DEF CON 22 - Michael Ossmann - The NSA Playset: RF Retroreflectors

Поділитися
Вставка
  • Опубліковано 28 лис 2024

КОМЕНТАРІ • 80

  • @philorkill
    @philorkill 3 роки тому +21

    6 yeard and I'm still trying to figure out the basics. Thank you!

    • @andretarvok7122
      @andretarvok7122 3 роки тому

      Tell me about it i love these nsa playset talks cant get enough

    • @SarahKchannel
      @SarahKchannel Місяць тому

      Just think RFID tag, practically the same, except the reflected payload is a signal picked up locally and not just an embedded response packet - like a serial number.

  • @jacopo1farina
    @jacopo1farina 6 років тому +57

    A little trivia: the soviet spying device they display at 11:00 was invented by Léon Theremin, the same guy who invented the musical instrument

    • @funkosaurus1
      @funkosaurus1 6 років тому +4

      Swet. I have a Theremin I'm getting rid of.
      I haven't touched it in years.

    • @GospodinJean
      @GospodinJean 5 років тому

      and the father of RFID kind of

    • @prodbydramatic
      @prodbydramatic 2 роки тому +1

      @@funkosaurus1 I hope u kept it iv always wanted one

  • @---do2qd
    @---do2qd 7 років тому +12

    He's a very talented public speaker. Great job

  • @ganjajoe2566
    @ganjajoe2566 6 років тому +19

    Thanks for sharing!!! I'm an RF noob, and I just got a hackRF and Ettus USRP N210 with a lot of boards for it. I love learning about this stuff! Very fascinating to me.

  • @Phantom0fTheRouter
    @Phantom0fTheRouter 2 роки тому +2

    I had a lot of fun listening to the tones of the key presses on my TRS-80 PC2 on my GE clock radio back in the early 80s...

  • @AEON.
    @AEON. 2 роки тому

    We can view what you're dreaming wirelessly now - we can visualize wifi signals and see through any building - we can read the vibration on a window plane of what someone is saying in real time.

  • @docpedersen7582
    @docpedersen7582 8 років тому +12

    Info on great seal bug incorrect. Wasn't in an embassy, was in UN security council chamber in New York. Was discovered by ham -British as I recall- operator who also worked at UN and realized what he stumbled on shouldn't have been broadcast. He reported signal to authorities, which finally led to discovery. Seal was a gift to UN by Russians.

    • @andreassjoberg3145
      @andreassjoberg3145 5 років тому +3

      OOOOH! Goood old Trojan-horse rides again!

    • @The_Seeker
      @The_Seeker 5 років тому +4

      Neither of these are true, it was hung in the Spaso House, which was the US ambassador's residence in Moscow.

  • @ralphe9668
    @ralphe9668 3 роки тому +1

    so happy 😁 to find this thank you so much for the presentation

  • @larrbaII
    @larrbaII 2 роки тому

    This is a lot on how you can a 808 Laser to read vibrations off an idem ,reflected back to to a censer that can decode to auto output.

  • @NipkowDisk
    @NipkowDisk 6 років тому +16

    Ah, yes, RF illumination... The Great Seal incident immediately comes to mind.

  • @vikrantvijit1436
    @vikrantvijit1436 3 роки тому +1

    Great talk on Research Gaps or rather Black holes nature of radio art and sciencey things at technical beings.

  • @wesleyfeldsine7955
    @wesleyfeldsine7955 5 років тому +4

    As far as countermeasures, a Faraday cage may be the best bet at the moment. Unless you know the frequency being used (1-4ghz??) to attack you and you can flood that frequency with lots of random noise (non random noise could possibly be deciphered from looking at [+/-]interference, but then we are outside the range of active RF-Retroreflective talks.)

  • @AEON.
    @AEON. 2 роки тому

    Reminds me of the "Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference" talk. The radar talk lol. That was 2 years ago - is this something that came out of that open source work? Very interesting. (Did this talk influence and help the Bill Swearingen work? I mean - Just to be clear.)

  • @johndunn5272
    @johndunn5272 Рік тому

    How will the NSA detect quantum mechanical designed bugs ?

