Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 6 August 2013

CreepyDOL - The sinister Espionage System for $57

Posted on 09:29 by Unknown
Brendan O’Connor is a security researcher. How easy would it be, he recently wondered, to monitor the movement of everyone on the street – not by a government intelligence agency, but by a private citizen with a few hundred dollars to spare?

Mr. O’Connor, 27, bought some plastic boxes and stuffed them with a $25, credit-card size Raspberry Pi Model A computer and a few over-the-counter sensors, including Wi-Fi adapters. He connected each of those boxes to a command and control system, and he built a data visualization system to monitor what the sensors picked up: all the wireless traffic emitted by every nearby wireless device, including smartphones.


Each box cost $57. He produced 10 of them, and then he turned them on – to spy on himself. He could pick up the Web sites he browsed when he connected to a public Wi-Fi – say at a cafe – and he scooped up the unique identifier connected to his phone and iPad. Gobs of information traveled over the Internet in the clear, meaning they were entirely unencrypted and simple to scoop up.

Even when he didn’t connect to a Wi-Fi network, his sensors could track his location through Wi-Fi “pings.” His iPhone pinged the iMessage server to check for new messages. When he logged on to an unsecured Wi-Fi, it revealed what operating system he was using on what kind of device, and whether he was using Dropbox or went on a dating site or browsed for shoes on an e-commerce site. One site might leak his e-mail address, another his photo.

“It could be used for anything depending on how creepy you want to be,” he said.

You could spy on your ex-lover, by placing the sensor boxes near the places the person frequents, or your teenage child, or the residents of a particular neighborhood. You could keep tabs on people who gather at a certain house of worship or take part in a protest demonstration in a town square. Their phones and tablets, Mr. O’Connor argued, would surely leak some information about them – and certainly if they then connected to an unsecured Wi-Fi. The boxes are small enough to be tucked under a cafe table or dropped from a hobby drone. They can be scattered around a city and go unnoticed. (more) (Want your own CreepyDOL?)


Yet another thing a TSCM survey could uncover for you.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in amateur, cautionary tale, espionage, FutureWatch, Hack, privacy, spybot, surveillance, tracking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • Bugging Boss for a Raise Lands Three Employees in Jail
    China - Three public officials were each sentenced to 20 months in jail for illegally wiretapping a county Communist Party chief of central ...
  • Holiday Shopping Safety Infographic
    Click to enlarge . Click to enlarge .
  • New York Times - Quote of the Day - Tapped Out On Taps
    "I'm so jaded at this point that I'm not surprised. And from my perspective, let them all wear wires. Let's catch everybody...
  • From BULLRUN to NOCON and LACONIC
    On September 5, The Guardian , The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption sy...
  • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone to Thwart Spyware
    Sometimes you just need a dumb phone that can't spy on you.   inKlien Global's tiny phone 6.5mm Ultra Thin AIEK M3 Cool Card Cell Ph...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ▼  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ▼  August (50)
      • The red phone that was NOT on the Hotline
      • Researchers Grow Human Brains in a Lab
      • Snapchat Not So Private and Secure
      • FutureWatch: On the Road to The Corporate State
      • Government and Business Team Up Against Espionage...
      • Wiretapping Sparks Naked Protest
      • Use of phone-tracking technology in shopping cente...
      • The 50th anniversary of the Washington-Moscow Hotline
      • Millions of Android Users Vulnerable to Security T...
      • Spybusters Tip #972 - Own a Foscam FI9821W Megapix...
      • Snoop in the Soup - (You Can't Make This S--- Up)
      • Your Boss Won't Stop Spying on You (Because It Works)
      • NSA also has arrangements with foreign internet pr...
      • Boyfriend Tracker app Booted from Google Play
      • Homes Hacked Through Wireless Devices - There Real...
      • CEO Pleads Guilty to Wiretapping Charge
      • FutureWatch: Eavesdropping via Mind Reading
      • Laser Beam Eavesdropping - In the News Again
      • Spybusters Tip #948 - Android Device Manager Allow...
      • Last of the Nixon Tapes Go Online
      • Do You Know Your NSA History? (Pop Quiz - no prize)
      • Who Gets the Bill for Government Wiretaps?
      • Spy Drone Pisses Off Dr. Wee
      • IKEA Store Union's Covert Video Allowed
      • Intel's IT Computer Network PanOptiCop - Code Name...
      • Some Stuff Around the House Which Might Be Spying ...
      • Spybusters Tip # 723 - Be Smart - Use a Dumb Phone...
      • Before you snicker, review your spy service's history
      • The Latest Holiday Season Spy Toy Rolls Out... and...
      • "Paranoia is our friend."
      • FutureWatch: Powerless Bugs or Teslabestiola
      • Man Bugs his Ex's Home for Over Three Years
      • Baby Cam Hackers Can See You, Hear You, and Talk t...
      • Spy Cameras, Secret Audio Help Fight Movie Piracy
      • Former Director's Wiretapping Conviction Could Spo...
      • Spy Malware Buried on Official Tibetan Website
      • Clap On - Clap Off... Some Applaud
      • Britain’s Fraud Agency Admits to Loss of Data and ...
      • Silent Circle Silenced
      • Espionage Battlebots - China v. USA - Guess Who Wins
      • Today in Eavesdropping History
      • How to Protect Your Company Against Corporate Espi...
      • Solar-Powered Smartphones (and more) Coming Soon
      • Think Changing Your SIM Card Can Mask Who You Are?...
      • Windows Phones Susceptible to Password Theft When ...
      • CreepyDOL - The sinister Espionage System for $57
      • Mystery Car Thefts - Solved
      • Corporate Sleuths on Edge after China Detains Fore...
      • Men's Room Leaks Prompt Eavesdropping Fears
      • Warrantless Cellphone Tracking Is Upheld
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ►  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ►  October (12)
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile