Building the NSA’s Tools

Ya’ know, there’s a whole world of contract manufacturers out there and the NSA lets them all bid on these. They do not do all this work on their own in house, they like CIA have front companies that go around seeding the ideas, bids, RFPs that eventually lead to these devices. It’s a cottage industry of sorts of small COMMs outfits making small runs of very sophisticated devices. All in the name of National Security.

Hackaday

Fake ANT Catalog Entry for HackRF

Back in 2013, the NSA ANT Catalog was leaked. This document contained a list of devices that are available to the NSA to carry out surveillance.

[Michael Ossmann] took a look at this, and realized that a lot of their tools were similar to devices the open source hardware community had built. Based on that, he gave a talk on The NSA Playset at Toorcamp 2014. This covered how one might implement these devices using open hardware.

The above image is a parody of an ANT Catalog page, which shows [Michael]’s HackRF, an open source software defined radio. In the talk, [Michael] and [Dean Pierce] go over the ANT Catalog devices one by one, discussing the hardware that would be needed to build your own.

Some of these tools already have open source counterparts. The NIGHTSTAND WiFi exploitation tools is essentially a WiFi Pineapple. SPARROW II is more or less a device running Kismet attached…

View original post 52 more words

Advertisements

Author: carpetbomberz

Technology news & commentary all-in-one!