Mike Ryan is a penetration tester (“security consultant”) at iSEC Partners. At iSEC, Mike does low-level wireless and embedded testing as much as possible. Too often he’s stuck doing mobile and web security, along with red team penetration tests and incident response. In 2013 Mike released a tool called crackle. Crackle cracks the key exchange in Bluetooth Smart (BLE), allowing a *passive* eavesdropper to capture and decrypt all data sent over BLE. He has since gone on to develop an arsenal of BLE active attack tools. Mike has presented ToorCon, ShmooCon, BlackHat, CanSecWest, and USENIX Security. He has been playing the game since 2002 and employs a wide array of skills, tricks, and leet hax on a daily basis.