SlideShare a Scribd company logo
1 of 45
Download to read offline
Am I Being Spied On?
Low-tech Ways Of Detecting High-tech
Surveillance
Dr. Phil
@ppolstra
http://philpolstra.com
What this talk is about
● Determining if you are a victim of spying
– Video surveillance
– Tailing
– Audio eavesdropping
– Devices embedded in your computer,
tablet, or smart phone
Why you should care
● Government assault on Constitution is
well known
● Local governments
● Competitors
● Stalkers
● People who just don't like you
Video surveillance
Common flaw all night vision
cameras share
Detecting this flaw with any
digital camera
Finding a camera with a
phone
Other Ways to Detect IR
Detecting wireless cameras
Free way: Android tablet or
smartphone (ad hoc nets)
Inexpensive way: BeagleBone based system
Simple way using Airodump-ng
Slightly more sophisticated with Python#!/usr/bin/env python
from scapy.all import *
import os, sys, time, operator
interface = "mon0"
clientsIKnow = { }
def sniffClientStrength(p):
if p.haslayer(RadioTap) and p.haslayer(Dot11):
try:
sigStrength = int(-(256-ord(p.notdecoded[-4:-3])))
if str(p.addr2) not in clientsIKnow.keys():
clientsIKnow[str(p.addr2)] = sigStrength
else:
if sigStrength > clientsIKnow[str(p.addr2)]:
clientsIKnow[str(p.addr2)] = sigStrength
except KeyboardInterrupt:
sys.exit(1)
except:
pass
def main():
os.system('clear')
try:
while True:
sniff(iface=interface, prn=sniffClientStrength, timeout=2)
if clientsIKnow:
sorted_list = sorted(clientsIKnow.items(), key=lambda x: x[1], reverse=True)
for item in sorted_list:
print item[0], item[1]
time.sleep(1)
os.system('clear')
clientsIKnow.clear()
sorted_list = []
except KeyboardInterrupt:
pass
if __name__ == '__main__':
main()
More sophisticated Way
Moderately expensive way:
Detecting signals in licensed
bands
● Use an Linear Technologies LTC5582
RMS RF power detector
● Measure LTC5582 output on volt meter
or BeagleBone or ??
● Bandpass filters can be used to look at
individual frequency bands
Moderately Expensive Way
Moderately Expensive Way
Physical surveillance
● Tailing
– Common vehicles used
– Standard techniques
● Stakeout
– Common vehicles used
– Standard techniques
Tailing Vehicles
● Non-government spies choose vehicles to blend in
– Probably not the red Ferrari behind you
– Likely vehicles
● Bland colored Honda or Toyota sedan
● Bland colored SUV
● Whatever is commonly seen in the area
● Government spies drive vehicles issued to them
– Black SUV
– Crown Victoria
– Other vehicles too!
General Tailing Techniques
● Follow distance varies from about 2
cars behind to a block
● Bumper beeper may be used to extend
follow distance to 0.5 – 10.0 miles
● Tail is generally considered blown if
subject has 3 suspicious impressions
Single Car Tailing
● Generally will be closer than multi-car
tails
● More likely to follow traffic laws
● May use a bumper beeper to help
relocate the subject if lost
Multi-car Tailing
● In most cases everyone is behind the
subject
● Some cars may be on parallel streets
– More likely in urban areas
● Tailing vehicles may change relative
positions
● Vehicles might occasionally appear to
go a different direction only to rejoin
later
Combating Tailing
● Look!
– Check around your car for trackers
– Watch for vehicles who seem to be
behind you for long distances
– Watch for vehicles that go away and
then come back
Combating Tailing (contd)
● Detect electronic devices
– Use the previously describe RF
detection system without any
filters
– Scan the AM radio band on your
car radio before you go
● Many homemade or privately available
trackers operate in this frequency band
● If you hear nothing but a strong tone it is
probably a tracker on your car!
Combating Tailing (contd)
● Active techniques
– Drag a few traffic lights
– Take unusual routes
