This is basically a computer terrorist device. Clearly not marked in anyway. It should have skull and crossbones on it with a written warning. So I don’t buy the claim that it is intended for good purposes.
The modifications to the Mother board design to stop this attack are really very simple and cheap. I hope the manufacturers get on the ball.
Any serious testing of USB ports' handling of high voltages would be done with externally powered devices capable of different voltages and pulse durations. Being powered by the USB port itself shows that it is meant for causing trouble.
There would have to be some type of surge protector/breaker in place to interrupt it.
Since this device requires no data communication, disabling USB ports as part of a Windows group policy may have no effect. As long as the port is energized, even if no data is allowed to transfer, it will charge the capacitors of this kill device and shunt it back into the computer.
You would need possibly BIOS level controls to physically “de-power” unused ports.
Ever since I’ve heard of this device I’ve been on the lookout where vulnerabilities exist. It’s amazing how many POS terminals and receptionist desks, etc have exposed USB ports that are easily accessible.
I’m most concerned about voting machines. I used to work as a chief of precinct for Fairfax County, VA. The old Shouptronic machines were very resistant to physical attack, as all the electronic ports and controls were on the back of the machine and not easily accessible by a voter.
The new machines (at least as of 2010) are essentially touch screen PCs running Windows XP embedded. I don’t remember if they have an exposed USB port, but it wouldn’t surprise me. Someone going into a precinct with a USB kill stick that is known to produce Republican votes and destroying a machine would make it very difficult to retrieve the tally figures.
Chalk it up to malfunction, but a clandestine targeting of devices spread out over a geographic area could tip a very close race.