Komentáře •

  • @philorkill
    @philorkill Před 2 lety +17

    6 yeard and I'm still trying to figure out the basics. Thank you!

    • @andretarvok7122
      @andretarvok7122 Před 2 lety

      Tell me about it i love these nsa playset talks cant get enough

  • @ganjajoe2566
    @ganjajoe2566 Před 6 lety +19

    Thanks for sharing!!! I'm an RF noob, and I just got a hackRF and Ettus USRP N210 with a lot of boards for it. I love learning about this stuff! Very fascinating to me.

  • @---do2qd
    @---do2qd Před 7 lety +11

    He's a very talented public speaker. Great job

  • @ralphe9668
    @ralphe9668 Před 3 lety +1

    so happy 😁 to find this thank you so much for the presentation

  • @Phantom0fTheRouter
    @Phantom0fTheRouter Před 2 lety +1

    I had a lot of fun listening to the tones of the key presses on my TRS-80 PC2 on my GE clock radio back in the early 80s...

  • @jacopo1farina
    @jacopo1farina Před 5 lety +53

    A little trivia: the soviet spying device they display at 11:00 was invented by Léon Theremin, the same guy who invented the musical instrument

    • @funkosaurus1
      @funkosaurus1 Před 5 lety +4

      Swet. I have a Theremin I'm getting rid of.
      I haven't touched it in years.

    • @GospodinJean
      @GospodinJean Před 5 lety

      and the father of RFID kind of

    • @prodbydramatic
      @prodbydramatic Před rokem +1

      @@funkosaurus1 I hope u kept it iv always wanted one

  • @BuckFitches
    @BuckFitches Před 3 lety +3

    The Wizard of Oss.........#bestman

  • @jaimedavilaperez
    @jaimedavilaperez Před 5 lety

    very interesting..would try

  • @NipkowDisk
    @NipkowDisk Před 6 lety +16

    Ah, yes, RF illumination... The Great Seal incident immediately comes to mind.

  • @larrbaII
    @larrbaII Před 2 lety

    This is a lot on how you can a 808 Laser to read vibrations off an idem ,reflected back to to a censer that can decode to auto output.

  • @AEON.
    @AEON. Před rokem

    We can view what you're dreaming wirelessly now - we can visualize wifi signals and see through any building - we can read the vibration on a window plane of what someone is saying in real time.

  • @vikrantvijit1436
    @vikrantvijit1436 Před 3 lety +1

    Great talk on Research Gaps or rather Black holes nature of radio art and sciencey things at technical beings.

  • @Aemilindore
    @Aemilindore Před 5 lety +1

    Need more Michel osman.. More.. More more mkre.

  • @chriskaprys
    @chriskaprys Před 6 lety +4

    what about "massive attacks"? :)

  • @AEON.
    @AEON. Před rokem

    Reminds me of the "Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference" talk. The radar talk lol. That was 2 years ago - is this something that came out of that open source work? Very interesting. (Did this talk influence and help the Bill Swearingen work? I mean - Just to be clear.)

  • @docpedersen7582
    @docpedersen7582 Před 8 lety +11

    Info on great seal bug incorrect. Wasn't in an embassy, was in UN security council chamber in New York. Was discovered by ham -British as I recall- operator who also worked at UN and realized what he stumbled on shouldn't have been broadcast. He reported signal to authorities, which finally led to discovery. Seal was a gift to UN by Russians.

    • @andreassjoberg3145
      @andreassjoberg3145 Před 5 lety +3

      OOOOH! Goood old Trojan-horse rides again!

    • @The_Seeker
      @The_Seeker Před 4 lety +3

      Neither of these are true, it was hung in the Spaso House, which was the US ambassador's residence in Moscow.

  • @SameLif3
    @SameLif3 Před 4 lety +2

    I may not be a hacker nor engineer yet but I sure noticed during this conference I That what the n s a maybe using is something that usually depends on any ordinary current like hacking WiFi or just look up wireless leds from strange parts from CZcams for example

  • @64-bit63
    @64-bit63 Před 2 lety

    Cant you make one with a rpi4?

  • @bojo8981
    @bojo8981 Před rokem

    I think I can prove the NSA can/does calculate the precise location of users of the "hidden services" BEFORE they are allowed to use the "hidden services". What should I do? Who would I report it to?

  • @johndunn5272
    @johndunn5272 Před rokem

    How will the NSA detect quantum mechanical designed bugs ?

  • @martonlerant5672
    @martonlerant5672 Před 8 lety +3

    Well in a pretty old book written in the soviet era, it seems that westerners were a lot more in the dark about these tools than we were

  • @GT101Nofear
    @GT101Nofear Před 9 lety +3

    Now. .. I enjoyed watching this and all. .. But what's the RF Retroreflector really suppose to do? Is it like a Sonar canceller? Would firing this up cause a DOS to Radio frequencies? I'm confused as to what is supposed to do.

    • @elmotox
      @elmotox Před 9 lety

      .

    • @OlDurtyGurty
      @OlDurtyGurty Před 9 lety +4

      You solder the retroflectors inline with the data on a device and with another RF device, you can read the device with the retroflector from a distance. The sine waves he showed is the pulse that a PS/2 keyboard sends when you press the key "Q" from what I understand.

    • @PhillipRhodes
      @PhillipRhodes Před 3 lety +3

      It's a way to snoop on signals from a distance, but you use a passive "reflector" instead of an active "transmitter". If you watch old spy movies or shows like "Get Smart" they would plant "bugs" on people or in rooms, that transmitted a signal (like audio from the room). But this is bad because it requires a power source, which makes the device bigger and easier to locate, and because the active transmission from the device can be detected any time it is transmitting. Hence the old idea of "sweeping for bugs".
      With this "reflector" idea, the "bug" doesn't transmit a signal of its own. A separate transmitter transmits into the room, and the mere presence of the "reflector" affects the transmitted signal in a way that can be detected by monitoring the same frequency you're transmitting on. It the extent to which it tweaks the transmitted signal is driven by some signal you want to monitor (like the data line of a PS/2 keyboard cable) you can decode the signal you want to snoop on, by looking at how the signal from the transmitter gets distorted.
      In the latter model, the "bug" is smaller, needs no power source (eg a battery or whatever), and doesn't really transmit a signal of its own, which would theoretically make it much harder to locate.
      There are some over-simplifications in what I just wrote, I but I think that captures the basic essence of the idea.

  • @wesleyfeldsine7955
    @wesleyfeldsine7955 Před 5 lety +4

    As far as countermeasures, a Faraday cage may be the best bet at the moment. Unless you know the frequency being used (1-4ghz??) to attack you and you can flood that frequency with lots of random noise (non random noise could possibly be deciphered from looking at [+/-]interference, but then we are outside the range of active RF-Retroreflective talks.)

  • @drnv150
    @drnv150 Před 4 lety +1

    How many think there is alot of unknown data passed over HF shortwave now that 3G data speeds are possible, especially considering relatively few care to monitor HF and are mostly monitoring IT infrastructure, I.E.... Nelly O.? Hard to block or jam a station sending ALE 3G running 1.5 kilowatts transmit power, especially at random times on various HF bands with a mobile magnetic loop antenna. Bad part being, if your RF gear is really close to the 30 kv cap, it goes pooooof...

  • @i93sme
    @i93sme Před 2 lety +1

    Basically a fancy name for an RF tag

  • @JasonDimmick
    @JasonDimmick Před rokem

    Is this the technology created by Joseph Theremin for the self named Theremin musical instrument?

    • @joeb3300
      @joeb3300 Před rokem

      Leon Theremin (Lev Sergeyevich Termen)

  • @davidlee50
    @davidlee50 Před rokem

    What replaced it?

  • @retepignus2626
    @retepignus2626 Před 6 lety +1

    Is this what we call now "AirGap"?

  • @vanhetgoor
    @vanhetgoor Před 6 lety +1

    Countermeasures: one winding coil, and an ever changing capacitor, like the combinations of a varicap with ntc (temperature censor) and ldr (to detect light).

    • @Hektabyte
      @Hektabyte Před 5 lety +1

      That's a actually a great idea, I'll try it out this week when I get proper equipment.

    • @vanhetgoor
      @vanhetgoor Před 3 lety

      ​@Ura Fag Very simple, it has to be passive and for ever as much changes as possible, light is oftener changing then the room temperature.

  • @CucamongaGuy
    @CucamongaGuy Před 2 lety

    How it's done > 10:40

  • @mountainconstructions
    @mountainconstructions Před 5 lety +2

    People in the audience have no idea

  • @goiterlanternbase
    @goiterlanternbase Před rokem +1

    Searching for hidden patents? Attempt for a patent on something similar to the thing that should be patented but isn't.

  • @andreassjoberg3145
    @andreassjoberg3145 Před 5 lety +9

    So, RF-shielding is going to get even more important, and the new 5G Cellphone net will be passively illuminating stuff with 5GHz - tinfoil-hats ON!

  • @nobodynoone2500
    @nobodynoone2500 Před rokem

    retro reflection was researched way before the 40s, you aren't using the right terms to findthem, because they were not yet defined. There are literally papers from the 1880's discussing it.

  • @timk1595
    @timk1595 Před 9 lety +1

    where would one learn about "hacking" (very broad term)?

    • @Calvert1212
      @Calvert1212 Před 9 lety +2

      Hacking is the application of knowledge and critical thinking to make something do something it wasn't designed to do, so you'll need to be more specific.

    • @Calvert1212
      @Calvert1212 Před 9 lety +1

      Seeing as this is a defcon video I will assume you mean either rf, software, hardware, network, wifi, Bluetooth, phreaking, etc. etc. which one interests you most?

    • @Calvert1212
      @Calvert1212 Před 9 lety +1

      Chad Calvert sorry for the post spam, this is kinda stream of conscience. The very first thing I suggest is to download Kali linux on your computer. It is a free Debian distribution of Linux that comes preloaded with all the tools you need to practice many different forms of hacking, such as: HID attacks, fuzzing, debugging, scripting, programming, MitM, software defined radio, Metasploit, MAC spoofing, badUSB, brute forcing, dictionary attacks, DDoS (if that counts), SSL stripping, arp poisoning(a more specific type of MitM attack), hash passing, stack bashing, cookie injection, SQL injection (goes without saying) and so on. Hacking, more specifically information security in this case (infosec, or antisec if you are more of a rebel), is an art form which requires knowledge of computer, cryptological, social and communications processes so that one can identify weakness in a given system so as to fix or exploit them. A more accurate term for this is "cracking".

    • @timk1595
      @timk1595 Před 9 lety

      ***** Chad Calvert Appreciate all the info you listed. I would be looking more towards software. Defiantly going to check out Kali Linux. Thanks for taking the time to elaborate. :D

    • @tiberiu_nicolae
      @tiberiu_nicolae Před 8 lety

      +Isiah F Hackaday.com shows all kinds of hacks

  • @gummipalle
    @gummipalle Před 8 lety +1

    one in 22,000 doesnt like this.... Thats a fine ratio.... Or a hack result.....

    • @leocurious9919
      @leocurious9919 Před 8 lety

      +Frabbledabble I only see 159 linkes and 3 dislikes. Where are those 22'000 likes?

    • @gummipalle
      @gummipalle Před 8 lety +2

      +Leo Curious nono, one of 22,000 views :-)

  • @yshouldifoogle6724
    @yshouldifoogle6724 Před 6 lety

    Encourage leaks by crowd sourcing Bitcoin $ to pay for them. untraceable money and leakers can stay private.

    • @JohnDoe-nq4du
      @JohnDoe-nq4du Před 4 lety +4

      bitcoin is the most traceable currency ever devised. every active bitcoin wallet on earth contains a plain-text record of every bitcoin transaction ever completed. combined with the right opsec practices, it is possible to use bitcoin as part of a system to dissociate one's legal identity from activities carried out using bitcoin, but just using bitcoin doesn't make it even really all that inconvenient to identify you. pseudonymous =/= anonymous

  • @AEON.
    @AEON. Před rokem

    Thanks to 3rd party advertising and tracking of everyone - it's easy - very easy - to passively intercept data and even man in the middle it and shoot it back out.

  • @Paraboemba
    @Paraboemba Před 5 lety

    aka. BACKSCATTERING