October 1st, 2014

James Atkinson to speak at Midnight Research Labs Boston on Thursday (June 25, 2009)

(Copied from the MRLB mailing list)

Howdy! I’m pleased to announce that THIS Thursday (June 25) at 6:30 PM,
Midnight Research Labs Boston will have a special guest speaker: Mr.
James Atkinson, who will be giving (if memory serves me correctly) his
“Kill Your Cordless Phone” talk.

***This talk will be announced and open to the general public, and WILL
REQUIRE AN RSVP as space is limited. Given the size and layout of MRLB,
we’ll be doing a bit of re-arranging to accommodate attendees.***

Please RSVP to rsvp001 @ n0where.org

We hope to see you there!

Here’s a brief bio on Mr. Atkinson (more at http://tscm.com/biojma.html):

“””
James M. Atkinson is the President and Senior Engineer of Granite Island
Group – a prestigous veteran-owned company started in 1987 that
specializes in the electronics engineering field. Assuring the
protection of classified, confidential, privileged, or private
information against technical attack, eavesdropping, or exploitation,
Mr. Atkinson has earned the respect of the of the most public and
private global client base in the industry. Prior to 1987, Mr. Atkinson
served in the military, and had a nationally recognized background as a
computer hardware and software developer.

He is a counter-surveillance expert, communications engineer, security
consultant, and instructor with a reputation for designing and
installing some of the most powerful secure communications systems used
by both government agencies and major corporations. He has designed over
130 electronic and tactical products such as GPS devices, test
instruments, radio equipment, audio products, modified bouchons, HRT
devices, cryptographic equipment, surveillance devices, SIGINT/COMINT
products, and various other devices and systems.
“””

Keyboard Sniffing

We talked about this before, and since it’s a pretty interesting project I thought it would be good to follow up on. The remote-exploit.org guys (responsible for backtrack) released a how-to along with source-code and parts list, etc, for their wireless keyboard sniffing project. They don’t have fabricated boards yet, but they’re looking at some options for the future. The hardware is based on a Texas Instruments TRF7900 chip controlled by an ATMEL ATMEGA microcontroller. Here’s the blurb they have on the site:

This opensource hardware and software project enables every person to verify the security level of their own keyboard transmissions, and/or demonstrate the sniffing attacks (for educational purpose only). The hardware itself is designed to be small and versatile, it can be extended to currently undetected/unknown keyboard traffic, and/or hardware extensions, for example, a repeating module or amplifier

Here’s a video that they posted of the sniffer in use:

Keyboard Sniffer Keykeriki from Max Moser on Vimeo.

Imhotep theme designed by Chris Lin. Proudly powered by Wordpress.
XHTML | CSS | RSS | Comments RSS