  • @martonlerant5672
    @martonlerant5672 8 років тому +3

    Well in a pretty old book written in the soviet era, it seems that westerners were a lot more in the dark about these tools than we were

  • @andreassjoberg3145
    @andreassjoberg3145 5 років тому +11

    So, RF-shielding is going to get even more important, and the new 5G Cellphone net will be passively illuminating stuff with 5GHz - tinfoil-hats ON!

  • @bojo8981
    @bojo8981 Рік тому

    I think I can prove the NSA can/does calculate the precise location of users of the "hidden services" BEFORE they are allowed to use the "hidden services". What should I do? Who would I report it to?

  • @chriskaprys
    @chriskaprys 7 років тому +4

    what about "massive attacks"? :)

  • @WhiteBoiDave
    @WhiteBoiDave 4 роки тому +4

    The Wizard of Oss.........#bestman

  • @GT101Nofear
    @GT101Nofear 10 років тому +3

    Now. .. I enjoyed watching this and all. .. But what's the RF Retroreflector really suppose to do? Is it like a Sonar canceller? Would firing this up cause a DOS to Radio frequencies? I'm confused as to what is supposed to do.

    • @elmotox
      @elmotox 10 років тому

      .

    • @OlDurtyGurty
      @OlDurtyGurty 10 років тому +4

      You solder the retroflectors inline with the data on a device and with another RF device, you can read the device with the retroflector from a distance. The sine waves he showed is the pulse that a PS/2 keyboard sends when you press the key "Q" from what I understand.

    • @PhillipRhodes
      @PhillipRhodes 3 роки тому +3

      It's a way to snoop on signals from a distance, but you use a passive "reflector" instead of an active "transmitter". If you watch old spy movies or shows like "Get Smart" they would plant "bugs" on people or in rooms, that transmitted a signal (like audio from the room). But this is bad because it requires a power source, which makes the device bigger and easier to locate, and because the active transmission from the device can be detected any time it is transmitting. Hence the old idea of "sweeping for bugs".
      With this "reflector" idea, the "bug" doesn't transmit a signal of its own. A separate transmitter transmits into the room, and the mere presence of the "reflector" affects the transmitted signal in a way that can be detected by monitoring the same frequency you're transmitting on. It the extent to which it tweaks the transmitted signal is driven by some signal you want to monitor (like the data line of a PS/2 keyboard cable) you can decode the signal you want to snoop on, by looking at how the signal from the transmitter gets distorted.
      In the latter model, the "bug" is smaller, needs no power source (eg a battery or whatever), and doesn't really transmit a signal of its own, which would theoretically make it much harder to locate.
      There are some over-simplifications in what I just wrote, I but I think that captures the basic essence of the idea.

  • @vanhetgoor
    @vanhetgoor 7 років тому +1

    Countermeasures: one winding coil, and an ever changing capacitor, like the combinations of a varicap with ntc (temperature censor) and ldr (to detect light).

    • @Hektabyte
      @Hektabyte 5 років тому +1

      That's a actually a great idea, I'll try it out this week when I get proper equipment.

    • @vanhetgoor
      @vanhetgoor 3 роки тому

      ​@Ura Fag Very simple, it has to be passive and for ever as much changes as possible, light is oftener changing then the room temperature.

  • @JasonDimmick
    @JasonDimmick Рік тому

    Is this the technology created by Joseph Theremin for the self named Theremin musical instrument?

    • @joeb3300
      @joeb3300 Рік тому

      Leon Theremin (Lev Sergeyevich Termen)

  • @drnv150
    @drnv150 4 роки тому +1

    How many think there is alot of unknown data passed over HF shortwave now that 3G data speeds are possible, especially considering relatively few care to monitor HF and are mostly monitoring IT infrastructure, I.E.... Nelly O.? Hard to block or jam a station sending ALE 3G running 1.5 kilowatts transmit power, especially at random times on various HF bands with a mobile magnetic loop antenna. Bad part being, if your RF gear is really close to the 30 kv cap, it goes pooooof...

  • @Aemilindore
    @Aemilindore 6 років тому +1

    Need more Michel osman.. More.. More more mkre.

  • @goiterlanternbase
    @goiterlanternbase Рік тому +1

    Searching for hidden patents? Attempt for a patent on something similar to the thing that should be patented but isn't.

  • @64-bit63
    @64-bit63 2 роки тому

    Cant you make one with a rpi4?

  • @davidlee50
    @davidlee50 2 роки тому

    What replaced it?

  • @nobodynoone2500
    @nobodynoone2500 Рік тому

    retro reflection was researched way before the 40s, you aren't using the right terms to findthem, because they were not yet defined. There are literally papers from the 1880's discussing it.

  • @jaimedavilaperez
    @jaimedavilaperez 5 років тому

    very interesting..would try

  • @i93sme
    @i93sme 3 роки тому +1

    Basically a fancy name for an RF tag

  • @Thefreakyfreek
    @Thefreakyfreek Місяць тому

    10:26 the engineering team rolling in thier graves as some 21 century WizKid pigbacking on decades of tenological development calling thier magnum opus a "simple device"

  • @retepignus2626
    @retepignus2626 6 років тому +1

    Is this what we call now "AirGap"?

  • @CucamongaGuy
    @CucamongaGuy 3 роки тому

    How it's done > 10:40

  • @johnaweiss
    @johnaweiss Місяць тому

    Won't a 10 GHz device have very short range, and terrible NLOS performance?

  • @mountainconstructions
    @mountainconstructions 6 років тому +2

    People in the audience have no idea

  • @timk1595
    @timk1595 9 років тому +1

    where would one learn about "hacking" (very broad term)?

    • @Calvert1212
      @Calvert1212 9 років тому +2

      Hacking is the application of knowledge and critical thinking to make something do something it wasn't designed to do, so you'll need to be more specific.

    • @Calvert1212
      @Calvert1212 9 років тому +1

      Seeing as this is a defcon video I will assume you mean either rf, software, hardware, network, wifi, Bluetooth, phreaking, etc. etc. which one interests you most?

    • @Calvert1212
      @Calvert1212 9 років тому +1

      Chad Calvert sorry for the post spam, this is kinda stream of conscience. The very first thing I suggest is to download Kali linux on your computer. It is a free Debian distribution of Linux that comes preloaded with all the tools you need to practice many different forms of hacking, such as: HID attacks, fuzzing, debugging, scripting, programming, MitM, software defined radio, Metasploit, MAC spoofing, badUSB, brute forcing, dictionary attacks, DDoS (if that counts), SSL stripping, arp poisoning(a more specific type of MitM attack), hash passing, stack bashing, cookie injection, SQL injection (goes without saying) and so on. Hacking, more specifically information security in this case (infosec, or antisec if you are more of a rebel), is an art form which requires knowledge of computer, cryptological, social and communications processes so that one can identify weakness in a given system so as to fix or exploit them. A more accurate term for this is "cracking".

    • @timk1595
      @timk1595 9 років тому

      ***** Chad Calvert Appreciate all the info you listed. I would be looking more towards software. Defiantly going to check out Kali Linux. Thanks for taking the time to elaborate. :D

    • @tiberiu_nicolae
      @tiberiu_nicolae 9 років тому

      +Isiah F Hackaday.com shows all kinds of hacks

  • @gummipalle
    @gummipalle 9 років тому +1

    one in 22,000 doesnt like this.... Thats a fine ratio.... Or a hack result.....

    • @leocurious9919
      @leocurious9919 8 років тому

      +Frabbledabble I only see 159 linkes and 3 dislikes. Where are those 22'000 likes?

    • @gummipalle
      @gummipalle 8 років тому +2

      +Leo Curious nono, one of 22,000 views :-)

  • @yshouldifoogle6724
    @yshouldifoogle6724 6 років тому

    Encourage leaks by crowd sourcing Bitcoin $ to pay for them. untraceable money and leakers can stay private.

    • @JohnDoe-nq4du
      @JohnDoe-nq4du 5 років тому +4

      bitcoin is the most traceable currency ever devised. every active bitcoin wallet on earth contains a plain-text record of every bitcoin transaction ever completed. combined with the right opsec practices, it is possible to use bitcoin as part of a system to dissociate one's legal identity from activities carried out using bitcoin, but just using bitcoin doesn't make it even really all that inconvenient to identify you. pseudonymous =/= anonymous

  • @AEON.
    @AEON. 2 роки тому

    Thanks to 3rd party advertising and tracking of everyone - it's easy - very easy - to passively intercept data and even man in the middle it and shoot it back out.

  • @Paraboemba
    @Paraboemba 5 років тому

    aka. BACKSCATTERING