Dan Veeneman Wireless Overview Protocols and Threat Models
Wireless Overview: Protocols and Threat Models
Dan Veeneman
[ Wireless ]
Everything seems to be going wireless. There are now a number of wireless voice and data networks that are used routinely to carry sensitive business and personal information. This session will provide an introduction to the protocols, radio modulation techniques, and security features of CDPD, Bluetooth, digital mobile telephony (including SIM cards), SMS, 3G, two-way paging and private data networks.
We'll discuss the development of threat models and some corresponding mitigation techniques, as well as demonstrate several wireless tools and test equipment.
A question and answer session at the end of the presentation will allow participants to cover any additional issues they'd like to discuss.
Dan Veeneman has served in a number of management, technical and consulting positions since 1980. He has designed and implemented secure data networks for a number of government and civilian clients, encompassing video, audio and data delivered over telephone, satellite and the Internet. Dan is also the system architect for the United States Army's satellite-based two-way realtime messaging and geolocation system used on thousands of battlefield vehicles around the world.
Dan has been writing software for more than 25 years, coding everything from embedded firmware to distributed processing applications for a variety of small, midsize and Fortune 500 companies.
He writes a monthly magazine column covering wireless issues and edits a quarterly newsletter concerning cryptography. Dan holds an engineering degree from Northwestern University
Black Hat - USA - 2002 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #wireless