Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

A Cheap Spying Tool With a High Creepy Factor
blogs.nytimes.com ^ | 8/2/13 | Somini Sengupta

Posted on 08/03/2013 5:12:33 AM PDT by LibWhacker

With a handful of plastic boxes and over-the-counter sensors, including Wi-Fi adapters and a USB hub, Brendan O’Connor, a security researcher, was able to monitor all the wireless traffic emitted by nearby wireless devices.Brendan O’Connor With a handful of plastic boxes and over-the-counter sensors, including Wi-Fi adapters and a USB hub, Brendan O’Connor, a security researcher, was able to monitor all the wireless traffic emitted by nearby wireless devices.

Brendan O’Connor is a security researcher. How easy would it be, he recently wondered, to monitor the movement of everyone on the street – not by a government intelligence agency, but by a private citizen with a few hundred dollars to spare?

Mr. O’Connor, 27, bought some plastic boxes and stuffed them with a $25, credit-card size Raspberry Pi Model A computer and a few over-the-counter sensors, including Wi-Fi adapters. He connected each of those boxes to a command and control system, and he built a data visualization system to monitor what the sensors picked up: all the wireless traffic emitted by every nearby wireless device, including smartphones.

Each box cost $57. He produced 10 of them, and then he turned them on – to spy on himself. He could pick up the Web sites he browsed when he connected to a public Wi-Fi – say at a cafe – and he scooped up the unique identifier connected to his phone and iPad. Gobs of information traveled over the Internet in the clear, meaning they were entirely unencrypted and simple to scoop up.

(Excerpt) Read more at bits.blogs.nytimes.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: cheap; spying; tools; wifi

1 posted on 08/03/2013 5:12:34 AM PDT by LibWhacker
[ Post Reply | Private Reply | View Replies]

To: LibWhacker

... one reason to NEVER download your banking data on your smart phone!


2 posted on 08/03/2013 5:16:04 AM PDT by Ken522
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ken522

That’s what encryption is for. Anyone can listen in and gather as much data as they like, but all that banking data will just be gibberish.


3 posted on 08/03/2013 5:40:25 AM PDT by ctdonath2 (Making good people helpless doesn't make bad people harmless.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Ken522

Yes, never do anything serious on a public wi-fi connection.


4 posted on 08/03/2013 5:49:30 AM PDT by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 2 | View Replies]

To: LibWhacker

Burn a free Backtrack live CD and you can do this without building any hardware.


5 posted on 08/03/2013 6:04:59 AM PDT by bigbob
[ Post Reply | Private Reply | To 1 | View Replies]

To: FreedomPoster
Yes, never do anything serious on a public wi-fi connection.

AFAIK, attaching to a web site that has https is always safe as the data is encrypted both ways.

6 posted on 08/03/2013 6:14:45 AM PDT by upchuck (To the faceless, jack-booted government bureaucrat who just scanned this post: SCREW YOU!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: upchuck

If everyone does things right on both ends, true. Not infrequently, they don’t. Better safe than sorry.


7 posted on 08/03/2013 6:27:18 AM PDT by FreedomPoster (Islam delenda est)
[ Post Reply | Private Reply | To 6 | View Replies]

To: ctdonath2
That’s what encryption is for. Anyone can listen in and gather as much data as they like, but all that banking data will just be gibberish.

If you open your banking page on an open wi-fi and then proceed to log on, that log-on was not encrypted.

Even when encrypted, people don't necessarily have to read the encryption to use it. Capture the train and resend it. For example, you send an encrypted signal to deactivate your house alarm for the exterminator. I capture that signal and resend it. I don't have to be able to read the signal just know what it does and duplicate it. This gets much more complicated, as people parse coded commands by knowing what a string length means regarding function.

For a code to prevent this, but send and receiver must be time synced with an ever changing algorithm based on the time. That is a very complicated code.

8 posted on 08/03/2013 7:29:54 AM PDT by SampleMan (Feral Humans are the refuse of socialism.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: LibWhacker

There are now thumb tip sized USB WIFI antennas, that with a little modification could look the same, but could do all sorts of things.

For example voice recording the entire room, compressing the recording and sending small mp3 files to a particular IP address, without the computer even being part of the process.


9 posted on 08/03/2013 7:54:08 AM PDT by yefragetuwrabrumuy (Be Brave! Fear is just the opposite of Nar!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Ken522

I was thinking one more reason to toss the cell phone in the trash.


10 posted on 08/03/2013 8:58:04 AM PDT by B4Ranch (AGENDA: Grinding America Down ----- http://vimeo.com/63749370)
[ Post Reply | Private Reply | To 2 | View Replies]

To: SampleMan

Those only apply of the crypto programmer is incompetent.


11 posted on 08/03/2013 9:17:45 AM PDT by ctdonath2 (Making good people helpless doesn't make bad people harmless.)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson