Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

In secure locations it's common for USB ports to be physically blocked (the ones I've seen with glue/resin).


In super secure locations like a SCIF, a TSCM (technical surveillance countermeasures) team comes through on a regular basis with highly sensitive, expensive portable spectrum analyzers, which would find this really quick.


If you were designing a modern bug, wouldn't you make it cache data and limit its transmission window to one second a week?


You're completely correct. You'd have to be watching that frequency continuously. Fortunately, there's another way...

Nonlinear junction detectors can find semiconductor things, be they powered on OR off. Long story short, you blanket an area with GHz rf, and then look at the harmonics of the freq you spray it with.

I can see how to create one with a 2.4GHz transmitter and a DSP. I know the prices Ive seen are in the thousands of $$$, in which it's not terribly complex. The hardware would probably cost around a few hundred, primarily cause DSPs are $$$$

https://en.wikipedia.org/wiki/Nonlinear_junction_detector


Yes, burst transmitters have been a thing for a very long time


Speech to text aboard, compress the text and send it in bursts at random times.


Completely out of scope of anything but superpower espionage, but that got me wondering if you could do something useful with a nanoscale mechanical computer built the same way they do those microchip gyroscopes. The simplest would be a mechanical timer for toggling power only when there's no countermeasure scan going on, but I wonder if there are other clever things you could do if you had a nationstate budget


Ive made and will be giving a talk on what a TSCM team would use.

My talk was accepted at CircleCityCon in Indianapolis IN. I've built a tablet capable of intercepting and injecting radio from 20MHz to 1.5GHz.

https://ccc2019cfp.busyconf.com/activities/5c3a57314808fac10...

https://mobile.twitter.com/CrankyLinuxUser/status/1097884386...

Repo: https://gitlab.com/crankylinuxuser/siginttablet


Why would a TSCM want to inject traffic and potentially alert the adversary to the detection? Have you seen some of the spectrum analyzers built on HackRF?


because for me, doing TSCM is only half of what I'm wanting to do.

There's a lot of wireless stuff out there, not using 802.11__ or BT specs and frequencies. Are these things secure? Probably not. Are they encrypted? Perhaps. Do they defend against replay? Likely not.

But in the end, how do we assess? Standard TSCM gear can do a good job scanning and finding peaks. But its not for protocol decoding and device assessments. My goal is to "Identify signals, categorize protocols for signals found, decode if possible, and attempt to access/exploit".


This is awesome and thanks for sharing it, do you know if the circle city con talks are going to be recorded? I'd love to see a walk through of this stuff


Ive never attended CircleCityCon before, but in my experience, hacker cons do record. The problem I find is the smaller cons end up hosting the videos on a private server.

You could certainly ask them over twitter. In my experience they return questions in an hour or 2.


Hey, thanks for the response, I'll definitely follow up with them on twitter. And, seriously man, very cool stuff, very interested in digging in


Thank you!

Ideally, if you dont care about looks, all you need is a Raspberry Pi 3B+, keyboard/monitor/screen, Rtl-sdr, and a wire.

The wire is hooked up to GPIO 4 and used in conjunction with RPITX library.

The Rtlsdr allows receiving radio signals.

The only broken thing right now, is that changing GPU clock frequencies does "weird" things to the onboard wifi (unsurprising).

My next step will be making 2 scripts: 1 to install a SigInt tooling, and 2 is to update said tooling.


We stayed on NT4 into the mid-aughts partially because of the lack of USB support.


I have seen in the UK solder used to physically block usb ports on laptops - this was QinetiQ (the bit that remained as civilservants).

Of course they equipped the laptop with a cd burner


> I have seen in the UK solder used to physically block usb ports on laptops

With devices moving to USB-C for data and charging I wonder how security companies are going to prevent physical access to USB ports...


You'll remove the USB controller from the USB port on the laptop, then provide an adapter that has a USB controller, and plus it to the regular usb cable.


Disable the USB controller?


It's necessary to negotiate the power requirements.


I did not know this, that is interesting.

As in, the OS driver for the USB controller? Feels like a lot.


Google USB-PD. Devices on either end of the USB cable could be dumb, and it would revert to some base minimum requirements (5V 500/900mA or so). But notebook may not be able to negotiate for higher power or higher voltage for charging.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: