As seen in my Black Hat USA and DEF CON presentations, this is the short video demonstration of the CreepyDOL visualization system. No audio, but first you'll see panning around the area as the underlying map loads, then some zooming in and out, followed by clicking and dragging a box around some nodes of interest. Then you'll see the map reload in the area of interest, followed by which I hover over some nodes to show their location and MAC address, before clicking on one node to show all the known information: real name, email address, photo, self-reported location, hardware type, software version, etc. all harvested by CreepyDOL.
As seen in my Black Hat USA and DEF CON presentations, this is the short video demonstration of the CreepyDOL visualization system. No audio, but first you'll see panning around the area as the underlying map loads, then some zooming in and out, followed by clicking and dragging a box around some nodes of interest. Then you'll see the map reload in the area of interest, followed by which I hover over some nodes to show their location and MAC address, before clicking on one node to show all the known information: real name, email address, photo, self-reported location, hardware type, software version, etc. all harvested by CreepyDOL.
Go sign up on the mailing list at http://eepurl.com/DoDwH to be informed of new CreepyDOL announcements, or go to http://store.maliceafterthought.com to purchase F-BOMBs.You Can Do The Thing!USSJoin2017-11-12 | ShmooCon FireTalks 2017 Whether you think that the election provides a wake-up call to a political elite who need to be brought to heel, or a terrifying sense of impending doom and nuclear winter, you likely have a bunch of things that you think need to be changed immediately. The security community has been reasonably good about donating to EFF and HFC---two small organizations that do good work within their space---and other technically-focused groups, because tech is what we care about each day. Tech-focused groups are not sufficient, however, to fix everything that needs fixing. Also, the world needs more than money; our skills are needed for every cause we support or even think is a good idea.Security by Consent - OReilly Security Amsterdam 2016USSJoin2016-12-20 | How to create and maintain a security operation within a larger organization that focuses on cooperation and consent, rather than coercion, based upon the 'policing by consent' model created in 1820s England. As presented at the O'Reilly Security Amsterdam conference in 2016.
Abstract: Are you tired of knowing everything, having people ignore 'the security person' because 'reasons,' and then having 'I told you so' as your only comfort? Sick of the hostile relationship between security and development, security and operations, security and HR, and/or security and everyone not wearing a black t-shirt? There’s a better way. Faced with the challenge of building a security function into a society that wasn’t sure it wanted one (but which nonetheless needed it), Charles Rowan and Richard Mayne set out what became known as the Peelian Principles of Policing, or Policing by Consent. They provide an effective model for running a security group that stands with its organization, rather than against it. We are, after all, 'only members of the public who are paid to give full-time attention to duties which are incumbent on every citizen in the intent of the community welfare.' Join us to become a security Bobby—where a commitment to service is non-optional, but the silly hat’s only needed if you like it.
Slide deck is CC-BY, photo credits at the end of the deck.Dont Be a Hero - Ignite OReilly Security NYC 2016USSJoin2016-11-01 | Ignite format (20 slides, 15 seconds per slide, automatic advance) presented at the 2016 O'Reilly Security Conference in New York.
Abstract:
Swinging swords, slaying beasts, drinking Red Bull, and coding through a weekend: the life of a startup is exciting and free from rules. When you get your first security audit and have to establish policies and compliance, you may find your sword hand itchy; are the good times over? No--something even better comes next. Stop being a hero-based organization, and build things that will outlive you.
(Note: this data was all collected using CreepyDOL, but this visualization was not done in the CreepyDOL visualization system.)
The circles are students, or groups of students, moving around the campus as detected by sensors spread throughout the campus. For privacy, I've grouped the circles, randomized their color (and grouped the color), and added randomness to the location (so things don't appear exactly where I detected them).
The date and time appears in the lower-left corner.
To clarify, this is only the location data; none of the content was used in this video. There's much more to do, but I wanted to share a quick cut of the data, and to thank you all.
Thank you to Tom Oden, for allowing me to come; to Jacob and Adrian, for getting the students involved; and to every student, faculty member, or staff member, who showed me around, made me feel welcome, or chatted with me. I hugely appreciate your help, and your contribution to what I hope will be significant research.
Satellite Image from Google Earth. Used in compliance with the Google Satellite Images policy. Music: "Threshold of a Dream" by Level 99 and prophetik - OverClocked ReMix (http://ocremix.org). Available from http://threshold.ocremix.org/music.php. Used in compliance with the OCRemix content policy.
Otherwise Copyright 2014, Malice Afterthought, Inc.Interview With Brendan OConnor and Aaron FlintUSSJoin2013-01-24 | An interview of Brendan O'Connor on Aaron Flint's radio show, Voices of Montana, on the Northern Broadcast Network. http://www.northernbroadcasting.com/Talk.aspx
The topic was Montana Senate Bill 150, an act which will restrict the governmental use of unmanned aerial vehicles in the State of Montana. For more on the law, please see Brendan's written Senate testimony at http://blog.ussjoin.com/2013/01/montana-drones.html .
This interview was originally broadcast on January 24, 2013, and Aaron Flint was kind enough to give permission to me to upload the audio (since it will not be archived on their website).Sector67 on CarouselUSSJoin2012-08-31 | It's all fun and games until someone overvolts the carousel to 1000 RPM (or a crazy person yells "Stop the Carousel" because someone tried to jump off a horse like it was a plane). Then it's hilarious.Rutherford - Outside VideoUSSJoin2012-08-01 | A brief test video shot at The Rutherford Institute, showing the Parrot AR.Drone's outdoor video capabilities briefly.
Video recorded with a Parrot AR.Drone, Version 1.0. For more information on the drone (including version 2.0, with HD recording), check out http://ardrone.parrot.com/parrot-ar-drone/usa .How Hackers Make Creme BruleeUSSJoin2012-07-28 | Custard? Check. Sugar? Check. $5 improvised flamethrower? Check.
This is how Defcon makes creme brulee in record time, with style.Hack The LawUSSJoin2012-07-17 | My presentation on why more hackers should go to law school, delivered at HOPE Number Nine on Sunday, July 15, 2012. Slides and blog post at http://blog.ussjoin.com/2012/07/hack-the-law.html .
Abstract:
Recent bills such as ACTA, COICA, and SOPA in legislatures worldwide demonstrate that there exists a fundamental disconnect between hackers and politicians. Worse, the people charged with dealing with law on the ground, the lawyers, rarely have any significant technical background obtained within the last few decades. This must change. It's all well and good to write your congressperson or donate to the EFF, but it's not enough; we need hackers to go to law school. Lawyers - whether they work as attorneys, or bring their knowledge of the law back to other fields - are uniquely situated to effect direct change on politics, social issues, and the law on the ground (where they arrest poor hackers) and, unlike many fields, it's not enough to be self-taught. This presentation will focus on the utility of the hacking ethos within the law, as well as the "law school experience," technical bits about actually getting in, and how to keep yourself from going nuts while spending three years surrounded by those who can't tell their megabytes from their overbites (and are terrified by Wireshark, let alone the more subtle tools in existence). Expect stories, humorous anecdotes, and terrifying lapses in judgment.Sector67 PPPRS ResearchUSSJoin2012-04-27 | Very important Sector67 PPPRS research toward our new propulsion system.
Any other uses for this you may be thinking of are irrelevant. Promise.Flight of Apollo67, Prototype 1USSJoin2012-03-06 | This was Sector67's first attempt for the http://hackerspacesinspace.com contest -- a contest for a hackerspace to launch a weather balloon costing less than $200 total, and capture pictures of the curvature of the Earth as seen from space.
Launched on November 20, 2011 from just west of Ridgeway, WI (about 37 miles west of Madison, WI), it was believed lost; no data was recovered from the wireless systems. However, in February, 2012, a nice family on the east side of Lake Michigan found it washed up on the beach-- and the data on the onboard computer was recoverable! This is the flight path and altitude recorded during the first hour of the flight, during which the balloon reached an altitude of 17,913 meters (almost 59,000 feet!). Pictures of near-space (including the curvature of the Earth) *were* recovered, and are at http://www.sector67.org/blog/2012/apollo67-v1-recovered .
For more information, check out http://www.apollo67.com.
Apollo67 is just one of many awesome projects happening at Sector67, Madison's hackerspace and general place of awesome. Check us out at http://sector67.org.ShmooCon 2012 - Sacrificial Computing for Land and SkyUSSJoin2012-01-30 | This was my talk at ShmooCon 2012; since the live stream was interrupted, the recording engineer gave me permission to upload it immediately. (Thanks!)
Projects such as the incredible Wireless Aerial Surveillance Platform give you the ability to monitor or attack networks far from accessible areas, but are limited by their deployment characteristics: $6000+ buys you just 10-30 minutes on target, and you have simultaneously to do your work and defend the physical plane from Bad Men With Projectile Weapons, lest they take exception to your plans. Disposable computing designed for just one use can provide massive reductions in cost and time to deployment without sacrificing flexibility; we show how $50-$75 can give you upwards of 24 hours to work on a task, while using only off-the-shelf hardware, and leaving no data onsite for an adversary to analyze after the operation. These computers can then be planted manually, or even dropped from unspecialized UAVs (such as the Parrot Drone) to allow your expensive plane to return to safety while you do your work.First Law School EventUSSJoin2011-09-13 | A nice intro to law school. A protest at the first open lecture.UWC-USA Annual Conference 2002 - Coming Soon VideoUSSJoin2010-04-17 | A video I made way back in 2002, as an advertisement for the 2002 UWC-USA Annual Conference on WMDs. Sure, it's hokey-- but this was the state of the art (for personal computers-- I did this on a circa 2000 laptop, not an Avid bay) at the time. Pretty stunning, really.UWC Presentation - Part 7/7USSJoin2010-04-13 | My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM, entitled "Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based Social Networking." If you'd like to examine the slides by themselves, they're available at http://tinyurl.com/y73x3yx .UWC Presentation - Part 6/7USSJoin2010-04-13 | My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM, entitled "Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based Social Networking." If you'd like to examine the slides by themselves, they're available at http://tinyurl.com/y73x3yx .UWC Presentation - Part 4/7USSJoin2010-04-13 | My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM, entitled "Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based Social Networking." If you'd like to examine the slides by themselves, they're available at http://tinyurl.com/y73x3yx .UWC Presentation - Part 5/7USSJoin2010-04-13 | My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM, entitled "Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based Social Networking." If you'd like to examine the slides by themselves, they're available at http://tinyurl.com/y73x3yx .UWC Presentation - Part 3/7USSJoin2010-04-13 | My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM, entitled "Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based Social Networking." If you'd like to examine the slides by themselves, they're available at http://tinyurl.com/y73x3yx .UWC Presentation - Part 2/7USSJoin2010-04-13 | My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM, entitled "Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based Social Networking." If you'd like to examine the slides by themselves, they're available at http://tinyurl.com/y73x3yx .UWC Presentation - Part 1/7USSJoin2010-04-13 | My presentation on Saturday, April 10, 2010 to students at the United World College of the American West in Montezuma, NM, entitled "Run Away: A Fair and Balanced Look at Privacy in the Age of Location-Based Social Networking." If you'd like to examine the slides by themselves, they're available at http://tinyurl.com/y73x3yx .Lys Gets ProtectiveUSSJoin2010-01-27 | My cat, Lysistrata, wasn't sure she liked her new cat tree. Then she saw me coming for it, and decided she had to defend it at all costs.Snowpocalypse 2009: Arlington, VAUSSJoin2009-12-20 | A brief video showing the amount of snow after the snowfall has ended (about midnight on 20 December 2009), including my poor, poor old red minivan from Montana.Cyborg: Stage OneUSSJoin2009-10-01 | This is the Teleglass T3-A by Scalar Corporation, as seen in http://www.youtube.com/watch?v=R1AzailvJB0 . It is a relatively inexpensive (about 20% of the cost of comparable systems) HMD (Head-Mounted Display). In addition to the motorized function being demonstrated (useful for any application where it doesn't constantly need to be monitored), it sports a 960x240 resolution, more than sufficient for wearable computing applications.
Also, it's really cool. :-)Tanmays White Coat CeremonyUSSJoin2009-08-08 | At Duke Medical, the first-year medical students receive white coats in their first week. This is Tanmay Gokhale, receiving his.Shannons White Coat CeremonyUSSJoin2009-08-08 | At Duke Medical, new medical students are given their white coats in their first week. This is Shannon O'Connor, getting hers.The Boat RaceUSSJoin2009-07-19 | John Rust and Bill O'Connor (my dad) face off against Shannon O'Connor and Kelsey Rust (their daughters) in this epic battle of speed and sheer insanity. Watch the climactic finish as the older generation, attempting to turn too fast, receive a thorough cleaning in the lake. This was at the Rust Family Reunion, 2009.