Hi, I’m James Linton, and in 2017 I used spear phishing techniques to socially engineer my way into quite a lot of inboxes.
You can read more about my time as Sinon_reborn AKA “EMAIL PRANKSTER” here on Wikipedia.
I don’t think it was inevitable, going from email prankster (with zero knowledge of threats) to email protector; deal sealed with a high-five and a wink as I’m emailed the AWS keys.
But with a fascination for the craft and UX/tech of tricking someone and a fistful of headlines, I downloaded a task management app (ok maybe I downloaded a few) and I entered the world of the Silicon Valley start-up!
Well, kinda. I was working remotely, but this was before it was fashionable.
The silicon valley years
I spent 3 years working in email threat intelligence, socially engineering cyber criminals to collect intelligence which was then passed onto law enforcement and financial institutions. As we dived deeply into previously undocumented parts of the West African cyber criminal networks, I got to travel globally, presenting the insights we were uncovering.
I now focus on helping employees to make better security decisions when using email. But it’s hard to care about something if you don’t understand it.
So I want to share what I have learnt, in a way that connects with those who doesn’t have any interest in cyber threats — which is exactly as I was, just 4 years ago.
If you want to present an authentic and pragmatic perspective on cyber awareness, with zero spin, let’s chat: email@example.com