>Message: 1
>Date: Thu, 2 Oct 2025 12:12:17 +0200
>From: anonym <[email protected]>
>To: [email protected]
>Cc: [email protected]
>Subject: Re: [Tails-dev] Wireless Vulnerability in All USB Memory
>       Sticks
>Message-ID: <[email protected]>
>Content-Type: text/plain; charset=UTF-8; format=flowed
>
On 30/09/2025 18.57, David A. Wheeler via Tails-dev wrote:
>>> On Sep 30, 2025, at 9:35 AM, JOSEPH WILLIAM BAKER? via Tails-dev 
>>> <[email protected]> wrote:
>>>
>>> Two department heads within a reclamation department of the US Department 
>>> of Defense told me circa 2013 that SAP had discovered a wireless 
>>> vulnerability in USB >memory sticks.
>
>Joseph, you said that "SAP had made the discovery public", so where can 
>we read more about this claim?
>
>Otherwise, I have nothing to add to the great response from David A. 
>Wheeler.
>
>Cheers!

Dear Anonym,

I could not find anything on the internet about SAP making the discovery 
public.   I was told by the official that "The only reason I can tell you this 
is because SAP made it public."  Then he proceeded to tell me about the 
wireless back door of the usb flash memory sticks.  I can infer that the back 
door tech was a secret that could not be told... i.e. classified.  But that he 
was saying the only reason he could tell me is because SAP had made it public.  
Let's search archive.org maybe?  I have searched many times on the Internet and 
have not been able to find this.  It's like a black hole on this information.  
Still, it might be interesting to ask SAP what their policies are regarding the 
use of USB memory sticks. 

I was a systems administrator at Plug and Play Tech Center in Sunnyvale, 
California.   We were renting a fully managed server to a 3rd party who was a 
contractor for this reclamation department for the DOD.  He described the 
department's role as dealing with rusty old equipment the US Military would 
otherwise be leaving as waste.   

We need people with wireless detective skills, and xray or thermal microscopic 
interrogation of the circuits to identify added circuitry installed at the 
fabrication facility which was not a part of the original design.   Perhaps 
simulators of the circuits could show what the thermal footprint should look 
like and it could be compared to the actual fabricated device.  I know there 
are programmable radios that can detect typical RF signals.   Perhaps these 
could be employed to observe the wireless spectrum surrounding an active USB 
flash drive. 

I cannot say whether an NVME host adapter instead of the flash drives would 
make any difference. 

I presume the info has been squelched. 

I'm just passing it on.  Because I used to be very security conscious and I'd 
run linux from flash memory sticks mostly to practice best practices.   Then I 
had to live on the run for a while.   I know this can mean life or death.  
Police in Bakersfield, California made an attempt to kill me.   And I know 
journalists are counting on the best practices to be shown to them.  

I did post the original message I sent to the list here at my web site:  
https://josephwilliambaker.com/usb-flash-drive-remote-vulnerability/

If you'd like me to make a video and swear under penalty of perjury I'll gladly 
do that on my youtube channel at https://youtube.com/@remedyreport

Here I've recorded a video statement under penalty of perjury.  
https://www.linkedin.com/video/live/urn:li:ugcPost:7379628842157543424/

I'm also on keybase as @foghorn 
My linkedin page is https://linkedin.com/in/remedyreport
I was on the leadership team of the Silicon Valley Bitcoin Meetup Group
https://www.meetup.com/silicon-valley-bitcoin-users/members/?op=leaders


David, what is your standard of evidence?   I'll do the best I can to assert 
this claim because it basically shows us that what we thought were air gapped 
systems are vulnerable somehow through the memory stick. 

Knowing this I removed the wifi card from my motherboard in the past when I was 
having difficulty with my live broadcasts.

Note: I still use memory sticks now and then but I have enjoyed running linux 
installers from a usb stick with the "TORAM" kernel option and then remove the 
stick during the install.  
_______________________________________________
Tails-dev mailing list
[email protected]
https://www.autistici.org/mailman/listinfo/tails-dev
To unsubscribe from this list, send an empty email to 
[email protected].

Reply via email to