Inspired by the NSA's ANT Catalog of spyware and surveillance tools, The NSA Playset project invites hackers to reproduce easy, at-home versions of the NSA's spy-tools arsenal — and NSA-style silly names are required.
The NSA's ANT Catalog was among documents leaked by Edward Snowden. It revealed 49 different software and hardware tools used for espionage on civilian targets. For hackers, it's an irresistible Pandora's Box.
The NSA Playset was announced in a presentation at Hack In The Box Amsterdam in April by Michal Ossmann (founder of Great Scott Gadgets, known for the Throwing Star LAN Tap and HackRF). His talk NSA Playset slides are here (.pdf).
For development of the collaborative project, The NSA Playset website was created.
The NSA Playset riffs off of the NSA's ANT Catalog, issuing an open call to hackers to contribute to The NSA Playset project: a humorous, open-contribution DIY guide to making sets and tools based on ANT Catalog "products."
The project encourages hackers to create NSA spy tools to "build your own NSA Playset out of open source components and play along with the NSA!"
The Playset website introduction reads,
Welcome to the home of the NSA Playset.
In the coming months and beyond, we will release a series of dead simple, easy to use tools to enable the next generation of security researchers.
We, the security community have learned a lot in the past couple decades, yet the general public is still ill equipped to deal with real threats that face them every day, and ill informed as to what is possible.
Inspired by the NSA ANT catalog, we hope the NSA Playset will make cutting edge security tools more accessible, easier to understand, and harder to forget.
The Playset project's goal is to raise awareness about everyday security and surveillance risks by reproducing the tools — the toys — used by the NSA for spying, easily, and while open-sourcing the recipes.
According to Ossmann's debut of The NSA Playset,
The gadgets in the catalog allow the NSA to monitor and locate mobile phones, tap USB and Ethernet connections, maintain persistent malware on PCs, communicate with malware across air gaps, mount Wi-Fi attacks from drones, and even monitor video displays, keystrokes, and ambient audio from a distance.
Did you know that nearly all of those capabilities can be implemented today with open source hardware and software?
Four NSA Playset projects will be presented at this year's premiere American hacking conference, DEF CON 22.
These include "TWILIGHTVEGETABLE" (comprehensive GSM sniffing/attacks), RF retroreflectors (radar eavesdropping technology for over-the-air surveillance), "SLOTSCREAMER" (DMA attacks), and "CHUCKWAGON" (an open source hardware version of the NSA's hardware trojan, its name play a riff on the NSA's "WAGONBED").
CHUCKWAGON's placeholder instructions on The NSA Playset website read,
step 1: Boot Kali Linux
step 2: Take a nap
step 3: ????
step 4: Profit
Project requirements for NSA Playset contributions are a combination of whimsy and practicality.
Contributions must have a silly name, a category, an exact scope or escalation, a list of ingredients and detailed instructions for reproducing results.
The entire concept is a bitterly lucid, almost luridly absurd — nee playful — critique. Yet this makes sense, after all, as the childish-seeming names in the ANT Catalog readily lent themselves to startling moments of humor.
If your project is similar to an existing NSA ANT project, you can come up with a clever play on that name. For example, if your project is similar to FOXACID, maybe you could call it COYOTEMETH.
Of course, if your project doesn't quite line up with anything in the ANT Catalog, you can come up with your own name. If you are feeling less creative, try out the handy [NSA] name generator found here.
The categories reveal a scope that make us wonder if this project might go the way of The Anarchist's Cookbook:
Passive Radio Interception - Any radio monitoring and analysis techniques.
Active Radio Injection - Any radio technique that requires transmission.
Physical Domination - These are techniques for forcibly unlocking physically proximate locked electronic devices.
Hardware Implants - Modified hardware/firmware for the purposes of monitoring or control of hardware devices.
Software Implants - Rootkits for any major software platform, including servers, mobile devices, browsers, etc.
Network Reconnaissance - Tools for gathering metadata from a live, local network.
The Playset definitely has the capability to introduce a level of chaos that no one expected to result from the Snowden documents.
The NSA Playset concept makes the ANT Catalog into a hacking and learning experience for hacker culture, which no doubt saw the NSA's catalog of James Bond/Q gadgets as both a cabinet of toys that filled them with intellectual lust, and a challenge to conquer.
We can only imagine that to a number of hackers and security researchers, the NSA ANT Catalog was its own sort of Sears catalog of madness. It is terrifying because it is understood.
In this view, The NSA Playset feels like a pointed yet whimsical way of coping with what the NSA ANT Catalog meant to the very people in the world who truly understand the chilling implications of the sinister toys the NSA (minus a democracy's version of adult supervision) is playing with.
Images via Michael Ossmann's NSA Playset slides.