Michael Schrenk 
       Competitive Intelligence Counterintelligence Training & Speaking      In The News      Contact   
In The News
  Show All   Books   Articles   Interviews   Talks   Data Journalism  


Linux Pro Magazine, Dec 2012 (Cover Story)
"Build a Botnet, Playing nice with Internet Attack Techniques"
This is an article about the constructive things that can be done with destructive technologies. Most people associate botnets with nefarious activities like denial of service attacks on websites or identity fraud. I, on the other hand, associate botnets with the one I developed that autonomously purchased millions of dollars worth of automobiles.


PHP|Architect, Jul 2007 (Cover Story)
"Webbots and Spiders, An Insider's Guide"
Just after my first book was published, I wrote another introduction to writing webbots with PHP and cURL. The article explains the basics of writing automated web agents by solving a common business problem with a ShopperBot.


Web Techniques Magazine, Mar 2000 (Cover Story)
"Writing Intelligent Web Agents"
This article describes methods for designing and writing intelligent web agent software, which use information available on the Internet in some very "non-browser-like" ways. (now maintained by Dr. Dobbs).
This was only the second article I had written and sold. After I got paid, I drove down to REI and bought two 9' kayaks and a roof-top rack for my (cool at the time) Dodge Colt Vista.


Computer World Magazine, Aug 1997
"Fear and Hacking in Las Vegas"
Back in the '90s, I pioneered ways to transmit heart biometrics to physicians over the Internet via a standard browser and simple hardware. Because of the requirements of the medical industry, I became very interested in online security. At the same time, I became frustrated with the data security education available at the time. During this time I discovered that the hacker community was by far the best place to learn about security (it still is). I wanted to attend DEFCON 5, the world's largest hacker convention, but didn't want to offend the extremely conservative consulting firm that employed me. I found the solution to my problem by covering the story for Computer World Magazine. In the process, I got to work with a big-time photographer, Susan Werner, and had a great introduction to writing. (This was my first paying writing gig.) The article is no longer on the Computer World website, but you can read the archive of Fear and Hacking in Las Vegas on the DEFCON website.
You have a responsibility to know as much as possible about your competition and markets.
How much information are you giving your competition? Do you have Organizational Privacy policies?
 Training &
Well informed employees are your only true path to Organizational Privacy.
Many online processes can be automated for efficiency and cost savings.
Copyright Michael Schrenk 2019, all rights reserved.
DEF CON 23: Applied Intelligence: Using information that's not there
DEF CON 22: You're leaking trade secrets
DEF CON 21: How my BotNet purchased Millions of Dollars in Cars...
DEF CON 17: Screen Scraper Tricks: Difficult Cases
DEF CON 15: The Fabulous Executable Image Exploit
DEF CON 11: Online Corporate Intelligence
DEF CON 10: An Introduction to Writing Webbots and Spiders
DEF CON 5: Computer World: Fear and hacking in Las Vegas
  Organizational Privacy
Keynote: Secure Computing Forum, Dublin Ireland
Data Jounralism
Web Development
Bot Detector