NSA XKeyscore tool targets Linux users

Apparently the US NSA believes that users of Linux in general, and readers of online ezine Linux Journal in particluar are extremists. According to this article on the NDR.de Panorama blog, internet users whose searches contained terms related to the TAILs (The Amnesic Incognito Live System) software program or Linux Journal had their internet traffic […]

DARPA looks to Oculus as a cyberwar weapon

The Oculus Rift is a high end virtual reality headset being developed for gamers. A team from DARPA has announced that they are working toward integrating the Oculus’s virtual cybervision capabilities into the cyberwar arena. The US armed forces’ far-out research branch known as the Defense Advanced Research Projects Agency (DARPA) showed off its latest […]

The street lights really ARE tracking you

Reuters has reported that overhead street lights are being retrofitted with multi-sensor capabilities. One such platform being used is known as Netsense by Sensity. The Sensity site describes the platform thusly: NetSense integrates LED lighting, sensors, high-speed networking, cloud computing, and big data analytics into a single, MultiService Platform (MSP). With NetSense you get distributed […]

Advice: what to expect when authorities confiscate your electronics

It’s unfortunate that we have to consider these matters, but with governments worldwide obsessed with violating the privacy of ordinary citizens we found a well documented post which puts some flesh on what some naively view as skeletal paranoia. In this comprehensive article Violet Blue of ZDNet outlines the tools and techniques government agents worldwide […]

CreepyDOL WiFi surveillance project debuts at Blackhat/DEFCON

CreepyDOL, the Creepy Digital Object Locator, is a distributed tracking system that uses low-cost hardware sensors, a robust communications system, and simple observation to give near-real-time identification of humans and tracking capabilities to anyone. It’s goal is to develop hardware and software for passive surveillance of WiFi data and draw inferences regarding human behavior therefrom. […]

PiPurr remote cat interaction server

When the cats away, the mice will play. But…. what’s the cat doing when YOU’RE away? That question led Tris of CantHack, a group of geeks from Canterbury, UK, to develop PiPurr. Tris explains, “PiPurr is a simple client-server solution. The server runs on a Raspberry Pi, for low power consumption and provides the functionality […]

Interesting radio frequency: ankle monitors on 314.2 MHz

Now that dongle-based SDRs are exploding in popularity, why not start exploring outside the usual frequency bands? With 64 to 1700+ MHz at your disposal there’s a lot of territory to cover. You’ll find that a number of unusual services occupy some of the lesser know bands not covered by conventional radio scanners. One example […]

Wardriving for ZigBee

Travis Goodspeed has assembled this wardriving project covering the ZigBee wireless protocol. It is designed around the radio module from the TelosB, which is used to sniff for nearby ZigBee/802.15.4 transmissions. This module is connected via serial to a Roving Networks RN42 module which provides a Bluetooth connection to the Nokia N9. Travis’ GoodFET firmware […]

Transparency Grenade blows WiFi privacy out of water

Created in January, 2012, by Julian Oliver for the Studio Weise7 exhibition at Labor 8, Haus der Kulturen der Welt, Berlin, the Transparency Grenade represents a more physical approach to fostering the process of corporate and government transparency than the slow, tedious process of policy reform. Equipped with a tiny computer, microphone and powerful wireless […]

28c3: the FreedomBox

This lightning talk from the recent 28C3 conference in Berlin is a general introduction and status update on the development of the FreedomBox project. The FreedomBox is a personal server running a free software operating system and free applications, designed to preserve personal privacy by providing a secure platform upon which federated social networks can […]

Google tracking expands, threatens privacy

Google appears poised to commence a program of tracking all users across all their services. The company will not allow you to opt-out. For example, they will pair info gained through their email service with search logs, ostensibly to target ads better. Of course such info is individually identifiable and stored for at least 9 […]

TCPDUMP-fu

While most of us are familiar with packet capturing/sniffing programs such as Wireshark, it’s not always the most convenient or appropriate tool to use in every network monitoring situation. Henry Van Styn has written an excellent how-to tutorial on the uses of the Linux command line utility TCPDUMP, and why it may be all you […]

Defcon 19: Network Monitoring with Arduino

Steve Ocepek, Director of Security Research, Trustwave SpiderLabs presented this talk at Defcon 19 (2011). He harkens back to the days of blinking modem lights, and demonstrates how to create a modern day “blinking light” network monitoring device using the Arduino Uno along with itead Studio’s Color Shield. Dubbed the cerealbox, this design interfaces with […]

Defcon 19: Hacking over power lines

Dave Kennedy (ReL1K) presented this talk at last summer’s Defcon 19 conference demonstrating the relative insecurity of home automation devices, such as X10, HomePlug and ZWave modules, which communicate either locally over power lines or via RF in the ISM bands. The presentation covers usage of the Teensy Arduino-based device to emulate a keyboard when […]

Irongeek’s Teensy based SD keylogger

Adrian Crenshaw (“Irongeek”) has released the project details and code for his latest hardware keylogger. If you have a Teensy board and ever thought about experimenting with keyloggers you’ll find everything you need in Adrian’s project description. You simple connect the Teensy between a female PS/2 connector and an SD card adapter and grab the […]

How to find your location using GSM data

Boris Landoni writes to call attention to his interesting article in Open Electronics describing how to find your location using GSM Cell ID data: The radio mobile network is made up of a number of adjacent radio cells, each of which is characterized by an identifier consisting of four data: a progressive number (Cell ID), […]

How to build still another passive ethernet tap

firestorm_v1 from yourwarrantyisvoid has published this detailed tutorial on building and using a passive ethernet tap. His goal in this project is to facilitate network monitoring for intrusion detection purposes, and wanted hardware which will allow the monitoring for traffic without degrading performance.