, GA

•LibertyJS 2019, October 24-25, 2019, Philadelphia, PA.

•PyCon NG 2019, October 30th November 2nd, Abuja, Nigeria.

•Cluj Tech Society IT Conference, November 08-09, 2019, Cluj-Napoca, Romania

•Stretch Leadership and Management MeetUp, December 12, 2019, Online, Budapest, Hungary


•NDC London 2020, January 27th-31st, 2020, London, England

•28 Days of Culture - Diversity Fair, February 06-27, Phoenix, AZ

•DevSecCon Singapore 2020, March 18-19, 2020, Singapore, Malaysia

•DevSecCon Sydney 2020, March, 23-24, 2020, Sydney, Australia

•Codemotion Rome Tech Conference, Rome, Italy. March 27-28, 2020

•2020 CodeStock Conference, April 17-18, 2020, Knoxville, TN

•National ADA Symposium, May 10-13, 2020, Kansas City, MO

•IT Security Summit, May 18th-20th, 2020, Munich, Germany

•Developer First Conference, June 12th, 2020, Minneapolis, Minnesota


Preview video



  •   CRUX CONCEPTION Proposer a month ago

    I will require travel and hotel accommodations.

    Although, I reside in and usually travel from Fort Wayne, Indiana (USA) airport (FWA). However, if selected, I can drive to either: Detroit, Michigan (USA), Chicago, Illinois (USA), or Indianapolis, Indiana (USA). I have found these locations to have less expensive airline tickets.

Login with Twitter or Google to leave a comment