A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


Hacking with Ham Radios: What I have learned in 25 years of being a ham. - Jay and Jerome Radcliff BSides Detroit 2017 (Hacking Illustrated Series InfoSec Tutorial Videos)

Hacking with Ham Radios: What I have learned in 25 years of being a ham.
Jay and Jerome Radcliff
@jradcliffe02

When I first got my license as a 12 year old, I had no idea what kind of world I was entering. Ham radio make many people think of old white guys and morse code. The reality is that hams have been hackers since the very first radios were made. We’ll explore some of the niche aspects of the hobby and how they relate to hacking in the infosec world. Being from the detroit area I will also introduce some of the great local resources those in the southeastern Michigan area have to a great wealth of information on the topic.

Jay Radcliffe has been working in the computer security field for over twenty years and is currently a Senior Security Consultant and researcher for Rapid7. Coming from the managed security services industry, Jay has used just about every security device made over the last decade. Recently, Jay has presented ground-breaking research on security vulnerabilities in medical devices at Black Hat, BSides and other technology conferences. Having held an amateur radio license since the age of 12, Jay is equally comfortable hacking hardware and working a soldering iron as he is in front of a keyboard performing a penetration test. Jay holds a Masters degree in Information Security Engineering from SANS Technology Institute as well as a Bachelor's degree in Criminal Justice/Pre-Law from Wayne State University. SC Magazine named him one of the Top Influential IT Security Thinkers in 2013.

Back to BSides Detroit video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast