fbpx

Stalking a City for Fun and Frivolity – Defcon 21

Tired of the government being the only entity around that can keep tabs
on a whole city at once? Frustrated by dictators du jour knowing more
about you than you know about them? Fed up with agents provocateur
slipping into your protests, rallies, or golf outings?

Suffer no more, because CreepyDOL is here to help! With open-source
software, off-the-shelf sensors, several layers of encryption, and a
deployment methodology of “pull pin, point toward privacy insurance
claimant,” it allows anyone to track everyone in a neighborhood, suburb,
or city from the comfort of their sofa. For just four easy hardware
purchases of $131.95, you, too can move up from small-time weirding out
to the big leagues of total information awareness: deploy CreepyDOL
today!


The Author 

Brendan O’Connor (@USSJoin) is a geek of many trades. While he’s a full-time law student at the University of Wisconsin in Madison (set to graduate in May 2014), his consultancy, Malice Afterthought, completed two DARPA Cyber Fast Track contracts during his first two years in law school.

He has also taught information warfare for the DoD, played the violin (now for more than 21 years), obtained his Amateur Extra certification, and wished fervently that his two cats would think of him as more than (a provider of) food.

 

Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...