Archive for the ‘surveillance’ Category

Video: PwnDrone The Modern Airborne Cyber Threat

Sunday, June 21st, 2015

In this presentation from the recent BSides Cleveland conference, Devin Gergen explains the basics of UAVs including their history, capabilities and potential. This video is available due to the tireless efforts of Irongeek.

Tags: , ,
Posted in security, surveillance, Videos | No Comments »

NSA XKeyscore tool targets Linux users

Friday, July 4th, 2014

Apparently the US NSA believes that users of Linux in general, and readers of online ezine Linux Journal in particluar are extremists. According to this article on the Panorama blog, internet users whose searches contained terms related to the TAILs (The Amnesic Incognito Live System) software program or Linux...

Tags: , , , , ,
Posted in code, Linux, surveillance | No Comments »

DARPA looks to Oculus as a cyberwar weapon

Sunday, May 25th, 2014

The Oculus Rift is a high end virtual reality headset being developed for gamers. A team from DARPA has announced that they are working toward integrating the Oculus's virtual cybervision capabilities into the cyberwar arena. The US armed forces’ far-out research branch known as the Defense Advanced Research Projects Agency...

Tags: , ,
Posted in News, security, surveillance | 2 Comments »

The street lights really ARE tracking you

Thursday, November 14th, 2013

Reuters has reported that overhead street lights are being retrofitted with multi-sensor capabilities. One such platform being used is known as Netsense by Sensity. The Sensity site describes the platform thusly: NetSense integrates LED lighting, sensors, high-speed networking, cloud computing, and big data analytics into a single, MultiService Platform (MSP)....

Tags: , ,
Posted in News, security, sensors, surveillance | 3 Comments »

Advice: what to expect when authorities confiscate your electronics

Monday, August 26th, 2013

It's unfortunate that we have to consider these matters, but with governments worldwide obsessed with violating the privacy of ordinary citizens we found a well documented post which puts some flesh on what some naively view as skeletal paranoia. In this comprehensive article Violet Blue of ZDNet outlines the tools...

Tags: , , ,
Posted in documentation, encryption, people, security, surveillance | 1 Comment »

CreepyDOL WiFi surveillance project debuts at Blackhat/DEFCON

Saturday, August 10th, 2013

CreepyDOL, the Creepy Digital Object Locator, is a distributed tracking system that uses low-cost hardware sensors, a robust communications system, and simple observation to give near-real-time identification of humans and tracking capabilities to anyone. It's goal is to develop hardware and software for passive surveillance of WiFi data and draw...

Tags: , ,
Posted in R-Pi, RF, surveillance, wireless | 3 Comments »

PiPurr remote cat interaction server

Monday, April 15th, 2013

When the cats away, the mice will play. But.... what's the cat doing when YOU'RE away? That question led Tris of CantHack, a group of geeks from Canterbury, UK, to develop PiPurr. Tris explains, "PiPurr is a simple client-server solution. The server runs on a Raspberry Pi, for low power...

Tags: ,
Posted in Android, open source, R-Pi, sensors, surveillance | 2 Comments »

Interesting radio frequency: ankle monitors on 314.2 MHz

Monday, May 28th, 2012

Now that dongle-based SDRs are exploding in popularity, why not start exploring outside the usual frequency bands? With 64 to 1700+ MHz at your disposal there's a lot of territory to cover. You'll find that a number of unusual services occupy some of the lesser know bands not covered by...

Tags: ,
Posted in RF, SDR, surveillance | No Comments »

Wardriving for ZigBee

Tuesday, February 28th, 2012

Travis Goodspeed has assembled this wardriving project covering the ZigBee wireless protocol. It is designed around the radio module from the TelosB, which is used to sniff for nearby ZigBee/802.15.4 transmissions. This module is connected via serial to a Roving Networks RN42 module which provides a Bluetooth connection to the...

Tags: ,
Posted in hacks, RF, surveillance, wireless | No Comments »

Transparency Grenade blows WiFi privacy out of water

Tuesday, February 21st, 2012

Created in January, 2012, by Julian Oliver for the Studio Weise7 exhibition at Labor 8, Haus der Kulturen der Welt, Berlin, the Transparency Grenade represents a more physical approach to fostering the process of corporate and government transparency than the slow, tedious process of policy reform. Equipped with a tiny...

Tags: ,
Posted in Arduino, ARM, surveillance, tools, wireless | 3 Comments »

28c3: the FreedomBox

Thursday, February 9th, 2012

This lightning talk from the recent 28C3 conference in Berlin is a general introduction and status update on the development of the FreedomBox project. The FreedomBox is a personal server running a free software operating system and free applications, designed to preserve personal privacy by providing a secure platform upon...

Tags: , ,
Posted in Development, open source, security, surveillance, talks | No Comments »

Google tracking expands, threatens privacy

Wednesday, January 25th, 2012

Google appears poised to commence a program of tracking all users across all their services. The company will not allow you to opt-out. For example, they will pair info gained through their email service with search logs, ostensibly to target ads better. Of course such info is individually identifiable and...

Tags: ,
Posted in News, surveillance | No Comments »


Monday, December 26th, 2011

While most of us are familiar with packet capturing/sniffing programs such as Wireshark, it's not always the most convenient or appropriate tool to use in every network monitoring situation. Henry Van Styn has written an excellent how-to tutorial on the uses of the Linux command line utility TCPDUMP, and why...

Tags: , ,
Posted in documentation, Linux, surveillance, tcpip | No Comments »

Defcon 19: Network Monitoring with Arduino

Wednesday, November 23rd, 2011

Steve Ocepek, Director of Security Research, Trustwave SpiderLabs presented this talk at Defcon 19 (2011). He harkens back to the days of blinking modem lights, and demonstrates how to create a modern day "blinking light" network monitoring device using the Arduino Uno along with itead Studio's Color Shield. Dubbed the...

Tags: ,
Posted in Arduino, conferences, surveillance, talks | No Comments »

Defcon 19: Hacking over power lines

Friday, November 4th, 2011

Dave Kennedy (ReL1K) presented this talk at last summer's Defcon 19 conference demonstrating the relative insecurity of home automation devices, such as X10, HomePlug and ZWave modules, which communicate either locally over power lines or via RF in the ISM bands. The presentation covers usage of the Teensy Arduino-based device...

Tags: , ,
Posted in hacks, surveillance, talks, wireless | No Comments »

Irongeek’s Teensy based SD keylogger

Thursday, November 3rd, 2011

Adrian Crenshaw ("Irongeek") has released the project details and code for his latest hardware keylogger. If you have a Teensy board and ever thought about experimenting with keyloggers you'll find everything you need in Adrian's project description. You simple connect the Teensy between a female PS/2 connector and an SD...

Tags: , ,
Posted in Arduino, code, how-to, surveillance, tutorials | 1 Comment »

How to find your location using GSM data

Saturday, September 17th, 2011

Boris Landoni writes to call attention to his interesting article in Open Electronics describing how to find your location using GSM Cell ID data: The radio mobile network is made up of a number of adjacent radio cells, each of which is characterized by an identifier consisting of four data:...

Tags: ,
Posted in RF, surveillance, techniques, wireless | 5 Comments »

How to build still another passive ethernet tap

Sunday, August 28th, 2011

firestorm_v1 from yourwarrantyisvoid has published this detailed tutorial on building and using a passive ethernet tap. His goal in this project is to facilitate network monitoring for intrusion detection purposes, and wanted hardware which will allow the monitoring for traffic without degrading performance.

Tags: ,
Posted in how-to, security, surveillance, tcpip, tools | No Comments »

Recent Comments