– Drive through residential neighborhoods
– Take a few alleys or deserted side
streets
– Occasionally park for no reason
Stakeout Vehicles
● Same vehicles used in tailing may be
used
● Additional vehicles might be used
– SUV
– Commercial vans
– Pickup trucks with toppers
Combating Stationary
Surveillance
● Look!
– People in parked vehicles
– Construction/utility workers who are
around too long or appear to be
doing nothing
– Commercial vans parked for
extended periods
– Anyone with view of all your exits
Combating Stationary
Surveillance (contd)
● Active techniques
– Get out your binoculars and spy back
– Run outside and jump in your car
● Run back inside and see if anyone
seems to notice
● Drive around the block and see if anyone
followed you
Audio bugging
Detecting active bugs
● Free way: analog AM/FM radio might detect
some bugs
● Inexpensive way: USB TV Tuner Software
Defined Radio (SDR)
– Can detect signals in 50 MHz - 2 GHz
– Commercial bugs are usually 10 MHz - 8
GHz
● Moderately expensive way: Broadband amplifier
connected to TV antenna
● Expensive way: Drop $500 on a commercial
detector
Detecting bugs with a radio
● Must be analog
● Scan through the AM/FM
bands to see if you can hear
the audio you are generating
● Works with only the simplest
bugs
Detecting passive bugs
● Must try to excite bug with RF in correct
band
● If you are close enough and the signal
is strong can still work with wrong
frequency
● Detection is same as active bugs
Exciting the bug
● Free way: Blast it with 2.4 GHz from
your Alfa
● Inexpensive way: Noisy broadband
transmitter attached to TV antenna
Bugs in your computing
devices
● Bugs can be installed by
– intercepting shipments
– "service" professionals
– spies in your local IT staff
– pissed off guy in your office
Detecting bugs
● Free way: Look!
– Bugging devices can be installed externally
– I described a small dropbox easily hidden
behind a computer at DC21
– Same dropbox is easily hidden in other
items on your desk
● Example: Dalek desktop defender
● Example: TARDIS
● Check every device connected to your
computer especially USB and network
Hiding Places
Bugs may be internal
● Open the case and look for obvious
signs
● Pictures of NSA devices have been
leaked
● Inexpensive way: Current leaks
– Bugs need current to run
– Turned off devices shouldn't draw any
power
A modified universal laptop
power supply can be used to
detect this current leakage● Modify the power supply to detect current
● For laptop or phone remove the battery and measure
current with device "off"
– Current flow indicates possible bug
● For tablet fully charge the battery
– Measure the current flow
– Small current might indicate issue with charging circuit
or battery
– If the current peaks when you speak or move in view of
the camera there may be a bug
Laptop Adapter
Laptop Adapter
For a desktop computer
● Physical inspection is best
– Can attempt to detect leakage current
with Kill o Watt or similar
● Many computer power supplies leak
current so this is not conclusive
● Desktop bug might only work when
computer is on
Passive bugs
● Excite as described for passive audio
bugs
● Use same techniques as described
above to detect excited bug
● Won't detect all passive bugs (such as
the expensive NSA bugs)
Summary
● Chose your level of paranoia
● Even if you aren't paranoid you can still
detect many spying activities at no cost
● Truly paranoid can still test without
financial ruin
References
● Hacking and Penetration Testing with
Low Power Devices by Philip Polstra
(Syngress, 2014)
● Jacob Appelbaum talk on NSA spy
device catalog
https://www.youtube.com/watch?
v=vILAlhwUgIU
Questions?
● Come see me after
● @ppolstra on Twitter
● Http://philpolstra.com or http://polstra.org
● More info on BeagleBone drones

More Related Content

What's hot

Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...
Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...
Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...Anish K
 
Introduction to tcpdump
Introduction to tcpdumpIntroduction to tcpdump
Introduction to tcpdumpLev Walkin
 
Dhcp presentation 01
Dhcp presentation 01Dhcp presentation 01
Dhcp presentation 01maverick4489
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Diverajdeep
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
Introduction to Linux Kernel by Quontra Solutions
Introduction to Linux Kernel by Quontra SolutionsIntroduction to Linux Kernel by Quontra Solutions
Introduction to Linux Kernel by Quontra SolutionsQUONTRASOLUTIONS
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentationraini
 
Red Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud InfrastructureRed Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud InfrastructureAlex Baretto
 
Lacp Agreement
Lacp AgreementLacp Agreement
Lacp AgreementPLVision
 
Introduction to Docker storage, volume and image
Introduction to Docker storage, volume and imageIntroduction to Docker storage, volume and image
Introduction to Docker storage, volume and imageejlp12
 
OpenStack Networking
OpenStack NetworkingOpenStack Networking
OpenStack NetworkingIlya Shakhat
 
Deep dive into highly available open stack architecture openstack summit va...
Deep dive into highly available open stack architecture   openstack summit va...Deep dive into highly available open stack architecture   openstack summit va...
Deep dive into highly available open stack architecture openstack summit va...Arthur Berezin
 
Containers and workload security an overview
Containers and workload security an overview Containers and workload security an overview
Containers and workload security an overview Krishna-Kumar
 

What's hot (20)

Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...
Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...
Real Time Storage Configuration Using PERC9 on Dell 13th Generation PowerEdge...
 
Introduction to tcpdump
Introduction to tcpdumpIntroduction to tcpdump
Introduction to tcpdump
 
Kubernetes 101
Kubernetes 101Kubernetes 101
Kubernetes 101
 
Dhcp presentation 01
Dhcp presentation 01Dhcp presentation 01
Dhcp presentation 01
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
 
Linux05 DHCP Server
Linux05 DHCP ServerLinux05 DHCP Server
Linux05 DHCP Server
 
Linux Audio Drivers. ALSA
Linux Audio Drivers. ALSALinux Audio Drivers. ALSA
Linux Audio Drivers. ALSA
 
802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Arpspoofing
ArpspoofingArpspoofing
Arpspoofing
 
Nikto
NiktoNikto
Nikto
 
Introduction to Linux Kernel by Quontra Solutions
Introduction to Linux Kernel by Quontra SolutionsIntroduction to Linux Kernel by Quontra Solutions
Introduction to Linux Kernel by Quontra Solutions
 
EMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgradeEMEA Airheads - Multi zone ap and centralized image upgrade
EMEA Airheads - Multi zone ap and centralized image upgrade
 
DHCP Server & Client Presentation
DHCP Server & Client PresentationDHCP Server & Client Presentation
DHCP Server & Client Presentation
 
Red Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud InfrastructureRed Hat OpenStack - Open Cloud Infrastructure
Red Hat OpenStack - Open Cloud Infrastructure
 
Lacp Agreement
Lacp AgreementLacp Agreement
Lacp Agreement
 
Introduction to Docker storage, volume and image
Introduction to Docker storage, volume and imageIntroduction to Docker storage, volume and image
Introduction to Docker storage, volume and image
 
OpenStack Networking
OpenStack NetworkingOpenStack Networking
OpenStack Networking
 
Deep dive into highly available open stack architecture openstack summit va...
Deep dive into highly available open stack architecture   openstack summit va...Deep dive into highly available open stack architecture   openstack summit va...
Deep dive into highly available open stack architecture openstack summit va...
 
Containers and workload security an overview
Containers and workload security an overview Containers and workload security an overview
Containers and workload security an overview
 

Viewers also liked

Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor SkochinskyCODE BLUE
 
Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...CODE BLUE
 
Smart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PISmart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PIKrishna Kumar
 
Halvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedHalvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedArea41
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillPriyanka Aash
 
Cyberhijacking Airplanes Truth or Fiction
Cyberhijacking Airplanes Truth or FictionCyberhijacking Airplanes Truth or Fiction
Cyberhijacking Airplanes Truth or FictionPhilip Polstra
 
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor SkochinskyインテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor SkochinskyCODE BLUE
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Featuresxabean
 
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...CODE BLUE
 
The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012Philip Polstra
 
"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant Reading"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant ReadingShalin Hai-Jew
 
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki ChidaIDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki ChidaCODE BLUE
 
Dna Technology
Dna TechnologyDna Technology
Dna Technologyannperry09
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...CODE BLUE
 

Viewers also liked (20)

Secret of Intel Management Engine by Igor Skochinsky
Secret of Intel Management Engine  by Igor SkochinskySecret of Intel Management Engine  by Igor Skochinsky
Secret of Intel Management Engine by Igor Skochinsky
 
Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...Preventing hard disk firmware manipulation attack and disaster recovery by Da...
Preventing hard disk firmware manipulation attack and disaster recovery by Da...
 
Polstra 44con2012
Polstra 44con2012Polstra 44con2012
Polstra 44con2012
 
Smart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PISmart Wireless Surveillance Monitoring using RASPBERRY PI
Smart Wireless Surveillance Monitoring using RASPBERRY PI
 
Halvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromisedHalvar Flake: Why Johnny can’t tell if he is compromised
Halvar Flake: Why Johnny can’t tell if he is compromised
 
Defcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveillDefcon 22-robert-rowley-detecting-defending-against-surveill
Defcon 22-robert-rowley-detecting-defending-against-surveill
 
Cyberhijacking Airplanes Truth or Fiction
Cyberhijacking Airplanes Truth or FictionCyberhijacking Airplanes Truth or Fiction
Cyberhijacking Airplanes Truth or Fiction
 
Thotcon2013
Thotcon2013Thotcon2013
Thotcon2013
 
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor SkochinskyインテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
インテルMEの秘密 - チップセットに隠されたコードと、それが一体何をするかを見出す方法 - by イゴール・スコチンスキー - Igor Skochinsky
 
Controlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden FeaturesControlling USB Flash Drive Controllers: Expose of Hidden Features
Controlling USB Flash Drive Controllers: Expose of Hidden Features
 
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
Practical network defense at scale Or: Protecting the “Eierlegende Wollmichsa...
 
The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012The Deck by Phil Polstra GrrCON2012
The Deck by Phil Polstra GrrCON2012
 
Philip polstra
Philip polstraPhilip polstra
Philip polstra
 
Surveillance
SurveillanceSurveillance
Surveillance
 
"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant Reading"Mass Surveillance" through Distant Reading
"Mass Surveillance" through Distant Reading
 
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki ChidaIDA Vulnerabilities and Bug Bounty  by Masaaki Chida
IDA Vulnerabilities and Bug Bounty  by Masaaki Chida
 
Spy - Thriller Genre Analysis
Spy - Thriller Genre AnalysisSpy - Thriller Genre Analysis
Spy - Thriller Genre Analysis
 
Dna Technology
Dna TechnologyDna Technology
Dna Technology
 
HOW TO HACK HANGOUTS
HOW TO HACK HANGOUTS HOW TO HACK HANGOUTS
HOW TO HACK HANGOUTS
 
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
A Security Barrier Device That Can Protect Critical Data Regardless of OS or ...
 

Similar to Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCON 22)

Defcon 22-phil-polstra-am-i-being-spied-on
Defcon 22-phil-polstra-am-i-being-spied-onDefcon 22-phil-polstra-am-i-being-spied-on
Defcon 22-phil-polstra-am-i-being-spied-onPriyanka Aash
 
DSEF CON 27 - WILL C - phreaking elevators
DSEF CON 27 - WILL C - phreaking elevatorsDSEF CON 27 - WILL C - phreaking elevators
DSEF CON 27 - WILL C - phreaking elevatorsFelipe Prado
 
DerbyCon: Surveillance Using Spare Stuff
DerbyCon: Surveillance Using Spare StuffDerbyCon: Surveillance Using Spare Stuff
DerbyCon: Surveillance Using Spare StuffThreatReel Podcast
 
SUAS & Arduino Presentation - Staples - 20140403 - CLEARED
SUAS & Arduino Presentation - Staples - 20140403 - CLEAREDSUAS & Arduino Presentation - Staples - 20140403 - CLEARED
SUAS & Arduino Presentation - Staples - 20140403 - CLEAREDGabriel Staples
 
Voice controlled home automation.pptx
Voice controlled home automation.pptxVoice controlled home automation.pptx
Voice controlled home automation.pptxTamil964528
 
Distance measuring using ultra sonic sensor (2).pptx
Distance measuring using ultra sonic sensor (2).pptxDistance measuring using ultra sonic sensor (2).pptx
Distance measuring using ultra sonic sensor (2).pptxDrTRaghavendraVishnu
 
Worksheet for Introduction to Software Defined Radio (SDR)
Worksheet for Introduction to Software Defined Radio (SDR)Worksheet for Introduction to Software Defined Radio (SDR)
Worksheet for Introduction to Software Defined Radio (SDR)Pamela O'Shea
 
An Iot Noise Detector with Automatic Recording System.pptx
An Iot Noise Detector with Automatic Recording System.pptxAn Iot Noise Detector with Automatic Recording System.pptx
An Iot Noise Detector with Automatic Recording System.pptxJAYPRAKASH383047
 
Accident prevention using bluetooth tech and eye blink sensor
Accident prevention using bluetooth tech and eye blink sensorAccident prevention using bluetooth tech and eye blink sensor
Accident prevention using bluetooth tech and eye blink sensorAntony Ignesh
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!Aaron Lafferty
 
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - AaronBirds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - AaronHITCON GIRLS
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptxssusere578aa
 
A COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptx
A COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptxA COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptx
A COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptxJessicaWein1
 
Troubleshooting methods of computer peripherals
Troubleshooting methods of computer peripheralsTroubleshooting methods of computer peripherals
Troubleshooting methods of computer peripheralsDevyani Chaudhari
 
Smart solution for collision at doors using Arduino
Smart solution for collision at doors using ArduinoSmart solution for collision at doors using Arduino
Smart solution for collision at doors using ArduinoAmon Olimov
 
FIRSTFare 2013 overview of electronics-2014
FIRSTFare 2013   overview of electronics-2014FIRSTFare 2013   overview of electronics-2014
FIRSTFare 2013 overview of electronics-2014Oregon FIRST Robotics
 
Car automation OHM2013
Car automation OHM2013Car automation OHM2013
Car automation OHM2013Marian Marinov
 
Autonomous robotics based on simple sensor inputs.
Autonomous robotics based on simplesensor inputs.Autonomous robotics based on simplesensor inputs.
Autonomous robotics based on simple sensor inputs. sathish sak
 

Similar to Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCON 22) (20)

Defcon 22-phil-polstra-am-i-being-spied-on
Defcon 22-phil-polstra-am-i-being-spied-onDefcon 22-phil-polstra-am-i-being-spied-on
Defcon 22-phil-polstra-am-i-being-spied-on
 
DSEF CON 27 - WILL C - phreaking elevators
DSEF CON 27 - WILL C - phreaking elevatorsDSEF CON 27 - WILL C - phreaking elevators
DSEF CON 27 - WILL C - phreaking elevators
 
DerbyCon: Surveillance Using Spare Stuff
DerbyCon: Surveillance Using Spare StuffDerbyCon: Surveillance Using Spare Stuff
DerbyCon: Surveillance Using Spare Stuff
 
SUAS & Arduino Presentation - Staples - 20140403 - CLEARED
SUAS & Arduino Presentation - Staples - 20140403 - CLEAREDSUAS & Arduino Presentation - Staples - 20140403 - CLEARED
SUAS & Arduino Presentation - Staples - 20140403 - CLEARED
 
Voice controlled home automation.pptx
Voice controlled home automation.pptxVoice controlled home automation.pptx
Voice controlled home automation.pptx
 
project2presentation.pptx
project2presentation.pptxproject2presentation.pptx
project2presentation.pptx
 
Project PPT.pptx
Project PPT.pptxProject PPT.pptx
Project PPT.pptx
 
Distance measuring using ultra sonic sensor (2).pptx
Distance measuring using ultra sonic sensor (2).pptxDistance measuring using ultra sonic sensor (2).pptx
Distance measuring using ultra sonic sensor (2).pptx
 
Worksheet for Introduction to Software Defined Radio (SDR)
Worksheet for Introduction to Software Defined Radio (SDR)Worksheet for Introduction to Software Defined Radio (SDR)
Worksheet for Introduction to Software Defined Radio (SDR)
 
An Iot Noise Detector with Automatic Recording System.pptx
An Iot Noise Detector with Automatic Recording System.pptxAn Iot Noise Detector with Automatic Recording System.pptx
An Iot Noise Detector with Automatic Recording System.pptx
 
Accident prevention using bluetooth tech and eye blink sensor
Accident prevention using bluetooth tech and eye blink sensorAccident prevention using bluetooth tech and eye blink sensor
Accident prevention using bluetooth tech and eye blink sensor
 
FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!FM & Bluetooth & WIFI, Oh My!
FM & Bluetooth & WIFI, Oh My!
 
