As dawn broke on the 2013 Black hat security conference, attendees and organisers alike had heavy hearts and plenty of apprehension.
Just days prior, news had broke of the death of iconic security researcher Barnaby Jack. The master hacker had made headlines at previous conferences for demonstrating high-profile hacks such as a cash-spitting ATM machine and, more importantly, had no shortage of friends within the security industry.
Jack had been scheduled to demonstrate at the conference, showing off hacking techniques that could have left implantable biomedical devices vulnerable to attacks. As the show kicked off, many were still in mourning, and Black Hat general manager Trey Ford solemnly kicked off the conference with a moment of silence.
Further complicating matters was a sense of tension caused by the conference's keynote speaker. NSA chief General Keith Alexander had long been scheduled to open the conference with his address. In the weeks leading up to the speech, news broke about the NSA's secret PRISM surveillance programme and the saga of Edward Snowden left many in the security community with a less than stellar opinion of the NSA.
Even with the tension and heartbreak, however, the Black Hat community endured.
Alexander kicked off the show with a surprisingly candid explanation of the NSA surveillance programme, which included screenshots and a detailed explanation of the surveillance tools themselves. Despite the occasional outburst from hecklers in the audience, Alexander's keynote went off with minimal interruption and, despite the obvious tension in the air, his keynote drew applause from the thousands in attendance.
With the keynote out of the way, Black Hat's numerous presenters were able to do what they do best: hack stuff.
Among the most fascinating presentations was a demonstration by iSEC researchers, which showed how an aftermarket femtocell unit could be modified to become a surveillance and espionage kit. While previous demonstrations had been able to intercept SMS messages, the iSEC researchers took things a step further by intercepting audio from a call live on stage and showing how hansets connected to the femtocell could effectively be “cloned”.
The phone hacking fun continued when a group of researchers from Georgia Tech University exploited flaws in Apple's iOS platform to craft a malicious “charger” system that could take over the device and use an uploaded developer profile to install malware and then hide the applications as otherwise legitimate iOS apps.
In the weeks leading up to Black Hat 2013, the big security story was the high-profile Android flaw, which left an overwhelming majority of devices prone to attack. That flaw, discovered by Jeff Forristal of Bluebox, exploited a weakness in the way Android applications are compressed and installed on a handset. According to Forristall, the flaw only came to light when he tried to input co-ordinates onto a mapping application.
Later in the week, the security community gathered at the room and time slot in which Barnaby Jack would have given his presentation. At the request of the family and Black Hat, press were asked not to record the event or directly quote any of the speakers at the session.
Even amidst the heartbreak and turmoil, Black Hat went on. The show, which started under a dark cloud of grief and suspicion, would go on to celebrate the ingenuity and creativity of the research community, while still paying tribute to one of its fallen heroes. The hackers may have been heartbroken, but they were not halted.
Microsoft seizes control of phishing sites linked with Russian state hackers
Fitness trackers over-estimate the number of steps their users take, analysis of 67 research reports suggests
Everything we think we know about the imminent Apple iPhone 9, iPhone 11 and iPhone 11 Plus launches
All the latest rumours about Apple iPhone Displays, CPUs, launch dates and even prices
Nvidia brings Turing microarchitecture into the high-end gaming segment