(no title)
steven777400 | 7 years ago
You could imagine a USB device that presented as a harmless file store unless certain conditions were detected, in which case the device could re-present as a keyboard (providing pre-programmed keystrokes) or potentially a bluetooth or wireless network receiver that could log or analyze traffic to a hidden partition.
I think the question of how to safely analyze suspect USB devices, at the level of potential nation-state actors, needs a lot more consideration and probably some custom tooling.
jakeinspace|7 years ago
j16sdiz|7 years ago
e.g. https://www.cvedetails.com/cve/CVE-2013-3200/
fulafel|7 years ago
"Boss, the electron microscope reverse engineering from that USB stick 6 months ago came back. They said they didn't find anything out of ordinary. The bill is $400k. But I guess we can start analyzing the contents now.".
tropo|7 years ago
It could contain a microphone and a transmitter.
A more evil device, for assassination, could contain explosives or nerve gas. Plugging in the device is fatal.
russdill|7 years ago
However, I'm doubtful that a small USB drive would have enough volume to be effective. Wouldn't matter on TV though.
exelius|7 years ago
I would be absolutely shocked if the US’ three letter agencies did not have some form of custom tooling to detect this — especially considering the sophisticated multi-vector I/O exploitation they demonstrated a decade ago with Stuxnet and the Equation Group.
Regardless of your views on his policy, Trump has demonstrated zero respect for opsec — even in a national security context — so I would also not be surprised if those three letter agencies have decided the White House is untrustworthy with its cyber warfare capabilities.
vanattab|7 years ago