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - AaronBirds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
Birds of a Feather 2017: 邀請分享 IoT, SDR, and Car Security - Aaron
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
A COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptx
A COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptxA COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptx
A COMPLETE GUIDE FOR BUILDING AN INTERVIEW RECORDING.pptx
 
Troubleshooting methods of computer peripherals
Troubleshooting methods of computer peripheralsTroubleshooting methods of computer peripherals
Troubleshooting methods of computer peripherals
 
Smart solution for collision at doors using Arduino
Smart solution for collision at doors using ArduinoSmart solution for collision at doors using Arduino
Smart solution for collision at doors using Arduino
 
FIRSTFare 2013 overview of electronics-2014
FIRSTFare 2013   overview of electronics-2014FIRSTFare 2013   overview of electronics-2014
FIRSTFare 2013 overview of electronics-2014
 
Car automation OHM2013
Car automation OHM2013Car automation OHM2013
Car automation OHM2013
 
Autonomous robotics based on simple sensor inputs.
Autonomous robotics based on simplesensor inputs.Autonomous robotics based on simplesensor inputs.
Autonomous robotics based on simple sensor inputs.
 

Recently uploaded

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Am I being spied on: Low-tech ways of detecting high-tech surveillance (DEFCON 22)

  • 1. Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance Dr. Phil @ppolstra http://philpolstra.com
  • 2. What this talk is about ● Determining if you are a victim of spying – Video surveillance – Tailing – Audio eavesdropping – Devices embedded in your computer, tablet, or smart phone
  • 3. Why you should care ● Government assault on Constitution is well known ● Local governments ● Competitors ● Stalkers ● People who just don't like you
  • 5. Common flaw all night vision cameras share
  • 6. Detecting this flaw with any digital camera
  • 7. Finding a camera with a phone
  • 8. Other Ways to Detect IR
  • 10. Free way: Android tablet or smartphone (ad hoc nets)
  • 12. Simple way using Airodump-ng
  • 13. Slightly more sophisticated with Python#!/usr/bin/env python from scapy.all import * import os, sys, time, operator interface = "mon0" clientsIKnow = { } def sniffClientStrength(p): if p.haslayer(RadioTap) and p.haslayer(Dot11): try: sigStrength = int(-(256-ord(p.notdecoded[-4:-3]))) if str(p.addr2) not in clientsIKnow.keys(): clientsIKnow[str(p.addr2)] = sigStrength else: if sigStrength > clientsIKnow[str(p.addr2)]: clientsIKnow[str(p.addr2)] = sigStrength except KeyboardInterrupt: sys.exit(1) except: pass def main(): os.system('clear') try: while True: sniff(iface=interface, prn=sniffClientStrength, timeout=2) if clientsIKnow: sorted_list = sorted(clientsIKnow.items(), key=lambda x: x[1], reverse=True) for item in sorted_list: print item[0], item[1] time.sleep(1) os.system('clear') clientsIKnow.clear() sorted_list = [] except KeyboardInterrupt: pass if __name__ == '__main__': main()
  • 15. Moderately expensive way: Detecting signals in licensed bands ● Use an Linear Technologies LTC5582 RMS RF power detector ● Measure LTC5582 output on volt meter or BeagleBone or ?? ● Bandpass filters can be used to look at individual frequency bands
  • 18. Physical surveillance ● Tailing – Common vehicles used – Standard techniques ● Stakeout – Common vehicles used – Standard techniques
  • 19. Tailing Vehicles ● Non-government spies choose vehicles to blend in – Probably not the red Ferrari behind you – Likely vehicles ● Bland colored Honda or Toyota sedan ● Bland colored SUV ● Whatever is commonly seen in the area ● Government spies drive vehicles issued to them – Black SUV – Crown Victoria – Other vehicles too!
  • 20. General Tailing Techniques ● Follow distance varies from about 2 cars behind to a block ● Bumper beeper may be used to extend follow distance to 0.5 – 10.0 miles ● Tail is generally considered blown if subject has 3 suspicious impressions
  • 21. Single Car Tailing ● Generally will be closer than multi-car tails ● More likely to follow traffic laws ● May use a bumper beeper to help relocate the subject if lost
  • 22. Multi-car Tailing ● In most cases everyone is behind the subject ● Some cars may be on parallel streets – More likely in urban areas ● Tailing vehicles may change relative positions ● Vehicles might occasionally appear to go a different direction only to rejoin later
  • 23. Combating Tailing ● Look! – Check around your car for trackers – Watch for vehicles who seem to be behind you for long distances – Watch for vehicles that go away and then come back
  • 24. Combating Tailing (contd) ● Detect electronic devices – Use the previously describe RF detection system without any filters – Scan the AM radio band on your car radio before you go ● Many homemade or privately available trackers operate in this frequency band ● If you hear nothing but a strong tone it is probably a tracker on your car!
  • 25. Combating Tailing (contd) ● Active techniques – Drag a few traffic lights – Take unusual routes – Drive through residential neighborhoods – Take a few alleys or deserted side streets – Occasionally park for no reason
  • 26. Stakeout Vehicles ● Same vehicles used in tailing may be used ● Additional vehicles might be used – SUV – Commercial vans – Pickup trucks with toppers
  • 27. Combating Stationary Surveillance ● Look! – People in parked vehicles – Construction/utility workers who are around too long or appear to be doing nothing – Commercial vans parked for extended periods – Anyone with view of all your exits
  • 28. Combating Stationary Surveillance (contd) ● Active techniques – Get out your binoculars and spy back – Run outside and jump in your car ● Run back inside and see if anyone seems to notice ● Drive around the block and see if anyone followed you
  • 30. Detecting active bugs ● Free way: analog AM/FM radio might detect some bugs ● Inexpensive way: USB TV Tuner Software Defined Radio (SDR) – Can detect signals in 50 MHz - 2 GHz – Commercial bugs are usually 10 MHz - 8 GHz ● Moderately expensive way: Broadband amplifier connected to TV antenna ● Expensive way: Drop $500 on a commercial detector
  • 31. Detecting bugs with a radio ● Must be analog ● Scan through the AM/FM bands to see if you can hear the audio you are generating ● Works with only the simplest bugs
  • 32. Detecting passive bugs ● Must try to excite bug with RF in correct band ● If you are close enough and the signal is strong can still work with wrong frequency ● Detection is same as active bugs
  • 33. Exciting the bug ● Free way: Blast it with 2.4 GHz from your Alfa ● Inexpensive way: Noisy broadband transmitter attached to TV antenna
  • 34. Bugs in your computing devices ● Bugs can be installed by – intercepting shipments – "service" professionals – spies in your local IT staff – pissed off guy in your office
  • 35. Detecting bugs ● Free way: Look! – Bugging devices can be installed externally – I described a small dropbox easily hidden behind a computer at DC21 – Same dropbox is easily hidden in other items on your desk ● Example: Dalek desktop defender ● Example: TARDIS ● Check every device connected to your computer especially USB and network
  • 37. Bugs may be internal ● Open the case and look for obvious signs ● Pictures of NSA devices have been leaked ● Inexpensive way: Current leaks – Bugs need current to run – Turned off devices shouldn't draw any power
  • 38. A modified universal laptop power supply can be used to detect this current leakage● Modify the power supply to detect current ● For laptop or phone remove the battery and measure current with device "off" – Current flow indicates possible bug ● For tablet fully charge the battery – Measure the current flow – Small current might indicate issue with charging circuit or battery – If the current peaks when you speak or move in view of the camera there may be a bug
  • 41. For a desktop computer ● Physical inspection is best – Can attempt to detect leakage current with Kill o Watt or similar ● Many computer power supplies leak current so this is not conclusive ● Desktop bug might only work when computer is on
  • 42. Passive bugs ● Excite as described for passive audio bugs ● Use same techniques as described above to detect excited bug ● Won't detect all passive bugs (such as the expensive NSA bugs)
  • 43. Summary ● Chose your level of paranoia ● Even if you aren't paranoid you can still detect many spying activities at no cost ● Truly paranoid can still test without financial ruin
  • 44. References ● Hacking and Penetration Testing with Low Power Devices by Philip Polstra (Syngress, 2014) ● Jacob Appelbaum talk on NSA spy device catalog https://www.youtube.com/watch? v=vILAlhwUgIU
  • 45. Questions? ● Come see me after ● @ppolstra on Twitter ● Http://philpolstra.com or http://polstra.org ● More info on BeagleBone drones