Presented at ToorCamp 2014
July 12, 2014, 1 p.m.
The leaked pages from the ANT catalog have given us unprecedented insight into the capabilities of the NSA. The gadgets in the catalog allow the NSA to monitor and locate mobile phones, tap USB and Ethernet connections, maintain persistent malware on PCs, communicate with malware across air gaps, mount Wi-Fi attacks from drones, and even monitor video displays, keystrokes, and ambient audio from a distance.
Did you know that nearly all of those capabilities can be implemented today with open source hardware and software? With a focus on the hardware devices found in the ANT catalog, I will show you how to build your own NSA Playset out of open source components so that you can play along with the NSA!
Dean Pierce / @deanpierce
as Dean Pierce
Dean Pierce is a computer security researcher in Portland Oregon. As an infosec professional, he has worked primarily in the fields of network security and product security, and has in the past covered research topics ranging from wireless networks and cryptography, to the development of various networking tools.
Michael Ossmann is a wireless security researcher who makes hardware for hackers. Best known for the open source HackRF, Ubertooth, and Daisho projects, he founded Great Scott Gadgets in an effort to put exciting, new tools into the hands of innovative people.