When Der Spiegel and Jacob Appelbaum published leaked pages of the National Security Agency's ANT Catalog—the collection of tools and software created for NSA's Tailored Access Operations (TAO) division—it triggered shock, awe, and a range of other emotions around the world. Among some hardware hackers and security researchers, it triggered something else, too—a desire to replicate the capabilities of TAO's toolbox to conduct research on how the same approaches might be used by other adversaries.
In less than 18 months since the catalog's leak, the NSA Playset project has done just that. The collection boasts over a dozen devices that put the power of the NSA's TAO into the hands of researchers. Project creator Michael Ossmann—a security researcher, radio frequency hardware engineer, and founder of Great Scott Gadgets—detailed the tools at a presentation during the Black Hat conference in Las Vegas last week, and he talked with Ars more about it this past weekend at DEF CON 23.
(Score: 0) by Anonymous Coward on Thursday August 13 2015, @03:36AM
Now we can analyze their code and laugh at how stupid they are! Meanwhile they're using something completely different while we're laughing at old crap that was intentionally bad and intentionally leaked.
(Score: 3, Insightful) by tibman on Thursday August 13 2015, @02:03PM
If you checkout the catalog you'd see that some of this stuff will be useful for a long long time. Also, i just want to point out that a picture and short description of a device isn't much to go on to recreate it. So the people recreating these devices are doing a lot more than just copying something.
SN won't survive on lurkers alone. Write comments.