Replicating NSA’s gadgets using open source

Wireless security researcher Michael Ossmann asked himself: “Could I make the gadgets that the agency uses to monitor and locate mobile phones, tap USB and Ethernet connections, maintain persistent malware on PCs, communicate with malware across air gaps, and more, by just using open source software and hardware?” In this podcast he shares his insights on what to use – and how – to duplicate hardware devices found in the ANT catalog.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis