BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.nsec.io//2026//8PVU8H
BEGIN:VTIMEZONE
TZID:EST
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10;UNTIL=20061029T070000Z
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:STANDARD
DTSTART:20071104T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=11
TZNAME:EST
TZOFFSETFROM:-0400
TZOFFSETTO:-0500
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000402T030000
RRULE:FREQ=YEARLY;BYDAY=1SU;BYMONTH=4;UNTIL=20060402T080000Z
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
BEGIN:DAYLIGHT
DTSTART:20070311T030000
RRULE:FREQ=YEARLY;BYDAY=2SU;BYMONTH=3
TZNAME:EDT
TZOFFSETFROM:-0500
TZOFFSETTO:-0400
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-2026-MF3UWC@cfp.nsec.io
DTSTART;TZID=EST:20260514T113000
DTEND;TZID=EST:20260514T120000
DESCRIPTION:Is ADINT\, *Advertising-based Intelligence*\, the new trend for
  Computer Network Exploitation (CNE) initial access and commercial surveil
 lance solutions ? ADINT defines the exploitation of online advertising pro
 cesses to collect\, correlate\, and operationalize large-scale data for in
 telligence gathering. By weaponizing the advertisement Real-Time Bidding (
 RTB) process\, this technique turns an omnipresent commercial ecosystem in
 to a dual-use surveillance tool. \n\nWhile initially leveraged for granula
 r geolocation and real-time geofencing through mobile advertising identifi
 ers and metadata correlation\, the stakes of ADINT have escalated signific
 antly. It now also serves as an initial access vector for commercial spywa
 re solutions\, reshaping the economics of the commercial surveillance vend
 or (CSV) market as traditional zero-click vulnerabilities become increasin
 gly scarce and costly.\n\nThis presentation provides a comprehensive overv
 iew of the current ADINT landscape and operational use cases. It will outl
 ine the evolution of ADINT and propose a categorization into three operati
 onal tiers: *Passive ADINT*\, characterized by the passive collection and 
 correlation of RTB bidstream data\; *Active ADINT*\, which employs on-dema
 nd micro-targeting and geofencing for real-time target validation\; and *O
 ffensive ADINT*\, where the ad delivery mechanism itself is repurposed as 
 a zero-click intrusion vector for initial access.\n\nBased on documented c
 ases\, the presentation will also examine how commercial surveillance vend
 ors weaponize ADINT by exploiting the structural opacity of the AdTech ind
 ustry. By rebranding intrusive monitoring as legitimate analytics\, these 
 firms leverage regulatory arbitrage to circumvent dual-use export controls
 \, highlighting the urgent need for stakeholders to adapt their defensive 
 and policy responses.
DTSTAMP:20260507T204234Z
LOCATION:Salle de bal
SUMMARY:Sold to the highest bidder : the escalation of ADINT from geolocati
 on tracking to intrusion vector - Maxime ARQUILLIERE\, Coline C
URL:https://cfp.nsec.io/2026/talk/MF3UWC/
END:VEVENT
END:VCALENDAR
