Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level

Presented at DEF CON 15 (2007), Aug. 5, 2007, 11 a.m. (50 minutes)

It seems that at every con nowadays there is at least one talk dedicated to physical security. Our servers and data can be encrypted and passworded with the latest algorithms, but that doesn't do the trick if someone marches them out the door when we're not looking. In the past, many physical security talks have focused on passive defense: locks that resist picking, safes which resist cracking, etc. However, sometimes an intrusion is detected while in progress... and such intrusions- even physical ones- may require immediate countermeasures. Many of us in the security community own firearms, but few have ever had to use them in a defensive situation. Others have considered gun ownership but lack any experience or foundation in this area. This panel of experts will provide a comprehensive overview of this highly-charged and often-misunderstood topic. Bring any questions you have about hardware, ammunition, tactics, and the law.

Presenters:

  • Deviant Ollam
    Deviant Ollam is a frequent speaker on the topic of physical security. A graduate of the New Jersey Institute of Technology's "Science, Technology, & Society" program, he is always fascinated by the interplay that connects human values and social trends to developments in the technical world. A gun-owning peacenick, Deviant disdains violence but believes in being prepared to confront it. He has given physical security presentations at DefCon, ShmooCon, HOPE, and at various colleges and universities, including the United States Military Academy at West Point.
  • Noid
    Noid is a recognized member of both the hacking world and the firearm community. A shooting enthusiast who has handled just about every manufactured style of firearm, his encyclopedic knowledge of guns results in a constant barrage of questions from individuals who are considering the purchase of a new piece of steel. During particularly stressful days at the office, Noid considers hanging up his INFOSEC spurs and becoming a range master or armorer for the Feds.
  • John Benson / jur1st as jur1st
    Jur1st is the co-chair of the Kansas City Metropolitan Bar Association Computer Law and Technology Committee, adjunct professor at the Colorado Technical University, and an electronic discovery analyst at a large midwestern law firm. While in law school he excelled in the areas of evidence and trial advocacy, produced papers on the Sony XCP Rootkit and NSA warrantless wiretapping program, and was a general menace to the local network administrators.
  • Frank Thornton (a.k.a. Thorn)
    Frank Thornton (a.k.a. Thorn) runs his own consulting firm, Blackthorn Systems, which specializes in wireless networks. In addition to his computer interests, Frank was a law enforcement officer for many years. He has investigated thousands of crimes, been in numerous armed confrontations, and been directly involved in several shootings. Combining both professional interests, he was a member of the workgroup that established ANSI Standard "ANSI/NIST-CSL 1-1993 Data Format for the Interchange of Fingerprint Information."

Links:

Similar Presentations: