This document discusses USB attacks in the past, present, and future. It provides background on the SensePost team located in South Africa and the UK that has trained at BlackHat conferences yearly since 2002. It then outlines how USB attacks have evolved from early peripheral interfaces to exploiting USB device classes and plug-and-play capabilities. Finally, it suggests the future may bring additional USB-based attacks and encourages visiting their website for more information.